Cisco IOS Debug Command Reference - Commands A Through D
Cisco IOS Debug Command Reference - Commands A Through D
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown
for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
CHAPTER 3 debug clns esis events through debug dbconn tcp 373
debug clns esis events through debug dbconn tcp 373
debug clns esis events 374
debug clns esis packets 375
debug clns events 377
debug clns igrp packets 378
debug clns packet 380
debug clns routing 381
debug cls message 382
debug cls vdlc 383
debug cme-xml 385
debug cns config 386
debug cns events 388
debug cns exec 390
debug cns image 392
debug cns management 393
debug cns xml 395
debug cns xml-parser 397
debug compress 399
debug condition 401
debug condition application voice 405
debug condition glbp 407
debug condition interface 409
debug condition match-list 413
debug condition standby 415
debug condition voice-port 417
debug condition vrf 419
debug condition xconnect 420
debug configuration lock 423
CHAPTER 4 debug decnet adj through debug dss ipx event 565
debug decnet adj through debug dss ipx event 565
debug decnet adj 566
debug decnet connects 568
debug decnet events 570
debug decnet packet 571
debug decnet routing 572
debug device-sensor 573
debug dhcp 575
debug dhcp redundancy 579
debug dialer events 580
debug dialer forwarding 582
debug dialer map 584
debug dialpeer 586
debug diameter 589
debug dlsw 594
debug dmsp doc-to-fax 603
debug dmsp fax-to-doc 605
debug dmvpn 607
debug dmvpn condition 611
debug dot11 614
debug dot11 aaa 616
debug dot11 cac 619
debug dot11 dot11radio 621
debug dot11 ids 624
debug dot11 ids mfp 626
debug dot1x 628
Usage Guidelines The information displayed by the debugaaaaccounting command is independent of the accounting protocol
used to transfer the accounting information to a server. Use the debugtacacs and debugradius protocol-specific
commands to get more detailed information about protocol-level issues.
You can also use the showaccountingcommand to step through all active sessions and to print all the accounting
records for actively accounted functions. The showaccounting command allows you to display the active
"accountable events" on the system. It provides systems administrators a quick look at what is happening,
and may also be useful for collecting information in the event of a data loss of some kind on the accounting
server. The showaccounting command displays additional data on the internal state of the authentication,
authorization, and accounting (AAA) security system if debugaaaaccounting is turned on as well.
Related Commands
Command Description
debug aaa authentication Displays information on accountable events as they
occur.
12.2(33)SRC This command was integrated into a release earlier than Cisco IOS Release
12.2(33)SRC.
12.2(33)SXI This command was integrated into a release earlier than Cisco IOS Release
12.2(33)SXI.
Cisco IOS XE This command was integrated into a release earlier than Cisco IOS XE
Release 2.1.
Release 2.1
Usage Guidelines Use the debugaaaauthentication command to learn the methods of authentication being used.
Examples The following is sample output from the debugaaaauthentication command. A single EXEC login that uses
the "default" method list and the first method, TACACS+, is displayed.
Usage Guidelines Use this command to learn the methods of authorization being used and the results of these methods.
Examples The following is sample output from thedebugaaaauthorizationcommand. In this display, an EXEC
authorization for user "carrel" is performed. On the first line, the username is authorized. On the second and
third lines, the attribute value (AV) pairs are authorized. The debug output displays a line for each AV pair
that is authenticated. Next, the display indicates the authorization method used. The final line in the display
indicates the status of the authorization process, which, in this case, has failed.
The table below describes AV pairs associated with the debugaaaauthorization command that may appear
in the debug output.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRC This command was integrated into Cisco IOS Release 12.2(33)SRC.
Related Commands
Command Description
aaa authorization cache filterserver Enables AAA authorization caches and the
downloading of ACL configurations from a RADIUS
filter server.
12.2(33)SRC This command was integrated into Cisco IOS Release 12.2(33)SRC.
15.0(1)M This command was integrated into Cisco IOS Release 15.0(1)M.
Usage Guidelines Use this command to display debug information about cached entries.
Examples The following example displays the debug information about all cached entries:
Related Commands
Command Description
clear aaa cache group Clears an individual entry or all entries in the cache.
show aaa cache group Displays cache entries stored by the AAA cache.
Usage Guidelines Use this command to display debug information about AAA common criteria policies.
Examples The following example displays the debug information about AAA common criteria:
Device> enable
Device# debug aaa common-criteria
AAA common-criteria debugs debugging is on
*Aug 6 08:21:06.554: AAA CC: User flags:2,Policy flags:4
*Aug 6 08:21:06.554: AAA CC: Increment ref count to 1 for test
*Aug 6 08:21:06.554: AAA CC: User test linked to CC policy test
Related Commands
Command Description
aaa common-criteria policy Configures a AAA common criteria security policy.
show aaa common-criteria policy Displays common criteria security policy details.
Command Default If the command is not configured, debugging is not turned on.
12.3(7)T This command was integrated into Cisco IOS Release 12.3(7)T. The command
output includes two new fields: Current Tries and Elapsed Time.
Usage Guidelines Dead-criteria transaction values may change with every AAA transaction. Some of the values that can be
displayed are estimated outstanding transactions, retransmit tries, and dead-detect intervals. These values are
explained in the table below.
Examples The following example shows dead-criteria transaction information for a particular server group:
Field Description
AAA/SG/TRANSAC AAA server-group transactions.
Field Description
Computed Retransmit Tries Currently computed number of retransmissions before
the server is marked as dead.
Current Max Tries Maximum number of tries since the last successful
transaction.
Computed Dead Detect Interval Period of inactivity (the number of seconds since the
last successful transaction) that can elapse before the
server is marked as dead. The period of inactivity
starts when a transaction is sent to a server that is
considered live. The dead-detect interval is the period
that the router waits for responses from the server
before the router marks the server as dead.
Elapsed Time Amount of time that has elapsed since the last valid
response.
Current Max Interval Maximum period of inactivity since the last successful
transaction.
Related Commands
Command Description
radius-server dead-criteria Forces one or both of the criteria--used to mark a
RADIUS server as dead--to be the indicated constant.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The per-user module is responsible for installing per-user attributes for PPP sessions.
Examples The following example displays the configuration commands that were generated by the per-user process:
Related Commands
Command Description
debug aaa authorization Displays information on AAA TACACS+
authorization.
12.2(2)XB Support for the voice applications as well as support for the Cisco AS5350,
Cisco AS5400 and the Cisco 3600 series was added.
12.2(11)T Support for the Cisco AS5850 was added. This command was integrated
into Cisco IOS Release 12.2(11)T.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following example shows output from a successful POD request when using the showdebug command:
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr=h323-originate
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23 value_len=6
Apr 25 17:15:59.318:voip_get_call_direction:
Apr 25 17:15:59.318:voip_get_call_direction:returning answer
Apr 25 17:15:59.318:voip_eval_pod_attr:
Apr 25 17:15:59.318:cc_api_trigger_disconnect:
Apr 25 17:15:59.322:POD:Sending ACK to 172.19.139.206/1700
Apr 25 17:15:59.322:voip_pod_clean:
Related Commands
Command Description
aaa pod server Enables the POD feature.
12.2(33)SRC This command was integrated into Cisco IOS Release 12.2(33)SRC.
12.2(33)SRE This command was integrated into Cisco IOS Release 12.2(33)SRE.
Usage Guidelines This command displays the AAA synchronization data for the session synchronization to the standby device.
This information might be useful for diagnosing any AAA problems related to the session synchronization.
Examples The following example shows sample output from the debugaaaredundancycommand collected while a
session is activated and synchronized to the standby device:
01:31:55: SSS MGR [uid:10]: Updating ID Mgr with the following keys:
aaa-unique-id 11 (0xB)
01:31:55: SSS MGR [uid:10]: Handling Policy Service Authorize action (1 pending sessions)
01:31:55: SSS PM [uid:10][63D5D594]: RM/VPDN disabled: RM/VPDN author not needed
01:31:55: SSS PM [uid:10][63D5D594]: AAA author needed for registered user
01:31:55: SSS MGR [uid:10]: Got reply Need More Keys from PM
01:31:55: SSS MGR [uid:10]: Handling Need More Keys action
01:31:57: SSS INFO: Element type is Unauth-User = "user1"
01:31:57: SSS INFO: Element type is AccIe-Hdl = 33554441 (02000009)
01:31:57: SSS INFO: Element type is AAA-Id = 11 (0000000B)
01:31:57: SSS INFO: Element type is Access-Type = 0 (PPP)
01:31:57: SSS INFO: Element type is Protocol-Type = 0 (PPP)
01:31:57: SSS MGR [uid:10]: Sending a Session Update ID Mgr event
01:31:57: SSS MGR [uid:10]: Updating ID Mgr with the following keys:
username "user1"
aaa-unique-id 11 (0xB)
01:31:57: SSS MGR [uid:10]: Handling Policy Send More Keys action
01:31:57: SSS PM [uid:10][63D5D594]: AAA author needed for registered user
01:31:57: SSS PM [uid:10][63D5D594]: SGBP disabled: SGF author not needed
01:31:57: SSS MGR [uid:10]: Got reply Local Terminate from PM
01:31:57: SSS MGR [uid:10]: Handling Connect Local Service action
01:31:57: SSS MGR [uid:10]: Need the resource type determined key
01:31:57: SSS MGR [uid:10]: Handling Need More Keys action
01:31:57: SSS MGR [uid:10]: Not yet ready to start the Local service
01:31:57: AAA/AUTHEN/PPP (0000000B): Pick method list 'default'
01:31:57: RADIUS/ENCODE(0000000B):Orig. component type = PPoE
01:31:57: RADIUS: AAA Unsupported Attr: client-mac-address[42] 14
01:31:57: RADIUS: 30 30 30 61 2E 34 32 37 64 2E 65 63 [ 000a.427d.ec]
01:31:57: RADIUS: AAA Unsupported Attr: interface [171] 7
01:31:57: RADIUS: 36 2F 30 2F 30 [ 6/0/0]
01:31:57: RADIUS(0000000B): Config NAS IP: 0.0.0.0
01:31:57: RADIUS/ENCODE(0000000B): acct_session_id: 11
01:31:57: RADIUS(0000000B): sending
01:31:57: RADIUS/ENCODE: Best Local IP-Address 9.2.76.2 for Radius-Server 9.2.36.253
01:31:57: RADIUS(0000000B): Send Access-Request to 9.2.36.253:1645 id 1645/10, len 86
01:31:57: RADIUS: authenticator FD E8 32 9A 71 15 50 44 - BE FF 19 D0 09 D4 8D 15
01:31:57: RADIUS: Framed-Protocol [7] 6 PPP [1]
01:31:57: RADIUS: User-Name [1] 9 "user1"
01:31:57: RADIUS: User-Password [2] 18 *
01:31:57: RADIUS: NAS-Port-Type [61] 6 Virtual [5]
01:31:57: RADIUS: NAS-Port [5] 6 0
01:31:57: RADIUS: NAS-Port-Id [87] 9 "6/0/0/0"
01:31:57: RADIUS: Service-Type [6] 6 Framed [2]
01:31:57: RADIUS: NAS-IP-Address [4] 6 9.2.76.2
01:31:57: RADIUS: Received from id 1645/10 9.2.36.253:1645, Access-Accept, len 32
01:31:57: RADIUS: authenticator E4 68 43 2C 2F E7 B4 57 - 05 70 FF B1 22 13 E8 0F
01:31:57: RADIUS: Idle-Timeout [28] 6 200
01:31:57: RADIUS: Service-Type [6] 6 Framed [2]
01:31:57: RADIUS(0000000B): Received from id 1645/10
01:31:57: SSS INFO: Element type is Auth-User = "user1"
01:31:57: SSS INFO: Element type is AAA-Attr-List = C5000100
01:31:57: SSS INFO: Element type is idletime 200 (0xC8)
01:31:57: SSS INFO: Element type is service-type 2 [Framed]
01:31:57: SSS INFO: Element type is Resource-Determined = 1 (YES)
01:31:57: SSS INFO: Element type is Access-Type = 0 (PPP)
01:31:57: SSS INFO: Element type is Protocol-Type = 0 (PPP)
01:31:57: SSS INFO: Element type is Final = 1 (YES)
01:31:57: SSS MGR [uid:10]: Handling Connect Local Service action
01:31:57: SSS MGR [uid:10]: Rcvd an AAA attr list from SIP, pushing it to the PM
01:31:57: SSS MGR [uid:10]: Handling Send Policy Push Cng action
01:31:57: SSS AAA AUTHOR [uid:10]: Root SIP PPPoE
01:31:57: SSS AAA AUTHOR [uid:10]: Enable PPPoE parsing
01:31:57: SSS AAA AUTHOR [uid:10]: Enable PPP parsing
01:31:57: SSS AAA AUTHOR [uid:10]: Active key set to Unauth-User
01:31:57: SSS AAA AUTHOR [uid:10]: Authorizing key user1
01:31:57: SSS AAA AUTHOR [uid:10]: Spoofed AAA reply sent for key user1
01:31:57: SSS MGR [uid:10]: Not yet ready to start the Local service
01:31:57: SSS AAA AUTHOR [uid:10]: Received an AAA pass
01:31:57: SSS AAA AUTHOR [uid:10]: SIP PPP[60A0504C] parsed as Success
01:31:57: SSS AAA AUTHOR [uid:10]: SIP PPP[61571560] parsed as Ignore
01:31:57: SSS AAA AUTHOR [uid:10]: SIP PPPoE[61599FB0] parsed as Success
01:31:57: SSS AAA AUTHOR [uid:10]: SIP Root parser not installed
01:31:57: SSS AAA AUTHOR [uid:10]: No service authorization info found
Field Description
(0000000B) AAA unique ID for the session.
Related Commands
Command Description
debug ccm-manager Displays debugging information about Cisco
CallManager.
12.2(28)SB This command was extended for RADIUS server load balancing to show
which server is selected on the basis of a load balancing algorithm.
12.4(11)T This command was integrated into Cisco IOS Release 12.4(11)T.
12.2(33)SRC This command was integrated into Cisco IOS Release 12.2(33)SRC.
Examples The following example shows that debugging has been set to display information about server selection:
Examples In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The server
retransmits are set to 0 (so each server is attempted only once before failover to the next configured server),
and the transmissions per transaction are set to 4 (the transmissions will stop on the third failover). The third
server in the server group (192.0.2.118) has accepted the transaction on the third transmission (second failover).
Examples In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The server
retransmits are set to 0, and the transmissions per transaction are set to 8. In this transaction, the transmission
to server 192.0.2.1 has failed on the eighth transmission.
Examples In the following sample output, the RADIUS server load balancing feature is enabled with a batch size of 3.
The server selection, based on the load balancing algorithm, is shown as five access-requests that are being
sent to the server group.
Related Commands
Command Description
load-balance Enables RADIUS server load balancing for named
RADIUS server groups.
radius-server load-balance Enables RADIUS server load balancing for the global
RADIUS server group.
radius-server retry method reorder Specifies the reordering of RADIUS traffic retries
among a server group.
12.4(11)T This command was integrated into Cisco IOS Release 12.4(11)T.
12.2(33)SRC This command was integrated into Cisco IOS Release 12.2(33)SRC.
Examples In the following sample output, the RADIUS server load balancing feature is enabled. The idle timer has
expired.
Related Commands
Command Description
load-balance Enables RADIUS server load balancing for named
RADIUS server groups.
Command Description
radius-server host Enables RADIUS automated testing for load
balancing.
radius-server load-balance Enables RADIUS server load balancing for the global
RADIUS server group.
debug acircuit
To display errors and events that occur on the attachment circuits (the circuits between the provider edge (PE)
and customer edge (CE) routers), use thedebugacircuit command in privileged EXEC mode. To disable
debugging output, use the no form of this command.
12.2(14)S This command was integrated into Cisco IOS Release 12.2(14)S.
12.2(15)T This command was integrated into Cisco IOS Release 12.2(15)T.
12.2(25)S This command was integrated into Cisco IOS Release 12.2(25)S.
12.2(27)SBC Support for this command was integrated into Cisco IOS Release
12.2(27)SBC.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use the debugacircuit command to identify provisioning events, setup failures, circuit up and down events,
and configuration failures on attachment circuits.
An attachment circuit connects a PE router to a CE router. A router can have many attachment circuits. The
attachment circuit manager controls all the attachment circuits from one central location. Therefore, when
you enable the debug messages for the attachment circuit, you receive information about all the attachment
circuits.
Examples The following is sample output from the debugacircuitevent command when you enable an interface:
23:28:53: Et2/1 ACMGR: Rcv SIP msg: resp connect forwarded, hdl D6000002, sss_hdl 9E00000F
23:28:53: Et2/1 ACMGR: service connected event, SIP state chg connecting to connected,
action is respond forwarded
23:28:53: ACLIB: pthru_intf_response hdl is D6000002, response is 1
23:28:53: ACLIB [10.0.3.201, 5]: Setting new AC state to Ac-Connected
The command output is self-explanatory.
Related Commands
Command Description
debug vpdn Displays errors and events relating to L2TP
configuration and the surrounding Layer 2 tunneling
infrastructure.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRC This command was integrated into Cisco IOS Release 12.2(33)SRC.
Usage Guidelines Use this command when Any Transport over MPLS (AToM) is configured for nonstop forwarding/stateful
switchover (NSF/SSO) and Graceful Restart.
Use debug commands with caution. They use a significant amount of CPU resources and can affect system
performance.
Examples The debugacircuitcheckpoint command is issued on the active route processor (RP):
On the standby RP, the following messages indicate that it receives checkpointing data:
Related Commands
Command Description
debug mpls l2transport checkpoint Enables the display of AToM events when AToM is
configured for NSF/SSO and Graceful Restart.
debug adjacency
To enable the display of information about the adjacency database, use the debug adjacencycommand in
privileged EXEC mode. To disable the display of these events, use the no form of this command.
debug adjacency [epoch| ipc| state| table] [ prefix ] [ interface ] [connectionid id] [link {ipv4| ipv6| mpls}]
no debug adjacency [epoch| ipc| state| table] [ prefix ] [ interface ] [connectionid id] [link {ipv4| ipv6|
mpls}]
link {ipv4 | ipv6 | mpls (Optional) Displays debugging events for the
specified link type (IP, IPv6, or Multiprotocol Label
Switching [MPLS] traffic).
Note On the Cisco 10000 series routers, IPv6 is
supported in Cisco IOS Release 12.2(28)SB
and later releases.
12.1(1)E This command was implemented on the Cisco 7600 series routers.
12.2(25)S This command was integrated into Cisco IOS Release 12.2(25)S, and the
prefix , interface , connectionidid , and link {ipv4 | ipv6 | mpls} keywords
and arguments were added.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB and
implemented on the Cisco 10000 series routers.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Because debugging output is assigned high priority in the CPU process, you should use debug commands
only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff.
Also, you should use debug commands during periods of lower network traffic and fewer users. Debugging
during these periods decreases the likelihood that increased debug command processing overhead will affect
system use.
You can use any combination of the prefix , interface , connectionidid , and link {ipv4 | ipv6 | mpls} keywords
and arguments (in any order) as a filter to enable debugging for a specified subset of adjacencies.
Note On the Cisco 10000 series routers, IPv6 is supported in Cisco IOS Release 12.2(28)SB and later releases.
Examples The following example shows how to display information on the adjacency database:
Related Commands
Command Description
clear adjacency Clears the Cisco Express Forwarding adjacency table.
clear arp-cache Deletes all dynamic entries from the ARP cache.
show mls cef adjacency Displays information about the hardware Layer 3
switching adjacency node.
Related Commands debug vasi Displays debugging information for the VASI.
debug alarm-interface
To show real-time activities in the data channel or the management channel of the Alarm Interface Controller
(AIC), use the debugalarm-interface command in privileged EXEC mode. To disable debugging output, use
theno form of this command.
Syntax Description slot-number Router chassis slot where the AIC network module
is installed.
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T.
Usage Guidelines This command allows you to observe the management channel activity from the AIC in the specified slot.
Such activity shows that the software running on the AIC CPU has reached a minimum level of working order.
Related Commands
Command Description
alarm-interface Enters the alarm interface mode and configures the
AIC.
debug alps ascu {event| packet| detail| all| format {ipars| router| both}} [interface [ascu id]]
no debug alps ascu {event| packet| detail| all| format {ipars| router| both}} [interface [ascu id]]
format ipars router both Specifies how to display ASCU addresses and the
hexadecimal data in the debug output:
ipars-- Displays only the IPARS hexadecimal
output.
router-- Displays only the router hexadecimal
output.
both-- Displays both the IPARS and router
hexadecimal output.
12.1(2)T The format, ipars, router, and both keywords were added. The output for
this command was modified to include IPARS and router formats.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines To enable debugging for a group of ASCUs, enter a separate command for each ASCU interface and IA
combination.
The interface option applies only to the event, packet, detail, and all keywords.
Note To specify the particular debug tracing level (event, packet, detail or all) and the format (router, pairs
or both), you must configure the debugalpsascucommand two times: once to configure the debug tracing
level and once to configure the format.
Examples The following output is from the debugalpsascuevent command, showing events or protocol errors in router
format for ASCU 42 on interface Serial7:
Note If you specify the ipars or both format for the event or detail tracing level, both the IPARS and router
formats will be displayed.
The following output is from the debugalpsascuevent command, showing events or protocol errors in ipars
format for ASCU 42 on interface Serial7:
The following output is from the debugalpsascudetail command, showing all protocol events in router
format for ASCU 42 on interface Serial6:
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd to ckt
RTP_MATIP
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
Note If you specify the ipars or both format for the event or detail tracing level, both the IPARS and router
formats will be displayed.
The following output is from the debugalpsascudetail command, showing all protocol events in both format
for ASCU 42 on interface Serial6:
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd to ckt
RTP_MATIP
ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS ASCU: Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
The following output is from the debugalpsascupacket command, showing all packets sent or received in
router format for ASCU 42 on interface Serial6:
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
02321D26 0C261616
140C0D18 26163135 0611C6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd ckt
RTP_MATIP
42607866 65717866
65717966 755124
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
022038 26253138
26253139 263511E4
The following output is from the debugalpsascupacket command, showing all packets sent or received in
ipars format for ASCU 42 on interface Serial6:
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS IPARS Format:
2F2C1126 33262525
35331339 26251C14 271DC6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd ckt
RTP_MATIP
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS Router Format:
02321D26 0C261616
140C0D18 26163135 0611C6
ALPS IPARS Format:
2F2C1126 33262525
35331339 26251C14 271DC6
ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd ckt
RTP_MATIP
ALPS Router Format:
42607866 65717866
65717966 755124
ALPS IPARS Format:
2F3E3826 161C3826
161C1826 141D24
ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6
ALPS Router Format:
022038 26253138
26253139 263511E4
ALPS IPARS Format:
2F3E38 26161C38
26161C18 26141DE4
Command Default If no circuit name is specified, then debugging is enabled for every ALPS circuit.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines To enable debugging for a single ALPS circuit, specify the name of the circuit.
To enable debugging for a group of circuits, enter a separate command for each circuit name.
Examples The following is sample output from the debugalpscircuitevent command for circuit RTP_AX25:
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPEN, Event= DISABLE:
(CloseAndDisable)->DISC
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= DISC, Event= ENABLE:
(TmrStartNullRetry)->INOP
ALPS P1024 CKT: Ckt= RTP_AX25, Open - peer set to 200.100.40.2
ALPS P1024 CKT: Ckt= RTP_AX25, Open - peer open.
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= INOP, Event= RETRY_TIMEOUT:
(Open)->OPNG
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPNG, Event= CKT_OPEN_CFM:
(CacheAndFwdAscuData)->OPEN
alps-ccpe# debug alps circuit event RTP_AX25
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPEN, Event= CktClose, Rsn= 12:
(PvcKill,CktRemove,TmrStartClose)->INOP
ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= X25PvcInact, Rsn= 0:
(-,-,-)->INOP
ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= X25VcDeleted, Rsn= 0:
(-,CktDestroy,TmrStop)->INOP
ALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= CktOpReq, Rsn= 4:
(PvcMake,CktAdd,TmrStartOpen)->OPNG
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, Event= X25ResetTx, Rsn= 0:
(-,-,-)->OPNG
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, Event= X25VcUp, Rsn= 0:
(-,OpnCfm,TmrStop)->OPEN
Command Default If no IP address is specified, then debugging is enabled for every peer connection.
12.0(5)T The packet keyword was added. The format for the output was modified
for consistency.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines To enable debugging for a single remote ALPS peer, specify the peer IP address.
To enable debugging for a set of remote peers, enter the command for each peer IP address.
Command Default If no IP address is specified, debugging is enabled for every peer connection.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines To enable debugging for a single remote ALPS peer, specify the peer IP address.
To enable debugging for a set of remote peers, enter the command for each peer IP address.
12.1(2)T The output for this command was modified to reflect MIB and SNMP
changes.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following output is from the debugalpssnmp command. The first line shows a circuit event status change.
The second line shows an ASCU status change. The third line shows a peer connection status change.
debug ancp
To enable the display of debugging information related to the Access Node Control Protocol (ANCP), use
the debugancpcommand in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug ancp {adjacency| details| errors| events| neighbor| packets [brief]| port-event {details| events}|
port-management {details| events}}
no debug ancp {adjacency| details| errors| events| neighbor| packets [brief]| port-event {details| events}|
port-management {details| events}}
12.2(31)ZV1 This command was modified. L2CP was replaced with ANCP.
Cisco IOS XE Release 2.4 This command was integrated into Cisco IOS XE Release 2.4.
Release Modification
Cisco IOS XE Release 3.2S This command was modified. The port-event and port-management
keywords were added.
Usage Guidelines You can use the debugconditioninterface command to conditionalize all the debug commands where the
ANCP TCP connections are terminated.
Examples The following is sample output from the debugancpadjacency command. The output fields are self-explanatory.
ANCP: Received adjacency message, code 3 Src 10.1.1.1 Src port 40224 tcb 549D930
ANCP: 2 capability tlv(s) received
ANCP ADJ: received ACK from nbr, state ESTAB Sending ACK to nbr thou timer. State stays
ESTAB
The table below describes the significant fields shown in the display.
Field Description
Received adjacency message Adjacency message received from the ANCP
neighbor. Adjacency protocol messages synchronize
the Network Access Server and access nodes.
The following is sample output from the debugancpport-eventdetailscommand. The output fields are
self-explanatory.
Related Commands
Command Description
debug condition interface Limits the output for some debug commands on the
basis of interface, VC, or VLAN.
debug appfw
To display debug messages about Cisco IOS Firewall events, use the debugappfwcommand in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Examples The following sample configuration shows how to configure an HTTP policy with application firewall
debugging enabled:
APPFW FUNC:appfw_http_appl_find
APPFW FUNC:appfw_http_appl_find -- Application not found
APPFW FUNC:appfw_http_appl_alloc
APPFW FUNC:appfw_http_appl_alloc -- appl_http 0x64D7A25C
APPFW FUNC:appfw_http_appl_alloc -- Application HTTP parser structure 64D7A25C created
! Debugging sample for HTTP-specific application inspection
Router(cfg-appfw-policy-http)#
Router(cfg-appfw-policy-http)# strict-http action reset alarm
APPFW FUNC:appfw_http_subcommand
APPFW FUNC:appfw_http_subcommand -- strict-http cmd turned on
Router# debug appfw detailed
Usage Guidelines This command is helpful when you experience problems communicating with a node on the network you
control (a neighbor). If the debugapplearp display indicates that the router is receiving AARP probes, you
can assume that the problem does not reside at the physical layer.
Usage Guidelines Use the debugappledomain command to observe activity for domains and subdomains. Use this command
in conjunction with the debugappleremap command to observe interaction between remapping and domain
activity. Messages are displayed when the state of a domain changes, such as creating a new domain, deleting
a domain, and updating a domain.
Examples The following is sample output from the debugappledomain command intermixed with output from the
debugappleremap command; the two commands show related events:
Related Commands
Command Description
debug apple remap Enables debugging of the AppleTalk remap activities.
Usage Guidelines The debugappleeigrp-all command can be used to monitor acquisition of routes, aging route table entries,
and advertisement of known routes through Enhanced IGRP.
Caution Because the debugappleeigrp-all command can generate many messages, use it only when the CPU
utilization of the router is less than 50 percent.
Field Description
atigrp2_router: AppleTalk address of the neighbor.
Field Description
AT: Indicates that this is an AppleTalk packet.
Usage Guidelines In a stable AppleTalk network, the debugappleerrors command produces little output.
To solve encapsulation problems, enable debugappleerrors and debugapplepacket together.
Examples The following is sample output from the debugappleerrors command when a router is brought up with a
zone that does not agree with the zone list of other routers on the network:
As the output suggests, a single error message indicates zone list incompatibility; this message is sent out
periodically until the condition is corrected or the debugappleerrors command is turned off.
Most of the other messages that the debugappleerrors command can generate are obscure or indicate a serious
problem with the AppleTalk network. Some of these other messages follow.
In the following message, RTMPRsp, RTMPReq, ATP, AEP, ZIP, ADSP, or SNMP could replace NBP, and
"llap dest not for us" could replace "wrong encapsulation":
The debugappleerrors command can print out additional messages when other debugging commands are
also turned on. When you turn on both the debugappleerrors and debugappleeventscommands, the following
message can be generated:
Usage Guidelines Only significant events (for example, neighbor and route changes) are logged.
The debugappleevents command is useful for solving AppleTalk network problems because it provides an
overall picture of the stability of the network. In a stable network, the debugappleevents command does not
return any information. If the command generates numerous messages, those messages can indicate possible
sources of the problems.
When configuring or making changes to a router or interface for AppleTalk, enable the debugappleevents
command to alert you to the progress of the changes or to any errors that might result. Also use this command
periodically when you suspect network problems.
The debugappleevents command is also useful to determine whether network flapping (nodes toggling online
and offline) is occurring. If flapping is excessive, look for routers that only support 254 networks.
When you enable the debugappleeventscommand, you will see any messages that the
appleevent-loggingconfiguration command normally displays. Turning on the debugappleeventscommand,
however, does not cause the appleevent-loggingcommand to be maintained in nonvolatile memory. Only
turning on the appleevent-logging command explicitly stores it in nonvolatile memory. Furthermore, if the
appleevent-logging command is already enabled, turning on or off the debugappleevents command does
not affect the appleevent-logging command.
Examples The debugappleevents command is useful in tracking the discovery mode state changes through which an
interface progresses. When no problems are encountered, the state changes progress as follows:
1 Line down.
2 Restarting.
3 Probing (for its own address [node ID] using AARP).
4 Acquiring (sending out GetNetInfo requests).
5 Requesting zones (the list of zones for its cable).
6 Verifying (that the routers configuration is correct. If not, a port configuration mismatch is declared).
7 Checking zones (to make sure its list of zones is correct).
8 Operational (participating in routing).
The following message indicates that the router is rechecking its list of zones for its cable:
Usage Guidelines To determine whether the router is receiving NBP lookups from a node on the AppleTalk network, enable
debugapplenbp at each node between the router and the node in question to determine where the problem
lies.
Caution Because the debugapplenbp command can generate many messages, use it only when the CPU utilization
of the router is less than 50 percent.
The table below describes the fields in the first line of output.
Field Description
AT: NBP Indicates that this message describes an AppleTalk
NBP packet.
ctrl = LkUp Identifies the type of NBP packet. Possible values are
as follows:
LkUp--NBP lookup request.
LkUp-Reply--NBP lookup reply.
The table below describes the fields in the second line of output.
Field Description
AT: Indicates that this message describes an AppleTalk
packet.
Field Description
name: =:ciscoRouter@Low End SW Lab Indicates the entity name for which a network address
has been requested. The AppleTalk entity name
includes three components:
Object (in this case, a wildcard character [=],
indicating that the requester is requesting
name-address pairs for all objects of the
specified type in the specified zone).
Type (in this case, ciscoRouter).
Zone (in this case, Low End SW Lab).
The third line in the output essentially reiterates the information in the two lines above it, indicating that a
lookup request has been made regarding name-address pairs for all objects of the ciscoRouter type in the Low
End SW Lab zone.
Because the router is defined as an object of type ciscoRouter in zone Low End SW Lab, the router sends an
NBP lookup reply in response to this NBP lookup request. The following two lines of output show the response
of the router:
Usage Guidelines With this command, you can monitor the types of packets being slow switched. It displays at least one line
of debugging output per AppleTalk packet processed.
The output reports information online when a packet is received or a transmission is attempted.
When invoked in conjunction with the debugapplerouting, debugapplezip, and debugapplenbp commands,
thedebugapplepacket command adds protocol processing information in addition to generic packet details.
It also reports successful completion or failure information.
When invoked in conjunction with the debugappleerrors command, the debugapplepacket command reports
packet-level problems, such as those concerning encapsulation.
Caution Because the debugapplepacket command can generate many messages, use it only when the CPU
utilization of the router is less than 50 percent.
Field Description
Ether0: Name of the interface through which the router
received the packet.
encaps000000000000000000000000 Encapsulation.
The table below describes the fields in the second line of output.
Field Description
AT: Indicates that this is an AppleTalk packet.
2 rtes Indicates that two routes in the routing table link these
two addresses.
The third line indicates the type of packet received and its source AppleTalk address. This message is repeated
in the fourth line because AppleTalk hosts can send multiple replies to a given GetNetInfo request.
Usage Guidelines Use the debugappleremapcommand with the debugappledomain command to observe activity between
domains and subdomains. Messages from the debugappleremap command are displayed when a particular
remapping function occurs, such as creating remaps or deleting remaps.
Examples The following is sample output from the debugappleremap command intermixed with output from the
debugappledomaincommand; the two commands show related events.
Related Commands
Command Description
debug apple domain Enables debugging of the AppleTalk domain
activities.
