DEBUG
DEBUG
DEBUG
Release 12.3
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of Cisco Systems, Inc.;
Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE,
CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems
logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ
Net Readiness Scorecard, LightStream, MGX, MICA, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX,
Registrar, ScriptShare, SlideCast, SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0304R)
Introduction DB-1
This chapter explains how you use debug commands to diagnose and resolve internetworking problems.
Specifically, it covers the following topics:
• Entering debug commands
• Using the debug ? command
• Using the debug all command
• Generating debug command output
• Redirecting debug and error message output
Caution Because debugging output is assigned high priority in the CPU process, it can render the system
unusable. For this reason, use debug commands only to troubleshoot specific problems or during
troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug
commands during periods of lower network traffic and fewer users. Debugging during these periods
decreases the likelihood that increased debug command processing overhead will affect system use.
To turn off the debug isdn q931 command, enter the no form of the command at the command line in
privileged EXEC mode:
To display the state of each debugging option, enter the following at the command line in privileged
EXEC mode:
show debugging
debug ?
Not all debugging commands listed in the debug ? output are described in this document. Commands
are included here based on their usefulness in assisting you to diagnose network problems. Commands
not included are typically used internally by Cisco engineers during the development process and are not
intended for use outside the Cisco environment.
debug all
The no debug all command turns off all diagnostic output. Using the no debug all command is a
convenient way to ensure that you have not accidentally left any debug commands turned on.
Caution Because debugging output takes priority over other network traffic, and because the debug all
command generates more output than any other debug command, it can severely diminish the
performance of the router or even render it unusable. In virtually all cases, it is best to use more
specific debug commands.
The router continues to generate such output until you enter the corresponding no debug command (in
this case, the no debug modem command).
If you enable a debug command and no output is displayed, consider the following possibilities:
• The router may not be properly configured to generate the type of traffic you want to monitor. Use
the more system:running-config EXEC command to check its configuration.
• Even if the router is properly configured, it may not generate the type of traffic you want to monitor
during the particular period that debugging is turned on. Depending on the protocol you are
debugging, you can use commands such as the TCP/IP ping EXEC command to generate network
traffic.
Note Be aware that the debugging destination you use affects system overhead. Logging to the console
produces very high overhead, whereas logging to a virtual terminal produces less overhead. Logging
to a syslog server produces even less, and logging to an internal buffer produces the least overhead
of any method.
To configure message logging, you need to be in configuration command mode. To enter this mode, use
the configure terminal command at the EXEC prompt.
logging on
no logging on
no logging console
The logging console command limits the logging messages displayed on the console to messages up to
and including the specified severity level, which is specified by the level argument. Keywords are listed
in order from the most severe level to the least severe.
The no logging console command disables logging to the console.
The following example sets console logging of messages at the debugging level, which is the least severe
level and which displays all logging messages:
logging console debugging
logging buffered
no logging buffered
The logging buffered command copies logging messages to an internal buffer instead of writing them
to the console. The buffer is circular in nature, so newer messages overwrite older messages. To display
the messages that are logged in the buffer, use the show logging privileged EXEC command. The first
message displayed is the oldest message in the buffer.
The no logging buffered command cancels the use of the buffer and writes messages to the console (the
default).
no logging monitor
The logging monitor command limits the logging messages displayed on terminal lines other than the
console line to messages with a level up to and including the specified level argument. To display logging
messages on a terminal (virtual console), use the terminal monitor privileged EXEC command.
The no logging monitor command disables logging to terminal lines other than the console line.
The following example sets the level of messages displayed on monitors other than the console to
notification:
logging monitor notification
The logging host command identifies a syslog server host that is to receive logging messages. The
ip-address argument is the IP address of the host. By issuing this command more than once, you build a
list of syslog servers that receive logging messages.
The no logging host command deletes the syslog server with the specified address from the list of
syslogs.
no logging trap
The logging trap command limits the logging messages sent to syslog servers to logging messages with
a level up to and including the specified level argument.
To send logging messages to a syslog server, specify its host address with the logging host command.
The default trap level is informational.
The no logging trap command returns the trap level to the default.
The current software generates the following categories of syslog messages:
• Error messages at the emergencies level.
• Error messages at the alerts level.
• Error messages at the critical level.
• Error messages about software or hardware malfunctions, displayed at the errors level.
• Interface up/down transitions and system restart messages, displayed at the notification level.
• Reload requests and low-process stack messages, displayed at the informational level.
• Output from the debug commands, displayed at the debugging level.
The show logging privileged EXEC command displays the addresses and levels associated with the
current logging setup. The command output also includes ancillary statistics.
To set up the syslog daemon on a 4.3 BSD UNIX system, include a line such as the following in the file
/etc/syslog.conf:
local7.debugging /usr/adm/logs/tiplog
When the Conditionally Triggered Debugging feature is enabled, the router generates debugging
messages for packets entering or leaving the router on a specified interface; the router will not generate
debugging output for packets entering or leaving through a different interface. You can specify the
interfaces explicitly. For example, you may want to see debugging messages only for one interface or
subinterface. You can also turn on debugging for all interfaces that meet specified conditions. This
feature is useful on dial access servers, which have a large number of ports.
Normally, the router will generate debugging messages for every interface, resulting in a large number
of messages that consume system resources and can make it difficult to find the specific information you
need. By limiting the number of debugging messages, you can receive messages related to only the ports
you want to troubleshoot.
The Conditionally Triggered Debugging feature controls the output from the following protocol-specific
debug commands:
• debug aaa {accounting | authorization | authentication}
• debug dialer packets
• debug isdn {q921 | q931}
• debug modem
• debug ppp {packet | negotiation | error | authentication | compression | cbcp}
Although this feature limits the output of the listed commands, it does not automatically enable the
generation of debugging output from these commands. Debugging messages are generated only when
the protocol-specific debug command is enabled. The debug command output is controlled through two
processes:
• The protocol-specific debug commands specify which protocols are being debugged. For example,
the debug dialer events command generates debugging output related to dialer events.
• The debug condition commands limit these debugging messages to those related to a particular
interface. For example, the debug condition username cisco command generates debugging output
only for interfaces with packets that specify a username of cisco.
To configure Conditionally Triggered Debugging, perform the tasks described in the following sections:
• Enabling Protocol-Specific debug Commands
• Enabling Conditional Debugging Commands
• Specifying Multiple Conditions
Command Purpose
show debugging Determines which types of debugging are enabled.
debug protocol Enables the desired debugging commands.
no debug protocol Disables the debugging commands that are not desired.
If you want to have no output, disable all the protocol-specific debug commands.
Command Purpose
debug condition interface interface-type interface-number Disables debugging messages for all
interfaces except one.
If you enter the debug condition interface command, the debugging output will be turned off for all
interfaces except the specified interface. To reenable debugging output for all interfaces, use the no
debug condition interface command.
If you specify more than one interface by entering this command multiple times, debugging output will
be displayed for all of the specified interfaces. To turn off debugging on a particular interface, use the
no debug interface command. If you use the no debug interface all command or remove the last debug
interface command, debugging output will be reenabled for all interfaces.
Command Purpose
debug condition {username username | Enables conditional debugging. The router will display
called dial-string | caller dial-string} messages only for interfaces that meet this condition.
To reenable the debugging output for all interfaces, use the no debug condition all command.
Command Purpose
debug condition {username username | Enables conditional debugging and specifies the first
called dial-string | caller dial-string} condition.
debug condition {username username | Specifies the second condition. Repeat this task until all
called dial-string | caller dial-string} conditions are specified.
If you enter multiple debug condition commands, debugging output will be generated if an interface
meets at least one of the conditions. If you use the no debug condition command to remove one of the
conditions, using interfaces that meet only that condition will no longer produce debugging output.
However, interfaces that meet a condition other than the removed condition will continue to generate
output. Only if no active conditions are met for an interface will the output for that interface be disabled.
When any debug condition command is entered, debugging messages for conditional debugging are
enabled. The following debugging messages show conditions being met on different interfaces as serial
interface 0 and serial interface 1 come up. For example, the second line of output indicates that serial
interface 0 meets the username cisco condition.
*Mar 1 00:04:41.647: %LINK-3-UPDOWN: Interface Serial0, changed state to up
*Mar 1 00:04:41.715: Se0 Debug: Condition 4, username cisco triggered, count 2
*Mar 1 00:04:42.963: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed
state to up
*Mar 1 00:04:43.271: Vi1 Debug: Condition 3, interface Vt1 triggered, count 1
*Mar 1 00:04:43.271: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
*Mar 1 00:04:43.279: Vi1 Debug: Condition 4, username cisco triggered, count 2
*Mar 1 00:04:43.283: Vi1 Debug: Condition 1, interface Se0 triggered, count 3
*Mar 1 00:04:44.039: %IP-4-DUPADDR: Duplicate address 172.27.32.114 on Ethernet 0,
sourced by 00e0.1e3e.2d41
After a period of time, the show debug condition command displays the revised list of conditions:
Router# show debug condition
Next, serial interface 1 and serial interface 0 go down. When an interface goes down, conditions for that
interface are cleared.
*Mar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down
*Mar 1 00:05:51.471: Se1 Debug: Condition 4, username cisco cleared, count 1
*Mar 1 00:05:51.479: Vi1 Debug: Condition 2, interface Se1 cleared, count 3
*Mar 1 00:05:52.443: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed
state to down
*Mar 1 00:05:56.859: %LINK-3-UPDOWN: Interface Serial0, changed state to down
*Mar 1 00:05:56.887: Se0 Debug: Condition 4, username cisco cleared, count 1
*Mar 1 00:05:56.895: Vi1 Debug: Condition 1, interface Se0 cleared, count 2
*Mar 1 00:05:56.899: Vi1 Debug: Condition 3, interface Vt1 cleared, count 1
*Mar 1 00:05:56.899: Vi1 Debug: Condition 4, username cisco cleared, count 0
*Mar 1 00:05:56.903: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down
*Mar 1 00:05:57.907: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed
state to down
*Mar 1 00:05:57.907: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1,
changed state to down
The final show debug condition output is the same as the output before the interfaces came up:
Router# show debug condition
This chapter contains an alphabetical listing of the debug commands and their descriptions.
Documentation for each command includes a brief description of its use, command syntax, usage
guidelines, sample output, and a description of that output.
Usage Guidelines The information displayed by the debug aaa accounting command is independent of the accounting
protocol used to transfer the accounting information to a server. Use the debug tacacs and debug radius
protocol-specific commands to get more detailed information about protocol-level issues.
You can also use the show accounting command to step through all active sessions and to print all the
accounting records for actively accounted functions. The show accounting command allows you to
display the active “accountable events” on the system. It provides systems administrators a quick look
at what is happening, and may also be useful for collecting information in the event of a data loss of
some kind on the accounting server. The show accounting command displays additional data on the
internal state of the authentication, authorization, and accounting (AAA) security system if debug aaa
accounting is turned on as well.
Examples The following is sample output from the debug aaa accounting command:
Router# debug aaa accounting
Usage Guidelines Use this command to learn the methods of authentication being used and the results of these methods.
Examples The following is sample output from the debug aaa authentication command. A single EXEC login that
uses the “default” method list and the first method, TACACS+, is displayed. The TACACS+ server sends
a GETUSER request to prompt for the username and then a GETPASS request to prompt for the
password, and finally a PASS response to indicate a successful login. The number 50996740 is the
session ID, which is unique for each authentication. Use this ID number to distinguish between different
authentications if several are occurring concurrently.
Router# debug aaa authentication
Usage Guidelines Use this command to learn the methods of authorization being used and the results of these methods.
Examples The following is sample output from the debug aaa authorization command. In this display, an EXEC
authorization for user “carrel” is performed. On the first line, the username is authorized. On the second
and third lines, the attribute value (AV) pairs are authorized. The debug output displays a line for each
AV pair that is authenticated. Next, the display indicates the authorization method used. The final line
in the display indicates the status of the authorization process, which, in this case, has failed.
Router# debug aaa authorization
The aaa authorization command causes a request packet containing a series of AV pairs to be sent to
the TACACS+ daemon as part of the authorization process. The daemon responds in one of the following
three ways:
• Accepts the request as is
• Makes changes to the request
• Refuses the request, thereby refusing authorization
Table 2 describes AV pairs associated with the debug aaa authorization command that may appear in
the debug output.
Examples The following is sample output from the debug aaa cache filterserver command:
Router# debug aaa cache filterserver
Usage Guidelines Dead-criteria transaction values may change with every AAA transaction. Some of the values that can
be displayed are estimated outstanding transactions, retransmit tries, and dead-detect intervals. These
values are explained in Table 3.
Examples The following example shows dead-criteria transaction information for a particular server group:
Router# debug aaa dead-criteria transactions
Field Description
AAA/SG/TRANSAC AAA server-group transactions.
Computed Retransmit Tries Currently computed number of retransmissions before the
server is marked as dead.
Current Tries Number of successive failures since the last valid response.
Current Max Tries Maximum number of tries since the last successful
transaction.
Computed Dead Detect Interval Period of inactivity (the number of seconds since the last
successful transaction) that can elapse before the server is
marked as dead. The period of inactivity starts when a
transaction is sent to a server that is considered live. The
dead-detect interval is the period that the router waits for
responses from the server before the router marks the server
as dead.
Elapsed Time Amount of time that has elapsed since the last valid response.
Current Max Interval Maximum period of inactivity since the last successful
transaction.
Estimated Outstanding Transactions Estimated number of transactions that are associated with the
server.
Current Max Transactions Maximum transactions since the last successful transaction.
Examples The following example shows output from a successful POD request, when using the show debug
command:
Router# debug aaa pod
General OS:
AAA POD packet processing debugging is on
Router#
Apr 25 17:15:59.318:POD:172.19.139.206 request queued
Apr 25 17:15:59.318:voice_pod_request:
Apr 25 17:15:59.318:voip_populate_pod_attr_list:
Apr 25 17:15:59.318:voip_pod_get_guid:
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=50
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr=h323-conf-id
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=50 value_len=35
Apr 25 17:15:59.318:voip_pod_get_guid:conf-id=FFA7785F F7F607BB
00000000 993FB1F4 n_bytes=35
Apr 25 17:15:59.318:voip_pod_get_guid:GUID = FFA7785F F7F607BB 00000000
993FB1F4
Apr 25 17:15:59.318:voip_populate_pod_attr_list:
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr=h323-originate
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23 value_len=6
Apr 25 17:15:59.318:voip_get_call_direction:
Apr 25 17:15:59.318:voip_get_call_direction:returning answer
Apr 25 17:15:59.318:voip_eval_pod_attr:
Apr 25 17:15:59.318:cc_api_trigger_disconnect:
Apr 25 17:15:59.322:POD:Sending ACK to 172.19.139.206/1700
Apr 25 17:15:59.322:voip_pod_clean:
Examples The following example shows that debugging has been set to display information about server selection:
Router# debug aaa sg-server selection
The following two debug outputs display the behavior of RADIUS transactions within a server group
with the server-reorder-on-failure feature configured.
Debug 1
In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The server
retransmits are set to 0 (so each server is tried just one time before failover to the next configured server),
and the transmissions per transaction are set to 4 (the transmissions will stop on the third failover). The
third server in the server group (10.107.164.118) has accepted the transaction on the third transmission
(second failover).
00:38:35: %SYS-5-CONFIG-I: Configured from console by console
00:38:53: RADIUS/ENCODE(OOOOOOOF) : ask "Username: "
00:38:53: RADIUS/ENCODE (0000000F) : send packet; GET-USER
00:38:58: RADIUS/ENCODE (0000000F) : ask "Password: "
00:38:58: RADIUS/ENCODE(0000000F) : send packet; GET-PASSWORD
00:38:59: RADIUS: AAA Unsupported [152] 4
00:38:59: RADIUS: 7474 [tt]
00:38:59: RADIUS (0000000F) : Storing nasport 2 in rad-db
00:38:59: RADIUS/ENCODE(0000000F) : dropping service type, "radius-server attribute 6
on-for-login-auth" is off
00:38:59: RADIUS (0000000F) : Config NAS IP: 0.0.0.0
00:38:59: RADIUS/ENCODE (0000000F) : acct-session-id: 15
00:38:59: RADIUS (0000000F) : sending
00:38:59: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 1.1.1.1
00:38:59: RAPIUS(0000000F) : Send Access-Request to 1.1.1.1:1645 id 21645/11, len 78
00:38:59: RADIUS:: authenticator 4481 E6 65 2D 5F 6F OA -lE F5 81 8F 4E 1478 9C
Debug 2
In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The server
retransmits are set to 0, and the transmissions per transaction are set to 8. In this transaction, the
transmission to server 1.1.1.1 has failed on the eighth transmission.
00:42:30: RADIUS(00000011): Received from id 21645/13
00:43:34: RADIUS/ENCODE(00000012) : ask "Username: "
00:43:34: RADIUS/ENCODE(00000012) : send packet; GET-USER
00:43:39: RADIUS/ENCODE(00000012) : ask "Password: "
00:43:39: RADIUS/ENCODE(00000012) : send packet; GET-PASSWORD
00:43:40: RADIUS: AAA Unsupported [152] 4
00:43:40: RADIUS: 7474 [tt]
00:43:40: RADIUS(00000012) : Storing nasport 2 in rad-db
00:43:40: RADIUS/ENCODE(00000012): dropping service type, "radius-server attribute 6
on-for-login-auth" is off
00:43:40: RADIUS(00000012) : Co~fig NAS IP: 0.0.0.0
00:43:40: RADIUS/ENCODE(00000012) : acct-session-id: 18
00:43:40: RADIUS(00000012) : sending
00:43:40: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 10.107.164.118
00:43:40: RADIUS(00000012) : Send Access-Request to 10.107.164.118:1645 id 21645/14, len
78 00:43:40: RADIUS: authenticator B8 OA 51 3A AF A6 0018 -B3 2E 94 5E 07 OB 2A IF
00:43:40: RADIUS: User-Name [1] 7 "david" 00:43:40: RADIUS: User-Password [2] 18 *
00:43:40: RADIUS: NAS-Port [5] 6 2
00:43:40: RADIUS: NAS-Port-Type [61] 6 Virtual [5] 00:43:40: RADIUS: Calling-Station-]d
[31] 15 "172.19.192.23" 00:43:40: RADIUS: NAS-IP-Address [4] 6 10.0.1.130
00:43:42: RADIUS: Fail-over to (1.1.1,1:1645,1646) for id 21645/14
00:43:42: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 1.1.1.1
00:43:44: RADius: Fail-over to (2.2.2.2:1645,1646) for id 21645/14
00:43:44: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 2.2.2.2
00:43:46: RADIUS: Fail-over to (10.107.164.118:1645,1646) for id 21645/14
00:43:46: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 10.107.164.118
00:43:48: RADIUS: Fail-over to (1.1.1.1:1645,1646) for id 21645/14
00:43:48: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 1.1.1.1
00:43:50: RADIUS: Fail-over to (2.2.2.2:1645,1646) for id 21645/14
00:43:50: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 2.2.2.2
00:43:52: RADIUS: Fail-over to (10.107.164.118:1645,1646) for id 21645/14
00:43:52: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 10.107.164.118
00:43:54: RADIUS: Fail-over to (1.1.1.1:1645,1646) for id 21645/14
00:43:54: RADIUS/ENCODE: Best Local IP-Address 10.0.1.130 for Radius-Server 1.1.1.1
00:43:56: RADIUS: No response from (1.1.1.1:1645,1646) for id 21645/14 00:43:56:
RADIUS/DECODE: parse response no app start; FAIL 00:43:56: RADIUS/DECODE: parse response;
FAIL
debug acircuit
To display errors and events that occur on the attachment circuits (the circuits between the provider edge
(PE) and customer edge (CE) routers), use the debug acircuit command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
Syntax Description error Displays any errors that occurred on any of the attachment circuits.
event Displays any event messages for the attachment circuits, including messages about state
transitions, interface transitions, and message events.
Usage Guidelines An attachment circuit connects a PE router to a CE router. A router can have many attachment circuits.
The attachment circuit manager controls all the attachment circuits from one central location. Therefore,
when you enable the debug messages for the attachment circuit, you receive information about all the
attachment circuits.
Examples The following is sample output from the debug acircuit event command when you enable an interface:
Router# debug acircuit event
The following is sample output from the debug acircuit event command when you disable an interface:
Router# debug acircuit event
debug alarm-interface
To show real-time activities in the data channel or the management channel of the Alarm Interface
Controller (AIC), use the debug alarm-interface command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
Syntax Description slot-number Router chassis slot where the AIC network module is installed.
data Displays AIC serial data channel and asynchronous craft port
communication activity.
management Displays IOS-to-AIC communication activity.
Usage Guidelines This command allows you to observe the management channel activity from the AIC in the specified
slot. Such activity shows that the software running on the AIC CPU has reached a minimum level of
working order.
Examples The following is sample output from the debug alarm-interface 1 management command:
Router# debug alarm-interface
The following is sample output from the debug alarm-interface 1 data command:
Router# debug alarm-interface 1 data
debug alps ascu {event | packet | detail | all | format {ipars | router | both}} [interface [ascu id]]
no debug alps ascu {event | packet | detail | all | format {ipars | router | both}} [interface [ascu
id]]
Usage Guidelines To enable debugging for a group of ASCUs, enter a separate command for each ASCU interface and IA
combination.
The interface option applies only to the event, packet, detail, and all keywords.
Note To specify the particular debug tracing level (event, packet, detail or all) and the format (router, pairs
or both), you must configure the debug alps ascu command two times: once to configure the debug
tracing level and once to configure the format.
Examples The following output is from the debug alps ascu event command, showing events or protocol errors in
router format for ASCU 42 on interface Serial7:
Router# debug alps ascu format router
Note If you specify the ipars or both format for the event or detail tracing level, both the IPARS and router
formats will be displayed.
The following output is from the debug alps ascu event command, showing events or protocol errors in
ipars format for ASCU 42 on interface Serial7:
Router# debug alps ascu format ipars
The following output is from the debug alps ascu detail command, showing all protocol events in
router format for ASCU 42 on interface Serial6:
Router# debug alps ascu format router
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd to ckt
RTP_MATIP
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
Note If you specify the ipars or both format for the event or detail tracing level, both the IPARS and router
formats will be displayed.
The following output is from the debug alps ascu detail command, showing all protocol events in both
format for ASCU 42 on interface Serial6:
Router# debug alps ascu format both
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd to ckt
RTP_MATIP
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
The following output is from the debug alps ascu packet command, showing all packets sent or received
in router format for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format router Serial6 42
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
02321D26 0C261616
140C0D18 26163135 0611C6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd ckt
RTP_MATIP
42607866 65717866
65717966 755124
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
022038 26253138
26253139 263511E4
The following output is from the debug alps ascu packet command, showing all packets sent or received
in ipars format for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format ipars Serial6 42
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS IPARS Format:
2F2C1126 33262525
35331339 26251C14 271DC6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd ckt
RTP_MATIP
ALPS IPARS Format:
2F3E3826 161C3826
161C1826 141D24
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS IPARS Format:
2F3E38 26161C38
26161C18 26141DE4
The following output is from the debug alps ascu packet command, showing all packets sent or received
in both formats for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format both Serial6 42
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS Router Format:
02321D26 0C261616
140C0D18 26163135 0611C6
ALPS IPARS Format:
2F2C1126 33262525
35331339 26251C14 271DC6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd ckt
RTP_MATIP
ALPS Router Format:
42607866 65717866
65717966 755124
ALPS IPARS Format:
2F3E3826 161C3826
161C1826 141D24
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS Router Format:
022038 26253138
26253139 263511E4
ALPS IPARS Format:
2F3E38 26161C38
26161C18 26141DE4
Syntax Description name (Optional) Name given to identify an ALPS circuit on the remote customer
premises equipment (CPE).
Defaults If no circuit name is specified, then debugging is enabled for every ALPS circuit.
Usage Guidelines To enable debugging for a single ALPS circuit, specify the name of the circuit.
To enable debugging for a group of circuits, enter a separate command for each circuit name.
Examples The following is sample output from the debug alps circuit event command for circuit RTP_AX25:
alps-rcpe# debug alps circuit event RTP_AX25
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPEN, Event= DISABLE:
(CloseAndDisable)->DISC
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= DISC, Event= ENABLE:
(TmrStartNullRetry)->INOP
ALPS P1024 CKT: Ckt= RTP_AX25, Open - peer set to 200.100.40.2
ALPS P1024 CKT: Ckt= RTP_AX25, Open - peer open.
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= INOP, Event= RETRY_TIMEOUT:
(Open)->OPNG
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPNG, Event= CKT_OPEN_CFM:
(CacheAndFwdAscuData)->OPEN
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPEN, Event= CktClose, Rsn= 12:
(PvcKill,CktRemove,TmrStartClose)->INOP
ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= X25PvcInact, Rsn= 0:
(-,-,-)->INOP
ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= X25VcDeleted, Rsn= 0:
(-,CktDestroy,TmrStop)->INOP
ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= CktOpReq, Rsn= 4:
(PvcMake,CktAdd,TmrStartOpen)->OPNG
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, Event= X25ResetTx, Rsn= 0:
(-,-,-)->OPNG
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, Event= X25VcUp, Rsn= 0:
(-,OpnCfm,TmrStop)->OPEN
Defaults If no IP address is specified, then debugging is enabled for every peer connection.
Usage Guidelines To enable debugging for a single remote ALPS peer, specify the peer IP address.
To enable debugging for a set of remote peers, enter the command for each peer IP address.
Examples The following is sample output from the debug alps peer packet command:
Router# debug alps peer packet
Usage Guidelines To enable debugging for a single remote ALPS peer, specify the peer IP address.
To enable debugging for a set of remote peers, enter the command for each peer IP address.
Examples The following is sample output from the debug alps peer event command:
Router# debug alps peer event
Examples The following output is from the debug alps snmp command. The first line shows a circuit event status
change. The second line shows an ASCU status change. The third line shows a peer connection status
change.
ALPS CktStatusChange Notification for circuit CKT-1
ALPS AscuStatusChange Notification for ascu (Serial3, 41)
PeerConnStatusChange Notification for peer (10.227.50.106, MATIP_A_CKT-1)
The following output shows that an open failure has occurred on circuit 1:
ALPS CktOpenFailure Notification for circuit CKT1
The following output shows that a partial rejection to an ALPS circuit peer open request has occurred
on circuit 1:
ALPS CktPartialReject Notification for ascu (Serial2, 41) on circuit CKT1
Usage Guidelines This command is helpful when you experience problems communicating with a node on the network you
control (a neighbor). If the debug apple arp display indicates that the router is receiving AARP probes,
you can assume that the problem does not reside at the physical layer.
Examples The following is sample output from the debug apple arp command:
Router# debug apple arp
The following line indicates that the host at network address 4160.26 has replied, giving its MAC address
(0000.0c00.0453). For completeness, the message also shows the network address to which the reply was
sent and its hardware MAC address (also in parentheses).
Ether0: AARP: Reply from 4160.26(0000.0c00.0453) for 4160.154(0000.0c00.8ea9)
The following line indicates that the MAC address request is complete:
Ether0: AARP: Resolved waiting request for 4160.26(0000.0c00.0453)
Usage Guidelines Use the debug apple domain command to observe activity for domains and subdomains. Use this
command in conjunction with the debug apple remap command to observe interaction between
remapping and domain activity. Messages are displayed when the state of a domain changes, such as
creating a new domain, deleting a domain, and updating a domain.
Examples The following is sample output from the debug apple domain command intermixed with output from
the debug apple remap command; the two commands show related events:
Router# debug apple domain
Usage Guidelines In a stable AppleTalk network, the debug apple errors command produces little output.
To solve encapsulation problems, enable debug apple errors and debug apple packet together.
Examples The following is sample output from the debug apple errors command when a router is brought up with
a zone that does not agree with the zone list of other routers on the network:
Router# debug apple errors
As the output suggests, a single error message indicates zone list incompatibility; this message is sent
out periodically until the condition is corrected or the debug apple errors command is turned off.
Most of the other messages that the debug apple errors command can generate are obscure or indicate
a serious problem with the AppleTalk network. Some of these other messages follow.
In the following message, RTMPRsp, RTMPReq, ATP, AEP, ZIP, ADSP, or SNMP could replace NBP,
and “llap dest not for us” could replace “wrong encapsulation”:
Packet discarded, src 4160.12-254,dst 4160.19-254,NBP,wrong encapsulation
In the following message, in addition to an invalid echo packet error, other possible errors are unsolicited
AEP echo reply, unknown echo function, invalid ping packet, unknown ping function, and bad responder
packet type:
Ethernet0: AppleTalk packet error; no source address available
AT: pak_reply: dubious reply creation, dst 4160.19
AT: Unable to get a buffer for reply to 4160.19
The debug apple errors command can print out additional messages when other debugging commands
are also turned on. When you turn on both the debug apple errors and debug apple events commands,
the following message can be generated:
Proc err, src 4160.12-254,dst 4160.19-254,ZIP,NetInfo Reply format is invalid
In the preceding message, in addition to the NetInfo Reply format is invalid error, other possible errors
are NetInfoReply not for me, NetInfoReply ignored, NetInfoReply for operational net ignored,
NetInfoReply from invalid port, unexpected NetInfoReply ignored, cannot establish primary zone, no
primary has been set up, primary zone invalid, net information mismatch, multicast mismatch, and zones
disagree.
When you turn on both the debug apple errors and debug apple nbp commands, the following message
can be generated:
Processing error,...,NBP,NBP name invalid
In the preceding message, in addition to the NBP name invalid error, other possible errors are NBP type
invalid, NBP zone invalid, not operational, error handling brrq, error handling proxy, NBP fwdreq
unexpected, No route to srcnet, Proxy to “*” zone, Zone “*” from extended net, No zone info for “*”,
and NBP zone unknown.
When you turn on both the debug apple errors and debug apple routing commands, the following
message can be generated:
Processing error,...,RTMPReq, unknown RTMP request
In the preceding message, in addition to an unknown RTMP request error, other possible errors are
RTMP packet header bad, RTMP cable mismatch, routed RTMP data, RTMP bad tuple, and Not Req or
Rsp.
Usage Guidelines Only significant events (for example, neighbor and route changes) are logged.
The debug apple events command is useful for solving AppleTalk network problems because it provides
an overall picture of the stability of the network. In a stable network, the debug apple events command
does not return any information. If the command generates numerous messages, those messages can
indicate possible sources of the problems.
When configuring or making changes to a router or interface for AppleTalk, enable the debug apple
events command to alert you to the progress of the changes or to any errors that might result. Also use
this command periodically when you suspect network problems.
The debug apple events command is also useful to determine whether network flapping (nodes toggling
online and offline) is occurring. If flapping is excessive, look for routers that only support 254 networks.
When you enable the debug apple events command, you will see any messages that the apple
event-logging configuration command normally displays. Turning on the debug apple events
command, however, does not cause the apple event-logging command to be maintained in nonvolatile
memory. Only turning on the apple event-logging command explicitly stores it in nonvolatile memory.
Furthermore, if the apple event-logging command is already enabled, turning on or off the debug apple
events command does not affect the apple event-logging command.
Examples The following is sample output from the debug apple events command that describes a nonseed router
coming up in discovery mode:
As the output shows, the debug apple events command is useful in tracking the discovery mode state
changes through which an interface progresses. When no problems are encountered, the state changes
progress as follows:
1. Line down.
2. Restarting.
3. Probing (for its own address [node ID] using AARP).
4. Acquiring (sending out GetNetInfo requests).
5. Requesting zones (the list of zones for its cable).
6. Verifying (that the router’s configuration is correct. If not, a port configuration mismatch is
declared).
7. Checking zones (to make sure its list of zones is correct).
8. Operational (participating in routing).
Explanations for individual lines of output follow.
The following message indicates that a port is set. In this case, the zone multicast address is being reset.
Ether0: AT: Resetting interface address filters
The following messages indicate that the router is changing to restarting mode:
%AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restarted
Ether0: AppleTalk state changed; unknown -> restarting
The following message indicates that the router is probing in the startup range of network numbers
(65280 to 65534) to discover its network number:
Ether0: AppleTalk state changed; restarting -> probing
The following message indicates that the router is enabled as a nonrouting node using a provisional
network number within its startup range of network numbers. This type of message only appears if the
network address the router will use differs from its configured address. This is always the case for a
discovery-enabled router; it is rarely the case for a nondiscovery-enabled router.
%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 65401.148
The following messages indicate that the router is sending out GetNetInfo requests to discover the
default zone name and the actual network number range in which its network number can be chosen:
Ether0: AppleTalk state changed; probing -> acquiring
%AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration
Now that the router has acquired the cable configuration information, the following message indicates
that it restarts using that information:
Ether0: AppleTalk state changed; acquiring -> restarting
The following messages indicate that the router is probing for its actual network address:
Ether0: AppleTalk state changed; restarting -> line down
Ether0: AppleTalk state changed; line down -> restarting
Ether0: AppleTalk state changed; restarting -> probing
The following message indicates that the router has found an actual network address to use:
%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 4160.148
The following messages indicate that the router is sending out GetNetInfo requests to verify the default
zone name and the actual network number range from which its network number can be chosen:
Ether0: AppleTalk state changed; probing -> acquiring
%AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configuration
The following message indicates that the router is requesting the list of zones for its cable:
Ether0: AppleTalk state changed; acquiring -> requesting zones
The following messages indicate that the router is sending out GetNetInfo requests to make sure its
understanding of the configuration is correct:
Ether0: AppleTalk state changed; requesting zones -> verifying
AT: Sent GetNetInfo request broadcast on Ethernet0
The following message indicates that the router is rechecking its list of zones for its cable:
Ether0: AppleTalk state changed; verifying -> checking zones
The following message indicates that the router is now fully operational as a routing node and can begin
routing:
Ether0: AppleTalk state changed; checking zones -> operational
The following shows sample debug apple events output that describes a nondiscovery-enabled router
coming up when no other router is on the wire.
As the output shows, a nondiscovery-enabled router can come up when no other router is on the wire;
however, it must assume that its configuration (if accurate syntactically) is correct, because no other
router can verify it. Notice that the last line indicates this situation.
The following is sample output from the debug apple events command that describes a
discovery-enabled router coming up when there is no seed router on the wire:
Router# debug apple events
As the output shows, when you attempt to bring up a nonseed router without a seed router on the wire,
it never becomes operational; instead, it hangs in the acquiring mode and continues to send out periodic
GetNetInfo requests.
The following is sample output from the debug apple events command when a nondiscovery-enabled
router is brought up on an AppleTalk internetwork that is in compatibility mode (set up to accommodate
extended as well as nonextended AppleTalk) and the router has violated internetwork compatibility:
The following three configuration command lines indicate the part of the configuration of the router that
caused the configuration mismatch:
lestat(config)# interface ethernet 0
lestat(config-if)# apple cab 41-41
lestat(config-if)# apple zone Marketing
The router shown had been configured with a cable range of 41-41 instead of 40-40, which would have
been accurate. Additionally, the zone name was configured incorrectly; it should have been “Marketing,”
rather than being misspelled as “Markting.”
Usage Guidelines To determine whether the router is receiving NBP lookups from a node on the AppleTalk network, enable
debug apple nbp at each node between the router and the node in question to determine where the
problem lies.
Caution Because the debug apple nbp command can generate many messages, use it only when the CPU
utilization of the router is less than 50 percent.
Examples The following is sample output from the debug apple nbp command:
Router# debug apple nbp
Field Description
AT: NBP Indicates that this message describes an AppleTalk NBP packet.
ctrl = LkUp Identifies the type of NBP packet. Possible values are as follows:
• LkUp—NBP lookup request.
• LkUp-Reply—NBP lookup reply.
ntuples = 1 Indicates the number of name-address pairs in the lookup request
packet. Range: 1 to 31 tuples.
id = 77 Identifies an NBP lookup request value.
Field Description
AT: Indicates that this message describes an AppleTalk packet.
4160.19 Indicates the network address of the requester.
skt 2 Indicates the internet socket address of the requester. The responder
will send the NBP lookup reply to this socket address.
enum 0 Indicates the enumerator field. Used to identify multiple names
registered on a single socket. Each tuple is assigned its own
enumerator, incrementing from 0 for the first tuple.
name: =:ciscoRouter@Low Indicates the entity name for which a network address has been
End SW Lab requested. The AppleTalk entity name includes three components:
• Object (in this case, a wildcard character [=], indicating that the
requester is requesting name-address pairs for all objects of the
specified type in the specified zone).
• Type (in this case, ciscoRouter).
• Zone (in this case, Low End SW Lab).
The third line in the output essentially reiterates the information in the two lines above it, indicating that
a lookup request has been made regarding name-address pairs for all objects of the ciscoRouter type in
the Low End SW Lab zone.
Because the router is defined as an object of type ciscoRouter in zone Low End SW Lab, the router sends
an NBP lookup reply in response to this NBP lookup request. The following two lines of output show
the response of the router:
AT: NBP ctrl = LkUp-Reply, ntuples = 1, id = 77
AT: 4160.154, skt 254, enum 1, name: lestat.Ether0:ciscoRouter@Low End SW Lab
In the first line, ctrl = LkUp-Reply identifies this NBP packet as an NBP lookup request. The same value
in the id field (id = 77) associates this lookup reply with the previous lookup request. The second line
indicates that the network address associated with the entity name of the router
(lestat.Ether0:ciscoRouter@Low End SW Lab) is 4160.154. The fact that no other entity name/network
address is listed indicates that the responder only knows about itself as an object of type ciscoRouter in
zone Low End SW Lab.
Usage Guidelines With this command, you can monitor the types of packets being slow switched. It displays at least one
line of debugging output per AppleTalk packet processed.
The output reports information online when a packet is received or a transmission is attempted.
When invoked in conjunction with the debug apple routing, debug apple zip, and debug apple nbp
commands, the debug apple packet command adds protocol processing information in addition to
generic packet details. It also reports successful completion or failure information.
When invoked in conjunction with the debug apple errors command, the debug apple packet command
reports packet-level problems, such as those concerning encapsulation.
Caution Because the debug apple packet command can generate many messages, use it only when the CPU
utilization of the router is less than 50 percent.
Examples The following is sample output from the debug apple packet command:
Router# debug apple packet
Field Description
Ether0: Name of the interface through which the router received the
packet.
AppleTalk packet Indicates that this is an AppleTalk packet.
enctype SNAP Encapsulation type for the packet.
size 60 Size of the packet (in bytes).
encaps000000000000000000000000 Encapsulation.
Field Description
AT: Indicates that this is an AppleTalk packet.
src=Ethernet0:4160.47 Name of the interface sending the packet and its AppleTalk address.
dst=4160-4160 Cable range of the destination of the packet.
size=10 Size of the packet (in bytes.)
2 rtes Indicates that two routes in the routing table link these two addresses.
RTMP pkt sent Type of packet sent.
The third line indicates the type of packet received and its source AppleTalk address. This message is
repeated in the fourth line because AppleTalk hosts can send multiple replies to a given GetNetInfo
request.
Usage Guidelines Use the debug apple remap command with the debug apple domain command to observe activity
between domains and subdomains. Messages from the debug apple remap command are displayed
when a particular remapping function occurs, such as creating remaps or deleting remaps.
Examples The following is sample output from the debug apple remap command intermixed with output from the
debug apple domain command; the two commands show related events.
Router# debug apple remap
Usage Guidelines This command can be used to monitor acquisition of routes, aging of routing table entries, and
advertisement of known routes. It also reports conflicting network numbers on the same network if the
network is misconfigured.
Caution Because the debug apple routing command can generate many messages, use it only when router CPU
utilization is less than 50 percent.
Examples The following is sample output from the debug apple routing command:
Router# debug apple routing
Table 8 describes the fields in the first line of sample debug apple routing output.
Field Description
AT: Indicates that this is AppleTalk debugging output.
src=Ethernet0:4160.41 Indicates the source router interface and network address for the RTMP
update packet.
dst=4160-4160 Indicates the destination network address for the RTMP update packet.
Field Description
size=19 Displays the size of this RTMP packet (in bytes).
2 rtes Indicates that this RTMP update packet includes information on two
routes.
RTMP pkt sent Indicates that this type of message describes an RTMP update packet
that the router has sent (rather than one that it has received).
The following two messages indicate that the ager has started and finished the aging process for the
routing table and that this table contains 97 entries:
AT: Route ager starting (97 routes)
AT: Route ager finished (97 routes)
Table 9 describes the fields in the following line of the debug apple routing command output:
AT: RTMP from 4160.19 (new 0,old 94,bad 0,ign 0, dwn 0)
Field Description
AT: Indicates that this is AppleTalk debugging output.
RTMP from 4160.19 Indicates the source address of the RTMP update the router received.
new 0 Displays the number of routes in this RTMP update packet that the router
did not already know about.
old 94 Displays the number of routes in this RTMP update packet that the router
already knew about.
bad 0 Displays the number of routes the other router indicates have gone bad.
ign 0 Displays the number of routes the other router ignores.
dwn 0 Displays the number of poisoned tuples included in this packet.
Usage Guidelines This command reports significant events such as the discovery of new zones and zone list queries. It
generates information similar to that generated by the debug apple routing command, but generates it for
ZIP packets instead of Routing Table Maintenance Protocol (RTMP) packets.
You can use the debug apple zip command to determine whether a ZIP storm is taking place in the
AppleTalk network. You can detect the existence of a ZIP storm when you see that no router on a cable
has the zone name corresponding to a network number that all the routers have in their routing tables.
Examples The following is sample output from the debug apple zip command:
Router# debug apple zip
The first line indicates that the router has received an RTMP update that includes a new network number
and is now requesting zone information:
AT: Sent GetNetInfo request broadcast on Ether0
The second line indicates that the neighbor at address 4160.19 replies to the zone request with a default
zone:
AT: Recvd ZIP cmd 6 from 4160.19-6
The third line indicates that the router responds with three queries to the neighbor at network address
4160.19 for other zones on the network:
AT: 3 query packets sent to neighbor 4160.19
The fourth line indicates that the neighbor at network address 4160.19 responds with a ZIP extended
reply, indicating that one zone has been assigned to network 31902:
AT: 1 zones for 31902, ZIP XReply, src 4160.19
The fifth line indicates that the router responds that the zone name of network 31902 is US-Florida, and
the zone length of that zone name is 10:
AT: net 31902, zonelen 10, name US-Florida
Note Refer to the other forms of the debug appn command to enable specific debug output selectively.
Usage Guidelines This command shows all APPN events. Use other forms of the debug appn command to display specific
types of events.
Caution Because the debug appn all command can generate many messages and alter timing in the network
node, use it only when instructed by authorized support personnel.
Caution Debugging output takes priority over other network traffic. The debug appn all command generates
more output than any other debug appn command and can alter timing in the network node. This
command can severely diminish router performance or even render it unusable. In virtually all cases, it
is best to use specific debug appn commands.
Examples Refer to the documentation for specific debug appn commands for examples and explanations.
Command Description
debug appn ss Displays SS events.
debug appn trs Displays debugging information on APPN TRS component activity.
debug appn cs
To display Advanced Peer-to-Peer Networking (APPN) Configuration Services (CS) component activity,
use the debug appn cs command in privileged EXEC mode. To disable debugging output, use the no
form of this command.
debug appn cs
no debug appn cs
Usage Guidelines The CS component is responsible for defining link stations, ports, and connection networks. It is
responsible for the activation and deactivation of ports and link stations and handles status queries for
these resources.
Examples The following is sample output from the debug appn cs command. In this example a link station is being
stopped.
Router# debug appn cs
Table 10 describes the significant fields and messages shown in the display.
Field Description
APPN APPN debugging output.
CS CS component output.
Deq CS received a message from another component.
Field Description
FSM LS Link station finite state machine is being referenced.
Sending CS is sending a message to another component.
debug appn ds
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Directory Services
(DS) component activity, use the debug appn ds command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug appn ds
no debug appn ds
Usage Guidelines The DS component manages searches for resources in the APPN network. DS is also responsible for
registration of resources within the network.
Examples The following is sample output from the debug appn ds command. In this example a search has been
received.
Router# debug appn ds
Field Description
APPN APPN debugging output.
NEWDS DS component output.
search from Locate was received from NETA.PATTY.
Field Description
LSfsm_ Locate Search finite state machine is being referenced.
PQenq Message was sent to another component.
Rcvd Message was received from another component.
send locate Locate will be sent to NETA.PATTY.
Examples The following is sample output from the debug appn hpr command:
Router# debug appn hpr
Field Description
APPN APPN debugging output.
NCL Network control layer debugging output. Network control layer is the
component that handles ANR packets.
ncl_port_fsm Network control layer port finite state machine has been invoked.
ncl_assign_anr ANR label has been assigned to an activating link station.
ncl_populate_anr System is updating the ANR record with information specific to the link
station.
ncl_ls_fsm Network control layer link finite state machine has been invoked.
rtp_send RTP is about to send a packet.
hpr timer Debugging output related to an HPR timer.
rtt start time RTP is measuring the round-trip time for an HPR status request packet. This
is the start time.
NCL_SND_MSG Network control layer has been requested to send a packet.
process_nlp_from_rtp Network control layer has been requested by RTP to send a packet.
rtt end time RTP is measuring the round-trip time for an HPR status request packet. This
is the time.
round trip time Round-trip time for this HPR status exchange has been computed.
debug appn ms
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Management Services
(MS) component activity, use the debug appn ms command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug appn ms
no debug appn ms
Usage Guidelines The MS component is responsible for generating, sending, and forwarding network management
information in the form of traps and alerts to a network management focal point, such as Netview, in the
APPN network.
Examples The following is sample output from the debug appn ms command. In this example an error occurred
that caused an alert to be generated.
Router# debug appn ms
Field Description
APPN Indicates that this is APPN debugging output.
MSP Indicates that this is MS component output.
Usage Guidelines The NOF component is responsible for processing commands entered by the user such as start, stop,
show, and configuration commands. NOF forwards these commands to the proper component and waits
for the response.
Examples The following is sample output from the debug appn nof command. In this example, an APPN
connection network is being defined.
Router# debug appn nof
Field Description
APPN APPN debugging output.
NOF NOF component output.
Received Configuration command was entered.
send Message was sent to CS.
waiting Response was expected from CS.
debug appn pc
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Path Control (PC)
component activity, use the debug appn pc command in privileged EXEC mode. To disable debugging
output, use the no form of this command.
debug appn pc
no debug appn pc
Usage Guidelines The PC component is responsible for passing Message Units (MUs) between the Data Link Control
(DLC) layer and other APPN components. PC implements transmission priority by passing higher
priority MUs to the DLC before lower priority MUs.
Examples The following is sample output from the debug appn pc command. In this example an MU is received
from the network:
Router# debug appn pc
Field Description
APPN APPN debugging output.
PC PC component output.
Deq REMOTE Message was received from the network.
mu received Message is an MU.
Field Description
DATA.IND MU contains data.
sending MU MU is session traffic for an ISR session. The MU is forwarded to the
Session Connector component for routing.
debug appn ps
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Presentation Services
(PS) component activity, use the debug appn ps command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug appn ps
no debug appn ps
Usage Guidelines The PS component is responsible for managing the Transaction Programs (TPs) used by APPN. TPs are
used for sending and receiving searches, receiving resource registration, and sending and receiving
topology updates.
Examples The following is sample output from the debug appn ps command. In this example a CP capabilities
exchange is in progress.
Router# debug appn ps
Field Description
APPN APPN debugging output.
CCA CP Capabilities TP output.
RCA Receive CP Capabilities TP output.
Usage Guidelines The SCM component is responsible for the activation and deactivation of the local resources that route
an intermediate session through the router.
Examples The following is sample output from the debug appn scm command. In this example an intermediate
session traffic is being routed.
Router# debug appn scm
Field Description
APPN APPN debugging output.
SCM SCM component output.
debug appn ss
To display session services (SS) events, use the debug appn ss command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
debug appn ss
no debug appn ss
Usage Guidelines The SS component generates unique session identifiers, activates and deactivates control
point-to-control point (CP-CP) sessions, and assists logical units (LUs) in initiating and activating
LU-LU sessions.
Examples The following is sample output from the debug appn ss command. In this example CP-CP sessions
between the router and another node are being activated.
Router# debug appn ss
Field Description
APPN APPN debugging output.
SS SS component output.
Usage Guidelines The TRS component is responsible for creating and maintaining the topology database, creating and
maintaining the class of service database, and computing and caching optimal routes through the
network.
Examples The following is sample output from the debug appn trs command:
Router# debug appn trs
Field Description
APPN APPN debugging output.
TRS TRS component output.
debug arap
To display AppleTalk Remote Access Protocol (ARAP) events, use the debug arap command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug arap {internal | memory | mnp4 | v42bis} [linenum [aux | console | tty | vty]]
no debug arap {internal | memory | mnp4 | v42bis} [linenum [aux | console | tty | vty]]
Usage Guidelines Use the debug arap command with the debug callback command on access servers to debug dialin and
callback events.
Use the debug modem command to help catch problems related to ARAP autodetection (that is,
autoselect arap). These problems are very common and are most often caused by modems, which are
the most common cause of failure in ARAP connection and configuration sessions.
Examples The following is sample output from the debug arap internal command:
Router# debug arap internal
debug arp
To display information on Address Resolution Protocol (ARP) transactions, use the debug arp command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug arp
no debug arp
Usage Guidelines Use this command when some nodes on a TCP/IP network are responding, but others are not. It shows
whether the router is sending ARP packets and whether it is receiving ARP packets.
Examples The following is sample output from the debug arp command:
Router# debug arp
In the output, each line of output represents an ARP packet that the router sent or received. Explanations
for the individual lines of output follow.
The first line indicates that the router at IP address 172.16.22.7 and MAC address 0000.0c01.e117 sent
an ARP request for the MAC address of the host at 172.16.22.96. The series of zeros (0000.0000.0000)
following this address indicate that the router is currently unaware of the MAC address.
IP ARP: sent req src 172.16.22.7 0000.0c01.e117, dst 172.16.22.96 0000.0000.0000
The second line indicates that the router at IP address 172.16.22.7 receives a reply from the host at
172.16.22.96 indicating that its MAC address is 0800.2010.b908:
IP ARP: rcvd rep src 172.16.22.96 0800.2010.b908, dst 172.16.22.7
The third line indicates that the router receives an ARP request from the host at 172.16.6.10 requesting
the MAC address for the host at 172.16.6.62:
IP ARP: rcvd req src 172.16.6.10 0000.0c00.6fa2, dst 172.16.6.62
The fourth line indicates that another host on the network attempted to send the router an ARP reply for
its own address. The router ignores meaningless replies. Usually, meaningless replies happen if a bridge
is being run in parallel with the router and is allowing ARP to be bridged. This condition indicates a
network misconfiguration.
IP ARP: rep filtered src 172.16.22.7 aa92.1b36.a456, dst 255.255.255.255 ffff.ffff.ffff
The fifth line indicates that another host on the network attempted to inform the router that it is on
network 172.16.9.7, but the router does not know that the network is attached to a different router
interface. The remote host (probably a PC or an X terminal) is misconfigured. If the router were to install
this entry, it would deny service to the real machine on the proper cable.
IP ARP: rep filtered src 172.16.9.7 0000.0c00.6b31, dst 172.16.22.7 0800.2010.b908
Usage Guidelines The router uses asynchronous security protocols from companies including ADT Security Systems, Inc.,
Adplex, and Diebold to transport alarm blocks between two devices (such as a security alarm system
console and an alarm panel). The alarm blocks are transported in pass-through mode using BSTUN
encapsulation.
Examples The following is partial sample output from the debug asp packet command for asynchronous security
protocols when packet debugging is enabled on an asynchronous line carrying Diebold alarm traffic. In
this example, two polls are sent from the Diebold alarm console to two alarm panels that are
multidropped from a single EIA/TIA-232 interface. The alarm panels have device addresses F0 and F1.
The example trace indicates that F1 is responding and F0 is not responding. At this point, you need to
examine the physical link and possibly use a datascope to determine why the device is not responding.
Router# debug asp packet
Field Description
ASP Asyncronous security protocol packet.
Serial5 Interface receiving and sending the packet.
ADI-Rx Packet is being received.
ADI-T Packet is being sent.
Field Description
Data (n bytes) Type and size of the packet.
F1FF4c42 Alarm panel device address.
Examples The following example starts the asynchronous rotary line queueing debugging display:
Router# debug async async-queue
*Mar 2 03:50:28.377: AsyncQ: First connection to be queued - starting the AsyncQ manager
*Mar 2 03:50:28.377: AsyncQ: Enabling the AsyncQ manager
*Mar 2 03:50:28.377: AsyncQ: Started the AsyncQ manager process with pid 98
*Mar 2 03:50:28.381: AsyncQ: Created a Waiting TTY on TTY66 with pid 99
*Mar 2 03:50:30.164: WaitingTTY66: Did Authentication on waiting TTY (VTY)
*Mar 2 03:50:30.168: AsyncQ: Received ASYNCQ_MSG_ADD
*Mar 2 03:50:30.168: AsyncQ: New queue, adding this connection as the first element
*Mar 2 03:50:34.920: AsyncQ: Created a Waiting TTY on TTY67 with pid 100
*Mar 2 03:50:36.783: WaitingTTY67: Did Authentication on waiting TTY (VTY)
*Mar 2 03:50:36.787: AsyncQ: Received ASYNCQ_MSG_ADD
*Mar 2 03:50:36.787: AsyncQ: Queue exists, adding this connection to the end of the queue
Examples The following example provides output for the debug atm bundle error command:
Router# debug atm bundle error
Examples The following example provides output for the debug atm bundle events command:
Router# debug atm bundle events
Field Description
01:14:35 Local time on the router in hours:minutes:seconds.
BUNDLE EVENT(test) Bundle event for bundle by that name.
b_update_vc for four with bstate 1, vc_state 1 Test describing the bundle event.
Usage Guidelines This command displays ATM events that occur on the ATM interface processor and is useful for
diagnosing problems in an ATM network. It provides an overall picture of the stability of the network.
In a stable network, the debug atm events command does not return any information. If the command
generates numerous messages, the messages can indicate the possible source of problems.
When configuring or making changes to a router or interface for ATM, enable the debug atm events
command. Doing so alerts you to the progress of the changes or to any errors that might result. Also use
this command periodically when you suspect network problems.
Examples The following is sample output from the debug atm events command:
Router# debug atm events
aip_love_note(ATM4/0): asr=0x200
aip_setup_vc(ATM4/0): vc:6 vpi:6 vci:6
aip_love_note(ATM4/0): asr=0x200
aip_setup_vc(ATM4/0): vc:7 vpi:7 vci:7
aip_love_note(ATM4/0): asr=0x200
aip_setup_vc(ATM4/0): vc:11 vpi:11 vci:11
aip_love_note(ATM4/0): asr=0x200
Field Description
PLIM type Indicates the interface rate in megabits per second (Mbps). Possible
values are:
• 1 = TAXI(4B5B) 100 Mbps
• 2 = SONET 155 Mbps
• 3 = E3 34 Mbps
state Indicates current state of the ATM Interface Processor (AIP). Possible
values are:
• 1 = An ENABLE will be issued soon.
• 0 = The AIP will remain shut down.
asr Defines a bitmask, which indicates actions or completions to
commands. Valid bitmask values are:
• 0x0800 = AIP crashed, reload may be required.
• 0x0400 = AIP detected a carrier state change.
• 0x0n00 = Command completion status. Command completion
status codes are:
– n = 8 Invalid Physical Layer Interface Module (PLIM)
detected
– n = 4 Command failed
– n = 2 Command completed successfully
– n = 1 CONFIG request failed
– n = 0 Invalid value
The following line indicates that the AIP was reset. The PLIM TYPE detected was 1, so the maximum
rate is set to 100 Mbps.
RESET(ATM4/0): PLIM type is 1, Rate is 100Mbps
The following line indicates that the AIP was given a shutdown command, but the current configuration
indicates that the AIP should be up:
aip_disable(ATM4/0): state=1
The following line indicates that a configuration command has been completed by the AIP:
aip_love_note(ATM4/0): asr=0x201
The following line indicates that the AIP was given a no shutdown command to take it out of shutdown:
aip_enable(ATM4/0)
The following line indicates that the AIP detected a carrier state change. It does not indicate that the
carrier is down or up, only that it has changed.
aip_love_note(ATM4/0): asr=0x4000
The following line of output indicates that the AIP enable function is restarting all permanent virtual
circuits (PVCs) automatically:
aip_enable(ATM4/0): restarting VCs: 7
The following lines of output indicate that PVC 1 was set up and a successful completion code was
returned:
aip_setup_vc(ATM4/0): vc:1 vpi:1 vci:1
aip_love_note(ATM4/0): asr=0x200
Syntax Description api (Optional) Native ATM application programming interface (API). Displays
events that occur as a result of the exchange between the native ATM API
and the signaling API.
conn (Optional) Native ATM connection manager. Displays internal connection
manager events for the native ATM API.
error (Optional) Native ATM error. Displays errors that occur during the setup of
an ATM SVC.
filter (Optional) Native ATM filter. Displays the internal network service access
point (NSAP) filter events of the native ATM API.
Usage Guidelines Native ATM API is the layer above the signaling API. Static map and Resource Reservation Protocol
(RSVP) clients use the native ATM API to interact with the signaling API to create ATM SVCs.
Use the debug atm native command to diagnose problems in the creation of static map and RSVP ATM
SVCs.
Examples The following is sample output for the debug atm native command with the api keyword:
Router# debug atm native api
Usage Guidelines Use the debug atm nbma command to diagnose problems in the creation of RSVP SVCs.
The RSVP application creates SVCs by using the NBMA API. The debug atm nbma command with the
api keyword displays events that occur as a result of the exchange between RSVP and the NBMA API.
Examples The following is sample output for the debug atm nbma command:
Router# debug atm nbma api
00:52:50:NBMA-ATM-API - atm_setup_req
00:52:50:NBMA_ATM-API - nbma_atm_fill_blli
00:52:50:NBMA_ATM-API - nbma_atm_fill_bhli
00:52:50:NBMA_ATM-API - nbma_atm_callbackMsg - NATIVE_ATM_OUTGOING_CALL_ACTIVE
00:52:50:NBMA_ATM-API - rcv_outgoing_call_active
00:52:50:NBMA_ATM-API - nbma_svc_lookup
Syntax Description interface atm number (Optional) Number of the ATM interface.
Examples The following sample output for the debug atm oam cc command records activity beginning with the
entry of the oam-pvc manage cc command and ending with the entry of the no oam-pvc manage cc
command. The ATM 0 interface is specified, and the “both” segment direction is specified. The output
shows an activation request sent and confirmed, a series of CC cells sent by the routers on each end of
the segment, and a deactivation request and confirmation.
Router# debug atm oam cc interface atm0
Generic ATM:
ATM OAM CC cells debugging is on
Router#
00:15:05: CC ACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM
Type:8 OAM Func:1 Direction:3 CTag:5
00:15:05: CC ACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM Cell
Type:4 OAM Type:8 OAM Func:1 Direction:3 CTag:5
00:15:06: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1
00:15:07: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:08: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:09: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:10: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:11: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:12: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:13: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:14: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:15: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:16: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:17: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:18: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:19: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:19: CC DEACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM
Type:8 OAM Func:1 Direction:3 CTag:6
00:15:19: CC DEACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM Cell
Type:4 OAM Type:8 OAM Func:1 Direction:3 CTag:6
Field Description
00:15:05 Time stamp.
CC ACTIVATE MSG (ATM0) Message type and interface.
0 Source.
1 Sink.
VC 1/40 Virtual circuit identifier.
Direction:3 Direction in which the cells are traveling. May be one of the
following values:
1— local router is the sink.
2— local router is the source.
3— both routers operate as the source and sink.
Caution Use caution when enabling this debug command in a live system. It produces significant amounts of
output, which could lead to a disruption of service.
Syntax Description state Shows information about state transitions. Possible states are as follows:
SESS_SET_IDLE: A session-set has been created.
SESS_SET_OOS: A session(s) has been added to session-group(s). No
ACTIVE notification has been received from Virtual Switch Controller (VSC).
SESS_SET_ACTIVE_IS: An ACTIVE notification has been received over one
in-service session-group. STANDBY notification has not been received on any
available session-group(s).
SESS_SET_STNDBY_IS: A STANDBY notification is received, but there is no
in-service active session-group available.
SESS_SET_FULL_IS: A session-group in-service that has ACTIVE
notification and at least one session-group in-service that has STANDBY
notification.
SESS_SET_SWITCH_OVER: An ACTIVE notification is received on
session-group in-service, which had received STANDBY notification.
xport Provides traces for all packets (protocol data units (PDUs)), application PDUs,
and also session-manager messages.
all All available sessions.
session-id A specified session.
Examples The following is output for the debug backhaul-session-manager session all command:
Router# debug backhaul-session-manager session all
Router# debug_bsm_command:DEBUG_BSM_SESSION_ALL
The following example displays output for the debug backhaul-session-manager session state all
command:
Router# debug backhaul-session-manager session state all
Router# debug_bsm_command:DEBUG_BSM_SESSION_STATE_ALL
The following example displays output for the debug backhaul-session-manager session xport all
command:
Router# debug backhaul-session-manager session xport all
Router# debug_bsm_command:DEBUG_BSM_SESSION_XPORT
Examples The following is output for the debug backhaul-session-manager set command for all available session
sets:
Router# debug backhaul-session-manager set all
Router# debug_bsm_command:DEBUG_BSM_SET_ALL
The following is output for the debug backhaul-session-manager set name test-set command:
Router# debug backhaul-session-manager set name set1
Router# debug_bsm_command:DEBUG_BSM_SET_NAME
debug backup
To monitor the transitions of an interface going down then back up, use the debug backup command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug backup
no debug backup
Usage Guidelines The debug backup command is useful for monitoring dual X.25 interfaces configured as primary and
backup in a Telco data communication network (DCN).
Examples The following example shows how to start the debug backup command:
Router# debug backup
debug bert
To display information on the bit error rate testing (BERT) feature, use the debug bert command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug bert
no debug bert
Usage Guidelines The debug bert command output is used primarily by Cisco technical support representatives. The
debug bert command displays debugging messages for specific areas of executed code.
Usage Guidelines The debug bgp ipv6 dampening command is similar to the debug ip bgp dampening command, except
that it is IPv6-specific.
Use the prefix-list keyword and an argument to filter BGP IPv6 dampening debug information through
an IPv6 prefix list.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options within global configuration
mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following is sample output from the debug bgp ipv6 dampening command:
Router# debug bgp ipv6 dampening
The following example shows output for the debug bgp ipv6 dampening command filtered through the
prefix list named “marketing”:
Router# debug bgp ipv6 dampening prefix-list marketing
Field Description
penalty Numerical value of 1000 assigned to a route by a router configured for
route dampening in another autonomous system each time a route
flaps. Penalties are cumulative. The penalty for the route is stored in
the BGP routing table until the penalty exceeds the suppress limit. If
the penalty exceeds the suppress limit, the route state changes from
history to damp.
flapped Number of times a route is available, then unavailable, or vice versa.
halflife-time Amount of time (in minutes) by which the penalty is decreased after the
route is assigned a penalty. The halflife-time value is half of the
half-life period (which is 15 minutes by default). Penalty reduction
happens every 5 seconds.
reuse The limit by which a route is unsuppressed. If the penalty for a flapping
route decreases and falls below this reuse limit, the route is
unsuppressed. That is, the route is added back to the BGP table and
once again used for forwarding. The default reuse limit is 750. Routes
are unsuppressed at 10-second increments. Every 10 seconds, the
router determines which routes are now unsuppressed and advertises
them to the world.
suppress Limit by which a route is suppressed. If the penalty exceeds this limit,
the route is suppressed. The default value is 2000.
Field Description
maximum suppress limit Maximum amount of time (in minutes) a route is suppressed. The
(not shown in sample output) default value is four times the half-life period.
damp state State in which the route has flapped so often that the router will not
(not shown in sample output) advertise this route to BGP neighbors.
Usage Guidelines The debug bgp ipv6 updates command is similar to the debug ip bgp updates command, except that
it is IPv6-specific.
Use the prefix-list keyword to filter BGP IPv6 updates debugging information through an IPv6 prefix
list.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options within global configuration
mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following is sample output from the debug bgp ipv6 updates command:
Router# debug bgp ipv6 updates
The following is sample output from the debug bgp ipv6 updates command filtered through the prefix
list named “sales”:
Router# debug bgp ipv6 updates prefix-list sales
Field Description
BGP(1): BGP debugging for address family index (afi) 1.
afi Address family index.
neighbor version Version of the BGP table on the neighbor from which the update was
received.
table version Version of the BGP table on the router from which you entered the
debug bgp ipv6 updates command.
starting at Starting at the network layer reachability information (NLRI). BGP
sends routing update messages containing NLRI to describe a route
and how to get there. In this context, an NLRI is a prefix. A BGP
update message carries one or more NLRI prefixes and the attributes
of a route for the NLRI prefixes; the route attributes include a BGP
next hop gateway address, community values, and other information.
route sourced locally Indicates that a route is sourced locally and that updates are not sent
for the route.
send UPDATE (format) Indicates that an update message for a reachable network should be
formatted. Addresses include prefix and next hop.
send UPDATE (prepend, Indicates that an update message about a path to a BGP peer should be
chgflags:0x208) written.
Usage Guidelines The debug bgp nsap command is similar to the debug ip bgp command, except that it is specific to the
NSAP address family.
Note By default, the network server sends the output from debug commands and system error messages to
the console. To redirect debug output, use the logging command options within global configuration
mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a
syslog server.
Examples The following example shows output for the debug bgp nsap command. The BGP(4) identifies that BGP
version 4 is operational.
Router# debug bgp nsap
Syntax Description filter-list access-list-number (Optional) Displays debug messages for BGP NSAP dampening
events that match the access list. The acceptable access list number
range is from 1 to 199.
Usage Guidelines The debug bgp nsap dampening command is similar to the debug ip bgp dampening command, except
that it is specific to the NSAP address family.
Note By default, the network server sends the output from debug commands and system error messages
to the console. To redirect debug output, use the logging command options within global
configuration mode. Destinations include the console, virtual terminals, internal buffer, and UNIX
hosts running a syslog server.
Examples The following example shows output for the debug bgp nsap dampening command:
Router# debug bgp nsap dampening
Only one line of output is displayed unless the bgp dampening command is configured with a route map
in NSAP address family configuration mode. The following example shows output for the debug bgp
nsap dampening command when a route map is configured:
20:07:19: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15
reuse/suppress 750/2000
20:07:19: BGP(4): flapped 1 times since 00:00:00. New penalty is 1000
20:08:59: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15
reuse/suppress 750/2000
20:10:04: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15
reuse/suppress 750/2000
20:10:04: BGP(4): flapped 3 times since 00:02:44. New penalty is 2839
20:10:48: BGP(4): suppress 49.0404 path 65202 65404 for 00:28:10 (penalty 2752)
20:10:48: halflife-time 15, reuse/suppress 750/2000
Field Description
penalty Numerical value of 1000 assigned to a route by a router configured for
route dampening in another autonomous system each time a route
flaps. Penalties are cumulative. The penalty for the route is stored in
the BGP routing table until the penalty exceeds the suppress limit. If
the penalty exceeds the suppress limit, the route state changes from
history to damp.
halflife-time Amount by which the penalty is decreased after the route is assigned a
penalty. The half-life-time value is half of the half-life period (which
is 15 minutes by default). Penalty reduction occurs every 5 seconds.
flapped Number of times a route is available, then unavailable, or vice versa.
reuse The limit by which a route is unsuppressed. If the penalty for a flapping
route decreases and falls below this reuse limit, the route is
unsuppressed. That is, the route is added back to the BGP table and
once again used for forwarding. The default reuse limit is 750.
Unsuppressing of routes occurs at 10-second increments. Every
10 seconds, the router learns which routes are now unsuppressed and
advertises them throughout the network.
suppress Limit by which a route is suppressed. If the penalty exceeds this limit,
the route is suppressed. The default value is 2000.
maximum suppress limit Maximum amount of time a route is suppressed. The default value is
(not shown in sample output) four times the half-life period.
damp state State in which the route has flapped so often that the router will not
(not shown in sample output) advertise this route to BGP neighbors.
Defaults Debugging for BGP NSAP prefix update packets is not enabled.
Usage Guidelines The debug bgp nsap updates command is similar to the debug ip bgp updates command, except that
it is specific to the NSAP address family.
Use the ip-address argument to display the BGP update debug messages for a specific BGP neighbor.
Use the clns-filter-set-name argument to display the BGP update debug messages for a specific NSAP
prefix.
Note By default, the network server sends the output from debug commands and system error messages to
the console. To redirect debug output, use the logging command options within global configuration
mode. Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a
syslog server.
Examples The following example shows output for the debug bgp nsap updates command:
Router# debug bgp nsap updates
Field Description
BGP(4): BGP debug for address family index (afi) 4.
route sourced locally (not Indicates that a route is sourced locally and that updates are not sent for
shown in display) the route.
send UPDATE (format) Indicates that an update message for a reachable network should be
formatted. Addresses include NSAP prefix and next hop.
rcv UPDATE (not shown in Indicates that an update message about a path to a BGP peer has been
display) received. Addresses include NSAP prefix.
debug bri-interface
To display debugging information on ISDN BRI routing activity, use the debug bri-interface command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug bri-interface
no debug bri-interface
Usage Guidelines The debug bri-interface command indicates whether the ISDN code is enabling and disabling the B
channels when attempting an outgoing call. This command is available for the low-end router products
that have a multi-BRI network interface module installed.
Caution Because the debug bri-interface command generates a substantial amount of output, use it only when
traffic on the IP network is low, so other activity on the system is not adversely affected.
Examples The following is sample output from the debug bri-interface command:
Router# debug bri-interface
The following line indicates that an internal command was written to the interface controller. The subunit
identifies the first interface in the slot.
BRI: write_sid: wrote 1B for subunit 0, slot 1.
The following line indicates that the power-up timer was started for the named unit:
BRI: Starting Power Up timer for unit = 0.
The following lines indicate that the channel or the protocol on the interface changed state:
%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to up
%LINK-5-CHANGED: Interface BRI0: B-Channel 1, changed state to up.!!!
%LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0: B-Channel 1, changed state to down
Lines of output not described are for use by support staff only.
Usage Guidelines This command traces all interfaces configured with a bsc protocol-group number command.
Examples The following is sample output from the debug bsc event command:
Router# debug bsc event
Usage Guidelines This command traces all interfaces configured with a bsc protocol-group number command.
Examples The following is sample output from the debug bsc packet command:
Router# debug bsc packet
Usage Guidelines When you enable the debug bstun events command, messages showing connection establishment and
other overall status messages are displayed.
You can use the debug bstun events command to assist you in determining whether the BSTUN peers
are configured correctly and are communicating. For example, if you enable the debug bstun packet
command and you do not see any packets, you may want to enable event debugging.
Note Also refer to the debug bsc packet and debug bsc event commands. Currently, these two commands
support the only protocol working through the BSTUN tunnel. Sometimes frames do not go through the
tunnel because they have been discarded at the Bisync protocol level.
Examples The following is sample output from the debug bstun events command of keepalive messages working
correctly. If the routers are configured correctly, at least one router will show reply messages.
Router# debug bstun events
Note In a scenario where there is constantly loaded bidirectional traffic, you might not see keepalive messages
because they are sent only when the remote end has been silent for the keepalive period.
The following is sample output from the debug bstun events output of an event trace in which the wrong
TCP address has been specified for the remote peer. These are non-keepalive related messages.
Router# debug bstun events
Examples The following is sample output from the debug bstun packet command:
Router# debug bstun packet
Usage Guidelines Use this command to enable the display of error information for a bundle, such as reports of inconsistent
mapping in the bundle.
Usage Guidelines Use this command to enable the display of bundle events, such as occurrences of VC bumping, when
bundles were brought up, when they were taken down, and so forth.
Usage Guidelines This command is used to debug the sensor circuitry used to measure internal temperature, midplane
voltages, fan performance, and power supply voltages on the Cisco uBR7246 console.
Examples The following is sample output from the debug cable env command:
Router# debug cable env
Field Description
ps id Power supply raw voltage reading.
pstype Power supply type determined from the ps id, v, and r values. The
Cisco uBR7246 universal broadband router contains dual power supplies,
so ID information for two types is usually printed.
Sensor Sensor number.
a2dref Analog-to-digital converter reference reading.
a2dact Analog-to-digital converter actual (measured reading).
vref Reference voltage.
vact Actual voltage.
Alpha Raw temperature reading.
temp Temperature corresponding to Alpha.
Usage Guidelines This command is used to display unexpected Data-over-Cable Service Interface Specifications
(DOCSIS) MAC protocol messages. When the Cisco uBR7246 universal broadband router does not
expect to receive a specific MAC message, an error message and hexadecimal dump are printed. Other
miscellaneous error conditions may result in output.
Examples The following is sample output from the debug cable err command:
Router# debug cable err
Examples The following is sample output from the debug cable freqhop command:
Router# debug cable freqhop
Examples The following is sample output from the debug cable hw-spectrum command:
Router# debug cable hw-spectrum
Syntax Description interface-type interface-number Specifies the cable interface to be debugged. A space is not
required between the values.
mac-address (Optional) Specifies that debugging is to be done on a specified
MAC address.
address (Optional) Specifies the MAC address of the interface.
mask (Optional) Specifies the MAC address validation address.
verbose (Optional) Displays detailed debug information.
Usage Guidelines You can repeat this debug command for other interfaces. Each time you specify a different cable
interface or MAC address, debugging is turned on for this cable interface or MAC address.
If you enter two debug commands with the same interface or MAC address, but with different mask or
verbose keywords, the router treats both commands as the same. In this case, the latest debug information
supersedes the previous debugging information.
Examples The following example demonstrates how to enable debugging on interface c3/0:
Router# debug cable interface c3/0
The following example demonstrates how to enable detailed debugging on interface c3/0:
Router# debug cable interface c3/0 verbose
The following example demonstrates how to enable debugging on interface c3/0 for all traffic coming
from modems with MAC addresses 0010.00xx.xxxx:
Router# debug cable interface c3/0 mac-address 0010.0000.0000 ffff.ff00.0000
Usage Guidelines This command activates debugging of the TEK and KEK baseline privacy key activity. When this
command is activated, all activity related to KEK and TEK keys will be displayed on the Cisco uBR7246
console. This command is used to display encryption key management debugging output.
Examples The following is sample output from the debug cable keyman command:
Router# debug cable keyman
Caution Do not use this command if you have a large number of modems on your network. The Cisco uBR7246
universal broadband router will become flooded with console printouts.
Examples The following example shows the return for the MAC layer:
Router# debug cable mac
Field Description
SID value is.... Reports the service ID of the modem. The range is from 1 through
891. The information on this line should agree with the first line of
the return (that is, Ranging Modem with Sid...).
CM mac address.... MAC address of the specified cable modem.
Timing offset is.... Time by which to offset the frame transmission upstream so the
frame arrives at the expected minislot time at the cable modem
termination system (CMTS).
Power value is FE0, or 0 dB Raw value derived from the 3137 Broadcom chip. Alternately, the
decibel value specifies the relative change in the transmission
power level that the cable modem needs to make so transmissions
arrive at the CMTS at the desired power level. This desired power
level is usually 0, but you can use the CLI to change it via the cable
power-level command.
Freq Error = .... Raw value derived from the 3137 Broadcom chip.
Freq offset is .... Specifies the relative change in the transmission frequency that the
cable modem will make to match the CMTS.
Usage Guidelines You can repeat this debug command for other MAC addresses. Each time you specify a different MAC
address, debugging is turned on for this MAC address.
If you enter two debug commands with the same MAC address, but with different mask or verbose
keywords, the router treats both commands as the same. In this case, the latest debug information
supersedes the previous debugging information.
Examples The following example demonstrates how to enable debugging for all traffic coming from all interfaces
of modems with the MAC address 0010.00xx.xxxx:
Router# debug cable mac-address 0010.0000 ffff.ff00.000
Examples The following example displays all the map messages with and without data grants:
Router# debug cable map
19:41:53: On interface Cable6/0, sent 5000 MAPs, 1321 MAPs had grant(s)Long Grants
13256993, Total Short Grants 223
A sample Map without any data grant
------------------ MAP MSG --------------------
us_ch_id: 1 ucd_count: 5 num_elems: 9 reserved: 0
Alloc Start Time: 33792 Ack Time: 33618
Rng_bkoff_start: 0 Rng_bkoff_end: 2
Data_bkoff_start: 1 Data_bkoff_end: 3:
sid:16383 iuc:1 mslot_offset:0
sid:0 iuc:7 mslot_offset:40
A sample Map with data grant(s)
------------------ MAP MSG ---------------------
us_ch_id: 1 ucd_count: 5 num_elems: 7 reserved: 0
Alloc Start Time: 33712 Ack Time: 33578
Rng_bkoff_start: 0 Rng_bkoff_end: 2
Data_bkoff_start: 1 Data_bkoff_end: 3
sid:2 iuc:6 mslot_offset:0
sid:16383 iuc:1 mslot_offset:16
sid:0 iuc:7 mslot_offset:40
Field Description
sent 5000 MAPs Total number of maps sent.
MAPs had grant(s) Long Grants Total number of grants considered long sized by the cable modem
termination system (CMTS).
Total Short Grants Total number of grants considered short sized by the CMTS.
Field Description
us_ch_id Identifies the upstream channel ID for this message.
ucd_count Number of upstream channel descriptors (UCDs).
num_elems Number of information elements in the map.
reserved Reserved for alignment.
Alloc Start Time Start time from CMTS initialization (in minislots) for assignments
in this map.
Ack Time Latest time from CMTS initialization (in minislots) processed in
upstream. The cable modems use this time for collision detection.
Rng_bkoff_start Initial backoff window for initial ranging contention, expressed as
a power of 2. Valid values are from 0 to 15.
Rng_bkoff_end Final backoff window for initial ranging contention, expressed as
a power of 2. Valid values are from 0 to 15.
Data_bkoff_start Initial backoff window for contention data and requests, expressed
as a power of 2. Valid values are from 0 to 15.
Data_bkoff_end Final backoff window for contention data and requests, expressed
as a power of 2. Valid values are from 0 to 15.
sid Service ID.
iuc Interval usage code (IUC) value.
mslot_offset Minislot offset.
Syntax Description errors Provides debugging information about Cisco uBR900 series privacy errors.
events Provides debugging information about events related to cable baseline privacy.
packets Provides debugging information about baseline privacy packets.
Usage Guidelines Baseline privacy key management exchanges take place only when both the Cisco uBR900 series and
the cable modem termination system (CMTS) are running code images that support baseline privacy, and
the privacy class of service is enabled via the configuration file that is downloaded to the cable modem.
Baseline privacy code images for the Cisco uBR900 series contain “k1” in the code image name.
Examples The following is sample output from the debug cable-modem bpkm errors command when the headend
does not have privacy enabled:
Router# debug cable-modem bpkm errors
Usage Guidelines When the interface is down, all bridge table entries learned on the Ethernet interface are set to discard
because traffic is not bridged until the cable interface has completed initialization. After the interface
(the line protocol) is completely up, bridge table entries learned on the Ethernet interface program the
cable MAC data filters. The cable MAC hardware filters out any received packets whose addresses are
not in the filters. In this way, the cable interface only receives packets addressed to its own MAC address
or an address it has learned on the Ethernet interface.
Examples The following example is sample output from the debug cable-modem bridge command:
Router# debug cable-modem bridge
Usage Guidelines This command displays detailed output about the sanity checking of received frame formats, the
acquisition of downstream QAM/forward error correction (FEC) lock, the receipt or nonreceipt of SYNC
messages from the cable modem termination system (CMTS), reception errors, and bandwidth request
failures.
Examples The following is sample output from the debug cable-modem error command:
Router# debug cable-modem error
Examples The following is sample output from the debug cable-modem interrupts command for Cisco uBR900
series interrupts:
Router# debug cable-modem interrupts
Usage Guidelines Of all the available debug cable-modem commands, the most useful is debug cable-modem mac log.
MAC log messages are written to a circular log file even when debugging is not turned on. These
messages include time stamps, events, and information pertinent to these events. Enter the debug
cable-modem mac log command to view MAC log messages. If you want to view this information
without entering debug mode, enter the show controllers cable-modem number mac log command. The
same information is displayed by both commands.
If the Cisco uBR900 series interface fails to come up or resets periodically, the MAC log will show what
happened. For example, if an address is not obtained from the Dynamic Host Configuration Protocol
(DHCP) server, an error is logged, initialization starts over, and the Cisco uBR900 series cable access
server router scans for a downstream frequency. The debug cable-modem mac log command displays
the log from the oldest to the newest entry.
After initial ranging is successful (dhcp_state has been reached), further RNG-REQ/RNG-RSP messages and
watchdog timer entries are suppressed from output unless the verbose keyword is used. Note that
CMAC_LOG_WATCHDOG_TIMER entries while in the maintenance_state are normal when the verbose keyword
is used.
Examples The following example is sample output from the debug cable-modem mac log command. The fields
of the output are the time since bootup, the log message, and in some cases a parameter that gives more
detail about the log entry.
Router# debug cable-modem mac log
528504.494 CMAC_LOG_WATCHDOG_TIMER
528534.494 CMAC_LOG_WATCHDOG_TIMER
The line “0 events dropped due to lack of a chunk” at the end of a display indicates that no log entries
were discarded due to a temporary lack of memory, which means the log is accurate and reliable.
The following example compares the output of the debug cable-modem mac log command with the
debug cable-modem mac log verbose command. The verbose keyword displays periodic events such
as ranging.
Router# debug cable-modem mac log
The following is sample output from the debug cable-modem mac messages command. This command
causes received cable MAC management messages to be displayed in a verbose format.
Router# debug cable-modem mac messages ?
The dynsrv keyword displays Dynamic Service Add or Dynamic Service Delete messages during the
off-hook/on-hook transitions of a phone connected to the Cisco uBR900 series cable access router.
In addition, sent REG-REQ messages are displayed in hexadecimal dump format. The output from this
command is very verbose and is usually not needed for normal interface debugging. The command is
most useful when attempting to attach a Cisco uBR900 series cable access router to a cable modem
termination system (CMTS) that is not Data-over-Cable Service Interface Specifications
(DOCSIS)-qualified.
For a description of the displayed fields of each message, refer to the DOCSIS Radio Frequency
Interface Specification, v1.0 (SP-RFI-I04-980724).
Router# debug cable mac messages
*Mar 7 01:44:06:
*Mar 7 01:44:06: UCD MESSAGE
*Mar 7 01:44:06: -----------
*Mar 7 01:44:06: FRAME HEADER
*Mar 7 01:44:06: FC - 0xC2 == MAC Management
*Mar 7 01:44:06: MAC_PARM - 0x00
*Mar 7 01:44:06: LEN - 0xD3
*Mar 7 01:44:06: MAC MANAGEMENT MESSAGE HEADER
*Mar 7 01:44:06: DA - 01E0.2F00.0001
*Mar 7 01:44:06: SA - 00E0.1EA5.BB60
*Mar 7 01:44:06: msg LEN - C1
*Mar 7 01:44:06: DSAP - 0
*Mar 7 01:44:06: SSAP - 0
*Mar 7 01:44:06: control - 03
*Mar 7 01:44:06: version - 01
*Mar 7 01:44:06: type - 02 == UCD
*Mar 7 01:44:06: RSVD - 0
*Mar 7 01:44:06: US Channel ID - 1
*Mar 7 01:44:06: Configuration Change Count - 4
*Mar 7 01:44:06: Mini-Slot Size - 8
*Mar 7 01:44:06: DS Channel ID - 1
*Mar 7 01:44:06: Symbol Rate - 8
*Mar 7 01:44:06: Frequency - 20000000
*Mar 7 01:44:06: Preamble Pattern - CC CC CC CC CC CC CC CC CC CC CC CC CC
CC 0D 0D
*Mar 7 01:44:06: Burst Descriptor 0
*Mar 7 01:44:06: Interval Usage Code - 1
*Mar 7 01:44:06: Modulation Type - 1 == QPSK
*Mar 7 01:44:06: Differential Encoding - 2 == OFF
*Mar 7 01:44:06: Preamble Length - 64
*Mar 7 01:44:06: Preamble Value Offset - 56
*Mar 7 01:44:06: FEC Error Correction - 0
*Mar 7 01:44:06: FEC Codeword Info Bytes - 16
*Mar 7 01:44:06: Scrambler Seed - 0x0152
*Mar 7 01:44:06: Maximum Burst Size - 1
*Mar 7 01:44:06: Guard Time Size - 8
*Mar 7 01:44:06: Last Codeword Length - 1 == FIXED
*Mar 7 01:44:06: Scrambler on/off - 1 == ON
*Mar 7 01:44:06: Burst Descriptor 1
*Mar 7 01:44:06: Interval Usage Code - 3
*Mar 7 01:44:06: Modulation Type - 1 == QPSK
*Mar 7 01:44:06: Differential Encoding - 2 == OFF
*Mar 7 01:44:06: Preamble Length - 128
*Mar 7 01:44:06: Preamble Value Offset - 0
*Mar 7 01:44:06: FEC Error Correction - 5
*Mar 7 01:44:06: FEC Codeword Info Bytes - 34
*Mar 7 01:44:06: Scrambler Seed - 0x0152
*Mar 7 01:44:06: Maximum Burst Size - 0
*Mar 7 01:44:06: Guard Time Size - 48
*Mar 7 01:44:20:
*Mar 7 01:44:20: REG-RSP MESSAGE
*Mar 7 01:44:20: ---------------
*Mar 7 01:44:20: FRAME HEADER
*Mar 7 01:44:20: FC - 0xC2 == MAC Management
*Mar 7 01:44:20: MAC_PARM - 0x00
*Mar 7 01:44:20: LEN - 0x29
*Mar 7 01:44:20: MAC MANAGEMENT MESSAGE HEADER
*Mar 7 01:44:20: DA - 00F0.1EB2.BB61
Examples The following is sample output from the debug cable-modem map command:
Router# debug cable-modem map
Usage Guidelines This command activates debugging of messages generated in the cable physical sublayer (PHY), which
is where upstream and downstream activity between the Cisco uBR7246 router and the hybrid
fiber-coaxial (HFC) network is controlled. When this command is activated, any messages generated in
the cable PHY will be displayed on the Cisco uBR7246 console.
Examples The following is sample output from the debug cable phy command:
Router# debug cable phy
Usage Guidelines This command activates debugging of baseline privacy. When this command is activated, any messages
generated by the spectrum manager will be displayed on the Cisco uBR7246 console.
Examples The following is sample output from the debug cable privacy command:
Router# debug cable privacy
Usage Guidelines This command activates debugging of QoS. When this command is activated, any messages related to
QoS parameters will be displayed on the Cisco uBR7246 console.
Examples The following is sample output from the debug cable qos command:
Router# debug cable qos
CMTS_QOS_LOG_NO_MORE_QOS_INDEX
Modems cannot add more entries to the class of service table.
CMTS_QOS_LOG_NOMORE_QOSPRF_MEM
Memory allocation error when creating class of service table entry.
CMTS_QOS_LOG_NO_CREATION_ALLOWED
Class of service entry cannot be created by modem. Use CLI or SNMP
interface instead of the modem's TFTP configuration file.
CMTS_QOS_LOG_CANNOT_REGISTER_COS_SID
A service identifier (SID) could not be assigned to the registering modem.
CMTS_QOS_LOG_CANNOT_DEREGISTER_COS_SID
The modem's service identifier (SID) was already removed.
CMTS_QOS_LOG_MSLOT_TIMEBASE_WRAPPED
The 160 KHz timebase clock drives a 26-bit counter which wraps around
approximately every 7 minutes. This message is generated every time it
wraps around.
Usage Guidelines This command activates debugging of ranging messages from cable modems on the hybrid fiber-coaxial
(HFC) network. When this command is activated, any ranging messages generated when cable modems
request or change their upstream frequencies will be displayed on the Cisco uBR7246 console. Use this
command to display the details of the initial and station maintenance procedures. The initial
maintenance procedure is used for link establishment. The station maintenance procedure is used for link
keepalive monitoring.
Examples The following is sample output from the debug cable range command when a modem first seeks to
establish a link to the Cisco uBR7246 universal broadband router:
Router# debug cable range
The SID value of 0 indicates that the modem has no assigned service identifier. The “CM mac address”
is the MAC address of the radio frequency (RF) interface of the modem, not its Ethernet interface. The
“Timing offset” is a measure of the distance between the modem and the Cisco uBR7246 universal
broadband router expressed in 10.24-MHz clocks. This value is adjusted down to zero by the
maintenance procedures. The first 16 bytes of the prepended header of the message are dumped in
hexadecimal.
The following is sample output when the modem is first assigned a SID during initial maintenance:
CM mac address 0010.7b43.aa21
found..Assigned SID #2 on Interface Cable3/0/U0
Timing offset is CF0
Power value is 15F8, or -1 dB
Freq Error = 423, Freq offset is 1692
Ranging Modem with Sid 2 on i/f : Cable3/0/U0
The following is sample output when the modem is reassigned the same SID during initial maintenance:
Initial Range Message Received on Interface Cable3/0/U0
CMTS reusing old sid : 2 for modem : 0010.7b43.aa21
Timing offset is CF0
The following is sample output when the modem is polled by the Cisco uBR7246 universal broadband
router during station maintenance. Polling happens at a minimum rate of once every 10 seconds.
Ranging Modem with Sid 2 on i/f : Cable3/0/U0
Usage Guidelines This command activates display of reset messages from cable interfaces.
Examples The following is sample output from the debug cable reset command when the interface is reset due to
complete loss of receive packets:
Router# debug cable reset
Usage Guidelines This command activates debugging of spectrum management (frequency agility) on the HFC network.
When this command is activated, any messages generated due to spectrum group activity will be
displayed on the Cisco uBR7246 console. Spectrum group activity can be additions or changes to
spectrum groups, or frequency and power lever changes controlled by spectrum groups.
Examples The following is sample output from the debug cable specmgmt command:
Router# debug cable specmgmt
cmts_next_frequency(0x60A979AC, 1, 1)
The following is sample output when the frequency hop was commanded:
add_interface_to_freq(0x60BD3734, 0x60C44F68)
The following is sample output when the interface was added to the interface list of a frequency:
set_upstream(0x60A979AC,1,21000000,-5)
The following is sample output when the spectrum management has set the frequency and power level
of an upstream port:
cmts_frequency_hop_decision(0x60B57FEC)
Usage Guidelines This command activates debugging of any channel allocations on the HFC network. When this command
is activated, any messages generated when channels are allocated to cable modems on the HFC network
will be displayed on the Cisco uBR7246 console.
Examples The following is sample output from the debug cable startalloc command:
Router# debug cable startalloc
This output indicates time-slot Manufacturing Automation Protocol (MAP) processing is active.
Examples The following is sample output from the debug cable telco-return command:
Router# debug cable telco-return
Usage Guidelines This command activates debugging of any UCC messages generated when cable modems request or are
assigned a new channel. When this command is activated, any messages related to upstream channel
changes will be displayed on the Cisco uBR7246 console.
Examples The following is sample output from the debug cable ucc command when moving a modem from one
upstream channel to another:
Router# debug cable ucc
Usage Guidelines This command activates debugging of any UCD messages. UCD messages contain information about
upstream channel characteristics and are sent to the cable modems on the hybrid fiber-coaxial (HFC)
network. Cable modems that are configured to use enhanced upstream channels use these UCD messages
to identify and select an enhanced upstream channel to use. When this command is activated, any
messages related to upstream channel descriptors will be displayed on the Cisco uBR7246 console.
Examples The following is sample output from the debug cable ucd command:
Router# debug cable ucd
UCD MESSAGE
-----------
FRAME HEADER
FC - 0xC2 ==
MAC_PARM - 0x00
LEN - 0xD3
MAC MANAGEMENT MESSAGE HEADER
DA - 01E0.2F00.0001
SA - 0009.0CEF.3730
msg LEN - C1
DSAP - 0
SSAP t - 0
control - 03
version - 01
type - 02 ==
US Channel ID - 1
Configuration Change Count - 5
Mini-Slot Size - 4
DS Channel ID - 1
Symbol Rate - 8
Frequency - 10000000
Preamble Pattern - CC CC CC CC CC CC CC CC CC CC CC CC CC
CC 0D 0D
Burst Descriptor 0
Interval Usage Code - 1
Modulation Type - 1 == QPSK
Differential Encoding - 2 == OFF
Preamble Length - 64
Preamble Value Offset - 56
FEC Error Correction - 0
debug callback
To display callback events when the router is using a modem and a chat script to call back on a terminal
line, use the debug callback command in privileged EXEC mode. To disable debugging output, use the
no form of this command.
debug callback
no debug callback
Usage Guidelines This command is useful for debugging chat scripts on PPP and AppleTalk Remote Access Protocol
(ARAP) lines that use callback mechanisms. The output provided by the debug callback command
shows you how the call is progressing when used with the debug ppp or debug arap commands.
Examples The following is sample output from the debug callback command:
Router# debug callback
Defaults Disabled
Usage Guidelines Every time a call request is received, the debug call fallback detail command displays in the command-line
interface (CLI) cache lookup and call acceptance/rejection information. Use this command to monitor call
requests as they enter the call fallback subsystem.
If you have a large amount of calls in your router, enabling this command can cause delays in your
routing functions as the debug statistics are constantly compiled and sent to your terminal. Also, debug
messages on your terminal may make for difficult CLI configuring.
Examples The following example depicts a call coming in to 10.1.1.4 with codec g729r8. Because there is no cache
entry for this destination, a probe is sent and values are inserted into the cache. A lookup is performed
again, entry is found, and a fallback decision is made to admit the call.
Router# debug call fallback detail
The following example depicts a call coming in to 10.1.1.4 with codec g729r8. A lookup is performed,
entry is found, and a fallback decision is made to admit the call.
Router# debug call fallback detail
Defaults Disabled
Usage Guidelines Every time a probe is received, the debug call fallback probe command displays in the command-line
interface (CLI) network traffic information collected by the probe. Use this command to monitor the network
traffic information the probes carry as they enter the call fallback subsystem and log cache entries.
If you have frequent return of probes to your router, enabling this command can cause delays in your
routing functions as the debug statistics are constantly compiled and sent to your terminal. Also, debug
messages on your terminal may make for difficult CLI configuring.
Examples The following example depicts a call coming in to 10.1.1.4 and codec type g729r8. Because there is no
cache entry for this IP address, a g729r8 probe is initiated. The probe consists of 20 packet returns with
an average delay of 43 milliseconds. The “jitter out” is jitter from source to destination router and “jitter
in” is jitter from destination to source router. The delay, loss, and Calculated Planning Impairment Factor
(ICPIF) values following g113_calc_icpif are the instantaneous values, whereas those values following
“New smoothed values” are the values after applying the smoothing with weight 65.
Router# debug call fallback probe
2d19h:fb_initiate_probe:Probe payload is 32
2d19h:fb_main:NumOfRTT=20, RTTSum=120, loss=0, delay=43, jitter in=0, jitter out=0->
10.1.1.4, codec:g729r8
2d19h:g113_calc_icpif(delay (w/codec delay)=43, loss=0, expect_factor=10) Icpif=0
debug call-mgmt
To display debugging information for call accounting, including modem and time slot usage, for active
and recent calls, use the debug call-mgmt command in privileged EXEC mode. To disable debugging
output, use the no form of this command.
debug call-mgmt
no debug call-mgmt
Examples The following is sample output after the debug call-mgmt command has been enabled:
Router# debug call-mgmt
Field Description
CPM_NEW_CALL_CSM_CONNECT Indicates the arrival of a new call.
access type CPM_INSERT_NEW_CALL, Indicates that the new call is an analog ISDN B channel
call (either a voice call or a call over an analog modem),
call type CPM_ISDN_ANALOG:
rather than a digital (V.110) call.
CC-Slot#7, DSX1-Ctrlr#17, Indicates that the call is connected via the B channel on
DS0-Timeslot#1 Serial7/17:1 to the asynchronous modem resource 1/03
Mdm-Slot#1, Mdm-Port#3, TTY#219 (interface async1/03, also known as line tty219).
Dec 26 13:58:25.682: Call mgmt per minute Displays periodic statistics that give the allocation state
statistics: of each DSX1 interface present in the system, as well as
the number of current (active) and recent (history) calls.
active list length: 1
history list length: 3
Dec 26 13:58:26.538: msg_to_calls_mgmt: Indicates that the analog ISDN B channel call has been
msg type disassociated from a modem.
CPM_VOICE_CALL_REJ_NO_MOD_
AVAIL received
Field Description
access type Indicates that the analog ISDN B channel call has been
CPM_REMOVE_DISC_CALL, disconnected.
call type CPM_ISDN_ANALOG:
Removed a disconnected ISDN analog call
CC-Slot#7, DSX1-Ctrlr#17, Indicates that the call has been disconnected via the
DS0-Timeslot#1 B channel on Serial7/17:1 to the asynchronous modem
resource 1/03 (interface async1/03, also known as line
Dec 26 13:58:26.538: Mdm-Slot#1,
tty219).
Mdm-Port#3, TTY#219
Usage Guidelines It is highly recommended that you log the output from the debug call rsvp-sync events command to a
buffer, rather than sending the output to the console; otherwise, the size of the output could severely
impact the performance of the gateway.
Examples The following example shows a portion of sample output for a call initiating RSVP when using the
debug call rsvp-sync events command:
00:03:25: Parameters: localip: 10.19.101.117 :localport: 16660
00:03:25: RESV CONFIRM message received from 10.19.101.116 for RESV setup from
10.19.101.117
00:03:25: RESERVATIONS ESTABLISHED : CallId: 1Stop timer and notify Session Protocol of
Success (ie. if notification requested)
Usage Guidelines It is highly recommended that you log the output from the debug call rsvp-sync func-trace command
to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely
impact the performance of the gateway.
Examples The following example shows a portion of sample output for a call initiating RSVP when using the
debug call rsvp-sync func-trace command in conjunction with the debug call rsvp-sync events
command:
00:03:41: Entering Function QoS_Listen
00:03:41:remoteip:10.10.101.117 :remoteport:0
00:03:41: Parameters:localip:10.10.101.116
00:03:41: remoteip:10.10.101.117
Syntax Description module The module argument can be one of the following:
• core—Traces the resource information.
• detail—Traces for detail information.
Defaults Disabled
Examples The following is sample output from the debug call threshold core command:
The following is sample output from the debug call threshold detail command:
Defaults Disabled
Examples Debug actions are performed on calls by call treatment. The following sample output shows that call
treatment is turned on:
Router# debug call treatment action
Defaults Debugging for ATM Adaptation Layer type 2 (AAL2) sessions is not enabled.
Usage Guidelines Use this command when troubleshooting an AAL2 trunk setup or teardown problem.
Examples The following example shows sample output from the debug ccaal2 session command for a forced
shutdown of a voice port:
Router# debug ccaal2 session
00:32:45:ccaal2_call_disconnect:peer tag 0
00:32:45:ccaal2_evhandle_call_disconnect:Entered
00:32:45:ccaal2_call_cleanup:freeccb 1, call_disconnected 1
00:32:45:starting incoming timer:Setting accept_incoming to FALSE and
00:32:45:timer 2:(0x622F6270)starts - delay (70000)
00:32:45:ccaal2_call_cleanup:Generating Call record
00:32:45:cause=81 tcause=81 cause_text=unspecified
00:32:45:ccaal2_call_cleanup:ccb 0x63FF1700, vdbPtr 0x62DFF2E0
freeccb_flag=1, call_disconnected_flag=1
00:32:45:%LINK-3-UPDOWN:Interface recEive and transMit2/0:0(1),
changed state to Administrative Shutdown
The following example shows sample output from the debug ccaal2 session command for a trunk setup
on a voice port:
Router# debug ccaal2 session
Router(config-voiceport)# no shutdown
Router(config-voiceport)#
00:35:28:%LINK-3-UPDOWN:Interface recEive and transMit2/0:0(1),
changed state to up
00:35:35:ccaal2_call_setup_request:Entered
00:35:35:ccaal2_evhandle_call_setup_request:Entered
00:35:35:ccaal2_initialize_ccb:preferred_codec set(-1)(0)
00:35:35:ccaal2_evhandle_call_setup_request:preferred_codec
set(5)(40). VAD is 1
00:35:35:ccaal2_call_setup_trunk:subchannel linking
successfulccaal2_receive:xmitFunc is NULL
00:35:35:ccaal2_caps_ind:PeerTag = 49
00:35:35: codec(preferred) = 1, fax_rate = 2, vad = 2
00:35:35: cid = 56, config_bitmask = 258, codec_bytes = 40,
signal_type=8
00:35:36:%HTSP-5-UPDOWN:Trunk port(channel) [2/0:0(1)] is up
Router(config-voiceport)#
Usage Guidelines Use this command to display debug information about the various FRF.11 VoFR service provider
interface (SPI) functions. Note that this debug command does not display any information regarding the
proprietary Cisco switched-VoFR SPI.
This debug is useful only when the session protocol is “frf11-trunk.”
Examples The following is sample output from the debug ccfr11 session command:
Router# debug ccfrf11 session
5d22h:ccfrf11_evhandle_call_setup_request:preffered_codec set(9)(24)
5d22h:ccfrf11_call_setup_trunk:subchannel linking successful
5d22h:ccfrf11_caps_ind:PeerTag = 810
5d22h: codec(preferred) = 512, fax_rate = 2, vad = 2
5d22h: cid = 30, config_bitmask = 1, codec_bytes = 24, signal_type=2
5d22h: required_bandwidth 6500
5d22h:ccfrf11_caps_ind:Bandwidth reservation of 6500 bytes succeeded.
CALL TEARDOWN:
*Mar 6 18:09:14.805:ccfrf11_call_disconnect:peer tag 0
*Mar 6 18:09:14.805:ccfrf11_evhandle_call_disconnect:Entered
*Mar 6 18:09:14.805:ccfrf11_call_cleanup:freeccb 1, call_disconnected 1
*Mar 6 18:09:14.805:ccfrf11_call_cleanup:Setting accept_incoming to FALSE and starting
incoming timer
*Mar 6 18:09:14.809:timer 2:(0x60EB6098)starts - delay (70000)
*Mar 6 18:09:14.809:ccfrf11_call_cleanup:Alive timer stopped
*Mar 6 18:09:14.809:timer 1:(0x60F64104) stops
*Mar 6 18:09:14.809:ccfrf11_call_cleanup:Generating Call record
*Mar 6 18:09:14.809:cause=10 tcause=10 cause_text="normal call clearing."
*Mar 6 18:09:14.809:ccfrf11_call_cleanup:Releasing 8192 bytes of reserved bandwidth
*Mar 6 18:09:14.809:ccfrf11_call_cleanup:ccb 0x60F6404C, vdbPtr 0x610DB7A4
freeccb_flag=1, call_disconnected_flag=1
debug cch323
To provide debugging output for various components within the H.323 subsystem, use the debug cch323
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug cch323 {all | error | h225 | h245 | nxe | ras | rawmsg | session}
no debug cch323
Usage Guidelines The debug cch323 Command with the all Keyword
When used with the debug cch323 command, the all keyword provides debug output for various
components within the H.323 subsystem.
The debug cch323 command used with the all keyword enables the following debug cch323 commands:
Caution Using the debug cch323 all command could slow your system and flood the TTY if there is significant
call traffic.
Note There is little or no output from this command when there is a stable H.323 network.
• H225_WAIT_FOR_DRQ—This is the state in which the H.225 state machine is waiting for the
completion of the Disengage Request (DRQ) process from the RAS state machine.
• H225_WAIT_FOR_H245—This is the state in which the H.225 state machine is waiting for the
success or failure from the H.245 state machine.
The definitions of the different events of the H.225 state machine follow:
• H225_EVENT_NONE—There is no event.
• H225_EVENT_ALERT—This event instructs the H.225 state machine to send an alert message to
the peer.
• H225_EVENT_ALERT_IND—This event indicates to the H.225 state machine that an alert
message arrived from the peer.
• H225_EVENT_CALLPROC—This event instructs the H.225 state machine to send a call
proceeding message to the peer.
• H225_EVENT_CALLPROC_IND—This event indicates to the H.225 state machine that a call
proceeding message has been received from the peer.
• H225_EVENT_REJECT—This event instructs the H.225 state machine to reject the call setup
request from the peer.
• H225_EVENT_REJECT_IND—This event indicates to the H.225 state machine that a call setup
request to the peer has been rejected.
• H225_EVENT_RELEASE—This event instructs the H.225 state machine to send a release complete
message to the peer.
• H225_EVENT_RELEASE_IND—This event indicates to the H.225 state machine that a release
complete message has been received from the peer.
• H225_EVENT_SETUP—This event instructs the H.225 state machine to send a setup message to
the peer.
• H225_EVENT_SETUP_IND—This event indicates to the H.225 state machine that a setup message
has been received from the peer.
• H225_EVENT_SETUP_CFM—This event instructs the H.225 state machine to send a connect
message to the peer.
• H225_EVENT_SETUP_CFM_IND—This event indicates to the H.225 state machine that a connect
message arrived from the peer.
• H225_EVENT_RAS_SUCCESS—This event indicates to the H.225 state machine that the pending
RAS operation succeeded.
• H225_EVENT_RAS_FAILED—This event indicates to the H.225 state machine that the pending
RAS operation failed.
• H225_EVENT_H245_SUCCESS—This event indicates to the H.225 state machine that the pending
H.245 operation succeeded.
• H225_EVENT_H245_FAILED—This event indicates to the H.225 state machine that the pending
H.245 operation failed.
Caution Using the debug cch323 command with the rawmsg keyword could slow your system and flood the TTY
if there is significant call traffic.
Caution Using the debug cch323 session command could slow your system and flood the TTY if there is
significant call traffic.
Examples The debug cch323 Command with the all Keyword Example
The debug cch323 all command and keyword combination provides output for the following keywords:
error, h225, h245, nxe, ras, rawmsg, and session. Examples of output for each keyword follow.
Field Description
H225_EVENT_SETUP This event instructs the H.225 state machine to
send a setup message to the peer.
H225_IDLE The initial state of the H.225 state machine. The
H.225 state machine is in this state before issuing
a call setup request (for the outbound IP call case)
or when ready to receive an incoming IP call.
H225_SETUP The call setup state. The state machine changes to
this state after sending out a call setup request or
after receiving an incoming call indication.
SETUPCFM_CHOSEN The H225 connect message that has been received
from a remote H323 endpoint.
H225_EVENT_SETUP_CFM_IND This event indicates to the H.225 state machine
that a connect message arrived from the peer.
H225_ACTIVE The call connected state. In this state, the call is
active. The state machine changes to this state after
sending the connect message to the peer or after
receiving the connect message from the peer.
H225_EVENT_H425_SUCCESS This event indicates to the H.225 state machine
that the pending H.245 operation succeeded.
H225_EVENT_RELEASE This event instructs the H.225 state machine to
send a release complete message to the peer.
H225_WAIT_FOR_DRQ The state in which the H.225 state machine is
waiting for the completion of the DRQ process
from the RAS state machine.
H225_EVENT_RAS_SUCCESS This event indicates to the H.225 state machine
that the pending RAS operation succeeded.
H225 FSM The finite state machine.
Field Description
H245_EVENT_MSD Send MSD event message to the state machine.
H245 MS FSM An H225 master slave determination finite state
machine.
H245_MS_NONE The initial state of the MSD state machine.
H245_MS_WAIT In this state, a MSD message is sent, and the device
is waiting for the reply.
H245_EVENT_CAP Send CAP event message.
H245 CAP FSM This is the H245 terminal CAP finite state
machine.
H245_CAP_NONE The initial state of the CAP state machine.
H245_CAP_WAIT In this state, a CAP message is sent, and the device
is waiting for the reply.
Field Description
M_H245_MS_DETERMINE _INDICATION The MSD message that has been received by an
H245 terminal from a remote H323 endpoint.
H245_EVENT_MS_IND Received MSD event message.
M_H245_CAP_TRANSFER_INDICATION A CAP message that has been received by the
H245 terminal from an H323 remote endpoint.
H245_EVENT_CAP_IND Received CAP event message.
M_H245_MS_DETERMINE_CONFIRM A confirmation message that the H245 master
slave termination message was sent.
H245_EVENT_MS_CFM Send MSD acknowledge event message.
H245_MS_DONE The result is in.
M_H245_CAP_TRANSFER_CONFIRM An indication to the H245 terminal that the CAP
message was sent.
H245_EVENT_CAP_CFM Send CAP acknowledge event message.
H245_CAP_DONE The result is in.
H245_EVENT_OLC Send OLC event message.
H245_OLC_NONE The initial state of the OLC state machine.
H245_OLC_WAIT In this state, an OLC message is sent, and the
device is waiting for the reply.
M_H245_UCHAN_ESTABLISH_INDICATION The OLC message received by an H245 terminal
from a remote H323 endpoint.
H245_EVENT_OLC_IND Received OLC event message.
M_H245_UCHAN_ESTAB_ACK The OLC message acknowledgement received by
an H245 terminal from a remote H323 endpoint.
H245_EVENT_OLC_CFM Send OLC acknowledge event message.
H245 OLC FSM The OLC finite state machine of the H245
terminal.
H245_EVENT_OLC_CFM Send OLC acknowledge event message.
H245_OLC_DONE The result is in.
Field Description
CCH323_RAS_EVENT_SEND_RRQ Send RRQ event message.
CCH323_RAS_STATE_IDLE The global state machine is in the idle state.
CCH323_RAS_STATE_RRQ The state machine is in the RRQ state. In this
state, the gateway is registering with a gatekeeper.
RCF_CHOSEN A registration confirm message that has been
received from a gatekeeper.
Field Description
CCH323_RAS_EVENT_RCF Received RCF event message.
CCH323_RAS_EVENT_NEWCALL New call event.
CCH323_RAS_STATE_ARQ The per-call state machine is in the process of
admitting a new call.
ACF_CHOSEN ACF message that has been received from a
gatekeeper.
CCH323_RAS_EVENT_ACF Received ACF event message.
CCH323_RAS_STATE_ACTIVE The per-call state machine is in the call active
state.
CCH323_RAS_EVENT_CALLDISC Call disconnect event message.
CCH323_RAS_STATE_DRQ The per-call state machine is in the process of
disengaging an active call.
DCF_CHOSEN The disengage confirm message that has been
received from a gatekeeper.
CCH323_RAS_EVENT_DCF Received DCF event message.
CCH323_RAS_EVENT_IRR Send IRR event message.
00:33:49:cch323_call_setup:gw_id=1, callID=16
00:33:49:timer(0x81D130D4) stops
00:33:49:timer (0x81D130D4)starts - delay (180000)
00:33:49:Codec:loc(16), rem(16),
Bytes:loc(20), Fwd(20), Rev(20)
00:33:49:cch323_rtp_open_notify:
00:33:50:cch323_ct_main:SOCK 1 Event 0x1
00:33:50: [1]towner_data=0x81D13C88, len=71, msgPtr=0x81F1F2E0
The following is sample output from a typical debug cch323 session request for a call setup on a
terminating gateway:
Router# debug cch323 session
00:23:27:cch323_h225_setup_ind
00:23:27:Not using Voice Class Codec
00:23:27:cch323_build_fastStart_cap_response:Retrieved qosCapability of 0
Usage Guidelines Use the debug cch323 capacity command to track the maximum and current call capacity values in the
Registration, Admission, and Status (RAS) Protocol messages and to debug capacity-related problems
while sending RAS messages. This command is entered on the gateway to monitor the call capacity of
the gatekeeper.
The command lists the values for current and maximum call capacity provided by the trunk group
capacity resource manager if and when the H.323 Service Provider Interface (SPI) requests the
information for all or specific groups of circuits.
Examples The following is sample output from the debug cch323 capacity command:
Router# debug cch323 capacity
The gatekeeper displays this output when trunk groups are added, deleted, or modified or when circuits
in a trunk group are deactivated or activated (similar to ISDN layer 2 down/up).
5d00h: cch323_process_carrier_update: Registered = 1,Event = 1,Reason = 1
5d00h: cch323_process_carrier_update: CarrierId = CARRIERA_NEWENGLAND
Field Description
Registered Gateway registration:
• 0=Gateway is not registered to the gatekeeper
• 1=Gateway is registered to the gatekeeper at the time of
the change
Event Carriers updated:
• 0=All carriers updated
• 1=Single carrier updated
Reason Reason for the update notification:
• 0=CURRENT_CAPACITY_UPDATE
• 1=MAX_CAPACITY_UPDATE
• 2=BOTH_CAPACITY_UPDATE
CarrierID ID of the trunk group or carrier to which the change applies.
The gatekeeper displays this output whenever call capacity information is sent to the gatekeeper.
5d00h: cch323_fill_crm_CallCapacities: Reason = 1, GroupID = CARRIERA_NEWENGLAND
5d00h: Capacity Details: Maximum Channels in Group: 23
Max. Voice Calls(In) : 23, Max. Voice Calls(Out): 23
Active Voice Calls(In): 5, Active Voice Calls(Out): 7
Max. Voice Calls(to GK): 23, Avail. Voice Calls(to GK): 11
Field Description
GroupID The circuit’s carrier identification (ID) or trunk
group label.
Maximum Channels in Group Maximum number of physical (or configured)
circuits.
Max. Voice Calls(In) Maximum number of allowed incoming voice and
data calls.
Max. Voice Calls(Out) Maximum number of allowed outgoing voice and
data calls.
Active Voice Calls(In) Current number of active incoming voice and data
calls.
Active Voice Calls(Out) Current number of active outgoing voice and data
calls.
Max. Voice Calls(to GK) Maximum call capacity value to be sent to the
gatekeeper in the RAS message.
Avail. Voice Calls(to GK) Available call capacity value to be sent to the
gatekeeper in the RAS message.
Defaults Disabled
Events Description
The event definitions of the different events of the H.225 state machine are as follows:
• H225_EVENT_NONE— No event.
• H225_EVENT_ALERT—This event indicates the H.225 state machine to send an alerting message
to the peer.
• H225_EVENT_ALERT_IND—This event indicates the H.225 state machine that an alerting
message is received from the peer.
• H225_EVENT_CALLPROC—This event indicates the H.225 state machine to send a call
proceeding message to the peer.
• H225_EVENT_CALLPROC_IND—This event indicates the H.225 state machine that a call
proceeding message is received from the peer.
• H225_EVENT_REJECT—This event indicates the H.225 state machine to reject the call setup
request from the peer.
• H225_EVENT_REJECT_IND—This event indicates the H.225 state machine that a call setup
request to the peer is rejected.
• H225_EVENT_RELEASE—This event indicates the H.225 state machine to send a release
complete message to the peer.
• H225_EVENT_RELEASE_IND—This event indicates the H.225 state machine that a release
complete message is received from the peer.
• H225_EVENT_SETUP—This event indicates the H.225 state machine to send a setup message to
the peer.
• H225_EVENT_SETUP_IND—This event indicates the H.225 state machine that a setup message is
received from the peer.
• H225_EVENT_SETUP_CFM—This event indicates the H.225 state machine to send a connect
message to the peer.
• H225_EVENT_SETUP_CFM_IND—This event indicates the H.225 state machine that a connect
message from the peer.
• H225_EVENT_RAS_SUCCESS—This event indicates the H.225 state machine that the pending
RAS operation is successful.
• H225_EVENT_RAS_FAILED—This event indicates the H.225 state machine that the pending RAS
operation failed.
• H225_EVENT_H245_SUCCESS—This event indicates the H.225 state machine that the pending
H.245 operation is successful.
• H225_EVENT_H245_FAILED—This event indicates the H.225 state machine that the pending
H.245 operation failed.
Examples The following is sample output from the debug cch323 h225 command:
Router# debug cch323 h225
Defaults Disabled
Usage Guidelines The H.245 state machines include the following three state machines:
• Master SlaveDetermination (MSD) state machine
• Capability Exchange (CAP) state machine
• Open Logical Channel (OLC) state machine
State Definitions
The definitions are as follows:
• H245_MS_NONE— This is the initial state of the master slave determination state machine.
• H245_MS_WAIT—In this state, a Master Slave Determination message is sent, waiting for the
reply.
• H245_MS_DONE— The result is in.
• H245_CAP_NONE—This is the initial state of the capabilities exchange state machine.
• H245_CAP_WAIT—In this state, a cap exchange message is sent, waiting for reply.
• H245_CAP_DONE—The result is in.
• H245_OLC_NONE—This is the initial state of the open logical channel state machine.
• H245_OLC_WAIT: OLC message sent, waiting for reply.
• H245_OLC_DONE: OLC done.
Event definitions
• H245_EVENT_MSD—Send MSD message
• H245_EVENT_MS_CFM—Send MSD acknowledge message
• H245_EVENT_MS_REJ—Send MSD reject message
• H245_EVENT_MS_IND— Received MSD message
• H245_EVENT_CAP—Send CAP message
• H245_EVENT_CAP_CFM—Send CAP acknowledge message
• H245_EVENT_CAP_REJ—Send CAP reject
• H245_EVENT_CAP_IND—Received CAP message
• H245_EVENT_OLC—Send OLC message
• H245_EVENT_OLC_CFM—Send OLC acknowledge message
• H245_EVENT_OLC_REJ—Send OLC reject message
• H245_EVENT_OLC_IND—Received OLC message
Examples The following is sample output from the debug cch323 h245 command:
Router# debug cch323 h245
Field Description
Request Request Type—0 for preauthentication, 1 for disconnect.
Preauth id Identifier for the preauthentication request.
EndPt Type Call Origin End Point Type—1 for IP address, 2 for IZCT value.
EndPt Call Origin End Point Value—An IP address or IZCT value.
Resource Service Resource Service Type—1 for Reservation, 2 for Query.
Call_origin Answer.
Call_type Voice over IP (VoIP).
Calling_num Calling Party Number (CLID).
Called_num Called Party Number (DNIS).
Protocol 0 for H.323, 1 for SIP.
function reports Various identifiers and status reports for executed functions.
Defaults Disabled
Usage Guidelines RAS operates in two state machines. One global state machine controls the overall RAS operation of the
Gateway. The other state machine is a per call state machine that controls the active calls.
State definitions
The state definitions of the different states of the RAS state machine follow:
• CCH323_RAS_STATE_NONE—This is the initial state of the RAS state machine.
• CCH323_RAS_STATE_GRQ—The state machine is in the Gatekeeper Request (GRQ) state. In this
state, the gateway is in the process of discovering a gatekeeper.
• CCH323_RAS_STATE_RRQ—The state machine is in the Registration Request (RRQ) state. In this
state, the gateway is in the process of registering with a gatekeeper.
• CCH323_RAS_STATE_IDLE—The global state machine is in the idle state.
• CCH323_RAS_STATE_URQ—The state machine is in the Unregistration Request (URQ) state. In
this state, the gateway is in the process of unregistering with a gatekeeper.
• CCH323_RAS_STATE_ARQ—The per call state machine is in the process of admitting a new call.
• CCH323_RAS_STATE_ACTIVE—The per call state machine is in the call active state.
• CCH323_RAS_STATE_DRQ—The per call state machine is in the process of disengaging an active
call.
Event Definitions
These are the event definitions of the different states of the RAS state machine:
• CCH323_RAS_EVENT_NONE—Nothing.
• CCH323_RAS_EVENT_GWUP—Gateway is coming up.
• CCH323_RAS_EVENT_GWDWN—Gateway is going down.
• CCH323_RAS_EVENT_NEWCALL—New call.
• CCH323_RAS_EVENT_CALLDISC—Call disconnect.
• CCH323_RAS_EVENT_GCF—Received Gatekeeper Confirmation (GCF).
• CCH323_RAS_EVENT_GRJ—Received Gatekeeper Rejection (GRJ).
• CCH323_RAS_EVENT_ACF—Received Admission Confirmation (ACF).
• CCH323_RAS_EVENT_ARJ—Received Admission Rejection (ARJ).
• CCH323_RAS_EVENT_SEND_RRQ—Send Registration Request (RRQ).
• CCH323_RAS_EVENT_RCF—Received Registration Confirmation (RCF).
• CCH323_RAS_EVENT_RRJ—Received Registration Rejection (RRJ).
• CCH323_RAS_EVENT_SEND_URQ—Send URQ.
• CCH323_RAS_EVENT_URQ—Received URQ.
• CCH323_RAS_EVENT_UCF—Received Unregister Confirmation (UCF).
• CCH323_RAS_EVENT_SEND_UCF—Send Unregister Confirmation (UCF).
• CCH323_RAS_EVENT_URJ—Received Unregister Reject (URJ).
• CCH323_RAS_EVENT_BCF—Received Bandwidth Confirm (BCF).
• CCH323_RAS_EVENT_BRJ—Received Bandwidth Rejection (BRJ).
• CCH323_RAS_EVENT_DRQ—Received Disengage Request (DRQ).
• CCH323_RAS_EVENT_DCF—Received Disengage Confirm (DCF).
• CCH323_RAS_EVENT_SEND_DCF—Send Disengage Confirm (DCF).
• CCH323_RAS_EVENT_DRJ—Received Disengage Reject (DRJ).
• CCH323_RAS_EVENT_IRQ—Received Interrupt Request (IRQ).
• CCH323_RAS_EVENT_IRR—Send Information Request (IRR).
• CCH323_RAS_EVENT_TIMEOUT—Message timeout.
Examples The following is sample output from the debug cch323 preauth command:
Router# debug cch323 preauth
debug ccm-manager
To display debugging information about the Cisco CallManager (CCM), use the debug ccm-manager
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
no debug ccm-manager
Syntax Description backhaul (Optional) Enables debugging of the CCM backhaul. The keywords are as
follows:
• events—Displays CCM backhaul events.
• errors—Displays CCM backhaul errors.
config-download Enables debugging of the CCM configuration download. The keywords are
as follows:
• all—Displays all CCM configuration parameters.
• errors—Displays CCM configuration errors.
• events—Displays CCM configuration events.
• packets—Displays CCM configuration packets.
• xml—Displays the CCM configuration eXtensible Markup Language
(XML) parser.
errors (Optional) Displays errors related to CCM.
events (Optional) Displays CCM events, such as when the primary CCM server
fails and control is switched to the backup CCM server.
music-on-hold (Optional) Displays music-on-hold (MOH). The keywords are as follows:
• errors—Displays MOH errors.
• events—Displays MOH events.
• packets—Displays MOH packets.
packets (Optional) Displays CCM packets.
Release Modification
12.2(2)XN Support for enhanced Media Gateway Control Protocol (MGCP) voice
gateway interoperability was added to Cisco CallManager Version 3.1 for
the Cisco 2600 series routers, Cisco 3600 series routers, and the Cisco Voice
Gateway 200 (Cisco VG200).
12.2(11)T This command was implemented on the Cisco IAD2420 series.
Examples The following is sample output from the debug ccm-manager events command:
Router# debug ccm-manager events
Field Description
nn:nn:nn: Time stamp that indicates when the Cisco CallManager event occurred.
CMAPP: error message The Cisco CallManager routine in which the error event occurred.
Usage Guidelines The debug ccsip all command enables the following SIP debug commands:
• debug ccsip events
• debug ccsip error
• debug ccsip states
• debug ccsip messages
• debug ccsip calls
Examples The following example displays debug output from one side of the call:
Router# debug ccsip all
v=0
o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20208 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20038 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20038 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20208 RTP/AVP 0
Content-Length: 0
*Mar 6 14:10:50:
*Mar 6 14:10:50: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote
port: 5060
The following example displays debut output from the other side of the call:
Router# debug ccsip all
v=0
o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20208 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20038 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231
s=SIP Call
t=0 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20208 RTP/AVP 0
From: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27D3FCA8-C7F
To: "3660110" <sip:3660110@166.34.245.230>
Date: Mon, 08 Mar 1993 22:36:44 GMT
Call-ID: ABBAE7AF-823100CE-0-1CCAA69C@172.18.192.194
User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Max-Forwards: 6
Timestamp: 731612207
CSeq: 101 BYE
Content-Length: 0
*Mar 8 17:36:47:
*Mar 8 17:36:47: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote
port: 5060
Usage Guidelines This command traces the SIP call details as they are updated in the SIP call control block.
Examples The following example displays debug output from one side of the call:
Router1# debug ccsip calls
*Mar 6 14:12:40:
The following example displays debug output from the other side of the call:
Router2# debug ccsip calls
*Mar 8 17:38:38:
Usage Guidelines This command traces all error messages generated from errors encountered by the SIP subsystem.
Examples The following example displays debug output from one side of the call:
Router1# debug ccsip error
*Mar 6 14:16:49: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote
port: 5060
The following example displays debug output from the other side of the call:
Router2# debug ccsip error
*Mar 8 17:42:47: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote
port: 5060
Usage Guidelines This command previously traced all events posted to Session Limitation Protocol (SIP) SPI from all
interfaces and also provided general SIP SPI information. Beginning with Cisco IOS Release 12.2(15)T,
the debug ccsip events command displays only debugging information specifically related to SIP SPI
events. Media stream and SIP SPI information is now reported in the debug ccsip media and debug
ccsip info command output.
Examples The following is sample output from the debug ccsip events command for a Cisco 3660:
Router# debug ccsip events
Usage Guidelines Beginning in Cisco IOS Release 12.2(15)T, the debug ccsip info command is a separate option that
displays general SIP SPI information for debug purposes. In past releases, this output was part of the
debug ccsip events command.
Examples The following is sample output from the debug ccsip info command for a Cisco 3660:
Router# debug ccsip info
Usage Guidelines Beginning in Cisco IOS Release 12.2(15)T, the debug ccsip media command is a separate option that
displays debugging information specific to SIP media stream processing. In past releases, this output was
part of the debug ccsip events command.
Examples The following is sample output from the debug ccsip media command for a Cisco 3660:
Router# debug ccsip media
Usage Guidelines This command traces the Session Limitation Protocol (SIP) messages exchanged between the SIP UA
client (UAC) and the access server.
Examples The following example shows debug output from one side of the call:
Router1# debug ccsip messages
v=0
o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20762 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20224 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20224 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20762 RTP/AVP 0
The following example show debug output from the other side of the call:
Router2# debug ccsip messages
Max-Forwards: 6
Timestamp: 731427554
Contact: <sip:3660110@166.34.245.230:5060;user=phone>
Expires: 180
Content-Type: application/sdp
Content-Length: 138
v=0
o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20762 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20224 RTP/AVP 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231
s=SIP Call
t=0 0
v=0
o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20762 RTP/AVP 0
Examples The following example shows debug output for a single SIP call:
Router# debug ccsip preauth
Field Description
Request Request Type—0 for preauthentication, 1 for disconnect.
Preauth id Identifier for the preauthentication request.
EndPt Type Call Origin End Point Type—1 for IP address, 2 for Interzone ClearToken
(IZCT) value.
EndPt Call Origin End Point Value—An IP address or IZCT value.
Resource Service Resource Service Type—1 for Reservation, 2 for Query.
Call_origin Answer.
Call_type Voice over IP (VoIP).
Calling_num Calling Party Number (CLID).
Called_num Called Party Number (DNIS).
Protocol 0 for H.323, 1 for SIP.
function reports Various identifiers and status reports for executed functions.
Usage Guidelines This command traces the state machine changes of SIP SPI and displays the state transitions.
Examples The following example shows all SIP SPI state tracing:
Router1# debug ccsip states
Usage Guidelines Use this command when attempting to troubleshoot a Vo call that uses the “cisco-switched” session
protocol. This command provides the same information as the debug ccswvoice vo-session command,
but includes additional debugging information relating to the calls.
Examples The following shows sample output from the debug ccswvoice vo-debug command:
Router# debug ccswvoice vo-debug
2w2d: ccswvoice: callID 529927 pvcid -1 cid -1 state NULL event O/G SETUP
2w2d: ccswvoice_out_callinit_setup: callID 529927 using pvcid 1 cid 15
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G INIT event I/C PROC
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G PROC event I/C
ALERTccfrf11_caps_ind: codec(preferred) = 1
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G ALERT event I/C CONN
2w2d: ccswvoice_bridge_drop: dropping bridge calls src 529927 dst 529926 pvcid 1 cid 15
state ACTIVE
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state ACTIVE event O/G REL
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state RELEASE event I/C RELCOMP
2w2d: ccswvo_store_call_history_entry: cause=10 tcause=10 cause_text=normal call
clearing.
Usage Guidelines Use this command when troubleshooting a VoFR call that uses the “cisco-switched” session protocol.
This command provides the same information as the debug ccswvoice vofr-session command, but
includes additional debugging information relating to the calls.
Examples The following shows sample output from the debug ccswvoice vofr-debug command:
Router# debug ccswvoice vofr-debug
CALL TEARDOWN:
3640_vofr(config-voiceport)#
*Mar 1 03:02:08.719:ccswvofr_bridge_drop:dropping bridge calls src 17 dst 16 dlci 100
cid 9 state ACTIVE
*Mar 1 03:02:08.727:ccswvofr:callID 17 dlci 100 cid 9 state ACTIVE event O/G REL
*Mar 1 03:02:08.735:ccswvofr:callID 17 dlci 100 cid 9 state RELEASE event I/C RELCOMP
*Mar 1 03:02:08.735:ccswvofr_store_call_history_entry:cause=22 tcause=22
cause_text=no circuit.
3640_vofr(config-voiceport)#
Usage Guidelines Use this command to show the state transitions of the cisco-switched-vofr state machine as a call is
processed, and when attempting to troubleshoot a VoFR call that uses the “cisco-switched” session
protocol.
