- debug eap through debug hw-module subslot periodic
- debug eap
- debug ecfmpal
- debug eigrp address-family neighbor
- debug eigrp address-family notifications
- debug eigrp frr
- debug eigrp fsm
- debug eigrp neighbor
- debug eigrp notifications
- debug eigrp nsf
- debug eigrp packets
- debug eigrp service-family
- debug eigrp transmit
- debug elb-pal-pd
- debug emm
- debug eou
- debug epc
- debug ephone alarm
- debug ephone blf
- debug ephone ccm-compatible
- debug ephone detail
- debug ephone error
- debug ephone extension-assigner
- debug ephone lpcor
- debug ephone keepalive
- debug ephone loopback
- debug ephone message
- debug ephone mlpp
- debug ephone moh
- debug ephone mwi
- debug ephone pak
- debug ephone qov
- debug ephone raw
- debug ephone register
- debug ephone sccp-state
- debug ephone state
- debug ephone statistics
- debug ephone video
- debug ephone vm-integration
- debug ephone whisper-intercom
- debug epmpal
- debug errors
- debug eswilp
- debug ethernet cfm all
- debug ethernet cfm diagnostic
- debug ethernet cfm error
- debug ethernet cfm errors
- debug ethernet cfm ha
- debug ethernet cfm packets
- debug ethernet cfm pm
- debug ethernet event microwave
- debug ethernet l2ctrl
- debug ethernet lmi
- debug ethernet nid
- debug ethernet oam
- debug ethernet ring g8032 errors
- debug ethernet ring g8032 events
- debug ethernet ring g8032 fsm
- debug ethernet ring g8032 packets
- debug ethernet service
- debug ethernet service instance dynamic
- debug event manager
- debug events
- debug fax dmsp
- debug fax fmsp
- debug fax foip
- debug fax mmoip aaa
- debug fax mspi
- debug fax mta
- debug fax relay capture-log
- debug fax relay event-log
- debug fax relay t30
- debug fddi smt-packets
- debug filesystem
- debug firewall
- debug flow exporter
- debug flow monitor
- debug flow record
- debug flow-sampler
- debug fm ipv6 pbr
- debug fm private-hosts
- debug fm raguard
- debug fmsp receive
- debug fmsp send
- debug foip off-ramp
- debug foip on-ramp
- debug format
- debug fpm event
- debug frame-relay
- debug frame-relay adjacency
- debug frame-relay callcontrol
- debug frame-relay end-to-end keepalive
- debug frame-relay events
- debug frame-relay foresight
- debug frame-relay fragment
- debug frame-relay hqf
- debug frame-relay informationelements
- debug frame-relay ip tcp header-compression
- debug frame-relay lapf
- debug frame-relay lmi
- debug frame-relay multilink
- debug frame-relay networklayerinterface
- debug frame-relay packet
- debug frame-relay ppp
- debug frame-relay pseudowire
- debug frame-relay redundancy
- debug frame-relay switching
- debug frame-relay vc-bundle
- debug frame-relay virtual
- debug fras error
- debug fras-host activation
- debug fras-host error
- debug fras-host packet
- debug fras-host snmp
- debug fras message
- debug fras state
- debug ftpserver
- debug gatekeeper gup
- debug gatekeeper load
- debug gatekeeper server
- debug ggsn quota-server
- debug glbp errors
- debug glbp events
- debug glbp packets
- debug glbp terse
- debug gprs category fsm event
- debug gprs charging
- debug gprs dcca
- debug gprs dfp
- debug gprs dhcp
- debug gprs gtp
- debug gprs gtp parsing
- debug gprs gtp ppp
- debug gprs gtp ppp-regeneration
- debug gprs gtp-director
- debug gprs radius
- debug gprs redundancy
- debug gvrp
- debug h225
- debug h225 asn1
- debug h225 events
- debug h245 asn1
- debug h245 events
- debug h245 srtp
- debug h323-annexg
- debug hccp timing
- debug hpi
- debug http client
- debug http client cookie
- debug hw-module all upgrade
- debug hw-module subslot
- debug hw-module subslot commands
- debug hw-module subslot errors
- debug hw-module subslot events
- debug hw-module subslot interrupts
- debug hw-module subslot ipcshim
- debug hw-module subslot oir
- debug hw-module subslot periodic
debug eap through debug hw-module subslot periodic
debug eap through debug hw-module subslot periodic
debug eap
To display information about Extensible Authentication Protocol (EAP), use the debug eapcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug eap [ all | method ] [ authenticator | peer ] { all | errors | events | packets | sm }