Usage Guidelines This command can be used to monitor acquisition of routes, aging of routing table entries, and advertisement
of known routes. It also reports conflicting network numbers on the same network if the network is
misconfigured.
Caution Because the debugapplerouting command can generate many messages, use it only when router CPU
utilization is less than 50 percent.
Field Description
AT: Indicates that this is AppleTalk debugging output.
Field Description
dst=4160-4160 Indicates the destination network address for the
RTMP update packet.
RTMP pkt sent Indicates that this type of message describes an RTMP
update packet that the router has sent (rather than one
that it has received).
The following two messages indicate that the ager has started and finished the aging process for the routing
table and that this table contains 97 entries:
Field Description
AT: Indicates that this is AppleTalk debugging output.
RTMP from 4160.19 Indicates the source address of the RTMP update the
router received.
Usage Guidelines This command reports significant events such as the discovery of new zones and zone list queries. It generates
information similar to that generated by the debug apple routing command, but generates it for ZIP packets
instead of Routing Table Maintenance Protocol (RTMP) packets.
You can use the debugapplezip command to determine whether a ZIP storm is taking place in the AppleTalk
network. You can detect the existence of a ZIP storm when you see that no router on a cable has the zone
name corresponding to a network number that all the routers have in their routing tables.
The fifth line indicates that the router responds that the zone name of network 31902 is US-Florida, and the
zone length of that zone name is 10:
Usage Guidelines This command shows all APPN events. Use other forms of the debugappn command to display specific types
of events.
Caution Because the debugappnallcommand can generate many messages and alter timing in the network node,
use it only when instructed by authorized support personnel.
Caution Debugging output takes priority over other network traffic. The debugappnall command generates more
output than any other debugappn command and can alter timing in the network node. This command can
severely diminish router performance or even render it unusable. In virtually all cases, it is best to use
specific debugappn commands.
Examples Refer to the documentation for specific debugappn commands for examples and explanations.
Related Commands
Note Refer to the other forms of the debugappn command to enable specific debug output selectively.
Command Description
debug appn cs Displays the APPN CS component activity.
Command Description
debug appn ms Displays debugging information on APPN MS
component activity.
debug appn cs
To display Advanced Peer-to-Peer Networking (APPN) Configuration Services (CS) component activity, use
the debugappncs command in privileged EXEC mode. To disable debugging output, use the no form of this
command.
debug appn cs
no debug appn cs
Usage Guidelines The CS component is responsible for defining link stations, ports, and connection networks. It is responsible
for the activation and deactivation of ports and link stations and handles status queries for these resources.
Examples The following is sample output from the debugappncs command. In this example a link station is being
stopped.
Field Description
APPN APPN debugging output.
CS CS component output.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
debug appn ds
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Directory Services (DS)
component activity, use the debugappnds command in privileged EXEC mode. To disable debugging output,
use the no form of this command.
debug appn ds
no debug appn ds
Usage Guidelines The DS component manages searches for resources in the APPN network. DS is also responsible for registration
of resources within the network.
Examples The following is sample output from the debugappnds command. In this example a search has been received.
Field Description
APPN APPN debugging output.
Field Description
PQenq Message was sent to another component.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
Field Description
APPN APPN debugging output.
Field Description
NCL Network control layer debugging output. Network
control layer is the component that handles ANR
packets.
rtt start time RTP is measuring the round-trip time for an HPR
status request packet. This is the start time.
rtt end time RTP is measuring the round-trip time for an HPR
status request packet. This is the time.
round trip time Round-trip time for this HPR status exchange has
been computed.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
debug appn ms
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Management Services
(MS) component activity, use the debugappnms command in privileged EXEC mode. To disable debugging
output, use the no form of this command.
debug appn ms
no debug appn ms
Usage Guidelines The MS component is responsible for generating, sending, and forwarding network management information
in the form of traps and alerts to a network management focal point, such as Netview, in the APPN network.
Examples The following is sample output from the debugappnms command. In this example an error occurred that
caused an alert to be generated.
Field Description
APPN Indicates that this is APPN debugging output.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
Usage Guidelines The NOF component is responsible for processing commands entered by the user such as start, stop, show,
and configuration commands. NOF forwards these commands to the proper component and waits for the
response.
Examples The following is sample output from the debugappnnof command. In this example, an APPN connection
network is being defined.
Field Description
APPN APPN debugging output.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
debug appn pc
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Path Control (PC) component
activity, use thedebugappnpccommand in privileged EXEC mode. To disable debugging output, use the no
form of this command.
debug appn pc
no debug appn pc
Usage Guidelines The PC component is responsible for passing Message Units (MUs) between the Data Link Control (DLC)
layer and other APPN components. PC implements transmission priority by passing higher priority MUs to
the DLC before lower priority MUs.
Examples The following is sample output from the debugappnpc command. In this example an MU is received from
the network.
Field Description
APPN APPN debugging output.
PC PC component output.
Field Description
sending MU MU is session traffic for an ISR session. The MU is
forwarded to the Session Connector component for
routing.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
debug appn ps
To display debugging information on Advanced Peer-to-Peer Networking (APPN) Presentation Services (PS)
component activity, use the debugappnpscommand in privileged EXEC mode. To disable debugging output,
use the no form of this command.
debug appn ps
no debug appn ps
Usage Guidelines The PS component is responsible for managing the Transaction Programs (TPs) used by APPN. TPs are used
for sending and receiving searches, receiving resource registration, and sending and receiving topology updates.
Examples The following is sample output from the debugappnps command. In this example a CP capabilities exchange
is in progress.
Field Description
APPN APPN debugging output.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
Usage Guidelines The SCM component is responsible for the activation and deactivation of the local resources that route an
intermediate session through the router.
Examples The following is sample output from the debugappnscm command. In this example an intermediate session
traffic is being routed.
Field Description
APPN APPN debugging output.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
debug appn ss
To display session services (SS) events, use thedebugappnsscommand in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug appn ss
no debug appn ss
Usage Guidelines The SS component generates unique session identifiers, activates and deactivates control point-to-control
point (CP-CP) sessions, and assists logical units (LUs) in initiating and activating LU-LU sessions.
Examples The following is sample output from the debugappnss command. In this example CP-CP sessions between
the router and another node are being activated.
Field Description
APPN APPN debugging output.
SS SS component output.
Related Commands
Command Description
debug appn all Turns on all possible debugging messages for APPN.
Usage Guidelines The TRS component is responsible for creating and maintaining the topology database, creating and maintaining
the class of service database, and computing and caching optimal routes through the network.
The table below describes the significant fields shown in the display.
Field Description
APPN APPN debugging output.
debug arap
To display AppleTalk Remote Access Protocol (ARAP) events, use the debugarap command in privileged
EXEC mode. To disable debugging output, use the noform of this command.
debug arap {internal| memory| mnp4| v42bis} [linenum [aux| console| tty| vty]]
no debug arap {internal| memory| mnp4| v42bis} [linenum [aux| console| tty| vty]]
Usage Guidelines Use the debugarap command with the debugcallback command on access servers to debug dialin and callback
events.
Use the debugmodem command to help catch problems related to ARAP autodetection (that is,
autoselectarap). These problems are very common and are most often caused by modems, which are the
most common cause of failure in ARAP connection and configuration sessions.
Related Commands
Command Description
debug callback Displays callback events when the router is using a
modem and a chat script to call back on a terminal
line.
12.2(25)S This command was integrated into Cisco IOS Release 12.2(25)S.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB and
implemented on the Cisco 10000 series.
Cisco IOS XE Release 3.9S This command was integrated into Cisco IOS XE Release 3.9S.
Examples The following is sample output from the debug archive config timestamp command:
Starting Pass 2
Time to read file system:running-config = 0 msec (0 sec)
Number of lines read:55
Size of file :1054
Time taken for positive rollback pass = 0 msec (0 sec)
Time taken for negative rollback pass = 0 msec (0 sec)
Time taken for Pass 2 = 0 msec (0 sec)
Total number of passes:1
Rollback Done
Related Commands
Command Description
debug archive versioning Enables debugging of the Cisco configuration archive
activities.
Command Default If this command is not entered, there is no debugging or display of the configuration logging persistent events
in the archive.
12.4(11)T This command was integrated into Cisco IOS Release 12.4(11)T.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set,
platform, and platform hardware.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB.
Usage Guidelines The configuration logger feature must be enabled in order for the debug capability to work.
Examples The following example turns on the debugging feature and displays the configuration logging persistent events:
Related Commands
Command Description
archive log config persistent save Saves the persisted commands in the configuration
log to the Cisco IOS secure file system.
12.2(25)S This command was integrated into Cisco IOS Release 12.2(25)S.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set,
platform, and platform hardware.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB and
implemented on the Cisco 10000 series.
12.2(33)SRE This command was modified. It was integrated into Cisco IOS Release
12.2(33)SRE.
Cisco IOS XE Release 3.9S This command was integrated into Cisco IOS XE Release 3.9S.
Examples The following is sample output from the debug archive versioning command:
Related Commands
Command Description
debug archive config timestamp Enables debugging of the processing time for each
integral step of a configuration replace operation and
the size of the configuration files being handled.
debug arp
To enable debugging output for Address Resolution Protocol (ARP) transactions, use the debug arp command
in privileged EXEC mode. To disable debugging, use the no form of this command.
Syntax Description vrf vrf-name (Optional) Enables debug trace for a specific VPN
routing and forwarding (VRF) instance.
Command Default Debugging output is disabled for ARP transactions. To enable ARP packet debugging, use this command
without a keyword.
12.4(11)T The following keywords were added: adjacency, application, dynamic, ha,
interface, static, subblocking, table, and timer.
12.2(33)SRE This command was modified. The database keyword was added.
15.1(1)SY This command was modified. The vrf vrf-name keyword-argument pair and
global keyword were added.
Usage Guidelines The debugging information shows whether the device is sending ARP packets and receiving ARP packets.
Use this command when only some nodes on a TCP/IP network are responding.
The amount of debug information displayed is filtered based on an interface, an access list, or both, as specified
by the debug list command.
To list the debugging options enabled on this device, use the show debugging command.
Examples The following example shows how to enable ARP packet debugging filtered on ARP table entries for the host
at 192.0.2.10:
Related Commands
Command Description
access-list (extended-ibm) Configures the extended access list mechanism for
filtering frames by both source and destination
addresses and arbitrary bytes in the packet.
debug ase
Note Effective with Cisco IOS Release 12.4(24), the debugase command is not available in Cisco IOS software.
To gather Automatic Signature Extraction (ASE) error, log, messaging, reporting, status, and timer information,
use the debugase command in privileged EXEC mode. To disable error, log, messaging, reporting, status,
and timer information, use the no form of this command.
Usage Guidelines This command is used on the Cisco 1800, 2800, and 7200 series routers, Cisco 7301 router, and Integrated
Services Routers (ISRs) as ASE sensors.
Related Commands
Command Description
ase collector Enters the ASE collector server IP address so that the
ASE sensor has IP connectivity to the ASE collector.
ase group Identifies the TIDP group number for the ASE feature.
ase signature extraction Enables the ASE feature globally on the router.
clear ase signature Clears ASE signatures that were detected on the
router.
show ase Displays the ASE run-time status, which includes the
TIDP group number.
Usage Guidelines This command traces the event logs in the ASNL, which serves as the interface layer between the application
and protocol stacks. Event logs are generated during normal subscription processing, when the application
responds to the notification request and when the session history table is updated.
Examples The following example shows the ASNL subscription table being generated and the associated subscription
timers as the application responds to the subscription request. The response timer is started to determine if
the application responds to the notification request. If the application that made the subscription does not
respond to the notification request within 5 seconds, the system automatically removes the subscription. The
session-history-record deletion timer is also started. When the timer expires, the history record is removed
from the active subscription table.
*May 4 06:26:29.651://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0
*May 4 06:26:34.663://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay
(5000)
*May 4 06:26:34.663://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops
*May 4 06:26:34.667://-1//ASNL:SUB-1:/asnl_create_session_history:Creating Session History
Related Commands
Command Description
clear subscription Clears all active subscriptions or a specific
subscription.
subscription asnl session history Specifies how long to keep ASNL subscription history
records and how many history records to keep in
memory.
Usage Guidelines The router uses asynchronous security protocols from companies including ADT Security Systems, Inc.,
Adplex, and Diebold to transport alarm blocks between two devices (such as a security alarm system console
and an alarm panel). The alarm blocks are transported in pass-through mode using BSTUN encapsulation.
Examples The following is partial sample output from the debugasppacket command for asynchronous security protocols
when packet debugging is enabled on an asynchronous line carrying Diebold alarm traffic. In this example,
two polls are sent from the Diebold alarm console to two alarm panels that are multidropped from a single
EIA/TIA-232 interface. The alarm panels have device addresses F0 and F1. The example trace indicates that
F1 is responding and F0 is not responding. At this point, you need to examine the physical link and possibly
use a datascope to determine why the device is not responding.
Field Description
ASP Asyncronous security protocol packet.
Field Description
Data (n bytes) Type and size of the packet.
Usage Guidelines The debugasppeventcommand should be used with the debugaspppacket command to display all available
details of the APOS call flow.
Examples The following is sample output from the debugasppeventcommand for a simple transaction:
Field Description
Serial ENABLE: Enable event received from the serial interface.
Field Description
Network ENABLE: Enable event received from the network.
Related Commands
Command Description
debug aspp packet Displays APOS packet debug messages.
Usage Guidelines The debugaspppacketcommand should be used with the debugasppevent command to display all available
details of the APOS call flow.
Examples The following is sample output from the debugaspppacketcommand for a simple transaction:
Field Description
ASPP Indicates that this is an ASPP debug message.
Field Description
ADI-rx Indicates a received packet.
Related Commands
Command Description
debug aspp event Displays APOS event debug messages.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following example starts the asynchronous rotary line queueing debugging display:
Related Commands
Command Description
debug ip tcp transactions Enables the IP TCP transactions debugging display
to observe significant transactions such as state
changes, retransmissions, and duplicate packets.
15.0(1)M This command was integrated into Cisco IOS Release 15.0(1)M.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRE This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples The following example shows output for the debug atm autovc command for all autoprovisioned PVC events
and errors:
00:09:03:AutoVC(ATM1/0):process VC 1/101
This message indicates that PVC 1/101 is in the process of being autoprovisioned.
00:09:03:AutoVC(ATM1/0.1):bring up vc 1/101
This message indicates that PVC 1/101 is being brought up.
Related Commands
Command Description
create on-demand Configures ATM PVC autoprovisioning, which
enables a PVC or range of PVCs to be created
automatically on demand.
Router#
debug atm bundle error
Related Commands
Command Description
debug atm bundle events Displays SVC bundle events.
Field Description
01:14:35 Local time on the router in hours:minutes:seconds.
b_update_vc for four with bstate 1, vc_state 1 Test describing the bundle event.
Related Commands
Command Description
debug atm bundle error Displays debug messages for SVC bundle errors.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following example enables debugging for ATM virtual circuits (VCs) that have been configured with
cell packing:
Related Commands
Command Description
atm mcpt-timers Creates cell-packing timers that specify how long the
PE router can wait for cells to be packed into an
MPLS or L2TPv3 packet.
Command Description
show atm cell-packing Displays information about the VCs and VPs that
have ATM cell relay over MPLS or L2TPv3 cell
packing enabled.
12.2(4)T This command was integrated into Cisco IOS Release 12.2(4)T.
Usage Guidelines This command displays ATM events that occur on the ATM interface processor and is useful for diagnosing
problems in an ATM network. It provides an overall picture of the stability of the network. In a stable network,
the debugatmevents command does not return any information. If the command generates numerous messages,
the messages can indicate the possible source of problems.
When configuring or making changes to a router or interface for ATM, enable the debugatmeventscommand.
Doing so alerts you to the progress of the changes or to any errors that might result. Also use this command
periodically when you suspect network problems.
aip_love_note(ATM4/0): asr=0x200
aip_setup_vc(ATM4/0): vc:4 vpi:4 vci:4
aip_love_note(ATM4/0): asr=0x200
aip_setup_vc(ATM4/0): vc:6 vpi:6 vci:6
aip_love_note(ATM4/0): asr=0x200
aip_setup_vc(ATM4/0): vc:7 vpi:7 vci:7
aip_love_note(ATM4/0): asr=0x200
aip_setup_vc(ATM4/0): vc:11 vpi:11 vci:11
aip_love_note(ATM4/0): asr=0x200
The table below describes the significant fields shown in the display.
Field Description
PLIM type Indicates the interface rate in megabits per second
(Mbps). Possible values are:
1 = TAXI(4B5B) 100 Mbps
2 = SONET 155 Mbps
3 = E3 34 Mbps
The following line indicates that the AIP was reset. The PLIM TYPE detected was 1, so the maximum rate
is set to 100 Mbps.
The following line indicates that the AIP was given a shutdown command, but the current configuration
indicates that the AIP should be up:
aip_disable(ATM4/0): state=1
The following line indicates that a configuration command has been completed by the AIP:
aip_love_note(ATM4/0): asr=0x201
The following line indicates that the AIP was given a no shutdown command to take it out of shutdown:
aip_enable(ATM4/0)
The following line indicates that the AIP detected a carrier state change. It does not indicate that the carrier
is down or up, only that it has changed.
aip_love_note(ATM4/0): asr=0x4000
The following line of output indicates that the AIP enable function is restarting all permanent virtual circuits
(PVCs) automatically:
12.2(18)S This command was integrated into Cisco IOS Release 12.2(18)S on Cisco
7500 series routers.
12.2(20)S Support was added for the Cisco 7304 router. The Cisco 7500 series router
is not supported in Cisco IOS Release 12.2(20)S.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
Examples The following example displays debug messages regarding ATM HA errors on the networking device:
Related Commands
Command Description
debug atm ha-events Debugs ATM HA events on the networking device.
12.2(18)S This command was integrated into Cisco IOS Release 12.2(18)S on Cisco
7500 series routers.
12.2(20)S Support was added for the Cisco 7304 router. The Cisco 7500 series router
is not supported in Cisco IOS Release 12.2(20)S.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
Examples The following example displays debug messages regarding ATM HA events on the networking device:
Related Commands
Command Description
debug atm ha-error Debugs ATM HA errors on the networking device.
12.2(18)S This command was integrated into Cisco IOS Release 12.2(18)S on Cisco
7500 series routers.
12.2(20)S Support was added for the Cisco 7304 router. The Cisco 7500 series router
is not supported in Cisco IOS Release 12.2(20)S.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
Examples The following example displays debug messages regarding the ATM HA state on the networking device:
Related Commands
Command Description
debug atm ha-error Debugs ATM HA errors on the networking device.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following example shows the events and messages when configuring ATM Cell Relay over MPLS in VP
mode.
Related Commands
Command Description
show mpls l2transport vc Displays information about AToM circuits that have
been enabled to route Layer 2 packets on a router.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
Examples The following examples show output from the debugatmlfi command. Each example is preceded by an
explanation of the output.
The following output indicates that the packet has dequeued from the per-VC queue that is associated
with the virtual circuit (VC):
The following output indicates that the packet is enqueued on the per-VC queue associated with the VC:
The following output indicates that the packet has dequeued from the MLP bundle queue:
The following output indicates that PPP over ATM (PPPoA) encapsulation cannot be added to the packet
for some reason:
The following output indicates that the VC could not be found on the virtual access interface associated
with the PPPoA session:
When a permanent virtual circuit (PVC) has been deleted, the following output indicates that MLP has
been deconfigured successfully:
If the changing of any PVC parameters requires re-creation of the PVC, the following output is generated
during the re-creation of the PVC:
The following output indicates that the MLP over ATM structure associated with a VC has failed to
allocate memory:
The following output is generated when MLP over ATM is first configured on a PVC:
Related Commands
Command Description
show multilink ppp Displays bundle information for MLP bundles.
Usage Guidelines Native ATM API is the layer above the signaling API. Static map and Resource Reservation Protocol (RSVP)
clients use the native ATM API to interact with the signaling API to create ATM SVCs.
Use the debugatmnative command to diagnose problems in the creation of static map and RSVP ATM SVCs.
Examples The following is sample output for the debugatmnative command with the api keyword:
Usage Guidelines Use the debugatmnbma command to diagnose problems in the creation of RSVP SVCs.
The RSVP application creates SVCs by using the NBMA API. The debugatmnbma command with
theapikeyword displays events that occur as a result of the exchange between RSVP and the NBMA API.
Syntax Description interface atm number (Optional) Number of the ATM interface.
12.2(13)T This command was integrated into Cisco IOS Release 12.2(13)T.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
Examples The following sample output for the debugatmoamcc command records activity beginning with the entry of
theoam-pvcmanagecc command and ending with the entry of thenooam-pvcmanagecc command. The ATM
0 interface is specified, and the "both" segment direction is specified. The output shows an activation request
sent and confirmed, a series of CC cells sent by the routers on each end of the segment, and a deactivation
request and confirmation.
00:15:15: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:16: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:17: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:18: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:19: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
00:15:19: CC DEACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM
Type:8 OAM Func:1 Direction:3 CTag:6
00:15:19: CC DEACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM Cell
Type:4 OAM Type:8 OAM Func:1 Direction:3 CTag:6
The table below describes the significant fields shown in the display.
Field Description
00:15:05 Time stamp.
0 Source.
1 Sink.
Related Commands
Command Description
oam-pvc manage cc Configures ATM OAM F5 CC management.
show atm pvc Displays all ATM PVCs and traffic information.
debug atm oc3 pom {data| flow| pa| sar| sfp| trace}
no debug atm oc3 pom {data| flow| pa| sar| sfp| trace}
When traffic sent to the SAR exceeds the peak cell rate for a particular virtual circuit (VC), the SAR indicates
this to the host by sending flow control indications. These indications inform the host that either the high
watermark or the low watermark has been reached for that VC queue.
When a high watermark is received from the SAR, indicating that the VC queue is full, the host will stop
sending packets to the SAR until a low watermark indication is received. A low watermark indicates that the
VC queue has been drained sufficiently to receive additional packets.
debug atm oc3 pom pa command
Use the debugatmoc3pompacommand on those platforms supporting OIR to display the indications generated
when the port adapter (the ATM-OC3 POM network module) is subjected to OIR. This command is used
principally during the port adapter initialization phase.
debug atm oc3 pom sar command
Use the debugatmoc3pomsar command to display blocking commands or indications sent to or received
from the SAR. This includes commands or indications of the creation or deletion of virtual circuits or virtual
paths.
debug atm oc3 pom sfp command
Use the debugatmoc3pomsfp command to display the indications generated when a module in the SFP port
is subjected to OIR.
debug atm oc3 pom trace command
Use the debugatmoc3pomtrace command to display the hexadecimal representation of commands sent to
or received from the SAR. To facilitate debugging, use this command in conjunction with the
debugatmoc3pomsar command.
Examples
Field Description
Jun 27 22:03:17.996: Date or time stamp of packet DMA transfer.
Examples The following example illustrates the output from the debugatmoc3pomflow command:
Field Description
Jun 27 15:14:13.456: Date or time stamp of flow indication
Examples The following examples illustrate the output from the debugatmoc3pompa command.
The first example gives the output when the network module is removed:
Examples The following examples illustrate the output from the debugatmoc3pomsar command.
The first example displays command indications for setting up a VC and opening the reassembly channel and
the segmentation channel in the SAR:
Examples The following examples illustrate the output from the debugatmoc3pomsfp command.
The first example gives the output when the module is removed from the SFP port:
Examples The first example illustrates the output from the debugatmoc3pomtrace command when it is run without
the debugatmoc3sar command being activated:
Field Description
Jun 27 22:15:09.284: Date or time stamp for the command dialog.
The second example illustrates the output from the debugatmoc3pomtrace command run in conjunction
with the debugatmoc3pomsar command.
In this example, each command sent to the SAR is displayed by the debugatmoc3pomsar command. Then
the hexadecimal representation of the command and its acknowledgement are displayed by the
debugatmoc3pomtrace command.
When a high watermark is received from the SAR, indicating that the VC queue is full, the host will stop
sending packets to the SAR until a low watermark indication is received. A low watermark indicates that the
VC queue has been drained sufficiently to receive additional packets.
debug atm t3e3 pa command
Use the debugatmt3e3pacommand on those platforms supporting OIR to display the indications generated
when the port adapter (the ATM T3/E3 network module) is subjected to OIR. This command is used principally
during the port adapter initialization phase.
debug atm t3e3 sar command
Use the debugatmt3e3sar command to display blocking commands or indications sent to or received from
the SAR. This includes commands or indications of the creation or deletion of virtual circuits or virtual paths.
debug atm t3e3 trace command
Use the debugatmt3e3trace command to display the hexadecimal representation of commands sent to or
received from the SAR. To facilitate debugging, use this command in conjunction with the debugatmt3e3sar
command.
Examples
Field Description
Jun 27 22:03:17.996: Date or time stamp of packet DMA transfer.
Examples The following example illustrates the output from the debugatmt3e3flow command:
Field Description
Jun 27 15:14:13.456: Date or time stamp of flow indication
Examples The following examples illustrate the output from the debugatmt3e3pa command.
The first example gives the output when the network module is removed:
Examples The following examples illustrate the output from the debugatmt3e3sar command.
The first example displays command indications for setting up a VC and opening the reassembly channel and
the segmentation channel in the SAR:
Router(config-if-atm-vc)# exit
Router(config-if)#
*Jun 27 22:12:28.816: ATM2/0: Setup_VC: vc:3 vpi:2 vci:2
*Jun 27 22:12:28.816: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2)
*Jun 27 22:12:28.816: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760
*Jun 27 22:12:28.816: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2)
*Jun 27 22:12:28.820: ATM2/0: Setup_Cos: vc:3 wred_name:- max_q:0
The second example displays the commands sent to the SAR and the acknowledgements returned when the
VC is deleted and the segmentation and reassembly channels are closed:
Examples The first example illustrates the output from the debugatmt3e3trace command when it is run without the
debugatmt3e3sar command being activated:
Field Description
Jun 27 22:15:09.284: Date or time stamp for the command dialog.
The second example illustrates the output from the debugatmt3e3trace command run in conjunction with
the debugatmt3e3sar command.
In this example, each command sent to the SAR is displayed by the debugatmt3e3sar command. Then the
hexadecimal representation of the command and its acknowledgement are displayed by the debugatmt3e3trace
command.
debug audit
To display debug messages for the audit subsystem, use the debugauditcommand in privileged EXEC mode.
To disable debugging for the audit subsystem, use the no form of this command.
debug audit
no debug audit
12.0(27)S This feature was integrated into Cisco IOS Release 12.0(27)S.
12.2(27)SBC This command was integrated into Cisco IOS Release 12.2(27)SBC.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Audit files allow you to track changes that have been made to your router. Each change is logged as a syslog
message, and all syslog messages are kept in the audit file, which is kept in the audit subsystem.
*Sep 14 18:37:32.103:Audit:disk0:DONE
*Sep 14 18:37:32.103:Audit:Trying to hash filesystem bootflash:
*Sep 14 18:37:32.103:Audit:Trying to hash attributes of
bootflash:c7200-kboot-mz.121-8a.E
*Sep 14 18:37:32.107:Audit:bootflash:c7200-kboot-mz.121-8a.E DONE
*Sep 14 18:37:32.107:Audit:Trying to hash attributes of
bootflash:crashinfo_20030115-182547
*Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030115-182547 DONE
*Sep 14 18:37:32.107:Audit:Trying to hash attributes of
bootflash:crashinfo_20030115-212157
*Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030115-212157 DONE
*Sep 14 18:37:32.107:Audit:Trying to hash attributes of
bootflash:crashinfo_20030603-155534
*Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030603-155534 DONE
*Sep 14 18:37:32.107:Audit:bootflash:DONE
*Sep 14 18:37:32.107:%AUDIT-1-FILESYSTEM:Hash:
330E7111F2B526F0B850C24ED5774EDE User:
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for 7206VXR chassis,
Hw Serial#:28710795, Hw Revision:A
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for NPE 400 Card, Hw
Serial#:28710795, Hw Revision:A
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for I/O Dual
FastEthernet Controller
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for i82543
(Livengood)
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for i82543
(Livengood)
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot
*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot
*Sep 14 18:37:32.107:%AUDIT-1-HARDWARE_CONFIG:Hash:
32F66463DDA802CC9171AF6386663D20 User:
audit interval Changes the time interval that is used for calculating
hashes.
debug authentication
To display debugging information about the Authentication Manager, use the debugauthentication command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
15.2(2)T This command was integrated into Cisco IOS Release 15.2(2)T.
Cisco IOS XE Release 3.2SE This command was modified. The detail keyword was added.
Usage Guidelines Use the debug authentication command to troubleshoot the Authentication Manager.
Examples The following example shows sample output from the debug authentication command when the feature
and events keywords are configured:
Related Commands
Command Description
debug access-session Displays debugging information about Session Aware
Networking sessions.
debug auto-config
To enable debugging for autoconfiguration applications, use the debugauto-config command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
12.3(14)T This command was integrated into Cisco IOS Release 12.3(14)T.
12.4(3) This command was integrated into Cisco IOS Release 12.4(3).
Examples The following example shows the debugauto-config command used to enable debugging for autoconfiguration
applications and to display autoconfiguration events:
Field Description
0x628C8164 Identifies the application handle, an auto-generated
number for debugging.
Related Commands
Command Description
auto-config Enables autoconfiguration or enters auto-config
application configuration mode for the SCCP
application.
debug autoupgrade
To display the debug output of the Cisco Auto-Upgrade Manager (AUM), use the debug autoupgrade
command in privileged EXEC mode. To disable debug output, use the no form of this command.
debug autoupgrade
no debug autoupgrade
Cisco IOS XE Release 3.9S This command was integrated into Cisco IOS XE Release 3.9S.
Usage Guidelines Use the debug autoupgrade command when you encounter a problem with AUM and provide the output to
TAC. Run the debug autoupgrade command and then run AUM to view the debug messages.
Examples The following example shows how to enable the debugging of Cisco Auto-Upgrade Manager:
Related Commands
Command Description
upgrade automatic getversion Downloads a Cisco software image directly from
www.cisco.com or from a non-Cisco server.
12.2(2)T Support for this command was introduced on the Cisco 7200 series routers.
12.2(4)T This command was implemented on the Cisco 2600 series, Cisco 3600 series,
and Cisco MC3810.
12.2(2)XB This command was implemented on the Cisco AS5350 and Cisco AS5400.
12.2(8)T This command was implemented on Cisco IAD2420 series integrated access
devices (IADs). This command is not supported on the access servers in this
release.
12.2(11)T This command was implemented on Cisco AS5350, Cisco AS5400, and Cisco
AS5850 platforms.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Router# debug_bsm_command:DEBUG_BSM_SESSION_STATE_ALL
23:50:54:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE
23:50:54:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS
23:50:54:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT
23:50:54:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS
The following example displays output for the debugbackhaul-session-managersessionxportall command:
Related Commands
Caution Use caution when enabling this debug command in a live system. It produces significant amounts of
output, which could lead to a disruption of service.
Command Description
debug backhaul-session-manager set Traces state changes and receives messages and
events for all available session-sets or a specified
session-set.
12.2(2)T Support for this command was introduced on the Cisco 7200 series routers.
12.2(4)T This command was implemented on the Cisco 2600 series, Cisco 3600 series,
and Cisco MC3810.
12.2(2)XB This command was implemented on the Cisco AS5350 and Cisco AS5400.
12.2(8)T This command was implemented on Cisco IAD2420 series integrated access
devices (IADs). This command is not supported on the access servers in this
release.
12.2(11)T This command was implemented on Cisco AS5350, Cisco AS5400, and Cisco
AS5850 platforms.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following is output for the debugbackhaul-session-managersetcommand for all available session sets:
Related Commands
Command Description
debug backhaul-session-manager session Debugs all available sessions or a specified session.
debug backup
To monitor the transitions of an interface going down then back up, use the debugbackupcommand in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug backup
no debug backup
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The debugbackupcommand is useful for monitoring dual X.25 interfaces configured as primary and backup
in a Telco data communication network (DCN).
Examples The following example shows how to start the debugbackup command:
Related Commands
Command Description
backup active interface Activates primary and backup lines on specific X.25
interfaces.
debug bert
To display information on the bit error rate testing (BERT) feature, use the debugbert command in privileged
EXEC mode. To disable debugging output, use the noform of this command.
debug bert
no debug bert
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The debugbert command output is used primarily by Cisco technical support representatives. The debugbert
command displays debugging messages for specific areas of executed code.
Related Commands
Command Description
bert abort Aborts a bit error rate testing session.
bert controller Starts a bit error rate test for a particular port on a
Cisco AS5300 router.
debug bfd
To display debugging messages about Bidirectional Forwarding Detection (BFD), use the debug bfd command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
12.0(31)S This command was integrated into Cisco IOS Release 12.0(31)S.
12.4(4)T This command was integrated into Cisco IOS Release 12.4(4)T.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SRE This command was modified. Support for IPv6 was added.
15.1(2)T This command was modified. Support for IPv6 was added to Cisco IOS
Release 15.1(2)T.
15.1(1)SG This command was integrated into Cisco IOS Release 15.1(1)SG.
15.1(1)SY This command was modified. Support for IPv6 was added to Cisco IOS
Release 15.1(1)SY.
Usage Guidelines The debug bfd command can be used to troubleshoot the BFD feature.
Note Because BFD is designed to send and receive packets at a very high rate of speed, consider the potential
effect on system resources before enabling this command, especially if there are a large number of BFD
peers. The debug bfd packet command should be enabled only on a live network at the direction of Cisco
Technical Assistance Center personnel.
Examples The following example shows output from the debug bfd packet command. The IP address has been specified
in order to limit the packet information to one interface:
The following example shows output from the debug bfd event command when an interface between two
BFD neighbor routers fails and then comes back online:
Field Description
bfd_neighbor - action:DESTROY The BFD neighbor will tear down the BFD session.