Examples The following shows sample output from the debug ccswvoice vofr-session command:
Router# debug ccswvoice vofr-session
CALL TEARDOWN:
3640_vofr(config-voiceport)#
*Mar 1 02:58:13.203:ccswvofr:callID 14 dlci 100 cid 8 state ACTIVE event O/G REL
*Mar 1 02:58:13.215:ccswvofr:callID 14 dlci 100 cid 8 state RELEASE event I/C RELCOMP
3640_vofr(config-voiceport)#
Usage Guidelines Use this command to show the state transitions of the cisco-switched-vo state machine as a call is
processed. This command should be used when attempting to troubleshoot a Vo call that uses the
“cisco-switched” session protocol.
Examples The following shows sample output from the debug ccswvoice vo-session command:
Router# debug ccswvoice vo-session
2w2d: ccswvoice: callID 529919 pvcid -1 cid -1 state NULL event O/G SETUP
2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state O/G INIT event I/C PROC
2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state O/G PROC event I/C ALERT
2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state O/G ALERT event I/C CONN
2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state ACTIVE event O/G REL
2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state RELEASE event I/C RELCOMP
debug cdapi
To display information about the call distributor application programming interface (CDAPI), use the
debug cdapi command in privileged EXEC mode.
Syntax Description detail Displays when applications register or unregister with CDAPI, when calls
are added or deleted from the CDAPI routing table, and when CDAPI
messages are created and freed. It is useful for determining if messages
are being lost (or not freed) and the size of the raw messages passed
between CDAPI and applications so that you can check that the correct
number of bytes is being passed.
events Displays the events passing between CDAPI and an application or
signalling stack. This debug is useful for determining if certain ISDN
messages are not being received by an application and if calls are not
being directed to an application.
Defaults Disabled
Examples The following example shows output for the debug cdapi command:
Router# debug cdapi
003909 Cause = 0
003909 CDAPI-ISDN Se123 RX <- CDAPI_MSG_CONNECT_RESP from TSP CDAPI Application call =
0x24
003909 Call Type = VOICE
003909 B Channel = 0
003909 Cause = 0
003909 CDAPI Se123 TX -> CDAPI_MSG_SUBTYPE_CALL_PROC_REQ to ISDN call = 0x24
003909 From Appl/Stack = TSP CDAPI Application
003909 Call Type = VOICE
003909 B Channel = 0
003909 Cause = 0
003909 CDAPI-ISDN Se123 RX <- CDAPI_MSG_SUBTYPE_CALL_PROC_REQ from TSP CDAPI Application
call = 0x24
003909 Call Type = VOICE
003909 B Channel = 0
003909 Cause = 0
003909 ISDN Se123 TX -> CALL_PROC pd = 8 callref = 0x86BB
003909 Channel ID i = 0xA98381
debug cdp
To enable debugging of the Cisco Discovery Protocol (CDP), use the debug cdp command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Usage Guidelines Use debug cdp commands to display information about CDP packet activity, activity between CDP
neighbors, and various CDP events.
Examples The following is sample output from debug cdp packets, debug cdp adjacency, and debug cdp events
commands:
Router# debug cdp packets
debug cdp ip
To enable debug output for the IP routing information that is carried and processed by the
Cisco Discovery Protocol (CDP), use the debug cdp ip command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug cdp ip
no debug cdp ip
Usage Guidelines CDP is a media- and protocol-independent device-discovery protocol that runs on all Cisco routers.
You can use the debug cdp ip command to determine the IP network prefixes CDP is advertising and
whether CDP is correctly receiving this information from neighboring routers.
Use the debug cdp ip command with the debug ip routing command to debug problems that occur when
on-demand routing (ODR) routes are not installed in the routing table at a hub router. You can also use
the debug cdp ip command with the debug cdp packet and debug cdp adjacency commands along with
encapsulation-specific debug commands to debug problems that occur in the receipt of CDP IP
information.
Examples The following is sample output from the debug cdp ip command. This example shows the transmission
of IP-specific information in a CDP update. In this case, three network prefixes are being sent, each with
a different network mask.
Router# debug cdp ip
• This message indicates a protocol error occurred during an attempt to decode an incoming CDP
packet:
CDP-IP: IP TLV length (3) invalid
• This message indicates the receipt of the IP prefix 172.16.1.0/24 from a CDP neighbor connected
via Ethernet interface 0/0. The neighbor IP address is 10.0.01.
CDP-IP: Reading prefix 172.16.1.0/24 source 10.0.0.1 via Ethernet0/0
debug ces-conn
To display information from circuit emulation service (CES) clients, use the debug ces-conn command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
no debug ces-conn
Syntax Description all (Optional) Displays all error and event information.
errors (Optional) Displays only error information.
events (Optional) Displays only event information.
Examples The following example shows debug output for a CES connection:
Router# debug ces-conn all
Router(config-ces-conn)# exit
Router(config)#
*Mar 6 18:32:27:CES_CLIENT:vc QoS parameters are PCR = 590, CDV =
5000, CAS_ENABLED = 1,partial fill = 0, multiplier = 8,cbr rate = 64,
clock recovery = 0,service_type = 3, error method = 0,sdt_size = 196,
billing count = 0
*Mar 6 18:32:27:CES_CLIENT:attempt 1 to activate segment>
Usage Guidelines This command displays CMCC adapter events that occur on the Channel Interface Processor (CIP) or
Channel Port Adapter (CPA) and is useful for diagnosing problems in an IBM channel attach network.
It provides an overall picture of the stability of the network. In a stable network, the debug channel
events command does not return any information. If the command generates numerous messages, the
messages can indicate the possible source of the problems. To observe the statistic message
(cip_love_letter) sent every 10 seconds, use the debug channel love command.
When configuring or making changes to a router or interface that supports IBM channel attach, enable
the debug channel events command. Doing so alerts you to the progress of the changes or to any errors
that might result. Also use this command periodically when you suspect network problems.
Examples The following sample output is from the debug channel events command:
Router# debug channel events
The following line indicates that the CIP is being reset to an administrative down state:
Channel3/0: cip_reset(), state administratively down
The following line indicates that the CIP is being reset to an administrative up state:
Channel3/0: cip_reset(), state up
The following line indicates that the node ID is being sent to the CIP. This information is the same as
the “Local Node” information under the show extended channel slot/port subchannels command. The
CIP needs to send this information to the host mainframe.
Channel3/0: sending nodeid
The following line indicates that a Common Link Access for Workstations (CLAW) subchannel
command is being sent from the Route Processor (RP) to the CIP. The value vc 0 indicates that the CIP
will use virtual circuit number 0 with this device. The virtual circuit number also shows up when you
use the debug channel packets command.
Channel3/0: sending command for vc 0, CLAW path C700, device C0
The following is a sample output that is generated by the debug channel events command when a
CMPC+ IP TG connection is activated with the host:
1d05h:Channel4/2:Received route UP for tg (768)
1d05h:Adding STATIC ROUTE for vc:768
The following is a sample output from the debug channel events command when a CMPC+ IP TG
connection is deactivated:
1d05h:Channel4/2:Received route DOWN for tg (768)
1d05h:Deleting STATIC ROUTE for vc:768
Usage Guidelines The debug channel ilan command displays events related to CMCC internal LANs. This command is
useful for debugging problems associated with CMCC internal LAN configuration. It is also useful for
debugging problems related to SRB packet flows through internal LANs.
Examples The following sample output is from the debug channel ilan command:
Router# debug channel ilan
The following line indicates that a packet destined for the CMCC via a configured internal MAC adapter
configured on an internal LAN was dropped because the Logical Link Control (LLC) end station in
Cisco IOS software did not exist:
CIP ILAN(Channel3/2-Token): Packet dropped - NULL LLC
The following line indicates that a packet destined for the CMCC via a configured internal MAC adapter
configured on an internal LAN was dropped because the CMCC had not yet acknowledged the internal
MAC adapter configuration command:
Channel3/2: ILAN Token-Ring 3 - CIP internal MAC adapter not acknowledged
DMAC(4000.7000.0001) SMAC(0c00.8123.0023)
Usage Guidelines This command displays CIP love letter events (an operating status or configuration message) that occur
on the CIP interface processor and is useful for diagnosing problems in an IBM channel attach network.
It provides an overall picture of the stability of the network. In a stable network, the debug channel love
command returns a statistic message (cip_love_letter) that is sent every 10 seconds. This command is
valid for the Cisco 7000 series routers only.
Examples The following is sample output from the debug channel love command:
Router# debug channel love
The following line indicates that data was received on the CIP:
Channel3/1: love letter received, bytes 3308
The following line indicates that the interface is enabled, but there is no configuration for it. It does not
normally indicate a problem, just that the Route Processor (RP) got statistics from the CIP but has no
place to store them.
cip_love_letter: received ll, but no cip_info
Usage Guidelines The debug channel packets command displays all process-level Channel Interface Processor (CIP)
packets for both outbound and inbound packets. The output reports information when a packet is
received or a transmission is attempted. You will need to disable fast switching and autonomous
switching to obtain debugging output. This command is useful for determining whether packets are
received or sent correctly.
This command is valid for the Cisco 7000 series routers only.
Examples The following is sample output from the debug channel packets command:
Router# debug channel packets
(Channel3/0)-out size = 104, vc = 0000, type = 0800, src 172.24.0.11, dst 172.24.1.58
(Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197
(Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197
(Channel3/0)-out size = 71, vc = 0000, type = 0800, src 172.24.15.197, dst 172.24.1.58
(Channel3/0)-in size = 44, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197
Field Description
(Channel3/0) Interface slot and port.
in/out “In” is a packet from the mainframe to the router.
“Out” is a packet from the router to the mainframe.
size = Number of bytes in the packet, including internal overhead.
vc = Value from 0 to 511 that maps to the claw interface configuration command. This
information is from the MAC layer.
type = Encapsulation type in the MAC layer. The value 0800 indicates an IP datagram.
src Origin, or source, of the packet, as opposed to the previous hop address.
dst Destination of the packet, as opposed to the next-hop address.
Examples The following is sample output from the debug clns esis events command:
Router# debug clns esis events
The following line indicates that the router received a hello packet (ISH) from the IS at MAC address
aa00.0400.2c05 on Ethernet interface 1. The hold time (or number of seconds to consider this packet
valid before deleting it) for this packet is 30 seconds.
ES-IS: ISH from aa00.0400.2c05 (Ethernet1), HT 30
The following line indicates that the router received a hello packet (ESH) from the ES at MAC address
aa00.0400.9105 on the Ethernet interface 1. The hold time is 150 seconds.
ES-IS: ESH from aa00.0400.9105 (Ethernet1), HT 150
The following line indicates that the router sent an IS hello packet on the Ethernet interface 0 to all ESs
on the network. The network entity title (NET) address of the router is 49.0001.0400.AA00.6904.00; the
hold time for this packet is 299 seconds; and the header length of this packet is 20 bytes.
ES-IS: ISH sent to All ESs (Ethernet1): NET 49.0001.AA00.0400.6904.00, HT 299, HLEN 20
Examples The following is sample output from the debug clns esis packets command:
Router# debug clns esis packets
The following line indicates that the router has sent an IS hello packet on Ethernet interface 0 to all ESs
on the network. This hello packet indicates that the NET of the router is
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds.
The packet header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Ethernet0): NET
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 33
The following line indicates that the router has sent an IS hello packet on Ethernet interface 1 to all ESs
on the network. This hello packet indicates that the NET of the router is
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds.
The packet header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Ethernet1): NET
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 34
The following line indicates that the router received a hello packet on Ethernet interface 0 from an
intermediate system, aa00.0400.6408. The hold time for this packet is 299 seconds.
ES-IS: ISH from aa00.0400.6408 (Ethernet0), HT 299
The following line indicates that the router has sent an IS hello packet on Tunnel interface 0 to all ESs
on the network. This hello packet indicates that the NET of the router is
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds.
The packet header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Tunnel0): NET
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 34
The following line indicates that on Ethernet interface 0, the router received a hello packet from an end
system with an SNPA of 0000.0c00.bda8. The hold time for this packet is 300 seconds.
IS-IS: ESH from 0000.0c00.bda8 (Ethernet0), HT 300
Examples The following is sample output from the debug clns events command:
Router# debug clns events
The following line indicates that the router received an echo protocol data unit (PDU) on Ethernet
interface 3 from source network service access point (NSAP) 39.0001.2222.2222.2222.00. The
exclamation point at the end of the line has no significance.
CLNS: Echo PDU received on Ethernet3 from 39.0001.2222.2222.2222.00!
The following lines indicate that the router at source NSAP 39.0001.3333.3333.3333.00 is sending a
CLNS echo packet to destination NSAP 39.0001.2222.2222.2222.00 via an IS with system ID
2222.2222.2222. The packet is being sent on Ethernet interface 3, with a MAC address of
0000.0c00.3a18.
CLNS: Sending from 39.0001.3333.3333.3333.00 to 39.0001.2222.2222.2222.00
via 2222.2222.2222 (Ethernet3 0000.0c00.3a18)
The following lines indicate that a CLNS echo packet 117 bytes in size is being sent from source NSAP
39.0001.2222.2222.2222.00 to destination NSAP 49.0002.0001.AAAA.AAAA.AAAA.00 via the router
at NSAP 49.0002. The packet is being forwarded on the Ethernet interface 3, with a MAC address of
0000.0c00.b5a3.
CLNS: Forwarding packet size 117
from 39.0001.2222.2222.2222.00
to 49.0002.0001.AAAA.AAAA.AAAA.00
via 49.0002 (Ethernet3 0000.0c00.b5a3)
The following lines indicate that the router sent a redirect packet on the Ethernet interface 3 to the NSAP
39.0001.2222.2222.2222.00 at MAC address 0000.0c00.3a18 to indicate that NSAP
49.0002.0001.AAAA.AAAA.AAAA.00 can be reached at MAC address 0000.0c00.b5a3.
CLNS: RD Sent on Ethernet3 to 39.0001.2222.2222.2222.00 @ 0000.0c00.3a18,
redirecting 49.0002.0001.AAAA.AAAA.AAAA.00 to 0000.0c00.b5a3
Examples The following is sample output from the debug clns packet command:
Router# debug clns packet
In the following lines, the first line indicates that a Connectionless Network Service (CLNS) packet of
size 157 bytes is being forwarded. The second line indicates the network service access point (NSAP)
and system name of the source of the packet. The third line indicates the destination NSAP for this
packet. The fourth line indicates the next hop system ID, interface, and subnetwork point of attachment
(SNPA) of the router interface used to forward this packet.
CLNS: Forwarding packet size 157
from 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.00 STUPI-RBS
to 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00
via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
In the following lines, the first line indicates that the router received an echo protocol data unit (PDU)
on the specified interface from the source NSAP. The second line indicates which source NSAP is used
to send a CLNS packet to the destination NSAP, as shown on the third line. The fourth line indicates the
next hop system ID, interface, and SNPA of the router interface used to forward this packet.
CLNS: Echo PDU received on Ethernet0 from
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00!
CLNS: Sending from 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00 to
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00
via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
Examples The following is sample output from the debug clns routing command:
Router# debug clns routing
The following line indicates that a change to the routing table has resulted in an addition to the
fast-switching cache:
CLNS-RT: cache increment:17
The following line indicates that a specific prefix route was added to the routing table, and indicates the
next hop system ID to that prefix route. In other words, when the router receives a packet with the prefix
47.0023.0001.0000.0000.0003.0001 in the destination address of that packet, it forwards that packet to
the router with the MAC address 1920.3614.3002.
CLNS-RT: Add 47.0023.0001.0000.0000.0003.0001 to prefix table, next hop 1920.3614.3002
The following lines indicate that the fast-switching cache entry for a certain network service access point
(NSAP) has been invalidated and then deleted:
CLNS-RT: Aging cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06
CLNS-RT: Deleting cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06
Usage Guidelines The debug cls message command displays the primitives (state), selector, header length, and data size.
Examples The following is sample output from the debug cls message command. For example, CLS-->DLU
indicates the direction of the flow that is described by the status. From CLS to dependent logical unit
(DLU), a request was established to the connection endpoint. The header length is 48 bytes, and the data
size is 104 bytes.
Router# debug cls message
(FRAS Daemon:CLS-->DLU):
ID_STN.Ind to uSAP: 0x607044C4 sel: LLC hlen: 40, dlen: 54
(FRAS Daemon:CLS-->DLU):
ID_STN.Ind to uSAP: 0x6071B054 sel: LLC hlen: 40, dlen: 46
(FRAS Daemon:DLU-->SAP):
REQ_OPNSTN.Req to pSAP: 0x608021F4 sel: LLC hlen: 48, dlen: 104
(FRAS Daemon:CLS-->DLU):
REQ_OPNSTN.Cfm(NO_REMOTE_STN) to uCEP: 0x607FFE84 sel: LLC hlen: 48, dlen: 104
The status possibilities include the following: enabled, disabled, request open station, open station, close
station, activate SA, deactivate service access point (SAP), XID, exchange identification (XID) station,
connect station, signal station, connect, disconnect, connected, data, flow, unnumbered data, modify
SAP, test, activate ring, deactivate ring, test station, and unnumbered data station.
Usage Guidelines The debug cls message command displays primitive state transitions, selector, and source and
destination MAC and service access points (SAPs).
Also use the show cls command to display additional information on CLS VDLC.
Caution Use the debug cls vdlc command with caution because it can generate a substantial amount of output.
Examples The following messages are sample output from the debug cls vdlc command. In the following scenario,
the systems network architecture (SNA) service point—also called native service point (NSP)—is
setting up two connections through VDLC and data-link switching (DLSw): one from NSP to VDLC and
one from DLSw to VDLC. VDLC joins the two.
The NSP initiates a connection from 4000.05d2.0001 as follows:
VDLC: Req Open Stn Req PSap 0x7ACE00, port 0x79DF98
4000.05d2.0001(0C)->4000.1060.1000(04)
In the next message, VDLC sends a test station request to DLSw for destination address 4000.1060.1000.
VDLC: Send UFrame E3: 4000.05d2.0001(0C)->4000.1060.1000(00)
In the next two messages, DLSw replies with test station response, and NSP goes to a half-open state.
NSP is waiting for the DLSw connection to VDLC.
VDLC: Sap to Sap TEST_STN_RSP VSap 0x7B68C0 4000.1060.1000(00)->4000.05d2.0001(0C)
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPENING->VDLC_HALF_OPEN
The NSP sends an exchange identification (XID) and changes state as follows:
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_HALF_OPEN->VDLC_XID_RSP_PENDING
VDLC: CEP to SAP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04) via bridging SAP (DLSw)
In the next several messages, DLSw initiates its connection, which matches the half-open connection
with NSP:
VDLC: Req Open Stn Req PSap 0x7B68C0, port 0x7992A0
4000.1060.1000(04)->4000.05d2.0001(0C)
VDLC: two-way connection established
VDLC: 4000.1060.1000(04)->4000.05d2.0001(0C): VDLC_IDLE->VDLC_OPEN
In the following messages, DLSw sends an XID response, and the NSP connection goes from the state
XID Response Pending to Open. The XID exchange follows:
VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING
VDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)
VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING
VDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)
VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING
VDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)
VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDING
VDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)
When DLSw is ready to connect, the front-end processor (FEP) sends a set asynchronous balanced mode
extended (SABME) command as follows:
VDLC: CEP to CEP CONNECT_REQ 4000.1060.1000(04)->4000.05d2.0001(0C)
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPEN
In the following messages, NSP accepts the connection and sends an unnumbered acknowledgment (UA)
to the FEP:
VDLC: CEP to CEP CONNECT_RSP 4000.05d2.0001(0C)->4000.1060.1000(04)
VDLC: FlowReq QUENCH OFF 4000.1060.1000(04)->4000.05d2.0001(0C)
Syntax Description agent Displays debugging messages related to the CNS configuration agent.
all Displays all debugging messages.
connection Displays debugging messages related to configuration connections.
notify Displays debugging messages related to CNS configurations.
Usage Guidelines Use this command to turn on or turn off debugging messages related to the CNS Configuration Agent.
Examples In the following example, debugging messages are enabled for CNS configuration processes:
Router# debug cns config all
Syntax Description agent Displays debugging messages related to the event agent.
all Displays all debugging messages.
connection Displays debugging messages related to event connections.
subscriber Displays debugging messages related to subscribers.
Usage Guidelines Use this command to turn on or turn off debugging messages related to the CNS Event Gateway.
Examples In the following example, debugging messages about all CNS Events are enabled:
Router# debug cns event all
Syntax Description agent Displays debugging messages related to the exec agent.
all Displays all debugging messages.
decode Displays debugging messages related to image agent connections.
messages Displays debugging output related to messages generated by exec agent
services.
Usage Guidelines Use the debug cns exec command to troubleshoot CNS exec agent services.
Examples The following example shows a debugging message for the CNS exec agent when a response has been
posted to HTTP:
Router# debug cns exec agent
Syntax Description agent Displays debugging messages related to the image agent.
all Displays all debugging messages.
connection Displays debugging messages related to image agent connections.
error Displays debugging messages related to errors generated by image agent
services.
Usage Guidelines Use the debug cns image command to troubleshoot CNS image agent services.
Syntax Description snmp Displays debugging messages related to nongranular Simple Network
Management Protocol (SNMP) encapsulated CNS-management events.
xml Displays debugging messages related to granular eXtensible Markup
Language (XML) encapsulated CNS-management events.
Examples In the following example, debugging messages about SNMP- and XML-encapsulated CNS-management
events are enabled:
Router# debug cns management snmp
Router# debug cns management xml
Examples In the following example, debugging messages for the CNS XML parser are enabled:
Router# debug cns xml-parser
debug compress
To debug compression, enter the debug compress command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug compress
no debug compress
Defaults Disabled
Usage Guidelines Use this command to display output from the compression and decompression configuration you made.
Live traffic must be configured through the Cisco 2600 access router with a data compression Advanced
Interface Module (AIM) installed for this command to work.
Examples The following example is output from the debug compress command, which shows that compression is
taking place on a Cisco 2600 access router using data compression AIM hardware compression is
configured correctly:
Router# debug compress
COMPRESS debugging is on
Router#compr-in:pak:0x810C6B10 npart:0 size:103
pak:0x810C6B10 start:0x02406BD4 size:103 npart:0
compr-out:pak:0x8118C8B8 stat:0x00000000 npart:1 size:71 lcb:0xED
pak:0x8118C8B8 start:0x0259CD3E size:71 npart:1
mp:0x8118A980 start:0x0259CD3E size:71
Field Description
compr-in Indicates that a packet needs to be compressed.
compr-out Indicates completion of compression of packet.
decmp-in Indicates receipt of a compressed packet that needs to be
decompressed.
decmp-out Indicates completion of decompression of a packet.
pak:0x810C6B10 Provides the address in memory of a software structure that
describes the compressed packet.
start:0x02406BD4 size:103 npart:0 The “npart:0” indicates that the packet is contained in a
single, contiguous area of memory. The start address of the
packet is 0x02406bd4 and the size of the packet is 103.
start:0x0259CD3E size:71 npart:1 The “npart:1” indicates that the packet is contained in 1 or
more regions of memory. The start address of the packet is
0x0259CD3E and the size of the packet is 71.
mp:0x8118A980 start:0x0259CD3e Describes one of these regions of memory.
size:71
mp:0x8118A980 Provides the address of a structure describing this region.
start 0x0259CD3E Provides the address of the start of this region.
debug condition
To limit output for some debug commands based on specified conditions, use the debug condition
command in privileged EXEC mode. To removed the specified condition, use the no form of this
command.
debug condition {username username | called dial-string | caller dial-string | vcid vc-id | ip
ip-address}
Syntax Description username username Generates debugging messages for interfaces with the specified username.
called dial-string Generates debugging messages for interfaces with the called party number.
caller dial-string Generates debugging messages for interfaces with the calling party number.
vcid vc-id Generates debugging messages for the VC ID specified.
ip ip-address Generates debugging messages for the IP address specified.
condition-id Removes the condition indicated.
all Removes all debugging conditions, and conditions specified by the debug
condition interface command. Use this keyword to disable conditional
debugging and reenable debugging for all interfaces.
Defaults All debugging messages for enabled protocol-specific debug commands are generated.
Usage Guidelines Use the debug condition command to restrict the debug output for some commands. If any debug
condition commands are enabled, output is only generated for interfaces associated with the specified
keyword. In addition, this command enables debugging output for conditional debugging events.
Messages are displayed as different interfaces meet specific conditions.
If multiple debug condition commands are enabled, output is displayed if at least one condition
matches. All the conditions do not need to match.
The no form of this command removes the debug condition specified by the condition identifier. The
condition identifier is displayed after you use a debug condition command or in the output of the show
debug condition command. If the last condition is removed, debugging output resumes for all interfaces.
You will be asked for confirmation before removing the last condition or all conditions.
Not all debugging output is affected by the debug condition command. Some commands generate output
whenever they are enabled, regardless of whether they meet any conditions. The commands that are
affected by the debug condition commands are generally related to dial access functions, where a large
amount of output is expected. Output from the following commands is controlled by the debug
condition command:
• debug aaa {accounting | authorization | authentication}
• debug dialer events
• debug isdn {q921 | q931}
• debug modem {oob | trace}
• debug ppp {all | authentication | chap | error | negotiation | multilink events | packet}
Examples Example 1
In the following example, the router displays debugging messages only for interfaces that use a username
of fred. The condition identifier displayed after the command is entered identifies this particular
condition.
Router# debug condition username fred
Condition 1 set
Example 2
The following example specifies that the router should display debugging messages only for VC 1000:
Router# debug condition vcid 1000
Condition 1 set
01:12:32: 1000 Debug: Condition 1, vcid 1000 triggered, count 1
01:12:32: 1000 Debug: Condition 1, vcid 1000 triggered, count 1
Other debugging commands are enabled, but they will only display debugging for VC 1000.
Router# debug mpls l2transport vc event
The following commands shut down the interface where VC 1000 is established.
Router(config)# interface s3/1/0
Router(config-if)# shut
The debugging output shows the change to the interface where VC 1000 is established.
01:15:59: AToM MGR [13.13.13.13, 1000]: Event local down, state changed from established
to remote ready
01:15:59: AToM MGR [13.13.13.13, 1000]: Local end down, vc is down
01:15:59: AToM SMGR [13.13.13.13, 1000]: Processing imposition update, vc_handle 6227BCF0,
update_action 0, remote_vc_label 18
01:15:59: AToM SMGR [13.13.13.13, 1000]: Imposition Disabled
Syntax Description application-name Name of the VoiceXML application for which you want to display all
enabled debugging messages.
Defaults If this command is not configured, debugging messages are enabled for all VoiceXML applications.
Usage Guidelines • This command filters debugging output only for the debug vxml and debug http client commands,
except that it does not filter output for the debug vxml error, debug vxml background, debug http
client error, or debug http client background commands. It does not filter messages for any other
debug commands such as the debug voip ivr command or the debug voice ivr command.
• This command filters debugging output for all VoiceXML applications except the application named
in the command. When this command is configured, the gateway displays debugging messages only
for the specified VoiceXML application.
• To filter debugging output with this command, the <cisco-debug> element must be enabled in the
VoiceXML document. For more information about the <cisco-debug> element, refer to the
Cisco VoiceXML Programmer’s Guide.
• To see debugging output for VoiceXML applications, you must first configure global debug
commands such as the debug vxml command or the debug http client command. If no global debug
commands are turned on, you do not see debugging messages even if the debug condition
application voice command is configured and the <cisco-debug> element is enabled in the
VoiceXML document.
• This command can be configured multiple times to display output for more than one application.
• To see which debug conditions have been set, use the show debug condition command.
Examples The following example disables debugging output for all applications except the myapp1 application, if
the <cisco-debug> element is enabled in the VoiceXML documents that are executed by myapp1:
Router# debug condition application voice myapp1
Examples The following is sample output from the debug condition glbp command:
Router# debug condition glbp fastethernet 0/0 10 1
Condition 1 set
5d23h: Fa0/0 GLBP10.1 Debug: Condition 1, glbp Fa0/0 GLBP10.1 triggered, count 1
Defaults All debugging messages for enabled debug commands are displayed.
Usage Guidelines Use this command to restrict the debug output for some commands to output based on its related
interface. When you enter this command, debugging output is turned off for all interfaces except the
specified interface. In addition, this command enables debugging output for conditional debugging
events. Messages are displayed as different interfaces meet specific conditions.
The no form of the command has two functions:
• It disables the debug condition interface command for the specified interface. Output is no longer
generated for the interface, assuming that the interface meets no other conditions. If the interface
meets other active conditions, as set by another debug condition command, debugging output will
still be generated for the interface.
• The command also resets the debugging trigger on the interface. If some other debug condition
command has been enabled, this command resets the trigger on the interface. Output is stopped for
that interface until the condition is met on the interface.
You will be asked for confirmation before removing the last condition or all conditions.
Not all debugging output is affected by the debug condition command. Some commands generate output
whenever they are enabled, regardless of whether they meet any conditions. The commands that are
affected by the debug condition commands are generally related to dial access functions, where a large
amount of output is expected. Output from the following commands is controlled by the debug
condition command:
• debug aaa {accounting | authorization | authentication}
• debug dialer events
• debug isdn {q921 | q931}
• debug modem {oob | trace}
• debug ppp {packet | negotiation | error | authentication | compression | cbcp}
Examples In this example, only debug command output related to serial interface 1 is displayed. The condition
identifier for this command is 1.
Router# debug condition interface serial1
Condition 1 set
debug confmodem
To display information associated with the discovery and configuration of the modem attached to the
router, use the debug confmodem command in privileged EXEC mode. To disable debugging output,
use the no form of this command.
debug confmodem
no debug confmodem
Usage Guidelines The debug confmodem command is used in debugging configurations that use the modem autoconfig
command.
Examples The following is sample output from the debug confmodem command. In the first three lines, the router
is searching for a speed at which it can communicate with the modem. The remaining lines show the
actual sending of the modem command.
Router# debug confmodem
debug conn
To display information from the connection manager, time-division multiplexing (TDM) and digital
signal processor (DSP) clients, use the debug conn command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug conn
no debug conn
Router(config-tdm-conn)# exit
debug cops
To display a one-line summary of each Common Open Policy Service (COPS) message sent from and
received by the router, use the debug cops command in privileged EXEC mode. To disable debugging
output, use the no form of this command.
Syntax Description detail (Optional) Displays additional debug information, including the contents of
COPS and Resource Reservation Protocol (RSVP) messages.
Usage Guidelines To generate a complete record of the policy process, enter this command and, after entering a carriage
return, enter the additional command debug ip rsvp policy.
Examples This first example displays the one-line COPS message summaries, as the router goes through six
different events.
Router# debug cops
COPS debugging is on
Event 1
Router(config)#
15:13:45:COPS: Opened TCP connection to 2.0.0.1/3288
15:13:45:COPS: ** SENDING MESSAGE **
15:13:45:COPS OPN message, Client-type:1, Length:28. Handle:[NONE]
15:13:45:COPS: ** RECEIVED MESSAGE **
15:13:45:COPS CAT message, Client-type:1, Length:16. Handle:[NONE]
Router(config)#
Event 2
Event 3
Event 4
Event 5
Event 6
The router gets configured to cease communicating with the policy server:
Router(config)# no ip rsvp policy cops servers
This second example uses the detail keyword to display the contents of the COPS and RSVP messages,
and additional debugging information:
Router# debug cops detail
COPS debugging is on
To see an example where the debug cops command is used along with the debug ip rsvp policy
command, refer to the second example of the debug ip rsvp policy command.
debug cot
To display information about the Continuity Test (COT) functionality, use the debug cot command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description api Displays information about the COT application programming interface
(API).
dsp Displays information related to the COT/Digital Signal Processor
configuration (DSP) interface. Typical DSP functions include data modems,
voice codecs, fax modems and codecs, and low-level signaling such as
channel-associated signaling (CAS)/R2.
queue Display information related to the COT internal queue.
detail Display information about COT internal detail; summary of the debug cot
api, debug cot dsp, and debug cot queue commands.
Examples The following is sample output from the debug cot api command:
Field Description
CDB Internal controller information.
req Type of COT operation requested.
shelf Shelf ID of the COT operation request.
slot Designates the slot number, 1 to 4.
appl-no Hardware unit that provides the external interface connections from a router
to the network.
Field Description
ds0 Number of the COT operation request.
key COT operation identifier.
duration Timeout duration of the COT operation.
freqTX Requested transmit tone frequency.
freqRX Requested receive tone frequency.
The following is sample output from the debug cot dsp command:
Router#
00:10:42:COT:DSP (1/1) Allocated
00:10:43:In cot_callback
00:10:43: returned key 0xFFF1, status = 0
00:10:43:COT:Received DSP Q Event
00:10:43:COT:DSP (1/1) Done
00:10:43:COT:DSP (1/1) De-allocated
Field Description
DSP (1/1) Allocated Slot and port of the DSP allocated for the COT operation.
Received DSP Q Event Indicates the COT subsystem received an event from the DSP.
DSP (1/1) Done Slot and port of the DSP transitioning to IDLE state.
DSP (1/1) De-allocated Slot and port of the DSP de-allocated after the completion of the COT
operation.
The following is sample output from the debug cot queue command:
Router# debug cot queue
Router#
00:11:26:COT(0x60EBB48C):Adding new request (0x61123DBC) to In
Progress Q
00:11:26:COT(0x60EBB48C):Adding COT(0x61123DBC) to the Q head
00:11:27:In cot_callback
00:11:27: returned key 0xFFF1, status = 0
Field Description
COT Internal COT operation request.
Adding new request Internal COT operation request queue.
The following is sample output from the debug cot detail command.
Router# debug cot detail
Router#
00:04:57:cot_request_handler():CDB@0x60EBB48C, req(COT_CHECK_TONE_ON):
Because the debug cot detail command is a summary of the debug cot api, debug cot dsp, and debug
cot queue commands, the field descriptions are the same.
debug crm
To view Carrier Resource Manager (CRM) information, use the debug crm command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug crm
no debug crm
Usage Guidelines Disable console logging and use buffered logging before using the debug crm command. Using the
debug crm command generates a large volume of debugs, which can affect router performance.
Examples Sample output from the debug crm command is shown below.
The output shows that the route label, which will be either a trunk group label or carrier ID, is att1.
Mask 1 indicates that it is an incoming voice update. Count type 1 indicates the number of voice calls is
being incremented.
Field Description
count type Indicates whether the number of voice calls is being incremented or
decremented.
1 = Incremented
-1 = Decremented
current capacity mask Indicates type of current capacity update from CRM to service provider
interface (SPI).
event type 0 = Update all carriers
1 = Update single carrier
mask Mask for CRM call update.
max capacity mask Indicates type of maximum capacity update from CRM to SPI.
reason for event Reason for this event being sent:
0 = Current capacity update
1 = Max capacity update
2 = Both capacity update
3 = Delete carrier
route label Either the trunk group label or carrier id.
route label type Indicates the type of trunk.
0 = Invalid
1 = TDM
2 = VOIP H323
3 = VOIP SIP
4 = VOIP MGCP
5 = VOIPN2P
Usage Guidelines Use the debug crypto engine command to display information pertaining to the crypto engine, such as
when Cisco IOS software is performing encryption or decryption operations.
The crypto engine is the actual mechanism that performs encryption and decryption. A crypto engine
can be software or a hardware accelerator. Some platforms can have multiple crypto engines; therefore,
the router will have multiple hardware accelerators.
Examples The following is sample output from the debug crypto engine command. The first sample output shows
messages from a router that successfully generates Rivest, Shamir, and Adelma (RSA) keys. The second
sample output shows messages from a router that decrypts the RSA key during Internet Key Exchange
(IKE) negotiation.
Router# debug crypto engine
Defaults The logging of commands sent from the VPN module driver to the VPN module hardware is disabled.
Usage Guidelines Use the debug crypto engine accelerator logs command when encryption traffic is sent to the router
and a problem with the encryption module is suspected.
This command is intended only for Cisco TAC personnel to collect debugging information.
Examples The debug crypto engine accelerator logs command uses a debug flag to log commands and associated
parameters sent from the VPN module driver to the VPN module hardware as follows:
Router# debug crypto engine accelerator logs
Command Description
show crypto engine accelerator sa-database Prints active (in-use) entries in the
platform-specific VPN module database.
show crypto engine configuration Displays the Cisco IOS crypto engine of your
router.
Examples The following is sample output from the debug crypto ipsec command. In this example, security
associations (SAs) have been successfully established.
Router# debug crypto ipsec
IPSec requests SAs between 172.21.114.123 and 172.21.114.67, on behalf of the permit ip host
172.21.114.123 host 172.21.114.67 command. It prefers to use the transform set esp-des
w/esp-md5-hmac, but it will also consider ah-sha-hmac.
00:24:30: IPSEC(sa_request): ,
(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,
src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 120s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
00:24:30: IPSEC(sa_request): ,
(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,
src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1).,
protocol= AH, transform= ah-sha-hmac ,
lifedur= 120s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0.
Internet Key Exchange (IKE) asks for Service Provider Interfaces (SPIs) from IPSec. For inbound
security associations, IPSec controls its own SPI space.
00:24:34: IPSEC(key_engine): got a queue event...
00:24:34: IPSEC(spi_response): getting spi 302974012ld for SA
from 172.21.114.67 to 172.21.114.123 for prot 3
00:24:34: IPSEC(spi_response): getting spi 525075940ld for SA
from 172.21.114.67 to 172.21.114.123 for prot 2
IKE will ask IPSec if it accepts the SA proposal. In this case, it will be the one sent by the local IPSec
in the first place:
00:24:34: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123,
dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),
src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
After the proposal is accepted, IKE finishes the negotiations, generates the keying
material, and then notifies IPSec of the new security associations (one security
association for each direction).
00:24:35: IPSEC(key_engine): got a queue event...
The following output pertains to the inbound SA. The conn_id value references an entry in the crypto
engine connection table.
00:24:35: IPSEC(initialize_sas): ,
(key eng. msg.) dest= 172.21.114.123, src= 172.21.114.67,
dest_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
src_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 120s and 4608000 kb,
spi= 0x120F043C(302974012), conn_id= 29, keysize= 0, flags= 0x4
The following is sample output from the debug crypto ipsec command as seen on the peer router. In this
example, IKE asks IPSec if it will accept an SA proposal. Although the peer sent two proposals, IPSec
accepted the first proposal.
00:26:15: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123,
dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),
src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
IKE does the remaining processing, completing the negotiation and generating keys. It then tells IPSec
about the new SAs.
00:26:15: IPSEC(key_engine): got a queue event...
Usage Guidelines To force the Voice DSP Control Message Logger feature to reestablish the virtual private network (VPN)
connections, use the clear crypto sa and clear crypto isakmp commands to delete the IP Security
(IPSec) associations and Internet Key Exchange (IKE) connections, respectively.
Examples The following example shows debugging of the Voice DSP Contol Message Logger feature being turned
on, as well as typical debugging messages that appear when the VPN tunnel is created:
Router# debug crypto ipsec client ezvpn
EzVPN debugging is on
Router#
3d17h: EZVPN: New State: READY
3d17h: EZVPN: Current State: READY
3d17h: EZVPN: Event: MODE_CONFIG_REPLY
3d17h: ezvpn_mode_config
3d17h: ezvpn_parse_mode_config_msg
3d17h: EZVPN: Attributes sent in message:
3d17h: DNS Primary: 172.168.0.250
3d17h: DNS Secondary: 172.168.0.251
3d17h: NBMS/WINS Primary: 172.168.0.252
3d17h: NBMS/WINS Secondary: 172.168.0.253
3d17h: Default Domain: cisco.com
3d17h: EZVPN: New State: SS_OPEN
3d17h: EZVPN: Current State: SS_OPEN
3d17h: EZVPN: Event: SOCKET_READY
3d17h: EZVPN: No state change
3d17h: EZVPN: Current State: SS_OPEN
3d17h: EZVPN: Event: SOCKET_READY
3d17h: EZVPN: No state change
The following example shows the typical display for a VPN tunnel that is reset with the clear crypto
ipsec client ezvpn command:
Router# clear crypto ipsec client ezvpn
The following example shows the typical display for a VPN tunnel that is removed from the interface
with the no crypto ipsec client ezvpn command:
Router# no crypto ipsec client ezvpn
Examples The following is sample output from the debug crypto isakmp command for an IKE peer that initiates
an IKE negotiation.
First, IKE negotiates its own security association (SA), checking for a matching IKE policy.
Router# debug crypto isakmp
IKE has found a matching policy. Next, the IKE SA is used by each peer to authenticate the other peer.
20:26:58: ISAKMP (8): SA is doing pre-shared key authentication
20:26:59: ISAKMP (8): processing KE payload. message ID = 0
20:26:59: ISAKMP (8): processing NONCE payload. message ID = 0
20:26:59: ISAKMP (8): SKEYID state generated
20:26:59: ISAKMP (8): processing ID payload. message ID = 0
20:26:59: ISAKMP (8): processing HASH payload. message ID = 0
20:26:59: ISAKMP (8): SA has been authenticated
Next, IKE negotiates to set up the IP Security (IPSec) SA by searching for a matching transform set.
20:26:59: ISAKMP (8): beginning Quick Mode exchange, M-ID of 767162845
20:26:59: ISAKMP (8): processing SA payload. message ID = 767162845
20:26:59: ISAKMP (8): Checking IPSec proposal 1
20:26:59: ISAKMP: transform 1, ESP_DES
20:26:59: ISAKMP: attributes in transform:
20:26:59: ISAKMP: encaps is 1
20:26:59: ISAKMP: SA life type in seconds
20:26:59: ISAKMP: SA life duration (basic) of 600
A matching IPSec transform set has been found at the two peers. Now the IPSec SA can be created (one
SA is created for each direction).
20:26:59: ISAKMP (8): processing NONCE payload. message ID = 767162845
20:26:59: ISAKMP (8): processing ID payload. message ID = 767162845
20:26:59: ISAKMP (8): processing ID payload. message ID = 767162845
20:26:59: ISAKMP (8): Creating IPSec SAs
20:26:59: inbound SA from 155.0.0.2 to 155.0.0.1 (proxy 155.0.0.2 to 155.0.0.1 )
20:26:59: has spi 454886490 and conn_id 9 and flags 4
20:26:59: lifetime of 600 seconds
20:26:59: lifetime of 4608000 kilobytes
20:26:59: outbound SA from 155.0.0.1 to 155.0.0.2 (proxy 155.0.0.1
to 155.0.0.2 )
20:26:59: has spi 75506225 and conn_id 10 and flags 4
20:26:59: lifetime of 600 seconds
20:26:59: lifetime of 4608000 kilobytes
The following is sample output from the debug crypto isakmp command using the aaa keyword:
Router# debug crypto isakmp aaa
Start Example
Update Example
Usage Guidelines Encryption and authentication are provided by a software service on the router called a crypto engine.
The crypto engine performs authentication through DSS public and private keys when a connection is
set up. DSS is a means of sending a “signature” at the end of a message that positively identifies the
author of the message. The signature cannot be forged or duplicated by others, so whoever received a
message with a DSS signature knows exactly who sent the message.
If the process of exchanging DSS public keys with a peer router by means of the config crypto
key-exchange command is not successful, try to exchange DSS public keys again after enabling the
debug crypto key-exchange command to help you diagnose the problem.
Examples The following is sample output from the debug crypto key-exchange command. The first shows output
from the initiating router in a key exchange. The second shows output from the passive router in a key
exchange. The number of bytes received should match the number of bytes sent from the initiating side,
although the number of messages can be different.
Router# debug crypto key-exchange
Examples The following example shows IPSec MIB debug message notification being enabled:
Router# debug crypto mib
Defaults Disabled
Usage Guidelines The debug crypto pki messages command displays messages about the actual data being sent and
received during public key infrastructure (PKI) transactions. This command is internal for use by Cisco
support personnel.
You can use the show crypto ca certificates command to display information about your certificate.
Examples The following is sample output from the debug crypto pki messages command:
Router# debug crypto pki messages
00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 07 03 A0 80 30 80 02 01 00
00:48:23:31 80 30 82 01 0F 02 01 00 30 78 30 6A 31 0B 30 09 06 03 55
00:48:23:04 06 13 02 55 53 31 0B 30 09 06 03 55 04 08 13 02 43 41 31
00:48:23:13 30 11 06 03 55 04 07 13 0A 53 61 6E 74 61 20 43 72 75 7A
00:48:23:31 15 30 13 06 03 55 04 0A 13 0C 43 69 73 63 6F 20 53 79 73
00:48:23:74 65 6D 31 0E 30 0C 06 03 55 04 0B 13 05 49 50 49 53 55 31
00:48:23:Signed Data 1382 bytes
00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 07 02 A0 80 30 80 02 01 01
00:48:23:31 0E 30 0C 06 08 2A 86 48 86 F7 0D 02 05 05 00 30 80 06 09
00:48:23:2A 86 48 86 F7 0D 01 07 01 A0 80 24 80 04 82 02 75 30 80 06
00:48:23:02 55 53 31 0B 30 09 06 03 55 04 08 13 02 43 41 31 13 30 11
00:48:23:33 34 5A 17 0D 31 30 31 31 31 35 31 38 35 34 33 34 5A 30 22
00:48:23:31 20 30 1E 06 09 2A 86 48 86 F7 0D 01 09 02 16 11 70 6B 69
00:48:23:2D 33 36 61 2E 63 69 73 63 6F 2E 63 6F 6D 30 5C 30 0D 06 09
00:48:23:2A 86 48 86 F7 0D 01 01 01 05 00 03 4B 00 30 48 02 41 00 DD
00:48:23:2C C6 35 A5 3F 0F 97 6C 11 E2 81 95 01 6A 80 34 25 10 C4 5F
00:48:23:3D 8B 33 1C 19 50 FD 91 6C 2D 65 4C B6 A6 B0 02 1C B2 84 C1
00:48:23:86 F7 0D 01 01 01 05 00 04 40 C6 24 36 D6 D5 A6 92 80 5D E5
00:48:23:15 F7 3E 15 6D 71 E1 D0 13 2B 14 64 1B 0C 0F 96 BF F9 2E 05
00:48:23:EF C2 D6 CB 91 39 19 F8 44 68 0E C5 B5 84 18 8B 2D A4 B1 CD
00:48:23:3F EC C6 04 A5 D9 7C B1 56 47 3F 5B D4 93 00 00 00 00 00 00
00:48:23:00 00
00:48:24:Received pki message:1778 types
.
.
.
Defaults Disabled
Usage Guidelines Use the debug crypto pki transactions command to display debugging messages pertaining to public
key infrastructure (PKI) certificates. The messages will show status information during certificate
enrollment and verification.
You can also use the show crypto ca certificates command to display information about your certificate.
Examples The following example, which authenticates and enrolls a CA, contains sample output for the debug
crypto pki transactions command:
Router(config)# crypto ca authenticate msca
Password:
Re-enter password:
00:44:29:CRYPTO_PKI:signed attr:pki-message-type:
00:44:29:13 01 33
00:44:29:CRYPTO_PKI:signed attr:pki-status:
00:44:29:13 01 30
00:44:29:CRYPTO_PKI:signed attr:pki-recipient-nonce:
00:44:29:04 10 B4 C8 2A 12 9C 8A 2A 4A E1 E5 15 DE 22 C2 B4 FD
00:44:29:CRYPTO_PKI:signed attr:pki-transaction-id:
00:44:29:13 20 34 45 45 41 44 42 36 33 38 43 33 42 42 45 44 45 39 46
00:44:29:34 38 44 33 45 36 39 33 45 33 43 37 45 39
00:44:29:CRYPTO_PKI:status = 100:certificate is granted
00:44:29:CRYPTO__PKI:All enrollment requests completed.
00:44:29:%CRYPTO-6-CERTRET:Certificate received from Certificate Authority
Usage Guidelines Encryption and authentication are provided by a software service on the router called a crypto engine.
The crypto engine performs authentication through Digital Signature Standard (DSS) public and private
keys when a connection is set up. DSS is a means of sending a “signature” at the end of a message that
positively identifies the author of the message. The signature cannot be forged or duplicated by others,
so whoever receives a message with a DSS signature knows exactly who sent the message.
When connections are not completing, use the debug crypto sesmgmt command to follow the progress
of connection messages as a first step in diagnosing the problem. You see a record of each connection
message as the router discovers it, and can track its progress through the necessary signing, verifying,
and encryption session setup operations. Other significant connection setup events, such as the
pregeneration of Diffie-Hellman public numbers, are also shown. For information on Diffie-Hellman
public numbers, refer to the Cisco IOS Security Configuration Guide.
Also use the show crypto connections command to display additional information on connections.
Examples The following is sample output from the debug crypto sesmgmt command. The first shows messages
from a router that initiates a successful connection. The second shows messages from a router that
receives a connection.
Router# debug crypto sesmgmt
Defaults Disabled
Usage Guidelines Disable console logging and use buffered logging before using the debug csm tgrm command. Using
the debug csm tgrm command generates a large volume of debugs, which can affect router performance.
Examples The following is sample output from the debug csm tgrm command. The output shows that the call type
is voice, the direction is incoming, and the call is accepted by the CSM.
Router# debug csm tgrm
Router#
00:02:25:CSM-TGRM:csm_rx_cas_event_from_neat(EVENT_DIAL_IN) - c(T1 7/1:1:3)
call_type=VOICE, dir=INCOMING
Router#
00:02:30:CSM-TGRM:csm_proc_ic3_wait_for_res_resp() c(T1 7/1:1:3) VOICE <ACCEPTED !!>
Field Description
call_type Type of call: VOICE or MODEM.
dir Direction of the call: INCOMING or OUTGOING.
Syntax Description slot | dspm | dsp | dsp-channel (Optional) Identifies the location of a particular digital signal
processor (DSP) channel.
Usage Guidelines The debug csm voice command turns on debugging for all CSM VoIP calls. If this command has no
keyword specified, then debugging is enabled for all voice calls.
Note The debug csm voice command does not display any information if you try to debug isdn voice
calls. To view debugging information about isdn calls, use the debug cdapi command.
The no debug cms voice command turns off debugging information for all voice calls.
If the slot | dspm | dsp | dsp-channel argument is specified, then (if the specified DSP channel is engaged
in a CSM call) CSM call-related debugging information will be turned on for this channel. The no form
of this command turns off debugging for that particular channel.
Examples The following examples show sample output from the debug csm voice command. The following shows
that CSM has received an event from ISDN.
Router# debug csm voice
This AS5300 access server might not be actually used to handle this call. CSM must first allocate the
CSM voice control block to initiate the state machine. After the voice control block has been allocated,
CSM obtains from the DSP Resource Manager the actual DSP channel that will be used for the call. At
that point, CSM will switch to the actual logical port number. The slot number refers to the physical slot
on the AS5300 access server. The port number is the logical DSP number interpreted as listed in
Table 47.
The following shows that the function csm_vtsp_init_tdm() has been called with a voice control block
of address 0x60B8562C. This function will be called only when the call is treated as a voice call.
Oct 18 04:05:07.052: csm_vtsp_init_tdm (voice_vdev=0x60B8562C)
The following shows that CSM has obtained a DSP channel from the DSP Resource Manager:
Oct 18 04:05:07.052: csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm slot 1, dspm 2, dsp 5,
dsp_channel 1csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm stream 5, channel 9, bank 0,
bp_channel 10
The DSP channel has the following initialized TDM channel information:
• TDM slot 1, dspm 2, dsp 5, dsp_channel 1—Indicates the physical DSP channel that will be used
for this call.
• TDM stream 5, channel 9, bank 0, bp_channel 10—Indicates the on-chip and backplane TDM
channel assigned to this DSP channel. Stream 5, channel 9 gives the on-chip TDM channel mapped
to the DSP; bank 0, bp_channel 10 means that the backplane stream 0 and backplane channel #1 are
assigned to this DSP.
The following shows that CSM has received an incoming call event from ISDN:
Oct 18 04:05:07.052: EVENT_FROM_ISDN:(00CF): DEV_INCALL at slot 1 and port 20
Slot 1, port 20 means the logical DSP channel 20 (mapped to DSPRM 2, DSP 5, DSP channel 1).
The following shows that the DEV_INCALL message has been translated into a
CSM_EVENT_ISDN_CALL message:
Oct 18 04:05:07.052: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 20
This message is passed to the CSM central state machine while it is in the CSM_IDLE state and is in the
CSM_PROC_IDLE procedure. The logical DSP channel port 20 on slot 1 is used to handle this call.
The following shows that CSM has invoked the vtsp_ic_notify() function with a CSM voice call control
block 0x60B8562C.
Oct 18 04:05:07.052: vtsp_ic_notify : (voice_vdev= 0x60B8562C)
Inside this function, CSM will send a SETUP INDICATION message to the VTSP. This function will be
invoked only if the call is a voice call.
The following shows that CSM has received a SETUP INDICATION RESPONSE message from the
VTSP as an acknowledgment.
Oct 18 04:05:07.056: csm_vtsp_call_setup_resp (vdev_info=0x60B8562C, vtsp_cdb=0x60FCA114)
This means that the VTSP has received the CALL SETUP INDICATION message previously sent and
has proceeded to process the call.
• vdev_info—Contains the address of the CSM voice data block.
• vtsp_cdb—Contains the address of the VTSP call control block.
The following shows that CSM has received a CALL CONNECT message from the VTSP:
Oct 18 04:05:07.596: csm_vtsp_call_connect (vtsp_cdb=0x60FCA114, voice_vdev=0x60B8562C)
This indicates that the VTSP has received a CONNECT message for the call leg initiated to the Internet
side.
• vtsp_cdb—Contains the address of the VTSP call control block.
• voice_vdev—Contains the address of the CSM voice data block.
The following shows that while CSM is in the CSM_IC2_RING state, it receives a SETUP
INDICATION RESPONSE from the VTSP. This message is translated into
CSM_EVENT_MODEM_OFFHOOK and passed to the CSM central state machine.
Oct 18 04:05:07.596: CSM_PROC_IC2_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 20
The following shows that CSM has received a CONNECT message from ISDN for the call using the
logical DSP channel on slot 1 and port 20:
The following shows that CSM has translated the CONNECT event from ISDN into the
CSM_EVENT_ISDN_CONNECTED message, which is then passed to the CSM central state machine:
Oct 18 04:05:07.616: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1,
port 20
The following shows that CSM has received a CALL SETUP REQUEST from the VTSP:
May 16 12:22:27.580: csm_vtsp_call_setup_request (vtsp_cdb=0x60FCFA20,
vtsp_sdb=0x60DFB608)
The following shows the on-chip and backplane TDM channel assigned to this DSP channel:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm stream 5, channel 25, bank 0,
bp_channel 27
In this sample output, tdm stream 5, channel 25, bank 0, bp_channel 27 indicates the on-chip and
backplane TDM channel assigned to this DSP channel. Stream 5, channel 25 gives the on-chip TDM
channel mapped to the DSP; bank 0, bp_channel 27 means that the backplane stream 0 and backplane
channel 1 are assigned to this DSP.
The following shows the calling number and the called number for this call.
May 16 12:22:27.580: csm_vtsp_call_setup_request: calling number: 10001, called number:
30001
The following shows that the CALL SETUP REQUEST from the VTSP has been translated into the '
CSM_EVENT_MODEM_OFFHOOK message and is passed to the CSM central state machine:
The logical DSP channel number for the DSP (slot 1, port 54) is now displayed, which maps to the
physical DSP channel slot 1, dspm 5, dsp 4, dsp_channel 1.
The following shows that CSM has collected all the digits for dialing out:
For PRI and for applications that do not require digit collection of outdialing digits (for example, voice
calls), the intermediate digit collection states are omitted and the CSM state machine moves to this state
directly, pretending that the digit collection has been done.
The following shows an information message:
May 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: called party num: (30001) at slot 1,
port 54
The following shows that CSM attempts to find a free signalling D channel to direct the outgoing call:
May 16 12:22:27.580: csm_vtsp_check_dchan (voice_vdev=0x60B8562C)
May 16 12:22:27.580: csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0,
dchan_idb=0x60E8ACF0)
May 16 12:22:27.580: csm_vtsp_check_dchan (voice_vdev=0x60B8562C)
May 16 12:22:27.580: csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0,
dchan_idb=0x60D7ACB0)
In the case of voice calls, the free signaling D channel must match the voice interface specified inside
the signalling data block (vtsp_sdb) passed from the VTSP.
The following shows that CSM has received an event from ISDN:
May 16 12:22:27.624: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1
bchan=0x1E, event=0x3, cause=0x0
The following shows that the CALL PROCEEDING event received from ISDN has been interpreted as
a CSM_EVENT_ISDN_BCHAN_ASSIGNED message:
*May 16 12:22:27.624: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port
54
ISDN has assigned a B channel for this outgoing call. This B channel must be on the same PRI span as
the signalling D channel allocated previously.
This is invoked when an outgoing call initiated by the VTSP receives a response from the ISDN stack.
The following shows that ISDN has sent a CONNECT message to CSM indicating that the call leg to the
PSTN side has been established:
May 16 12:22:28.084: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1
bchan=0x1E, event=0x4, cause=0x0
May 16 12:22:28.084: EVENT_FROM_ISDN:(A121): DEV_CONNECTED at slot 1 and port 54
The following shows that while CSM is in the OC5_WAIT_FOR_CARRIER state, it has received the
'CONNECT' message from ISDN and has translated it into the CSM_EVENT_ISDN_CONNECTED
message, which is passed to the CSM central state machine:
May 16 12:22:28.084: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1,
port 54
The following shows that the function vtsp_confirm_oc() has been called:
May 16 12:22:28.084: vtsp_confirm_oc : (voice_vdev= 0x60B8562C)
This is invoked after CSM received the CONNECT message from ISDN. CSM sends a confirmation of
the CONNECT to the VTSP.
debug ctunnel
To display debugging messages for the IP over a Connectionless Network Service (CLNS) Tunnel
feature, use the debug ctunnel command in privileged EXEC mode. To disable debugging messages, use
the no form of this command.
debug ctunnel
no debug ctunnel
Examples As packets are sent over the virtual interface, the following type of output will appear on the console
when the debug ctunnel command is used:
4d21h: CTunnel1: IPCLNP encapsulated 49.0001.1111.1111.1111.00->49.0001.2222.2222.2222.00
(linktype=7, len=89)
debug custom-queue
To enable custom queueing output, use the debug custom-queue command in privileged EXEC mode.
To disable debugging output, use the no form of this command.
debug custom-queue
no debug custom-queue
debug dampening
To display debug trace information messages for interface dampening, use the debug dampening
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description all (Optional) Enables trace debugging for all dampening features.
interface (Optional) Enables trace debugging for IP event dampening.
Examples The following sample output is similar to the output that will be displayed when the debug dampening
command is entered with the interface keyword. The sample output shows the following information:
• Ethernet interface 1/1 is configured with the IP Event Dampening feature. The half-life period is set
to 30 seconds, the reuse threshold to 500, the suppress threshold to 1000, and the restart penalty to
90.
• The shutdown command and then the no shutdown command was entered on Ethernet interface
1/1. The interface was suppressed and then reused by the IP Event Dampening feature.
Router# debug dampening interface
Field Description
... Routing reports state transition Displays the status of the specified interface from the perspective
from UP to DOWN of the specified protocol. Interface state changes are displayed.
The interface is specified within parentheses. The protocol is
specified at the beginning of the message.
charge penalty 1000, new accum. Displays the penalty assigned to the flapping interface and amount
penalty 1000, flap count 1 of penalty that is added to the accumulated penalty. The interface
flap count is also displayed.
accum. penalty 1000, now Displays the status of the interface, accumulated penalty, and
suppressed with a reuse intervals configured reuse threshold.
of 30
update CLNS Routing state to Displays the status of the specified interface. Interface state
DOWN, interface is suppressed changes and suppression status are displayed.
accum. penalty decayed to 1000 Displays the decay rate of the accumulated penalty.
after 0 second(s)
unsuppress interfaces Indicates that dampened interfaces have been unsuppressed.
Usage Guidelines The debug dbconn all command displays debug output for Advanced Program-to-Program
Communication (APPC), Database Connection configuration, Distributed Relational Database
Architecture (DRDA), error messages, event traces, and TCP. The Database Connection debug flags are
appc, config, drda, event, and tcp.
Examples See the sample output provided for the debug dbconn appc, debug dbconn config, debug dbconn
drda, debug dbconn event, and debug dbconn tcp commands.
Usage Guidelines In a router with stable Database Connection, the alias_cp_name field in the trace message should not be
blank. There should be no other APPC error message. You can use Advanced Peer-to-Peer Networking
(APPN) debug commands with this debug command to track APPN-related errors.
Examples The following is sample output from the debug dbconn appc command. In a normal situation, only the
following message is displayed:
DBCONN-APPC: alias_cp_name is "ASH"
The following error messages are displayed if there is a network configuration error or other
APPN-related problem:
DBCONN-APPC-612C2B28: APPC error: opcode 0x1, primary_rc 0x0003,
secondary_rc 0x00000004
DBCONN-APPC-612C2B28: Verb block =
DBCONN-APPC-612C2B28: 0001 0200 0003 0000 0000 0004 0020 100C
DBCONN-APPC-612C2B28: 610A 828B 0000 0000 0000 0000 0000 0000
DBCONN-APPC-612C2B28: 0000 0000 8014 0003 0000 0000 0000 0000
DBCONN-APPC-612C2B28: D3E4 F6F2 E2E3 C1D9 C4C2 F240 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 0200 0000 0000 0000
DBCONN-APPC-612C2B28: 0000 0000 D4C5 D9D9 C9C5 4040 4040 D7C5
DBCONN-APPC-612C2B28: E3C5 D940 4040 4040 0000 0000 0000 0000
DBCONN-APPC-612C2B28: 00E2 E3C1 D9E6 4BE3 D6D9 C3C8 4040 4040
DBCONN-APPC-612C2B28: 4040 0000 0000 0000 0000 0000
DBCONN-APPC-612C2B28: ALLOCATE verb block =
DBCONN-APPC-612C2B28: 0001 0200 0003 0000 0000 0004 0020 100C
DBCONN-APPC-612C2B28: 610A 828B 0000 0000 0000 0000 0000 0000
DBCONN-APPC-612C2B28: 0000 0000 8014 0003 0000 0000 0000 0000
DBCONN-APPC-612C2B28: D3E4 F6F2 E2E3 C1D9 C4C2 F240 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040
DBCONN-APPC-612C2B28: 4040 4040 4040 4040 0200 0000 0000 0000
You can use the debug appn command to obtain more information.
The following message is displayed if a database connection is manually cleared and an outstanding
APPC verb is pending:
DBCONN-APPC-%612C2B28: Canceling pending APPC verb 0x1
Usage Guidelines Most of the messages for Database Connection and control blocks do not report any errors. If a
connection is inactive and cannot be cleared, use this command with the debug dbconn appc, debug
dbconn tcp, and debug appn commands to locate the problem. The alias_cp_name field must match the
configured APPN cpname.
Examples The following is sample output from the debug dbconn config command:
Router# debug dbconn config
Command Description
debug dbconn event Displays trace or error messages for Database Connection
events.
debug dbconn tcp Displays error messages and traces for TCP.
Examples The following is sample output from the debug dbconn drda command:
Router# debug dbconn drda
Examples The following examples display output from the debug dbconn event command in a variety of
situations. A normal trace for the debug dbconn event displays as follows:
Router# debug dbconn event
If the following messages are displayed, contact Cisco technical support personnel:
DBCONN-TCPFSM-1234abcd: Cannot occur in state 2 on input 6363 ('cc')
DBCONN-APPCFSM-1234abcd: Cannot occur in state 3 on input 6363 ('cc')
Examples The following is sample output from the debug dbconn tcp command:
Router# debug dbconn tcp
Examples The following is sample output from the debug decnet adj command:
Router# debug decnet adj
The following line indicates that the router is sending hello messages to all routers on this segment,
which in this case is Ethernet 0:
DNET-ADJ: Sending hellos to all routers on interface Ethernet0, blksize 1498
The following line indicates that the router has heard a hello message from address 1.5 and is creating
an adjacency entry in its table. The initial state of this adjacency will be initializing.
DNET-ADJ: 1.5 adjacency initializing
The following line indicates that the router is sending an unscheduled (triggered) hello message as a
result of some event, such as new adjacency being heard:
DNET-ADJ: sending triggered hellos
The following line indicates that the adjacency with 1.5 is now up, or active:
DNET-ADJ: 1.5 adjacency up
The following line indicates that the adjacency with 1.5 has timed out, because no hello message has
been heard from adjacency 1.5 in the time interval originally specified in the hello message from 1.5:
DNET-ADJ: 1.5 adjacency down, listener timeout
The following line indicates that the router is sending an unscheduled hello message, as a result of some
event, such as the adjacency state changing:
DNET-ADJ: hello update triggered by state changed in dn_add_adjacency
Usage Guidelines When you use connect packet filtering, it may be helpful to use the decnet access-group configuration
command to apply the following basic access list:
access-list 300 permit 0.0 63.1023 eq any
You can then log all connect packets sent on interfaces to which you applied this list, in order to
determine those elements on which your connect packets must be filtered.
Note Packet password and account information is not logged in the debug decnet connects message, nor is it
displayed by the show access EXEC command. If you specify password or account information in your
access list, they can be viewed by anyone with access to the configuration of the router.
Examples The following is sample output from the debug decnet connects command:
Router# debug decnet connects
Field Description
DNET-CON: Indicates that this is a debug decnet connects packet.
list 300 item #2 matched Indicates that a packet matched the second item in access list 300.
src=19.403 Indicates the source DECnet address for the packet.
dst=19.309 Indicates the destination DECnet address for the packet.
on Ethernet0: Indicates the router interface on which the access list filtering the
packet was applied.
permitted Indicates that the access list permitted the packet.
Field Description
srcname = “RICK” Indicates the originator user of the packet.
srcuic=[0,017] Indicates the source UIC of the packet.
dstobj=42 Indicates that DECnet object 42 is the destination.
id=“USER” Indicates the access user.
Examples The following is sample output from the debug decnet events command:
Router# debug decnet events
DNET: Hello from area 50 rejected - exceeded ‘max area' parameter (45)
DNET: Hello from area 50 rejected - exceeded ‘max area' parameter (45)
The following line indicates that the router received a hello message from a router whose area was
greater than the max-area parameter with which this router was configured:
DNET: Hello from area 50 rejected - exceeded'max area' parameter (45)
The following line indicates that the router received a hello message from a router whose node ID was
greater than the max-node parameter with which this router was configured:
DNET: Hello from node 1002 rejected - exceeded'max node' parameter (1000)
Examples The following is sample output from the debug decnet packet command:
Router# debug decnet packet
The following line indicates that the router is sending a converted packet addressed to node 1.5 to
Phase V:
DNET-PKT: src 1.4 dst 1.5 sending to PHASEV
The following line indicates that the router forwarded a packet from node 1.4 to node 1.5. The packet is
being sent to the next hop of 1.5 whose subnetwork point of attachment (MAC address) on that interface
is 0000.3080.cf90.
DNET-PKT: Packet fwded from 1.4 to 1.5, via 1.5, snpa 0000.3080.cf90, TokenRing0
Examples The following is sample output from the debug decnet routing command:
Router# debug decnet routing
The following line indicates that the router has received a level 1 update on Ethernet interface 0:
DNET-RT: Received level 1 routing from 1.3 on Ethernet0 at 1:16:34
The following line indicates that the router is sending its scheduled updates on Ethernet interface 0:
DNET-RT: Sending normal routing updates on Ethernet0
The following line indicates that the route will send an unscheduled update on this interface as a result
of some event. In this case, the unscheduled update is a result of a new entry created in the routing table
of the interface.
DNET-RT: route update triggered by after split route pointers in dn_rt_input
The following line indicates that the router sent the unscheduled update on Ethernet 0:
DNET-RT: Sending L1 triggered routes
DNET-RT: Sending L1 triggered routing updates on Ethernet0
The following line indicates that the router removed the entry for node 5 because the adjacency with
node 5 timed out, or the route to node 5 through a next-hop router was disconnected:
DNET-RT: removing route to node 5
debug dhcp
To display debugging information about the Dynamic Host Configuration Protocol (DHCP) client
activities and to monitor the status of DHCP packets, use the debug dhcp command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
Usage Guidelines You can also use the debug dhcp command to monitor the subnet allocation and releasing for on-demand
address pools.
For debugging purposes, the debug dhcp detail command provides the most useful information such as
the lease entry structure of the client and the state transitions of the lease entry. The debug output shows
the scanned option values from received DHCP messages that are replies to a router request. The values
of the op, htype, hlen, hops, server identifier option, xid, secs, flags, ciaddr, yiaddr, siaddr, and giaddr
fields of the DHCP packet are shown in addition to the length of the options field.
Examples The following examples show and explain some of the typical debugging messages you might see when
using the debug dhcp detail command.
The following example shows the debug output when a DHCP client sends out a DHCPDISCOVER
broadcast message to find its local DHCP server:
Router# debug dhcp detail
The first seven lines of the following output show the current values stored in the lease entry structure
for the client:
00:07:21:Temp IP addr:0.0.0.0 for peer on Interface:Ethernet2
00:07:21:Temp sub net mask:0.0.0.0
00:07:21: DHCP Lease server:0.0.0.0, state:1 Selecting
00:07:21: DHCP transaction id:582
00:07:21: Lease:0 secs, Renewal:0 secs, Rebind:0 secs
00:07:21: Next timer fires after:00:00:03
00:07:21: Retry count:1 Client-ID:cisco-0010.7b6e.afd8-Et2
The following example shows the offered addresses and parameters sent to the DHCP client by the
DHCP server via a DHCPOFFER message. The messages containing the field “Scan” indicate the
options that were scanned from the received BOOTP packet and the corresponding values.
00:07:23:DHCP:Received a BOOTREP pkt
00:07:23:DHCP:Scan:Message type:DHCP Offer
00:07:23:DHCP:Scan:Server ID Option:10.1.1.1 = A010101
00:07:23:DHCP:Scan:Lease Time:180
00:07:23:DHCP:Scan:Renewal time:90
00:07:23:DHCP:Scan:Rebind time:157
00:07:23:DHCP:Scan:Subnet Address Option:255.255.255.0
The following debug output shows selected fields in the received BOOTP packet:
00:07:23:DHCP:rcvd pkt source:10.1.1.1, destination: 255.255.255.255
00:07:23: UDP sport:43, dport:44, length:308
00:07:23: DHCP op:2, htype:1, hlen:6, hops:0
00:07:23: DHCP server identifier:10.1.1.1
00:07:23: xid:582, secs:0, flags:8000
00:07:23: client:0.0.0.0, your:10.1.1.2
00:07:23: srvr: 0.0.0.0, gw:0.0.0.0
00:07:23: options block length:60
The following example shows the debug output when the DHCP client sends out a DHCPREQUEST
broadcast message to the DHCP server to accept the offered parameters:
00:07:23:DHCP:SRequest attempt # 1 for entry:
00:07:23:Temp IP addr:10.1.1.2 for peer on Interface:Ethernet2
00:07:23:Temp sub net mask:255.255.255.0
00:07:23: DHCP Lease server:10.1.1.1, state:2 Requesting
00:07:23: DHCP transaction id:582
00:07:23: Lease:180 secs, Renewal:0 secs, Rebind:0 secs
00:07:23: Next timer fires after:00:00:02
00:07:23: Retry count:1 Client-ID:cisco-0010.7b6e.afd8-Et2
00:07:23:DHCP:SRequest- Server ID option:10.1.1.1
00:07:23:DHCP:SRequest- Requested IP addr option:10.1.1.2
00:07:23:DHCP:SRequest placed lease len option:180
00:07:23:DHCP:SRequest:326 bytes
00:07:23:DHCP:SRequest:326 bytes
00:07:23: B'cast on Ethernet2 interface from 0.0.0.0
The following example shows the debug output when the DHCP server sends a DHCPACK message to
the client with the full set of configuration parameters:
00:07:23:DHCP:Received a BOOTREP pkt
00:07:23:DHCP:Scan:Message type:DHCP Ack
00:07:23:DHCP:Scan:Server ID Option:10.1.1.1 = A010101
00:07:23:DHCP:Scan:Lease Time:180
00:07:23:DHCP:Scan:Renewal time:90
00:07:23:DHCP:Scan:Rebind time:157
00:07:23:DHCP:Scan:Subnet Address Option:255.255.255.0
00:07:23:DHCP:rcvd pkt source:10.1.1.1, destination: 255.255.255.255
00:07:23: UDP sport:43, dport:44, length:308
00:07:23: DHCP op:2, htype:1, hlen:6, hops:0
00:07:23: DHCP server identifier:10.1.1.1
Most fields are self-explanatory; however, fields that may need further explanation are described in
Table 50.
Fields Description
DHCP:Scan:Subnet Address Option:255.255.255.0 Subnet mask option (option 1).
DHCP server identifier:1.1.1.1 Value of the DHCP server id option (option 54).
Note that this is not the same as the siaddr field,
which is the server IP address.
srvr:0.0.0.0, gw:0.0.0.0 srvr is the value of the siaddr field. gw is the
value of the giaddr field.
Usage Guidelines When dial-on-demand routing (DDR) is enabled on the interface, information concerning the cause of
any call (called the Dialing cause) is displayed.
Examples In the following example, the line of output for an IP packet lists the name of the DDR interface and the
source and destination addresses of the packet:
Router# debug dialer events
The following line of output for a bridged packet lists the DDR interface and the type of packet (in
hexadecimal). For information on these packet types, see the “Ethernet Type Codes” appendix of the
Cisco IOS Bridging and IBM Networking Command Reference publication.
Dialing cause: Serial1: Bridge (0x6005)
Most messages are self-explanatory; however, messages that may need some explanation are described
in Table 51.
Message Description
Dialer0: Already xxx call(s) in progress Number of calls in progress (xxx) exceeds the maximum
on Dialer0, dialing not allowed number of calls set on the interface.
Dialer0: No free dialer - starting fast All the lines in the interface or rotary group are busy, and a
idle timer packet is waiting to be sent to the destination.
BRI0: rotary group to xxx overloaded Number dialer (xxx) exceeds the load set on the interface
(yyy) (yyy).
BRI0: authenticated host xxx with no No dialer profile matches xxx, the Challenge Handshake
matching dialer profile Authentication Protocol (CHAP) name or remote name of
the remote host.
Message Description
BRI0: authenticated host xxx with no No dialer map matches xxx, the CHAP name or remote name
matching dialer map of the remote host.
BRI0: Can’t place call, verify Dialer string or dialer pool on an interface not set.
configuration
Table 52 describes the messages that the debug dialer events command can generate for a serial
interface used as a V.25bis dialer for DDR.
Message Description
Serial 0: Dialer result = xxxxxxxxxx Result returned from the V.25bis dialer. It is useful in debugging
if calls are failing. On some hardware platforms, this message
cannot be displayed due to hardware limitations. Possible values
for the xxxxxxxxxx variable depend on the V.25bis device with
which the router is communicating.
Serial 0: No dialer string defined. Packet is received that should cause a call to be placed.
Dialing cannot occur. However, no dialer string is configured, so dialing cannot occur.
This message usually indicates a configuration problem.
Serial 0: Attempting to Packet has been received that passes the dial-on-demand access
dial xxxxxxxxxx lists. That packet causes phone number xxxxxxxxxx to be dialed.
Serial 0: Unable to dial xxxxxxxxxx Phone call to xxxxxxxxxx cannot be placed. This failure might be
due to a lack of memory, full output queues, or other problems.
Serial 0: disconnecting call Router hangs up a call.
Serial 0: idle timeout One of these three messages is displayed when a dialer timer
Serial 0: re-enable timeout expires. These messages are mostly informational, but are useful
for debugging a disconnected call or call failure.
Serial 0: wait for carrier timeout
Usage Guidelines Use the debug dialer forwarding command to configure a virtual private dialout network (VPDN) on
the HGW and a network access server (NAS) to dial from the HGW to the client.
An L2TP tunnel is created between the HGW and the NAS and the packets are forwarded transparently
at the NAS.
Examples The following is sample output from the debug dialer forwarding command for dialing from the HGW
to the client.
Router# ping
Protocol [ip]:
Target IP address:1.1.1.3
Repeat count [5]:1
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 1.1.1.3, timeout is 2 seconds:
Usage Guidelines Use the debug dialer map command to track large-scale dialout (LSDO) and incoming calls that use
dynamic dialer maps. This command shows the whole trace including when the map is created and
removed.
If an interface is configured for dial-on-demand routing (DDR), and a map to a specified address does
not exist, then a dynamic dialer map is created and when the call disconnects, the dialer map is removed.
Note Do not configure a dialer string or a dialer map on the incoming interface.
Examples In the following sample output from the debug dialer map command, a dialer map is created when an
incoming call is connected and removed when that call is disconnected:
debug dialpeer
To view dial peer information, use the debug dialpeer command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug dialpeer
no debug dialpeer
Defaults Disabled
Usage Guidelines Disable console logging and use buffered logging before using the debug dialpeer command. Using the
debug dialpeer command generates a large volume of debugging messages, which can affect router
performance.
Examples The following is sample output for the debug dialpeer command. The output shows the destination
pattern configured on the matched dial-peer. Expanded string is the string after applying number
translation to the original number. It shows that dial-peer 1311 was an incoming dial-peer match. It also
shows that routing label was att1. It shows that dial-peer 5108888 and 111399 are an outgoing dial-peer
match.
Router# debug dialpeer
Router#
00:22:28: Inside dpMatchCore:
00:22:28: destination pattn:5108880101 expanded string:5108880101
00:22:28:MatchNextPeer:Peer 1311 matched
00:22:28: Inside dpMatchCore:
00:22:28: destination pattn:5108880101 expanded string:5108880101
00:22:28: Inside dpMatchCore:
00:22:28: destination pattn:4088880101 expanded string:4088880101
00:22:28: Inside dpMatchCore:
00:22:28: destination pattn:4088880101 expanded string:4088880101
00:22:28: dpAssociateIncomingPeer_T:Matching route label att1
00:22:28: Inside dpMatchCore:
00:22:28: destination pattn:5108880101 expanded string:5108880101
00:22:28: dpAssociateIncomingPeer_T:Matching peer with src route label att1 failed
00:22:28: Inside dpMatchCore:
00:22:28: destination pattn:5108880101 expanded string:5108880101
00:22:28:MatchNextPeer:Peer 1311 matched
Field Description
destination pattn Destination pattern configured on the dial peer.
expanded string The string after applying number translation to the original
number.
Match Dest. pattern; called Indicates that dial-peer match is going to match destination
pattern against the called number.
Matching route label The trunk group label or carrier id that is used for matching a dial
peer.
MatchNextPeer Indicates the dial peer tag that matched.
Result Indicates the result of dial peer matching algorithm:
0 = Successful
1 = More digits needed for a possible match
-1 = No match (match failed)
-2 = The digits matched, but the destination address could not
be obtained
debug dlsw
To enable debugging of data-link switching plus (DLSw+), use the debug dlsw command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description border-peers (Optional) Enables debugging output for border peer events.
interface interface (Optional) Specifies a remote peer to debug by a direct interface.
ip address ip-address (Optional) Specifies a remote peer to debug by its IP address.
core (Optional) Enables debugging output for DLSw core events.
flow-control (Optional) Enables debugging output for congestion in the WAN or
at the remote end station.
messages (Optional) Enables debugging output of core messages—specific
packets received by DLSw either from one of its peers or from a local
medium via the Cisco link services interface.
state (Optional) Enables debugging output for state changes on the circuit.
xid (Optional) Enables debugging output for the exchange identification
state machine.
circuit-number (Optional) Specifies the circuit for which you want core debugging
output to reduce the output.
local-circuit circuit-number (Optional) Enables debugging output for circuits performing local
conversion. Local conversion occurs when both the input and output
data-link connections are on the same local peer and no remote peer
exists.
peers (Optional) Enables debugging output for peer events.
fast-errors (Optional) Debugs errors for fast-switched packets.
fast-paks (Optional) Debugs fast-switched packets.
fst-seq (Optional) Debugs Fast-Sequenced Transport (FST) sequence
numbers on fast switched packets.
udp (Optional) Debugs User Datagram Protocol (UDP) packets.
reachability (Optional) Enables debugging output for reachability events
(explorer traffic). If no options are specified, event-level information
is displayed for all protocols.
error | verbose (Optional) Specifies how much reachability information you want
displayed. The verbose keyword displays everything, including
errors and events. The error keyword displays error information
only. If no option is specified, event-level information is displayed.
sna | netbios (Optional) Specifies that reachability information be displayed for
only Systems Network Architecture (SNA) or Network Basic
Input/Output System (NetBIOS) protocols. If no option is specified,
information for all protocols is displayed.
Usage Guidelines When you specify no optional keywords, the debug dlsw command enables all available DLSW
debugging output.
Normally you need to use only the error or verbose option of the debug dlsw reachability command
to help identify problems. The error option is recommended for use by customers and provides a subset
of the messages from the normal event-level debugging. The verbose option provides a very detailed
view of events, and is typically used only by service personnel.
To reduce the amount of debug information displayed, use the sna or netbios option with the debug dlsw
reachability command if you know that you have an SNA or NetBIOS problem.
The DLSw core is the engine that is responsible for the establishment and maintenance of remote
circuits. If possible, specifying the index of the specific circuit you want to debug reduces the amount
of output displayed. However, if you want to watch a circuit initially come up, do not use the
circuit-number option with the core keyword.
The core flow-control option provides information about congestion in the WAN or at the remote end
station. In these cases, DLSw sends Receiver Not Ready (RNR) frames on its local circuits, slowing data
traffic on established sessions and giving the congestion an opportunity to clear.
The core state option allows you to see when the circuit changes state. This capability is especially
useful for determining why a session cannot be established or why a session is being disconnected.
The core XID option allows you to track the exchange identification (XID)-state machine. The router
tracks XID commands and responses used in negotiations between end stations before establishing a
session.
Examples The following examples show and explain some of the typical DLSw debugging messages you might see
when using the debug dlsw command.
The following example enables UDP packet debugging for a specific remote peer:
Router# debug dlsw peers ip-address 1.1.1.6 udp
The following message is sample output from the debug dlsw border-peers command:
*Mar 10 17:39:56: CSM: delete group mac cache for group 0
*Mar 10 17:39:56: CSM: delete group name cache for group 0
*Mar 10 17:40:19: CSM: update group cache for mac 0000.3072.1070, group 10
*Mar 10 17:40:22: DLSw: send_to_group_members(): copy to peer 10.19.32.5
The following message is from a router that received a Logical Link Control, type 2 (LLC2) connection:
DLSw-LLC2: Sending enable port ; port no : 0
PEER-DISP Sent : CLSI Msg : ENABLE.Req dlen: 20
DLSw: Peer Received : CLSI Msg : ENABLE.Cfm CLS_OK dlen: 20
DLSw-LLC2 : Sending activate sap for Serial0 - port_id = 887C3C
port_type = 7 dgra(UsapID) = 93AB34
PEER-DISP Sent : CLSI Msg : ACTIVATE_SAP.Req dlen: 60
DLSw: Peer Received : CLSI Msg : ACTIVATE_SAP.Cfm CLS_OK dlen: 60
DLSw Got ActSapcnf back for Serial0 - port_id = 8944700, port_type = 7, psap_id = 0
The following messages occur when a CUR_ex (CANUREACH explorer) frame is received from other
peers, and the peer statements or the promiscuous keyword have not been enabled so that the router is
not configured correctly:
22:42:44: DLSw: Not promiscuous - Rej conn from 172.20.96.1(2065)
22:42:51: DLSw: Not promiscuous - Rej conn from 172.20.99.1(2065)
In the following messages, the router sends a keepalive message every 30 seconds to keep the peer
connected. If three keepalive messages are missed, the peer is torn down. These messages are displayed
only if keepalives are enabled (by default, keepalives are disabled):
22:44:03: DLSw: Keepalive Request sent to peer 172.20.98.1(2065) (168243148)
22:44:03: DLSw: Keepalive Response from peer 172.20.98.1(2065) (168243176)
22:44:34: DLSw: Keepalive Request sent to peer 172.20.98.1(2065) (168274148)
22:44:34: DLSw: Keepalive Response from peer 172.20.98.1(2065) (168274172)
The following peer debugging messages indicate that the local peer is disconnecting from the specified
remote peer because of missed peer keepalives:
0:03:24: DLSw: keepalive failure for peer on interface Serial0
0:03:24: DLSw: action_d(): for peer on interface Serial0
0:03:24: DLSW: DIRECT aborting connection for peer on interface Serial0
0:03:24: DLSw: peer on interface Serial0, old state CONNECT, new state DISCONN
The following peer debugging messages result from an attempt to connect to an IP address that does not
have DLSw enabled. The local router attempts to connect in 30-second intervals:
23:13:22: action_a() attempting to connect peer 172.20.100.1(2065)
23:13:22: DLSw: CONN: peer 172.20.100.1 open failed, rejected [9]
23:13:22: action_a() retries: 8 next conn time: 861232504
23:13:52: action_a() attempting to connect peer 172.20.100.1(2065)
23:13:52: DLSw: CONN: peer 172.20.100.1 open failed, rejected [9]
23:13:52: action_a() retries: 9 next conn time: 861292536
The following peer debugging messages that indicates a remote peer statement is missing on the router
(address 172.20.100.1) to which the connection attempt is sent:
23:14:52: action_a() attempting to connect peer 172.20.100.1(2065)
23:14:52: DLSw: action_a(): Write pipe opened for peer 172.20.100.1(2065)
23:14:52: DLSw: peer 172.20.100.1(2065), old state DISCONN, new state WAIT_RD
23:14:52: DLSw: dlsw_tcpd_fini() closing connection for peer 172.20.100.1
23:14:52: DLSw: action_d(): for peer 172.20.100.1(2065)
23:14:52: DLSw: aborting tcp connection for peer 172.20.100.1(2065)
23:14:52: DLSw: peer 172.20.100.1(2065), old state WAIT_RD, new state DISCONN
The following messages show a peer connection opening with no errors or abnormal events:
23:16:37: action_a() attempting to connect peer 172.20.100.1(2065)
23:16:37: DLSw: action_a(): Write pipe opened for peer 172.20.100.1(2065)
23:16:37: DLSw: peer 172.20.100.1(2065), old state DISCONN, new state WAIT_RD
23:16:37: DLSW: passive open 172.20.100.1(17762) -> 2065
23:16:37: DLSw: action_c(): for peer 172.20.100.1(2065)
23:16:37: DLSw: peer 172.20.100.1(2065), old state WAIT_RD, new state CAP_EXG
The following two messages show that an information frame is passing through the router:
DLSw: dlsw_tr2fct() lmac:c000.a400.0000 rmac:0800.5a29.75fe ls:5 rs:4 i:34
DLSw: dlsw_tr2fct() lmac:c000.a400.0000 rmac:0800.5a29.75fe ls:4 rs:4 i:34
Field Description
decr r Decrement received count.
s This DLSW router’s granted units for the circuit.
so 0=This DLSW router does not owe a flow control
acknowledgment.
1=This router owes a flow control acknowledgment.
Field Description
r Partner’s number of granted units for the circuit.
ro Indicates whether the partner owes flow control
acknowledgment.
The following message shows that DLSW received the I frame from the LAN:
Dec 5 10:48:35: DLSW Received-disp : CLSI Msg : DATA.Ind dlen: 4
The next group of messages show that the DLSW reachability cache is added, and that a name query is
perform from the router MARIAN:
23:45:11: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB4
23:45:11: CSM: 0800.5a30.7a9b passes local mac excl. filter
23:45:11: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB4
23:45:11: CSM: update local cache for name MARIAN , port 5EFBB4
23:45:11: CSM: Received CLS_UDATA_STN from Core
23:45:11: CSM: Received netbios frame type A
23:45:11: CSM: Processing Name Query
23:45:11: CSM: Netbios Name Query: ws_status = 6
23:45:11: CSM: Write to peer 0 ok.
23:45:11: CSM: Freeing clsi message
23:45:11: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB4
23:45:11: CSM: 0800.5a30.7a9b passes local mac excl. filter
23:45:11: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB4
23:45:11: CSM: update local cache for name MARIAN , port 658AB4
23:45:11: CSM: Received CLS_UDATA_STN from Core
23:45:11: CSM: Received netbios frame type A
23:45:11: CSM: Processing Name Query
23:45:11: CSM: Netbios Name Query: ws_status = 5
23:45:11: CSM: DLXNR_PEND match found.... drop name query
23:45:11: CSM: Freeing clsi message
23:45:12: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB4
23:45:12: CSM: 0800.5a30.7a9b passes local mac excl. filter
23:45:12: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB4
23:45:12: CSM: update local cache for name MARIAN , port 5EFBB4
23:45:12: CSM: Received CLS_UDATA_STN from Core
23:45:12: CSM: Received netbios frame type A
23:45:12: CSM: Processing Name Query
23:45:12: CSM: Netbios Name Query: ws_status = 5
23:45:12: CSM: DLXNR_PEND match found.... drop name query
23:45:12: CSM: Freeing clsi message
23:45:12: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB4
23:45:12: CSM: 0800.5a30.7a9b passes local mac excl. filter
23:45:12: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB4
23:45:12: CSM: update local cache for name MARIAN , port 658AB4
The following messages show that the router named MARIAN is added to the network:
23:45:38: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB4
23:45:38: CSM: 0800.5a30.7a9b passes local mac excl. filter
23:45:38: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB4
23:45:38: CSM: update local cache for name MARIAN , port 5EFBB4
23:45:38: CSM: Received CLS_UDATA_STN from Core
23:45:38: CSM: Received netbios frame type 8
23:45:38: CSM: Write to peer 0 ok.
23:45:38: CSM: Freeing clsi message
23:45:38: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB4
23:45:38: CSM: 0800.5a30.7a9b passes local mac excl. filter
23:45:38: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB4
23:45:38: CSM: update local cache for name MARIAN , port 658AB4
23:45:38: CSM: Received CLS_UDATA_STN from Core
23:45:38: CSM: Received netbios frame type 8
23:45:38: CSM: Write to peer 0 ok.
23:45:38: CSM: Freeing clsi message
In the next group of messages, an attempt is made to add the router named GINGER on the Ethernet
interface:
0:07:44: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB4
0:07:44: CSM: 0004.f545.24e6 passes local mac excl. filter
0:07:44: CSM: update local cache for mac 0004.f545.24e6, port 658AB4
0:07:44: CSM: update local cache for name GINGER , port 658AB4
0:07:44: CSM: Received CLS_UDATA_STN from Core
0:07:44: CSM: Received netbios frame type 8
0:07:44: CSM: Write to peer 0 ok.
In the following example, the output from the show dlsw reachability command indicates that GINGER
is on the Ethernet interface and MARIAN is on the Token Ring interface:
Router# show dlsw reachability
Syntax Description text-to-fax (Optional) Displays debugging messages that occur while the DocMSP
Component is receiving text packets and producing T4 fax data.
tiff-reader (Optional) Displays debugging messages that occur while the DocMSP
Component is receiving TIFF packets and producing T4 fax data.
Examples The following is sample output from the debug dmsp doc-to-fax command:
Router# debug dmsp doc-to-fax
Jan 1 04:58:39.902: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC, encode out=2
Jan 1 04:58:39.902: docmsp_rcv_msp_ev: call id =18, evID = 42
Jan 1 04:58:39.902: docmsp_bridge cfid=6, srccid=18, dstcid=15
Jan 1 04:58:39.902: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=DEST, encode out=2
Jan 1 04:58:39.902: docmsp_process_rcv_data: call id src=0, dst=18
Jan 1 04:58:39.902: docmsp_generate_page:
Jan 1 04:58:39.902: docmsp_generate_page: new context for Call 18
Jan 1 04:58:39.922: docmsp_get_msp_event_buffer:
Jan 1 04:58:42.082: docmsp_xmit: call id src=15, dst=18
Jan 1 04:58:42.082: docmsp_process_rcv_data: call id src=15, dst=18
Jan 1 04:58:42.082: offramp_data_process:
Jan 1 04:58:42.102: docmsp_xmit: call id src=15, dst=18
Jan 1 04:58:42.106: docmsp_process_rcv_data: call id src=15, dst=18
Jan 1 04:58:42.106: offramp_data_process:
Jan 1 04:58:42.122: docmsp_xmit: call id src=15, dst=18
Jan 1 04:58:42.126: docmsp_process_rcv_data: call id src=15, dst=18
Jan 1 04:58:42.126: offramp_data_process:
Jan 1 04:58:42.142: docmsp_xmit: call id src=15, dst=18
Jan 1 04:58:42.146: docmsp_xmit: call id src=15, dst=18
Syntax Description tiff-writer (Optional) Displays debug messages that occur while the DocMSP
Component is receiving T4 fax data and producing TIFF packets.
Examples The following is sample output from the debug dmsp fax-to-doc command:
Router# debug dmsp fax-to-doc
*Oct 16 08:29:54.487: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC, encode out=2
*Oct 16 08:29:54.487: docmsp_bridge cfid=16, srccid=22, dstcid=17
*Oct 16 08:29:54.487: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=DEST, encode out=2
*Oct 16 08:29:54.487: docmsp_xmit: call id src=17, dst=22
*Oct 16 08:29:54.487: docmsp_process_rcv_data: call id src=17, dst=22
*Oct 16 08:29:54.487: offramp_data_process:
*Oct 16 08:29:54.515: docmsp_get_msp_event_buffer:
*Oct 16 08:29:56.115: docmsp_call_setup_request: callid=24
*Oct 16 08:29:56.115: docmsp_call_setup_request(): ramp data dir=ONRAMP, conf dir=DEST
*Oct 16 08:29:56.115: docmsp_caps_ind: call id=24, src=20
*Oct 16 08:29:56.115: docmsp_bridge cfid=17, srccid=24, dstcid=20
Usage Guidelines When a TrBRF interface is configured on the Remote Switch Module (RSM), the DRiP protocol is
activated. The DRiP protocol adds the VLAN ID specified in the router command to its database and
recognizes the VLAN as a locally configured, active VLAN.
Examples The following is sample output from the debug drip event command:
Router# debug drip event
DRiP recognizes that the VLAN ID it is getting is a new one from the network:
6116C840: 0100 0CCCCCCC ...LLL
6116C850: 00102F72 CBFB0024 AAAA0300 000C0102 ../rK{.$**......
6116C860: 01FF0214 0002E254 00015003 00102F72 ......bT..P.../r
6116C870: C8000010 04C00014 044003EB 14 H....@...@.k.
DRIP : remote update - Never heard of this vlan
DRiP attempts to resolve any conflicts when it discovers a new VLAN. The value action = 1 means to
notify the local platform of change in state.
DRIP : resolve remote for vlan 20 in VLAN0
DRIP : resolve remote - action = 1
No action is required:
DRIP : resolve remote - action = 0
Thirty seconds have expired, and DRiP sends its local database entries to all its trunk ports:
DRIP : local timer expired
DRIP : transmit on 0000.0c50.1900, length = 24
612B92C0: 01000C00 00000000 0C501900 0000AAAA .........P....**
612B92D0: 0300000C 00020000 00000100 0CCCCCCC .............LLL
612B92E0: 00000C50 19000020 AAAA0300 000C0102 ...P... **......
612B92F0: 01FF0114 00000003 00000002 00000C50 ...............P
612B9300: 19000001 04C00064 04 .....@.d.
Usage Guidelines Before you use this command, you can optionally use the clear drip command first. As a result the DRiP
counters are reset to 0. If the DRiP counters begin to increment, the router is receiving packets.
Examples The following is sample output from the debug drip packet command:
Router# debug drip packet
The following type of output is displayed when a packet is entering the router and you use the show
debug command:
039E5FC0: 0100 0CCCCCCC 00E0A39B 3FFB0028 ...LLL.`#.?{.(
039E5FD0: AAAA0300 000C0102 01FF0314 0000A5F6 **............%v
039E5FE0: 00008805 00E0A39B 3C000000 04C00028 .....`#.<....@.(
039E5FF0: 04C00032 044003EB 0F .@.2.@.k.
039FBD20: 01000C00 00000010 ........
The following type of output is displayed when a packet is sent by the router:
039FBD30: A6AEB450 0000AAAA 0300000C 00020000 &.4P..**........
039FBD40: 00000100 0CCCCCCC 0010A6AE B4500020 .....LLL..&.4P.
039FBD50: AAAA0300 000C0102 01FF0114 00000003 **..............
039FBD60: 00000002 0010A6AE B4500001 04C00064 ......&.4P...@.d
039FBD70: 04 .
Syntax Description This command has no arguments or keywords; however, it can be used with the execute-on command.
Usage Guidelines To perform this command from the router shelf on the Cisco AS5800 series platform, use the execute-on
slot slot-number debug dsc clock form of this command.
The debug dsc clock command displays TDM clock-switching events on the dial shelf controller. The
information displayed includes the following:
• Clock configuration messages received from trunks via NBUS
• Dial shelf controller clock configuration messages from the router shelf over the dial shelf interface
link
• Clock switchover algorithm events
Examples The following example shows that the debug dsc clock command has been enabled, and that trunk
messages are received, and that the configuration message has been received:
AS5800# debug dsc clock
debug dsip
To display debugging output for Distributed System Interconnect Protocol (DSIP) used between a router shelf
and a dial shelf, use the debug dsip command in privileged EXEC mode. To disable debugging output, use
the no form of this command.
Usage Guidelines The debug dsip command is used to enable the display of debugging messages for DSIP between the
router shelf and the dial shelf. Using this command, you can display booting messages generated when
the download of an image occurs, view console operation, and trace logging of MAC header information
and DSIP transport layer information as modules interact with the underlying physical media driver. This
command can be applied to a single modem or a group of modems.
Once the debug dsip trace command has been enabled, you can read the information captured in the
trace buffer using the show dsip tracing command.
Examples The following example indicates the debug dsip trace command logs MAC headers of the various
classes of DSIP packets. To view the logged information, use the show dsip tracing command:
AS5800# debug dsip trace
debug dspapi
To enable debugging for Digital Signal Processor (DSP) application programming interface (API)
message events, use the debug dspapi command in privileged EXEC mode. To reset the default value
for this feature, use the no form of this command.
Syntax Description all Enables all debug dspapi options (command, detail, error, notification and
response).
command Displays commands sent to the DSPs.
detail Displays additional detail for the DSP API debugs enabled.
error Displays any DSP API errors.
notification Displays notification messages sent from the DSP (for example, tone detection
notification).
response Displays responses sent by the DSP (for example, responses to statistic
requests).
Usage Guidelines DSP API message events used to communicate with DSPs are intended for use with Connexant
(Nextport) and Texas Instrument (54x) DSPs. This command severely impacts performance and should
be used only for single-call debug capture.
Examples The following example shows how to enable debugging for all DSP API message events:
Router# debug dspapi all
debug dspfarm
To display digital signal processor (DSP) farm service debugging information, use the debug dspfarm
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
no debug dspfarm
Usage Guidelines The router on which this command is used must be equipped with one or more digital T1/E1 packet voice
trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms
(NM-HDV-FARMs) to provide DSP resources.
Debugging is turned on for all DSP-farm-service sessions. You can debug multiple sessions
simultaneously, with different levels of debugging for each.
Examples The following is sample output from the debug dspfarm events command:
Router# debug dspfarm events
*Mar 1 00:46:01: dspfarm_find_stream: stream 63121F1C, found in sess 631143CC, cid 2705
*Mar 1 00:46:01: dspfarm_modify_connection: old_mode 4, new_mode 3
*Mar 1 00:46:01: dspfarm_close_local_rtp: stream 63121F1C, local_rtp_port 22656
*Mar 1 00:46:01: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C4C8,
eve_id 5, context 6311426C, result 0
*Mar 1 00:46:01: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2705
*Mar 1 00:46:01: dspfarm_process_appl_event_queue: XAPP eve 6311C4E0 rcvd
*Mar 1 00:46:01: dspfarm_find_stream: stream 63121F1C, found in sess 631143CC, cid 2705
*Mar 1 00:46:01: dspfarm_close_local_rtp: stream 63121F1C, local_rtp_port 0
*Mar 1 00:46:01: dspfarm_release_dsp_resource: sess 631143CC, stream 63121F1C, num_stream
3, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040002
*Mar 1 00:46:01: dspfarm_drop_conference:slot 2 dsp 4 ch 2
*Mar 1 00:46:01: dspfarm_send_drop_conf: Sent drop_conference to DSP 4 ch 2
*Mar 1 00:46:01: dspfarm_xapp_enq: Sent msg 8 to DSPFARM
*Mar 1 00:46:01: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C4F8,
eve_id 9, context 6311426C, result 0
*Mar 1 00:46:01: dspfarm_process_dsp_event_queue: DSP eve 6312078C rcvd
*Mar 1 00:46:01: dspfarm_delete_stream: sess_id 26, conn_id 2705, stream 63121F1C, in
sess 631143CC is freed
*Mar 1 00:46:01: Sent 180 bytes to DSP 4 channel 3
*Mar 1 00:46:04: Sent 180 bytes to DSP 4 channel 3
*Mar 1 00:46:05: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2689, conn_mode 3,
ripaddr 10.10.1.5, rport 19514
*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C510 rcvd
*Mar 1 00:46:05: dspfarm_find_stream: stream 63121E34, found in sess 631143CC, cid 2689
*Mar 1 00:46:05: dspfarm_modify_connection: old_mode 4, new_mode 3
*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63121E34, local_rtp_port 25834
*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C528,
eve_id 5, context 63114244, result 0
*Mar 1 00:46:05: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2689
*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C540 rcvd
*Mar 1 00:46:05: dspfarm_find_stream: stream 63121E34, found in sess 631143CC, cid 2689
*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63121E34, local_rtp_port 0
*Mar 1 00:46:05: dspfarm_release_dsp_resource: sess 631143CC, stream 63121E34, num_stream
2, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040001
*Mar 1 00:46:05: dspfarm_drop_conference:slot 2 dsp 4 ch 1
*Mar 1 00:46:05: dspfarm_send_drop_conf: Sent drop_conference to DSP 4 ch 1
*Mar 1 00:46:05: dspfarm_xapp_enq: Sent msg 8 to DSPFARM
*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C558,
eve_id 9, context 63114244, result 0
*Mar 1 00:46:05: dspfarm_process_dsp_event_queue: DSP eve 6311586C rcvd
*Mar 1 00:46:05: dspfarm_delete_stream: sess_id 26, conn_id 2689, stream 63121E34, in
sess 631143CC is freed
*Mar 1 00:46:05: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2721, conn_mode 3,
ripaddr 10.10.1.6, rport 21506
*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C570 rcvd
*Mar 1 00:46:05: dspfarm_find_stream: stream 63122004, found in sess 631143CC, cid 2721
*Mar 1 00:46:05: dspfarm_modify_connection: old_mode 4, new_mode 3
*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63122004, local_rtp_port 19912
*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C588,
eve_id 5, context 63114294, result 0
*Mar 1 00:46:05: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2721
*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C5A0 rcvd
*Mar 1 00:46:05: dspfarm_find_stream: stream 63122004, found in sess 631143CC, cid 2721
*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63122004, local_rtp_port 0
*Mar 1 00:46:05: dspfarm_release_dsp_resource: sess 631143CC, stream 63122004, num_stream
1, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040003
*Mar 1 00:46:05: dspfarm_drop_conference:slot 2 dsp 4 ch 3
*Mar 1 00:46:05: dspfarm_drop_conference: Last conferee - closing the conf session
*Mar 1 00:46:05: dspfarm_send_close_conf: Sent close_conference to DSP 4
*Mar 1 00:46:05: dspfarm_drop_conference: Removed the conf in dsp 4
*Mar 1 00:46:05: dspfarm_xapp_enq: Sent msg 8 to DSPFARM
*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C5B8,
eve_id 9, context 63114294, result 0
Syntax Description name (Optional) The host or physical unit (PU) name designation.
Usage Guidelines The debug dspu activation command displays all DSPU activation traffic. To restrict the output to a
specific host or PU, include the host or PU name argument. You cannot turn off debugging output for an
individual PU if that PU has not been named in the debug dspu activation command.
Examples The following is sample output from the debug dspu activation command. Not all intermediate numbers
are shown for the “activated” and “deactivated” logical unit (LU) address ranges.
Router# debug dspu activation
Field Description
DSPU Downstream PU debugging message.
LS Link station (LS) event triggered the message.
PU PU event triggered the message.
LU LU event triggered the message.
HOST3745 Host name or PU name.
HOST3745-253 Host name or PU name and the LU address, separated by a dash.
connected Event that occurred to trigger the message.
activated
disconnected
deactivated
Usage Guidelines The debug dspu packet command displays all DSPU packet data flowing through the router. To restrict
the output to a specific host or physical unit (PU), include the host or PU name argument. You cannot
turn off debugging output for an individual PU if that PU has not been named in the debug dspu packet
command.
Examples The following is sample output from the debug dspu packet command:
Router# debug dspu packet
Field Description
DSPU: Rx: Received frame (packet) from the remote PU to the router PU.
DSPU: Tx: Transmitted frame (packet) from the router PU to the remote PU.
PU HOST3745 Host name or PU associated with the transmit or receive.
data length 12 data: Number of bytes of data, followed by up to 128 bytes of displayed data.
Syntax Description name (Optional) The host or physical unit (PU) name designation.
Usage Guidelines Use the debug dspu state command to display only the FSM state changes. To see all FSM activity, use
the debug dspu trace command. You cannot turn off debugging output for an individual PU if that PU
has not been named in the debug dspu state command.
Examples The following is sample output from the debug dspu state command. Not all intermediate numbers are
shown for the “activated” and “deactivated” logical unit (LU) address ranges.
Router# debug dspu state
Field Description
DSPU Downstream PU debug message.
LS Link station (LS) event triggered the message.
PU PU event triggered the message.
LU LU event triggered the message.
HOST3745-253 Host name or PU name and LU address.
input=input, Input received by the FSM.
previous-state, -> Previous state and current new state as seen by the FSM.
current-state
Syntax Description name (Optional) The host or physical unit (PU) name designation.
Usage Guidelines Use the debug dspu trace command to display all FSM state changes. To see FSM state changes only,
use the debug dspu state command. You cannot turn off debugging output for an individual PU if that
PU has not been named in the debug dspu trace command.
Examples The following is sample output from the debug dspu trace command:
Router# debug dspu trace
Field Description
7:23:57 Time stamp.
DSPU Downstream PU debug message.
LS Link station (LS) event triggered the message.
PU A PU event triggered the message.
LU LU event triggered the message.
HOST3745-253 Host name or PU name and LU address.
in:input s:state ->(new-state, String describing the following:
action)
• input—LU FSM input
• state—Current FSM state
• new-state—New FSM state
• action—FSM action
input=input -> String describing the following:
(new-state ,action ) • input—PU or LS FSM input
• new-state—New PU or LS FSM state
• action—PU or LS FSM action
Examples The following is sample output from the debug dss ipx event command:
Router# debug dss ipx event
05:51:36:DSS-feature:dss_ipxcache_version():idb:NULL, reason:42,
prefix:0, mask:FFFFFFFF
05:51:36:DSS-feature:dss_ipx_access_group():idb:Vlan22
05:51:36:DSS-feature:dss_ipx_access_list()
05:51:36:DSS-base 05:51:33.834 dss_ipx_invalidate_interface Vl22
05:51:36:DSS-base 05:51:33.834 dss_set_ipx_flowmask_reg 2
05:51:36:%IPX mls flowmask transition from 1 to 2 due to new status of
simple IPX access list on interfaces
Usage Guidelines This command helps you observe EIGRP feasible successor activity and to determine whether route
updates are being installed and deleted by the routing process.
Examples The following is sample output from the debug eigrp fsm command:
Router# debug eigrp fsm
In the first line, DUAL stands for diffusing update algorithm. It is the basic mechanism within EIGRP
that makes the routing decisions. The next three fields are the Internet address and mask of the
destination network and the address through which the update was received. The metric field shows the
metric stored in the routing table and the metric advertised by the neighbor sending the information. If
shown, the term “Metric... inaccessible” usually means that the neighbor router no longer has a route to
the destination, or the destination is in a hold-down state.
In the following output, EIGRP is attempting to find a feasible successor for the destination. Feasible
successors are part of the DUAL loop avoidance methods. The FD field contains more loop avoidance
state information. The RD field is the reported distance, which is the metric used in update, query, or
reply packets.
The indented line with the “not found” message means a feasible successor (FS) was not found for
192.168.4.0 and EIGRP must start a diffusing computation. This means it begins to actively probe (sends
query packets about destination 192.168.4.0) the network looking for alternate paths to 192.164.4.0.
DUAL: Find FS for dest 192.168.4.0 255.255.255.0. FD is 2249216, RD is 2249216
DUAL: 0.0.0.0 metric 4294967295/4294967295not found Dmin is 4294967295
The following output indicates the route DUAL successfully installed into the routing table:
DUAL: RT installed 172.25.166.0 255.255.255.0 via 0.0.0.0
The following output shows that no routes to the destination were discovered and that the route
information is being removed from the topology table:
DUAL: Dest 192.168.4.0 255.255.255.0 not entering active state.
DUAL: Removing dest 192.168.4.0 255.255.255.0, nexthop 0.0.0.0
DUAL: No routes. Flushing dest 192.168.4.0 255.255.255.0
Examples The following is sample output from the debug eigrp neighbor command:
Router# debug eigrp neighbor static
Router(config-router)#
22:40:07:EIGRP:Multicast Hello is disabled on Ethernet3/1!
22:40:07:EIGRP:Add new static nbr 10.1.1.1 to AS 100 Ethernet3/1
Router(config-router)#
22:41:23:EIGRP:Static nbr 10.1.1.1 not in AS 100 Ethernet3/1 dynamic list
22:41:23:EIGRP:Delete static nbr 10.1.1.1 from AS 100 Ethernet3/1
22:41:23:EIGRP:Multicast Hello is enabled on Ethernet3/1!
Usage Guidelines The output from the debug eigrp nsf command displays NSF-specific events. This command can be
issued on an NSF-capable or NSF-aware router.
Examples The following example enables Enhanced Interior Gateway Routing Protocol (EIGRP) NSF debugging:
Router# debug eigrp nsf
Usage Guidelines If a communication session is closing when it should not be, an end-to-end connection problem can be
the cause. The debug eigrp packet command is useful for analyzing the messages traveling between the
local and remote hosts.
Examples The following is sample output from the debug eigrp packet command:
Router# debug eigrp packet
The output shows transmission and receipt of Enhanced Interior Gateway Routing Protocol (EIGRP)
packets. These packet types may be hello, update, request, query, or reply packets. The sequence and
acknowledgment numbers used by the EIGRP reliable transport algorithm are shown in the output.
Where applicable, the network-layer address of the neighboring router is also included.
Field Description
EIGRP: EIGRP packet information.
AS n Autonomous system number.
Flags nxn A flag of 1 means the sending router is indicating to the receiving
router that this is the first packet it has sent to the receiver.
A flag of 2 is a multicast that should be conditionally received by
routers that have the conditionally receive (CR) bit set. This bit gets
set when the sender of the multicast has previously sent a sequence
packet explicitly telling it to set the CR bit.
HELLO Hello packets are the neighbor discovery packets. They are used to
determine whether neighbors are still alive. As long as neighbors
receive the hello packets the router is sending, the neighbors validate
the router and any routing information sent. If neighbors lose the
hello packets, the receiving neighbors invalidate any routing
information previously sent. Neighbors also send hello packets.
debug eigrp transmit [ack] [build] [detail] [link] [packetize] [peerdown] [sia] [startup]
[strange]
no debug eigrp transmit [ack] [build] [detail] [link] [packetize] [peerdown] [sia] [startup]
[strange]
Syntax Description ack (Optional) Information for acknowledgment (ACK) messages sent by the
system.
build (Optional) Build information messages (messages that indicate that a
topology table was either successfully built or could not be built).
detail (Optional) Additional detail for debug output.
link (Optional) Information regarding topology table linked-list management.
packetize (Optional) Information regarding topology table linked-list management.
peerdown (Optional) Information regarding the impact on packet generation when a
peer is down.
sia (Optional) Stuck-in-active (SIA) messages.
startup (Optional) Information regarding peer startup and initialization packets that
have been transmitted.
strange (Optional) Unusual events relating to packet processing.
Examples The following is sample output from the debug eigrp transmit command:
Router# debug eigrp transmit
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone alarm command shows all the SkinnyStation alarm messages sent by the
Cisco IP phone. Under normal circumstances, this message is sent by the Cisco IP phone just before it
registers, and the message has the severity level for the alarm set to “Informational” and contains the
reason for the phone reboot or re-register. This type of message is entirely benign and does not indicate
an error condition.
If the mac-address keyword is not used, the debug ephone alarm command debugs all Cisco IP phones
that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want
to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following example shows a SkinnyStation alarm message that is sent before the Cisco IP phone
registers:
Router# debug ephone alarm
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone detail command includes the error and state levels.
If the mac-address keyword is not used, the debug ephone detail command debugs all Cisco IP phones
that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want
to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of detail debugging of the Cisco IP phone with MAC address
0030.94c3.8724. The sample is an excerpt of some of the activities that takes place during call setup,
connected state, active call, and the call being disconnected.
Router# debug ephone detail mac-address 0030.94c3.8724
1d04h: ephone-1[1]:OFFHOOK
.
.
1d04h: Skinny Call State change for DN 1 SIEZE
.
.
1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsOffHook
.
.
1d04h: ephone-1[1]:SetLineLamp 1 to ON
.
.
1d04h: ephone-1[1]:KeypadButtonMessage 5
.
.
1d04h: ephone-1[1]:KeypadButtonMessage 0
.
.
1d04h: ephone-1[1]:KeypadButtonMessage 0
.
.
1d04h: ephone-1[1]:KeypadButtonMessage 2
.
.
1d04h: ephone-1[1]:Store ReDial digit: 5002
.
SkinnyTryCall to 5002 instance 1
.
.
1d04h: ephone-1[1]:Store ReDial digit: 5002
1d04h: ephone-1[1]:
SkinnyTryCall to 5002 instance 1
.
.
1d04h: Skinny Call State change for DN 1 ALERTING
.
.
1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsRingOut
.
.
1d04h: ephone-1[1]:SetLineLamp 1 to ON
1d04h: SetCallInfo calling dn 1 dn 1
calling [5001] called [5002]
.
.
1d04h: ephone-1[1]: Jane calling
1d04h: ephone-1[1]: Jill
.
.
1d04h: SkinnyUpdateDnState by EFXS_RING_GENERATE
for DN 2 to state RINGING
.
.
1d04h: SkinnyGetCallState for DN 2 CONNECTED
.
.
1d04h: ephone-1[1]:SetLineLamp 3 to ON
1d04h: ephone-1[1]:UpdateCallState DN 1 state 4 calleddn 2
.
.
1d04h: Skinny Call State change for DN 1 CONNECTED
.
.
1d04h: ephone-1[1]:OpenReceive DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80
.
.
1d04h: ephone-1[1]:OpenReceiveChannelAck 1.2.172.21 port=20180
1d04h: ephone-1[1]:Outgoing calling DN 1 Far-ephone-2 called DN 2
1d04h: SkinnyGetCallState for DN 1 CONNECTED
.
.
1d04h: ephone-1[1]:SetCallState line 3 DN 2 TsOnHook
.
.
1d04h: ephone-1[1]:SetLineLamp 3 to OFF
.
.
1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsOnHook
.
.
1d04h: ephone-1[1]:Clean Up Speakerphone state
1d04h: ephone-1[1]:SpeakerPhoneOnHook
1d04h: ephone-1[1]:Clean up activeline 1
1d04h: ephone-1[1]:StopTone sent to ephone
1d04h: ephone-1[1]:Clean Up phone offhook state
1d04h: SkinnyGetCallState for DN 1 IDLE
1d04h: called DN -1, calling DN -1 phone -1
1d04h: ephone-1[1]:SetLineLamp 1 to OFF
1d04h: UnBinding ephone-1 from DN 1
1d04h: UnBinding called DN 2 from DN 1
1d04h: ephone-1[1]:ONHOOK
1d04h: ephone-1[1]:SpeakerPhoneOnHook
1d04h: ephone-1[1]:ONHOOK NO activeline
.
.
.
Command Description
debug ephone statistics Sets statistics debugging for the Cisco IP phone.
show debugging Displays information about the types of debugging that are
enabled for your router.
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone error command cancels debugging at the detail and state level.
If the mac-address keyword is not used, the debug ephone error command debugs all Cisco IP phones
that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want
to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of error debugging for the Cisco IP phone with MAC address
0030.94c3.8724:
Router# debug ephone error mac-address 0030.94c3.8724
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone keepalive command sets keepalive debugging.
If the mac-address keyword is not used, the debug ephone keepalive command debugs all
Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that
you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of the keepalive status for the Cisco IP phone with MAC address
0030.94C3.E1A8:
Router# debug ephone keepalive mac-address 0030.94c3.E1A8
Usage Guidelines The debug ephone mwi command sets message waiting indication debugging for the Cisco IOS
Telephony Service router. Because the MWI protocol activity is not specific to any individual
Cisco IP phone, setting the MAC address keyword qualifier for this command is not useful.
Note Unlike the other related debug ephone commands, the mac-address keyword does not help debug a
particular Cisco IP phone.
Examples The following is sample output of the message waiting indication status for the Cisco IOS Telephony
Service router:
Router# debug ephone mwi
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone pak command provides voice packet level debugging and prints the contents of one
voice packet in every 1024 voice packets.
If the mac-address keyword is not used, the debug ephone pak command debugs all Cisco IP phones
that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want
to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of packet debugging for the Cisco IP phone with MAC address
0030.94c3.8724:
Router# debug ephone pak mac-address 0030.94c3.8724
Command Description
debug ephone statistics Sets statistics debugging for the Cisco IP phone.
show debugging Displays information about the types of debugging that are
enabled for your router.
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone raw command provides raw low-level protocol debug display for all SCCP messages.
The debug display provides byte level display of Skinny TCP socket messages.
If the mac-address keyword is not used, the debug ephone raw command debugs all Cisco IP phones
that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want
to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of raw protocol debugging for the Cisco IP phone with MAC address
0030.94c3.E1A8:
Router# debug ephone raw mac-address 0030.94c3.E1A8
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone register command sets registration debugging for the Cisco IP phones.
If the mac-address keyword is not used, the debug ephone register command debugs all
Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that
you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of registration debugging for the Cisco IP phone with MAC address
0030.94c3.8724:
Router# debug ephone register mac-address 0030.94c3.8724
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone state command sets state debugging for the Cisco IP phones.
If the mac-address keyword is not used, the debug ephone state command debugs all Cisco IP phones
that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want
to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of state debugging for the Cisco IP phone with MAC address
0030.94c3.E1A8:
Router# debug ephone state mac-address 0030.94c3.E1A8
1d06h: ephone-1[1]:OFFHOOK
1d06h: ephone-1[1]:SIEZE on activeline 0
1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsOffHook
1d06h: ephone-1[1]:Skinny-to-Skinny call DN 1 to DN 2 instance 1
1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsRingOut
1d06h: ephone-1[1]:Call Info DN 1 line 1 ref 158 called 5002 calling 5001
1d06h: ephone-1[1]: Jane calling
1d06h: ephone-1[1]: Jill
1d06h: ephone-1[1]:SetCallState line 3 DN 2 TsRingIn
1d06h: ephone-1[1]:Call Info DN 2 line 3 ref 159 called 5002 calling 5001
1d06h: ephone-1[1]: Jane calling
1d06h: ephone-1[1]: Jill
1d06h: ephone-1[1]:SetCallState line 3 DN 2 TsCallRemoteMultiline
1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsConnected
1d06h: ephone-1[1]:OpenReceive DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80
1d06h: ephone-1[1]:OpenReceiveChannelAck 1.2.172.21 port=24010
1d06h: ephone-1[1]:StartMedia 1.2.172.22 port=24612
1d06h: DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80
1d06h: ephone-1[1]:CloseReceive
1d06h: ephone-1[1]:StopMedia
1d06h: ephone-1[1]:SetCallState line 3 DN 2 TsOnHook
1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsOnHook
1d06h: ephone-1[1]:SpeakerPhoneOnHook
1d06h: ephone-1[1]:ONHOOK
1d06h: ephone-1[1]:SpeakerPhoneOnHook
1d06h: SkinnyReportDnState DN 1 ONHOOK
Syntax Description mac-address (Optional) Defines the MAC address of the Cisco IP phone.
mac-address (Optional) Specifies the MAC address of the Cisco IP phone.
Usage Guidelines The debug ephone statistics command provides a debug monitor display of the periodic messages from
the Cisco IP phone to the router. These include transmit-and-receive packet counts and an estimate of
drop packets. The call statistics can also be displayed for live calls using the show ephone command.
If the mac-address keyword is not used, the debug ephone statistics command debugs all
Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that
you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that
have debugging enabled, enter the show ephone command and look at the debug field in the output.
When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory
numbers associated with the Cisco IP phone.
Examples The following is sample output of statistics debugging for the Cisco IP phone with MAC address
0030.94C3.E1A8:
Router# debug ephone statistics mac-address 0030.94C3.E1A8
debug errors
To display errors, use the debug errors command in privileged EXEC mode. To disable debugging
output, use the no form of this command.
debug errors
no debug errors
Examples The following is sample output from the debug errors command:
Router# debug errors
The first line of output indicates that a packet was routed to the interface, but no static map was set up
to route that packet to the proper virtual circuit.
The second line of output shows that an OAM F5 (virtual circuit) cell error occurred.
debug events
To display events, use the debug events command in privileged EXEC mode. To disable debugging
output, use the no form of this command.
debug events
no debug events
Usage Guidelines This command displays events that occur on the interface processor and is useful for diagnosing
problems in an network. It provides an overall picture of the stability of the network. In a stable network,
the debug events command does not return any information. If the command generates numerous
messages, the messages can indicate the possible source of problems.
When configuring or making changes to a router or interface for, enable the debug events command.
Doing so alerts you to the progress of the changes or to any errors that might result. Also use this
command periodically when you suspect network problems.
Examples The following is sample output from the debug events command:
Router# debug events
Field Description
PLIM type Indicates the interface rate in Mbps. Possible values are:
• 1 = TAXI(4B5B) 100 Mbps
• 2 = SONET 155 Mbps
• 3 = E3 34 Mbps
state Indicates current state of the ATM Interface Processor (AIP). Possible values
are:
• 1 = An ENABLE will be issued soon.
• 0 = The AIP will remain shut down.
asr Defines a bitmask, which indicates actions or completions to commands.
Valid bitmask values are:
• 0x0800 = AIP crashed, reload may be required.
• 0x0400 = AIP detected a carrier state change.
• 0x0n00 = Command completion status. Command completion status
codes are:
– n = 8 Invalid physical layer interface module (PLIM) detected
– n = 4 Command failed
– n = 2 Command completed successfully
– n = 1 CONFIG request failed
– n = 0 Invalid value
The following line indicates that the AIP was reset. The PLIM detected was 1, so the maximum rate is
set to 100 Mbps.
RESET(4/0): PLIM type is 1, Rate is 100Mbps
The following line indicates that the AIP was given a shutdown command, but the current configuration
indicates that the AIP should be up:
aip_disable(4/0): state=1
The following line indicates that a configuration command has been completed by the AIP:
aip_love_note(4/0): asr=0x201
The following line indicates that the AIP was given a no shutdown command to take it out of the
shutdown state:
aip_enable(4/0)
The following line indicates that the AIP detected a carrier state change. It does not indicate that the
carrier is down or up, only that it has changed.
aip_love_note(4/0): asr=0x4000
The following line of output indicates that the AIP enable function is restarting all permanent virtual
circuits (PVCs) automatically:
aip_enable(4/0): restarting VCs: 7
The following lines of output indicate that PVC 1 was set up and a successful completion code was
returned:
aip_setup_vc(4/0): vc:1 vpi:1 vci:1
aip_love_note(4/0): asr=0x200
Syntax Description all Enables debugging for all incoming and outgoing calls.
calling-number Enables debugging for incoming numbers that begin with a
specified string of digits.
called-number Enables debugging for outgoing numbers that begin with a specified
string of digits.
string Digits that specify the incoming or outgoing number.
Usage Guidelines The incoming or outgoing numbers must be a valid E.164 destination. The period symbol (.) as a
wildcard should not be used. Instead of a wildcard, leave the space blank to indicate that any numbers
can be valid.
There are no limits to the number of debug entries. The number entered generates a match if the calling
or called number matches up to the final number of the debug entry. For example, the 408555 entry
would match 408555, 4085551, 4085551212, or any other number starting with 408555.
Examples The following command enables debugging for any incoming calls that start with 408555:
Router# debug fax relay t30 calling-number 408555
The following command enables debugging for any calls received to a number starting with 555-1212:
Router# debug fax relay t30 called-number 4155551212
Examples The following is sample output from the debug fddi smt-packets command. In this example, an SMT
frame has been output by FDDI 1/0. The SMT frame is a next station addressing (NSA) neighbor
information frame (NIF) request frame with the parameters as shown.
Router# debug fddi smt-packets
Field Description
SMT O SMT frame was sent from FDDI interface 1/0. Also, SMT I indicates
that an SMT frame was received on the FDDI interface 1/0.
Fddi1/0 Interface associated with the frame.
FC Frame control byte in the MAC header.
DA, SA Destination and source addresses in FDDI form.
class Frame class. Values can be echo frame (ECF), neighbor information
frame (NIF), parameter management frame (PMF), request denied
frame (RDF), status information frame (SIF), and status report frame
(SRF).
type Frame type. Values can be Request, Response, and Announce.
vers Version identification. Values can be 1 or 2.
station_id Station identification.
Field Description
len Packet size.
code 1, len 8 -- Parameter type X’0001—upstream neighbor address (UNA),
000000016850043F parameter length in bytes, and parameter value. SMT parameters are
described in the SMT specification ANSI X3T9.
Examples The following is sample output from the debug fmsp receive command:
Router# debug fmsp receive
Examples The following is sample output from the debug fmsp send command:
Router# debug fmsp send
Examples The following is sample output from the debug foip off-ramp command:
Router# debug foip off-ramp
Examples The following is sample output from the debug foip on-ramp command:
Router# debug foip on-ramp
debug frame-relay
To display debugging information about the packets received on a Frame Relay interface, use the debug
frame-relay command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug frame-relay
no debug frame-relay
Usage Guidelines This command helps you analyze the packets that have been received. However, because the debug
frame-relay command generates a substantial amount of output, use it only when the rate of traffic on
the Frame Relay network is less than 25 packets per second.
To analyze the packets that have been sent on a Frame Relay interface, use the debug frame-relay
packet command.
Examples The following is sample output from the debug frame-relay command:
Router# debug frame-relay
Field Description
Serial0(i): Indicates that serial interface 0 has received this Frame Relay datagram
as input.
dlci 500(0x7C41) Indicates the value of the data-link connection identifier (DLCI) for
this packet in decimal (and q922). In this case, 500 has been configured
as the multicast DLCI.
Field Description
pkt type 0x809B Indicates the packet type code.
Possible supported signalling message codes are as follows:
• 0x308—Signalling message; valid only with a DLCI of 0
• 0x309—LMI message; valid only with a DLCI of 1023
Possible supported Ethernet type codes are:
• 0x0201—IP on a 3 MB net
• 0x0201—Xerox ARP on 10 MB networks
• 0xCC—RFC 1294 (only for IP)
• 0x0600—XNS
• 0x0800—IP on a 10 MB network
• 0x0806—IP ARP
• 0x0808—Frame Relay Address Resolution Protocol (ARP)
Possible High-Level Data Link Control (HDLC) type codes are as
follows:
• 0x6001—DEC Maintenance Operation Protocol (MOP) booting
protocol
• 0x6002—DEC MOP console protocol
• 0x6003—DECnet Phase IV on Ethernet
• 0x6004—DEC LAT on Ethernet
• 0x8005—HP Probe
• 0x8035—RARP
• 0x8038—DEC spanning tree
• 0x809b—Apple EtherTalk
• 0x80f3—AppleTalk ARP
• 0x8019—Apollo domain
• 0x8137—Internetwork Packet Exchange (IPX)
• 0x9000—Ethernet loopback packet IP
• 0x1A58—IPX, standard form
• 0xFEFE—Connectionless Network Service (CLNS)
• 0xEFEF—End System-to-Intermediate System (ES-IS)
• 0x1998—Uncompressed TCP
• 0x1999—Compressed TCP
• 0x6558—Serial line bridging
datagramsize 24 Indicates size of this datagram (in bytes).
Syntax Description pvc Displays information regarding the adjacent PVC only.
dlci (Optional) Data-link connection identifier for a specific PVC.
vc-bundle Displays information regarding the adjacent PVC bundle and its members.
vc-bundle-name (Optional) Name of the PVC bundle.
Usage Guidelines Use this command to monitor adjacency activity and status for an adjacent node.
Note Debug messages that are prefixed with “FR_ADJ” (instead of “FR-ADJ”) indicate serious failures in the
Frame Relay PVC bundle performance. Contact the Cisco Technical Assistance Center (TAC) if you see
debugging messages with this prefix.
Examples The following sample output from the debug frame-relay adjacency vc-bundle command shows PVC
bundle “MP-4-dynamic” going down. Each bundle member PVC is marked for removal from the CEF
adjacency table, and then the adjacency for the PVC bundle itself is marked for removal. The adjacencies
are actually removed from the table later when a background clean-up process runs.