no debug eap [ all | method ] [ authenticator | peer ] { all | errors | events | packets | sm }
Syntax Description
Command Modes
Privileged EXEC #
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command was introduced. |
12.4(6)T |
The method argument and authenticator and peer keywords were added. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2(33)SXI |
This command was integrated into Cisco IOS Release 12.2(33)SXI. |
Examples
The following sample output from the debug eap all command shows all EAP information:
Router# debug eap all *Nov 7 13:05:58.512: EAP-EVENT: Received get canned status from lower layer (0x00000000) *Nov 7 13:05:59.460: EAP-EVENT: Received context create from lower layer (0x00000009) *Nov 7 13:05:59.460: eap_authen : initial state eap_auth_initialize has enter *Nov 7 13:05:59.460: EAP-EVENT: Started 'Authenticator Start' timer (1s) for EAP sesion handle 0xD6000008 *Nov 7 13:05:59.460: EAP-EVENT: Allocated new EAP context (handle = 0xD6000008) *Nov 7 13:05:59.464: EAP-EVENT: Started EAP tick timer *Nov 7 13:06:00.488: EAP-EVENT: 'Authenticator Start' timer expired for EAP sesion handle 0xD6000008 *Nov 7 13:06:00.488: eap_authen : during state eap_auth_initialize, got event 21(eapStartTmo) *Nov 7 13:06:00.488: @@@ eap_authen : eap_auth_initialize -> eap_auth_select_action *Nov 7 13:06:00.488: eap_authen : during state eap_auth_select_action, got event 17(eapDecisionPropose) *Nov 7 13:06:00.488: @@@ eap_authen : eap_auth_select_action -> eap_auth_propose_method
Related Commands
Command |
Description |
---|---|
debug eou |
Displays information about EAPoUDP. |
debug ecfmpal
To enable debugging of the data path of the Ethernet Connectivity Fault Management (CFM) function, use the debug ecfmpal command in the privileged EXEC mode. To disable the debugging function, use the no form of this command.
debug ecfmpal { all | api | common | ecfmpal | epl | isr }
no debug ecfmpal { all | api | common | ecfmpal | epl | isr }
Syntax Description
all |
Specifies all the platform Ethernet CFM events. |
api |
Specifies the platform-specific application program interface (API) Ethernet CFM events. |
common |
Specifies the common Ethernet CFM events. |
ecfmpal |
Specifies the general Ethernet CFM platform events. |
epl |
Specifies the end-point list Ethernet CFM events. |
isr |
Specifies the platform-interrupt service request events. |
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release | Modification |
---|---|
15.4(1)T |
This command was introduced into Cisco IOS Release 15.4(1)T. |
Usage Guidelines
Use this command to troubleshoot Ethernet CFM functions on the following routers:
Examples
The following is a sample output of the debug ecfmpal all command:
Device# debug ecfmpal all ECFMPAL EPL events debugging is on ECFMPAL Ingress ISR events debugging is on ECFMPAL events debugging is on ECFMPAL API events debugging is on ECFMPAL common events debugging is on Router# *Nov 15 05:10:25.909: ECFMPD-API: Port MEP Gi0/2.1 get 0 02DB7F44
debug eigrp address-family neighbor
To display debugging information about Enhanced Interior Gateway Routing Protocol (EIGRP) address family neighbors, use the debug eigrp address-family neighbor command in privileged EXEC mode. To disable debugging of EIGRP service-family neighbors, use the no form of this command.
debug eigrp address-family [ ipv4 | ipv6 ] neighbor [ip-address]
no debug eigrp address-family [ ipv4 | ipv6 ] neighbor [ip-address]
Syntax Description
ipv4 |
(Optional) Enables debugging for neighbors formed using the IPv4 protocol family. |
ipv6 |
(Optional) Enables debugging for neighbors formed using the IPv6 protocol family. |
ip-address |
(Optional) IPv4 or IPv6 address of the neighbor. Specifying an address enables debugging for the service family at this address. |
Command Default
Debugging of EIGRP service-family neighbors is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
15.0(1)M |
This command was introduced. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
12.2(33)XNE |
This command was integrated into Cisco IOS Release 12.2(33)XNE. |
Cisco IOS XE Release 2.5 |
This command was integrated into Cisco IOS XE Release 2.5. |
Usage Guidelines
Consult Cisco technical support before using this command.