Session [172.16.10.1, 172.16.10.2, Fa0/1,1] IP addresses of the BFD neighbors holding this
session that is carried over FastEthernet interface 0/1.
event DETECT TIMER EXPIRED The BFD neighbor has not received BFD control
packets within the negotiated interval and the detect
timer has expired.
state UP -> FAILING The BFD event state is changing from Up to Failing.
Session [172.16.10.1, 172.16.10.2, Fa0/1,1], event The BFD session between the neighbors indicated by
RX IHY 0 the IP addresses that is carried over FastEthernet
interface 0/1 is changing state from Failing to Down.
The I Hear You (IHY) bit value is shown as 0 to
indicate that the remote system is tearing down the
BFD session.
event RX IHY 0, state DOWN -> INIT The BFD session is still considered down, and the
IHY bit value still is shown as 0, and the session state
changes from DOWN to INIT to indicate that the
BFD session is again initializing, as the interface
comes back up.
event RX IHY 1, state INIT -> UP The BFD session has been reestablished, and the IHY
bit value changes to 1 to indicate that the session is
live. The BFD session state changes from INIT to
UP.
The following example shows output from the debug bfd packet command when an interface between two
BFD neighbor routers fails and then comes back online. The diagnostic code changes from 0 (No Diagnostic)
to 1 (Control Detection Time Expired) because no BFD control packets could be sent (and therefore detected
by the BFD peer) after the interface fails. When the interface comes back online, the diagnostic code changes
back to 0 to signify that BFD packets can be sent and received by the BFD peers.
Field Description
Rx IP: src 172.16.10.2 The router has received this BFD packet from the
BFD router with source address 172.16.10.2.
Field Description
H/D/P/F (0/0/0/0) H bit--Hear You bit. This bit is set to 0 if the
transmitting system either is not receiving BFD
packets from the remote system or is tearing down
the BFD session. During normal operation the I Hear
You bit is set to 1.
D bit--Demand Mode bit. If the Demand Mode bit
set, the transmitting system wants to operate in
demand mode. BFS has two modes--asynchronous
and demand. The Cisco implementation of BFD
supports only asynchronous mode.
P bit--Poll bit. If the Poll bit is set, the transmitting
system is requesting verification of connectivity or
of a parameter change.
F bit--Final bit. If the Final bit is set, the transmitting
system is responding to a received BFC control packet
that had a Poll (P) bit set.
Field Description
tx 1000000 Desired minimum transmit interval.
Command Default Debugging for IPv6 BGP dampening packets is not enabled.
12.0(21)ST This command was integrated into Cisco IOS Release 12.0(21)ST.
12.0(22)S This command was integrated into Cisco IOS Release 12.0(22)S.
12.2(14)S This command was integrated into Cisco IOS Release 12.2(14)S.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(25)SG This command was integrated into Cisco IOS Release 12.2(25)SG.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
Cisco IOS XE Release 2.1 This command was introduced on Cisco ASR 1000 Series Routers.
Usage Guidelines The debug bgp ipv6 dampeningcommand is similar to the debug ip bgp dampeningcommand, except that
it is IPv6-specific.
Use the prefix-list keyword and an argument to filter BGP IPv6 dampening debug information through an
IPv6 prefix list.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options within global configuration
mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following is sample output from the debug bgp ipv6 dampeningcommand:
Field Description
penalty Numerical value of 1000 assigned to a route by a
router configured for route dampening in another
autonomous system each time a route flaps. Penalties
are cumulative. The penalty for the route is stored in
the BGP routing table until the penalty exceeds the
suppress limit. If the penalty exceeds the suppress
limit, the route state changes from history to damp.
Field Description
flapped Number of times a route is available, then unavailable,
or vice versa.
maximum suppress limit (not shown in sample output) Maximum amount of time (in minutes) a route is
suppressed. The default value is four times the
half-life period.
damp state (not shown in sample output) State in which the route has flapped so often that the
router will not advertise this route to BGP neighbors.
Related Commands
Command Description
debug bgp ipv6 updates Displays debugging messages for IPv6 BGP update
packets.
debug bgp ipv6 {unicast| multicast} updates [ ipv6-address ] [prefix-list prefix-list-name] [in| out]
no debug bgp ipv6 {unicast| multicast} updates [ ipv6-address ] [prefix-list prefix-list-name] [in| out]
Command Default Debugging for IPv6 BGP update packets is not enabled.
12.0(21)ST This command was integrated into Cisco IOS Release 12.0(21)ST.
12.0(22)S This command was integrated into Cisco IOS Release 12.0(22)S.
12.2(14)S This command was integrated into Cisco IOS Release 12.2(14)S.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB.
Release Modification
12.2(25)SG This command was integrated into Cisco IOS Release 12.2(25)SG.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
Cisco IOS XE Release 2.1 This command was introduced on Cisco ASR 1000 Series Routers.
Usage Guidelines The debug bgp ipv6 updatescommand is similar to the debug ip bgp updatescommand, except that it is
IPv6-specific.
Use the prefix-list keyword to filter BGP IPv6 updates debugging information through an IPv6 prefix list.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options within global configuration
mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server. For complete information on debug commands and redirecting debugging output, refer to the
Release 12.2 Cisco IOS Debug Command Reference .
Examples The following is sample output from the debug bgp ipv6 updatescommand:
Field Description
BGP(1): BGP debugging for address family index (afi) 1.
neighbor version Version of the BGP table on the neighbor from which
the update was received.
table version Version of the BGP table on the router from which
you entered the debug bgp ipv6 updates command.
route sourced locally Indicates that a route is sourced locally and that
updates are not sent for the route.
send UPDATE (prepend, chgflags:0x208) Indicates that an update message about a path to a
BGP peer should be written.
Related Commands
Command Description
debug bgp ipv6 dampening Displays debugging messages for IPv6 BGP
dampening packets.
debug bgp l2vpn vpls updates [access-list | expanded-access-list | bgp-neighbor-address | events | {in | out
}]
nodebug bgp l2vpn vpls updates [access-list | expanded-access-list | bgp-neighbor-address | events | {in |
out }]
Examples The following shows how to enable the debug bgp l2vpn vpls updates command:
Device> enable
Device# debug bgp l2vpn vpls updates
BGP updates debugging is on for address family: L2VPN Vpls
Related Commands
Command Description
debug ip bgp updates Displays information about the
processing of BGP updates.
12.2(33)SRB This command was integrated into Cisco IOS Release 12.2(33)SRB.
Cisco IOS XE 2.6 This command was integrated into Cisco IOS XE Release 2.6.
Usage Guidelines The debugbgpnsapcommand is similar to the debugipbgpcommand, except that it is specific to the NSAP
address family.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debug output, use the logging command options within global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Examples The following example shows output for the debugbgpnsapcommand. The BGP(4) identifies that BGP
version 4 is operational.
Related Commands
Command Description
debug bgp nsap dampening Displays debug messages for BGP NSAP prefix
dampening events.
debug bgp nsap updates Displays debug messages for BGP NSAP prefix
update packets.
Syntax Description filter-list access-list-number (Optional) Displays debug messages for BGP NSAP
dampening events that match the access list. The
acceptable access list number range is from 1 to 199.
Command Default Debugging for BGP NSAP dampening events is not enabled.
12.2(33)SRB This command was integrated into Cisco IOS Release 12.2(33)SRB.
Cisco IOS XE 2.6 This command was integrated into Cisco IOS XE Release 2.6.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debug output, use the logging command options within global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Only one line of output is displayed unless thebgpdampening command is configured with a route map in
NSAP address family configuration mode. The following example shows output for the
debugbgpnsapdampeningcommand when a route map is configured:
20:07:19: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15
reuse/suppress 750/2000
20:07:19: BGP(4): flapped 1 times since 00:00:00. New penalty is 1000
20:08:59: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15
reuse/suppress 750/2000
20:08:59: BGP(4): flapped 2 times since 00:01:39. New penalty is 1928
20:10:04: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15
reuse/suppress 750/2000
20:10:04: BGP(4): flapped 3 times since 00:02:44. New penalty is 2839
20:10:48: BGP(4): suppress 49.0404 path 65202 65404 for 00:28:10 (penalty 2752)
20:10:48: halflife-time 15, reuse/suppress 750/2000
The table below describes the significant fields shown in the display.
Field Description
penalty Numerical value of 1000 assigned to a route by a
router configured for route dampening in another
autonomous system each time a route flaps. Penalties
are cumulative. The penalty for the route is stored in
the BGP routing table until the penalty exceeds the
suppress limit. If the penalty exceeds the suppress
limit, the route state changes from history to damp.
maximum suppress limit (not shown in sample output) Maximum amount of time a route is suppressed. The
default value is four times the half-life period.
Field Description
damp state (not shown in sample output) State in which the route has flapped so often that the
router will not advertise this route to BGP neighbors.
Related Commands
Command Description
debug bgp nsap Displays debug messages for BGP NSAP packets.
debug bgp nsap updates Displays debug messages for BGP NSAP update
events.
Command Default Debugging for BGP NSAP prefix update packets is not enabled.
12.2(33)SRB This command was integrated into Cisco IOS Release 12.2(33)SRB.
Cisco IOS XE 2.6 This command was integrated into Cisco IOS XE Release 2.6.
Usage Guidelines The debugbgpnsapupdatescommand is similar to the debugipbgpupdatescommand, except that it is specific
to the NSAP address family.
Use the ip-address argument to display the BGP update debug messages for a specific BGP neighbor. Use
the clns-filter-set-name argument to display the BGP update debug messages for a specific NSAP prefix.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debug output, use the logging command options within global configuration mode.
Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server.
Field Description
BGP(4): BGP debug for address family index (afi) 4.
route sourced locally (not shown in display) Indicates that a route is sourced locally and that
updates are not sent for the route.
rcv UPDATE (not shown in display) Indicates that an update message about a path to a
BGP peer has been received. Addresses include NSAP
prefix.
Related Commands
Command Description
debug bgp nsap Displays debug messages for BGP NSAP packets.
debug bgp nsap dampening Displays debug messages for BGP NSAP prefix
dampening events.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SXI This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines Use the debug bgp vpnv6 unicastcommand to help troubleshoot the BGP VPN.
Note By default, the network server sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options within global configuration
mode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslog
server. For complete information on debug commands and redirecting debugging output, refer to the Cisco
IOS Debug Command Reference, Release 12.4.
Examples The following example enables BGP debugging output for IPv6 VPN instances:
debug bri-interface
To display debugging information on ISDN BRI routing activity, use the debugbri-interface command in
privileged EXEC mode. To disable debugging output, use the noform of this command.
debug bri-interface
no debug bri-interface
Usage Guidelines Thedebugbri-interface command indicates whether the ISDN code is enabling and disabling the B channels
when attempting an outgoing call. This command is available for the low-end router products that have a
multi-BRI network interface module installed.
Caution Because the debugbri-interfacecommand generates a substantial amount of output, use it only when
traffic on the IP network is low, so other activity on the system is not adversely affected.
The following line indicates that an internal command was written to the interface controller. The subunit
identifies the first interface in the slot.
Related Commands
Command Description
debug isdn event Displays ISDN events occurring on the user side (on
the router) of the ISDN interface.
debug isdn q931 Displays information about call setup and teardown
of ISDN network connections (Layer 3) between the
local router (user side) and the network.
Usage Guidelines This command traces all interfaces configured with a bscprotocol-groupnumber command.
Related Commands
Command Description
debug bsc packet Displays all frames traveling through the Bisync
feature.
Usage Guidelines This command traces all interfaces configured with a bscprotocol-groupnumber command.
Related Commands
Command Description
debug bsc event Displays all events occurring in the Bisync feature.
Usage Guidelines When you enable the debugbstunevents command, messages showing connection establishment and other
overall status messages are displayed.
You can use thedebugbstuneventscommand to assist you in determining whether the BSTUN peers are
configured correctly and are communicating. For example, if you enable thedebugbstunpacketcommand
and you do not see any packets, you may want to enable event debugging.
Note Also refer to the debugbscpacketanddebugbscevent commands. Currently, these two commands support
the only protocol working through the BSTUN tunnel. Sometimes frames do not go through the tunnel
because they have been discarded at the Bisync protocol level.
Examples The following is sample output from the debugbstuneventscommand of keepalive messages working correctly.
If the routers are configured correctly, at least one router will show reply messages.
Note In a scenario where there is constantly loaded bidirectional traffic, you might not see keepalive messages
because they are sent only when the remote end has been silent for the keepalive period.
The following is sample output from the debugbstuneventsoutput of an event trace in which the wrong TCP
address has been specified for the remote peer. These are non-keepalive related messages.
Related Commands
Command Description
debug bsc event Displays all events occurring in the Bisync feature.
debug bsc packet Displays all frames traveling through the Bisync
feature.
Router# debug
bstun packet
BSTUN bsc-local-ack: 0:00:00 Serial2 SDI: Addr: 40 Data: 02C1C1C1C1C1C1C1C1C1
BSTUN bsc-local-ack: 0:00:00 Serial2 SDI: Addr: 40 Data: 02C1C1C1C1C1C1C1C1C1
BSTUN bsc-local-ack: 0:00:06 Serial2 NDI: Addr: 40 Data: 0227F5C31140C11D60C8
Related Commands
Command Description
debug bstun events Displays BSTUN connection events and status.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use this command to enable the display of error information for a bundle, such as reports of inconsistent
mapping in the bundle.
Related Commands
Command Description
bump Configures the bumping rules for a VC class that can
be assigned to a VC bundle.
debug bundle events Enables display of bundle events when use occurs.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use this command to enable the display of bundle events, such as occurrences of VC bumping, when bundles
were brought up, when they were taken down, and so forth.
Related Commands
Command Description
debug bstun packet Enables the display of information on bundle errors.
debug call-home diagnostic-signature {action | all | api | cli | download | event-registration | parsing}
no debug call-home diagnostic-signature {action | all | api | cli | download | event-registration | parsing}
Syntax Description action Displays debugging information associated with the execution of any call-home
diagnostic signature action defined in the diagnostic signature file.
all Displays debugging information about all flags associated with the call-home
diagnostic signature.
cli Displays debugging information associated with the call-home diagnostic signature
to run the CLI commands as part of the diagnostic signature actions.
Examples The following is sample output from the debug call-home diagnostic-signature action command:
.
.
.
The following is sample output from the debug call-home diagnostic-signature parsing command:
Related Commands
Command Description
call-home diagnostic-signature Downloads, installs, and uninstalls diagnostic
signature files on a device.
debug call-mgmt
To display debugging information for call accounting, including modem and time slot usage, for active and
recent calls, use the debugcall-mgmt command in privileged EXEC mode. To disable debugging output, use
the no form of this command.
debug call-mgmt
no debug call-mgmt
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following is sample output after the debugcall-mgmt command has been enabled:
Field Description
CPM_NEW_CALL_CSM_CONNECT Indicates the arrival of a new call.
access type CPM_INSERT_NEW_CALL, Indicates that the new call is an analog ISDN B
channel call (either a voice call or a call over an
call type CPM_ISDN_ANALOG:
analog modem), rather than a digital (V.110) call.
CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1 Indicates that the call is connected via the B channel
Mdm-Slot#1, Mdm-Port#3, TTY#219 on Serial7/17:1 to the asynchronous modem resource
1/03 (interface async1/03, also known as line tty219).
Dec 26 13:58:25.682: Call mgmt per minute statistics: Displays periodic statistics that give the allocation
state of each DSX1 interface present in the system,
active list length: 1
as well as the number of current (active) and recent
history list length: 3 (history) calls.
Dec 26 13:58:26.538: msg_to_calls_mgmt: msg type Indicates that the analog ISDN B channel call has
been disassociated from a modem.
CPM_VOICE_CALL_REJ_NO_MOD_ AVAIL
received
Field Description
access type CPM_REMOVE_DISC_CALL, Indicates that the analog ISDN B channel call has
been disconnected.
call type CPM_ISDN_ANALOG:
Removed a disconnected ISDN analog call
CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1 Indicates that the call has been disconnected via the
B channel on Serial7/17:1 to the asynchronous modem
Dec 26 13:58:26.538: Mdm-Slot#1, Mdm-Port#3,
resource 1/03 (interface async1/03, also known as
TTY#219
line tty219).
12.2(4)T This command was implemented on the Cisco 7200 series routers.
12.2(4)T3 This command was implemented on the Cisco 7500 series routers routers.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines Every time a call request is received, the debugcallfallbackdetail command displays in the command-line
interface (CLI) cache lookup and call acceptance/rejection information. Use this command to monitor call
requests as they enter the call fallback subsystem.
If you have a large amount of calls in your router, enabling this command can cause delays in your routing
functions as the debug statistics are constantly compiled and sent to your terminal. Also, debug messages on
your terminal may make for difficult CLI configuring.
Examples The following example depicts a call coming in to 10.1.1.4 with codec g729r8. Because there is no cache
entry for this destination, a probe is sent and values are inserted into the cache. A lookup is performed again,
entry is found, and a fallback decision is made to admit the call.
12.2(4)T This command was implemented on the Cisco 7200 series routers.
12.2(4)T3 This command was implemented on the Cisco 7500 series routers.
Usage Guidelines Every time a probe is received, the debugcallfallbackprobe command displays in the command-line interface
(CLI) network traffic information collected by the probe. Use this command to monitor the network traffic
information the probes carry as they enter the call fallback subsystem and log cache entries.
If you have frequent return of probes to your router, enabling this command can cause delays in your routing
functions as the debug statistics are constantly compiled and sent to your terminal. Also, debug messages on
your terminal may make for difficult CLI configuring.
Examples The following example depicts a call coming in to 10.1.1.4 and codec type g729r8. Because there is no cache
entry for this IP address, a g729r8 probe is initiated. The probe consists of 20 packet returns with an average
delay of 43 milliseconds. The "jitter out" is jitter from source to destination router and "jitter in" is jitter from
destination to source router. The delay, loss, and Calculated Planning Impairment Factor (ICPIF) values
following g113_calc_icpif are the instantaneous values, whereas those values following "New smoothed
values" are the values after applying the smoothing with weight 65.
2d19h:fb_initiate_probe:Probe payload is 32
2d19h:fb_main:NumOfRTT=20, RTTSum=120, loss=0, delay=43, jitter in=0, jitter out=0-> 10.1.1.4,
codec:g729r8
2d19h:g113_calc_icpif(delay (w/codec delay)=43, loss=0, expect_factor=10) Icpif=0
2d19h:fb_main:Probe timer expired, 10.1.1.4, codec:g729r8
2d19h:fb_main:NumOfRTT=20, RTTSum=120, loss=0, delay=43, jitter in=0, jitter out=0-> 10.1.1.4,
codec:g729r8
2d19h:g113_calc_icpif(delay (w/codec delay)=43, loss=0, expect_factor=10) Icpif=0
2d19h:fb_main:New smoothed values:inst_weight=65, ICPIF=0, Delay=43, Loss=0 -> 10.1.1.4,
codec:g729r8
Examples The following sample output from the debugcallfilterdetail command shows the detailed activity of the
GCFM, which is the internal module that controls the debug filtering.
Field Description
5d18h: gcfm_init_percall_matchlist: Shows that the filtering has been initiated.
5d18h: gcfm_call_enlist: tail is empty Shows the global unique identifier (GUID) for the
guid=C2E4C789-214A-11D4-804C-000A8A389BA8 call.
5d18h: gcfm_matchlist_percond_check: checked Shows that the call matched conditions in match list
result is 1 1.
Related Commands
Command Description
debug call filter inout Displays the debug trace inside the GCFM.
show call filter components Displays the components used for filtering calls.
Examples The following sample output from the debugcallfilterinout command shows the incoming and outgoing
activity of the GCFM, which is the internal module that controls the debug filtering.
Field Description
gcfm_generate_guid: Shows that a GUID has been generated.
Field Description
gcfm_percall_register: Shows that a component has been registered.
Related Commands
Command Description
debug call filter detail Displays the details of the debug trace inside the
GCFM.
show call filter components Displays the components used for filtering calls.
12.1(5)T This command was integrated into Cisco IOS Release 12.1(5)T.
12.2(11)T Support for the command was implemented in Cisco AS5850 images.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines It is highly recommended that you log the output from the debugcallrsvp-syncevents command to a buffer,
rather than sending the output to the console; otherwise, the size of the output could severely impact the
performance of the gateway.
Examples The following example shows a portion of sample output for a call initiating RSVP when using the
debugcallrsvp-syncevents command:
Related Commands
Command Description
call rsvp-sync Enables synchronization between RSVP and the
H.323 voice signaling protocol.
call rsvp-sync resv-timer Sets the timer for RSVP reservation setup.
debug call rsvp-sync func-trace Displays messages about the software functions called
by RSVP synchronization.
show call rsvp-sync stats Displays statistics for calls that attempted RSVP
reservation.
12.1(5)T This command was integrated into Cisco IOS Release 12.1(5)T.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines It is highly recommended that you log the output from the debugcallrsvp-syncfunc-trace command to a
buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact
the performance of the gateway.
Examples The following example shows a portion of sample output for a call initiating RSVP when using the
debugcallrsvp-syncfunc-trace command in conjunction with the debugcallrsvp-synceventscommand:
00:03:41: Parameters:localip:10.10.101.116
00:03:41: remoteip:10.10.101.117
00:03:41: QoSpcb :0x61FAFD18
00:03:41: Response Status :0
00:03:41: Entering Function hash_tbl_insert_entry
00:03:41: Entering Function hash_func
00:03:41: Handling QoS Primitive QoS Listen
00:03:41: Entering Function qos_dequeue_hash_port_entry
00:03:41: Entering Function qos_port_tbl_insert_entry
00:03:41: Entering Function hash_func
00:03:41: Doing RSVP Listen :rsvp_add_ip_listen_api()
Related Commands
Command Description
call rsvp-sync Enables synchronization between RSVP and the
H.323 voice signaling protocol.
call rsvp-sync resv-timer Sets the timer for RSVP reservation setup.
debug call rsvp-sync events Displays the events that occur during RSVP
synchronization.
show call rsvp-sync stats Displays statistics for calls that attempted RSVP
reservation.
Syntax Description module The module argument can be one of the following:
core --Traces the resource information.
detail --Traces for detail information.
12.2(4)T The command was integrated into Cisco IOS Release 12.2(4)T. Support for the
Cisco AS5300, Cisco AS5350, and Cisco AS5400 is not included in this release.
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T and implemented
on Cisco 7200 series routers.
12.2(11)T Support for this command was implemented on Cisco AS5850, Cisco AS5800,
Cisco AS5300, Cisco AS5350, and Cisco AS5400 series images.
Examples
The following is sample output from the debug call threshold core
command:
Router# debug call threshold core
RSCCAC Core info debugging is on
The following is sample output from the debugcallthresholddetail command:
12.2(4)T The command was integrated into Cisco IOS Release 12.2(4)T.
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T and
implemented on Cisco 7200 series routers.
12.2(11)T Support for this command was implemented on Cisco AS5850, Cisco AS5800,
Cisco AS5300, Cisco AS5350, and Cisco AS5400 series images.
Examples Debug actions are performed on calls by call treatment. The following sample output shows that call treatment
is turned on:
debug callback
To display callback events when the router is using a modem and a chat script to call back on a terminal line,
use the debugcallback command in privileged EXEC mode. To disable debugging output, use the noform
of this command.
debug callback
no debug callback
Usage Guidelines This command is useful for debugging chat scripts on PPP and AppleTalk Remote Access Protocol (ARAP)
lines that use callback mechanisms. The output provided by the debugcallback command shows you how
the call is progressing when used with the debugppp or debugarap commands.
Related Commands
Command Description
debug cable env Displays ARAP events.
debug capf-server
To collect debug information about the CAPF server, use the debugcapf-server command in privileged EXEC
mode. To disable collection of debug information, use the no form of this command.
12.4(9)T This command was integrated into Cisco IOS Release 12.4(9)T.
Usage Guidelines This command is used with Cisco Unified CallManager Express phone authentication.
Examples The following example shows debug messages for the CAPF server.
debug cas
To debug channel-associated signaling (CAS) messages and to debug the establishment of a time-division
multiplexing (TDM) connection between a DS0 and a digital modem, use the debugcas command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description slot slot number Slot and slot number. Valid values are 0 and 1.
port port number Port and port number. Valid values are 0 and 1.
12.2(2)T This command was integrated into Cisco IOS Release 12.2(2)T and support was
added for the Cisco 2600 series and Cisco 3600 series platforms.
12.3(1) This command was integrated into Cisco IOS Release 12.3(1) and support was
added for the Cisco 2600 XM series, Cisco 2691, and Cisco 3700 series
platforms.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines When the NM-xCE1T1PRI network module is used with an NM-xDM and a DS0-group is configured under
the controller, you can use the debugcas command to debug CAS signaling messages and the establishment
of a TDM connection between a DS0 and a digital modem. Use the debugcas command to identify and
troubleshoot call connection problems on a T1/E1 interface. With this command, you can trace the complete
sequence of incoming and outgoing calls.
Examples The following shows an example session to enable debugging CAS and generate troubleshooting output:
CAS debugging is on
Router#
debug-cas is on at slot(1) dsx1(0)
Router# show debug
CAS debugging is on
The following example shows output for the first outgoing call:
Router# p 1.1.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds:
*Mar 2 00:17:45: dsx1_alloc_cas_channel: channel 0 dsx1_timeslot
1(0/0): TX SEIZURE (ABCD=0001)(0/0): RX SEIZURE_ACK (ABCD=1101)(0/1):
RX_IDLE (ABCD=1001)(0/2): RX_IDLE (ABCD=1001)(0/3): RX_IDLE
(ABCD=1001)(0/4): RX_IDLE (ABCD=1001)(0/5): RX_IDLE (ABCD=1001)(0/6):
RX_IDLE (ABCD=1001)(0/7): RX_IDLE (ABCD=1001)(0/8): RX_IDLE
(ABCD=1001)(0/9): RX_IDLE (ABCD=1001)(0/10): RX_IDLE (ABCD=1001)(0/11):
RX_IDLE (ABCD=1001)(0/12): RX_IDLE (ABCD=1001)(0/13): RX_IDLE
(ABCD=1001)(0/14): RX_IDLE (ABCD=1001)(0/16): RX_IDLE (ABCD=1001)(0/17):
RX_IDLE (ABCD=1001)(0/18): RX_IDLE (ABCD=1001)(0/19): RX_IDLE
(ABCD=1001)(0/20): RX_IDLE (ABCD=1001)(0/21): RX_IDLE
(ABCD=1001).(0/22): RX_IDLE (ABCD=1001)(0/23): RX_IDLE
(ABCD=1001)(0/24): RX_IDLE (ABCD=1001)(0/25): RX_IDLE (ABCD=1001)(0/26):
RX_IDLE (ABCD=1001)(0/27): RX_IDLE (ABCD=1001)(0/28): RX_IDLE
(ABCD=1001)(0/29): RX_IDLE (ABCD=1001)(0/30): RX_IDLE
(ABCD=1001)...(0/0): RX ANSWERED (ABCD=0101).
Success rate is 0 percent (0/5)
Router#
*Mar 2 00:18:13.333: %LINK-3-UPDOWN: Interface Async94, changed state to up
*Mar 2 00:18:13.333: %DIALER-6-BIND: Interface As94 bound to profile Di1
*Mar 2 00:18:14.577: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async94, changed state
to up
Router# p 1.1.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 160/180/236 ms
The following example shows that the call is cleared on the router:
Router# p 1.1.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds:
*Mar 2 00:18:40: dsx1_alloc_cas_channel: channel 5 dsx1_timeslot
6(0/5): TX SEIZURE (ABCD=0001)(0/5): RX SEIZURE_ACK
(ABCD=1101)....(0/5): RX ANSWERED (ABCD=0101).
Success rate is 0 percent (0/5)
Router#
*Mar 2 00:19:08.841: %LINK-3-UPDOWN: Interface Async93, changed state to up
*Mar 2 00:19:08.841: %DIALER-6-BIND: Interface As93 bound to profile Di1
Router#
(0/5): TX IDLE (ABCD=1001)(0/5): RX IDLE (ABCD=1001)
*Mar 2 00:19:26.249: %LINK-5-CHANGED: Interface Async93, changed state to reset
*Mar 2 00:19:26.249: %DIALER-6-UNBIND: Interface As93 unbound from profile Di1
*Mar 2 00:19:27.249: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async93, changed state
to down
Router#
*Mar 2 00:19:31.249: %LINK-3-UPDOWN: Interface Async93, changed state to down
The following example shows an incoming CAS call:
Router#
(0/0): RX SEIZURE (ABCD=0001)
*Mar 2 00:22:40: dsx1_alloc_cas_channel: channel 0 dsx1_timeslot
1(0/0): TX SEIZURE_ACK (ABCD=1101)(0/0): TX ANSWERED (ABCD=0101)
Router#
*Mar 2 00:23:06.249: %LINK-3-UPDOWN: Interface Async83, changed state to up
*Mar 2 00:23:06.249: %DIALER-6-BIND: Interface As83 bound to profile Di1
*Mar 2 00:23:07.653: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async83, changed state
to up
Related Commands
Command Description
show debug Displays information about the types of debugging
that are enabled for your router.
Command Default Debugging for ATM Adaptation Layer type 2 (AAL2) sessions is not enabled.
12.2(2)T Support for this command was implemented on the Cisco 7200 series
routers.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use this command when troubleshooting an AAL2 trunk setup or teardown problem.
Examples The following example shows sample output from the debugccaal2sessioncommand for a forced shutdown
of a voice port:
The following example shows sample output from the debugccaal2sessioncommand for a trunk setup on a
voice port:
Related Commands
Command Description
show debug Shows which debug commands are enabled.
Command Default No debugging information is generated for the the CCE DP URL Filtering Classification module.
12.4(20)T This command was integrated into Cisco IOS Release 12.4(20)T.
Examples The following is sample output from the debugccedpnamed-dburlfiltercommand at the time that a URL
request to the untrusted domain www.example.com was made:
12.0(4)T This command was integrated into Cisco IOS Release 12.0(4)T.
12.0(7)XK This command was first supported on the Cisco MC3810 series.
12.1(2)T Support for this command was implemented in Cisco MC3810 images.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use this command to display debug information about the various FRF.11 VoFR service provider interface
(SPI) functions. Note that this debug command does not display any information regarding the proprietary
Cisco switched-VoFR SPI.
This debug is useful only when the session protocol is "frf11-trunk."
Related Commands
Command Description
debug call rsvp-sync events Displays the ccswvoice function calls during call
setup and teardown.
debug ccswvoice vofr-session Displays the ccswvoice function calls during call
setup and teardown.
debug cch323
To provide debugging output for various components within the H.323 subsystem, use the
debugcch323commandinprivilegedEXECmode.To disable debugging output, use the noform of this
command.
debug cch323 {all| error| h225| h245| nxe| ras| rawmsg| session}
no debug cch323
Release Modification
12.2(4)T The following keywords were introduced: all, error, rawmsg, and session. The
nxe keyword was integrated into Cisco IOS Release 12.2(4)T on all Cisco
H.323 platforms. This command does not support the Cisco access server
platforms in this release.
Usage Guidelines The debug cch323 Command with the all Keyword
When used with the debugcch323 command, the all keyword provides debug output for various components
within the H.323 subsystem.
The debugcch323 command used with the all keyword enables the following debugcch323 commands:
Caution Using the debugcch323all command could slow your system and flood the TTY if there is significant
call traffic.
Note There is little or no output from this command when there is a stable H.323 network.
H225_IDLE--This is the initial state of the H.225 state machine. The H.225 state machine is in this state
before issuing a call setup request (for the outbound IP call case) or when ready to receive an incoming
IP call.
H225_SETUP--This is the call setup state. The state machine changes to this state after sending out a
call setup request or after receiving an incoming call indication.
H225_ALERT--This is the call alerting state. The state machine changes to this state after sending the
alerting message or after receiving an alerting message from the peer.
H225_CALLPROC--This is the call proceeding state.
H225_ACTIVE--This is the call connected state. In this state, the call is active. The state machine changes
to this state after sending the connect message to the peer or after receiving the connect message from
the peer.
H225_WAIT_FOR_ARQ--This is the state in which the H.225 state machine is waiting for the completion
of the Admission Request (ARQ) process from the RAS state machine.
H225_WAIT_FOR_DRQ--This is the state in which the H.225 state machine is waiting for the completion
of the Disengage Request (DRQ) process from the RAS state machine.
H225_WAIT_FOR_H245--This is the state in which the H.225 state machine is waiting for the success
or failure from the H.245 state machine.
The definitions of the different events of the H.225 state machine follow:
H225_EVENT_NONE--There is no event.
H225_EVENT_ALERT--This event instructs the H.225 state machine to send an alert message to the
peer.
H225_EVENT_ALERT_IND--This event indicates to the H.225 state machine that an alert message
arrived from the peer.
H225_EVENT_CALLPROC--This event instructs the H.225 state machine to send a call proceeding
message to the peer.
H225_EVENT_CALLPROC_IND--This event indicates to the H.225 state machine that a call proceeding
message has been received from the peer.
H225_EVENT_REJECT--This event instructs the H.225 state machine to reject the call setup request
from the peer.
H225_EVENT_REJECT_IND--This event indicates to the H.225 state machine that a call setup request
to the peer has been rejected.
H225_EVENT_RELEASE--This event instructs the H.225 state machine to send a release complete
message to the peer.
H225_EVENT_RELEASE_IND--This event indicates to the H.225 state machine that a release complete
message has been received from the peer.
H225_EVENT_SETUP--This event instructs the H.225 state machine to send a setup message to the
peer.
H225_EVENT_SETUP_IND--This event indicates to the H.225 state machine that a setup message has
been received from the peer.
H225_EVENT_SETUP_CFM--This event instructs the H.225 state machine to send a connect message
to the peer.