Router# debug frame-relay adjacency vc-bundle MP-4-dynamic
Usage Guidelines The debug frame-relay callcontrol command is used specifically for observing FRF.4/Q.933 signalling
messages and related state changes. The FRF.4/Q.933 specification describes a state machine for call
control. The signalling code implements the state machine. The debug statements display the actual
event and state combinations.
The Frame Relay switched virtual circuit (SVC) signalling subsystem is an independent software
module. When used with the debug frame-relay networklayerinterface command, the
debug frame-relay callcontrol command provides a better understanding of the call setup and teardown
sequence. The debug frame-relay networklayerinterface command provides the details of the
interactions between the signalling subsystem on the router and the Frame Relay subsystem.
Examples State changes can be observed during a call setup on the calling party side. The debug frame-relay
networklayerinterface command shows the following state changes or transitions:
STATE_NULL -> STATE_CALL_INITIATED -> STATE_CALL_PROCEEDING->STATE_ACTIVE
The following messages are samples of output generated during a call setup on the calling side:
6d20h: U0_SetupRequest: Serial0
6d20h: L3SDL: Ref: 1, Init: STATE_NULL, Rcvd: SETUP_REQUEST, Next: STATE_CALL_INITIATED
6d20h: U1_CallProceeding: Serial0
6d20h: L3SDL: Ref: 1, Init: STATE_CALL_INITIATED, Rcvd: MSG_CALL_PROCEEDING, Next:
STATE_CALL_PROCEEDING
6d20h: U3_Connect: Serial0
6d20h: L3SDL: Ref: 1, Init: STATE_CALL_PROCEEDING, Rcvd: MSG_CONNECT, Next: STATE_ACTIVE
6d20h:
The following messages are samples of output generated during a call setup on the called party side. Note
the state transitions as the call goes to the active state:
STATE_NULL -> STATE_CALL_PRESENT-> STATE_INCOMING_CALL_PROCEEDING->STATE_ACTIVE
Examples The following examples show typical output from the debug frame-relay end-to-end keepalive packet
command. The following example shows output for an outgoing request packet:
EEK (o, Serial0.1 DLCI 200): 1 1 1 3 2 4 3
The seven number fields that follow the colon signify the following:
Field Description
first (example value = 1) Information Element (IE) type.
second (example value = 1) IE length.
third (example value = 1) Report ID. 1 = request, 2 = reply.
fourth (example value = 3) Next IE type. 3 = LIV ID (Keepalive ID).
fifth (example value = 2) IE length. (This IE is a Keepalive IE.)
sixth (example value = 4) Send sequence number.
seventh (example value = 3) Receive sequence number.
The seven number fields that follow the colon signify the following:
Field Description
first (example value = 1) Information Element (IE) type.
second (example value = 1) IE length.
third (example value = 2) Report ID. 1 = request, 2 = reply.
Field Description
fourth (example value = 3) Next IE type. 3 = LIV ID (Keepalive ID).
fifth (example value = 2) IE length. (This IE is a Keepalive IE.)
sixth (example value = 4) Send sequence number.
seventh (example value = 4) Receive sequence number.
The following example shows typical output from the debug frame-relay end-to-end keepalive events
command:
EEK SUCCESS (request, Serial0.2 DLCI 400)
EEK SUCCESS (reply, Serial0.1 DLCI 200)
EEK sender timeout (Serial0.1 DLCI 200)
Usage Guidelines This command is useful for identifying the cause of end-to-end connection problems during the
installation of a Frame Relay network or node.
Note Because the debug frame-relay events command does not generate much output, you can use it at any
time, even during periods of heavy traffic, without adversely affecting other users on the system.
Examples The following is sample output from the debug frame-relay events command:
Router# debug frame-relay events
As the output shows, the debug frame-relay events command returns one specific message type. The
first line, for example, indicates that IP address 172.16.170.26 sent a Frame Relay ARP reply; this packet
was received as input on serial interface 2. The last field (126) is the data-link connection identifier
(DLCI) to use when communicating with the responding router.
For Frame Relay over MPLS, the following is sample output for the debug frame-relay events
command. The command output shows the status of the VCs.
This example shows the messages that are displayed when you shut the core-facing interface on a
provider edge (PE) router:
04:40:38:%SYS-5-CONFIG_I: Configured from console by consolenf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface hssi2/0
Router(config-if)# shut
This example shows the messages that are displayed when you enable the core-facing interface on a PE
router:
Router(config-if)# no shut
This example shows the messages that are displayed when you shut the edge-facing interface on a PE
router:
Router(config)# interface pos4/0
Router(config-if)# shut
This example shows the messages that are displayed when you enable the edge-facing interface on a PE
router:
Router(config)# interface pos4/0
Router(config-if)# no shut
Examples The following is sample output that shows the display message returned in response to the debug
frame-relay foresight command:
Router# debug frame-relay foresight
This message indicates the router learned from the ForeSight message that data-link connection
identifier (DLCI) 17 is now experiencing congestion. The output rate for this circuit should be slowed
down, and in the router this DLCI is configured to adapt traffic shaping in response to foresight
messages.
Syntax Description event (Optional) Displays event or error messages related to Frame Relay
fragmentation.
interface (Optional) Displays fragments received or sent on the specified interface.
type (Optional) The interface type for which you wish to display fragments received
or sent.
number (Optional) The Interface number.
dlci (Optional) The data-link connection identifier (DLCI) value of the PVC for
which you wish to display fragments received or sent.
Usage Guidelines This command will display event or error messages related to Frame Relay fragmentation; it is only
enabled at the PVC level on the selected interface.
This command is not supported on the Cisco MC3810 networking device for fragments received by a
PVC configured via the voice-encap command.
Examples The following is sample output from the debug frame-relay fragment command:
Router# debug frame-relay fragment interface serial 0/0 109
Serial0/0(i): dlci 109, rx-seq-num 126, exp_seq-num 126, BE bits set, frag_hdr 04 C0 7E
The following is sample output from the debug frame-relay fragment event command:
Router# debug frame-relay fragment event
Frame-relay reassembled packet is greater than MTU size, packet dropped on serial 0/0
dlci 109
Usage Guidelines Within the FRF.4/Q.933 signalling specification, messages are divided into subunits called information
elements. Each information element defines parameters specific to the call. These parameters can be
values configured on the router, or values requested from the network.
The debug frame-relay informationelements command shows the signalling message in hexadecimal
format. Use this command to determine parameters being requested and granted for a call.
Note Use the debug frame-relay informationelements command when the debug frame-relay callcontrol
command does not explain why calls are not being set up.
Caution The debug frame-relay informationelements command displays a substantial amount of information
in bytes. You must be familiar with FRF.4/Q.933 to decode the information contained within the debug
output.
Examples The following is sample output from the debug frame-relay informationelements command. In this
example, each information element has a length associated with it. For those with odd-numbered lengths,
only the specified bytes are valid, and the extra byte is invalid. For example, in the message “Call Ref,
length: 3, 0x0200 0x0100,” only “02 00 01” is valid; the last “00” is invalid.
lw0d# debug frame-relay informationelements
Usage Guidelines Use the debug frame-relay lapf command to troubleshoot the data-link control portion of Layer 2 that
runs over data-link connection identifier (DLCI) 0. Use this command only if you have a problem
bringing up Layer 2. You can use the show interface serial command to determine the status of Layer 2.
If it shows a Link Access Procedure, Frame Relay (LAPF) state of down, Layer 2 has a problem.
Examples The following is sample output from the debug frame-relay lapf command. In this example, a line being
brought up indicates an exchange of set asynchronous balanced mode extended (SABME) and
unnumbered acknowledgment (UA) commands. A SABME is initiated by both sides, and a UA is the
response. Until the SABME gets a UA response, the line is not declared to be up. The p/f value indicates
the poll/final bit setting. TX means send, and RX means receive.
Router# debug frame-relay lapf
In the following example, a line in an up LAPF state should see a steady exchange of RR (receiver ready)
messages. TX means send, RX means receive, and N(R) indicates the receive sequence number.
Router# debug frame-relay lapf
Usage Guidelines You can use this command to determine whether the router and the Frame Relay switch are sending and
receiving LMI packets properly.
Note Because the debug frame-relay lmi command does not generate much output, you can use it at any time,
even during periods of heavy traffic, without adversely affecting other users on the system.
Examples The following is sample output from the debug frame-relay lmi command:
The first four lines describe an LMI exchange. The first line describes the LMI request the router has
sent to the switch. The second line describes the LMI reply the router has received from the switch. The
third and fourth lines describe the response to this request from the switch. This LMI exchange is
followed by two similar LMI exchanges. The last six lines consist of a full LMI status message that
includes a description of the two permanent virtual circuits (PVCs) of the router.
Table 65 describes significant fields shown in the first line of the display.
Field Description
Serial1(out) Indicates that the LMI request was sent out on serial interface 1.
StEnq Command mode of message, as follows:
• StEnq—Status inquiry
• Status—Status reply
clock 20212760 System clock (in milliseconds). Useful for determining whether an appropriate
amount of time has transpired between events.
myseq 206 Myseq counter maps to the CURRENT SEQ counter of the router.
yourseen 136 Yourseen counter maps to the LAST RCVD SEQ counter of the switch.
DTE up Line protocol up/down state for the DTE (user) port.
Table 66 describes the significant fields shown in the third and fourth lines of the display.
Field Description
RT IE 1 Value of the report type information element.
length 1 Length of the report type information element (in bytes).
type 1 Report type in RT IE.
KA IE 3 Value of the keepalive information element.
length 2 Length of the keepalive information element (in bytes).
yourseq 138 Yourseq counter maps to the CURRENT SEQ counter of the switch.
myseq 206 Myseq counter maps to the CURRENT SEQ counter of the router.
Table 67 describes the significant fields shown in the last line of the display.
Field Description
PVC IE 0x7 Value of the PVC information element type.
length 0x6 Length of the PVC IE (in bytes).
dlci 401 DLCI decimal value for this PVC.
status 0 Status value. Possible values include the following:
• 0x00—Added/inactive
• 0x02—Added/active
• 0x04—Deleted
• 0x08—New/inactive
• 0x0a—New/active
bw 56000 Committed information rate (in decimal) for the DLCI.
Syntax Description control (Optional) Displays incoming and outgoing bundle link control messages
and bundle link status changes.
mfr number (Optional) Specific bundle interface for which information will be
displayed.
serial number (Optional) Specific bundle link interface for which information will be
displayed.
Usage Guidelines
Caution Using the debug frame-relay multilink command without the control keyword could severely impact
router performance and is not recommended.
Using the debug frame-relay multilink command without the mfr or serial keywords will display error
conditions occurring at the bundle layer.
Examples The following example shows output from the debug frame-relay multilink command for bundle
“MFR0”, which has three bundle links:
Router# debug frame-relay multilink control MFR0
E1 00 01 01 07 4D 46 52 30 00
00:42:54:Serial5/1(o):msg=Add_link, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1,
BL state=Idle
E1 00 01 01 07 4D 46 52 30 00
00:42:54:%LINK-3-UPDOWN:Interface MFR0, changed state to down
00:42:54:Serial5/3(i):msg=Add_link_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3,
BL state=Add_sent
E1 00 02 01 07 4D 46 52 30 00
00:42:54:Serial5/2(i):msg=Add_link_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2,
BL state=Add_sent
E1 00 02 01 07 4D 46 52 30 00
00:42:54:Serial5/1(i):msg=Add_link_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1,
BL state=Add_sent
E1 00 02 01 07 4D 46 52 30 00
00:42:54:%SYS-5-CONFIG_I:Configured from console by console
00:43:00:Serial5/1(i):msg=Add_link, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1,
BL state=Ack_rx
E1 00 01 01 07 4D 46 52 30 00
00:43:00:Serial5/1(o):msg=Add_link_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1,
BL state=Ack_rx
E1 00 02 01 07 4D 46 52 30 00
00:43:00:%LINK-3-UPDOWN:Interface MFR0, changed state to up
00:43:00:Serial5/1(i):msg=Hello, Link=Serial5/1, Bundle=MFR0, Linkid=Serial5/1, BL
state=Up
E1 00 04 03 06 30 A7 E0 54 00
00:43:00:Serial5/1(o):msg=Hello_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL
state=Up
E1 00 05 03 06 90 E7 0F C2 06
00:43:01:Serial5/2(i):msg=Add_link, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2,
BL state=Ack_rx
E1 00 01 01 07 4D 46 52 30 00
00:43:01:Serial5/2(o):msg=Add_link_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2,
BL state=Ack_rx
E1 00 02 01 07 4D 46 52 30 00
00:43:01:Serial5/2(i):msg=Hello, Link=Serial5/2, Bundle=MFR0, Linkid=Serial5/2, BL
state=Up
E1 00 04 03 06 30 A7 E0 54 00
00:43:01:Serial5/2(o):msg=Hello_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2,
BL state=Up
E1 00 05 03 06 90 E7 0F C2 06
00:43:01:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/1, changed state to up
00:43:01:Serial5/3(i):msg=Add_link, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3,
BL state=Ack_rx
E1 00 01 01 07 4D 46 52 30 00
00:43:01:Serial5/3(o):msg=Add_link_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3,
BL state=Ack_rx
E1 00 02 01 07 4D 46 52 30 00
00:43:01:Serial5/3(i):msg=Hello, Link=Serial5/3, Bundle=MFR0, Linkid=Serial5/3, BL
state=Up
E1 00 04 03 06 30 A7 E0 54 00
00:43:01:Serial5/3(o):msg=Hello_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3,
BL state=Up
E1 00 05 03 06 90 E7 0F C2 06
00:43:02:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/2 , changed state to up
00:43:02:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/3 , changed state to up
Field Description
msg Type of bundle link control message that was sent or received.
Link Interface number of the bundle link.
Bundle Bundle with which the link is associated.
Link id Bundle link identification name.
BL state Operational state of the bundle link.
Usage Guidelines The Frame Relay switched virtual circuit (SVC) signaling subsystem is decoupled from the rest of the
router code by means of the NLI intermediate software layer.
The debug frame-relay networklayerinterface command shows activity within the network-layer
interface when a call is set up or torn down. All output that contains an NL relates to the interaction
between the Q.933 signaling subsystem and the NLI.
Note The debug frame-relay networklayerinterface command has no significance to anyone not familiar
with the inner workings of the Cisco IOS software. This command is typically used by service personnel
to debug problem situations.
Examples The following is sample output from the debug frame-relay networklayerinterface command. This
example displays the output generated when a call is set up. The second example shows the output
generated when a call is torn down.
Router# debug frame-relay networklayerinterface
Table 69 describes the significant states and events shown in the display.
Usage Guidelines This command helps you analyze the packets that are sent on a Frame Relay interface. Because the
debug frame-relay packet command generates a substantial amount of output, only use it when traffic
on the Frame Relay network is fewer than 25 packets per second. Use the options to limit the debugging
output to a specific DLCI or interface.
To analyze the packets received on a Frame Relay interface, use the debug frame-relay command.
Examples The following is sample output from the debug frame-relay packet command:
The debug frame-relay packet output consists of groups of output lines; each group describes a Frame
Relay packet that has been sent. The number of lines in the group can vary, depending on the number of
DLCIs on which the packet was sent. For example, the first two pairs of output lines describe two
different packets, both of which were sent out on a single DLCI. The last three lines describe a single
Frame Relay packet that was sent out on two DLCIs.
Field Description
Serial0: Interface that has sent the Frame Relay packet.
broadcast = 1 Destination of the packet. Possible values include the following:
• broadcast = 1—Broadcast address
• broadcast = 0—Particular destination
• broadcast search—Searches all Frame Relay map entries for this particular
protocol that include the broadcast keyword.
link 809B Link type, as documented in the debug frame-relay command.
addr 65535.255 Destination protocol address for this packet. In this case, it is an AppleTalk
address.
Serial0(o): (o) indicates that this is an output event.
DLCI 500 Decimal value of the DLCI.
type 809B Packet type, as documented under the debug frame-relay command.
size 24 Size of this packet (in bytes).
The following lines describe a Frame Relay packet sent to a particular address; in this case AppleTalk
address 10.2:
Serial0: broadcast - 0, link 809B, addr 10.2
Serial0(o):DLCI 100 type 809B size 104
The following lines describe a Frame Relay packet that went out on two different DLCIs, because two
Frame Relay map entries were found:
Serial0: broadcast search
Serial0(o):DLCI 300 type 809B size 24
Serial0(o):DLCI 400 type 809B size 24
The following lines do not appear. They describe a Frame Relay packet sent to a true broadcast address.
Serial1: broadcast search
Serial1(o):DLCI 400 type 800 size 288
Usage Guidelines This command displays error messages for link states and Local Management Interface (LMI) status
changes for PPP over Frame Relay sessions.
To debug process-switched packets, use the debug frame-relay packet or debug ppp packet
commands. To analyze the packets that have been sent on a Frame Relay interface, use the debug
frame-relay packet command.
The debug frame-relay ppp command is generated from process-level switching only and is not CPU
intensive.
Examples The following shows output from the debug frame-relay ppp command where the encapsulation failed
for VC 100.
Router# debug frame-relay ppp
The following shows the output from the debug frame relay ppp and debug frame-relay packet
commands. This example shows a virtual interface (virtual interface 1) establishing a PPP connection
over PPP.
Router# debug frame-relay ppp
The following shows the output for the debug frame-relay ppp and debug frame-relay packet
commands that report a failed PPP over Frame Relay session. The problem is due to a challenge
handshake authentication protocol (CHAP) failure.
Router# debug frame-relay ppp
Syntax Description interface interface The name of the Frame Relay interface.
dlci The DLCI number of the switched PVC to be debugged.
interval interval (Optional) Interval in seconds at which debugging messages will be
updated.
Usage Guidelines The debug frame-relay switching command can be used only on switched Frame Relay PVCs, not
terminated PVCs.
Debug statistics are displayed only if they have changed.
Note Although statistics are displayed at configured intervals, there may be a delay between the occurrence
of a debug event (such as a packet drop) and the display of that event. The delay may be as much as the
configured interval plus 10 seconds.
Examples The following is sample output from the debug frame-relay switching command:
Router# debug frame-relay switching interface s2/1 1000 interval 2
Syntax Description detail Displays detailed information about the members of the bundle specified by
vc-bundle-name. Displays detailed information about the members of all
PVC bundles if vc-bundle-name is not specified.
state-change Displays information pertaining only to the state changes of the PVC bundle
and PVC bundle members specified by vc-bundle-name. Displays
state-change information for all PVC bundles and bundle members if
vc-bundle-name is not specified.
vc-bundle-name (Optional) Specifies a particular PVC bundle.
Usage Guidelines Use this command to monitor state changes and Inverse ARP activity for one or all of the PVC bundles
and bundle members configured on a router.
Note Debugging messages that are prefixed with “FR_VCB” (instead of “FR-VCB”) indicate serious failures
in the Frame Relay PVC bundle performance. Contact the Cisco Technical Assistance Center (TAC) if
you see debugging messages with this prefix.
Examples The following is sample output from the debug frame-relay vc-bundle command that shows Inverse
ARP information for the PVC bundle. PVC bundle member 406 is the only PVC in the bundle to handle
Inverse ARP packets. The Inverse ARP packets coming in on other bundle member PVCs are dropped.
Router# debug frame-relay vc-bundle
In the following example the PVC bundle goes down because the protected group goes down. All
information about active transmission on each PVC is removed.
00:58:27:FR-VCB:MP-4-dynamic:member 402 state changed to DOWN
00:58:27:FR-VCB:MP-4-dynamic:protected group is DOWN
00:58:27:FR-VCB:MP-4-dynamic:state changed to DOWN
00:58:27:FR-VCB:MP-4-dynamic:active table reset
The following is sample output from the debug frame-relay vc-bundle detail command. State change
and Inverse ARP activity is displayed for all PVC bundles and bundle members on the router.
Router# debug frame-relay adjacency vc-bundle detail
Syntax Description destination interface Enables the debugging messages for that specific interface.
Usage Guidelines Use the debug frame-relay virtual command to display debugging messages for the virtual Frame
Relay interface. The debug frame-relay virtual command produces output only when problems occur.
Examples The following example shows the output if one of the routers has not been configured. This output occurs
when the other end is trying to send the receiving box Frame Relay packets.
VFR: Radio1/0 has no VFR for 00:00:C068:6F:AA
Usage Guidelines For complete information on the FRAS process, use the debug fras message along with the debug fras
error command.
Examples The following is sample output from the debug fras error command. This example shows that no logical
connection exists between the local station and remote station in the current setup.
Router# debug fras error
Usage Guidelines If many LLC2 sessions are being activated or deactivated at any time, this command may generate a
substantial amount of output to the console.
Examples The following is sample output from the debug fras-host activation command:
Router# debug fras-host activation
The first line indicates that the FRAS Host sent a TEST Command to the host. In the second line, the
FRAS Host forwards an XID frame from a BNN device to the host. In the third line, the FRAS Host
forwards an XID from the host to the BNN device.
Table 71 describes the significant fields shown in the display.
Field Description
DA Destination MAC address of the frame.
SA Source MAC address of the frame.
DSAP Destination SAP of the frame.
SSAP Source SAP of the frame.
Examples The following is sample output from the debug fras-host error command when the I-field in a TEST
Response frame from a host does not match the I-field of the TEST Command sent by the FRAS Host:
Router# debug fras-host error
Usage Guidelines Use this command with great care. If many LLC2 sessions are active and passing data, this command
may generate a substantial amount of output to the console and impact device performance.
Examples The following is sample output from the debug fras-host packet command:
Router# debug fras-host packet
The debug fras-host packet output contains all of the output from the debug fras-host activation
command and additional information. The first six lines of this sample display are the same as the output
from the debug fras-host activation command. The last lines show LLC-2 frames being sent between
the Frame Relay Boundary Network Node (BNN) device and the host.
Field Description
DA Destination MAC address of the frame.
SA Source MAC address of the frame.
DSAP Destination service access point (SAP) of the frame.
SSAP Source SAP of the frame.
Usage Guidelines Use of this command may result in a substantial amount of output to the screen. Only use this command
for problem determination.
Examples The following is sample output from the debug fras-host snmp command. In this example, the MIB
variable k_frasHostConnEntry_get() is providing SNMP information for the FRAS host.
Router# debug fras-host snmp
Field Description
serNum Serial number of the SNMP request.
vRingIfIdx Interface index of a virtual Token Ring.
frIfIdx Interface index of a Frame Relay serial interface.
Hmac MAC address associated with the host for this connection.
frLocSap SAP associated with the host for this connection.
Rmac MAC address associated with the FRAD for this connection.
frRemSap LLC 2 SAP associated with the FRAD for this connection.
Usage Guidelines For complete information on the FRAS process, use the debug fras error command along with the
debug fras message command.
Examples The following is sample output from the debug fras message command. This example shows incoming
Cisco Link Services (CLS) primitives.
Router# debug fras message
Examples The following is sample output from the debug fras state command. This example shows the state
changing from a request open station is sent state to an exchange XID state.
Possible states are the following: reset, request open station is sent, exchange xid, connection request is
sent, signal station wait, connection response wait, connection response sent, connection established,
disconnect wait, and number of link states.
Router# debug fras state
debug ftpserver
To display information about the FTP server process, use the debug ftpserver command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug ftpserver
no debug ftpserver
Examples The following is sample output from the debug ftpserver command:
Router# debug ftpserver
The sample output corresponds to the following FTP client session. In this example, the user connects
to the FTP server, views the contents of the top-level directory, and gets a file.
FTPclient% ftp FTProuter
Connected to FTProuter.cisco.com.
220 FTProuter IOS-FTP server (version 1.00) ready.
Name (FTProuter:me): aa
331 Password required for 'aa'.
Password:
230 Logged in.
Remote system type is Cisco.
ftp> pwd
257 "disk0:/syslogd.dir/" is current directory.
ftp> dir
200 PORT command successful.
150 Opening ASCII mode data connection for file list.
syslogd.1
syslogd.2
syslogd.3
syslogd.4
syslogd.5
syslogd.6
syslogd.7
syslogd.8
syslogd.9
syslogd.cur
226 Transfer complete.
ftp> bin
200 Type set to I.
ftp> get syslogd.1
200 PORT command successful.
150 Opening BINARY mode data connection for syslogd.1 (607317 bytes).
226 Transfer complete.
607317 bytes received in 7.7 seconds (77 Kbytes/s)
ftp>
The following debug ftpserver command output indicates that no top-level directory is specified.
Therefore, the client cannot access any location on the FTP server. Use the ftp-server topdir command
to specify the top-level directory.
Mar 3 10:29:14: FTPSRV_DEBUG:(REPLY) 550
Mar 3 10:29:14: FTPSRV_DEBUG:Access denied to 'disk0:'
Syntax Description events Displays a message whenever a GUP announcement is sent or received.
GUP is the protocol used between individual gatekeepers in a cluster, which
keeps all the gatekeepers synchronized with all endpoints registered on the
cluster.
asn1 ASN.1 library. ASN.1 is an International Telecommunication Union (ITU)
standard for protocol syntax and message encoding. Entering this keyword
causes a packet dump of all GUP announcement messages.
Examples The following example shows how to enable a packet dump of all GUP announcement messages:
Router# debug gatekeeper gup asn1
announcementInterval 30
endpointCapacity 100000
callCapacity 100000
hostName '47656E657661'H
percentMemory 39
percentCPU 0
currentCalls 0
currentEndpoints 0
zoneInformation
gatekeeperIdentifier {"Geneva"}
altGKIdentifier {"Paris"}
totalBandwidth 0
interzoneBandwidth 0
remoteBandwidth 0
RAW_BUFFER::=
00 0A2A8648 86F70C0A 00000120 001E800B 858A8001 86A00144 80007400 6F007200 6E006100
64006F00 2D006700 6B120063 00790063 006C006F 006E0065 002D0067 006B0000 00000000
*Mar 3 15:40:31:
*Mar 3 15:40:31:Sending GUP ANNOUNCEMENT INDICATION to 172.18.195.140RAW_BUFFER::=
00 0A2A8648 86F70C0A 00000120 001E800A EF8A8001 86A00144 80006300 79006300 6C006F00
6E006500 2D006700 6B120074 006F0072 006E0061 0064006F 002D0067 006B0000 00000000
*Mar 3 15:40:31:PDU DATA = 60EAB248
gatekeeperIdentifier {"cyclone-gk"}
altGKIdentifier {"tornado-gk"}
totalBandwidth 0
interzoneBandwidth 0
remoteBandwidth 0
u all
All possible debugging has been turned off
Syntax Description events Displays a message whenever a load-balancing message is sent or received.
Examples The following is sample output for the debug gatekeeper load command.
Note The following output examples are independent of each other and would not ordinarily be seen at the
same time.
Router#
Router#
Defaults Disabled
Usage Guidelines Use this command to see information about a Gatekeeper server. This command shows any errors that
occur in sending messages to the external applications or in parsing messages from the external
applications.
Examples The following example shows debugging information about a Gatekeeper server:
Router# debug gatekeeper servers
Gatekeeper:
Gatekeeper Server Messages debugging is on
To turn the Gatekeeper server debugging message off, see the following examples:
Router# no debug all
Examples The following is sample output from the debug glbp errors command:
Router# debug glbp errors
Syntax Description all (Optional) Displays all debugging output about GLBP events.
detail (Optional) Displays detailed debugging output about GLBP events.
terse (Optional) Displays a limited range of debugging output about GLBP events.
Examples The following is sample output from the debug glbp events command when the terse keyword is
specified:
Router# debug glbp events terse
Syntax Description all (Optional) Displays all debugging output about GLBP packets.
detail (Optional) Displays detailed debugging output about GLBP packets.
hello (Optional) Displays debugging output about GLBP hello packets.
reply (Optional) Displays debugging output about GLBP reply packets.
request (Optional) Displays debugging output about GLBP request packets.
terse (Optional) Displays a limited range of debugging output about GLBP packets.
Examples The following sample output from the debug glbp packets command shows debugging output about
GLBP hello packets:
Router# debug glbp packets hello
Examples The following is sample output from the debug glbp terse command:
Router# debug glbp terse
GLBP:
GLBP Errors debugging is on
GLBP Events debugging is on
(protocol, redundancy, track)
GLBP Packets debugging is on
(Request, Reply)
Syntax Description events Displays events related to GPRS charging processing on the GGSN.
packets Displays GPRS charging packets that are sent between the GGSN and the
charging gateway.
Usage Guidelines This command is useful for system operators if problems are encountered with GPRS charging
functions.
Caution Because the debug gprs charging command generates a substantial amount of output, use it only when
traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples The following example enables the display of events related to GPRS charging events on the GGSN:
Router# debug gprs charging events
The following example enables the display of GPRS charging packets sent between the GGSN and the
charging gateway:
Router# debug gprs charging events
Syntax Description events Displays events related to GTP processing on the gateway GPRS support
node (GGSN).
messages Displays GTP signaling messages that are sent between the SGSN and
GGSN.
packets Displays GTP packets that are sent between the SGSN and GGSN.
Usage Guidelines This command is useful for system operators and development engineers if problems are encountered
with communication between the GGSN and the SGSN using GTP.
Caution Because the debug gprs gtp command generates a significant amount of output, use it only when traffic
on the GPRS network is low, so other activity on the system is not adversely affected.
Examples The following example enables the display of events related to GTP processing on the GGSN:
Router# debug gprs gtp events
The following example enables the display of GTP packets sent between the SGSN and GGSN:
Router# debug gprs gtp packets
debug h225
To display additional information about the actual contents of H.225 Registration, Admission, and Status
Protocol (RAS) messages, use the debug h225 command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
no debug h225
Syntax Description asn1 Indicates that only the Abstract Syntax Notation One (ASN.1) contents of
any H.225 message sent or received will be displayed.
events Indicates that key Q.931 events that occur when placing an H.323 call from
one gateway to another will be displayed.
Usage Guidelines Both versions of the debug h225 command display information about H.225 messages. H.225 messages
are used to exchange RAS information between gateways and gatekeepers as well as to exchange Q.931
information between gateways.
The debug h225 events command displays key Q.931 events that occur when placing an H.323 call from
one gateway to another. Q.931 events are carried in H.225 messages. This command enables you to
monitor Q.931 state changes such as setup, alert, connected, and released.
Note Although the debug information includes the hexadecimal output of the entire H.225 message, only the
key state changes are decoded.
The debug h225 asn1 command displays the ASN.1 contents of any H.225 message sent or received that
contains ASN.1 content. Not all H.225 messages contain ASN.1 content. Some messages contain both
Q.931 information and ASN.1 information; if you enter this command, only ASN.1 information will be
displayed.
Examples The following sample output for the debug h225 events command shows a call being placed from
gateway GW13 to gateway GW14. Before the call was placed, the gateway exchanged RAS messages
with the gatekeeper. Because RAS messages do not contain Q.931 information, these messages do not
appear in this output.
Router# debug h225 events
Router#
The following output shows the same call being placed from gateway GW13 to gateway GW14 using the
debug h225 asn1 command. The output is very long, but you can track the following information:
• The admission request to the gatekeeper.
• The admission confirmation from the gatekeeper.
• The ASN.1 portion of the H.225/Q.931 setup message from the calling gateway to the called
gateway.
• The ASN.1 portion of the H.225/Q.931 setup response from the called gateway, indicating that the
call has proceeded to alerting state.
• The ASN.1 portion of the H.225/Q.931 message from the called gateway, indicating that the call has
been connected.
• The ASN.1 portion of the H.225/Q.931 message from the called gateway, indicating that the call has
been released.
• The ANS.1 portion of the H.225 RAS message from the calling gateway to the gatekeeper, informing
it that the call has been disengaged.
• The ASN.1 portion of the H.225 RAS message from the gatekeeper to the calling gateway,
confirming the disengage request.
• The ASN.1 portion of the H.225/Q.931 release complete message sent from the called gateway to
the calling gateway.
Router# debug h225 asn1
Router#
Usage Guidelines
Caution This command slows the system down considerably. Connections may time out.
debug h323-annexg
To display all pertinent Annex G messages that have been transmitted and received, use the debug
h323-annexg command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
no debug h323-annexg
Examples The following is sample output from the debug h323-annexg events command:
Router# debug h323-annexg events
debug hpi
To enable debugging for Host Port Interface (HPI) message events, use the debug hpi command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug hpi {all | buffer size | capture | command | destination url | detail | error | notification |
response | stats}
no debug hpi {all | buffer size | capture | command | destination url | detail | error | notification
| response | stats}
Syntax Description all Enables all HPI debug options (command, detail, error, notification, and
response).
buffer size Sets the maximum amount of memory (in bytes) that the capture system
allocates for its buffers when it is active. Valid size range is from 0 to
9000000. Default is 0.
capture Displays HPI capture.
command Displays commands that are being sent to the 54x DSP.
destination url Turns capture on if it was off and sends the output to the specified URL. If
capture was previously enabled for a different URL, the existing URL is
closed, the new URL is opened, and output is sent to the new URL.
detail Displays additional detail for the HPI debugs that are enabled.
error Displays any HPI errors.
notification Displays notification messages sent that are from the 54x DSP (for example,
tone detection notification).
response Displays responses (to commands) that are sent by the 54x DSP (for
example, responses to statistic requests).
stats Displays HPI statistics.
Release Modification
12.2(2)T This command was implemented on the Cisco 1700, Cisco 2600 series,
Cisco 3600 series, and the Cisco MC3810. The stats keyword was added.
12.2(10), 12.2(11)T This command was implemented on the Cisco 827, Cisco 2400,
Cisco 7200 series, and Cisco CVA 120. The following keywords were
added:
• buffer
• capture
• destination
Usage Guidelines This command enables debugging for HPI message events, which are used to communicate with digital
signal processors (DSPs).
When used with the Voice DSP Contol Message Logger feature, the debug hpi buffer command sets the
maximum amount of memory (in bytes) that the capture system can allocate for its buffers when it is
active. The debug hpi capture destination url command turns capture on if it was off and sends the
output to the given URL. If capture was previously enabled for a different URL, the existing URL is
closed, the new URL is opened, and output is sent to the new URL.
When you use the no debug hpi capture command, the capture option is turned off if it was on, any
open files are closed, and any allocated memory is released.
Use the debug hpi all command to view gateway DSP modem relay termination codes. The DSP-to-host
messages for the modem relay termination indicate to the host the modem relay session termination time,
physical or link layer, and other probable causes for disconnection. On receiving this indication from the
DSP, the host can disconnect the call or place the channel in the modem passthrough state.
When this command is used on a Cisco AS5300 during a calling session, the Cisco AS5300 displays the
following information (of severity 6 whereas ordinary debug information is severity 7) on the screen by
default:
2w6d:%ISDN-6-DISCONNECT:Interface Serial0:18 disconnected from 22022 , call lasted 12
seconds
2w6d:%ISDN-6-DISCONNECT:Interface Serial1:9 disconnected from 32010 , call lasted 14
seconds
2w6d:%ISDN-6-CONNECT:Interface Serial3:2 is now connected to 52003
2w6d:%ISDN-6-CONNECT:Interface Serial2:11 is now connected to 42002
To disable this default information on the Cisco AS5300 and to block the display of the
debug hpi capture and show voice hpi capture commands, set the login console to a severity lower
than 6.
Examples The following example turns on the debug output from capture routines:
Router# debug hpi capture
debug http client {all | api | background | cache | error | main | msg | socket}
no debug http client {all | api | background | cache | error | main | msg | socket}
Syntax Description all Displays all debugging messages for the HTTP client.
api Displays debugging information for the HTTP client application
programming interface (API) process.
background Displays background messages.
cache Displays debugging information for the HTTP client cache module.
error Displays the HTTP client error messages.
main Displays debugging information for the HTTP client main process.
msg Displays the HTTP client messages.
socket Displays the HTTP client socket messages.
Usage Guidelines The output of this command is effected by the debug condition application voice command. If the
debug condition application voice command is configured and the <cisco-debug> element is enabled
in the VoiceXML document, debugging output is limited to the VoiceXML application named in the
debug condition application voice command.
Note We recommend that you log output from the debug http client msg and debug http client socket
commands to a buffer, rather than sending the output to the console; otherwise, the size of the output
could severely impact the performance of the gateway.
Examples The following is sample output from the debug http client api command:
Router# debug http client api
The following is sample output from the debug http client cache command:
Router# debug http client cache
The following is sample output from the debug http client main command:
Router# debug http client main
The following is sample output from the debug http client msg command:
Router# debug http client msg
HTTP Client:
HTTP Client Messages debugging is on
The following is sample output from the debug http client socket command:
Router# debug http client socket
The following is sample output from the debug http client error command:
Router# debug http client error
Jan 4 02:45:07 PDT: HTTPC msg timeout waiting for rsp - fd(0)
Jan 4 02:45:07 PDT: HTTPC URL:http://rtsp-ws/dropoffAppend.php?append=&disconnect=1,
TIMEOUT(10000 msec), fd(-1)
debug ima
To display debugging messages for inverse multiplexing over AMT (IMA) groups and links, use the
debug ima command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug ima
no debug ima
Examples The following example shows output when you enter the debug ima command while adding two ATM
links to an IMA group. Notice that the group has not yet been created with the interface atm
slot/imagroup-number command, so the links are not activated yet as group members. However, the
individual ATM links are deactivated.
Router# debug ima
debug ip auth-proxy
To display the authentication proxy configuration information on the router, use the debug ip
auth-proxy command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
no debug ip auth-proxy
Syntax Description detailed Displays details of the TCP events during an authentication proxy process.
The details are generic to all FTP, HTTP, and Telnet protocols.
ftp Displays FTP events related to the authentication proxy.
function-trace Displays the authentication proxy functions.
object-creation Displays additional entries to the authentication proxy cache.
object-deletion Displays deletion of cache entries for the authentication proxy.
telnet Displays Telnet-related authentication proxy events.
timers Displays authentication proxy timer-related events.
Usage Guidelines Use the debug ip auth-proxy command to display authentication proxy activity. See the “Examples”
section for more information about the debug options.
Note The function-trace debugging information provides low-level software information for Cisco technical
support representatives. No output examples are provided for this keyword option.
Examples The following examples illustrate the output of the debug ip auth-proxy command. In these examples,
debugging is on for object creations, object deletions, HTTP, and TCP.
In this example, the client host at 192.168.201.1 is attempting to make an HTTP connection to the web
server located at 192.168.21.1. The HTTP debugging information is on for the authentication proxy. The
output shows that the router is setting up an authentication proxy entry for the login request:
00:11:10: AUTH-PROXY creates info:
cliaddr - 192.168.21.1, cliport - 36583
seraddr - 192.168.201.1, serport - 80
ip-srcaddr 192.168.21.1
pak-srcaddr 0.0.0.0
Following a successful login attempt, the debugging information shows the authentication proxy entries
created for the client. In this example, the client is authorized for SMTP (port 25), FTP data (port 20),
FTP control (port 21), and Telnet (port 23) traffic. The dynamic access control list (ACL) entries are
included in the display.
00:11:25:AUTH_PROXY OBJ_CREATE:acl item 61AD60CC
The next example shows the debug output following a clear ip auth-proxy cache command to clear the
authentication entries from the router. The dynamic ACL entries are removed from the router.
00:12:36:AUTH-PROXY OBJ_DELETE:delete auth_proxy cache 61AD6298
00:12:36:AUTH-PROXY OBJ_DELETE:delete create acl wrapper 6151C7C8 -- acl item 61AD60CC
00:12:36:AUTH-PROXY OBJ_DELETE:delete create acl wrapper 6187A060 -- acl item 6151C908
00:12:36:AUTH-PROXY OBJ_DELETE:delete create acl wrapper 6187A0D4 -- acl item 61A40B88
00:12:36:AUTH-PROXY OBJ_DELETE:delete create acl wrapper 61879644 -- acl item 61879550
The following example shows the timer information for a dynamic ACL entry. All times are expressed
in milliseconds. The first laststart is the time that the ACL entry is created relative to the startup time of
the router. The lastref is the time of the last packet to hit the dynamic ACL relative to the startup time of
the router. The exptime is the next expected expiration time for the dynamic ACL. The delta indicates
the remaining time before the dynamic ACL expires. After the timer expires, the debugging information
includes a message indicating that the ACL and associated authentication proxy information for the
client have been removed.
00:19:51:first laststart 1191112
The following example is sample output with the detailed keyword enabled:
00:37:50:AUTH-PROXY:proto_flag=5, dstport_index=1
00:37:50: SYN SEQ 245972 LEN 0
00:37:50:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 4347
00:37:50:AUTH-PROXY:auth_proxy_half_open_count++ 1
00:37:50:AUTH-PROXY:proto_flag=5, dstport_index=1
00:37:50: ACK 1820245643 SEQ 245973 LEN 0
00:37:50:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 4347
00:37:50:clientport 4347 state 0
00:37:50:AUTH-PROXY:incremented proxy_proc_count=1
00:37:50:AUTH-PROXY:proto_flag=5, dstport_index=1
00:37:50: ACK 1820245674 SEQ 245973 LEN 0
00:37:50:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 4347
00:37:50:clientport 4347 state 0
00:37:57:AUTH-PROXY:proto_flag=5, dstport_index=1
00:37:57: PSH ACK 1820245674 SEQ 245973 LEN 16
00:37:57:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 4347
00:37:57:clientport 4347 state 0
00:37:57:AUTH-PROXY:proto_flag=5, dstport_index=1
00:37:57: ACK 1820245699 SEQ 245989 LEN 0
00:37:57:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 4347
00:37:57:clientport 4347 state 0
00:38:01:AUTH-PROXY:proto_flag=5, dstport_index=1
00:38:01: PSH ACK 1820245699 SEQ 245989 LEN 16
00:38:01:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 4347
00:38:01:clientport 4347 state 0
00:38:01:AUTH-PROXY:Authenticating user ryan
00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats
00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats
00:38:01:AUTH-PROXY:Sent AAA request successfully
00:38:01:AUTH-PROXY:Sent password successfully
00:38:01:AUTH-PROXY:processing authorization data
00:38:01:AUTH-PROXY:Sending accounting start.unique-id 2
00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats
00:38:01:AUTH-PROXY:Session state is INIT.Not updating stats
00:38:01:AUTH-PROXY:wait complete on watched boolean stat=0
00:38:01:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1
00:38:01: SYN ACK 2072458992 SEQ 4051022445 LEN 0
00:38:01:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1
00:38:01: PSH ACK 2072458992 SEQ 4051022446 LEN 49
00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1
00:38:02: ACK 2072459003 SEQ 4051022495 LEN 0
00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1
00:38:02: PSH ACK 2072459003 SEQ 4051022495 LEN 33
00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1
00:38:02: ACK 2072459014 SEQ 4051022528 LEN 0
00:38:02:AUTH-PROXY:src ip addr is 192.168.127.2, dstaddr=192.168.27.1
00:38:02: PSH ACK 2072459014 SEQ 4051022528 LEN 26
00:38:03:AUTH-PROXY:proto_flag=5, dstport_index=1
00:38:03: ACK 1820245725 SEQ 246005 LEN 0
00:38:03:dst_addr 192.168.127.2 src_addr 192.168.27.1 dst_port 21 src_port 4347
00:38:03:clientport 4347 state 3
7200b#
debug ip bgp
To display information related to processing of the Border Gateway Protocol (BGP), use the debug ip
bgp command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ip bgp [A.B.C.D. | dampening | events | in | keepalives | out | updates | vpnv4 | mpls]
no debug ip bgp [A.B.C.D. | dampening | events | in | keepalives | out | updates | vpnv4 | mpls]
Examples The following is sample output from the debug ip bgp command:
03:47:14:vpn:bgp_vpnv4_bnetinit:100:2:58.0.0.0/8
03:47:14:vpn:bnettable add:100:2:58.0.0.0 / 8
03:47:14:vpn:bestpath_hook route_tag_change for vpn2:58.0.0.0/255.0.0.0(ok)
03:47:14:vpn:bgp_vpnv4_bnetinit:100:2:57.0.0.0/8
03:47:14:vpn:bnettable add:100:2:57.0.0.0 / 8
03:47:14:vpn:bestpath_hook route_tag_change for vpn2:57.0.0.0/255.0.0.0(ok)
03:47:14:vpn:bgp_vpnv4_bnetinit:100:2:14.0.0.0/8
03:47:14:vpn:bnettable add:100:2:14.0.0.0 / 8
03:47:14:vpn:bestpath_hook route_tag_chacle ip bgp *nge for vpn2:14.0.0.0/255.0.0.0(ok)
Examples The following is sample output from the debug ip casa affinities command:
Router# debug ip casa affinities
Field Description
Adding fixed affinity Adding a fixed affinity to affinity table.
Updating fixed affinity Modifying a fixed affinity table with information from the services
manager.
flags Bit field indicating actions to be taken on this affinity.
fwd addr Address to which packets will be directed.
interest Services manager that is interested in packets for this affinity.
Field Description
int ip:port Services manager port to which interest packets are sent.
sequence delta Used to adjust TCP sequence numbers for this affinity.
Examples The following is sample output from the debug ip casa packets command:
Router# debug ip casa packets
Field Description
Routing CASA packet - Forwarding Agent is routing a packet to the services manager.
TO_MGR
Routing CASA packet - Forwarding Agent is routing a packet to the forwarding address.
FWD_PKT
Routing CASA packet - TICKLE Forwarding Agent is signaling services manager while allowing
the packet in question to take the appropriate action.
Interest Addr Services manager address.
Interest Port Port on the services manager where packet is sent.
Fwd Addr Address to which packets matching the affinity are sent.
Interest Mask Services manager that is interested in packets for this affinity.
Examples The following is sample output from the debug ip casa wildcards command:
Router# debug ip casa wildcards
Field Description
src mask Source of connection.
dest mask Destination of connection.
no frag, not advertising Not accepting IP fragments.
flags Bit field indicating actions to be taken on this affinity.
fwd addr Address to which packets matching the affinity will be directed.
Field Description
interest Services manager that is interested in packets for this affinity.
int ip: port Services manager port to which interest packets are sent.
sequence delta Used to adjust sequence numbers for this affinity.
debug ip cef
To troubleshoot various Cisco Express Forwarding (CEF) events, use the debug ip cef command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ip cef {drops [rpf [access-list]] [access-list] | receive [access-list] | events [access-list] |
interface | dialer}
no debug ip cef {drops [rpf [access-list]] [access-list] | receive [access-list] | events [access-list]
| interface | dialer}
Usage Guidelines This command gathers additional information for the handling of CEF interface, IPC, or packet events.
Note For packet events, we recommend that you use an access control list (ACL) to limit the
messages recorded.
Examples The following is sample output from the debug ip cef rpf command for a packet that is dropped when
it fails the RPF check. IP address 172.17.249.252 is the source address, and Ethernet 2/0/0 is the input
interface:
Router# debug ip cef drops rpf
The following is sample output for CEF packets that are not switched using information from the FIB
table but are received and sent to the next switching layer:
Router# debug ip cef receive
Field Description
CEF-Drop:Packet from 172.17.249.252 via A packet from IP address 172.17.249.252 is
Ethernet2/0/0 -- unicast rpf check dropped because it failed the reverse path
forwarding check.
CEF-receive:Receive packet for 10.1.104.13 CEF has received a packet addressed to the router.
The following is sample output from the debug ip cef dialer command for a legacy dialer:
Router# debug ip cef dialer
The following is sample output from the debug ip cef dialer command for a dialer profile:
Router# debug ip cef dialer
00:31:44:CEF-Dialer (profile dynamic encap (not MLP)):add link to 10.10.10.2 via Dialer1
through Dialer1
00:31:44:CEF-Dialer:adjacency added:0x81164850
00:31:44:CEF-Dialer:adjacency found:0x81164850; fib->count:1
Field Description
CEF-Dialer (legacy):add link to 10.10.10.2 via A link was added to IP address 10.10.10.2 for legacy
Dialer1 through BRI0/0:1 Dialer1 through physical interface BRI0/0:1.
CEF-Dialer (profile dynamic encap (not A link was added to IP address 10.10.10.2 for dialer
MLP)):add link to 10.10.10.2 via Dialer1 profile Dialer1 through Dialer1.
through Dialer1
Usage Guidelines This command records accounting events for nonrecursive prefixes when the ip cef accounting
non-recursive command is enabled in global configuration mode.
Examples The following is sample output from the debug ip cef accounting non-recursive command:
Router# debug ip cef accounting non-recursive
Field Description
Beginning generation of tmstats ephemeral file (mode Tmstats file is being created.
binary)
CEF-Acct:snapshoting loadinfo 0x63FF2000 Baseline counters are being written to the
tmstats file for each nonrecursive prefix.
CEF-Acct:tmstats_binary:aggregation complete, Tmstats file creation is complete.
duration 0 seconds
CEF-Acct:tmstats_binary:writing 45 bytes Nonrecursive accounting statistics are being
updated to the tmstats file.
CEF-Acct:tmstats_binary:tmstats file written, status 0 Update of the tmstats file is complete.
Usage Guidelines This command is used to troubleshoot fragmentation problems when CEF switching is enabled.
Examples The following is sample output from the debug ip cef fragmentation command:
Router# debug ip cef fragmentation
Field Description
no_fixup path A packet is being fragmented in the no_fixup path.
network_start 0x5397CF8E Memory address of the IP packet.
datagramstart 0x5397CF80 Memory address of the encapsulated IP packet.
data_start 0x397CF80 For particle systems, the memory address where data starts for the
first packet particle.
data_block 0x397C5C0 For particle systems, the memory address of the first packet particle
data block.
mtu 1000 Maximum transmission unit of the output interface.
datagramsize 1414 Size of the encapsulated IP packet.
data_bytes 1414 For particle systems, the sum of the particle data bytes that make
up the packet.
send frag Fragment is being forwarded.
Usage Guidelines Use this command when changing the load sharing algorithm to view the hash table details.
Examples The following is sample output from the debug ip cef hash command with IP CEF load algorithm tunnel
information:
Router# debug ip cef hash
Field Description
ip cef load-sharing algorithm tunnel 0 Echo of the user command.
Load balancing algorithm:tunnel Load sharing algorithm is set to tunnel.
Load balancing unique id:1F2BA5F6 ID field in the command is usually 0. In this instance, the
router chose a pseudo-random ID of 1F2BA5F6.
Destroyed load sharing hash table Purge the existing hash table.
Sending hash algorithm id 2, unique id Algorithm is being distributed.
1F2BA5F6 to slot 255
Creating load sharing hash table Hash table is being created.
Hash table columns for valid max_index: Generated hash table.
Usage Guidelines Use this command to verify the removal of receive hash events when you are shutting down or deleting
an interface.
Examples The following is sample output from the debug ip cef rrhash command.
Router# debug ip cef rrhash
Field Description
rrhash/check Verify address is on the receive list.
found 9.1.104.7 on down idb [ok Found a valid address on the receive list for a shutdown interface
to delete] which is okay to delete.
debug ip cef subblock [id {all | hw hw-id | sw sw-id }] [xdr {all | control | event | none | statistic}]
Usage Guidelines This command is used to record CEF subblock messages and events.
Examples The following is sample output from the debug ip cef subblock command:
Router# debug ip cef subblock
Field Description
Creating unicast RPF subblock for FastEthernet6/0 Creating an RPF interface descriptor subblock.
Linked unicast RPF subblock to FastEthernet6/0 Linked the subblock to the specified interface.
Encoded unit of unicast RPF data (length 16) for Encoded the subblock information in an XDR.
FastEthernet6/0
Sent 1 data unit to slot 6 in 1 XDR message Sent the XDR message to a line card through
the IPC.
Syntax Description access-list (Optional) Controls collection of consistency checker parameters from
specified lists.
consistency-checkers (Optional) Sets consistency checking characteristics.
Usage Guidelines This command is used to record CEF table events related to the forwarding information base (FIB) table.
Possible types of events include the following:
• Routing updates that populate the FIB table
• Flushing of the FIB table
• Adding or removing of entries to the FIB table
• Table reloading process
Examples The following is sample output from the debug ip cef table command:
Router# debug ip cef table
Field Description
CEF-Table Indicates a table event.
Event up, 1.1.1.1/32 IP prefix 1.1.1.1/32 is being added.
rdbs:1 Event is from routing descriptor block 1.
flags:1000000 Indicates the network descriptor block
flags.
CEF-IP Indicates a CEF IP event.
Checking dependencies of 0.0.0.0/0 Resolves the next hop dependencies for
0.0.0.0/0.
attempting to resolve 1.1.1.1/32 Resolves the next hop dependencies.
resolved 1.1.1.1/32 via 9.1.104.1 to 9.1.104.1 Next hop to IP prefix 1.1.1.1/32 is set and
Ethernet2/0/0 is added to the table.
Event up, default, 0.0.0.0/0 Prefix exists - no-op change Indicates no table change is necessary for
0.0.0.0/32.
Syntax Description events Reports server events, like address assignments and database updates.
packets Decodes DHCP receptions and transmissions.
linkage Displays database linkage information (such as parent-child relationships in
a radix tree).
debug ip drp
To display Director Response Protocol (DRP) information, use the debug ip drp command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug ip drp
no debug ip drp
Usage Guidelines The debug ip drp command is used to debug the director response agent used by the Distributed Director
product. The Distributed Director can be used to dynamically respond to Domain Name System (DNS)
queries with the IP address of the “best” host based on various criteria.
Examples The following is sample output from the debug ip drp command. This example shows the packet
origination, the IP address that information is routed to, and the route metrics that were returned.
Router# debug ip drp
Field Description
DRP: received v1 packet from Router received a version 1 DRP packet from the IP address shown,
172.69.232.8, via Ethernet0 via the interface shown.
DRP: RTQUERY for DRP packet contained two Route Query requests. The first request
172.69.58.94 was for the distance to the IP address 171.69.113.50.
internal If nonzero, the metric for the internal distance of the route that the
router uses to send packets in the direction of the client. The internal
distance is the distance within the autonomous system of the router.
external If nonzero, the metric for the Border Gateway Protocol (BGP) or
external distance used to send packets to the client. The external
distance is the distance outside the autonomous system of the router.
debug ip dvmrp
To display information on Distance Vector Multiprotocol Routing Protocol (DVMRP) packets received
and sent, use the debug ip dvmrp command in privileged EXEC mode. To disable debugging output,
use the no form of this command.
Syntax Description detail (Optional) Enables a more detailed level of output and displays
packet contents.
access-list (Optional) Causes the debug ip dvmrp command to restrict output to
one access list.
in (Optional) Causes the debug ip dvmrp command to output packets
received in DVMRP reports.
out (Optional) Causes the debug ip dvmrp command to output packets
sent in DVMRP reports.
Usage Guidelines Use the debug ip dvmrp detail command with care. This command generates a substantial amount of
output and can interrupt other activity on the router when it is invoked.
Examples The following is sample output from the debug ip dvmrp command:
Router# debug ip dvmrp
The following lines show that the router received DVMRP routing information and placed it in the
mroute table:
DVMRP: Received Report on Ethernet0 from 172.19.244.10
DVMRP: Received Report on Ethernet0 from 172.19.244.11
The following lines show that the router is creating a report to send to another DVMRP router:
DVMRP: Building Report for Ethernet0 224.0.0.4
DVMRP: Send Report on Ethernet0 to 224.0.0.4
Table 86 provides a list of internet multicast addresses supported for host IP implementations.
The following lines show that a protocol update report has been sent to all known multicast groups. Hosts
use Internet Group Management Protocol (IGMP) reports to communicate with routers and to request to
join a multicast group. In this case, the router is sending an IGMP report for every known group to the
host, which is running mrouted. The host then responds as though the router were a host on the LAN
segment that wants to receive multicast packets for the group.
DVMRP: Sending IGMP Reports for known groups on Ethernet0
The following is sample output from the debug ip dvmrp detail command:
Router# debug ip dvmrp detail
The following lines show that this group is available to the DVMRP router. The mrouted process on the
host will forward the source and multicast information for this group through the DVMRP cloud to other
members.
DVMRP: Advertise group 224.2.224.2 on Ethernet0
The metric is the number of hops the route has covered, and the distance is the administrative distance.
debug ip eigrp
To display information on Enhanced Interior Gateway Routing Protocol (EIGRP) protocol packets, use
the debug ip eigrp command in privileged EXEC mode. To disable debugging output, use the no form
of this command.
debug ip eigrp
no debug ip eigrp
Usage Guidelines This command helps you analyze the packets that are sent and received on an interface. Because the
debug ip eigrp command generates a substantial amount of output, only use it when traffic on the
network is light.
Examples The following is sample output from the debug ip eigrp command:
Router# debug ip eigrp
Field Description
IP-EIGRP: Indicates IP EIGRP messages.
Ext Indicates that the following address is an external destination rather
than an internal destination, which would be labeled as Int.
Field Description
M Displays the computed metric, which includes the value in the SM
field and the cost between this router and the neighbor. The first
number is the composite metric. The next two numbers are the
inverse bandwidth and the delay, respectively.
SM Displays the metric as reported by the neighbor.
Usage Guidelines The output from the debug ip eigrp notifications command displays EIGRP events and notifications.
Examples The following example output shows that the NSF-aware router has received the restart notification. The
NSF-aware router will now wait for end of transmission (EOT) to be sent from the restarting neighbor
(NSF-capable).
Router# debug ip eigrp notifications
debug ip error
To display IP errors, use the debug ip error command in privileged EXEC mode. To disable debugging
errors, use the no form of this command.
no debug ip error
Syntax Description access-list-number (Optional) The IP access list number that you can specify. If the datagram is
not permitted by that access list, the related debugging output (or IP error) is
suppressed. Standard, extended, and expanded access lists are supported.
The range of standard and extended access lists is from 1 to 199. The range
of expanded access lists is from 1300 to 2699.
detail (Optional) Displays detailed IP error debugging information.
dump (Hidden) Displays IP error debugging information along with raw packet
data in hexadecimal and ASCII forms. This keyword can be enabled with
individual access lists and also with the detail keyword.
Note The dump keyword is not fully supported and should be used only
in collaboration with Cisco Technical Support. See the caution notes
below, in the usage guidelines, for more specific information.
Usage Guidelines This command is used for IP error debugging. The output displays IP errors which are locally detected
by this router.
Caution Enabling this command will generate output only if IP errors occur. However, if the router starts to
receive many packets that contain errors, substantial output may be generated and severely affect
system performance. This command should be used with caution in production networks. It should
only be enabled when traffic on the IP network is low, so other activity on the system is not adversely
affected. Enabling the detail and dump keywords use the highest level of system resources of the
available configuration options for this command, so a high level of caution should be applied when
enabling either of these keywords.
Caution The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical
Support. Because of the risk of using significant CPU utilization, the dump keyword is hidden from the
user and cannot be seen using the “?” prompt. The length of the displayed packet information may
exceed the actual packet length and include additional padding bytes that do not belong to the IP packet.
Also note that the beginning of a packet may start at different locations in the dump output depending
on the specific router, interface type, and packet header processing that may have occurred before the
output is displayed.
Examples The following is sample output from the debug ip error command:
debug ip error
The IP error in the above output was caused when the router attempted to forward a packet with a
time-to-live (TTL) value of 0. The “ip.hopcount” traffic counter is incremented when a packet is dropped
because of an error. This error is also displayed in the output of the show ip traffic command by the “bad
hop count” traffic counter.
Table 88 describes the significant fields shown in the display.
Field Description
IP:s=10.8.8.1 (Ethernet0/1) The packet source IP address and interface.
d=10.1.1.1, len 28 The packet destination IP address and prefix length.
dispose ip.hopcount This traffic counter increments when an IP packet is dropped
because of an error.
The following is sample output from the debug ip error command enabled with the detail keyword:
debug ip error detail
The detailed output includes layer 4 information in addition to the standard output. The IP error in the
above output was caused when the router received a UDP packet when no application was listening to
the UDP port. The “udp.noport” traffic counter is incremented when the router drops a UDP packet
because of this error. This error is also displayed in the output of the show ip traffic command by the
“no port” traffic counter under “UDP statistics.”
Table 89 describes the significant fields shown in the display.
Field Description
IP:s=10.0.19.100 (Ethernet0/1) The IP packet source IP address and interface.
Field Description
d=10.1.1.1, len 28 The IP packet destination and prefix length.
dispose udp.noport The traffic counter that is incremented when a UDP packet is
dropped because of this error.
The following is sample output from the debug ip error command enabled with the detail and dump
keywords:
debug ip error detail dump
Note The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical
Support. See the caution in the usage guidelines section of this command reference page for more
specific information.
The output from the debug ip error command, when the dump keyword is enabled, provides raw packet
data in hexadecimal and ASCII forms. This addtional output is displayed in addition to the standard
output. The dump keyword can be used with all of the available configuration options of this command.
Table 90 describes the standard output fields shown in the display.
Field Description
IP:s=10.0.19.100 (Ethernet0/1) The IP packet source IP address and interface.
d=10.1.1.1, len 28 The IP packet destination and prefix length.
dispose udp.noport The traffic counter that is incremented when a UDP packet is
dropped because of this error.
Examples The following is sample output from the debug ip flow export command:
Router# debug ip flow export
debug ip ftp
To activate the debugging option to track the transactions submitted during an FTP session, use the
debug ip ftp command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug ip ftp
no debug ip ftp
Usage Guidelines The debug ip ftp command is useful for debugging problems associated with FTP.
Defaults Disabled
Usage Guidelines This command enables debugging messages for all HTTP processes and activity. Issuing this command
is equivalent to issuing the following commands:
• debug ip http authentication
• debug ip http ezsetup
• debug ip http ssi
• debug ip http token
• debug ip http transaction
• debug ip http url
Examples For sample output and field descriptions of this command, see the documentation of the commands listed
in the “Usage Guidelines” section.
Command Description
debug ip http transaction Displays HTTP server transaction processing.
debug ip http url Displays the URLs accessed from the router.
ip http server Enables the HTTP 1.1 server, including the Cisco web
browser user interface.
Usage Guidelines The debug ip http authentication command displays the authentication method the router attempted
and authentication-specific status messages.
Examples The following is sample output from the debug ip http authentication command:
Router# debug ip http authentication
Field Description
Authentication for url Provides information about the URL in different forms.
Authentication username Identifies the user.
priv-level Indicates the user privilege level.
auth-type Indicates the authentication method.
Usage Guidelines Use the debug ip http ezsetup command to verify the EZ Setup actions without changing the
configuration of the router.
EZ Setup is a form you fill out to perform basic router configuration from most HTML browsers.
Examples The following is sample output from the debug ip http ezsetup that shows the configuration changes
for the router when the EZ Setup form has been submitted:
Router# debug ip http ezsetup
Examples The following is sample output from the debug ip http ssi command:
Router# debug ip http ssi
The following line shows the contents of the SSI EXEC command:
HTML: filtered command ‘exec cmd="show users"’
The following line indicates the type of SSI command that was requested:
HTML: SSI command ‘exec’
The following line shows the argument show users assigned to the tag cmd:
HTML: SSI tag ’cmd’ = "show users"
The following line indicates that the show users command is being executed in EXEC mode:
HTML: Executing CLI ‘show users’ in mode ‘exec’ done
Examples None.
Usage Guidelines Use the debug ip http token command to display low-level HTTP server parsings. To display high-level
HTTP server parsings, use the debug ip http transaction command.
Examples The following is part of a sample output from the debug ip http token command. In this example, the
browser accessed the router’s home page http://router-name/. The output gives the token parsed by the
HTTP server and its length.
Router# debug ip http token
Usage Guidelines Use the debug ip http transaction command to display what the HTTP server is parsing at a high level.
To display what the HTTP server is parsing at a low level, use the debug ip http token command.
Examples The following is sample output from the debug ip http transaction command. In this example, the
browser accessed the router’s home page http://router-name/.
Router# debug ip http transaction
Field Description
HTTP: parsed uri '/' Uniform resource identifier that is requested.
HTTP: client version 1.0 Client HTTP version.
HTTP: parsed extension Referer HTTP extension.
HTTP: parsed line Value of HTTP extension.
http://www.company.com/
HTTP: received GET '' HTTP request method.
Usage Guidelines Use the debug ip http url command to keep track of the URLs that are accessed and to determine from
which hosts the URLs are accessed.
Examples The following output is from the debug ip http url command. In this example, the HTTP server accessed
the URLs and /exec. The output shows the URL being requested and the IP address of the host requesting
the URL.
Router# debug ip http url
debug ip icmp
To display information on Internal Control Message Protocol (ICMP) transactions, use the debug ip
icmp command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug ip icmp
no debug ip icmp
Usage Guidelines This command helps you determine whether the router is sending or receiving ICMP messages. Use it,
for example, when you are troubleshooting an end-to-end connection problem.
Note For more information about the fields in debug ip icmp command output, refer to RFC 792, Internet
Control Message Protocol; Appendix I of RFC 950, Internet Standard Subnetting Procedure; and
RFC 1256, ICMP Router Discovery Messages.
Examples The following is sample output from the debug ip icmp command:
Router# debug ip icmp
Field Description
ICMP: Indication that this message describes an ICMP packet.
rcvd type 3 The type field can be one of the following:
• 0—Echo Reply
• 3—Destination Unreachable
• 4—Source Quench
• 5—Redirect
• 8—Echo
• 9—Router Discovery Protocol Advertisement
• 10—Router Discovery Protocol Solicitations
• 11—Time Exceeded
• 12—Parameter Problem
• 13—Timestamp
• 14—Timestamp Reply
• 15—Information Request
• 16—Information Reply
• 17—Mask Request
• 18—Mask Reply
Field Description
code 1 This field is a code. The meaning of the code depends upon the type
field value, as follows:
• Echo and Echo Reply—The code field is always zero.
• Destination Unreachable—The code field can have the following
values:
0—Network unreachable
1—Host unreachable
2—Protocol unreachable
3—Port unreachable
4—Fragmentation needed and DF bit set
5—Source route failed
• Source Quench—The code field is always 0.
• Redirect—The code field can have the following values:
0—Redirect datagrams for the network
1—Redirect datagrams for the host
2—Redirect datagrams for the command mode of service and
network
3—Redirect datagrams for the command mode of service and host
• Router Discovery Protocol Advertisements and
Solicitations—The code field is always zero.
• Time Exceeded—The code field can have the following values:
0—Time to live exceeded in transit
1—Fragment reassembly time exceeded
• Parameter Problem—The code field can have the following values:
0—General problem
1—Option is missing
2—Option missing, no room to add
• Timestamp and Timestamp Reply—The code field is always zero.
• Information Request and Information Reply—The code field is
always zero.
• Mask Request and Mask Reply—The code field is always zero.
from 10.95.192.4 Source address of the ICMP packet.
Table 94 describes the significant fields shown in the second line of the display.
Field Description
ICMP: Indicates that this message describes an ICMP packet.
src 10.56.10.202 Address of the sender of the echo.
dst 172.69.16.1 Address of the receiving router.
echo reply Indicates that the router received an echo reply.
Other messages that the debug ip icmp command can generate follow.
When an IP router or host sends out an ICMP mask request, the following message is generated when
the router sends a mask reply:
ICMP: sending mask reply (255.255.255.0) to 172.69.80.23 via Ethernet0
The following two lines are examples of the two forms of this message. The first form is generated when
a mask reply comes in after the router sends out a mask request. The second form occurs when the router
receives a mask reply with a nonmatching sequence and ID. Refer to Appendix I of RFC 950, Internet
Standard Subnetting Procedures, for details.
ICMP: mask reply 255.255.255.0 from 172.69.80.31
ICMP: unexpected mask reply 255.255.255.0 from 172.69.80.32
The following output indicates that the router sent a redirect packet to the host at address 172.69.80.31,
instructing that host to use the gateway at address 172.69.80.23 in order to reach the host at destination
address 172.69.1.111:
ICMP: redirect sent to 172.69.80.31 for dest 172.69.1.111 use gw 172.69.80.23
The following message indicates that the router received a redirect packet from the host at address
172.69.80.23, instructing the router to use the gateway at address 172.69.80.28 in order to reach the host
at destination address 172.69.81.34:
ICMP: redirect rcvd from 172.69.80.23 -- for 172.69.81.34 use gw 172.69.80.28
The following message is displayed when the router sends an ICMP packet to the source address
(172.69.94.31 in this case), indicating that the destination address (172.69.13.33 in this case) is
unreachable:
ICMP: dst (172.69.13.33) host unreachable sent to 172.69.94.31
The following message is displayed when the router receives an ICMP packet from an intermediate
address (172.69.98.32 in this case), indicating that the destination address (172.69.13.33 in this case) is
unreachable:
ICMP: dst (172.69.13.33) host unreachable rcv from 172.69.98.32
Depending on the code received (as Table 93 describes), any of the unreachable messages can have any
of the following “strings” instead of the “host” string in the message:
net
protocol
port
frag. needed and DF set
source route failed
prohibited
The following message is displayed when the TTL in the IP header reaches zero and a time exceed ICMP
message is sent. The fields are self-explanatory.
ICMP: time exceeded (time to live) send to 10.95.1.4 (dest was 172.69.1.111)
The following message is generated when parameters in the IP header are corrupted in some way and
the parameter problem ICMP message is sent. The fields are self-explanatory.
ICMP: parameter problem sent to 128.121.1.50 (dest was 172.69.1.111)
Based on the preceding information, the remaining output can be easily understood:
ICMP: parameter problem rcvd 172.69.80.32
ICMP: source quench rcvd 172.69.80.32
ICMP: source quench sent to 128.121.1.50 (dest was 172.69.1.111)
ICMP: sending time stamp reply to 172.69.80.45
ICMP: sending info reply to 172.69.80.12
ICMP: rdp advert rcvd type 9, code 0, from 172.69.80.23
ICMP: rdp solicit rcvd type 10, code 0, from 172.69.80.43
debug ip igmp
To display Internet Group Management Protocol (IGMP) packets received and sent, and IGMP-host
related events, use the debug ip igmp command in privileged EXEC mode. To disable debugging output,
use the no form of this command.
Syntax Description vrf (Optional) Supports the Multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
Usage Guidelines This command helps discover whether the IGMP processes are functioning. In general, if IGMP is not
working, the router process never discovers that another host is on the network that is configured to
receive multicast packets. In dense mode, this situation will result in packets being delivered
intermittently (a few every 3 minutes). In sparse mode, packets will never be delivered.
Use this command in conjunction with the debug ip pim and debug ip mrouting commands to observe
additional multicast activity and to learn the status of the multicast routing process, or why packets are
forwarded out of particular interfaces.
Examples The following is sample output from the debug ip igmp command:
Router# debug ip igmp
The messages displayed by the debug ip igmp command show query and report activity received from
other routers and multicast group addresses.
The following is sample output from the debug ip igmp command when SSM is enabled. Because IGMP
Version 3 lite (IGMP v3lite) requires the host to send IGMP Version 2 (IGMPv2) packets, IGMPv2 host
reports also will be displayed in response to the router IGMPv2 queries. If SSM is disabled, the word
“ignored” will be displayed in the debug ip igmp command output.
IGMP:Received v3-lite Report from 10.0.119.142 (Ethernet3/3), group count 1
IGMP:Received v3 Group Record from 10.0.119.142 (Ethernet3/3) for 232.10.10.10
IGMP:Update source 224.1.1.1
IGMP:Send v2 Query on Ethernet3/3 to 224.0.0.1
IGMP:Received v2 Report from 10.0.119.142 (Ethernet3/3) for 232.10.10.10
IGMP:Update source 224.1.1.1
Usage Guidelines If the IP address of an IGRP neighbor is specified, the resulting debug ip igrp events output includes
messages describing updates from that neighbor and updates that the router broadcasts toward that
neighbor. Messages are not generated for each route.
This command is particularly useful when there are many networks in your routing table. In this case,
using debug ip igrp transactions could flood the console and make the router unusable. Use debug ip
igrp events instead to display summary routing information.
Examples The following is sample output from the debug ip igrp events command:
This shows that the router has sent two updates to the broadcast address 255.255.255.255. The router
also received two updates. Three lines of output describe each of these updates.
The first line indicates whether the router sent or received the update packet, the source or destination
address, and the interface through which the update was sent or received. If the update was sent, the IP
address assigned to this interface is shown (in parentheses).
IGRP: sending update to 255.255.255.255 via Ethernet1 (160.89.33.8)
The second line summarizes the number and types of routes described in the update:
IGRP: Update contains 26 interior, 40 system, and 3 exterior routes.
The third line indicates the total number of routes described in the update:
IGRP: Total routes in update: 69
Usage Guidelines If the IP address of an IGRP neighbor is specified, the resulting debug ip igrp transactions output
includes messages describing updates from that neighbor and updates that the router broadcasts toward
that neighbor.
When many networks are in your routing table, the debug ip igrp transactions command can flood the
console and make the router unusable. In this case, use the debug ip igrp events command instead to
display summary routing information.
Examples The following is sample output from the debug ip igrp transactions command:
The output shows that the router being debugged has received updates from two other routers on the
network. The router at source address 160.89.80.240 sent information about ten destinations in the
update; the router at source address 160.89.80.28 sent information about three destinations in its update.
The router being debugged also sent updates—in both cases to the broadcast address 255.255.255.255
as the destination address.
On the second line the first field refers to the type of destination information: “subnet” (interior),
“network” (system), or “exterior” (exterior). The second field is the Internet address of the destination
network. The third field is the metric stored in the routing table and the metric advertised by the neighbor
sending the information. “Metric... inaccessible” usually means that the neighbor router has put the
destination in a hold down state.
The entries show that the router is sending updates that are similar, except that the numbers in
parentheses are the source addresses used in the IP header. A metric of 16777215 is inaccessible.
Other examples of output that the debug ip igrp transactions command can produce follow.
The following entry indicates that the routing table was updated and shows the new edition number (97
in this case) to be used in the next IGRP update:
IGRP: edition is now 97
Entries such as the following occur on startup or when some event occurs such as an interface making a
transition or a user manually clearing the routing table:
IGRP: broadcasting request on Ethernet0
IGRP: broadcasting request on Ethernet1
The following type of entry can result when routing updates become corrupted between sending and
receiving routers:
IGRP: bad checksum from 172.69.64.43
An entry such as the following should never appear. If it does, the receiving router has a bug in the
software or a problem with the hardware. In either case, contact your technical support representative.
IGRP: system 45 from 172.69.64.234, should be system 109
debug ip inspect
To display messages about Cisco IOS firewall events, use the debug ip inspect command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description function-trace Displays messages about software functions called by the Cisco IOS firewall.
object-creation Displays messages about software objects being created by the Cisco IOS
firewall. Object creation corresponds to the beginning of Cisco IOS
firewall-inspected sessions.
object-deletion Displays messages about software objects being deleted by the Cisco IOS
firewall. Object deletion corresponds to the closing of Cisco IOS
firewall-inspected sessions.
events Displays messages about Cisco IOS firewall software events, including
information about Cisco IOS firewall packet processing.
timers Displays messages about Cisco IOS firewall timer events such as when the
Cisco IOS firewall idle timeout is reached.
protocol Displays messages about Cisco IOS firewall-inspected protocol events,
including details about the packets of the protocol. Table 95 provides a list of
protocol keywords.
detailed Displays detailed information to be displayed for all the other enabled
Cisco IOS firewall debugging. Use this form of the command in conjunction
with other Cisco IOS firewall debug commands.
Examples The following is sample output from the debug ip inspect function-trace command:
Router# debug ip inspect function-trace
This output shows the functions called by the Cisco IOS firewall as a session is inspected. Entries with
an asterisk (*) after the word “CBAC” are entries when the fast path is used; otherwise, the process path
is used.
The following is sample output from the debug ip inspect object-creation and debug ip inspect
object-deletion commands:
Router# debug ip inspect object-creation
Router# debug ip inspect object-deletion
The following is sample output from the debug ip inspect object-creation, debug ip inspect
object-deletion, and debug ip inspect events commands:
Router# debug ip inspect object-creation
Router# debug ip inspect object-deletion
Router# debug ip inspect events
The following is sample output from the debug ip inspect timers command:
Router# debug ip inspect timers
The following is sample output from the debug ip inspect tcp command:
Router# debug ip inspect tcp
*Mar 2 01:20:43: CBAC* sis 25A3604 pak 2541C58 TCP P ack 4223720032 seq 4200176225(22)
(10.0.0.1:46409) => (10.1.0.1:21)
*Mar 2 01:20:43: CBAC* sis 25A3604 ftp L7 inspect result: PROCESS-SWITCH packet
*Mar 2 01:20:43: CBAC sis 25A3604 pak 2541C58 TCP P ack 4223720032 seq 4200176225(22)
(10.0.0.1:46409) => (10.1.0.1:21)
*Mar 2 01:20:43: CBAC sis 25A3604 ftp L7 inspect result: PASS packet
*Mar 2 01:20:43: CBAC* sis 25A3604 pak 2544374 TCP P ack 4200176247 seq 4223720032(30)
(10.0.0. 1:46409) <= (10.1.0.1:21)
*Mar 2 01:20:43: CBAC* sis 25A3604 ftp L7 inspect result: PASS packet
*Mar 2 01:20:43: CBAC* sis 25A3604 pak 25412F8 TCP P ack 4223720062 seq 4200176247(15)
(10.0.0. 1:46409) => (10.1.0.1:21)
*Mar 2 01:20:43: CBAC* sis 25A3604 ftp L7 inspect result: PASS packet
*Mar 2 01:20:43: CBAC sis 25C1CC4 pak 2544734 TCP S seq 4226992037(0) (10.1.0.1:20) =>
(10.0.0.1:46411)
*Mar 2 01:20:43: CBAC* sis 25C1CC4 pak 2541E38 TCP S ack 4226992038 seq 4203405054(0)
(10.1.0.1:20) <= (10.0.0.1:46411)
This sample shows TCP packets being processed and lists the corresponding acknowledge (ACK) packet
numbers and sequence (SEQ) numbers. The number of data bytes in the TCP packet is shown in
parentheses—for example, (22). For each packet shown, the addresses and port numbers are shown
separated by a colon. For example, (10.1.0.1:21) indicates an IP address of 10.1.0.1 and a TCP port
number of 21.
Entries with an asterisk (*) after the word “CBAC” are entries when the fast path is used; otherwise, the
process path is used.
The following is sample output from the debug ip inspect tcp and debug ip inspect detailed commands:
Router# debug ip inspect tcp
Router# debug ip inspect detailed
*Mar 2 01:20:58: CBAC* Pak 2541E38 Find session for (30.0.0.1:46409) (40.0.0.1:21) tcp
*Mar 2 01:20:58: P ack 4223720160 seq 4200176262(22)
*Mar 2 01:20:58: CBAC* Pak 2541E38 Addr:port pairs to match: (30.0.0.1:46409)
(40.0.0.1:21)
*Mar 2 01:20:58: CBAC* sis 25A3604 SIS_OPEN
*Mar 2 01:20:58: CBAC* Pak 2541E38 IP: s=30.0.0.1 (Ethernet0), d=40.0.0.1 (Ethernet1),
len 76,proto=6
*Mar 2 01:20:58: CBAC sis 25A3604 Saving State: SIS_OPEN/ESTAB iisn 4200176160 i_rcvnxt
4223720160 i_sndnxt 4200176262 i_rcvwnd 8760 risn 4223719771 r_rcvnxt 4200176262 r_sndnxt
4223720160 r_rcvwnd 8760
*Mar 2 01:20:58: CBAC* sis 25A3604 pak 2541E38 TCP P ack 4223720160 seq 4200176262(22)
(30.0.0.1:46409) => (40.0.0.1:21)
*Mar 2 01:20:58: CBAC* sis 25A3604 pak 2541E38 SIS_OPEN/ESTAB TCP seq 4200176262(22)
Flags: ACK 4223720160 PSH
*Mar 2 01:20:58: CBAC* sis 25A3604 pak 2541E38 --> SIS_OPEN/ESTAB iisn 4200176160
i_rcvnxt 4223720160 i_sndnxt 4200176284 i_rcvwnd 8760 risn 4223719771 r_rcvnxt 4200176262
r_sndnxt 4223720160 r_rcvwnd 8760
*Mar 2 01:20:58: CBAC* sis 25A3604 L4 inspect result: PASS packet 2541E38
(30.0.0.1:46409) (40.0.0.1:21) bytes 22 ftp
*Mar 2 01:20:58: CBAC sis 25A3604 Restoring State: SIS_OPEN/ESTAB iisn 4200176160
i_rcvnxt 4223
720160 i_sndnxt 4200176262 i_rcvwnd 8760 risn 4223719771 r_rcvnxt 4200176262 r_sndnxt
4223720160 r_rcvwnd 8760
*Mar 2 01:20:58: CBAC* sis 25A3604 ftp L7 inspect result: PROCESS-SWITCH packet
*Mar 2 01:20:58: CBAC* sis 25A3604 ftp L7 inspect result: PROCESS-SWITCH packet
*Mar 2 01:20:58: CBAC* Bump up: inspection requires the packet in the process
path(30.0.0.1) (40.0.0.1)
*Mar 2 01:20:58: CBAC Pak 2541E38 Find session for (30.0.0.1:46409) (40.0.0.1:21) tcp
*Mar 2 01:20:58: P ack 4223720160 seq 4200176262(22)
*Mar 2 01:20:58: CBAC Pak 2541E38 Addr:port pairs to match: (30.0.0.1:46409)
(40.0.0.1:21)
*Mar 2 01:20:58: CBAC sis 25A3604 SIS_OPEN
*Mar 2 01:20:58: CBAC Pak 2541E38 IP: s=30.0.0.1 (Ethernet0), d=40.0.0.1 (Ethernet1), len
76, proto=6
The following is sample output from the debug ip inspect icmp and debug ip inspect detailed
commands:
Router# debug ip inspect icmp
Router# debug ip inspect detailed
1w6d:CBAC* ICMP:sis 81073F0C pak 80F554F0 SIS_OPEN ICMP packet (192.168.133.3:0) =>
(0.0.0.0:0) datalen 56
1w6d:CBAC* sis 81073F0C --> SIS_OPEN (192.168.133.3:0) (0.0.0.0:0)
1w6d:CBAC* sis 81073F0C L4 inspect result:PASS packet 80F554F0 (192.168.133.3:0)
(0.0.0.0:0) bytes 56 icmp
1w6d:CBAC* sis 81073F0C SIS_OPEN
1w6d:CBAC* Pak 80E73AC0 IP:s=0.0.0.0 (Ethernet0), d=192.168.133.3 (Ethernet1), len 98,
proto=1
1w6d:CBAC* ICMP:sis 81073F0C pak 80E73AC0 SIS_OPEN ICMP packet (192.168.133.3:0) <=
(0.0.0.0:0) datalen 56
1w6d:CBAC* sis 81073F0C --> SIS_OPEN (192.168.133.3:0) (0.0.0.0:0)
1w6d:CBAC* sis 81073F0C L4 inspect result:PASS packet 80E73AC0 (0.0.0.0:0) (192.168.133.3:0)
bytes 56 icmp
Syntax Description access-list-number (Optional) The number of an access list in the range from 1 to 99. If an
access list number is specified, debugging occurs only for the routes
permitted by the access list.
Examples The following is sample output from the debug ip mbgp dampening command:
Router# debug ip mbgp dampening
Defaults Logging for multiprotocol BGP-related information in BGP update messages is not enabled.
Examples The following example shows sample debug ip mbgp updates output:
Router# debug ip mbgp updates
debug ip mcache
To display IP multicast fast-switching events, use the debug ip mcache command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
Syntax Description vrf (Optional) Supports the Multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
hostname (Optional) The host name.
group-address (Optional) The group address.
Usage Guidelines Use this command when multicast fast switching appears not to be functioning.
Examples The following is sample output from the debug ip mcache command when an IP multicast route is
cleared:
Router# debug ip mcache
Field Description
MRC Multicast route cache.
Fast-switch flag Route is fast switched.
(172.31.60.185/32) Host route with 32 bits of mask.
off -> on State has changed.
caller ... The code function that activated the state change.
Examples The following is sample output from the debug ip mds ipc packet command:
Router# debug ip mds ipc packet
The following is sample output from the debug ip mds ipc event command:
Router# debug ip mds ipc event
Examples The following is sample output from the debug ip mds mevent command:
Router# debug ip mds mevent
Usage Guidelines Use this command on the line card or Route Processor (RP).
Examples The following is sample output from the debug ip mds process command:
Router# debug ip mds process
debug ip mhbeat
To monitor the action of the heartbeat trap, use the debug ip mhbeat command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug ip mhbeat
no debug ip mhbeat
!
Router(config)# ip multicast heartbeat intervals-of 10
debug ip mobile
To display IP mobility activities, use the debug ip mobile command in privileged EXEC mode.
Usage Guidelines Use the debug ip mobile standby command to troubleshoot redundancy problems.
No per-user debugging output is shown for mobile nodes using the network access identifier (NAI) for
the debug ip mobile host command. Debugging of specific mobile nodes using an IP address is possible
through the access list.
Examples The following is sample output from the debug ip mobile command when foreign agent reverse
tunneling is enabled:
MobileIP:MN 14.0.0.30 deleted from ReverseTunnelTable of Ethernet2/1(Entries 0)
The following is sample output from the debug ip mobile advertise command:
Router# debug ip mobile advertise
Field Description
type Type of advertisement.
len Length of extension (in bytes).
seq Sequence number of this advertisement.
lifetime Lifetime (in seconds).
flags Capital letters represent bits that are set; lowercase letters represent unset
bits.
Care-of address IP address.
Prefix Length ext Number of prefix lengths advertised. This is the bits in the mask of the
interface sending this advertisement. Used for roaming detection.
FA Challenge value Foreign Agent challenge value (randomly generated by the foreign agent.)
The following is sample output from the debug ip mobile host command:
Router# debug ip mobile host
The following is sample output from the debug ip mobile standby command. In this example, the active
home agent receives a registration request from mobile node 20.0.0.2 and sends a binding update to peer
home agent 1.0.0.2:
MobileIP:MN 20.0.0.2 - sent BindUpd to HA 1.0.0.2 HAA 20.0.0.1
MobileIP:HA standby maint started - cnt 1
MobileIP:MN 20.0.0.2 - sent BindUpd id 3780410816 cnt 0 elapsed 0
adjust -0 to HA 1.0.0.2 in grp 1.0.0.10 HAA 20.0.0.1
In this example, the standby home agent receives a binding update for mobile node 20.0.0.2 sent by the
active home agent:
MobileIP:MN 20.0.0.2 - HA rcv BindUpd from 1.0.0.3 HAA 20.0.0.1
Syntax Description detail (Optional) Displays detailed mobile router debug messages.
Usage Guidelines The mobile router operations can be debugged. The following conditions trigger debugging messages:
• Agent discovery
• Registration
• Mobile router state change
• Routes and tunnels created or deleted
• Roaming information
Debugging messages are prefixed with “MobRtr” and detail messages are prefixed with “MobRtrX”.
Examples The following is sample output from the debug ip mobile router command:
Router# debug ip mobile router
The following is sample output from the debug ip mobile router detail command:
Router# debug ip mobile router detail
1d09h: MobRtr: New agent 20.0.0.2 coa 30.0.0.2 int Ethernet3/1 MAC 00b0.8e35.a055
1d09h: MobRtr: Register reason: left home
1d09h: MobRtrX: Extsize 18 add 1 delete 0
1d09h: MobRtrX: Add network 20.0.0.0/8
MobileIP: MH auth ext added (SPI 100) to HA 100.0.0.3
1d09h: MobRtr: Register to fa 20.0.0.2 coa 30.0.0.2 home 100.0.0.1 ha 100.0.0.3 life 120
int Ethernet3/1 flag sbdmgvt cnt 0 id BE804340.447F50A4
1d09h: MobRtr: Status Isolated -> Pending
1d09h: MobRtr: MN rcv accept (0) reply on Ethernet3/1 from 20.0.0.2 lifetime 120
MobileIP: MN 100.0.0.3 - authenticating HA 100.0.0.3 using SPI 100
MobileIP: MN 100.0.0.3 - authenticated HA 100.0.0.3 using SPI 100
1d09h: MobRtr: Status Pending -> Registered
1d09h: MobRtr: Add default gateway 20.0.0.2 (Ethernet3/1)
1d09h: MobRtr: Add default route via 20.0.0.2 (Ethernet3/1)
debug ip mpacket
To display IP multicast packets received and sent, use the debug ip mpacket command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description vrf (Optional) Supports the Multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
detail (Optional) Displays IP header information and MAC address information.
fastswitch (Optional) Displays IP packet information in the fast path.
access-list (Optional) The access list number.
group (Optional) The group name or address.
Defaults The debug ip mpacket command displays all IP multicast packets switched at the process level.
Usage Guidelines This command displays information for multicast IP packets that are forwarded from this router. Use the
access-list or group argument to limit the display to multicast packets from sources described by the
access list or a specific multicast group.
Use this command with the debug ip packet command to display additional packet information.
Note The debug ip mpacket command generates many messages. Use this command with care so that
performance on the network is not affected by the debug message traffic.
Examples The following is sample output from the debug ip mpacket command:
Router# debug ip mpacket 224.2.0.1
Field Description
IP IP packet.
s=10.188.34.54 Source address of the packet.
(Ethernet1) Name of the interface that received the packet.
d=224.2.0.1 Multicast group address that is the destination for this packet.
(Tunnel0) Outgoing interface for the packet.
len 88 Number of bytes in the packet. This value will vary depending on the
application and the media.
mforward Packet has been forwarded.
debug ip mrm
To display Multicast Routing Monitor (MRM) control packet activity, use the debug ip mrm command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ip mrm
no debug ip mrm
Examples The following example is sample output for the debug ip mrm command on the different devices:
On Manager
*Feb 28 16:25:44.009: MRM: Send Beacon for group 239.1.1.1, holdtime 86100 seconds
*Feb 28 16:26:01.095: MRM: Receive Status Report from 10.1.4.2 on Ethernet0
*Feb 28 16:26:01.099: MRM: Send Status Report Ack to 10.1.4.2 for group 239.1.1.1
On Test-Sender
MRM: Receive Test-Sender Request/Local trigger from 1.1.1.1 on Ethernet0
MRM: Send TS request Ack to 1.1.1.1 for group 239.1.2.3
MRM: Send test packet src:2.2.2.2 dst:239.1.2.3 manager:1.1.1.1
On Test-Receiver
MRM: Receive Test-Receiver Request/Monitor from 1.1.1.1 on Ethernet0
MRM: Send TR request Ack to 1.1.1.1 for group 239.1.2.3
MRM: Receive Beacon from 1.1.1.1 on Ethernet0
MRM: Send Status Report to 1.1.1.1 for group 239.1.2.3
MRM: Receive Status Report Ack from 1.1.1.1 on Ethernet0
debug ip mrouting
To display changes to the multicast route (mroute) table, use the debug ip mrouting command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description vrf (Optional) Supports the multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
rpf-events (Optional) Checks the Reverse Path Forwarding (RPF) events of a specified
group.
group (Optional) Group name or address to monitor packet activity of a single
group.
Usage Guidelines This command indicates when the router has made changes to the mroute table. Use the debug ip pim
and debug ip mrouting commands consecutively to obtain additional multicast routing information. In
addition, use the debug ip igmp command to learn why an mroute message is being displayed.
This command generates a substantial amount of output. Use the optional group argument to limit the
output to a single multicast group.
Examples The following is sample output from the debug ip mrouting command:
Router# debug ip mrouting 224.2.0.1
The following lines show that multicast IP routes were deleted from the routing table:
MRT: Delete (10.0.0.0/8, 224.2.0.1)
MRT: Delete (10.4.0.0/16, 224.2.0.1)
MRT: Delete (10.6.0.0/16, 224.2.0.1)
The (*, G) entries are generally created by receipt of an Internet Group Management Protocol (IGMP)
host report from a group member on the directly connected LAN or by a Protocol Independent Multicast
(PIM) join message (in sparse mode) that this router receives from a router that is sending joins toward
the RP. This router will in turn send a join toward the Route Processor (RP) that creates the shared tree
(or RP tree).
MRT: Create (*, 224.2.0.1), if_input NULL
The following lines are an example of creating an (S, G) entry that shows that an IP multicast packet
(mpacket) was received on Ethernet interface 0. The second line shows a route being created for a source
that is on a directly connected LAN. The RPF means “Reverse Path Forwarding,” whereby the router
looks up the source address of the multicast packet in the unicast routing table and determines which
interface will be used to send a packet to that source.
MRT: Create (224.69.15.0/24, 225.2.2.4), if_input Ethernet0, RPF nbr 224.69.61.15
MRT: Create (224.69.39.0/24, 225.2.2.4), if_input Ethernet1, RPF nbr 224.0.0.0
The following lines show that multicast IP routes were added to the routing table. Note the 224.0.0.0 as
the RPF, which means the route was created by a source that is directly connected to this router.
MRT: Create (10.9.0.0/16, 224.2.0.1), if_input Ethernet1, RPF nbr 224.0.0.0
MRT: Create (10.16.0.0/16, 224.2.0.1), if_input Ethernet1, RPF nbr 224.0.0.0
If the source is not directly connected, the neighbor address shown in these lines will be the address of
the router that forwarded the packet to this router.
The shortest path tree state maintained in routers consists of source (S), multicast address (G), outgoing
interface (OIF), and incoming interface (IIF). The forwarding information is referred to as the multicast
forwarding entry for (S, G).
An entry for a shared tree can match packets from any source for its associated group if the packets come
through the proper incoming interface as determined by the RPF lookup. Such an entry is denoted as
(*, G). A (*, G) entry keeps the same information a (S, G) entry keeps, except that it saves the rendezvous
point address in place of the source address in sparse mode or as 24.0.0.0 in dense mode.
Table 99 describes the significant fields shown in the display.
Field Description
MRT Multicast route table.
RPF Reverse Path Forwarding.
nbr Neighbor.
debug ip msdp
To debug Multicast Source Discovery Protocol (MSDP) activity, use the debug ip msdp command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description vrf (Optional) Supports the Multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
peer-address | name (Optional) The peer for which debug events are logged.
detail (Optional) Provides more detailed debugging information.
routes (Optional) Displays the contents of Source-Active messages.
Examples The following is sample output from the debug ip msdp command:
Router# debug ip msdp
MSDP debugging is on
Router#
MSDP: 224.150.44.254: Received 1388-byte message from peer
MSDP: 224.150.44.254: SA TLV, len: 1388, ec: 115, RP: 172.31.3.92
MSDP: 224.150.44.254: Peer RPF check passed for 172.31.3.92, used EMBGP peer
MSDP: 224.150.44.250: Forward 1388-byte SA to peer
MSDP: 224.150.44.254: Received 1028-byte message from peer
MSDP: 224.150.44.254: SA TLV, len: 1028, ec: 85, RP: 172.31.3.92
MSDP: 224.150.44.254: Peer RPF check passed for 172.31.3.92, used EMBGP peer
MSDP: 224.150.44.250: Forward 1028-byte SA to peer
MSDP: 224.150.44.254: Received 1388-byte message from peer
MSDP: 224.150.44.254: SA TLV, len: 1388, ec: 115, RP: 172.31.3.111
MSDP: 224.150.44.254: Peer RPF check passed for 172.31.3.111, used EMBGP peer
MSDP: 224.150.44.250: Forward 1388-byte SA to peer
MSDP: 224.150.44.250: Received 56-byte message from peer
MSDP: 224.150.44.250: SA TLV, len: 56, ec: 4, RP: 205.167.76.241
MSDP: 224.150.44.250: Peer RPF check passed for 205.167.76.241, used EMBGP peer
MSDP: 224.150.44.254: Forward 56-byte SA to peer
Field Description
MSDP Protocol being debugged.
224.150.44.254: IP address of the MSDP peer.
Received 1388-byte message MSDP event.
from peer
Syntax Description vrf (Optional) Supports the Multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
debug ip nat
To display information about IP packets translated by the IP Network Address Translation (NAT)
feature, use the debug ip nat command in privileged EXEC mode. To disable debugging output, use the
no form of this command.
Syntax Description access-list (Optional) The standard IP access list number. If the datagram is not
permitted by the specified access list, the related debugging output is
suppressed.
detailed (Optional) Displays debug information in a detailed format.
h323 (Optional) Displays H.225 and H.245 protocol information.
ipsec (Optional) Displays IP Security (IPSec) packet information.
pptp (Optional) Displays Point-to-Point Tunneling Protocol (PPTP) information.
sip (Optional) Displays Session Initiation Protocol (SIP) information.
vrf (Optional) Displays Virtual Private Network (VPN) routing and forwarding
(VRF) traffic-related information.
Usage Guidelines The NAT feature reduces the need for unique, registered IP addresses. It can also save private network
administrators from needing to renumber hosts and routers that do not conform to global IP addressing.
Use the debug ip nat command to verify the operation of the NAT feature by displaying information
about every packet that is translated by the router. The debug ip nat detailed command generates a
description of each packet considered for translation. This command also outputs information about
certain errors or exceptional conditions, such as the failure to allocate a global address. To display
messages related to the processing of H.225 signaling and H.245 messages, use the debug ip nat h323
command. To display messages related to the processing of SIP messages, use the debug ip nat sip
command. To display messages related to the processing of VRF messages, use the debug ip nat vrf
command.
Caution Because the debug ip nat command generates a substantial amount of output, use it only when traffic
on the IP network is low, so other activity on the system is not adversely affected.
Examples The following is sample output from the debug ip nat command. In this example, the first two lines show
the debugging output produced by a Domain Name System (DNS) request and reply. The remaining lines
show the debugging output from a Telnet connection from a host on the inside of the network to a host
on the outside of the network. All Telnet packets, except for the first packet, were translated in the fast
path, as indicated by the asterisk (*).
Router# debug ip nat
Field Description
NAT: Indicates that the packet is being translated by the NAT feature.
An asterisk (*) indicates that the translation is occurring in the
fast path. The first packet in a conversation always goes through
the slow path (that is, it is process switched). The remaining
packets go through the fast path if a cache entry exists.
s=192.168.1.95->172.31.233.209 Source address of the packet and how it is being translated.
d=172.31.2.132 Destination address of the packet.
[6825] IP identification number of the packet. Might be useful in the
debugging process to correlate with other packet traces from
protocol analyzers.
The following is sample output from the debug ip nat detailed command. In this example, the first two
lines show the debugging output produced by a DNS request and reply. The remaining lines show the
debugging output from a Telnet connection from a host on the inside of the network to a host on the
outside of the network. In this example, the inside host 192.168.1.95 was assigned the global address
172.31.233.193.
Router# debug ip nat detailed
The following is sample output from the debug ip nat h323 command. In this example, an H.323 call is
established between two hosts, one host on the inside and the other one on the outside. The debug
displays the H.323 messages names that NAT recognizes and the embedded IP addresses contained in
those messages.
Router# debug ip nat h323
Field Description
NAT: Indicates that the packet is being translated by the NAT feature.
H.225 and H.245: Protocol of the packet.
[1] Indicates that the packet is moving from a host inside the network
to one outside the network.
[0] Indicates that the packet is moving from a host outside the network
to one inside the network.
The following is sample output from the debug ip nat ipsec command:
Router# debug ip nat ipsec
5d21h:NAT:new IKE going In->Out, source addr 192.168.122.35, destination addr
192.168.22.20, initiator cookie
0x9C42065D
5d21h:NAT:IPSec:created In->Out ESP translation IL=192.168.122.35 SPI=0xAAE32A0A,
IG=192.168.22.40, OL=192.168.22.20,
OG=192.168.22.20
5d21h:NAT:IPSec:created Out->In ESP translation OG=192.168.22.20 SPI=0xA64B5BB6,
OL=192.168.22.20, IG=192.168.22.40,
IL=192.168.122.35
OG=192.168.22.20
5d21h:NAT:IPSec:Inside host (IL=192.168.122.20) trying to open an ESP connection to
Outside host (OG=192.168.22.20),
wait for Out->In reply
5d21h:NAT:IPSec:created Out->In ESP translation OG=192.168.22.20 SPI=0x1B201366,
OL=192.168.22.20, IG=192.168.22.40,
IL=192.168.122.20
The following is sample output from the debug ip nat sip command. In this example, one IP phone
registers with a Cisco SIP proxy and then calls another IP phone. The debug output displays the SIP
messages that NAT recognizes and the embedded IP addresses contained in those messages.
Router# debug ip nat sip
Field Description
NAT: Indicates that the packet is being translated by the NAT feature.
SIP: Protocol of the packet.
[1] Indicates that the packet is moving from a host inside the network
to one outside the network.
[0] Indicates that the packet is moving from a host outside the network
to one inside the network.
The following is sample output from the debug ip nat vrf command:
Router# debug ip nat vrf
Field Description
vrf=> Indicates NAT is applied to a particular VPN.
Examples The following is sample output from the debug ip ospf events command:
Router# debug ip ospf events
The debug ip ospf events output shown might appear if any of the following situations occurs:
• The IP subnet masks for routers on the same network do not match.
• The OSPF hello interval for the router does not match that configured for a neighbor.
• The OSPF dead interval for the router does not match that configured for a neighbor.
If a router configured for OSPF routing is not seeing an OSPF neighbor on an attached network, perform
the following tasks:
• Make sure that both routers have been configured with the same IP mask, OSPF hello interval, and
OSPF dead interval.
• Make sure that both neighbors are part of the same area type.
In the following example line, the neighbor and this router are not part of a stub area (that is, one is a
part of a transit area and the other is a part of a stub area, as explained in RFC 1247):
OSPF: hello packet with mismatched E bit
Examples In the following example, information about traffic engineering advertisements is printed in OSPF LSA
messages:
Router# debug ip ospf mpls traffic-eng advertisements
Field Description
Link ID Index of the link being described.
Interface Address Address of the interface.
Neighbor Address Address of the neighbor.
Admin Metric Administrative weight associated with this link.
Maximum bandwidth Bandwidth capacity of the link (kbps).
Maximum reservable bandwidth Amount of reservable bandwidth on this link.
Number of Priority Number of priority levels for which bandwidth is advertised.
Priority Bandwidth available at indicated priority level.
Affinity Bit Attribute flags of the link that are being flooded.
Examples The following is sample output from the debug ip ospf packet command:
Router# debug ip ospf packet
The debug ip ospf packet command produces one set of information for each packet received. The
output varies slightly depending on which authentication is used. The following is sample output from
the debug ip ospf packet command when message digest algorithm 5 (MD5) authentication is used.
Router# debug ip ospf packet
Field Description
v: OSPF version.
t: OSPF packet type. Possible packet types follow:
• 1—Hello
• 2—Data description
• 3—Link state request
• 4—Link state update
• 5—Link state acknowledgment
l: OSPF packet length in bytes.
rid: OSPF router ID.
aid: OSPF area ID.
chk: OSPF checksum.
Field Description
aut: OSPF authentication type. Possible authentication types follow:
• 0—No authentication
• 1—Simple password
• 2—MD5
keyid: MD5 key ID.
seq: Sequence number.
Usage Guidelines The debug ip ospf spf statistic command displays the SPF calculation times in milliseconds, the node
count, and a time stamp.
Examples The following is sample output from the debug ip ospf spf statistic command:
Router# debug ip ospf spf statistic
Field Description
Begin SPF at Absolute time in milliseconds when SPF is started.
process time Cumulative time since the process has been created.
spf_time Last time SPF was run or an event has happened to run SPF.
wait_interval Time waited to run SPF.
End SPF at Absolute time in milliseconds when SPF had ended.
Total elapsed time Total time take to run SPF.
Intra: Time taken to process intra-area link-state advertisements (LSAs).
Field Description
Inter: Time taken to process interarea LSAs.
External: Time taken to process external LSAs.
R: Number of router LSAs.
N: Number of network LSAs.
Stubs: Number of stub links.
SN: Number of summary network LSAs.
SA: Number of summary LSAs describing autonomous system
boundary routers (ASBRs).
X5: Number of external type 5 LSAs.
X7: Number of external type 7 LSAs.
SPF suspends: intra Number of times process is suspended during intra-area SPF run.
total Total number of times process is suspended during SPF run.
debug ip packet
To display general IP debugging information and IP security option (IPSO) security transactions, use the
debug ip packet command in privileged EXEC mode. To disable debugging output, use the no form of
this command.
Syntax Description access-list-number (Optional) The IP access list number that you can specify. If the
datagram is not permitted by that access list, the related debugging
output is suppressed. Standard, extended, and expanded access lists
are supported. The range of standard and extended access lists is from
1 to 199. The range of expanded access lists is from 1300 to 2699.
detail (Optional) Displays detailed IP packet debugging information. This
information includes the packet types and codes as well as source and
destination port numbers.
dump (Hidden) Displays IP packet debugging information along with raw
packet data in hexadecimal and ASCII forms. This keyword can be
enabled with individual access lists and also with the detail keyword.
Note The dump keyword is not fully supported and should be used
only in collaboration with Cisco Technical Support. See the
caution notes below, in the usage guidelines, for more
specific information.
Usage Guidelines If a communication session is closing when it should not be, an end-to-end connection problem can be
the cause. The debug ip packet command is useful for analyzing the messages traveling between the
local and remote hosts. IP packet debugging captures the packets that are process switched including
received, generated and forwarded packets. IP packets that are switched in the fast path are not captured.
IPSO security transactions include messages that describe the cause of failure each time a datagram fails
a security test in the system. This information is also sent to the sending host when the router
configuration allows it.
Caution Because the debug ip packet command generates a substantial amount of output and uses a substantial
amount of system resources, this command should be used with caution in production networks. It
should only be enabled when traffic on the IP network is low, so other activity on the system is not
adversely affected. Enabling the detail and dump keywords use the highest level of system resources of
the available configuration options for this command, so a high level of caution should be applied when
enabling either of these keywords.
Caution The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical
Support. Because of the risk of using significant CPU utilization, the dump keyword is hidden from the
user and cannot be seen using the “?” prompt. The length of the displayed packet information may
exceed the actual packet length and include additional padding bytes that do not belong to the IP packet.
Also note that the beginning of a packet may start at different locations in the dump output depending
on the specific router, interface type, and packet header processing that may have occurred before the
output is displayed.
Examples The following is sample output from the debug ip packet command:
debug ip packet
IP packet debugging is on
The output shows two types of messages that the debug ip packet command can produce; the first line
of output describes an IP packet that the router forwards, and the third line of output describes a packet
that is destined for the router. In the third line of output, rcvd 2 indicates that the router decided to receive
the packet.
Table 108 describes the significant fields shown in the output.
Field Description
IP: Indicates that this is an IP packet.
s=172.69.13.44 (Fddi0) Indicates the source address of the packet and the name of the
interface that received the packet.
d=10.125.254.1 (Serial2) Indicates the destination address of the packet and the name of the
interface (in this case, S2) through which the packet is being sent out
on the network.
g=172.69.16.2 Indicates the address of the next-hop gateway.
forward Indicates that the router is forwarding the packet. If a filter denies a
packet, “access denied” replaces “forward,” as shown in the last line
of output.
The following is sample output from the debug ip packet command enabled with the detail keyword:
debug ip packet detail
The format of the output with detail keyword provides additional information, such as the packet type,
code, some field values, and source and destination port numbers.
Table 109 describes the significant fields shown in the output.
Field Description
CEF: Indicates that the IP packet is being processed by CEF.
IP: Indicates that this is an IP packet.
s=10.4.9.6 (FastEthernet0/0) Indicates the source address of the packet and the name of the
interface that received the packet.
d=10.4.9.151 (FastEthernet03) Indicates the destination address of the packet and the name of the
interface through which the packet is being sent out on the network.
TCP src= Indicates the source TCP port number.
dst= Indicates the destination TCP port number.
seq= Value from the TCP packet sequence number field./
ack= Value from the TCP packet acknowledgement field.
ICMP type= Indicates ICMP packet type.
code= Indicates ICMP return code.
The following is sample output from the debug ip packet command enabled with the dump keyword:
debug ip packet dump
Note The dump keyword is not fully supported and should be used only in collaboration with Cisco Technical
Support. See the caution in the usage guidelines section of this command reference page for more
specific information.
The output from the debug ip packet command, when the dump keyword is enabled, provides raw
packet data in hexadecimal and ASCII forms. This addtional output is displayed in addition to the
standard output. The dump keyword can be used with all of the available configuration options of this
command.
Table 110 describes the standard output fields shown.
Field Description
IP: Indicates that this is an IP packet.
s=10.4.9.6 (FastEthernet0/0) Indicates the source address of the packet and the name of the
interface that received the packet.
d=10.4.9.4 (FastEthernet0/0) Indicates destination address and length of the packet and the name
len 13 of the interface through which the packet is being sent out on the
network.
sending Indicates that the router is sending the packet.
The calculation on whether to send a security error message can be somewhat confusing. It depends upon
both the security label in the datagram and the label of the incoming interface. First, the label contained
in the datagram is examined for anything obviously wrong. If nothing is wrong, assume the datagram to
be correct. If something is wrong, the datagram is treated as unclassified genser. Then the label is
compared with the interface range, and the appropriate action is taken, as Table 111 describes.
The security code can only generate a few types of Internet Control Message Protocol (ICMP) error
messages. The only possible error messages and their meanings follow:
• ICMP Parameter problem, code 0—Error at pointer
• ICMP Parameter problem, code 1—Missing option
• ICMP Parameter problem, code 2—See Note that follows
• ICMP Unreachable, code 10—Administratively prohibited
Note The message “ICMP Parameter problem, code 2” identifies a specific error that occurs in the processing
of a datagram. This message indicates that the router received a datagram containing a maximum length
IP header but no security option. After being processed and routed to another interface, it is discovered
that the outgoing interface is marked with “add a security label.” Because the IP header is already full,
the system cannot add a label and must drop the datagram and return an error message.
When an IP packet is rejected due to an IP security failure, an audit message is sent via Department of
Defense Intelligence Information System Network Security for Information Exchange (DNSIX)
Network Address Translation (NAT). Also, any debug ip packet output is appended to include a
description of the reason for rejection. This description can be any of the following:
• No basic
• No basic, no response
• Reserved class
• Reserved class, no response
• Class too low, no response
• Class too high
• Class too high, bad authorities, no response
• Unrecognized class
• Unrecognized class, no response
• Multiple basic
• Multiple basic, no response
• Authority too low, no response
• Authority too high
• Compartment bits not dominated by maximum sensitivity level
Syntax Description data (Optional) Enables debugging for PGM sent (ODATA) and re-sent
(RDATA) data packets.
nak (Optional) Enables debugging for PGM negative acknowledgment
(NAK) data packets, NAK confirmation (NCF) data packets, and
Null NAK (NNAK) data packets.
spm (Optional) Enables debugging for PGM source path messages
(SPMs).
Defaults Debugging for PGM Host is not enabled. If the debug ip pgm host command is used with no additional
keywords, debugging is enabled for all PGM Host message types.
Examples The following is sample output from the debug ip pgm host command:
Router# debug ip pgm host
The following is sample output from the debug ip pgm host command when the data keyword is used:
Router# debug ip pgm host data
The following example shows output of the debug ip pgm host command when the nak keyword is used.
In the following example, the host sends a NAK to the source for a missing packet and the source returns
an NCF to the host followed by an RDATA data packet.
Router# debug ip pgm host nak
The following is sample output from the debug ip pgm host command with the spm keyword is used:
Router# debug ip pgm host spm
Syntax Description spm (Optional) Enables debugging for Source Path Messages (SPMs).
nak (Optional) Enables debugging for negative acknowledgments (NAKs), NAK
confirmations (NCFs), and Null NAKs (NNAKs).
data (Optional) Enables debugging for Retransmissions (RDATA).
Defaults Debugging for PGM is not enabled. If the debug ip pgm router command is used with no additional
keywords, debugging is enabled for all PGM message types.
Examples The following shows sample output from the debug ip pgm router command:
Router# debug ip pgm router
SPM debugging is on
NAK/NNAK/NCF debugging is on
RDATA debugging is on
The following shows sample output from the debug ip pgm router command when the spm keyword is
used:
Router# debug ip pgm router spm
The following example shows output of the debug ip pgm router command with the data keyword. The
debugging message is for an RDATA packet for which the router has only anticipated state, sqn 1991.
Because it did not actually get a NAK, this RDATA is not forwarded by the PGM router.
Router# debug ip pgm router data
debug ip pim
To display Protocol Independent Multicast (PIM) packets received and sent, and to display PIM-related
events, use the debug ip pim command in privileged EXEC mode. To disable debugging output, use the
no form of this command.
Syntax Description vrf (Optional) Supports the multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
group (Optional) The group name or address to monitor the packet activity of a
single group.
df (Optional) When bidirectional PIM is used, displays all designated
forwarder (DF) election messages.
rp-address (Optional) The rendezvous point IP address.
hello (Optional) Enables you to send PIM hello messages to be sent every few
milliseconds.
Usage Guidelines PIM uses Internet Group Management Protocol (IGMP) packets to communicate with routers and
advertise reachability information.
Use this command with the debug ip igmp and debug ip mrouting commands to display additional
multicast routing information.
Examples The following is sample output from the debug ip pim command:
Router# debug ip pim 224.2.0.1
The following lines appear periodically when PIM is running in sparse mode and indicate to this router
the multicast groups and multicast sources in which other routers are interested:
PIM: Received Join/Prune on Ethernet1 from 172.16.37.33
PIM: Received Join/Prune on Ethernet1 from 172.16.37.33
The following lines appear when a rendezvous point (RP) message is received and the RP timer is reset.
The expiration timer sets a checkpoint to make sure the RP still exists. Otherwise, a new RP must be
discovered.
PIM: Received RP-Reachable on Ethernet1 from 172.16.20.31
PIM: Update RP expiration timer for 224.2.0.1
PIM: Forward RP-reachability packet for 224.2.0.1 on Tunnel0
The prune message in the following line states that this router is not interested in the Source-Active (SA)
information. This message tells an upstream router to stop forwarding multicast packets from this
source.
PIM: Prune-list (10.221.196.51/32, 224.2.0.1)
In the following line, a second router on the network wants to override the prune message that the
upstream router just received. The timer is set at a random value so that if additional routers on the
network still want to receive multicast packets for the group, only one will actually send the message.
The other routers will receive the join message and then suppress sending their own message.
PIM: Set join delay timer to 2 seconds for (10.221.0.0/16, 224.2.0.1) on Ethernet1
In the following line, a join message is sent toward the RP for all sources:
PIM: Join-list: (*, 224.2.0.1) RP 172.16.20.31
In the following lines, the interface is being added to the outgoing interface (OIF) of the (*, G) and
(S, G) multicast route (mroute) table entry so that packets from the source will be forwarded out that
particular interface:
PIM: Add Tunnel0 to (*, 224.2.0.1), Forward state
PIM: Add Tunnel0 to (10.0.0.0/8, 224.2.0.1), Forward state
The following line appears in sparse mode only. There are two trees on which data may be received: the
RP tree and the source tree. In dense mode there is no RP. After the source and the receiver have
discovered one another at the RP, the first-hop router for the receiver will usually join to the source tree
rather than the RP tree.
PIM: Prune-list (172.16.84.16/28, 224.2.0.1) RP-bit set RP 172.16.84.16
The send prune message in the next line shows that a router is sending a message to a second router
saying that the first router should no longer receive multicast packets for the (S, G). The RP at the end
of the message indicates that the router is pruning the RP tree and is most likely joining the source tree,
although the router may not have downstream members for the group or downstream routers with
members of the group. The output shows the specific sources from which this router no longer wants to
receive multicast messages.
PIM: Send Prune on Ethernet1 to 172.16.37.6 for (172.16.84.16/28, 224.2.0.1), RP
The following lines indicate that a prune message is sent toward the RP so that the router can join the
source tree rather than the RP tree:
PIM: For RP, Prune-list: 10.9.0.0/16
PIM: For RP, Prune-list: 10.16.0.0/16
PIM: For RP, Prune-list: 10.49.0.0/16
In the following line, a periodic message is sent toward the RP. The default period is once per minute.
Prune and join messages are sent toward the RP or source rather than directly to the RP or source. It is
the responsibility of the next hop router to take proper action with this message, such as continuing to
forward it to the next router in the tree.
PIM: Send periodic Join/Prune to RP via 172.16.37.6 (Ethernet1)
Field Description
PIM Protocol Independent Multicast.
10.221.196.51/32 Host route with 32 bits of mask.
Examples The following sample output shows a new group being created and the router toward the rendezvous
point (RP) opening a new virtual circuit (VC). Because there are now two groups on this router, there
are two VCs open, as reflected by the “current count.”
The following is sample output from the debug ip pim atm command:
Router# debug ip pim atm
Field Description
Jan 28 19:05:51 Current date and time (in hours:minutes:seconds).
PIM-ATM Indicates what PIM is doing to set up or monitor an ATM connection
(vc).
current count Current number of open virtual circuits.
Syntax Description vrf (Optional) Supports the Multicast Virtual Private Network (VPN) routing
and forwarding (VRF) instance.
vrf-name (Optional) Name assigned to the VRF.
Examples The following is sample output from the debug ip pim auto-rp command:
Router# debug ip pim auto-rp
The first two lines show a packet received from 172.16.214.66 announcing that it is the RP for the groups
in 192.168.248.0/24. This announcement contains one RP address and is valid for 180 seconds. The
RP-mapping agent then updates its mapping database to include the new information.
Auto-RP: Received RP-announce, from 172.16.214.66, RP_cnt 1, holdtime 180 secs
Auto-RP: update (192.168.248.0/24, RP:172.16.214.66)
In the next five lines, the router creates an RP-discovery packet containing three RP mapping entries.
The packet is sent to the well-known CISCO-RP-DISCOVERY group address (224.0.1.40).
Auto-RP: Build RP-Discovery packet
Auto-RP: Build mapping (192.168.248.0/24, RP:172.16.214.66),
Auto-RP: Build mapping (192.168.250.0/24, RP:172.16.214.26).
Auto-RP: Build mapping (192.168.254.0/24, RP:172.16.214.2).
Auto-RP: Send RP-discovery packet (3 RP entries)
The final three lines show the router announcing that it intends to be an RP for the groups in
192.168.254.0/24. Only routers inside the scope “ttl 8” receive the advertisement and use the RP for
these groups.
Auto-RP: Build RP-Announce packet for 172.16.214.2
Auto-RP: Build announce entry for (192.168.254.0/24)
Auto-RP: Send RP-Announce packet, IP source 172.16.214.2, ttl 8
The following is sample output from the debug ip pim auto-rp command when a router receives an
update. In this example, the packet contains three group-to-RP mappings, which are valid for
180 seconds. The RP-mapping agent then updates its mapping database to include the new information.
Router# debug ip pim auto-rp
debug ip policy
To display IP policy routing packet activity, use the debug ip policy command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
Syntax Description access-list-name (Optional) The name of the access list. Displays packets permitted
by the access list that are policy routed in process level, Cisco
Express Forwarding (CEF), and distributed CEF (DCEF) with
NetFlow enabled or disabled.
If no access list is specified, information about all policy-matched
and policy-routed packets is displayed.
Usage Guidelines After you configure IP policy routing with the ip policy and route-map commands, use the debug ip
policy command to ensure that the IP policy is configured correctly.
Policy routing looks at various parts of the packet and then routes the packet based on certain
user-defined attributes in the packet.
The debug ip policy command helps you determine what policy routing is following. It displays
information about whether a packet matches the criteria, and if so, the resulting routing information for
the packet.
Caution Because the debug ip policy command generates a substantial amount of output, use it only when traffic
on the IP network is low, so other activity on the system is not adversely affected.
Field Description
IP: s= IP source address and interface of the packet being routed.
d= IP destination address of the packet being routed.
len Length of the packet.
g= IP gateway address of the packet being routed.
debug ip rgmp
To log debugging messages sent by a Router-Port Group Management Protocol (RGMP)-enabled router,
use the debug ip rgmp command in privileged EXEC mode. To disable debugging outut, use the no form
of this command.
no debug ip rgmp
Defaults Debugging for RGMP is not enabled. If the debug ip rgmp command is used without arguments,
debugging is enabled for all RGMP message types.
Examples The following example shows output for the debug ip rgmp command:
Router# debug ip rgmp
debug ip rip
To display information on Routing Information Protocol (RIP) routing transactions, use the debug ip rip
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ip rip
no debug ip rip
Examples The following is sample output from the debug ip rip command:
S2550
172.31.0.0 in 16 hops (inaccessible)
default 0.0.0.0, metric 8
The output shows that the router being debugged has received updates from one router at source address
160.89.80.28. That router sent information about five destinations in the routing table update. Notice that
the fourth destination address in the update—131.108.0.0—is inaccessible because it is more than 15
hops away from the router sending the update. The router being debugged also sent updates, in both cases
to broadcast address 255.255.255.255 as the destination.
The second line is an example of a routing table update. It shows how many hops a given Internet address
is from the router.
The entries show that the router is sending updates that are similar, except that the number in parentheses
is the source address encapsulated into the IP header.
Examples of additional output that the debug ip rip command can generate follow.
Entries such as the following appear at startup or when an event occurs such as an interface making a
transition or a user manually clearing the routing table:
RIP: broadcasting general request on Ethernet0
RIP: broadcasting general request on Ethernet1
An entry such as the following is most likely caused by a malformed packet from the sender:
RIP: bad version 128 from 160.89.80.43
debug ip routing
To display information on Routing Information Protocol (RIP) routing table updates and route cache
updates, use the debug ip routing command in privileged EXEC mode. To disable debugging output,
use the no form of this command.
debug ip routing
no debug ip routing
Examples The following is sample output from the debug ip routing command:
Router# debug ip routing
In the following lines, a newly created entry has been added to the IP routing table. The “metric change”
indicates that this entry existed previously, but its metric changed and the change was reported by means
of IGRP. The metric could also be reported via RIP, OSPF, or another IP routing protocol. The numbers
inside the brackets report the administrative distance and the actual metric.
RT: add 172.25.168.0 255.255.255.0 via 172.24.76.30, igrp metric [100/3020]
RT: metric change to 172.25.168.0 via 172.24.76.30, igrp metric [100/3020]
new metric [100/2930]
IP: cache invalidation from 0x115248 0x1378A, new version 5736
“Cache invalidation” means that the fast-switching cache was invalidated due to a routing table change.
“New version” is the version number of the routing table. When the routing table changes, this number
is incriminated. The hexadecimal numbers are internal numbers that vary from version to version and
software load to software load.
In the following output, the “holddown” and “cache invalidation” lines are displayed. Most of the
distance vector routing protocols use “holddown” to avoid typical problems like counting to infinity and
routing loops. If you look at the output of the show ip protocols command you will see the timer values
for “holddown” and “cache invalidation.” “Cache invalidation” corresponds to “came out of holddown.”
“Delete route” is triggered when a better path appears. It removes the old inferior path.
RT: delete route to 172.26.219.0 via 172.24.76.30, igrp metric [100/10816]
RT: no routes to 172.26.219.0, entering holddown
IP: cache invalidation from 0x115248 0x1378A, new version 5737
RT: 172.26.219.0 came out of holddown
debug ip rsvp
Caution Use this command with a small number of tunnels or Resource Reservation Protocol (RSVP)
reservations. Too much data can overload the console.
To display debug messages for RSVP categories, use the debug ip rsvp command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug ip rsvp [all | api | data-pkts | database | dump-messages | events | fast-reroute | filter |
function | handles | messages | msg-mgr | path | policy | proxy | rate-limit | reliable-msg |
resv | routing | sbm | signalling | snmp | summary-refresh | svc | timer | traffic-control | wfq]
no debug ip rsvp
Examples The following commands show how to enable debugging for RSVP categories, signalling and messages:
Router# debug ip rsvp signalling
In the following display, RSVP signalling-related events that include sending and receiving Path and
Resv messages, admitting new reservations, establishing sessions, sending and receiving
acknowledgments (ACKS), and sending and receiving summary refresh messages appear:
Usage Guidelines After you enable RSVP authentication, RSVP logs system error events whenever an authentication check
fails. These events are logged instead of just being displayed when debugging is enabled because they
may indicate potential security attacks. The events are generated when:
• RSVP receives a message that does not contain the correct cryptographic signature. This could be
due to misconfiguration of the authentication key or algorithm on one or more RSVP neighbors, but
it may also indicate an (unsuccessful) attack.
• RSVP receives a message with the correct cryptographic signature, but with a duplicate
authentication sequence number. This may indicate an (unsuccessful) message replay attack.
• RSVP receives a message with the correct cryptographic signature, but with an authentication
sequence number that is outside the receive window. This could be due to a reordered burst of valid
RSVP messages, but it may also indicate an (unsuccessful) message replay attack.
• Failed challenges result from timeouts or bad challenge responses.
Examples The following example shows output from the debug ip rsvp authentication command in which the
authentication type (digest) and the sequence number have been validated:
Router# debug ip rsvp authentication
Note Cisco routers using RSVP authentication on Cisco IOS ideally should have clocks that can be accurately
restored to the correct time when the routers boot. This capability is available on certain Cisco routers
that have clocks with battery backup. For those platforms that do not have battery backup, consider
configuring the router to keep its clock synchronized with a Network Time Protocol (NTP) time server.
Otherwise, if two adjacent routers have been operating with RSVP authentication enabled and one of
them reboots such that its clock goes backward in time, it is possible (but unlikely) the router that did
not reboot will log RSVP authentication sequence number errors.
Examples The following example shows the detailed debug information about RSVP and SBM that is available
when you enable debug mode through the debug ip rsvp detail command:
Router# debug ip rsvp detail
RSVP debugging is on
router2#u
*Dec 31 16:44:29.651: RSVP: send I_AM_DSBM message from 145.2.2.150
*Dec 31 16:44:29.651: RSVP: IP to 224.0.0.17 length=88 checksum=43AF
(Ethernet2)
*Dec 31 16:44:29.651: RSVP: version:1 flags:0000 type:I_AM_DSBM cksum:43AF
ttl:254 reserved:0 length:88
*Dec 31 16:44:29.651: DSBM_IP_ADDR type 1 length 8 : 91020296
*Dec 31 16:44:29.651: HOP_L2 type 1 length 12: 00E01ECE
*Dec 31 16:44:29.651: : 0F760000
*Dec 31 16:44:29.651: SBM_PRIORITY type 1 length 8 : 00000064
*Dec 31 16:44:29.651: DSBM_TIMERS type 1 length 8 : 00000F05
*Dec 31 16:44:29.651: SBM_INFO type 1 length 44: 00000000
*Dec 31 16:44:29.651: : 00240C02 00000007
*Dec 31 16:44:29.651: : 01000006 7F000005
*Dec 31 16:44:29.651: : 00000000 00000000
*Dec 31 16:44:29.655: : 00000000 00000000
*Dec 31 16:44:29.655: : 00000000
To display debugging messages for all RSVP events, use the debug ip rsvp dump-messages command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
Examples The following command shows how to enable debugging for RSVP events:
Router# debug ip rsvp dump-messages
In the following display, notice that a Path message is transmitted and an ACK_DESIRED flag is set for
ID: 0x26 Epoch: 0x76798A. In response, a Resv message is sent and an acknowledgment (ACK) is
issued for ID: 0x26 Epoch: 0x76798A indicating the RSVP state is established on the neighboring
router:
00:37:15:RSVP:version:1 flags:0000 type:PROXY_PATH cksum:0000 ttl:255 reserved:0
length:212
00:37:15: SESSION type 7 length 16:
00:37:15: Destination 140.75.1.1, TunnelId 100, Source 140.20.1.1, Protocol 0, Flags
0000
00:37:15: HOP type 1 length 12:
00:37:15: Neighbor 140.20.1.1, LIH 0x00000000
00:37:15: TIME_VALUES type 1 length 8 :
00:37:15: Refresh period is 30000 msecs
Usage Guidelines You might find it useful to enable the debug cops command when you are using the debug ip rsvp policy
command. Together, these commands generate a complete record of the policy process.
Examples The following example uses only the debug ip rsvp policy command:
Router-1# debug ip rsvp policy
RSVP_POLICY debugging is on
The following example uses both the debug ip rsvp policy and the debug cops commands:
Router-1# debug ip rsvp policy
RSVP_POLICY debugging is on
COPS debugging is on
Examples The following command shows how to enable debugging for RSVP rate-limiting and message manager
events:
Router# debug ip rsvp rate-limit
In the following display, RSVP process information including messages, timers, neighbors IP addresses,
and message IDs, appear:
01:00:19:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_message
01:00:19:RSVP-MSG-MGR (140.4.4.2):Starting timer msg-pacing interval 20
01:00:19:RSVP-MSG-MGR (140.4.4.2):Enqueue element 27000405 of type 3 on msg-pacing TAIL
01:00:19:RSVP-RATE-LIMIT:rsvp_msg_pacing_timer - timer expired
01:00:19:RSVP-MSG-MGR (140.4.4.2):Dequeueing element 27000405 of type 3 from msg-pacing
01:00:19:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_qe:sending psb (qe 27000405)
01:00:21:%LINK-3-UPDOWN:Interface Tunnel100, changed state to up
01:00:22:%LINEPROTO-5-UPDOWN:Line protocol on Interface Tunnel100, changed state to up
01:01:03:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_message
01:01:03:RSVP-MSG-MGR (140.4.4.2):Starting timer msg-pacing interval 20
01:01:03:RSVP-MSG-MGR (140.4.4.2):Enqueue element 27000405 of type 3 on msg-pacing TAIL
01:01:03:RSVP-RATE-LIMIT:rsvp_msg_pacing_timer - timer expired
01:01:03:RSVP-MSG-MGR (140.4.4.2):Dequeueing element 27000405 of type 3 from msg-pacing
01:01:03:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_qe:sending psb (qe 27000405)
01:01:42:RSVP-RATE-LIMIT:rsvp_msg_pacing_send_message
01:01:42:RSVP-MSG-MGR (140.4.4.2):Starting timer msg-pacing interval 20
Examples The following command shows how to enable debugging for RSVP reliable messages events:
Router# debug ip rsvp reliable-msg
In the following display, message IDs, acknowledgments (ACKs), and message processes including
retransmissions, appear:
Usage Guidelines The debug ip rsvp sbm command provides information about messages received, minimal detail about
the content of these messages, and information about state transitions.