Caution | Use of debug commands can have severe performance penalties and should be used with extreme caution. For this reason, Cisco recommends that you contact Cisco technical support before enabling a debug command. |
Examples
The following example shows how to enable debugging of an EIGRP address-family neighbor at 10.0.0.0:
Router# debug eigrp address-family ipv4 neighbor 10.0.0.0 Neighbor target enabled on AS 3 for 10.0.0.0 *Mar 17 15:50:53.244: EIGRP: 10.0.0.0/24 - do advertise out Serial1/2 *Mar 17 15:50:53.244: EIGRP: Int 10.0.0.0/24 metric 20512000 -20000000 512000 *Mar 17 15:50:53.244: EIGRP: 10.0.0.0/24 - do advertise out Serial1/2 *Mar 17 15:50:53.244: EIGRP: Int 10.0.0.0/24 metric 28160 - 256002560 *Mar 17 15:50:53.244: EIGRP: 10.0.0.0/24 - do advertise out Serial1/2 *Mar 17 15:50:53.244: EIGRP: 10.0.0.0/24 - do advertise out Serial1/2 *Mar 17 15:50:53.244: EIGRP: Int 10.0.0.0/24 metric 28160 - 25600256 *Mar 17 15:50:53.668: EIGRP: Processing incoming UPDATE packet *Mar 17 15:50:54.544: EIGRP: 10.0.0.0/24 - do advertise out Serial1/1
Related Commands
Command |
Description |
---|---|
debug eigrp address-family notifications |
Displays debugging information about EIGRP event notifications. |
debug eigrp address-family notifications
To display debugging information about Enhanced Interior Gateway Routing Protocol (EIGRP) address family event notifications, use the debug eigrp address-family notifications command in privileged EXEC mode. To disable EIGRP event notification debugging, use the no form of this command.
debug eigrp address-family { ipv4 [ autonomous-system-number | vrf [vrf-name] | ip-address ] | ipv6 [ autonomous-system-number | ip-address ] } notifications
no debug eigrp address-family { ipv4 [ autonomous-system-number | vrf [vrf-name] | ip-address ] | ipv6 [ autonomous-system-number | ip-address ] } notifications
Syntax Description
ipv4 |
Enables debugging for neighbors formed using the IPv4 protocol family. |
ipv6 |
Enables debugging for neighbors formed using the IPv6 protocol family. |
autonomous-system- number |
(Optional) Autonomous system number of the EIGRP routing process. If no autonomous system number is specified, debugging information is displayed for all autonomous systems. |
vrf |
(Optional) Enables debugging for the specified VRF. |
vrf-name |
(Optional) Name of the VRF address family to which the command is applied. |
ip-address |
(Optional) IPv4 or IPv6 address of neighbor. Specifying an address enables debugging for all entries with this address. |
Command Default
EIGRP event notification debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
15.0(1)M |
This command was introduced. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
12.2(33)XNE |
This command was integrated into Cisco IOS Release 12.2(33)XNE. |
Cisco IOS XE Release 2.5 |
This command was integrated into Cisco IOS XE Release 2.5. |
Usage Guidelines
Consult Cisco technical support before using this command.
Caution | Use of debug commands can have severe performance penalties and should be used with extreme caution. For this reason, Cisco recommends that you contact Cisco technical support before enabling a debug command. |
Examples
The following example shows how to enable EIGRP event notification debugging:
Router# debug eigrp address-family ipv4 notifications *Mar 17 15:58:07.144: IP-EIGRP: Callback: reload_iptable *Mar 17 15:58:08.148: IP-EIGRP: iptable_redistribute into eigrp AS 1 *Mar 17 15:58:12.144: IP-EIGRP: Callback: redist frm static AS 0 10.0.0.0/24 *Mar 17 15:58:12.144: into: eigrp AS 1 event: 1 *Mar 17 15:58:12.144: IP-EIGRP: Callback: redist frm static AS 0 172.16.0.0/24 *Mar 17 15:58:12.144: into: eigrp AS 1 event: 1
Related Commands
Command |
Description |
---|---|
debug eigrp address-family neighbor |
Displays debugging information about EIGRP service family neighbors. |
debug eigrp frr
To display debugging information about Enhanced Interior Gateway Routing Protocol (EIGRP) Fast Reroute (FRR) events, use the debug eigrp frr command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug eigrp frr
no debug eigrp frr
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
15.2(4)S |
This command was introduced. |
Cisco IOS XE Release 3.7S |
This command was integrated into Cisco IOS XE Release 3.7S. |
Examples
The following is sample output from the debug eigrp frr command. The fields in the display are self-explanatory.