H225_EVENT_SETUP_CFM_IND--This event indicates to the H.225 state machine that a connect
message arrived from the peer.
H225_EVENT_RAS_SUCCESS--This event indicates to the H.225 state machine that the pending RAS
operation succeeded.
H225_EVENT_RAS_FAILED--This event indicates to the H.225 state machine that the pending RAS
operation failed.
H225_EVENT_H245_SUCCESS--This event indicates to the H.225 state machine that the pending
H.245 operation succeeded.
H225_EVENT_H245_FAILED--This event indicates to the H.225 state machine that the pending H.245
operation failed.
The definitions of the different events of the RAS state machine follow:
CCH323_RAS_EVENT_NONE--Nothing.
CCH323_RAS_EVENT_GWUP--Gateway is coming up.
CCH323_RAS_EVENT_GWDWN--Gateway is going down.
CCH323_RAS_EVENT_NEWCALL--New call.
CCH323_RAS_EVENT_CALLDISC--Call disconnect.
CCH323_RAS_EVENT_GCF--Received Gatekeeper Confirmation (GCF).
CCH323_RAS_EVENT_GRJ--Received Gatekeeper Rejection (GRJ).
Caution Using the debugcch323 command with the rawmsg keyword could slow your system and flood the TTY
if there is significant call traffic.
Caution Using the debugcch323session command could slow your system and flood the TTY if there is significant
call traffic.
Examples
Examples The debugcch323all command and keyword combination provides output for the following keywords: error,
h225, h245, nxe, ras, rawmsg, and session. Examples of output for each keyword follow.
Examples The following is sample output from a typical debugcch323error request on a Cisco 3640 router:
Examples The following is sample output from a typical debugcch323h225 request on a Cisco 3640 router:
Field Description
H225_EVENT_SETUP This event instructs the H.225 state machine to send
a setup message to the peer.
Field Description
H225_EVENT_H425_SUCCESS This event indicates to the H.225 state machine that
the pending H.245 operation succeeded.
Examples The following is sample output from a typical debugcch323h245 request on a Cisco 3640 router:
H245_OLC_WAIT
20:58:23:changing from H245_OLC_WAIT state to H245_OLC_DONE state
The table below describes the significant fields shown in the display.
Field Description
H245_EVENT_MSD Send MSD event message to the state machine.
H245 CAP FSM This is the H245 terminal CAP finite state machine.
M_H245_MS_DETERMINE _INDICATION The MSD message that has been received by an H245
terminal from a remote H323 endpoint.
Field Description
H245_OLC_NONE The initial state of the OLC state machine.
H245 OLC FSM The OLC finite state machine of the H245 terminal.
Examples The following is sample output from a typical debugcch323ras request on a Cisco 3640 router:
Field Description
CCH323_RAS_EVENT_SEND_RRQ Send RRQ event message.
Field Description
CCH323_RAS_STATE_ACTIVE The per-call state machine is in the call active state.
Examples The following is sample output from a typical debugcch323rawmsg request on a Cisco 3640 router:
Examples Following are two examples of output using the debugcch323session command and keyword combination.
The first example is for a call setup on an originating gateway. The second example is for a call setup on a
terminating gateway.
The following is sample output from a typical debugcch323session request for a call setup on an originating
gateway:
Related Commands
Command Description
clear h323 gateway Clears the H.323 gateway counters.
debug voip rawmsg Displays the raw message owner, length, and pointer.
show h323 gateway Displays statistics for H.323 gateway messages that
have been sent and received and displays the reasons
for which H.323 calls have been disconnected.
Usage Guidelines Use the debugcch323capacity command to track the maximum and current call capacity values in the
Registration, Admission, and Status (RAS) Protocol messages and to debug capacity-related problems while
sending RAS messages. This command is entered on the gateway to monitor the call capacity of the gatekeeper.
The command lists the values for current and maximum call capacity provided by the trunk group capacity
resource manager if and when the H.323 Service Provider Interface (SPI) requests the information for all or
specific groups of circuits.
Field Description
Registered Gateway registration:
0=Gateway is not registered to the gatekeeper
1=Gateway is registered to the gatekeeper at the
time of the change
The gatekeeper displays this output whenever call capacity information is sent to the gatekeeper.
Field Description
GroupID The circuits carrier identification (ID) or trunk group
label.
Field Description
Active Voice Calls(In) Current number of active incoming voice and data
calls.
Active Voice Calls(Out) Current number of active outgoing voice and data
calls.
Max. Voice Calls(to GK) Maximum call capacity value to be sent to the
gatekeeper in the RAS message.
Avail. Voice Calls(to GK) Available call capacity value to be sent to the
gatekeeper in the RAS message.
Related Commands
Command Description
endpoint circuit-id h323id Associates a carrier with a non-Cisco endpoint.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T.
H225_WAIT_FOR_DRQ--This is the state where the H.225 state machine is waiting for the completion
of the DRQ process from the RAS state machine.
H225_WAIT_FOR_H245--This is the state where the H.225 state machine is waiting for the success or
failure from the H.245 state machine.
Events Description
The event definitions of the different events of the H.225 state machine are as follows:
H225_EVENT_NONE-- No event.
H225_EVENT_ALERT--This event indicates the H.225 state machine to send an alerting message to
the peer.
H225_EVENT_ALERT_IND--This event indicates the H.225 state machine that an alerting message
is received from the peer.
H225_EVENT_CALLPROC--This event indicates the H.225 state machine to send a call proceeding
message to the peer.
H225_EVENT_CALLPROC_IND--This event indicates the H.225 state machine that a call proceeding
message is received from the peer.
H225_EVENT_REJECT--This event indicates the H.225 state machine to reject the call setup request
from the peer.
H225_EVENT_REJECT_IND--This event indicates the H.225 state machine that a call setup request
to the peer is rejected.
H225_EVENT_RELEASE--This event indicates the H.225 state machine to send a release complete
message to the peer.
H225_EVENT_RELEASE_IND--This event indicates the H.225 state machine that a release complete
message is received from the peer.
H225_EVENT_SETUP--This event indicates the H.225 state machine to send a setup message to the
peer.
H225_EVENT_SETUP_IND--This event indicates the H.225 state machine that a setup message is
received from the peer.
H225_EVENT_SETUP_CFM--This event indicates the H.225 state machine to send a connect message
to the peer.
H225_EVENT_SETUP_CFM_IND--This event indicates the H.225 state machine that a connect message
from the peer.
H225_EVENT_RAS_SUCCESS--This event indicates the H.225 state machine that the pending RAS
operation is successful.
H225_EVENT_RAS_FAILED--This event indicates the H.225 state machine that the pending RAS
operation failed.
H225_EVENT_H245_SUCCESS--This event indicates the H.225 state machine that the pending H.245
operation is successful.
H225_EVENT_H245_FAILED--This event indicates the H.225 state machine that the pending H.245
operation failed.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines The H.245 state machines include the following three state machines:
Master SlaveDetermination (MSD) state machine
Capability Exchange (CAP) state machine
Open Logical Channel (OLC) state machine
State Definitions
The definitions are as follows:
H245_MS_NONE-- This is the initial state of the master slave determination state machine.
H245_MS_WAIT--In this state, a Master Slave Determination message is sent, waiting for the reply.
H245_MS_DONE-- The result is in.
H245_CAP_NONE--This is the initial state of the capabilities exchange state machine.
H245_CAP_WAIT--In this state, a cap exchange message is sent, waiting for reply.
H245_CAP_DONE--The result is in.
H245_OLC_NONE--This is the initial state of the open logical channel state machine.
Event definitions
H245_EVENT_MSD--Send MSD message
H245_EVENT_MS_CFM--Send MSD acknowledge message
H245_EVENT_MS_REJ--Send MSD reject message
H245_EVENT_MS_IND-- Received MSD message
H245_EVENT_CAP--Send CAP message
H245_EVENT_CAP_CFM--Send CAP acknowledge message
H245_EVENT_CAP_REJ--Send CAP reject
H245_EVENT_CAP_IND--Received CAP message
H245_EVENT_OLC--Send OLC message
H245_EVENT_OLC_CFM--Send OLC acknowledge message
H245_EVENT_OLC_REJ--Send OLC reject message
H245_EVENT_OLC_IND--Received OLC message
Field Description
Request Request Type--0 for preauthentication, 1 for
disconnect.
EndPt Type Call Origin End Point Type--1 for IP address, 2 for
IZCT value.
Call_origin Answer.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines RAS operates in two state machines. One global state machine controls the overall RAS operation of the
Gateway. The other state machine is a per call state machine that controls the active calls.
State definitions
The state definitions of the different states of the RAS state machine follow:
CCH323_RAS_STATE_NONE--This is the initial state of the RAS state machine.
CCH323_RAS_STATE_GRQ--The state machine is in the Gatekeeper Request (GRQ) state. In this
state, the gateway is in the process of discovering a gatekeeper.
CCH323_RAS_STATE_RRQ--The state machine is in the Registration Request (RRQ) state. In this
state, the gateway is in the process of registering with a gatekeeper.
CCH323_RAS_STATE_IDLE--The global state machine is in the idle state.
CCH323_RAS_STATE_URQ--The state machine is in the Unregistration Request (URQ) state. In this
state, the gateway is in the process of unregistering with a gatekeeper.
CCH323_RAS_STATE_ARQ--The per call state machine is in the process of admitting a new call.
CCH323_RAS_STATE_ACTIVE--The per call state machine is in the call active state.
Event Definitions
These are the event definitions of the different states of the RAS state machine:
CCH323_RAS_EVENT_NONE--Nothing.
CCH323_RAS_EVENT_GWUP--Gateway is coming up.
CCH323_RAS_EVENT_GWDWN--Gateway is going down.
CCH323_RAS_EVENT_NEWCALL--New call.
CCH323_RAS_EVENT_CALLDISC--Call disconnect.
CCH323_RAS_EVENT_GCF--Received Gatekeeper Confirmation (GCF).
CCH323_RAS_EVENT_GRJ--Received Gatekeeper Rejection (GRJ).
CCH323_RAS_EVENT_ACF--Received Admission Confirmation (ACF).
CCH323_RAS_EVENT_ARJ--Received Admission Rejection (ARJ).
CCH323_RAS_EVENT_SEND_RRQ--Send Registration Request (RRQ).
CCH323_RAS_EVENT_RCF--Received Registration Confirmation (RCF).
CCH323_RAS_EVENT_RRJ--Received Registration Rejection (RRJ).
CCH323_RAS_EVENT_SEND_URQ--Send URQ.
CCH323_RAS_EVENT_URQ--Received URQ.
CCH323_RAS_EVENT_UCF--Received Unregister Confirmation (UCF).
CCH323_RAS_EVENT_SEND_UCF--Send Unregister Confirmation (UCF).
CCH323_RAS_EVENT_URJ--Received Unregister Reject (URJ).
CCH323_RAS_EVENT_BCF--Received Bandwidth Confirm (BCF).
CCH323_RAS_EVENT_BRJ--Received Bandwidth Rejection (BRJ).
CCH323_RAS_EVENT_DRQ--Received Disengage Request (DRQ).
CCH323_RAS_EVENT_DCF--Received Disengage Confirm (DCF).
CCH323_RAS_EVENT_SEND_DCF--Send Disengage Confirm (DCF).
CCH323_RAS_EVENT_DRJ--Received Disengage Reject (DRJ).
CCH323_RAS_EVENT_IRQ--Received Interrupt Request (IRQ).
CCH323_RAS_EVENT_IRR--Send Information Request (IRR).
CCH323_RAS_EVENT_TIMEOUT--Message timeout.
12.4(9)T This command was integrated into Cisco IOS Release 12.4(9)T.
Usage Guidelines Use this command to enable a debugging trace for the video component in an H.323 network.
Examples
Examples The following is sample output of the debugging log for an originating Cisco Unified CallManager Express
(Cisco Unified CME) gateway after the debugcch323video command was enabled:
Examples The following is sample output of the debugging log for a terminating Cisco Unified Survivable Remote Site
Telephony (Cisco Unified SRST) gateway after the debugcch323video command was enabled:
Related Commands
Command Description
debug ephone video Sets video debugging for the Cisco Unified IP phone.
show call active video Displays call information for SCCP video calls in
progress.
show call history video Displays call history information for SCCP video
calls.
debug ccm-manager
To display debugging information about Cisco CallManager, use the debugccm-manager command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccm-manager {backhaul {errors| events| packets}| config-download {all| errors| events| packets|
tone| xml}| errors| events| music-on-hold {errors| events| packets}| packets}
no debug ccm-manager
12.2(2)XA This command was implemented on Cisco 2600 series and Cisco 3600 series
routers.
12.2(2)XN Support for enhanced MGCP voice gateway interoperability was added to Cisco
CallManager Version 3.1 for the Cisco 2600 series, Cisco 3600 series, and Cisco
VG200.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T and implemented
on the Cisco IAD2420 series.
12.2(15)XJ The tone keyword was added for the following platforms: Cisco 2610XM, Cisco
611XM, Cisco 2620XM, Cisco 2621XM, Cisco 2650XM, Cisco 2651XM, Cisco
2691, Cisco 3640A, Cisco 3660, Cisco 3725, and Cisco 3745.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support in
a specific 12.2SX release of this train depends on your feature set, platform, and
platform hardware.
Field Description
nn :nn :nn : Timestamp time in hours (military format), minutes,
and seconds that indicates when the Cisco
CallManager event occurred.
cmapp_ error message: The Cisco CallManager routine in which the error
event occurred.
Related Commands
Command Description
show ccm-manager Displays a list of Cisco CallManager servers, their
current status, and their availability.
12.2(2)XA Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.
12.2(2)XB1 This command was implemented on the Cisco AS5850 universal gateway.
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T and implemented
on Cisco 7200 series routers.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T. Support for
the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and
Cisco AS5850 universal gateway is not included in this release.
Usage Guidelines The debugccsipall command enables the following SIP debug commands:
debug ccsip events
debug ccsip error
debug ccsip states
debug ccsip messages
debug ccsip calls
Examples The following example displays debug output from one side of the call:
Content-Length: 137
v=0
o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20038 RTP/AVP 0
*Mar 6 14:10:42: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060
*Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_recdproc_new_message
*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse
*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description
*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sip_stats_status_code
*Mar 6 14:10:42: Roundtrip delay 8 milliseconds for method INVITE
*Mar 6 14:10:42: HandleSIP1xxRinging: SDP MediaTypes negotiation successful!
Negotiated Codec : g711ulaw , bytes :160
Inband Alerting : 0
*Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_RECD_PROCEEDING,
SUBSTATE_PROCEEDING_PROCEEDING) to (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_ALERTING)
*Mar 6 14:10:46: Received:
SIP/2.0 200 OK
Via: SIP/2.0/UDP 166.34.245.230:54113
From: "3660110" <sip:3660110@166.34.245.230>
To: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27D3FCA8-C7F
Date: Mon, 08 Mar 1993 22:36:40 GMT
Call-ID: ABBAE7AF-823100CE-0-1CCAA69C@172.18.192.194
Timestamp: 731427042
Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Contact: <sip:3660210@166.34.245.231:5060;user=phone>
CSeq: 101 INVITE
Content-Type: application/sdp
Content-Length: 137
v=0
o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20038 RTP/AVP 0
*Mar 6 14:10:46: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: act_recdproc_new_message
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPICheckResponse
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sip_stats_status_code
*Mar 6 14:10:46: Roundtrip delay 3536 milliseconds for method INVITE
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: act_recdproc_new_message: SDP MediaTypes negotiation
successful!
Negotiated Codec : g711ulaw , bytes :160
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPIReconnectConnection
*Mar 6 14:10:46: Queued event from SIP SPI : SIPSPI_EV_RECONNECT_CONNECTION
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: recv_200_OK_for_invite
*Mar 6 14:10:46: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sip_stats_method
*Mar 6 14:10:46: 0x624CFEF8 : State change from (STATE_RECD_PROCEEDING,
SUBSTATE_PROCEEDING_ALERTING) to (STATE_ACTIVE, SUBSTATE_NONE)
*Mar 6 14:10:46: The Call Setup Information is :
Call Control Block (CCB) : 0x624CFEF8
State of The Call : STATE_ACTIVE
TCP Sockets Used : NO
Calling Number : 3660110
Called Number : 3660210
Negotiated Codec : g711ulaw
Source IP Address (Media): 166.34.245.230
Source IP Port (Media): 20208
Destn IP Address (Media): 166.34.245.231
Destn IP Port (Media): 20038
Destn SIP Addr (Control) : 166.34.245.231
Destn SIP Port (Control) : 5060
Destination Name : 166.34.245.231
*Mar 6 14:10:46: HandleUdpReconnection: Udp socket connected for fd: 1 with
166.34.245.231:5060
*Mar 6 14:10:46: Sent:
ACK sip:3660210@166.34.245.231:5060;user=phone SIP/2.0
Via: SIP/2.0/UDP 166.34.245.230:54113
From: "3660110" <sip:3660110@166.34.245.230>
To: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27D3FCA8-C7F
Date: Sat, 06 Mar 1993 19:10:42 GMT
Call-ID: ABBAE7AF-823100CE-0-1CCAA69C@172.18.192.194
Max-Forwards: 6
Content-Type: application/sdp
Content-Length: 137
CSeq: 101 ACK
v=0
o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20208 RTP/AVP 0
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: ccsip_caps_ind
*Mar 6 14:10:46: ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160
*Mar 6 14:10:46: ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE
*Mar 6 14:10:46: CCSIP-SPI-CONTROL: ccsip_caps_ack
*Mar 6 14:10:50: Received:
BYE sip:3660110@166.34.245.230:5060;user=phone SIP/2.0
Via: SIP/2.0/UDP 166.34.245.231:54835
From: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27D3FCA8-C7F
To: "3660110" <sip:3660110@166.34.245.230>
Date: Mon, 08 Mar 1993 22:36:44 GMT
Call-ID: ABBAE7AF-823100CE-0-1CCAA69C@172.18.192.194
User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Max-Forwards: 6
Timestamp: 731612207
CSeq: 101 BYE
Content-Length: 0
*Mar 6 14:10:50: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:54835
*Mar 6 14:10:50: CCSIP-SPI-CONTROL: act_active_new_message
*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sact_active_new_message_request
*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sip_stats_method
*Mar 6 14:10:50: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE
*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sip_stats_status_code
*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sipSPIInitiateCallDisconnect : Initiate call
disconnect(16) for outgoing call
*Mar 6 14:10:50: 0x624CFEF8 : State change from (STATE_ACTIVE, SUBSTATE_NONE) to
(STATE_DISCONNECTING, SUBSTATE_NONE)
*Mar 6 14:10:50: Sent:
SIP/2.0 200 OK
Via: SIP/2.0/UDP 166.34.245.231:54835
From: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27D3FCA8-C7F
To: "3660110" <sip:3660110@166.34.245.230>
Date: Sat, 06 Mar 1993 19:10:50 GMT
Call-ID: ABBAE7AF-823100CE-0-1CCAA69C@172.18.192.194
Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Timestamp: 731612207
Content-Length: 0
CSeq: 101 BYE
*Mar 6 14:10:50: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_DISCONNECT
*Mar 6 14:10:50: CCSIP-SPI-CONTROL: act_disconnecting_disconnect
*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sipSPICallCleanup
*Mar 6 14:10:50: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTION
*Mar 6 14:10:50: CLOSE CONNECTION TO CONNID:1
*Mar 6 14:10:50: sipSPIIcpifUpdate :CallState: 4 Playout: 1755 DiscTime:48305031 ConnTime
48304651
*Mar 6 14:10:50: 0x624CFEF8 : State change from (STATE_DISCONNECTING, SUBSTATE_NONE) to
(STATE_DEAD, SUBSTATE_NONE)
*Mar 6 14:10:50: The Call Setup Information is :
Call Control Block (CCB) : 0x624CFEF8
State of The Call : STATE_DEAD
TCP Sockets Used : NO
Calling Number : 3660110
Called Number : 3660210
Negotiated Codec : g711ulaw
Source IP Address (Media): 166.34.245.230
Source IP Port (Media): 20208
Destn IP Address (Media): 166.34.245.231
Destn IP Port (Media): 20038
Destn SIP Addr (Control) : 166.34.245.231
Destn SIP Port (Control) : 5060
Destination Name : 166.34.245.231
*Mar 6 14:10:50:
Disconnect Cause (CC) : 16
Disconnect Cause (SIP) : 200
*Mar 6 14:10:50: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port:
5060
The following example displays debut output from the other side of the call:
Related Commands
Command Description
debug ccsip calls Shows all SIP SPI call tracing.
12.2(2)XA Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.
12.2(2)XB1 This command was introduced on the Cisco AS5850 universal gateway.
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T and implemented
on Cisco 7200 series routers.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T. Support for
the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and
Cisco AS5850 universal gateway is not included in this release.
Usage Guidelines This command traces the SIP call details as they are updated in the SIP call control block.
Examples The following example displays debug output from one side of the call:
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
Command Description
debug ccsip info Shows all SIP SPI message tracing.
Usage Guidelines The debug ccsip dhcp command can be enabled by executing the command itself or by issuing the debug
ccsip all command.
Examples The following example displays debug output from the debug ccsip dhcp command:
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging
12.2(2)XA Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.
12.2(2)XB1 This command was implemented on the Cisco AS5850 universal gateway.
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T and implemented
on Cisco 7200 series routers.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T. Support for
the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and
Cisco AS5850 universal gateway is not included in this release.
Usage Guidelines This command traces all error messages generated from errors encountered by the SIP subsystem.
Examples The following example displays debug output from one side of the call:
Router1#
debug ccsip error
SIP Call error tracing is enabled
Router1#
*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_call_setup
*Mar 6 14:16:41: act_idle_call_setup:Not using Voice Class Codec
*Mar 6 14:16:41: act_idle_call_setup: preferred_codec set[0] type :g711ulaw bytes: 160
*Mar 6 14:16:41: REQUEST CONNECTION TO IP:166.34.245.231 PORT:5060
*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_connection_created
*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_connection_created: Connid(1) created to
166.34.245.231:5060, local_port 55674
*Mar 6 14:16:41: sipSPIAddLocalContact
*Mar 6 14:16:41: CCSIP-SPI-CONTROL: sip_stats_method
*Mar 6 14:16:41: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060
*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_sentinvite_new_message
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
12.2(2)XA Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.
12.2(2)XB1 This command was introduced on the Cisco AS5850 universal gateway.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T.
12.2(15)T Much of the information formerly found in the output of the debugccsipevents
command is now reported in the output of the debugccsipinfo and
debugccsipmediacommands. The debugccsipeventscommand now displays
only the debugging information specifically related to SIP events.
Usage Guidelines This command previously traced all events posted to Session Initiation Protocol (SIP) SPI from all interfaces
and also provided general SIP SPI information. Beginning with Cisco IOS Release 12.2(15)T, the
debugccsipevents command displays only debugging information specifically related to SIP SPI events.
Media stream and SIP SPI information is now reported in the debugccsipmediaand debugccsipinfo command
output.
Examples The following is sample output from the debugccsipeventscommand for a Cisco 3660:
Router#
Nov 15 18:20:25.779: Queued event from SIP SPI : SIPSPI_EV_CC_CALL_SETUP
Nov 15 18:20:25.779: Queued event from SIP SPI : SIPSPI_EV_CREATE_CONNECTION
Nov 15 18:20:25.783: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE
Nov 15 18:20:25.815: Queued event from SIP SPI : SIPSPI_EV_CREATE_CONNECTION
Nov 15 18:20:25.819: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE
Nov 15 18:20:28.339: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTION
Nov 15 18:20:28.339: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE
Nov 15 18:20:50.844: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTION
Nov 15 18:20:50.844: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE
Nov 15 18:20:50.848: Queued event from SIP SPI : SIPSPI_EV_CC_CALL_DISCONNECT
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
Usage Guidelines Beginning in Cisco IOS Release 12.2(15)T, the debugccsipinfocommand is a separate option that displays
general SIP SPI information for debug purposes. In past releases, this output was part of the
debugccsipeventscommand.
Examples The following is sample output from the debugccsipinfocommand for a Cisco 3660:
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
debug ccsip events Enables tracing of events that are specific to SIP SPI.
Usage Guidelines Beginning in Cisco IOS Release 12.2(15)T, the debugccsipmediacommand is a separate option that displays
debugging information specific to SIP media stream processing. In past releases, this output was part of the
debugccsipeventscommand.
Examples The following is sample output from the debugccsipmediacommand for a Cisco 3660:
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
debug ccsip events Enables tracing of events that are specific to SIP SPI.
12.2(2)XA Support was added for the Cisco AS5350 and Cisco AS5400 universal
gateways.
12.2(2)XB1 This command was implemented on the Cisco AS5850 universal gateway.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T. Support for
the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and
Cisco AS5850 universal gateway is not included in this release.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
IOS Release XE 2.5 This command was integrated into Cisco IOS XE Release 2.5.
Usage Guidelines This command traces the Session Initiation Protocol (SIP) messages exchanged between the SIP UA client
(UAC) and the access server.
Examples The following example shows debug output from one side of the call:
Router1#
debug ccsip messages
SIP Call messages tracing is enabled
Router1#
*Mar 6 14:19:14: Sent:
INVITE sip:3660210@166.34.245.231;user=phone;phone-context=unknown SIP/2.0
Via: SIP/2.0/UDP 166.34.245.230:55820
From: "3660110" <sip:3660110@166.34.245.230>
To: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>
Date: Sat, 06 Mar 1993 19:19:14 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
Cisco-Guid: 2881152943-2184249568-0-483551624
User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
CSeq: 101 INVITE
Max-Forwards: 6
Timestamp: 731427554
Contact: <sip:3660110@166.34.245.230:5060;user=phone>
Expires: 180
Content-Type: application/sdp
Content-Length: 138
v=0
o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20762 RTP/AVP 0
*Mar 6 14:19:14: Received:
SIP/2.0 100 Trying
Via: SIP/2.0/UDP 166.34.245.230:55820
From: "3660110" <sip:3660110@166.34.245.230>
To: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>
Date: Mon, 08 Mar 1993 22:45:12 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
Timestamp: 731427554
Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
CSeq: 101 INVITE
Content-Length: 0
*Mar 6 14:19:14: Received:
SIP/2.0 180 Ringing
Via: SIP/2.0/UDP 166.34.245.230:55820
From: "3660110" <sip:3660110@166.34.245.230>
To: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>
Date: Mon, 08 Mar 1993 22:45:12 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
Timestamp: 731427554
Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
CSeq: 101 INVITE
Content-Type: application/sdp
Content-Length: 138
v=0
o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20224 RTP/AVP 0
*Mar 6 14:19:16: Received:
SIP/2.0 200 OK
Via: SIP/2.0/UDP 166.34.245.230:55820
From: "3660110" <sip:3660110@166.34.245.230>
To: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27DBC6D8-1357
Date: Mon, 08 Mar 1993 22:45:12 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
Timestamp: 731427554
Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Contact: <sip:3660210@166.34.245.231:5060;user=phone>
CSeq: 101 INVITE
Content-Type: application/sdp
Content-Length: 138
v=0
o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231
s=SIP Call
t=0 0
c=IN IP4 166.34.245.231
m=audio 20224 RTP/AVP 0
*Mar 6 14:19:16: Sent:
ACK sip:3660210@166.34.245.231:5060;user=phone SIP/2.0
Via: SIP/2.0/UDP 166.34.245.230:55820
From: "3660110" <sip:3660110@166.34.245.230>
To: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27DBC6D8-1357
Date: Sat, 06 Mar 1993 19:19:14 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
Max-Forwards: 6
Content-Type: application/sdp
Content-Length: 138
CSeq: 101 ACK
v=0
o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230
s=SIP Call
t=0 0
c=IN IP4 166.34.245.230
m=audio 20762 RTP/AVP 0
*Mar 6 14:19:19: Received:
BYE sip:3660110@166.34.245.230:5060;user=phone SIP/2.0
Via: SIP/2.0/UDP 166.34.245.231:53600
From: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27DBC6D8-1357
To: "3660110" <sip:3660110@166.34.245.230>
Date: Mon, 08 Mar 1993 22:45:14 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Max-Forwards: 6
Timestamp: 731612717
CSeq: 101 BYE
Content-Length: 0
*Mar 6 14:19:19: Sent:
SIP/2.0 200 OK
Via: SIP/2.0/UDP 166.34.245.231:53600
From: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27DBC6D8-1357
To: "3660110" <sip:3660110@166.34.245.230>
Date: Sat, 06 Mar 1993 19:19:19 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Timestamp: 731612717
Content-Length: 0
CSeq: 101 BYE
The following example show debug output from the other side of the call:
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Max-Forwards: 6
Timestamp: 731612717
CSeq: 101 BYE
Content-Length: 0
*Mar 8 17:45:17: Received:
SIP/2.0 200 OK
Via: SIP/2.0/UDP 166.34.245.231:53600
From: <sip:3660210@166.34.245.231;user=phone;phone-context=unknown>;tag=27DBC6D8-1357
To: "3660110" <sip:3660110@166.34.245.230>
Date: Sat, 06 Mar 1993 19:19:19 GMT
Call-ID: ABBAE7AF-823100E2-0-1CD274BC@172.18.192.194
Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabled
Timestamp: 731612717
Content-Length: 0
CSeq: 101 BYE
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
Examples The following example shows debug output for a single SIP call:
Field Description
Request Request Type--0 for preauthentication, 1 for
disconnect.
EndPt Type Call Origin End Point Type--1 for IP address, 2 for
Interzone ClearToken (IZCT) value.
Call_origin Answer.
12.2(2)XA Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.
12.2(2)XB1 This command was implemented on the Cisco AS5850 universal gateway.
12.2(11)T This command was integrated into Cisco IOS Release 12.2(11)T. Support for
the Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, and
Cisco AS5850 universal gateway is not included in this release.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support in
a specific 12.2SX release of this train depends on your feature set, platform, and
platform hardware.
Usage Guidelines This command traces the state machine changes of SIP SPI and displays the state transitions.
Examples The following example shows all SIP SPI state tracing:
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
12.2 SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Usage Guidelines Use the debugccsiptransportcommand to debug issues related to connection and transport usage and to see
the flow of the messages being sent or received.
Examples The following is sample output from the debugccsiptransportcommand for a Cisco 3660:
Field Description
Sending Invite to the transport layer Indicates that the SIP signaling state machine has
invoked transport layer operations such as transport
arbitration logic and the connection management
interface.
MTU size for remote address Indicates that the bound outgoing Ethernet interface
that sends the message to the given remote address
is configured for an MTU size of the indicated value.
Interface MTU Size 500, Msg Size 1096 Indicates that the size of the message is larger than
the size of the MTU; thus transport switching (from
UDP to TCP) should be enabled.
Switching msg=... transport UDP->TCP Indicates that transport switching from UDP to TCP
is occurring for the handled message because of the
large size of the message.
Aging timer initiated for holder Indicates that the connection algorithm is started; that
is, the counter begins to age out the TCP or UDP
connection if inactivity occurs.
Posting TCP conn create request Indicates a request for a TCP connection from a lower
TCP process.
Field Description
sipSPITransportSendMessage:msg=0x64082D50, Indicates all the transport related attributes that the
addr=...transport=1, switch=1, callBack=0x614FAB58 SIP signaling state machine originally gives to the
transport layer to send out the message. The attributes
are:
transport: 1 for UDP; 2 for TCP.
switch (switching transport enabled or disabled
for large messages): 1 for enabled; 0 for
disabled.
Posting send for msg=0x64082D50, addr=...for TCP Indicates that all transport and connection related
operations are complete. The message is sent out on
the network targeted to the given address, port, and
transport.
Related Commands
Command Description
debug ccsip all Enables all SIP-related debugging.
voice-class sip transport switch Enables switching between UDP and TCP transport
mechanisms for large SIP messages for a specific dial
peer.
12.0(7)XK This command was implemented on the Cisco 3600 series router.
12.1(2)T This command was integrated into Cisco IOS Release 12.1(2)T.
Usage Guidelines Use this command when attempting to troubleshoot a Vo call that uses the "cisco-switched" session protocol.
This command provides the same information as the debugccswvoicevo-session command, but includes
additional debugging information relating to the calls.
Examples The following shows sample output from the debugccswvoicevo-debug command:
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G ALERT event I/C CONN
2w2d: ccswvoice_bridge_drop: dropping bridge calls src 529927 dst 529926 pvcid 1 cid 15
state ACTIVE
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state ACTIVE event O/G REL
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state RELEASE event I/C RELCOMP
2w2d: ccswvo_store_call_history_entry: cause=10 tcause=10 cause_text=normal call clearing.
Related Commands
Command Description
debug ccswvoice vo-session Displays the first 10 bytes (including header) of
selected VoFR subframes for the interface .
12.0(4)T This command was integrated into Cisco IOS Release 12.0(4)T.
12.0(7)XK This command was implemented on the Cisco MC3810 networking device.
12.1(2)T This command was integrated into Cisco IOS Release 12.1(2)T.
Usage Guidelines Use this command when troubleshooting a VoFR call that uses the "cisco-switched" session protocol. This
command provides the same information as the debugccswvoicevofr-session command, but includes additional
debugging information relating to the calls.
Examples The following shows sample output from the debugccswvoicevofr-debug command:
Related Commands
Command Description
debug cch323 Displays the ccfrf11 function calls during call setup
and teardown.
debug ccsw voice vo-debug Displays the ccswvoice function calls during call
setup and teardown.
12.0(4)T This command was integrated into Cisco IOS Release 12.0(4)T.
12.0(7)XK This command was implemented on the Cisco MC3810 networking device.
12.1(2)T This command was integrated into Cisco IOS Release 12.1(2)T.
Usage Guidelines Use this command to show the state transitions of the cisco-switched-vofr state machine as a call is processed,
and when attempting to troubleshoot a VoFR call that uses the "cisco-switched" session protocol.