Examples The following example shows the detailed debug information about SBM and the SBM and DSBM state
transitions that is available when you enable debug mode through the debug ip rsvp sbm command:
Router# debug ip rsvp sbm
RSVP debugging is on
router2#
*Dec 31 16:45:34.659: RSVP: send I_AM_DSBM message from 145.2.2.150
*Dec 31 16:45:34.659: RSVP: IP to 224.0.0.17 length=88 checksum=9385 (Ethernet2)
*Dec 31 16:45:34.659: RSVP: version:1 flags:0000 type:I_AM_DSBM cksum:9385
ttl:254 reserved:0 length:88
*Dec 31 16:45:34.659: DSBM_IP_ADDR type 1 length 8 : 91020296
*Dec 31 16:45:34.659: HOP_L2 type 1 length 12: 00E01ECE
*Dec 31 16:45:34.659: : 0F760000
*Dec 31 16:45:34.659: SBM_PRIORITY type 1 length 8 : 0029B064
*Dec 31 16:45:34.659: DSBM_TIMERS type 1 length 8 : 00000F05
*Dec 31 16:45:34.659: SBM_INFO type 1 length 44: 00000000
*Dec 31 16:45:34.659: : 00240C02 00000007
*Dec 31 16:45:34.659: : 01000006 7F000005
*Dec 31 16:45:34.659: : 00000000 00000000
*Dec 31 16:45:34.663: : 00000000 00000000
*Dec 31 16:45:34.663: : 00000000
*Dec 31 16:45:34.663:
Examples The following command shows how to enable debugging for RSVP summary-refresh messages events:
Router# debug ip rsvp summary-refresh
In the following output, the IP addresses, the interfaces, the types of RSVP messages (Path and Resv),
message IDs, and epoch identifiers (for routers) for which RSVP summary-refresh events occur are
shown:
01:11:00:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x84
on Ethernet1
01:11:00:RSVP-SREFRESH 140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Created msgid 0x84 for
nbr 140.4.4.2
01:11:02:%LINK-3-UPDOWN:Interface Tunnel100, changed state to up
01:11:03:%LINEPROTO-5-UPDOWN:Line protocol on Interface Tunnel100, changed state to up
01:11:30:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Path, ID:0x4C :Start
using Srefresh to 140.4.4.2
01:11:31:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x84
on Ethernet1
01:11:31:RSVP-SREFRESH:State exists for nbr:140.4.4.2 epoch:0xE1A1B7 msgid:0x84
01:12:00:RSVP-SREFRESH:Preparing to Send Srefresh(es) to 140.4.4.2, 1 IDs Total
01:12:00:RSVP-SREFRESH:Sending 1 IDs in this Srefresh
01:12:00:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Path, ID:0x4C
01:12:01:RSVP-SREFRESH:Incoming message from nbr 140.4.4.2 with epoch:0xE1A1B7 msgid:0x86
on Ethernet1
01:12:01:RSVP-SREFRESH:Rec'd 1 IDs in Srefresh from 140.4.4.2 (on Ethernet1),
epoch:0xE1A1B7 msgid:0x86
01:12:01:RSVP-SREFRESH:140.20.1.1_18->140.75.1.1_100[140.20.1.1]:Resv, ID:0x84
01:12:30:RSVP-SREFRESH:Preparing to Send Srefresh(es) to 140.4.4.2, 1 IDs Total
Note In the preceding output, notice the message IDs that correspond to Path or Resv state being refreshed.
Because the entire message does not have to be transmitted, there is less data and network performance
is improved.
Usage Guidelines Use the debug ip rsvp traffic-control command to troubleshoot compression-related problems.
Examples The following example from the debug ip rsvp traffic-control command shows that compression was
successfully predicted:
Router# debug ip rsvp traffic-control
RSVP debugging is on
The following example from the debug ip rsvp traffic-control command shows that compression was
unsuccessfully predicted because no compression context IDs were available:
Router# debug ip rsvp traffic-control
RSVP debugging is on
Examples The following is an example of output from the debug ip rsvp wfq command:
Router# debug ip rsvp wfq
RSVP debugging is on
IP RSVP debugging is on
IP RSVP debugging (Traffic Control events) is on
IP RSVP debugging (WFQ events) is on
Router#
03:03:23:RSVP-TC:Attempting to install QoS for rsb 6268A538
03:03:23:RSVP-TC:Adding new tcsb 00001A01 for rsb 6268A538
03:03:23:RSVP-TC:Assigning WFQ QoS to tcsb 00001A01
03:03:23:RSVP-TC:Consulting policy for tcsb 00001A01
03:03:23:RSVP-TC:Policy granted QoS for tcsb 00001A01
03:03:23:RSVP-TC:Requesting QoS for tcsb 00001A01
03:03:23:RSVP-TC: ( r = 12500 bytes/s M = 1514 bytes
03:03:23:RSVP-TC: b = 1000 bytes m = 0 bytes )
03:03:23:RSVP-TC: p = 12500 bytes/s Service Level = non-priority
03:03:23:RSVP-WFQ:Requesting a RESERVED queue on Et0/1 for tcsb 00001A01
03:03:23:RSVP-WFQ:Queue 265 allocated for tcsb 00001A01
03:03:23:RSVP-TC:Allocation succeeded for tcsb 00001A01
Router#
Examples The following is sample output from the debug ip rtp header-compression command:
Router# debug ip rtp header-compression
Field Description
context0 Compression state for a connection 0.
expected sequence RTP header compression link sequence (expected).
received sequence RTP header compression link sequence (actually received).
Examples The following is sample output from the debug ip rtp packets command:
Router# debug ip rtp packets
Field Description
id IP identification.
ttl IP time to live (TTL).
len Total UDP length.
debug ip scp
To troubleshoot secure copy (SCP) authentication problems, use the debug ip scp command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ip scp
no debug ip scp
Examples The following example is sample output from the debug ip scp command. In this example, a copy of the
file scptest.cfg from a UNIX host to the router’s running configuration was successful.
Router# debug ip scp
The following example is also sample output from the debug ip scp command, but in this example, the
user has privilege 0 and is therefore denied:
Router# debug ip scp
Usage Guidelines In a live system, the debugging messages for performance, state, signal, and warnings are the most
useful. These show any association or destination address failures and can be used to monitor the
stability of any established associations.
Caution The debug ip sctp api command should not be used in a live system that has any significant amount of
traffic running because it can generate a lot of traffic, which can cause associations to fail.
Examples The following example shows SCTP calls to the API that are being executed and the parameters
associated with these calls:
Router# debug ip sctp api
Field Description
Assoc ID Association identifier.
stream num SCTP stream number.
bptr, dptr Address of the buffer that contains the data, and address of the start of the
data.
datalen Length of the data that the application is sending (the datagram).
context A value that is meaningful to the application. Returned with the datagram if
the datagram ever needs to be retrieved.
lifetime Not used.
unorder flag Specifies that the datagram should be sent as unordered data.
bundle flag Indicates whether the application wants the datagram to be delayed slightly,
trying to bundle it with other data being sent.
max data len Maximum length of data that can be received—the size of the receive buffer.
Usage Guidelines In a live system, the debugging messages for performance, state, signal, and warnings are the most
useful. These show any association or destination address failures and can be used to monitor the
stability of any established associations.
Debug commands other than those for performance, state, signal, and warnings can generate a great deal
of output and therefore can cause associations to fail. These commands should be used only in test
environments or when there are very low amounts of traffic.
Examples The following example shows parameters used to calculate SCTP congestion:
Router# debug ip sctp congestion
Field Description
cwnd Congestion window values for destination address.
rwnd, a_rwnd Receiver window values as defined in RFC 2960.
outstanding Number of bytes outstanding.
Usage Guidelines All initialization chunks are shown, including the INIT, INIT_ACK, COOKIE_ECHO, and
COOKIE_ACK chunks. This debug command can be used to see the chunks associated with any
initialization sequence but does not display data chunks sent once the association is established.
Therefore, it is safe to use in a live system that has traffic flowing when you have trouble with
associations failing and being reestablished.
Examples The following example shows initialization chunks for SCTP associations:
Router# debug ip sctp init
*Mar 1 00:53:07.279: SCTP Test: Attempting to open assoc to remote port 8787...assoc ID is 0
*Mar 1 00:53:07.279: SCTP: Process Assoc Request
*Mar 1 00:53:07.279: SCTP: Assoc 0: dest addr list:
*Mar 1 00:53:07.279: SCTP: addr 10.5.0.4
*Mar 1 00:53:07.279: SCTP: addr 10.6.0.4
*Mar 1 00:53:07.279:
...
*Mar 1 00:53:13.279: SCTP: Assoc 0: Send Init
*Mar 1 00:53:13.279: SCTP: INIT_CHUNK, len 42
*Mar 1 00:53:13.279: SCTP: Initiate Tag: B4A10C4D, Initial TSN: B4A10C4D, rwnd 9000
*Mar 1 00:53:13.279: SCTP: Streams Inbound: 13, Outbound: 13
*Mar 1 00:53:13.279: SCTP: IP Addr: 10.1.0.2
*Mar 1 00:53:13.279: SCTP: IP Addr: 10.2.0.2
*Mar 1 00:53:13.279: SCTP: Supported addr types: 5
*Mar 1 00:53:13.307: SCTP: Process Init
*Mar 1 00:53:13.307: SCTP: INIT_CHUNK, len 42
*Mar 1 00:53:13.307: SCTP: Initiate Tag: 3C2D8327, Initial TSN: 3C2D8327, rwnd 18000
*Mar 1 00:53:13.307: SCTP: Streams Inbound: 13, Outbound: 13
Field Description
Initiate Tag Initiation chunk identifier.
Initial TSN Initial transmission sequence number.
rwnd Receiver window values.
Usage Guidelines More than one IP address parameter can be included in an initialization (INIT) chunk when the INIT
sender is multihomed. Datagrams should be sent to the primary destination addresses unless the network
is experiencing problems, in which case the datagrams should be sent to secondary addresses.
Caution The debug ip sctp multihome command generates one debug line for each datagram sent or received.
It should be used with extreme caution in a live network.
Examples The following example shows source and destination for multihomed addresses:
Router# debug ip sctp multihome
Field Description
s Source address and port.
d Destination address and port.
Usage Guidelines In a live system, the debugging messages for performance, state, signal, and warnings are the most
useful. These show any association or destination address failures and can be used to monitor the
stability of any established associations.
Once enabled, the debug ip sctp performance command displays the average number of chunks and
datagrams being sent and received per second once every 10 seconds. Note that the averages are
cumulative since the last time the statistics were cleared using the clear ip sctp statistics command and
may not accurately reflect the number of datagrams and chunks currently being sent and received at that
particular moment.
SCTP Sent: SCTP Dgrams 5, Chunks 28, Data Chunks 29, ULP Dgrams 29
SCTP Rcvd: SCTP Dgrams 7, Chunks 28, Data Chunks 29, ULP Dgrams 29
Chunks Discarded: 0, Retransmitted 0
SCTP Sent: SCTP Dgrams 6, Chunks 29, Data Chunks 30, ULP Dgrams 30
SCTP Rcvd: SCTP Dgrams 7, Chunks 29, Data Chunks 30, ULP Dgrams 30
Chunks Discarded: 0, Retransmitted 0
Field Description
SCTP Dgrams Datagram sent to or received from the network.
Chunks Includes data chunks and control chunks sent or received.
Data Chunks Data chunks sent or received.
ULP Dgrams Upper-layer protocol (ULP) datagrams, which are datagrams sent to or
received from the ULP or application.
Usage Guidelines The debug ip sctp rcvchunks command shows the following information about received chunks:
• Whether the chunk is for a new datagram or is part of a datagram that is being reassembled
• Whether the datagram is complete after receiving this chunk
• If the datagram is complete, whether the datagram is in sequence within the specified stream and
can be delivered to the upper-layer protocol (ULP)
• The selective acknowledgments (SACKs) that are returned to the remote SCTP peer
• The cumulative transmission sequence number (Cum TSN) that was acknowledged and the number
of fragments included
• Whether the datagram is received by the ULP
Caution The debug ip sctp rcvchunks command generates multiple debug lines for each chunk received. It
should be used with extreme caution in a live network.
Examples In the following example, a segmented datagram is received in two chunks for stream 0 and sequence
number 0. The length of the first chunk is 1452 bytes, and the second is 1 byte. The first chunk indicates
that it is for a new datagram, but the second chunk indicates that it is part of an existing datagram that
is already being reassembled. When the first chunk is processed, it is noted to be in sequence, but is not
complete and so cannot be delivered yet. When the second chunk is received, the datagram is both in
sequence and complete. The application receives the datagram, and a SACK is shown to acknowledge
that both chunks were received with no missing chunks indicated (that is, with no fragments).
Field Description
0 / 0 / 1452 / 2C33D822 Stream number / datagram sequence number / chunk length, in bytes /
chunk transmission sequence number.
Sack Chunk Selective acknowledgment chunk.
ApplRecv Application has received the chunk.
CumTSN Cumulative transmission sequence number that is being acknowledged.
numFrags Number of fragments, or missing chunks.
Usage Guidelines The debug ip sctp rto command shows adjustments that are made to the retransmission timeout value
(shown as retrans in the command output) because of either retransmission of data chunks or
unacknowledged heartbeats.
Caution The debug ip sctp rto command can generate a great deal of output. It should be used with extreme
caution in a live network.
Examples In the following example, there is only one destination address available. Each time the chunk needs to
be retransmitted, the RTO value is doubled.
Router# debug ip sctp rto
Usage Guidelines The debug ip sctp segments command provides the short form of the output about datagrams. For the
verbose form, use the debug ip sctp segmentv command.
Caution The debug ip sctp segments command generates several lines of output for each datagram sent or
received. It should be used with extreme caution in a live network.
Examples The following output shows an example in which an association is established, a few heartbeats are sent,
the remote endpoint fails, and the association is restarted.
Router# debug ip sctp segments
Field Description
s Source address and port.
d Destination address and port.
len Length of chunk, in bytes.
Tag The identifier for an initialization chunk.
TSN Transmission sequence number.
rwnd Receiver window value.
num frags Number of fragments received.
7 / 0 / 100 / 4F2D8236 (Data chunks) Stream number / datagram sequence number / chunk length,
in bytes / chunk transmission sequence number.
Usage Guidelines The debug ip sctp segmentv command provides the verbose form of the output for datagrams. For the
simple form, use the debug ip sctp segments command.
Caution The debug ip sctp segmentv command generates multiple lines of output for each datagram sent and
received. It should be used with extreme caution in a live network.
Examples The following output shows an example in which an association is established, a few heartbeats are sent,
the remote endpoint fails, and the association is restarted:
Router# debug ip sctp segmentv
SCTP: Sent: Assoc 0: s=10.1.0.2 8787, d=10.5.0.4 8787, len 56, ver tag 0
SCTP: INIT_CHUNK, len 42
SCTP: Initiate Tag: B131ED6A, Initial TSN: B131ED6A, rwnd 9000
SCTP: Streams Inbound: 13, Outbound: 13
SCTP: IP Addr: 10.1.0.2
SCTP: IP Addr: 10.2.0.2
SCTP: Supported addr types: 5
SCTP: Recv: Assoc 0: s=10.5.0.4 8787, d=10.1.0.2 8787, len 56, ver tag 0
SCTP: INIT_CHUNK, len 42
SCTP: Initiate Tag: 5516B2F3, Initial TSN: 5516B2F3, rwnd 18000
SCTP: Streams Inbound: 13, Outbound: 13
SCTP: IP Addr: 10.5.0.4
SCTP: IP Addr: 10.6.0.4
SCTP: Supported addr types: 5
SCTP: Sent: Assoc NULL: s=10.1.0.2 8787, d=10.5.0.4 8787, len 136, ver tag 5516B2F3
SCTP: INIT_ACK_CHUNK, len 124
Field Description
s Source address and port.
d Destination address and port.
len Length of chunk, in bytes.
ver tag Verification identifier.
Tag The identifier for an initialization chunk.
TSN Transmission sequence number.
rwnd Receive window value.
Rcv win credit Receive window value. Same as rwnd.
Num frags Number of fragments received.
0/0/100/5516B2F3 (Data chunks) Stream number / datagram sequence number / chunk length,
in bytes / chunk transmission sequence number.
Command Description
show ip sctp association parameters Shows the parameters configured for the association
defined by the association identifier.
show ip sctp association statistics Shows the current statistics for the association defined by
the association identifier.
show ip sctp errors Shows error counts logged by SCTP.
show ip sctp instances Shows all currently defined SCTP instances.
show ip sctp statistics Shows overall statistics counts for SCTP.
show iua as Shows information about the current condition of an
application server.
show iua asp Shows information about the current condition of an
application server process.
Usage Guidelines The debug ip sctp signal command can be used to see if the current associations are stable or not.
Because it generates output only on state transitions, it is safe to use in a live environment. It still should
be used with caution, however, depending on the number of associations being handled by the system
and the stability of the network.
The debug ip sctp state command is often used at the same time as the debug ip sctp signal command.
Using the two commands together gives good insight into the stability of associations.
Examples In the following example, a new association is requested and established. The peer then restarts the
association and notes that the association failed and is being reestablished. The local peer then indicates
that the association has failed because it has tried to retransmit the specified chunk more than the
maximum number of times without success. As a result, the association fails (because of communication
loss) and is terminated. The ULP requests that the association be attempted again, and this attempt
succeeds. A shutdown is then received from the remote peer, and the local peer enters the shutdown
acknowledge sent state, which is followed by the association being terminated. Again, another
association attempt is made and succeeds.
Router# debug ip sctp signal
Router# debug ip sctp state
Usage Guidelines The debug ip sctp sndchunks command provides the following information:
• Application send requests from the local SCTP peer
• Chunks being bundled and sent to the remote peer
• Processing of the selective acknowledgments (SACKs) from the remote peer, indicating which
chunks were successfully received
• Chunks that are marked for retransmission
Caution The debug ip sctp sndchunks command generates large amounts of data if there is any significant
amount of traffic flowing. It should be used with extreme caution in live networks.
Examples The following example shows output for the debug ip sctp sndchunks command for a case in which
data chunks are being sent, with some of them marked for retransmission:
Router# debug ip sctp sndchunks
Field Description
0 / 10412 / 100 / A23134F8 Stream number / datagram sequence number / chunk length, in
bytes / chunk transmission sequence number.
outstanding Number of bytes outstanding to the specified destination
address.
Field Description
CumTSN Cumulative transmission sequence number (TSN).
numFrags Number of fragments sent.
Usage Guidelines The debug ip sctp state command can be used to see if the current associations are stable or not. Because
it generates output only on state transitions, it is safe to use in a live environment. It still should be used
with caution, however, depending on the number of associations being handled by the system and the
stability of the network.
The debug ip sctp state command is often used at the same time as the debug ip sctp signal command.
Using the two commands together gives good insight into the stability of associations.
Examples In the following example, a new association is requested and established. The peer then restarts the
association and notes that the association failed and is being reestablished. The local peer then indicates
that the association has failed because it has tried to retransmit the specified chunk more than the
maximum number of times without success. As a result, the association fails (because of communication
loss) and is terminated. The upper-layer protocol (ULP) requests that the association be attempted again,
and this attempt succeeds. A shutdown is then received from the remote peer, and the local peer enters
the shutdown acknowledge sent state, which is followed by the association being terminated. Again,
another association attempt is made and succeeds.
Router# debug ip sctp signal
Router# debug ip sctp state
Field Description
CLOSED -> SCTP endpoint sends initialization chunk and moves to the
COOKIE_WAIT COOKIE_WAIT state to wait for acknowledgment and a state cookie
from the remote endpoint.
COOKIE_WAIT -> SCTP endpoint returns the state cookie to the remote endpoint and
COOKIE_ECHOED enters COOKIE_ECHOED state.
COOKIE_ECHOED -> SCTP endpoint enters ESTABLISHED state after receiving
ESTABLISHED acknowledgment that the state cookie has been received by the remote
endpoint.
ESTABLISHED -> SCTP endpoint enters SHUTDOWN_ACKSENT state after receiving a
SHUTDOWN_ACKSENT shutdown message and sending a shutdown acknowledgment to the
remote endpoint.
SHUTDOWN_ACKSENT SCTP endpoint enters CLOSED state.
-> CLOSED
Usage Guidelines Many SCTP timers should not be restarted after they have been started once. For these timers, the first
call succeeds in starting the timer, and subsequent calls do nothing until the timer either expires or is
stopped. For example, the retransmission timer is started when the first chunk is sent, but then is not
started again for subsequent chunks when there is outstanding data.
Caution The debug ip sctp timer command generates a significant amount of output. It should be used with
extreme caution in a live network.
Examples The following example shows the starting and stopping of various SCTP timers:
Router# debug ip sctp timer
Field Description
CUMSACK Cumulative selective acknowledgment.
RETRANS Retransmission.
Usage Guidelines In a live system, the debugging messages for performance, state, signal, and warnings are the most
useful. They show any association or destination address failures and can be used to monitor the stability
of established associations.
The debug ip sctp warnings command displays information on any unusual situation that is
encountered. These situations may or may not indicate problems, depending on the particulars of the
situation.
Examples The following example shows some events and conditions that are flagged as warnings:
Router# debug ip sctp warnings
debug ip sd
To display all session directory (SD) announcements received, use the debug ip sd command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ip sd
no debug ip sd
Usage Guidelines This command shows session directory announcements for multicast IP. Use it to observe multicast
activity.
Field Description
SD Session directory event.
Announcement from Address sending the SD announcement.
on Serial0.1 Interface receiving the announcement.
146 bytes Size of the announcement event.
s= Session name being advertised.
i= Information providing a descriptive name for the session.
o= Origin of the session, either an IP address or a name.
Field Description
c= Connect description showing address and number of hops.
m= Media description that includes media type, port number, and ID.
debug ip security
To display IP security option processing, use the debug ip security command in privileged EXEC mode.
To disable debugging output, use the no form of this command.
debug ip security
no debug ip security
Usage Guidelines The debug ip security command displays information for both basic and extended IP security options.
For interfaces where ip security is configured, each IP packet processed for that interface results in
debugging output regardless of whether the packet contains IP security options. IP packets processed for
other interfaces that also contain IP security information also trigger debugging output. Some additional
IP security debugging information is also controlled by the debug ip packet command in privileged
EXEC mode.
Caution Because the debug ip security command generates a substantial amount of output for every IP packet
processed, use it only when traffic on the IP network is low, so other activity on the system is not
adversely affected.
Examples The following is sample output from the debug ip security command:
Router# debug ip security
Field Description
number of BSO Indicates the number of basic security options found in the packet.
idb Provides information on the security configuration for the incoming
interface.
pak Provides information on the security classification of the incoming
packet.
src Indicates the source IP address.
dst Indicates the destination IP address.
The following line indicates that the packet was locally generated, and it has been classified with the
internally significant security level “insert” (0xff) and authority information of 0x0:
idb: NULL
pak: insert (0xff) 0x0
The following line indicates that the packet was received via an interface with dedicated IP security
configured. Specifically, the interface is configured at security level “secret” and with authority
information of 0x0. The packet itself was classified at level “secret” (0x5a) and authority information of
0x10.
idb: secret (0x6) 0x10 to secret (0x6) 0x10, no implicit
def secret (0x6) 0x10
pak: secret (0x5A) 0x10
debug ip slb
To display debugging messages for the Cisco IOS Server Load Balancing (SLB) feature, use the debug
ip slb command in privileged EXEC mode. To disable debug output, use the no form of this command.
Syntax Description conns Displays debugging messages for all connections being handled by
Cisco IOS SLB.
dfp Displays debugging messages for the Cisco IOS SLB DFP and DFP
agents.
icmp Displays all ICMP debugging messages for Cisco IOS SLB.
reals Displays debugging messages for all real servers defined to
Cisco IOS SLB.
all Displays all debugging messages for Cisco IOS SLB.
Usage Guidelines See the following caution before using debug commands.
Caution Because debugging output is assigned high priority in the CPU process, it can render the system
unusable. For this reason, only use debug commands to troubleshoot specific problems or during
troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands
during periods of lower network flows and fewer users. Debugging during these periods reduces the
effect these commands have on other users on the system.
Examples The following example configures a debug session to check all IP IOS SLB parameters:
Router# debug ip slb all
The following example shows Cisco IOS SLB DFP debug output:
Router# debug ip slb dfp
022049 SLB DFP Queue to main queue - type 6 for Agent 161.44.2.3458229
022049 SLB DFP Processing Conn Q unknown MAJOR 80
022049 SLB DFP Reset SLB_DFP_SIDE_QUEUE
022049 SLB DFP select_rc = -1 readset = 0
022049 SLB DFP Sleeping ...
022050 SLB DFP readset = 1
022050 SLB DFP select_rc = 1 readset = 1
022050 SLB DFP Agent 161.44.2.3458229 fd = 0 readset = 1
022050 SLB DFP Message length 44 from Agent 161.44.2.3458229
022050 SLB DFP Agent 161.44.2.3458229 setting Host 17.17.17.17, Bind ID 1 Weight 1
022050 SLB DFP Agent 161.44.2.3458229 setting Host 34.34.34.34, Bind ID 2 Weight 2
022050 SLB DFP Agent 161.44.2.3458229 setting Host 51.51.51.51, Bind ID 3 Weight 3
022050 SLB DFP Processing Q event for Agent 161.44.2.3458229 - WAKEUP
022115 SLB DFP Queue to main queue - type 5 for Agent 161.44.2.3458229
022115 SLB DFP select_rc = -1 readset = 0
022115 SLB DFP Sleeping ...
022116 SLB DFP readset = 1
022116 SLB DFP select_rc = -1 readset = 0
022116 SLB DFP Processing Q event for Agent 161.44.2.3458229 - DELETE
debug ip snat
To display information about IP packets translated by the IP stateful network address translation (SNAT)
feature, use the debug ip snat command in privileged EXEC mode. To disable debugging output, use
the no form of this command.
Usage Guidelines The SNAT feature allows two or more network address translators to function as a translation group. One
member of the translation group handles traffic requiring translation of IP address information. It
informs the backup translator of active flows as they occur. The backup translator can then use
information from the active translator to prepare duplicate translation table entries enabling the backup
translator to become the active translator in the event of a critical failure. Traffic continues to flow
without interruption because the same network address translations are used and the state of those
translations has been previously defined.
Caution Because the debug ip snat command generates a significant amount of output, use it only when traffic
on the IP network is low, so other activity on the system is not adversely affected.
Examples The following is sample output from the debug ip snat command:
Router# debug ip snat detailed
try/entries
2w6d:SNAT(sense):Send SYNC message
2w6d:SNAT (Send):Enqueuing SYNC Message for Router-Id 100
2w6d:SNAT(write2net):192.168.123.2 <---> 192.168.123.3 send message
2w6d:SNAT(write2net):ver 2, id 100, opcode 1, len 68
2w6d:SNAT (readfromnet):Enqueuing SYNC Message msg to readQ
2w6d:SNAT (Receive):Processed SYNC Message from Router-Id:200 for Router-Id:200's
entry/entries
Field Description
SNAT: Indicates that the packet is being translated by the SNAT feature.
DUMP-REQUEST Message Requests for entries after the SNAT router is active.
debug ip socket
To display all state change information for all sockets, use the debug ip socket command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug ip socket
no debug ip socket
Usage Guidelines Use this command to collect information on the socket interface. To get more complete information on
a socket/TCP port pair, use this command in conjunction with the debug ip tcp transactions command.
Because the socket debugging information is state-change oriented, you will not see the debugging
message on a per-packet basis. However, if the connections normally have very short lives (few packet
exchanges during the life cycle of a connection), then socket debugging could become expensive because
of the state changes involved during connection setup and teardown.
Examples The following is sample output from the debug ip socket output from a server process:
Router# debug ip socket
The following is sample output from the debug ip socket command from a client process:
Router# debug ip socket
SOCKET: socket event process: socket 0x60B70220, TCB new state --> FINWAIT1
socket state: SS_ISCONNECTED SS_CANTSENDMORE SS_ISDISCONNECTING
SOCKET: Removed socket 0x60B70220 from process 2 socket list
Field Description
Added socket 0x60B86228 process 40 New socket is opened for process 40.
SOCKET Indicates that this is a SOCKET transaction.
set TCP property TCP_PID Sets the process ID to the TCP associated with the socket.
socket 0x60B86228, TCB 0x60B85E38 Address for the socket/TCP pair.
set TCP property TCP_BIT_NOTIFY Sets the method for how the socket wants to be notified for
an event.
created new socket to TCP, fd 2 Opened a new socket referenced by file descriptor 2 to TCP.
bound socket fd 2 to TCB Bound the socket referenced by file descriptor 2 to TCP.
listen on socket fd 2 Indicates which file descriptor the application is listening to.
closing socket Indicates that the socket is being closed.
socket event process Processed a state change event occurred in the transport
layer.
TCB new state --> FINWAIT1 TCP state machine changed to FINWAIT1. (See the debug ip
tcp transaction command for more information on TCP state
machines.)
Field Description
socket state: SS_ISCONNECTED New SOCKET state flags after the transport event
SS_CANTSENDMORE processing. This socket is still connected, but disconnecting
SS_ISDISCONNECTING is in progress, and it will not send more data to peer.
Possible SOCKET state flags follow:
• SS_NOFDREF
No file descriptor reference for this socket.
• SS_ISCONNECTING
Socket connecting is in progress.
• SS_ISBOUND
Socket is bound to TCP.
• SS_ISCONNECTED
Socket is connected to peer.
• SS_ISDISCONNECTING
Socket disconnecting is in progress.
• SS_CANTSENDMORE
Can’t send more data to peer.
• SS_CANTRCVMORE
Can’t receive more data from peer.
• SS_ISDISCONNECTED
Socket is disconnected. Connection is fully closed.
Removed socket 0x60B86228 from Connection is closed, and the socket is removed from the
process 40 socket list process socket list.
debug ip ssh
To display debugging messages for Secure Shell (SSH), use the debug ip ssh command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug ip ssh
no debug ip ssh
Usage Guidelines Use the debug ssh command to ensure normal operation of the SSH server.
Usage Guidelines The TCP driver is the process that the router software uses to send packet data over a TCP connection.
Remote source-route bridging (RSRB), serial tunneling (STUN), and X.25 switching currently use the
TCP driver.
Using the debug ip tcp driver command together with the debug ip tcp driver-pak command provides
the most verbose debugging output concerning TCP driver activity.
Examples The following is sample output from the debug ip tcp driver command:
Router# debug ip tcp driver
Field Description
TCPDRV359CD8: Unique identifier for this instance of TCP driver activity.
Active open 172.21.80.26 Indication that the router at IP address 172.21.80.26 has initiated a
connection to another router.
:0 TCP port number the initiator of the connection uses to indicate that any
port number can be used to set up a connection.
--> 172.21.80.25 IP address of the remote router to which the connection has been
initiated.
:1996 TCP port number that the initiator of the connection is requesting that
the remote router use for the connection. (1996 is a private TCP port
number reserved in this implementation for RSRB.)
Field Description
OK, Indication that the connection has been established. If the connection
has not been established, this field and the following field do not appear
in this line of output.
lport 36628 TCP port number that has actually been assigned for the initiator to use
for this connection.
The following line indicates that the TCP driver user (RSRB, in this case) will allow TCP to drop the
connection if excessive retransmissions occur:
TCPDRV359CD8: enable tcp timeouts
The following line indicates that the TCP driver user (in this case, RSRB) at IP address 172.21.80.26
(and using TCP port number 36628) is requesting that the connection to IP address 172.21.80.25 using
TCP port number 1996 be aborted:
TCPDRV359CD8: 172.21.80.26:36628 --> 172.21.80.25:1996 Abort
The following line indicates that this connection was in fact closed because of an abnormal termination:
TCPDRV359CD8: 172.21.80.26:36628 --> 172.21.80.25:1996 DoClose tcp abort
Usage Guidelines This command turns on a verbose debugging by logging at least one debugging message for every packet
sent or received on the TCP driver connection.
The TCP driver is the process that the router software uses to send packet data over a TCP connection.
Remote source-rate bridging (RSRB), serial tunneling (STUN), and X.25 switching currently use the
TCP driver.
To observe the context within which certain debug ip tcp driver-pak messages occur, turn on this
command in conjunction with the debug ip tcp driver command.
Caution Because the debug ip tcp driver-pak command generates so many messages, use it only on lightly
loaded systems. This command not only places a substantial load on the system processor, it also may
change the symptoms of any unexpected behavior that occurs.
Examples The following is sample output from the debug ip tcp driver-pak command:
Router# debug ip tcp driver-pak
Field Description
TCPDRV359CD8 Unique identifier for this instance of TCP driver activity.
send Indicates that this event involves the TCP driver sending data.
2E8CD8 Address in memory of the data the TCP driver is sending.
Field Description
(len 26) Length of the data (in bytes).
queued Indicates that the TCP driver user process (in this case, RSRB) has
transferred the data to the TCP driver to send.
The following line indicates that the TCP driver has sent the data that it had received from the TCP driver
user, as shown in the previous line of output. The last field in the line (26) indicates that the 26 bytes of
data were sent out as a single unit.
TCPDRV359CD8: output pak 2E8CD8 (len 26) (26)
The following line indicates that the TCP driver has received 42 bytes of data from the remote IP address.
The TCP driver user (in this case, remote source-route bridging) has established an input threshold of 16
bytes for this connection. (The input threshold instructs the TCP driver to transfer data to the TCP driver
user only when at least 16 bytes are present.)
TCPDRV359CD8: readf 42 bytes (Thresh 16)
Examples The following is sample output from the debug ip tcp intercept command:
Router# debug ip tcp intercept
The router sends more retransmissions trying to establish connections with the apparent clients:
INTERCEPT: retransmit 4 (172.19.160.17:61774) <- (10.1.1.30:23) SYNRCVD
INTERCEPT: retransmit 4 (172.19.160.17:62030) <- (10.1.1.30:23) SYNRCVD
INTERCEPT: retransmit 2 (171.69.232.23:1048) <- (10.1.1.30:23) SYNRCVD
The router establishes the connection with the third client and resends to the server:
INTERCEPT: 1st half of connection is established (171.69.232.23:1048) => (10.1.1.30:23)
INTERCEPT: (171.69.232.23:1048) SYN -> 10.1.1.30:23
INTERCEPT: retransmit 2 (171.69.232.23:1048) -> (10.1.1.30:23) SYNSENT
The router resends to the first two apparent clients, times out, and sends resets:
INTERCEPT: retransmit 8 (172.19.160.17:61774) <- (10.1.1.30:23) SYNRCVD
INTERCEPT: retransmit 8 (172.19.160.17:62030) <- (10.1.1.30:23) SYNRCVD
INTERCEPT: retransmit 16 (172.19.160.17:61774) <- (10.1.1.30:23) SYNRCVD
INTERCEPT: retransmit 16 (172.19.160.17:62030) <- (10.1.1.30:23) SYNRCVD
INTERCEPT: retransmitting too long (172.19.160.17:61774) => (10.1.1.30:23) SYNRCVD
INTERCEPT: 172.19.160.17:61774 <- RST (10.1.1.30:23)
INTERCEPT: retransmitting too long (172.19.160.17:62030) => (10.1.1.30:23) SYNRCVD
INTERCEPT: 172.19.160.17:62030 <- RST (10.1.1.30:23)
Usage Guidelines This command is particularly useful for debugging a performance problem on a TCP/IP network that you
have isolated above the data link layer.
The debug ip tcp transactions command displays output for packets the router sends and receives, but
does not display output for packets it forwards.
Examples The following is sample output from the debug ip tcp transactions command:
Router# debug ip tcp transactions
Field Description
TCP: Indicates that this is a TCP transaction.
sending SYN Indicates that a synchronize packet is being sent.
seq 168108 Indicates the sequence number of the data being sent.
ack 88655553 Indicates the sequence number of the data being
acknowledged.
Field Description
TCP0: Indicates the TTY number (0, in this case) with which this TCP
connection is associated.
Connection to 10.9.0.13:22530 Indicates the remote address with which a connection has been
established.
advertising MSS 966 Indicates the maximum segment size this side of the TCP
connection is offering to the other side.
state was LISTEN -> SYNRCVD Indicates that the TCP state machine changed state from
LISTEN to SYNSENT. Possible TCP states follow:
• CLOSED—Connection closed.
• CLOSEWAIT—Received a FIN segment.
• CLOSING—Received a FIN/ACK segment.
• ESTAB—Connection established.
• FINWAIT 1—Sent a FIN segment to start closing the
connection.
• FINWAIT 2—Waiting for a FIN segment.
• LASTACK—Sent a FIN segment in response to a received
FIN segment.
• LISTEN—Listening for a connection request.
• SYNRCVD—Received a SYN segment, and responded.
• SYNSENT—Sent a SYN segment to start connection
negotiation.
• TIMEWAIT—Waiting for network to clear segments for
this connection before the network no longer recognizes
the connection as valid. This must occur before a new
connection can be set up.
[23 -> 10.9.0.13(22530)] The element within these brackets are as follows:
• The first field (23) indicates local TCP port.
• The second field (10.9.0.13) indicates the destination IP
address.
• The third field (22530) indicates the destination TCP port.
restart retransmission in 5996 Indicates the number of milliseconds until the next
retransmission takes place.
debug ip trigger-authentication
To display information related to automated double authentication, use the debug ip
trigger-authentication command in privileged EXEC mode. To disable debugging output, use the no
form of this command.
Syntax Description verbose (Optional) Specifies that the complete debugging output be displayed, including
information about packets that are blocked before authentication is complete.
Usage Guidelines Use this command when troubleshooting automated double authentication.
This command displays information about the remote host table. Whenever entries are added, updated,
or removed, a new debugging message is displayed.
What is the remote host table? Whenever a remote user needs to be user-authenticated in the second stage
of automated double authentication, the local device sends a User Datagram Protocol (UDP) packet to
the host of the remote user. Whenever such a UDP packet is sent, the host IP address of the user is added
to a table. If additional UDP packets are sent to the same remote host, a new table entry is not created;
instead, the existing entry is updated with a new time stamp. This remote host table contains a cumulative
list of host entries; entries are deleted after a timeout period or after you manually clear the table by using
the clear ip trigger-authentication command.
If you include the verbose keyword, the debugging output also includes information about packet
activity.
Examples The following is sample output from the debug ip trigger-authentication command. In this example,
the local device at 172.21.127.186 sends a UDP packet to the remote host at 172.21.127.114. The UDP
packet is sent to request the remote user’s username and password (or PIN). (The output says “New entry
added.”)
After a timeout period, the local device has not received a valid response from the remote host, so the
local device sends another UDP packet. (The output says “Time stamp updated.”)
Then the remote user is authenticated, and after a length of time (the timeout period) the entry is removed
from the remote host table. (The output says “remove obsolete entry.”)
myfirewall# debug ip trigger-authentication
The following is sample output from the debug ip trigger-authentication verbose command. In this
example, messages about packet activity are included because of the use of the verbose keyword.
You can see many packets that are being blocked at the interface because the user has not yet been double
authenticated. These packets will be permitted through the interface only after the user has been double
authenticated. (You can see packets being blocked when the output says “packet enqueued” and then
“packet ignored.”)
TRIGGER_AUTH: packet enqueued, qdata=69FEEC
remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0)
TRIGGER_AUTH: UDP sent from 172.21.127.186 to 172.21.127.113, qdata=69FEEC
Time stamp updated
TRIGGER_AUTH: packet enqueued, qdata=69FEEC
remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0)
TRIGGER_AUTH: packet ignored, qdata=69FEEC
TRIGGER_AUTH: packet enqueued, qdata=69FEEC
remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0)
TRIGGER_AUTH: packet ignored, qdata=69FEEC
TRIGGER_AUTH: packet enqueued, qdata=69FEEC
remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0)
TRIGGER_AUTH: UDP sent from 172.21.127.186 to 172.21.127.113, qdata=69FEEC
Time stamp updated
TRIGGER_AUTH: packet enqueued, qdata=69FEEC
remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0)
TRIGGER_AUTH: packet ignored, qdata=69FEEC
TRIGGER_AUTH: packet enqueued, qdata=69FEEC
remote host=172.21.127.113, local host=172.21.127.186 (if: 0.0.0.0)
TRIGGER_AUTH: packet ignored, qdata=69FEEC
debug ip urd
To display debugging messages for URL Rendezvous Directory (URD) channel subscription report
processing, use the debug ip urd command in privileged EXEC mode. To disable debugging output, use
the no form of this command.
no debug ip urd
Syntax Description hostname (Optional) The domain Name System (DNS) name.
ip-address (Optional) The IP address.
Defaults If no host name or IP address is specified, all URD reports are debugged.
Examples The following is sample output from the debug ip urd command:
Router# debug ip urd
debug ip urlfilter
To enable debug information of URL filter subsystems, use the debug ip urlfilter command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description function-trace The system prints a sequence of important functions that are called when
configuring URL filtering.
detailed The system prints detailed information about various activities that occur
during URL filtering.
events The system prints various events such as queue event, timer event, and
socket event.
Examples The following is sample output for the debug ip urlfilter command:
Router# debug ip urlfilter
urlfilter:
Urlfilter Detailed Debugs debugging is on
Defaults Debugging for CEFv6 and dCEFv6 dropped packets is not enabled.
Usage Guidelines The debug ipv6 cef drop command is similar to the debug ip cef drop command, except that it is
IPv6-specific.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following is sample output from the debug ipv6 cef drop command:
Router# debug ipv6 cef drop
Field Description
IPv6-CEF: received packet on Serial6/0/2 CEF has received a packet addressed to the router via
serial interface 6/0/2.
IPv6-CEF: found no adjacency for 6001::1 CEF has found no adjacency for the IPv6 address prefix
of 6000::1.
IPv6-CEF: packet not switched CEF has dropped the packet.
Defaults Debugging for CEFv6 and dCEFv6 general events is not enabled.
Usage Guidelines The debug ipv6 cef events command is similar to the debug ip cef events command, except that it is
IPv6-specific.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following is sample output from the debug ipv6 cef events command:
Router# debug ipv6 cef events
Field Description
Interface Serial6/0/2, changed Indicates that the interface hardware on serial interface 6/0/2 is
state to up currently active.
Line protocol on Interface Indicates that the software processes that handle the line protocol
Serial6/0/2, changed state to up consider the line usable for serial interface 6/0/2.
Serial6/0/2 address 4000::248 The IPv6 address 4000::248 was downloaded successfully.
add download succeeded
Defaults Debugging for CEFv6 and dCEFv6 load-sharing hash algorithm events is not enabled.
Usage Guidelines The debug ipv6 cef hash command is similar to the debug ip cef hash command, except that it is
IPv6-specific.
Use this command when changing the load-sharing algorithm to display IPv6 hash table details.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Defaults Debugging for CEFv6 and dCEFv6 packets that are process-switched on the router is not enabled.
Usage Guidelines The debug ipv6 cef receive command is similar to the debug ip cef receive command, except that it is
IPv6-specific.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following is sample output from the debug ipv6 cef receive command when another router in the
network pings 4000::2, which is a local address on this box:
Router# debug ipv6 cef receive
Field Description
IPv6CEF-receive: Receive packet for 4000::2 CEF has received a packet addressed to the router.
Syntax Description background (Optional) Sets CEFv6 and dCEFv6 table background updates.
Defaults Debugging for CEFv6 and dCEFv6 table modification events is not enabled.
Usage Guidelines The debug ipv6 cef table command is similar to the debug ip cef table command, except that it is
IPv6-specific.
This command is used to record CEFv6 and dCEFv6 table events related to the Forwarding Information
Base (FIB) tables. Types of events include the following:
• Routing updates that populate the FIB tables
• Flushing of the FIB tables
• Adding or removing of entries to the FIB tables
• Table reloading process
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Usage Guidelines The debug ipv6 icmp command is similar to the debug ip icmp command, except that it is IPv6-specific.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
This command helps you determine whether the router is sending or receiving IPv6 ICMP messages. Use
it, for example, when you are troubleshooting an end-to-end connection problem.
Note For more information about the fields in debug ipv6 icmp output, refer to RFC 2463, Internet Control
Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6).
Examples The following example shows output for the debug ipv6 icmp command:
Router# debug ipv6 icmp
Table 138 describes significant fields shown in the first line of the display.
Field Description
13:28:40: Indicates the time (hours:minutes:seconds) at which the ICMP
neighbor discovery event occurred.
nwnd: Indicates time (weeks, days) since last reboot of the event occurring.
(not shown in sample output) For example, 1w4d: indicates the time (since the last reboot) of the
event occurring was 1 week and 4 days ago.
ICMPv6: Indication that this message describes an ICMP version 6 packet.
Received ICMPv6 packet IPv6 address from which the ICMP version 6 packet is received.
from 2000:0:0:3::2
type 136 The number variable indicates one of the following IPv6 ICMP
message types:
• 1—Destination unreachable. The router cannot forward a packet
that was sent or received.
• 2—Packet too big. The router attempts to send a packet that
exceeds the maximum transmission unit (MTU) of a link between
itself and the packet destination.
• 3—Time exceeded. Either the hop limit in transit or the fragment
reassembly time is exceeded.
• 4—Parameter problem. The router attempts to send an IPv6
packet that contains invalid parameters. An example is a packet
containing a next header type unsupported by the router that is
forwarding the packet.
• 128—Echo request. The router received an echo reply.
• 129—Echo reply. The router sent an echo reply.
• 133—Router solicitation messages. Hosts send these messages to
prompt routers on the local link to send router advertisement
messages.
• 134—Router advertisement messages. Routers periodically send
these messages to advertise their link-layer addresses, prefixes for
the link, and other link-specific information. These messages are
also sent in response to router solicitation messages.
• 135—Neighbor solicitation messages. Nodes send these
messages to request the link-layer address of a station on the same
link.
• 136—Neighbor advertisement messages. Nodes send these
messages, containing their link-local addresses, in response to
neighbor solicitation messages.
• 137—Redirect messages. Routers send these messages to hosts
when a host attempts to use a less-than-optimal first hop address
when forwarding packets. These messages contain a better first
hop address that should be used instead.
Following are examples of the IPv6 ICMP messages types that can be displayed by the debug ipv6 icmp
command:
• ICMP echo request and ICMP echo reply messages. In the following example, an ICMP echo request
is sent to address 2052::50 and an ICMP echo reply is received from address 2052::50.
1w4d:ICMPv6:Sending echo request to 2052::50
1w4d:ICMPv6:Received echo reply from 2052::50
• ICMP packet too big messages. In the following example, a router tried to forward a packet to
destination address 2052::50 via the next hop address 2052::52. The size of the packet was greater
than 1280 bytes, which is the MTU of destination address 2052::50. As a result, the router receives
an ICMP packet too big message from the next hop address 2052::52.
1w4d:Received ICMP too big from 2052::52 about 2052::50, MTU=1300
• ICMP parameter problem messages. In the following example, an ICMP parameter problem
message is received from address 2052::52.
1w4d:Received ICMP parameter problem from 2052::52
• ICMP time exceeded messages. In the following example, an ICMP time exceeded message is
received from address 2052::52.
1w4d:Received ICMP time exceeded from 2052::52
• ICMP unreachable messages. In the following example, an ICMP unreachable message with code 1
is received from address 2052::52. Additionally, an ICMP unreachable message with code 1 is sent
to address 2060::20 about address 2062::20.
1w4d:Received ICMP unreachable code 1 from 2052::52
1w4d:Sending ICMP unreachable code 1 to 2060::20 about 2062::20
Code Description
0 The router has no route to the packet destination.
1 Although the router has a route to the packet destination, communication is
administratively prohibited.
3 The address is unreachable.
4 The port is unreachable.
Syntax Description detailed (Optional) Displays detailed information about NAT-PT translation events.
Usage Guidelines The debug ipv6 nat command can be used to troubleshoot NAT-PT translation issues. If no keywords
are specified, debugging messages for all NAT-PT protocol translation events are displayed.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog server.
Caution Because the debug ipv6 nat command generates a substantial amount of output, use it only when traffic
on the IPv6 network is low, so other activity on the system is not adversely affected.
Examples The following example shows output for the debug ipv6 nat command:
Router# debug ipv6 nat
00:06:06: IPv6 NAT: icmp src (3002::8) -> (192.168.124.8), dst (2001::2) ->
(192.168.123.2)
00:06:06: IPv6 NAT: icmp src (192.168.123.2) -> (2001::2), dst (192.168.124.8) ->
(3002::8)
00:06:06: IPv6 NAT: icmp src (3002::8) -> (192.168.124.8), dst (2001::2) ->
(192.168.123.2)
00:06:06: IPv6 NAT: icmp src (192.168.123.2) -> (2001::2), dst (192.168.124.8) ->
(3002::8)
00:06:06: IPv6 NAT: tcp src (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2)
00:06:06: IPv6 NAT: tcp src (192.168.123.2) -> (2001::2), dst (192.168.124.8) -> (3002::8)
00:06:06: IPv6 NAT: tcp src (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2)
00:06:06: IPv6 NAT: tcp src (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2)
00:06:06: IPv6 NAT: tcp src (3002::8) -> (192.168.124.8), dst (2001::2) -> (192.168.123.2)
00:06:06: IPv6 NAT: tcp src (192.168.123.2) -> (2001::2), dst (192.168.124.8) -> (3002::8)
Field Description
IPv6 NAT: Indicates that this is a NAT-PT packet.
icmp Protocol of the port identifying the packet.
src (3000::8) -> (192.168.124.8) The source IPv6 address and the NAT-PT mapped IPv4 address.
Note If you are mapping IPv4 hosts to IPv6 hosts, the first
address would be an IPv4 address and the second address
an IPv6 address.
dst (2001::2) -> (192.168.123.2) The destination IPv6 address and the NAT-PT mapped IPv4
address.
Note If you are mapping IPv4 hosts to IPv6 hosts, the first
address would be an IPv4 address and the second address
an IPv6 address.
The following example shows output for the debug ipv6 nat command with the detailed keyword:
Router# debug ipv6 nat detailed
debug ipv6 nd
To display debugging messages for IPv6 Internet Control Message Protocol (ICMP) neighbor discovery
transactions, use the debug ipv6 nd command in privileged EXEC mode. To disable debugging output,
use the no form of this command.
debug ipv6 nd
no debug ipv6 nd
Usage Guidelines This command can help determine whether the router is sending or receiving IPv6 ICMP neighbor
discovery messages.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following example shows output for the debug ipv6 nd command:
Router# debug ipv6 nd
Field Description
13:22:40: Indicates the time (hours:minutes:seconds) at which the ICMP
neighbor discovery event occurred.
ICMPv6-ND Indicates that a state change is occurring for an entry in the IPv6
neighbors cache.
STALE Stale state. This state of an neighbor discovery cache entry used to be
“reachable,” but now is “stale” because the entry is not being used. In
order to use this address, the router must go through the neighbor
discovery process in order to confirm reachability.
DELAY Delayed state. Reachability for this ND cache entry is currently being
reconfirmed. While in the delay state, upper-layer protocols may
inform IPv6 that they have confirmed reachability to the entry.
Therefore, there is no need to send a neighbor solicitation for the
entry.
PROBE Probe state. While in the probe state, if no confirmation is received
from the upper-layer protocols about the reachability of the entry, a
neighbor solicitation message is sent. The entry remains in the
“probe” state until a neighbor advertisement message is received in
response to the neighbor solicitation message.
Field Description
Sending NS for... Sending a neighbor solicitation message. In the example output, a
neighbor solicitation message is sent on Fast Ethernet interface 0/0 to
determine the link-layer address of 2000:0:0:3::2 on Fast Ethernet
interface 0/0.
Received NA for... Received a neighbor advertisement message. In the example output, a
neighbor advertisement message is received from the address
2000:0:0:3::2 (the second address) that includes the link-layer address
of 2000:0:0:3::2 (first address) from Ethernet interface 0/0.
REACH Reachable state. An ND cache entry in this state is considered
reachable, and the corresponding link-layer address can be used
without needing to perform neighbor discovery on the address.
Received NS for... Received neighbor solicitations. In the example output, the address
FE80::203:A0FF:FED6:1400 (on Fast Ethernet interface 0/0) is trying
to determine the link-local address of 2000:0:0:3::1.
Sending NA for... Sending for neighbor advertisements. In the example output, a
neighbor advertisement containing the link-layer address of
2000:0:0:3::1 (an address assigned to the Fast Ethernet interface 0/0
address) was sent.
DAD: FE80::1 is unique. Duplicate address detection processing was performed on the unicast
IPv6 address (a neighbor solicitation message was not received in
response to a neighbor advertisement message that contained the
unicast IPv6 address) and the address is unique.
3d19h: Indicates time (days, hours) since the last reboot of the event
occurring; 3d19h: indicates the time (since the last reboot) of the event
occurring was 3 days and 19 hours ago.
DAD: duplicate link-local Duplicate address detection processing was performed on the
FE80::2 on Ethernet0/2, link-local IPv6 address (the link-local address FE80::2 is used in the
interface stalled example). A neighbor advertisement message was received in
response to a neighbor solicitation message that contained the
link-local IPv6 address. The address is not unique, and the processing
of IPv6 packets is disabled on the interface.
%IPV6-4-DUPLICATE: System error message indicating the duplicate address.
Duplicate address...
Received NA for 3000::4 on Duplicate address detection processing was performed on the global
Ethernet0/3 from 3000::4 IPv6 address (the global address 3000::4 is used in the example). A
neighbor advertisement message was received in response to a
neighbor solicitation message that contained the global IPv6 address.
The address is not unique and is not used.
Usage Guidelines Consult Cisco technical support before using this command.
Examples The following example displays adjacency information for OSPF for IPv6:
Router# debug ipv6 ospf adj
Usage Guidelines Consult Cisco technical support before using this command.
Usage Guidelines Consult Cisco technical support before using this command.
Examples The following example displays database modification information for OSPF for IPv6:
Router# debug ipv6 ospf lsdb
Usage Guidelines Consult Cisco technical support before using this command.
Examples The following example displays information about each OSPF for IPv6 packet received:
Router# debug ipv6 ospf packet
Usage Guidelines The debug ipv6 ospf spf statistic command displays the SPF calculation times in milliseconds, the node
count, and a time stamp. Consult Cisco technical support before using this command.
Examples The following example displays statistical information while running the SPF algorithm:
Router# debug ipv6 ospf spf statistics
Syntax Description access-list (Optional) Specifies an IPv6 access list. The access list name cannot contain
access-list-name a space or quotation mark, or begin with a numeric.
detail (Optional) Displays detailed information about a specified IPv6 access list.
Usage Guidelines The debug ipv6 packet command is similar to the debug ip packet command, except that it is
IPv6-specific.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
IPv6 debugging information includes packets received, generated, and forwarded. Fast-switched packets
do not generate messages. When an IPv6 access list is specified by using the access-list keyword and
access-list-name argument, only packets matching the access list permit entries are displayed.
Caution Because the debug ipv6 packet command generates a substantial amount of output, use it only when
traffic on the IPv6 network is low, so other activity on the system is not adversely affected.
Examples The following example shows output for the debug ipv6 packet command:
Router# debug ipv6 packet
Field Description
IPV6: Indicates that this is an IPv6 packet.
source 2000:0:0:3::1 (local) The source address in the IPv6 header of the packet.
dest 2000:0:0:3::2 The destination address in the IPv6 header of the packet.
(FastEthernet0/0)
traffic class 96 The contents of the traffic class field in the IPv6 header.
flow 0x0 The contents of the flow field of the IPv6 header. The flow field is
used to label sequences of packets for which special handling is
necessary by IPv6 routers.
len 143+195 The length field of the IPv6 packet. The length is expressed as two
numbers with a plus (+) character between the numbers. The second
number is the length of the IPv6 portion (payload length plus IPv6
header length). The first number is the entire datagram size minus the
second number.
prot 6 The protocol field in the IPv6 header. Describes the next layer
protocol that is carried by the IPv6 packet. In the example, the
protocol 58 signifies that the next layer protocol is ICMPv6.
hops 64 The hops field in the IPv6 packet. This field is similar in function to
the IPv4 time-to-live field.
originating The presence of this field indicates that the packet shown was
originated by the router.
Field Description
Sending on FastEthernet0/0 Specifies the interface on which the packet was sent.
forward to ulp Indicates that the packet was received by the router at the destination
address and was forwarded to an upper-layer address (ulp) for
processing.
Examples The following example enables debugging for IPv6 prefix pools:
Router# debug ipv6 pool
Syntax Description interface-type (Optional) The interface type about which to display debugging messages.
interface-number (Optional) The interface number about which to display debugging
messages.
Usage Guidelines The debug ipv6 rip command is similar to the debug ip rip command, except that it is IPv6-specific.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Using this command without arguments enables IPv6 RIP debugging for RIP packets that are sent and
received on all router interfaces. Using this command with arguments enables IPv6 RIP debugging for
RIP packets that are sent and received only on the specified interface.
Caution Using this command on busy networks seriously degrades the performance of the router.
Examples The following example shows output for the debug ipv6 rip command:
Router# debug ipv6 rip
13:09:10: zrc=FE80::203:E4FF:FE12:CC1D
13:09:10: dst=FF02::9 (Ethernet1/1)
13:09:10: sport=521, dport=521, length=32
13:09:10: command=2, version=1, mbz=0, #rte=1
13:09:10: tag=0, metric=1, prefix=::/0
13:09:28:RIPng:response received from FE80::202:FDFF:FE77:1E42 on Ethernet1/1 for as1_rip
13:09:28: zrc=FE80::202:FDFF:FE77:1E42 (Ethernet1/1)
13:09:28: dst=FF02::9
13:09:28: sport=521, dport=521, length=32
13:09:28: command=2, version=1, mbz=0, #rte=1
13:09:28: tag=0, metric=1, prefix=2000:0:0:1:1::/80
The example shows two RIP packets; both are updates, known as “responses” in RIP terminology and
indicated by a “command” value of 2. The first is an update sent by this router, and the second is an
update received by this router. Multicast update packets are sent to all neighboring IPv6 RIP routers (all
routers that are on the same links as the router sending the update, and that have IPv6 RIP enabled). An
IPv6 RIP router advertises the contents of its routing table to its neighbors by periodically sending
update packets over those interfaces on which IPv6 RIP is configured. An IPv6 router may also send
“triggered” updates immediately following a routing table change. In this case the updates only include
the changes to the routing table. An IPv6 RIP router may solicit the contents of the routing table of a
neighboring router by sending a Request (command =1) message to the router. The router will respond
by sending an update (Response, command=2) containing its routing table. In the example, the received
response packet could be a periodic update from the address FE80::202:FDFF:FE77:1E42 or a response
to a RIP request message that was previously sent by the local router.
Table 143 describes the significant fields shown in the display. The tag, metric, and prefix fields are
specific to each RTE contained in the update.
Field Description
as1_rip The name of the RIP process that is sending or receiving the update.
src The address from which the update was originated.
dst The destination address for the update.
sport, dport The source and destination ports for the update. (IPv6 RIP uses port
521, as shown in the display.)
command The command field within the RIP packet. A value of 2 indicates that
the RIP packet is a response (update); a value of 1 indicates that the
RIP packet is a request.
version The version of IPv6 RIP being used. The current version is 1.
mbz There must be a 0 (mbz) field within the RIP packet.
#rte Indicates the number of routing table entries (RTEs) the RIP packet
contains.
tag Allows for the flagging of IPv6 RIP “internal” and “external” routes.
metric The distance metric from the router (sending this update) to the prefix.
prefix The tag, metric, and prefix fields are specific to each RTE contained
in the update.
The IPv6 prefix of the destination being advertised.
Related Commands
Command Description
debug ipv6 routing Displays debugging messages for IPv6 routing table updates and route
cache updates.
Defaults Debugging for IPv6 routing table updates and route cache updates is not enabled.
Usage Guidelines The debug ipv6 routing command is similar to the debug ip routing command, except that it is
IPv6-specific.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options in global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following example shows output for the debug ipv6 routing command:
Router# debug ipv6 routing
The debug ipv6 routing command displays messages whenever the routing table changes. For example,
the following message indicates that a route to the prefix 2000:0:0:1:1::/80 was added to the routing table
at the time specified in the message.
13:18:43:IPv6RT0:Add 2000:0:0:1:1::/80 to table
The following message indicates that the prefix 2000:0:0:2::/64 was already in the routing table;
however, a received advertisement provided a lower cost path to the prefix. Therefore, the routing table
was updated with the lower cost path. (The [20/1] in the example is the administrative distance [20] and
metric [1] of the better path.)
13:19:09:IPv6RT0:Better next-hop for 2000:0:0:2::/64, [20/1]
Examples The following is sample output from the debug ip wccp events command when a Cisco Cache Engine
is added to the list of available Web caches:
Router# debug ip wccp events
WCCP-EVNT: Built I_See_You msg body w/1 usable web caches, change # 0000000A
WCCP-EVNT: Web Cache 192.168.25.3 added
WCCP-EVNT: Built I_See_You msg body w/2 usable web caches, change # 0000000B
WCCP-EVNT: Built I_See_You msg body w/2 usable web caches, change # 0000000C
Examples The following is sample output from the debug ip wccp packets command. The router is sending
keepalive packets to the Cisco Cache Engines at 192.168.25.4 and 192.168.25.3. Each keepalive packet
has an identification number associated with it. When the Cisco Cache Engine receives a keepalive
packet from the router, it sends a reply with the identification number back to the router.
Router# debug ip wccp packets
Usage Guidelines The debug ipx ipxwan command is useful for verifying the startup negotiations between two routers
running the IPX protocol through a WAN. This command produces output only during state changes or
startup. During normal operations, no output is produced.
Examples The following is sample output from the debug ipx ipxwan command during link startup:
Router# debug ipx ipxwan
The following lines indicate that the startup process failed to receive a timer response, brought the link
down, then brought the link up and tried again with a new timer set:
IPXWAN: state (Sending Timer Requests -> Disconnect) [Serial1/6666:200 (IPX line
state brought down)]
IPXWAN: state (Disconnect -> Sending Timer Requests) [Serial1/6666:200 (IPX line
state brought up)]
The following lines indicate that the interface is sending timer requests and waiting for a timer response:
IPXWAN: Send TIMER_REQ [seq 0] out Serial1/6666:200
IPXWAN: Send TIMER_REQ [seq 1] out Serial1/6666:200
The following lines indicate that the interface has received a timer request from the other end of the link
and has sent a timer response. The fourth line shows that the interface has come up as the master on the
link.
IPXWAN: Rcv TIMER_REQ on Serial1/6666:200, NodeID 1234, Seq 1
IPXWAN: Send TIMER_REQ [seq 1] out Serial1/6666:200
IPXWAN: Rcv TIMER_RSP on Serial1/6666:200, NodeID 1234, Seq 1, Del 6
IPXWAN: state (Sending Timer Requests -> Master: Sent RIP/SAP) [Serial1/6666:200
(Received Timer Response as master)]
The following lines indicate that the interface is sending RIP/SAP requests:
IPXWAN: Send RIPSAP_INFO_REQ [seq 0] out Serial1/6666:200
IPXWAN: Rcv RIPSAP_INFO_RSP from Serial1/6666:200, NodeID 1234, Seq 0
IPXWAN: state (Master: Sent RIP/SAP -> Master: Connect) [Serial1/6666:200 (Received Router
Info Rsp as Master)]
Syntax Description packets Displays normal operating messages relating to incoming and
outgoing NASI packets. This is the default.
error Displays messages indicating an error or failure in the protocol
processing.
activity Displays messages relating to internal NASI processing of NASI
connections. The activity option includes all NASI activity such as
traffic indication, timer events, and state changes.
Usage Guidelines Use the debug ipx nasi command to display handshaking or negotiating details between the protocol
(SPX or NASI) and the other protocols or applications. Use the packets option to determine the NASI
traffic flow, and use the error option as a quick check of failure reasons in NASI connections.
Examples The following is sample output from the debug ipx nasi command using the packets and error
keywords:
Router# debug ipx nasi packets
In the following line, the 0 is the number of the tty to which this NASI connection is attached. TTY 0 is
used by all NASI control connections. 6E6E is the associated SPX connection pointer for this NASI
connection. “Check server info” is a type of NASI packet that indicates an incoming NASI packet of this
type.
NASI0: 6E6E Check server info
The following message indicates that the router is sending back a “server-info” packet with a positive
acknowledgment, and the packet size is 43 bytes:
NASI0: 6E6E sending server-info 4F00 Good response: 43 bytes
The following line is a NASI packet type. “Find first” and “find next” are NASI packet types.
NASI0: 7A6E Query Port. Find first
The following line indicates that the outgoing find first packet for the NASI connection 7A6E has line 0
DE, port name TTY1, and general name ASYNC:
NASI0: FFirst: line 0 DE, port: TTY1-__________ASYNC___^, group: ASYNC___^
The following two lines indicate a received NASI packet for NASI connection on line 1. 7B6E is the
NASI connection pointer. The packet code is 4500 and is not recognizable by Cisco devices. The second
line is a hexadecimal dump of the packet.
NASI1: 7B6E Unknown NASI code 4500 Pkt Size: 13
45 0 0 FC 0 2 0 20 0 0 FF 1 0
Usage Guidelines This command is useful for learning whether Internetwork Packet Exchange (IPX) packets are traveling
over a router.
Note In order to generate debug ipx packet information on all IPX traffic traveling over the router, you must
first configure the router so that fast switching is disabled. Use the no ipx route-cache command on all
interfaces on which you want to observe traffic. If the router is configured for IPX fast switching, only
non fast-switched packets will produce output. When the IPX cache is invalidated or cleared, one packet
for each destination is displayed as the cache is repopulated.
Examples The following is sample output from the debug ipx packet command:
Router# debug ipx packet
The first line indicates that the router receives a packet from a Novell station (address
160.0260.8c4c.4f22); this trace does not indicate the address of the immediate router sending the packet
to this router. In the second line, the router forwards the packet toward the Novell server (address
1.0000.0000.0001) through an immediate router (183.0000.0c01.5d85).
Table 144 describes the significant fields shown in the display.
Field Description
IPX Indicates that this is an IPX packet.
zrc=160.0260.8c4c.4f22 Source address of the IPX packet. The Novell network number is 160.
Its MAC address is 0260.8c4c.4f22.
Note The field “zrc” will appear as “src” in the output field.
dst=1.0000.0000.0001 Destination address for the IPX packet. The address 0000.0000.0001
is an internal MAC address, and the network number 1 is the internal
network number of a Novell 3.11 server.
packet received Router received this packet from a Novell station, possibly through an
intermediate router.
gw=183.0000.0c01.5d85 Router is sending the packet over to the next hop router; its address of
183.0000.0c01.5d85 was learned from the IPX routing table.
sending packet Router is attempting to send this packet.
Usage Guidelines Normally, a router or server sends out one routing update per minute. Each routing update packet can
include up to 50 entries. If many networks exist on the internetwork, the router sends out multiple
packets per update. For example, if a router has 120 entries in the routing table, it would send three
routing update packets per update. The first routing update packet would include the first 50 entries, the
second packet would include the next 50 entries, and the last routing update packet would include the
last 20 entries.
Examples The following is sample output from the debug ipx routing command:
Router# debug ipx routing
Field Description
IPXRIP IPX RIP packet.
update from Routing update packet from an IPX server at address
9999.0260.8c6a.1733 9999.0260.8c6a.1733.
110801 in 1 hops Network 110801 is one hop away from the router at address
9999.0260.8c6a.1733.
delay 2 Delay is a time measurement (1/18th second) that the NetWare shell
uses to estimate how long to wait for a response from a file server. Also
known as ticks.
Field Description
sending update to Router is sending this IPX routing update packet to address
12FF02:ffff.ffff.ffff via 12FF02:ffff.ffff.ffff through Ethernet interface 1.
Ethernet 1
network 555 Packet includes routing update information for network 555.
metric 2 Network 555 is two metrics (or hops) away from the router.
delay 3 Network 555 is a delay of 3 away from the router. Delay is a
measurement that the NetWare shell uses to estimate how long to wait
for a response from a file server. Also known as ticks.
Syntax Description activity (Optional) Provides more detailed output of SAP packets, including
displays of services in SAP packets.
events (Optional) Limits amount of detailed output for SAP packets to those
that contain interesting events.
Usage Guidelines Normally, a router or server sends out one SAP update per minute. Each SAP packet can include up to
seven entries. If many servers are advertising on the network, the router sends out multiple packets per
update. For example, if a router has 20 entries in the SAP table, it would send three SAP packets per
update. The first SAP would include the first seven entries, the second SAP would include the next seven
entries, and the last update would include the last six entries.
Obtain the most meaningful detail by using the debug ipx sap activity and the debug ipx sap events
commands together.
Caution Because the debug ipx sap command can generate a substantial amount of output, use it with caution
on networks that have many interfaces and large service tables.
Examples The following is sample output from the debug ipx sap command:
Router# debug ipx sap
IPXSAP: at 0023F778:
I SAP Response type 0x2 len 160 src:160.0000.0c00.070d dest:160.ffff.ffff.ffff(452)
type 0x4, "Hello2", 199.0002.0004.0006 (451), 2 hops
type 0x4, "Hello1", 199.0002.0004.0008 (451), 2 hops
IPXSAP: sending update to 160
IPXSAP: at 00169080:
O SAP Update type 0x2 len 96 ssoc:0x452 dest:160.ffff.ffff.ffff(452)
IPX: type 0x4, "Magnolia", 42.0000.0000.0001 (451), 2hops
The debug ipx sap command generates multiple lines of output for each SAP packet—a packet summary
message and a service detail message.
The first line displays the internal router memory address of the packet. The technical support staff may
use this information in problem debugging.
IPXSAP: at 0023F778:
Field Description
I Indicates whether the router received the SAP packet as input (I) or is
sending an update as output (O).
SAP Response type 0x2 Packet type. Format is 0xn; possible values for n include:
• 1—General query
• 2—General response
• 3—Get Nearest Server request
• 4—Get Nearest Server response
len 160 Length of this packet (in bytes).
src: 160.000.0c00.070d Source address of the packet.
dest:160.ffff.ffff.ffff IPX network number and broadcast address of the destination IPX
network for which the message is intended.
(452) IPX socket number of the process sending the packet at the source
address. This number is always 452, which is the socket number for the
SAP process.
Field Description
type 0x4 Indicates the type of service the server sending the packet provides.
Format is 0xn. Some of the values for n are proprietary to Novell.
Those values for n that have been published include the following
(contact Novell for more information):
• 0—Unknown
• 1—User
• 2—User group
• 3—Print queue
• 4—File server
• 5—Job server
• 6—Gateway
• 7—Print server
• 8—Archive queue
• 9—Archive server
• A—Job queue
• B—Administration
• 21—NAS SNA gateway
• 24—Remote bridge server
• 2D—Time Synchronization VAP
• 2E—Dynamic SAP
• 47—Advertising print server
• 4B—Btrieve VAP 5.0
• 4C—SQL VAP
• 7A—TES—NetWare for VMS
• 98—NetWare access server
• 9A—Named Pipes server
• 9E—Portable NetWare—UNIX
• 111—Test server
• 166—NetWare management
• 233—NetWare management agent
• 237—NetExplorer NLM
• 239—HMI hub
• 23A—NetWare LANalyzer agent
• 26A—NMS management
• FFFF—Wildcard (any SAP service)
Contact Novell for more information.
Field Description
“Hello2” Name of the server being advertised.
199.0002.0004.0006 (451) Indicates the network number and address (and socket) of the server
generating the SAP packet.
2 hops Number of hops to the server from the router.
The fifth line of output indicates that the router sent a SAP update to network 160:
IPXSAP: sending update to 160
The format for debug ipx sap output describing a SAP update the router sends is similar to that
describing a SAP update the router receives, except that the ssoc: field replaces the src: field, as the
following line of output indicates:
O SAP Update type 0x2 len 96 ssoc:0x452 dest:160.ffff.ffff.ffff(452)
The ssoc:0x452 field indicates the IPX socket number of the process sending the packet at the source
address. Possible values include the following:
• 451—Network Core Protocol
• 452—Service Advertising Protocol
• 453—Routing Information Protocol
• 455—NetBIOS
• 456—Diagnostics
• 4000 to 6000—Ephemeral sockets used for interaction with file servers and other network
communications
Usage Guidelines Use this command to troubleshoot connections that use SPX spoofing when SPX keepalive spoofing is
enabled.
Examples The following is sample output from the debug ipx spoof command:
Router# debug ipx spoof
The following lines show that SPX packets were seen, but they are not seen for a connection that exists
in the SPX table:
IPX: Tu1:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7004 4B8 8 1D
23 (new) (changed:yes) Last Changed 0
IPX: Tu1:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7104 2B8 7 29
2E (new) (changed:yes) Last Changed 0
The following lines show SPX packets for connections that exist in the SPX table but that SPX idle time
has not yet elapsed and spoofing has not started:
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: 80 0 2B8 7104 29 7 7
(early)
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.da75 ln= 42 tc=02, SPX: 80 0 4B8 7004 1D 8 8
(early)
The following lines show an IPX watchdog packet and the spoofed reply:
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.da75 ln= 32 tc=02, watchdog
IPX: local:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 32 tc=00, watchdog sent
The following lines show SPX packets that arrived more than two minutes after spoofing started. This
situation occurs when the other sides of the SPX table are cleared. When the table is cleared, the routing
processes stop spoofing the connection, which allows SPX keepalives from the local side to travel to the
remote side and repopulate the SPX table.
IPX: Tu1:200.0260.8c8d.da75->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7004 4B8 8 1D
23 (changed:clear) Last Changed 0
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: C0 0 2B8 7104 29 7 7
(early)
IPX: Tu1:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, SPX: 80 0 7104 2B8 7 29
2E (changed:clear) Last Changed 0
The following lines show that an SPX keepalive packet came in and was spoofed:
IPX: Et1:CC0001.0000.0000.0001->200.0260.8c8d.c558 ln= 42 tc=02, SPX: C0 0 2B8 7104 29 7 7
(Last Changed 272 sec)
IPX: local:200.0260.8c8d.c558->CC0001.0000.0000.0001 ln= 42 tc=02, spx keepalive sent 80 0
7104 2B8 7 29 2E
Usage Guidelines Use the debug ipx spx command to display handshaking or negotiating details between the SPX protocol
and the other protocols or applications. SPX debugging messages indicate various states of SPX
connections such as incoming and outgoing traffic information, timer events, and related processing of
SPX connections.
Examples The following is sample output from the debug ipx spx command:
Router# debug ipx spx
The following line indicates an incoming SPX packet that has a source connection ID of 776E and a
destination connection ID of 20A0 (both in hexadecimal). The data stream value in the SPX packet is
indicated by d-strm, and the connection control value in the SPX packet is indicated by con-ctl (both in
hexadecimal). All data packets received are followed by an SPX debugging message indicating the size
of the packet. All control packets received are consumed internally.
SPX: I Con Src/Dst 776E/20A0 d-strm 0 con-ctl 80
The following lines indicate that SPX is attempting to remove an SPX connection that has the address
C847C from its list of connections:
SPX: purge timer fired. Cleaning up C847C
SPX: purging spxcon C847C from conQ
debug isdn
To display messages about what is occurring in the structure and operation of ISDN in the Cisco IOS
software, use the debug isdn commands in privileged EXEC mode. To disable the ISDN debugging
commands, use the no form of this command.
debug isdn {all [interface bri number | serial port:number] | api [interface bri number | serial
port:number] | cc [{detail | interface bri number | serial port:number}] | error [{interface bri
number | serial port:number}] | event | mgmnt [{detail | interface bri number | serial
port:number}] | q921 | q931 | standard [{interface bri number | serial port:number}] | tgrm}
no debug isdn {all [interface bri number | serial port:number] | api [interface bri number | serial
port:number] | cc [{detail | interface bri number | serial port:number}] | error [{interface bri
number | serial port:number}] | event | mgmnt [{detail | interface bri number | serial
port:number}] | q921 | q931 | standard [{interface bri number | serial port:number}] | tgrm}
Note With the exception of the debug isdn event, debug isdn q921, debug isdn q931, and debug isdn
tgrm commands, the commands described on this page are not intended for customer use and can
cause ISDN or the Cisco IOS software to fail. The debug isdn event, debug isdn q921, debug isdn
q931, and debug isdn tgrm commands are described on separate command pages.
Syntax Description interface bri number (Optional) BRI interface number (BRI 2, for example).
serial port:number (Optional) Serial port and number (serial 1/0, for example).
detail (Optional) Generates more information during the processing of a
specific request.
all Enables all debug isdn commands on all interfaces or, optionally, on a
specific interface.
api Selectively enables the following application program interfaces (APIs)
contained in ISDN, on all interfaces or, optionally, on a specific interface:
• accept—ISDN call acceptance
• all—All ISDN API tracing
• bkhl—ISDN backhaul API tracing
• cdapi—ISDN Call Distributor Application Programming Interface
API tracing
• csm—ISDN Compact Subscriber Module API tracing
• l2sock—ISDN Layer 2 socket API tracing
• nfas—Non-Facility Associated Signaling
• packet—ISDN packet API tracing
• qsig—ISDN PRI Q Signaling API tracing
• rlm—Redundant Link Manager API tracing
cc Enables ISDN Call Control debug messages on all interfaces or,
optionally, on a specific interface. Call Control is a layer of processing
within ISDN that is above the Q.931 protocol processing layer, but below
the host and API layers.
error Generates error messages for normal exception conditions in the software
on all interfaces or, optionally, on a specific interface. The actual
significance of the message can be determined only by a detailed
examination of surrounding debug messages.
event Displays ISDN events occurring on the user side of the ISDN interface.
See the debug isdn event command page.
mgmnt Enables ISDN Management Entity messages on all interfaces or,
optionally, on a specific interface. Management Entity controls the
activation and deactivation of Q.921 resources.
q921 Displays data link layer access procedures that are taking place at the
router on the D channel LAPD of its ISDN interface. See the debug isdn
q921 command page.
q931 Displays information about call setup and teardown of ISDN network
connections between the local router and the network. See the debug isdn
q931 command page.
standard Enables a selected set of isdn debug messages on all interfaces or,
optionally, on a specific interface, that should provide sufficient
information to determine why a problem is occurring.
tgrm Displays ISDN trunk group resource manager information. See the
command page for debug isdn tgrm.
Defaults Commands are enabled on all interfaces unless a specific interface is specified.
Usage Guidelines Follow all instructions from Cisco technical support personnel when enabling and disabling these
commands.
Examples The general format of the debug isdn command messages is as follows:
The text message can be used to determine what is occurring in the structure and operation of ISDN in
the Cisco IOS software, ISDN messages, and ISDN signaling procedures. The message must be
interpreted by Cisco technical personnel.
The following example shows a typical message for the debug isdn cc command:
*Mar 1 02:29:27.751: ISDN Se1/0:23 CC: CCPRI_Go: source id 0x300, call id 0x8008, event
0x341 (pre-ccb recovery)
The following example enables a selected set of debug isdn messages that should provide sufficient
information for Cisco technical personnel to determine why a problem is occurring on BRI interface 2:
Router# debug isdn standard interface bri 2
Usage Guidelines Although the debug isdn event and the debug isdn q931 commands provide similar debug information,
the information is displayed in a different format. If you want to see the information in both formats,
enable both commands at the same time. The displays will be intermingled.
The ISDN events that can be displayed are Q.931 events (call setup and teardown of ISDN network
connections).
Use the show dialer command to retrieve information about the status and configuration of the ISDN
interface on the router.
Use the service timestamps debug datetime msec global configuration command to include the time
with each message.
For more information on ISDN switch types, codes, and values, see Appendix B, “ISDN Switch Types,
Codes, and Values.”
Examples The following is sample output from the debug isdn event command of call setup events for an outgoing
call:
Router# debug isdn event
The following shows sample debug isdn event output of call setup events for an incoming call. The
values used for internal purposes are unpacked information elements. The values that follow the ISDN
specification are an interpretation of the unpacked information elements.
received HOST_INCOMING_CALL
Bearer Capability i = 0x080010
-------------------
Channel ID i = 0x0101
Calling Party Number i = 0x0000, ‘415555121202’
IE out of order or end of ‘private’ IEs --
Bearer Capability i = 0x8890
Channel ID i = 0x89
Calling Party Number i = 0x0083, ‘415555121202’
ISDN Event: Received a call from 415555121202 on B1 at 64 Kb/s
ISDN Event: Accepting the call
received HOST_CONNECT
Channel ID i = 0x0101
ISDN Event: Connected to 415555121202 on B1 at 64 Kb/s
The following is sample output from the debug isdn event command of call teardown events for a call
that has been disconnected by the host side of the connection:
Router# debug isdn event
received HOST_DISCONNECT
ISDN Event: Call to 415555121202 was hung up
The following is sample output from the debug isdn event command of a call teardown event for an
outgoing or incoming call that has been disconnected by the ISDN interface on the router side:
Router# debug isdn event
Field Description
Bearer Capability Indicates the requested bearer service to be provided by the network. See
Table B-4 in Appendix B, “ISDN Switch Types, Codes, and Values.”
i= Indicates the information element identifier. The value depends on the
field it is associated with. Refer to the ITU-T Q.931 specification for
details about the possible values associated with each field for which this
identifier is relevant.
Channel ID Channel Identifier. The values and corresponding channels might be
identified in several ways:
• Channel ID i=0x0101—Channel B1
• Channel ID i=0x0102—Channel B2
ITU-T Q.931 defines the values and channels as exclusive or preferred:
• Channel ID i=0x83—Any B channel
• Channel ID i=0x89—Channel B1 (exclusive)
• Channel ID i=0x8A—Channel B2 (exclusive)
• Channel ID i=0x81—B1 (preferred)
• Channel ID i=0x82—B2 (preferred)
Field Description
Calling Party Number Identifies the called party. This field is only present in outgoing calls. The
Calling Party Number field uses the IA5 character set. Note that it may be
replaced by the Keypad facility field.
IE out of order or end of Indicates that an information element identifier is out of order or there are
‘private’ IEs no more private network information element identifiers to interpret.
Received a call from Identifies the origin of the call. This field is present only in incoming
415555121202 on B1 at calls. Note that the information about the incoming call includes the
64 Kb/s channel and speed. Whether the channel and speed are displayed depends
on the network delivering the calling party number.
The following is sample output from the debug isdn event command of a call teardown event for a call
that has passed call screening and then has been hung up by the ISDN interface on the far end side:
Router# debug isdn event
The following is sample output from the debug isdn event command of a call teardown event for a call
that has not passed call screening and has been rejected by the ISDN interface on the router side:
Router# debug isdn event
The following is sample output from the debug isdn event command of a call teardown event for an
outgoing call that uses a dialer subaddress:
Router# debug isdn event
Jan 3 11:41:48.483:
ISDN BR0: Event: Call to 61885:1212 at 64 Kb/s
Jan 3 11:41:48.495:
ISDN BR0: TX -> SETUP pd = 8 callref = 0x04
Jan 3 11:41:48.495: Bearer Capability i = 0x8890
Jan 3 11:41:48.499: Channel ID i = 0x83
Jan 3 11:41:48.503: Called Party Number i = 0x80, '61885'
Jan 3 11:41:48.507: Called Party SubAddr i = 0x80, 'P1212'
Jan 3 11:41:48.571:
ISDN BR0: RX <- CALL_PROC pd = 8 callref = 0x84
Jan 3 11:41:48.575: Channel ID i = 0x89
Jan 3 11:41:48.587:
ISDN BR0: Event: incoming ces value = 1
Jan 3 11:41:48.587:
ISDN BR0: received HOST_PROCEEDING
Channel ID i = 0x0101
Jan 3 11:41:48.591: -------------------
Channel ID i = 0x89
Jan 3 11:41:48.731: ISDN BR0: RX <- CONNECT pd = 8 callref = 0x84
Jan 3 11:41:48.743: ISDN BR0: Event: incoming ces value = 1
Jan 3 11:41:48.743: ISDN BR0: received HOST_CONNECT
Channel ID i = 0x0101
Jan 3 11:41:48.747: -------------------
%LINK-3-UPDOWN: Interface BRI0:1 changed state to up
Jan 3 11:41:48.771: ISDN BR0: Event: Connected to 61885:1212 on B1 at 64 Kb/s
Jan 3 11:41:48.775: ISDN BR0: TX -> CONNECT_ACK pd = 8 callref = 0x04
%LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:1, changed state to up
%ISDN-6-CONNECT: Interface BRI0:1 is now connected to 61885:1212 goodie
The output is similar to the output of debug isdn q931. Refer to the debug isdn q931 command for
detailed field descriptions.
The following is sample output from the debug isdn event command of call setup events for a successful
callback for legacy DDR:
Router# debug isdn event
The following is sample output from the debug isdn event command for a callback that was
unsuccessful because the router had no dialer map for the calling number:
Router# debug isdn event
Table 148 debug isdn event Field Descriptions for Caller ID Callback and Legacy DDR
Field Description
BRI0:Caller id Callback server starting to ... Caller ID callback has started, plus host name and
number called. The callback enable timer starts now.
: Callback timer expired Callback timer has expired; callback can proceed.
BRI0:beginning callback to ... Actions proceeding after the callback timer expired,
BRI0: Attempting to dial ... plus host name and number called.
The following is sample output from the debug isdn event command for a callback that was successful
when the dialer profiles DDR feature is configured:
*Mar 1 00:46:51.827: BR0:1:Caller id 81012345678901 matched to profile delorean
*Mar 1 00:46:51.827: Dialer1:Caller id Callback server starting to delorean
81012345678901
*Mar 1 00:46:54.151: : Callback timer expired
*Mar 1 00:46:54.151: Dialer1:beginning callback to delorean 81012345678901
*Mar 1 00:46:54.155: Freeing callback to delorean 81012345678901
*Mar 1 00:46:54.155: BRI0: Dialing cause Callback return call
*Mar 1 00:46:54.155: BRI0: Attempting to dial 81012345678901
*Mar 1 00:46:54.503: %LINK-3-UPDOWN: Interface BRI0:2, changed state to up
*Mar 1 00:46:54.523: %DIALER-6-BIND: Interface BRI0:2 bound to profile Dialer1
*Mar 1 00:46:55.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:2, changed
state to up
*Mar 1 00:46:58.187: %ISDN-6-CONNECT: Interface BRI0:2 is now connected to 81012345678901
delorean
Table 149 describes significant fields of call setup events for a successful callback for the sample output
from the debug isdn event command when the dialer profiles DDR feature is configured.
Table 149 debug isdn event Field Descriptions for Caller ID Callback and Dialer Profiles
Field Description
BR0:1:Caller id ... matched to profile ... Interface, channel number, caller ID that are matched,
and the profile to bind to the interface.
: Callback timer expired Callback timer has expired; callback can proceed.
Dialer1:beginning callback to... Callback process is beginning to the specified number.
Freeing callback to... Callback has been started to the specified number, and
the number has been removed from the callback list.
BRI0: Dialing cause Callback return call The reason for the call and the number being dialed.
BRI0: Attempting to dial
%LINK-3-UPDOWN: Interface BRI0:2, Interface status: up.
changed state to up
%DIALER-6-BIND: Interface BRI0:2 bound Profile bound to the interface.
to profile Dialer1
%LINEPROTO-5-UPDOWN: Line protocol Line protocol status: up.
on Interface BRI0:2, changed state to up
%ISDN-6-CONNECT: Interface BRI0:2 is Interface is now connected to the specified host and
now connected to ... number.
Usage Guidelines The ISDN data link layer interface provided by the router conforms to the user interface specification
defined by ITU-T recommendation Q.921. The debug isdn q921 command output is limited to
commands and responses exchanged during peer-to-peer communication carried over the D channel.
This debug information does not include data sent over the B channels that is also part of the router’s
ISDN interface. The peers (data link layer entities and layer management entities on the routers)
communicate with each other via an ISDN switch over the D channel.
Note The ISDN switch provides the network interface defined by Q.921. This debug command does not
display data link layer access procedures taking place within the ISDN network (that is, procedures
taking place on the network side of the ISDN connection). See Appendix B, “ISDN Switch Types, Codes,
and Values,” for a list of the supported ISDN switch types.
A router can be the calling or called party of the ISDN Q.921 data link layer access procedures. If the
router is the calling party, the command displays information about an outgoing call. If the router is the
called party, the command displays information about an incoming call and the keepalives.
The debug isdn q921 command can be used with the debug isdn event and the debug isdn q931
commands at the same time. The displays will be intermingled.
Use the service timestamps debug datetime msec global configuration command to include the time
with each message.
Examples The following is sample output from the debug isdn q921 command for an outgoing call:
Router# debug isdn q921
In the following lines, the seventh and eighth most significant hexadecimal numbers indicate the type of
message. 0x05 indicates a Call Setup message, 0x02 indicates a Call Proceeding message, 0x07 indicates
a Call Connect message, and 0x0F indicates a Connect Ack message.
Jan 3 14:52:24.475: ISDN BR0: TX -> INFOc sapi = 0 tei = 64 ns = 5 nr = 2
i = 0x08010705040288901801837006803631383835
Jan 3 14:52:24.527: ISDN BR0: RX <- INFOc sapi = 0 tei = 64 ns = 2 nr = 6
i = 0x08018702180189
Jan 3 14:52:24.643: ISDN BR0: RX <- INFOc sapi = 0 tei = 64 ns = 3 nr = 6
i = 0x08018707
Jan 3 14:52:24.683: ISDN BR0: TX -> INFOc sapi = 0 tei = 64 ns = 6 nr = 4
i = 0x0801070F
The following is sample output from the debug isdn q921 command for a startup message on a
DMS-100 switch:
Router# debug isdn q921
The first seven lines of this example indicate a Layer 2 link establishment.
The following lines indicate the message exchanges between the data link layer entity on the local router
(user side) and the assignment source point (ASP) on the network side during the TEI assignment
procedure. This assumes that the link is down and no TEI currently exists.
Jan 3 14:47:30.171: ISDN BR0: TX -> IDREQ ri = 31815 ai = 127
Jan 3 14:47:30.219: ISDN BR0: RX <- IDASSN ri = 31815 ai = 64
At 14:47:30.171, the local router data link layer entity sent an Identity Request message to the network
data link layer entity to request a TEI value that can be used in subsequent communication between the
peer data link layer entities. The request includes a randomly generated reference number (31815) to
differentiate among user devices that request automatic TEI assignment and an action indicator of 127
to indicate that the ASP can assign any TEI value available. The ISDN user interface on the router uses
automatic TEI assignment.
At 14:47:30.219, the network data link entity responds to the Identity Request message with an Identity
Assigned message. The response includes the reference number (31815) previously sent in the request
and TEI value (64) assigned by the ASP.
The following lines indicate the message exchanges between the layer management entity on the
network and the layer management entity on the local router (user side) during the TEI check procedure:
Jan 3 14:47:30.227: ISDN BR0: RX <- IDCKRQ ri = 0 ai = 127
Jan 3 14:47:30.235: ISDN BR0: TX -> IDCKRP ri = 16568 ai = 64
At 14:47:30.227, the layer management entity on the network sends the Identity Check Request message
to the layer management entity on the local router to check whether a TEI is in use. The message includes
a reference number that is always 0 and the TEI value to check. In this case, an ai value of 127 indicates
that all TEI values should be checked. At 14:47:30.227, the layer management entity on the local router
responds with an Identity Check Response message indicating that TEI value 64 is currently in use.
The following lines indicate the messages exchanged between the data link layer entity on the local
router (user side) and the data link layer on the network side to place the network side into modulo 128
multiple frame acknowledged operation. Note that the data link layer entity on the network side also can
initiate the exchange.
Jan 3 14:47:30.223: ISDN BR0: TX -> SABMEp sapi = 0 tei = 64
Jan 3 14:47:30.239: ISDN BR0: RX <- UAf sapi = 0 tei = 64
At 14:47:30.223, the data link layer entity on the local router sends the SABME command with a SAPI
of 0 (call control procedure) for TEI 64. At 14:47:30.239, the first opportunity, the data link layer entity
on the network responds with a UA response. This response indicates acceptance of the command. The
data link layer entity sending the SABME command may need to send it more than once before receiving
a UA response.
The following lines indicate the status of the data link layer entities. Both are ready to receive I frames.
Jan 3 14:47:43.815: ISDN BR0: RX <- RRp sapi = 0 tei = 64 nr = 2
Jan 3 14:47:43.819: ISDN BR0: TX -> RRf sapi = 0 tei = 64 nr = 0
Field Description
Jan 3 14:49:47.391 Indicates the date and time at which the frame was sent from or
received by the data link layer entity on the router. The time is
maintained by an internal clock.
TX Indicates that this frame is being sent from the ISDN interface on the
local router (user side).
RX Indicates that this frame is being received by the ISDN interface on the
local router from the peer (network side).
IDREQ Indicates the Identity Request message type sent from the local router
to the network (ASP) during the automatic TEI assignment procedure.
This message is sent in a UI command frame. The SAPI value for this
message type is always 63 (indicating that it is a Layer 2 management
procedure) but it is not displayed. The TEI value for this message type
is 127 (indicating that it is a broadcast operation).
ri = 31815 Indicates the Reference number used to differentiate between user
devices requesting TEI assignment. This value is a randomly generated
number from 0 to 65535. The same ri value sent in the IDREQ message
should be returned in the corresponding IDASSN message. Note that a
Reference number of 0 indicates that the message is sent from the
network side management layer entity and a reference number has not
been generated.
ai = 127 Indicates the Action indicator used to request that the ASP assign any
TEI value. It is always 127 for the broadcast TEI. Note that in some
message types, such as IDREM, a specific TEI value is indicated.
IDREM Indicates the Identity Remove message type sent from the ASP to the
user side layer management entity during the TEI removal procedure.
This message is sent in a UI command frame. The message includes a
reference number that is always 0, because it is not responding to a
request from the local router. The ASP sends the Identity Remove
message twice to avoid message loss.
IDASSN Indicates the Identity Assigned message type sent from the ISDN
service provider on the network to the local router during the automatic
TEI assignment procedure. This message is sent in a UI command
frame. The SAPI value for this message type is always 63 (indicating
that it is a Layer 2 management procedure). The TEI value for this
message type is 127 (indicating it is a broadcast operation).
ai = 64 Indicates the TEI value automatically assigned by the ASP. This TEI
value is used by data link layer entities on the local router in
subsequent communication with the network. The valid values are in
the range from 64 to 126.
Field Description
SABME Indicates the set asynchronous balanced mode extended command.
This command places the recipient into modulo 128 multiple frame
acknowledged operation. This command also indicates that all
exception conditions have been cleared. The SABME command is sent
once a second for N200 times (typically three times) until its
acceptance is confirmed with a UA response. For a list and brief
description of other commands and responses that can be exchanged
between the data link layer entities on the local router and the network,
see ITU-T Recommendation Q.921.
sapi = 0 Identifies the service access point at which the data link layer entity
provides services to Layer 3 or to the management layer. A SAPI with
the value 0 indicates it is a call control procedure. Note that the Layer
2 management procedures such as TEI assignment, TEI removal, and
TEI checking, which are tracked with the debug isdn q921 command,
do not display the corresponding SAPI value; it is implicit. If the SAPI
value were displayed, it would be 63.
tei = 64 Indicates the TEI value automatically assigned by the ASP. This TEI
value will be used by data link layer entities on the local router in
subsequent communication with the network. The valid values are in
the range from 64 to 126.
IDCKRQ Indicates the Identity Check Request message type sent from the ISDN
service provider on the network to the local router during the TEI check
procedure. This message is sent in a UI command frame. The ri field is
always 0. The ai field for this message contains either a specific TEI
value for the local router to check or 127, which indicates that the local
router should check all TEI values. For a list and brief description of
other message types that can be exchanged between the local router
and the ISDN service provider on the network, see Appendix B, “ISDN
Switch Types, Codes, and Values.”
IDCKRP Indicates the Identity Check Response message type sent from the
local router to the ISDN service provider on the network during the TEI
check procedure. This message is sent in a UI command frame in
response to the IDCKRQ message. The ri field is a randomly generated
number from 0 to 65535. The ai field for this message contains the
specific TEI value that has been checked.
UAf Confirms that the network side has accepted the SABME command
previously sent by the local router. The final bit is set to 1.
INFOc Indicates that this is an Information command. It is used to transfer
sequentially numbered frames containing information fields that are
provided by Layer 3. The information is transferred across a data-link
connection.
INFORMATION pd = 8 Indicates the information fields provided by Layer 3. The information
callref = (null) is sent one frame at a time. If multiple frames need to be sent, several
Information commands are sent. The pd value is the protocol
discriminator. The value 8 indicates it is call control information. The
call reference number is always null for SPID information.
Field Description
SPID information i = Indicates the SPID. The local router sends this information to the ISDN
0x343135393033383336363 switch to indicate the services to which it subscribes. SPIDs are
031 assigned by the service provider and are usually 10-digit telephone
numbers followed by optional numbers. Currently, only the DMS-100
switch supports SPIDs, one for each B channel. If SPID information is
sent to a switch type other than DMS-100, an error may be displayed
in the debug information.
ns = 0 Indicates the send sequence number of sent I frames.
nr = 0 Indicates the expected send sequence number of the next received I
frame. At time of transmission, this value should be equal to the value
of ns. The value of nr is used to determine whether frames need to be
re-sent for recovery.
RRr Indicates the Receive Ready response for unacknowledged information
transfer. The RRr is a response to an INFOc.
RRp Indicates the Receive Ready command with the poll bit set. The data
link layer entity on the user side uses the poll bit in the frame to solicit
a response from the peer on the network side.
RRf Indicates the Receive Ready response with the final bit set. The data
link layer entity on the network side uses the final bit in the frame to
indicate a response to the poll.
sapi Indicates the service access point identifier. The SAPI is the point at
which data link services are provided to a network layer or
management entity. Currently, this field can have the value 0 (for call
control procedure) or 63 (for Layer 2 management procedures).
tei Indicates the terminal endpoint identifier (TEI) that has been assigned
automatically by the assignment source point (ASP) (also called the
layer management entity on the network side). The valid range is from
64 to 126. The value 127 indicates a broadcast.
Usage Guidelines The ISDN network layer interface provided by the router conforms to the user interface specification
defined by ITU-T recommendation Q.931, supplemented by other specifications such as for switch type
VN4. The router tracks only activities that occur on the user side, not the network side, of the network
connection. The display information debug isdn q931 command output is limited to commands and
responses exchanged during peer-to-peer communication carried over the D channel. This debug
information does not include data sent over the B channels, which are also part of the router’s ISDN
interface. The peers (network layers) communicate with each other via an ISDN switch over the D
channel.
A router can be the calling or called party of the ISDN Q.931 network connection call setup and tear-
down procedures. If the router is the calling party, the command displays information about an outgoing
call. If the router is the called party, the command displays information about an incoming call.
You can use the debug isdn q931 command with the debug isdn event and the debug isdn q921
commands at the same time. The displays will be intermingled. Use the service timestamps debug
datetime msec global configuration command to include the time with each message.
For more information on ISDN switch types, codes, and values, refer to Appendix B, “ISDN Switch
Types, Codes, and Values.”
Examples The following is sample output from the debug isdn q931 command of a call setup procedure for an
outgoing call:
Router# debug isdn q931
The following is sample output from the debug isdn q931 command of a call setup procedure for an
incoming call:
Router# debug isdn q931
The following is sample output from the debug isdn q931 command of a call teardown procedure from
the network:
Router# debug isdn q931
The following is sample output from the debug isdn q931 command of a call teardown procedure from
the router:
Router# debug isdn q931
Field Description
TX -> Indicates that this message is being sent from the local router (user
side) to the network side of the ISDN interface.
RX <- Indicates that this message is being received by the user side of the
ISDN interface from the network side.
SETUP Indicates that the SETUP message type has been sent to initiate call
establishment between peer network layers. This message can be sent
from either the local router or the network.
pd Indicates the protocol discriminator. The protocol discriminator
distinguishes messages for call control over the user-network ISDN
interface from other ITU-T-defined messages, including other Q.931
messages. The protocol discriminator is 8 for call control messages
such as SETUP. For basic-1tr6, the protocol discriminator is 65.
Field Description
callref Indicates the call reference number in hexadecimal notation. The value
of this field indicates the number of calls made from either the router
(outgoing calls) or the network (incoming calls). Note that the
originator of the SETUP message sets the high-order bit of the call
reference number to 0. The destination of the connection sets the
high-order bit to 1 in subsequent call control messages, such as the
CONNECT message. For example, callref = 0x04 in the request
becomes callref = 0x84 in the response.
Bearer Capability Indicates the requested bearer service to be provided by the network.
Refer to Table B-4 in Appendix B, “ISDN Switch Types, Codes,
and Values,” for detailed information about bearer capability values.
i= Indicates the information element identifier. The value depends on the
field it is associated with. Refer to the ITU-T Q.931 specification for
details about the possible values associated with each field for which
this identifier is relevant.
Channel ID Indicates the channel identifier. The value 83 indicates any channel, 89
indicates the B1 channel, and 8A indicates the B2 channel. For more
information about the Channel Identifier, refer to ITU-T
Recommendation Q.931.
Called Party Number Identifies the called party. This field is only present in outgoing
SETUP messages. Note that it can be replaced by the Keypad facility
field. This field uses the IA5 character set.
Calling Party Number Identifies the origin of the call. This field is present only in incoming
SETUP messages. This field uses the IA5 character set.
CALL_PROC Indicates the CALL PROCEEDING message; the requested call setup
has begun and no more call setup information will be accepted.
CONNECT Indicates that the called user has accepted the call.
CONNECT_ACK Indicates that the calling user acknowledges the called user’s
acceptance of the call.
DISCONNECT Indicates either that the user side has requested the network to clear an
end-to-end connection or that the network has cleared the end-to-end
connection.
Cause Indicates the cause of the disconnect. Refer to Table B-2 and Table B-3
in Appendix B, “ISDN Switch Types, Codes, and Values,” for detailed
information about DISCONNECT cause codes and RELEASE cause
codes.
Looking Shift to Codeset 6 Indicates that the next information elements will be interpreted
according to information element identifiers assigned in codeset 6.
Codeset 6 means that the information elements are specific to the local
network.
Codeset 6 IE 0x1 i = 0x82, Indicates charging information. This information is specific to the NTT
‘10’ switch type and may not be sent by other switch types.
Field Description
RELEASE Indicates that the sending equipment will release the channel and call
reference. The recipient of this message should prepare to release the
call reference and channel.
RELEASE_COMP Indicates that the sending equipment has received a RELEASE
message and has now released the call reference and channel.
Usage Guidelines Disable console logging and use buffered logging before using the debug isdn tgrm command. Using
the debug isdn tgrm command generates a large volume of debugs, which can affect router
performance.
Examples A sample output of the debug isdn tgrm command is shown below.
The output shows that the channel used (bchan) is 1, service state is 0 (in-service), call_state is 2 (busy),
“false busy” is 0, and DSL is 2. The output also shows that the B channel is 1, the channel is available,
and the call state is transitioned from 0 (idle) to 2 (busy).
The last two lines of output shows that bchan is 1, call state is 1 (busy), call type is 2 (voice), and call
direction is 1 (incoming).
00:26:31:ISDN:get_tgrm_avail_state:idb 0x64229380 bchan 1 service_state 0 call_state 2
false busy 0x0 dsl 2
00:26:31:ISDN:update_tgrm_call_status:idb 0x64229380 bchan 1 availability state 1 call
state(prev,new) (0,2), dsl 2
00:26:31:ISDN:Calling TGRM with tgrm_call_isdn_update:idb 0x64229380 bchan 1 call state 1
call type 2 call dir 1
Table 152 provides an alphabetical listing of the fields shown in the debug isdn tgrm command output
and a description of each field.
Field Description
availability state Indicates whether the channel is available:
0 = Not available
1 = Available
bchan Bearer channel used for this call.
call dir Direction of the call:
0 = Incoming
1 = Outgoing
call_state State of the call. It has different values depending on whether it is
from ISDN perspective or TGRM perspective.
When printed from get_tgrm_avail_state(), it is the state value
from ISDN perspective:
0 = Idle
1 = Negotiate
2 = Busy
3 = Reserved
4 = Restart pending
5 = Maintenance pend
6 = Reassigned
When printed from tgrm_call_isdn_update(), it is the state value
from TGRM perspective:
0 = Idle
1 = Busy
2 = Pending
3 = Reject
call state (prev, new) Indicates the state transition of the call. The state values are as
shown in call_state from the ISDN perspective.
call type Type of call:
0 = Invalid
1 = Data
2 = Voice
3 = Modem
4 = None
dsl Internal interface identifier.
false busy Bit map of all the channels on the interface indicating their soft
busy status.
idb Address of the interface descriptor block (IDB) for the interface.
service_state Service state:
0 = In-service
1 = Maintenance
2 = Out of service
Examples The following is sample output from the debug isis adj packets command:
Router# debug isis adj packets
ISIS-Adj: Rec L1 IIH from 0000.0c00.40af (Ethernet0), cir type 3, cir id BBBB.BBBB.BBBB.01
ISIS-Adj: Rec L2 IIH from 0000.0c00.40af (Ethernet0), cir type 3, cir id BBBB.BBBB.BBBB.01
ISIS-Adj: Rec L1 IIH from 0000.0c00.0c36 (Ethernet1), cir type 3, cir id CCCC.CCCC.CCCC.03
ISIS-Adj: Area mismatch, level 1 IIH on Ethernet1
ISIS-Adj: Sending L1 IIH on Ethernet1
ISIS-Adj: Sending L2 IIH on Ethernet1
ISIS-Adj: Rec L2 IIH from 0000.0c00.0c36 (Ethernet1), cir type 3, cir id BBBB.BBBB.BBBB.03
The following line indicates that the router received an IS-IS hello packet (IIH) on Ethernet interface 0
from the Level 1 router (L1) at MAC address 0000.0c00.40af. The circuit type is the interface type:
1—Level 1 only; 2—Level 2 only; 3—Level 1/2.
The circuit ID is what the neighbor interprets as the designated router for the interface.
ISIS-Adj: Rec L1 IIH from 0000.0c00.40af (Ethernet0), cir type 3, cir id BBBB.BBBB.BBBB.01
The following line indicates that the router (configured as a Level 1 router) received on Ethernet
interface 1 is an IS-IS hello packet from a Level 1 router in another area, thereby declaring an area
mismatch:
ISIS-Adj: Area mismatch, level 1 IIH on Ethernet1
The following lines indicates that the router (configured as a Level 1/Level 2 router) sent on Ethernet
interface 1 is a Level 1 IS-IS hello packet, and then a Level 2 IS-IS packet:
ISIS-Adj: Sending L1 IIH on Ethernet1
ISIS-Adj: Sending L2 IIH on Ethernet1
Syntax Description information Required keyword that specifies IS-IS authentication information.
Examples The following example displays output from the debug isis authentication command with the
information keyword:
Router# debug isis authentication information
The sample output indicates that the router has been running for 3 days and 3 hours. Debugging output
is about IS-IS authentication information. The local router is configured for authentication, but it
received a packet that does not contain authentication data; the remote router does not have
authentication configured.
Examples In the following example, information about traffic engineering advertisements is printed in IS-IS LSA
messages:
Router# debug isis mpls traffic-eng advertisements
System ID:Router1.00
Router ID:10.106.0.6
Link Count:1
Link[1]
Neighbor System ID:Router2.00 (P2P link)
Interface IP address:10.42.0.6
Neighbor IP Address:10.42.0.10
Admin. Weight:10
Physical BW:155520000 bits/sec
Reservable BW:5000000 bits/sec
BW unreserved[0]:2000000 bits/sec, BW unreserved[1]:100000 bits/sec
BW unreserved[2]:100000 bits/sec, BW unreserved[3]:100000 bits/sec
BW unreserved[4]:100000 bits/sec, BW unreserved[5]:100000 bits/sec
BW unreserved[6]:100000 bits/sec, BW unreserved[7]:0 bits/sec
Affinity Bits:0x00000000
Field Description
System ID Identification value for the local system in the area.
Router ID Multiprotocol Label Switching traffic engineering router ID.
Link Count Number of links that MPLS traffic engineering advertised.
Neighbor System ID Identification value for the remote system in an area.
Interface IP address IPv4 address of the interface.
Neighbor IP Address IPv4 address of the neighbor.
Admin. Weight Administrative weight associated with this link.
Physical BW Bandwidth capacity of the link (in bits per second).
Reservable BW Amount of reservable bandwidth on this link.
BW unreserved Amount of bandwidth that is available for reservation.
Affinity Bits Attribute flags of the link that are being flooded.
Examples In the following example, information is printed about traffic engineering-related IS-IS events:
Router# debug isis mpls traffic-eng events
Usage Guidelines This command displays information about significant events that occur during SPF-related processing.
Examples The following example displays significant events during an IS-IS SPF computation:
Router# debug isis spf-events
Usage Guidelines The Intermediate System-to-Intermediate System (IS-IS) Interdomain Routing Protocol (IDRP)
provides routing between ISs by flooding the network with link-state information. IS-IS provides routing
at two levels, intra-area (Level 1) and intra-domain (Level 2). Level 1 routing allows Level 1 ISs to
communicate with other Level 1 ISs in the same area. Level 2 routing allows Level 2 ISs to build an
interdomain backbone between Level 1 areas by traversing only Level 2 ISs. Level 1 ISs only need to
know the path to the nearest Level 2 IS in order to take advantage of the interdomain backbone created
by the Level 2 ISs.
The IS-IS protocol uses the shortest-path first (SPF) routing algorithm to build Level 1 and Level 2
routes. The debug isis spf statistics command provides information for determining the time required
to place a Level 1 IS or Level 2 IS on the shortest path tree (SPT) using the IS-IS protocol.
Note The SPF algorithm is also called the Dijkstra algorithm, after the creator of the algorithm.
Examples The following is sample output from the debug isis spf statistics command:
Router# debug isis spf statistics
Field Description
Compute L1 SPT Indicates that Level 1 ISs are to be added to a Level 1 area.
Timestamp Indicates the time at which the SPF algorithm was applied. The
time is expressed as the number of seconds elapsed since the
system was up and configured.
Complete L1 SPT Indicates that the algorithm has completed for Level 1 routing.
Field Description
Compute time Indicates the time required to place the ISs on the SPT.
nodes on SPT Indicates the number of ISs that have been added.
Compute L2 SPT Indicates that Level 2 ISs are to be added to the domain.
Complete L2 SPT Indicates that the algorithm has completed for Level 2 routing.
The following lines show the statistical information available for Level 1 ISs:
ISIS-Stats: Compute L1 SPT, Timestamp 2780.328 seconds
ISIS-Stats: Complete L1 SPT, Compute time 0.004, 1 nodes on SPT
The output indicates that the SPF algorithm was applied 2780.328 seconds after the system was up and
configured. Given the existing intra-area topology, 4 milliseconds were required to place one Level 1 IS
on the SPT.
The following lines show the statistical information available for Level 2 ISs:
ISIS-Stats: Compute L2 SPT, Timestamp 2780.3336 seconds
ISIS-Stats: Complete L2 SPT, Compute time 0.056, 12 nodes on SPT
This output indicates that the SPF algorithm was applied 2780.3336 seconds after the system was up and
configured. Given the existing intradomain topology, 56 milliseconds were required to place 12 Level 2
ISs on the SPT.
Examples This router has been configured for IS-IS routing. The following is sample output from thee debug isis
update-packets command:
Router# debug isis update-packets
The following lines indicate that the router has sent a periodic Level 1 and Level 2 complete sequence
number PDU on Ethernet interface 0:
ISIS-Update: Sending L1 CSNP on Ethernet0
ISIS-Update: Sending L2 CSNP on Ethernet0
The following lines indicate that the network service access point (NSAP) identified as
8888.8800.0181.00 was deleted from the Level 2 LSP 1600.8906.4022.00-00. The sequence number
associated with this LSP is 0xE.
ISIS-Update: Updating L2 LSP
ISIS-Update: Delete link 888.8800.0181.00 from L2 LSP 1600.8906.4022.00-00, seq E
The following lines indicate that the NSAP identified as 8888.8800.0181.00 was added to the Level 2
LSP 1600.8906.4022.00-00. The new sequence number associated with this LSP is 0x10.
ISIS-Update: Updating L1 LSP
ISIS-Update: Sending L1 CSNP on Ethernet0
ISIS-Update: Sending L2 CSNP on Ethernet0
The following line indicates that the router sent Level 2 LSP 1600.8906.4022.00-00 with sequence
number 0x10 on tunnel 0 interface:
ISIS-Update: Sending L2 LSP 1600.8906.4022.00-00, seq 10, ht 1198 on Tunnel0
The following lines indicates that a Level 2 LSP could not be transmitted because it was recently sent:
ISIS-Update: Sending L2 CSNP on Tunnel0
ISIS-Update: Updating L2 LSP
ISIS-Update: Rate limiting L2 LSP 1600.8906.4022.00-00, seq 11 (Tunnel0)
The following lines indicate that a Level 2 partial sequence number PDU (PSNP) has been received on
tunnel 0 interface:
ISIS-Update: Updating L1 LSP
ISIS-Update: Rec L2 PSNP from 8888.8800.0181.00 (Tunnel0)
The following line indicates that a Level 2 PSNP with an entry for Level 2 LSP 1600.8906.4022.00-00
has been received. This output is an acknowledgment that a previously sent LSP was received without
an error.
ISIS-Update: PSNP entry 1600.8906.4022.00-00, seq 10, ht 1196
debug iua as
To display debugging messages for the IDSN User Adaptation Layer (IUA) application server (AS), use
the debug iua as command in privileged EXEC mode. To disable debugging output, use the no form of
this command.
no debug iua as
Syntax Description user Displays information about the use of application programming interfaces
(APIs) and events between the ISDN layer and IUA.
state Displays information about AS state transitions.
all Enables debug for all the configured ASs.
name as-name Defines the name of the AS.
Examples The following example shows debugging output when an ISDN backhaul connection is initially
established. The output shows that state debugging is turned on for all ASs and that the AS is active.
Router# debug iua as state all
debug iua asp {pak | peer-msg | sctp-sig | state} {all | name asp-name}
Examples The following example shows debugging output when an ISDN backhaul connection is initially
established. The output shows that peer message debugging is turned on for all ASPs and that the ASP
is active.
Router# debug iua asp peer-msg all
Router#
00:04:58:IUA :recieved ASP_UP message on ASP asp1
00:04:58:IUA:ASP asp1 xsition ASP-Down --> ASP-Up , cause - rcv peer
msg
ASP-UP
00:04:58:IUA:sending ACK of type 0x304 to asp asp1
00:05:03:IUA:recv ASP_ACTIVE message for ASP asp1
00:05:03:IUA:ASP asp1 xsition ASP-Up --> ASP-Active, cause - rcv peer
msg
ASP-Active
debug kerberos
To display information associated with the Kerberos Authentication Subsystem, use the debug kerberos
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug kerberos
no debug kerberos
Usage Guidelines Kerberos is a security system that authenticates users and services without passing a cleartext password
over the network. Cisco supports Kerberos under the authentication, authorization, and accounting
(AAA) security system.
Use the debug aaa authentication command to get a high-level view of login activity. When Kerberos
is used on the router, you can use the debug kerberos command for more detailed debugging
information.
Examples The following is part of the sample output from the debug aaa authentication command for a Kerberos
login attempt that failed. The information indicates that Kerberos is the authentication method used.
Router# debug aaa authentication
The following is sample output from the debug kerberos command for a login attempt that was
successful. The information indicates that the router sent a request to the key distribution center (KDC)
and received a valid credential.
Router# debug kerberos
The following is sample output from the debug kerberos command for a login attempt that failed. The
information indicates that the router sent a request to the KDC and received a reply, but the reply did not
contain a valid credential.
Router# debug kerberos
The following output shows other failure messages you might see that indicate a configuration problem.
The first message indicates that the router failed to find the default Kerberos realm, therefore the process
failed to build a message to send to the KDC. The second message indicates that the router failed to
retrieve its own IP address. The third message indicates that the router failed to retrieve the current time.
The fourth message indicates the router failed to find or create a credentials cache for a user, which is
usually caused by low memory availability.
Router# debug kerberos
debug kron
To display debugging messages about Command Scheduler policies or occurrences, use the debug kron
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description all Displays all debugging output about Command Scheduler policy lists or
occurrences.
exec-cli Displays detailed debugging output about Command Scheduler policy list
command-line interface (CLI) commands.
info Displays debugging output about Command Scheduler policy lists,
occurrence warnings, or progress information.
major Displays debugging output about Command Scheduler policy list or
occurrence failures.
Usage Guidelines Use the debug kron command to display the output of a scheduled EXEC show command on the
console.
Examples The following example shows debugging messages for the EXEC CLI show version after the CLI was
run at a scheduled interval:
Router# debug kron exec-cli
Usage Guidelines The SGSN module uses the proprietary Layer 2 Relay protocol in conjunction with the intra-Serving
GPRS Support Node (iSGSN) protocol for communication between the SGSN-datacom (SGSN-D) and
SGSN-telecom (SGSN-T) units that comprise the SGSN.
For debugging purposes, it might also be useful to trace Layer 2 Relay packets. To display information
about Layer 2 Relay packets, use the debug l2relay packets command.
Normally you will not need to use the debug l2relay events or debug l2relay packets commands. If
problems with the SGSN are encountered, Cisco technical support personnel may request that issue the
command.
Caution Because the debug l2relay events command generates a substantial amount of output, use it only when
traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples The following example enables the display of Layer 2 Relay events:
Router# debug l2relay events
Usage Guidelines Use the debug l2relay packets command to display information about Layer 2 Relay packets.
The SGSN module uses the proprietary Layer 2 Relay protocol in conjunction with the intra-Serving
GPRS Support Node (iSGSN) protocol for communication between the SGSN-datacom (SGSN-D) and
SGSN-telecom (SGSN-T) units that comprise the SGSN.
For debugging purposes, it might also be useful to trace Layer 2 Relay events. To display information
about Layer 2 Relay events, use the debug l2relay events command.
Normally you will not need to use the debug l2relay packets or debug l2relay events command. If
problems with the SGSN are encountered, Cisco technical support personnel may request that you issue
the command.
Caution Because the debug l2relay packets command generates a significant amount of output, use it only when
traffic on the GPRS network is low, so other activity on the system is not adversely affected.
Examples The following example enables the display of Layer 2 Relay packets:
Router# debug l2relay packets
debug lane client {all | le-arp | mpoa | packet | signaling | state | topology} [interface interface]
no debug lane client {all | le-arp | mpoa | packet | signaling | state | topology} [interface
interface]
Syntax Description all Displays all debug information related to the LEC.
le-arp Displays debug information related to the LAN Emulation (LANE) Address
Resolution Protocol (ARP) table.
mpoa Displays debug information to track the following:
• MPOA specific TLV information in le-arp requests/responses
• Elan-id and local segment TLV in lane control frames
• When a LANE client is bound to an MPC/MPS
packet Displays debug information about each packet.
signaling Displays debug information related to client switched virtual circuits (SVCs).
state Displays debug information when the state changes.
topology Displays debug information related to the topology of the emulated LAN
(ELAN).
interface interface (Optional) Limits the debugging output to messages that relate to a particular
interface or subinterface. If you enter this command multiple times with different
interfaces, the last interface entered will be the one used to filter the messages.
Defaults If the interface number is not specified, the default will be the number of all the mpoa lane clients.
Usage Guidelines The debug lane client all command can generate a large amount of output. Use a limiting keyword or
specify a subinterface to decrease the amount of output and focus on the information you need.
Examples The following example shows output for debug lane client packet and debug lane client state
commands for an LEC joining an ELAN named elan1:
Router# debug lane client packet
The LEC listens for signaling calls to its ATM address (Initial State):
LEC ATM2/0.1: sending LISTEN
LEC ATM2/0.1: listen on 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: received LISTEN
The LEC calls the LAN Emulation Configuration Server (LECS) and attempts to set up the Configure
Direct VC (LECS Connect Phase):
LEC ATM2/0.1: sending SETUP
LEC ATM2/0.1: callid 0x6114D174
LEC ATM2/0.1: called party 39.020304050607080910111213.00000CA05B43.00
LEC ATM2/0.1: calling_party 39.020304050607080910111213.00000CA05B40.01
The LEC receives a CONNECT response from the LECS. The Configure Direct VC is established:
LEC ATM2/0.1: received CONNECT
LEC ATM2/0.1: callid 0x6114D174
LEC ATM2/0.1: vcd 148
The LEC sends a CONFIG REQUEST to the LECS on the Configure Direct VC (Configuration Phase):
LEC ATM2/0.1: sending LANE_CONFIG_REQ on VCD 148
LEC ATM2/0.1: SRC MAC address 0000.0ca0.5b40
LEC ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: LAN Type 2
LEC ATM2/0.1: Frame size 2
LEC ATM2/0.1: LAN Name elan1
LEC ATM2/0.1: LAN Name size 5
The LEC receives a CONFIG RESPONSE from the LECS on the Configure Direct VC:
LEC ATM2/0.1: received LANE_CONFIG_RSP on VCD 148
LEC ATM2/0.1: SRC MAC address 0000.0ca0.5b40
LEC ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: LAN Type 2
LEC ATM2/0.1: Frame size 2
LEC ATM2/0.1: LAN Name elan1
LEC ATM2/0.1: LAN Name size 5
The LEC calls the LAN Emulation Server (LES) and attempts to set up the Control Direct VC
(Join/Registration Phase):
LEC ATM2/0.1: sending SETUP
LEC ATM2/0.1: callid 0x61167110
LEC ATM2/0.1: called party 39.020304050607080910111213.00000CA05B41.01
LEC ATM2/0.1: calling_party 39.020304050607080910111213.00000CA05B40.01
The LEC receives a CONNECT response from the LES. The Control Direct VC is established:
LEC ATM2/0.1: received CONNECT
LEC ATM2/0.1: callid 0x61167110
LEC ATM2/0.1: vcd 150
The LEC sends a JOIN REQUEST to the LES on the Control Direct VC:
LEC ATM2/0.1: sending LANE_JOIN_REQ on VCD 150
LEC ATM2/0.1: Status 0
LEC ATM2/0.1: LECID 0
LEC ATM2/0.1: SRC MAC address 0000.0ca0.5b40
LEC ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: LAN Type 2
LEC ATM2/0.1: Frame size 2
LEC ATM2/0.1: LAN Name elan1
LEC ATM2/0.1: LAN Name size 5
The LEC receives a SETUP request from the LES to set up the Control Distribute VC:
LEC ATM2/0.1: received SETUP
LEC ATM2/0.1: callid 0x6114D174
LEC ATM2/0.1: called party 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: calling_party 39.020304050607080910111213.00000CA05B41.01
A CONNECT_ACK is received from the ATM switch. The Control Distribute VC is established:
LEC ATM2/0.1: received CONNECT_ACK
The LEC receives a JOIN response from the LES on the Control Direct VC.
The LEC sends an LE ARP request to the LES to obtain the broadcast and unknown server (BUS) ATM
NSAP address (BUS connect):
LEC ATM2/0.1: sending LANE_ARP_REQ on VCD 150
LEC ATM2/0.1: SRC MAC address 0000.0ca0.5b40
LEC ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: TARGET MAC address ffff.ffff.ffff
LEC ATM2/0.1: TARGET ATM address 00.000000000000000000000000.000000000000.00
The LEC receives its own LE ARP request via the LES over the Control Distribute VC:
LEC ATM2/0.1: received LANE_ARP_RSP on VCD 151
LEC ATM2/0.1: SRC MAC address 0000.0ca0.5b40
LEC ATM2/0.1: SRC ATM address 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: TARGET MAC address ffff.ffff.ffff
LEC ATM2/0.1: TARGET ATM address 39.020304050607080910111213.00000CA05B42.01
The LEC calls the BUS and attempts to set up the Multicast Send VC:
LEC ATM2/0.1: sending SETUP
LEC ATM2/0.1: callid 0x6114D354
LEC ATM2/0.1: called party 39.020304050607080910111213.00000CA05B42.01
LEC ATM2/0.1: calling_party 39.020304050607080910111213.00000CA05B40.01
The LEC receives a CONNECT response from the BUS. The Multicast Send VC is established:
LEC ATM2/0.1: received CONNECT
LEC ATM2/0.1: callid 0x6114D354
LEC ATM2/0.1: vcd 153
The LEC receives a SETUP request from the BUS to set up the Multicast Forward VC:
LEC ATM2/0.1: received SETUP
LEC ATM2/0.1: callid 0x610D4230
LEC ATM2/0.1: called party 39.020304050607080910111213.00000CA05B40.01
LEC ATM2/0.1: calling_party 39.020304050607080910111213.00000CA05B42.01
A CONNECT_ACK is received from the ATM switch. The Multicast Forward VC is established:
LEC ATM2/0.1: received CONNECT_ACK
The following output is from the show lane client command after the LEC joins the emulated LAN as
shown in the debug lane client output:
Router# show lane client
The following example shows debug lane client all command output when an interface with LECS, an
LES/BUS, and an LEC is shut down:
Router# debug lane client all
The following output is from the debug lane client mpoa command when the lane interface is shut
down:
Router# debug lane client mpoa
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int atm 1/1/0.1
Router(config-subif)#shutdown
Router(config-subif)#
00:23:32:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to down
00:23:32:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN
00:23:32:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN
Router(config-subif)#
Router(config-subif)#
Router(config-subif)#
Router(config-subif)#exit
Router(config)#exit
The following output is from the debug lane client mpoa command when the lane interface is started
(not shut down):
Router# debug lane client mpoa
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int atm 1/1/0.1
Router(config-subif)#
Router(config-subif)#
Router(config-subif)#no shutdown
Router(config-subif)#
00:23:39:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_CONFIG_RSP, num_tlvs 14
00:23:39:LEC ATM1/1/0.1:elan id from LECS set to 300
00:23:39:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_JOIN_RSP, num_tlvs 1
00:23:39:LEC ATM1/1/0.1:elan id from LES set to 300
00:23:39:LEC ATM1/1/0.1:lec_append_mpoa_dev_tlv:
00:23:39:LEC ATM1/1/0.1:got mpoa client addr 47.0091810000000050E2097801.0050A
29AF42D.00
00:23:39:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to up
00:23:39:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:UP
00:25:57:LEC ATM1/1/0.1:lec_process_lane_tlv:msg LANE_ARP_REQ, num_tlvs 1
00:25:57:LEC ATM1/1/0.1:lec_process_dev_type_tlv: lec 47.0091810000000050E
2097801.00500B306440.02
type MPS, mpc 00.000000000000000000000000.000000000000.00
mps 47.0091810000000050E2097801.00500B306444.00, num_mps_mac 1, mac 0050.0b3
0.6440
00:25:57:LEC ATM1/1/0.1:create mpoa_lec
00:25:57:LEC ATM1/1/0.1:new mpoa_lec 0x617E3118
00:25:57:LEC ATM1/1/0.1:lec_process_dev_type_tlv:type MPS, num _mps_mac
1
00:2t 5:57:LEC ATM1/1/0.1:lec_add_mps:
remote lec 47.0091810000000050E2097801.00500B306440.02
mps 47.0091810000000050E2097801.00500B306444.00 num_mps_mac 1, mac 0050.0b30
.6440
00:25:57:LEC ATM1/1/0.1:mpoa_device_change:lec_nsap 47.0091810000000050E20978
01.00500B306440.02, appl_type 5
mpoa_nsap 47.0091810000000050E2097801.00500B306444.00, opcode 4
00:25:57:LEC ATM1/1/0.1:lec_add_mps:add mac 0050.0b30.6440, mps_mac 0x617E372
C
00:25:57:LEC ATM1/1/0.1:mpoa_device_change:lec_nsap 47.0091810000000050E20978
01.00500B306440.02, appl_type 5
mpoa_nsap 47.0091810000000050E2097801.00500B306444.00, opcode 5
00:25:57:LEC ATM1/1/0.1: mps_mac 0050.0b30.6440
00:25:57:LEC ATM1/1/0.1:lec_append_mpoa_dev_tlv:
The following output is from the debug lane client mpoa command when the ATM major interface is
shut down:
Router# debug lane client mpoa
Router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int atm 1/1/0
Router(config-if)# shutdown
Router(config-if)#
00:26:28:LANE ATM1/1/0:atm hardware reset
00:26:28:%LANE-5-UPDOWN:ATM1/1/0.1 elan elan2:LE Client changed state to down
00:26:28:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN
00:26:28:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN
00:26:28:%MPOA-5-UPDOWN:MPC mpc2:state changed to down
00:26:28:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 0
00:26:30:%LINK-5-CHANGED:Interface ATM1/1/0, changed state to administratively
down
00:26:30:LANE ATM1/1/0:atm hardware reset
00:26:31:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/1/0, changed stat
e to down
Router(config-if)#
00:26:31:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 0
The following output is from the debug lane client mpoa command when the ATM major interface is
started:
Router# debug lane client mpoa
Router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# int atm 1/1/0
Router(config-if)# no shutdown
00:26:32:LANE ATM1/1/0:atm hardware reset
00:26:32:LEC ATM1/1/0.1:lec_inform_mpoa_state_chg:DOWN
00:26:34:%LINK-3-UPDOWN:Interface ATM1/1/0, changed state to down
00:26:34:LANE ATM1/1/0:atm hardware reset
00:26:41:%LINK-3-UPDOWN:Interface ATM1/1/0, changed state to up
00:26:42:%LINEPROTO-5-UPDOWN:Line protocol on Interface ATM1/1/0, changed stat
e to up
00:27:10:%LANE-6-INFO:ATM1/1/0:ILMI prefix add event received
00:27:10:LANE ATM1/1/0:prefix add event for 470091810000000050E2097801 ptr=0x6
17BFC0C len=13
00:27:10: the current first prefix is now:470091810000000050E2097801
00:27:10:%ATMSSCOP-5-SSCOPINIT:- Intf :ATM1/1/0, Event :Rcv End, State :Act
ive.