Device# debug eigrp frr *May 25 15:34:48.421: EIGRP-FRR: 10.6.6.6 can not be a LFA *May 25 15:34:48.421: EIGRP-FRR: 192.168.1.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.422: EIGRP-FRR: 192.168.3.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.422: EIGRP-FRR: 10.3.3.3 can not be a LFA *May 25 15:34:48.422: EIGRP-FRR: 10.6.6.6 can not be a LFA *May 25 15:34:48.422: EIGRP-FRR: 192.168.1.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.422: EIGRP-FRR: 192.168.2.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.422: EIGRP-FRR: 192.168.3.0/24 is having 2 available paths and 2 successors *May 25 15:34:48.435: EIGRP-FRR: 10.5.5.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.435: EIGRP-FRR: 10.1.1.2 can not be a LFA *May 25 15:34:48.435: EIGRP-FRR: 10.3.3.3 can not be a LFA *May 25 15:34:48.435: EIGRP-FRR: 10.6.6.6 can not be a LFA *May 25 15:34:48.435: EIGRP-FRR: 192.168.1.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.435: EIGRP-FRR: 192.168.2.0/24 is having 2 available paths and 1 successors *May 25 15:34:48.435: EIGRP-FRR: Number of LFA are 1 *May 25 15:34:48.435: EIGRP-FRR: Going to update repair path for 192.168.2.0/24 with 10.2.3.3 *May 25 15:34:48.435: EIGRP-IPv4-FRR: Repair path for 192.168.2.0/24 with nexthop 10.2.3.3 has been updated *May 25 15:34:48.436: EIGRP-FRR: 192.168.3.0/24 is having 3 available paths and 1 successors *May 25 15:34:48.436: EIGRP-FRR: Number of LFA are 2 *May 25 15:34:48.436: EIGRP-FRR: SRLG Disjoint *May 25 15:34:48.436: EIGRP-FRR: Going to update repair path for 192.168.3.0/24 with 10.3.3.1 *May 25 15:34:48.436: EIGRP-IPv4-FRR: Repair path for 192.168.3.0/24 with nexthop 10.3.3.1 has been updated *May 25 15:34:48.446: EIGRP-FRR: 10.10.10.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.446: EIGRP-FRR: 10.4.4.4 can not be a LFA *May 25 15:34:48.446: EIGRP-FRR: 10.1.1.2 can not be a LFA *May 25 15:34:48.446: EIGRP-FRR: 10.3.3.3 can not be a LFA *May 25 15:34:48.446: EIGRP-FRR: 10.6.6.6 can not be a LFA *May 25 15:34:48.446: EIGRP-FRR: 192.168.1.0/24 is having 1 available paths and 1 successors *May 25 15:34:48.447: EIGRP-FRR: 192.168.3.0/24 is having 4 available paths and 1 successors *May 25 15:34:48.447: EIGRP-FRR: Number of LFA are 3 *May 25 15:34:48.447: EIGRP-FRR: SRLG Disjoint *May 25 15:34:48.447: EIGRP-FRR: Going to update repair path for 192.168.3.0/24 with 10.4.3.1 *May 25 15:34:48.447: EIGRP-IPv4-FRR: Repair path for 192.168.3.0/24 with nexthop 10.4.3.4 has been updated RTR-1# *May 25 15:34:48.447: EIGRP-IPv4-FRR: Repair path for 192.168.3.0/24 with nexthop 10.2.3.3 has been deleted
debug eigrp fsm
To display debugging information about Enhanced Interior Gateway Routing Protocol (EIGRP) feasible successor metrics (FSMs), use the debug eigrp fsm command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug eigrp fsm
no debug eigrp fsm
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.0(7)T |
This command was introduced. |
12.4(6)T |
Support for IPv6 was added. |
12.2(33)SRB |
This command was integrated into Cisco IOS Release 12.2(33)SRB. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Cisco IOS XE Release 2.1 |
This command was introduced on Cisco ASR 1000 Series Routers. |
Usage Guidelines
This command helps you observe EIGRP feasible successor activity and to determine whether route updates are being installed and deleted by the routing process.