Examples The following shows sample output from the debugccswvoicevofr-session command:
Related Commands
Command Description
debug cch323 Displays the ccfrf11 function calls during call setup
and teardown.
Command Description
debug call rsvp-sync events Displays events that occur during RSVP setup.
12.0(7)XK This command was implemented on the Cisco 3600 series router.
12.1(2)T This command was integrated into Cisco IOS Release 12.1(2)T.
Usage Guidelines Use this command to show the state transitions of the cisco-switched-vo state machine as a call is processed.
This command should be used when attempting to troubleshoot a Vo call that uses the "cisco-switched" session
protocol.
Examples The following shows sample output from the debugccswvoicevo-session command:
Related Commands
Command Description
debug ccswvoice vo-debug Displays detailed debugging information related to
ccswvoice function calls during call setup and
teardown.
debug cdapi
To display information about the Call Distributor Application Programming Interface (CDAPI), use the
debugcdapicommand in privileged EXEC mode. To disable debugging output, use the no form of this
command.
12.1(5)XM2 This command was implemented on the Cisco AS5350 and Cisco AS5400.
12.3(2)T This command was integrated into Cisco IOS Release 12.3(2)T. This
command was enhanced to show V.110 call types.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The detail keyword is useful for determining if messages are being lost (or not freed). It is also useful for
determining the size of the raw messages passed between CDAPI and other applications to ensure that the
correct number of bytes is being passed.
The events keyword is useful for determining if certain ISDN messages are not being received by an application
and if calls are not being directed to an application.
The following bandwidths are supported:
56 kbps
64 kbps
Examples The following Media Gateway Control Protocol (MGCP) packet received example shows V.110 call debugging
output for the debugcdapidetail command. In this example, the modem is not yet in STEADY_STATE.
Field Description
L:b:64, nas/bt The bearer type parameter includes v.110 and v.120
for V.110 and V.120 calls.
Related Commands
Command Description
debug mgcp packet Displays the MGCP signaling message received and
sent to the called agent.
debug voip rawmsg Displays the raw message owner, length, and pointer.
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
debug cdma pdsn a10 gre [errors| events| packets] [tunnel-key key]
no debug cdma pdsn a10 gre [errors| events| packets]
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
12.2(8)BY The tunnel-key keyword was added and the existing keywords were
made optional.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
12.2(8)BY The mnid argument was added and the existing keywords were made
optional.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
CDMA:
CDMA PDSN A11 packet debugging is on for mnid 000000000000001
Router#
*Mar 1 03:13:37.803:CDMA-RP:extension type=38, len=0
*Mar 1 03:13:37.803:CDMA-RP:extension type=38, len=0
*Mar 1 03:13:37.803:CDMA-RP:extension type=38, len=0
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
debug cdma pdsn cluster message [error| events| packets] redundancy [error| events| packets]
no debug cdma pdsn cluster message [error| events| packets] redundancy [error| events| packets]
Syntax Description message Displays cluster messages for errors, events and
packets received.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
Usage Guidelines This debug is only allowed on PDSN c6-mz images, and helps to monitor prepaid information.
12.4(11)T This command was integrated into Cisco IOS Release 12.4(11)T.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
Usage Guidelines This debug is only allowed on PDSN c6-mz images, and helps to monitor prepaid information.
12.4(11)T This command was integrated into Cisco IOS Release 12.4(11)T.
Syntax Description errors Displays Packet Data Service node (PDSN) resource
manager errors.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
Examples The following is sample output from the debugcdmapdsnselectioncommand with the keyword events
specified:
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
CDMA:
CDMA PDSN session events debugging is on
CDMA PDSN session errors debugging is on
Router#
*Jan 1 00:22:27:CDMA-SM:create_session 5.5.5.5-4.4.4.5-2
*Jan 1 00:22:27:CDMA-SM:create_tunnel 5.5.5.5-4.4.4.5
*Jan 1 00:22:27:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up
*Jan 1 00:22:29:CDMA-SM:create_flow mn=0.0.0.0, ha=8.8.8.8 nai=l2tp2@cisco.com
*Jan 1 00:22:30:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1, changed
state to up
debug cdp
To enable debugging of the Cisco Discovery Protocol (CDP), use the debugcdpcommand in privileged EXEC
mode. To disable debugging output, use the no form of this command.
12.2(55)SE This command was modified. The debug output was enhanced to display location
Type-Length-Values (TLVs), location-server TLVs, and application TLV-related
debugs.
Usage Guidelines Use debugcdp commands to display information about CDP packet activity, activity between CDP neighbors,
and various CDP events.
Related Commands
Command Description
cdp tlv Configures location support in CDP.
debug cdp ip
To enable debug output for the IP routing information that is carried and processed by the Cisco Discovery
Protocol (CDP), use the debugcdpipcommand in privileged EXEC mode. To disable debugging output, use
the no form of this command.
debug cdp ip
no debug cdp ip
Usage Guidelines CDP is a media- and protocol-independent device-discovery protocol that runs on all Cisco routers.
You can use the debugcdpipcommand to determine the IP network prefixes CDP is advertising and whether
CDP is correctly receiving this information from neighboring routers.
Use the debugcdpipcommand with the debugiprouting command to debug problems that occur when
on-demand routing (ODR) routes are not installed in the routing table at a hub router. You can also use the
debugcdpipcommand with the debugcdppacketanddebugcdpadjacency commands along with
encapsulation-specific debug commands to debug problems that occur in the receipt of CDP IP information.
Examples The following is sample output from thedebugcdpip command. This example shows the transmission of
IP-specific information in a CDP update. In this case, three network prefixes are being sent, each with a
different network mask.
This message indicates a protocol error occurred during an attempt to decode an incoming CDP packet:
This message indicates the receipt of the IP prefix 172.16.1.0/24 from a CDP neighbor connected via
Ethernet interface 0/0. The neighbor IP address is 10.0.01.
Related Commands
Command Description
debug ip routing Displays information on RIP routing table updates
and route cache updates.
debug cef
To enable the display of information about Cisco Express Forwarding events, use the debugcefcommand in
privileged EXEC mode. To disable the display of Cisco Express Forwarding events, use the no form of this
command.
debug cef {all| assert| background| broker| consistency-check| elog| epoch| fib [attached export| subblock]|
hardware {notification| queries}| hash| high-availability| interest| interface| iprm| issu| loadinfo| memory|
non-ip| path [extension| list| scope]| subtree context| switching background| table| xdr}
no debug cef {all| assert| background| broker| consistency-check| elog| epoch| fib [attached export|
subblock]| hardware {notification| queries}| hash| high-availability| interest| interface| iprm| issu|
loadinfo| memory| non-ip| path [extension| list| scope]| subtree context| switching background| table|
xdr}
Syntax Description all Displays debug messages for all Cisco Express
Forwarding events.
path [extension | list | scope] Displays debug messages for Cisco Express
Forwarding path events.
Command Default Debugging information about Cisco Express Forwarding events is not displayed.
12.2(28)SB This command was integrated into Cisco IOS Release 12.2(28)SB and
implemented on the Cisco 10000 series routers.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH This command was integrated into Cisco IOS Release 12.2(33)SXH.
12.4(20)T This command was integrated into Cisco IOS Release 12.4(20)T.
Usage Guidelines Because debugging output is assigned high priority in the CPU process, you should use debug commands
only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff.
Moreover, you should use debug commands during periods of lower network traffic and fewer users. Debugging
during these periods decreases the likelihood that increased debug command processing overhead will affect
system use.
Related Commands
Command Description
cef table consistency-check Enables Cisco Express Forwarding consistency
checker table values by type and parameter.
debug ip cef table Enables the collection of events that affect entries in
the Cisco Express Forwarding tables.
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Related Commands
Command Description
debug cellular messages async Debugs cellular async.
debug cellular messages data Prints Cisco IOS data path debug messages.
Command Description
debug cellular messages management Prints management path messages, such as CnS.
debug cellular messages dm Prints diagnostics monitor (DM) messages from the
Qualcomm CDMA chipset.
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
12.4(22)YB1 This command was integrated into Cisco IOS Release 12.4(22)YB1.
Related Commands
Command Description
debug cellular messages async Debugs cellular async.
debug cellular messages data Prints Cisco IOS data path debug messages.
debug cellular messages management Prints management path messages, such as CnS.
debug cellular messages dm Prints diagnostics monitor (DM) messages from the
Qualcomm CDMA chipset.
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
Related Commands
Command Description
debug cellular messages async Debugs cellular async.
debug cellular messages data Prints Cisco IOS data path debug messages.
debug cellular messages management Prints management path messages, such as CnS.
debug cellular messages dm Prints diagnostics monitor (DM) messages from the
Qualcomm CDMA chipset.
debug cellular messages virt-con Redirects the Nios II console driver messages to
display them in the Cisco IOS router console
environment.
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Related Commands
Command Description
debug cellular messages all Prints all Cisco IOS driver debug messages.
debug cellular messages data Prints Cisco IOS data path debug messages.
debug cellular messages management Prints management path messages, such as CnS.
debug cellular messages dm Prints diagnostics monitor (DM) messages from the
Qualcomm CDMA chipset.
Command Description
debug cellular messages virt-con Redirects the Nios II console driver messages to
display them in the Cisco IOS router console
environment.
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
Related Commands
Command Description
debug cellular messages all Prints all Cisco IOS driver debug messages.
debug cellular messages management Prints management path messages, such as CnS.
debug cellular messages dm Prints diagnostics monitor (DM) messages from the
Qualcomm CDMA chipset.
debug cellular messages virt-con Redirects the Nios II console driver messages to
display them in the Cisco IOS router console
environment.
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
Related Commands
Command Description
debug cellular messages all Prints all Cisco IOS driver debug messages.
debug cellular messages data Prints Cisco IOS data path debug messages.
debug cellular messages management Prints management path messages, such as CnS.
debug cellular messages virt-con Redirects the Nios II console driver messages to
display them in the Cisco IOS router console
environment.
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
Related Commands
Command Description
debug cellular messages all Prints all Cisco IOS driver debug messages.
debug cellular messages data Prints Cisco IOS data path debug messages.
debug cellular messages virt-con Redirects the Nios II console driver messages to
display them in the Cisco IOS router console
environment.
debug cell-hwic slotwic_slotport virt-con {clear| disable| dump-data-structs| log| monitor| wrapper-on|
wrapper-off}
Syntax Description slot/wic_slot/port Numeric values that indicate the router slot, WAN
interface card (WIC) slot, and port.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Release Modification
12.4(22)YB1 This command was integrated into Cisco IOS Release 12.4(22)YB1.
Related Commands
Command Description
debug cellular messages all Prints all Cisco IOS driver debug messages.
debug cellular messages data Prints Cisco IOS data path debug messages.
debug cellular messages management Prints management path messages, such as CnS.
debug cellular messages dm Prints diagnostics monitor (DM) messages from the
Qualcomm CDMA chipset.
Usage Guidelines Use the show debug command to see debug information.
Examples The following command turns on CEM local switching error debugging:
Related Commands
Command Description
debug cem ls events Enables debugging of events relating to CEM local
switching.
Usage Guidelines Use the show debug command to see debug information.
Examples The following command turns on debugging for CEM local switching events.
Related Commands
Command Description
debug cem ls errors Enables debugging of connection errors or null data
structures.
debug ces-conn
To display information from circuit emulation service (CES) clients, use the debugces-conncommand in
privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description all (Optional) Displays all error and event information.
12.2(4)T This command was integrated into Cisco IOS Release 12.2(4)T.
Examples The following example shows debug output for a CES connection:
debug cfm
To enable debugging of the data path of Ethernet connectivity fault management (CFM) on Cisco Catalyst
6500 series switches, use the debug cfm command in privileged EXEC mode. To disable the debugging
function, use the no form of this command.
12.2(33)SRE This command was integrated into Cisco IOS Release 12.2(33)SRE.
Examples The following example shows output of the debug cfm all command:
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines This command displays CMCC adapter events that occur on the Channel Interface Processor (CIP) or Channel
Port Adapter (CPA) and is useful for diagnosing problems in an IBM channel attach network. It provides an
overall picture of the stability of the network. In a stable network, the debugchannelevents command does
not return any information. If the command generates numerous messages, the messages can indicate the
possible source of the problems. To observe the statistic message (cip_love_letter) sent every 10 seconds, use
the debugchannellove command.
When configuring or making changes to a router or interface that supports IBM channel attach, enable the
debugchannelevents command. Doing so alerts you to the progress of the changes or to any errors that might
result. Also use this command periodically when you suspect network problems.
The following line indicates that the node ID is being sent to the CIP. This information is the same as the
"Local Node" information under the showextendedchannelslot/portsubchannels command. The CIP needs
to send this information to the host mainframe.
Related Commands
Command Description
debug channel ilan Displays CIP love letter events.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The debug channel ilan command displays events related to CMCC internal LANs. This command is useful
for debugging problems associated with CMCC internal LAN configuration. It is also useful for debugging
problems related to SRB packet flows through internal LANs.
Channel3/2: ILAN Token-Ring 3 - CIP internal MAC adapter not acknowledged DMAC(4000.7000.0001)
SMAC(0c00.8123.0023)
Related Commands
Command Description
debug channel events Displays processing that occurs on the channel adapter
interfaces of all installed adapters.
Usage Guidelines This command displays CIP love letter events (an operating status or configuration message) that occur on
the CIP interface processor and is useful for diagnosing problems in an IBM channel attach network. It provides
an overall picture of the stability of the network. In a stable network, the debugchannellove command returns
a statistic message (cip_love_letter) that is sent every 10 seconds. This command is valid for the Cisco 7000
series routers only.
Related Commands
Command Description
debug channel events Displays processing that occurs on the channel adapter
interfaces of all installed adapters.
Usage Guidelines The debugchannelpackets command displays all process-level Channel Interface Processor ( CIP) packets
for both outbound and inbound packets. The output reports information when a packet is received or a
transmission is attempted. You will need to disable fast switching and autonomous switching to obtain
debugging output. This command is useful for determining whether packets are received or sent correctly.
This command is valid for the Cisco 7000 series routers only.
(Channel3/0)-out size = 104, vc = 0000, type = 0800, src 172.24.0.11, dst 172.24.1.58
(Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197
(Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197
(Channel3/0)-out size = 71, vc = 0000, type = 0800, src 172.24.15.197, dst 172.24.1.58
(Channel3/0)-in size = 44, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197
The table below describes the significant fields shown in the display.
Field Description
(Channel3/0) Interface slot and port.
Field Description
type = Encapsulation type in the MAC layer. The value 0800
indicates an IP datagram.
ES-IS: ISH sent to All ESs (Ethernet1): NET 49.0001.AA00.0400.6904.00, HT 299, HLEN 20
The following line indicates that on Ethernet interface 0, the router received a hello packet from an end system
with an SNPA of 0000.0c00.bda8. The hold time for this packet is 300 seconds.
The following lines indicate that the router is generating a Level 2 update to advertise reachability to destination
area 1 and that it is sending that update to all systems that can be reached through Ethernet interface 3:
Usage Guidelines The debugclsmessagecommand displays the primitives (state), selector, header length, and data size.
Examples The following is sample output from thedebugclsmessagecommand. For example, CLS-->DLU indicates the
direction of the flow that is described by the status. From CLS to dependent logical unit (DLU), a request was
established to the connection endpoint. The header length is 48 bytes, and the data size is 104 bytes.
Related Commands
Command Description
debug fras error Displays information about FRAS protocol errors.
Usage Guidelines The debugclsmessage command displays primitive state transitions, selector, and source and destination
MAC and service access points (SAPs).
Also use the showcls command to display additional information on CLS VDLC.
Caution Use the debugclsvdlc command with caution because it can generate a substantial amount of output.
Examples The following messages are sample output from the debugclsvdlc command. In the following scenario, the
systems network architecture (SNA) service point--also called nativeservicepoint(NSP)--is setting up two
connections through VDLC and data-link switching (DLSw): one from NSP to VDLC and one from DLSw
to VDLC. VDLC joins the two.
The NSP initiates a connection from 4000.05d2.0001 as follows:
Related Commands
Command Description
debug cls message Displays information about CLS messages.
debug cme-xml
To generate debug messages for the Cisco Unified CallManager Express XML application, use the
debugcme-xml command in privileged EXEC mode. To disable debugging, use the no form of the command.
debug cme-xml
no debug cme-xml
12.4(9)T This command was integrated into Cisco IOS Release 12.4(9)T.
Usage Guidelines The showfb-its-log command displays the contents of the XML event table.
Examples The following example shows the progress of an XML request that has been sent to Cisco Unified CallManager
Express:
Related Commands
Command Description
show fb-its-log Displays Cisco Unified CallManager Express XML
API information.
12.0(18)ST This command was integrated into Cisco IOS Release 12.0(18)ST.
12.2(8)T This command was implemented on the Cisco 2600 and Cisco 3600
series.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SXI This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines Use this command to turn on or turn off debugging messages related to the CNS Configuration Agent.
Examples In the following example, debugging messages are enabled for CNS configuration processes:
Related Commands
Command Description
cns config cancel Cancels a CNS configuration.
cns config retrieve Gets the configuration of a routing device using CNS.
Syntax Description agent Displays debugging messages related to the event agent.
12.0(18)ST This command was integrated into the Cisco IOS Release 12.0(18)ST.
12.2(8)T This command was implemented on Cisco 2600 series and Cisco 3600
series routers.
12.2(31)SB2 This command was integrated into Cisco IOS Release 12.2(31)SB2.
Usage Guidelines Use this command to turn on or turn off debugging messages related to the CNS Event Gateway.
Examples In the following example, debugging messages about all CNS Events are enabled:
Related Commands
Command Description
cns event Configures the CNS Event Gateway.
show cns event Displays information about the CNS Event Agent.
12.2(25)S This command was integrated into Cisco IOS Release 12.2(25)S.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SXI This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines Use the debug cns exec command to troubleshoot CNS exec agent services.
Examples The following example shows a debugging message for the CNS exec agent when a response has been posted
to HTTP:
Related Commands
Command Description
cns exec Configures CNS Exec Agent services.
12.2(31)SB2 This command was integrated into Cisco IOS Release 12.2(31)SB2.
12.2(33)SRB This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SXI This command was integrated into Cisco IOS Release 12.2(33)SXI.
Usage Guidelines Use the debug cns image command to troubleshoot CNS image agent services.
Examples In the following example, debugging messages about SNMP- and XML-encapsulated CNS-management
events are enabled:
Related Commands
Command Description
cns event Configures the CNS event gateway, which provides
CNS event services to Cisco IOS clients.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB.
12.2(33)SXI This command was integrated into Cisco IOS Release 12.2(33)SXI.
Examples In the following example, debugging messages for the CNS XML parser are enabled:
Related Commands
Command Description
cns event Configures the CNS Event Gateway.
show cns event Displays information about the CNS Event Agent.
Note Effective with Cisco IOS Release 12.3(2)T, the debug cns xml-parser command is replaced by the debug
cns xml command. See the debug cns xml command for more information.
To turn on debugging messages related to the Cisco Networking Services (CNS) eXtensible Markup Language
(XML) parser, use the debug cns xml-parser command in privileged EXEC mode. To disable debugging
output, use the no form of this command.
12.0(18)ST This command was integrated into Cisco IOS Release 12.0(18)ST.
12.2(8)T This command was implemented on the Cisco 2600 and Cisco 3600
series.
12.3(2)T This command was replaced by the debug cns xml command.
Examples In the following example, debugging messages for the CNS XML parser are enabled:
Related Commands
Command Description
cns event Configures the CNS Event Gateway.
show cns event Displays information about the CNS Event Agent.
debug compress
To debug compression, enter the debugcompresscommand in privileged EXEC mode. To disable debugging
output, use the no form of this command.
debug compress
no debug compress
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use this command to display output from the compression and decompression configuration you made. Live
traffic must be configured through the Cisco 2600 access router with a data compression Advanced Interface
Module (AIM) installed for this command to work.
Examples The following example is output from the debugcompress command, which shows that compression is taking
place on a Cisco 2600 access router using data compression AIM hardware compression is configured correctly:
Field Description
compr-in Indicates that a packet needs to be compressed.
start:0x02406BD4 size:103 npart:0 The "npart:0" indicates that the packet is contained
in a single, contiguous area of memory. The start
address of the packet is 0x02406bd4 and the size of
the packet is 103.
start:0x0259CD3E size:71 npart:1 The "npart:1" indicates that the packet is contained
in 1 or more regions of memory. The start address of
the packet is 0x0259CD3E and the size of the packet
is 71.
Related Commands
Command Description
debug frame-relay Displays debugging information about the packets
that are received on a Frame Relay interface.
debug condition
To filter debugging output for certain debug commands on the basis of specified conditions, use thedebug
condition command in privileged EXEC mode. To remove the specified condition, use the no form of this
command.
debug condition {called dial-string| caller dial-string| calling tidimsi string| domain domain-name| interface
interface-id| ip ip-address| mac-address hexadecimal-MAC-address| portbundle ip ip-address bundle
bundle-number| session-id session-number| username username| vcid vc-id| vlan vlan-id}
no debug condition {condition-id| all}
Syntax Description called dial-string Filters output on the basis of the called party number.
caller dial-string Filters output on the basis of the calling party number.
portbundle ip ip-address Filters output on the basis of the port-bundle host key
(PBHK) that uniquely identifies the session.
vlan vlan-id Filters output on the basis of the specified VLAN ID.
Command Default All debugging messages for enabled protocol-specific debug commands are generated.
12.0(23)S This command was modified. The vcid and ip keywords were added to support
the debugging of Any Transport over MPLS (AToM) messages.
12.2(14)S This command was integrated into Cisco IOS Release 12.2(14)S.
12.2(15)T This command was integrated into Cisco IOS Release 12.2(15)T.
12.3(2)XB This command was modified. Support was added on the GGSN.
12.3(8)T This command was modified. The calling keyword and tid/imsi-string
argument were added.
12.2(28)SB This command was modified. The ability to filter output on the following
conditions was added: domain, MAC address, PBHK, and ISA session ID.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
15.2(2)T This command was modified. The vlan vlan-id keyword and argument and
the interface interface-id keyword and argument were added.
Usage Guidelines Use the debug condition command to restrict the debug output for some commands. If any debug condition
commands are enabled, output is generated only for interfaces associated with the specified keyword. In
addition, this command enables debugging output for conditional debugging events. Messages are displayed
as different interfaces meet specific conditions.
If multiple debug condition commands are enabled, output is displayed if at least one condition matches. All
the conditions do not need to match.
The no form of this command removes the debug condition specified by the condition identifier. The condition
identifier is displayed after you use a debug condition command or in the output of the show debug condition
command. If the last condition is removed, debugging output resumes for all interfaces. You will be asked
for confirmation before removing the last condition or all conditions.
Not all debugging output is affected by the debug condition command. Some commands generate output
whenever they are enabled, regardless of whether they meet any conditions.
The following components are supported for Intelligent Service Architecture (ISA) distributed conditional
debugging:
Authentication, authorization, and accounting (AAA) and RADIUS
ATM components
Feature Manager
Policy Manager
PPP
PPP over Ethernet (PPPoE)
Session Manager
Virtual Private Dialup Network (VPDN)
Ensure that you enable TID/IMSI-based conditional debugging by entering debug condition calling before
configuring debug gprs gtp and debug gprs charging. In addition, ensure that you disable the debug gprs
gtp and debug gprs charging commands using the no debug all command before disabling conditional
debugging using the no debug condition command. This will prevent a flood of debugging messages when
you disable conditional debugging.
Examples
Examples In the following example, the router displays debugging messages only for interfaces that use a username of
user1. The condition identifier displayed after the command is entered identifies this particular condition.
Examples The following example specifies that the router should display debugging messages only for VC 1000:
The debugging output shows the change to the interface where VC 1000 is established:
01:15:59: AToM MGR [13.13.13.13, 1000]: Event local down, state changed from established
to remote ready
01:15:59: AToM MGR [13.13.13.13, 1000]: Local end down, vc is down
01:15:59: AToM SMGR [13.13.13.13, 1000]: Processing imposition update, vc_handle 6227BCF0,
update_action 0, remote_vc_label 18
01:15:59: AToM SMGR [13.13.13.13, 1000]: Imposition Disabled
01:15:59: AToM SMGR [13.13.13.13, 1000]: Processing disposition update, vc_handle 6227BCF0,
update_action 0, local_vc_label 755
01:16:01:%LINK-5-CHANGED: Interface Serial3/1/0, changed state to administratively down
01:16:02:%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial3/1/0, changed state to down
Related Commands
Command Description
debug condition interface Limits output for some debugging commands based
on the interfaces.
Syntax Description application-name Name of the VoiceXML application for which you
want to display all enabled debugging messages.
Command Default If this command is not configured, debugging messages are enabled for all VoiceXML applications.
Usage Guidelines
This command filters debugging output only for the debugvxmland debughttpclient commands, except
that it does not filter output for the debugvxmlerror, debugvxmlbackground, debughttpclienterror,
or debughttpclientbackground commands. It does not filter messages for any other debug commands
such as the debugvoipivr command or the debugvoiceivr command.
This command filters debugging output for all VoiceXML applications except the application named in
the command. When this command is configured, the gateway displays debugging messages only for
the specified VoiceXML application.
To filter debugging output with this command, the <cisco-debug> element must be enabled in the
VoiceXML document. For more information about the <cisco-debug> element, refer to the Cisco
VoiceXML Programmers Guide.
To see debugging output for VoiceXML applications, you must first configure global debug commands
such as the debugvxmlcommand or the debughttpclientcommand. If no global debug commands are
turned on, you do not see debugging messages even if the debugconditionapplicationvoice command
is configured and the <cisco-debug> element is enabled in the VoiceXML document.
This command can be configured multiple times to display output for more than one application.
To see which debug conditions have been set, use the showdebugcondition command.
Examples The following example disables debugging output for all applications except the myapp1 application, if the
<cisco-debug> element is enabled in the VoiceXML documents that are executed by myapp1:
Related Commands
Command Description
debug http client Displays debugging messages for the HTTP client.
show debug condition Displays the debugging conditions that have been
enabled for VoiceXML application.
12.2(15)T This command was integrated into Cisco IOS Release 12.2(15)T.
12.2(17b)SXA This command was integrated into Cisco IOS Release 12.2(17b)SXA.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Related Commands
Command Description
debug glbp errors Displays debugging messages about GLBP errors.
Command Description
debug glbp packets Displays debugging messages about GLBP packets.
debug condition interface interface-type interface-number [dlci dlci] [vc {vci| vpivci}] [vlan-id vlan-id]
no debug condition interface interface-type interface-number [dlci dlci] [vc {vci| vpivci}] [vlan-id vlan-id]
Syntax Description interface-type interface-number Interface type and number. For more information, use
the question mark (?) online help function.
Command Default All debugging messages for enabled debug commands are displayed.
12.0(28)S This command was modified. The dlci and vc keywords were added for
additional Frame Relay and ATM functionality.
12.2(25)S This command was modified. It was integrated into Cisco IOS Release
12.2(25)S.
12.2(27)SBC This command was modified. It was integrated into Cisco IOS Release
12.2(27)SBC.
Release Modification
12.2(28)SB This command was modified. It was integrated into Cisco IOS Release
12.2(28)SB, and the ability to filter debug output on the basis of VLAN ID
was added.
12.4(9)T This command was modified. It was integrated into Cisco IOS Release
12.4(9)T.
12.2(33)SRE This command was modified. It was integrated into Cisco IOS Release
12.2(33)SRE.
Cisco IOS XE 2.5 This command was modified. It was integrated into Cisco IOS XE Release
2.5.
Usage Guidelines Use this command to restrict the debugging output for some commands on the basis of an interface or virtual
circuit. When you enter this command, debugging output is disbaled for all interfaces except the specified
interface or virtual circuit. In addition, this command enables conditional debugging to limit output for specific
debugging events. Messages are displayed as different interfaces meet specific conditions.
The no form of this command performs the following functions:
Disables the debugconditioninterface command for the specified interface. Output is no longer generated
for the interface, assuming that the interface meets no other applicable conditions. If the interface meets
other conditions that have been set by another debugcondition command, debugging output will still
be generated for the interface.
If some other debugcondition command has been enabled, output is stopped for that interface until the
condition is met on the interface. You will be asked for confirmation before the last condition or all
conditions are removed.
Not all debugging output is affected by the debugcondition command. Some commands generate output
whenever they are enabled, regardless of whether they meet any conditions. The commands that are affected
by the debugcondition commands are generally related to dial access functions, where a large amount of
output is expected. Output from the following commands is controlled by the debugconditioncommand:
debug aaa
debug atm
debug dialer events
debug frame-relay
debug isdn
debug modem
debug ppp
One or more ATM-encapsulated interfaces must be enabled, and one or more of the following debug commands
must be enabled to use conditional debugging with ATM:
debug atm arp
One or more of the following debug commands must be enabled to use conditional debugging with Frame
Relay:
debug frame-relay adjacency
debug frame-relay ipc
debug frame-relay lmi
debug frame-relay packet
debug frame-relay pseudowire
Examples In the following example, only debug command output related to serial interface 1 is displayed. The condition
identifier for this command is 1.
Router> enable
Password:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface atm 2/0
Router(config-if)# ip address 209.165.201.2 255.255.255.0
Router(config-if)# pvc 255/62610
Router(config-if-atm-vc)# no shutdown
Router(config-if)# exit
Router(config)# exit
2w3d: %SYS-5-CONFIG_I: Configured from console by console
Router# debug condition interface atm 2/0 vc 255/62610
Condition 1 set
2w3d: ATM VC Debug: Condition 1, atm-vc 255/62610 AT2/0 triggered, count 1
Router# show debug condition
Condition 1: atm-vc 255/62610 AT2/0 (1 flags triggered)
Flags: ATM VC
The following example shows how to enable Frame Relay conditional debugging on Frame Relay DLCI 105:
The following example shows how to disable the conditional debugging on VC. A warning message is displayed
when the last condition is removed.
Router> enable
Router# no debug condition interface atm 1/0 vc 4335
Related Commands
Command Description
debug condition Limits output for some debug commands on the basis
of specific conditions.
show debug condition Displays the debugging filters that have been enabled
for VoiceXML. applications, ATM-enabled interfaces,
or Frame Relay interfaces
Syntax Description number Numeric label that uniquely identifies the match list.
Range is 1 to 16. The number for the match list is set
using the callfiltermatch-list command.
The following is sample output for the debugconditionmatch-list1 command. The next several lines match
the above conditions.
Field Description
3C0B9468-15C8-11D4-8013-000A8A389BA8 Shows the global unique identifier (GUID).
(7/0:D):0:0:0 Shows the port name, channel number, DSP slot, and
DSP channel number for the VTSP module.
Related Commands
Command Description
call filter match-list voice Creates a call filter match list for debugging voice
calls.
debug call filter inout Displays the debug trace inside the GCFM.
Usage Guidelines Use the debugconditionstandbycommand to restrict the debug output for the debugstandby command. If
the debugconditionstandbycommand is enabled, output is generated only for the interfaces and HSRP group
numbers specified. The interface you specify must be a valid interface capable of supporting HSRP. The group
can be any group (0 to 255 for HSRPv1 and 0 to 4095 for HSRPv2).
Use the no form of this command to remove the HSRP debug condition. If the last condition is removed,
debugging output resumes for all interfaces. You will be asked for confirmation before removing the last
condition or all conditions.
You can set debug conditions for groups that do not exist, which allows you to capture debug information
during the initialization of a new group.
You must enable the debug standby command in order for any HSRP debug output to be produced. If you do
not configure the debugconditionstandby command after entering the debugstandbycommand, then debug
output is produced for all groups on all interfaces.
Examples In the following example, the router displays debugging messages only for Ethernet interface 0/0 that are part
of HSRP group 23:
Related Commands
Command Description
debug condition interface Limits output for some debugging commands based
on the interfaces.
debug standby events icmp Displays debugging messages for the HSRP ICMP
redirects filter.
Syntax Description port-number Voice port for which you want to display all enabled
debugging messages.
Note Syntax for the port-numberargument is
platform-dependent; type ? to determine
available options for argument syntax.
Command Default Debugging messages are enabled for all voice ports.
Usage Guidelines This command filters out debugging output for all voice ports except the port specified in the command. When
this command is configured, the gateway displays debugging messages only for the specified port.
To display debugging output, you must first enable the debugvoipapplicationstcappallcommand. If no debug
commands are turned on, no debugging messages are displayed even if the debugconditionvoice-port
command is enabled.
The debugconditionvoice-port command can be configured multiple times to display output for more than
one voice port. This command differs from the debugvoipapplicationstcappportcommand, which can be
configured to display output for only one voice port.
To display which debug conditions have been set, use the showdebug command.
Before disabling conditions, first disable any debugging commands; otherwise output for all ports could flood
the logging buffer.
Examples The following example filters debugging output so that output only for ports 2/1 and 2/3 is displayed:
Related Commands
Command Description
debug sccp all Displays debugging information for SCCP.
debug voip application stcapp all Displays debugging information for the components
of the STCAPP.
debug voip application stcapp port Enables STCAPP debugging for a specific port.
Usage Guidelines Use this command to limit debug output to a single VRF.
Examples The following example shows how to limit debugging output to VRF red:
Related Commands
Command Description
vrf definition Defines a virtual routing and forwarding instance.
debug condition xconnect {fib type| interface type number [dlci| vp number| vc number]| peer ip-address
vcid vcid| segment segment-id}
no debug condition xconnect {fib type| interface type number [dlci| vp number| vc number]| peer ip-address
vcid vcid| segment segment-id}
Syntax Description fib type Filters control-plane and data-plane debug messages
for the xconnect segment pair specified by matching
against the Forwarding Information Base (FIB)
Interface Descriptor Block (IDB) information
associated with a particular interface on a line card.
Usage Guidelines Use the debugconditionxconnect command to specify conditions for filtering the debug messages displayed
by related subscriber service switch (SSS), xconnect, and attachment circuit debug commands.