00:27:10:LEC ATM1/1/0.1:mpoa_to_lec:appl 6, opcode 0
Syntax Description all Displays all debugging messages related to the LANE configuration
server. The output includes both the events and packets types of
output.
events Displays only messages related to significant LANE configuration
server events.
packets Displays information on each packet sent or received by the LANE
configuration server.
Usage Guidelines The debug lane config output is intended to be used primarily by a Cisco technical support
representative.
Examples The following is sample output from the debug lane config all command when an interface with LECS,
an LES/BUS, and an LEC is shut down:
Router# debug lane config all
Usage Guidelines The debug lane finder command output is intended to be used primarily by a Cisco technical support
representative.
Examples The following is sample output from the debug lane finder command when an interface with LECS,
LES/BUS, and LEC is shut down:
Router# debug lane finder
Syntax Description interface interface (Optional) Limits the debugging output to messages relating to a specific
interface or subinterface. If you use this command multiple times with different
interfaces, the last interface entered is the one used to filter debugging
messages.
Usage Guidelines The debug lane server command output is intended to be used primarily by a Cisco technical support
representative. The debug lane server command can generate a substantial amount of output. Specify a
subinterface to decrease the amount of output and focus on the information you need.
Examples The following is sample output from the debug lane server command when an interface with LECS,
LES/BUS, and LEC is shut down:
Router# debug lane server
Syntax Description interface interface (Optional) Limits the debugging output to messages relating to a
specific interface or subinterface. If you use this command multiple
times with different interfaces, the last interface entered is the one
used to filter debugging messages.
Usage Guidelines The debug lane signaling command output is intended to be used primarily by a Cisco technical support
representative. The debug lane signaling command can generate a substantial amount of output. Specify
a subinterface to decrease the amount of output and focus on the information you need.
Examples The following is sample output from the debug lane signaling command when an interface with LECS,
LES/BUS, and LEC is shut down:
Router# debug lane signaling
LANE SIG ATM1/0.1: sent ATM_RELEASE request for lv 0x60EBBC10 in state LANE_VCC_CONNECTED
LANE SIG ATM1/0.1: sent ATM_RELEASE request for lv 0x60EBBB80 in state LANE_VCC_CONNECTED
LANE SIG ATM1/0.1: sent ATM_RELEASE request for lv 0x60EBBA60 in state LANE_VCC_CONNECTED
LANE SIG ATM1/0.1: received ATM_RELEASE_COMPLETE callid 0x60EBEB00 cause 0 lv 0x60EBBC10
lvstate LANE_VCC_DROP_SENT
LANE SIG ATM1/0.1: lane_sig_mc_release: breaking lv 0x60EBBC10 from mcg 0x60E8F560
LANE SIG ATM1/0.1: timer for lv 0x60EBBC10 stopped
LANE SIG ATM1/0.2: received ATM_RELEASE_COMPLETE callid 0x60E8B174 cause 0 lv 0x60E8D2B8
lvstate LANE_VCC_RELEASE_SENT
LANE SIG ATM1/0.2: timer for lv 0x60E8D2B8 stopped
LANE SIG ATM1/0.3: received ATM_RELEASE_COMPLETE callid 0x60E8B990 cause 0 lv 0x60E8BE64
lvstate LANE_VCC_RELEASE_SENT
LANE SIG ATM1/0.3: timer for lv 0x60E8BE64 stopped
LANE SIG ATM1/0.2: received ATM_RELEASE_COMPLETE callid 0x60EB7FE0 cause 0 lv 0x60E8D3D8
lvstate LANE_VCC_RELEASE_SENT
LANE SIG ATM1/0.2: timer for lv 0x60E8D3D8 stopped
LANE SIG ATM1/0.3: received ATM_RELEASE_COMPLETE callid 0x60EB8554 cause 0 lv 0x60E8BF84
lvstate LANE_VCC_RELEASE_SENT
LANE SIG ATM1/0.3: timer for lv 0x60E8BF84 stopped
LANE SIG ATM1/0.1: received ATM_RELEASE_COMPLETE callid 0x60EBB6D4 cause 0 lv 0x60EBBA60
lvstate LANE_VCC_RELEASE_SENT
LANE SIG ATM1/0.1: timer for lv 0x60EBBA60 stopped
LANE SIG ATM1/0.1: received ATM_RELEASE_COMPLETE callid 0x60EBE24C cause 0 lv 0x60EBBB80
lvstate LANE_VCC_RELEASE_SENT
LANE SIG ATM1/0.1: timer for lv 0x60EBBB80 stopped
LANE SIG ATM1/0.1: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER
LANE SIG ATM1/0.1: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER
LANE SIG ATM1/0.2: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER
LANE SIG ATM1/0.2: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER
LANE SIG ATM1/0.3: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER
LANE SIG ATM1/0.3: sent ATM_CANCEL_NSAP request for lv 0x0 in state NULL_VCC_POINTER
LANE SIG ATM1/0.1: received ATM_CANCEL_NSAP for nsap
00.000000000000050000000000.000000000000.00
LANE SIG ATM1/0.1: received ATM_CANCEL_NSAP for nsap
00.000000000000050000000000.000000000000.00
LANE SIG ATM1/0.2: received ATM_CANCEL_NSAP for nsap
00.000000000000050000000000.000000000000.00
LANE SIG ATM1/0.2: received ATM_CANCEL_NSAP for nsap
00.000000000000050000000000.000000000000.00
LANE SIG ATM1/0.3: received ATM_CANCEL_NSAP for nsap
00.000000000000050000000000.000000000000.00
LANE SIG ATM1/0.3: received ATM_CANCEL_NSAP for nsap
00.000000000000050000000000.000000000000.00
debug lapb
To display all traffic for interfaces using Link Access Procedure, Balanced (LAPB) encapsulation, use
the debug lapb command in privileged EXEC mode. To disable debugging output, use the no form of
this command.
debug lapb
no debug lapb
Usage Guidelines This command displays information on the X.25 Layer 2 protocol. It is useful to users familiar with the
LAPB protocol.
You can use the debug lapb command to determine why X.25 interfaces or LAPB connections are going
up and down. It is also useful for identifying link problems, as evidenced when the show interfaces
EXEC command displays a high number of rejects or frame errors over the X.25 link.
Caution Because the debug lapb command generates a substantial amount of output, use it when the aggregate
of all LAPB traffic on X.25 and LAPB interfaces is fewer than five frames per second.
Examples The following is sample output from the debug lapb command (the numbers 1 through 7 at the top of
the display have been added in order to aid documentation):
1 2 3 4 5 6 7
Serial0: LAPB I CONNECT (5) IFRAME P 2 1
Serial0: LAPB O REJSENT (2) REJ F 3
Serial0: LAPB O REJSENT (5) IFRAME 0 3
Serial0: LAPB I REJSENT (2) REJ (C) 7
Serial0: LAPB I DISCONNECT (2) SABM P
Serial0: LAPB O CONNECT (2) UA F
Serial0: LAPB O CONNECT (5) IFRAME 0 0
Serial0: LAPB T1 CONNECT 357964 0
Each line of output describes a LAPB event. There are two types of LAPB events: frame events (when
a frame enters or exits the LAPB) and timer events. In the sample output, the last line describes a timer
event; all of the other lines describe frame events. Table 155 describes the first seven fields.
Field Description
First field (1) Interface type and unit number reporting the frame event.
Second field (2) Protocol providing the information.
Third field (3) Frame event type. Possible values are as follows:
• I—Frame input
• O—Frame output
• T1—T1 timer expired
• T3—Interface outage timer expired
• T4—Idle link timer expired
Fourth field (4) State of the protocol when the frame event occurred. Possible values
are as follows:
• BUSY (RNR frame received)
• CONNECT
• DISCONNECT
• DISCSENT (disconnect sent)
• ERROR (FRMR frame sent)
• REJSENT (reject frame sent)
• SABMSENT (SABM frame sent)
Fifth field (5) In a frame event, this value is the size of the frame (in bytes). In a timer
event, this value is the current timer value (in milliseconds).
Field Description
Sixth field (6) In a frame event, this value is the frame type name. Possible values for
frame type names are as follows:
• DISC—Disconnect
• DM—Disconnect mode
• FRMR—Frame reject
• IFRAME—Information frame
• ILLEGAL—Illegal LAPB frame
• REJ—Reject
• RNR—Receiver not ready
• RR—Receiver ready
• SABM—Set asynchronous balanced mode
• SABME—Set asynchronous balanced mode, extended
• UA—Unnumbered acknowledgment
In a T1 timer event, this value is the number of retransmissions already
attempted.
Seventh field (7) This field is only present in frame events. It describes the frame type
(This field will not print if identified by the LAPB address and Poll/Final bit. Possible values are
the frame control field is as follows:
required to appear as either a • (C)—Command frame
command or a response, and
• (R)—Response frame
that frame type is correct.)
• P—Command/Poll frame
• F—Response/Final frame
• /ERR—Command/Response type is invalid for the control field.
An ?ERR generally means that the data terminal equipment
(DTE)/data communications equipment (DCE) assignments are
not correct for this link.
• BAD-ADDR—Address field is neither Command nor Response
A timer event only displays the first six fields of debug lapb command output. For frame events,
however, the seventh field documents the LAPB control information present in the frame. Depending on
the value of the frame type name shown in the sixth field, the seventh field may or may not appear.
After the Poll/Final indicator, depending on the frame type, three different types of LAPB control
information can be printed.
For information frames, the value of the N(S) field and the N(R) field will be printed. The N(S) field of
an information frame is the sequence number of that frame, so this field will rotate between 0 and 7 for
(modulo 8 operation) or 0 and 127 (for modulo 128 operation) for successive outgoing information
frames and (under normal circumstances) also will rotate for incoming information frame streams. The
N(R) field is a “piggybacked” acknowledgment for the incoming information frame stream; it informs
the other end of the link which sequence number is expected next.
RR, RNR, and REJ frames have an N(R) field, so the value of that field is printed. This field has exactly
the same significance that it does in an information frame.
For the FRMR frame, the error information is decoded to display the rejected control field, V(R) and
V(S) values, the Response/Command flag, and the error flags WXYZ.
In the following example, the output shows an idle link timer action (T4) where the timer expires twice
on an idle link, with the value of T4 set to five seconds:
Serial2: LAPB T4 CONNECT 255748
Serial2: LAPB O CONNECT (2) RR P 5
Serial2: LAPB I CONNECT (2) RR F 5
Serial2: LAPB T4 CONNECT 260748
Serial2: LAPB O CONNECT (2) RR P 5
Serial2: LAPB I CONNECT (2) RR F 5
The following example output shows an error condition when no DCE to DTE connection exists. Note
that if a frame has only one valid type (for example, a SABM can only be a command frame), a received
frame that has the wrong frame type will be flagged as a receive error (R/ERR in the following output).
This feature makes misconfigured links (DTE-DTE or DCE-DCE) easy to spot. Other, less common
errors will be highlighed too, such as a too-short or too-long frame, or an invalid address (neither
command nor response).
Serial2: LAPB T1 SABMSENT 1026508 1
Serial2: LAPB O SABMSENT (2) SABM P
Serial2: LAPB I SABMSENT (2) SABM (R/ERR)
Serial2: LAPB T1 SABMSENT 1029508 2
Serial2: LAPB O SABMSENT (2) SABM P
Serial2: LAPB I SABMSENT (2) SABM (R/ERR)
The output in the next example shows the router is misconfigured and has a standard (modulo 8) interface
connected to an extended (modulo 128) interface. This condition is indicated by the SABM balanced
mode and SABME balanced mode extended messages appearing on the same interface.
Serial2: LAPB T1 SABMSENT 1428720 0
Serial2: LAPB O SABMSENT (2) SABME P
Serial2: LAPB I SABMSENT (2) SABM P
Serial2: LAPB T1 SABMSENT 1431720 1
Serial2: LAPB O SABMSENT (2) SABME P
Serial2: LAPB I SABMSENT (2) SABM P
debug lapb-ta
To display debugging messages for Link Access Procedure, Balanced-Terminal Adapter (LAPB-TA),
use the debug lapb-ta command in privileged EXEC mode. To disable debugging output, use the no
form of this command.
Examples The following is sample output from the debug lapb-ta command with the error, event, and traffic
keywords activated:
Router# debug lapb-ta error
Usage Guidelines For each datagram (packet) received or sent, a message is logged to the console.
Caution This command severely impacts LAT performance and is intended for troubleshooting use only.
Examples The following is sample output from the debug lat packet command:
Router# debug lat packet
The second line of output describes a packet that is input to the router. Table 156 describes the fields in
this line.
Field Description
LAT: Indicates that this display shows LAT debugging output.
I Indicates that this line of output describes a packet that is input to the
router (I) or output from the router (O).
int = Ethernet0 Indicates the interface on which the packet event took place.
src = 0800.2b11.2d13 Indicates the source address of the packet.
Field Description
dst=0000.0c01.7876 Indicates the destination address of the packet.
type=A Indicates the message type (in hexadecimal notation). Possible values
are as follows:
• 0 = Run Circuit
• 1 = Start Circuit
• 2 = Stop Circuit
• A = Service Announcement
• C = Command
• D = Status
• E = Solicit Information
• F = Response Information
The third line of output describes a packet that is output from the router. Table 157 describes the last
three fields in this line.
Field Description
len= 20 Indicates the length (in hexadecimal notation) of the packet (in bytes).
next 0 Indicates the link on the transmit queue.
ref 1 Indicates the count of packet users.
Examples The following is sample output from the debug lex rcmd command:
Router# debug lex rcmd
The following output indicates that a LAN Extender remote command packet was received on a serial
interface that is not bound to a LAN Extender interface:
LEX-RCMD: "shutdown" command received on unbound serial interface- Serial0
This message can occur for any of the LAN Extender remote commands. Possible causes of this message
are as follows:
• FLEX state machine software error
• Serial line momentarily goes down, which is detected by the host but not by FLEX
The following output indicates that a LAN Extender remote command response has been received. The
hexadecimal values are for internal use only.
LEX-RCMD: Lex0: "inventory" command received
Rcvd rcmd: FF 03 80 41 41 13 00 1A 8A 00 00 16 01 FF 00 00
Rcvd rcmd: 00 02 00 00 07 5B CD 15 00 00 0C 01 15 26
The following output indicates that when the host router originates a LAN Extender remote command
to FLEX, it generates an 8-bit identifier that is used to associate a command with its corresponding
response:
LEX-RCMD: ACK or response received on Serial0 without a corresponding ID
The following output shows that a LAN Extender remote command response was received but that the
CODE field in the header was incorrect:
LEX-RCMD: illegal CODE field received in header: <number>
The following output indicates that a LAN Extender remote command response was received but that it
had an incorrect length field. This message can occur for any of the LAN Extender remote commands.
LEX-RCMD: illegal length for Lex0: "lex input-type-list"
The following output shows that a host router was about to send a remote command when the serial link
went down:
LEX-RCMD: Lex0 is not bound to a serial interface
The following output shows that the serial encapsulation routine of the interface failed to encapsulate
the remote command datagram because the LEX-NCP was not in the OPEN state. Due to the way the
PPP state machine is implemented, it is normal to see a single encapsulation failure for each remote
command that gets sent at bind time.
LEX-RCMD: encapsulation failure
The following output shows that the timer expired for the given remote command without having
received a response from the FLEX device. This message can occur for any of the LAN Extender remote
commands.
LEX-RCMD: timeout for Lex0: "lex priority-group" command
The following output indicates that an illegal parameter was passed to the lex_setup_and_send routine.
This message could be displayed due to a host software error.
LEX-RCMD: lex_setup_and_send called with invalid parameter
The following output is informational and shows when a bind occurs on a shutdown interface:
LEX-RCMD: bind occurred on shutdown LEX interface
The following output shows that the LEX-NCP reached the open state and a bind operation was
attempted with the FLEX's MAC address, but no free LAN Extender interfaces were found that were
configured with that MAC address. This output can occur when the network administrator does not
configure a LAN Extender interface with the correct MAC address.
LEX-RCMD: Serial0- No free Lex interface found with negotiated MAC address 0000.0c00.d8db
The following output shows that the serial line that was bound to the LAN Extender interface went down
and the unbind routine was called, but when the list of active LAN Extender interfaces was searched, the
LAN Extender interface corresponding to the serial interface was not found. This output usually occurs
because of a host software error.
LEX-RCMD: No active Lex interface found for unbind
Usage Guidelines This command is used to display the statistics, which are used for debugging the status of the various
conditions occurred during execution of the monitoring process.
debug list
To filter debugging information on a per-interface or per-access list basis, use the debug list command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description list (Optional) An access list number in the range from 1100 to 1199.
interface (Optional) The interface type. Allowed values are the following:
• channel—IBM Channel interface
• ethernet—IEEE 802.3
• fddi—ANSI X3T9.5
• null—Null interface
• serial—Serial
• tokenring—IEEE 802.5
• tunnel—Tunnel interface
Usage Guidelines The debug list command is used with other debug commands for specific protocols and interfaces to
filter the amount of debug information that is displayed. In particular, this command is designed to filter
specific physical unit (PU) output from bridging protocols. The debug list command is supported with
the following commands:
• debug llc2 errors
• debug llc2 packets
• debug llc2 state
• debug rif
• debug sdlc
• debug token ring
Note All debug commands that support access list filtering use access lists in the range from 1100 to 1199.
The access list numbers shown in the examples are merely samples of valid numbers.
Examples To use the debug list command on only the first of several Logical Link Control, type 2 (LLC2)
connections, use the show llc2 command to display the active connections:
Router# show llc2
Next, configure an extended bridging access list, numbered 1103, for the connection you want to filter:
access-list 1103 permit 4000.1111.111c 0000.0000.0000 4000.2222.22c7 0000.0000.0000 0xC 2
eq 0x404
The convention for the LLC debug list command filtering is to use dmac = 6 bytes, smac = 6 bytes,
dsap_offset = 12, and ssap_offset = 13.
Finally, you invoke the following debug commands:
Router# debug list 1103
To use the debug list command for Synchronous Data Link Control (SDLC) connections, with the
exception of address 04, create access list 1102 to deny the specific address and permit all others:
access-list 1102 deny 0000.0000.0000 0000.0000.0000 0000.0000.0000 0000.0000.0000 0xC 1 eq
0x4
access-list 1102 permit 0000.0000.0000 0000.0000.0000 0000.0000.0000 0000.0000.0000
The convention is to use dmac = 0.0.0, smac = 0.0.0, and sdlc_frame_offset = 12.
Invoke the following debug commands:
Router# debug list 1102
To enable SDLC debugging (or debugging for any of the other supported protocols) for a specific
interface rather than for all interfaces on a router, use the following commands:
Router# debug list serial 0
To enable Token Ring debugging between two MAC address, 0000.3018.4acd and 0000.30e0.8250,
configure an extended bridging access list 1106:
access-list 1106 permit 0000.3018.4acd 8000.0000.0000 0000.30e0.8250 8000.0000.0000
access-list 1106 permit 0000.30e0.8250 8000.0000.0000 0000.3018.4acd 8000.0000.0000
To enable routing information field (RIF) debugging for a single MAC address, configure an access list
1109:
access-list 1109 permit permit 0000.0000.0000 ffff.ffff.ffff 4000.2222.22c6 0000.0000.0000
Examples The following is sample output from the debug llc2 dynwind command:
Router# debug llc2 dynwind
In this example, the router receives a backward explicit congestion notification (BECN) and reduces the
window size to 4. After receiving five consecutive I frames without a BECN, the router increases the
window size to 5.
Examples The following is sample output from the debug llc2 errors command from a router ignoring an
incorrectly configured device:
Router# debug llc2 errors
Each line of output contains the remote MAC address, the local MAC address, the remote service access
point (SAP), and the local SAP. In this example, the router receives unsolicited RR frames marked as
responses.
Usage Guidelines This command also displays information about some error conditions as well as internal interactions
between the Common Link Services (CLS) layer and the LLC2 layer.
Examples The following is sample output from the debug llc2 packet command from the router sending ping data
back and forth to another router:
Router# debug llc2 packet
LLC: llc2_input
401E54F0: 10400000 .@..
401E5500: 303A90CF 0006F4E1 2A200404 012B5E 0:.O..ta* ...+
LLC: i REC_RR_CMD N(R)=21 p/f=1
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 NORMAL REC_RR_CMD (3)
LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_RR_CMD N(R)=42
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 txmt RR_RSP N(R)=20 p/f=1
LLC: llc_sendframe
401E5610: 0040 0006F4E1 2A200000 .@..ta* ..
401E5620: 303A90CF 04050129 00 N 0:.O...). 2012
LLC: llc_sendframe
4022E3A0: 0040 0006F4E1 .@..ta
4022E3B0: 2A200000 303A90CF 04042A28 2C000202 * ..0:.O..*(,...
4022E3C0: 00050B90 A02E0502 FF0003D1 004006C1 .... ......Q.@.A
4022E3D0: D7C9D5C 0.128
C400130A C1D7D7D5 4BD5F2F0 WIUGD...AWWUKUrp
4022E3E0: F1F30000 011A6071 00010860 D7027000 qs....`q...`W.p.
4022E3F0: 00003B00 1112FF01 03000243 6973636F ..;........Cisco
4022E400: 20494F53 69 IOSi
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 txmt I N(S)=21 N(R)=20 p/f=0 size=90
LLC: llc2_input
401E5620: 10400000 303A90CF .@..0:.O
401E5630: 0006F4E1 2A200404 282C2C00 02020004 ..ta* ..(,,.....
401E5640: 03902000 1112FF01 03000243 6973636F .. ........Cisco
401E5650: 20494F53 A0 IOS
LLC: i REC_I_CMD N(R)=22 N(S)=20 V(R)=20 p/f=0
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 NORMAL REC_I_CMD (1)
LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_I_CMD N(S)=20 V(R)=20
LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_I_CMD N(R)=44
LLC: INFO: 0006.f4e1.2a20 0000.303a.90cf 04 04 v(r) 20
The first three lines indicate that the router has received some input from the link:
LLC: llc2_input
401E54F0: 10400000 .@..
401E5500: 303A90CF 0006F4E1 2A200404 012B5E 0:.O..ta* ...+
The next line indicates that this input was an RR command with the poll bit set. The other router has
received sequence number 21 and is waiting for the final bit.
LLC: i REC_RR_CMD N(R)=21 p/f=1
The next two lines contain the MAC addresses of the sender and receiver, and the state of the router when
it received this frame:
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 NORMAL REC_RR_CMD (3)
LLC (rs): 0006.f4e1.2a20 0000.303a.90cf 04 04 REC_RR_CMD N(R)=42
The next four lines indicate that the router is sending a response with the final bit set:
LLC: 0006.f4e1.2a20 0000.303a.90cf 04 04 txmt RR_RSP N(R)=20 p/f=1
LLC: llc_sendframe
401E5610: 0040 0006F4E1 2A200000 .@..ta* ..
401E5620: 303A90CF 04050129 00 N 0:.O...). 2012
Usage Guidelines Refer to the ISO/IEC standard 8802-2 for definitions and explanations of debug llc2 state command
output.
Examples The following is sample output from the debug llc2 state command when a router disables and enables
an interface:
Router# debug llc2 state
Usage Guidelines Unusual events include stations reporting errors or error thresholds being exceeded.
Examples The following is sample output from the debug lnm events command:
Router# debug lnm events
The following message indicates that station 0000.3001.1166 reported errors and has been added to the
list of stations reporting errors. This station is located on Ring 3.
IBMNM3: Adding 0000.3001.1166 to error list
The following message indicates that station 0000.3001.1166 has passed the “early warning” threshold
for error counts:
IBMNM3: Station 0000.3001.1166 going into preweight condition
The following message indicates that station 0000.3001.1166 is experiencing a severe number of errors:
IBMNM3: Station 0000.3001.1166 going into weight condition
The following message indicates that the error counts for station 0000.3001.1166 have all decayed to
zero, so this station is being removed from the list of stations that have reported errors:
IBMNM3: Removing 0000.3001.1166 from error list
The following message indicates that Ring 0 has entered failure mode. This ring number is assigned
internally.
LANMGR0: Beaconing is present on the ring
The following message indicates that Ring 0 is no longer in failure mode. This ring number is assigned
internally.
LANMGR0: Ring is no longer beaconing
The following message indicates that the router is beginning its attempt to determine whether any
stations left the ring during the automatic recovery process for the last beaconing failure. The router
attempts to contact stations that were part of the fault domain to detect whether they are still operating
on the ring.
IBMNM3: Beaconing, Postmortem Started
The following message indicates that the router is attempting to determine whether any stations left the
ring during the automatic recovery process for the last beaconing failure. It received a response from
station 0000.3000.1234, one of the two stations in the fault domain.
IBMNM3: Beaconing, heard from 0000.3000.1234
The following message indicates that the router is attempting to determine whether any stations left the
ring during the automatic recovery process for the last beaconing failure. It is initiating another attempt
to contact the two stations in the fault domain.
IBMNM3: Beaconing, Postmortem Next Stage
The following message indicates that the router has attempted to determine whether any stations left the
ring during the automatic recovery process for the last beaconing failure. It has successfully heard back
from both stations that were part of the fault domain.
IBMNM3: Beaconing, Postmortem Finished
Explanations follow for other messages that the debug lnm events command can generate.
The following message indicates that the router is out of memory:
LANMGR: memory request failed, find_or_build_station()
The following message indicates that Ring 3 is experiencing a large number of errors that cannot be
attributed to any individual station:
IBMNM3: Non-isolating error threshold exceeded
The following message indicates that a station (or stations) on Ring 3 is receiving frames faster than they
can be processed:
IBMNM3: Adapters experiencing congestion
The following message indicates that the beaconing has lasted for over 1 minute and is considered a
“permanent” error:
IBMNM3: Beaconing, permanent
The following message indicates that the beaconing lasted for less than 1 minute. The router is
attempting to determine whether either station in the fault domain left the ring.
IBMNM: Beaconing, Destination Started
In the preceding line of output, the following can replace “Started”: “Next State,” “Finished,” “Timed
out,” and “Cannot find station n.”
Usage Guidelines One line is displayed for each message sent or received.
Examples The following is sample output from the debug lnm llc command:
Router# debug lnm llc
As the output indicates, the debug lnm llc command output can vary somewhat in format.
Field Description
IBMNM: Displays LLC-level debugging information.
Received Router received a frame. The other possible value is Sending, to
indicate that the router is sending a frame.
LRM The function of the LLC-level software that is communicating as
follows:
• CRS—Configuration Report Server
• LBS—LAN Bridge Server
• LRM—LAN Reporting Manager
• REM—Ring Error Monitor
• RPS—Ring Parameter Server
• RS—Ring Station
Field Description
Set Reporting Point Name of the specific frame that the router sent or received. Possible
values include the following:
• Bridge Counter Report
• Bridge Parameters Changed Notification
• Bridge Parameters Set
• CRS Remove Ring Station
• CRS Report NAUN Change
• CRS Report Station Information
• CRS Request Station Information
• CRS Ring Station Removed
• LRM LAN Manager Accepted
• LRM Set Reporting Point
• New Reporting Link Established
• REM Forward MAC Frame
• REM Parameters Changed Notification
• REM Parameters Set
• Report Bridge Status
• Report LAN Manager Control Shift
• Report REM Status
• Request Bridge Status
• Request REM Status
• Set Bridge Parameters
• Set REM Parameters
from 1000.5ade.0d8a If the router has received the frame, this address is the source address
of the frame. If the router is sending the frame, this address is the
destination address of the frame.
The following message indicates that the lookup for the bridge with which the LAN Manager was
requesting to communicate was successful:
IBMNM: found bridge: 001-2-00A, addresses: 0000.3040.a630 4000.3040.a630
The following message indicates that a LAN Manager has connected or disconnected from an internal
bridge and that the router computes which LAN Manager is allowed to change parameters:
IBMNM: Determining new controlling LNM
The following line of output indicates which bridge in the router is the destination for the frame:
IBMNM: Bridge 001-2-00A received Request Bridge Status from 1000.5ade.0d8a.
Usage Guidelines One line is displayed for each message sent or received.
Examples The following is sample output from the debug lnm mac command:
Router# debug lnm mac
Field Description
LANMGR0: Indicates that this line of output displays MAC-level debugging
information. 0 indicates the number of the Token Ring interface
associated with this line of debugging output.
RS Indicates which function of the MAC-level software is communicating
as follows:
• CRS—Configuration Report Server
• REM—Ring Error Monitor
• RPS—Ring Parameter Server
• RS—Ring Station
received Indicates that the router received a frame. The other possible value is
sending, to indicate that the router is sending a frame.
request address Indicates the name of the specific frame that the router sent or received.
Possible values include the following:
• AMP
• initialize station
• report address
• report attachments
• report nearest active upstream neighbor (NAUN) change
• report soft error
• report state
• request address
• request attachments
• request initialization
• request state
• ring purge
• SMP
from 4000.3040.a670 Indicates the source address of the frame, if the router has received the
frame. If the router is sending the frame, this address is the destination
address of the frame.
As the output indicates, all debug lnm mac command messages follow the format described in Table 159
except the following:
LANMGR2: RS start watching ring poll
LANMGR2: RS stop watching ring poll
These messages indicate that the router starts and stops receiving AMP and SMP frames. These frames
are used to build a current picture of which stations are on the ring.
Examples The following is sample output from the debug local-ack state command:
Router# debug local-ack state
LACK_STATE: 2370300, hashp 2AE628, old state = disconn, new state = awaiting
LLC2 open to finish
LACK_STATE: 2370304, hashp 2AE628, old state = awaiting LLC2 open to finish,
new state = connected
LACK_STATE: 2373816, hashp 2AE628, old state = connected, new state = disconnected
LACK_STATE: 2489548, hashp 2AE628, old state = disconn, new state = awaiting
LLC2 open to finish
LACK_STATE: 2489548, hashp 2AE628, old state = awaiting LLC2 open to finish,
new state = connected
LACK_STATE: 2490132, hashp 2AE628, old state = connected, new state = awaiting
linkdown response
LACK_STATE: 2490140, hashp 2AE628, old state = awaiting linkdown response,
new state = disconnected
LACK_STATE: 2497640, hashp 2AE628, old state = disconn, new state = awaiting
LLC2 open to finish
LACK_STATE: 2497644, hashp 2AE628, old state = awaiting LLC2 open to finish,
new state = connected
Field Description
LACK_STATE: Indicates that this packet describes a state change in the local
acknowledgment state machine.
2370300 System clock.
hashp 2AE628 Internal control block pointer used by technical support staff for
debugging purposes.
Field Description
old state = disconn Old state condition in the local acknowledgment state machine.
Possible values include the following:
• Disconn (disconnected)
• awaiting LLC2 open to finish
• connected
• awaiting linkdown response
new state = awaiting LLC2 New state condition in the local acknowledgment state machine.
open to finish Possible values include the following:
• Disconn (disconnected)
• awaiting LLC2 open to finish
• connected
• awaiting linkdown response
Usage Guidelines The debug management event command prints messages to the screen whenever the Event MIB
evaluates a specified trigger. These messages are given in real-time, and are intended to be used by
technical support engineers for troubleshooting purposes. Definitions for the OID (object identifier)
fields can be found in the EVENT-MIB.my file, available for download from the Cisco MIB website on
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.
Examples The following is sample output from the debug management events command:
Router# debug management event
debug mdss
To display the run-time errors and sequence of events for the multicast distributed switching services
(MDSS), use the debug mdss command in privileged EXEC mode. To disable debugging output, use the
no form of this command.
Syntax Description all Displays both errors and sequence of events for MDSS.
error Displays the run-time errors for MDSS.
event Displays the run-time sequence of events for MDSS.
Examples The following example shows output using the debug mdss command with the all keyword:
Router# debug mdss all
Router#
01:31:03: MDSS: got MDFS_CLEARALL
01:31:03: MDSS: --> mdss_flush_all_sc
01:31:03: MDSS: enqueue a FE_GLOBAL_DELETE
01:31:03: MDSS: got MDFS_MROUTE_ADD for (0.0.0.0, 224.0.1.40)
01:31:03: MDSS: --> mdss_free_scmdb_cache
01:31:03: MDSS: got MDFS_MROUTE_ADD for (0.0.0.0, 239.255.158.197)
01:31:03: MDSS: got MDFS_MROUTE_ADD for (192.1.21.6, 239.255.158.197)
01:31:03: MDSS: got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan22
01:31:03: MDSS: -- mdss_add_oif
01:31:03: MDSS: enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan22
01:31:03: MDSS: mdb (192.1.21.6, 239.255.158.197) fast_flags |
MCACHE_MTU
01:31:03: MDSS: got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan23
01:31:03: MDSS: -- mdss_add_oif
01:31:03: MDSS: enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan
23
01:31:03: MDSS: mdb (192.1.21.6, 239.255.158.197) fast_flags |
MCACHE_MTU
01:31:03: MDSS: got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan24
01:31:03: MDSS: -- mdss_add_oif
01:31:03: MDSS: enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan24
01:31:03: MDSS: mdb (192.1.21.6, 239.255.158.197) fast_flags |
MCACHE_MTU
01:31:03: MDSS: got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan25
01:31:03: MDSS: -- mdss_add_oif
01:31:03: MDSS: enqueue a FE_OIF_ADD (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan25
01:31:03: MDSS: mdb (192.1.21.6, 239.255.158.197) fast_flags |
MCACHE_MTU
01:31:03: MDSS: got a MDFS_MIDB_ADD for (192.1.21.6, 239.255.158.197,
Vlan21) +Vlan26
01:31:03: MDSS: -- mdss_add_oif
debug mgcp
To enable debug traces for Media Gateway Control Protocol (MGCP) errors, events, media, packets,
parser, and Call Admission Control (CAC), use the debug mgcp command in privileged EXEC mode.
To disable debugging output, use the no form of this command.
debug mgcp [all | errors [endpoint endpoint-name] | events [endpoint endpoint-name] | media
[endpoint endpoint-name] | nas | packets [endpoint endpoint-name | input-hex] | parser | src
| voipcac]
no debug mgcp [all | errors | events | media | nas | packets | parser | src | voipcac]
Syntax Description all (Optional) Debugs MGCP errors, events, media, packets, parser
and builder, and CAC.
errors (Optional) Debugs MGCP errors.
endpoint endpoint-name (Optional) Debugs MGCP errors, events, media, or packets per
endpoint.
events (Optional) Debugs MGCP events.
media (Optional) Debugs MGCP tone and signal events.
nas (Optional) Debugs MGCP network access server (NAS) (data)
events.
packets (Optional) Debugs MGCP packets.
input-hex (Optional) Debugs MGCP input packets in hexadecimal values.
parser (Optional) Debugs MGCP parser and builder.
src (Optional) Debugs MGCP System Resource Check (SRC) CAC
information.
voipcac (Optional) Turns on debugging messages for the Voice over IP
(VoIP) CAC process at the MGCP application layer.
Release Modification
12.2(2)XA The media keyword was added. The endpoint endpoint-name keyword
and argument were added as options for the errors, events, media, and
packets keywords. The input-hex keyword option was added for the
packets keyword.
12.2(2)XB The nas keyword and the src and voipcac keywords were added. (Refer
to MGCP VoIP Call Admission Control in Cisco IOS
Release 12.2(2)XB.)
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T.
Note The nas keyword was not integrated into Cisco IOS
Release 12.2(8)T.
12.2(11)T The command was implemented on the Cisco AS5350, Cisco AS5400,
and Cisco AS5850.
12.2(13)T Support for this command was implemented in Cisco 7200 series
images.
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following is sample output from the debug mgcp errors, debug mgcp events, debug mgcp media,
debug mgcp nas, debug mgcp packets, debug mgcp parser, and debug mgcp src commands and
keywords. The debug mgcp all command and keyword would show a compilation of all this output,
including the debug mgcp voipcac command and keyword output. Note that using the debug mgcp all
command and keyword may severely impact network performance.
The following is sample output from the debug mgcp errors command and keyword:
Router# debug mgcp errors
The following is sample output from the debug mgcp events command and keyword:
Router# debug mgcp events
The following is sample output from the debug mgcp media command and keyword:
Router# debug mgcp media
The following is sample output for the debug mgcp nas command and keyword, with the debug mgcp
packets command and keyword enabled as well:
Router# debug mgcp nas
Router#
01:49:14:MGCP Packet received -
CRCX 58 S7/DS1-0/23 MGCP 1.0
X:57
M:nas/data
C:3
CRCX Recv
mgcpapp_endpt_is_data:endpt S7/DS1-0/23, slot 7, port 0 chan 23
mgcpapp_data_call_hnd:mgcpapp_xcsp_get_chan_cb -Found - Channel state Idle
bw=64, bearer=E1,cdn=3000,cgn=1000
The following is sample output from the debug mgcp packets command and keyword:
Router# debug mgcp packets
The following is sample output from the debug mgcp parser command and keyword:
Router# debug mgcp parser
The following is sample output from the debug mgcp src command and keyword:
Router# debug mgcp src
00:14:08: 200 42 OK
<---
00:14:12: send_mgcp_msg, MGCP Packet sent --->
00:14:12: 200 44
I: 4
v=0
o=- 4 0 IN IP4 1.4.120.1
s=Cisco SDP 0
c=IN IP4 1.4.120.1
t=0 0
m=audio 16404 RTP/AVP 0
<---
00:14:13: MGCP Packet received -
v=0
o=- 4 0 IN IP4 1.4.120.3
s=Cisco SDP 0
c=IN IP4 1.4.120.3
t=0 0
m=audio 16384 RTP/AVP 0
00:14:13: 200 48 OK
<---
00:14:20: MGCP Packet received -
MDCX 52 aaln/S1/1 MGCP 0.1
N: emu@[1.4.173.1]:51665
C: 3
I: 4
X: 51
M: sendrecv
R: hu
L: a:G.711u,p:5,e:off,s:off
00:14:20: 200 52 OK
<---
00:14:34: MGCP Packet received -
DLCX 56 aaln/S1/1 MGCP 0.1
X: 55
N: emu@[1.4.173.1]:51665
C: 3
I: 4
R: hu
00:14:34: 250 56
P: PS=1382, OS=110180, PR=1378, OR=109936, PL=63484, JI=520, LA=2
<---
00:14:36: mgcp_reset_call_direction: Reseting incoming_call flag=FALSE in voice_if
00:14:36: send_mgcp_msg, MGCP Packet sent --->
debug mls rp
To display various Internetwork Packet Exchange (IPX) Multilayer Switching (MLS) debugging
elements, use the debug mls rp command in privileged EXEC mode. To disable debugging output, use
the no form of this command.
Examples The following example shows output using the debug mls rp ipx command:
Router# debug mls rp ipx
Syntax Description all Displays all multicast MLSP debugging information, including
errors, events, and packets.
error Displays error messages related to multicast MLSP.
events Displays the run-time sequence of events for multicast MLSP.
packets Displays the contents of MLSP packets.
Examples The following example shows output from the debug mls rp ip multicast command using the error
keyword:
Router# debug mls rp ip multicast error
The following example shows output from the debug mls rp ip multicast command using the event
keyword:
Router# debug mls rp ip multicast event
The following example shows output from the debug mls rp ip multicast command using the packet
keyword:
Router# debug mls rp ip multicast packet
3d23h:
**23h: MSCP(I): 01 00 0c cc cc cc 00 e0 1e 7c fe 5f 00 24 aa aa
...LLL.`.|~_.$
..23h: MSCP(I): 03 00 00 0c 01 07 01 86 00 1c 01 02 0a c7 00 10
.............G
..23h: MSCP(I): a6 0b b4 ff 00 00 00 0b 00 00 c0 01 02 01 00 00
..4.......@...
3d23h: MSCP(I): 00 00
3d23h:
Examples The following output shows how the debug mmoip aaa command provides information about AAA for
the on-ramp or off-ramp gateways:
Router# debug mmoip aaa
5d10h:fax_aaa_begin_authentication:User-Name = mmoip-b.cisco.com
5d10h:fax_aaa_begin_authentication:fax_account_id_origin = GATEWAY_ID
5d10h:fax_aaa_end_authentication_callback:Authentication successful
The following output shows how the debug mmoip aaa command provides information about AAA for
the off-ramp gateway:
Router# debug mmoip aaa
5d10h:fax_aaa_start_accounting:User-Name = mmoip-b.cisco.com
5d10h:fax_aaa_start_accounting:Calling-Station-Id = gmercuri@mail-server.cisco.com
5d10h:fax_aaa_start_accounting:Called-Station-Id = fax=571-0839@mmoip-b.cisco.com
5d10h:fax_aaa_start_accounting:fax_account_id_origin = GATEWAY_ID
mmoip-b#ax_aaa_start_accounting:fax_msg_id = <37117AF3.3D98300E@mail-server.cisco.com>
5d10h:fax_aaa_start_accounting:fax_pages = 2
5d10h:fax_aaa_start_accounting:fax_coverpage_flag = TRUE
5d10h:fax_aaa_start_accounting:fax_connect_speed = 14400bps
5d10h:fax_aaa_start_accounting:fax_recipient_count = 1
5d10h:fax_aaa_start_accounting:fax_auth_status = USER SUCCESS
5d10h:fax_aaa_start_accounting:gateway_id = mmoip-b.cisco.com
5d10h:fax_aaa_start_accounting:call_type = Fax Send
5d10h:fax_aaa_start_accounting:port_used = slot:0 vfc port:0
5d10h:fax_aaa_do_offramp_accounting tty(6), Stopping accounting
5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveTransmitBytes = 18038
5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveTransmitPackets = 14
The following output shows how the debug mmoip aaa command provides information about AAA for
the on-ramp gateway:
Router# debug mmoip aaa
5d10h:fax_aaa_start_accounting:User-Name = mmoip-b.cisco.com
5d10h:fax_aaa_start_accounting:Calling-Station-Id = FAX=408@mail-from-hostname.com
5d10h:fax_aaa_start_accounting:Called-Station-Id = FAX=5710839@mail-server.cisco.com
5d10h:fax_aaa_start_accounting:fax_account_id_origin = GATEWAY_ID
5d10h:fax_aaa_start_accounting:fax_msg_id = 00391997233216263@mmoip-b.cisco.com
5d10h:fax_aaa_start_accounting:fax_pages = 2
5d10h:fax_aaa_start_accounting:fax_connect_speed = 14400bps
5d10h:fax_aaa_start_accounting:fax_auth_status = USER SUCCESS
5d10h:fax_aaa_start_accounting:email_server_address = 1.14.116.1
5d10h:fax_aaa_start_accounting:email_server_ack_flag = TRUE
5d10h:fax_aaa_start_accounting:gateway_id = mmoip-b.cisco.com
5d10h:fax_aaa_start_accounting:call_type = Fax Receive
5d10h:fax_aaa_start_accounting:port_used = Cisco Powered Fax System slot:1 port:4
5d10h:fax_aaa_do_onramp_accounting tty(5), Stopping accounting
5d10h:fax_aaa_stop_accounting:endb->cact->generic.callActiveTransmitBytes = 26687
5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveReceiveBytes = 18558
5d10h:fax_aaa_stop_accounting:ftdb->cact->generic.callActiveReceivePackets = 14
Syntax Description string E-mail address of the sender; for example, mailuser@mail-server.com.
There is no default.
Examples The debug mmoip send email command is used to test connectivity between the on-ramp gateway and
the e-mail server. Basically, this debug command sends an e-mail message to the recipient specified in
the e-mail address string. There is no specific output associated with the debug mmoip send email
command; to see how the on-ramp gateway and e-mail server interact when processing the test e-mail
message, enable the debug fmail client command.
The following example tests connectivity between the on-ramp gateway and the e-mail server by sending
a test e-mail message to mailuser@mail-server.com:
Router# debug fmail client
Router# debug mmoip send email mailuser@mail-server.com
Syntax Description string E.164 telephone number to be used for sending the test fax. There is no
default.
Examples The debug mmoip send fax command is used to test connectivity between the off-ramp gateway and a
recipient fax device. Basically, this debug command sends a test fax transmission to the recipient
specified in the telephone number string. There is no specific output associated with the debug mmoip
send fax command.
The following example sends a test fax message to the telephone number 5550839:
Router# debug mmoip send fax 5550839
The following output shows that the off-ramp gateway is placing a fax call:
01:28:18:ftsp_offramp_match_digits:phone number to translate:5550839
01:28:18: destPat(5......), matched(1), prefix() peer_tag(1)
01:28:18:ftsp_offramp_match_digits:target:710839
01:28:18:fap_offcm:tty(4), Got dial message00:00:00.000:AT&F\Q0S7=255
00:00:00.128:E0V1
00:00:00.140:ATE0
OK
00:00:00.140:AT+FCLASS=2
00:00:00.148:
OK
00:00:00.148:+FDCC=..;+FBOR=
00:00:00.168:AT+FLID
00:00:00.180:
OK
00:00:00.180:ATDTW710839
The following output shows that the fax transmission is complete; in this particular example, there was
a transmission error, and the modem timed out.
01:28:25:ftsp_setup_for_oc:tty4, callid=0xA
01:28:25:ftsp_setup_for_oc ctl=0, cas grp=-1, snmp_ix=30
01:28:25:ftsp_off_ramp_active_call_init tty4 callid=0xA, snmp_ix=30
01:29:18:fap_offpmt:tty(4), TxPhaseA:modem timeout
01:29:18:%FTSP-6-FAX_DISCONNECT:Transmission er
Syntax Description prefix-filename Name of the TIFF file. The format for the TIFF filename is
“telephone-number.TIFF.”
tftp-server-name TFTP server to which the output from the TIFF writer is sent.
Examples The debug mmoip transfer command sends the content of the fax data received to the TFTP server
named by the tftp-server-name variable into the file identified by the prefix-filename variable. Each page
of the fax transmission is a separate file, designated by the letter “p”, followed by the page number.
For example, the following command transfers the received fax content to a TFTP server named “keyer”.
The first page of the transmission goes to the file named “/tftpboot/test/testp1.tiff”, the second page goes
to the file named “/tftpboot/test/testp2.tiff” and so on.
Router# debug mmoip transfer /tftpboot/test/test keyer
The named files must exist on the TFTP server and be writable in order for the debug operation to be
successful.
debug modem
To observe modem line activity on an access server, use the debug modem command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug modem
no debug modem
Examples The following is sample output from the debug modem command. The output shows when the modem
line changes state.
Router# debug modem
Syntax Description slot/port (Optional) The slot and modem port number.
group group-number (Optional) The modem group.
Usage Guidelines Use the debug modem csm command to troubleshoot call switching problems. With this command, you
can trace the complete sequence of switching incoming and outgoing calls.
Examples The following is sample output from the debug modem csm command. In this example, a call enters the
modem (incoming) on slot 1, port 0:
Router(config)# service timestamps debug uptime
Router(config)# end
The following is sample output from the debug modem csm command when call is dialed from the
modem into the network (outgoing) from slot 1, port 2:
Router# debug modem csm
atdt16665202
00:11:21: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 2
00:11:21: T1_MAIL_FROM_NEAT: DC_READY_RSP: mid = 1, slot = 0, unit = 0
00:11:21: CSM_PROC_OC1_REQUEST_DIGIT: CSM_EVENT_DIGIT_COLLECT_READY at slot 1, port 2
00:11:24: T1_MAIL_FROM_NEAT: DC_FIRST_DIGIT_RSP: mid = 1, slot = 0, unit = 0
00:11:24: CSM_PROC_OC2_COLLECT_1ST_DIGIT: CSM_EVENT_GET_1ST_DIGIT at slot 1, port 2
00:11:27: T1_MAIL_FROM_NEAT: DC_ALL_DIGIT_RSP: mid = 1, slot = 0, unit = 0
00:11:27: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS (16665202) at slot 1,
port 2
00:11:27: ccpri_ratetoteup bear rate is 10
The following is sample output from the debug modem csm command for an incoming call:
Router# debug modem csm
Router#1.19.36.7 2001
Trying 1.19.36.7, 2001 ... Open
atdt111222333444555666
*Apr 7 12:39:42.475: Mica Modem(1/0): Rcvd Dial String(111222333444555666)
*Apr 7 12:39:42.475: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 0
*Apr 7 12:39:42.479: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_CHANNEL_LOCK at slot 1 and
port 0
*Apr 7 12:39:42.479: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_BCHAN_ASSIGNED at slot 1, port
0
*Apr 7 12:39:42.479: Mica Modem(1/0): Configure(0x1)
*Apr 7 12:39:42.479: Mica Modem(1/0): Configure(0x5)
*Apr 7 12:39:42.479: Mica Modem(1/0): Call Setup
*Apr 7 12:39:42.479: neat msg at slot 0: (1/0): Tx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.491: neat msg at slot 0: (0/0): Rx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.531: VDEV_ALLOCATE: slot 1 and port 3 is allocated.
*Apr 7 12:39:42.531: CSM_RX_CAS_EVENT_FROM_NEAT:(0004): EVENT_CALL_DIAL_IN at slot 1 and
port 3
*Apr 7 12:39:42.531: CSM_PROC_IDLE: CSM_EVENT_DSX0_CALL at slot 1, port 3
*Apr 7 12:39:42.531: Mica Modem(1/3): Configure(0x0)
*Apr 7 12:39:42.531: Mica Modem(1/3): Configure(0x5)
*Apr 7 12:39:42.531: Mica Modem(1/3): Call Setup
*Apr 7 12:39:42.595: Mica Modem(1/0): State Transition to Call Setup
*Apr 7 12:39:42.655: Mica Modem(1/3): State Transition to Call Setup
*Apr 7 12:39:42.655: Mica Modem(1/3): Went offhook
*Apr 7 12:39:42.655: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 3
*Apr 7 12:39:42.671: neat msg at slot 0: (0/0): Tx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.691: neat msg at slot 0: (1/0): Rx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.731: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1
and port 0
*Apr 7 12:39:42.731: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0
*Apr 7 12:39:42.731: Mica Modem(1/0): Generate digits:called_party_num= len=1
*Apr 7 12:39:42.835: Mica Modem(1/3): Rcvd Digit detected(#)
*Apr 7 12:39:42.835: CSM_PROC_IC2_COLLECT_ADDR_INFO: CSM_EVENT_KP_DIGIT_COLLECTED (DNIS=,
ANI=) at slot 1, port 3
*Apr 7 12:39:42.855: neat msg at slot 0: (0/0): Tx LOOP_OPEN (ABCD=0101)
*Apr 7 12:39:42.871: neat msg at slot 0: (1/0): Rx LOOP_OPEN (ABCD=0101)
*Apr 7 12:39:42.899: Mica Modem(1/0): Rcvd Digits Generated
*Apr 7 12:39:42.911: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_END_TX_TONE at slot 1 and
port 0
*Apr 7 12:39:42.911: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_END_TX_TONE at slot 1, port 0
*Apr 7 12:39:42.911: Mica Modem(1/0): Generate digits:called_party_num=A len=1
*Apr 7 12:39:43.019: Mica Modem(1/0): Rcvd Digits Generated
*Apr 7 12:39:43.019: CSM_PROC_OC4_DIALING: CSM_EVENT_TONE_GENERATED at slot 1, port 0
*Apr 7 12:39:43.019: Mica Modem(1/3): Rcvd Digit detected(A)
*Apr 7 12:39:43.335: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1
and port 0
*Apr 7 12:39:43.335: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0
*Apr 7 12:39:43.335: Mica Modem(1/0): Generate digits:called_party_num=111222333444555666
len=19
*Apr 7 12:39:43.439: Mica Modem(1/3): Rcvd Digit detected(1)
*Apr 7 12:39:43.559: Mica Modem(1/3): Rcvd Digit detected(1)
*Apr 7 12:39:43.619: Mica Modem(1/3): Rcvd Digit detected(1)
*Apr 7 12:39:43.743: Mica Modem(1/3): Rcvd Digit detected(2)
*Apr 7 12:39:43.859: Mica Modem(1/3): Rcvd Digit detected(2)
The MICA technologies modem goes through the following internal link states when the call comes in:
• Call Setup
• Off Hook
• Connect
• Link
• Trainup
• EC Negotiation
• Steady State
The following section describes the CSM activity for an incoming call.
When a voice call comes in, CSM is informed of the incoming call. This allocates the modem and sends
the Call Setup message to the MICA modem. The Call_Proc message is sent through D channel. The
modem sends an offhook message to CSM by sending the state change to Call Setup. The D channel then
sends a CONNECT message. When the CONNECT_ACK message is received, the Link initiate message
is sent to the MICA modem and it negotiates the connection with the remote modem. In the following
debug examples, a modem on slot 1, port 13 is allocated. It goes through its internal states before it is in
Steady State and answers the call.
Router# debug modem csm
The following section describes the status of CSM when a call is connected.
The show modem csm x/y command is similar to AS5200 access server. For an active incoming analog
call, the modem_status and csm_status should be VDEV_STATUS_ACTIVE_CALL and
CSM_IC4_CONNECTED, respectively.
Router# show modem csm 1/13
The following section describes the CSM activity for an outgoing call.
For MICA modems, the dial tone is not required to initiate an outbound call. Unlike in the AS5200, the
digit collection step is not required. The dialed digit string is sent to the CSM in the outgoing request to
the CSM. CSM signals the D channel to generate an outbound voice call, and the B channel assigned is
connected to the modem and the CSM.
The modem is ordered to connect to the remote side with a CONNECT message, and by sending a link
initiate message, the modem starts to train.
Syntax Description tty-range Modem tty number or range. You can specify a single TTY line
number or a range from 0 through the number of modems you have in
your Cisco AS5800 access server. Be sure to include a dash (-)
between the range values you specify.
group Modem group information.
shelf/slot/port Location of the modem by shelf/slot/port numbers for internal
modems.
Usage Guidelines The debug modem dsip command displays each Distributed System Interconnect Protocol (DSIP)
message that relates to a modem and is sent from or received at the router shelf. This command can be
applied to a single modem or a group of modems.
Examples The following examples show a display of the available debug modem command options and
debug modem dsip command options:
Router# debug modem ?
The following example indicates that a Real Time Server (RTS) status message was received from the
router shelf, and an ACK message was sent back:
Router# debug modem dsip
Field Description
RSMODEM_SEND-1/2/06 Router shelf modem shelf sends a
MODEM_RING_INDICATION_MSG message.
RSMODEM_sRCV-1/2/06 Router shelf modem received a MODEM_CALL_ACK_MSG
message.
MODEM_CALL_ACCEPT_MSG Router shelf accepts the call.
MODEM_CALL_HANGUP_MSG Router shelf sends a hangup message.
MODEM_RTS_STATUS_MSG Request to send message status.
Syntax Description slot/modem-port (Optional) The slot and modem port number.
group group-number (Optional) The modem group.
Usage Guidelines The message types and sequence numbers that appear in the debugging output are initiated by the
Modem Out-of-Band Protocol and used by service personnel for debugging purposes.
Caution Entering the debug modem oob command without specifying a slot and modem number debugs all
out-of-band ports, which generates a substantial amount of information.
Examples The following is sample output from the debug modem oob command. This example debugs the
out-of-band port on modem 2/0, which creates modem startup messages between the network
management software and the modem.
Router# debug modem oob 2/0
Usage Guidelines In a stable modem relay network, the debug modem relay errors command produces little output.
Examples The following is sample output from the debug modem relay errors command. The output shows the
sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte
of the payload in hexadecimal.
Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 28 tm 11944 OUT ERR, pb=12, payload: 00 06
00 00 00 00 00 07 00 00 01 DE
*Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 29 tm 11944 OUT ERR, pb=12, payload: 00
06 00 00 00 00 00 04 00 00 00 BE
*Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 30 tm 11944 OUT ERR, pb=12, payload: 00
06 00 00 00 00 00 05 FF FF FF FD
Usage Guidelines In a stable modem relay network, the debug modem relay events command produces little output.
Examples The following is sample output from the debug modem relay events command. The output shows the
sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte
of the payload in hexadecimal.
Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 28 tm 11944 OUT EVNT, pb=12, payload: 00
06 00 00 00 00 00 07 00 00 01 DE
*Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 29 tm 11944 OUT EVNT, pb=12, payload: 00
06 00 00 00 00 00 04 00 00 00 BE
*Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 30 tm 11944 OUT EVNT, pb=12, payload: 00
06 00 00 00 00 00 05 FF FF FF FD
Usage Guidelines Disable console logging and use buffered logging before using the debug modem relay packetizer
command. Using the debug modem relay packetizer command generates a large volume of debugs,
which can affect router performance.
Examples The following is sample output from the debug modem relay packetizer command. The output shows
the sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each
byte of the payload in hexadecimal.
Jan 11 05:33:33.715:ModemRelay pkt[0:D:11]. sqn 8 tm 47610 IN PKTZR, pb=7, payload: 82 38
00 18 03 01 87
*Jan 11 05:33:33.727:ModemRelay pkt[0:D:11]. sqn 9 tm 47616 OUT PKTZR, pb=7, payload: 82
20 00 18 03 01 47
*Jan 11 05:33:35.719:ModemRelay pkt[0:D:11]. sqn 10 tm 49614 IN PKTZR, pb=7, payload: 82
39 00 18 03 01 87
Usage Guidelines Disable console logging and use buffered logging before using the debug modem relay physical
command. Using the debug modem relay physical command generates a large volume of debugs, which
can affect router performance.
Examples The following is sample output from the debug modem relay physical command. The output shows the
sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte
of the payload in hexadecimal.
Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 28 tm 11944 OUT PHYS, pb=12, payload: 00
06 00 00 00 00 00 07 00 00 01 DE
*Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 29 tm 11944 OUT PHYS, pb=12, payload: 00
06 00 00 00 00 00 04 00 00 00 BE
*Jan 11 05:35:09.119:ModemRelay pkt[0:D:11]. sqn 30 tm 11944 OUT PHYS, pb=12, payload: 00
06 00 00 00 00 00 05 FF FF FF FD
Usage Guidelines Disable console logging and use buffered logging before using the debug modem relay sprt command.
Using the debug modem relay sprt command generates a large volume of debugs, which can affect
router performance.
Examples The following is sample output from the debug modem relay sprt command. The output shows the
sequence number of the packet, time stamp, direction, layer, and payload bytes, followed by each byte
of the payload in hexadecimal.
Jan 11 05:37:16.151:ModemRelay pkt[0:D:11]. sqn 34 tm 7910 OUT SPRT, pb=4, payload: 02 00
03 71
*Jan 11 05:37:16.295:ModemRelay pkt[0:D:11]. sqn 35 tm 8048 IN SPRT, pb=13, payload: 02 00
01 F1 F7 7E FD F5 90 F3 3E 90 55
*Jan 11 05:37:16.303:ModemRelay pkt[0:D:11]. sqn 36 tm 8060 IN SPRT, pb=6, payload: 02 00
01 41 04 00
Usage Guidelines Disable console logging and use buffered logging before using the debug modem relay udp command.
Using the debug modem relay udp command generates a large volume of debugs, which can affect
router performance.
Examples The following is sample output from the debug modem relay udp command. The output shows three
UDP packets related to modem relay. In the sample output, OUT or IN represent packet direction, and
UDP indicates the specific layer that reported the packet.
Jan 1 03:39:29.407:ModemRelay pkt[0:D (4)]. sqn 61 tm 3060 OUT UDP, pb=6, payload: 80 00
00 00 00 00
*Jan 1 03:39:29.471:ModemRelay pkt[0:D (4)]. sqn 62 tm 3120 IN UDP, pb=6, payload: 40 00
00 00 00 00
*Jan 1 03:39:29.471:ModemRelay pkt[0:D (4)]. sqn 63 tm 3120 IN UDP, pb=6, payload: 80 00
00 00 00 00
Usage Guidelines Disable console logging and use buffered logging before using the debug modem relay v42 command.
Using the debug modem relay v42 command generates a large volume of debugs, which can affect
router performance.
Examples The following is sample output from the debug modem relay v42 command. The output shows the
sequence number of the packet, timestamp, direction, layer, and payload-bytes, followed by each byte of
the payload in hexadecimal.
Jan 11 05:42:08.715:ModemRelay pkt[0:D:13]. sqn 3 tm 10104 OUT V42, pb=43, payload: 03 AF
82 80 00 13 03 03 8A 89 00 05 02 03 E0 06 02 03 E0 07 01 08 08 01 08 F0 00 0F 00 03 56 34
32 01 01 03 02 02 04 00 03 01 20
*Jan 11 05:42:08.847:ModemRelay pkt[0:D:13]. sqn 4 tm 10236 IN V42, pb=2, payload: 03 7F
Syntax Description normal (Optional) Uploads the call trace to the syslog server on normal call
termination (for example, a local user hangup or a remote user hangup).
abnormal (Optional) Uploads the call trace to the syslog server on abnormal call
termination (for example, any call termination other than normal
termination, such as a lost carrier or a watchdog timeout).
all (Optional) Uploads the call trace on all call terminations including
normal and abnormal call termination.
slot/modem-port (Optional) The slot and modem port number.
group group-number (Optional) The modem group.
Usage Guidelines The debug modem trace command applies only to manageable modems. For additional information, use
the show modem command.
Examples The following is sample output from the debug modem trace abnormal command:
Router# debug modem trace abnormal 1/14
Usage Guidelines The debug modem traffic command displays output for framed, unframed, and asynchronous data sent
or received by the modem cards.
Examples The following example displays information about unframed or framed data sent to or received from the
modem cards:
Router# debug modem traffic
The information indicates unframed asynchronous data transmission and reception involving the modem
on shelf 6, slot 5, port 00.
The following example displays framed asynchronous data transmission and reception involving the
modem on shelf 6, slot 5, port 00:
Router# debug modem traffic
Usage Guidelines Use the debug mpls adjacency command to monitor when entries are updated in or added to the
adjacency database.
Examples The following is sample output from the debug mpls adjacency command:
Router# debug mpls adjacency
Table 162 describes the significant fields shown in the sample display.
Field Description
add Adding an entry to the database.
update Updating the MAC address for an existing entry.
10.10.0.1 Address of neighbor TSR.
Ethernet0/0/0 Connecting interface.
Syntax Description bind (Optional) Specifies debug information about bind responses for a VC path.
request (Optional) Specifies debug information about bind requests for a VC path.
Examples The following command sequence demonstrates how to obtain sample output from the debug mpls
atm-cos command.
First, display the Multiprotocol Label Switching (MPLS) forwarding table to see which prefixes are
associated with a single label VC (LVC), as shown below:
Router# show mpls forwarding
Second, enable debugging of request and bind events, as shown in the command sequence below:
Router# debug mpls atm-cos ?
Third, configure an MPLS ATM subinterface for multi-VC mode. The corresponding request and bind
events are displayed, as shown below:
Router# conf terminal
Usage Guidelines Use the debug mpls atm-ldp api command in conjunction with the debug mpls atm-ldp routes and
debug mpls atm-ldp states commands to display more complete information about an LVC.
Examples The following shows sample output from the debug mpls atm-ldp api command:
Router# debug mpls atm-ldp api
Field Description
TAGATM_API The subsystem that displays the message.
interface The interface used by the driver to allocate or free VPI/VCI resources.
dir The direction of the VC:
• In—Input or receive VC
• Out—Output VC
vpi Virtual path identifier.
vci Virtual channel identifier.
result The return error code from the driver API.
Usage Guidelines Use the debug mpls atm-ldp failure command to display failure information about the LC-ATM. This
command is useful for determining failure cases. This command displays only failure information,
unlike the debug mpls atm-ldp api command, which displays all application programming interface
(API) events.
Examples The following shows sample output from the debug mpls atm-ldp failure command:
The following failure message is displayed during a race condition where the LC-ATM attempts to
allocate label virtual circuits (LVCs) on an interface where MPLS has been disabled:
Router# debug mpls atm-ldp failure
The following failure message is displayed when the LC-ATM fails to deallocate the output leg LVC of
a cross connect:
Router# debug mpls atm-ldp failure
The following failure message is displayed when a cross connect cannot be installed on the switching
fabric. The result code is also provided.
The following message is displayed when attempts to establish a cross connect fail. The result describes
the reason for the failure.
Router# debug mpls atm-ldp failure
The following message is displayed when attempts to remove a cross connect fail. The result describes
why the cross connect cannot be removed.
Router# debug mpls atm-ldp failure
Usage Guidelines When there are many routes and system activities (that is, shutting down of interfaces, learning of new
routes, and so forth), the debug mpls atm-ldp routes command displays extensive information that
might interfere with system timing. Most commonly, this interference affects normal Label Distribution
Protocol (LDP) operation. To avoid this problem, you can increase the LDP hold time by means of the
mpls ldp holdtime command.
Examples The following shows sample output from the debug mpls atm-ldp routes command:
Router# debug mpls atm-ldp routes
Field Description
CleanupRoutes Cleans up the routing table after a route has been deleted.
not deleting route of idb The route cleanup event has not removed the specified route.
ATM0/0.2
rdbIndex Index identifying the route.
tcatmFindRouteTags Request a VC for the route.
idb The internal descriptor for an interface.
nh Next hop for the route.
index Identifier for the route.
AddNewRoute Action of adding routes for a prefix or address.
Usage Guidelines When there are many routes and system activities (such as shutting down of interfaces, learning of new
routes, and so forth), the debug mpls atm-ldp states command outputs extensive information that might
interfere with system timing. Most commonly, this interference affects normal Label Distribution
Protocol (LDP) operation. To avoid this problem, you should increase the LDP hold time by means of
the mpls ldp holdtime command.
Examples The following shows sample output from the debug mpls atm-ldp states command:
Router# debug mpls atm-ldp states
Table 165 describes the significant fields shown in the sample display.
Field Description
Transit Output Output side of a label virtual circuit (LVC).
VPI/VCI VC value.
Transit Input Input side of an LVC.
Examples The following is sample output from the debug mpls events command:
Router# debug mpls events
Usage Guidelines You can issue this command either from the line card or the route processor to log Any Transport over
MPLS (AToM) updates to or from line cards. This command applies only to platforms that support
distributed mode.
Examples The following is sample output from the debug mpls l2transport ipc command:
Router# debug mpls l2transport ipc
*May 27 23:56:04.699 UTC: AToM SMGR [17.17.17.17, 1201]: Sending disposition update to
slot 255
*May 27 23:56:04.699 UTC: AToM SMGR [17.17.17.17, 1201]: Distributing disposition info to
all linecards
Syntax Description data Displays (in hex) the AToM switched packets for imposition and disposition. This can
help validate that packets are flowing between the customer edge (CE) routers. Also, you
can display the packets to check the format of the data or the data itself.
error Displays AToM switching errors, such as the reason that packets cannot be switched. This
can help identify why data is not being transported.
Usage Guidelines Use this command sparingly, because the command output can be overwhelming.
For platforms that support distributed switching, the command displays output only for packets switched
by the central route processor module. Packets switched autonomously by the linecards are not
displayed. For example, packets switched by Versatile Interface Processors (VIPs) on the Cisco 7500
router are not displayed.
Examples The following is sample output from the debug mpls l2transport packet commands for a PPP over
MPLS configuration:
Router# debug mpls l2transport packet data
AToM:
AToM packet data debugging is on
AToM packet errors debugging is on
*Mar 24 23:29:49.471: 0F 00 88 47 00 01 10 FF 00 01 61 02 00 10 00 00
*Mar 24 23:29:49.471: 80 21 01 0B 00 0A 03 06 78 01 01 78
*Mar 24 23:29:49.475: ATOM-PPP Switching: check features failed.
Examples The following is sample output from the debug mpls l2transport signaling command:
Router# debug mpls l2transport signaling event
AToM:
AToM LDP event debugging is on
AToM LDP message debugging is on
Syntax Description event Displays AToM event messages about the VCs.
fsm Displays the finite state machine.
Usage Guidelines You can issue this command from the line card or the route processor.
Examples The following is sample output from the debug mpls l2transport vc commands:
Router# debug mpls l2transport vc event
AToM:
AToM vc event debugging is on
AToM vc fsm debugging is on
*Mar 24 23:17:24.371: AToM MGR [9.9.9.9, 50]: Event provision, state changed from idle to
provisioned
*Mar 24 23:17:24.371: AToM MGR [9.9.9.9, 50]: Provision vc
*Mar 24 23:17:24.371: AToM SMGR [9.9.9.9, 50]: Requesting VC create, vc_handle 61A09930
*Mar 24 23:17:24.371: AToM MGR [9.9.9.9, 50]: Event local up, state changed from
provisioned to local standby
*Mar 24 23:17:24.371: AToM MGR [9.9.9.9, 50]: Update local vc label binding
*Mar 24 23:17:24.371: AToM SMGR [9.9.9.9, 50]: sucessfully processed create request
*Mar 24 23:17:24.875: %SYS-5-CONFIG_I: Configured from console by console
*Mar 24 23:17:28.567: AToM MGR [9.9.9.9, 50]: Event ldp up, state changed from local
standby to local ready
*Mar 24 23:17:28.567: AToM MGR [9.9.9.9, 50]: Advertise local vc label binding
*Mar 24 23:17:28.567: AToM MGR [9.9.9.9, 50]: Event remote up, state changed from local
ready to establishing
*Mar 24 23:17:28.567: AToM MGR [9.9.9.9, 50]: Remote end up
*Mar 24 23:17:28.567: AToM MGR [9.9.9.9, 50]: Event remote validated, state changed from
establishing to established
*Mar 24 23:17:28.567: AToM MGR [9.9.9.9, 50]: Validate vc, activating data plane
*Mar 24 23:17:28.567: AToM SMGR [9.9.9.9, 50]: Processing imposition update, vc_handle
61A09930, update_action 3, remote_vc_label 21
*Mar 24 23:17:28.567: AToM SMGR [9.9.9.9, 50]: Imposition Programmed, Output Interface:
PO5/0
*Mar 24 23:17:28.567: AToM SMGR [9.9.9.9, 50]: Processing disposition update, vc_handle
61A09930, update_action 3, local_vc_label 22
*Mar 24 23:17:28.571: AToM SMGR: Processing TFIB event for 9.9.9.9
*Mar 24 23:17:28.571: AToM SMGR [9.9.9.9, 50]: Imposition Programmed, Output Interface:
PO5/0
Syntax Description peer-acl acl (Optional) Limits the displayed advertisements to those for LDP peers
permitted by the access control list (ACL).
prefix-acl acl (Optional) Limits the displayed advertisements to those for prefixes
permitted by the ACL.
Defaults Displays information about advertisements to all LDP peers for all prefixes.
Usage Guidelines Use this command to monitor the label and address advertisements to LDP peers.
Use the peer-acl or prefix-acl options separately or together to limit the information display to specific
LDP peers or specific prefixes.
Note This command monitors advertisement of non-LC-ATM labels (generic labels) only. Use the debug
mpls atm-ldp command to monitor LC-ATM activity.
Examples The following shows sample output from the debug mpls ldp advertisements command:
Router# debug mpls ldp advertisements
Table 166 describes the significant fields shown in the sample display.
Field Description
tagcon: Identifies the source of the message as the label control subsystem.
peer a.b.c.d:e The LDP identifier of the peer to which the advertisement was targeted.
(pp 0xnnnnnnnn) The identifier for the data structure used to represent the peer at the label
distribution level. Useful for correlating debug output.
advertise X Identifies what was advertised to the peer—either an interface address
(“a.b.c.d”) or label binding (“a.b.c.d/m, label t (#n)”).
(#n) For a label binding advertisement, the sequence number of the Label
Information Base (LIB) modification that made it necessary to advertise the
label.
Syntax Description peer-acl acl (Optional) Limits the displayed binding information to that learned from
LDP peers permitted by the access control list (ACL).
prefix-acl acl (Optional) Limits the displayed binding information to that learned for
prefixes permitted by the ACL.
Defaults Displays information about all bindings learned from all LDP peers.
Usage Guidelines Use this command to monitor label bindings and label switch router (LSR) addresses learned from LDP
peers.
Note This command monitors non-LC-ATM labels (generic labels) only. Use the debug mpls atm-ldp
command to monitor LC-ATM activity.
Examples The following shows sample output from the debug mpls ldp bindings command:
Router# debug mpls ldp bindings
Table 167 describes the significant fields shown in the sample display.
Field Description
tagcon: Identifies the source of the message as the label control subsystem.
tibent(network/mask) The destination that has a label binding change.
created; reason A LIB entry has been created for the specified destination for the indicated
reason.
rem label ... Describes a change to the label bindings for the specified destination. The
change is for a label binding learned from the specified LDP peer.
lcl label ... Describes a change to a locally assigned (incoming) label for the specified
destination.
(#n) The sequence number of the modification to the LIB corresponding to the
local label change.
a.b.c.d:n: e.f.g.h added The address e.f.g.h has been added to the set of addresses associated with
to addr<->ldp ident map LDP identifier a.b.c.d:n.
Syntax Description sent Displays LDP messages sent to LDP peers permitted by the access control
list (ACL).
received Displays LDP messages received from LDP peers permitted by the ACL.
all (Optional) Displays all LDP messages sent to and received from LDP peers
(including periodic keepalive messages) permitted by the ACL.
peer-acl acl (Optional) Limits the messages displayed for LDP peers in accordance with
the ACL.
Defaults All messages sent (for the sent keyword) or received (for the received keyword) are displayed except
for periodic keepalive messages.
Usage Guidelines LDP requires periodic transmission of keepalive messages. If you do not specify the all option, periodic
keepalive messages are not displayed.
Examples The following shows sample output from the debug mpls ldp messages command:
Router# debug mpls ldp messages received
Router# debug mpls ldp messages sent
Table 168 describes the significant fields shown in the sample display.
Field Description
ldp: Identifies the source of the displayed information as LDP.
Rcvd xxx msg The type of message received or sent.
Sent xxx msg
from a.b.c.d The host that sent the message. Used in the early stages of the opening of an
LDP session, when the LDP identifier is not yet known.
from a.b.c.d:e The LDP identifier of the peer that sent the message or to which the message
was sent.
to a.b.c.d:e
(pp 0xnnnnnnnn) Identifies the data structure used to represent the peer at the label distribution
level. Useful for correlating debug output.
Usage Guidelines LDP manages peer sessions by means of the following two coupled state machines:
• A low-level state machine that deals with session establishment and shutdown.
• A high-level state machine that deals with setting up and shutting down label advertisement
Use the debug mpls ldp session state-machine command to monitor the lower-level session state
machine.
Use the debug mpls ldp peer state-machine command to monitor the higher-level session state
machine.
Examples The following shows sample output from the debug mpls ldp peer state-machine command:
Router# debug mpls ldp peer state-machine
Table 169 describes the significant fields shown in the sample display.
Field Description
tagcon: Identifies the source of the message as the label control subsystem.
a.b.c.d:e The LDP identifier of the peer for the session with the state change.
(pp 0xnnnnnnnn) Address of the data structure used to represent the peer at the label
distribution level. This address is useful for correlating debug output.
Event E The event causing the state change.
s1 -> s2 The state of the LDP session has changed from state s1 to state s2.
Syntax Description all (Optional) Includes the contents of periodic keepalive messages in the
displayed message output to LDP peers.
peer-acl acl (Optional) Limits the displayed message output to those LDP peers permitted
by the access control list (ACL).
Defaults Displays the contents of LDP messages sent and received except for periodic keepalive messages.
Usage Guidelines Entering this command causes the contents of all messages sent and received, except for periodic
keepalive messages, to be displayed.
Examples The following shows sample output from the debug mpls ldp session io command:
Router# debug mpls ldp session io all
ldp: LDP keepalive msg: PDU hdr: LDP Id: 133.0.0.33:0; Msg Contents:
0x00 0x01 0x00 0x0E 0x85 0x00 0x00 0x21 0x00 0x00 0x02 0x01 0x00 0x04 0x00 0x00
0x06 0x33
ldp: Rcvd keepalive msg from 10.0.0.44:0 (pp 0x0)
ldp: LDP keepalive msg: PDU hdr: LDP Id: 10.0.0.44:0; Msg Contents:
0x00 0x01 0x00 0x0E 0x90 0x00 0x00 0x2C 0x00 0x00 0x02 0x01 0x00 0x04 0x00 0x00
0x10 0x22
ldp: Sent address msg to 10.0.0.44:0 (pp 0x610ECDD0)
ldp: LDP address msg: PDU hdr: LDP Id: 133.0.0.33:0; Msg Contents:
0x00 0x01 0x00 0x34 0x85 0x00 0x00 0x21 0x00 0x00 0x03 0x00 0x00 0x2A 0x00 0x00
0x06 0x34 0x01 0x01 0x00 0x22 0x00 0x01 0x02 0x00 0x00 0xA3 0x82 0x42 0x00 0x21
0x82 0x4D 0x00 0x21 0x85 0x00 0x00 0x21 0x22 0x00 0x00 0x21 0x67 0x00 0x00 0x21
0x23 0x00 0x00 0x21 0x26 0x00 0x00 0x21
ldp: Sent label mapping msg to 10.0.0.44:0 (pp 0x610ECDD0)
ldp: LDP label mapping msg: PDU hdr: LDP Id: 133.0.0.33:0; Msg Contents:
0x00 0x01 0x00 0x22 0x85 0x00 0x00 0x21 0x00 0x00 0x04 0x00 0x00 0x18 0x00 0x00
0x06 0x36 0x01 0x00 0x00 0x08 0x02 0x00 0x01 0x20 0xCB 0x00 0x07 0x07 0x02 0x00
0x00 0x04 0x00 0x00 0x00 0x18
ldp: Rcvd address msg from 10.0.0.44:0 (pp 0x610ECDD0)
ldp: LDP address msg: PDU hdr: LDP Id: 10.0.0.44:0; Msg Contents:
0x00 0x01 0x00 0x24 0x90 0x00 0x00 0x2C 0x00 0x00 0x03 0x00 0x00 0x1A 0x00 0x00
0x10 0x23 0x01 0x01 0x00 0x12 0x00 0x01 0x90 0x00 0x00 0x2C 0x02 0x00 0x00 0xA4
0x22 0x00 0x00 0x2C 0x2D 0x00 0x00 0x2C
ldp: Rcvd label mapping msg from 10.0.0.44:0 (pp 0x610ECDD0)
ldp: LDP label mapping msg: PDU hdr: LDP Id: 10.0.0.44:0; Msg Contents:
0x00 0x01 0x00 0x22 0x90 0x00 0x00 0x2C 0x00 0x00 0x04 0x00 0x00 0x18 0x00 0x00
0x10 0x24 0x01 0x00 0x00 0x08 0x02 0x00 0x01 0x20 0x90 0x00 0x00 0x2C 0x02 0x00
0x00 0x04 0x00 0x00 0x00 0x03
Table 170 describes the significant fields shown in the sample display.
Field Description
ldp: Identifies the source of the message as LDP.
Rcvd xxx msg Indicates that a message of the specified type has been received.
from a.b.c.d The host to which the message has been sent. Used in the early stages of the
opening of an LDP session when the LDP identifier is not yet known.
Sent xxx msg Indicates that a message of the specified type has been sent.
to a.b.c.d The host to which the message has been sent. Used in the early stages of the
opening of an LDP session when the LDP identifier is not yet known.
to a.b.c.d:e The LDP identifier of the peer to which the message has been sent.
(pp 0xnnnnnnnn) Identifies the data structure used to represent the peer at the label distribution
level. Useful for correlating debug output.
--LDP xxx msg The type of message that has been sent.
PDU hdr: LDP Id: The LDP identifier of the sender included in the LDP protocol data unit
a.b.c.d:e (PDU) header.
Msg Contents: 0xnn ... The contents of the message represented as a sequence of bytes.
0xnn
Syntax Description peer-acl acl (Optional) Limits the displayed information to that for LDP peers permitted
by the access control list (ACL).
Usage Guidelines LDP manages peer sessions by means of the following two coupled-state machines:
• A low-level state machine that deals with session establishment and shutdown
• A high-level state machine that deals with setting up and shutting down label advertisement
Use the debug mpls ldp session state-machine command to monitor the lower-level session state
machine.
Use the debug mpls ldp peer state-machine command to monitor the higher-level session state
machine.
Examples The following shows sample output from the debug mpls ldp session state-machine command:
Router# debug mpls ldp session state-machine
Field Description
ldp: Identifies the source of the message as LDP.
ptcl_adj:a.b.c.d Identifies the network address of the LDP peer.
(0xnnnnnnnn) Identifies the data structure used to represent the peer at the protocol level.
Useful for correlating debug output.
Event: E The event that caused the state transition.
s1 -> s2 The state of the LDP session has changed from state s1 to state s2.
Usage Guidelines Platforms that are not directly connected may engage in Label Distribution Protocol (LDP) label
distribution (for example, to support two-level labeling across a label-switched path (LSP) tunnel).
An LDP session between nondirectly connected label switch routers (LSRs) is called a targeted session
and is supported by LDP extended discovery which uses targeted Hello messages sent to specific IP
addresses. This mechanism establishes LDP adjacencies to peers that are not directly adjacent, such as
peers at either end of a tunnel.
An LSR (Router 1) attempting to initiate an LDP targeted session with another LSR (Router 2) sends
targeted Hello messages sent to a specific IP address of Router 2. If the configuration of Router 2 permits
it to respond to targeted Hello messages from Router 1, it does so, and the LDP session can be
established. In this situation, Router 1 is said to be an active LSR for the targeted session because it
initiated the targeted Hello messages; Router 2 is said to be a passive LSR for the session because it
responded to them.
As with LDP sessions between two directly connected LSRs, it is possible for a targeted session to be
the result of multiple discovery activities which are targeted to different IP addresses for the same LSR.
In addition, it is possible for both LSRs in a targeted session to be active and for both to be passive.
The debugging messages enabled by the debug mpls ldp targeted-neighbors command report activity
relating to targeted sessions.
Examples The following shows sample output from the debug mpls ldp targeted-neighbors command:
Router# debug mpls ldp targeted-neighbors
Table 172 describes the significant fields shown in the sample display.
Field Description
ldp-trgtnbr: Identifies this as an LDP targeted neighbor debug statement.
10.0.0.44 IP address for the targeted neighbor.
Syntax Description peer-acl acl (Optional) Limits the displayed information to that for LDP peers permitted
by the access control list (ACL).
interface interface (Optional) Limits the displayed information to that for the specified
interface.
Defaults Displays information about LDP TCP connection activity for all peers and all interfaces.
Usage Guidelines Use this command to monitor LDP activity relating to the establishment of the TCP connection for LDP
sessions.
When two devices establish a TCP connection for an LDP session, the device with the larger transport
address plays an active role and the other plays a passive role. The active device attempts to establish a
TCP connection to the well-known LDP port at the passive device. The passive device waits for the
connection to the well-known port to be established.
Examples The following shows sample output from the debug mpls ldp transport connections command:
Router# debug mpls ldp transport connections
Table 173 describes the significant fields shown in the sample display.
Field Description
ldp: Identifies the source of the message as LDP.
adj 0xnnnnnnnn Identifies the data structure used to represent the peer at the transport level.
Useful for correlating debug output.
a.b.c.d <-> p.q.r.s Indicates a TCP connection between a.b.c.d and p.q.r.s.
a.b.c.d:x <-> p.q.r.s:y Indicates a TCP connection between a.b.c.d, port x and p.q.r.s, port y.
Syntax Description peer-acl acl (Optional) Limits the displayed information to that for LDP peers permitted
by the access control list (ACL).
interface (Optional) Limits the displayed information to that for the specified
interface.
Defaults Displays information about LDP discovery activity for all peers and all interfaces.
Usage Guidelines Use the command to monitor LDP discovery activity. This mechanism is used to determine the devices
with which you wish to establish LDP sessions.
This command might generate a great deal of output. Use the peer-acl option or interface option, or
both, to limit the output to peers or interfaces of interest.
Note The command includes all of the output generated by the debug mpls ldp transport connections
command.
Examples The following shows sample output from the debug mpls ldp transport events command:
Router# debug mpls ldp transport events
ldp: Rcvd ldp hello; ATM3/0.1, from 203.0.7.7 (203.0.7.7:2), intf_id 1, opt 0x8, tcatm
ldp: Send ldp hello; Ethernet1/1/1, src/dst 138.1.0.88/224.0.0.2, inst_id 0
ldp: Rcvd ldp hello; Ethernet1/1/1, from 10.105.0.9 (7.1.1.1:0), intf_id 0, opt 0xC
ldp: ldp Hello from 10.105.0.9 (7.1.1.1:0) to 224.0.0.2, opt 0xC
ldp: New adj 0x617C5EBC from 10.105.0.9 (7.1.1.1:0), Ethernet1/1/1
ldp: Opening ldp conn; adj 0x617C5EBC, 8.1.1.1 <-> 7.1.1.1
ldp: ldp conn is up; adj 0x617C5EBC, 8.1.1.1:11013 <-> 7.1.1.1:646
ldp: Send ldp hello; ATM3/0.1, src/dst 8.1.1.1/224.0.0.2, inst_id 1, tcatm
ldp: Rcvd ldp hello; ATM3/0.1, from 203.0.7.7 (203.0.7.7:2), intf_id 1, opt 0x8, tcatm
ldp: Send ldp hello; Ethernet1/1/1, src/dst 138.1.0.88/224.0.0.2, inst_id 0
ldp: Rcvd ldp hello; Ethernet1/1/1, from 10.105.0.9 (7.1.1.1:0), intf_id 0, opt 0xC
...
ldp: Send ldp hello; Ethernet1/1/1, src/dst 138.1.0.88/224.0.0.2, inst_id 0
ldp: Send ldp hello; ATM3/0.1, src/dst 8.1no tag ip
.0.2, inst_id 1, tcatm
ldp: disabling ldp on Ethernet1/1/1
ldp: Hold timer expired for adj 0x617C5EBC, will close conn
ldp: Closing ldp conn 8.1.1.1:11013 <-> 7.1.1.1:646, adj 0x617C5EBC
ldp: Adjacency 0x617C5EBC, 10.105.0.9 timed out
ldp: Adj 0x617C5EBC; state set to closed
ldp: Rcvd ldp hello; ATM3/0.1, from 203.0.7.7 (203.0.7.7:2), intf_id 1, opt 0x8, tcatm
ldp: Ignore Hello from 10.105.0.9, Ethernet1/1/1; no intf
Field Description
ldp: Identifies the source of the message as LDP.
adj 0xnnnnnnnn Identifies the data structure used to represent the peer at the transport level.
Useful for correlating debug output.
a.b.c.d (p.q.r.s:n) Network address and LDP identifier of the peer.
intf_id Interface identifier (non-zero for LC-ATM interfaces; 0 otherwise).
opt 0xn Bits that describe options in the LDP discovery Hello packet:
• 0x1—Targeted Hello option
• 0x2—Send targeted Hello option
• 0x4—Transport address option
• 0x8—LDP Hello message (as opposed to TDP Hello message)
Usage Guidelines Several lines of output are produced for each route placed into the label-forwarding information base
(LFIB). If your router has thousands of labeled routes, be careful about issuing this command. When
label switching is first enabled, each of these routes is placed into the LFIB, and several lines of output
are displayed for each route.
Examples The following is sample output displayed when you enter the debug mpls lfib cef command:
Router# debug mpls lfib cef
Field Description
tagcon The name of the subsystem issuing the debug output (Label Control).
LFIB The name of the subsystem issuing the debug output.
tc_ip_rtlookup fail on The destination with IP address and mask shown is not in the routing table.
x.y.w.z/m:
subnet_lookup failed
route tag chg x.y.w.z/m Request to create the LFIB entry for the specified prefix/mask.
idx=-1 The index within the FIB entry of the path whose LFIB entry is being created.
The parameter –1 means all paths for this FIB entry.
inc=s Incoming label of the entry being processed.
outg=s Outgoing label of the entry being processed.
enabled=0xn Bit mask indicating the types of label switching currently enabled:
• 0x1 = dynamic
• 0x2 = TSP tunnels
• 0x3 = both
fib complete delete Indicates that the FIB entry is being deleted.
prefix=x.y.w.z/m A destination prefix.
delete_info=1 Indicates that label_info is also being deleted.
deactivate tag rew for Indicates that label rewrite for specified prefix is being deleted.
x.y.w.z/m
index=n Index of path in the FIB entry being processed.
Field Description
set fib rew: pfx Indicates that label rewrite is being installed or deleted from the FIB entry
x.y.w.z/m for the specified destination for label imposition purposes.
add=0 Indicates that label rewrite is being deleted from the FIB (no longer
imposing labels).
tag_rew->adj=s Adjacency of label rewrite for label imposition.
resolve tag Indicates that the FIB route to the specified prefix is being resolved.
rew,prefix=x.y.w.z/m
no tag_info Indicates that there is no label_info for the destination (destination not
labeled).
no parent Indicates that the route is not recursive.
fib scanner start Indicates that the periodic scan of the FIB has started.
needed:1 Indicates that the LFIB needs the FIB to be scanned.
unres:n Indicates the number of unresolved TFIB entries.
mac:n Indicates the number of TFIB entries missing MAC strings.
loadinfo:n Indicates whether the nonrecursive accounting state has changed and
whether the loadinfo information in the LFIB needs to be adjusted.
fib upd loadinf Indicates that a check for nonrecursive accounting is being made and that
x.y.w.z/m the LFIB loadinfo information for the specified prefix is being updated.
tag=s Incoming label of entry.
fib no loadin Indicates that the corresponding FIB entry has no loadinfo.
tfib no loadin Indicates that the LFIB entry has no loadinfo.
fib check cleanup for Indicates that a check is being made on the LFIB entry for the specified
x.y.w.z/m destination to determine if rewrite needs to be removed from the LFIB.
return_value=x If x is 0, indicates that no change has occurred in the LFIB entry. If x is 1,
there was a change.
fib_scanner_end Indicates that the FIB scan has come to an end.
create dynamic entry for Indicates that the LFIB has been enabled and that an LFIB entry is being
x.y.w.z/m created for the specified destination.
call find_route_tags Indicates that the labels for that destination are being requested.
dist_method=n Identifies the label distribution method—TDP, TC-ATM, and so on.
next_hop=x.y.z.w Identifies the next hop for the destination.
interface name Identifies the outgoing interface for the destination.
create tag info Indicates that a label_info data structure is being created for the destination.
has no info Indicates that the destination does not already have label_info.
finish fib re x.y.z.w/m Indicates that the LFIB entry for the specified route is being completed.
parent outg tag s If recursive, specifies the outgoing label of the route through which it is
recursive (the parent). If not recursive, s = “no parent.”
Field Description
tagcon: Indicates that label control is notifying LFIB that labels are available for the
route_tag_change for: specified destination.
x.y.z.w/m
intag s Identifies the incoming label for the destination.
outtag s Identifies the outgoing label for the destination.
nexthop tsr x.y.z.w.i Identifies the TDP ID of the next hop that sent the tag.
Usage Guidelines Several lines of output are produced for each route placed into the LFIB. If your router has thousands of
labeled routes, issue this command with care. When label switching is first enabled, each of these routes
is placed into the LFIB and a label encapsulation is created. The command output shows you on which
adjacency the label rewrite is being created and the labels assigned.
Examples The following is an example of output generated when you issue the debug mpls lfib enc command.
This example shows the encapsulations for three routes that have been created and placed into the LFIB.
Router# debug mpls lfib enc
Field Description
TFIB Identifies the source of the message as the LFIB subsystem.
finish res Identifies that the LFIB resolution is being finished.
inc tag=x or inc=x An incoming (local) label for the LFIB entry is being created. Labels can be
numbers or special values.
outg=y An outgoing (remote) label for the LFIB entry is being created.
next_hop=a.b.c.d IP address of the next hop for the destination.
interface The outgoing interface through which a packet will be sent.
get ip adj Identifies that the IP adjacency to use in the LFIB entry is being determined.
get tag adj Identifies that the label switching adjacency to use for the LFIB entry is
being determined.
addr = a.b.c.d The IP address of the adjacency.
is_p2p=x If x is 1, this is a point-to-point adjacency. If x is 0, it is not.
fibidb = s Indicates the interface of the adjacency.
linktype = x The link type of the adjacency, as follows:
• 7 = LINK_IP
• 79 = LINK_TAG
sizes x,y,z Indicates the following values:
• x = length of macstring
• y = length of tag encapsulation
• z = tag MTU
type = x Tag encapsulation type, as follows:
• 0 = normal
• 1 = TCATM
• 2 = TSP tunnel
idb:s Indicates the outgoing interface.
update_mac Indicates that the macstring of the adjacency is being updated.
Table 177 describes the special labels, which sometimes appear in the debug output, and their meanings.
Examples The following is sample output generated from the debug mpls lfib lsp command:
Router# debug mpls lfib lsp
On VIP:
TFIB: tagtun chg msg,in tg=35,o tg=1,nh=10.93.72.13,if=7
TFIB: tsptunnel:next hop=10.93.72.13,inc=35,outg=Imp_null,if_number=7
TFIB: tsptun update loadinfo:tag=35,loadinfo_reqd=0,no new loadinfo,no old loadinfo
TFIB: tagtun chg msg,in tg=36,o tg=1,nh=10.92.0.7,if=6
TFIB: tsptunnel:next hop=10.92.0.7,inc=36,outg=Imp_null,if_number=6
Table 178 describes the significant fields in the sample display shown.
Field Description
tagtun Name of routine entered.
next hop=x.y.z.w Next hop for the tunnel being created.
inc=x Incoming label for this hop of the tunnel being created.
outg=x Outgoing label (1 means Implicit Null label).
idb=s Outgoing interface for the tunnel being created.
if_number=7 Interface number of the outgoing interface.
tsptunnel Name of the routine entered.
tsptun update loadinfo The procedure being performed.
tag=x Incoming label of the LFIB slot whose loadinfo is being updated.
loadinfo_reqd=x Indicates whether a loadinfo is expected for this entry (non-recursive
accounting is on).
no new loadinfo No change required in loadinfo.
no old loadinfo No previous loadinfo available.
tagtun tag chg linec Line card is being informed of the TSP tunnel.
fiblc=x Indicates which line card is being informed (0 means all).
in tg=x Indicates the incoming label of new TSP tunnel.
o tg=x Indicates the outgoing label of new TSP tunnel.
if=x Indicates the outgoing interface number.
nh=x.y.w.z Indicates the next hop IP address.
tagtun_delete Indicates that a procedure is being performed: delete a TSP tunnel.
tagtun tag del linec Informs the line card of the TSP tunnel deletion.
tagtun chg msg Indicates that the line card has received a message to create a TSP tunnel.
Usage Guidelines Use this command when you wish to trace what happens to the label-forwarding information base (LFIB)
when you issue the mpls ip or the mpls tsp-tunnel command.
Examples The following is sample output generated from the debug mpls lfib state command:
Router# debug mpls lfib state
On linecard only:
Field Description
LFIB Identifies the source of the message as the LFIB subsystem.
Upd tag sb x Indicates that the status of the “xth” label switching sub-block is being
updated, where x is the interface number. There is a label switching
sub-block for each interface on which label switching has been enabled.
(status:0xC1,tmtu:1500, Identifies the values of the fields in the label switching sub-block, as
VPI:1-1VC=0/32, follows:
et:0/0/0),lc 0x0)
• status byte
• maximum transmission unit (tmtu)
• range of ATM VPs
• control VP
• control VC (if this is a TC-ATM interface)
• encapsulation type (et)
• encapsulation information
• tunnel interface number (lc)
• line card number to which the update message is being sent (0 means
all line cards)
intf status chg Indicates that there was an interface status change.
idb=Et4/0/2 Identifies the interface whose status changed.
status=0xC1 Indicates the new status bits in the label switching sub-block of the idb.
oldstatus=0xC3 Indicates the old status bits before the change.
interface dyntag change, Indicates that there was a change in the dynamic label status for the
change in state to particular interface.
Ethernet4/0/2
enable entered Indicates that the code that enables the LFIB was invoked.
TFIB already enabled Indicates that the LFIB was already enabled when this call was made.
table exists Indicates that an LFIB table had already been allocated in a previous call.
cleanup: tfib[x] still Indicates that the LFIB is being deleted, but that slot x is still active.
non-0
disable lc mesg recvd, Indicates that a message to disable label switching type 1 (dynamic) was
type=0x1 received by the line card.
disable entered, table Indicates that a call to disable dynamic label switching was issued.
exists,type=0x1
Ethernet4/0/1 fibidb Indicates that a message giving fibidb status change was received on the
subblock message line card.
received
enable lc msg Indicates that the line card received a message to enable label switching
recvd,type=0x1 type 1 (dynamic).
Field Description
Tunnel301 set encapfix Shows that fibidb Tunnel301 on the line card received an encapsulation
to 0x6016A97C fixup.
types now 0x3, returning Shows the value of the bitmask indicating the type of label switching
enabled on the interface, as follows:
• 0x1—means dynamic label switching
• 0x2—means tsp-tunnels
• 0x3—means both
Examples The following is sample output generated from the debug mpls lfib struct command:
Router# debug mpls lfib struct
Field Description
TFIB The subsystem issuing the message.
delete tag rew A label rewrite is being freed.
remove from tfib A label rewrite is being removed from the LFIB.
inc tag=s The incoming label of the entry being processed.
set loadinfo The loadinfo field in the LFIB entry is being set (used for nonrecursive
accounting).
tag=s The incoming label of the entry being processed.
no old loadinfo The LFIB entry did not have a loadinfo before.
no new loadinfo The LFIB entry should not have a loadinfo now.
TFIB not in use. Label switching has been disabled and the LFIB is being freed up.
Checking for entries.
cleanup: tfib[x] still The LFIB is being checked for any entries in use, and entry x is the lowest
non-0 numbered slot still in use.
TFIB freed The LFIB table has been freed.
enable, TFIB allocated, Label switching has been enabled and an LFIB of x bytes has been allocated.
size x bytes, maxtag = y The largest legal label is y.
create tag rewrite A label rewrite is being created.
inc s The incoming label.
outg s The outgoing label.
add to tfib at s A label rewrite has been placed in the LFIB at slots.
first in circular list This LFIB slot had been empty and this is the first rewrite in the list.
mac=0,enc=0 Length of the MAC string and total encapsulation length, including labels.
added to circular list A label rewrite is being added to an LFIB slot that already had an entry. This
rewrite is being inserted in the circular list.
Usage Guidelines The optional interface parameter restricts the display to only those packets received or sent on the
indicated interface.
Note Use this command with care because it generates output for every packet processed. Furthermore,
enabling this command causes fast and distributed label switching to be disabled for the selected
interfaces. To avoid adversely affecting other system activity, use this command only when traffic on the
network is at a minimum.
Examples The following is sample output from the debug mpls packets command:
Router# debug mpls packets
Field Description
Hs0/0 The identifier for the interface on which the packet was received or sent.
recvd Packet received.
xmit Packet transmitted.
CoS Class of Service field from the packet label header.
TTL Time to live field from the packet label header.
(no tag) Last label popped off the packet and were sent unlabeled.
Tag(s) A list of labels on the packet, ordered from the top of the stack to the bottom.
Examples In the following example, information is printed about traffic engineering area configuration change
events:
Router# debug mpls traffic-eng areas
Examples In the following example, information is printed about automatic routing over traffic engineering
tunnels:
Router# debug mpls traffic-eng autoroute
Examples In the following example, information is printed about traffic engineering LSP admission control on
traffic engineering interfaces:
Router# debug mpls traffic-eng link-management admission-control
Examples In the following example, detailed debugging information is printed about resource advertisements for
traffic engineering interfaces:
Router# debug mpls traffic-eng link-management advertisements detail
Field Description
Flooding Protocol Interior Gateway Protocol (IGB) that is flooding information for
this area.
IGP System ID Identification that IGP flooding uses in this area to identify this
node.
MPLS TE Router ID MPLS traffic engineering router ID.
Flooded Links Number of links that are flooded in this area.
Link ID Index of the link that is being described.
Link IP Address Local IP address of this link.
IGP Neighbor IGP neighbor on this link.
Admin. Weight Administrative weight associated with this link.
Physical Bandwidth Link’s bandwidth capacity (in kbps).
Max Reservable BW Maximum amount of bandwidth that is currently available for
reservation at this priority.
Reservable Bandwidth Amount of bandwidth that is available for reservation.
Attribute Flags Attribute flags of the link being flooded.
Examples In the following example, information is printed about bandwidth allocation for traffic engineering
LSPs:
Router# debug mpls traffic-eng link-management bandwidth-allocation
Examples In the following example, detailed debugging information is printed about errors encountered during a
traffic engineering link management procedure:
Router# debug mpls traffic-eng link-management errors detail
Examples In the following example, detailed debugging information is printed about traffic engineering link
management system events:
Router# debug mpls traffic-eng link-management events detail
Examples In the following example, detailed debugging information is printed about changes to the link
management database of IGP neighbors:
Router# debug mpls traffic-eng link-management igp-neighbors detail
Examples In the following example, detailed debugging information is printed about traffic engineering link
management interface events:
Router# debug mpls traffic-eng link-management links detail
Examples In the following example, detailed debugging information is printed about traffic engineering LSP
preemption:
Router# debug mpls traffic-eng link-management preemption detail
Examples In the following example, detailed debugging information is printed about traffic engineering link
management routing resolutions that can be performed to help RSVP interpret explicit route objects:
Router# debug mpls traffic-eng link-management routing detail
Examples In the following example, information is printed about unequal cost load balancing over traffic
engineering tunnels:
Router# debug mpls traffic-eng load-balancing
Syntax Description num Prints path calculation information only for the local tunneling interface
with unit number num.
lookup Prints information for path lookups.
spf Prints information for shortest path first (SPF) calculations.
verify Prints information for path verifications.
Examples In the following example, information is printed about the calculation of the traffic engineering path:
Router# debug mpls traffic-eng path lookup
Examples In the following example, information is printed about traffic engineering topology change events:
Router# debug mpls traffic-eng topology change
Examples In the following example, information is printed about traffic engineering topology LSA events:
Router# debug mpls traffic-eng topology lsa
Examples In the following example, detailed debugging information is printed about errors encountered during a
traffic engineering tunnel management procedure:
Router# debug mpls traffic-eng tunnels errors
Examples In the following example, detailed debugging information is printed about traffic engineering tunnel
management system events:
Router# debug mpls traffic-eng tunnels events detail
Examples In the following example, detailed debugging information is printed about MPLS label management for
traffic engineering tunnels:
Router# debug mpls traffic-eng tunnels labels detail
To restrict output to information about a single tunnel, you can configure an access list and supply it to
the debug command. Configure the access list as follows:
Router(config-ext-nacl)# permit udp host scr_address host dst_address eq tun intfc
For example, if tunnel 10012 has destination 10.0.0.11 and source 10.0.0.4, as determined by the show
mpls traffic-eng tunnels command, the following access list could be configured and added to the
debug command:
Router(config-ext-nacl)# permit udp host 10.0.0.4 10.0.0.11 eq 10012
Examples In the following example, detailed debugging information is printed about traffic engineering tunnel
reoptimizations that match access list number 101:
Router# debug mpls traffic-eng tunnels reoptimize detail 101
Examples In the following example, detailed debugging information is printed about traffic engineering tunnel
signalling operations that match access list number 101:
Router# debug mpls traffic-eng tunnels signalling detail 101
Examples In the following example, detailed debugging information is printed about state maintenance for traffic
engineering tunnels that match access list number 99:
Router# debug mpls traffic-eng tunnels state detail 99
Examples In the following example, detailed debugging information is printed about traffic engineering tunnel
timer management:
Router# debug mpls traffic-eng tunnels timers detail
Usage Guidelines This command monitors requests to establish or remove cross-connects from XmplsATM interfaces to
the Virtual Switch Interface (VSI) master, as well as the VSI master responses to these requests.
Note Use this command with care, because it generates output for each cross-connect operation performed by
the label switch controller (LSC). In a network configuration with many label virtual circuits (LVCs),
the volume of output generated can interfere with system timing and the proper operation of other router
functions. Use this command only in situations in which the LVC setup or teardown rate is low.
Examples The following is sample output from the debug mpls xtagatm cross-connect command:
Router# debug mpls xtagatm cross-connect
Field Description
XTagATM The source of the debugging message as an XmplsATM interface.
cross-conn An indicator that the debugging message pertains to a cross-connect setup
or teardown operation.
request A request from an XmplsATM interface to the VSI master to set up or tear
down a cross-connect.
response Response from the VSI master to an XmplsATM interface that a
cross-connect was set up or removed.
SETUP A request for the setup of a cross-connect.
TEARDOWN A request for the teardown of a cross-connect.
UP The cross-connect is established.
DOWN The cross-connect is not established.
userdata, userbits Values passed with the request that are returned in the corresponding fields
in the matching response.
prec The precedence for the cross-connect.
result The status of the completed request.
0xC0100 (Ctl-If) 1/32 Information about the interface:
• One endpoint of the cross-connect is on the interface whose logical
interface number is 0xC0100.
• The interface is the VSI control interface.
• The virtual path identifier (VPI) value at this endpoint is 1.
• The virtual channel identifier (VCI) value at this end of the
cross-connect is 32.
<-> The type of cross-connect (unidirectional or bidirectional).
0xC0200 (XTagATM0) Information about the interface:
0/32
• The other endpoint of the cross-connect is on the interface whose
logical interface number is 0xC0200.
• The interface is associated with XmplsATM interface 0.
• The VPI value at this endpoint is 0.
• The VCI value at this end of the cross-connect is 32.
-> The response pertains to a unidirectional cross-connect.
Usage Guidelines Use the debug mpls xtagatm errors command to display information about abnormal conditions and
events that occur on XmplsATM interfaces.
Examples The following is sample output from the debug mpls xtagatm errors command:
Router# debug mpls xtagatm errors
XTagATM VC: XTagATM0 1707 2/352 (ATM1/0 1769 3/915): Cross-connect setup
failed NO_RESOURCES
This message indicates a failed attempt to set up a cross-connect for a terminating a virtual circuit (VC)
on XmplsATM0. The reason for the failure was a lack of resources on the controlled ATM switch.
Usage Guidelines Use the debug mpls xtagatm events command to monitor major events that occur on XmplsATM
interfaces. This command monitors events that pertain only to XmplsATM interfaces as a whole and does
not include any events that pertain to individual XmplsATM VCs or individual switch cross-connects.
The specific events that are monitored when the debug mpls xtagatm events command is in effect
include the following:
• Receiving asynchronous notifications that the VSI master sent through the external ATM application
programming interface (ExATM API) to an XmplsATM interface.
• Resizing of the table that is used to store switch cross-connect information. This table is resized
automatically as the number of cross-connects increases.
• Marking of XmplsATM VCs as stale when an XmplsATM interface shuts down, thereby ensuring
that the stale interfaces are refreshed before new XmplsATM VCs can be created on the interface.
Examples The following is sample output from the debug mpls xtagatm events command:
Router# debug mpls xtagatm events
Field Description
XTagATM The source of the debugging message.
desired cross-connect The table of cross-connect information has been set to hold 256 entries. A
table size set to 256 single cross-connect table is shared among all XmplsATM interfaces. The
cross-connect table is automatically resized as the number of
cross-connects increases.
ExATM API The information in the debug output pertains to an asynchronous
notification sent by the Virtual Switch Interface (VSI) master to the
XmplsATM driver.
event Up/Down The specific event that was sent by the VSI master to the XmplsATM driver.
port 0xA0100 (None) The event pertains to the VSI interface whose logical interface number is
0xA0100, and that this logical interface is not bound to an XmplsATM
interface.
marking all VCs stale All existing XmplsATM VCs on interface XmplsATM0 are marked as stale,
on XTagATM0 and that XmplsATM0 remains down until all of these VCs are refreshed.
Usage Guidelines Use the debug mpls xtagatm vc command to display detailed information about all events that affect
individual XmplsATM terminating VCs.
Note Use this command with care, because it results in extensive output when many XmplsATM VCs are set
up or torn down. This output can interfere with system timing and normal operation of other router
functions. Use the debug mpls xtagatm vc command only when a few XmplsATM VCs are created or
removed.
Examples The following is sample output from the debug mpls xtagatm vc command:
Router# debug mpls xtagatm vc
XTagATM VC: XTagATM1 18 0/32 (ATM1/0 0 0/0): Setup, Down --> UpPend
XTagATM VC: XTagATM1 18 0/32 (ATM1/0 88 1/32): Complete, UpPend --> Up
XTagATM VC: XTagATM1 19 1/33 (ATM1/0 0 0/0): Setup, Down --> UpPend
XTagATM VC: XTagATM0 43 0/32 (ATM1/0 67 1/84): Teardown, Up --> DownPend
Field Description
XTagATM VC The source of the debugging message.
XTagATM <ifnum> The particular XmplsATM interface number for the terminating VC.
vcd vpi/vci The virtual circuit descriptor (VCD) and virtual path identifier/virtual
channel identifier (VPI/VCI) values for the terminating VC.
(ctl-if vcd vpi/vci) The control interface, the VCD, and the VPI and VCI values for the private
VC corresponding to the XmplsATM VC on the control interface.
Setup, Complete, The name of the event that occurred for the indicated VC.
Teardown
oldstate -> newstate The state of the terminating VC before and after the processing of the event.
debug mpoa client {all | data | egress | general | ingress | keep-alives | platform-specific}
[name mpc-name]
no debug mpoa client {all | data | egress | general | ingress | keep-alives | platform-specific}
[name mpc-name]
Syntax Description all Displays debugging information for all MPC activity.
data Displays debugging information for data plane activity only. This option applies
only to routers.
egress Displays debugging information for egress functionality only.
general Displays general debugging information only.
ingress Displays debugging information for ingress functionality only.
keep-alives Displays debugging information for keep-alive activity only.
platform-specific Displays debugging information for specific platforms only. This option applies
only to the Catalyst 5000 series ATM module.
name mpc-name (Optional) Specifies the name of the MPC with the specified name.
Examples The following shows how to turn on debugging for the MPC ip_mpc:
ATM# debug mpoa client all name ip_mpc
Syntax Description name mps-name (Optional) Specifies the name of an MPOA server.
Usage Guidelines The debug mpoa server command optionally limits the output only to the specified MPOA Server
(MPS).
Examples The following turns on debugging only for the MPS named ip_mps:
Router# debug mpoa server name ip_mps
debug mrcp
To display debugging messages for Media Resource Control Protocol (MRCP) operations, use the
debug mrcp command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
Examples The following example shows output from the debug mrcp api command:
Router# debug mrcp api
The first four lines show Real Time Streaming Protocol (RTSP) socket commands for Text-To-Speech
(TTS) operations:
*Apr 17 16:31:16.323:mrcp_add_param:param:Kill-On-Barge-In:
*Apr 17 16:31:16.323:mrcp_add_param:param:Speech-Language:
*Apr 17 16:31:16.323:mrcp_add_param:param:Logging-Tag:
*Apr 17 16:31:16.323:mrcp_add_param:param:Content-Base:
The following lines show RTSP socket commands for Automatic Speech Recognition (ASR) operations:
*Apr 17 16:31:16.323:mrcp_add_param:param:Confidence-Threshold:
*Apr 17 16:31:16.323:mrcp_add_param:param:Sensitivity-Level:
*Apr 17 16:31:16.323:mrcp_add_param:param:Speed-Vs-Accuracy:
*Apr 17 16:31:16.323:mrcp_add_param:param:Dtmf-Interdigit-Timeout:
*Apr 17 16:31:16.323:mrcp_add_param:param:Dtmf-Term-Timeout:
*Apr 17 16:31:16.323:mrcp_add_param:param:Dtmf-Term-Char:
*Apr 17 16:31:16.323:mrcp_add_param:param:No-Input-Timeout:
*Apr 17 16:31:16.323:mrcp_add_param:param:Logging-Tag:
*Apr 17 16:31:16.327:mrcp_add_param:param:Content-Base:
*Apr 17 16:31:16.327:mrcp_add_param:param:Recognizer-Start-Timers:
*Apr 17 16:31:16.327:mrcp_recognizer_start 5
*Apr 17 16:31:26.715:mrcp_add_param:param:Kill-On-Barge-In:
*Apr 17 16:31:26.715:mrcp_add_param:param:Speech-Language:
*Apr 17 16:31:26.715:mrcp_add_param:param:Logging-Tag:
*Apr 17 16:31:26.715:mrcp_add_param:param:Content-Base:
*Apr 17 16:31:26.715:mrcp_synth_speak 5
*Apr 17 16:31:30.451:mrcp_destroy_session 5 type:SYNTHESIZER
*Apr 17 16:31:30.451:mrcp_destroy_session 5 type:RECOGNIZER
The following examples show output from the debug mrcp error command:
Router# debug mrcp error
This output shows an error when the response from the server is incorrect:
*May 9 20:29:09.936:Response from 10.1.2.58:554 failed
*May 9 20:29:09.936:MRCP/1.0 71 422 COMPLETE
This output shows an error when the RTSP connection to the server fails:
*May 9 20:29:09.936:Connecting to 10.1.2.58:554 failed
This output shows an error when the recognize request comes out of sequence:
*May 9 20:29:09.936:act_idle_recognize:ignoring old recognize request
The following example shows output from the debug mrcp pmh command:
Router# debug mrcp pmh
*Apr 17 16:32:51.885:GRAMMAR-CONTENT-HEADER
*Apr 17 16:32:51.885:Content-Type:text/uri-list
Content-Length:30
*Apr 17 16:32:51.885:Total-Length=365
*Apr 17 16:32:51.885:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
*Apr 17 16:32:51.885:RECOGNIZE 20 MRCP/1.0
Confidence-Threshold:50
Sensitivity-Level:50
Speed-Vs-Accuracy:50
Dtmf-Interdigit-Timeout:10000
Dtmf-Term-Timeout:10000
Dtmf-Term-Char:#
No-Input-Timeout:10000
Logging-Tag:14:14
Content-Base:http://server-asr/
Recognizer-Start-Timers:false
*Apr 17 16:32:51.885:Content-Type:text/uri-list
Content-Length:30
*Apr 17 16:32:51.885:session:field2@field.grammar
*Apr 17 16:32:51.885:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
*Apr 17 16:32:51.889:SPEECH-MARKUP-TYPE-HEADER
*Apr 17 16:32:51.889:Content-Type:application/synthesis+ssml
Content-Length:126
*Apr 17 16:32:51.889:Total-Length=313
*Apr 17 16:32:51.889:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
*Apr 17 16:32:51.889:SPEAK 18 MRCP/1.0
Kill-On-Barge-In:true
Speech-Language:en-US
Logging-Tag:14:14
Content-Base:http://server-asr/
*Apr 17 16:32:51.889:Content-Type:application/synthesis+ssml
Content-Length:126
*Apr 17 16:32:51.889:<?xml version="1.0"?><speak> Who do you want speak to?? Joe, Carl,
Alex?. And I am extending the length of the text</speak>
*Apr 17 16:32:51.889:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
*Apr 17 16:32:51.925:mrcp_pmh_parse_response:Length:28
Apr 17 16:32:51.925:mrcp_pmh_get_request_line:Line:MRCP/1.0 19 200 COMPLETE
*Apr 17 16:32:51.925:Request-tag:19 resp-code:200 Status:COMPLETE
*Apr 17 16:32:51.925:No Of Properties:0
*Apr 17 16:32:51.925:mrcp_process_recog_response:
*Apr 17 16:32:51.933:mrcp_pmh_parse_response:Length:31
Apr 17 16:32:51.933:mrcp_pmh_get_request_line:Line:MRCP/1.0 20 200 IN-PROGRESS
*Apr 17 16:32:51.933:Request-tag:20 resp-code:200 Status:IN-PROGRESS
*Apr 17 16:32:51.933:No Of Properties:0
*Apr 17 16:32:51.933:mrcp_process_recog_response:
*Apr 17 16:32:53.413:mrcp_pmh_parse_response:Length:31
Apr 17 16:32:53.413:mrcp_pmh_get_request_line:Line:MRCP/1.0 18 200 IN-PROGRESS
*Apr 17 16:32:53.413:Request-tag:18 resp-code:200 Status:IN-PROGRESS
*Apr 17 16:32:53.413:No Of Properties:0
*Apr 17 16:32:53.413:mrcp_process_synth_response:
*Apr 17 16:33:01.685:mrcp_pmh_parse_response:Length:100
Apr 17 16:33:01.689:mrcp_pmh_get_event_line:Line:SPEAK-COMPLETE 18 COMPLETE MRCP/1.0
*Apr 17 16:33:01.689:Request-tag:18 resp-code:200 Status:COMPLETE
*Apr 17 16:33:01.689:No Of Properties:2
*Apr 17 16:33:01.689:mrcp_process_synth_events:
*Apr 17 16:33:01.689: COMPLETION-CAUSE:1
*Apr 17 16:33:01.689:mrcp_send_synth_app_response:
*Apr 17 16:33:01.689:mrcp_pmh_parse_response:Length:61
Apr 17 16:33:01.689:mrcp_pmh_get_event_line:Line:START-OF-SPEECH 20 IN-PROGRESS MRCP/1.0
*Apr 17 16:33:01.689:Request-tag:20 resp-code:200 Status:IN-PROGRESS
*Apr 17 16:33:01.689:No Of Properties:1
*Apr 17 16:33:01.689:mrcp_process_recog_events:
*Apr 17 16:33:02.653:mrcp_pmh_parse_response:Length:815
Apr 17 16:33:02.653:mrcp_pmh_get_event_line:Line:RECOGNITION-COMPLETE 20 COMPLETE
MRCP/1.0
*Apr 17 16:33:02.653:Request-tag:20 resp-code:200 Status:COMPLETE
*Apr 17 16:33:02.653:No Of Properties:2
*Apr 17 16:33:02.653:mrcp_process_recog_events:
*Apr 17 16:33:02.653: COMPLETION-CAUSE:0
*Apr 17 16:33:02.653:mrcp_send_recog_app_response:
*Apr 17 16:33:02.661:param:Kill-On-Barge-In: true
*Apr 17 16:33:02.661:param:Speech-Language: en-US
*Apr 17 16:33:02.661:param:Logging-Tag: 14:14
*Apr 17 16:33:02.661:param:Content-Base: http://server-asr/
*Apr 17 16:33:02.665:SPEECH-MARKUP-TYPE-HEADER
*Apr 17 16:33:02.665:Content-Type:application/synthesis+ssml
Content-Length:57
*Apr 17 16:33:02.665:Total-Length=243
*Apr 17 16:33:02.665:@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
*Apr 17 16:33:02.665:SPEAK 22 MRCP/1.0
Kill-On-Barge-In:true
Speech-Language:en-US
Logging-Tag:14:14
Content-Base:http://server-asr/
*Apr 17 16:33:02.665:Content-Type:application/synthesis+ssml
Content-Length:57
*Apr 17 16:33:02.833:mrcp_pmh_parse_response:Length:31
Apr 17 16:33:02.833:mrcp_pmh_get_request_line:Line:MRCP/1.0 22 200 IN-PROGRESS
*Apr 17 16:33:02.833:Request-tag:22 resp-code:200 Status:IN-PROGRESS
*Apr 17 16:33:02.833:No Of Properties:0
*Apr 17 16:33:02.833:mrcp_process_synth_response:
*Apr 17 16:33:06.382:mrcp_pmh_parse_response:Length:98
Apr 17 16:33:06.382:mrcp_pmh_get_event_line:Line:SPEAK-COMPLETE 22 COMPLETE MRCP/1.0
*Apr 17 16:33:06.382:Request-tag:22 resp-code:200 Status:COMPLETE
*Apr 17 16:33:06.382:No Of Properties:2
*Apr 17 16:33:06.382:mrcp_process_synth_events:
*Apr 17 16:33:06.382: COMPLETION-CAUSE:0
*Apr 17 16:33:06.382:mrcp_send_synth_app_response:
The following example shows output from the debug mrcp session command:
Router# debug mrcp session
*Apr 17 16:34:07.851:mrcp_create_session:
*Apr 17 16:34:07.851:mrcp_create_session:New SCB creation
*Apr 17 16:34:07.851:mrcp_create_svr_session_url:
*Apr 17 16:34:07.851:mrcp_create_session:
*Apr 17 16:34:07.851:mrcp_create_session:Already an SCB is created for this call
*Apr 17 16:34:07.851:mrcp_process_events:event:LIB_CONNECT SYNTHESIZERCONN-STATUS=0
*Apr 17 16:34:07.855:mrcp_process_events:event:SPEAK SYNTHESIZER
*Apr 17 16:34:07.855:mrcp_process_events:event:SPEAK defered
*Apr 17 16:34:07.855:mrcp_process_events:event:LIB_CONNECT RECOGNIZERCONN-STATUS=0
*Apr 17 16:34:07.855:mrcp_process_events:event:DEFINE_GRAMMAR RECOGNIZER
*Apr 17 16:34:07.855:mrcp_process_events:event:DEFINE_GRAMMAR defered
*Apr 17 16:34:07.855:mrcp_process_events:event:LIB_CONNECT RECOGNIZERCONN-STATUS=0
*Apr 17 16:34:07.855:mrcp_process_events:event:RECOGNIZE RECOGNIZER
*Apr 17 16:34:07.855:mrcp_process_events:event:RECOGNIZE defered
*Apr 17 16:34:07.855:mrcp_response_handler:status=RTSPLIB_STATUS_SERVER_CONNECTED
*Apr 17 16:34:07.855:mrcp_process_events:event:LIB_CONNECTED SYNTHESIZERCONN-STATUS=4
*Apr 17 16:34:07.947:mrcp_response_handler:status=RTSPLIB_STATUS_RTP_RECORD_SETUP
The following example shows output from the debug mrcp state command:
Router# debug mrcp state
The following lines show the gateway connecting to the TTS server:
*Apr 17 16:35:25.145: curr[CONNECT_IDLE] ev-id[LIB_CONNECT]
next[CONNECTING] action=610B8FD00
*Apr 17 16:35:25.145:act_idle_libconnect
*Apr 17 16:35:25.145:mrcp_shortcut_connection_fsm
*Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:25.149: curr[CONNECTING] ev-id[LIB_CONNECT_PENDING]
next[CONNECTING] action=610B90F80
*Apr 17 16:35:25.149:act_connecting_libpending
*Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:25.149: curr[CONNECTING] ev-id[LIB_CONNECT]
next[CONNECTING] action=610B8D480
*Apr 17 16:35:25.149:act_connectfsm_error
*Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER
The following lines show the gateway successfully connected to the TTS server:
next[CONNECTING] action=610B8D480
*Apr 17 16:35:25.149:act_connectfsm_error
*Apr 17 16:35:25.149:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:25.149: curr[CONNECTING] ev-id[LIB_CONNECTED]
next[CONNECTED] action=610B913C0
*Apr 17 16:35:25.149:act_connecting_libconnected
*Apr 17 16:35:25.149:act_rtpsetupfsm_libdescribed
*Apr 17 16:35:25.237:mrcp_fsm_execute:type=RESOURCE_NONE
*Apr 17 16:35:25.237: curr[RTP_IDLE] ev-id[RECOG_RTP_SETUP]
next[RTP_RECOG_SETUP_DONE] action=610B94F40
*Apr 17 16:35:25.237:act_idle_recog_rtpsetup
*Apr 17 16:35:25.237:mrcp_fsm_execute:type=RECOGNIZER
*Apr 17 16:35:25.237: curr[RECOG_IDLE] ev-id[DEFINE_GRAMMAR]
next[RECOG_IDLE] action=610B99340
*Apr 17 16:35:25.237:act_idle_define_grammar:
*Apr 17 16:35:25.237:hash_add: key=31
*Apr 17 16:35:25.237:mrcp_fsm_execute:type=RECOGNIZER
*Apr 17 16:35:25.237: curr[RECOG_IDLE] ev-id[RECOGNIZE]
next[RECOG_ASSOCIATING] action=610B98400
*Apr 17 16:35:25.237:act_idle_recognize:
*Apr 17 16:35:25.245:mrcp_fsm_execute:type=RECOGNIZER
*Apr 17 16:35:25.245: curr[RECOG_ASSOCIATING] ev-id[RECOGNIZER_ASSOCIATED]
next[RECOGNIZING] action=610B9AB40
*Apr 17 16:35:25.245:act_associating_recognizer_associated:
*Apr 17 16:35:25.249:hash_add: key=32
*Apr 17 16:35:25.249:mrcp_fsm_execute:type=RESOURCE_NONE
*Apr 17 16:35:25.249: curr[RTP_IDLE] ev-id[SYNTH_RTP_SETUP]
next[RTP_SYNTH_SETUP_DONE] action=610B93D40
*Apr 17 16:35:25.249:act_idle_synth_rtpsetup
*Apr 17 16:35:25.249:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:25.249: curr[SYNTH_IDLE] ev-id[SPEAK]
next[SYNTH_ASSOCIATING] action=610BA5540
*Apr 17 16:35:25.249:act_idle_speak
*Apr 17 16:35:25.249:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:25.249: curr[SYNTH_ASSOCIATING] ev-id[SYNTHESIZER_ASSOCIATED]
The following lines show the TTS server performing speech synthesis:
next[SPEAKING] action=610BA7B40
*Apr 17 16:35:25.249:act_associating_speak_associated
*Apr 17 16:35:25.249:hash_add: key=30
*Apr 17 16:35:25.285:hash_get: key=31
*Apr 17 16:35:25.285:hash_delete: key=31
*Apr 17 16:35:25.293:hash_get: key=32
*Apr 17 16:35:25.293:hash_get: key=30
*Apr 17 16:35:32.805:hash_get: key=30
*Apr 17 16:35:32.805:hash_delete: key=30
*Apr 17 16:35:32.805:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:32.805: curr[SPEAKING] ev-id[SPEECH_COMPLETE]
next[SYNTH_IDLE] action=610BAA680
*Apr 17 16:35:32.805:act_speaking_speech_complete
*Apr 17 16:35:32.809:hash_get: key=32
*Apr 17 16:35:32.809:mrcp_fsm_execute:type=RECOGNIZER
*Apr 17 16:35:32.809: curr[RECOGNIZING] ev-id[START_OF_SPEECH]
next[RECOGNIZING] action=610B9F3C0
*Apr 17 16:35:32.809:act_recognizing_start_of_speech
*Apr 17 16:35:33.781:hash_get: key=32
*Apr 17 16:35:33.781:hash_delete: key=32
*Apr 17 16:35:33.781:mrcp_fsm_execute:type=RECOGNIZER
*Apr 17 16:35:33.781: curr[RECOGNIZING] ev-id[RECOGNITION_COMPLETE]
next[RECOGNIZED] action=610B9D240
*Apr 17 16:35:33.781:act_recognizing_recognition_complete:
*Apr 17 16:35:33.789:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:33.789: curr[SYNTH_IDLE] ev-id[SPEAK]
next[SYNTH_ASSOCIATING] action=610BA5540
*Apr 17 16:35:33.789:act_idle_speak
*Apr 17 16:35:33.793:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:33.793: curr[SYNTH_ASSOCIATING] ev-id[SYNTHESIZER_ASSOCIATED]
next[SPEAKING] action=610BA7B40
*Apr 17 16:35:33.793:act_associating_speak_associated
*Apr 17 16:35:33.793:hash_add: key=34
*Apr 17 16:35:33.949:hash_get: key=34
*Apr 17 16:35:37.221:hash_get: key=34
*Apr 17 16:35:37.221:hash_delete: key=34
*Apr 17 16:35:37.221:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:37.221: curr[SPEAKING] ev-id[SPEECH_COMPLETE]
next[SYNTH_IDLE] action=610BAA680
*Apr 17 16:35:37.221:act_speaking_speech_complete
*Apr 17 16:35:37.245:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:37.249: curr[CONNECTED] ev-id[LIB_DESTROY]
next[CONNECTED] action=610B8DD00
*Apr 17 16:35:37.249:act_connected_libdestroy
*Apr 17 16:35:37.249:mrcp_fsm_execute:type=SYNTHESIZER
*Apr 17 16:35:37.249: curr[CONNECTED] ev-id[LIB_DESTROY]
next[CONNECTED] action=610B8DD00
*Apr 17 16:35:37.249:act_connected_libdestroy
Examples The following is sample output from the debug mspi receive command:
Router# debug mspi receive
Examples The following is sample output from the debug mspi send command:
Router# debug mspi send
Examples The following example shows the messages exchanged (for example, the handshake) between the e-mail
server and the off-ramp gateway:
Router# debug mta receive all
Examples The following example shows the messages exchanged (for example, the handshake) between the e-mail
server and the on-ramp gateway:
Router# debug mta send all
Examples The following example shows debugging information displayed when the debug mta send rcpt-to
command has been enabled and the SMTP client is sending an e-mail message:
Router# debug mta send rcpt-to 5551212
Usage Guidelines The debug mwi relay errors command provides a debug monitor display of any error messages, when
MWI Relay Server (Cisco IOS Telephony Server) is trying to do MWI Relay to extensions on remote
Cisco IOS Telephony Service (ITS).