Examples
The following is sample output from the debug eigrp fsm command:
Router# debug eigrp fsm DUAL: dual_rcvupdate(): 172.25.166.0 255.255.255.0 via 0.0.0.0 metric 750080/0 DUAL: Find FS for dest 172.25.166.0 255.255.255.0. FD is 4294967295, RD is 42949 67295 found DUAL: RT installed 172.25.166.0 255.255.255.0 via 0.0.0.0 DUAL: dual_rcvupdate(): 192.168.4.0 255.255.255.0 via 0.0.0.0 metric 4294967295/ 4294967295 DUAL: Find FS for dest 192.168.4.0 255.255.255.0. FD is 2249216, RD is 2249216 DUAL: 0.0.0.0 metric 4294967295/4294967295not found Dmin is 4294967295 DUAL: Dest 192.168.4.0 255.255.255.0 not entering active state. DUAL: Removing dest 192.168.4.0 255.255.255.0, nexthop 0.0.0.0 DUAL: No routes. Flushing dest 192.168.4.0 255.255.255.0
In the first line, DUAL stands for diffusing update algorithm. It is the basic mechanism within EIGRP that makes the routing decisions. The next three fields are the Internet address and mask of the destination network and the address through which the update was received. The metric field shows the metric stored in the routing table and the metric advertised by the neighbor sending the information. If shown, the term "Metric... inaccessible" usually means that the neighbor router no longer has a route to the destination, or the destination is in a hold-down state.
In the following output, EIGRP is attempting to find a feasible successor for the destination. Feasible successors are part of the DUAL loop avoidance methods. The FD field contains more loop avoidance state information. The RD field is the reported distance, which is the metric used in update, query, or reply packets.
The indented line with the "not found" message means a feasible successor (FS) was not found for 192.168.4.0 and EIGRP must start a diffusing computation. This means it begins to actively probe (sends query packets about destination 192.168.4.0) the network looking for alternate paths to 192.164.4.0.
DUAL: Find FS for dest 192.168.4.0 255.255.255.0. FD is 2249216, RD is 2249216 DUAL: 0.0.0.0 metric 4294967295/4294967295not found Dmin is 4294967295
The following output indicates the route DUAL successfully installed into the routing table:
DUAL: RT installed 172.25.166.0 255.255.255.0 via 0.0.0.0
The following output shows that no routes to the destination were discovered and that the route information is being removed from the topology table:
DUAL: Dest 192.168.4.0 255.255.255.0 not entering active state. DUAL: Removing dest 192.168.4.0 255.255.255.0, nexthop 0.0.0.0 DUAL: No routes. Flushing dest 192.168.4.0 255.255.255.0
debug eigrp neighbor
To display neighbors discovered by the Enhanced Interior Gateway Routing Protocol (EIGRP), use the debug eigrp neighbor command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug eigrp neighbor [siatimer] [static]
no debug eigrp neighbor [siatimer] [static]
Syntax Description
siatimer |
(Optional) Stuck-in-active (SIA) timer messages. |
static |
(Optional) Static routes. |
Command Default
Debugging for EIGRP neighbors is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.0(7)T |
This command was introduced. |
12.4(6)T |
Support for IPv6 was added. |
12.2(33)SRB |
This command was integrated into Cisco IOS Release 12.2(33)SRB. |
12.2(37)SE |
This command was integrated into Cisco IOS Release 12.2(37)SE. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Cisco IOS XE Release 2.1 |
This command was introduced on Cisco ASR 1000 Series Routers. |
Examples
The following is sample output from the debug eigrp neighbor command:
Router# debug eigrp neighbor static
EIGRP Static Neighbors debugging is on Router# configure terminal Router(config)# router eigrp 100 Router(config-router)# neighbor 10.1.1.1 e3/1 Router(config-router)# 22:40:07:EIGRP:Multicast Hello is disabled on Ethernet3/1! 22:40:07:EIGRP:Add new static nbr 10.1.1.1 to AS 100 Ethernet3/1 Router(config-router)# no neighbor 10.1.1.1 e3/1 Router(config-router)# 22:41:23:EIGRP:Static nbr 10.1.1.1 not in AS 100 Ethernet3/1 dynamic list 22:41:23:EIGRP:Delete static nbr 10.1.1.1 from AS 100 Ethernet3/1 22:41:23:EIGRP:Multicast Hello is enabled on Ethernet3/1!