Examples The following example sets filter conditions that allow related debug commands to display debug messages
for only the xconnect segment pair specified by the remote peer IP address and the pseudowire VCID:
Related Commands
Command Description
debug acircuit Displays errors and events that occur on the
attachment circuits.
debug sss aaa authorization event Displays messages about AAA authorization events
that are part of normal call establishment.
debug sss aaa authorization fsm Displays information about AAA authorization state
changes.
debug sss error Displays diagnostic information about errors that may
occur during SSS call setup.
debug sss event Displays diagnostic information about SSS call setup
events.
debug sss fsm Displays diagnostic information about the SSS call
setup state.
12.0(31)S This command was integrated into Cisco IOS Release 12.0(31)S.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
12.2(33)SB This command was integrated into Cisco IOS Release 12.2(33)SB.
Examples The following is sample output with debugconfigurationlock enabled (assuming that the feature is enabled
using the configurationmodeexclusivemanual command in global configuration mode):
Configuration mode locked exclusively by user 'unknown' process '3' from terminal '0'.
Please try later.
Router#
Session1 from console
=======================
Router(config)#
Parser : LOCK REQUEST in EXCLUSIVE mode
Parser: <configure terminal lock> - Config. Lock requested by process <104> client <PARSER
Client>
Parser: <configure terminal lock> - NON_BLOCKING : Config mode locked <EXCLUSIVE> owner <3>
Router(config)#
Router(config)# end
Router#
%SYS-5-CONFIG_I: Configured from console by console
Parser: <Configure terminal> - Config. EXC UnLock requested by user<3>
Parser: <Configure terminal> - Config UNLOCKED !
Router#
Related Commands
Command Description
configuration mode exclusive Enables single-user (exclusive) access functionality
for the Cisco IOS CLI.
show configuration lock Displays information about the lock status of the
running configuration file during a configuration
replace operation.
debug confmodem
To display information associated with the discovery and configuration of the modem attached to the router,
use the debugconfmodemcommand in privileged EXEC mode. To disable debugging output, use the no form
of this command.
debug confmodem
no debug confmodem
Usage Guidelines The debugconfmodem command is used in debugging configurations that use the modemautoconfig command.
Examples The following is sample output from thedebugconfmodemcommand. In the first three lines, the router is
searching for a speed at which it can communicate with the modem. The remaining lines show the actual
sending of the modem command.
debug conn
To display information from the connection manager, time-division multiplexing (TDM) and digital signal
processor (DSP) clients, use the debugconncommand in privileged EXEC mode. To disable debugging output,
use the no form of this command.
debug conn
no debug conn
12.2(4)T This command is supported on Cisco 2600 series routers and was integrated
into Cisco IOS Release 12.2(4)T.
Router(config-tdm-conn)# exit
*Mar 6 18:30:59:%CONN TDM:Segment attached to dsx1
*Mar 6 18:30:59:%CONN TDM:Parsed segment 1
*Mar 6 18:30:59:%CONN TDM:Segment attached to dsx1
*Mar 6 18:30:59:%CONN TDM:Parsed segment 2
*Mar 6 18:30:59:%CONN:Creating new connection
Router(config)#
*Mar 6 18:31:01:%CONN TDM:Interwork Segments
*Mar 6 18:31:01:CONN TDM:Init Segment @ 61C26980
*Mar 6 18:31:01:CONN TDM:Init Segment @ 61C26A44
*Mar 6 18:31:01:%CONN TDM:Activating Segment @ 61C26980
*Mar 6 18:31:01:%CONN:Segment alarms for conn conn1 are 2
*Mar 6 18:31:01:%CONN TDM:Activating Segment @ 61C26A44
*Mar 6 18:31:01:%CONN:Segment alarms for conn conn1 are 0
*Mar 6 18:31:01:%CONN TDM:Connecting Segments
*Mar 6 18:31:01:%CONN TDM:MAKING CONNECTION
*Mar 6 18:31:01:%CONN:cm_activate_connection, stat = 5
Router(config)#
debug content-scan
To enable content scan debugging, use the debug content-scan command in privileged EXEC mode. To
disable content scan debugging, use the no form of this command.
Syntax Description access-list Enables debugging of content scan access control lists (ACLs).
extended-access-list-number Extended access list number. The range is from 1300 to 2699.
15.2(4)M This command was modified. The access-list and control-plane keywords
and the access-list-number, extended-access-list-number, and access-list-name
arguments were added.
Usage Guidelines The content scanning process redirects client web traffic to the ScanSafe web server.
You must configure ACLs by using the ip access-list extended command before you enable the debugging
of content-scan ACLs. The debug content-scan access-list command enables the conditional debugging for
content scan. The conditional debugging does not work for existing sessions when you enable content scan;
the ACL match occurs after the first packet is received.
Examples The following example shows how to enable extended ACL 149 and the debugging of content scan ACL 149:
Device(config)# ip access-list extended 149
Device(config-ext-nacl)# permit ip host 10.1.0.1
Device(config-ext-nacl)# end
Device# debug content-scan access-list 149
Content-scan ACL based conditional debugging is on
The following is sample output from the debug content-scan access-list 149 command:
Device# debug content-scan access-list 149
Related Commands
Command Description
content-scan out Enables content scanning on an egress interface.
debug control-plane
To display debugging output from the control-plane routines, use the debugcontrolplane command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
12.4(6)T The log keyword was added to support control plane logging.
Usage Guidelines Use the debugcontrolplane command if you want to display the debugging output from the control-plane
routines.
Examples The following example show a display from the debugcontrol-plane command:
The following example shows a display from the debugcontrol-plane command using the port-filtering
option:
Field Description
dport UPD destination port.
show control-plane cef-exception counters Displays the control plane packet counters for the
control plane CEF-exception subinterface.
show control-plane cef-exception features Displays the configured features for the control plane
CEF-exception subinterface.
show control-plane counters Displays the control-plane packet counters for the
aggregate control-plane interface.
show control-plane features Displays the configured features for the aggregate
control-plane interface.
show control-plane host counters Displays the control plane packet counters for the
control plane host subinterface.
show control-plane host features Displays the configured features for the control plane
host subinterface.
show control-plane host open-ports Displays a list of open TCP/UDP ports that are
registered with the port-filter database.
show control-plane transit counters Displays the control plane packet counters for the
control plane transit subinterface.
debug cops
To display a one-line summary of each Common Open Policy Service (COPS) message sent from and received
by the router, use the debugcops command in privileged EXEC mode. To disable debugging output, use the
no form of this command.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines To generate a complete record of the policy process, enter this command and, after entering a carriage return,
enter the additional command debug ip rsvp policy.
Examples This first example displays the one-line COPS message summaries, as the router goes through six different
events.
Examples The router gets configured to cease communicating with the policy server:
Related Commands
Command Description
debug ip rsvp policy Displays debugging messages for RSVP policy
processing.
debug cot
To display information about the Continuity Test (COT) functionality, use the debugcotcommand in privileged
EXEC mode. To disable debugging output, use the no form of this command.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Field Description
CDB Internal controller information.
Field Description
DSP (1/1) Allocated Slot and port of the DSP allocated for the COT
operation.
Received DSP Q Event Indicates the COT subsystem received an event from
the DSP.
DSP (1/1) Done Slot and port of the DSP transitioning to IDLE state.
DSP (1/1) De-allocated Slot and port of the DSP de-allocated after the
completion of the COT operation.
Field Description
COT Internal COT operation request.
Note Effective with Release 12.3(4)T, the debugcppevent command is no longer available in Cisco IOS 12.3(T)
releases.
To display general Combinet Proprietary Protocol (CPP) events, use the debugcppeventcommand in privileged
EXEC mode. The noform of this command disables debugging output.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines CPP allows a router to engage in negotiation over an ISDN B channel to establish connections with a Combinet
bridge.
The debugcppeventcommand displays events such as CPP sequencing, group creation, and keepalives.
Examples One or more of the messages in the table below appear when you use thedebugcppevent command. Each
message begins with the short name of the interface the event occurred on (for example, SERIAL0:1 or
BRI0:1) and might contain one or more packet sequence numbers or remote site names.
Message Description
BRI0:1: negotiation complete Call was set up on the interface (in this example,
BRI0:1).
BRI0:1: sending negotiation packet Negotiation packet was sent to set up the call.
Message Description
BRI0:1: out of sequence packet - got 10, range 1 8 Packet was received that was out of sequence. The
first number displayed in the message is the sequence
number received, and the following numbers are the
range of valid sequence numbers.
BRI0:1: Sequence timer expired - Lost 11 Trying Timer expired before the packet was received. The
sequence 12 first number displayed in the message is the sequence
number of the packet that was lost, and the second
number is the next sequence number.
BRI0:1: create cpp group ber19 destroyed cpp group Dialer group is created on the remote site (in this
ber19 example, ber19).
Related Commands
Command Description
debug cpp negotiation Displays CPP negotiation events.
Note Effective with Release 12.3(4)T, the debugcppnegotiation command is no longer available in Cisco IOS
12.3T releases.
To display Combinet Proprietary Protocol (CPP) negotiation events, use the debugcppnegotiationcommand
in privileged EXEC mode. The noform of this command disables debugging output.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines CPP allows a router to engage in negotiation over an ISDN B channel to establish connections with a Combinet
bridge.
The debugcppnegotiationcommand displays events such as the type of packet and packet size being sent.
Examples The following is sample output from the debugcppnegotiation command. In this example, a sample connection
is shown.
Field Description
BR0:1 (I) NEG packet - len 77 Interface name, packet type, and packet size.
Related Commands
Command Description
debug cot Displays information about the COT functionality.
Note Effective with Release 12.3(4)T, the debugcpppacketcommand is no longer available in Cisco IOS 12.3T
Releases.
To display Combinet Proprietary Protocol (CPP) packets, use the debugcpppacketcommand in privileged
EXEC mode. The noform of this command disables debugging output.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines CPP allows a router to engage in negotiation over an ISDN B channel to establish connections with a Combinet
bridge.
The debugcpppacketcommand displays the hexadecimal values of the packets.
Examples The following is sample output from the debugcpppacket command. This example shows the interface name,
packet type, packet size, and the hexadecimal values of the packet.
Related Commands
Command Description
debug cot Displays information about the COT functionality.
debug credentials
To set debugging on the credentials service that runs between the Cisco Unified Survivable Site Remote
Telephony (Cisco Unified SRST) router and Cisco CallManager, use the debugcredentials command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug credentials
no debug credentials
Usage Guidelines Use this command to monitor Cisco CallManager while it requests certificates from the Cisco Unified SRST
router.
Examples The following is sample output showing the credentials service that runs between the Cisco Unified SRST
router and Cisco CallManager. The credentials service provides Cisco CallManager with the certificate from
the Cisco Unified SRST router.
Field Description
Start TLS Handshake 1 10.5.43.174 4374 Indicates the beginning of the TLS handshake
between the secure SRST router and Cisco
CallManager. In this example, 1 indicates the socket,
10.5.43.174 is the IP address, and 4374 is the port of
Cisco CallManager.
Field Description
TLS Handshake completes Indicates that the TLS handshake has finished and
that the Cisco CallManager has received the secure
SRST device certificate.
Related Commands
Command Description
credentials (SRST) Provides the Cisco Unified SRST router certificate
to Cisco CallManager and enters credentials
configuration mode.
debug crm
To troubleshoot the Carrier Resource Manager (CRM), use the debugcrm command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug crm [all| default| detail| error [call [informational]| software [informational]]| function| inout]
no debug crm
Release Modification
12.3(8)T The all, default, detail, error, call, informational, software, function,
and inoutkeywords were added.
Usage Guidelines Disable console logging and use buffered logging before using the debugcrm command. Using the debugcrm
command generates a large volume of debugs, which can affect router performance.
Examples The following is sample output from the debugcrmall command for an incoming ISDN call on a trunk group:
01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update:
01:21:23: //-1/xxxxxxxxxxxx/CRM/print_event:
RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=Both
Capacity Update,
Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F
01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_call_update:
Increment the call count
CarrierID=2023, TrunkGroupLabel=2023
Update is for TrunkGroupLabel, Mask=0x00000001
01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_call_update:
IncomingVoiceCalls=1
Router#
01:21:48: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update:
01:21:48: //-1/xxxxxxxxxxxx/CRM/print_event:
RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=Both
Capacity Update,
Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F
01:22:13: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update:
01:22:13: //-1/xxxxxxxxxxxx/CRM/print_event:
RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=Both
Capacity Update,
Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F
Router#
01:22:18: //-1/xxxxxxxxxxxx/CRM/crm_call_update:
Decrement the call count
CarrierID=2023, TrunkGroupLabel=2023
Update is for TrunkGroupLabel, Mask=0x00000001
01:22:18: //-1/xxxxxxxxxxxx/CRM/crm_call_update:
IncomingVoiceCalls=0
The table below describes the significant fields shown in the display.
Field Description
//-1/xxxxxxxxxxxx/CRM/print_event: The format of this message is
//callid/GUID/CRM/function name:
CallEntry ID is -1. This indicates that the
CallEntry ID is unavailable.
GUID is xxxxxxxxxxxxxxxxx. This indicates
that the GUID is unavailable.
CRM is the module name.
Theprint_event:field shows that the CRM is
showing the print event function.
Related Commands
Command Description
max-calls Specifies the maximum number of calls the trunk
group can handle.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Examples The following example enables IPSec VPN SPA debugging for a Blade Failure Group:
Related Commands
Command Description
linecard-group feature card Assigns a group ID to a Blade Failure Group.
show crypto ace redundancy Displays information about a Blade Failure Group.
Examples The following example enables ACE Crypto engine congestion manager debugging:
Syntax Description isakmp | ipsec | ikev2 | engine | gdoi-group (Optional) One or more of these keywords can be
enabled to display debug messages for the specified
areas. If none of these keywords are entered, debug
messages for all crypto areas will be shown.
Command Default Debug messages that do not have context information to match any debug conditions (filters) will not be
printed.
12.2(18)SXD This command was integrated into Cisco IOS Release 12.2(18)SXD.
15.1(3)T This command was modified. The gdoi-group keyword was replaced
by the groupkeyword of thedebugcryptogdoiconditioncommand.
Cisco IOS XE Release 3.8S This command was integrated into Cisco IOS XE Release 3.8S.
Usage Guidelines After the debugcryptocondition command has been enabled, you can use the
debugcryptoconditionunmatched command to define whether the debug output is being printed when no
context information is available in the code to check against the debug filters. For example, if the crypto
engines connection-ID is the filter that the debug conditions are being checked against, the
debugcryptoconditionunmatched command displays debug messages in the early negotiation phase when
a connection-ID is unavailable to check against debug conditions.
Examples The following example shows how to enable debug messages for all crypto-related areas:
Related Commands
Command Description
debug crypto gdoi condition Defines conditional debug filters for GDOI.
show crypto debug-condition Displays crypto debug conditions that have already
been enabled in the router.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support in
a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Usage Guidelines You can use this command if a cTCP session fails to come up.
Examples The following example shows that debugging has been turned on for a cTCP session:
Related Commands
Command Description
crypto ctcp Configures cTCP encapsulation for Easy VPN.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use the debug crypto engine command to display information pertaining to the crypto engine, such as when
Cisco IOS software is performing encryption or decryption operations.
The crypto engine is the actual mechanism that performs encryption and decryption. A crypto engine can be
software or a hardware accelerator. Some platforms can have multiple crypto engines; therefore, the router
will have multiple hardware accelerators.
Examples The following is sample output from the debugcryptoengine command. The first sample output shows
messages from a router that successfully generates Rivest, Shamir, and Adelma (RSA) keys. The second
sample output shows messages from a router that decrypts the RSA key during Internet Key Exchange (IKE)
negotiation.
00:27:52:CryptoEngine0:CRYPTO_RSA_PRIV_ENCRYPT
00:27:53:CryptoEngine0:clear dh number for conn id 1
00:27:53:CryptoEngine0:generate hmac context for conn id 1
00:27:53:validate proposal 0
00:27:53:validate proposal request 0
00:27:54:CryptoEngine0:generate hmac context for conn id 1
00:27:54:CryptoEngine0:generate hmac context for conn id 1
00:27:54:ipsec allocate flow 0
00:27:54:ipsec allocate flow 0
Related Commands
Command Description
crypto key generate rsa Generates RSA key pairs.
Command Default The logging of commands sent from the VPN module driver to the VPN module hardware is disabled.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use the debugcryptoengineacceleratorlogscommand when encryption traffic is sent to the router and a
problem with the encryption module is suspected.
This command is intended only for Cisco TAC personnel to collect debugging information.
Examples The debugcryptoengineacceleratorlogs command uses a debug flag to log commands and associated
parameters sent from the VPN module driver to the VPN module hardware as follows:
Related Commands
Command Description
crypto engine accelerator Enables or disables the crypto engine accelerator if
it exists.
show crypto engine accelerator logs Prints information about the last 32 CGX Library
packet processing commands, and associated
parameters sent from the VPN module driver to the
VPN module hardware.
Command Description
show crypto engine accelerator sa-database Prints active (in-use) entries in the platform-specific
VPN module database.
show crypto engine configuration Displays the Cisco IOS crypto engine of your router.
Syntax Description init (Optional) Enables initial state (INIT state) debugging for an Application Control
Engine (ACE) appliance in Cisco VPN ISM.
tftp (Optional) Enables debugging for TFTP download or upload on the Cisco VPN
ISM.
Examples The following example shows how to enable initial state (INIT state) debugging.
Device# debug crypto engine ism-vpn init
INIT debugging is on
Related Commands
Command Description
debug crypto engine ism-vpn ssl Enables debugging for Cisco VPN ISM SSL.
Command Description
debug crypto engine ism-vpn traffic Enables debugging for Cisco VPN ISM traffic.
debug crypto engine ism-vpn traffic selector Enables debugging for specific traffic in a Cisco VPN
ISM.
show crypto engine accelerator statistic Displays IPsec encryption statistics and error counters
for the onboard hardware accelerator of a device, the
IPsec VPN SPA, or the Cisco VPN ISM.
Syntax Description context rule-number Enables debugging for a specific SSL depending on the rule or the session. The
session-id range for the rule number is from 1 to 10. The range for the session ID is 0 to
4294967294.
direction number Enables debugging for packets that are in the inbound or outbound direction.
The range for the direction number is from 0 to 3, where 0 indicates the inbound
and outbound direction, 1 indicates encryption , 2 indicates decryption, and 3
indicates exceptions.
Examples The following example shows how to enable debugging of rule 3 and context 1:
Device# debug crypto engine ism-vpn ssl context 3 1
ISM-VPN Enable rule 3, ctx: 1
Related Commands
Command Description
debug crypto engine ism-vpn Enables debugging for a Cisco VPN ISM.
debug crypto engine ism-vpn traffic Enables debugging for Cisco VPN ISM traffic.
debug crypto engine ism-vpn traffic selector Enables debugging for specific traffic in a Cisco VPN
ISM.
Command Description
show crypto engine accelerator statistic Displays IPsec encryption statistics and error counters
for the onboard hardware accelerator of a device, the
IPsec VPN SPA, or Cisco VPN ISM.
debug crypto engine ism-vpn traffic{all| detail| exception number| inbound| outbound| selective| vam}
no debug crypto engine ism-vpn traffic{all| detail| exception number| inbound| outbound| selective|
vam}
Syntax Description all Enables debugging for all traffic that flows to the Cisco VPN ISM.
detail Enables detailed debugging for all traffic that flows to the Cisco VPN ISM.
exception number Enables debugging for specified exceptions in the traffic. The range is from 0
to 54. 0 enables debugging for all exceptions.
selective Enables selective rules for the traffic on the Cisco VPN ISM.
vam Enables debugging for the Cisco VPN Acceleration Module (VAM) in the
Cisco VPN ISM.
Examples The following shows how to enable debugging for all exceptions in the traffic:
Device# debug crypto engine ism-vpn traffic exception 0
ISM-VPN Traffic Detail debugging is on
Related Commands
Command Description
debug crypto engine ism-vpn Enables debugging for a Cisco VPN ISM.
Command Description
debug crypto engine ism-vpn traffic selector Enables debugging for specific traffic in a Cisco VPN
ISM.
debug crypto engine ism-vpn ssl Enables debugging for Cisco VPN ISM SSL.
show crypto engine accelerator statistic Displays IPsec encryption statistics and error counters
for the onboard hardware accelerator of a device, the
IPsec VPN SPA, or the Cisco VPN ISM.
debug crypto engine ism-vpn traffic selector{ipv4| ipv6}{disable rule-number| enable rule-number
source-ip-address source-address-mask destination-ip-address destination-address-mask protocols}
no debug crypto engine ism-vpn traffic selector{ipv4| ipv6}{disable rule-number| enable rule-number
source-ip-address source-address-mask destination-ip-address destination-address-mask protocols}
source-ip-address source-address-mask Source IP address and network mask of the traffic for which
rules must be enabled or disabled.
destination-ip-address destination-address-mask Destination IP address and network mask of the traffic for
which rules must be enabled or disabled.
Command Default Cisco VPN ISM selective traffic debugging is not enabled.
Examples The following example shows how to enable the debugging of rule 0 for all protocols from source address
10.0.0.1 255.255.255.0 and destination address 10.0.0.2 255.255.255.0:
Device# debug crypto engine ism-vpn traffic selector enable 0 10.0.0.1 255.255.255.0 10.0.0.2
255.255.255.0 1
ISM-VPN Enable rule 0, s: 10.0.0.1 d: 10.0.0.2 p: 1
Related Commands
Command Description
debug crypto engine ism-vpn Enables debugging for a Cisco VPN ISM.
debug crypto engine ism-vpn traffic Enables debugging for Cisco VPN ISM traffic.
debug crypto engine ism-vpn ssl Enables debugging for Cisco VPN ISM SSL.
show crypto engine accelerator statistic Displays IPsec encryption statistics and error counters
for the onboard hardware accelerator of a device, the
IPsec VPN SPA, or Cisco VPN ISM.
Syntax Description isakmp Debug messages are shown for Internet Key Exchange
(IKE)-related error operations only.
12.2(18)SXD This command was integrated into Cisco IOS Release 12.2(!8)SXD.
Usage Guidelines Thedebugcryptoerrorcommand will display only error-related debug messages; that is, an error debug will
not be shown if the operation is functioning properly.
This command should be used when debug conditions cannot be determined; for example, enable this command
when a random, small subset of IKE peers is failing negotiation.
Note The global crypto command-line interfaces (CLIs) (the debugcryptoisakmp, debugcryptoipsec, and
debugcryptoengine commands) will override the debugcryptoerror command. Thus, this command
should not be used in conjunction with the global CLIs because you may overwhelm the router.
Note Debug message filtering for crypto hardware engines is not supported.
Examples The following example shows how to enable IPSec-related error messages:
debug crypto gdoi [all-features [all-levels]| detail| error| event| gm| infrastructure| ks [acls| coop]| packet|
replay| terse]
no debug crypto gdoi [all-features [all-levels]| detail| error| event| gm| infrastructure| ks [acls| coop]|
packet| replay| terse]
Syntax Description all-features (Optional) Displays debug data for all features in
GDOI. This consists of rekey, cooperative key server,
replay, and registration information (for KSs) and
rekey, registration, and replay information (for GMs).
12.4(11)T The detail, error, event, gm, infrastructure, ks, coop, packet, replay,
andtersekeywords were added.
Cisco IOS XE Release 2.3 This command was integrated into Cisco IOS XE Release 2.3.
15.1(3)T This command was modified. The acls and replay keywords were
removed. The all-features and all-levels keywords were added.
Cisco IOS XE Release 3.8S This command was modified. The acls and replay keywords were
removed. The all-features and all-levels keywords were added.
Usage Guidelines Using this command displays various GDOI debugs. For debugging information for cooperative key servers,
use the debugcryptogdoikscoop command.
If you do not specify a feature (using the all-features, registration, rekey, replay, coop, or infrastructure
keywords), then messages for all features are displayed. If you do not specify a level (using the detail, error,
event, packet, and terse keywords), then the terse level (which also includes the error level) is used.
You can use this command in conjunction with the debugcryptogdoiconditioncommand. When these two
commands are used together, only those messages that pass through any debug level or feature (specified by
the debugcryptogdoicommand) and pass through any condition (specified by the
debugcryptogdoiconditioncommand) are displayed.
Examples The following example shows group member registration debug output:
debug crypto gdoi condition {[group group-name] [peer {address ipv4 ipv4-address-of-peer| hostname
ipv4 ipv4-hostname}]| reset| unmatched}
no debug crypto gdoi condition {[group group-name] [peer {address ipv4 ipv4-address-of-peer| hostname
ipv4 ipv4-hostname}]| reset| unmatched}
Syntax Description group group-name (Optional) Displays information for a specific group.
Cisco IOS XE Release 3.8S This command was integrated into Cisco IOS XE Release 3.8S.
Usage Guidelines This command lets you filter the number of debug messages to make it easier to identify the problem of a
particular group member (GM). This command is useful when many (such as thousands of) GMs are registered
to a key server on which debugging is enabled.
You can use this command in conjunction with the debugcryptogdoicommand. When these two commands
are used together, only those messages that pass through any debug level or feature (specified by the
Examples The following example shows how to configure a conditional filter for a GDOI group named group1:
Related Commands
Command Description
debug crypto condition Defines conditional debug filters for IP Security
(IPSec) tunnels.
debug crypto ha
To display crypto high availability debugging information, use the debugcryptohacommand in privileged
EXEC mode. To disable debugging messages, use the no form of this command.
debug crypto ha
no debug crypto ha
Examples The following example is sample output from the debugcryptoha command:
Active router:
Router# show debug
Cryptographic Subsystem:
Crypto High Availability Manager debugging is on
vrf-lite-R1#
*Sep 28 21:27:50.899:Sending IKE Add SA Message
*Sep 28 21:27:50.899:HA Message 0:flags=0x01 len=394 HA_IKE_MSG_ADD_SA (2)
*Sep 28 21:27:50.899: ID:04000003
*Sep 28 21:27:50.899: attr HA_IKE_ATT_MY_COOKIE (2) len 8
*Sep 28 21:27:50.899: 9B 1A 76 AA 99 11 1A 1F
*Sep 28 21:27:50.899: attr HA_IKE_ATT_HIS_COOKIE (3) len 8
*Sep 28 21:27:50.899: E2 A2 A3 5F 53 1D EA 15
*Sep 28 21:27:50.899: attr HA_IKE_ATT_SRC (4) len 4
*Sep 28 21:27:50.899: 04 00 00 05
*Sep 28 21:27:50.899: attr HA_IKE_ATT_DST (5) len 4
*Sep 28 21:27:50.899: 04 00 00 03
*Sep 28 21:27:50.899: attr HA_IKE_ATT_PEER_PORT (6) len 2
*Sep 28 21:27:50.899: 01 F4
*Sep 28 21:27:50.899: attr HA_IKE_ATT_F_VRF (7) len 1
*Sep 28 21:27:50.899: 00
*Sep 28 21:27:50.899: attr HA_IKE_ATT_INIT_OR_RESP (8) len 1
*Sep 28 21:27:50.899: 00
*Sep 28 21:27:50.899: attr HA_IKE_ATT_NAT_DISCOVERY (9) len 1
*Sep 28 21:27:50.899: 02
*Sep 28 21:27:50.899: attr HA_IKE_ATT_IDTYPE (38) len 1
*Sep 28 21:27:50.899: 01
*Sep 28 21:27:50.899: attr HA_IKE_ATT_PROTOCOL (39) len 1
*Sep 28 21:27:50.899: 11
*Sep 28 21:27:50.899: attr HA_IKE_ATT_PORT (40) len 2
*Sep 28 21:27:50.899: 01 F4
*Sep 28 21:27:50.899: attr HA_IKE_ATT_ADDR (41) len 4
*Sep 28 21:27:50.899: 04 00 00 05
*Sep 28 21:27:50.899: attr HA_IKE_ATT_MASK (42) len 4
*Sep 28 21:27:50.899: 00 00 00 00
Related Commands
Command Description
debug crypto ipsec ha Enables debugging messages for IPSec high
availability.
Cisco IOS XE Release 2.1 This command was introduced on Cisco ASR 1000 Series Routers.
Usage Guidelines Use this command to display IPSec events while setting up or removing policy definitions during OSPF
configuration.
Examples The following example enables the display of IPSec events for IPv6 networks:
Related Commands
Command Description
debug crypto engine Displays debugging messages about crypto engines,
which perform encryption and decryption.
debug crypto ipv6 packet Displays debug messages for IPv6 packets allowing
you to see the contents of packets outbound from a
Cisco router when the remote node is not a Cisco
node.
debug crypto socket Displays communication between the client and IPSec
during policy setup and removal processes.
Command Description
debug ipv6 ospf authentication Displays the interaction between OSPF and IPSec,
including creation or removal of policies.
Cisco IOS XE Release 2.1 This command was introduced on Cisco ASR 1000 Series Routers.
Usage Guidelines Consult Cisco Technical Support before using this command.
Use this command to display the contents of IPv6 packets. This command is useful when the remote node is
not a Cisco device and communication between the Cisco and non-Cisco router cannot be established. This
command enables you to look at the contents of the packets outbound from the Cisco router.
This command examines the content of every IPv6 packet and may slow network performance.
Examples This example shows the ouptut of each packet when the debug crypto ipv6 packet command is enabled:
Related Commands
Command Description
debug crypto engine Displays debugging messages about crypto engines,
which perform encryption and decryption.
debug crypto ipv6 ipsec Displays IPSec events for IPv6 networks.
debug crypto socket Displays communication between the client and IPSec
during policy setup and removal processes.
Cisco IOS XE Release 3.3S This command was integrated into Cisco IOS XE Release 3.3S.
Usage Guidelines Use this command to enable IKEv2 debug messages. IKEv2 uses following debug levels.
Level 1--error
Level 2--terse
Level 3--event
Level 4--packet
Level 5--detail
Note Level 1 is the lowest level and is least verbose and level 5 is highest level. Enabling debug at a higher
level enables debug at all lower levels. You can selectively disable a debug level and enable conditional
debug using the debugcryptocondition command.
Examples The following example shows that the IKEv2 debugging is enabled:
Related Commands
Command Description
debug crypto condition Enables conditional debugging.
Cisco IOS XE Release 2.6 This command was integrated into Cisco IOS XE Release 2.6.
Examples The following is sample output from the debugcryptoipsec command. In this example, security associations
(SAs) have been successfully established.
00:24:30: IPSEC(sa_request): ,
(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,
src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 120s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
00:24:30: IPSEC(sa_request): ,
(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,
src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1).,
protocol= AH, transform= ah-sha-hmac ,
lifedur= 120s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0.
Internet Key Exchange (IKE) prompts for Service Provider Interfaces (SPIs) from IPsec. For inbound security
associations, IPsec controls its own SPI space.
IKE will verify whether IPsec accepts the SA proposal. In this example, it is the SA proposal sent by the local
IPsec that is accepted first.
00:24:35: IPSEC(initialize_sas): ,
(key eng. msg.) dest= 172.21.114.123, src= 172.21.114.67,
dest_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
src_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 120s and 4608000 kb,
spi= 0x120F043C(302974012), conn_id= 29, keysize= 0, flags= 0x4
The following output pertains to the outbound SA:
00:24:35: IPSEC(initialize_sas): ,
(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,
src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),
dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 120s and 4608000kb,
spi= 0x38914A4(59315364), conn_id= 30, keysize= 0, flags= 0x4
IPsec then installs the SA information into its SA database.
IKE does the remaining processing, completing the negotiation and generating keys. IKE then notifies IPsec
about the new SAs.
00:26:15: IPSEC(initialize_sas): ,
(key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123,
dest_proxy= 172.21.114.67/0.0.0.0/0/0 (type=1),
src_proxy= 172.21.114.123/0.0.0.0/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 120s and 4608000kb,
spi= 0x38914A4(59315364), conn_id= 25, keysize= 0, flags= 0x4
The following output pertains to the outbound SA:
00:26:15: IPSEC(initialize_sas): ,
(key eng. msg.) src= 172.21.114.67, dest= 172.21.114.123,
src_proxy= 172.21.114.67/0.0.0.0/0/0 (type=1),
dest_proxy= 172.21.114.123/0.0.0.0/0/0 (type=1),
protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 120s and 4608000kb,
spi= 0x120F043C(302974012), conn_id= 26, keysize= 0, flags= 0x4
IPsec then installs the SA information into its SA database:
12.2(13)T This command was integrated into Cisco IOS Release 12.2(13)T.
12.3(4)T This command was expanded to support the Easy VPN Remote feature.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX This command is supported in the Cisco IOS 12.2SX family of releases. Support
in a specific 12.2SX release is dependent on your feature set, platform, and
platform hardware.
Usage Guidelines To force the Voice DSP Contol Message Logger to reestablish the virtual private network (VPN) connections,
use the clearcryptosaandclearcryptoisakmp commands to delete the IPSec security associations and Internet
Key Exchange (IKE) connections, respectively.
Examples The following example shows debugging messages when the Voice DSP Contol Message Logger is turned
on and typical debugging messages that appear when the VPN tunnel is created:
EzVPN debugging is on
router#
00:02:28: EZVPN(hw1): Current State: IPSEC_ACTIVE
Related Commands
Command Description
debug crypto ipsec Displays debugging messages for generic IPSec
events.