Examples The following examples show errors when MWI Relay Server tries to do an MWI Relay to extension
7004, but location of 7004 is not known to the MWI Relay Server:
Router# debug mwi relay errors
Usage Guidelines The debug mwi relay events command provides a debug monitor display of events, when MWI Relay
Server (Cisco IOS Telephony Server) is trying to do MWI Relay to extensions on remote Cisco IOS
Telephony Services (ITS).
Examples The following debugging messages are shown when the MWI Relay server tries to send MWI
Information to remote client 7001 and the location of 7001 is known by the MWI Relay Server:
Router# debug mwi relay events
Syntax Description error (Optional) Displays the error situation for each circuit.
event (Optional) Displays the packets received and sent for each circuit.
flow-control (Optional) Displays the flow control information for each circuit.
state (Optional) Displays the state changes for each circuit.
Usage Guidelines NCIA is an architecture developed by Cisco for accessing Systems Network Architecture (SNA)
applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP
backbones.
You cannot enable debugging output for a particular client or particular circuit.
Caution Do not enable the debug ncia circuit command during normal operation because this command
generates a substantial amount of output messages and could slow down the router.
Examples The following is sample output from the debug ncia circuit error command. In this example, the
possible errors are displayed. The first error message indicates that the router is out of memory. The
second message indicates that the router has an invalid circuit control block. The third message indicates
that the router is out of memory. The remaining messages identify errors related to the finite state
machine.
Router# debug ncia circuit error
The following is sample output from the debug ncia circuit event command. In this example, a session
startup sequence is displayed.
Router# debug ncia circuit event
Field Description
IN Incoming message from client.
OUT Outgoing message to client.
Ver_Id NDLC version ID.
MsgType NDLC message type.
Len NDLC message length.
tmac Target MAC.
tsap Target SAP.
csap Client SAP.
oid Origin ID.
tid Target ID.
lfs Largest frame size flag.
ws Window size.
saddr Source MAC address.
ssap Source SAP.
daddr Destination MAC address.
dsap Destination SAP.
sid Session ID.
FC Flow control flag.
In the following messages, an NDLC_START_DL messages is received from a client to start a data-link
session:
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_START_DL, Len: 24, tmac: 4000.1060.1000,
tsap: 4, csap 8, oid: 8A91E8, tid 0, lfs 16, ws 1
NCIA: create circuit: saddr 4000.1060.1000, ssap 4, daddr 4000.3000.0003, dsap 8 sid:
8B09A8
The next two messages indicate that an NDLC_DL_STARTED message is sent to a client. The server
informs the client that a data-the link session is started.
NCIA: send NDLC_DL_STARTED to client 10.2.20.3 for ckt: 8B09A8
NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_DL_STARTED, Len: 2,4 tmac: 4000.1060.1000,
tsap: 4, csap 8, oid: 8A91E8, tid 8B09A8, lfs 16, ws 1
In the following two messages, an NDLC_XID_FRAME message is received from a client, and the client
starts an XID exchange:
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8B09A8, FC 0x81
NCIA: send NDLC_XID_FRAME to client 10.2.20.3 for ckt: 8B09A8
In the following two messages, an NDLC_XID_FRAME message is sent from a client, and an
DLC_XID_FRAME message is received from a client:
NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8A91E8, FC 0xC1
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 18, sid: 8B09A8, FC 0xC1
The next two messages show that an NDLC_CONTACT_STN message is sent to a client:
NCIA: send NDLC_CONTACT_STN to client 10.2.20.3 for ckt: 8B09A8
NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_CONTACT_STN, Len: 12, sid: 8A91E8, FC 0xC1
In the following message, an NDLC_STN_CONTACTED message is received from a client. The client
informs the server that the station has been contacted.
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_STN_CONTACTED, Len: 12, sid: 8B09A8, FC 0xC1
In the last two messages, an NDLC_INFO_FRAME is sent to a client, and the server sends data to the
client:
NCIA: send NDLC_INFO_FRAME to client 10.2.20.3 for ckt: 8B09A8
NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_INFO_FRAME, Len: 30, sid: 8A91E8, FC 0xC1
The following is sample output from the debug ncia circuit flow-control command. In this example,
the flow control in a session startup sequence is displayed:
Router# debug ncia circuit flow-control
Field Description
IW Initial window size.
GP Granted packet number.
CW Current window size.
The following is sample output from the debug ncia circuit state command. In this example, a session
startup sequence is displayed:
Router# debug ncia circuit state
Field Description
WAN Event from WAN (client).
DLU Event from upstream module—dependent logical unit (DLU).
ADMIN Administrative event.
TIMER Timer event.
debug ncia client [ip-address | error [ip-address] | event [ip-address] | message [ip-address]]
no debug ncia client [ip-address | error [ip-address] | event [ip-address] | message [ip-address]]
Usage Guidelines NCIA is an architecture developed by Cisco for accessing Systems Network Architecture (SNA)
applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP
backbones.
Use the debug ncia client error command to see only certain error conditions that occur.
Use the debug ncia client event command to determine the sequences of activities that occur while an
NCIA client is in different processing states.
Use the debug ncia client message command to see only the first 32 bytes of data in a TCP packet sent
to or received from an NCIA client.
The debug ncia client command can be used in conjunction with the debug ncia server and debug ncia
circuit commands to get a complete picture of NCIA activity.
Examples The following is sample output from the debug ncia circuit command. Following the example is a
description of each sample output message.
Router# debug ncia client
NCIA: Rcvd msg type NDLC_PEER_TEST_REQ in tcp packet for client 10.2.20.123
NCIA: First 4 byte of data rcvd: 811D0004
NCIA: event KEEPALIVE_RCVD, state NCIA_OPENED for client 10.2.20.123
NCIA: Sent msg type NDLC_PEER_TEST_RSP in tcp packet to client 10.2.20.123
NCIA: First 4 byte of data sent: 811E0004IA
NCIA: Error, event PASIVE_OPEN, state NCIA_OPENED, for client 10.2.20.123, should not have
occurred.
NCIA: Error, active_open for pre_client_fsm while client 10.2.20.123 is active or not
configured, registered.
Messages in lines 1 through 12 show the events that occur when a client connects to the router (the NCIA
server). These messages show a passive_open process.
Messages in lines 13 to 17 show the events that occur when a TIME_OUT event is detected by a client
PC workstation. The workstation sends an NDLC_PEER_TEST_REQ message to the NCIA server, and
the router responds with an NDLC_PEER_TEST_RSP message.
Messages in lines 18 to 23 show the events that occur when a TIME_OUT event is detected by the router
(the NCIA server). The router sends an NDLC_PEER_TEST_REQ message to the client PC
workstation, and the PC responds with an NDLC_PEER_TEST_RSP message.
When you use the debug ncia client message command, the messages shown on lines 6, 8, 11, 14, 17,
20, and 22 are output in addition to other messages not shown in this example.
When you use the debug ncia client error command, the messages shown on lines 24 and 25 are output
in addition to other messages not shown in this example.
Usage Guidelines NCIA is an architecture developed by Cisco for accessing Systems Network Architecture (SNA)
applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP
backbones.
The debug ncia server command displays all Cisco Link Services (CLS) messages between the NCIA
server and its upstream modules, such as data-link switching (DLSw) and downstream physical units
(DSPUs). Use this command when a problem exists between the NCIA server and other software
modules within the router.
You cannot enable debugging output for a particular client or particular circuit.
Examples The following is sample output from the debug ncia server command. In this example, a session startup
sequence is displayed. Following the example is a description of each group of sample output messages.
Router# debug ncia server
In the following messages, the client is sending a test message to the host and the test message is received
by the host:
NCIA: send CLS_TEST_STN_IND to DLU
NCIA: Receive TestStn.Rsp
In the next message, the server is sending an exchange identification (XID) message to the host:
NCIA: send CLS_ID_STN_IND to DLU
In the next two messages, the host opens the station and the server responds:
NCIA: Receive ReqOpnStn.Req
NCIA: send CLS_REQ_OPNSTN_CNF to DLU
In the following two messages, the client is performing an XID exchange with the host:
NCIA: Receive Id.Rsp
NCIA: send CLS_ID_IND to DLU
In the next group of messages, the host attempts to establish a session with the client:
NCIA: Receive Connect.Req
NCIA: send CLS_CONNECT_CNF to DLU
NCIA: Receive Flow.Req
In the next two messages, the host sends data to the client:
NCIA: Receive Data.Req
NCIA: send CLS_DATA_IND to DLU
Usage Guidelines For complete information on the NetBIOS process, use the debug netbios packet command along with
the debug netbios error command.
Examples The following is sample output from the debug netbios error command. This example shows that an
illegal packet has been received on the asynchronous interface.
Router# debug netbios error
debug netbios-name-cache
To display name caching activities on a router, use the debug netbios-name-cache command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug netbios-name-cache
no debug netbios-name-cache
Usage Guidelines Examine the display to diagnose problems in Network Basic Input/Output System (NetBIOS) name
caching.
Examples The following is sample output from the debug netbios-name-cache command:
Router# debug netbios-name-cache
Note The sample display is a composite output. Debugging output that you actually see would not necessarily
occur in this sequence.
Field Description
NETBIOS NetBIOS name caching debugging output.
L, U L means lookup; U means update.
addr=1000.4444.5555 MAC address of machine being looked up in NetBIOS name cache.
Field Description
idb=TR1 Indicates that the name of machine was learned from Token Ring
interface number 1; idb is into interface data block.
vrn=0 Packet comes from virtual ring number 0. This packet actually comes
from a real Token Ring interface, because virtual ring number 0 is not
valid.
type=1 Indicates the way that the router learned about the specified machine.
The possible values are as follows:
• 1—Learned from traffic
• 2—Learned from a remote peer
• 4—Statically entered via the configuration of the router
With the first line of output, the router declares that it has examined the NetBIOS name cache table for
the machine name ORINDA and that the packet that prompted the lookup came from virtual ring 0. In
this case, this packet comes from a real interface—virtual ring number 0 is not valid.
NETBIOS: L checking name ORINDA, vrn=0
The following two lines indicate that an invalid NetBIOS entry exists and that the corrupted memory was
detected. The invalid memory will be removed from the table; no action is needed.
NetBIOS name cache table corrupted at offset 13
NetBIOS name cache table corrupted at later offset, at location 13
The following line indicates that the router attempted to check the NetBIOS cache table for the name
ORINDA with MAC address 1000.4444.5555. This name was obtained from Token Ring interface 1. The
type field indicates that the name was learned from traffic.
NETBIOS: U chk name=ORINDA, addr=1000.4444.5555, idb=TR1, vrn=0, type=1
The following line indicates that the NetBIOS name ORINDA is in the name cache table and was
updated to the current value:
NETBIOS: U upd name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1
The following line indicates that the NetBIOS name ORINDA is not in the table and must be added to
the table:
NETBIOS: U add name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1
The following line indicates that there was insufficient cache buffer space when the router tried to add
this name:
NETBIOS: U no memory to add cache entry. name=ORINDA,addr=1000.4444.5555
The following line indicates that the NetBIOS ager detects an invalid memory in the cache. The router
clears the entry; no action is needed.
NETBIOS: Invalid structure detected in netbios_name_cache_ager
The following line indicates that the entry for ORINDA was flushed from the cache table:
NETBIOS: flushed name=ORINDA, addr=1000.4444.5555
The following line indicates that the entry for ORINDA timed out and was flushed from the cache table:
NETBIOS: expired name=ORINDA, addr=1000.4444.5555
The following line indicates that the router removed the ORINDA entry from its cache table:
NETBIOS: removing entry. name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0
The following line indicates that the router discarded a NetBIOS packet of type ADD_NAME, STATUS,
NAME_QUERY, or ADD_GROUP. These packets are discarded when multiple copies of one of these
packet types are detected during a certain period of time.
NETBIOS: Tossing ADD_NAME/STATUS/NAME/ADD_GROUP frame
The following line indicates that the system could not find a NetBIOS name in the cache:
NETBIOS: Lookup Failed -- not in cache
The following line indicates that the system found the destination NetBIOS name in the cache, but
located on the same ring from which the packet came. The router will drop this packet because the packet
should not leave this ring.
NETBIOS: Lookup Worked, but split horizon failed
The following line indicates that the system found the NetBIOS name in the cache, but the router could
not find the corresponding RIF. The packet will be sent as a broadcast frame.
NETBIOS: Could not find RIF entry
The following line indicates that no buffer was available to create a NetBIOS name cache proxy. A proxy
will not be created for the packet, which will be forwarded as a broadcast frame.
NETBIOS: Cannot duplicate packet in netbios_name_cache_proxy
Usage Guidelines For complete information on the NetBIOS process, use the debug netbios error command along with
the debug netbios packet command.
Examples The following is sample output from the debug netbios packet and debug netbios error commands.
This example shows the Logical Link Control (LLC) header for an asynchronous interface followed by
the NetBIOS information. For additional information on the NetBIOS fields, refer to IBM LAN Technical
Reference IEEE 802.2.
Router# debug netbios packet
debug ntp
To display debugging messages for Network Time Protocol (NTP) features, use the debug ntp
command. To disable debugging output, use the no form of this command.
debug ntp {adjust | authentication | events | loopfilter | packets | params | refclock | select | sync
| validity}
no debug ntp {adjust | authentication | events | loopfilter | packets | params | refclock | select |
sync | validity}
debug oam
To display operation and maintenance (OAM) events, use the debug oam command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug oam
no debug oam
Examples The following is sample output from the debug oam command:
Router# debug oam
Field Description
0000 Virtual circuit designator (VCD) Special OAM indicator.
0300 Descriptor MODE bits for the ATM Interface Processor (AIP).
0 GFC (4 bits).
07 Virtual path identifier (VPI) (8 bits).
0007 Virtual channel identifier (VCI )(16 bits).
A Payload type field (PTI) (4 bits).
00 Header Error Correction (8 bits).
1 OAM Fault mangement cell (4 bits).
8 OAM LOOPBACK indicator (4 bits).
01 Loopback indicator value, always 1 (8 bits).
00000005 Loopback unique ID, sequence number (32 bits).
FF6A Fs and 6A required in the remaining cell, per UNI3.0.
debug packet
To display per-packet debugging output, use the debug packet command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
Usage Guidelines The debug packet command displays all process-level packets for both outbound and inbound packets.
This command is useful for determining whether packets are being received and sent correctly. The
output reports information online when a packet is received or a transmission is attempted.
For sent packets, the information is displayed only after the protocol data unit (PDU) is entirely
encapsulated and a next hop VC is found. If information is not displayed, the address translation
probably failed during encapsulation. When a next hop VC is found, the packet is displayed exactly as
it will be presented on the wire. Having a display indicates that the packets are properly encapsulated
for transmission.
For received packets, information is displayed for all incoming frames. The display can show whether
the sending station properly encapsulates the frames. Because all incoming frames are displayed, this
information is useful when performing back-to-back testing and corrupted frames cannot be dropped by
an intermediary switch.
The debug packet command also displays the initial bytes of the actual PDU in hexadecimal. This
information can be decoded only by qualified support or engineering personnel.
Caution Because the debug packet command generates a substantial amount of output for every packet
processed, use it only when traffic on the network is low so other activity on the system is not adversely
affected.
Examples The following is sample output from the debug packet command:
Router# debug packet
Field Description
2/0.5 Indicates the subinterface that generated this packet.
(I) Indicates a receive packet. (O) indicates an output packet.
VCD: 0xn Indicates the virtual circuit associated with this packet, where n is some value.
DM: 0xnnnn Indicates the descriptor mode bits on output only, where nnnn is a
hexadecimal value.
TYPE:n Displays the encapsulation type for this packet.
Length:n Displays the total length of the packet including the headers.
The following two lines of output are the binary data, which are the contents of the protocol data unit
(PDU) before encapsulation:
4500 002E 0000 0000 0209 92ED 836C A26E FFFF FFFF 1108 006D 0001 0000 0000
A5CC 6CA2 0000 000A 0000 6411 76FF 0100 6C08 00FF FFFF 0003 E805 DCFF 0105
Field Description
Ethernet0 Name of the Ethernet interface that received the packet.
Unknown Network could not classify this packet. Examples include packets with unknown
link types.
ARPA Packet uses ARPA-style encapsulation. Possible encapsulation styles vary
depending on the media command mode (MCM) and encapsulation style.
Ethernet (MCM)—Encapsulation Style:
• ARP
• ETHERTALK
• ISO1
• ISO3
• LLC2
• NOVELL-ETHER
• SNAP
FDDI (MCM)—Encapsulation Style:
• ISO1
• ISO3
• LLC2
• SNAP
Frame Relay—Encapsulation Style:
• BRIDGE
• FRAME-RELAY
Field Description
ARPA Serial (MCM)—Encapsulation Style:
(continued)
• BFEX25
• BRIDGE
• DDN-X25
• DDNX25-DCE
• ETHERTALK
• FRAME-RELAY
• HDLC
• HDH
• LAPB
• LAPBDCE
• MULTI-LAPB
• PPP
• SDLC-PRIMARY
• SDLC-SECONDARY
• SLIP
• SMDS
• STUN
• X25
• X25-DCE
Token Ring (MCM)—Encapsulation Style:
• 3COM-TR
• ISO1
• ISO3
• MAC
• LLC2
• NOVELL-TR
• SNAP
• VINES-TR
src 0000.0c00.6fa4 MAC address of the node generating the packet.
dst.ffff.ffff.ffff MAC address of the destination node for the packet.
type 0x0a0 Packet type.
data... First 12 bytes of the datagram following the MAC header.
len 60 Length of the message (in bytes) that the interface received from the wire.
size 64 Length of the message (in bytes) that the interface received from the wire.
Equivalent to the len field.
Field Description
flags 0x0F00 HDLC or PP flags field.
DLCI 7a The DLCI number on Frame Relay.
compressed TCP/IP TCP header compression is enabled on an interface and the packet is not HDLC
packet dropped or X25.
debug pad
To display debugging messages for all packet assembler/disassembler (PAD) connections, use the debug
pad command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug pad
no debug pad
Examples Use the debug pad command to gather information to forward to the Cisco Technical Assistance Center
(TAC) to assist in troubleshooting a problem that involves PAD connections.
The following example shows output of the debug pad and debug x25 event commands for an incoming
PAD call destined for a terminal line. The incoming PAD call is rejected by the terminal line because the
selected network closed user group (CUG) has not been subscribed to by the caller:
Router# debug pad
Router# debug x25 event
The following example shows the output of the debug pad command for an outgoing PAD call initiated
from a terminal line with a subscribed CUG that bars outgoing access:
!PAD130:Outgoing Call packet, Closed User Group - CUG service validation, selected CUG
!bars outgoing access
PAD130:Closing connection to . In 0/0, out 0/0
Usage Guidelines The debug piafs events command provides debugging information for the PIAFS calls on the router,
including the inband negotiation process.
Examples The debug piafs events command was configured to provide the following information for PIAFS calls:
Router# debug piafs events
Field Description
RX <- CDAPI :cdapi_route_call Request The call distributor application programming
interface (CDAPI) in the router receives an
ISDN call request from the switch.
RX <- CDAPI :CDAPI_MSG_CONNECT_IND The CDAPI in the router receives a connection
indicator message from the switch.
TX -> CDAPI The CDAPI in the router transmits an alert
:CDAPI_MSG_SUBTYPE_ALERT_REQ request to the switch.
TX -> CDAPI :CDAPI_MSG_CONNECT_RESP The CDAPI in the router transmits a connect
response message to the switch.
TX -> CDAPI The CDAPI in the router transmits a connection
:CDAPI_MSG_CONN_ACTIVE_REQ active request to the switch.
RX <-CDAPI:CDAPI_MSG_CONN_ACTIVE_IND The CDAPI in the router receives a connection
active indicator from the switch.
Enabling QMC in PIAFS mode for B1 QMC (global multichannel parameters) are
being enabled in PIAFS mode for the B1
channel.
piafs_driver_enable_settings() The PIAFS driver is enabling the settings.
Starting 64 kbps PIAFS Incoming The speed of the transmission in kbps. In this
case, the speed is 64 kbps.
RX <- NEGO_SYNC_REQUEST[GSN: RSN: The router receives a PIAFS negotiation
CRSN: SISN:] synchronization request frame from the peer
PIAFS device. The frame contains the
following: general sequence number (GSN),
reception sequence number (RSN),
confirmation response sequence number
(CRSN), and synchronization initiation
sequence number (SISN).
Updating conf resp num The confirmation response number is being
updated.
TX -> NEGO_SYNC_RECEPTION[GSN: RSN: The router transmits a PIAFS negotiation
CRSN: SISN: ] synchronization reception message to the peer
PIAFS device. The message includes the GSN,
RSN, CRSN, and SISN.
RX <- CONTROL_REQUEST The router receives a PIAFS control request
frame that includes communication parameters.
Rx Parameters The communication parameters are as follows.
Data Protocol The version of the data protocol.
Control Protocol The version of the control protocol.
RTF value Round-trip frame value.
Compression The compression standard.
Frame Length The length of the frame, in bytes.
Frame Number The number of packets per frame.
Field Description
TX -> CONTROL_RECEPTION The router transmits a PIAFS control reception
frame.
ACKed all the Rx control parameters The control reception frame acknowledges all
the communication parameters that were
received from the peer.
Piafs layer up & Main FSM set to DATA The PIAFS protocol is active on the router. The
router is ready to receive data from the peer
device.
Compression v42bis enabled The compression protocol v42bis is enabled.
V42BIS:v42bis_init() The v42bis compression protocol has been
initiated.
V42BIS:Negotiated Values for P1, P2 are - 4096 , In this example, P1 is the total count of encoded
250 words when v42bis compression is enabled. P2
is the maximum letter line length for the V42bis
compression.
Incoming call invoking ISDN_CALL_CONNECT An incoming ISDN call connection message is
received.
PPP The PPP layer on the router becomes active and
starts to process the PPP frame from the peer
PIAFS device.
debug pots
To display information on the telephone interfaces, use the debug pots command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
Usage Guidelines The debug pots command displays driver and CSM debug information for telephone ports 1 and 2.
Examples The following is a sample display from the debug pots driver 1 command. This sample display indicates
that the telephone port driver is not receiving caller ID information from the ISDN line. Therefore, the
analog caller ID device attached to the telephone port does not display caller ID information.
Router# debug pots driver 1
The following is sample display from the debug pots csm 1 command. This sample display indicates
that a dial peer contains an invalid destination pattern (555-1111).
Router# debug pots csm 1
Examples To see debugging messages, enter the logging console global configuration mode command as follows:
Router(config)# logging console
Router(config)# exit
Debugging messages are displayed in one of two formats that are relevant to the POTS dial feature:
hh:mm:ss: CSM_STATE: CSM_EVENT, call id = ??, port = ?
or
hh:mm:ss: EVENT_FROM_ISDN:dchan_idb=0x???????, call_id=0x????, ces=? bchan=0x????????,
event=0x?, cause=0x??
Table 197 shows the values for events that are translated into CSM events.
Hexadecimal
Value Event CSM Event
0x0 DEV_IDLE CSM_EVENT_ISDN_DISCONNECTED
0x1 DEV_INCALL CSM_EVENT_ISDN_CALL
0x2 DEV_SETUP_ACK CSM_EVENT_ISDN_SETUP_ACK
0x3 DEV_CALL_PROC CSM_EVENT_ISDN_PROC
0x4 DEV_CONNECTED CSM_EVENT_ISDN_CONNECTED
0x5 DEV_CALL_PROGRESSING CSM_EVENT_ISDN_CALL_PROGRESSING
0x6 DEV_HOLD_ACK CSM_EVENT_ISDN_HARD_HOLD
0x7 DEV_HOLD_REJECT CSM_EVENT_ISDN_HARD_HOLD_REJ
Hexadecimal
Value Event CSM Event
0x8 DEV_CHOLD_ACK CSM_EVENT_ISDN_CHOLD
0x9 DEV_CHOLD_REJECT CSM_EVENT_ISDN_CHOLD_REJ
0xa DEV_RETRIEVE_ACK CSM_EVENT_ISDN_RETRIEVED
0xb DEV_RETRIEVE_REJECT CSM_EVENT_ISDN_RETRIEVE_REJ
0xc DEV_CONFR_ACK CSM_EVENT_ISDN_CONFERENCE
0xd DEV_CONFR_REJECT CSM_EVENT_ISDN_CONFERENCE_REJ
0xe DEV_TRANS_ACK CSM_EVENT_ISDN_TRANSFERRED
0xf DEV_TRANS_REJECT CSM_EVENT_ISDN_TRANSFER_REJ
Table 198 shows cause values that are assigned only to call-progressing events.
Examples This section provides debug output examples for three call scenarios, displaying the sequence of events
that occur during a POTS dial call or POTS disconnect call.
Call Scenario 1
In this example call scenario, port 1 is on the hook, the application dial is set to call 4085552221, and
the far-end successfully connects.
Router# debug pots csm
Router#
The following output shows an event indicating that port 1 is being used by the dial application:
01:58:27: CSM_PROC_IDLE: CSM_EVENT_VDEV_APPLICATION_CALL, call id = 0x0, port = 1
The following output shows events indicating that the CSM is receiving the application digits of the
number to dial:
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:58:27: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
The following output shows that the telephone connected to port 1 is off the hook:
01:58:39: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_OFFHOOK, call id = 0x0, port = 1
The following output shows a call-proceeding event pair indicating that the router ISDN software has
sent the dialed digits to the ISDN switch:
01:58:40: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0x0,
event=0x3, cause=0x0
01:58:40: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_PROC, call id =
0x8004, port = 1
The following output shows the call-progressing event pair indicating that the telephone at the far end is
ringing:
01:58:40: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF,
event=0x5, cause=0x0
01:58:40: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_CALL_PROGRESSING, call id = 0x8004, port
= 1
The following output shows a call-connecting event pair indicating that the telephone at the far end has
answered:
01:58:48: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF,
event=0x4, cause=0x0
01:58:48: CSM_PROC_CONNECTING: CSM_EVENT_ISDN_CONNECTED, call id = 0x8004, port = 1
The following output shows a call-progressing event pair indicating that the telephone at the far end has
hung up and that the calling telephone is receiving an in-band tone from the ISDN switch:
01:58:55: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF,
event=0x5, cause=0x10
01:58:55: CSM_PROC_CONNECTED: CSM_EVENT_ISDN_CALL_PROGRESSING, call id = 0x8004, port = 1
The following output shows that the telephone connected to port 1 has hung up:
01:58:57: CSM_PROC_CONNECTED: CSM_EVENT_VDEV_ONHOOK, call id = 0x8004, port = 1
The following output shows an event pair indicating that the call has been terminated:
01:58:57: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8004, ces=0x1 bchan=0xFFFFFFFF,
event=0x0, cause=0x0
01:58:57: CSM_PROC_NEAR_END_DISCONNECT: CSM_EVENT_ISDN_DISCONNECTED, call id = 0x8004,
port = 1
813_local#
Call Scenario 2
In this example scenario, port 1 is on the hook, the application dial is set to call 4085552221, and the
destination number is busy.
Router# debug pots csm
Router#
The following output shows that port 1 is used by the dial application:
01:59:42: CSM_PROC_IDLE: CSM_EVENT_VDEV_APPLICATION_CALL, call id = 0x0, port = 1
The following output shows the events indicating that the CSM is receiving the application digits of the
number to call:
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
01:59:42: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
The following output shows an event indicating that the telephone connected to port 1 is off the hook:
01:59:52: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_OFFHOOK, call id = 0x0, port = 1
The following output shows a call-proceeding event pair indicating that the telephone at the far end is
busy:
01:59:52: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8005, ces=0x1 bchan=0x0,
event=0x3, cause=0x11
01:59:52: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_PROC, call id = 0x8005, port = 1
The following output shows a call-progressing event pair indicating that the calling telephone is
receiving an in-band busy tone from the ISDN switch:
01:59:58: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8005, ces=0x1 bchan=0xFFFFFFFF,
event=0x5, cause=0x0
01:59:58: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_ISDN_CALL_PROGRESSING, call id = 0x8005, port
= 1
The following output shows an event indicating that the calling telephone has hung up:
02:00:05: CSM_PROC_ENBLOC_DIALING: CSM_EVENT_VDEV_ONHOOK, call id = 0x8005, port = 1
The following output shows an event pair indicating that the call has been terminated:
02:00:05: EVENT_FROM_ISDN:dchan_idb=0x280AF38, call_id=0x8005, ces=0x1 bchan=0xFFFFFFFF,
event=0x0, cause=0x0
02:00:05: CSM_PROC_NEAR_END_DISCONNECT: CSM_EVENT_ISDN_DISCONNECTED, call id = 0x8005,
port = 1
Call Scenario 3
In this example call scenario, port 1 is on the hook, the application dial is set to call 4086661112, the far
end successfully connects, and the command test pots disconnect terminates the call:
Router# debug pots csm
Router#
The following output follows the same sequence of events as shown in Call Scenario 1:
1d03h: CSM_PROC_IDLE: CSM_EVENT_VDEV_APPLICATION_CALL, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
1d03h: CSM_PROC_APPLIC_DIALING: CSM_EVENT_VDEV_DIGIT, call id = 0x0, port = 1
The test pots disconnect command disconnects the call before you physically need to put the telephone
back on the hook:
1d03h: CSM_PROC_CONNECTING: CSM_EVENT_VDEV_APPLICATION_HANGUP_CALL, call id = 0x8039,
port = 1
1d03h: EVENT_FROM_ISDN:dchan_idb=0x2821F38, call_id=0x8039, ces=0x1
bchan=0xFFFFFFFF, event=0x0, cause=0x0
debug ppp
To display information on traffic and exchanges in an internetwork implementing the Point-to-Point
Protocol (PPP), use the debug ppp command in privileged EXEC mode. To disable debugging output,
use the no form of this command.
Syntax Description packet Displays PPP packets being sent and received. (This command displays low-level
packet dumps.)
negotiation Displays PPP packets sent during PPP startup, where PPP options are negotiated.
error Displays protocol errors and error statistics associated with PPP connection
negotiation and operation.
authentication Displays authentication protocol messages, including Challenge Authentication
Protocol (CHAP) packet exchanges and Password Authentication Protocol (PAP)
exchanges.
compression Displays information specific to the exchange of PPP connections using Microsoft
Point-to-Point Compression (MPPC). This command is useful for obtaining
incorrect packet sequence number information where MPPC compression is
enabled.
cbcp Displays protocol errors and statistics associated with PPP connection
negotiations using Microsoft Callback (MSCB).
Usage Guidelines Use the debug ppp command when trying to find the following:
• The Network Control Protocols (NCPs) that are supported on either end of a PPP connection
• Any loops that might exist in a PPP internetwork
• Nodes that are (or are not) properly negotiating PPP connections
• Errors that have occurred over the PPP connection
• Causes for CHAP session failures
• Causes for PAP session failures
• Information specific to the exchange of PPP connections using the Callback Control Protocol
(CBCP), used by Microsoft clients
• Incorrect packet sequence number information where MPPC compression is enabled
Refer to Internet RFCs 1331, 1332, and 1333 for details concerning PPP-related nomenclature and
protocol information.
Caution The debug ppp compression command is CPU-intensive and should be used with caution. This
command should be disabled immediately after debugging.
Examples The following is sample output from the debug ppp packet command as seen from the Link Quality
Monitor (LQM) side of the connection. This example depicts packet exchanges under normal PPP
operation.
Router# debug ppp packet
Field Description
PPP PPP debugging output.
Serial4 Interface number associated with this debugging information.
(o), O Packet was detected as an output packet.
(i), I Packet was detected as an input packet.
lcp_slqr() Procedure name; running LQM, send a Link Quality Report (LQR).
lcp_rlqr() Procedure name; running LQM, received an LQR.
input (C021) Router received a packet of the specified packet type (in hexadecimal
notation). A value of C025 indicates packet of type LQM.
state = OPEN PPP state; normal state is OPEN.
Field Description
magic = D21B4 Magic Number for indicated node; when output is indicated, this is the
Magic Number of the node on which debugging is enabled. The actual
Magic Number depends on whether the packet detected is indicated as
I or O.
datagramsize 52 Packet length including header.
code = ECHOREQ(9) Identifies the type of packet received. Both forms of the packet, string
and hexadecimal, are presented.
len = 48 Packet length without header.
id = 3 ID number per Link Control Protocol (LCP) packet format.
pkt type 0xC025 Packet type in hexadecimal notation; typical packet types are C025 for
LQM and C021 for LCP.
LCP ECHOREQ(9) Echo Request; value in parentheses is the hexadecimal representation
of the LCP type.
LCP ECHOREP(A) Echo Reply; value in parentheses is the hexadecimal representation of
the LCP type.
To elaborate on the displayed output, consider the partial exchange. This sequence shows that one side
is using ECHO for its keepalives and the other side is using LQRs.
Router# debug ppp packet
The first line states that the router with debugging enabled has sent an LQR to the other side of the PPP
connection:
PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
The next two lines indicate that the router has received a packet of type C025 (LQM) and provides details
about the packet:
PPP Serial4(i): pkt type 0xC025, datagramsize 52
PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48
The next two lines indicate that the router received an ECHOREQ of type C021 (LCP). The other side
is sending ECHOs. The router on which debugging is configured for LQM but also responds to ECHOs.
PPP Serial4(i): pkt type 0xC021, datagramsize 16
PPP Serial4: I LCP ECHOREQ(9) id 3 (C) magic D3454
Next, the router is detected to have responded to the ECHOREQ with an ECHOREP and is preparing to
send out an LQR:
PPP Serial4: O LCP ECHOREP(A) id 3 (C) magic D21B4
PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
The following is sample output from the debug ppp negotiation command. This is a normal negotiation,
where both sides agree on Network Control Program (NCP) parameters. In this case, protocol type IP is
proposed and acknowledged.
Router# debug ppp negotiation
Field Description
ppp PPP debugging output.
sending CONFREQ Router sent a configuration request.
type = 4 Type of LCP configuration option that is being negotiated and a
(CI_QUALITYTYPE) descriptor. A type value of 4 indicates Quality Protocol negotiation; a
type value of 5 indicates Magic Number negotiation.
value = C025/3E8 For Quality Protocol negotiation, indicates NCP type and reporting
period. In the example, C025 indicates LQM; 3E8 is a hexadecimal
value translating to about 10 seconds (in hundredths of a second).
value = 3D56CAC For Magic Number negotiation, indicates the Magic Number being
negotiated.
received config Receiving node has received the proposed option negotiation for the
indicated option type.
acked Acknowledgment and acceptance of options.
state = ACKSENT Specific PPP state in the negotiation process.
ipcp_reqci IPCP notification message; sending CONFACK.
fsm_rconfack (8021) Procedure fsm_rconfack processes received CONFACKs, and the
protocol (8021) is IP.
The first two lines indicate that the router is trying to bring up LCP and will use the indicated negotiation
options (Quality Protocol and Magic Number). The value fields are the values of the options themselves.
C025/3E8 translates to Quality Protocol LQM. 3E8 is the reporting period (in hundredths of a second).
3D56CAC is the value of the Magic Number for the router.
ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8
ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 3D56CAC
The next two lines indicate that the other side negotiated for options 4 and 5 as requested and
acknowledged both. If the responding end does not support the options, a CONFREJ is sent by the
responding node. If the responding end does not accept the value of the option, a
Configure-Negative-Acknowledge (CONFNAK) is sent with the value field modified.
ppp: received config for type = 4 (QUALITYTYPE) acked
ppp: received config for type = 5 (MAGICNUMBER) value = 3D567F8 acked (ok)
The next three lines indicate that the router received a CONFAK from the responding side and displays
accepted option values. Use the rcvd id field to verify that the CONFREQ and CONFACK have the same
ID field.
PPP Serial4: state = ACKSENT fsm_rconfack(C021): rcvd id 5
ppp: config ACK received, type = 4 (CI_QUALITYTYPE), value = C025
ppp: config ACK received, type = 5 (CI_MAGICNUMBER), value = 3D56CAC
The next line indicates that the router has IP routing enabled on this interface and that the IPCP NCP
negotiated successfully:
ppp: ipcp_reqci: returning CONFACK.
The following is sample output from when the debug ppp packet and debug ppp negotiation
commands are enabled at the same time.
The following is sample output from the debug ppp negotiation command when the remote side of the
connection is unable to respond to LQM requests:
Router# debug ppp negotiation
The following is sample output when no response is detected for configuration requests (with both the
debug ppp negotiation and debug ppp packet commands enabled):
Router# debug ppp negotiation
The following is sample output from the debug ppp error command. These messages might appear
when the Quality Protocol option is enabled on an interface that is already running PPP.
Router# debug ppp error
Field Description
PPP PPP debugging output.
Serial3(i) Interface number associated with this debugging information; indicates
that this is an input packet.
rlqr receive failure Request to negotiate the Quality Protocol option is not accepted.
myrcvdiffp = 159 Number of packets received over the time period.
peerxmitdiffp = 41091 Number of packets sent by the remote node over this period.
myrcvdiffo = 2183 Number of octets received over this period.
peerxmitdiffo = 1714439 Number of octets sent by the remote node over this period.
threshold = 25 Maximum error percentage acceptable on this interface. This
percentage is calculated by the threshold value entered in the
ppp quality number interface configuration command. A value of 100
– number (100 minus number) is the maximum error percentage. In this
case, a number of 75 was entered. This means that the local router must
maintain a minimum 75 percent non-error percentage, or the PPP link
will be considered down.
OutLQRs = 1 Local router’s current send LQR sequence number.
LastOutLQRs = 1 The last sequence number that the remote node side has seen from the
local node.
The following is sample output from the debug ppp authentication command. Use this command to
determine why an authentication fails.
Router# debug ppp authentication
In general, these messages are self-explanatory. Fields that can show optional output are outlined in
Table 202.
Field Description
Serial0 Interface number associated with this debugging information and
CHAP access session in question.
USERNAME pioneer not The name pioneer in this example is the name received in the CHAP
found. response. The router looks up this name in the list of usernames that
are configured for the router.
Remote message is The following messages can appear:
Unknown name
• No name received to authenticate
• Unknown name
• No secret for given name
• Short MD5 response received
• MD compare failed
code = 4 Specific CHAP type packet detected. Possible values are as follows:
• 1—Challenge
• 2—Response
• 3—Success
• 4—Failure
id = 3 ID number per LCP packet format.
len = 48 Packet length without header.
The following shows sample output from the debug ppp command using the cbcp keyword. This output
depicts packet exchanges under normal PPP operation where the Cisco access server is waiting for the
remote PC to respond to the MSCB request. The router also has debug ppp negotiation and
service timestamps msec commands enabled.
Router# debug ppp cbcp
Dec 17 00:48:11.302: As8 MCB: User mscb Callback Number - Client ANY
Dec 17 00:48:11.306: Async8 PPP: O MCB Request(1) id 1 len 9
Dec 17 00:48:11.310: Async8 MCB: O 1 1 0 9 2 5 0 1 0
Dec 17 00:48:11.314: As8 MCB: O Request Id 1 Callback Type Client-Num delay 0
Dec 17 00:48:13.342: As8 MCB: Timeout in state WAIT_RESPONSE
Dec 17 00:48:13.346: Async8 PPP: O MCB Request(1) id 2 len 9
Dec 17 00:48:13.346: Async8 MCB: O 1 2 0 9 2 5 0 1 0
Dec 17 00:48:13.350: As8 MCB: O Request Id 2 Callback Type Client-Num delay 0
Dec 17 00:48:15.370: As8 MCB: Timeout in state WAIT_RESPONSE
Dec 17 00:48:15.374: Async8 PPP: O MCB Request(1) id 3 len 9
Dec 17 00:48:15.374: Async8 MCB: O 1 3 0 9 2 5 0 1 0
Dec 17 00:48:15.378: As8 MCB: O Request Id 3 Callback Type Client-Num delay 0
Dec 17 00:48:17.398: As8 MCB: Timeout in state WAIT_RESPONSE
Dec 17 00:48:17.402: Async8 PPP: O MCB Request(1) id 4 len 9
Dec 17 00:48:17.406: Async8 MCB: O 1 4 0 9 2 5 0 1 0
Dec 17 00:48:17.406: As8 MCB: O Request Id 4 Callback Type Client-Num delay 0
Dec 17 00:48:19.426: As8 MCB: Timeout in state WAIT_RESPONSE
Dec 17 00:48:19.430: Async8 PPP: O MCB Request(1) id 5 len 9
Dec 17 00:48:19.430: Async8 MCB: O 1 5 0 9 2 5 0 1 0
The following is sample output from the debug ppp compression command with service timestamps
enabled and shows a typical PPP packet exchange between the router and Microsoft client where the
MPPC header sequence numbers increment correctly:
Router# debug ppp compression
Field Description
interface Interface enabled with MPPC.
Decomp - hdr/ Decompression header and bit settings.
exp_cc# Expected coherency count.
0x2003 Received sequence number.
0x0003 Expected sequence number.
The following shows sample output from debug ppp negotiation and debug ppp error commands,
which can be used to troubleshoot initial PPP negotiation and setup errors. This example shows a virtual
interface (virtual interface 1) during normal PPP operation and CCP negotiation.
Router# debug ppp negotiation error
debug pppatm
To enable debug reports for PPP over ATM (PPPoA) events, errors, and states, either globally or
conditionally, on an interface or virtual circuit (VC), use the debug pppatm command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Usage Guidelines Each specific PPPoA debug report must be requested on a separate command line; see the “Examples”
section.
Examples The following is example output of a PPPoA session with event, error, and state debug reports enabled
on ATM interface 1/0.10:
Router# debug pppatm event interface atm1/0.10
Router# debug pppatm error interface atm1/0.10
Router# debug pppatm state interface atm1/0.10
Field Description
Event Reports PPPoA events for use by Cisco engineering technical assistance
personnel.
State Reports PPPoA states for use by Cisco engineering technical assistance
personnel.
Usage Guidelines Do not use this command when memory is scarce or in very high traffic situations.
Examples The following types of events generate the debugging messages displayed in the figures in this section:
• A dial attempt failed.
• A BACP group was created.
• A BACP group was removed.
• The precedence of the group changed.
• Attempting to dial a number.
• Received a BACP message.
• Discarding a BACP message.
• Received an unknown code.
• Cannot find the appropriate BACP group on input.
• Displaying the response type.
• Incomplete mandatory options notification.
• Invalid outgoing message type.
• Unable to build an output message.
• Sending a BACP message.
• Details about the sent message (type of message, its identifier, the virtual access interface that sent
it).
The following is sample output from the debug ppp bap command:
Router# debug ppp bap
Field Description
BAP Virtual-Access1: Identifier of the virtual access interface in use.
group “laudrup” Name of the BACP group.
sending CallReq Action initiated; in this case, sending a call request.
on BRI3:1 to remote Physical interface being used.
BAP laudrup: attempt1 to dial 19995776677 Call initiated, number being dialed, and physical
on BRI3 interface being used.
---> reason BAP - Multilink bundle Reason for initiating the BACP call.
overloaded
BAP laudrup: sending StatusInd, id 2, len 44 Details about the sent message: It was a status
on Virtual-Access1 to remote indication message, had identifier 2, had a BACP
datagram length 44, and was sent on virtual access
interface 1. You can display information about the
virtual access interface by using the show interfaces
virtual-access EXEC command. (The length shown at
the end of each negotiated option includes the 2-byte
type and length header.)
The debug ppp bap event command might show state transitions and protocol actions, in addition to the
basic debug ppp bap command.
The following is sample output from the debug ppp bap event command:
Router# debug ppp bap event
The following is sample output from the debug ppp bap event command:
Router# debug ppp bap event
The error messages displayed might be added to the basic output when the debug ppp bap error
command is used. Because the errors are very rare, you might never see these messages.
Router# debug ppp bap error
The messages displayed might be added to the basic output when the debug ppp bap negotiation
command is used:
Router# debug ppp bap negotiation
BAP laudrup: adding link speed 64 kbps for type 0x1 len 5
BAP laudrup: adding reason "User initiated addition", len 25
BAP laudrup: CallRsp, id 4, ACK
BAP laudrup: link speed 64 kbps for types 0x1, len 5 (ACK)
BAP laudrup: phone number "1: 0 2: ", len 7 (ACK)
BAP laudrup: adding call status 0, action 0 len 4
BAP laudrup: adding 1 phone numbers "1: 0 2: " len 7
BAP laudrup: adding reason "Successfully added link", len 25
BAP laudrup: StatusRsp, id 4, ACK
The following shows additional reasons for a particular BAP action that might be displayed in an “adding
reason” line of the debug ppp bap negotiation command output:
"Outgoing add request has precedence"
"Outgoing remove request has precedence"
"Unable to change request precedence"
"Unable to determine valid phone delta"
"Attempting to add link"
"Link addition is pending"
"Attempting to remove link"
"Link removal is pending"
"Precedence of peer marked CallReq for no action"
"Callback request rejected due to configuration"
"Call request rejected due to configuration"
"No links of specified type(s) available"
"Drop request disallowed due to configuration"
"Discriminator is invalid"
"No response to call requests"
"Successfully added link"
"Attempt to dial destination failed"
"No interfaces present to dial out"
"No dial string present to dial out"
"Mandatory options incomplete"
"Load has not exceeded threshold"
"Load is above threshold"
"Currently attempting to dial destination"
"No response to CallReq from race condition"
Reason Explanation
“Outgoing add request has Received a CallRequest or CallbackRequest while we were
precedence” waiting on a CallResponse or CallbackResponse to a sent
request. We are the favored peer from the initial BACP
negotiation, so we are issuing a NAK to our peer request.
“Outgoing remove request has Received a LinkDropQueryRequest while waiting on a
precedence” LinkDropQueryResponse to a sent request. We are the favored
peer from the initial BACP negotiation, therefore we are
issuing a NAK to our peer request.
“Unable to change request Received a CallRequest, CallbackRequest, or
precedence” LinkDropQueryRequest while waiting on a
LinkDropQueryResponse to a sent request. Our peer is deemed
to be the favored peer from the initial BACP negotiation and
we were unable to change the status of our outgoing request in
response to the favored request, so we are issuing a NAK.
(This is an internal error and should never be seen.)
“Unable to determine valid phone Received a CallRequest from our peer but are unable to
delta” provide the required phone delta for the response, so we are
issuing a NAK. (This is an internal error and should never be
seen.)
“Attempting to add link” Received a LinkDropQueryRequest while attempting to add a
link; a NAK is issued.
“Link addition is pending” Received a LinkDropQueryRequest, CallRequest, or
CallbackRequest while attempting to add a link as the result of
a previous operation; a NAK is issued in the response.
“Attempting to remove link” Received a CallRequest or CallbackRequest while attempting
to remove a link; a NAK is issued.
“Link removal is pending” Received a CallRequest, CallbackRequest, or
LinkDropQueryRequest while attempting to remove a link as
the result of a previous operation; a NAK is issued in the
response.
“Precedence of peer marked CallReq Received an ACK to a previously unfavored CallRequest; we
for no action” are issuing a CallStatusIndication to inform our peer that there
will be no further action on our part as per this response.
“Callback request rejected due to Received a CallbackRequest but we are configured not to
configuration” accept them; a REJect is issued to our peer.
“Call request rejected due to Received a CallRequest but we are configured not to accept
configuration” them; a REJect is issued to our peer.
“No links of specified type(s) We received a CallRequest but no links of the specified type
available” and speed are available; a NAK is issued.
“Drop request disallowed due to Received a LinkDropQueryRequest but we are configured not
configuration” to accept them; a NAK is issued to our peer.
Reason Explanation
“Discriminator is invalid” Received a LinkDropQueryRequest but the local link
discriminator is not contained within the bundle; a NAK is
issued.
“No response to call requests” After no response to our CallRequest message, a
CallStatusIndication is sent to the peer informing that no more
action will be taken on behalf of this operation.
“Successfully added link” Sent as part of the CallStatusIndication informing our peer that
we successfully completed the addition of a link to the bundle
as the result of the transmission of a CallRequest or the
reception of a CallbackRequest.
“Attempt to dial destination failed” Sent as part of the CallStatusIndication informing our peer that
we failed in an attempt to add a link to the bundle as the result
of the transmission of a CallRequest or the reception of a
CallbackRequest. The retry field with the CallStatusIndication
informs the peer of our intentions.
“No interfaces present to dial out” There are no available interfaces to dial out on to attempt to
add a link to the bundle, and we will not retry the dial attempt.
“No dial string present to dial out” We do not have a dial string to dial out with to attempt to add
a link to the bundle, and we are not going to retry the dial
attempt. (This is an internal error and should never be seen.)
“Mandatory options incomplete” Received a CallRequest, CallbackRequest,
LinkDropQueryRequest, or CallStatusIndication and the
mandatory options are not present, so a NAK is issued in the
response. (A CallStatusResponse is an ACK, however).
“Load has not exceeded threshold” Received a CallRequest or CallbackRequest but we are issuing
a NAK in the response. We are monitoring the load of the
bundle, and so we determine when links should be added to the
bundle.
“Load is above threshold” Received a LinkDropQueryRequest but we are issuing a NAK
in the response. We are monitoring the load of the bundle, and
so we determine when links should be removed from the
bundle.
“Currently attempting to dial Received a CallbackRequest which is a retransmission of one
destination” that we previously ACK’d and are dialing the number
suggested in the request. We are issuing an ACK because we
did so previously, even though our peer never saw the previous
response.
“No response to CallReq from race We issued a CallRequest but failed to receive a response, and
condition” we are issuing a CallStatusIndication to inform our peer of our
intention not to proceed with the operation.
Usage Guidelines
Caution Do not use this command when memory is scarce or in very high traffic situations.
Examples The following is sample output from the debug ppp multilink events command:
Router# debug ppp multilink events
Field Description
MLP laudrup Name of the multilink group.
established BAP group 4 Internal identifier. The same identifiers are used in the
show ppp bap group command output.
Virtual-Access1 Dynamic access interface number.
physical BRI3:1 Bundle was established from a call on this interface.
removed BAP group 4 When the bundle is removed, the associated BACP
group (with its ID) is also removed.
Usage Guidelines
Caution The debug ppp multilink fragments command has some memory overhead and should not be used
when memory is scarce or in very high traffic situations.
Examples The following is sample output from the debug ppp multilink fragments command when used with the
ping EXEC command. The debug output indicates that a multilink PPP packet on interface BRI 0 (on
the B channel) is an input (I) or output (O) packet. The output also identifies the sequence number of the
packet and the size of the fragment.
Router# debug ppp multilink fragments
debug pppoe
To display debugging information for PPP over Ethernet (PPPoE) sessions, use the debug pppoe
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug pppoe {data | errors | events | packets} [rmac remote-mac-address | interface type number
[vc {[vpi/]vci | vc-name}]]
Examples The following examples show sample output from the debug pppoe command:
Router# debug pppoe events interface atm1/0.10 vc 101
Field Description
PPPoE PPPoE debug message header.
0: PPPoE session ID.
I PADI Incoming PPPoE Active Discovery Initiation packet.
R: Remote MAC address.
L: Local MAC address.
0/101 Virtual path identifier (VPI)/virtual channel identifier (VCI)
of the PVC.
ATM1/0.10 Interface type and number.
O PADO Outgoing PPPoE Active Discovery Offer packet.
I PADR Incoming PPPoE Active Discovery Request packet.
Field Description
[3] Unique user session ID. The same ID is used for identifying
sessions across different applications such as PPPoE, PPP,
Layer 2 Tunneling Protocol (L2TP), and Subscriber Service
Switch (SSS). The same session ID appears in the output for
the show pppoe session, show sss session, and show vpdn
session commands.
PPPoE 3 PPPoE session ID.
Created PPPoE session is created.
O PADS Outgoing PPPoE Active Discovery Session-confirmation
packet.
Connected PTA PPPoE session is established.
Max session count(1) on PPPoE session is rejected because of per-MAC session limit.
mac(00b0.c2e9.c470) reached
debug priority
To display priority queueing output, use the debug priority command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
debug priority
no debug priority
Examples The following example shows how to enable priority queueing output:
Router# debug priority
The following is sample output from the debug priority command when the Frame Relay PVC Interface
Priority Queueing (FR PIPQ) feature is configured on serial interface 0:
Router# debug priority
Usage Guidelines Enter the show proxy h323 detail-call EXEC command to see the statistics.
debug pvcd
To display the permanent virtual circuit (PVC) Discovery events and Interim Local Management
Interface (ILMI) MIB traffic used when discovering PVCs, use the debug pvcd command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug pvcd
no debug pvcd
Usage Guidelines This command is primarily used by Cisco technical support representatives.
Examples The following is sample output from the debug pvcd command:
Router# debug pvcd
Usage Guidelines This command helps you track down errors in the QLLC interactions with X.25 networks. Use the debug
qllc error command in conjunction with the debug x25 all command to see the connection. The data
shown by this command only flows through the router on the X.25 connection. Some forms of this
command can generate a substantial amount of output and network traffic.
Examples The following is sample output from the debug qllc error command:
Router# debug qllc error
The following line indicates that the QLLC connection was closed:
%QLLC-3-GENERRMSG: qllc_close - bad qllc pointer Caller 00407116 Caller 00400BD2
The following line shows the virtual MAC address of the failed connection:
QLLC 4000.1111.0002: NO X.25 connection. Discarding XID and calling out
Usage Guidelines Use the debug qllc event command to display primitives that might affect the state of a QLLC
connection. An example of these events is the allocation of a QLLC structure for a logical channel
indicator when an X.25 call has been accepted with the QLLC call user data. Other examples are the
receipt and transmission of LAN explorer and exchange identification (XID) frames.
Examples The following is sample output from the debug qllc event command:
Router# debug qllc event
The following line indicates that a new QLLC data structure has been allocated:
QLLC: allocating new qllc lci 9
The following lines show transmission and receipt of LAN explorer or test frames:
QLLC: tx POLLING TEST, da 4001.3745.1088, sa 4000.1111.0001
QLLC: rx explorer response, da 4000.1111.0001, sa c001.3745.1088, rif 08B0.1A91.1901.A040
Usage Guidelines This command helps you to track down errors in the QLLC interactions with X.25 networks. The data
shown by this command only flows through the router on the X25 connection. Use the debug qllc packet
command in conjunction with the debug x25 all command to see the connection and the data that flows
through the router.
Examples The following is sample output from the debug qllc packet command:
Router# debug qllc packet
The following lines indicate that a packet was received on the interfaces:
14:38:05: Serial2/5 QLLC I: Data Packet.-RSP 9 bytes.
14:38:07: Serial2/6 QLLC I: Data Packet.-RSP 112 bytes.
The following lines show that a packet was sent on the interfaces:
14:38:07: Serial2/6 QLLC O: Data Packet. 128 bytes.
14:38:12: Serial2/5 QLLC O: Data Packet. 128 bytes.
Usage Guidelines Use the debug qllc state command to show when the state of a QLLC connection has changed. The
typical QLLC connection goes from states ADM to SETUP to NORMAL. The NORMAL state indicates
that a QLLC connection exists and is ready for data transfer.
Examples The following is sample output from the debug qllc state command:
Router# debug qllc state
The following line indicates that a QLLC connection attempt is changing state from ADM to SETUP:
QLLC: state ADM -> SETUP
The following line indicates that a QLLC connection attempt is changing state from SETUP to
NORMAL:
QLLC: state SETUP -> NORMAL
Usage Guidelines The QLLC process periodically cycles and checks status of itself and its partner. If the partner is not
found in the desired state, an LAPB primitive command is re-sent until the partner is in the desired state
or the timer expires.
Examples The following is sample output from the debug qllc timer command:
Router# debug qllc timer
14:27:24: Qllc timer lci 257, state ADM retry count 0 Caller 00407116 Caller 00400BD2
14:27:34: Qllc timer lci 257, state NORMAL retry count 0
14:27:44: Qllc timer lci 257, state NORMAL retry count 1
14:27:54: Qllc timer lci 257, state NORMAL retry count 1
The following line of output shows the state of a QLLC partner on a given X.25 logical channel
identifier:
14:27:24: Qllc timer lci 257, state ADM retry count 0 Caller 00407116 Caller 00400BD2
Usage Guidelines This command is helpful to track down errors in the QLLC interactions with X.25 networks. Use the
debug qllc x25 command in conjunction with the debug x25 events or debug x25 all commands to see
the X.25 events between the router and its partner.
Examples The following is sample output from the debug qllc x25 command:
Router# debug qllc x25
Field Description
15:07:23 Displays the time of day.
QLLC X25 notify 257 Indicates that this is a QLLC X25 message.
event <n> Indicates the type of event, n. Values for n can be as follows:
• 1—Circuit is cleared
• 2—Circuit has been reset
• 3—Circuit is connected
• 4—Circuit congestion has cleared
• 5—Circuit has been deleted
debug radius
To display information associated with RADIUS, use the debug radius command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
Usage Guidelines RADIUS is a distributed security system that secures networks against unauthorized access. Cisco
supports RADIUS under the authentication, authorization, and accounting (AAA) security system.
When RADIUS is used on the router, you can use the debug radius command to display detailed
debugging and troubleshooting information in ASCII format. Use the debug radius brief command for
abbreviated output displaying client/server interaction and minimum packet information. Use the debug
radius hex command to display packet dump information that has not been truncated in hex format.
Examples The following is sample output from the debug radius command:
Router# debug radius
The following is sample output from the debug radius brief command:
Router# debug radius brief
17:26:52: Attribute 26 57
000000090133683332332D696E636F6D696E672D636F6E662D69643D3846334133313633204234393830303046
20302033424537314238
17:26:52: Attribute 26 31
000000091A19683332332D63616C6C2D6F726967696E3D616E73776572
17:26:52: Attribute 26 32
000000091B1A683332332D63616C6C2D747970653D54656C6570686F6E79
17:26:52: Attribute 26 56
000000091932683332332D73657475702D74696D653D2A30393A32363A35322E3838302050535420536174204A
616E20312032303030
17:26:52: Attribute 26 48
00000009182A683332332D636F6E662D69643D3846334133313633204234393830303046203020334245373142
38
17:26:52: Attribute 44 10 3030303030303035
17:26:52: Attribute 41 6 00000000
17:26:52: %ISDN-6-CONNECT: Interface Serial0:22 is now connected to 4085274206
17:26:52: RADIUS: Received from id 10 10.0.0.1:1824, Accounting-response, len 20
17:27:01: RADIUS: ustruct sharecount=3
17:27:01: Radius: radius_port_info() success=0 radius_nas_port=1
17:27:01: RADIUS: Initial Transmit ISDN 0:D:23 id 11 10.0.0.0:1823, Access-Request, len
173
17:27:01: Attribute 4 6 01081D03
17:27:01: Attribute 26 19 00000009020D4953444E20303A443A3233
17:27:01: Attribute 61 6 00000000
17:27:01: Attribute 1 8 313233343536
17:27:01: Attribute 26 48
00000009182A683332332D636F6E662D69643D3846334133313633204234393830303046203020334245373142
38
17:27:01: Attribute 31 12 34303835323734323036
17:27:01: Attribute 2 18 C980D8D0E9A061B3D783C61AA6F27214
17:27:01: Attribute 26 36
00000009011E683332332D6976722D6F75743D7472616E73616374696F6E49443A33
17:27:01: RADIUS: Received from id 11 1.7.157.1:1823, Access-Accept, len 115
17:27:01: Attribute 6 6 00000001
17:27:01: Attribute 26 29 000000096517683332332D6372656469742D616D6F756E743D3435
17:27:01: Attribute 26 27 000000096615683332332D6372656469742D74696D653D3333
17:27:01: Attribute 26 26 000000096714683332332D72657475726E2D636F64653D30
17:27:01: Attribute 25 7 6C6F63616C
17:27:01: RADIUS: saved authorization data for user 61AA0698 at 6215087C
17:27:09: %ISDN-6-DISCONNECT: Interface Serial0:22 disconnected from 4085554206, call
lasted 17 seconds
17:27:09: RADIUS: ustruct sharecount=2
17:27:09: Radius: radius_port_info() success=0 radius_nas_port=1
17:27:09: RADIUS: Sent class "local" at 621508E8 from user 61AA0698
17:27:09: RADIUS: Initial Transmit ISDN 0:D:23 id 12 1.7.157.1:1824, Accounting-Request,
len 776
17:27:09: Attribute 4 6 01081D03
17:27:09: Attribute 26 19 00000009020D4953444E20303A443A3233
17:27:09: Attribute 61 6 00000000
17:27:09: Attribute 1 8 313233343536
17:27:09: Attribute 30 7 3532393831
17:27:09: Attribute 31 12 34303835323734323036
17:27:09: Attribute 40 6 00000002
17:27:09: Attribute 25 7 6C6F63616C
17:27:09: Attribute 45 6 00000001
17:27:09: Attribute 6 6 00000001
17:27:09: Attribute 26 27 000000092115683332332D67772D69643D353330305F34332E
17:27:09: Attribute 26 57
000000090133683332332D696E636F6D696E672D636F6E662D69643D3846334133313633204234393830303046
20302033424537314238
17:27:09: Attribute 26 31
000000091A19683332332D63616C6C2D6F726967696E3D616E73776572
17:27:09: Attribute 26 32
000000091B1A683332332D63616C6C2D747970653D54656C6570686F6E79
17:27:09: Attribute 26 56
000000091932683332332D73657475702D74696D653D2A30393A32363A35322E3838302050535420536174204A
616E20312032303030
17:27:09: Attribute 26 58
000000091C34683332332D636F6E6E6563742D74696D653D2A30393A32363A35322E3930372050535420536174
204A616E20312032303030
17:27:09: Attribute 26 61
000000091D37683332332D646973636F6E6E6563742D74696D653D2A30393A32373A31302E3133372050535420
536174204A616E20312032303030
17:27:09: Attribute 26 32
000000091E1A683332332D646973636F6E6E6563742D63617573653D3130
17:27:09: Attribute 26 28 000000091F16683332332D766F6963652D7175616C6974793D30
17:27:09: Attribute 26 48
00000009182A683332332D636F6E662D69643D3846334133313633204234393830303046203020334245373142
38
17:27:09: Attribute 44 10 3030303030303035
17:27:09: Attribute 42 6 00000000
17:27:09: Attribute 43 6 00012CA0
17:27:09: Attribute 47 6 00000000
17:27:09: Attribute 48 6 000001E1
17:27:09: Attribute 46 6 00000011
17:27:09: Attribute 26 30 000000090118737562736372696265723D526567756C61724C696E65
17:27:09: Attribute 26 35
00000009011D683332332D6976722D6F75743D5461726966663A556E6B6E6F776E
17:27:09: Attribute 26 22 0000000901107072652D62797465732D696E3D30
17:27:09: Attribute 26 23 0000000901117072652D62797465732D6F75743D30
17:27:09: Attribute 26 21 00000009010F7072652D70616B732D696E3D30
17:27:09: Attribute 26 22 0000000901107072652D70616B732D6F75743D30
17:27:09: Attribute 26 22 0000000901106E61732D72782D73706565643D30
17:27:09: Attribute 26 22 0000000901106E61732D74782D73706565643D30
17:27:09: Attribute 41 6 00000000
17:27:09: RADIUS: Received from id 12 10.0.0.1:1824, Accounting-response, len 20
debug ras
To display the types and addressing of Registration, Admission and Status (RAS) messages sent and
received, use the debug ras command in privileged EXEC mode. To disable debugging output, use the
no form of this command.
debug ras
no debug ras
Usage Guidelines Use the debug ras command to display the types and addressing of RAS messages sent and received.
The debug output lists the message type using mnemonics defined in International Telecommunications
Union-Telecommunication (ITU-T) specification H.225.
Examples In the following output, gateway GW13.cisco.com sends a RAS registration request (RRQ) message to
gatekeeper GK15.cisco.com at IP address 10.9.53.15. GW13.cisco.com then receives a registration
confirmation (RCF) message from the gatekeeper. If there is no response, it could mean that the
gatekeeper is offline or improperly addressed. If you receive a reject (RRJ) message, it could mean that
the gatekeeper is unable to handle another gateway or that the registration information is incorrect.
Router# debug ras
debug redundancy
To enable the display of events for troubleshooting redundant dial shelf controllers (DSCs), use the
debug redundancy command in privileged EXEC mode. To disable debugging output, use the no form
of this command.
Syntax Description all Displays all available information on redundant DSCs, including that specified
by the following options in this table.
ui Displays information on the user interface of the redundant DSCs.
clk Displays information on the clocks of the redundant DSCs.
hub Displays information on the BIC hub of the redundant DSCs. The hub is the
Fast Ethernet link between the router and the DSC.
Usage Guidelines This command is issued from the router shelf console.
Examples The output from this command consists of event announcements that can be used by authorized
troubleshooting personnel.
Usage Guidelines Use the master form of the command to view redundancy-related debug entries. All debug entries
continue to be logged even if you do not specify an option here, and you can always use the show
redundancy debug-log command to view them.
Examples The output from this command consists of event announcements that can be used by authorized
troubleshooting personnel.
debug resource-pool
To see and trace resource pool management activity, use the debug resource-pool command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug resource-pool
no debug resource-pool
Defaults Disabled
Usage Guidelines Enter the debug resource-pool command to see and trace resource pool management activity. Table 210
describes the resource pooling states.
State Description
RM_IDLE No call activity.
RM_RES_AUTHOR Call waiting for authorization, message sent to authentication,
authorization, and accounting (AAA).
RM_RES_ALLOCATING Call authorized, resource-grp-mgr allocating.
RM_RES_ALLOCATED Resource allocated, connection acknowledgment sent to
signalling state. Call should get connected and become active.
RM_AUTH_REQ_IDLE Signalling module disconnected call while in
RM_RES_AUTHOR. Waiting for authorization response from
AAA.
RM_RES_REQ_IDLE Signalling module disconnected call while in
RM_RES_ALLOCATING. Waiting for resource allocation
response from resource-group manager.
RM_DNIS_AUTHOR An intermediate state before proceeding with Route Processor
Module (RPM) authorization.
RM_DNIS_AUTH_SUCCEEDED Dialed number identification service (DNIS) authorization
succeeded.
RM_DNIS_RES_ALLOCATED DNIS resource allocated.
State Description
RM_DNIS_AUTH_REQ_IDLE DNIS authorization request idle.
RM_DNIS_AUTHOR_FAIL DNIS authorization failed.
RM_DNIS_RES_ALLOC_SUCC DNIS resource allocation succeeded.
ESS
RM_DNIS_RES_ALLOC_FAIL DNIS resource allocation failed.
RM_DNIS_RPM_REQUEST DNIS resource pool management requested.
You can use the resource pool state to isolate problems. For example, if a call fails authorization in the
RM_RES_AUTHOR state, investigate further with AAA authorization debugs to determine whether the
problem lies in the resource-pool manager, AAA, or dispatcher.
Examples The following example shows different instances where you can use the debug resource-pool command:
Router# debug resource-pool
RM general debugging is on
General OS:
AAA Authorization debugging is on
Resource Pool:
resource-pool general debugging is on
Router #
Router #ping 21.1.1.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 21.1.1.10, timeout is 2 seconds:
*Jan 8 00:10:30.358: RM state:RM_IDLE event:DIALER_INCALL DS0:0:0:0:1
*Jan 8 00:10:30.358: RM: event incoming call
Field Description
RM state:RM_IDLE Resource manager state that displays no active calls.
RM state:RM_RES_AUTHOR Resource authorization state.
RES_AUTHOR_SUCCESS DS0: Actual physical resource that is used
shelf:slot:port:channel
Allocated resource from res_group Physical resource group that accepts the call.
Field Description
RM profile <x>, allocated resource <x> Specific customer profile and resource group names used
to accept the call.
RM state: RM_RES_ALLOCATING Resource manager state that unifies a call with a physical
resource.
debug rif
To display information on entries entering and leaving the routing information field (RIF) cache, use the
debug rif command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug rif
no debug rif
Usage Guidelines In order to use the debug rif command to display traffic source-routed through an interface, fast
switching of source route bridging (SRB) frames must first be disabled with the no source-bridge
route-cache interface configuration command.
Examples The following is sample output from the debug rif command:
The first line of output is an example of a RIF entry for an interface configured for SDLC Logical Link
Control (SDLLC) or Local-Ack. Table 212 describes significant fields shown in the display.
Field Description
RIF: This message describes RIF debugging output.
U chk Update checking. The entry is being updated; the timer is set to zero (0).
da=9000.5a59.04f9 Destination MAC address.
sa=0110.2222.33c1 Source MAC address. This field contains values of zero
(0000.0000.0000) in a non-SDLLC or non-Local-Ack entry.
[4880.3201.00A1.0050] RIF string. This field is blank (null RIF) in a non-SDLLC or
non-Local-Ack entry.
Field Description
type 8 Possible values follow:
• 0—Null entry
• 1—This entry was learned from a particular Token Ring port
(interface)
• 2—Statically configured
• 4—Statically configured for a remote interface
• 8—This entry is to be aged
• 16—This entry (which has been learned from a remote interface) is
to be aged
• 32—This entry is not to be aged
• 64—This interface is to be used by LAN Network Manager (and is
not to be aged)
on static/remote/0 This route was learned from a real Token Ring port, in contrast to a
virtual ring.
The following line of output is an example of a RIF entry for an interface that is not configured for
SDLLC or Local-Ack:
RIF: U chk da=0000.3080.4aed,sa=0000.0000.0000 [] type 8 on TokenRing0/0
Notice that the source address contains only zero values (0000.0000.0000), and that the RIF string is null
([ ]). The last element in the entry indicates that this route was learned from a virtual ring, rather than a
real Token Ring port.
The following line shows that a new entry has been added to the RIF cache:
RIF: U add 1000.5a59.04f9 [4880.3201.00A1.0050] type 8
The following line shows that a RIF cache lookup operation has taken place:
RIF: L checking da=0000.3080.4aed, sa=0000.0000.0000
The following line shows that a TEST response from address 9000.5a59.04f9 was inserted into the RIF
cache:
RIF: rcvd TEST response from 9000.5a59.04f9
The following line shows that the RIF entry for this route has been found and updated:
RIF: U upd da=1000.5a59.04f9,sa=0110.2222.33c1 [4880.3201.00A1.0050]
The following line shows that an XID response from this address was inserted into the RIF cache:
RIF: rcvd XID response from 9000.5a59.04f9
The following line shows that the router sent an XID response to this address:
SR1: sent XID response to 9000.5a59.04f9
Table 213 explains the other possible lines of debug rif command output.
Field Description
RIF: L Sending XID for <address> Router/bridge wanted to send a packet to address but
did not find it in the RIF cache. It sent an XID explorer
packet to determine which RIF it should use. The
attempted packet is dropped.
RIF: L No buffer for XID to <address> Similar to the previous description; however, a buffer
in which to build the XID packet could not be
obtained.
RIF: U remote rif too small <rif> Packet’s RIF was too short to be valid.
RIF: U rej <address> too big <rif> Packet’s RIF exceeded the maximum size allowed and
was rejected. The maximum size is 18 bytes.
RIF: U upd interface <address> RIF entry for this router/bridge’s interface has been
updated.
RIF: U ign <address> interface update RIF entry that would have updated an interface
corresponding to one of this router’s interfaces.
RIF: U add <address> <rif> RIF entry for address has been added to the RIF
cache.
RIF: U no memory to add rif for <address> No memory to add a RIF entry for address.
RIF: removing rif entry for <address, type RIF entry for address has been forcibly removed.
code>
RIF: flushed <address> RIF entry for address has been removed because of a
RIF cache flush.
RIF: expired <address> RIF entry for address has been aged out of the RIF
cache.
Usage Guidelines This command is especially helpful for policy routing with dCEF switching.
This command displays a summary of one-way IPC messages from the RP to the VIP about NetFlow
policy routing. If you execute this command on the RP, the messages are shown as “Sent.” If you execute
this command on the VIP console, the IPC messages are shown as “Received.”
Examples The following is sample output of the debug route-map ipc command executed at the RP:
Router# debug route-map ipc
Router(config)#^Z
Router#
The following is sample output of the debug route-map ipc command executed at the VIP:
VIP-Slot0# debug route-map ipc
VIP-Slot0#
RM-IPC: Rcvd clean-all-routemaps; len 12
RM-IPC: Rcvd add routemap test(seq:10); n_len 5; len 17
RM-IPC: Rcvd add acl 1 of routemap test(seq:10); len 21
RM-IPC: Rcvd add min 10 max 300 of routemap test(seq:10); len 24
RM-IPC: Rcvd add preced 1 of routemap test(seq:10); len 17
RM-IPC: Rcvd add tos 4 of routemap test(seq:10); len 17
RP-IPC: Rcvd add nexthop 50.0.0.8 of routemap test(seq:10); len 20
RP-IPC: Rcvd add default nexthop 50.0.0.9 of routemap test(seq:10); len 20
RM-IPC: Rcvd add interface Ethernet0/3 of routemap tes; len 20
RM-IPC: Rcvd add default interface Ethernet0/2 of routemap test(seq:10); len 20
Examples The following example shows debugging output for two calls. The first is a leg 3 SIP call, and the second
is a leg 3 H.323 call:
Router# debug rpms-proc preauth all
The following example shows the output for a single leg 3 H.323 call:
Router# debug rpms-proc preauth h323
The following example shows output for a single leg 3 SIP call:
Router# debug rpms-proc preauth sip
Field Description
Request Request Type—0 for preauthentication, 1 for disconnect.
Preauth id Identifier for the preauthentication request.
EndPt Type Call Origin End Point Type—1 for IP address, 2 for Interzone ClearToken
(IZCT) value.
EndPt Call Origin End Point Value—An IP address or IZCT value.
Resource Service Resource Service Type—1 for Reservation, 2 for Query.
Call_origin Answer.
Call_type Voice over IP (VoIP).
Calling_num Calling party number (calling line identification, or CLID).
Called_num Called party number (dialed number identification service, or DNIS).
Protocol 0 for H.323, 1 for SIP.
function reports Various identifiers and status reports for executed functions.
Usage Guidelines
Caution Be careful when you use this command because it can result in console flooding and reduced voice
quality.
Examples The following example shows a debug trace for RTP SPI errors, sessions, and in/out functions on a
gateway:
Router# debug rtpspi all
RTP SPI Error, Session and function in/out tracings are enabled.
*Mar 1 00:38:59.381:rtpspi_allocate_rtp_port:Entered.
*Mar 1 00:38:59.381:rtpspi_allocate_rtp_port:allocated RTP port 16544
*Mar 1 00:38:59.381:rtpspi_allocate_rtp_port:Success. port = 16544. Leaving.
*Mar 1 00:38:59.381:rtpspi_call_setup_request:entered.
Call Id = 5, dest = 0.0.0.0; callInfo:
final dest flag = 0,
rtp_session_mode = 0x2,
local_ip_addrs = 0x5000001,remote_ip_addrs = 0x0,
local rtp port = 16544, remote rtp port = 0
*Mar 1 00:38:59.381:rtpspi_call_setup_request:spi_info copied for rtpspi_app_data_t.
*Mar 1 00:38:59.385:rtpspi_call_setup_request:leaving
*Mar 1 00:38:59.385:rtpspi_call_setup() entered
*Mar 1 00:38:59.385:rtpspi_initialize_ccb:Entered
*Mar 1 00:38:59.385:rtpspi_initialize_ccb:leaving
*Mar 1 00:38:59.385:rtpspi_call_setup:rtp_session_mode = 0x2
Usage Guidelines
Caution Be careful when you use this command because it can result in console flooding and reduced voice
quality.
Examples This example shows a debug trace for RTP SPI errors on two gateways. The following example shows
the debug trace on the first gateway:
Router# debug rtpspi errors
The following example shows the debug trace on the second gateway:
Router# debug rtpspi errors
00:54:08:rtpspi_process_timers:
00:54:08:rtpspi_process_timers:Timer 0x1A5AF9C expired.
00:54:08:rtpspi_process_timers:Timer expired for callID 0x3
00:54:08:rtpspi_process_timers:
00:54:08:rtpspi_process_timers:Timer 0x1A5AF9C expired.
00:54:08:rtpspi_process_timers:Timer expired for callID 0x3
00:54:08:rtpspi_process_timers:
00:54:08:rtpspi_process_timers:Timer 0x1A5AF9C expired.
00:54:08:rtpspi_process_timers:Timer expired for callID 0x3
00:54:09:rtpspi_process_timers:
Usage Guidelines
Caution Be careful when you use this command because it can result in console flooding and reduced voice
quality.
Examples The following example shows a debug trace for RTP SPI in/out functions on a gateway:
Router# debug rtpspi inout
*Mar 1 00:57:24.565:rtpspi_allocate_rtp_port:Entered.
*Mar 1 00:57:24.565:rtpspi_allocate_rtp_port:Success. port = 16520. Leaving.
*Mar 1 00:57:24.565:rtpspi_call_setup_request:entered.
Call Id = 9, dest = 0.0.0.0; callInfo:
final dest flag = 0,
rtp_session_mode = 0x2,
local_ip_addrs = 0x5000001,remote_ip_addrs = 0x0,
local rtp port = 16520, remote rtp port = 0
*Mar 1 00:57:24.565:rtpspi_call_setup_request:spi_info copied for rtpspi_app_data_t.
*Mar 1 00:57:24.565:rtpspi_call_setup_request:leaving
*Mar 1 00:57:24.569:rtpspi_call_setup() entered
*Mar 1 00:57:24.569:rtpspi_initialize_ccb:Entered
*Mar 1 00:57:24.569:rtpspi_initialize_ccb:leaving
*Mar 1 00:57:24.569:rtpspi_start_rtcp_session:entered. rtp session mode=0x2, rem rtp=0,
rem ip=0x0
*Mar 1 00:57:24.569:rtpspi_get_rtcp_mode:entered. rtp_mode = 0x2
*Mar 1 00:57:24.569:rtpspi_call_setup:Leaving.
*Mar 1 00:57:24.573:rtpspi_bridge:entered. conf id = 3, src i/f = 0x1859E88,
Syntax Description call-ID Specifies the call ID of the active call. The valid range is from 0 to
65535.
NSE-event-ID Specifies the NSE Event ID. The valid range is from 0 to 255.
Examples The following example shows the RTP SPI software module set to send an NSE:
Router# debug rtpspi send-nse
Examples The following example shows a debug trace for RTP SPI sessions on a gateway:
Router# debug rtpspi session
Syntax Description: probe (Optional) Number of the probe in the range from 0 to 31.
Usage Guidelines The debug rtr error command displays run-time errors. When a probe number other than 0 is specified,
all run-time errors for that probe are displayed when the probe is active. When the probe number is 0 all
run-time errors relating to the Response Time Reporter scheduler process are displayed. When no probe
number is specified, all run-time errors for all active probes configured on the router and probe control
are displayed.
Note Use the debug rtr error command before using the debug rtr trace command because the debug rtr
error command generates a lesser amount of debugging output.
Examples The following example shows output from the debug rtr error command. The output indicates failure
because the target is not there or because the responder is not enabled on the target. All debugging output
for the Response Time Reporter (including the debug rtr trace command) has the format shown in
Table 215.
Router# debug rtr error
Field Description
RTR 1 Number of the probe generating the message.
Error Return Code Message identifier indicating the error type (or error itself).
LU0 RTR Probe 1 Name of the process generating the message.
in echoTarget on call luReceive Supplemental messages that pertain to the message identifier.
LuApiReturnCode of
InvalidHandle - invalid host name
or API handle
Syntax Description: probe (Optional) Number of the probe in the range from 0 to 31.
Usage Guidelines When a probe number other than 0 is specified, execution for that probe is traced. When the probe
number is 0, the Response Time Reporter scheduler process is traced. When no probe number is
specified, all active probes and every probe control is traced.
The debug rtr trace command also enables debug rtr error command for the specified probe. However,
the no debug rtr trace command does not disable the debug rtr error command. You must manually
disable the command by using the no debug rtr error command.
All debuggng output (including debug rtr error command output) has the format shown in the debug
rtr error command output example.
Note The debug rtr trace command can generate a large number of debug messages. First use the debug rtr
error command, and then use the debug rtr trace on a per-probe basis.
Examples The following output is from the debug rtr trace command. In this example, a probe is traced through
a single operation attempt: the setup of a connection to the target, and the attempt at an echo to calculate
UDP packet response time.
Router# debug rtr trace
Usage Guidelines We recommend that you log output from the debug rtsp all command to a buffer rather than sending the
output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Examples The following example shows debugging output for the debug rtsp all command. The show debug
command shows which RTSP modules are traced.
Router# debug rtsp all
RTSP:
RTSP client Protocol Error debugging is on
RTSP client Protocol Message Handler debugging is on
RTSP client API debugging is on
RTSP client socket debugging is on
RTSP client session debugging is on
Router#
Router#!call initiated
Router#
*Mar 11 03:14:23.471: //-1//RTSP:/rtsp_get_new_scb:
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//166/ Identifies the CallEntry ID.
RTSP: Identifies the RTSP module.
rtsp_function name Identifies the function name.
Usage Guidelines We recommend that you log output from the debug rtsp api command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Examples The following example shows debugging output for the debug rtsp api command:
Router# debug rtsp api
Router!call answered
Router#!digits dialed
Router#!call terminated
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//146/ Identifies the CallEntry ID.
RTSP: Identifies the RTSP module.
rtsp_function name Identifies the function name.
Usage Guidelines We recommend that you log output from the debug rtsp client command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Syntax Description client (Optional) Displays client information and stream information for the
stream that is currently active.
session (Optional) Displays cumulative information about the session, packet
statistics, and general call information such as call ID, session ID,
individual RTSP stream URLs, packet statistics, and play duration.
Examples The following example displays the debug messages of the RTSP session:
Jan 1 00:08:36.783:rtsp_process_async_event:SCB=0x62128F08
Jan 1 00:08:36.783:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY
rtsp_event = RTSP_EV_SVR_DESC_OR_ANNOUNCE_RESP
Jan 1 00:08:36.783:act_ready_event_desc_or_announce_resp:
Jan 1
00:08:36.783:act_ready_event_desc_or_announce_resp:RTSP_STATUS_DESC_OR_ANNOUNCE_RESP_OK
Jan 1 00:08:37.287:rtsp_control_main:SOCK= 0 Event=0x1
Jan 1 00:08:37.287:rtsp_process_async_event:SCB=0x62128F08
Jan 1 00:08:37.287:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY
rtsp_event = RTSP_EV_SVR_SETUP_RESP
Jan 1 00:08:37.287:act_ready_event_setup_resp:
Jan 1 00:08:37.287:act_ready_event_setup_resp:Remote RTP Port=13344
Jan 1 00:08:37.287:rtsp_rtp_stream_setup:scb=0x62128F08, callID=0x7 record=0
Jan 1 00:08:37.287:rtsp_rtp_stream_setup:Starting RTCP session.
Local IP addr = 1.13.79.45, Remote IP addr = 1.13.79.6,
Local RTP port = 18748, Remote RTP port = 13344 CallID=8
Jan 1 00:08:37.291:xmit_func = 0x0 vdbptr = 0x61A0FC98
Jan 1 00:08:37.291:rtsp_control_main:CCAPI Queue Event
Jan 1 00:08:37.291:rtsp_rtp_associate_done:ev=0x62070E08, callID=0x7
Jan 1 00:08:37.291:rtsp_rtp_associate_done:scb=0x62128F08
Jan 1 00:08:37.291:rtsp_rtp_associate_done:callID=0x7, pVdb=0x61F4FBC8,
Jan 1 00:08:37.291: spi_context=0x6214145C
Jan 1 00:08:37.291: disposition=0, playFunc=0x60CA2238,
Jan 1 00:08:37.291: codec=0x5, vad=0, mediaType=6,
Jan 1 00:08:37.291: stream_assoc_id=1
Jan 1 00:08:37.291:rtsp_rtp_modify_session:scb=0x62128F08, callID=0x7
Jan 1 00:08:37.291:rtsp_process_async_event:SCB=0x62128F08
Jan 1 00:08:37.291:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY
rtsp_event = RTSP_EV_ASSOCIATE_DONE
Jan 1 00:08:37.291:act_ready_event_associate_done:
Jan 1 00:08:37.291:rtsp_get_stream:
Jan 1 00:08:37.783:rtsp_control_main:SOCK= 0 Event=0x1
Jan 1 00:08:37.783:rtsp_process_async_event:SCB=0x62128F08
Jan 1 00:08:37.783:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_READY
rtsp_event = RTSP_EV_SVR_PLAY_OR_REC_RESP
Jan 1 00:08:37.783:act_ready_event_play_or_rec_resp:
Jan 1 00:08:37.783:rtsp_start_timer:timer (0x62128FB0)starts - delay (4249)
rtsp-5#
Jan 1 00:08:42.035:rtsp_process_timer_events:
Jan 1 00:08:42.035:rtsp_process_timer_events:PLAY OR RECORD completed
Jan 1 00:08:42.035:rtsp_process_async_event:SCB=0x62128F08
Jan 1 00:08:42.035:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_PLAY_OR_REC
rtsp_event = RTSP_EV_PLAY_OR_REC_TIMER_EXPIRED
Jan 1 00:08:42.035:act_play_event_play_done:
Jan 1 00:08:42.035:act_play_event_play_done:elapsed play time = 4249 total play time =
4249
Jan 1 00:08:42.035:rtsp_send_teardown_to_svr:
Jan 1 00:08:42.487:rtsp_control_main:SOCK= 0 Event=0x1
Jan 1 00:08:42.487:rtsp_process_async_event:SCB=0x62128F08
Jan 1 00:08:42.487:rtsp_process_async_event:rtsp_state = RTSP_SES_STATE_PLAY_OR_REC
rtsp_event = RTSP_EV_SVR_TEARDOWN_RESP
Jan 1 00:08:42.487:act_play_event_teardown_resp:
Jan 1 00:08:42.487:rtsp_server_closed:
Jan 1 00:08:42.487:rtsp_send_resp_to_api:
Jan 1 00:08:42.487:rtsp_send_resp_to_api:sending RESP=RTSP_STATUS_PLAY_COMPLETE
Jan 1 00:08:42.491:rtsp_rtp_teardown_stream:scb=0x62128F08, callID=0x7
Jan 1 00:08:42.491:rtsp_rtp_stream_cleanup:scb=0x62128F08, callID=0x7
Jan 1 00:08:42.491:rtsp_update_stream_stats:scb=0x62128F08, stream=0x61A43350,
Jan 1 00:08:42.491:call_info=0x6214C67C, callID=0x7
Jan 1 00:08:42.491:rtsp_update_stream_stats:rx_bytes = 25992
Jan 1 00:08:42.491:rtsp_update_stream_stats:rx_packetes = 82
Jan 1 00:08:42.491:rtsp_reinitialize_scb:
Jan 1 00:08:42.503:rtsp_control_process_msg:
Jan 1 00:08:42.503:rtsp_control_process_msg:received MSG request of TYPE 0
Jan 1 00:08:42.503:rtsp_set_event:
Jan 1 00:08:42.503:rtsp_set_event:api_req_msg_type=RTSP_API_REQ_DESTROY
Jan 1 00:08:42.503:rtsp_session_cleanup:
Jan 1 00:08:42.503:rtsp_create_session_history:scb=0x62128F08, callID=0x7
Jan 1 00:08:42.503:rtsp_insert_session_history_record:current=0x6214BDC8, callID=0x7
Jan 1 00:08:42.503:rtsp_insert_session_history_record:count = 3
Jan 1 00:08:42.503:rtsp_insert_session_history_record:starting history record
deletion_timer of10 minutes
Jan 1 00:08:42.503:rtsp_session_cleanup:deleting session:scb=0x62128F08
Router#
Usage Guidelines We recommend that you log output from the debug rtsp error command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Usage Guidelines We recommend that you log output from the debug rtsp pmh command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Usage Guidelines We recommend that you log output from the debug rtsp session command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Examples The following example shows the display of the debugging messages of the RTSP session:
Router#!digits dialed
Router#
Router#!call terminated
Router#
*Mar 11 03:10:38.139: //-1//RTSP:RS41:/rtsp_control_process_msg:
*Mar 11 03:10:38.139: //158//RTSP:/rtsp_control_process_msg: received MSG request of TYPE
0
*Mar 11 03:10:38.139: //158//RTSP:/rtsp_set_event: api_req_msg_type=RTSP_API_REQ_DESTROY
*Mar 11 03:10:38.139: //158//RTSP:/rtsp_session_cleanup:
*Mar 11 03:10:38.139: //-1//RTSP:/rtsplib_free_svr_session:
*Mar 11 03:10:38.139: //-1//RTSP:/rtsplib_stop_timer: timer(0x638D5DDC) stops
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: scb=0x63A5FE6C,
callID=0x9E
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: No streams in session
control block
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_session_cleanup: deleting session: scb=0x63A5FE6C
*Mar 11 03:10:38.143: //-1//RTSP:RS42:/rtsp_control_process_msg:
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_control_process_msg: received MSG request of TYPE
0
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_set_event: api_req_msg_type=RTSP_API_REQ_DESTROY
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_session_cleanup:
*Mar 11 03:10:38.143: //-1//RTSP:/rtsplib_free_svr_session:
*Mar 11 03:10:38.143: //-1//RTSP:/rtsplib_stop_timer: timer(0x63A60110) stops
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: scb=0x63A5D874,
callID=0x9E
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_create_session_history: No streams in session
control block
*Mar 11 03:10:38.143: //158//RTSP:/rtsp_session_cleanup: deleting session: scb=0x63A5D874
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//158/ Identifies the CallEntry ID.
RTSP: Identifies the RTSP module.
rtsp_function name Identifies the function name.
Usage Guidelines Each Real-Time Streaming Protocol (RTS) session has a TCP port for control and a UDP (RTP) port for
delivery of data. The control connection (TCP socket) is used to exchange a set of messages (request
from the RTSP client and the response from the server) for displaying a prompt. The debug rtsp socket
command enables the user to debug the message exchanges being done on the TCP control connection.
Note We recommend that you log output from the debug rtsp socket command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
debug rudpv1
For debug information for Reliable User Datagram Protocol (RUDP), use the debug rudpv1 command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
Usage Guidelines Use this command only during times of low traffic.
Examples The following is output for the debug rudpv1 application command:
Router# debug rudpv1 application
*Jan 1 00:53:01.207:
*Jan 1 00:53:01.207:Retrans timer, set to ack 213
*Jan 1 00:53:01.311:Retrans timer, set to ack 214
*Jan 1 00:53:01.419:Retrans timer, set to ack 98
*Jan 1 00:53:01.611:Retrans timer, set to ack 215
*Jan 1 00:53:01.711:Retrans timer, set to ack 218
*Jan 1 00:53:01.811:Retrans timer, set to ack 219
*Jan 1 00:53:01.911:Retrans timer, set to ack 220
*Jan 1 00:53:02.011:Retrans timer, set to ack 221
*Jan 1 00:53:02.311:Retrans handler fired, 221
*Jan 1 00:53:02.311:Retrans:221:
*Jan 1 00:53:02.311:
*Jan 1 00:53:02.311:Retrans timer, set to ack 222
*Jan 1 00:53:02.415:Retrans timer, set to ack 225
Examples The following is sample output from the debug saa apm command:
Router# debug saa apm
Router# configure terminal
Router(config)# saa apm operation 123 start ftp://apm/config/iptv.cf
Usage Guidelines This command may generate a large number of debugging messages.
Examples In the following example, debugging is enabled for the SAA ATM SLM feature and the SAA eXtensible
Markup Language (XML) feature for the purposes of debugging the XML requests and responses:
Router# debug saa slm
Router# debug saa xml
debug sccp
To display debugging information for Simple Client Control Protocol (SCCP) and its related applications
(transcoding and conferencing), use the debug sccp command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
no debug sccp
Usage Guidelines The router on which this command is used must be equipped with one or more digital T1/E1 packet voice
trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding and conferencing digital
signal processor (DSP) farms (NM-HDV-FARMs) to provide DSP resources.
Debugging is turned on for all DSP farm service sessions. You can debug multiple sessions
simultaneously, with different levels of debugging for each.
Examples The following is sample output from the debug sccp events command:
Router# debug sccp events
*Mar 1 00:47:01: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256
*Mar 1 00:47:07: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1,
count 0
*Mar 1 00:47:07: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:07: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4
*Mar 1 00:47:07: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256
*Mar 1 00:47:08: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2,
count 0
*Mar 1 00:47:08: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:09: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84
*Mar 1 00:47:09: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256
*Mar 1 00:47:14: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1,
count 0
*Mar 1 00:47:14: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:15: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4
*Mar 1 00:47:15: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256
*Mar 1 00:47:16: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2,
count 0
*Mar 1 00:47:16: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:16: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84
*Mar 1 00:47:16: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256
*Mar 1 00:47:22: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1,
count 0
*Mar 1 00:47:22: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:22: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4
*Mar 1 00:47:22: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256
*Mar 1 00:47:23: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2,
count 0
*Mar 1 00:47:23: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:24: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84
*Mar 1 00:47:24: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256
*Mar 1 00:47:29: sccp_create_application: send keepalive msg, appl 6248F760, appl_type 1,
count 0
*Mar 1 00:47:29: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:30: sccp_process_mtp_pdu: appl - 6248F760, mbuf - 6248F7D4
*Mar 1 00:47:30: sccp_process_mtp_pdu: msg_ptr 6248F7DC, len 4, offset 12, msg_id 256
*Mar 1 00:47:31: sccp_create_application: send keepalive msg, appl 6248FC10, appl_type 2,
count 0
*Mar 1 00:47:31: sccp_keepalive: send keepalive id 0, len 4
*Mar 1 00:47:31: sccp_process_mtp_pdu: appl - 6248FC10, mbuf - 6248FC84
*Mar 1 00:47:31: sccp_process_mtp_pdu: msg_ptr 6248FC8C, len 4, offset 12, msg_id 256
debug sdlc
To display information on Synchronous Data Link Control (SDLC) frames received and sent by any
router serial interface involved in supporting SDLC end station functions, use the debug sdlc command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug sdlc
no debug sdlc
Usage Guidelines
Note Because the debug sdlc command can generate many messages and alter timing in the network node,
use it only when instructed by authorized support personnel.
Examples The following is sample output from the debug sdlc command:
Router# debug sdlc
The following line of output indicates that the router is sending a Receiver Ready packet at location 4 in
the code:
SDLC: Sending RR at location 4
Table 219 debug sdlc Field Descriptions for a Frame Output Event
Field Description
Serial1/0 Interface type and unit number reporting the frame event.
SDLC Protocol providing the information.
O Command mode of frame event. Possible values are as follows:
• I—Frame input
• O—Frame output
• T—T1 timer expired
04 SDLC address of the SDLC connection.
CONNECT State of the protocol when the frame event occurred. Possible values are
as follows:
• CONNECT
• DISCONNECT
• DISCSENT (disconnect sent)
• ERROR (FRMR frame sent)
• REJSENT (reject frame sent)
• SNRMSENT (SNRM frame sent)
• USBUSY
• THEMBUSY
• BOTHBUSY
(285) Size of the frame (in bytes).
IFRAME Frame type name. Possible values are as follows:
• DISC—Disconnect
• DM—Disconnect mode
• FRMR—Frame reject
• IFRAME—Information frame
• REJ—Reject
• RNR—Receiver not ready
• RR—Receiver ready
• SIM—Set Initialization mode command
• SNRM—Set Normal Response Mode
• TEST—Test frame
• UA—Unnumbered acknowledgment
• XID—EXchange ID
Table 219 debug sdlc Field Descriptions for a Frame Output Event (continued)
Field Description
P/F Poll/Final bit indicator. Possible values are as follows:
• F—Final (printed for Response frames)
• P—Poll (printed for Command frames)
• P/F—Poll/Final (printed for RR, RNR, and REJ frames, which can be
either Command or Response frames)
6 Receive count; range: 0 to 7.
Table 220 debug sdlc Field Descriptions for a Frame Input Event
Field Description
02 SDLC address.
IFRAME Traffic engineering type.
P Poll bit P is on.
VR: 7 Receive count; range: 0 to 7.
VS: 0 Send count; range: 0 to 7.
Field Description
Serial1/0 Interface type and unit number reporting the frame event.
SDLC Protocol providing the information.
T Timer has expired.
02 SDLC address of this SDLC connection.
Table 221 debug sdlc Field Descriptions for a Timer Event (continued)
Field Description
CONNECT State of the protocol when the frame event occurred. Possible values are as
follows:
• BOTHBUSY
• CONNECT
• DISCONNECT
• DISCSENT (disconnect sent)
• ERROR (FRMR frame sent)
• REJSENT (reject frame sent)
• SNRMSENT (SNRM frame sent)
• THEMBUSY
• USBUSY
0x9CB69E8 Top timer.
0 Retry count; default: 0.
Syntax Description number (Optional) Frame-type that you want to monitor. See the “Usage
Guidelines” section.
Usage Guidelines You can select the frame types you want to monitor; the frame types correspond to bit flags. You can
select 1, 2, 4, or 7, which is the decimal value of the bit flag settings. If you select 1, the octet is set to
00000001. If you select 2, the octet is set to 0000010. If you select 4, the octet is set to 00000100. If you
want to select all frame types, select 7; the octet is 00000111. The default is 7 for all events. Table 222
defines these bit flags.
Caution Because using this command is processor intensive, it is best to use it after hours, rather than in a
production environment. It is also best to use this command by itself, rather than in conjunction with
other debugging commands.
Examples The following is sample output from the debug sdlc local-ack command:
The first line shows the input to the SDLC local acknowledgment state machine:
SLACK (Serial3): Input = Network, LinkupRequest
Field Description
SLACK SDLC local acknowledgment feature is providing the information.
(Serial3): Interface type and unit number reporting the event.
Input = Network Source of the input.
LinkupRequest Op code. A LinkupRequest is an example of possible values.
The second line shows the change in the SDLC local acknowledgment state machine. In this case the
AwaitSdlcOpen state is an internal state that has not changed while this display was captured.
SLACK (Serial3): Old State = AwaitSdlcOpen New State = AwaitSdlcOpen
The third line shows the output from the SDLC local acknowledgment state machine:
SLACK (Serial3): Output = SDLC, SNRM
Syntax Description max-bytes (Optional) Limits the number of bytes of data that are printed to the
display.
Usage Guidelines This command requires intensive CPU processing; therefore, we recommend not using it when the router
is expected to handle normal network loads, such as in a production environment. Instead, use this
command when network response is noncritical. We also recommend that you use this command by
itself, rather than in conjunction with other debug commands.
Examples The following is sample output from the debug sdlc packet command with the packet display limited
to 20 bytes of data:
Router# debug sdlc packet 20
Usage Guidelines If the show interface serial EXEC command shows that the line and protocol are down, you can use the
debug serial interface command to isolate a timing problem as the cause of a connection failure. If the
keepalive values in the mineseq, yourseen, and myseen fields are not incrementing in each subsequent
line of output, there is a timing or line problem at one end of the connection.
Caution Although the debug serial interface command typically does not generate a substantial amount of
output, nevertheless use it cautiously during production hours. When Switched Multimegabit Data
Service (SMDS) is enabled, for example, it can generate considerable output.
The output of the debug serial interface command can vary, depending on the type of WAN configured
for an interface: Frame Relay, High-Level Data Link Control (HDL) , High-Speed Serial Interface
(HSSI), SMDS, or X.25. The output also can vary depending on the type of encapsulation configured for
that interface. The hardware platform also can affect debug serial interface output.
Examples The following sections show and describe sample debug serial interface output for various
configurations.
Field Description
Serial 1 Interface through which the serial connection is taking place.
HDLC Serial connection is an HDLC connection.
myseq 636119 Myseq counter increases by one each time the router sends a keepalive
packet to the remote router.
mineseen 636119 Value of the mineseen counter reflects the last myseq sequence number
the remote router has acknowledged receiving from the router. The
remote router stores this value in its yourseen counter and sends that
value in a keepalive packet to the router.
yourseen 515032 Yourseen counter reflects the value of the myseq sequence number the
router has received in a keepalive packet from the remote router.
line up Connection between the routers is maintained. Value changes to “line
down” if the values of the myseq and myseen fields in a keepalive
packet differ by more than three. Value returns to “line up” when the
interface is reset. If the line is in loopback mode, (“looped”) appears
after this field.
The previous example shows that after missing three keepalives, the line goes down and the interface is
reset. However, the interface is also reset when two keepalives are missed, but the line is not marked as
“down.” This is done in an attempt to restart traffic on the interface without bringing the line down, as
shown in the following output:
*Mar 18 08:07:29.057: Serial3/2: HDLC myseq 604562, mineseen 604562, yourseen 259336, line up
*Mar 18 08:07:39.053: Serial3/2: HDLC myseq 604563, mineseen 604563, yourseen 259337, line up
*Mar 18 08:07:49.081: Serial3/2: HDLC myseq 604564, mineseen 604564, yourseen 259338, line up
*Mar 18 08:07:59.057: Serial3/2: HDLC myseq 604565, mineseen 604565, yourseen 259339, line up
*Mar 18 08:08:09.073: Serial3/2: HDLC myseq 604566, mineseen 604565, yourseen 259340, line up
*Mar 18 08:08:19.057: Serial3/2: Reset from PC 0x6DEA0
*Mar 18 08:08:19.061: Serial3/2: HDLC myseq 604567, mineseen 604565, yourseen 259341, line up
*Mar 18 08:08:29.057: Serial3/2: HDLC myseq 604568, mineseen 604568, yourseen 259342, line up
*Mar 18 08:08:39.061: Serial3/2: HDLC myseq 604569, mineseen 604569, yourseen 259343, line up
*Mar 18 08:08:49.065: Serial3/2: HDLC myseq 604570, mineseen 604570, yourseen 259344, line up
*Mar 18 08:08:59.053: Serial3/2: HDLC myseq 604571, mineseen 604571, yourseen 259345, line up
Even though the “Reset from PC” message appears to occur when there is only a difference of 1 between
myseq and mineseen, this message applies to the condition shown in the immediately following line
(notice that the timestamp is only a few milliseconds later) where the difference is 2. After the reset, the
line has recovered and the difference between myseq and mineseen is zero.
Table 225 describes additional error messages that the debug serial interface command can generate
for HDLC.
Field Description
Illegal serial link type code Router attempted to send a packet containing an unknown packet
<xxx>, PC = 0xnnnnnn type.
Illegal HDLC serial type code Unknown packet type is received.
<xxx>, PC = 0xnnnnn
Serial 0: attempting to restart Interface is down. The hardware is then reset to correct the problem,
if possible.
Serial 0: Received bridge packet Bridge packet is received over a serial interface configured for
sent to <nnnnnnnnn> HDLC, and bridging is not configured on that interface.
This message indicates that the HSSI hardware has been reset. The 0xnnnnnnn variable is the address of
the routine requesting that the hardware be reset; this value is useful only to development engineers.
Table 226 debug serial interface Error Messages for ISDN Basic Rate
Message Description
BRI: D-chan collision Collision on the ISDN D channel has occurred; the software
will retry transmission.
Received SID Loss of Frame ISDN hardware has lost frame alignment. This usually
Alignment int. indicates a problem with the ISDN network.
Unexpected IMP int: ipr = 0xnn ISDN hardware received an unexpected interrupt. The 0xnn
variable indicates the value returned by the interrupt register.
BRI(d): RX Frame Length Violation. Any of these messages can be displayed when a receive error
Length=n occurs on one of the ISDN channels. The (d) indicates which
channel it is on. These messages can indicate a problem with
BRI(d): RX Nonoctet Aligned Frame
the ISDN network connection.
BRI(d): RX Abort Sequence
BRI(d): RX CRC Error
BRI(d): RX Overrun Error
BRI(d): RX Carrier Detect Lost
BRI0: Reset from 0xnnnnnnn BRI hardware has been reset. The 0xnnnnnnn variable is the
address of the routine that requested that the hardware be reset;
it is useful only to development engineers.
BRI(d): Bad state in SCMs scm1=x Any of these messages can be displayed if the ISDN hardware
scm2=x scm3=x is not in the proper state. The hardware is then reset. If the
message is displayed constantly, it usually indicates a
BRI(d): Bad state in SCONs scon1=x
hardware problem.
scon2 =x scon3=x
BRI(d): Bad state ub SCR; SCR=x
BRI(d): Illegal packet Packet is received, but the encapsulation used for the packet is
encapsulation=n not recognized. The interface might be misconfigured.
Table 227 debug serial interface Error Messages for an MK5025 Device
Message Description
MK5(d): Reset from 0xnnnnnnnn Hardware has been reset. The 0xnnnnnnn variable is the
address of the routine that requested that the hardware be reset;
it is useful only to development engineers.
MK5(d): Illegal packet Packet is received, but the encapsulation used for the packet is
encapsulation=n not recognized. Interface might be misconfigured.
MK5(d): No packet available for Serial driver attempted to get a buffer (memory) and was
packet realignment unable to do so.
MK5(d): Bad state in CSR0=(x) This message is displayed if the hardware is not in the proper
state. The hardware is reset. If this message is displayed
constantly, it usually indicates a hardware problem.
Table 227 debug serial interface Error Messages for an MK5025 Device (continued)
Message Description
MK5(d): New serial state=n Hardware has interrupted the software. It displays the state that
the hardware is reporting.
MK5(d): DCD is down. If the interrupt indicates that the state of carrier has changed,
MK5(d): DCD is up. one of these messages is displayed to indicate the current state
of DCD.
The following message indicates that SMDS was asked to encapsulate a packet, but no corresponding
destination E.164 SMDS address was found in any of the static SMDS tables or in the ARP tables:
SMDS send: Error in encapsulation, no hardware address, type = x
The following message indicates that a protocol such as Connectionless Network Service (CLNS) or IP
has been enabled on an SMDS interface, but the corresponding multicast addresses have not been
configured. The n variable displays the link type for which encapsulation was requested.
SMDS: Send, Error in encapsulation, type=n
The following messages can occur when a corrupted packet is received on an SMDS interface. The router
expected x, but received y.
SMDS: Invalid packet, Reserved NOT ZERO, x y
SMDS: Invalid packet, TAG mismatch x y
SMDS: Invalid packet, Bad TRAILER length x y
The following messages can indicate an invalid length for an SMDS packet:
SMDS: Invalid packet, Bad BA length x
SMDS: Invalid packet, Bad header extension length x
SMDS: Invalid packet, Bad header extension type x
SMDS: Invalid packet, Bad header extension value x
The following messages are displayed when the debug serial interface command is enabled:
Interface Serial 0 Sending SMDS L3 packet:
SMDS: dgsize:x type:0xn src:y dst:z
If the debug serial interface command is enabled, the following message can be displayed when a
packet is received on an SMDS interface, but the destination SMDS address does not match any on that
interface:
SMDS: Packet n, not addressed to us
Usage Guidelines The debug serial packet command generates output that is dependent on the type of serial interface and
the encapsulation running on that interface. The hardware platform also can impact debug serial packet
output.
The debug serial packet command displays output for only Switched Multimegabit Data Service
(SMDS) encapsulations.
Examples The following is sample output from the debug serial packet command when SMDS is enabled on the
interface:
Router# debug serial packet
As the output shows, when encapsulation is set to SMDS, the debug serial packet command displays
the entire SMDS header (in hexadecimal notation), and some payload data on transmit or receive. This
information is useful only when you have an understanding of the SMDS protocol. The first line of the
output indicates either Sending or Receiving.
debug service-module
To display debugging information that monitors the detection and clearing of network alarms on the
integrated channel service unit/data service unit (CSU/DSU) modules, use the debug service-module
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug service-module
no debug service-module
Usage Guidelines Use this command to enable and disable debug logging for the serial 0 and serial 1 interfaces when an
integrated CSU/DSU is present. This command enables debugging on all interfaces.
Network alarm status can also be viewed through the use of the show service-module command.
Note The debug output varies depending on the type of service module installed in the router.
Examples The following is sample output from the debug service-module command:
Router# debug service-module
Usage Guidelines Use this command only when the sgbp dial-bids command has been configured.
Examples The following is sample output from the debug sgbp dial-bids command:
Router# debug sgbp dial-bids
Usage Guidelines Enable the debug sgbp error command to enable the display of debug messages about routing problems
between members of a stack group.
Note In unusual cases you may see debug messages not documented on this command reference page. These
debug messages are intended for expert diagnostic interpretation by the Cisco Technical Assistance
Center (TAC).
Examples One common configuration error is setting a source IP address for a stack member that does not match
the locally defined IP address for the same stack member. The following debug output shows the error
message that results from this misconfiguration:
Systema# debug sgbp error
This error means that the source IP address of the Stack Group Bidding Protocol (SGBP) hello message
received from systemb does not match the IP address configured locally for systemb (through the sgbp
member command). Correct this configuaration error by going to systemb and checking for multiple
interfaces by which the SGBP hello can send the message.
Another common error message is:
Systema# debug sgbp error
This error message means that routerk is not defined locally, but is defined on another stack member.
Correct this configuration error by defining routerk across all members of the stack group using the sgbp
member command.
The following error message indicates that an SGBP peer is leaving the stack group:
Systema# debug sgbp error
This error message indicates that the peer systemc is leaving the stack group. Systemc could be leaving
the stack group intentionally, or a connectivity problem may exist.
The following error message indicates that an SGBP event was detected from an unknown peer:
Systema# debug sgbp error
An SGBP event came from a network host that was not recognizable as an SGBP peer. Check to see if a
network media error could have corrupted the address, or if peer equipment is malfunctioning to generate
corrupted packets. Depending on the network topology and firewalling of your network, SGBP packets
from a nonpeer host could indicate probing and attempts to breach security.
Caution If there is a chance your network is under attack, obtain knowledgeable assistance from TAC.
Usage Guidelines Enable the debug sgbp hellos command to enable the display of debug messages for authentication
between routers configured as members of a stack group.
Note In unusual cases you may see debug messages not documented on this command reference page. These
debug messages are intended for expert diagnostic interpretation by the Cisco Technical Assistance
Center (TAC).
Examples The following output from the debug sgbp hellos command shows systema sending a successful
Challenge Handshake Authentication Protocol (CHAP) challenge to and receiving a response from
systemb. Similarly, systemb sends out a challenge and receives a response from systema:
systema# debug sgbp hellos
This error message means that the remote systemb password for the stack group does not match the
password defined on systema. To correct this error, make sure that both systema and systemb have the
same password defined using the username command.
%SGBP-7-NORESP -Fail to respond to systemb group stack1, may not have password.
This error message means that systema does not have a username or password defined. To correct this
error, define a common group password across all stack members using the username command.
debug sgcp
To debug the Simple Gateway Control Protocol (SGCP), use the debug sgcp command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Examples See the following examples to enable and disable debugging at the specified level:
Router# debug sgcp errors
Syntax Description endpoint string (Optional) Specifies the endpoint string if you want to debug SGCP
errors for a specific endpoint.
On the Cisco MC3810 router, the endpoint string syntax takes the
following forms:
• DS1 endpoint: DS1-slot/port
• POTS endpoint: aaln/slot/port
On the Cisco 3600 router, the endpoint string syntax takes the
following forms:
• DS1 endpoint: slot/subunit/DS1-ds1 number/ds0 number
• POTS endpoint: aaln/slot/subunit/port
Examples The following example shows the debugging of SGCP errors being enabled:
Router# debug sgcp errors
The following example shows a debug trace for SGCP errors on a specific endpoint:
Router# debug sgcp errors endpoint DS1-0/1
Syntax Description endpoint string (Optional) Specifies the endpoint string if you want to debug SGCP
errors for a specific endpoint.
On the Cisco MC3810 router, the endpoint string syntax takes the
following forms:
• DS1 endpoint: DS1-slot/port
• POTS endpoint: aaln/slot/port
On the Cisco 3600 router, the endpoint string syntax takes the
following forms:
• DS1 endpoint: slot/subunit/DS1-ds1 number/ds0 number
• POTS endpoint: aaln/slot/subunit/port
Examples The following example shows a debug trace for SGCP events on a specific endpoint:
Router# debug sgcp events endpoint DS1-0/1
The following example shows a debug trace for all SGCP events on a gateway:
Router# debug sgcp events
*Mar 1 01:13:31.075:Unqueue msg from SGCP wait ack q** (0)[25]DS1 = 1, DS0 = 13
*Mar 1 01:13:33.786:Unqueue msg from SGCP wait ack q** (0)[26]DS1 = 1, DS0 = 13
v=0
c=IN IP4 5.0.0.1
m=audio 16400 RTP/AVP 0
v=0
c=IN IP4 5.0.0.1
m=audio 16400 RTP/AVP 0
v=0
c=IN IP4 5.0.0.1
m=audio 16400 RTP/AVP 0
*Mar 1 01:14:48.128:Unqueue msg from SGCP wait ack q** (0)[27]DS1 = 1, DS0 = 13
Syntax Description endpoint string (Optional) Specifies the endpoint string if you want to debug SGCP
errors for a specific endpoint.
On the Cisco MC3810, the endpoint string syntax takes the following
forms:
• DS1 endpoint: DS1-slot/port
• POTS endpoint: aaln/slot/port
On the Cisco 3600, the endpoint string syntax takes the following
forms:
• DS1 endpoint: slot/subunit/DS1-ds1 number/ds0 number
• POTS endpoint: aaln/slot/subunit/port
Examples The following example shows a debug trace for SGCP packets on a specific endpoint:
Router# debug sgcp packet endpoint DS1-0/1
The following example shows a debug trace for all SGCP packets on a gateway:
Router# debug sgcp packet
<---
200 22
<---
<---
200 23
v=0
c=IN IP4 5.0.0.1
m=audio 16538 RTP/AVP 0
<---
v=0
c=IN IP4 6.0.0.1
m=audio 16392 RTP/AVP 0
I:6
v=0
c=IN IP4 5.0.0.1
m=audio 16538 RTP/AVP 0
<---
v=0
c=IN IP4 6.0.0.1
m=audio 16392 RTP/AVP 0
v=0
c=IN IP4 5.0.0.1
m=audio 16538 RTP/AVP 0
<---
<---
200 24
<---
Syntax Description detail Indicates that in addition to a one-line description of the frame being
displayed, an entire hexadecimal dump of the frame will follow.
Usage Guidelines
Caution The debug snasw dlc command displays the same trace information available via the snasw dlctrace
command. The snasw dlctrace command is the preferred method for gathering this trace information
because it is written to a capture buffer instead of directly to the console. The debug snasw dlc command
should only be used when it is certain that the output will not cause excessive data to be output to the
console.
Examples The following is an example of the debug snasw dlc command output:
Router# debug snasw dlc
Sequence
Number Size of ISR/
Link SNA BTU HPR Description of frame
Usage Guidelines
Caution The debug snasw ips command displays the same trace information available via the snasw ipstrace
command. Output from this debug command can be large. The snasw ipstrace command is the preferred
method for gathering this trace information because it is written to a capture buffer instead of directly to
the console. The debug snasw ips command should only be used when it is certain that the output will
not cause excessive data to be output to the console. The debug snasw dlc command displays the same
trace information available via the snasw dlctrace command.
Examples The following is an example of the debug snasw ips command output:
Router# debug snasw ips
Sequence
Number Sending Receiving
Signal Name Process Process Queue
Examples The following is sample output from the debug snmp packet command. In this example, the router
receives a get-next request from the host at 172.16.63.17 and responds with the requested information.
Router# debug snmp packet
Based on the kind of packet sent or received, the output may vary. For get-bulk requests, a line similar
to the following is displayed:
SNMP: Get-bulk request, reqid 23584, nonrptr 10, maxreps 20
Field Description
Get-next request Indicates what type of SNMP protocol data unit (PDU) the packet is.
Possible types are as follows:
• Get request
• Get-next request
• Response
• Set request
• V1 Trap
• Get-bulk request
• Inform request
• V2 Trap
Depending on the type of PDU, the rest of this line displays different
fields. The indented lines following this line list the MIB object
names and corresponding values.
reqid Request identification number. This number is used by the SNMP
manager to match responses with requests.
errstat Error status. All PDU types other than response will have an errstat
of 0. If the agent encounters an error while processing the request, it
will set errstat in the response PDU to indicate the type of error.
erridx Error index. This value will always be 0 in all PDUs other than
responses. If the agent encounters an error, the erridx will be set to
indicate which varbind in the request caused the error. For example,
if the agent had an error on the second varbind in the request PDU,
the response PDU will have an erridx equal to 2.
nonrptr Nonrepeater value. This value and the maximum repetition value are
used to determine how many varbinds are returned. Refer to
RFC 1905 for details.
maxreps Maximum repetition value. This value and the nonrepeater value are
used to determine how many varbinds are returned. Refer to
RFC 1905 for details.
ent Enterprise object identifier. Refer to RFC 1215 for details.
gentrap Generic trap value. Refer to RFC 1215 for details.
spectrap Specific trap value. Refer to RFC 1215 for details.
Examples The following is sample output from the debug snmp requests command:
Router# debug snmp requests
Field Description
SNMP Manager API Indicates that the router sent an SNMP request.
dest Destination of the request.
community Community string sent with the request.
retries Number of times the request has been re-sent.
timeout Request timeout, or how long the router will wait before resending
the request.
mult Timeout multiplier. The timeout for a re-sent request will be equal to
the previous timeout multiplied by the timeout multiplier.
use session rtt Indicates that the average round-trip time of the session should be
used in calculating the timeout value.
userdata Internal Cisco IOS software data.
Examples The following is sample output from the debug sntp adjust command output when an offset to the time
reported by the configured NTP server is calculated. The offset indicates the difference between the
router time and the actual time (as kept by the server) and is displayed in milliseconds. The clock time
is then successfully changed to the accurate time by adding the offset to the current router time.
Router# debug sntp adjust
The following is sample output from the debug sntp adjust command when an offset to the time
reported by a broadcast server is calculated. Because the packet is a broadcast packet, no transmission
delay can be calculated. However, in this case, the offset is too large, so the clock is reset to the correct
time.
Router# debug sntp adjust
Examples The following is sample output from the debug sntp packets command when a message is received:
Router# debug sntp packets
The following is sample output from the debug sntp packets command when a message is sent:
Router# debug sntp packets
Field Description
length Length of the SNTP packet.
leap Indicates if a leap second will be added or subtracted.
mode Indicates the mode of the router relative to the server sending the packet.
version SNTP version number of the packet.
stratum Stratum of the server.
ppoll Peer polling interval.
rtdel Total delay along the path to the root clock.
rtdsp Dispersion of the root path.
refid Address of the server that the router is currently using for synchronization.
Field Description
ref Reference time stamp.
org Originate time stamp. This value indicates the time the request was sent by the
router.
rec Receive time stamp. This value indicates the time the request was received by the
SNTP server.
xmt Transmit time stamp. This value indicates the time the reply was sent by the SNTP
server.
inp Destination time stamp. This value indicates the time the reply was received by the
router.
Examples The following is sample output from the debug sntp select command. In this example, the router will
synchronize its time to the server at 172.16.186.66.
Router# debug sntp select
Examples The following is sample output from the debug source bridge output for peer bridges using TCP as a
transport mechanism. The remote source-route bridging (RSRB) network configuration has ring 2 and
ring 1 bridged together through remote peer bridges. The remote peer bridges are connected via a serial
line and use TCP as the transport mechanism.
Router# debug source bridge
The following line indicates that a remote explorer frame has been sent to IP address 192.108.250.1 and,
like all RSRB TCP connections, has been assigned port 1996. The bridge belongs to ring group 5. The
explorer frame originated from ring 2. The routing information field (RIF) descriptor has been generated
by the local station and indicates that the frame was sent out via bridge 1 onto virtual ring 5.
RSRB: remote explorer to 5/192.108.250.1/1996 srn 2 [C840.0021.0050.0000]
The following line indicates that a request for remote peer information has been sent to IP address
192.108.250.1, TCP port 1996. The bridge belongs to ring group 5.
RSRB: Version/Ring XReq sent to peer 5/192.108.250.1/1996
The following line is the response to the version request previously sent. The response is sent from IP
address 192.108.250.1, TCP port 1996. The bridge belongs to ring group 5.
RSRB: Received version reply from 5/192.108.250.1/1996 (version 2)
The following line is the response to the ring request previously sent. The response is sent from IP
address 192.108.250.1, TCP port 1996. The target ring number is 2, virtual ring number is 5, the offset
is 18, and the length of the frame is 10 bytes.
RSRB: DATA: 5/192.108.250.1/1996 Ring Xchg Rep, trn 2, vrn 5, off 0, len 10
The following line indicates that bridge 1 and ring 1 were added to the source-bridge table for IP address
192.108.250.1, TCP port 1996:
RSRB: added bridge 1, ring 1 for 5/192.108.250.1/1996
The following line indicates that a packet containing an explorer frame came across virtual ring 5 from
IP address 192.108.250.1, TCP port 1996. The packet is 69 bytes in length. This packet is received after
the Ring Exchange information was received and updated on both sides.
RSRB: DATA: 5/192.108.250.1/1996 Explorer trn 2, vrn 5, off 18, len 69
The following line indicates that a packet containing data came across virtual ring 5 from IP address
192.108.250.1 over TCP port 1996. The packet is being placed on the local target ring 2. The packet is
92 bytes in length.
RSRB: DATA: 5/192.108.250.1/1996 Forward trn 2, vrn 5, off 0, len 92
The following line indicates that a packet containing data is being forwarded to the peer that has IP
address 192.108.250.1 address belonging to local ring 2 and bridge 1. The packet is forwarded via virtual
ring 5. This packet is sent after the Ring Exchange information was received and updated on both sides.
RSRB: DATA: forward Forward srn 2, br 1, vrn 5 to peer 5/192.108.250.1/1996
The following is sample output from the debug source bridge command for peer bridges using direct
encapsulation as a transport mechanism. The RSRB network configuration has ring 1 and ring 2 bridged
together through peer bridges. The peer bridges are connected via a serial line and use TCP as the
transport mechanism.
Router# debug source bridge
The following line indicates that a remote explorer frame was sent to remote peer Serial1, which belongs
to ring group 5. The explorer frame originated from ring 1. The RIF descriptor 0011.0050 was generated
by the local station and indicates that the frame was sent out via bridge 1 onto virtual ring 5.
RSRB: remote explorer to 5/Serial1 srn 1 [C840.0011.0050.0000]
The following line indicates that a request for remote peer information was sent to Serial1. The bridge
belongs to ring group 5.
RSRB: Version/Ring XReq sent to peer 5/Serial1
The following line is the response to the version request previously sent. The response is sent from Serial
1. The bridge belongs to ring group 5 and the version is 2.
RSRB: Received version reply from 5/Serial1 (version 2)
The following line is the response to the ring request previously sent. The response is sent from Serial1.
The target ring number is 2, virtual ring number is 5, the offset is 0, and the length of the frame is 39
bytes.
RSRB: IFin: 5/Serial1 Ring Xchg Rep, trn 2, vrn 5, off 0, len 39
The following line indicates that bridge 1 and ring 1 were added to the source-bridge table for Serial1:
RSRB: added bridge 1, ring 1 for 5/Serial1
Usage Guidelines The debug source error command displays some output also found in the debug source bridge output.
See the debug source bridge command for other possible output.
Examples In all of the following examples of debug source error command messages, the variable number is the
Token Ring interface. For example, if the line of output starts with SRB1, the output relates to the Token
Ring 1 interface. SRB indicates a source-route bridging message. RSRB indicates a remote source-route
bridging message. SRTLB indicates a source-route translational bridging (SR/TLB) message.
In the following example, a packet of protocol protocol-type was dropped:
SRBnumber drop: Routed protocol protocol-type
In the following example, an Address Resolution Protocol (ARP) packet was dropped. ARP is defined
in RFC 826.
SRBnumber drop:TYPE_RFC826_ARP
In the following example, the current Cisco IOS version does not support Qualified Logical Link Control
(QLLC). Reconfigure the router with an image that has the IBM feature set.
RSRB: QLLC not supported in version version
Please reconfigure.
In the following example, the packet was dropped because the outgoing interface of the router was down:
RSRB IF: outgoing interface not up, dropping packet
In the following example, the router received an out-of-sequence IP sequence number in a Fast
Sequenced Transport (FST) packet. FST has no recovery for this problem like TCP encapsulation does.
RSRB FST: bad sequence number dropping.
In the following example, the router was unable to locate the virtual interface:
RSRB: couldn't find virtual interface
In the following example, the TCP queue of the peer router is full. TCPD indicates that this is a TCP
debug.
RSRB TCPD: tcp queue full for peer
In the following example, the router was unable to send data to the peer router. A result of 1 indicates
that the TCP queue is full. A result of —1 indicates that the RSRB peer is closed.
RSRB TCPD: tcp send failed for peer result
In the following example, the routing information identifier (RII) was not set in the explorer packet going
forward. The packet will not support SRB, so it is dropped.
vrforward_explorer - RII not set
In the following example, a packet sent to a virtual bridge in the router did not include a routing
information field (RIF) to tell the router which route to use:
RSRB: no RIF on packet sent to virtual bridge
The following example indicates that the RIF did not contain any information or the length field was set
to zero:
RSRB: RIF length of zero sent to virtual bridge
The following message occurs when the local service access point (LSAP) is out of range. The variable
lsap-out is the value, type is the type of RSRB peer, and state is the state of the RSRB peer.
VRP: rsrb_lsap_out = lsap-out, type = type, state = state
In the following message, the router is unable to find another router with which to exchange bridge
protocol data units (BPDUs). BPDUs are exchanged to set up the spanning tree and determine the
forwarding path.
RSRB(span): BPDU's peer not found
Usage Guidelines Some of the output from the debug source bridge and debug source error commands is identical to the
output of this command.
Note In order to use the debug source event command to display traffic source-routed through an interface,
you first must disable fast switching of SRB frames with the no source bridge route-cache interface
configuration command.
Examples The following is sample output from the debug source event command:
Router# debug source event
Field Description
RSRB0: Indication that this routing information field (RIF) cache entry is for the
Token Ring interface 0, which has been configured for remote
source-route bridging (SRB). (SRB1, in contrast, would indicate that this
RIF cache entry is for Token Ring 1, configured for SRB.)
forward Forward (normal data) packet, in contrast to a control packet containing
proprietary Cisco bridging information.
srn 5 Ring number of the source ring of the packet.
Field Description
bn 1 Bridge number of the bridge this packet traverses.
trn 10 Ring number of the target ring of the packet.
src: 8110.2222.33c1 Source address of the route in this RIF cache entry.
dst: 1000.5a59.04f9 Destination address of the route in this RIF cache entry.
[0800.3201.00A1.0050] RIF string in this RIF cache entry.
In the following example messages, SRBnumber or RSRBnumber denotes a message associated with
interface Token Ring number. A number of 99 denotes the remote side of the network.
SRBnumber: no path, s: source-MAC-addr d: dst-MAC-addr rif: rif
In the preceding example, a bridgeable packet came in on interface Token Ring number but there was
nowhere to send it. This is most likely a configuration error. For example, an interface has source
bridging turned on, but it is not connected to another source bridging interface or a ring group.
In the following example, a bridgeable packet has been forwarded from Token Ring number to the target
ring. The two interfaces are directly linked.
SRBnumber: direct forward (srn ring bn bridge trn ring)
In the following examples, a proxy explorer reply was not generated because the address could not be
reached from this interface. The packet came from the node with the first address.
SRBnumber: br dropped proxy XID, address for address, wrong vring (rem)
SRBnumber: br dropped proxy TEST, address for address, wrong vring (rem)
SRBnumber: br dropped proxy XID, address for address, wrong vring (local)
SRBnumber: br dropped proxy TEST, address for address, wrong vring (local)
SRBnumber: br dropped proxy XID, address for address, no path
SRBnumber: br dropped proxy TEST, address for address, no path
In the following example, an appropriate proxy explorer reply was generated on behalf of the second
address. It is sent to the first address.
SRBnumber: br sent proxy XID, address for address[rif]
SRBnumber: br sent proxy TEST, address for address[rif]
The following example indicates that the broadcast bits were not set, or that the routing information
indicator on the packet was not set:
SRBnumber: illegal explorer, s: source-MAC-addr d: dst-MAC-addr rif: rif
The following example indicates that the direction bit in the RIF field was set, or that an odd packet
length was encountered. Such packets are dropped.
SRBnumber: bad explorer control, D set or odd
The following example indicates that a spanning explorer was dropped because the spanning option was
not configured on the interface:
SRBnumber: span dropped, input off, s: source-MAC-addr d: dst-MAC-addr rif: rif
The following example indicates that a spanning explorer was dropped because it had traversed the ring
previously:
SRBnumber: span violation, s: source-MAC-addr d: dst-MAC-addr rif: rif
The following example indicates that an explorer was dropped because the maximum hop count limit
was reached on that interface:
SRBnumber: max hops reached - hop-cnt, s: source-MAC-addr d: dst-MAC-addr rif: rif
The following example indicates that the ring exchange request was sent to the indicated peer. This
request tells the remote side which rings this node has and asks for a reply indicating which rings that
side has.
RSRB: sent RingXreq to ring-group/ip-addr
The following example indicates that a message was sent to the remote peer. The label variable can be
AHDR (active header), PHDR (passive header), HDR (normal header), or DATA (data exchange), and
op can be Forward, Explorer, Ring Xchg, Req, Ring Xchg, Rep, Unknown Ring Group, Unknown Peer,
or Unknown Target Ring.