Examples The following example is sample output of the debugcryptoipsecha command for both the active and stanby
router:
Active Router
Router# debug crypto ipsec ha
Active Router
*Sep 29 17:05:48.803:IPSec HA (crypto_ha_ipsec_mgr_set_state_common):called for vip 4.0.0.3
*Sep 29 17:06:11.655:IPSec HA (crypto_ha_ipsec_mgr_bulk_sync_sas):Bulk sync request from
standby for local addr 4.0.0.3
*Sep 29 17:06:44.059:IPSec HA (crypto_ha_ipsec_notify_add_sa):called
Active Router
*Sep 29 17:27:30.839:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num
1000 last-sent 0 dir inbound
*Sep 29 17:27:30.839:IPSec HA(create_update_struct):Sending inbound update
*Sep 29 17:27:30.839:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0
Inbound - New KB 3998772, New replay 1000
*Sep 29 17:29:30.883:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num
2000 last-sent 1000 dir inbound
*Sep 29 17:29:30.883:IPSec HA(create_update_struct):Sending inbound update
*Sep 29 17:29:30.883:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0
Inbound - New KB 3998624, New replay 2000
*Sep 29 17:30:30.899:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num
3000 last-sent 2000 dir inbound
*Sep 29 17:30:30.899:IPSec HA(create_update_struct):Sending inbound update
*Sep 29 17:30:30.899:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0
Inbound - New KB 3998476, New replay 3000
*Sep 29 17:32:30.943:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num
4000 last-sent 3000 dir inbound
*Sep 29 17:32:30.943:IPSec HA(create_update_struct):Sending inbound update
*Sep 29 17:32:30.943:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0
Inbound - New KB 3998327, New replay 4000
Standby Router
*Sep 29 17:27:28.887:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called
*Sep 29 17:27:28.887:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =
4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998772,
NEW REPLAY WINDOW START = 1000,
*Sep 29 17:29:28.915:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called
*Sep 29 17:29:28.915:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =
4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998624,
NEW REPLAY WINDOW START = 2000,
*Sep 29 17:30:28.939:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called
*Sep 29 17:30:28.939:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =
4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998476,
NEW REPLAY WINDOW START = 3000,
*Sep 29 17:32:28.955:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called
*Sep 29 17:32:28.955:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =
4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998327,
NEW REPLAY WINDOW START = 4000,
Related Commands
Command Description
debug crypto ha Displays crypto high availability debugging
information.
Command Description
debug crypto isakmp ha Enables debugging messages for ISAKMP high
availability.
12.2(18)SXD This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Cisco IOS XE Release 2.6 This command was integrated into Cisco IOS XE Release 2.6.
15.3(2)T This command was modified. The kmi number keyword-argument pair
was added.
Usage Guidelines IKE is a key management protocol standard that is used in conjunction with the IPsec to configure basic IPsec
VPNs. IPsec can be configured without IKE, but IKE enhances IPsec by providing additional features,
flexibility, and ease of configuration for the IPsec standard. IKE is a hybrid protocol that implements the
Oakley key exchange and Skeme key exchange inside the Internet Security Association and Key Management
Protocol (ISAKMP) framework.
The debug crypto isakmp kmi command must be enabled prior to any traffic that triggers sessions. This
command enables capturing KMI sequence events along with timestamps for a particular IKE security
association (SA) and corresponding IPsec SA. The number argument denotes the number of KMI messages
to be captured. The KMI sequence is displayed in the output of the show crypto isakmp peers detail command.
Examples The following is sample output from the debug crypto isakmp command for an IKE peer that initiates an
IKE negotiation:
IKE negotiates its own SA.
When IKE finds a matching policy, each peer in the network uses the IKE SA to authenticate another peer.
Next, IKE negotiates to set up the IPsec SA by searching for a matching transform set.
After finding a matching IPsec transform set for the two peers, an IPsec SA is created (one SA is created for
each direction).
The following is sample output from the debug crypto isakmp command using the aaa keyword:
The following example shows how to set the KMI sequence for a value of 10. The KMI sequence is displayed
in the output of the show crypto isakmp peers detail command.
Related Commands
Command Description
crypto isakmp profile Defines an ISAKMP profile and audits IPsec user
sessions.
crypto map (global IPsec) Enters crypto map configuration mode and creates or
modifies a crypto map entry, creates a crypto profile
that provides a template for configuration of a
dynamically created crypto map, or configures a client
accounting list.
Examples The following is sample output for a standby router from the debugcryptoisakmphacommand:
Active Router
no debug message
Standby Router
Router# debug crypto isakmp ha
Active Router
Router# debug crypto isakmp ha detail
Related Commands
Command Description
debug crypto ha Displays crypto high availability debugging
information.
Usage Guidelines Encryption and authentication are provided by a software service on the router called a cryptoengine. The
crypto engine performs authentication through DSS public and private keys when a connection is set up. DSS
is a means of sending a "signature" at the end of a message that positively identifies the author of the message.
The signature cannot be forged or duplicated by others, so whoever received a message with a DSS signature
knows exactly who sent the message.
If the process of exchanging DSS public keys with a peer router by means of the configcryptokey-exchange
command is not successful, try to exchange DSS public keys again after enabling the
debugcryptokey-exchange command to help you diagnose the problem.
Examples The following is sample output from the debugcryptokey-exchange command. The first shows output from
the initiating router in a key exchange. The second shows output from the passive router in a key exchange.
The number of bytes received should match the number of bytes sent from the initiating side, although the
number of messages can be different.
Related Commands
Command Description
debug crypto sesmgmt Displays connection setup messages and their flow
through the router.
12.2(4)T This command was integrated into Cisco IOS Release 12.2(4)T.
Examples The following example shows IPsec MIB debug message notification being enabled:
Related Commands
Command Description
show crypto mib ipsec flowmib history failure size Displays the size of the IPSec failure history table.
show crypto mib ipsec flowmib history tunnel size Displays the size of the IPSec tunnel history table.
show crypto mib ipsec flowmib version Displays the IPSec Flow MIB version used by the
router.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The debug crypto pki messages command displays messages about the actual data being sent and received
during public key infrastructure (PKI) transactions. This command is internal for use by Cisco support
personnel.
You can use the show crypto ca certificates command to display information about your certificate.
00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 07 03 A0 80 30 80 02 01 00
00:48:23:31 80 30 82 01 0F 02 01 00 30 78 30 6A 31 0B 30 09 06 03 55
00:48:23:04 06 13 02 55 53 31 0B 30 09 06 03 55 04 08 13 02 43 41 31
00:48:23:13 30 11 06 03 55 04 07 13 0A 53 61 6E 74 61 20 43 72 75 7A
00:48:23:31 15 30 13 06 03 55 04 0A 13 0C 43 69 73 63 6F 20 53 79 73
00:48:23:74 65 6D 31 0E 30 0C 06 03 55 04 0B 13 05 49 50 49 53 55 31
00:48:23:Signed Data 1382 bytes
00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 07 02 A0 80 30 80 02 01 01
00:48:23:31 0E 30 0C 06 08 2A 86 48 86 F7 0D 02 05 05 00 30 80 06 09
00:48:23:2A 86 48 86 F7 0D 01 07 01 A0 80 24 80 04 82 02 75 30 80 06
00:48:23:02 55 53 31 0B 30 09 06 03 55 04 08 13 02 43 41 31 13 30 11
00:48:23:33 34 5A 17 0D 31 30 31 31 31 35 31 38 35 34 33 34 5A 30 22
00:48:23:31 20 30 1E 06 09 2A 86 48 86 F7 0D 01 09 02 16 11 70 6B 69
00:48:23:2D 33 36 61 2E 63 69 73 63 6F 2E 63 6F 6D 30 5C 30 0D 06 09
00:48:23:2A 86 48 86 F7 0D 01 01 01 05 00 03 4B 00 30 48 02 41 00 DD
00:48:23:2C C6 35 A5 3F 0F 97 6C 11 E2 81 95 01 6A 80 34 25 10 C4 5F
00:48:23:3D 8B 33 1C 19 50 FD 91 6C 2D 65 4C B6 A6 B0 02 1C B2 84 C1
00:48:23:86 F7 0D 01 01 01 05 00 04 40 C6 24 36 D6 D5 A6 92 80 5D E5
00:48:23:15 F7 3E 15 6D 71 E1 D0 13 2B 14 64 1B 0C 0F 96 BF F9 2E 05
00:48:23:EF C2 D6 CB 91 39 19 F8 44 68 0E C5 B5 84 18 8B 2D A4 B1 CD
00:48:23:3F EC C6 04 A5 D9 7C B1 56 47 3F 5B D4 93 00 00 00 00 00 00
00:48:23:00 00
00:48:24:Received pki message:1778 types
.
.
.
Related Commands
Command Description
crypto ca enroll Obtains the certificate of your router from the CA.
debug crypto pki transactions Displays debugging messages for the trace of
interaction (message type) between the CA and the
router.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following example shows how to enable debugging for a certificate server. This example also contains
sample debug messages, which allow users to troubleshoot the various certificate-request-related stages and
tasks that are handled by the certificate server.
SCEP_WRTE_DB_8
Oct 15 19:50:59.531:CRYPTO_CS:write SCEP:unregistered and unbound
service SCEP_WRTE_DB_8
.....
Oct 15 19:53:08.403:CRYPTO_CS:CS_RA_REQUEST:save cert in dbase,
pending id = 2
Oct 15 19:53:08.403:CRYPTO_CS:enrollment request 2 granted
Oct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed for
trustpoint ra.
Oct 15 19:53:08.403:%CRYPTO-6-CERTRET:Certificate received from
Certificate Authority
Oct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed for
trustpoint ra.
Oct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed for
trustpoint ra.
Oct 15 19:53:08.407:CRYPTO_PKI:All enrollment requests completed for
trustpoint ra.
Oct 15 19:53:19.623:IPSEC(key_engine):major = 1
Oct 15 19:53:19.623:IPSEC(key_engine):expired_timer:skip ...
Oct 15 19:53:35.707:CRYPTO_CS:received a SCEP request
Oct 15 19:53:35.711:CRYPTO_CS:read SCEP:registered and bound service
SCEP_READ_DB_14
Oct 15 19:53:35.859:CRYPTO_CS:scep msg type - 20
Oct 15 19:53:35.859:CRYPTO_CS:trans id -
4D774FFE2F7CA9991A7F6A785E803E77
Oct 15 19:53:36.591:CRYPTO_CS:read SCEP:unregistered and unbound
service SCEP_READ_DB_14
Oct 15 19:53:36.595:CRYPTO_CS:received an enrollment request
Oct 15 19:53:36.595:CRYPTO_CS:write SCEP:registered and bound service
SCEP_WRTE_DB_14
Oct 15 19:53:37.623:CRYPTO_CS:write SCEP:unregistered and unbound
service SCEP_WRTE_DB_14
Oct 15 19:53:37.631:CRYPTO_CS:Certificate sent to requestor
Related Commands
Command Description
crypto pki server Enables a Cisco IOS certificate server and enters
certificate server configuration mode.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use the debug crypto pki transactions command to display debugging messages pertaining to public key
infrastructure (PKI) certificates. The messages will show status information during certificate enrollment and
verification.
You can also use the show crypto ca certificates command to display information about your certificate.
Examples The following example, which authenticates and enrolls a CA, contains sample output for the
debugcryptopkitransactionscommand:
certificate status
Related Commands
Command Description
crypto ca authenticate Authenticates the CA (by getting the certificate of the
CA).
crypto ca enroll Obtains the certificate of your router from the CA.
debug crypto pki messages Displays debugging messages for details of the
interaction (message dump) between the CA and the
router.
Usage Guidelines For more detailed information about authentication, authorization, and accounting (AAA), use the
debugaaaauthorization command.
Examples The following is sample output from the debugcryptoprovisioningcommand. The output includes explanations
of the process.
Related Commands
Command Description
authentication list (tti-registrar) Authenticates the introducer in an SDP operation.
authorization list (tti-registrar) Specifies the appropriate authorized fields for the
certificate subject name and list of template variables
to be expanded into the Cisco IOS CLI snippet that
is sent back to the petitioner in an SDP operation.
Usage Guidelines Encryption and authentication are provided by a software service on the router called a cryptoengine. The
crypto engine performs authentication through Digital Signature Standard (DSS) public and private keys when
a connection is set up. DSS is a means of sending a "signature" at the end of a message that positively identifies
the author of the message. The signature cannot be forged or duplicated by others, so whoever receives a
message with a DSS signature knows exactly who sent the message.
When connections are not completing, use the debugcryptosesmgmt command to follow the progress of
connection messages as a first step in diagnosing the problem. You see a record of each connection message
as the router discovers it, and can track its progress through the necessary signing, verifying, and encryption
session setup operations. Other significant connection setup events, such as the pregeneration of Diffie-Hellman
public numbers, are also shown. For information on Diffie-Hellman public numbers, refer to the Cisco IOS
Security Configuration Guide .
Also use the showcryptoconnections command to display additional information on connections.
Examples The following is sample output from the debugcryptosesmgmt command. The first shows messages from a
router that initiates a successful connection. The second shows messages from a router that receives a
connection.
Related Commands
Command Description
debug crypto key-exchange Displays DSS public key exchange messages.
Syntax Description slot | dspm | dsp | dsp-channel (Optional) Identifies the location of a particular digital
signal processor (DSP) channel.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Usage Guidelines The debugcsmneatcommand turns on debugging for all CSM VoIP calls. If no arguments are specified,
debugging is enabled for all voice calls.
Note The debugcsmneat command does not display any information if you try to debug ISDN voice calls. To
view debugging information about ISDN calls, use the debugcdapi command.
The nodebugcmsneat command turns off debugging information for all voice calls.
If the slot,dspm,dsp,ordsp-channel arguments are specified (if the specified DSP channel is engaged in a CSM
call), CSM call-related debugging information is turned on for this channel. The noform of this command
turns off debugging for that particular channel.
Examples The following examples show sample output from the debugcsmneat command. The following shows that
CSM has received an event from ISDN.
Field Description
dchan_idb Indicates the address of the hardware interface
description block (IDB) for the D channel.
The following example shows that CSM has allocated the CSM voice control block for the DSP device on
slot 1 port 10 for this call.
The following example shows that the function csm_vtsp_init_tdm() has been called with a voice control
block of address 0x60B8562C. This function will be called only when the call is treated as a voice call.
Field Description
TDM slot 1, dspm 2, dsp 5, dsp_channel 1 Indicates the physical DSP channel that will be used
for this call.
TDM stream 5, channel 9, bank 0, bp_channel 10 Indicates the on-chip and backplane TDM channel
assigned to this DSP channel. Stream 5, channel 9
gives the on-chip TDM channel mapped to the DSP;
bank 0, bp_channel 10 means that the backplane
stream 0 and backplane channel #1 are assigned to
this DSP.
The following shows that CSM received an incoming call event from ISDN:
The following shows that CSM received a SETUP INDICATION RESPONSE message from the VTSP as
an acknowledgment.
This means that the VTSP received the CALL SETUP INDICATION message previously sent and has
proceeded to process the call.
vdev_info--Contains the address of the CSM voice data block.
vtsp_cdb--Contains the address of the VTSP call control block.
The following shows that CSM received a CALL CONNECT message from the VTSP:
The following shows that while CSM is in the CSM_IC2_RING state, it receives a SETUP INDICATION
RESPONSE from the VTSP. This message is translated into CSM_EVENT_MODEM_OFFHOOK and passed
to the CSM central state machine.
The following shows that the physical DSP channel has been allocated for this outgoing call:
to the DSP; bank 0, bp_channel 27 means that the backplane stream 0 and backplane channel 1 are assigned
to this DSP.
The following shows the calling number and the called number for this call.
The following shows that CSM has received a CALL PROCEEDING message from ISDN.
ISDN has assigned a B channel for this outgoing call. This B channel must be on the same PRI span as the
signalling D channel allocated previously.
The following shows that the csm_vtsp_setup_for_oc function is called:
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Disable console logging and use buffered logging before using the debug csm tgrm command. Using the
debug csm tgrm command generates a large volume of debugs, which can affect router performance.
Examples The following is sample output from the debug csm tgrm command. The output shows that the call type is
voice, the direction is incoming, and the call is accepted by the CSM.
Router#
00:02:25:CSM-TGRM:csm_rx_cas_event_from_neat(EVENT_DIAL_IN) - c(T1 7/1:1:3) call_type=VOICE,
dir=INCOMING
Router#
00:02:30:CSM-TGRM:csm_proc_ic3_wait_for_res_resp() c(T1 7/1:1:3) VOICE <ACCEPTED !!>
The table below describes the significant fields shown in the display.
Field Description
call_type Type of call: VOICE or MODEM.
Syntax Description slot | dspm | dsp | dsp-channel (Optional) Identifies the location of a particular digital
signal processor (DSP) channel.
Usage Guidelines The debugcsmvoicecommand turns on debugging for all CSM VoIP calls. If this command has no keyword
specified, then debugging is enabled for all voice calls.
Note The debugcsmvoice command does not display any information if you try to debug isdn voice calls. To
view debugging information about isdn calls, use the debugcdapi command.
The nodebugcmsvoice command turns off debugging information for all voice calls.
If the slot|dspm|dsp|dsp-channel argument is specified, then (if the specified DSP channel is engaged in a
CSM call) CSM call-related debugging information will be turned on for this channel. The noform of this
command turns off debugging for that particular channel.
Examples The following examples show sample output from the debugcsmvoice command. The following shows that
CSM has received an event from ISDN.
The following shows that CSM has allocated the CSM voice control block for the DSP device on slot 1 port
10 for this call.
The following shows that the function csm_vtsp_init_tdm() has been called with a voice control block of
address 0x60B8562C. This function will be called only when the call is treated as a voice call.
TDM stream 5, channel 9, bank 0, bp_channel 10--Indicates the on-chip and backplane TDM channel
assigned to this DSP channel. Stream 5, channel 9 gives the on-chip TDM channel mapped to the DSP;
bank 0, bp_channel 10 means that the backplane stream 0 and backplane channel #1 are assigned to this
DSP.
The following shows that CSM has received an incoming call event from ISDN:
The following shows that CSM has received a CALL CONNECT message from the VTSP:
The following shows that while CSM is in the CSM_IC2_RING state, it receives a SETUP INDICATION
RESPONSE from the VTSP. This message is translated into CSM_EVENT_MODEM_OFFHOOK and passed
to the CSM central state machine.
The following shows that CSM has translated the CONNECT event from ISDN into the
CSM_EVENT_ISDN_CONNECTED message, which is then passed to the CSM central state machine:
The following shows that the physical DSP channel has been allocated for this outgoing call:
In the case of voice calls, the free signaling D channel must match the voice interface specified inside the
signalling data block (vtsp_sdb) passed from the VTSP.
The following shows that CSM has received an event from ISDN:
The following shows that CSM has received a CALL PROCEEDING message from ISDN.
debug ctl-client
To collect debug information about the CTL client, use the debugctl-client command in privileged EXEC
configuration mode. To disable collection of debug information, use the no form of this command.
debug ctl-client
no debug ctl-client
12.4(9)T This command was integrated into Cisco IOS Release 12.4(9)T.
Usage Guidelines This command is used with Cisco Unified CME phone authentication.
Examples The following example shows debug messages for the CTL client:
debug ctunnel
To display debugging messages for the IP over a Connectionless Network Service (CLNS) Tunnel feature,
use the debugctunnel command in privileged EXEC mode. To disable debugging messages, use the no form
of this command.
debug ctunnel
no debug ctunnel
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples As packets are sent over the virtual interface, the following type of output will appear on the console when
the debugctunnel command is used:
debug custom-queue
To enable custom queueing output, use the debugcustom-queue command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
debug custom-queue
no debug custom-queue
Related Commands
Command Description
debug priority Enables priority queueing output.
debug cwmp
To debug the TR-069 Agent, use the debugcwmp command in privileged EXEC mode. To disable, use the
no form of this command.
debug dampening
To display debug trace information messages for interface dampening, use the debugdampening command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
Syntax Description all (Optional) Enables trace debugging for all dampening
features.
12.2(13)T This command was integrated into Cisco IOS Release 12.2(13)T.
12.2(14)S This command was integrated into Cisco IOS Release 12.2(14)S.
12.2(18)SXD This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(31)SB2 This command was integrated into Cisco IOS Release 12.2(31)SB2.
Examples The following sample output is similar to the output that will be displayed when the debugdampening
command is entered with the interface keyword. The sample output shows the following information:
Ethernet interface 1/1 is configured with the IP Event Dampening feature. The half-life period is set to
30 seconds, the reuse threshold to 500, the suppress threshold to 1000, and the restart penalty to 90.
The shutdown command and then the noshutdown command was entered on Ethernet interface 1/1.
The interface was suppressed and then reused by the IP Event Dampening feature.
Field Description
... Routing reports state transition from UP to DOWN Displays the status of the specified interface from the
perspective of the specified protocol. Interface state
changes are displayed. The interface is specified
within parentheses. The protocol is specified at the
beginning of the message.
charge penalty 1000, new accum. penalty 1000, flap Displays the penalty assigned to the flapping interface
count 1 and amount of penalty that is added to the
accumulated penalty. The interface flap count is also
displayed.
accum. penalty 1000, now suppressed with a reuse Displays the status of the interface, accumulated
intervals of 30 penalty, and configured reuse threshold.
update CLNS Routing state to DOWN, interface is Displays the status of the specified interface. Interface
suppressed state changes and suppression status are displayed.
accum. penalty decayed to 1000 after 0 second(s) Displays the decay rate of the accumulated penalty.
debug data-store
To display persistant storage device (PSD)-related debugging messages for the gateway GPRS support node
(GGSN), use the debugdata-storecommand in privileged EXEC mode. To disable debugging output, use the
no form of this command.
debug data-store
no debug data-store
12.4(2)XB This command was integrated into Cisco IOS Release 12.4(2)XB.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
Usage Guidelines This command displays PSD-related debugging messages for the GGSN.
Caution Because debugging output is assigned high priority in the CPU process, it can render the system unusable.
For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting
sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods
of lower network flows and fewer users. Debugging during these periods reduces the effect these commands
have on other users on the system.
Examples The following example configures a debugging session to check PSD-related parameters:
12.4(2)XB This command was integrated into Cisco IOS Release 12.4(2)XB.
12.4(15)T This command was integrated into Cisco IOS Release 12.4(15)T.
Usage Guidelines This command displays PSD-related debugging messages for the GGSN.
Caution Because debugging output is assigned high priority in the CPU process, it can render the system unusable.
For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting
sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods
of lower network flows and fewer users. Debugging during these periods reduces the effect these commands
have on other users on the system.
Related Commands
Command Description
auto-retrieve Configures the GGSN to automatically initiate a
retrieval of G-CDRs from PSDs defined in a PSD
server group.
show data-store Displays the status of the PSD client and PSD
server-related information.
Usage Guidelines The debugdbconnall command displays debug output for Advanced Program-to-Program Communication
(APPC), Database Connection configuration, Distributed Relational Database Architecture (DRDA), error
messages, event traces, and TCP. The Database Connection debug flags are appc, config, drda, event, and
tcp.
Examples See the sample output provided for the debug dbconn appc , debug dbconn config , debug dbconn drda
, debug dbconn event , and debug dbconn tcp commands.
Related Commands
Command Description
debug dbconn appc Displays APPC-related trace or error messages.
debug dbconn drda Displays error messages and stream traces for DRDA.
debug dbconn event Displays trace or error messages for CTRC events
related to DB2 communications.
debug dbconn tcp Displays error messages and traces for TCP.
Usage Guidelines In a router with stable Database Connection, the alias_cp_name field in the trace message should not be blank.
There should be no other APPC error message. You can use Advanced Peer-to-Peer Networking (APPN)
debug commands with this debug command to track APPN-related errors.
Examples The following is sample output from the debugdbconnappccommand. In a normal situation, only the following
message is displayed:
The following message is displayed if a database connection is manually cleared and an outstanding APPC
verb is pending:
Related Commands
Command Description
debug dbconn all Turns on all debug flags for Database Connection.
debug dbconn drda Displays error messages and stream traces for DRDA.
debug dbconn tcp Displays error messages and traces for TCP.
Usage Guidelines Most of the messages for Database Connection and control blocks do not report any errors. If a connection
is inactive and cannot be cleared, use this command with the debugdbconnappc,debugdbconntcp,
anddebugappn commands to locate the problem. The alias_cp_name field must match the configured APPN
cpname.
Related Commands
Command Description
debug dbconn all Turns on all debug flags for Database Connection.
debug dbconn drda Displays error messages and stream traces for DRDA.
Command Description
debug dbconn event Displays trace or error messages for Database
Connection events.
debug dbconn tcp Displays error messages and traces for TCP.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Related Commands
Command Description
debug dbconn all Turns on all debug flags for Database Connection.
Command Description
debug dbconn event Displays trace or error messages for CTRC events
related to DB2 communications.
debug dbconn tcp Displays error messages and traces for TCP.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples The following examples display output from the debugdbconneventcommand in a variety of situations. A
normal trace for the debugdbconnevent displays as follows:
Related Commands
Command Description
debug dbconn all Turns on all debug flags for Database Connection.
Command Description
debug dbconn config Display trace or error messages for Database
Connection configuration and control blocks.
debug dbconn drda Displays error messages and stream traces for DRDA.
debug dbconn tcp Displays error messages and traces for TCP.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Related Commands
Command Description
debug dbconn all Turns on all debug flags for Database Connection.
debug dbconn drda Displays error messages and stream traces for DRDA.
Command Description
debug dbconn event Displays trace or error messages for CTRC events
related to DB2 communications.
Note The debugdecnetadj command is not available in Cisco IOS Release 12.2(33)SXH and later Cisco IOS
12.2SX releases.
The following line indicates that the router is sending an unscheduled hello message, as a result of some event,
such as the adjacency state changing:
Usage Guidelines When you use connect packet filtering, it may be helpful to use the decnetaccess-group configuration command
to apply the following basic access list:
Note Packet password and account information is not logged in the debugdecnetconnects message, nor is it
displayed by the showaccess EXEC command. If you specify password or account information in your
access list, they can be viewed by anyone with access to the configuration of the router.
Field Description
DNET-CON: Indicates that this is a debugdecnetconnects packet.
list 300 item #2 matched Indicates that a packet matched the second item in
access list 300.
Field Description
dst=19.309 Indicates the destination DECnet address for the
packet.
Note The debugdecnetevents command is not available in Cisco IOS Release 12.2(33)SXH and later Cisco
IOS 12.2SX releases.
DNET: Hello from node 1002 rejected - exceeded'max node' parameter (1000)
Note The debugdecnetpacketcommand is not available in Cisco IOS Release 12.2(33)SXH and later Cisco
IOS 12.2SX releases.
To display debugging information on DECnet packet events, use the debugdecnetpacket command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
DNET-PKT: Packet fwded from 1.4 to 1.5, via 1.5, snpa 0000.3080.cf90, TokenRing0
Note The debugdecnetrouting command is not available in Cisco IOS Release 12.2(33)SXH and later Cisco
IOS 12.2SX releases.
To display all DECnet routing-related events occurring at the router, use the debugdecnetrouting command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug device-sensor
To enable debugging for device sensor, use the debug device-sensor command in privileged EXEC mode.
15.1(1)SG This command was integrated into Cisco IOS Release 15.1(1)SG.
Usage Guidelines Use the debug device-sensor command in conjunction with the debug authentication all command to
troubleshoot scenarios where device sensor cache entries are not being created for the connected devices.
Examples The following is sample output from the debug device-sensor events command. The debug output shows
how Cisco Discovery Protocol packets and Type-Length-Values (TLVs) are received from the device connected
to the Gigabit Ethernet interface 2/1.
Device#
*Nov 30 23:58:45.811: DSensor: Received cdp packet from GigabitEthernet2/1:00d0.2bdf.08a5
*Nov 30 23:58:45.811: DSensor: SM returned no or invalid session label for
GigabitEthernet2/1:00d0.2bdf.08a5
*Nov 30 23:58:45.811: DSensor: Updating SM with identity attribute list
cdp-tlv 0 00 01 00 0B 4A 41 45 30 37 34 31 31 50 53 32
cdp-tlv 0 00 03 00 03 32 2F 38
cdp-tlv 0 00 04 00 04 00 00 00 0A
cdp-tlv 0 00 05 00 68 57 53 2D 43 32 39 34 38 20 53 6F 66 74 77 61 72 65
2C 20 56 65 72 73 69 6F 6E 20 4D 63 70 53 57 3A 20 36 2E 34 28 35 2E
30 29 20 4E 6D 70 53 57 3A 20 36 2E 34 28 35 29 0A 43 6F 70 79 72 69 67 68 74 20 28 63 29
20 31 39 39 35 2D 32 30 30 33 20 62 79 20 43 69 73 63 6F 20 53 79 73
74 65 6D 73 2C 20 49 6E 63 2E 0A
cdp-tlv 0 00 06 00 08 57 53 2D 43 32 39 34 38
cdp-tlv 0 00 09 00 00
cdp-tlv 0 00 0A 00 02 00 21
cdp-tlv 0 00 0B 00 01 01
cdp-tlv 0 00 12 00 01 00
cdp-tlv 0 00 13 00 01 00
cdp-tlv 0 00 14 00 00
cdp-tlv 0 00 15 00 0A 06 08 2B 06 01 04 01 09 05 2A
cdp-tlv 0 00 16 00 16 00 00 00 02 01 01 CC 00 04 00 00 00 0001 01 CC 00 04
01 01 01 01
cdp-tlv 0 00 17 00 01 00
swidb 0 604702240 (0x240B0620)
clid-mac-addr 0 00 D0 2B DF 08 A5
*Nov 30 23:58:46.831: DSensor: Received cdp packet from GigabitEthernet2/1:00d0.2bdf.08a5exi
Switch#
*Nov 30 23:58:51.171: %SYS-5-CONFIG_I: Configured from console by console
Related Commands
Command Description
debug authentication all Displays all debugging information about the
Authentication Manager and all features.
device-sensor accounting Adds the device sensor protocol data to the accounting
records and generates additional accounting events
when new sensor data is detected.
debug dhcp
To display debugging information about the Dynamic Host Configuration Protocol (DHCP) client activities
and to monitor the status of DHCP packets, use the debugdhcp command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
12.3(8)T The output of this command was enhanced to display default static routes.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines You can also use the debugdhcp command to monitor the subnet allocation and releasing for on-demand
address pools.
For debugging purposes, the debugdhcpdetail command provides the most useful information such as the
lease entry structure of the client and the state transitions of the lease entry. The debug output shows the
scanned option values from received DHCP messages that are replies to a router request. The values of the
op, htype, hlen, hops, server identifier option, xid, secs, flags, ciaddr, yiaddr, siaddr, and giaddr fields of the
DHCP packet are shown in addition to the length of the options field.
Examples The following examples show and explain some of the typical debugging messages you may see when using
the debugdhcpdetail command.
The following sample output shows when a DHCP client sends a DHCPDISCOVER broadcast message to
find its local DHCP server:
*Oct 2 06:22:24: Setting default_gateway to 68.8.8.1 ! This is the option 3 default gateway.
*Oct 2 06:22:24: Adding default route 68.8.8.1
*Oct 2 06:22:24: DHCP: Adding static route to 4.3.2.1 255.255.255.255 via 68.8.8.1
*Oct 2 06:22:24: DHCP: Adding static route to 1.1.1.1 255.255.255.255 via 68.8.8.1
*Oct 2 06:22:24: DHCP: Adding static route to 67.2.2.2 255.255.255.255 via 68.8.8.1
Most fields are self-explanatory; however, fields that may need further explanation are described in the table
below.
Fields Description
DHCP:Scan:Subnet Address Option:255.255.255.0 Subnet mask option (option 1).
DHCP server identifier:1.1.1.1 Value of the DHCP server ID option (option 54). Note
that this is not the same as the siaddr field, which is
the server IP address.
srvr:0.0.0.0, gw:0.0.0.0 srvr is the value of the siaddr field. gw is the value of
the giaddr field.
Related Commands
Command Description
debug ip ddns update Enables debugging for DDNS updates.
ip ddns update hostname Enables a host to be used for DDNS updates of A and
PTR RRs.
Command Description
ip dhcp client update dns Enables DDNS updates of A RRs using the same
hostname passed in the hostname and FQDN options
by a client.
ip dhcp-client update dns Enables DDNS updates of A RRs using the same
hostname passed in the hostname and FQDN options
by a client.
ip dhcp update dns Enables DDNS updates of A and PTR RRs for most
address pools.
show ip ddns update method Displays information about the DDNS update method.
12.2(31)SRB1 This command was integrated into Cisco IOS Release 12.2(31)SRB1.
Examples The following example displays debug messages regarding DHCP redundancy events. The last line is output
when the debugdhcpredundancy command is enabled. The line indicates that the active Route Processor
has sent a dynamic lease synchronization message for IP address 10.1.1.1:
Related Commands
Command Description
debug ip dhcp server redundancy Displays debugging information about DHCP server
and relay agent redundancy events.
Usage Guidelines When dial-on-demand routing (DDR) is enabled on the interface, information concerning the cause of any
call (called the Dialingcause) is displayed.
Examples In the following example, the line of output for an IP packet lists the name of the DDR interface and the source
and destination addresses of the packet:
Message Description
Dialer0: Already xxx call(s) in progress on Dialer0, Number of calls in progress (xxx) exceeds the
dialing not allowed maximum number of calls set on the interface.
Dialer0: No free dialer - starting fast idle timer All the lines in the interface or rotary group are busy,
and a packet is waiting to be sent to the destination.
BRI0: rotary group to xxx overloaded (yyy) Number dialer (xxx) exceeds the load set on the
interface (yyy).
BRI0: authenticated host xxx with no matching dialer No dialer profile matches xxx, the Challenge
profile Handshake Authentication Protocol (CHAP) name
or remote name of the remote host.
Message Description
BRI0: authenticated host xxx with no matching dialer No dialer map matches xxx, the CHAP name or
map remote name of the remote host.
BRI0: Cant place call, verify configuration Dialer string or dialer pool on an interface not set.
The table below describes the messages that the debugdialereventscommand can generate for a serial interface
used as a V.25bis dialer for DDR.