RSRB: label: sent op to ring-group/ip-addr
The following example indicates that the remote bridge and ring pair were removed from or added to the
local ring group table because the remote peer changed:
RSRB: removing bn bridge rn ring from ring-group/ip-addr
RSRB: added bridge bridge, ring ring for ring-group/ip-addr
The following example shows miscellaneous remote peer connection establishment messages:
RSRB: peer ring-group/ip-addr closed [last state n]
RSRB: passive open ip-addr(remote port) -> local port
RSRB: CONN: opening peer ring-group/ip-addr, attempt n
RSRB: CONN: Remote closed ring-group/ip-addr on open
RSRB: CONN: peer ring-group/ip-addr open failed, reason[code]
The following example shows that an explorer packet was propagated onto the local ring from the remote
ring group:
RSRBn: sent local explorer, bridge bridge trn ring, [rif]
The following messages indicate that the RSRB code found that the packet was in error:
RSRBn: ring group ring-group not found
RSRBn: explorer rif [rif] not long enough
The following example indicates that a buffer could not be obtained for a ring exchange packet (this is
an internal error):
RSRB: couldn’t get pak for ringXchg
The following example indicates that a ring exchange packet was received that had an incorrect length
(this is an internal error):
RSRB: XCHG: req/reply badly formed, length pak-length, peer peer-id
The following example indicates that a ring entry was removed for the peer; the ring was possibly
disconnected from the network, causing the remote router to send an update to all its peers.
RSRB: removing bridge bridge ring ring from peer-id ring-type
The following example indicates that a ring entry was added for the specified peer; the ring was possibly
added to the network, causing the other router to send an update to all its peers.
RSRB: added bridge bridge, ring ring for peer-id
The following example indicates that no memory was available to add a ring number to the ring group
specified (this is an internal error):
RSRB: no memory for ring element ring-group
The following example indicates that memory was corrupted for a connection block (this is an internal
error):
RSRB: CONN: corrupt connection block
The following example indicates that a connector process started, but that there was no packet to process
(this is an internal error):
RSRB: CONN: warning, no initial packet, peer: ip-addr peer-pointer
The following example indicates that a packet was received with a version number different from the one
pre-sent on the router:
RSRB: IF New version. local=local-version, remote=remote-version,pak-op-code peer-id
The following example indicates that a packet with a bad op code was received for a direct encapsulation
peer (this is an internal error):
RSRB: IFin: bad op op-code (op code string) from peer-id
The following example indicates that the virtual ring header will not fit on the packet to be sent to the
peer (this is an internal error):
RSRB: vrif_sender, hdr won't fit
The following example indicates that the specified peer is being opened. The retry count specifies the
number of times the opening operation is attempted.
RSRB: CONN: opening peer peer-id retry-count
The following example indicates that the router, configured for FST encapsulation, received a version
reply to the version request packet it had sent previously:
RSRB: FST Rcvd version reply from peer-id (version version-number)
The following example indicates that the router, configured for FST encapsulation, sent a version request
packet to the specified peer:
RSRB: FST Version Request. op = opcode, peer-id
The following example indicates that the router received a packet with a bad op code from the specified
peer (this is an internal error):
RSRB: FSTin: bad op opcode (op code string) from peer-id
The following example indicates that the TCP connection between the router and the specified peer is
being aborted:
RSRB: aborting ring-group/peer-id (vrtcpd_abort called)
The following example indicates that an attempt to establish a TCP connection to a remote peer timed
out:
RSRB: CONN: attempt timed out
The following example indicates that a packet was dropped because the ring group number in the packet
did not correlate with the ring groups configured on the router:
RSRBnumber: ring group ring-group not found
debug span
To display information on changes in the spanning-tree topology when debugging a transparent bridge,
use the debug span command in privileged EXEC mode. To disable debugging output, use the no form
of this command.
debug span
no debug span
Usage Guidelines This command is useful for tracking and verifying that the spanning-tree protocol is operating correctly.
Examples The following is sample output from the debug span command for an IEEE bridge protocol data unit
(BPDU) packet:
Router# debug span
Field Description
ST: Indication that this is a spanning tree packet.
Ether4 Interface receiving the packet.
(A) 0000 Indication that this is an IEEE BPDU packet.
(B) 00 Version.
(C) 00 Command mode:
• 00 indicates config BPDU.
• 80 indicates the Topology Change Notification (TCN) BPDU.
(D) 00 Topology change acknowledgment:
• 00 indicates no change.
• 80 indicates a change notification.
(E) 000A Root priority.
Field Description
(F) 080002A02D67 Root ID.
(G) 00000000 Root path cost (0 means the sender of this BPDU packet is the root
bridge).
(H) 000A Bridge priority.
(I) 080002A02D67 Bridge ID.
(J) 80 Port priority.
(K) 01 Port Number 1.
(L) 0000 Message age in 256ths of a second (0 seconds, in this case).
(M) 1400 Maximum age in 256ths of a second (20 seconds, in this case).
(N) 0200 Hello time in 256ths of a second (2 seconds, in this case).
(O) 0F00 Forward delay in 256ths of a second (15 seconds, in this case).
The following is sample output from the debug span command for a DEC BPDU packet:
Router# debug span
Table 233 debug span Field Descriptions for a DEC BPDU Packet
Field Description
ST: Indication that this is a spanning tree packet.
Ethernet4 Interface receiving the packet.
(A) E1 Indication that this is a DEC BPDU packet.
(B) 19 Indication that this is a DEC hello packet. Possible values are as
follows:
• 0x19—DEC Hello
• 0x02—TCN
(C) 01 DEC version.
(D) 00 Flag that is a bit field with the following mapping:
• 1—TCN
• 2—TCN acknowledgment
• 8—Use short timers
(E) 0002 Root priority.
(F) 00000C01A2C9 Root ID (MAC address).
Table 233 debug span Field Descriptions for a DEC BPDU Packet (continued)
Field Description
(G) 0064 Root path cost (translated as 100 in decimal notation).
(H) 0080 Bridge priority.
(I) 00000C0106CE Bridge ID.
(J) 0A Port ID (in contrast to interface number).
(K) 01 Message age (in seconds).
(L) 05 Hello time (in seconds).
(M) 0F Maximum age (in seconds).
(N) 1E Forward delay (in seconds).
(O) 6A Not applicable.
To initiate Signaling System 7 (SS7) Message Transfer Part Level 1 (MTP1) debugging, enter the debug
ss7 mtp1 command in global configuration mode during a low-traffic period. To disable debugging
output, use the no form of this command.
debug ss7 mtp1 [mtp2 | ipc | link-state | oir | rx | scc-regs | siram | tdm-info | tx]
Usage Guidelines The following debug commands are not used in this release:
• debug ss7 mtp1 rx
• debug ss7 mtp1 tx
• debug ss7 mtp1 scc-regs
• debug ss7 mtp1 siram
Examples To turn on message tracing between the host processor and the trunk firmware for each trunk card
inserted, use the debug ss7 mtp1 ipc command.
For example, there is a digital link in slot 7, trunk 0, channel-group 0 (therefore, timeslot 1). When you
enter show ss7 mtp1 links, the following output is displayed:
Router# show ss7 mtp1 links
session
interface type SCC state channel
--------- -------- --- ------------ -------
7/0:0 digital 7/3 STOPPED 0
Notice that the link is stopped in this example. Enter the following commands:
Router# debug ss7 mtp1 ipc
Router# configure terminal
Router(config)# interface serial 7/0:0
Router(config-if)# no shutdown
Router(config-if)# end
In this case, the output means that for the SS7 link that is using SCC3 on the trunk card in slot 7 (link
7/0:0), the host processor has told the board firmware to STOP then START.
To show low-level (MTP1) state changes for the internal state-machine implemented for each SS7 link,
use the debug ss7 mtp1 link-state command. The following output shows the different MTP1 states link
Serial 7/0:0 goes through during shutdown, no shutdown, and debug.
For example, if you stopped the SS7 link 7/0:0 (shutdown), then restarted it (no shutdown), you could
see MTP1 state changes by enabling debugging, as follows:
Router# debug ss7 mtp1 link-state
Router# configure terminal
Router(config)# interface serial 7/0:0
Router(config-if)# shutdown
01:02:20:%TRUNK_SERIAL-3-STATE_GENERIC:
At ../src-7k-as5400/as5400_ss7_link.c:511 [Serial7/0:0]:STOP:
STARTED -> STOP_PENDING
ss7_link_ll_stop 7/0:0:Tx shadow ring has
0 unsent buffers
01:02:20:%TRUNK_SERIAL-3-STATE_GENERIC:
At ../src-7k-as5400/as5400_ss7_link.c:1010 [Serial7/0:0]: FW_STOPPED:
STOP_PENDING -> STOPPED
01:02:26:%TRUNK_SERIAL-3-STATE_GENERIC:
At ../src-7k-as5400/as5400_ss7_link.c:1417 [Serial7/0:0]: START:
STOPPED -> START_PENDING
01:02:26:%TRUNK_SERIAL-3-STATE_GENERIC:
At ../src-7k-as5400/as5400_ss7_link.c:1164 [Serial7/0:0]: STOP_START:
START_PENDING -> STOP_START_PENDING
ss7_link_ll_stop 7/0:0:Tx shadow ring has 0 unsent buffers
01:02:26:%TRUNK_SERIAL-3-STATE_GENERIC:
At ../src-7k-as5400/as5400_ss7_link.c:1010 [Serial7/0:0]: FW_STOPPED:
STOP_START_PENDING -> START_PENDING
01:02:26:%TRUNK_SERIAL-3-STATE_GENERIC:
At ../src-7k-as5400/as5400_ss7_link.c:1234 [Serial7/0:0]: FW_STARTED:
START_PENDING -> STARTED
To show detailed information about how TDM timeslots on the DFC trunk card on the host backplane
are allocated and deallocated based on link configuration activity, use the debug ss7 mtp1 tdm-info
command.
For example, if you wanted to create a digital SS7 link on timeslot 1 of trunk 0 for an 8PRI board in slot
7, and you would like to see traces of the TDM resources allocated, you would enable TDM debugging
using the debug ss7 mtp1 tdm-info command then create the new SS7 link as described above, as in the
following example:
05:26:55:
05:26:55:TDM(PRI:0x28002000):Close PRI framer st0 ch4
05:26:55:<<< tdm_allocate_bp_ts(ss7_ch) SUCCEEDED >>>
debug ss7 mtp2 [aerm | backhaul | cong | iac | lsc | lssu | msu | packet [all] | rcv | suerm | timer |
txc][channel]
Syntax Description aerm (Optional) Initiates alignment Error Rate Monitor events.
backhaul (Optional) Initiates trace backhaul control messages. The channel argument
represents a logical channel number. Valid values are from 0 to 3.
cong (Optional) Initiates congestion Control events.
iac (Optional) Initiates initial Alignment Control events.
lsc (Optional) Initiates Link State Control events.
lssu (Optional) Initiates trace backhaul LSSU messages.
msu (Optional) Initiates trace backhaul MSU messages (use during low traffic
only).
packet [all] (Optional) Initiates low-level MTP2 packet tracing. If you do not specify a
channel number or enter the all keyword, the command displays information for
channel 0.
rcv (Optional) Displays information about SS7 MTP2 receiver state machine
events and transitions.
suerm (Optional) Displays information about SS7 MTP2 Signal Unit Error Rate
Monitor (SUERM) state machine events and transitions.
timer (Optional) Displays information about SS7 MTP2 timer starts and stops.
txc (Optional) Displays information about SS7 MTP2 transmit state machine
events and transitions.
channel (Optional) The channel argument represents a logical channel number. Valid
values are from 0 to 3.
Usage Guidelines If you do not specify a channel number with each keyword, the command displays information for
channel 0.
Examples The following is an example of debug ss7 mtp2 aerm command output. See the MTP2 specification
tables for details:
Router# debug ss7 mtp2 aerm 0
The following is an example of debug ss7 mtp2 backhaul command output for channel 0:
Router# debug ss7 mtp2 backhaul 0
*Mar 1 03:08:04.433: MTP2: send Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO
*Mar 1 03:08:04.433: MTP2: send LSC Ind ch=0 event=0x8-lost link alignment cause=0x0
*Mar 1 03:08:08.721: MTP2: rcvd Conn Req - Normal ch=0
*Mar 1 03:08:10.311: MTP2: rcvd Statistics Req-Send&Reset ch=0
*Mar 1 03:08:10.311: MTP2: send Stats Cfm ch=0
*Mar 1 03:08:20.440: MTP2: send Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO
*Mar 1 03:08:20.444: MTP2: send LSC Ind ch=0 event=0x8-lost link alignment cause=0x0
*Mar 1 03:08:24.719: MTP2: rcvd Conn Req - Normal ch=0
*Mar 1 03:08:36.438: MTP2: send Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO
*Mar 1 03:08:36.438: MTP2: send LSC Ind ch=0 event=0x8-lost link alignment cause=0x0
*Mar 1 03:08:40.312: MTP2: rcvd Statistics Req-Send&Reset ch=0
*Mar 1 03:08:40.312: MTP2: send Stats Cfm ch=0
*Mar 1 03:08:40.721: MTP2: rcvd Conn Req - Normal ch=0
*Mar 1 03:08:52.444: MTP2: send Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO
*Mar 1 03:08:52.444: MTP2: send LSC Ind ch=0 event=0x8-lost link alignment cause=0x0
*Mar 1 03:08:56.719: MTP2: rcvd Conn Req - Normal ch=0
*Mar 1 03:09:08.438: MTP2: send Disc Ind ch=0 reason=0x14-T2 expired waiting for SIO
*Mar 1 03:09:08.438: MTP2: send LSC Ind ch=0 event=0x8-lost link alignment cause=0x0
The following is an example of debug ss7 mtp2 cong command output. See the MTP2 specification
tables for details:
Router# debug ss7 mtp2 cong 0
The following is an example of debug ss7 mtp2 iac command output. See the MTP2 specification tables
for details:
Router# debug ss7 mtp2 iac 0
The following is an example of debug ss7 mtp2 lsc command output. See the MTP2 specification tables
for details:
Router# debug ss7 mtp2 lsc 0
The following is an example of debug ss7 mtp2 msu command output for channel 2. The output for this
command can slow traffic under busy conditions, so enter it when there is low traffic. See the MTP2
specification tables for details about the command output:
Router# debug ss7 mtp2 msu 2
Caution Use this command only for testing problems in a controlled environment. This command can generate
significant amounts of output. If there is any significant amount of traffic flow when you issue the
command, the processor may slow down so much that RUDP connections fail. This command is
recommended for field support personnel only, and is not recommended for use without prior
recommendation from Cisco.
The following is an example of debug ss7 mtp2 packet command output for channel 0:
Router# debug ss7 mtp2 packet 0
The following is an example of debug ss7 mtp2 rcv command output. See the MTP2 specification tables
for details:
Router# debug ss7 mtp2 rcv 0
The following is an example of debug ss7 mtp2 suerm command output. See the MTP2 specification
tables for details:
Router# debug ss7 mtp2 suerm 0
Caution Use this command only for testing problems in a controlled environment. This command can generate
significant amounts of output. If there is any significant amount of traffic flow when you issue the
command, the processor may slow down so much that RUDP connections fail. This command is
recommended for field support personnel only, and is not recommended for use without prior
recommendation from Cisco.
The following is an example of debug ss7 mtp2 timer command output for channel 0:
Router# debug ss7 mtp2 timer 0
Caution Use this command only for testing problems in a controlled environment. This command can generate
significant amounts of output. If there is any significant amount of traffic flow when you issue the
command, the processor may slow down so much that RUDP connections fail. This command is
recommended for field support personnel only, and is not recommended for use without prior
recommendation from Cisco.
The following is an example of debug ss7 mtp2 txc command output for channel 2. The transmission
control is functioning and updating backward sequence numbers (BSNs). See the MTP2 specification
for details:
Router# debug ss7 mtp2 txc 2
The following MTP2 specification tables explain codes that appear in the command output.
debug ss7 sm
To display debugging messages for an Signaling System 7 (SS7) Session Manager, use the debug ss7
sm command in privileged EXEC mode. To disable debugging output, use the no form of this command.
Usage Guidelines Use this command to watch the Session Manager and Reliable User Data Protocol (RUDP) sessions. The
Session Manager is responsible for establishing the RUDP connectivity to the Virtual Switch Controller
(VSC).
Support for up to four Session Manager sessions was added. Session Manager sessions are now
numbered 0 to 3. This feature changes the CLI syntax, and adds sessions 2 and 3.
Examples The following is an example of debug ss7 sm command output using the session keyword. The Session
Manager has established the connection (RUDP_CONN_OPEN_SIG) for session 3.
Router# debug ss7 sm session 3
The following is an example of debug ss7 sm session command output for session 0. The Session
Manager has established the connection (RUDP_CONN_OPEN_SIG):
Router# debug ss7 sm session 0
debug sse
To display information for the silicon switching engine (SSE) processor, use the debug sse command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug sse
no debug sse
Usage Guidelines Use the debug sse command to display statistics and counters maintained by the SSE.
Examples The following is sample output from the debug sse command:
Router# debug sse
The following line indicates that the SSE cache is being updated due to a change in the IP fast-switching
cache:
SSE: IP number of cache entries changed 273 274
The following line indicates that bridging functions were enabled on the SSE:
SSE: bridging enabled
The following lines indicate that the SSE is now loaded with information about the interfaces:
SSE: interface Ethernet0/0 icb 0x30 addr 0x29 status 0x21A040 protos 0x11
SSE: interface Ethernet0/1 icb 0x33 addr 0x29 status 0x21A040 protos 0x11
SSE: interface Ethernet0/2 icb 0x36 addr 0x29 status 0x21A040 protos 0x10
SSE: interface Ethernet0/3 icb 0x39 addr 0x29 status 0x21A040 protos 0x11
SSE: interface Ethernet0/4 icb 0x3C addr 0x29 status 0x21A040 protos 0x10
SSE: interface Ethernet0/5 icb 0x3F addr 0x29 status 0x21A040 protos 0x11
SSE: interface Hssi1/0 icb 0x48 addr 0x122 status 0x421E080 protos 0x11
The following line indicates that the SSE took 316 ms of processor time to update the SSE cache. The
value of 320 ms represents the total time elapsed while the cache updates were performed.
SSE: cache update took 316ms, elapsed 320ms
Usage Guidelines Use this command to show error messages for the control modules. These modules include all those that
manage the user authentication and service login and logout (RADIUS, PPP, Subblock, and Accounting).
An error message is the result of an error detected during normal execution.
Examples The following output is generated by using the debug ssg ctrl-errors command when a host logs in to
and logs out of a service:
Router# debug ssg ctrl-errors
Usage Guidelines This command displays event messages for the control modules, which include all modules that manage
the user authentication and service login and logout (RADIUS, PPP, Subblock, and Accounting). An
event message is an informational message generated during normal execution.
Examples The following output is generated by the debug ssg ctrl-events command when a host logs in to a
service:
Router# debug ssg ctrl-events
Usage Guidelines Use this command to show packet messages for the control modules. These modules include all those
that manage the user authentication and service login and logout (RADIUS, PPP, Subblock, and
Accounting). A packet message displays the contents of a package.
Examples The following output is generated by using the debug ssg ctrl-packets command when a host logs out
of a service:
Router# debug ssg ctrl-packets
Usage Guidelines The debug ssg data command shows packets for the data modules. These modules include all those that
forward data packets (Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS),
tunneling, fast switching, IP stream, and multicast).
Examples The following output is generated by using the debug ssg data command when a host logs in to and out
of a service:
Router# debug ssg data
Usage Guidelines The debug ssg data-nat command displays packets for the data modules. These modules include all
those that forward NAT data packets.
Examples The following output is generated by using the debug ssg data-nat command when a host logs in to and
out of a service:
Router# debug ssg data-nat
Usage Guidelines The debug ssg errors command displays error messages for the system modules, which include the basic
Cisco IOS and other support modules (such as Object Model, Timeout, and Initialization). An error
message is the result of an error detected during normal execution.
Examples The following output is generated by using the debug ssg errors command when a PPP over Ethernet
(PPPoE) client logs in with an incorrect password:
Router# debug ssg errors
Usage Guidelines The debug ssg events command displays event messages for the system modules, which include the
basic Cisco IOS modules and other support modules (such as Object Model, Timeout, and Initialization).
An event message is an informational message that appears during normal execution.
Examples The following output is generated by using the debug ssg events command when a PPP over Ethernet
(PPPoE) client logs in with the username “username” and the password “cisco”:
Router# debug ssg events
Usage Guidelines The debug ssg packets command displays packet messages for the system modules, which include the
basic Cisco IOS and other support modules (such as Object Model, Timeout, Initialization). A packet
message displays the contents of a package.
Examples The following output is generated by using the debug ssg packets command when a user is running a
Telnet session to 192.168.250.12 and pinging 192.168.250.11:
Router# debug ssg packets
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12)
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12)
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi3:172.16.17.72->192.168.250.12)
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12)
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12)
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi2:172.16.17.71->192.168.250.12)
19:46:03:SSG-DATA:PS-UP-SetPakOutput=1(Vi3:172.16.17.72->192.168.250.11)
Syntax Description events Displays messages for port-map events: create and remove.
packets Displays port-map packet contents and port address translations.
Usage Guidelines This command displays debugging messages for the creation of port maps.
Examples Using the debug ssg port-map command generates the following output when a subscriber logs in to a
service:
Router# debug ssg port-map events
SSG:
SSG port-map events debugging is on
Router#
00:46:09:SSG-PMAP:Changing state of port-bundle 70.13.60.3:65 from FREE to RESERVED
00:46:09:SSG-PMAP:Changing state of port-bundle 70.13.60.3:65 from RESERVED to INUSE
00:46:10:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2, changed state to
up
Router#
00:46:25:SSG-PMAP:Allocating new port-mapping:[4148<->1040] for port-bundle 70.13.60.3:65
00:46:29:SSG-PMAP:Allocating new port-mapping:[4149<->1041] for port-bundle 70.13.60.3:65
00:46:31:SSG-PMAP:Allocating new port-mapping:[4150<->1042] for port-bundle 70.13.60.3:65
00:46:31:SSG-PMAP:Allocating new port-mapping:[4151<->1043] for port-bundle 70.13.60.3:65
00:46:31:SSG-PMAP:Allocating new port-mapping:[4152<->1044] for port-bundle 70.13.60.3:65
Syntax Description packet Displays redirection information and any changes made to a packet when it
is due for redirection.
error Displays any SSG TCP redirect errors.
event Displays any major SSG TCP redirect events or state changes.
Usage Guidelines Use this command to turn on debug information for the SSG TCP Redirect for Services feature. Use the
packet keyword to display redirection information and any changes made to a packet when it is due for
redirection. Use the error keyword to display any SSG TCP redirect errors. Use the event keyword to
display any major SSG TCP redirect events or state changes.
Examples The following example shows how to display redirection information and any changes made to a packet
when it is due for redirection:
Router# debug ssg tcp-redirect packet
Direction of the packet “-Up” indicates upstream packets from an SSG user, while “-Down” indicates
downstream packets sent to a user:
07:13:15:SSG-REDIR-PKT:-Up:unauthorised user at 111.0.0.2 redirected to 9.2.36.253,8080
The following example shows how to display any SSG TCP redirect errors:
Router# debug ssg tcp-redirect error
The following example shows how to display any major SSG TCP redirect events or state changes:
Router# debug ssg tcp-redirect event
Examples The following is sample output of several Subscriber Service Switch (SSS) debug commands including
the debug sss aaa authorization event command. The reports from these commands should be sent to
technical personnel at Cisco Systems for evaluation.
Router# debug sss event
Router# debug sss error
Router# debug sss state
Router# debug sss aaa authorization event
Router# debug sss aaa authorization fsm
SSS:
SSS events debugging is on
SSS error debugging is on
SSS fsm debugging is on
SSS AAA authorization event debugging is on
SSS AAA authorization FSM debugging is on
Examples The following example shows how to enter this command. See the “Examples” section of the debug sss
aaa authorization event command page for an example of output.
Router# debug sss aaa authorization fsm
Examples The following example shows how to enter this command. See the “Examples” section of the debug sss
aaa authorization event command page for an example of output.
Router# debug sss error
Examples The following example shows how to enter this command. See the “Examples” section of the debug sss
aaa authorization event command page for an example of output.
Router# debug sss event
Examples The following example shows how to enter this command. See the “Examples” section of the debug sss
aaa authorization event command page for an example of output.
Router# debug sss fsm
debug standby
To display Hot Standby Protocol (HSP) state changes, use the debug standby command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug standby
no debug standby
Usage Guidelines The debug standby command displays Hot Standby Protocol state changes and debugging information
regarding transmission and receipt of Hot Standby Protocol packets. Use this command to determine
whether hot standby routers recognize one another and take the proper actions.
Examples The following is sample output from the debug standby command:
Router# debug standby
Field Description
SB Abbreviation for “standby.”
Ethernet0 Interface on which a Hot Standby packet was sent or received.
Hello in Hello packet received from the specified IP address.
Hello out Hello packet sent from the specified IP address.
pri Priority advertised in the hello packet.
hel Hello interval advertised in the hello packet.
hol Hold-down interval advertised in the hello packet.
ip address Hot Standby group IP address advertised in the hello packet.
state Transition from one state to another.
Coup out address Coup packet sent by the router from the specified IP address.
The following line indicates that the router is initiating the Hot Standby Protocol. The standby ip
interface configuration command enables Hot Standby.
SB: Starting up hot standby process
The following line indicates that a state transition occurred on the interface:
SB: Ethernet0 state Listen -> Speak
Usage Guidelines You can filter the debug output using interface and HSRP group conditional debugging. To enable
interface conditional debugging, use the debug condition interface command. To enable HSRP
conditional debugging, use the debug condition standby command.
Usage Guidelines You can filter the debug output using interface and HSRP group conditional debugging. To enable
interface conditional debugging, use the debug condition interface command. To enable HSRP
conditional debugging, use the debug condition standby command.
Examples The following example enables the display of all HSRP events:
Router# debug standby events all
Usage Guidelines This command helps you determine whether HSRP is filtering an outgoing ICMP redirect message.
Examples The following is sample output from the debug standby events icmp command:
Router# debug standby events icmp
10:35:20: SB: changing ICMP redirect sent to 20.0.0.4 for dest 30.0.0.2
10:35:20: SB: gw 20.0.0.2 -> 20.0.0.12, src 20.0.0.11
10:35:20: SB: Use HSRP virtual address 20.0.0.11 as ICMP src
If the router being redirected to is passive (HSRP enabled but no active groups), the following debugging
message is displayed:
10:41:22: SB: ICMP redirect not sent to 20.0.0.4 for dest 40.0.0.3
10:41:22: SB: 20.0.0.3 does not contain an active HSRP group
If HSRP could not uniquely determine the gateway used by the host, then the following message is
displayed:
10:43:08: SB: ICMP redirect not sent to 20.0.0.4 for dest 30.0.0.2
10:43:08: SB: could not uniquely determine IP address for mac 00d0.bbd3.bc22
The following messages are also displayed if the debug ip icmp command is enabled, in which case the
message prefix is changed:
10:39:09: ICMP: HSRP changing redirect sent to 20.0.0.4 for dest 30.0.0.2
10:39:09: ICMP: gw 20.0.0.2 -> 20.0.0.12, src 20.0.0.11
10:39:09: ICMP: Use HSRP virtual address 20.0.0.11 as ICMP src
10:39:09: ICMP: redirect sent to 20.0.0.4 for dest 30.0.0.2, use gw 20.0.0.12
debug standby packets [[all | terse] | [hsrp | coup | hello | resign]] [detail]
Usage Guidelines You can filter the debug output using interface and HSRP group conditional debugging. To enable
interface conditional debugging, use the debug condition interface command. To enable HSRP
conditional debugging, use the debug condition standby command.
Examples The following example enables the display of all HSRP packets:
Router# debug standby packets all
Syntax Description group (Optional) A decimal integer assigned to a group. Using this option
limits output to packets associated with the specified STUN group.
address (Optional) The output is further limited to only those packets
containing the specified STUN address. The address argument is in
the appropriate format for the STUN protocol running for the
specified group.
Usage Guidelines Because using this command is processor intensive, it is best to use it after regular business hours, rather
than in a production environment. It is also best to turn this command on by itself, rather than use it in
conjunction with other debug commands.
Examples The following is sample output from the debug stun packet command:
Table 235 describes the significant fields in this line of debug stun packet output.
Field Description
STUN sdlc: Indication that the STUN feature is providing the information.
0:00:04 Time elapsed since receipt of the previous packet.
Serial3 Interface type and unit number reporting the event.
NDI: Type of cloud separating the Synchronous Data Link Control (SDL) end
nodes. Possible values are as follows:
• NDI—Network input
• SDI—Serial link
0C2 SDLC address of the SDLC connection.
008 Modulo value of 8.
U: SNRM Frame type followed by the command or response type. In this case it is an
Unnumbered frame that contains a Set Normal Response Mode (SNRM)
command. The possible frame types are as follows:
• I—Information frame
• S—Supervisory frame. The possible commands and responses are: RR
(Receive Ready), RNR (Receive Not Ready), and REJ (Reject).
• U—Unnumbered frame. The possible commands are: UI (Unnumbered
Information), SNRM, DISC/RD (Disconnect/Request Disconnect),
SIM/RIM, XID Exchange Identification), TEST. The possible responses
are UA (unnumbered acknowledgment), DM (Disconnected Mode), and
FRMR (Frame Reject Mode)
PF:1 Poll/Final bit. Possible values are as follows:
• 0—Off
• 1—On
All the fields in the previous line of output match those for an X1 type of packet, except the last field,
which is additional. NR:000 indicates a receive count of 0; the range for the receive count is 0 to 7.
The following line of output describes an X3 type of packet:
STUN sdlc: 0:00:00 Serial3 SDI: (0C2/008) S:I PF:1 NR:000 NS:000
All fields in the previous line of output match those for an X2 type of packet, except the last field, which
is additional. NS:000 indicates a send count of 0; the range for the send count is 0 to 7.
debug sw56
To display debugging information for switched 56K services, use the debug sw56 command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug sw56
no debug sw56
Usage Guidelines This command is primarily useful to your technical support representative.
Examples The following is sample output from the debug syscon perfdata command. In this example, the CallFail
poll group is configured and applied to shelf 1111. The system determines when the next polling cycle
should occur and polls the shelf at the appropriate time. The data is stored in the file CallFail.891645120,
and an older file is deleted.
Router# debug syscon perfdata
Usage Guidelines Use this command to display information about SDP packets exchanged between the shelf and the
system controller.
Examples The following sample output from the debug syscon sdp command shows the system controller
discovering a managed shelf. In the first few lines, the system controller receives a hello packet from
shelf 99 at 172.23.66.106. The system controller responds with a hello packet. When the shelf sends
another hello packet, the system controller resets the timer and sends another packet.
Syscon# debug syscon sdp
The following sample output from the debug syscon sdp command shows the shelf contacting the
system controller. The shelf sends a hello packet to the system controller at 172.23.66.111. The system
controller responds with the autoconfiguration commands. The remaining lines show the Hello packets
were exchanged between the shelf and the system controller.
Shelf# debug syscon sdp
debug syslog-server
To display information about the syslog server process, use the debug syslog-server command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug syslog-server
no debug syslog-server
Usage Guidelines This command outputs a message every time the syslog server receives a message. It also displays
information about subfile creation, removal, and renaming.
Use this command when subfiles are not being created as configured or data is not being written to
subfiles. This command is also useful for detecting syslog file size mismatches.
Examples The following sample output shows when the following command has been added to the configuration:
logging syslog-server 10 3 syslogs
This example shows the files being created. Use the dir disk0:/syslogs.dir command to display the
contents of the newly created directory.
Router# debug syslog-server
When a syslog message is received, the router checks to determine if the current file will be too large
when the new data is added. In this example, two messages are added to the file.
SYSLOG_SERVER: Configured size : 10240 bytes
Current size : 0 bytes
Data size : 68 bytes
New size : 68 bytes
SYSLOG_SERVER: Wrote 68 bytes successfully.
SYSLOG_SERVER: Configured size : 10240 bytes
Current size : 68 bytes
Data size : 61 bytes
New size : 129 bytes
SYSLOG_SERVER: Wrote 61 bytes successfully.
Field Description
Configured size Maximum subfile size, as set in the logging syslog-server command.
Current size Size of the current subfile before the new message is added.
Data size Size of the syslog message.
New size Size of the current subfile after the syslog message is added.
The following output indicates that the current file is too full to fit the next syslog message. The oldest
subfile is removed, and the remaining files are renamed. A new file is created and opened for writing
syslog messages.
SYSLOG_SERVER:Last archive subfile disk0:/syslogs.dir/syslogs.2 removed.
SYSLOG_SERVER: Subfile disk0:/syslogs.dir/syslogs.1 renamed as
disk0:/syslogs.dir/syslogs.2.
SYSLOG_SERVER:subfile disk0:/syslogs.dir/syslogs.cur renamed as
disk0:/syslogs.dir/syslogs.1.
SYSLOG_SERVER:Current subfile disk0:/syslogs.dir/syslogs.cur has been opened.
debug tacacs
To display information associated with TACACS, use the debug tacacs command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug tacacs
no debug tacacs
Usage Guidelines TACACS is a distributed security system that secures networks against unauthorized access. Cisco
supports TACACS under the authentication, authorization, and accounting (AAA) security system.
Use the debug aaa authentication command to get a high-level view of login activity. When TACACS
is used on the router, you can use the debug tacacs command for more detailed debugging information.
Examples The following is sample output from the debug aaa authentication command for a TACACS login
attempt that was successful. The information indicates that TACACS+ is the authentication method used.
Router# debug aaa authentication
The following is sample output from the debug tacacs command for a TACACS login attempt that was
successful, as indicated by the status PASS:
Router# debug tacacs
The following is sample output from the debug tacacs command for a TACACS login attempt that was
unsuccessful, as indicated by the status FAIL:
Router# debug tacacs
Usage Guidelines Use the debug tacacs events command only in response to a request from service personnel to collect
data when a problem has been reported.
Caution Use the debug tacacs events command with caution because it can generate a substantial amount of
output.
The TACACS protocol is used on routers to assist in managing user accounts. TACACS+ enhances the
TACACS functionality by adding security features and cleanly separating out the authentication,
authorization, and accounting (AAA) functionality.
Examples The following is sample output from the debug tacacs events command. In this example, the opening
and closing of a TCP connection to a TACACS+ server are shown, and the bytes read and written over
the connection and the TCP status of the connection:
Router# debug tacacs events
The TACACS messages are intended to be self-explanatory or for consumption by service personnel
only. However, the messages shown are briefly explained in the following text.
The following message indicates that a TCP open request to host 192.168.58.104 on port 1049 will time
out in 15 seconds if it gets no response:
00:03:16: TAC+: Opening TCP/IP to 192.168.58.104/1049 timeout=15
The following message indicates a successful open operation and provides the address of the internal
TCP “handle” for this connection:
00:03:16: TAC+: Opened TCP/IP handle 0x48A87C to 192.168.58.104/1049
The following message indicates that a TACACS+ request has been queued:
00:03:16: TAC+: 192.168.58.104 req=3BD868 id=-1242409656 ver=193 handle=0x48A87C (ESTAB)
expire=14 AUTHEN/START/SENDAUTH/CHAP queued
The following message indicates that 12 bytes were read in reply to the request:
00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=12 wanted=12 alloc=12 got=12
The following message indicates that 49 more bytes were read, making a total of 61 bytes in all, which
is all that was expected:
00:03:22: TAC+: 192.168.58.104 CLOSEWAIT read=61 wanted=61 alloc=61 got=49
The following message indicates that a complete 61-byte reply has been read and processed for request
3BD868:
00:03:22: TAC+: 192.168.58.104 received 61 byte reply for 3BD868 00:03:22: TAC+:
req=3BD868 id=-1242409656 ver=193 handle=0x48A87C (CLOSEWAIT) expire=9
AUTHEN/START/SENDAUTH/CHAP processed
The following message indicates that the TACACS+ server helper process switched itself off when it had
no more work to do:
00:03:22: TAC+: periodic timer stopped (queue empty)
Usage Guidelines For complete information on the TARP process, use the debug tarp packets command along with the
debug tarp events command. Events are usually related to error conditions.
Examples The following is sample output from the debug tarp events and debug tarp packets commands after
the tarp resolve command was used to determine the network service access point (NSAP) address for
the TARP target identifier (TID) named artemis.
Router# debug tarp events
Field Descriptions
Sending TARP type 1 PDU Protocol data unit (PDU) requesting the NSAP of the specified TID.
timeout Number of seconds the router will wait for a response from the Type
1 PDU. The timeout is set by the tarp t1-response-timer command.
NET corresponding to NSAP address (in this case, 49.0001.1111.1111.1111.00) for the
specified TID.
*Mar 1 00:43:59 Debug time stamp.
TARP-PA: Propagated TARP packet: A Type 1 PDU was sent out on Ethernet interface 0.
Lft Lifetime of the PDU (in hops).
Seq Sequence number of the PDU.
Prot type Protocol type of the PDU.
URC Update remote cache bit.
Ttid len Destination TID length.
Stid len Source TID length.
Prot addr len Protocol address length (bytes).
Destination NSAP NSAP address that the PDU is being sent to.
Originator’s NSAP NSAP address that the PDU was sent from.
Target TID TID that the PDU is being sent to.
Originator’s TID TID that the PDU was sent from.
TARP-EV: Packet not TARP event: The Type 1 PDU was not propagated on Ethernet
propagated interface 0 because the adjacency is not up.
TARP-EV: No route found TARP event: The Type 1 PDU was not sent because no route was
available.
TARP-PA: Received TARP TARP packet: A Type 3 PDU was received on Ethernet interface 0.
Packet sent/propagated by NSAP address of the router that sent or propagated the PDU.
TARP-PA: Created new TARP packet: A dynamic entry was made to the local TID cache.
DYNAMIC cache entry
Usage Guidelines For complete information on the TARP process, use the debug tarp events command along with the
debug tarp packet command. Events are usually related to error conditions.
Examples The following is sample output from the debug tarp packet command after the tarp query command
was used to determine the TARP target identifier (TID) for the NSAP address
49.0001.3333.3333.3333.00:
Router# debug tarp packets
Field Descriptions
Sending TARP type 5 PDU Protocol data unit (PDU) requesting the TID of the specified NSAP.
timeout Number of seconds the router will wait for a response from the Type
5 PDU. The timeout is set by the tarp arp-request-timer command.
Table 238 debug tarp packets Field Descriptions—tarp query Command (continued)
Field Descriptions
TID corresponding to NET TID (in this case cerdiwen) for the specified NSAP address.
*Mar 2 03:10:11 Debug time stamp.
TARP-PA: Originated TARP TARP packet: A Type 5 PDU was sent.
packet
TARP P-A: Received TARP TARP packet: A Type 3 PDU was received.
Lft Lifetime of the PDU (in hops).
Seq Sequence number of the PDU.
Prot type Protocol type of the PDU.
URC The update remote cache bit.
Ttid len Destination TID length.
Stid len Source TID length.
Prot addr len Protocol address length (in bytes).
Packet sent/propagated NSAP address of the router that sent or propagated the PDU.
Originator’s NSAP NSAP address that the PDU was sent from.
Originator’s TID TID that the PDU was sent from.
TARP-PA: Created new TARP packet: A dynamic entry was made to the local TID cache.
DYNAMIC cache entry
Defaults Disabled
Usage Guidelines
Caution Use this command with caution, because it displays every packet that the D channel transmits to the
packet network and to the PBX. This command is CPU-intensive and should be used only as a last resort.
Use this command to debug a transparent CCS connection in the following cases:
• Observe the results of the ccs connect command results when you configure the setup.
• Observe CCS traffic at run time; the output shows the actual CCS packets received at run time and
the number of packets received and sent.
Examples The following example shows output from the command on both the originating and terminating sides:
Router# debug tccs signaling
01:37:12: [4] 86 86 86 86
01:37:12: [8] 86 86 86 86
01:37:12: [12] 86 86 86 86
01:37:12: [16] 86 86 86 86
01:37:12: [20] 86 86 86 86
01:37:12: [24] 86 86 11 48
01:37:12: 2 tccs packets received from the port.
01:37:12: 1 tccs packets received from the nework.
01:37:12: pri_tccs_rx_intr:from port->send_sub_channel
01:37:12: tccs_db->vcd = 37, tccs_db->cid = 100
01:37:12: pak->datagramsize=25
01:37:12: [0] A4 40 C0 0
01:37:12: [4] 42 43 43 43
01:37:12: [8] 43 43 43 43
01:37:12: [12] 43 43 43 43
01:37:12: [16] 43 43 43 43
01:37:12: [20] 43 43 43 43
01:37:12: [24] 43 43 43 0
debug tdm
To display time-division multiplexing (TDM) bus connection information each time a connection is
made on Cisco AS5300 access servers, use the debug tdm command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
Syntax Description api (Optional) Displays a debugging message whenever the TDM subsystem
application programming interface (API) is invoked from another
subsystem.
detail (Optional) Displays detailed messages (i.e., trace messages) whenever the
TDM software executes.
dynamic (Optional) Displays TDM debugging information whenever a backplane
timeslot is allocated or deallocated.
pri (Optional) Routes modem back-to-back connections from the
modem-to-PRI board to modem board. By default, the modem back-to-back
connections route from modem board to motherboard to modem board.
test (Optional) Simulates the failure of allocating a TDM timeslot. Verifies that
the software and TDM hardware recover from the failure.
tsi (Optional) Displays debugging information about the TSI Chip
MT8980/MT90820 driver.
vdev (Optional) TDM per voice device debug <0-2> slot and port number (that is,
0/1). Displays debugging information whenever a modem board TDM
connection is made.
Usage Guidelines The debug tdm command output is to be used primarily by a Cisco technical support representative. The
debug tdm command enables display of debugging messages for specific areas of code that execute.
Examples The following examples show the turning on of the debug option, performing a modem call, and turning
off the debug option:
Router# debug tdm api
debug telnet
To display information about Telnet option negotiation messages for incoming Telnet connections to a
Cisco IOS Telnet server, use the debug telnet command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug telnet
no debug telnet
Examples The following is sample output from the debug telnet command:
Router# debug telnet
Field Description
Telnet1/00: 1 1 251 1 Untranslated decimal option negotiations that are sent. 1/00
denotes the line number that the Telnet server is operating
on.
TCP1/00: Symbolically decoded option negotiations. 1/00 denotes the
line number that the Telnet server is operating on. Telnet
option negotiations are defined in the following RFCs:
• RFC 854—Telnet Protocol Specification
• RFC 856—Telnet Binary Transmission
• RFC 858—Telnet Suppress Go Ahead Option
• RFC 1091—Telnet Terminal-Type Option
• RFC 1123, sec. 3—Requirements for Internet
Hosts—Application and Support
• RFC 2217—Telnet Com Port Control Option
debug text-to-fax
To show information relating to the off-ramp text-to-fax conversion, use the debug text-to-fax
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug text-to-fax
no debug text-to-fax
Defaults Disabled
Examples The following debug output shows the off-ramp text-to-fax conversion.
Router# debug text-to-fax
debug tftp
To display Trivial File Transfer Protocol (TFTP) debugging information when encountering problems
netbooting or using the copy tftp system:running-config or copy system:running-config tftp
commands, use the debug tftp command in privileged EXEC mode. To disable debugging output, use
the no form of this command.
debug tftp
no debug tftp
Examples The following is sample output from the debug tftp command from the copy system:running-config
tftp EXEC command:
Router# debug tftp
TFTP: msclock 0x292B4; Sending write request (retry 0), socket_id 0x301DA8
TFTP: msclock 0x2A63C; Sending write request (retry 1), socket_id 0x301DA8
TFTP: msclock 0x2A6DC; Received ACK for block 0, socket_id 0x301DA8
TFTP: msclock 0x2A6DC; Received ACK for block 0, socket_id 0x301DA8
TFTP: msclock 0x2A6DC; Sending block 1 (retry 0), socket_id 0x301DA8
TFTP: msclock 0x2A6E4; Received ACK for block 1, socket_id 0x301DA8
Table 240 describes the significant fields in the first line of output.
Message Description
TFTP: TFTP packet.
msclock 0x292B4; Internal timekeeping clock (in milliseconds).
Sending write request TFTP operation.
(retry 0)
socket_id 0x301DA8 Unique memory address for the socket for the TFTP connection.
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
The “We already have connection with such itad/tripid combo in progress” message appears when an
error occurs where two location servers with the same Internet Telephony Administrative Domain
(ITAD), and TripID initiate a Telephony Routing over IP (TRIP) connection to the gateway. When the
second OPEN message arrives at the gateway, the debug trip error command displays the message.
Examples The following example shows output from the debug tgrep error command:
Errors : Process socket event has an invalid fd to work on
Errors : Process socket event has an invalid fd to work on
Errors : Process socket event has an invalid fd to work on
Errors : Process socket event has an invalid fd to work on
After the errors are reported, the open dump begins. The ITAD is identified in the dump.
------------------------ OPEN DUMP BEGINS ------------------------
0x1 0xFFFFFFFF 0x0 0xFFFFFFB4 0x0
0x0 0x4 0x58 0x6 0x7
0xFFFFFF98 0xFFFFFFA9 0x0 0xC 0x0
0x1 0x0 0x8 0x0 0x2
0x0 0x4 0x0 0x0 0x0
0x3
Version :1
Hold Time :180
My ITAD :1112
TRIP ID :101161129
Option Paramater #1
Param Type: Capability
Length 8
Cap Code :Send Receive Capability
Cap Len :4
Send Rec Cap: RCV ONLY MODE
-->All route types supported
The “We already have connection with such itad/tripid combo in progress” message appears when an
error occurs where two location servers with the same ITAD and TripID initiate a TRIP connection to
the gateway.
We already have connection with such itad/tripid combo in progress
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following example shows output from the debug tgrep events command:
tgrep-gw-1-02#Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 0 at this time
The tgrepQ size is 0 at this time
Field Description
Received a TGREP_UPD_TIMER timeout This event shows that a TGREP update timer
timeout event occurred.
The bulkSyncQ size is 0 at this time This event indicates the size of bulk sync queue.
The tgrepQ size is 0 at this time This event indicates the size of TGREP queue.
Command Description
debug tgrep msgdump Turns on debugging for the dump of the details of TGREP messages.
debug tgrep timer-event Turns on debugging for events that are related to the timer.
debug tgrep timers Turns on debugging for timer activity.
debug tgrep tripr Turns on debugging for the TRIP Reporter.
debug voip eddri Turns on debugging for the EDDRI.
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following example shows output from the debug tgrep fsm command:
Generic routes combined : 0x61FA38B4, 13 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x2 0x0 0x9 0x0
0x5 0x0 0x0 0x0 0x3
0x6D 0x63 0x69
-----------------------------------
+++++++++++++++++++++++++++++++++++++
NEXT HOP SERVER : 0x61FA38C1, 10 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x3 0x0 0x6 0x0
0x0 0x4 0xFFFFFFD2 0x0 0x0
-----------------------------------
+++++++++++++++++++++++++++++++++++++
AD RD PATH : 0x61FA38CB, 10 bytes
++++++++++++++++++++Getting a major event 4 on I/O
Here, a write event occurs. Note how the finite state machine details each step of the writing process.
Received a TRIP_IO_WRITEQ_BOOLEAN event 313
The peer connection check for fd 1 is success
Writing some pending stuff first NBR:14.1.1.210
Moving ahead with more reading rc = 4
-->Starting regular write for nbr NBR:14.1.1.210
The queuesize before we start is 1
Selected primary socket for NBR:14.1.1.210
The peer connection check for fd 1 is success
Dequeued 1 message (left 0) for NBR:14.1.1.210 for writing to socket
Now a read event occurs. After this event, the total number of TRIP messages read is displayed.
Recieved READ_EVENT for nbr NBR:14.1.1.210
Read 3 bytes from that network for nbr NBR:14.1.1.210
+++++++++++++++++++++++++++++++++++++
This is what we READ : 0x63E79090, 3 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x3 0x4
-----------------------------------
NBR:14.1.1.210 Re-starting hold timer after a message is read
tmsg malloc total memory allocated is 95
Allocated another buffer for TRIP message
TRIP Messages Read so far 1
+++++++++++++++++++++++++++++++++++++
Enqueing this tmsg : 0x691D09DC, 3 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x3 0x4
-----------------------------------
Enqueuing a message into the ReadQ of nbr: NBR:14.1.1.210
Read -1 bytes from that network for nbr NBR++++++++++++++++++
0x0 0x4 0x0 0x6 0x2
0x1 0x0 0x0 0x4 0xFFFFFFD2
-----------------------------------
Statistics for available circuits, total circuits, and call success rate are displayed.
+++++++++++++++++++++++++++++++++++++
AD RD PATH : 0x61FA38D5, 10 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x5 0x0 0x6 0x2
0x1 0x0 0x0 0x4 0xFFFFFFD2
-----------------------------------
+++++++++++++++++++++++++++++++++++++
LOCAL PREF : 0x61FA38DF, 8 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x7 0x0 0x4 0x0
0x0 0x0 0x5
-----------------------------------
+++++++++++++++++++++++++++++++++++++
Available Ckts : 0x61FA38E7, 8 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0xF 0x0 0x4 0x0
0x0 0x0 0x17
-----------------------------------
+++++++++++++++++++++++++++++++++++++
TOTAL CIRCUITS : 0x61FA38EF, 8 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x10 0x0 0x4 0x0
0x0 0x0 0x17
-----------------------------------
+++++++++++++++++++++++++++++++++++++
CALL SUCCESS RATE : 0x61FA38F7, 12 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x11 0x0
tgrep-gw-1-02#
tgrep-gw-1-02#und al:14.1.1.210
Getting a major event 512 on I/O
Errors : Process socket event has an invalid fd to work on
l 0x8 0x0
0x0 0x0 0x78 0x0 0x0
0x0 0x7F
-----------------------------------
+++++++++++++++++++++++++++++++++++++
PREFIX_ATTRIBUTE : 0x61FA3903, 64 bytes
++++++++++++++++++++++++++++++++++++++
debug tgrep io
To turn on debugging for detailed socket-level activities, use the debug tgrep io command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug tgrep io
no debug tgrep io
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following example shows output from the debug tgrep io command:
Dispatching a TRIP_EV_NBR_IO_ASYNC_RESET to I/O for NBR:16.1.1.202
Dispatching a TRIP_EV_NBR_IO_ASYNC_RESET to I/O for NBR:16.1.1.203
A socket has gulped all that we fed it NBR:16.1.1.202 -- 5 bytes
Closing all the fds for NBR:16.1.1.202
NBR:16.1.1.202 is not eligible to write, no non(-1) fd yet
NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet
A Socket error has caused a write failure NBR:16.1.1.203 errno 13
Closing all the fds for NBR:16.1.1.203
NBR:16.1.1.202 is not eligible to write, no non(-1) fd yet
NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet
After the errors are detected, a dump occurs. The Internet Telephony Administrative Domain (ITAD)
and Telephony Routing over IP (TRIP) ID are displayed.
------------------------ OPEN DUMP BEGINS ------------------------
0x1 0xFFFFFFFF 0x0 0xFFFFFFB4 0x0
0x0 0x4 0x58 0x6 0x7
0xFFFFFF98 0xFFFFFFA9 0x0 0xC 0x0
0x1 0x0 0x8 0x0 0x2
0x0 0x4 0x0 0x0 0x0
0x3
Version :1
Hold Time :180
My ITAD :1112
TRIP ID :101161129
Option Paramater #1
Param Type: Capability
Length 8
Cap Code :Send Receive Capability
Cap Len :4
Send Rec Cap: RCV ONLY MODE
-->All route types supported
Errors continue to occur. Note that the router still attempts to write, but the connection is not active.
Recieved WRITE_EVENT for nbr NBR:16.1.1.203
The Active connect never succeeded, no passive yet, resetting NBR:16.1.1.203
Error: Active connection to the nbr failed NBR:16.1.1.203
A Socket error has caused a write failure NBR:16.1.1.203 errno 13
Closing all the fds for NBR:16.1.1.203
Post connect succeeded for the nbr NBR:16.1.1.203, fd -1
Moving ahead with more reading rc = 4
NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet
Errors : Process socket event has an invalid fd to work on
Received Mask event of 0x1 for fd 1
Recieved READ_EVENT for nbr NBR:16.1.1.202
Read 3 bytes from that network for nbr NBR:16.1.1.202
Read -1 bytes from that network for nbr NBR:16.1.1.202
Errors : Process socket event has an invalid fd to work on
Going to initiate a connect to 16.1.1.203
Called a socket_connect with errno 11, confirmation later
Initiated a Async connect call for nbr NBR:16.1.1.203 fd 2
Received Mask event of 0x1 for fd 2
Recieved WRITE_EVENT for nbr NBR:16.1.1.203
The Active connect never succeeded, no passive yet, resetting NBR:16.1.1.203
Error: Active connection to the nbr failed NBR:16.1.1.203
A Socket error has caused a write failure NBR:16.1.1.203 errno 13
Closing all the fds for NBR:16.1.1.203
Post connect succeeded for the nbr NBR:16.1.1.203, fd -1
Moving ahead with more reading rc = 4
NBR:16.1.1.203 is not eligible to write, no non(-1) fd yet
Errors : Process socket event has an invalid fd to work on
Command Description
debug tgrep tripr Turns on debugging for the TRIP Reporter.
debug voip eddri Turns on debugging for the EDDRI.
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following example shows output from the debug tgrep messages command:
tgrep-gw(config-tgrep)#Received an OPEN NBR:14.1.1.210
Version :1
Hold Time :180
My ITAD :25
TRIP ID :17767
After the dump occurs, the TRGREP messages are displayed. In this case, keepalive messages are being
received by this gateway.
Enqueued a Keepalive for NBR:14.1.1.210
Received an KEEPALIVE NBR:14.1.1.210
Received Keepalive for NBR:14.1.1.210
Received an KEEPALIVE NBR:14.1.1.210
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following example shows output from the debug tgrep msgdump command:
tgrep-gw-1-02#Received an KEEPALIVE NBR:14.1.1.210
+++++++++++++++++++++++++++++++++++++
TMSG datagramstart : 0x69188648, 150 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0xFFFFFF96 0x2 0x0 0x1
0x0 0x0 0x0 0x2 0x0
0x9 0x0 0x5 0x0 0x0
0x0 0x3 0x6D 0x63 0x69
0x0 0x3 0x0 0x6 0x0
0x0 0x4 0xFFFFFFD2 0x0 0x0
0x0 0x4 0x0 0x6 0x2
0x1 0x0 0x0 0x4 0xFFFFFFD2
0x0 0x5 0x0 0x6 0x2
0x1 0x0 0x0 0x4 0xFFFFFFD2
0x0 0x7 0x0 0x4 0x0
0x0 0x0 0x5 0x0 0xF
0x0 0x4 0x0 0x0 0x0
0x16 0x0 0x10 0x0 0x4
0x0 0x0 0x0 0x17 0x0
0x11 0x0 0x8 0x0 0x0
0x0 0x74 0x0 0x0 0x0
0x7B 0x0 0x12 0x0 0x3C
0x0 0x4 0x31 0x31 0x32
0x38 0x0 0x4 0x31 0x31
0x32 0x37 0x0 0x4 0x31
After each event occurs, a dump of the message appears. The entire dump of each keepalive is being
displayed.
-----------------------------------
Received an KEEPALIVE NBR:14.1.1.210
+++++++++++++++++++++++++++++++++++++
TMSG datagramstart : 0x691B0CA0, 92 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0x5C 0x2 0x0 0x1
0x0 0x0 0x0 0x2 0x0
0xF 0x0 0x3 0x0 0x0
0x0 0x9 0x31 0x32 0x33
0x34 0x35 0x36 0x37 0x38
0x39 0x0 0x3 0x0 0x6
0x0 0x0 0x4 0xFFFFFFD2 0x0
0x0 0x0 0x4 0x0 0x6
0x2 0x1 0x0 0x0 0x4
0xFFFFFFD2 0x0 0x5 0x0 0x6
0x2 0x1 0x0 0x0 0x4
0xFFFFFFD2 0x0 0x7 0x0 0x4
0x0 0x0 0x0 0x5 0x0
0xF 0x0 0x4 0x0 0x0
0x0 0x17 0x0 0x10 0x0
0x4 0x0 0x0 0x0 0x17
0x0 0x11 0x0 0x8 0x0
0x0 0x0 0x75 0x0 0x0
0x0 0x78
-----------------------------------
+++++++++++++++++++++++++++++++++++++
TMSG datagramstart : 0x691885EC, 150 bytes
++++++++++++++++++++++++++++++++++++++
0x0 0xFFFFFF96 0x2 0x0 0x1
0x0 0x0 0x0 0x2 0x0
0x9 0x0 0x5 0x0 0x0
0x0 0x3 0x6D 0x63 0x69
0x0 0x3 0x0 0x6 0x0
0x0 0x4 0xFFFFFFD2 0x0 0x0
0x0 0x4 0x0 0x6 0x2
0x1 0x0 0x0 0x4 0xFFFFFFD2
0x0 0x5 0x0 0x6 0x2
0x1 0x0 0x0 0x4 0xFFFFFFD2
0x0 0x7 0x0 0x4 0x0
0x0 0x0 0x5 0x0 0xF
0x0 0x4 0x0 0x0 0x0
0x16 0x0 0x10 0x0 0x4
0x0 0x0 0x0 0x17 0x0
0x11 0x0 0x8 0x0 0x0
0x0 0x75 0x0 0x0 0x0
0x7C 0x0 0x12 0x0 0x3C
0x0 0x4 0x31 0x31 0x32
0x38 0x0 0x4 0x31 0x31
0x32 0x37 0x0 0x4 0x31
0x31 0x32 0x36 0x0 0x4
0x31 0x31 0x32 0x35 0x0
-----------------------------------
Received an KEEPALIVE NBR:14.1.1.210
Received an KEEPALIVE NBR:14.1.1.210
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following example shows output from the debug tgrep timer-event command:
Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 0 at this time
The tgrepQ size is 0 at this time
Restarting the router UPD timer after expiry
Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 0 at this time
The tgrepQ size is 0 at this time
Restarting the router UPD timer after expiry
The Telephony Routing over IP (TRIP) timer registers timeouts until the next event occurs. Here, the
timers are reset.
Entering trip_reset_nbr_timers to reset timers
Starting the CONNECT timer for nbr NBR:16.1.1.202 for value of 30 seconds
Stopping hold timer and keepalive timer while resetting NBR:16.1.1.202
Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 0 at this time
The tgrepQ size is 0 at this time
Restarting the router UPD timer after expiry
Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 3 at this time
The tgrepQ size is 0 at this time
Restarting the router UPD timer after expiry
Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 3 at this time
The tgrepQ size is 0 at this time
Here, the TRIP neighbor is cleared, which causes the timer to reset.
Router#clear trip nei *
Router#Entering trip_reset_nbr_timers to reset timers
Starting the CONNECT timer for nbr NBR:16.1.1.202 for value of 30 seconds
Stopping hold timer and keepalive timer while resetting NBR:16.1.1.202
Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 0 at this time
The tgrepQ size is 0 at this time
Restarting the router UPD timer after expiry
Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 3 at this time
The tgrepQ size is 0 at this time
Restarting the router UPD timer after expiry
Version :1
Hold Time :180
My ITAD :1112
TRIP ID :101161129
Option Paramater #1
Param Type: Capability
Length 8
Cap Code :Send Receive Capability
Cap Len :4
Send Rec Cap: RCV ONLY MODE
-->All route types supported
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
Examples The following example shows output from the debug tgrep timers command:
tgrep-gw-1-02#Received a TGREP_UPD_TIMER timeout
The bulkSyncQ size is 0 at this time
The tgrepQ size is 0 at this time
Restarting the router UPD timer after expiry
Field Description
Received a TGREP_UPD_TIMER This indicates that a timeout was received.
timeout
The bulkSyncQ size is 0 at this time This indicates the size of the bulk sync queue.
The tgrepQ size is 0 at this time This indicates the size of the TGREP queue.
Restarting the router UPD timer after This indicates that the timer has been reset.
expiry
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
A watched queue is used to inform the TRIPR process about changes in any of the interesting attributes
of dial peer that potentially could trigger TRIP update. A dial peer attribute change manifests into a
prefix attribute change and is deposited into the watched queue of TRIPR by the Event Dispatcher. The
trunk group system also does the same.
Examples The following example shows output from the debug tgrep tripr command:
20:51:11: tripr_build_triprtr_prefix_destination_ev : got the ev id 1 reason 64 num_prefix
1 advertise 0x2prefix 1128 addrFam 4
20:51:11: tripr_build_triprtr_prefix_destination_ev ac 22 tc 23 ac_avg 22
20:51:11: tripr_build_triprtr_prefix_destination_ev csr success 0 total 0
20:51:11:
20:51:11: --------------------------------
20:51:11: attrib 0x4002
20:51:11: ******* REACHABLE ROUTE ******
20:51:11: TRIP_AF_E164 1128
20:51:11: ac: 22
20:51:11:
20:51:11: =======================================
20:51:11: tripr_build_triprtr_prefix_destination_ev : got the ev id 1 reason 64 num_prefix
1 advertise 0x27prefix 123456789 addrFam 4
20:51:11: tripr_build_triprtr_prefix_destination_ev ac 22 tc 23 ac_avg 22
20:51:11: tripr_build_triprtr_prefix_destination_ev csr success 117 total 120
20:51:11: tg mci cc mci
20:51:11: tripr_build_triprtr_prefix_destination_ev tg mci cic 0 carrier mci
20:51:11:
20:51:11: --------------------------------
Field Description
ev id This field can contain the following entries:
• 1—Prefix regular event
• 2—Trunk group regular event
• 3—Carrier regular event
• 4—Prefix sync event
• 5—Trunk group sync event
• 6—Carrier sync event
• 7—Null sync event
reason: (for a prefix family event) This field can contain the following entries:
• 1—Prefix down
• 2—Prefix up
• 4—Prefix trunk group attribute changed
• 8—Prefix available circuits changed
• 16—Prefix total circuits changed
• 32—Prefix CSR changed
• 64—Prefix AC interesting point
• 128—Prefix carrier attributes changed
• 256—Prefix stop advertise configured
• 512—Prefix start advertise configured
Field Description
reason: (for a trunk group family This field can contain the following entries:
event) • 1—Trunk group down
• 2—Trunk group up
• 4—Trunk group prefix attribute changed
• 8—Trunk group available circuits changed
• 16—Trunk group total circuits changed
• 32—Trunk group CSR changed
• 64—Trunk group AC interesting point
• 128—Trunk group stop advertise configured
• 256—Trunk group start advertise configured
reason: (for a carrier family event) This field can contain the following entries:
• 1—Carrier down
• 2—Carrier up
• 4—Carrier prefix attribute changed
• 8—Carrier available circuits changed
• 16—Carrier total circuits changed
• 32—Carrier CSR changed
• 64—Carrier AC interesting point
• 128—Carrier stop advertise configured
• 256—Carrier start advertise configured
debug tgrm
To display debugging messages for all trunk groups, use the debug tgrm command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug tgrm
no debug tgrm
Examples The following examples show output of the debug tgrm command.
This message indicates which interface was selected for the outgoing voice call:
TGRM:tgrm_select_interface() - Interface Serial0:23 selected
This message indicates that the outgoing voice call was denied because of trunk group configuration
(Allowed shows the max-calls value):
TGRM:tgrm_select_interface() - Outgoing voice call denied. Allowed = 5, Current = 6
This message indicates that the trunk group has no interfaces belonging to it:
TGRM:tgrm_select_interface() - Trunk group 3 has no members
This message indicates that the outgoing voice or modem call was denied because of trunk group
configuration (Allowed shows the max-calls value). For a data call, the message is “Outgoing data call
denied.”
TGRM:Serial0:23:tgrm_accept_call() - Outgoing voice call denied. Allowed = > 5,
Current = 6
This message indicates that the incoming data call was denied because of trunk group configuration
(Allowed shows the max-calls value). For a voice call, the message is “Incoming voice call denied.”
TGRM:Serial0:23:tgrm_accept_call() - Incoming data call denied. Allowed = 5, Current = 6
no debug tiff-reader
Defaults Disabled
Examples The following debug example displays information about the off-ramp TIFF reader.
Router# debug tiff reader
debug tiff-writer
Defaults Disabled
Examples The following debug example shows information about the off-ramp TIFF writer.
Router# debug tiff writer
Examples The following is sample output from the debug time-range ipc command. In the following example, the
time ranges sent to the line card are monitored:
Router# debug time-range ipc
In the following example, the time ranges deleted from the line card are monitored:
Router# debug time-range ipc
Usage Guidelines This command reports several lines of information for each packet sent or received and is intended for
low traffic, detailed debugging.
The Token Ring interface records provide information regarding the current state of the ring. These
messages are only displayed when the debug token events command is enabled.
The debug token ring command invokes verbose Token Ring hardware debugging. This includes
detailed displays as traffic arrives and departs the unit.
Caution It is best to use this command only on routers and bridges with light loads.
Examples The following is sample output from the debug token ring command:
Router# debug token ring
Table 244 describes the significant fields shown in the second line of output.
Message Description
TR0: Name of the interface associated with the Token Ring event.
in: Indication of whether the packet was input to the interface (in) or output
from the interface (out).
MAC: Type of packet, as follows:
• MAC—Media Access Control
• LLC—Link Level Control
acfc: 0x1105 Access Control, Frame Control bytes, as defined by the IEEE 802.5
standard.
Dst: c000.ffff.ffff Destination address of the frame.
Src: 5000.1234.5678 Source address of the frame.
bf: 0x45 Bridge flags for internal use by technical support staff.
Table 245 describes the significant fields shown in the third line of output.
Message Description
TR0: Name of the interface associated with the Token Ring event.
in: Indication of whether the packet was input to the interface (in) or output
from the interface (out).
riflen 0 Length of the routing information field (RIF) in bytes.
rd_offset 0 Offset (in bytes) of the frame pointing to the start of the RIF field.
llc_offset 40 Offset in the frame pointing to the start of the LLC field.
Table 246 describes the significant fields shown in the fifth line of output.
Message Description
TR0: Name of the interface associated with the Token Ring event.
out: Indication of whether the packet was input to the interface (in) or output
from the interface (out).
LLC: Type of frame, as follows:
• MAC—Media Access Control
• LLC—Link Level Control
AAAA0300 This and the octets that follow it indicate the contents (hex) of the frame.
ln: 28 The length of the information field (in bytes).
debug track
To display tracking activity for tracked objects, use the debug track command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug track
no debug track
Usage Guidelines Use this command to display activity for objects being tracked by the tracking process. These objects
can be the state of IP routing, the line-protocol state of an interface, IP route reachability, and the IP
route metric threshold.
Examples The following example shows that object number 100 is being tracked and the state of IP routing on
Ethernet interface 0/2 is down:
Router# debug track
The following example shows that object number 100 is being tracked and the state of IP routing on
Ethernet interface 0/2 has changed and is back up:
Router# debug track
debug tsp
To display information about the telephony service provider (TSP), use the debug tsp command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
Defaults Disabled
Examples The following example shows output for the debug tsp all command:
01:04:12:CDAPI TSP RX ===> callId=(32 ), Msg=(CDAPI_MSG_CONNECT_IND,1 )
Sub=(CDAPI_MSG_SUBTYPE_NULL,0 )cdapi_tsp_connect_ind
01:04:12:TSP CDAPI:cdapi_free_msg returns 1
01:04:13:tsp_process_event:[0:D, 0.1 , 3] tsp_cdapi_setup_ack tsp_alert
01:04:13:tsp_process_event:[0:D, 0.1 , 5] tsp_alert_ind
01:04:13:tsp_process_event:[0:D, 0.1 , 10]
01:04:14:tsp_process_event:[0:D, 0.1 , 10]
01:04:17:CDAPI TSP RX ===> callId=(32 ), Msg=(CDAPI_MSG_DISCONNECT_IND,7 )
Sub=(CDAPI_MSG_SUBTYPE_NULL,0 )cdapi_tsp_disc_ind
01:04:17:TSP CDAPI:cdapi_free_msg returns 1
01:04:17:tsp_process_event:[0:D, 0.1 , 27] cdapi_tsp_release_indtsp_disconnet_tdm
01:04:17:tsp_process_event:[0:D, 0.4 , 7] cdapi_tsp_release_comp
Examples The following example shows the immediate output of the debug txconn all command. For examples
of specific debugging messages, see the examples provided for the debug txconn appc, debug txconn
config, debug txconn data, debug txconn event, debug txconn tcp, and debug txconn timer
commands.
Router# debug txconn all
Examples The following example shows APPC debugging output from the debug txconn appc command:
Router# debug txconn appc
Examples The following example shows output for the debug txconn config command:
Router# debug txconn config
Examples The following example shows selected output from the debug txconn data command when a connection
is established, data is received from the client via TCP/IP, data is sent to the client, and then the
connection is closed.
Router# debug txconn data
The following lines show output when data is sent to the host:
00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) LL(58) FMH5(0) CEBI(0)
00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) State(0) MsgID(7844) -> nextState(1)
00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) conversationType(mapped) syncLevel(1)
sec(0)
00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) TPName CCIN
00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) apDataLength(32) GDSID(12FF)
00:04:50: TXTrans(id:62197910 conn:62197464 addr:2) ->Host 0000 0008 03F4 F3F7 0000 0008
0401 0000
The following lines show output when data is received from the host:
00:05:01: TXTrans(id:62197910 conn:62197464 addr:2) <-Host 0092 12FF 0000 000C 0102 0000
0000 0002
The following lines show CTRC generating an FMH7 error message indicating that a CICS transaction
has failed at the host or has been cleared by a router administrator:
00:06:27: TXTrans(id:6219853C conn:62197464 addr:3) Generating FMH7.
00:06:27: %TXCONN-3-TXEXCEPTION: Error occurred from transaction 3 of client
157.151.241.10 connected to server CICSC, exception type is 9
The following line shows CTRC responding to an FMH7 error message sent by the CICS client program:
00:07:11: TXTrans(id:62197910 conn:62197464 addr:2) Generating FMH7 +RSP.
Examples The following example shows output for the debug txconn event command:
Router# debug txconn event
Examples The following example displays output from the debug txconn tcp command:
Router# debug txconn tcp
Examples The following example shows turnaround time and host response time in milliseconds for a CICS
transaction requested through CTRC. Turnaround time is measured from when CTRC receives the first
request packet for the transaction until CTRC sends the last response packet of the transaction to the
client. Host response time is measured from when CTRC sends the last request packet for a transaction
to the host until CTRC receives the first response packet from the host for that transaction.
Router# debug txconn timer
Command Description
debug txconn tcp Displays error messages or traces for TCP/IP communications with
CICS.
show debugging Displays the state of each debugging option.
debug udptn
To display debug messages for UDP Telnet (UDPTN) events, use the debug udptn command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug udptn
no debug udptn
Defaults Disabled
Examples The following is sample output from the debug udptn command:
terrapin# debug udptn
Usage Guidelines V.120 is an ITU specification that allows for reliable transport of synchronous, asynchronous, or bit
transparent data over ISDN bearer channels.
For complete information on the V.120 process, use the debug v120 packet command along with the
debug v120 event command. V.120 events are activity events rather than error conditions.
Examples The following is sample output from the debug v120 event command of V.120 starting up and stopping.
Also included is the interface that V.120 is running on (BR 0) and where the V.120 configuration
parameters are obtained from (default).
Router# debug v120 event
Usage Guidelines The debug v120 packet command shows every packet on the V.120 session. You can use this
information to determine whether incompatibilities exist between Cisco’s V.120 implementation and
other vendors’ V.120 implementations.
V.120 is an ITU specification that allows for reliable transport of synchronous, asynchronous, or bit
transparent data over ISDN bearer channels.
For complete information on the V.120 process, use the debug v120 events command along with the
debug v120 packet command.
Examples The following is sample output from the debug v120 packet command for a typical session startup:
Router# debug v120 packet
Field Descriptions
BR0:1 Interface number associated with this debugging information.
I/O Packet going into or out of the interface.
SABME, UA, IFRAME, RR V120 packet type:
• SABME—Set asynchronous balanced mode, extended
• US—Unnumbered acknowledgment
• IFRAME—Information frame
• RR—Receive ready
lli 256 Logical link identifier number.
C/R 0 Command or response.
P/F=1 Poll final.
N(R)=0 Number received.
N(S)=0 Number sent.
len 43 Number of data bytes in the packet.
0x83 Up to 16 bytes of data.
debug vg-anylan
To monitor error information and 100VG-AnyLAN port adapter connection activity, use the debug
vg-anylan command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug vg-anylan
no debug vg-anylan
Usage Guidelines This command could create a substantial amount of command output.
Examples The following is sample output from the debug vg-anylan command:
Router# debug vg-anylan
Table 248 lists the messages that could be generated by this command.
Defaults Disabled
Examples The following example shows output when you use the debug video vicm command. Comments are
enclosed in asterisks (*).
Router# debug video vicm
Router#
00:43:54:ViCM - current state = Call Connected
00:43:54:ViCM - current event = SVC Release
00:43:54:ViCM - new state = Remote Hangup
mc3810_video_lw_periodic:sending message
00:43:55:ViCM - current state = Idle
00:43:55:ViCM - current event = DTR Asserted
00:43:55:ViCM - new state = Idle, Codec Ready
Usage Guidelines The debug vlan packet command displays only packets with a VLAN identifier that the router is not
configured to support. This command allows you to identify other VLAN traffic on the network. Virtual
LAN packets that the router is configured to route or switch are counted and indicated when you use the
show vlans command.
Examples The following is sample output from the debug vlan packet output. In this example, a VLAN packet
with a VLAN ID of 1000 was received on FDDI interface 0 and this interface was not configured to route
or switch this VLAN packet:
Router# debug vlan packet
Syntax Description slot/port (Optional) The slot and port number of the voice port. If the slot and
port arguments are entered, only debugging information for that voice
port is displayed. If the slot and port are not entered, debugging
information for all voice ports is displayed.
Examples The debug voice all command output provides debug output for all the debug commands for the Voice
Call Manager compiled into one display. For sample output of the individual commands, see the sample
displays for the debug voice cp, debug voice eecm, debug voice protocol, debug voice signaling, and
debug voice tdsm commands.
debug voice cp
To display debugging information for the Voice Call Processing State Machine, use the debug voice cp
command in privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description slot/port (Optional) The slot and port number of the voice port. If the slot and port
arguments are entered, only debugging information for that voice port is
displayed.
Examples The following is sample output from the debug voice cp command:
Router# debug voice cp 1/1
Syntax Description slot/port (Optional) Slot and port number of the voice port. If the slot and port
arguments are entered, only debugging information for that voice port is
displayed.
Examples The following is sample output from the debug voice eecm command:
Router# debug voice eecm
Defaults Disabled
Usage Guidelines Disable console logging and use buffered logging before using the debug voice enum command. Using
the debug voice enum command generates a large volume of debugs, which can affect router
performance.
Examples The following is sample output from the debug voice enum detail command. The output shows the
match number as 5108891234, ENUM table as 10. Rule 1 in table 10 matched the pattern and after
applying the replacement rule, the resulting string is 5108891234. The ENUM query is sent out for the
domain 4.3.2.1.9.8.8.0.1.5.e164.cisco.com. The output then shows the matching Naming Authority
Pointer (NAPTR) records obtained in the response. The records are then processed and the final URLs
(contact lists) are shown toward the end.
Router# debug voice enum detail
A sample output of the debug voice enum summary command is shown below.
The output shows the matching number, the ENUM table used and the rule in the table that matched the
number along with the resulting string. Note that this output is a subset of the output from debug voice
enum detail command.
Router# debug voice enum summary
Table 249 provides an alphabetical listing of the debug voice enum command fields and a description
of each field.
Field Description
contact_list Final list of URLs that the gateway will try to contact as an attempt to
place the call.
flag Flag value of a NAPTR record as defined in RFC 2915.
match_num Number to be used for matching against the ENUM match table.
name Fully qualified domain name sent out to DNS server.
ns_server Address of the DNS server. If 0, the Domain Name System (DNS)
server configured on the gateway is used.
num_elem Number of records received in the response.
order Order in the record, as defined in RFC 2915.
pref Preference of the record, as defined in RFC 2915.
regexp Regular expression of the record, as defined in RFC 2915.
replacement Replacement string of the record, as defined in RFC 2915.
re_flags_string Flag indicating whether matching and replacement should be case
sensitive:
• i = Case insensitive
• otherwise = Case sensitive
Field Description
re_string The first part of the regexp, delimited by "/". This is used to match the
incoming string. Refer to RFC 2915.
re_substitution_string The second part of regexp, delimited by "/".
result string String that results when match_num is taken through the ENUM match
table for a match. This string will be used to form a fully qualified
domain name (FQDN).
rule Rule number that matched match_num in the enum match table.
search string String sent out to the DNS server.
service Service field of the NAPTR record. Refer to RFC 2915.
table_indx Index of the ENUM match table picked for this call.
type Type of record requested in the query:
35 = NAPTR
33 = DNS Service (SRV)
Syntax Description slot/port (Optional) Slot and port number of the voice port. If the slot and port
arguments are entered, only debugging information for that voice port is
displayed.
Usage Guidelines In the debugging display, the following abbreviations are used for the different signaling protocols:
Examples The following is sample output from the debug voice protocol command:
Router# debug voice protocol
Syntax Description slot/port (Optional) Slot and port number of the voice port. If the slot and port
arguments are entered, only debugging information for that voice port is
displayed.
Examples The following is sample output from the debug voice signaling command:
Router# debug voice signaling
Defaults Disabled
Usage Guidelines Disable console logging and use buffered logging before using the debug voice source-group command.
Using the debug voice source-group command generates a large volume of debugs, which can affect
router performance.
Examples A sample output of the debug voice source-group command is shown below.
The output shows that the hash table key for source ip group is 1.
00:30:49:SIPG:sipg_get() - idString=0x63BE1C28, hashkey=1
00:30:49:SIPG:sipg_find_key - hashkey=1,idstring=0x63BE1C28
Field Description
hashkey Hash table index of the source IP group.
idString Value of the pointer to the source IP group name, which is used to make
sure that it is not null.
Syntax Description slot/port (Optional) Slot and port number of the voice port. If the slot and port
arguments are entered, only debugging information for that voice port is
displayed.
Examples The following is sample output from the debug voice tdsm command:
Router# debug voice tdsm
Defaults Disabled
Usage Guidelines Disable console logging and use buffered logging before using the debug voice translation command.
Using the debug voice translation command generates a large volume of debugs, which can affect
router performance.
Examples Sample output from the debug voice translation command is shown below. The output shows the details
of the original number following “regxrule_profile_translate”.
Following “regxrule_profile_match”, the output shows that rule 1 in the translation rule 1001 was a
match; then the details of the SED substitution are shown.
Then the output shows the details of the translated number following “regxrule_profile_translate”.
In this example, because there was no called number or redirect number translation configured on the
translation profile, corresponding errors were generated with a message that no match was found.
Following “regxrule_dp_translate”, the output indicates that there is no translation profile for outgoing
direction, then it prints the numbers sent to the outgoing SPI.
Router#
00:51:56:regxrule_get_profile_from_trunkgroup:Voice port 0x64143DA8 does not belong to any
trunk group
00:51:56:regxrule_get_profile_from_trunkgroup:Voice port 0x64143DA8 does not belong to any
trunk group
00:51:56:regxrule_stack_pop_RegXruleNumInfo:stack=0x63DECAF4; count=1
00:51:56:regxrule_stack_push_RegXruleNumInfo:stack=0x63DECAF4; count=0
00:51:56:regxrule_profile_translate:number=4088880101 type=unknown plan=unknown
numbertype=calling
00:51:56:regxrule_profile_match:Matched with rule 1 in ruleset 1001
00:51:56:regxrule_profile_match:Matched with rule 1 in ruleset 1001
Table 251 provides an alphabetical listing of the debug voice translation command fields and a
description of each field.
Field Description
called_number Called number dialed number identification service (DNIS).
called_octet Octect3 of called IE.
calling_number Calling number automatic number identifier (ANI).
calling_octect Octect3 of calling IE.
count Number of elements in the translation stack.
Input Plan Numbering plan of the input.
Input Type Numbering type of the input.
matchPattern Regular exp used for matching.
Match Plan Numbering plan in the translation rule.
Match Type Numbering type in the translation rule.
number Incoming number for translation.
numbertype Type of number: calling, called, or redirect.
pattern Input string to the regular expression for matching.
plan Numbering plan.
redirect_number Redirect number.
redirect_plan Numbering plan in the redirect number.
redirect_type Numbering type in the redirect number.
replaced pattern Final string after applying replacement rule of translation rule.
replacePattern Replacement pattern in the translation rule.
Field Description
Replace Plan Replacement numbering plan in the translation rule.
Replace Type Replacement numbering type in the translation rule.
stack Value of the translation rule stack.
tag Tag of the translation rule.
type Numbering type in the translation rule.
xlt_number Number after translation.
xlt_plan Numbering plan after translation.
xlt_type Numbering type after translation.
Usage Guidelines This command applies to Cisco trunks and FRF.11 trunks only; it does not apply to switched calls.
This command applies to VoFR, VoATM, and VoHDLC dial peers on the Cisco MC3810 device.
Examples The following example shows sample output from the debug voice vofr command for a Cisco trunk:
Router# debug voice vofr
The following example shows sample output from the debug voice vofr command for an FRF.11 trunk:
Router# debug voice vofr
Defaults Disabled
Examples The following is sample output of the debug voip aaa command:
Router# debug voip aaa
Syntax Description error (Optional) Displays error logs in the CCAPI. If there are no errors, no
output is displayed.
inout (Optional) Displays the execution path through the CCAPI.
Usage Guidelines The error keyword displays the errors in the CCAPI. Error logs are generated during normal call
processing, if there are insufficient resources or problems in the underlying network-specific code, the
higher call session application, or the call control API itself. This keyword shows error events or
unexpected behavior in system software. In most cases, no errors are generated and nothing is displayed.
The inout keyword displays the execution path through the call control API, which serves as the
interface between the call session application and the underlying network-specific software. The output
from this command shows how calls are being handled by the router. This keyword shows how a call
flows through the system including call setup and teardown operations performed on both the telephony
and network call legs.
Examples The following is sample output of the debug voip ccapi command without any keywords:
Router# debug voip ccapi
The following is sample output that shows the call setup that it is accepted by the router:
Router# debug voip ccapi inout
!
cc_api_call_setup_ind (vdbPtr=0x60BFB530, callInfo={called=, calling=, fdest=0},
callID=0x60BFAEB8)
!
cc_process_call_setup_ind (event=0x60B68478) sess_appl: ev(14), cid(1), disp(0)
ccCallSetContext (callID=0x1, context=0x60A7B094) ccCallSetPeer (callID=0x1,
peer=0x60C0A868, voice_peer_tag=2, encapType=1, dest-pat=+14085231001, answer=)
!
ccCallSetupAck (callID=0x1)
!
!The following output shows the caller entering DTMF digits until a dial-peer is matched.
!
cc_api_call_digit (vdbPtr=0x60BFB530, callID=0x1, digit=4, mode=0) sess_appl: ev(8),
cid(1), disp(0) ssa: cid(1)st(0)oldst(0)cfid(-1)csize(0)in(1)fDest(0) cc_api_call_digit
(vdbPtr=0x60BFB530, callID=0x1, digit=1, mode=0) sess_appl: ev(8), cid(1), disp(0) ssa:
cid(1)st(0)oldst(0)cfid(-1)csize(0)in(1)fDest(0)
!
Usage Guidelines The debug voip ccapi error command traces the error logs in the call control API. Error logs are
generated during normal call processing, when there are insufficient resources, or when there are
problems in the underlying network-specific code, the higher call session application, or the call control
API itself.
This debug command shows error events or unexpected behavior in system software. In most cases, no
events will be generated.
Note We recommend that you log output from the debug voip ccapi error command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Usage Guidelines The debug voip ccapi inout command traces the execution path through the call control API, which
serves as the interface between the call session application and the underlying network-specific software.
You can use the output from this command to understand how calls are being handled by the voice
gateway.
This command shows how a call flows through the system. Using this debug level, you can see the call
setup and teardown operations performed on both the telephony and network call legs.
Note We recommend that you log output from the debug voip ccapi inout command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following example shows the call setup indicated and accepted by the voice gateway:
Router# debug voip ccapi inout
In the following lines, the call control API (CCAPI) receives the call setup. The called number is 34999,
and the calling number is 55555. The calling number matches dial peer 10002.
*Mar 1 15:35:53.592: //-1/xxxxxxxxxxxx/CCAPI/cc_api_display_ie_subfields:
*Mar 1 15:35:53.592: cc_api_call_setup_ind:
*Mar 1 15:35:53.592: cisco-username=
*Mar 1 15:35:53.596: ----- ccCallInfo IE subfields -----
*Mar 1 15:35:53.596: cisco-ani=55555
*Mar 1 15:35:53.596: cisco-anitype=0
*Mar 1 15:35:53.596: cisco-aniplan=0
*Mar 1 15:35:53.596: cisco-anipi=0
*Mar 1 15:35:53.596: cisco-anisi=0
*Mar 1 15:35:53.596: dest=34999
*Mar 1 15:35:53.596: cisco-desttype=0
*Mar 1 15:35:53.596: cisco-destplan=0
*Mar 1 15:35:53.596: cisco-rdn=
*Mar 1 15:35:53.596: cisco-rdntype=-1
*Mar 1 15:35:53.596: cisco-rdnplan=-1
*Mar 1 15:35:53.596: cisco-rdnpi=-1
*Mar 1 15:35:53.596: cisco-rdnsi=-1
*Mar 1 15:35:53.596: cisco-redirectreason=-1
*Mar 1 15:35:53.596: //-1/xxxxxxxxxxxx/CCAPI/cc_api_call_setup_ind:
(vdbPtr=0x637EC1E0,
callInfo={called=34999,called_oct3=0x80,calling=55555,calling_oct3=0x80,calling_oct3a=0x0,
calling_xlated=false,subscriber_type_str=RegularLine,fdest=1,
peer_tag=10002, prog_ind=0,callingIE_present 1, src_route_label=, tgt_route_label=
clid_transparent=0},callID=0x637B4278)
In the next line, 45F2AAE28044 is the GUID. The tag 10002 entry shows that the incoming dial peer
matched the CallEntry ID.
*Mar 1 15:35:53.608: //44/45F2AAE28044/CCAPI/cc_process_call_setup_ind: >>>>CCAPI handed
cid 44 with tag 10002 to app "DEFAULT"
*Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl:
ev(24=CC_EV_CALL_SETUP_IND), cid(44), disp(0)
*Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(SSA_EV_CALL_SETUP_IND),
cid(44), disp(0)
*Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/SSAPP:-1:-1/ssaCallSetupInd:
The next line shows CallEntry ID in hexadecimal form, 0x2C (44 in decimal). The CallID and GUID
numbers have been identified. The incoming dial-peer is 10002.
*Mar 1 15:35:53.608: //44/xxxxxxxxxxxx/CCAPI/ccCallSetContext: (callID=0x2C,
context=0x634A430C)
For CallEntry ID 44, two dial-peer tags (10001 and 20002) were matched with called number 34999.
*Mar 1 15:35:53.612: //44/45F2AAE28044/SSAPP:10002:-1/ssaDebugPeers: ssaSetupPe
er cid(44) peer list: tag(10001) called number (34999) tag(20002) called number
(34999)
*Mar 1 15:35:53.612: //44/45F2AAE28044/SSAPP:10002:-1/ssaSetupPeer: dialpeer tags in
rotary= 10001 20002
The next line shows that 5 digits were matched for this dial peer and no prefix was added. The
encapType (2) entry indicates a VoIP call.
*Mar 1 15:35:53.612: //44/45F2AAE28044/SSAPP:10002:-1/ssaSetupPeer: cid(44), de
stPat(34999), matched(5), prefix(), peer(637B0984), peer->encapType (2)
*Mar 1 15:35:53.612: //-1/xxxxxxxxxxxx/CCAPI/cc_can_gateway: Call legs: In=6, O
ut=1
The next line shows the voice gateway sending out a call-proceeding message to the incoming call leg
with progress indicator of 0x0.
*Mar 1 15:35:53.612: //44/xxxxxxxxxxxx/CCAPI/ccCallProceeding: (callID=0x2C, pr
og_ind=0x0)
The next line shows the voice gateway sending out the call-setup request to the outgoing call leg. The
dial-peer is 10001 with the incoming CallEntry ID being 0x2C.
*Mar 1 15:35:53.612: //44/xxxxxxxxxxxx/CCAPI/ccCallSetupRequest: (Inbound call
= 0x2C, outbound peer =10001, dest=,
params=0x63085D80 mode=0, *callID=0x63086314, prog_ind = 0callingIE_pres
ent 1)
In the next line, outgoing CallEntry ID 45 is bound to the same GUID 45F2AAE28044.
*Mar 1 15:35:53.620: //45/45F2AAE28044/CCAPI/cc_insert_call_entry: not incoming
entry
The voice gateway informs the incoming call leg that digits were forwarded.
*Mar 1 15:35:53.624: //44/xxxxxxxxxxxx/CCAPI/cc_api_call_report_digits_done:
(vdbPtr=0x637EC1E0, callID=0x2C, disp=0)
*Mar 1 15:35:53.624: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(54=CC_EV_CALL_
REPORT_DIGITS_DONE), cid(44), disp(0)
*Mar 1 15:35:53.624: //44/45F2AAE28044/SS
Router#APP:10002:-1/ssaTraceSct: cid(44)st(SSA_CS_CALL_SETTING)ev(SSA_EV_CALL_RE
PORT_DIGITS_DONE)
oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(1)fDest(1)
*Mar 1 15:35:53.624: //44/45F2AAE28044/SSAPP:10002:-1/ssaTraceSct: -cid2(45)st2
(SSA_CS_CALL_SETTING)oldst2(SSA_CS_MAPPING)
*Mar 1 15:35:53.624: //44/45F2AAE28044/SSAPP:10002:-1/ssaDebugPeers: ssaReportDigitsDone
cid(44) peer list: tag(20002) called number (34999)
*Mar 1 15:35:53.624: //44/45F2AAE28044/SSAPP:10002:-1/ssaReportDigitsDone: call
id=44 Reporting disabled.
*Mar 1 15:35:53.628: //-1/xxxxxxxxxxxx/CCAPI/cc_api_supported_data: data_mode=0x10082
*Mar 1 15:35:53.628: //45/xxxxxxxxxxxx/CCAPI/cc_api_get_ic_leg_obtained_numbers:
callID=0x2D
The next two lines shows the IP address of the terminating gateway and that the terminating gateway is
reached through Ethernet port 0/0.
*Mar 1 15:35:53.628: //-1/xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume: remote IP
is 171.69.85.111
*Mar 1 15:35:53.632: //-1/xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume: hwidb is Ethernet0/0
*Mar 1 15:35:53.632: //-1/xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume: create entry in
list: 1
*Mar 1 15:35:53.636: //45/xxxxxxxxxxxx/CCAPI/ccTDUtilGetInstanceCount: For tagI
D[1] of callID[45]
*Mar 1 15:35:53.636: //45/45F2AAE28044/CCAPI/ccTDPvtProfileTableObjectAccessManager: No
profileTable set for callID[45]
*Mar 1 15:35:53.636: //45/xxxxxxxxxxxx/CCAPI/ccTDUtilGetInstanceCount: For tagID[2] of
callID[45]
*Mar 1 15:35:53.636: //45/45F2AAE28044/CCAPI/ccTDPvtProfileTableObjectAccessManager: No
profileTable set for callID[45]
The next line shows that the voice gateway received a call proceeding message from the terminating
gateway, and then the following line shows that the voice gateway received a call alert from the
terminating gateway.
*Mar 1 15:35:53.740: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_proceeding: (vdbPtr=0x62EC61A4,
callID=0x2D,
prog_ind=0x0)
*Mar 1 15:35:53.740: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_alert: (vdbPtr=0x62EC61A4,
callID=0x2D, prog_ind=0x0, sig_ind=0x1)
*Mar 1 15:35:53.744: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl:
ev(21=CC_EV_CALL_PROCEEDING), cid(45), disp(0)
*Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: cid(45)st(SSA_CS
_CALL_SETTING)ev(SSA_EV_CALL_PROCEEDING)
oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(0)fDest(0)
*Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct:
-cid2(44)st2(SSA_CS_CALL_SETTING)oldst2(SSA_CS_CALL_SETTING)
*Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaCallProc:
*Mar 1 15:35:53.744: //44/xxxxxxxxxxxx/CCAPI/ccGetDialpeerTag: (callID=0x2C)
*Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaIgnore: cid(45), st(SSA_CS
_CALL_SETTING),oldst(1), ev(21)
*Mar 1 15:35:53.744: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(7=CC_EV_CALL_ALERT),
cid(45), disp(0)
*Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: cid(45)st(SSA_CS
_CALL_SETTING)ev(SSA_EV_CALL_ALERT)
oldst(SSA_CS_CALL_SETTING)cfid(-1)csize(0)in(0)fDest(0)
*Mar 1 15:35:53.744: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: -cid2(44)st2(SSA
_CS_CALL_SETTING)oldst2(SSA_CS_CALL_SETTING)
*Mar 1 15:35:53.744: //44/45F2AAE28044/SSAPP:10002:-1/ssaAlert:
*Mar 1 15:35:53.744: //44/xxxxxxxxxxxx/CCAPI/ccGetDialpeerTag: (callID=0x2C)
Router#
The voice gateway receives a connect message from the terminating gateway.
*Mar 1 15:36:05.016: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_connected: (vdbPtr=0x6
2EC61A4, callID=0x2D), prog_ind = 0
The next line shows that the call accounting starts. The leg_type=False message means this is for an
outgoing call. The line that follows shows that AAA accounting is not configured.
*Mar 1 15:36:05.016: //45/45F2AAE28044/CCAPI/cc_api_call_connected: calling accounting
start for callID=45 leg_type=0
*Mar 1 15:36:05.020: //45/xxxxxxxxxxxx/CCAPI/ccCallSetAAA_Accounting: callID=0x
2D, accounting=0
*Mar 1 15:36:05.020: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(8=CC_EV_CALL_CONNECTED),
cid(45), disp(0)
*Mar 1 15:36:05.020: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: cid(45)st(SSA_CS
_ALERT_RCVD)ev(SSA_EV_CALL_CONNECTED)
oldst(SSA_CS_CALL_SETTING)cfid(-1)csize(0)in(0)fDest(0)
*Mar 1 15:36:05.020: //45/45F2AAE28044/SSAPP:0:-1/ssaTraceSct: -cid2(44)st2(SSA
_CS_ALERT_RCVD)oldst2(SSA_CS_CALL_SETTING)
*Mar 1 15:36:05.020: //45/45F2AAE28044/SSAPP:0:-1/ssaConnect:
*Mar 1 15:36:05.020: //44/xxxxxxxxxxxx/CCAPI/ccGetDialpeerTag: (callID=0x2C)
The next lines show a conference being set up between the two call legs 0x2C and 0x2D. Bridge
complete messages are sent to both the terminating and originating gateways.
*Mar 1 15:36:05.020: //44/xxxxxxxxxxxx/CCAPI/ccConferenceCreate: (confID=0x6308
6424, callID1=0x2C, callID2=0x2D, tag=0x0)
Here, the voice gateway sets up negotiating capability with the originating telephony leg.
*Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (dstVdbPtr=0x62EC
61A4, dstCallId=0x2D, srcCallId=0x2C,
caps={codec=0x2887F, fax_rate=0xBF, vad=0x3, modem=0x2
codec_bytes=0, signal_type=3})
*Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (Playout: mode 0,
initial 60,min 40, max 300)
*Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(29=CC_EV_CONF_
CREATE_DONE), cid(44), disp(0)
*Mar 1 15:36:05.024: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct:
cid(44)st(SSA_CS_CONFERENCING)ev(SSA_EV_CONF_CREATE_DONE)
oldst(SSA_CS_CALL_SETTING)cfid(21)csize(2)in(1)fDest(1)
*Mar 1 15:36:05.024: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: -cid2(45)st2
(SSA_CS_CONFERENCING)oldst2(SSA_CS_ALERT_RCVD)
*Mar 1 15:36:05.024: //44/45F2AAE28044/SSAPP:10002:21/ssaConfCreateDone:
*Mar 1 15:36:05.024: //44/xxxxxxxxxxxx/CCAPI/ccCallConnect: (callID=0x2C), prog
_ind = 0
*Mar 1 15:36:05.024: //44/45F2AAE28044/CCAPI/ccCallConnect: setting callEntry->
connected to TRUE
The voice gateway sets up negotiating capability with the terminating VoIP leg.
*Mar 1 15:36:05.028: //45/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (dstVdbPtr=0x637E
C1E0, dstCallId=0x2C, srcCallId=0x2D,
caps={codec=0x4, fax_rate=0x2, vad=0x2, modem=0x0
codec_bytes=20, signal_type=2})
*Mar 1 15:36:05.028: //45/xxxxxxxxxxxx/CCAPI/cc_api_caps_ind: (Playout: mode 0,
initial 60,min 40, max 300)
Router# cid(44)st(SSA_CS_ACTIVE)ev(SSA_EV_VOICE_MODE_DONE)
oldst(SSA_CS_CONFERENCING)cfid(21)csize(2)in(1)fDest(1)
*Mar 1 15:36:05.032: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: -cid2(45)st2
(SSA_CS_ACTIVE)oldst2(SSA_CS_ALERT_RCVD)
*Mar 1 15:36:05.032: //44/45F2AAE28044/SSAPP:10002:21/ssaIgnore: cid(44), st(SS
A_CS_ACTIVE),oldst(5), ev(52)
Router#
Router#! digit punched
Router#
Router# !call hung up The user at the terminating gateway hangs up the call.
Router#
The voice gateway receives a disconnect message from the terminating gateway. The cause code is 0x10
which is normal call clearing.
*Mar 1 15:36:22.916: //45/xxxxxxxxxxxx/CCAPI/cc_api_call_disconnected: (vdbPtr=
0x62EC61A4, callID=0x2D, cause=0x10)
*Mar 1 15:36:22.920: //45/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(11=CC_EV_CALL_
DISCONNECTED), cid(45), disp(0)
*Mar 1 15:36:22.920: //45/45F2AAE28044/SSAPP:0:21/ssaTraceSct: cid(45)st(SSA_CS
_ACTIVE)ev(SSA_EV_CALL_DISCONNECTED)
oldst(SSA_CS_ALERT_RCVD)cfid(21)csize(2)in(0)fDest(0)
*Mar 1 15:36:22.920: //45/45F2AAE28044/SSAPP:0:21/ssaTraceSct: -cid2(44)st2(SSA
_CS_ACTIVE)oldst2(SSA_CS_ACTIVE)
*Mar 1 15:36:22.920: ssa: Disconnected cid(45) state(5) cause(0x10)
The voice gateway begins tearing down the conference and dropping the bridge.
*Mar 1 15:36:22.920: //-1/xxxxxxxxxxxx/CCAPI/ccConferenceDestroy: (confID=0x15,
tag=0x0)
*Mar 1 15:36:22.920: //45/xxxxxxxxxxxx/CCAPI/cc_api_bridge_drop_done: (confID=0
x15, srcIF=0x62EC61A4, srcCallID=0x2D, dstCallID=0x2C, disposition=0 tag=0x0)
*Mar 1 15:36:22.920: //44/xxxxxxxxxxxx/CCAPI/cc_api_bridge_drop_done: (confID=0
x15, srcIF=0x637EC1E0, srcCallID=0x2C, dstCallID=0x2D, disposition=0 tag=0x0)
*Mar 1 15:36:22.924: //44/xxxxxxxxxxxx/SSAPP:-1:-1/sess_appl: ev(30=CC_EV_CONF_
DESTROY_DONE), cid(44), disp(0)
*Mar 1 15:36:22.924: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct:
cid(44)st(SSA_CS_CONF_DESTROYING)ev(SSA_EV_CONF_DESTROY_DONE)
oldst(SSA_CS_ACTIVE)cfid(21)csize(2)in(1)fDest(1)
*Mar 1 15:36:22.924: //44/45F2AAE28044/SSAPP:10002:21/ssaTraceSct: -cid2(45)st2
(SSA_CS_CONF_DESTROYING)oldst2(SSA_CS_ACTIVE)
*Mar 1 15:36:22.924: //45/45F2AAE28044/SSAPP:0:-1/ssaConfDestroyDone:
*Mar 1 15:36:22.924: //44/xxxxxxxxxxxx/CCAPI/ccCallDisconnect: (callID=0x2C, cause=0x10
tag=0x0)
The voice gateway stops call accounting on the incoming call, indicated by the leg_type=True message.
The cause code is then set for the originating leg.
*Mar 1 15:36:22.924: //44/45F2AAE28044/CCAPI/ccCallDisconnect: calling accounting start
for callID=44 leg_type=1
*Mar 1 15:36:22.924: //44/45F2AAE28044/CCAPI/ccCallDisconnect: existing_cause =
0x0, new_cause = 0x10
*Mar 1 15:36:22.924: //44/xxxxxxxxxxxx/CCAPI/cc_api_get_transfer_info: (callID=0x2C)
*Mar 1 15:36:22.924: //45/xxxxxxxxxxxx/CCAPI/ccCallDisconnect: (callID=0x2D, cause=0x10
tag=0x0)
The voice gateway stops call accounting for the outgoing call, indicated by the leg_type=False message.
The cause code is verified for the terminating leg.
*Mar 1 15:36:22.924: //45/45F2AAE28044/CCAPI/ccCallDisconnect: calling accounting start
for callID=45 leg_type=0
*Mar 1 15:36:22.924: //45/45F2AAE28044/CCAPI/ccCallDisconnect: existing_cause =
0x10, new_cause = 0x10
*Mar 1 15:36:22.924: //45/45F2AAE28044/CCAPI/ccCallDisconnect: using the existing_cause
0x10
*Mar 1 15:36:22.928: //45/xxxxxxxxxxxx/CCAPI/cc_api_get_transfer_info: (callID=0x2D)
*Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_api_icpif: expect factor = 0
*Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/g113_calculate_impairment: (delay=79,
loss=0), Io=0 Iq=0 Idte=0 Idd=0 Ie=10 Itot=10
*Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_decr_if_call_volume: the remote
IP is 171.69.85.111
*Mar 1 15:36:22.932: //-1/xxxxxxxxxxxx/CCAPI/cc_decr_if_call_volume: hwidb is Ethernet0/0
Defaults Disabled
Usage Guidelines There is always a performance penalty when using debug commands.
The EDDRI notifies TGREP when an attribute changes on some subsystems. EDDRI interacts with the
dial peer subsystem, the trunk group subsystems, call control API (CCAPI) subsystem and the customer
relationship management (CRM) subsystem to notify changes in particular attributes. EDDRI is
responsible for creating the prefix database.
Examples The following example shows output from the debug voip eddri command:
21:00:53: eddri_interesting_ac_pt: new AC_curr 22 FD_curr -5 SD_curr -5
21:00:53: eddri_interesting_ac_pt: percent trigger diff 4
21:00:53: eddri_interesting_ac_pt: Interesting Point
21:00:53: eddri_send_prefix_event_to_clients : reason 0x40 num_prefix 1
With the send prefix event the available circuits value and the triggers for reporting are updated.
21:00:53: eddri_send_prefix_event_to_clients attr 0xFF ev_id 1 qid 0x64209230 reason 0x40
eddri_dequeue_event : dequeue event
Defaults Disabled
Usage Guidelines Disable console logging and use buffered logging before using the debug voip enum command. Using
the debug voip enum command generates a large volume of debugs, which can affect router
performance.
Examples A sample output of the debug voip enum detail command is shown below.
The output shows the match number as 5108891234, enum table as 10. Rule 1 in table 10 matched the
pattern and after applying the replacement rule, the resulting string is 5108891234. The enum query is
sent out for the domain 4.3.2.1.9.8.8.0.1.5.e164.cisco.com. The output then shows the matching Naming
Authority Pointer (NAPTR) records obtained in the response. The records are then processed and the
final URLs (contact lists) are shown toward the end.
Router# debug voip enum detail
A sample output of the debug voip enum summary command is shown below.
The output shows the matching number, the enum table used and the rule in the table that matched the
number along with the resulting string. Note that this output is a subset of the output from debug voip
enum detail command.
Router# debug voip enum summary
Table 252 provides an alphabetical listing of the debug voip enum command fields and a description of
each field.
Field Description
contact_list Final list of URLs that the gateway will try to contact as an attempt to
place the call.
flag Flag value of a NAPTR record as defined in RFC 2915.
match_num Number to be used for matching against the enum match table.
name Fully qualified domain name sent out to Domain Name System (DNS)
server
ns_server Address of the DNS server. If 0, the DNS server configured on the
gateway is used.
num_elem Number of records received in the response.
order Order in the record, as defined in RFC 2915.
pref Preference of the record, as defined in RFC 2915.
regexp Regular expression of the record, as defined in RFC 2915.
replacement Replacement string of the record, as defined in RFC 2915.
Field Description
re_flags_string Flag indicating whether matching and replacement should be case
sensitive:
• i = Case insensitive
• otherwise = Case sensitive
re_string The first part of the regexp, delimited by “/”. This is used to match the
incoming string. Refer to RFC 2915.
re_substitution_string The second part of regexp, delimited by “/”.
result string String that results when match_num is taken through the enum match
table for a match. This string will be used to form a FQDN.
rule Rule number that matched match_num in the enum match table.
search string String sent out to the DNS server.
service Service field of the NAPTR record. Refer to RFC 2915.
table_indx Index of the enum match table picked for this call.
type Type of record requested in the query:
35 = NAPTR
33 = DNS Service (SRV)
Defaults Disabled
Examples The following example shows debugging output from a Cisco IPIPGW:
Aug 8 15:24:30.626 EDT: cch323_build_early_fastStart_cap_response:
ccb-remote_fastStart=0x63C20630
Aug 8 15:24:30.626 EDT:
cch323_build_early_fastStart_cap_response:symm_mask=1,tempOtherCodec=5,templocalCodec=5,au
dioFastStartArray=0x63C1299C
The following line shows fast start response beginning for the inbound leg of the IP-to-IP call:
The following lines indicate the inbound call leg will send the channel information to the outbound
call leg (not yet created):
The following line indicates the inbound call leg is set to work in IP-to-IP mode (0xF0):
Aug 8 15:24:30.630 EDT: cch323_set_h245_state_mc_mode_incoming: h245 state m/c mode=0xF0
The following line indicates flow mode for incoming call leg is set to FLOW_THROUGH (incoming
callid = 35). At this point Session Application opens the outbound leg. Some output is omitted here.
Aug 8 15:24:30.630 EDT: cch323_media_flow_mode: IPIPGW(35):Flow Mode=1
Aug 8 15:24:30.630 EDT: cch323_set_h245_state_mc_mode_outgoing:call_spi_mode = 1
The following line indicates the outbound call leg is set to work in IP-to-IP mode (0xF0):
Aug 8 15:24:30.630 EDT: cch323_set_h245_state_mc_mode_outgoing: h245 state m/c mode=0xF0
Aug 8 15:24:30.630 EDT: cch323_get_peer_info line 1022:
Aug 8 15:24:30.630 EDT: cch323_get_peer_info line 1026:
Aug 8 15:24:30.630 EDT: cch323_set_pref_codec_list:IPIPGW(36):peer channel present: dp
pref mask=FFFFFFFF
Aug 8 15:24:30.630 EDT: cch323_set_pref_codec_list:IPIPGW(36):first preferred
codec(bytes)=5(160)
The following line indicates the outbound call leg is set to FLOW_THROUGH (outbound callid = 36):
Aug 8 15:24:30.630 EDT: cch323_get_peer_info: Flow Mode set to FLOW_THROUGH for callId 36
Aug 8 15:24:30.642 EDT: cch323_build_local_encoded_fastStartOLCs: state_mc_mode=0xF0 on
outbound leg.
Aug 8 15:24:30.642 EDT: cch323_build_local_encoded_fastStartOLCs:srcAddress = 0x10C0C30,
h245_lport = 0, flow mode = 1, minimum_qos=0
Aug 8 15:24:30.642 EDT: cch323_generic_open_logical_channel: IPIPGW: current codec =
5:160:160.
The following line indicates the IPIPGW received fast start response from the remote (called party)
entity of the outbound call leg:
Aug 8 15:24:30.658 EDT: Function: cch323_receive_fastStart_cap_response Line: 2800
Aug 8 15:24:30.658 EDT: Function: cch323_build_olc_for_ccapi, Line: 1198,
audioFastStartArray=0x63C1259C
Aug 8 15:24:30.658 EDT: cch323_build_olc_for_ccapi: channel_info ptr=0x63C12738, ccb
ptr=0x631A4D68
Aug 8 15:24:30.658 EDT: cch323_build_olc_for_ccapi: Channel Information:
Logical Channel Number (fwd/rev): 1
Channel address (fwd/rev): 0x10C0C28
RTP Channel (fwd/rev): 19128
RTCP Channel (fwd/rev): 19129
QoS Capability (fwd/rev): 0
Symmetric Audio Cap Mask: 0x1
Symmetric Audio Codec Bytes: 160
Flow Mode: 0
Silence Suppression: 0
Aug 8 15:24:30.658 EDT: cch323_build_olc_for_ccapi:NumOfElements = 1 idx = 1
Aug 8 15:24:30.658 EDT: Function: cch323_do_open_channel_ind Line: 1080
Aug 8 15:24:30.658 EDT: Function: cch323_open_channel_ind Line: 1132
The following lines indicates the outbound call leg (36) sends the channel response back to the inbound
call leg (35) via CCAPI:
Aug 8 15:24:30.658 EDT: cch323_receive_fastStart_cap_response: callID 0x24(36),
audioFastStartArray = 0x0.
Aug 8 15:24:30.658 EDT: cch323_peer_channel_ind: IPIPGW:### chn info coming in chn_ind()
Aug 8 15:24:30.658 EDT: cch323_peer_channel_ind: IPIPGW(35):giving event to Fast start
logic.
Aug 8 15:24:30.658 EDT: Function: cch323_do_open_channel Line: 5557
Aug 8 15:24:30.658 EDT: cch323_do_open_channel: line:5566, ccb->status=0x4000000
Aug 8 15:24:30.658 EDT: cch323_do_open_channel:srcAddress = 0x10C0C30, h245_lport =
18308, minimum_qos=0
Outbound leg, at this point, has prepared the fast start response to be sent to the originating (calling
party). This is sent in the next outgoing call control message (such as ALERT or PROGRESS):
Aug 8 15:24:30.658 EDT: cch323_build_fastStart_cap_response: Done.
Aug 8 15:24:30.658 EDT: cch323_do_open_channel: line:5644, ccb->status=0x4004200
Aug 8 15:24:30.674 EDT: cch323_h245_connection_sm: state = 0 event=5 ccb=63C18580
Aug 8 15:24:30.674 EDT: cch323_h245_connection_sm: listen state=0
Aug 8 15:24:30.678 EDT: cch323_h245_cap_ind: IPIPGW(35): masks au=0x1 data=0xC uinp=0x32.
The following line indicates the inbound call leg (35) received capability set (CAPSET) message:
Aug 8 15:24:30.678 EDT: cch323_run_h245_cap_in_sm:IPIPGW(35): got incoming CAPSET msg.
Aug 8 15:24:30.678 EDT: cch323_do_transparent_cap_ind: IPIPGW(35):mask sent to other
leg=1
The following lines show the inbound call leg (35) forwarding the TCS to the outbound leg and waiting
for the response of the outbound call leg (TCSACK or TCSREJ):
Aug 8 15:24:30.678 EDT: cch323_run_h245_cap_in_sm:IPIPGW(35):suppressTCS: our TCS will be
sent based on peer.
Aug 8 15:24:30.678 EDT: cch323_h245_cap_notify:IPIPGW(35):not xmiting CAPSACK: wait for
peer to ack.
The following line shows the outbound leg sending the TCS to the called party. No codec filter is
configured on outbound dial-peer (FFFFFFFF):
The following line shows the outbound leg forwarding the TCS over H.225 tunnel (starting H.245 via
tunnel):
Aug 8 15:24:30.678 EDT: cch323_send_generic_caps: IPIPGW:[trans]audio mask after
operation=0x1.
The following lines show master-slave determination events passing from inbound to outbound and vice
versa:
Aug 8 15:24:30.678 EDT: cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MSD
Aug 8 15:24:30.678 EDT: cch323_h245_connection_sm: state = 0 event=5 ccb=63C18580
Aug 8 15:24:30.678 EDT: cch323_h245_connection_sm: listen state=0
Aug 8 15:24:30.678 EDT: cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MS_IND
Aug 8 15:24:30.678 EDT: cch323_h245_connection_sm: state = 2 event=5 ccb=631A4D68
Aug 8 15:24:30.678 EDT: cch323_h245_connection_sm: listen state=0
Aug 8 15:24:30.678 EDT: cch323_h245_cap_ind: IPIPGW(36): masks au=0x1 data=0xC uinp=0x32.
Aug 8 15:24:30.678 EDT: cch323_run_h245_cap_in_sm:IPIPGW(36): got incoming CAPSET msg.
Aug 8 15:24:30.678 EDT: cch323_do_transparent_cap_ind: IPIPGW(36):mask sent to other
leg=1
The following lines show the outbound leg forwarding the TCS to the other leg and waiting for its
response (TCSACK or TCSREJ):
Aug 8 15:24:30.678 EDT: cch323_run_h245_cap_in_sm:IPIPGW(36):suppressTCS: our TCS will be
sent based on peer.
Aug 8 15:24:30.678 EDT: cch323_h245_cap_notify:IPIPGW(36):not xmiting CAPSACK: wait for
peer to ack.
Aug 8 15:24:30.678 EDT: cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MSD
Aug 8 15:24:30.678 EDT: cch323_caps_ind: IPIPGW(35):setting the mask to new : current
mask=0x4FFFF new mask=0x1.
Aug 8 15:24:30.682 EDT: cch323_caps_ind: IPIPGW(35): ExtendedCapsPresent
The following line shows the inbound call leg sending the TCS to the calling party:
Aug 8 15:24:30.682 EDT: cch323_send_generic_caps: IPIPGW:[trans]audio mask after
operation=0x1.
Aug 8 15:24:30.682 EDT: cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MSD
Aug 8 15:24:30.682 EDT: cch323_h245_connection_sm: state = 2 event=5 ccb=631A4D68
Aug 8 15:24:30.682 EDT: cch323_h245_connection_sm: listen state=0
Aug 8 15:24:30.682 EDT: cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MS_IND
Aug 8 15:24:30.682 EDT: cch323_h245_connection_sm: state = 2 event=5 ccb=631A4D68
Aug 8 15:24:30.682 EDT: cch323_h245_connection_sm: listen state=0
Aug 8 15:24:30.682 EDT: cch323_run_h245_cap_out_sm: IPIPGW(36): got caps ack.
Aug 8 15:24:30.682 EDT: cch323_run_h245_cap_out_sm:IPIPGW(36): sending caps ack to other
leg.
Aug 8 15:24:30.682 EDT: Function: cch323_do_caps_ack Line: 1116
Aug 8 15:24:30.682 EDT: cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MSD
The following line shows the inbound leg informing the outbound leg of the TCSACK:
Aug 8 15:24:30.686 EDT: cch323_run_h245_cap_out_sm:IPIPGW(35): sending caps ack to other
leg.
Aug 8 15:24:30.686 EDT: Function: cch323_do_caps_ack Line: 1116
Aug 8 15:24:30.686 EDT: cch323_peer_caps_ack: IPIPGW(36):sending caps resp event to CAP
state mc.
Aug 8 15:24:30.686 EDT: cch323_h245_connection_sm: state = 2 event=5 ccb=63C18580
Aug 8 15:24:30.686 EDT: cch323_h245_connection_sm: listen state=0
The following lines show that master-slave determination procedures are completed on both call legs:
Aug 8 15:24:30.686 EDT: cch323_run_passthru_msd: IPIPGW(35):event = H245_EVENT_MS_CFM
Aug 8 15:24:30.686 EDT: cch323_run_passthru_msd: IPIPGW(36):event = H245_EVENT_MS_DET_RSP
Syntax Description type Type of debugging messages. The keywords are as follows:
• all—(Optional) Displays debugging messages for all types.
• applib—(Optional) Displays application programming interface
(API) libraries being processed.
• callsetup—(Optional) Displays call setup being processed.
• digitcollect—(Optional) Displays digits collected during the call.
• dynamic—(Optional) Displays dynamic prompt play debug.
• error—(Optional) Displays errors.
• script—(Optional) Displays script debug.
• settlement—(Optional) Displays settlement activities.
• states—(Optional) Displays states.
• tclcommands—(Optional) Displays the Tool Command
Language (TCL) commands used in the script.
Defaults Disabled
Examples The following is sample output from the debug voip ivr command with the applib keyword:
Router# debug voip ivr applib
ivr:
ivr app library debugging is on
!
Jan 10 17:42:04.180:AppManagerCCAPI_Interface:
Jan 10 17:42:04.180:AppNewLeg
Jan 10 17:42:04.180:AppPushLegORConnection:Pushing LEG[34 ][NULL
] Onto {HAN[TCL_HAND][NULL ] ( )}
Jan 10 17:42:04.180:Event CC_EV_CALL_SETUP_IND[29]:LEG[34
][TCL_HAND]
Jan 10 17:42:04.184:AppPushHandler:Pushing {HAN[DC_HAND ][NULL ]
( )} Onto {HAN[TCL_HAND][NULL ] ( LEG[34 ][TCL_HAND] )}
Jan 10 17:42:04.184:AppPushLegORConnection:Pushing LEG[34
][TCL_HAND] Onto {HAN[DC_HAND ][TCL_HAND] ( )}
Jan 10 17:42:04.184:$ mediaPlay():CallID 34
Jan 10 17:42:04.184:Event CC_EV_CALL_REPORT_DIGITS_DONE[45]:LEG[34
][DC_HAND ]
Jan 10 17:42:17.261:AppMediaCallback:CallID 34 received
response 'MSW_RESPONSE_TYPE_PLAY'
with reason 'MSW_REASON_GENERIC_SUCCESS'
Jan 10 17:42:17.261:Event APP_EV_MEDIA_CALLBACK[47]:LEG[34
][DC_HAND ]
Jan 10 17:42:18.209:%ISDN-6-DISCONNECT:Interface Serial0:0
disconnected from unknown , call lasted 13 seconds
The following is sample output from the debug voip ivr command with the callsetup keyword:
Router# debug voip ivr callsetup
!
Jan 10 17:45:57.528:%SYS-5-CONFIG_I:Configured from console by lab on console
Jan 10 17:46:37.682:InitiateCallSetup:Incoming[66] AlertTime -1
Destinations(1) [ 3450070 ]
Jan 10 17:46:37.682:DNInitiate:Destination[3450070]
Jan 10 17:46:37.682:DNSetupPeer:
Jan 10 17:46:37.682:Destination SetupPeer cid(66), destPat(3450070),
match(2), prefix(), peer(61CB5CAC)
Jan 10 17:46:37.762:DNHandler:
(DN_SETTING[1])--(CC_EV_CALL_ALERT[11])--IGNORED-->>(DN_SETTING[1])
Jan 10 17:46:37.762:CS_Setting_ALERT:
Jan 10 17:46:37.762:CSPopLegAndWait:
Jan 10 17:46:37.762:CallSetupHandler:
(CS_SETTING[0]) -----(CS_EV_ALERT[0])------->>>(CS_CONFINGALERT[4])
Jan 10 17:46:37.762:CS_ConfingAlert_CREATEDONE:
Jan 10 17:46:37.762:CallSetupHandler:
(CS_CONFINGALERT[4])
-----(CS_EV_CREATEDONE[4])------->>>(CS_CONFEDALERT[5])
Jan 10 17:46:37.762:CallSetupHandler:
(CS_CONFEDALERT[5])--(DN_SETTING[APP_EV_NULL])--IGNORED-->>>(CS_CONFEDALERT[5])
!
Jan 10 17:46:47.682:CallSetupHandler:
(CS_CONFEDALERT[5])--(DN_SETTING[APP_EV_NULL])--IGNORED-->>>(CS_CONFEDALERT[5])
Jan 10 17:46:48.642:CS_ConfedAlert_CONNECTED:
Jan 10 17:46:48.642:CSDiscReturnAndEmptyLegALL:
Jan 10 17:46:48.642:DNCleanup:
Jan 10 17:46:48.642:DNSettlementCleanup:cid(66) trans=0, provider=0
Jan 10 17:46:48.642:CSReturnIFDone:CallSetup Returning(Status
CS_ACTIVE)
Jan 10 17:46:48.642:CallSetupHandler:
(CS_CONFEDALERT[5]) -----(CS_EV_CONNECTED[1])------->>>(CS_CONFED[3])
Jan 10 17:46:48.646:CallSetupCleanup:
!
The following is sample output from the debug voip ivr command with the digitcollect keyword:
Router# debug voip ivr digitcollect
ivr:
ivr digit collect debugging is on
!
Jan 10 17:47:55.558:DigitCollect:DialPlan=FALSE AbortKey=* TermKey=#
NumPatts=1
Enable=FALSE InterruptPrompt=TRUE maxDigits=11
Jan 10 17:47:55.558:act_DCRunning_RDone:callid=68 Enable succeeded.
!
Jan 10 17:48:04.006:DCHandlerFunc:PassingThrough
Jan 10 17:48:04.066:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:04.066:act_DCRunning_RDone:callid=68 Reporting disabled.
Jan 10 17:48:04.066:DigitCollectComplete:Status 5=DC_MATCHED_PATTERN.
Digits=1
Jan 10 17:48:04.070:DigitCollect:DialPlan=FALSE AbortKey=* TermKey=#
NumPatts=0
Enable=FALSE InterruptPrompt=TRUE maxDigits=11
Jan 10 17:48:04.070:DCHandlerCleanup:
Jan 10 17:48:04.074:act_DCRunning_RDone:callid=68 Enable succeeded.
!
Jan 10 17:48:08.038:DCHandlerFunc:PassingThrough
Jan 10 17:48:09.246:DCHandlerFunc:PassingThrough
Jan 10 17:48:09.286:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:09.478:DCHandlerFunc:PassingThrough
Jan 10 17:48:09.506:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:10.739:DCHandlerFunc:PassingThrough
Jan 10 17:48:10.779:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:11.027:DCHandlerFunc:PassingThrough
Jan 10 17:48:11.067:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:11.687:DCHandlerFunc:PassingThrough
Jan 10 17:48:11.747:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:12.219:DCHandlerFunc:PassingThrough
Jan 10 17:48:12.279:act_DCRunning_Digit::pLeg 68 Digit 2
Jan 10 17:48:14.227:DCHandlerFunc:PassingThrough
Jan 10 17:48:14.287:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:14.779:DCHandlerFunc:PassingThrough
Jan 10 17:48:14.859:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:15.307:DCHandlerFunc:PassingThrough
Jan 10 17:48:15.359:act_DCRunning_Digit::pLeg 68 Digit 1
Jan 10 17:48:15.719:DCHandlerFunc:PassingThrough
Jan 10 17:48:15.759:act_DCRunning_Digit::pLeg 68 Digit 2
Jan 10 17:48:16.219:DCHandlerFunc:PassingThrough
Jan 10 17:48:16.299:act_DCRunning_Digit::pLeg 68 Digit T
Jan 10 17:48:16.299:act_DCRunning_RDone:callid=68 Reporting disabled.
Jan 10 17:48:16.299:DigitCollectComplete:Status 5=DC_MATCHED_PATTERN.
Digits=1111121112
Jan 10 17:48:16.303:DCHandlerCleanup:
Jan 10 17:48:16.335:DigitCollect:DialPlan=TRUE AbortKey=* TermKey=#
NumPatts=0
Enable=FALSE InterruptPrompt=TRUE maxDigits=0
Jan 10 17:48:16.339:act_DCRunning_RDone:callid=68 Enable succeeded.
The following is sample output from the debug voip ivr command with the script keyword:
Router# debug voip ivr script
ivr:
ivr script debugging is on
!
Jan 10 17:49:10.250:FSM Transtion:([1
]CALL_INIT,[29]ev_setup_indication)---([10]act_Setup)--->([4
]LANGSELECTION)
Jan 10 17:49:10.250:TotalLanguages= 2
!
Jan 10 17:49:16.662:FSM Transtion:([4
]LANGSELECTION,[55]ev_digitcollect_done)---([1 ]act_LangSelect)--->([5
]CARDSELECTION)
!
Jan 10 17:49:20.630:([5 ]CARDSELECT,[47]ev_media_d) ------> NOTHANDLED
Jan 10 17:49:26.770:FSM Transtion:([5
]CARDSELECTION,[55]ev_digitcollect_done)---([2
]act_GotCardNumber)--->([6 ]AUTHORIZE)
Jan 10 17:49:26.806:FSM Transtion:([6
]AUTHORIZE,[49]ev_authorize_done)---([8 ]act_FirstAuthorized)--->([7
]GETDEST)
Jan 10 17:49:26.806: aaa authorize Status=ao_000
!
Jan 10 17:49:33.395:([7 ]GETDEST ,[47]ev_media_d) ------> NOTHANDLED
Jan 10 17:49:36.411:FSM Transtion:([7
]GETDEST,[55]ev_digitcollect_done)---([3 ]act_GotDest)--->([8
]SECONDAUTHORIZE)
Jan 10 17:49:36.451:FSM Transtion:([8
]SECONDAUTHORIZE,[49]ev_authorize_done)---([5
]act_SecondAuthorized)--->([10]PLACECALL)
Jan 10 17:49:36.451: aaa authorize Status=ao_000
Jan 10 17:49:42.179:FSM Transtion:
([10]PLACECALL,[47]ev_media_done)---([9
]act_CallSetup)--->([10]PLACECALL)
The following is sample output from the debug voip ivr with the tclcommands keyword:
Router# debug voip ivr tclcommands
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip ivr all command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Examples The following example shows debugging output for the debug voip ivr all command. The show debug
command shows all of the enabled IVR debugging traces.
Router# debug voip ivr all
Router#
ivr:
ivr errors debugging is on
ivr state transitions debugging is on
ivr settlement activities debugging is on
ivr dynamic promptplaying debugging is on
ivr script debugging is on
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//170/ Identifies the CallEntry ID.
APPL:HN34330144: Identifies the application.
TCL2: Identifies the TCL IVR 2 module.
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip ivr applib command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following example shows debugging output for the debug voip ivr applib command:
Router# debug voip ivr applib
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//91/ and //94/ Identifies the CallEntry ID.
APPL: Identifies the application.
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip ivr callsetup command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following example shows debugging output for the debug voip ivr callsetup command:
Router# debug voip ivr callsetup
Router#
Router#!call initiated
Router#
*Mar 11 00:33:11.336: //-1//PCM :LP:HN339DFAE4:HN339DE238:/InitiateCallSetup: Incoming[87]
AlertTime -1 Destinations(1) [ 34998 ]
*Mar 11 00:33:11.336: //-1//PCM :HN339DFAE4:/InitiateCallSetup: Destination 0 guid :
CF1773A4.1CCE11CC.809BA499.0FED1E30
*Mar 11 00:33:11.336: incoming_guid : 00000000.00000000.00000000.00000000
*Mar 11 00:33:11.336: //-1//PCM :LP:HN339DFAE4:HN339DFAE4:/DNInitiate: Destination[34998]
*Mar 11 00:33:11.336: //-1//PCM :HN339DFAE4:/DNMatchDialPeer:
*Mar 11 00:33:11.336: src carrier id:, tgt carrier id:
*Mar 11 00:33:11.336: Matched peers(1)
*Mar 11 00:33:11.336: //-1//PCM :HN339DFAE4:/DNSetupPeer:
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//90/ Identifies the CallEntry ID.
PCM: Identifies the IVR module name. This is the place call module.
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip ivr digitcollect command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following is sample output from the debug voip ivr digitcollect command:
Router# debug voip ivr digitcollect
Router#
Router#!call initiated
Router#
*Mar 11 00:30:05.384: //83//DCM :/DigitCollect: DialPlan=TRUE AbortKey=* TermKey=#
NumPatts=0
Enable=FALSE InterruptPrompt=TRUE maxDigits=0 DialPlanTerm=FALSE
*Mar 11 00:30:05.384: //83//APPL:/AppTypeAheadGetDigit: no chars in buffer.
*Mar 11 00:30:05.440: //83//DCM :/act_DCRunning_RDone: callid=83 Enable succeeded.enable=0
matchDialplan=1
numPatterns=0matchDialplanTerm=0
*Mar 11 00:30:07.912: //83//DCM :/DCHandlerFunc: PassingThrough
*Mar 11 00:30:09.652: //83//APPL:/AppVcrControlEvent: VCR Control, not enabled.---
*Mar 11 00:30:09.652: //83//APPL:/AppTypeAheadEvent: Passing, not enabled.---
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//83/ Identifies the CallEntry ID.
DCM: Identifies the IVR module name. This is the digit collect module.
APPL: Identifies the application.
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip ivr dynamic command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following is sample output from the debug voip ivr dynamic command:
Router# debug voip ivr dynamic
Router#!call answered
Router#
Router#!digits dialed
Router#
Router#!call terminated
Router#
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//118/ Identifies the CallEntry ID.
PDM: Identifies the IVR module name. This is the dynamic prompt
module.
MCM: Identifies the IVR module name. This is the media content
module.
Defaults Disabled
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip ivr script command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following is sample output from the debug voip ivr script command:
Router# debug voip ivr script
Router#
Router#!digits entered
Router#
Router#!call terminated
Router#
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
TCL2: Identifies the TCL IVR 2 module.
Defaults Disabled
Usage Guidelines Settlement output logs activities related to settlement when a call is processed.
We recommend that you log output from the debug voip ivr settlement command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following is sample output from the debug voip ivr settlement command:
Router # debug voip ivr settlement
Router#
Router#!digits dialed
Router#
Router#!call terminated
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//142/ Identifies the CallEntry ID.
TCL2: Identifies the TCL IVR 2 module.
Defaults Disabled
Usage Guidelines State output supplies information about the current status of the IVR script and the different events that
occur in that state.
We recommend that you log output from the debug voip ivr states command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following is sample output from the debug voip ivr states command:
Router# debug voip ivr states
reason=MSW_SYNTH_REASON_DISCONNECTED, current_state=MSW_S_IDLE
*Mar 11 02:57:01.663: //134//MSW :/msw_synth_stop: Stream not currently active
*Mar 11 02:57:01.663: //-1//MSW :/msw_recrd_stop: genericStream=0x634505E8,
mediaStream=0x638D31CC, rtspStream=0x633AF078
reason=MSW_RECRD_REASON_DISCONNECTED current_state=MSW_S_IDLE
*Mar 11 02:57:01.663: //-1//MSW :/msw_recrd_stop: Stream not currently active
*Mar 11 02:57:01.663: //-1//MSW :/msw_recog_stop:
*Mar 11 02:57:01.667: msw_recog_stop: genericStream=0x634505E8,
mrcpStream=0x63450B9C
reason=MSW_RECOG_REASON_DISCONNECTED, current_state=MSW_S_IDLE
*Mar 11 02:57:03.639: //137//TCL2:/TclInterpHandler: CC_EV_CALL_DISCONNECT_DONE
*Mar 11 02:57:03.639: //-1//TCL2:HN341F1290:/TclInterpCleaner:
*Mar 11 02:57:03.639: //-1//TCL2:HN341F1290:/TclCallProcess: Interp Done
*Mar 11 02:57:03.639: //-1//TCL2:HN341F1290:/TclInterpCleanup: Terminate TRUE Terminated
TRUE{HAN[TCL_HAND][NULL ]
( )}
*Mar 11 02:57:03.639: //-1//TCL2:HN341F1290:/TclFreeInterp: {HAN[TCL_HAND][NULL ] ( )}
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//134/ Identifies the CallEntry ID.
PDM: Identifies the IVR module name. This is the dynamic prompt
module.
MCM: Identifies the IVR module name. This is the media content
module.
MSW: Identifies the IVR module name. This is the media service
wrapper.
TCL2 Identifies the TCL IVR 2 module.
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip ivr tclcommands command to a buffer rather
than sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following is sample output from the debug voip ivr tclcommands command:
Router# debug voip ivr tclcommands
Field Description
//-1/ Indicates that the CallEntry ID for the module is unavailable.
//138/ Identifies the CallEntry ID.
TCL2 Identifies the TCL IVR 2 module.
Syntax Description detail (Optional) Prints the contents of the raw message in hexadecimal.
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug voip rawmsg command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following is sample output from the debug voip rawmsg command:
Router# debug voip rawmsg
These debug messages show that a raw message is allocated for this call. The pointer to the memory
location for this raw message is 63075164.
*Mar 1 01:16:25.155: //-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo: Raw Message ALL
OCATED: ptr is 63075164, owner is 1, length is 18, msg is 638E0C54, type is 0, p
rotocol id is 0
The call control API (CCAPI) gets a setup indicator. It has no information about the callid (-1) and
GUID (xxxxxxxxxxxx).
*Mar 1 01:16:25.159: //-1/xxxxxxxxxxxx/CCAPI/cc_api_call_setup_ind:
*Mar 1 01:16:25.159: Raw Message MaMa is TSP owner is CCAPI, length is 77, ptr
is 63075164, type is 0, protocol id is 2
The SSAPP at this stage knows about the CallEntry ID (30) but not about GUID (xxxxxxxxx) or the
dial-peer (-1).
*Mar 1 01:16:25.163: //30/xxxxxxxxxxxx/SSAPP:-1:-1/ssaCallSetupInd:
*Mar 1 01:16:25.163: Raw Message MaMa is TSP owner is SSAPP, length is 77, ptr
is 63075164, type is 0, protocol id is 2
The SSAPP learns about the GUID (34C457CD802F) and also learns the incoming dial peer (10002).
*Mar 1 01:16:25.163: //30/34C457CD802F/SSAPP:10002:-1/ssaSetupPeer:
*Mar 1 01:16:25.163: Raw Message MaMa is TSP owner is SSAPP, length is 77, ptr
is 63075164, type is 0, protocol id is 2
The CCAPI gets the call proceeding for CallEntry ID 30. CCAPI still does not have a
GUID (xxxxxxxxxxx).
*Mar 1 01:16:25.163: //30/xxxxxxxxxxxx/CCAPI/ccCallProceeding:
A new raw message buffer is created and the previous one is released.
*Mar 1 01:16:25.163: //-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo: VoIP Raw Msg Al
loc from 10, Length 77 Body 0
*Mar 1 01:16:25.167: //-1/xxxxxxxxxxxx/CCAPI/ccAllocRawMsgInfo: Raw Message ALL
OCATED: ptr is 630751EC, owner is 10, length is 77, msg is 638E0F0C, type is 0,
protocol id is 0
*Mar 1 01:16:25.167: //30/34C457CD802F/SSAPP:10002:-1/ssaSetupPeer:
*Mar 1 01:16:25.167: ssaSetupPeer: Saved rawmsgpp 630751EC len 77
IAM,
GCI,34c457cd14f911cc802f95f5fabb6b0f?)??p?34999
The SSAPP gets a message indicating the digits were passed along the VoIP call leg to the terminating
gateway. The CallEntry ID is 30, GUID is 34C457CD802F and the incoming dial peer is 10002.
*Mar 1 01:16:25.167: //30/34C457CD802F/SSAPP:10002:-1/ssaReportDigitsDone:
The old raw message 63075164 was freed. The new one is 630751EC.
*Mar 1 01:16:25.179: //-1/xxxxxxxxxxxx/CCAPI/ccFreeRawMsgInfo:
Router#Raw Message FREED: ptr is 63075164, owner is 3, length is 4D, msg is 638E
0DB0, type is 0, protocol id is 2
CCAPI got a call proceeding on the second call leg (31); it has no information about the
GUID (xxxxxxxxx).
*Mar 1 01:16:25.223: //31/xxxxxxxxxxxx/CCAPI/cc_api_call_proceeding:
CCAPI got a call alert on the second call leg (31); still no information about the GUID (xxxxxxxxx).
*Mar 1 01:16:25.227: //31/xxxxxxxxxxxx/CCAPI/cc_api_call_alert:
The alert is sent to the first call leg (30), GUID 34C457CD802F.
*Mar 1 01:16:25.227: //30/34C457CD802F/SSAPP:10002:-1/ssaAlert:
*Mar 1 01:16:25.227: //30/xxxxxxxxxxxx/CCAPI/ccCallAlert:
The call is answered at this point and the CCAPI gets a call connect for the second call
leg (CallEntry ID is 31; GUID is xxxxxxxxx).
The call connect is sent to the first call leg (30), GUID 34C457CD802F.
*Mar 1 01:16:40.975: //30/34C457CD802F/SSAPP:10002:-1/ssaConnect:
*Mar 1 01:16:40.975: //30/xxxxxxxxxxxx/CCAPI/ccCallConnect:
The current raw message (ptr 630751EC) is released; a new one will be proclaimed when needed.
*Mar 1 01:16:40.975: //-1/xxxxxxxxxxxx/CCAPI/ccFreeRawMsgInfo: Raw Message FREE
D: ptr is 630751EC, owner is 10, length is 4D, msg is 638E0F0C, type is 0,
protocol id is 2
The call terminates now. CCAPI detects a call disconnect from the first call leg (30) with no GUID
(xxxxxxxxx).
*Mar 1 01:17:04.007: //30/xxxxxxxxxxxx/CCAPI/cc_api_call_disconnected:
*Mar 1 01:17:04.007: Raw Message MaMa is TSP owner is CCAPI, length is 4, ptr i
s 63075274, type is 0, protocol id is 2
The disconnect is sent to the first call leg (30), GUID (34C457CD802F).
*Mar 1 01:17:04.011: //30/34C457CD802F/SSAPP:10002:14/ssaDisconnected:
*Mar 1 01:17:04.011: Raw Message MaMa is TSP owner is SSAPP, length is 4, ptr i
s 63075274, type is 0, protocol id is 2
The CCAPI disconnects both call legs (incoming 30 and outgoing 31).
*Mar 1 01:17:04.011: //30/xxxxxxxxxxxx/CCAPI/ccCallDisconnect:
*Mar 1 01:17:04.011: //31/xxxxxxxxxxxx/CCAPI/ccCallDisconnect:
*Mar 1 01:17:04.011: Raw Message MaMa is TSP owner is SSAPP, length is 4, ptr i
s 63075274, type is 0, protocol id is 2
The following example shows output when you use the debug voip rawmsg detail command. This
example shows that the CCAPI layer received an indication for call setup. The detailed raw message
dumps the hex of the message. This output is used to track down data pointing to different variables
within the software modules.
Router# debug voip rawmsg detail
Usage Guidelines When used without a keyword, this command turns on debugging for all events. This command severely
impacts performance; use with caution.
Examples The following is sample output from the debug voip rtcp command:
Router# debug voip rtcp
Router#
1w0d: voip_rtcp_send_event: event=EV_STATS
1w0d: voip_rtcp_stats_req: rtcp_interval=6394
1w0d: voip_rtcp_stats_req:delay=40 lost_packets=0 rtt=0
1w0d: recv:
1w0d: SR: ssrc=0x1272A94D sr_ntp_h=0xAF44E047 sr_ntp_l=0xFFB007F6 sr_timestamp=6
1w0d: SDES: ssrc=0x1272A94D name=1 len=19 data=0.0.0@172.19.169.77
1w0d: rtcp_round_trip_delay: ssrc=0x1D86A955
Router#
1w0d: voip_rtcp_remove_ccb
1w0d: voip_rtcp_send_event: event=EV_DESTROY
1w0d: voip_rtcp_destroy_idle
1w0d: voip_rtcp_close_session
1w0d: Cleaning up sess=62F95F58, sp=19544, dp=17130
debug voip rtp {error | session [nse | multicast | conference | dtmf-relay | named-event] | packet
remote-ip ipaddress remote-port portnum packetnum | packet callid idnum packetnum}
Defaults Disabled
Usage Guidelines This command severely impacts performance and should be used only for single-call debug capture. We
do not recommend using this command when using fax relay because it can adversely affect fax relay.
Examples The following example shows debugging output for the debug voip rtp session named-event command.
The example is for a gateway that sends digits 1, 2, 3, then receives digits 9,8,7. The payload type, event
ID, and additional packet payload are shown in each log.
The first three packets indicate the start of the tone (initial packet and two redundant). The last three
packets indicate the end of the tone (initial packet and two redundant). The packets in between are
refresh packets that are sent every 50 milliseconds (without redundancy).
Router# debug voip rtp session named-event
debug voip settlement all [enter | error | exit | misc | network | security | transaction]
no debug voip settlement all [enter | error | exit | misc | network | security | transaction]
Defaults Disabled
Usage Guidelines The debug voip settlement all privileged EXEC command enables the following debug settlement
commands:
• debug voip settlement enter
• debug voip settlement error
• debug voip settlement exit
• debug voip settlement misc
• debug voip settlement network
• debug voip settlement security
• debug voip settlement transaction
Defaults Disabled
Examples 00:43:40:OSP:ENTER:OSPPMimeMessageCreate()
00:43:40:OSP:ENTER:OSPPMimeMessageInit()
00:43:40:OSP:ENTER:OSPPMimeMessageSetContentAndLength()
00:43:40:OSP:ENTER:OSPPMimeMessageBuild()
00:43:40:OSP:ENTER:OSPPMimeDataFree()
00:43:40:OSP:ENTER:OSPPMimePartFree()
00:43:40:OSP:ENTER:OSPPMimePartFree()
00:43:40:OSP:ENTER:OSPPMsgInfoAssignRequestMsg()
00:43:40:OSP:ENTER:osppHttpSelectConnection
00:43:40:OSP:ENTER:OSPPSockCheckServicePoint() ospvConnected = <1>
00:43:40:OSP:ENTER:OSPPSockWaitTillReady()
00:43:40:OSP:ENTER:osppHttpBuildMsg()
00:43:40:OSP:ENTER:OSPPSSLSessionWrite()
00:43:40:OSP:ENTER:OSPPSockWrite()
00:43:40:OSP:ENTER:OSPPSockWaitTillReady()
Defaults Disabled
Examples The following is sample output from the debug voip settlement error command:
Router# debug voip settlement error
Defaults Disabled
Examples The following is sample output from the debug voip settlement exit command:
Router# debug voip settlement exit
01:21:10:OSP:EXIT :OSPPMimeMessageInit()
01:21:10:OSP:EXIT :OSPPMimeMessageSetContentAndLength()
01:21:10:OSP:EXIT :OSPPMimeMessageBuild()
01:21:10:OSP:EXIT :OSPPMimePartFree()
01:21:10:OSP:EXIT :OSPPMimePartFree()
01:21:10:OSP:EXIT :OSPPMimeDataFree()
01:21:10:OSP:EXIT :OSPPMimeMessageCreate()
01:21:10:OSP:EXIT :OSPPMsgInfoAssignRequestMsg()
01:21:10:OSP:EXIT :osppHttpSelectConnection
01:21:10:OSP:EXIT :OSPPSockCheckServicePoint() isconnected(1)
01:21:10:OSP:EXIT :osppHttpBuildMsg()
01:21:10:OSP:EXIT :OSPPSockWrite() (0)
01:21:10:OSP:EXIT :OSPPSSLSessionWrite() (0)
01:21:10:OSP:EXIT :OSPPSSLSessionRead() (0)
01:21:10:OSP:EXIT :OSPPSSLSessionRead() (0)
01:21:10:OSP:EXIT :OSPPHttpParseHeader
01:21:10:OSP:EXIT :OSPPHttpParseHeader
01:21:10:OSP:EXIT :OSPPSSLSessionRead() (0)
01:21:10:OSP:EXIT :OSPPUtilMemCaseCmp()
Defaults Disabled
Examples The following is sample output from the debug voip settlement misc command:
Router# debug voip settlement misc
00:52:03:OSP:osp_authorize:callp=0x6142770C
00:52:03:OSP:OSPPTransactionRequestNew:ospvTrans=0x614278A8
00:52:03:OSP:osppCommMonitor:major:minor=(0x2:0x1)
00:52:03:OSP:HTTP connection:reused
00:52:03:OSP:osppHttpSetupAndMonitor:HTTP=0x6141A514, QUEUE_EVENT from eventQ=0x6141A87C,
comm=0x613F16C4, msginfo=0x6142792C
00:52:03:OSP:osppHttpSetupAndMonitor:connected = <TRUE>
00:52:03:OSP:osppHttpSetupAndMonitor:HTTP=0x6141A514, build msginfo=0x6142792C, trans=0x2
00:52:04:OSP:osppHttpSetupAndMonitor:HTTP=0x6141A514, msg built and sent:error=0,
msginfo=0x6142792C
00:52:04:OSP:osppHttpSetupAndMonitor:monitor exit. errorcode=0
00:52:04:OSP:osppHttpSetupAndMonitor:msginfo=0x6142792C, error=0, shutdown=0
00:52:04:OSP:OSPPMsgInfoProcessResponse:msginfo=0x6142792C, err=0, trans=0x614278A8,
handle=2
00:52:04:OSP:OSPPMsgInfoChangeState:transp=0x614278A8, msgtype=12 current state=2
00:52:04:OSP:OSPPMsgInfoChangeState:transp=0x614278A8, new state=4
00:52:04:OSP:OSPPMsgInfoProcessResponse:msginfo=0x6142792C, context=0x6142770C, error=0
00:52:04:OSP:osp_get_destination:trans_handle=2, get_first=1, callinfop=0x614275E0
00:52:04:OSP:osp_get_destination:callinfop=0x614275E0 get dest=1.14.115.51,
validafter=1999-01-20T02:04:32Z, validuntil=1999-01-20T02:14:32Z
00:52:04:OSP:osp_parse_destination:dest=1.14.115.51
00:52:04:OSP:osp_get_destination:callinfop=0x614275E0, error=0, ip_addr=1.14.115.51,
credit=60
00:52:06:OSP:stop_settlement_ccapi_accounting:send report for callid=0x11, transhandle=2
00:52:06:OSP:osp_report_usage:transaction=2, duration=0, lostpkts=0, lostfrs=0,
lostpktr=0, lostfrr=0
Defaults Disabled
Usage Guidelines Using the debug voip settlement network command shows messages, in detail, in HTTP and XML
formats.
Examples The following is sample output from the debug voip settlement network command:
Router# debug voip settlement network
00:47:25:OSP:HTTP connection:reused
00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0
00:47:25:OSP:OSPPSockWaitTillReady:read=0, timeout=0, select=1
00:47:25:OSP:osppHttpBuildAndSend():http=0x6141A514 sending:
POST /scripts/simulator.dll?handler HTTP/1.1
Host:1.14.115.12
content-type:text/plain
Content-Length:439
Connection:Keep-Alive
Content-Type:text/plain
Content-Length:370
5552222</DestinationInfo>
<Service/>
<MaximumDestinations>
3</MaximumDestinations>
</AuthorisationRequest>
</Message>
00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0
00:47:25:OSP:OSPPSockWaitTillReady:read=0, timeout=1, select=1
00:47:25:OSP:OSPM_SEND:bytes_sent = 577
00:47:25:OSP:OSPPSockProcessRequest:SOCKFD=0, Expecting 100, got
00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0
00:47:25:OSP:OSPPSockWaitTillReady:read=1, timeout=1, select=1
00:47:25:OSP:OSPPSSLSessionRead() recving 1 bytes:
HTTP/1.1 100 Continue
Server:Microsoft-IIS/4.0
Date:Wed, 20 Jan 1999 02:01:54 GMT
00:47:25:OSP:OSPPSockProcessRequest:SOCKFD=0, Expecting 200, got
00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0
00:47:25:OSP:OSPPSockWaitTillReady:read=1, timeout=1, select=1
00:47:25:OSP:OSPPSSLSessionRead() recving 1 bytes:
HTTP/1.1 200 OK
Server:Microsoft-IIS/4.0
Date:Wed, 20 Jan 1999 02:01:54 GMT
Connection:Keep-Alive
Content-Type:multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1;
boundary=bar
Content-Length:1689
00:47:25:OSP:OSPPSockWaitTillReady:HTTPCONN=0x6141A514, fd=0
00:47:25:OSP:OSPPSockWaitTillReady:read=1, timeout=1, select=1
00:47:25:OSP:OSPPSSLSessionRead() recving 1689 bytes:
--bar
Content-Type:text/plain
Content-Length:1510
FmdGVyPjE5OTgtMTItMDhUMjA6MDQ6MFo8L1ZhbGlkQWZ0ZXI+PFZhbGlkVW50aWw+MTk5OS0xMi0zMVQyMzo1OTo1
OVo8L1ZhbGlkVW50aWw+PFRyYW5zYWN0aW9uSWQ+MTAxPC9UcmFuc2FjdGlvbklkPjxVc2FnZURldGFpbD48QW1vdW
50PjE0NDAwPC9BbW91bnQ+PEluY3JlbWVudD4xPC9JbmNyZW1lbnQ+PFNlcnZpY2UvPjxVbml0PnM8L1VuaXQ+PC9V
c2FnZURldGFpbD48L1Rva2VuSW5mbz48L01lc3NhZ2U+</Token>
<UsageDetail>
<Amount>
60</Amount>
<Increment>
1</Increment>
<Service/>
<Unit>
s</Unit>
</UsageDetail>
<ValidAfter>
1999-01-20T01:59:54Z</ValidAfter>
<ValidUntil>
1999-01-20T02:09:54Z</ValidUntil>
</Destination>
<transnexus.com:DelayLimit critical="False">
1000</transnexus.com:DelayLimit>
<transnexus.com:DelayPreference critical="False">
1</transnexus.com:DelayPreference>
</AuthorisationResponse>
</Message>
--bar
Content-Type:application/pkcs7-signature
Content-Length:31
--bar--
Defaults Disabled
Defaults Disabled
Usage Guidelines For complete information about the SSL connection, use the debug voip settlement ssl command if you
see one of the following errors generated from the debug voip settlement error command.
14400:OSP SSL error - failed to allocate memory.
14410:OSP SSL error - failed to initialize the context.
14420:OSP SSL error - failed to retrieve the version.
14430:OSP SSL error - failed to initialize the session.
14440:OSP SSL error - failed to attach the socket.
14450:OSP SSL error - handshake failed.
14460:OSP SSL error - failed to close SSL.
14470:OSP SSL error - failed to read from SSL.
14480:OSP SSL error - failed to write to SSL.
14490:OSP SSL error - could not get certificate.
14495:OSP SSL error - no root certificate found.
14496:OSP SSL error - failed to set the private key.
14497:OSP SSL error - failed to parse the private key.
14498:OSP SSL error - failed to add certificates.
14499:OSP SSL error - failed to add DN.
Examples The following example shows the debug output when the SSL is making a good connection to the Open
Settlement Protocol server:
*May 15 11:53:42.871:OSP:
*May 15 11:53:42.871:OSPPSSLConnect:****** SSL HANDSHAKE SUCCEED !!**** retry=2
These messages do not indicate an error but indicate the result of the operation.
To display actual error messages, enter the debug voip settlement error command.
Defaults Disabled
debug vpdn
To troubleshoot Layer 2 Forwarding (L2F) or Layer 2 Tunnel Protocol (L2TP) virtual private dialup
network (VPDN) tunneling events and infrastructure, use the debug vpdn command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug vpdn {call {event | fsm} | error | event [disconnect] | l2tp-sequencing | l2x-data |
l2x-errors | l2x-events | l2x-packets | message | packet [detail | errors] | sss {error | event |
fsm}}
no debug vpdn {call {event | fsm} | error | event [disconnect] | l2tp-sequencing | l2x-data |
l2x-errors | l2x-events | l2x-packets | message | packet [detail | errors] | sss {error | event |
fsm}}
Syntax Description call event Displays significant events in the VPDN call manager.
call fsm Displays significant events in the VPDN call manager finite state machine
(fsm).
error Displays VPDN errors.
event Displays VPDN events.
disconnect (Optional) Displays VPDN disconnect events.
l2tp-sequencing Displays significant events related to L2TP sequence numbers such as
mismatches, resend queue flushes, and drops.
l2x-data Displays errors that occur in data packets.
l2x-errors Displays errors that occur in protocol-specific conditions.
l2x-events Displays events resulting from protocol-specific conditions.
l2x-packets Displays detailed information about control packets in protocol-specific
conditions.
message Displays VPDN interprocess messages.
packet Displays information about VPDN packets.
detail (Optional) Displays detailed packet information, including packet dumps.
errors (Optional) Displays errors that occur in packet processing.
sss error Displays debug information about VPDN Subscriber Service Switch (SSS)
errors.
sss event Displays debug information about VPDN SSS events.
sss fsm Displays debug information about the VPDN SSS fsm.
T Release Modification
11.2 This command was introduced.
12.0(5)T Support was added for L2TP debugging messages. The l2tp-sequencing
and errors keywords were added. The l2f-errors, l2f-events, and
l2f-packets keywords were changed to l2x-errors, l2x-events, and
l2x-packets.
12.2(4)T Support was added for the message and call {event | fsm} keywords.
12.2(11)T Support was added for the detail keyword.
12.2(13)T Support was added for the sss {error | event | fsm} keywords.
Usage Guidelines Note that the debug vpdn packet and debug vpdn packet detail commands generate several debug
operations per packet. Depending on the L2TP traffic pattern, these commands may cause the CPU load
to increase to a high level that impacts performance.
The following is sample output from the debug vpdn event command on a NAS when an L2F tunnel is
brought up and Challenge Handshake Authentication Protocol (CHAP) authentication of the tunnel
succeeds:
Router# debug vpdn event
The following is sample output from the debug vpdn event command on a NAS when the L2F tunnel
is brought down normally:
Router# debug vpdn event
Table 262 describes the significant fields shown in the two previous displays. The output describes
normal operations when an L2F tunnel is brought up or down on a NAS.
Table 262 debug vpdn event Field Descriptions for the NAS
Field Description
Asynchronous interface coming up
%LINK-3-UPDOWN: Interface Async6, Asynchronous interface 6 came up.
changed state to up
looking for tunnel -- cisco.com -- Domain name is identified.
Async6 VPN Forwarding...
Async6 VPN Bind interface direction=1 Tunnel is bound to the interface. These are the
direction values:
• 1—From the NAS to the tunnel server
• 2—From the tunnel server to the NAS
Async6 VPN vpn_forward_user Tunnel for the specified user and domain name is
user6@cisco.com is forwarded forwarded.
%LINEPROTO-5-UPDOWN: Line protocol Line protocol is up.
on Interface Async6, changed state to up
L2F: Chap authentication succeeded for Tunnel was authenticated with the tunnel password
nas1. nas1.
Virtual access interface coming down
%LINEPROTO-5-UPDOWN: Line protocol Normal operation when the virtual access interface is
on Interface Async6, changed state to down taken down.
Async6 VPN cleanup Normal cleanup operations performed when the line or
virtual access interface goes down.
Async6 VPN reset
Async6 VPN Unbind interface
virtual-template 1
terminate-from hostname nas1
The following is sample output from the debug vpdn event command on the tunnel server when an L2F
tunnel is brought up successfully:
Router# debug vpdn event
The following is sample output from the debug vpdn event command on a tunnel server when an L2F
tunnel is brought down normally:
Router# debug vpdn event
Table 263 describes the fields shown in two previous outputs. The output describes normal operations
when an L2F tunnel is brought up or down on a tunnel server.
Table 263 debug vpdn event Field Descriptions for the Tunnel Server
Field Description
Tunnel coming up
L2F: Chap authentication succeeded for PPP CHAP authentication status for the tunnel named
nas1. nas1.
Virtual-Access3 VPN Virtual interface Virtual access interface was set up on the tunnel server
created for user6@cisco.com for the user user6@cisco.com.
Virtual-Access3 VPN Set to Async interface Virtual access interface 3 was set to asynchronous for
character-by-character transmission.
Virtual-Access3 VPN Clone from Vtemplate Virtual template 1 was applied to virtual access
1 block=1 filterPPP=0 interface 3.
%LINK-3-UPDOWN: Interface Link status is set to up.
Virtual-Access3, changed state to up
Virtual-Access3 VPN Bind interface Tunnel is bound to the interface. These are the
direction=2 direction values:
• 1—From the NAS to the tunnel server
• 2—From the tunnel server to the NAS
Virtual-Access3 VPN PPP LCP accepted PPP link control protocol (LCP) configuration settings
sent & rcv CONFACK (negotiated between the remote client and the NAS)
were copied to the tunnel server and acknowledged.
Table 263 debug vpdn event Field Descriptions for the Tunnel Server (continued)
Field Description
%LINEPROTO-5-UPDOWN: Line protocol Line protocol is up; the line can be used.
on Interface Virtual-Access3, changed state
to up
Tunnel coming down
%LINK-3-UPDOWN: Interface Virtual access interface is coming down.
Virtual-Access3, changed state to down
Virtual-Access3 VPN cleanup Router is performing normal cleanup operations when
a virtual access interface used for an L2F tunnel comes
Virtual-Access3 VPN reset
down.
Virtual-Access3 VPN Unbind interface
Virtual-Access3 VPN reset
%LINEPROTO-5-UPDOWN: Line protocol Line protocol is down for virtual access interface 3; the
on Interface Virtual-Access3, changed state line cannot be used.
to down
20:47:35: As7 VPDN: Get tunnel info for cisco.com with NAS nas1, IP 172.21.9.13
20:47:35: As7 VPDN: Forward to address 172.21.9.13
20:47:35: As7 VPDN: Forwarding...
20:47:35: As7 VPDN: Bind interface direction=1
20:47:35: Tnl/Cl 8/1 L2TP: Session FS enabled
20:47:35: Tnl/Cl 8/1 L2TP: Session state change from idle to wait-for-tunnel
20:47:35: As7 8/1 L2TP: Create session
20:47:35: Tnl 8 L2TP: SM State idle
20:47:35: Tnl 8 L2TP: Tunnel state change from idle to wait-ctl-reply
20:47:35: Tnl 8 L2TP: SM State wait-ctl-reply
20:47:35: As7 VPDN: bum1@cisco.com is forwarded
20:47:35: Tnl 8 L2TP: Got a challenge from remote peer, nas1
20:47:35: Tnl 8 L2TP: Got a response from remote peer, nas1
20:47:35: Tnl 8 L2TP: Tunnel Authentication success
20:47:35: Tnl 8 L2TP: Tunnel state change from wait-ctl-reply to established
20:47:35: Tnl 8 L2TP: SM State established
20:47:35: As7 8/1 L2TP: Session state change from wait-for-tunnel to wait-reply
20:47:35: As7 8/1 L2TP: Session state change from wait-reply to established
20:47:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async7, changed state to up
The following is sample output from the debug vpdn l2x-events command on a NAS when an L2F
tunnel is brought down normally:
Router# debug vpdn l2x-events
Field Descriptions
Tunnel coming up
%LINK-3-UPDOWN: Interface Async6, Asynchronous interface came up normally.
changed state to up
L2F Open UDP socket to 172.21.9.26 L2F opened a User Datagram Protocol (UDP) socket to
the tunnel server IP address.
L2F_CONF received L2F_CONF signal was received. When sent from the
tunnel server to the NAS, an L2F_CONF indicates the
tunnel server's recognition of the tunnel creation
request.
L2F Removing resend packet (type ...) Removing the resend packet for the L2F management
packet.
There are two resend packets that have different
meanings in different states of the tunnel.
L2F_OPEN received L2F_OPEN management message was received,
indicating that the tunnel server accepted the NAS
configuration of an L2F tunnel.
L2F building nas2gw_mid0 L2F is building a tunnel between the NAS and the
tunnel server, using the Multiplex ID (MID) MID0.
%LINEPROTO-5-UPDOWN: Line protocol Line protocol came up. Indicates whether the software
on Interface Async6, changed state to up processes that handle the line protocol regard the
interface as usable.
L2F_OPEN received L2F_OPEN management message was received,
indicating that the tunnel server accepted the NAS
configuration of an L2F tunnel.
L2F Got a MID management packet MID management packets are used to communicate
between the NAS and the tunnel server.
L2F MID synced NAS/HG Clid=7/15 Mid=1 L2F synchronized the Client IDs on the NAS and the
on Async6 tunnel server, respectively. A multiplex ID is assigned
to identify this connection in the tunnel.
Tunnel coming down
%LINEPROTO-5-UPDOWN: Line protocol Line protocol came down. Indicates whether the
on Interface Async6, changed state to down software processes that handle the line protocol regard
the interface as usable.
%LINK-5-CHANGED: Interface Async6, Interface was marked as reset.
changed state to reset
L2F_CLOSE received NAS received a request to close the tunnel.
L2F Destroying mid Connection identified by the MID is being taken down.
L2F Tunnel is going down! Advisory message about impending tunnel shutdown.
L2F Initiating tunnel shutdown. Tunnel shutdown has started.
L2F_CLOSE received NAS received a request to close the tunnel.
L2F Got closing for tunnel NAS began tunnel closing operations.
Field Descriptions
%LINK-3-UPDOWN: Interface Async6, Asynchronous interface was taken down.
changed state to down
L2F Closed tunnel structure NAS closed the tunnel.
L2F Deleted inactive tunnel Now-inactivated tunnel was deleted.
L2F_CONF received
L2F Creating new tunnel for nas1
L2F Got a tunnel named nas1, responding
L2F Open UDP socket to 172.21.9.25
L2F_OPEN received
L2F Removing resend packet (type 1)
L2F_OPEN received
L2F Got a MID management packet
%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
The following is sample output from the debug vpdn l2x-events command on a tunnel server when the
L2F tunnel is brought down normally:
Router# debug vpdn l2x-events
L2F_CLOSE received
L2F Destroying mid
L2F Removing resend packet (type 3)
L2F Tunnel is going down!
L2F Initiating tunnel shutdown.
%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down
L2F_CLOSE received
L2F Got closing for tunnel
L2F Removing resend packet
L2F Removing resend packet
L2F Closed tunnel structure
L2F Closed tunnel structure
L2F Deleted inactive tunnel
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to down
Field Description
Tunnel coming up
L2F_CONF received L2F configuration is received from the NAS. When sent
from a NAS to a tunnel server, the L2F_CONF is the
initial packet in the conversation.
L2F Creating new tunnel for nas1 Tunnel named nas1 is being created.
L2F Got a tunnel named nas1, responding Tunnel server is responding.
Field Description
L2F Open UDP socket to 172.21.9.25 Opening a socket to the NAS IP address.
L2F_OPEN received L2F_OPEN management message was received,
indicating the NAS is opening an L2F tunnel.
L2F Removing resend packet (type ...) Removing the resend packet for the L2F management
packet.
The two resend packet types have different meanings in
different states of the tunnel.
L2F Got a MID management packet L2F MID management packets are used to
communicate between the NAS and the tunnel server.
%LINK-3-UPDOWN: Interface Tunnel server is bringing up virtual access interface 1
Virtual-Access1, changed state to up for the L2F tunnel.
%LINEPROTO-5-UPDOWN: Line protocol Line protocol is up. The line can be used.
on Interface Virtual-Access1, changed state
to up
Tunnel coming down
L2F_CLOSE received NAS or tunnel server received a request to close the
tunnel.
L2F Destroying mid Connection identified by the MID is being taken down.
L2F Removing resend packet (type ...) Removing the resend packet for the L2F management
packet.
There are two resend packets that have different
meanings in different states of the tunnel.
L2F Tunnel is going down! Router is performing normal operations when a tunnel
is coming down.
L2F Initiating tunnel shutdown.
%LINK-3-UPDOWN: Interface The virtual access interface is coming down.
Virtual-Access1, changed state to down
L2F_CLOSE received Router is performing normal cleanup operations when
the tunnel is being brought down.
L2F Got closing for tunnel
L2F Removing resend packet
L2F Removing resend packet
L2F Closed tunnel structure
L2F Closed tunnel structure
L2F Deleted inactive tunnel
%LINEPROTO-5-UPDOWN: Line protocol Line protocol is down; virtual access interface 1 cannot
on Interface Virtual-Access1, changed state be used.
to down
Table 266 debug vpdn error Field Descriptions for the NAS
Field Description
%LINEPROTO-5-UPDOWN: Line protocol Line protocol on the asynchronous interface went
on Interface Async1, changed state to down down.
%LINK-5-CHANGED: Interface Async1, Asynchronous interface 1 was reset.
changed state to reset
%LINK-3-UPDOWN: Interface Async1, Link from asynchronous interface 1 link went down
changed state to down and then came back up.
%LINK-3-UPDOWN: Interface Async1,
changed state to up
%LINEPROTO-5-UPDOWN: Line protocol Line protocol on the asynchronous interface came back
on Interface Async1, changed state to up up.
VPDN tunnel management packet failed to Tunnel authentication failed. This is the most common
authenticate VPDN error.
Note Verify the password for the NAS and the
tunnel server name.
The following is sample output from the debug vpdn l2x-errors command:
Router# debug vpdn l2x-errors
Field Description
%LINK-3-UPDOWN: Interface The line protocol on the asynchronous interface came up.
Async1, changed state to up
L2F Out of sequence packet 0 Packet was expected to be the first in a sequence starting at 0, but
(expecting 0) an invalid sequence number was received.
L2F Tunnel authentication Tunnel was established from the NAS to the tunnel server,
succeeded for cisco.com cisco.com.
L2F Received a close request for Multiplex ID was not used previously; cannot close the tunnel.
a non-existent mid
L2F Out of sequence packet 0 Packet was expected to be the first in a sequence starting at 0, but
(expecting 0) an invalid sequence number was received.
L2F packet has bogus1 key Value based on the authentication response given to the peer during
1020868 D248BA0F tunnel creation. This packet, in which the key does not match the
expected value, must be discarded.
L2F packet has bogus1 key Another packet was received with an invalid key value. The packet
1020868 D248BA0F must be discarded.
Field Description
L2F SENDING (17) Number of bytes being sent. The first set of
“SENDING”...“RECEIVED” lines displays L2F keepalive traffic.
The second set displays L2F management data.
L2F header flags: Version and flags, in decimal.
version 53249 Version.
protocol 1 Protocol for negotiation of the point-to-point link between the NAS
and the tunnel server is always 1, indicating L2F management.
sequence 16 Sequence numbers start at 0. Each subsequent packet is sent with the
next increment of the sequence number. The sequence number is thus
a free running counter represented modulo 256. There is a distinct
sequence counter for each distinct MID value.
mid 0 Multiplex ID, which identifies a particular connection within the
tunnel. Each new connection is assigned a MID currently unused
within the tunnel.
cid 4 Client ID used to assist endpoints in demultiplexing tunnels.
length 17 Size in octets of the entire packet, including header, all fields pre-sent,
and payload. Length does not reflect the addition of the checksum, if
pre-sent.
offset 0 Number of bytes past the L2F header at which the payload data is
expected to start. If it is 0, the first byte following the last byte of the
L2F header is the first byte of payload data.
key 1701976070 Value based on the authentication response given to the peer during
tunnel creation. During the life of a session, the key value serves to
resist attacks based on spoofing. If a packet is received in which the
key does not match the expected value, the packet must be silently
discarded.
L2F RECEIVED (17) Number of bytes received.
L2F-IN Otput to Async1 Payload datagram. The data came in to the VPDN code.
(16)
L2F-OUT (16): Payload datagram sent out from the VPDN code to the tunnel.
L2F-OUT (101) Ping payload datagram. The value 62 in this line is the ping packet
size in hexadecimal (98 in decimal). The three lines that follow this
line show ping packet data.
23:31:18: L2X: l2tun session [1669204400], event [client request], old state [open], new
state [open]
23:31:18: L2X: L2TP: Received L2TUN message <Connect>
23:31:18: Tnl/Sn58458/28568 L2TP: Session state change from idle to wait-for-tunnel
23:31:18: Tnl/Sn58458/28568 L2TP: Create session
23:31:18: Tnl58458 L2TP: SM State idle
23:31:18: Tnl58458 L2TP: O SCCRQ
23:31:18: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds
23:31:18: Tnl58458 L2TP: Tunnel state change from idle to wait-ctl-reply
23:31:18: Tnl58458 L2TP: SM State wait-ctl-reply
23:31:18: Tnl58458 L2TP: I SCCRP from router
23:31:18: Tnl58458 L2TP: Tunnel state change from wait-ctl-reply to established
23:31:18: Tnl58458 L2TP: O SCCCN to router tnlid 8012
23:31:18: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds
23:31:18: Tnl58458 L2TP: SM State established
23:31:18: Tnl/Sn58458/28568 L2TP: O ICRQ to router 8012/0
23:31:18: Tnl/Sn58458/28568 L2TP: Session state change from wait-for-tunnel to wait-reply
23:31:19: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds
23:31:20: %LINK-3-UPDOWN: Interface Ethernet2/1, changed state to up
23:31:21: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet2/1, changed state to
up
23:31:25: L2X: Sending L2TUN message <Connect OK>
23:31:25: Tnl/Sn58458/28568 L2TP: O ICCN to router 8012/35149
23:31:25: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds
23:31:25: Tnl/Sn58458/28568 L2TP: Session state change from wait-reply to established
23:31:25: L2X: l2tun session [1669204400], event [server response], old state [open], new
state [open]
23:31:26: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds
Usage Guidelines The debug vpdn pppoe-data command displays a large number of debug messages and should
generally be used only on a debug chassis with a single active session.
Examples The following is sample output from the debug vpdn pppoe-data command:
Router# debug vpdn pppoe-data
6d20h:PPPoE:IN
particle pak, size 3840
C2 23 02 06 00 24 10 E6 84 FF 3A A4 49 19 CE D7
AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73
63 6F 2E 63 6F 6D 00 00
6d20h:PPPoE:OUT
contiguous pak, size 8
FF 03 C2 23 03 06 00 04
6d20h:PPPoE:OUT
contiguous pak, size 14
FF 03 80 21 01 01 00 0A 03 06 65 65 00 66
6d20h:PPPoE:IN
particle pak, size 1240
80 21 01 01 00 0A 03 06 00 00 00 00 49 19 CE D7
AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73
63 6F 2E 63 6F 6D 00 00
6d20h:PPPoE:OUT
contiguous pak, size 14
FF 03 80 21 03 01 00 0A 03 06 65 65 00 67
6d20h:PPPoE:IN
particle pak, size 1240
80 21 02 01 00 0A 03 06 65 65 00 66 00 04 AA AA
03 00 80 C2 00 07 00 00 00 10 7B 01 2C D9 00 B0
C2 EB 10 38 88 64 11 00
6d20h:PPPoE:IN
particle pak, size 1240
80 21 01 02 00 0A 03 06 65 65 00 67 49 19 CE D7
AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73
63 6F 2E 63 6F 6D 00 00
6d20h:PPPoE:OUT
contiguous pak, size 14
FF 03 80 21 02 02 00 0A 03 06 65 65 00 67
6d20h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1,
changed state to up
6d20h:PPPoE:OUT
contiguous pak, size 16
FF 03 C0 21 09 01 00 0C D3 FF 2B DA 4C 4D 49 A4
6d20h:PPPoE:IN
particle pak, size 1440
C0 21 0A 01 00 0C 39 53 A5 17 4C 4D 49 A4 AA AA
03 00 80 C2 00 07 00 00 00 10 7B 01 2C D9 00 B0
C2 EB 10 38 88 64 11 00
6d20h:PPPoE:IN
particle pak, size 1440
C0 21 09 01 00 0C 39 53 A5 17 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
Field Descriptions
6d20h:%LINK-3-UPDOWN:Interface Virtual access interface 1 came up.
Virtual-Access1, changed state to up
6d20h:PPPoE:OUT The host delivered a PPPoE session packet to the
access concentrator.
6d20h:PPPoE:IN The access concentrator received a PPPoE session
packet.
Field Descriptions
6d20h:%LINEPROTO-5-UPDOWN:Line Line protocol is up; the line can be used.
protocol on Interface Virtual-Access1,
changed state to up
contiguous pak, size 19 Size 19 contiguous packet.
particle pak, size 1240 Size 1240 particle packet.
Examples The following is a full list of error messages displayed by the debug vpdn pppoe-error command:
PPPOE:pppoe_acsys_err cannot grow packet
PPPoE:Cannot find PPPoE info
PPPoE:Bad MAC address:00b0c2eb1038
PPPOE:PADI has no service name tag
PPPoE:pppoe_handle_padi cannot add AC name/Cookie.
PPPoE:pppoe_handle_padi cannot grow packet
PPPoE:pppoe_handle_padi encap failed
PPPoE cannot create virtual access.
PPPoE cannot allocate session structure.
PPPoE cannot store session element in tunnel.
PPPoE cannot allocate tunnel structure.
PPPoE cannot store tunnel
PPPoE:VA221:No Session, Packet Discarded
PPPOE:Tried to shutdown a null session
PPPoE:Session already open, closing
PPPoE:Bad cookie:src_addr=00b0c2eb1038
PPPoE:Max session count on mac elem exceeded:mac=00b0c2eb1038
PPPoE:Max session count on vc exceeded:vc=3/77
PPPoE:Bad MAC address - dropping packet
PPPoE:Bad version or type - dropping packet
Field Descriptions
PPPOE:pppoe_acsys_err cannot grow packet Asynchronous PPPoE packet initialization error.
PPPoE:Cannot find PPPoE info The access concentrator sends a PADO to the host.
PPPoE:Bad MAC address:00b0c2eb1038 The host was unable to identify the Ethernet MAC
address.
PPPOE:PADI has no service name tag PADI requires a service name tag.
PPPoE:pppoe_handle_padi cannot add AC pppoe_handle_padi could not append AC name.
name/Cookie.
PPPoE:pppoe_handle_padi cannot grow pppoe_handle_padi could not append packet.
packet
PPPoE:pppoe_handle_padi encap failed pppoe_handle_padi could not specify PPPoE on ATM
encapsulation.
PPPoE cannot create virtual access. PPPoE session unable to verify virtual access
interface.
PPPoE cannot allocate session structure. PPPoE session unable to allocate Stage Protocol.
PPPoE cannot store session element in PPPoE tunnel cannot allocate session element.
tunnel.
PPPoE cannot allocate tunnel structure. PPPoE tunnel unable to allocate Stage Protocol.
PPPoE cannot store tunnel PPPoE configuration settings unable to initialize a
tunnel.
PPPoE:VA221:No Session, Packet Discarded No sessions created. All packets dropped.
PPPOE:Tried to shutdown a null session Null session shutdown.
PPPoE:Session already open, closing PPPoE session already open.
PPPoE:Bad cookie:src_addr=00b0c2eb1038 PPPoE session unable to append new cookie.
PPPoE:Max session count on mac elem The maximum number of sessions exceeded the
exceeded:mac=00b0c2eb1038 Ethernet MAC address.
PPPoE:Max session count on vc The maximum number of sessions exceeded the PVC
exceeded:vc=3/77 connection.
PPPoE:Bad MAC address - dropping packet The host was unable to identify the MAC address.
Packet dropped.
PPPoE:Bad version or type - dropping packet The host was unable to identify the encapsulation type.
Examples The following is sample output from the debug vpdn pppoe-events command:
1w5d:IN PADI from PPPoE tunnel
1w5d:OUT PADO from PPPoE tunnel
1w5d:IN PADR from PPPoE tunnel
1w5d:PPPoE:VPN session created.
1w5d:%LINK-3-UPDOWN:Interface Virtual-Access2, changed state to up
Field Descriptions
1w5d:IN PADI from PPPoE tunnel The access concentrator receives an Active Discovery
Initiation (PADI) packet from the PPPoE tunnel.
1w5d:OUT PADO from PPPoE tunnel The access concentrator sends an Active Discovery
Offer (PADO) to the host.
1w5d:IN PADR from PPPoE tunnel The host sends a single Active Discovery
Request (PADR) to the access concentrator that it has
chosen.
1w5d:PPPoE:VPN session created. The access concentrator receives the PADR packet and
creates a virtual private network (VPN) session.
Field Descriptions
1w5d:%LINK-3-UPDOWN:Interface Virtual access interface 2 came up.
Virtual-Access2, changed state to up
1w5d:%LINEPROTO-5-UPDOWN:Line Line protocol is up. The line can be used.
protocol on Interface Virtual-Access2,
changed state to up
Usage Guidelines The debug vpdn pppoe-packet command displays a large number of debug messages and should
generally only be used on a debug chassis with a single active session.
Examples The following is sample output from the debug vpdn pppoe-packet command:
PPPoE control packets debugging is on
1w5d:PPPoE:discovery packet
contiguous pak, size 74
FF FF FF FF FF FF 00 10 7B 01 2C D9 88 63 11 09
00 00 00 04 01 01 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...
1w5d:OUT PADO from PPPoE tunnel
contiguous pak, size 74
00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 10
7B 01 2C D9 00 90 AB 13 BC A8 88 63 11 07 00 00
00 20 01 01 00 00 01 02 00 04 41 67 6E 69 01 ...
1w5d:PPPoE:discovery packet
contiguous pak, size 74
00 90 AB 13 BC A8 00 10 7B 01 2C D9 88 63 11 19
00 00 00 20 01 01 00 00 01 02 00 04 41 67 6E 69
01 04 00 10 B7 4B 86 5B 90 A5 EF 11 64 A9 BA ...
Field Descriptions
PPPoE control packets debugging is on PPPoE debugging of packets is enabled.
1w5d:PPPoE:discovery packet The host performs a discovery to initiate a PPPoE
session.
1w5d:OUT PADO from PPPoE tunnel The access concentrator sends a PADO to the host.
1w5d:PPPoE:discovery packet The host performs a discovery to initiate a PPPoE
session.
contiguous pak, size 74 Size 74 contiguous packet.
Defaults Disabled
Usage Guidelines Use the debug vpm all command to enable the complete set of VPM debugging commands: debug vpm
dsp, debug vpm error, debug vpm port, debug vpm spi, and debug vpm trunk_sc.
Execution of no debug all will turn off all port level debugging. It is usually a good idea to turn off all
debugging and then enter the debug commands you are interested in one by one. This will help to avoid
confusion about which ports you are actually debugging.
Examples For sample outputs, refer to the documentation of the other debup vpm commands.
Usage Guidelines The debug vpm dsp command shows messages from the DSP on the VPM to the router; this command
can be useful if you suspect that the VPM is not functional. It is a simple way to check if the VPM is
responding to off-hook indications and to evaluate timing for signaling messages from the interface.
Examples The following output shows the DSP time stamp and the router time stamp for each event. For
SIG_STATUS, the state value shows the state of the ABCD bits in the signaling message. This sample
shows a call coming in on an FXO interface.
The router waits for ringing to terminate before accepting the call. State=0x0 indicates ringing; state 0x4
indicates not ringing.
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x0 timestamp=58172 systime=40024
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x4 timestamp=59472 systime=40154
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x4 timestamp=59589 systime=40166
This shows the disconnect indication and the final call statistics reported by the DSP (which are then
populated in the call history table):
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0xC timestamp=21214 systime=42882
vcsm_dsp_message: MSG_TX_GET_TX_STAT: num_tx_pkts=1019 num_signaling_pkts=0
num_comfort_noise_pkts=0 transmit_durtation=24150 voice_transmit_duration=20380
fax_transmit_duration=0
Defaults Disabled
Usage Guidelines Execution of no debug all will turn off all port level debugging. You should turn off all debugging and
then enter the debug commands you are interested in one by one. This will help avoid confusion about
which ports you are actually debugging.
Examples The following example shows debug vpm error messages for Cisco 2600 or Cisco 3600 series router
or a Cisco MC3810 series concentrator:
Router# debug vpm error
The following example turns off debug vpm error debugging messages:
Router# no debug vpm error
Syntax Description slot-number (Optional) Specifies the slot number in the Cisco router where the voice
interface card is installed. Valid entries are from 0 to 3, depending on the router
being used and the slot where the voice interface card has been installed.
subunit-number (Optional) Specifies the subunit on the voice interface card where the voice port
is located. Valid entries are 0 or 1.
port (Optional) Specifies the voice port. Valid entries are 0 or 1.
Usage Guidelines This command is not supported on Cisco 7200 series routers or on the Cisco MC3810.
Use this command to limit the debug output to a particular port. The debug output can be quite
voluminous for a single channel. A 12-port box might create problems. Use this debug command with
any or all of the other debug modes.
Execution of no debug vpm all will turn off all port level debugging. We recommend that you turn off
all debugging and then enter the debug commands you are interested in one by one. This process helps
to avoid confusion about which ports you are actually debugging.
Examples The following is sample output from the debug vpm port 1/1/0 command during trunk establishment
after the no shutdown command has been executed on the voice port:
Router# debug vpm port 1/1/0
Note in the above display that “transport_protocol = 3” indicates Voice-over-Frame Relay. Also note that
the second line of the display indicates that a shutdown/no shutdown command sequence was executed
on the voice port.
Usage Guidelines The debug vpm signal command collects debug information only for signaling events. This command
can also be useful in resolving problems with signaling to a PBX.
Examples The following output shows that a ring is detected, and that the router waits for the ringing to stop before
accepting the call:
ssm_process_event: [1/0/1, 0.2, 15] fxols_onhook_ringing
ssm_process_event: [1/0/1, 0.7, 19] fxols_ringing_not
ssm_process_event: [1/0/1, 0.3, 6]
ssm_process_event: [1/0/1, 0.3, 19] fxols_offhook_clear
The following output confirms a disconnect from the switch and release with higher layer code:
ssm_process_event: [1/0/1, 0.4, 27] fxols_offhook_disc
ssm_process_event: [1/0/1, 0.4, 33] fxols_disc_confirm
ssm_process_event: [1/0/1, 0.4, 3] fxols_offhook_release
Defaults Disabled
Examples The following is sample output from the debug vpm signaling command:
Usage Guidelines The debug vpm spi command traces how the voice port module SPI interfaces with the call control API.
This debug command displays information about how each network indication and application request
is handled.
This debug level shows the internal workings of the voice telephony call state machine.
Examples The following output shows that the call is accepted and presented to a higher layer code:
dsp_set_sig_state: [1/0/1] packet_len=14 channel_id=129 packet_id=39 state=0xC
timestamp=0x0
vcsm_process_event: [1/0/1, 0.5, 1] act_up_setup_ind
The following output shows that the higher layer code accepts the call, requests addressing information,
and starts DTMF and dial-pulse collection. It also shows that the digit timer is started.
vcsm_process_event: [1/0/1, 0.6, 11] act_setup_ind_ack
dsp_voice_mode: [1/0/1] packet_len=22 channel_id=1 packet_id=73 coding_type=1
voice_field_size=160 VAD_flag=0 echo_length=128 comfort_noise=1 fax_detect=1
dsp_dtmf_mode: [1/0/1] packet_len=12 channel_id=1 packet_id=65 dtmf_or_mf=0
dsp_CP_tone_on: [1/0/1] packet_len=32 channel_id=1 packet_id=72 tone_id=3 n_freq=2
freq_of_first=350 freq_of_second=440 amp_of_first=4000 amp_of_second=4000 direction=1
on_time_first=65535 off_time_first=0 on_time_second=65535 off_time_second=0
dsp_digit_collect_on: [1/0/1] packet_len=22 channel_id=129 packet_id=35
min_inter_delay=550 max_inter_delay=3200 mim_make_time=18 max_make_time=75
min_brake_time=18 max_brake_time=75
vcsm_timer: 46653
The following output shows the collection of digits one by one until the higher level code indicates it has
enough. The input timer is restarted with each digit and the device waits in idle mode for connection to
proceed.
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_timer: 47055
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_timer: 47079
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_timer: 47173
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_timer: 47197
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_timer: 47217
vcsm_process_event: [1/0/1, 0.7, 13] act_dcollect_proc
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
dsp_digit_collect_off: [1/0/1] packet_len=10 channel_id=129 packet_id=36
dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68
The following output shows that the network voice path cuts through:
vcsm_process_event: [1/0/1, 0.8, 15] act_bridge
vcsm_process_event: [1/0/1, 0.8, 20] act_caps_ind
vcsm_process_event: [1/0/1, 0.8, 21] act_caps_ack
dsp_voice_mode: [1/0/1] packet_len=22 channel_id=1 packet_id=73 coding_type=6
voice_field_size=20 VAD_flag=1 echo_length=128 comfort_noise=1 fax_detect=1
The following output shows that the called-party end of the connection is connected:
vcsm_process_event: [1/0/1, 0.8, 8] act_connect
The following output shows the voice quality statistics collected periodically:
vcsm_process_event: [1/0/1, 0.13, 17]
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0
vcsm_process_event: [1/0/1, 0.13, 28]
vcsm_process_event: [1/0/1, 0.13, 29]
vcsm_process_event: [1/0/1, 0.13, 32]
vcsm_process_event: [1/0/1, 0.13, 17]
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0
vcsm_process_event: [1/0/1, 0.13, 28]
vcsm_process_event: [1/0/1, 0.13, 29]
vcsm_process_event: [1/0/1, 0.13, 32]
vcsm_process_event: [1/0/1, 0.13, 17]
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0
vcsm_process_event: [1/0/1, 0.13, 28]
vcsm_process_event: [1/0/1, 0.13, 29]
vcsm_process_event: [1/0/1, 0.13, 32]
The following output shows that the disconnection indication is passed to higher-level code. The call
connection is torn down, and final call statistics are collected:
vcsm_process_event: [1/0/1, 0.13, 4] act_generate_disc
vcsm_process_event: [1/0/1, 0.13, 16] act_bdrop
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_process_event: [1/0/1, 0.13, 18] act_disconnect
dsp_get_levels: [1/0/1] packet_len=10 channel_id=1 packet_id=89
vcsm_timer: 48762
vcsm_process_event: [1/0/1, 0.15, 34] act_get_levels
dsp_get_tx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=86 reset_flag=1
vcsm_process_event: [1/0/1, 0.15, 31] act_stats_complete
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
dsp_digit_collect_off: [1/0/1] packet_len=10 channel_id=129 packet_id=36
dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68
vcsm_timer: 48762
dsp_set_sig_state: [1/0/1] packet_len=14 channel_id=129 packet_id=39 state=0x4
timestamp=0x0
vcsm_process_event: [1/0/1, 0.16, 5] act_wrelease_release
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=1
Usage Guidelines Use the debug vpm port command with the slot-number/subunit-number/port argument to limit the
debug vpm trunk_sc debug output to a particular port. If you do not use the debug vpm port command,
the debug vpm trunk_sc displays output for all ports.
Execution of the no debug all command will turn off all port level debugging. It is usually a good idea
to turn off all debugging and then enter the debug commands you are interested in one by one. This
process helps avoid confusion about which ports you are actually debugging.
Examples The following example shows debug vpm trunk_sc messages for port 1/0/0 on a Cisco 2600 or
Cisco 3600 series router:
Router# debug vpm trunk_sc
The following example shows debug vpm trunk_sc messages for port 1/1 on a Cisco MC3810 device:
Router# debug vpm trunk_sc
The following example turns off debug vpm trunk_sc debugging messages:
Router# no debug vpm trunk_sc
Usage Guidelines Do not enter this debug command on a system carrying live traffic. Continuous display of AAL2 type 1
(voice) packets results in high CPU utilization and loss of console access to the system. Calls will be
dropped and trunks may go down. For AAL2 debugging, use the debug vpm voaal2 type3 debug
command and identify a specific type 3 (control) packet type.
Examples The following is sample output from the debug vpm voaal2 all command, where the example selection
is to display channel-associated switching (CAS) packets sent to and from the DSP:
Router# debug vpm voaal2 all all_dsp
....
Usage Guidelines Do not enter this debug command on a system carrying live traffic. Continuous display of AAL2 type 1
(voice) packets results in high CPU utilization and loss of console access to the system. Calls will be
dropped and trunks may go down. For AAL2 debugging, use the debug vpm voaal2 type3 debug
command and identify a specific type 3 (control) packet type.
Examples The following is sample output from the debug vpm voaal2 type1 command:
Note The display of voice packets on a live system will continue indefinitely. The debugging output cannot
be interrupted, because console access will be lost.
debug vpm voaal2 type3 {alarms | alltype3 | cas | dialed | faxrelay | state}{all_dsp | from_dsp |
to_dsp}
Usage Guidelines This is the preferred debug command for displaying specific types of control packets. It is usually
preferable to specify a particular type of control packet rather than use the alltype3 to avoid excessive
output display and CPU utilization.
Examples The following is sample output from the debug vpm voaal2 type3 command, where the example
selection is to display messages to and from the DSP:
Router# debug vpm voaal2 type3 all_dsp
Examples The following is sample output for the debug vrrp all command:
Router# debug vrrp all
Examples The following is sample output for the debug vrrp error command:
Router# debug vrrp error
Router#
00:15:30: %IP-4-DUPADDR: Duplicate address 10.18.0.2 on Ethernet1/0, sourced by
0000.5e00.0101
May 22 18:41:54.447: VRRP: Grp 1 Advertisement Primary address 10.18.0.2
different from ours 10.18.0.1
May 22 18:41:57.443: VRRP: Grp 1 Advertisement Primary address 10.18.0.2
different from ours 10.18.0.1
May 22 18:42:00.443: VRRP: Grp 1 Advertisement Primary address 10.18.0.2
different from ours 10.18.0.1
In the example, the error being observed is that the router has a virtual address of 10.18.0.1 for group 1,
but it received a virtual address of 10.18.0.2 for group 1 from another router on the same LAN.
Examples The following is sample output from the debug vrrp events command:
Router# debug vrrp events
In the example, the event being observed is that the router received an advertisement from another router
for group 1 that has a higher or equal priority to itself.
Examples The following is sample output from the debug vrrp packets command. The output is on the master
virtual router; the router for group 1 is sending an advertisement with a checksum of 6BE7.
Router# debug vrrp packets
In the following example, the router with physical address 10.18.0.3 is advertising a priority of 105 for
VRRP group 1:
Router# debug vrrp packets
Examples The following is sample output from the debug vrrp state command:
Router# debug vrrp state
Usage Guidelines Use the debug vsi api command to monitor the communication between the VSI master and the
XmplsATM component regarding interface changes and cross-connect requests.
Examples The following is sample output from the debug vsi api command:
Router# debug vsi api
Field Description
vsi_exatm_conn_req The type of connection request (connect or disconnect) that was submitted
to the VSI master.
0x000C0200 The logical interface identifier of the primary endpoint, in hexadecimal
form.
1/35 The virtual path identifier (VPI) and virtual channel identifier (VCI) of the
primary endpoint.
Field Description
-> The type of traffic flow. A right arrow (->) indicates unidirectional traffic
flow (from the primary endpoint to the secondary endpoint). A bidirectional
arrow (<->) indicates bidirectional traffic flow.
0x000C0100 Logical interface identifier of the secondary endpoint.
1/50 VPI and VCI of the secondary endpoint.
desired state The status of a connect request. Up indicates a connect request; Down
indicates a disconnect request.
status (in The status of a request. One of following status indications appears:
vsi_exatm_conn_req
output) OK
INVALID_ARGS
NONEXIST_INTF
TIMEOUT
NO_RESOURCES
FAIL
OK means only that the request is successfully queued for transmission to
the switch; it does not indicate completion of the request.
Usage Guidelines Use the debug vsi errors command to display information about errors encountered by the VSI master
when parsing received messages, as well as information about unexpected conditions encountered by the
VSI master.
If the interface parameter is specified, output is restricted to errors associated with the indicated
VSI control interface. If the slave number is specified, output is further restricted to errors associated
with the session with the indicated slave.
Note Slave numbers are the same as the session numbers discussed under the show controllers vsi session
command.
Multiple commands that specify slave numbers allow multiple slaves to be debugged immediately. For
example, the following commands display errors associated with sessions 0 and 1 on control interface
atm2/0, but for no other sessions.
Router# debug vsi errors interface atm2/0 slave 0
Router# debug vsi errors interface atm2/0 slave 1
Some errors are not associated with any particular control interface or session. Messages associated with
these errors are printed, regardless of the interface or slave options currently in effect.
Examples The following is sample output from the debug vsi errors command:
Router# debug vsi errors
VSI Master: parse error (unexpected param-group contents) in GEN ERROR RSP rcvd on
ATM2/0:0/51 (slave 0)
errored section is at offset 16, for 2 bytes:
01.01.00.a0 00.00.00.00 00.12.00.38 00.10.00.34
*00.01*00.69 00.2c.00.00 01.01.00.80 00.00.00.08
00.00.00.00 00.00.00.00 00.00.00.00 0f.a2.00.0a
00.01.00.00 00.00.00.00 00.00.00.00 00.00.00.00
00.00.00.00
Field Description
parse error An error was encountered during the parsing of a message received by the
VSI master.
unexpected The type of parsing error. In this case, a parameter group within the message
param-group contents contained invalid data.
GEN ERROR RSP The function code in the header of the error message.
ATM2/0 The control interface on which the error message was received.
0/51 The virtual path identifier (VPI) or virtual channel identifier (VCI) of the
virtual circuit (VC) (on the control interface) on which the error message is
received.
slave Number of the session on which the error message is received.
offset <n> The number of bytes between the start of the VSI header and the start of that
portion of the message in error.
<n> bytes Length of the error section.
00.01.00.a0 [...] The entire error message, as a series of hexadecimal bytes. Note that the
error section is between asterisks (*).
Usage Guidelines Use the debug vsi events command to display information about events associated with the per-session
state machines of the Virtual Switch Interface (VSI) master, as well as the per-connection state machines.
If you specify an interface, the output is restricted to events associated with the indicated VSI control
interface. If you specify the slave number, output is further restricted to events associated with the
session with the indicated slave.
Note Slave numbers are the same as the session numbers discussed under the show controllers vsi session
command.
Multiple commands that specify slave numbers allow multiple slaves to be debugged at once. For
example, the following commands restrict output to events associated with sessions 0 and 1 on control
interface atm2/0, but for no other sessions. Output associated with all per-connection events are
displayed, regardless of the interface or slave options currently in effect.
Router# debug vsi events interface atm2/0 slave 0
Router# debug vsi events interface atm2/0 slave 1
Examples The following is sample output from the debug vsi events command:
Router# debug vsi events
Field Description
conn The event applies to a particular connection.
0xC0200 Logical interface identifier of the primary endpoint, in hexadecimal form.
1/37 The virtual path identifier (VPI) or virtual channel identifier (VCI) of the
primary endpoint.
-> The type of traffic flow. A right arrow (->) indicates unidirectional traffic
flow (from the primary endpoint to the secondary endpoint). A bidirectional
arrow (<->) indicates bidirectional traffic flow.
0xC0100 Logical interface identifier of the secondary endpoint.
1/51 VPI or VCI of the secondary endpoint.
<state1> -> <state2> <state1> is a mnemonic for the state of the connection before the event
occurred.
<state2> represents the state of the connection after the event occurred.
session The number of the session with which the event is associated.
ATM2/0 The control interface associated with the session.
event The event that has occurred. This includes mnemonics for the function
codes of received messages (for example, CONN_CMT_RSP), as well as
mnemonics for other events (for example, KEEPALIVE_TIMEOUT).
state <state1> -> Mnemonics for the session states associated with the transition triggered by
<state2> the event. <state1> is a mnemonic for the state of the session before the
event occurred; <state2> is a mnemonic for the state of the session after the
event occurred.
Usage Guidelines If you specify an interface, output is restricted to messages sent and received on the indicated VSI
control interface. If you specify a slave number, output is further restricted to messages sent and received
on the session with the indicated slave.
Note Slave numbers are the same as the session numbers discussed under the show controllers vsi session
command.
Multiple commands that specify slave numbers allow multiple slaves to be debugged at once. For
example, the following commands restrict output to messages received on atm2/0 for sessions 0 and 1,
but for no other sessions.
Router# debug vsi packets interface atm2/0 slave 0
Router# debug vsi packets interface atm2/0 slave 1
Examples The following is sample output from the debug vsi packets command:
Router# debug vsi packets
Field Description
session Session number identifying a particular VSI slave. Numbers begin with
zero. See the show controllers vsi session command.
ATM2/0 Identifier for the control interface on which the message is sent or received.
sent The message is sent by the VSI master.
rcvd The message is received by the VSI master.
msg The function code from the message header.
0/51 The virtual path identifier (VPI) or virtual channel identifier (VCI) of the
virtual circuit (VC) (on the control interface) on which the message is sent
or received.
Note param-groups stands for parameter groups. A parameter group is a component of a VSI message.
Usage Guidelines This command is most commonly used with the debug vsi packets command to monitor incoming and
outgoing VSI messages.
If you specify an interface, output is restricted to messages sent and received on the indicated VSI
control interface.
If you specify a slave, output is further restricted to messages sent and received on the session with the
indicated slave.
Note Slave numbers are the same as the session numbers discussed under the show controllers vsi session
command.
Multiple commands that specify slave numbers allow multiple slaves to be debugged at once. For
example, the following commands restrict output for messages received on atm2/0 for sessions 0 and 1,
but for no other sessions:
Router# debug vsi param-groups interface atm2/0 slave 0
Router# debug vsi param-groups interface atm2/0 slave 1
Examples The following is sample output from the debug vsi param-groups command:
Router# debug vsi param-groups
Field Description
Outgoing The message is sent by the VSI master.
Incoming The message is received by the VSI master.
bytes Number of bytes in the message, starting at the VSI header, and excluding
the link layer encapsulation.
01.02... The first 128 bytes of the message, in hexadecimal form.
debug vtemplate
To display cloning information for a virtual access interface from the time it is cloned from a virtual
template to the time the virtual access interface comes down when the call ends, use the debug
vtemplate command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug vtemplate
no debug vtemplate
Examples The following is sample output from the debug vtemplate command when a virtual access interface
comes up. The virtual access interface is cloned from virtual template 1.
Router# debug vtemplate
The following is sample output from the debug vtemplate command when a virtual access interface
goes down. The virtual interface is uncloned and returns to the recycle queue.
Router# debug vtemplate
Field Description
VTEMPLATE Reuse vaccess8, New Recycle Virtual access interface 8 is reused; the current queue
queue size:50 size is 50.
VTEMPLATE set default vaccess8 with no ip
address
Virtual-Access8 VTEMPLATE hardware MAC address of virtual interface 8.
address 0000.0c09.ddfd
VTEMPLATE vaccess8 has a new cloneblk Recording that virtual access interface 8 is cloned
vtemplate, now it has vtemplate from the virtual interface template.
VTEMPLATE undo default settings vaccess8 Removing the default settings.
VTEMPLATE ************* CLONE Banner: Cloning is in progress on virtual access
VACCESS8 ********** ******* interface 8.
VTEMPLATE Clone from vtemplate1 to Specific configuration commands in virtual interface
vaccess8 template 1 that are being applied to the virtual access
interface 8.
interface Virtual-Access8
no ip address
encap ppp
ip unnumbered Ethernet0
no ip mroute-cache
fair-queue 64 256 0
no cdp enable
ppp authentication chap
end
%LINK-3-UPDOWN: Interface Link status: The link is up.
Virtual-Access8, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol Line protocol status: The line protocol is up.
on Interface Virtual-Access8, changed state to
up
Field Description
%LINK-3-UPDOWN: Interface Link status: The link is down.
Virtual-Access8, changed state to down
VTEMPLATE Free vaccess8 Freeing virtual access interface 8.
%LINEPROTO-5-UPDOWN: Line protocol Line protocol status: The line protocol is down.
on Interface Virtual-Access8, changed state to
down
VTEMPLATE clean up dirty vaccess queue, Access queue cleanup is proceeding and the template
size:1 is being uncloned.
VTEMPLATE Found a dirty vaccess8 clone
with vtemplate
VTEMPLATE ************ UNCLONE
VACCESS8 **************
VTEMPLATE Unclone to-be-freed vaccess8 Specific configuration commands to be removed from
command#7 the virtual access interface 8.
interface Virtual-Access8
default ppp authentication chap
default cdp enable
default fair-queue 64 256 0
default ip mroute-cache
default ip unnumbered Ethernet0
default encap ppp
default ip address
end
VTEMPLATE set default vaccess8 with no ip Default is set again.
address
VTEMPLATE remove cloneblk vtemplate Removing the record of cloning from a virtual
from vaccess8 with vtemplate interface template.
VTEMPLATE Add vaccess8 to recycle queue, Virtual access interface is added to the recycle queue.
size=51
Usage Guidelines These debugging messages are displayed if the user configures virtual templates with commands that are
incompatible with virtual access subinterfaces.
Examples The following example displays virtual access subinterface debugging messages:
Router# debug vtemplate subinterface
Field Description
VT Indicates that this is a debug virtual template subinterface
message.
[Vt11]: Indicates that this message concerns virtual template 11.
Field Description
Config prevents subinterface creation Indicates that this virtual template cannot support the
creation of virtual access subinterfaces.
carrier-delay 45 These are the commands that make the virtual template
ip rtp priority 2000 2010 500 incompatible with subinterfaces.
debug vtsp
To display the state of the gateway and the call events, use the debug vtsp event command in privileged
EXEC mode. To display the machine state during voice telephony service provider (VTSP) event
processing, use the no form of the command.
debug vtsp {all | dsp | error | event | session | stats | tone | rtp}
no debug vtsp {all | dsp | error | event | session | stats | tone | rtp}
Note The debug vtsp command with the event keyword must be turned on before the voice call debug
command can be used.
Syntax Description all All VTSP debugging except stats, tone, and event is enabled.
dsp Digital signal processor (DSP) message trace is enabled.
error VTSP error debugging is enabled.
event State machine debugging is enabled.
session Session debugging is enabled.
stats Statistics debugging is enabled.
tone Tone debugging is enabled.
rtp Real-Time Transport Protocol (RTP) debugging is enabled.
Examples The following is sample output for a Cisco AS5300 and Cisco 3640 when the debug vtsp all command
is entered:
Field Description
VTSP:():-1:-1:-1 Identifies the VTSP module, port name, channel number, DSP
slot, and DSP channel number.
vtsp_tsp_apply_voiceport_xrule: Identifies a function name.
called_number Identifies a called number.
called Identifies the date the call was made.
peer_tag Identifies the dial peer number.
guid Identifies the GUID (hexadecimal address).
Defaults Disabled
Usage Guidelines The debug vtsp all command enables the following debug vtsp commands: debug vtsp session, debug
vtsp error, and debug vtsp dsp. For more information or sample output, see the individual commands.
Execution of the no debug vtsp all command will turn off all VTSP-level debugging. You should turn
off all debugging and then enter the debug commands you are interested in one by one. This process
helps avoid confusion about which ports you are actually debugging.
Caution Using this command can severely impact network performance and prevent any faxes from succeeding.
Examples The following example shows the debug vtsp all command on a Cisco 3640 modular access router:
Router# debug vtsp all
At this point, the VTSP is not aware of anything. The format of this message is
//callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
• CallEntry ID is -1.
• GUID is xxxxxxxxxx.
• The voice port is blank.
• Channel ID is -1.
• DSP ID is -1.
• DSP channel ID is -1.
The original and the translated calling number are the same (55555) and the original and the translated
called number are the same (888545). These numbers are often the same because if a translation rule is
applied, it will be on the dial peers or the ports, both of which comes later than these VTSP messages in
the Cisco IOS code execution.
*Mar 1 08:23:10.869: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate:
calling_number(original)= calling_number(xlated)=55555 called_number(original)=
called_number(xlated)=888545 redirectNumber(original)= redirectNumber(xlated)=
The VTSP got a call setup indicator from the TSP layer with called number 888545 and calling number
55555. There is no awareness of the CallEntry ID (-1) or the GUID (xxxxxxxxxxxx).
*Mar 1 08:23:10.873: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_call_setup_ind:
(sdb=0x634C90EC, tdm_info=0x0, tsp_info=0x63083950, calling_number=55555 calling_oct3 =
0x80, called_number=888545 called_oct3 = 0x80, oct3a=0x0): peer_tag=10002
*Mar 1 08:23:10.873: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_fill_setup_ind
: ev.clg.clir is 0
ev.clg.clid_transparent is 0
ev.clg.null_orig_clg is 0
ev.clg.calling_translated is false
At this point, the VTSP is not aware of anything. The format of this message is
//callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
• CallEntry ID is -1.
• GUID is D2F6429A8A8A.
• The voice port is 1/0:23 where 23 indicates D channel.
• The T1 channel is still unknown at this point (-1).
• The digital signal processor (DSP) is 0.
• The DSP channel is 4.
The VTSP learns about the B channel (changed from -1 to 22), and the CallEntry ID is still
unknown (-1).
*Mar 1 08:23:10.873: //-1/D2F6429A8A8A/VTSP:(1/0:23):22:0:4/vtsp_do_call_setup_ind:
type=0, under_spec=1615186336, name=, id0=23, id1=0, id2=0, calling=55555,called=888545
subscriber=RegularLinevtsp_do_call_setup_ind: redirect DN = reason = -1
*Mar 1 08:23:10.877: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_normal_call_setup_ind: .
The VTSP learns the CallEntry ID. The format of this message is
//callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
• CallEntry ID is 899 (changed from -1 to 899)
• GUID is D2F6429A8A8A
• The voice port is 1/0:23 where 23 indicates D channel
• The T1 channel is 22
• The DSP is 12
• The DSP channel is 4
In the following outputs, VTSP sets some of the voice parameters for this call:
• Modem capability
• Playout delay
• Dial-peer tag 10003
• Digit timeouts
VTSP sends out an alerting to the POTS leg; the phone is ringing at this time.
*Mar 1 08:23:10.949: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event:
vtsp:[1/0:23:899, S_PROCEEDING, E_CC_ALERT]
*Mar 1 08:23:10.949: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_alert: .
*Mar 1 08:23:10.949: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer_stop:3019095
*Mar 1 08:23:18.769: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_get_dialpeer_tag: tag
= 10003
The phone gets answered here, a bridge is now set up between the two call legs.
*Mar 1 08:23:18.769: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event:
vtsp:[1/0:23:899, S_ALERTING, E_CC_BRIDGE]
*Mar 1 08:23:18.769: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_bridge: .
The VTSP received a capabilities indication event from the CCAPI. The VTSP needs to be aware of this
because it handles the DSPs.
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event:
vtsp:[1/0:23:899, S_CONNECT, E_CC_CAPS_IND]
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: .
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: RTP
PT:NTE[101],NTEtx[101],NSE[100],FaxInd[96],FaxAck[97],CiscoDTMF[121],FaxRelay[122],CASsig[
123],ClearChan[125],PCMu[0],PCMa[8]Codec[4],TxDynamicPayload[0], RxDynamicPayload[0]
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: dtmf relay:
mode=32, codec=1
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: passthrough:
cap_modem_proto 0, cap_modem_codec 0, cap_modem_redundancy 0, payload100, modem_relay 0,
gw-xid=0
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: Encap 1, Vad
2, Codec 0x4, CodecBytes 20,
FaxRate 2, FaxBytes 20, FaxNsf 0xAD0051
SignalType 2
DtmfRelay 32, Modem 0, SeqNumStart 0x1343
*Mar 1 08:23:18.773: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind:
*Mar 1 08:23:18.777: FORKING Parameters are forking mask: 0, simple_forking_codec_mask:
0, complex_forking_codec_mask 0
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ind: [
mode:0,init:60, min:40, max:200]
The VTSP received events regarding capabilities acknowledged from the call control API (CCAPI).
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event:
vtsp:[1/0:23:899, S_CONNECT, E_CC_CAPS_ACK]
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ack: .
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ack: passthrough:
cap_modem_proto 0, cap_modem_codec 0, cap_modem_redundancy 0, payload100, modem_relay 0,
gw-xid=0
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_caps_ack: Named
Telephone Event payload: rcv 101, tx 101
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_switch_codec:
*Mar 1 08:23:18.777: DTMF Relay in act_switch_codec is 32
*Mar 1 08:23:18.777: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/set_dsp_encap_config:
A digit begin event was detected while in the connect state. Digit 1 is dialed outbound on the POTS legs.
*Mar 1 08:23:26.745: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_call_digit_begin:
vtsp_call_digit_begin: digit=1, digit_begin_flags=0x0, rtp_timestamp=0, rtp_expiration=0
*Mar 1 08:23:26.745: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event:
vtsp:[1/0:23:899, S_CONNECT, E_CC_DIGIT_BEGIN]
*Mar 1 08:23:26.745:
//899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_digit_begin:act_digit_begin
*Mar 1 08:23:27.045: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_call_digit_end:
vtsp_call_digit_end: digit=1, duration=300
A digit end event was detected while in the connect state. The total duration of the digit was 300 ms.
*Mar 1 08:23:27.045: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event:
vtsp:[1/0:23:899, S_CONNECT, E_CC_DIGIT_END,]
*Mar 1 08:23:27.045: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_digit_end:
act_digit_end
The call is hung up at this point, VTSP receives a bridge drop event from the CCAPI.
*Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_process_event:
vtsp:[1/0:23:899, S_CONNECT, E_CC_BRIDGE_DROP]
*Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_remove_stream_node:
*Mar 1 08:23:39.393: vtsp_remove_stream_node
*Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_get_xmit_info_node:
*Mar 1 08:23:39.393: vtsp_get_xmit_info_node
*Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_remove_stream_node:
*Mar 1 08:23:39.393: Stream count is 1 in function vtsp_remove_stream_node
*Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_bdrop: .
*Mar 1 08:23:39.393: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_is_record_active:
*Mar 1 08:23:39.393: vtsp_is_record_active: false
Following the disconnect event from the CCAPI, the timers are stopped.
*Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_ring_noan_timer_stop:
3021940
*Mar 1 08:23:39.397:
//899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_pcm_tone_detect_timer_stop: 3021940
*Mar 1 08:23:39.397:
//899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_pcm_switchover_timer_stop: 3021940
*Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_cm_detect_timer_stop:
3021940
*Mar 1 08:23:39.397:
//899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_modem_relay_mode_timer_stop: 3021940
*Mar 1 08:23:39.397:
//899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_modem_relay_stats_timer_stop: 3021940
*Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer_stop:3021940
*Mar 1 08:23:39.397: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/act_disconnect: cdb
0x635FC480, cause 0x10
*Mar 1 08:23:39.401: //899/D2F6429A8A8A/VTSP:(1/0:23):22:12:4/vtsp_timer: 3021940
Defaults Disabled
Note We recommend that you log output from the debug vtsp dsp command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Examples The following example shows the VTSP DSP usage on a Cisco 3640 modular access router:
Router# debug vtsp dsp
Field Descriptions
//12 CallEntry ID.
/A76D98838014 GUID.
1/0:23 Controller 1/0, D channel.
:22 B-channel number. This can also be found using the
show voice call summary command.
:14 DSP number. This can also be found using the show voice dsp
command.
:2 Channel number on the DSP. This can also be found using the
show voice dsp command.
echo_cancel: 1 Echo cancel is on.
Defaults Disabled
Usage Guidelines The debug vtsp error command can be used to check for mismatches in interface capabilities.
Note We recommend that you log output from the debug vtsp error command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Defaults Disabled
Usage Guidelines The debug vtsp event command can be used to enable state machine debugging.
Note We recommend that you log output from the debug vtsp event command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Examples The following example shows sample output from the debug vtsp event command:
Router# debug vtsp event
The following events are seen when the call is set up.
*Mar 1 22:20:39.138: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_SETUP_INDICATED, event: E_CC_PROCEEDING]
As soon as the call is answered, the bridge comes up and the CONNECT event appears.
*Mar 1 22:20:47.798: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_ALERTING, event: E_CC_BRIDGE]
*Mar 1 22:20:47.802: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_ALERTING, event: E_CC_CONNECT]
The following debug outputs are regularly seen as the call progresses. The outputs indicate that
collection of Tx/Rx/Delay/Error statistics is occurring.
*Mar 1 22:20:49.470: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_CC_REQ_PACK_STAT]
*Mar 1 22:20:49.482: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_TX]
*Mar 1 22:20:49.482: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_RX]
*Mar 1 22:20:49.486: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_VP_DELAY]
*Mar 1 22:20:49.486: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_VP_ERROR]
*Mar 1 22:20:51.638: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_CC_REQ_PACK_STAT]
*Mar 1 22:20:51.638: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_TX]
*Mar 1 22:20:51.638: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_RX]
*Mar 1 22:20:51.642: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_VP_DELAY]
*Mar 1 22:20:51.642: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_DSP_GET_VP_ERROR]
Router#
When digits are passed during the conversation, the digit begin and digit end events are seen.
*Mar 1 22:21:01.542: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_CC_DIGIT_BEGIN]
*Mar 1 22:21:01.842: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_CC_DIGIT_END,]
Once the call is hung up from one side, the bridge_drop and the disconnect events appear.
*Mar 1 22:21:10.834: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_TSP_DISCONNECT_IND]
*Mar 1 22:21:10.838: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_CC_BRIDGE_DROP]
*Mar 1 22:21:10.838: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_CONNECT, event: E_CC_DISCONNECT]
Following the disconnect event, the signaling state becomes S_WAIT_STATS, during which the DSP
stats are collected.
*Mar 1 22:21:10.842: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_WAIT_STATS, event: E_DSP_GET_ERROR]
*Mar 1 22:21:10.846: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_WAIT_STATS, event: E_DSP_GET_LEVELS]
*Mar 1 22:21:10.854: //72/D14258FE806E/VTSP:(1/0:23):22:14:2/vtsp_process_event:
[state:S_WAIT_STATS, event: E_DSP_GET_TX]
For Cisco 2600 and Cisco 3600 Series with Analog Voice Ports
For Cisco 2600 and Cisco 3600 Series with Digital Voice Ports (With T1 Packet Voice Trunk Network Modules)
Syntax Description slot/subunit/port • slot specifies a router slot in which a voice network module (NM) is
installed. Valid entries are router slot numbers for the specific platform.
• subunit specifies a voice interface card (VIC) where the voice port is
located. Valid entries are 0 and 1. (The VIC fits into the voice network
module.)
• port specifies an analog voice port number. Valid entries are 0 and 1.
For the Cisco 2600 and Cisco 3600 Series with Digital Voice Ports
slot/port:ds0-group Debugs the digital voice port you specify with the slot/port:ds0-group
designation.
• slot specifies a router slot in which the packet voice trunk network module
(NM) is installed. Valid entries are router slot numbers for the specific
platform.
• port specifies a T1 or E1 physical port in the voice WAN interface card
(VWIC). Valid entries are 0 and 1. (One VWIC fits in an NM.)
• ds0-group specifies a T1 or E1 logical port number. Valid entries are 0 to 23
for T1 and 0 to 30 for E1.
slot/port Debugs the analog voice port you specify with the slot/port designation.
• slot is the physical slot in which the analog voice module (AVM) is
installed. The slot is always 1 for analog voice ports in the Cisco MC3810
series.
• port specifies an analog voice port number. Valid entries are 1 to 6.
slot:ds0-group Debugs the digital voice port you specify with the slot:ds0-group designation.
• slot specifies the module (and controller). Valid entries are 0 for the MFT
(controller 0) and 1 for the DVM (controller 1).
• ds0-group specifies a T1 or E1 logical voice port number. Valid entries are
0 to 23 for T1 and 0 to 30 for E1.
Usage Guidelines Use the debug vtsp port command to limit the debug output to a specific voice port. The debug output
can be quite voluminous for a single channel. The entire VTSP debug output from a platform with 12
voice ports might create problems. Use this debug command with any or all of the other debug modes.
Execution of no debug vtsp all will turn off all VTSP-level debugging. It is usually a good idea to turn
off all debugging and then enter the debug commands you are interested in one by one. This will help
to avoid confusion about which ports you are actually debugging.
Note We recommend that you log output from the debug vtsp port command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Syntax Description both Displays packets that are both sent and received from the digital signal
processor (DSP).
from-dsp Displays packets received from the DSP.
to-dsp Displays packets sent to the DSP.
payload (Optional) Specifies a specific type of payload.
payload-type (Optional) Valid payload types are as follows:
• all—All packets are displayed. No codec is specified.
• equal-to —Packets in payloads equal to the specified codec are displayed.
• greater-than—Packets in payloads greater than the specified codec are
displayed.
• less-than —Packets in payloads less than the specified codec are displayed.
• other-than—Packets in payloads other than the specified codec are
displayed.
• other-than-fax-and—Packets in payloads other than fax relay and the
specified codec are displayed.
• other-than-silence-and —Packets in payloads other than silence and the
specified codec are displayed.
codec (Optional) If a codec needs to be specified for the payload type, valid codecs are
as follows:
• 0 to 123—Custom value of the payload.
• g711alaw—G.711 alaw 64000 bps.
• g711ulaw—G.711 ulaw 64000 bps.
• g723.1—G.723.1.
• g726—G.726.
• g728—G.728.
• g729a—G.729a.
Usage Guidelines We recommend that you log output from the debug vtsp rtp command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Voice telephony RTP Packet debugging enabled for payloads of all types of packets from and
to DSP
The following line shows the payload from the DSP (telephony leg) to the IP leg:
*Mar 1 01:10:05.687: //20/4DD959B48020/VTSP:(1/0:23):22:14:2/vtsp_print_rtp_header: s=DSP
d=VoIP payload 0x12 ssrc 0x40 sequence 0x19E3 timestamp 0xCCDCE092
The following line shows the payload from the IP leg to the DSP (telephony leg):
*Mar 1 01:10:05.699: //20/4DD959B48020/VTSP:(1/0:23):22:14:2/vtsp_print_rtp_header:
s=VoIP d=DSP payload 0x12 ssrc 0xAF0534E3 sequence 0x92A timestamp 0x6BE50
Usage Guidelines We recommend that you log output from the debug vtsp send-nse command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Defaults Disabled
Usage Guidelines The debug vtsp session command traces how the router interacts with the DSP based on the signaling
indications from the signaling stack and requests from the application. This debug command displays
information about how each network indication and application request is handled, signaling indications,
and DSP control messages.
This debug level shows the internal workings of the voice telephony call state machine.
Note We recommend that you log output from the debug vtsp send-nse command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following example shows sample output from the debug vtsp session command:
Router# debug vtsp session
At this point, the VTSP is not aware of anything. The format of this message is
//callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
• CallEntry ID is -1.
• GUID is xxxxxxxxxx.
• The voice port is blank.
• Channel ID is -1.
• DSP ID is -1.
• DSP channel ID is -1.
The original and the translated calling number are the same (55555) and the original and the translated
called number are the same (888545). These numbers are often the same because if a translation rule is
applied, it will be on the dial peers or the ports both of which comes later than these VTSP messages in
the Cisco IOS code execution.
*Mar 2 01:20:43.225: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_regxrule_translate:
calling_number(original)= calling_number(xlated)=55555 called_number(original)=
called_number(xlated)=888545 redirectNumber(original)= redirectNumber(xlated)=
The VTSP got a call setup indicator from the TSP layer with called number 888545 and calling number
55555. There is no awareness of the CallEntry ID (-1) or the GUID (xxxxxxxxxxxx).
*Mar 2 01:20:43.225: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_tsp_call_setup_ind:
(sdb=0x637AA6C0, tdm_info=0x0, tsp_info=0x630B6050, calling_number=55555 calling_oct3 =
0x80, called_number=888545 called_oct3 = 0x80, oct3a=0x0): peer_tag=10002
At this point, the VTSP is not aware of the anything. The format of this message is
//callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
• CallEntry ID is -1.
• GUID is F90073EB8080.
• The voice port is 1/0:23 where 23 indicates D channel.
• The T1 channel is still unknown at this point (-1).
• The DSP is 0.
• The DSP channel is 2.
The VTSP learns that the B channel used changed from -1 to 22.
*Mar 2 01:20:43.229: //-1/F90073EB8080/VTSP:(1/0:23):22:0:2/vtsp_do_call_setup_ind:
type=0, under_spec=1615186336, name=, id0=23, id1=0, id2=0, calling=55555,called=888545
subscriber=RegularLinevtsp_do_call_setup_ind: redirect DN = reason = -1
*Mar 2 01:20:43.229: //-1/xxxxxxxxxxxx/VTSP:():-1:-1:-1/vtsp_do_normal_call_setup_ind: .
The VTSP learns the CallEntry ID. The format of this message is
//callid/GUID/VTSP:(voice-port):T1-channel_number:DSP_number:DSP_channel_number:
• CallEntry ID is 84 (changed from -1 to 84).
• GUID is F90073EB8080.
• The voice port is 1/0:23 where 23 indicates D channel.
• The T1 channel is 22.
• The DSP is 14.
• The DSP channel is 2.
*Mar 2 01:20:43.233: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_insert_cdb: ,cdb
0x637B2A68, CallID=84
*Mar 2 01:20:43.233:
//84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_open_voice_and_set_params: .
In the following outputs VTSP sets some of the voice parameters for this call:
• Modem capability
• Playout-delay
• Dial-peer tag = 10003
• Digit-timeouts
*Mar 2 01:20:43.233: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_modem_proto_from_cdb:
cap_modem_proto 0
*Mar 2 01:20:43.233: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/set_playout_cdb: playout
default
VTSP sends out an alerting to the POTS leg; the phone is ringing now.
*Mar 2 01:20:43.301: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_process_event:
vtsp:[1/0:23:84, S_PROCEEDING, E_CC_ALERT]
*Mar 2 01:20:43.301: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/act_alert: .
*Mar 2 01:20:43.301: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_timer_stop: 9124331
Router#
*Mar 2 01:20:52.289: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_get_dialpeer_tag: tag =
10003
The phone gets answered here, and a bridge is now set up between the two call legs.
*Mar 2 01:20:52.289: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/vtsp_process_event:
vtsp:[1/0:23:84, S_ALERTING, E_CC_BRIDGE]
*Mar 2 01:20:52.289: //84/F90073EB8080/VTSP:(1/0:23):22:14:2/act_bridge: .
Defaults Disabled
Usage Guidelines The debug vtsp stats command generates a collection of DSP statistics for generating Real-Time
Transport Protocol (RTCP) packets and a collection of other statistical information.
Note We recommend that you log output from the debug vtsp stats command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Defaults Disabled
Usage Guidelines We recommend that you log output from the debug vtsp tone command to a buffer rather than sending
the output to the console; otherwise, the size of the output could severely impact the performance of the
gateway.
Syntax Description payload Number used to selectively display subframes of a specific payload. Payload types are:
0: Primary Payload
1: Annex-A
2: Annex-B
3: Annex-D
4: All other payloads
5: All payloads
Defaults Disabled
Usage Guidelines Each debug output displays the first 10 bytes of the FRF.11 subframe, including header bytes. The
from-dsp and to-dsp options can be used to limit the debugs to a single direction. If not specified,
debugs are displayed for subframes when they are received from the DSP and before they are sent to the
DSP.
Use extreme caution in selecting payload options 0 and 6. These options may cause network instability.
Note We recommend that you log output from the debug vtsp vofr subframe command to a buffer rather than
sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
debug vxml
To display debugging messages for VoiceXML features, use the debug vxml command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug vxml [all | application | background | error | event | grammar | puts | ssml | trace | warning]
no debug vxml [all | application | background | error | event | grammar | puts | ssml | trace |
warning]
Usage Guidelines • The output of this command is affected by the debug condition application voice command. If the
debug condition application voice command is configured and the <cisco-debug> element is
enabled in the VoiceXML document, debugging output is limited to the VoiceXML application
named in the debug condition application voice command.
• The debug vxml command enables all VoiceXML debugging messages except those displayed by
the grammar and ssml keywords. The debug vxml all command enables all VoiceXML debugging
messages including grammar and SSML.
Caution When the debug vxml grammar or debug vxml ssml command is enabled, the VoiceXML document
could abort if there is a fatal syntax error in its eXtensible Markup Language (XML) grammar or SSML.
Examples The following example shows output from the debug vxml application command:
Router# debug vxml application
1w5d: //39/924083218026/VAPP:/vapp_c
Router#hecksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
Router#
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event MSWR
1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]:
1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 77 vapp record state: 0
1w5d: //39/924083218026/VAPP:/vapp_media_done: evID=77 status=0, protocol=0, st0
1w5d: //39/924083218026/VAPP:/vapp_digit_collect:
1w5d: //39/924083218026/VAPP:/vapp_checksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
Router#
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event APPE
1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]:
1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 87 vapp record state: 0
1w5d: //39/924083218026/VAPP:/vapp_digit_collection_done:
1w5d: //39/924083218026/VAPP:/vapp_digit_collection_done: digits [5551234], sta]
1w5d: //39/924083218026/VAPP:/vapp_gain_control_default:
1w5d: //39/924083218026/VAPP:/vapp_placecall:
Router#1w5d: //39/924083218026/VAPP:/vapp_checksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
Router#
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event APPE
1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]:
1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 84 vapp record state: 0
1w5d: //39/924083218026/VAPP:/vapp_evt_setupdone:
1w5d: //39/924083218026/VAPP:/vapp_checksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
Router#
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_D
1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]:
1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 15 vapp record state: 0
1w5d: //39/924083218026/VAPP:/vapp_call_disconnected:
1w5d: //39/924083218026/VAPP:/vapp_connection_destroy:
1w5d: //39/924083218026/VAPP:/vapp_checksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: Sta
Router#te VAPP_ACTIVE got event CC_EV_CONF_DESTROY_DONE
1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]:
1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 34 vapp record state: 0
1w5d: //39/924083218026/VAPP:/vapp_leg_disconnect:
1w5d: //39/924083218026/VAPP:/vapp_checksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got event CC_E
1w5d: //39/924083218026/VAPP:/vapp_driver: pInterp[660E10FC]
Router#:
1w5d: //39/924083218026/VAPP:/vapp_driver: evtID: 16 vapp record state: 0
1w5d: //39/924083218026/VAPP:/vapp_terminate:
1w5d: //39/924083218026/VAPP:/vapp_session_exit_event_name: Exit Event vxml.sese
1w5d: //39/924083218026/VAPP:/vapp_checksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_terminate_initiation:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event CE
1w5d: //39/924083218
Router#026/VAPP:/vapp_cleaner:
1w5d: //39/924083218026/VAPP:/vapp_checksessionstate:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
1w5d: //39/924083218026/VAPP:/vapp_evt_handler: State VAPP_CLEANING got event AE
1w5d: //39/924083218026/VAPP:/vapp_cleaner:
1w5d: //39/924083218026/VAPP:/vapp_cleaner: VxmlDialogDone event=vxml.session.c0
1w5d: //39/924083218026/VAPP:/vapp_popifdone:
1w5d: //39/924083218026/VAPP:/vapp_checkifdone:
1w5d: //39/924083218026/VAPP:/vapp_
Router#cleanup_apphandler:
1w5d: vapp_cleanup_apphandler: Terminate FALSE Terminated TRUE{HAN[VXML_HAN][NU}
1w5d: //39/924083218026/VAPP:/vapp_free_apphandler: {HAN[VXML_HAN][NULL ] }
The following example shows output from the debug vxml background command:
Router# debug vxml background
The following examples show output from the debug vxml error command:
Router# debug vxml error
This example output shows an error when the version header is missing:
*May 10 20:08:57.572://7/98119BD78008/VXML:/vxml_vxml_build:tftp://demo/scripts/test.vxml
at line 2:<vxml version> required attribute missing
*May 10 20:08:57.576://7/98119BD78008/VXML:/vxml_create:
*May 10 20:08:57.576:code=ERROR vapp=VAPP_SUCCESS vxml=VXML_ERROR_INVALID
This example output shows an error when a field item is not used according to the DTD:
*May 10
20:16:23.315://8/A1BCF458800B/VXML:/vxml_start_element_handler:tftp://demo/scripts/test.vx
ml at line 4:Element <field> is not used according to DTD
*May 10 20:16:23.315://8/A1BCF458800B/VXML:/vxml_create:
*May 10 20:16:23.315:code=ERROR vapp=VAPP_SUCCESS vxml=VXML_ERROR_INVALID
The following example shows output from the debug vxml event command:
Router# debug vxml event
The following example shows output from the debug vxml grammar command:
Router# debug vxml grammar
The following example shows output from the debug vxml ssml command:
Router# debug vxml ssml
Router#
vxml ssml syntax checking debugging is on
Feb 11 13:55:28.994: //-1//VAPP:/vapp_get_apphandler:
*Feb 11 13:55:28.994: vapp_get_apphandler: Script help
*Feb 11 13:55:28.994: //-1//VAPP:/vapp_get_apphandler_core:
*Feb 11 13:55:28.994: //-1/A93E3F8F800E/VAPP:/vapp_InterpInitConfigParams:
*Feb 11 13:55:28.998: //-1//VAPP:/vapp_init_apphandler:
*Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_evt_handler: State VAPP_ACTIVE got
event CC_EV_CALL_SETUP_IND
*Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_driver: pInterp[62DD481C]:
*Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_driver: evtID: 28 vapp record state: 0
*Feb 11 13:55:28.998: //-1/003E3F8F800E/VAPP:/vapp_evt_setup:
*Feb 11 13:55:28.998: //-1//VAPP:/vapp_incoming_callblock:
*Feb 11 13:55:28.998: vapp_incoming_callblock:
*Feb 11 13:55:28.998: //10/BB2F243F8011/VAPP:/vapp_load_or_run_script:
*Feb 11 13:55:28.998: //10/BB2F243F8011/VAPP:/vapp_load_or_run_script:
*Feb 11 13:55:28.998: The VXML Script with len=760 starts:
-------------------------------------
<?xml version = "1.0"?>
<vxml version = "2.0">
The following example shows output from the debug vxml trace command:
Router# debug vxml trace
debug x25
To display information about X.25 traffic, use one of the following debug x25 commands in privileged
EXEC mode. The commands allow you to display all information or an increasingly restrictive part of
the information.
Caution This command can generate large amounts of debugging output. If logging of debug output to the router
console is enabled (the default condition), this output may fill the console buffer, preventing the router
from processing packets until the contents of the console buffer have been printed. To prevent this, do
one or more of the following:
• Disable logging of debug output to the console. Refer to the logging console command for more
information.
• Configure the router to discard console output when the buffer overflows. Refer to the logging
console guaranteed command for more information.
• Use this command only when all of the reportable X.25 traffic is flowing at a data rate of less than
five packets per second (pps).
To display information about all X.25 traffic, including traffic for X.25, Connection Mode Network
Service (CMNS), and X.25 over TCP (XOT) services, use the debug x25 command (default all). To
disable debugging output, use the no form of this command.
debug x25
no debug x25
To display information about all X.25 traffic except data and resource record packets, use the debug x25
events command. To disable debugging output, use the no form of this command.
To display information about a specific X.25 service class, use the following form of the debug x25
command. To disable debugging output, use the no form of this command.
To display information about a specific X.25 or CMNS context, use the following form of the debug x25
command. To disable debugging output, use the no form of this command.
To display information about a specific X.25 or CMNS virtual circuit, use the following form of the
debug x25 command. To disable debugging output, use the no form of this command.
To display information about traffic for all virtual circuits that use a given number, use the following
form of the debug x25 command. The no form of this command removes the filter for a particular virtual
circuit from the debug x25 all or debug x25 events output. To disable debugging output, use the no form
of this command.
To display information about traffic to or from a specific X.25 over TCP (XOT) host, use the following
form of the debug x25 xot command. To disable debugging output, use the no form of this command.
debug x25 xot [remote ip-address [port number]] [local ip-address [port number]]
[events | all]
no debug x25 xot [remote ip-address [port number]] [local ip-address [port number]]
[events | all]
To display information about an interface running PPP over an X.25 session, use the debug x25
command with the aodi keyword. To disable debugging output, use the no form of this command.
Syntax Description events (Optional) Displays all traffic except Data and Receiver Ready (RR)
packets.
only | cmns | xot (Optional) Displays information about the specified services: X.25
only, CMNS, or XOT.
all (Optional) Displays all traffic.
serial-interface X.25 serial interface.
cmns-interface MAC address of the CMNS interface and remote host. The interface
mac mac-address type can be Ethernet, Token Ring, or Fiber Distributed Data
Interface (FDDI).
vc number Virtual circuit number. Range is from 1 to 4095.
remote ip-address (Optional) Remote IP address and, optionally, a port number. Range
[port number] is 1 to 65535.
local ip-address [port number] (Optional) Local host IP address and, optionally, a port number.
Range is 1 to 65535.
aodi Causes the debug x25 command to display Always On/Dynamic
ISDN (AO/DI) events and processing information.
Usage Guidelines This command is particularly useful for diagnosing problems encountered when placing calls. The
debug x25 all output includes data, control messages, and flow control packets for all virtual circuits of
the router.
All debug x25 command forms can take either the events or the all keyword. The keyword all is the
default and causes all packets meeting the other debug criteria to be reported. The keyword events omits
reports of any Data or RR flow control packets; the normal flow of data and RR packets is commonly
large and less interesting to the user, so event reporting can significantly decrease the processor load
induced by debug reporting.
The debug x25 interface command is useful for diagnosing problems encountered with a single X.25 or
CMNS host or virtual circuit.
Because no interface is specified by the debug x25 vc command, traffic on any virtual circuit that has
the specified number is reported.
Virtual circuit zero (vc 0) cannot be specified. It is used for X.25 service messages, such as RESTART
packets, not virtual circuit traffic. Service messages can be monitored only when no virtual circuit filter
is used.
The debug x25 xot output allows you to restrict the debug output reporting to XOT traffic for one or
both hosts or host/port combinations. Because each XOT virtual circuit uses a unique TCP connection,
an XOT debug request that specifies both host addresses and ports will report traffic only for that virtual
circuit. Also, you can restrict reporting to sessions initiated by the local or remote router by specifying
1998 for the remote or local port. (XOT connections are received on port 1998.)
Use the debug x25 aodi command to display interface PPP events running over an X.25 session and to
debug X.25 connections between a client and server configured for AO/DI.
Examples The following is sample output from the debug x25 command, displaying output concerning the
functions X.25 restart, call setup, data exchange, and clear:
Router# debug x25
The following example shows a sequence of increasingly restrictive debug x25 commands:
Router# debug x25
The following examples show the normal sequence of events for both the AO/DI client and the server
sides:
Client Side
Router# debug x25 aodi
Server Side
Router# debug x25 aodi
The following display shows that the X.25 call was cleared by the X.25 host:
Serial0/1:X.25 I R1 Clear (5) 8 lci 64
Cause 0, Diag 122 (DTE originated/Maintenance action)
X25 RBP:X.25 circuit cleared
Serial0/1:X.25 O R1 Clear Confirm (3) 8 lci 64
The following display shows that the TCP session has terminated:
[10.0.155.30,11000/10.0.155.33,9999]:TCP receive error, End of data transfer
X25 RBP:End of data transfer
Serial0/1:X.25 O R1 Clear (5) 8 lci 64
Cause 9, Diag 122 (Out of order/Maintenance action)
Serial0/1:X.25 I R1 Clear Confirm (3) 8 lci 64
The following examples show output of the debug x25 events command when RBP has been configured
using the x25 pvc rbp local command.
The following display shows data on the PVC before the TCP session has been established:
X25 RBP:Data on unconnected PVC
Serial1/0:X.25 O D1 Reset (5) 8 lci 1
Cause 0, Diag 113 (DTE originated/Remote network problem)
Serial1/0:X.25 I D2 Reset Confirm (3) 8 lci 1
The following display shows termination of connection when the X.25 PVC was reset:
Serial1/0:X.25 I D1 Reset (5) 8 lci 1
Cause 15, Diag 122 (Network operational (PVC)/Maintenance action)
X25 RBP:Reset packet received
Serial1/0:X.25 O D3 Reset Confirm (3) 8 lci 1
The following display shows that the TCP session has terminated:
[2.30.0.30,11003/2.30.0.33,9998]:TCP receive error, End of data transfer
X25 RBP:End of data transfer
Serial1/0:X.25 O D1 Reset (5) 8 lci 1
Cause 0, Diag 113 (DTE originated/Remote network problem)
Serial1/0:X.25 I D2 Reset Confirm (3) 8 lci 1
The following examples show output of the x25 debug events command when RBP has been configured
using the x25 map rbp remote command.
The following display shows that the X.25 call was cleared:
Serial0/1:X.25 I R1 Clear (5) 8 lci 1024
Cause 0, Diag 122 (DTE originated/Maintenance action)
X25 RBP:X.25 circuit cleared
Serial0/1:X.25 O R1 Clear Confirm (3) 8 lci 1024
The following display shows that the X.25 call was reset:
Serial0/1:X.25 I D1 Reset (5) 8 lci 1024
Cause 0, Diag 122 (DTE originated/Maintenance action)
X25 RBP:Reset packet received
Serial0/1:X.25 O R1 Clear (5) 8 lci 1024
Cause 9, Diag 122 (Out of order/Maintenance action)
Serial0/1:X.25 I R1 Clear Confirm (3) 8 lci 1024
The following examples show output of the debug x25 events command when RBP has been configured
using the x25 pvc rbp remote command.
The following display shows that the X.25 permanent virtual circuit (PVC) has been reset:
Serial0/0:X.25 I D1 Reset (5) 8 lci 1
Cause 0, Diag 122 (DTE originated/Maintenance action)
X25 RBP:Reset packet received
Serial0/0:X.25 O D2 Reset Confirm (3) 8 lci 1
The following display shows that the connection was terminated when the X.25 interface was restarted:
Serial0/0:X.25 I R1 Restart (5) 8 lci 0
Cause 0, Diag 122 (DTE originated/Maintenance action)
X25 RBP:X.25 PVC inactive
Serial0/0:X.25 O R2 Restart Confirm (3) 8 lci 0
Serial0/0:X.25 O D1 Reset (5) 8 lci 1
Cause 1, Diag 113 (Out of order (PVC)/Remote network problem)
Serial0/0:X.25 I D3 Reset Confirm (3) 8 lci 1
Field Description
Serial0 Interface on which the X.25 event occurred.
X.25 Type of event this message describes.
I Letter indicating whether the X.25 packet was input (I) or output (O)
through the interface.
R3 State of the service or virtual circuit (VC). Possible values follow:
R/Inactive—Packet layer awaiting link layer service
R1—Packet layer ready
R2—Data terminal equipment (DTE) restart request
R3—DCE restart indication
P/Inactive—VC awaiting packet layer service
P1—Idle
P2—DTE waiting for DCE to connect CALL
P3—DCE waiting for DTE to accept CALL
P4—Data transfer
P5—CALL collision
P6—DTE clear request
P7—DCE clear indication
D/Inactive—VC awaiting setup
D1—Flow control ready
D2—DTE reset request
D3—DCE reset indication
Refer to Annex B of the ITU-T Recommendation X.25 for more
information on these states.
Field Description
Restart The type of X.25 packet. Possible values follow:
R Events
• Restart
• Restart Confirm
• Diagnostic
P Events
• Call
• Call Confirm
• Clear
• Clear Confirm
D Events
• Reset
• Reset Confirm
D1 Events
• Data
• Receiver Not Ready (RNR)
• RR (Receiver Ready)
• Interrupt
• Interrupt Confirm
XOT Overhead
• PVC Setup
(5) Number of bytes in the packet.
8 Modulo of the virtual circuit. Possible values are 8 and 128.
lci 0 VC number. Refer to Annex A of the ITU-T Recommendation X.25 for
information on VC assignment.
Cause 7 Code indicating the event that triggered the packet. The Cause field can
appear only in entries for Clear, Reset, and Restart packets. Possible
values for the Cause field can vary, depending on the type of packet.
Refer to “X.25 Cause and Diagnostic Codes” for an explanation of these
codes.
Diag 0 Code providing an additional hint of what, if anything, went wrong. The
Diag field can appear only in entries for Clear, Diagnostic (as “error 0”),
Reset, and Restart packets. Refer to “X.25 Cause and Diagnostic
Codes” for an explanation of these codes.
(Network operational/ The standard explanations of the Cause and Diagnostic codes
No additional information) (cause/diag).
Usage Guidelines It is generally recommended that the debug x25 annexg command be used only when specifically
requested by Cisco TAC to obtain information about a problem with an Annex G configuration. The
messages displayed by the debug x25 annexg command are meant to aid in the diagnosing of internal
errors.
Caution The X.25 debug commands can generate large amounts of debugging output. If logging of debug output
to the router console is enabled (the default condition), this output may fill the console buffer, preventing
the router from processing packets until the contents of the console buffer have been printed.
Examples The following example shows sample output for the debug x25 annexg command for a Frame Relay
data-link connection identifier (DLCI) configured for Annex G operation:
Router# debug x25 annexg
Field Description
payload Amount of buffer space available per message before adding Frame Relay
and device-specific headers.
overhead The length of the Frame Relay header and any device-specific header that
may be needed.
debug x28
To monitor error information and X.28 connection activity, use the debug x28 command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug x28
no debug x28
Examples The following is sample output while the packet assembler/disassembler (PAD) initiates an X.28
outgoing call:
Router# debug x28
*
03:30:43: X.28 mode session started
03:30:43: X28 escape is exit
03:30:43: Speed for console & vty lines :9600
*call 123456
COM
03:39:04: address ="123456", cud="[none]" 03:39:04: Setting X.3 Parameters for this
call...1:1 2:1 3:126 4:0 5:1 6:2 7:2 8:0 9:0 10:0 11:14 12:1 13:0 14:0 15:0 16:127 17:24
18:18 19:2 20:0 21:0 22:0
Router> exit
CLR CONF
*
*03:40:50: Session ended
* exit
Router#
*03:40:51: Exiting X.28 mode
Examples See the following examples to turn on and off external call control debugging:
AS5300-TGW# debug xcctsp all
AS5300-TGW#
Examples See the following examples to turn on and off error-level debugging:
Examples See the following examples to turn on and off session-level debugging:
AS5300-TGW# debug xcctsp session
External call control session debugging is on
AS5300-TGW#
debug xcsp
To display the debugging messages for the External Control Service Provider (XCSP) subsystem, use
the debug xcsp command in privileged EXEC mode. To disable debugging output, use the no form of
this command.
Syntax Description all Provides debug information about XCSP events and continuity testing
(COT).
cot Provides debug information about XCSP and COT. The cot keyword is not
used with the NAS Package for Media Gateway Control Protocol (MGCP)
feature.
event Provides debug information about XCSP events.
Usage Guidelines This command is used with the Network Access Server Package for MGCP. The XCSP subsystem is not
configured directly, but information about it may be useful in troubleshooting. The debug xcsp
command is used to display the exchange of signaling information between the MGCP protocol stack
and end applications such as call switching module (CSM) or dialer.
The cot keyword is not used with the Network Access Server Package for MGCP feature.
Examples The following examples show output for the debug xcsp all command and keyword and the debug xcsp
event command and keyword:
Router# debug xcsp all
200 58 Alert
I:630AED90
<---:Ack send SUCCESSFUL
01:49:14:xcsp_fsm:slot 7 p
c5400#ort 0 chan 23 oldstate = Connection in progress newstate= Connection in
progress
01:49:14:Received message on XCSP_CDAPI
01:49:14:process_cdapi_msg :slot/port/channel 7/0/23
01:49:14: process_cdapi_msg:new slot/port/channel 7/0/23
01:49:14: Received CALL_CONN:callid=0x7016
01:49:14:process_cdapi:Event CONN_, channel state = 8 for slot port channel 7
0 23
01:49:14:xcsp_process_sig_fsm:state/event Connection in progress / in call
connect
mgcpapp_xcsp_connect:
mgcpapp_xc
c5400#sp_get_chan_cb -Found - Channel state In Use
01:49:14:STOP TIMER
01:49:14:xcsp_fsm:slot 7 port 0 chan 23 oldstate = Connection in progress
newstate=In Use
c5400#
01:50:23:Received message on XCSP_CDAPI
01:50:23:process_cdapi_msg :slot/port/channel 7/0/23
01:50:23: process_cdapi_msg:new slot/port/channel 7/0/23
01:50:23: Received CALL_DISC_REQ:callid=0x7016
01:50:23:process_cdapi:Event DISC_CONN_REQ, channel state = 7 for slot port
channel 7 0 23
01:50:23:xcsp_process_sig_fsm:state/event In Use / release Request
mgcpapp_xcsp_disconnect
mgcpapp_xcsp_get_chan_cb -Fou
c5400#nd - Channel state In Use
01:50:23:send_mgcp_msg, MGCP Packet sent --->
<---
01:50:23:xcsp_fsm:slot 7 port 0 chan 23 oldstate = In Use newstate=Out
Release in progress
xcsp_restart Serial7/0:22 vc = 22
xcsp_restart Put idb Serial7/0:22 in down state
01:50:23:MGCP Packet received -
200 4 bye
Usage Guidelines The user can control the contents of the standardized header. The display options for the header are as
follows:
• Short 6-byte GUID
• Full 16-byte GUID
• Short header which contains only the CallEntry ID
The format of the GUID headers is as follows:
//CallEntryID/GUID/Module-Dependent-List/Function-name:.
Note Using the no form of this command does not turn off the debugging.
Examples The following is sample output for the voice call debug command when the full-guid keyword is
specified:
Router# voice call debug full-guid
!
00:05:12: //1/0E2C8A90-BC00-11D5-8002-DACCFDCEF87D/VTSP:(0:D):0:0:4385/vtsp_insert_cdb:
00:05:12: //-1/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/CCAPI/cc_incr_if_call_volume:
00:05:12: //1/0E2C8A90-BC00-11D5-8002-DACCFDCEF87D/VTSP:(0:D):0:0:4385/vtsp_open_voice_and
_set_params:
00:05:12: //1/0E2C8A90-BC00-11D5-8002-DACCFDCEF87D/VTSP:(0:D):0:0:4385/vtsp_modem_proto_fr
om_cdb:
00:05:12: //1/0E2C8A90-BC00-11D5-8002-DACCFDCEF87D/VTSP:(0:D):0:0:4385/set_playout_cdb:
00:05:12: //1/0E2C8A90-BC00-11D5-8002-DACCFDCEF87D/VTSP:(0:D):0:0:4385/vtsp_dsp_echo_cance
ller_control:
The “//-1/” output indicates that CallEntryID for the call control API (CCAPI) module is not available.
Table 284 describes the significant fields shown in the display.
Field Description
VTSP:(0:D):0:0:4385 Identifies the VTSP module, port name, channel number, DSP
slot, and DSP channel number.
vtsp_insert_cdb Identifies the function name.
CCAPI Identifies the CCAPI module.
The following is sample output for the voice call debug command when the short-header keyword is
specified:
Router(config)# voice call debug short-header
!
00:05:12: //1/vtsp_insert_cdb:
00:05:12: //-1/cc_incr_if_call_volume:
00:05:12: //1/vtsp_open_voice_and_set_params:
00:05:12: //1/vtsp_modem_proto_from_cdb:
00:05:12: //1/set_playout_cdb:
00:05:12: //1/vtsp_dsp_echo_canceller_control:
The output “//-1/” indicates that CallEntryID for CCAPI is not available.
This appendix covers the X.25 cause and diagnostic codes that can appear in output from the debug x25
all, debug x25 events, and debug x25 vc commands documented in the “Debug Commands” chapter.
For more information on these codes, see the 1984 ITU-T X.25 Recommendation.
Note The ITU-T carries out the functions of the former Consultative Committee for International Telegraph
and Telephone (CCITT).
Note The router reports the decimal value of a cause or diagnostic code, whereas other X.25 equipment may
report these codes in hexadecimal notation. For this reason, this appendix lists both the decimal and
hexadecimal values of the cause and diagnostic codes.
Table A-1 describes the differences between our implementation of certain X.25 network-generated,
“international problem” diagnostic fields and the definitions provided in Annex E of ITU-T
Recommendation X.25. The Annex E Table E-1/X.25 includes the complete diagnostic field listing.
Table A-3 describes the meanings of cause codes for RESET REQUEST packets.
Table A-4 describes the meanings of cause codes for RESTART packets.
Note These diagnostic codes can be produced by any equipment handling a given virtual circuit, and are then
propagated through all equipment handling that virtual circuit. Thus, receipt of a diagnostic code may
not indicate a problem with the router.
Diagnostic codes with values of 80 or greater in hexadecimal, or with values of 128 or greater in decimal,
are specific to a particular network. To learn the meanings of these codes, contact the administrator for
that network
This appendix contains a list of the supported switch types. It also contains the ISDN cause codes, cause
values, bearer capability values, and progress description field values that are valid within the debug
commands for ISDN.
Note The ITU-T carries out the functions of the former Consultative Committee for International Telegraph
and Telephone (CCITT).
Identifier Description
basic-1tr6 German 1TR6 ISDN switches
basic-5ess AT&T basic rate switches
basic-dms100 NT DMS-100 basic rate switches
basic-net3 NET3 ISDN and Euro-ISDN switches (UK and others), also called
E-DSS1 or DSS1
basic-ni1 National ISDN-1 switches
basic-nwnet3 Norway Net3 switches
basic-nznet3 New Zealand Net3 switches
basic-ts013 Australian TS013 switches
none No switch defined
ntt Japanese NTT ISDN switches (ISDN BRI only)
primary-4ess AT&T 4ESS switch type for the U.S. (ISDN PRI only)
primary-5ess AT&T 5ESS switch type for the U.S. (ISDN PRI only)
primary-dms100 NT DMS-100 switch type for the U.S. (ISDN PRI only)
primary-net5 NET5 ISDN PRI switches (Europe)
primary-ntt INS-Net 1500 for Japan (ISDN PRI only)
Identifier Description
primary-ts014 Australian TS014 switches (ISDN PRI only)
vn2 French VN2 ISDN switches (ISDN BRI only)
vn3 French VN3 ISDN switches (ISDN BRI only)
vn4 French VN4 ISDN switches (ISDN BRI only)
Field Value—Description
0x The values that follow are in hexadecimal.
y1 8—ITU-T standard coding.
y2 0—User
1—Private network serving local user
2—Public network serving local user
3—Transit network
4—Public network serving remote user
5—Private network serving remote user
7—International network
A—Network beyond internetworking point
z1 Class (the more significant hexadecimal number) of cause value. Refer to
Table B-3 for detailed information about possible values.
z2 Value (the less significant hexadecimal number) of cause value. Refer to
Table B-3 for detailed information about possible values.
a1 (Optional) Diagnostic field that is always 8.
a2 (Optional) Diagnostic field that is one of the following values:
0—Unknown
1—Permanent
2—Transient
The following is sample output of this form of the debug isdn q931 command:
Cause i = 0x8790
Decimal Hex
Value Value Cause Diagnostics Explanation
1 01 Unallocated Note 10 ISDN number was sent to the switch in the
(unassigned) correct format; however, the number is not
number assigned to any destination equipment.
2 02 No route to Transit ISDN exchange is asked to route the call
specified transit network through an unrecognized intermediate
network identity (Note network.
9)
3 03 No route to Note 10 Call was routed through an intermediate
destination network that does not serve the destination
address.
6 06 Channel Service quality of the specified channel is
unacceptable insufficient to accept the connection.
7 07 Call awarded and User is assigned an incoming call that is
being delivered in being connected to an already-established
an established call channel.
channel
16 10 Normal call Note 10 Normal call clearing has occurred.
clearing
17 11 User busy Called system acknowledges the connection
request but is unable to accept the call
because all B channels are in use.
18 12 No user responding Connection cannot be completed because
the destination does not respond to the call.
19 13 No answer from Destination responds to the connection
user (user alerted) request but fails to complete the connection
within the prescribed time. The problem is
at the remote end of the connection.
21 15 Call rejected Note 10—User Destination is capable of accepting the call
supplied but rejected the call for an unknown reason.
diagnostic
(Note 4)
22 16 Number changed ISDN number used to set up the call is not
assigned to any system.
26 1A Non-selected user Destination is capable of accepting the call
clearing but rejected the call because it was not
assigned to the user.
Decimal Hex
Value Value Cause Diagnostics Explanation
27 1B Designation out of Destination cannot be reached because the
order interface is not functioning correctly, and a
signaling message cannot be delivered. This
might be a temporary condition, but it could
last for an extended period of time. For
example, the remote equipment might be
turned off.
28 1C Invalid number Connection could be established because the
format destination address was presented in an
unrecognizable format or because the
destination address was incomplete.
29 1D Facility rejected Facility Facility requested by the user cannot be
identification provided by the network.
(Note 1)
30 1E Response to Status message was generated in direct
STATUS response to the prior receipt of a status
ENQUIRY enquiry message.
31 1F Normal, Reports the occurrence of a normal event
unspecified when no standard cause applies. No action
required.
34 22 No circuit/channel Connection cannot be established because
available no appropriate channel is available to take
the call.
38 26 Network out of Destination cannot be reached because the
order network is not functioning correctly, and the
condition might last for an extended period
of time. An immediate reconnect attempt
will probably be unsuccessful.
41 29 Temporary failure Error occurred because the network is not
functioning correctly. The problem will be
resolved shortly.
42 2A Switching Destination cannot be reached because the
equipment network switching equipment is temporarily
congestion overloaded.
43 2B Access information Discarded Network cannot provide the requested
discarded information access information.
element
identifier(s)
(Note 5)
44 2C Requested Remote equipment cannot provide the
circuit/channel not requested channel for an unknown reason.
available This might be a temporary problem.
Decimal Hex
Value Value Cause Diagnostics Explanation
47 2F Resources Requested channel or service is unavailable
unavailable, for an unknown reason. This might be a
unspecified temporary problem.
49 31 Quality of service Table B-2 Requested quality of service cannot be
unavailable provided by the network. This might be a
subscription problem.
50 32 Requested facility Facility Remote equipment supports the requested
not subscribed identification supplementary service by subscription only.
(Note 1)
57 39 Bearer capability Note 3 User requested a bearer capability that the
not authorized network provides, but the user is not
authorized to use it. This might be a
subscription problem.
58 3A Bearer capability Note 3 Network normally provides the requested
not presently bearer capability, but it is unavailable at the
available present time. This might be due to a
temporary network problem or to a
subscription problem.
63 3F Service or option Network or remote equipment was unable to
not available, provide the requested service option for an
unspecified unspecified reason. This might be a
subscription problem.
65 41 Bearer capability Note 3 Network cannot provide the bearer
not implemented capability requested by the user.
66 42 Channel type not Channel Type Network or the destination equipment does
implemented (Note 6) not support the requested channel type.
69 45 Requested facility Facility Remote equipment does not support the
not implemented Identification requested supplementary service.
(Note 1)
70 46 Only restricted Network is unable to provide unrestricted
digital information digital information bearer capability.
bearer capability is
available
79 4F Service or option Network or remote equipment is unable to
not implemented, provide the requested service option for an
unspecified unspecified reason. This might be a
subscription problem.
81 51 Invalid call Remote equipment received a call with a call
reference value reference that is not currently in use on the
user-network interface.
82 52 Identified channel Channel Receiving equipment is requested to use a
does not exist identity channel that is not activated on the interface
for calls.
Decimal Hex
Value Value Cause Diagnostics Explanation
83 53 A suspended call Network received a call resume request. The
exists, but this call call resume request contained a Call Identify
identity does not information element that indicates that the
call identity is being used for a suspended
call.
84 54 Call identity in use Network received a call resume request. The
call resume request contained a Call Identify
information element that indicates that it is
in use for a suspended call.
85 55 No call suspended Network received a call resume request
when there was not a suspended call
pending. This might be a transient error that
will be resolved by successive call retries.
86 56 Call having the Clearing cause Network received a call resume request. The
requested call call resume request contained a Call Identity
identity has been information element, which once indicated a
cleared suspended call. However, the suspended call
was cleared either by timeout or by the
remote user.
88 58 Incompatible Incompatible Indicates that an attempt was made to
destination parameter connect to non-ISDN equipment. For
(Note 2) example, to an analog line.
91 5B Invalid transit ISDN exchange was asked to route the call
network selection through an unrecognized intermediate
network.
95 5F Invalid message, Invalid message was received, and no
unspecified standard cause applies. This is usually due
to a D-channel error. If this error occurs
systematically, report it to your ISDN
service provider.
96 60 Mandatory Information Receiving equipment received a message
information element that did not include one of the mandatory
element is missing identifier(s) information elements. This is usually due to
(Note 5) a D-channel error. If this error occurs
systematically, report it to your ISDN
service provider.
97 61 Message type Message type Receiving equipment received an
non-existent or not unrecognized message, either because the
implemented message type was invalid or because the
message type was valid but not supported.
The cause is due to either a problem with the
remote configuration or a problem with the
local D channel.
Decimal Hex
Value Value Cause Diagnostics Explanation
98 62 Message not Message type Remote equipment received an invalid
compatible with message, and no standard cause applies.
call state or This cause is due to a D-channel error. If this
message type error occurs systematically, report it to your
non-existent or not ISDN service provider.
implemented
99 63 Information Information Remote equipment received a message that
element element includes information elements, which were
non-existent or not identifier(s) not recognized. This is usually due to a
implemented (Notes 5, 7) D-channel error. If this error occurs
systematically, report it to your ISDN
service provider.
100 64 Invalid information Information Remote equipment received a message that
element contents element includes invalid information in the
identifier(s) information element. This is usually due to
(Note 5) a D-channel error.
101 65 Message not Message type Remote equipment received an unexpected
compatible with message that does not correspond to the
call state current state of the connection. This is
usually due to a D-channel error.
102 66 Recovery on timer Timer number Error-handling (recovery) procedure was
expires (Note 8) initiated by a timer expiry. This is usually a
temporary problem.
111 6F Protocol error, Unspecified D-channel error when no other
unspecified standard cause applies.
127 7F Internetworking, Event occurred, but the network does not
unspecified provide causes for the action that it takes.
The precise problem is unknown.
• Bit 4 through 1—according to Table 4-15/Q.931 octet 3.2, channel type in ITU-T Q.931
specification
Note 7: When only locking shift information element is included and no variable length information
element identifier follows, it means that the codeset in the locking shift itself is not implemented.
Note 8: The timer number is coded in IA5 characters. The following coding is used in each octet:
• Bit 8—Spare “0”
• Bit 7 through 1—IA5 character
Note 9: The diagnostic field contains the entire transit network selection or network-specific facilities
information element, as applicable.
Note 10: See Table B-2 for the coding that is used.
Field Value—Description
0x Indication that the values that follow are in hexadecimal
88 ITU-T coding standard; unrestricted digital information
90 Circuit mode, 64 kbps
21 Layer 1, V.110/X.30
8F Synchronous, no in-band negotiation, 56 kbps
0x8090A2 Voice call (mu-law)
0x9090A2 Voice call (mu-law), 3.1 kHz Audio
0x8090A3 Voice call (a-law)
0x9090A3 Voice call (a-law), 3.1 kHz Audio
Decimal
Bits Number Description
0000001 1 Call is not end-to-end ISDN; further call progress information may be
available in-band
0000010 2 Destination address is non-ISDN
0000011 3 Origination address is non-ISDN
0000100 4 Call has returned to the ISDN
0001000 8 In-band information or appropriate pattern now available
0001010 10 Delay in response at destination interface
All other values for the progress description field are reserved.