Table 74: debug dialer events Command Message Descriptions for DDR
Message Description
Serial 0: Dialer result = xxxxxxxxxx Result returned from the V.25bisdialer. It is useful in
debugging if calls are failing. On some hardware
platforms, this message cannot be displayed due to
hardware limitations. Possible values for the
xxxxxxxxxx variable depend on the V.25bis device
with which the router is communicating.
Serial 0: No dialer string defined. Dialing cannot Packet is received that should cause a call to be
occur. placed. However, no dialer string is configured, so
dialing cannot occur. This message usually indicates
a configuration problem.
Serial 0: Attempting to dial xxxxxxxxxx Packet has been received that passes the
dial-on-demand access lists. That packet causes phone
number xxxxxxxxxx to be dialed.
Serial 0: Unable to dial xxxxxxxxxx Phone call to xxxxxxxxxx cannot be placed. This
failure might be due to a lack of memory, full output
queues, or other problems.
Related Commands
Command Description
debug decnet packet Displays debugging information about the packets
received on a dialer interface.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use the debugdialerforwarding command to configure a virtual private dialout network (VPDN) on the
HGW and a network access server (NAS) to dial from the HGW to the client.
An L2TP tunnel is created between the HGW and the NAS and the packets are forwarded transparently at the
NAS.
Examples The following is sample output from the debugdialerforwardingcommand for dialing from the HGW to the
client.
Router#
1d00h:Vi3 DDR-FWD 83093A60:event [VPDN DISC] state before [FORWARDED]
*Mar 2 00:33:33:%LINK-3-UPDOWN:Interface Virtual-Access3, changed state to down
*Mar 2 00:33:34:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access3, changed
state to down
Related Commands
Command Description
debug dialer events Displays debugging information about events on a
dialer interface.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Use the debugdialermap command to track large-scale dialout (LSDO) and incoming calls that use dynamic
dialer maps. This command shows the whole trace including when the map is created and removed.
If an interface is configured for dial-on-demand routing (DDR), and a map to a specified address does not
exist, then a dynamic dialer map is created and when the call disconnects, the dialer map is removed.
Note Do not configure a dialer string or a dialer map on the incoming interface.
Examples In the following sample output from the debugdialermap command, a dialer map is created when an incoming
call is connected and removed when that call is disconnected:
Router#
*Mar 22 12:19:15.597:%LINK-3-UPDOWN:Interface BRI0/0:1, changed state to up
*Mar 22 12:19:17.748:BR0/0:1 DDR:dialer_create_dynamic_map map created for 11.0.0.1
*Mar 22 12:19:18.734:%LINEPROTO-5-UPDOWN:Line protocol on Interface BRI0/0:1, changed state
to up
*Mar 22 12:19:21.598:%ISDN-6-CONNECT:Interface BRI0/0:1 is now connected to unknown R2604
Router#
*Mar 22 12:21:15.597:%ISDN-6-DISCONNECT:Interface BRI0/0:1 disconnected from R2604, call
lasted 120 seconds
*Mar 22 12:21:15.645:%LINK-3-UPDOWN:Interface BRI0/0:1, changed state to down
*Mar 22 12:21:15.649:BR0/0:1 DDR:dialer_remove_dynamic_map map 11.0.0.1 removed
*Mar 22 12:21:16.647:%LINEPROTO-5-UPDOWN:Line protocol on Interface BRI0/0:1, changed state
to down
Related Commands
Command Description
debug dialer events Displays debugging information about events on a
dialer interface.
debug dialpeer
Note Effective with release 12.3(8)T, the debugdialpeer command is replaced by the debugvoipdialpeer
command. See the debugvoipdialpeer command for more information.
To view dial peer information, use the debugdialpeercommand in privileged EXEC mode. To disable
debugging output, use the no form of this command.
debug dialpeer
no debug dialpeer
Usage Guidelines Disable console logging and use buffered logging before using the debugdialpeer command. Using the
debugdialpeer command generates a large volume of debugging messages, which can affect router performance.
Examples The following is sample output for the debugdialpeer command. The output shows the destination pattern
configured on the matched dial-peer. Expanded string is the string after applying number translation to the
original number. It shows that dial-peer 1311 was an incoming dial-peer match. It also shows that routing
label was att1. It shows that dial-peer 5108888 and 111399 are an outgoing dial-peer match.
Field Description
destination pattn Destination pattern configured on the dial peer.
Match Dest. pattern; called Indicates that dial-peer match is going to match
destination pattern against the called number.
Matching route label The trunk group label or carrier id that is used for
matching a dial peer.
Related Commands
Command Description
call-block (dial peer) Enables blocking of incoming calls on the dial peer.
session target (ENUM) Specifies the ENUM search table for the target
session.
Command Description
trunkgroup (dial-peer) Assigns a trunk group to the dial peer.
trunk-group-label (dial-peer) Identifies the trunk group handling the incoming call.
debug diameter
To display information about the Diameter Protocol, use the debugdiameter command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support in
a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Usage Guidelines Use this command to display information about any of the listed classes of information about the Diameter
Protocol.
Examples The following examples show output from the debugdiameter command:
Examples
Router# debug diameter all
*May 9 17:58:14.832: Dia Base: Diameter Peer configured. Allocate connection context.
*May 9 17:58:14.832: Dia Base: Allocate the peer connection context 50F63888, handle
C000000C *May 9 17:58:14.832: Dia Base: (C000000C): Received peer configuration event *May
9 17:58:14.832: Dia Peer FSM (50F63888): input event START in state CLOSED *May 9
17:58:14.832: Dia Peer FSM (50F63888): Starting Connection timer *May 9 17:58:14.832: Dia
Peer FSM (50F63888): event START, state
CLOSED-->WAIT_CONN_ACK
*May 9 17:58:14.836: Dia Transport: socket 0 - connecting to 9.113.33.6
(3868)
*May 9 17:58:14.836: Dia Transport: socket 0 - connection in progress *May 9 17:58:14.836:
Dia Transport: socket 0 - local address 9.113.33.5
(49214)
*May 9 17:58:14.836: Dia Transport: socket 0 - resume socket write - nothing to write *May
9 17:58:14.836: Dia Base: (C000000C): Received peer connection event from transport *May
9 17:58:14.836: Dia Peer FSM (50F63888): input event RCV_CONN_ACK in state WAIT_CONN_ACK
*May 9 17:58:14.836: Dia Base: Sending diameter message to peer "Unknown"
*May 9 17:58:14.836: DIAMETER: CER message, ver=1, len=120, app=0, [2328318322/2328318322]
Examples
*May 9 17:59:14.840: Dia Peer FSM (50F63888): input event TIMEOUT in
state OPEN
*May 9 17:59:14.840: Dia Base: Sending diameter message to peer
"diameter2.cisco.com"
*May 9 17:59:14.840: DIAMETER: DWR message, ver=1, len=48, app=0,
[2328318323/2328318323]
*May 9 17:59:14.840: DIAMETER: Origin-host-name [264]
"host" (M)
*May 9 17:59:14.840: DIAMETER: Origin-Realm [296]
"cisco" (M)
50D0B710: 01000030 80000118 00000000 ...0........
50D0B720: 8AC75173 8AC75173 00000108 4000000C .GQs.GQs....@...
50D0B730: 686F7374 00000128 4000000D 63697363 host...(@...cisc
50D0B740: 6F000000 FD o...}
*May 9 17:59:14.840: Dia Base: Request message hash ctx created for
[2328318323/2328318323]
*May 9 17:59:14.840: Dia Peer FSM (50F63888): Starting Watchdog timer,
[60] left for next timeout*May 9 17:59:14.840: Dia Peer FSM (50F63888):
event TIMEOUT, state OPEN-->OPEN
*May 9 17:59:14.840: Dia Transport: Dia Transport write message event
*May 9 17:59:14.840: Dia Transport: socket 0 - complete msg sent
*May 9 17:59:14.840: Dia Transport: socket 0 - complete read of 20
bytes
*May 9 17:59:14.840: Dia Transport: complete header read from socket 0
*May 9 17:59:14.840: Dia Transport: read msg (60) bytes from socket 0
*May 9 17:59:14.840: Dia Transport: socket 0 - complete read of 60
bytes
*May 9 17:59:14.840: Dia Base: Diameter message received from the peer
"diameter2.cisco.com"
*May 9 17:59:14.840: DIAMETER: DWA message, ver=1, len=80, app=0,
[2328318323/2328318323]
*May 9 17:59:14.840: DIAMETER: Result-code [268]
2001 (M)
*May 9 17:59:14.840: DIAMETER: Origin-host-name [264]
"diameter2.cisco.com" (M)
*May 9 17:59:14.840: DIAMETER: Origin-Realm [296]
"cisco.com" (M)
65940780: 01000050 00000118 00000000 ...P........
65940790: 8AC75173 8AC75173 0000010C 4000000C .GQs.GQs....@...
659407A0: 000007D1 00000108 4000001B 6469616D ...Q....@...diam
659407B0: 65746572 322E6369 73636F2E 636F6D00 eter2.cisco.com.
659407C0: 00000128 40000011 63697363 6F2E636F ...(@...cisco.co
Examples
*May 9 18:07:18.472: Dia Transport: socket 0 READ event: UP->CLOSE due
to bytes read = 0
*May 9 18:07:18.472: Dia Base: (8600000E): Received peer disconnection
event from transport
*May 9 18:07:18.472: %DIABASE-4-DIA_PEER_DOWN: Diameter peer 9.113.33.6
port 3868 TCP DOWN
*May 9 18:07:18.472: Dia Peer FSM (2068FF44): input event PEER_DISC in
state OPEN
*May 9 18:07:18.472: Dia Peer FSM (2068FF44): Starting Reconnect timer
*May 9 18:07:18.472: Dia Peer FSM (2068FF44): event PEER_DISC, state
OPEN-->CLOSED
*May 9 18:07:48.472: Dia Peer FSM (2068FF44): input event START in
state CLOSED
*May 9 18:07:48.472: Dia Peer FSM (2068FF44): Starting Connection timer
*May 9 18:07:48.472: Dia Peer FSM (2068FF44): event START, state
CLOSED-->WAIT_CONN_ACK
*May 9 18:07:48.472: Dia Transport: socket 0 - connecting to 9.113.33.6
(3868)
*May 9 18:07:48.472: Dia Transport: socket 0 - connection in progress
*May 9 18:07:48.472: Dia Transport: socket 0 - local address 9.113.33.5
(61122)
*May 9 18:07:48.472: Dia Transport: socket 0 - CONN_WAIT->CLOSE
*May 9 18:07:48.472: Dia Base: (8600000E): Received peer disconnection
event from transport
*May 9 18:07:48.472: Dia Peer FSM (2068FF44): input event PEER_DISC in
state WAIT_CONN_ACK
*May 9 18:07:48.472: Dia Peer FSM (2068FF44): Starting Reconnect timer
*May 9 18:07:48.472: Dia Peer FSM (2068FF44): event PEER_DISC, state
WAIT_CONN_ACK-->CLOSED
Examples
Ginger(config)#no diameter peer watch
Ginger(config)#
*May 9 18:05:02.812: Dia Base: Peer unconfigured, start peer
disconnection
*May 9 18:05:02.812: Dia Base: (C000000C): Received peer
unconfiguration event
*May 9 18:05:02.812: Dia Peer FSM (50F63888): input event STOP in state
OPEN
*May 9 18:05:02.812: Dia Base: Sending diameter message to peer
"diameter2.cisco.com"
*May 9 18:05:02.812: DIAMETER: DPR message, ver=1, len=60, app=0,
[2328318329/2328318329]
*May 9 18:05:02.812: DIAMETER: Origin-host-name [264]
"host" (M)
*May 9 18:05:02.816: DIAMETER: Origin-Realm [296]
"cisco" (M)
*May 9 18:05:02.816: DIAMETER: Peer-disconnect-reason [273]
Server-do-not-want-to-talk (M)
653D1810: 0100003C 8000011A ...<....
653D1820: 00000000 8AC75179 8AC75179 00000108 .....GQy.GQy....
653D1830: 4000000C 686F7374 00000128 4000000D @...host...(@...
653D1840: 63697363 6F000000 00000111 4000000C cisco.......@...
653D1850: 00000002 00 .....
*May 9 18:05:02.816: Dia Base: Request message hash ctx created for
[2328318329/2328318329]
*May 9 18:05:02.816: Dia Peer FSM (50F63888): Starting DPR timer
Related Commands
Command Description
show diameter peer Displays Diameter peer configuration information.
debug dlsw
To enable debugging of data-link switching plus (DLSw+), use the debugdlswcommand in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug dlsw border-peers [interface interface| ip address ip-address]core [flow-control messages| state|
xid] [circuit-number]local-circuit circuit-numberpeers [interface interface [fast-errors| fast-paks]]ip
address ip-address [fast-errors| fast-paks| fst-seq| udp]reachability [error| verbose] [sna| netbios]
no debug dlsw border-peers [interface interface| ip address ip-address]core [flow-control messages|
state| xid] [circuit-number]local-circuit circuit-numberpeers [interface interface [fast-errors| fast-paks]]ip
address ip-address [fast-errors| fast-paks| fst-seq| udp]reachability [error| verbose] [sna| netbios]
Syntax Description border-peers (Optional) Enables debugging output for border peer
events.
Usage Guidelines When you specify no optional keywords, the debug dlsw command enables all available DLSW debugging
output.
Normally you need to use only the error or verboseoption of thedebugdlswreachabilitycommand to help
identify problems. The error option is recommended for use by customers and provides a subset of the
messages from the normal event-level debugging. The verbose option provides a very detailed view of events,
and is typically used only by service personnel.
To reduce the amount of debug information displayed, use the sna or netbios option with the
debugdlswreachabilitycommand if you know that you have an SNA or NetBIOS problem.
The DLSw core is the engine that is responsible for the establishment and maintenance of remote circuits. If
possible, specifying the index of the specific circuit you want to debug reduces the amount of output displayed.
However, if you want to watch a circuit initially come up, do not use the circuit-number option with the core
keyword.
The coreflow-control option provides information about congestion in the WAN or at the remote end station.
In these cases, DLSw sends Receiver Not Ready (RNR) frames on its local circuits, slowing data traffic on
established sessions and giving the congestion an opportunity to clear.
The corestateoption allows you to see when the circuit changes state. This capability is especially useful for
determining why a session cannot be established or why a session is being disconnected.
The coreXIDoption allows you to track the exchange identification (XID)-state machine. The router tracks
XID commands and responses used in negotiations between end stations before establishing a session.
Examples The following examples show and explain some of the typical DLSw debugging messages you might see
when using thedebugdlswcommand.
The following example enables UDP packet debugging for a specific remote peer:
DLSw: dllc2p_action_c()
PEER-DISP Sent : CLSI Msg : CONNECT.Req dlen: 16
DLSw: END-LLC2PFSM (peer on interface Serial1): state:ROS_SENT->CON_PEND
DLSw: Peer Received : CLSI Msg : CONNECT.Cfm CLS_OK dlen: 28
DLSw: START-LLC2PFSM (peer on interface Serial1): event:CLS-CONNECT.CNF state:CON_PEND
DLSw: dllc2p_action_e() send capabilities to peer on interface Serial1
PEER-DISP Sent : CLSI Msg : SIGNAL_STN.Req dlen: 8
PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 418
DLSw: CapExId Msg sent to peer on interface Serial1
DLSw: END-LLC2PFSM (peer on interface Serial1): state:CON_PEND->WAIT_CAP
DLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 418
DLSw: START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP MSG RCVD state:WAIT_CAP
DLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial1
DLSw: Recv CapExId Msg from peer on interface Serial1
PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 96
DLSw: Pos CapExResp sent to peer on interface Serial1
DLSw: END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->WAIT_CAP
DLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 96
DLSw: START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP MSG RCVD state:WAIT_CAP
DLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial1
DLSw: Recv CapExPosRsp Msg from peer on interface Serial1
DLSw: END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->WAIT_CAP
DLSw: Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAP
DLSw: START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP EXCHANGED state:WAIT_CAP
DLSw: dllc2p_action_l() cap xchged for peer on interface Serial1
DLSw: END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->CONNECT
The following message is from a router that received a Logical Link Control, type 2 (LLC2) connection:
The following messages occur when a CUR_ex (CANUREACH explorer) frame is received from other peers,
and the peer statements or the promiscuous keyword have not been enabled so that the router is not configured
correctly:
The following two messages show that an information frame is passing through the router:
Examples The messages in this section are based on the following criteria:
Reachability is stored in cache. DLSw+ maintains two reachability caches: one for MAC addresses and
one for NetBIOS names. Depending on how long entries have been in the cache, they are either fresh
or stale.
If a router has a fresh entry in the cache for a certain resource, it answers a locate request for that resource
without verifying that it is still available. A locate request is typically a TEST frame for MAC addresses
or a FIND_NAME_QUERY for NetBIOS.
If a router has a stale entry in the cache for a certain resource, it verifies that the entry is still valid before
answering a locate request for the resource by sending a frame to the last known location of the resource
and waits for a resource. If the entry is a REMOTE entry, the router sends a CUR_ex frame to the remote
peer to verify. If the entry is a LOCAL entry, it sends either a TEST frame or a NetBIOS
FIND_NAME_QUERY on the appropriate local port.
By default, all reachability cache entries remain fresh for 4 minutes after they are learned. For MAC
addresses, you can change this time with the dlswtimersna-verify-interval command. For NetBIOS
names, you can change this time with the dlswtimernetbios-verify-interval command.
By default, all reachability cache entries age out of the cache 16 minutes after they are learned. For MAC
addresses, you can change this time with the dlswtimersna-cache-timeout command. For NetBIOS
names, you can change the time with the dlswtimernetbios-cache-timeout command.
The table below describes the debug output indicating that the DLSW router received an SSP message that
is flow controlled and should be counted against the window of the sender.
Dec 6 11:26:49: CSM: Received SSP CUR csex flags = 80, mac 4000.90b1.26cf,
The csex flags = 80 means that this is an CUR_ex (explorer).
Dec 5 10:48:33: DLSw: 1620175180 decr r - s:27 so:0 r:27 ro:0
Field Description
decr r Decrement received count.
Note In release 12.3(8)T, the debugdmspdoc-to-fax command is replaced by the debugfaxdmsp command.
See the debugfaxdmsp command for more information.
To display debugging messages for the doc Media Service Provider (docMSP) TIFF or text2Fax engine, use
the debugdmspdoc-to-faxcommand in privileged EXEC mode. To disable debugging output, use the no form
of this command.
12.3(8)T This command was replaced by the debugfaxdmsp command in the Cisco
IOS 12.3T release.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Related Commands
Command Description
debug dmsp fax-to-doc Displays debugging messages for doc MPS
fax-to-doc.
To display debugging messages for doc MSP (docMSP) fax-to-doc, use the
debugdmspfax-to-doccommandinprivilegedEXEC mode. To disable debugging output, use the no form of
this command.
Syntax Description tiff-writer (Optional) Displays debug messages that occur while
the DocMSP Component is receiving T4 fax data and
producing TIFF packets.
12.3(8)T This command was replaced by the debugfaxdmsp command in the Cisco
IOS 12.3T release.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Related Commands
Command Description
debug dmsp doc-to-fax Displays debugging messages for the doc Media
Service Provider TIFF or text2Fax engine.
debug dmvpn
To display debug Dynamic Multipoint VPN (DMVPN) session information, use the debug dmvpn command
in privileged EXEC mode. To disable debugging output, use the no form of this command.
Release Modification
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set,
platform, and platform hardware.
Cisco IOS XE Release 2.5 This command was modified. This command was integrated into Cisco IOS
XE Release 2.5.
Usage Guidelines You must specify both the level and the type of debugging that you want to enable. The debugging levels are
all, error, detail, or packet. You can enable NHRP, crypto Internet Key Exchange (IKE) and IPsec, tunnel
protection, and crypto secure socket debugging at any of the four debugging levels.
To enable conditional DMVPN debugging, you must first specify the level and type of debugging that you
want to enable, and then use the debug dmvpn condition command to specify the conditions that you want
to enable.
Error-Level Debugging
When error-level debugging is enabled with the debug dmvpn errorcommand, the following debugging
commands are enabled by default:
debug crypto ipsec error
debug crypto isakmp error
debug nhrp error
Detail-Level Debugging
When detail-level debugging is enabled with the debug dmvpn detailcommand, the following debugging
commands are enabled by default:
debug crypto ipsec
debug crypto isakmp
debug crypto sockets
debug nhrp
debug nhrp cache
debug nhrp rate
debug tunnel protection
Packet-Level Debugging
When packet-level debugging is enabled with the debug dmvpn packetcommand, the following debugging
commands are enabled by default:
debug nhrp extension
debug nhrp packet
Note Executing the debug dmvpn all command with a high number of active sessions may result in high CPU
utilization and large data output.
Examples The following example shows how to enable all debugging levels for DMVPN tunnel debugging:
Related Commands
Command Description
debug crypto error Enables error debugging for a crypto area.
Command Description
debug nhrp condition Enables NHRP conditional debugging.
debug dmvpn condition {unmatched| peer {nbma| tunnel {ipv4-address| ipv6-address}}| vrf vrf-name|
interface tunnel tunnel-interface}
no debug dmvpn condition [unmatched| peer {nbma| tunnel {ipv4-address| ipv6-address}}| vrf vrf-name|
interface tunnel number]
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set,
platform, and platform hardware.
Cisco IOS XE Release 2.5 This command was modified. It was integrated into Cisco IOS XE Release
2.5.
Usage Guidelines Conditional debugging is enabled only after the DMVPN debugging type and level have been specified using
the debug dmvpn command.
Console Output
The following debug dmvpn commands do not have any console output on the Cisco 3845 and Cisco 7200
series routers:
debug dmvpn condition interface
debug dmvpn condition peer
debug dmvpn condition unmatched
debug dmvpn condition vrf
Note When the debug dmvpn condition unmatched command is enabled on the Cisco 3845 and Cisco 7200
series routers, issuing the show debugging command does not produce any console output.
Examples The following example shows how to enable conditional DMVPN debugging for a specific peer NBMA
address:
The following example shows how to enable conditional DMVPN debugging when context is not available
to check against debugging conditions:
The following example shows how to disable conditional debugging for a specific tunnel interface:
Related Commands
Command Description
debug crypto error Enables error debugging for a crypto area.
debug dot11
To enable debugging of radio functions, use the debugdot11command in privileged EXEC mode. To stop or
disable the debug operation, use the no form of this command.
12.4(2)T This command was integrated into Cisco IOS Release 12.4(2)T.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Usage Guidelines Use this command to display debugging information about radio functions.
Examples The following example shows how to enable debugging of all radio-related events:
Related Commands
Command Description
debug dot11 aaa Enables debugging of dot11 AAA operations.
debug dot11 aaa {accounting| authenticator {all| dispatcher| mac-authen| process| rxdata| state-machine|
txdata}| dispatcher| manager {all| dispatcher| keys| rxdata| state-machine| supplicant| txdata}}
no debug dot11 aaa {accounting| authenticator {all| dispatcher| mac-authen| process| rxdata|
state-machine| txdata}| dispatcher| manager {all| dispatcher| keys| rxdata| state-machine| supplicant|
txdata}}
12.2(15)JA This command was modified to include the accounting, authenticator, dispatcher,
and manager debugging options.
12.4(2)T This command was integrated into Cisco IOS Release 12.4(2)T.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Usage Guidelines Use this command to display debugging information about dot11 AAA operations.
Examples The following example shows how to activate debugging for 802.11 AAA accounting packets:
Related Commands
Command Description
debug dot11 Enables debugging of radio functions.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Examples This example shows how to begin debugging of all admission control radio-related events:
Related Commands
Command Description
admin-traffic (SSID configuration mode) Enables CAC admission control for an SSID on the
access point.
admit-traffic (QOS Class interface configuration Configures CAC admission control on the access
mode) point.
show debugging Displays all debug settings and the debug packet
headers
show dot11 ids eap Displays all CAC radio events on the access point.
debug dot11 dot11radio interface {accept-radio-firmware| dfs simulate [ channel ]| monitor {ack| address|
beacon| crc| lines| plcp| print| probe| store}| print {hex| if| iv| lines| mic| plcp| printf| raw| shortadr}|
stop-on-failure| trace {off| print| store}}
no debug dot11 dot11radio interface {accept-radio-firmware| dfs simulate [ channel ]| monitor {ack|
address| beacon| crc| lines| plcp| print| probe| store}| print {hex| if| iv| lines| mic| plcp| printf| raw|
shortadr}| stop-on-failure| trace {off| print| store}}
Syntax Description interface The radio interface. The 2.4-GHz radio is 0. The
5-GHz radio is 1.
12.4(2)T This command was integrated into Cisco IOS Release 12.4(2)T.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Usage Guidelines Use this command to display debugging information about radio options.
Examples This example shows how to begin monitoring of all packets with CRC errors:
Related Commands
Command Description
debug dot11 Enables debugging of radio functions.
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Examples This example shows how to activate wireless IDS debugging for authentication events:
Related Commands
Command Description
dot11 ids eap attempts Configures limits on authentication attempts and
EAPOL flooding on scanner access points in monitor
mode
show debugging Displays all debug settings and the debug packet
headers
Command Description
show dot11 ids eap Displays wireless IDS statistics
{[no] debug dot11 ids mfpap [all] [detectors] [events] [generators] [io] [reporting]| wds [all] [detectors]
[events] [generators] [reporting] [statistics]| wlccp}
12.2SX This command is supported in the Cisco IOS Release 12.2SX train. Support
in a specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Examples This example shows how to debug the MFP detectors on the access point:
Related Commands
Command Description
dot11 ids mfp Configures MFP parameters on the access point.
show dot11 ids mfp Displays MFP parameters on the access point.
debug dot1x
To display 802.1X debugging information, use the debugdot1x command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
debug dot1x [all| errors| events| feature| packets| redundancy| registry| state-machine]
no debug dot1x [all| errors| events| feature| packets| redundancy| registry| state-machine]
12.1(14)EA1 The authsm, backend, besm, core, and reauthsm keywords were removed.
The errors, events, packets, registry, and state-machine keywords were
added.
12.3(2)XA This command was integrated into Cisco IOS Release 12.3(2)XA.
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T.
Release Modification
12.3(11)T The supplicant keyword was added.
12.4(6)T The redundancy keyword was added. The aaa, process, rxdata,
supplicant, txdata, and vlan keywords were deleted.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
pae-ether-type = 888e.0202.0000
*Nov 7 13:07:56.876: dot1x-packet:Received an EAPOL-Logoff packet on interface FastEthernet1
*Nov 7 13:07:56.876: EAPOL pak dump rx
*Nov 7 13:07:56.876: EAPOL Version: 0x2 type: 0x2 length: 0x0000
*Nov 7 13:07:56.876: dot1x-sm:Posting EAPOL_LOGOFF on Client=82AC85CC
*Nov 7 13:07:56.876: dot1x_auth Fa1: during state auth_authenticating, got event
7(eapolLogoff)
The fields in the output are self-explanatory.
Related Commands
Command Description
clear dot1x Clears 802.1X interface information.
identity profile default Creates an identity profile and enters identity profile
configuration mode.
12.2(15)ZJ This command was implemented on the following platforms: Cisco 2600
series, Cisco 3600 series, and Cisco 3700 series routers.
Release Modification
12.3(4)T This command was integrated into Cisco IOS Release 12.3(4)T on the
following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700
series routers.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The undebugdot1x command is the same as the nodebugdot1x command.
Related Commands
Command Description
show debugging Displays information about the types of debugging
that are enabled.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines When a TrBRF interface is configured on the Remote Switch Module (RSM), the DRiP protocol is activated.
The DRiP protocol adds the VLAN ID specified in the router command to its database and recognizes the
VLAN as a locally configured, active VLAN.
Recvd. pak
DRiP recognizes that the VLAN ID it is getting is a new one from the network:
DRiP attempts to resolve any conflicts when it discovers a new VLAN. The value action = 1 means to notify
the local platform of change in state.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines Before you use this command, you can optionally use the cleardrip command first. As a result the DRiP
counters are reset to 0. If the DRiP counters begin to increment, the router is receiving packets.
Related Commands
Command Description
debug drip event Displays debugging messages for DRiP events.
Syntax Description This command has no arguments or keywords; however, it can be used with the execute-on command.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines To perform this command from the router shelf on the Cisco AS5800 series platform, use the
execute-onslotslot-numberdebugdscclock form of this command.
The debugdscclock command displays TDM clock-switching events on the dial shelf controller. The
information displayed includes the following:
Clock configuration messages received from trunks via NBUS
Dial shelf controller clock configuration messages from the router shelf over the dial shelf interface link
Clock switchover algorithm events
Examples The following example shows that the debugdscclock command has been enabled, and that trunk messages
are received, and that the configuration message has been received:
Related Commands
Command Description
execute-on Executes commands remotely on a line card.
Command Description
show dsc clock Displays information about the dial shelf controller
clock.
debug dsip
To display debugging output for Distributed System Interconnect Protocol (DSIP) used between a router shelf
and a dial shelf, use thedebugdsip command in privileged EXEC mode. To disable debugging output, use
the no form of this command.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The debugdsip command is used to enable the display of debugging messages for DSIP between the router
shelf and the dial shelf. Using this command, you can display booting messages generated when the download
of an image occurs, view console operation, and trace logging of MAC header information and DSIP transport
layer information as modules interact with the underlying physical media driver. This command can be applied
to a single modem or a group of modems.
Once the debugdsiptrace command has been enabled, you can read the information captured in the trace
buffer using theshowdsiptracing command.
Examples The following example indicates the debugdsiptrace command logs MAC headers of the various classes of
DSIP packets. To view the logged information, use the showdsiptracing command:
Related Commands
Command Description
debug modem Displays information about the dial shelf, including
clocking information.
show dsip tracing Displays DSIP media header information logged using
thedebugdsiptrace command.
debug dspapi
Note Effective with release 12.3(8)T, the debugdspapicommand is replaced by the debugvoipdspapicommand.
See the debugvoipdspapicommand for more information.
To enable debugging for Digital Signal Processor (DSP) application programming interface (API) message
events, use the debugdspapi command in privileged EXEC mode. To reset the default value for this feature,
use the no form of this command.
12.1(5)XM1 This command was implemented on the Cisco AS5350 and Cisco AS5400.
12.2(2)T This command was implemented on the Cisco 1700, Cisco 2600 series,
Cisco 3600 series, and the Cisco 3810.
Release Modification
12.2(8)T This command was integrated into Cisco IOS Release 12.2(8)T.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines DSP API message events used to communicate with DSPs are intended for use with Connexant (Nextport)
and Texas Instrument (54x) DSPs. This command severely impacts performance and should be used only for
single-call debug capture.
Examples The following example shows how to enable debugging for all DSP API message events:
Related Commands
Command Description
debug hpi Enables debugging for HPI message events.
debug dspfarm
To display digital signal processor (DSP) farm service debugging information, use the debugdspfarmcommand
in privileged EXEC mode. To disable debugging output, use the no form of this command.
12.2(13)T This command was implemented on the Cisco 2600 series, Cisco 3620,
Cisco 3640, Cisco 3660, and Cisco 3700 series.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines The router on which this command is used must be equipped with one or more digital T1/E1 packet voice
trunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms
(NM-HDV-FARMs) to provide DSP resources.
Debugging is turned on for all DSP-farm-service sessions. You can debug multiple sessions simultaneously,
with different levels of debugging for each.
Related Commands
Command Description
debug frame-relay vc-bundle Sets debugging for SCCP and its applications at one
of four levels.
Syntax Description name (Optional) The host or physical unit (PU) name
designation.
Usage Guidelines The debugdspuactivation command displays all DSPU activation traffic. To restrict the output to a specific
host or PU, include the host or PU name argument. You cannot turn off debugging output for an individual
PU if that PU has not been named in the debugdspuactivation command.
Examples The following is sample output from the debugdspuactivation command. Not all intermediate numbers are
shown for the "activated" and "deactivated" logical unit (LU) address ranges.
Field Description
DSPU Downstream PU debugging message.
Field Description
PU PU event triggered the message.
connected activated disconnected deactivated Event that occurred to trigger the message.
Related Commands
Command Description
debug dspu packet Displays information on a DSPU packet.
Usage Guidelines The debugdspupacket command displays all DSPU packet data flowing through the router. To restrict the
output to a specific host or physical unit (PU), include the host or PU name argument. You cannot turn off
debugging output for an individual PU if that PU has not been named in the debug dspu packet command.
Field Description
DSPU: Rx: Received frame (packet) from the remote PU to the
router PU.
Related Commands
Command Description
debug drip event Displays debugging messages for DRiP packets.
Syntax Description name (Optional) The host or physical unit (PU) name
designation.
Usage Guidelines Use the debugdspustate command to display only the FSM state changes. To see all FSM activity, use the
debug dsputracecommand. You cannot turn off debugging output for an individual PU if that PU has not
been named in the debugdspustate command.
Examples The following is sample output from the debugdspustate command. Not all intermediate numbers are shown
for the "activated" and "deactivated" logical unit (LU) address ranges.
Field Description
DSPU Downstream PU debug message.
previous-state, -> current-state Previous state and current new state as seen by the
FSM.
Related Commands
Command Description
debug drip event Displays debugging messages for DRiP packets.
Syntax Description name (Optional) The host or physical unit (PU) name
designation.
Usage Guidelines Use the debugdsputrace command to display all FSM state changes. To see FSM state changes only, use the
debugdspustate command. You cannot turn off debugging output for an individual PU if that PU has not
been named in the debugdsputrace command.
Field Description
7:23:57 Time stamp.
Field Description
LS Link station (LS) event triggered the message.
Related Commands
Command Description
debug drip event Displays debugging messages for DRiP packets.
12.2(33)SRA This command was integrated into Cisco IOS Release 12.2(33)SRA.
Router#
Related Commands
Command Description
debug mls rp Displays various MLS debugging elements.