Related Commands
Command |
Description |
---|---|
neighbor |
Defines a neighboring router with which to exchange routing information. |
show ip eigrp neighbors |
Displays EIGRP neighbors. |
show ipv6 eigrp neighbors |
Displays IPv6 EIGRP neighbors. |
debug eigrp notifications
To debug notifications sent from the L2L3 API interface, use the debug eigrp notificationscommand in privileged EXEC mode. To turn off debugging, use the no form of this command.
debug eigrp notifications { rib | interface }
Syntax Description
rib |
Captures notifications from the routing information base (RIB) |
interface |
Captures notifications from the interface. |
Command Default
Debugging of EIGRP notifications for the L2L3 API interface is not enabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(15)XF |
This command was introduced. |
12.4(15)T |
This command was integrated into Cisco IOS Release 12.4(15)T. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
Usage Guidelines
Consult Cisco technical support before using this command.
Caution | Use of debug commands can have severe performance penalties and should be used with extreme caution. For this reason, Cisco recommends that you contact Cisco technical support before enabling a debug command. |
Examples
The following example displays information about the L2L3 API Interface:
Router# debug eigrp notifications rib
Related Commands
Command |
Description |
---|---|
eigrp interface |
Sets a threshold value to minimize hysteresis in a router-to-radio configuration. |
interface vmi |
Creates a virtual multipoint interface (VMI) that can be configured and applied dynamically. |
debug eigrp nsf
To display nonstop forwarding (NSF) events in the console of an NSF-aware or NSF-capable router, use the debug eigrp nsf command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug eigrp nsf
no debug eigrp nsf
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(15)T |
This command was introduced. |
12.2(28)SB |
This command was integrated into Cisco IOS Release 12.2(28)SB. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
15.0(1)M |
This command was integrated into Cisco IOS Release 15.0(1)M. |
Cisco IOS XE Release 3.6S |
This command was modified. Support for IPv6 and IPv6 VPN Routing and Forwarding (VRF) was added. |
15.2(2)S |
This command was modified. Support for IPv6 and IPv6 VRF was added. |
15.2(1)E |
This command was integrated into Cisco IOS Release 15.2(1)E. |
Usage Guidelines
The output from the debug eigrp nsf command displays NSF-specific events. The debug eigrp nsf command can be issued on either an NSF-capable or an NSF-aware router.
Examples
The following example shows how to enable the Enhanced Interior Gateway Routing Protocol (EIGRP) NSF debugging and display information about neighbor devices:
Device# debug eigrp nsf EIGRP NSF debugging is on Device# show ip eigrp neighbors detail EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 10.1.2.1 Et1/0 11 00:00:25 10 200 0 5 Version 5.1/3.0, Retrans: 2, Retries: 0, Prefixes: 1 Topology-ids from peer - 0 ! *Sep 23 18:57:19.423: %DUAL-5-NBRCHANGE: EIGRP-IPv4 100: Neighbor 10.1.2.1 (Ethernet1/0) is resync: peer graceful-restart *Sep 23 18:57:19.423: EIGRP: NSF: AS100, NSF or GR initiated by 10.1.2.1, flags 0x4:(RS) *Sep 23 18:57:36.028: EIGRP: NSF: AS100, Receive EOT from 10.1.2.1, Flags 0x8:(EOT) *Sep 23 18:57:36.028: EIGRP: NSF: route hold timer set to flush stale routes *Sep 23 18:57:36.038: EIGRP: NSF: AS100. route hold timer expiry *Sep 23 18:57:36.038: EIGRP: NSF: EIGRP-IPv4: Search for stale routes from 10.1.2.1 ! Device# show ip eigrp neighbors detail EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 10.1.2.1 Et1/0 11 00:02:31 12 200 0 6 Time since Restart 00:01:34 Version 5.1/3.0, Retrans: 2, Retries: 0, Prefixes: 1 Topology-ids from peer - 0
The following sample output is displayed when a router is unable to handle an event with NSF-Awareness:
*Jan 23 18:59:56.040: EIGRP: NSF: AS100: Checking if Graceful Restart is possible with neighbor 1.1.2.1, peer_down reason 'peer restarted' *Jan 23 18:59:56.040: EIGRP: NSF: Not possible: 'peer_down was called with a HARD resync flag' *Jan 23 18:59:56.040: %DUAL-5-NBRCHANGE: EIGRP-IPv6 100: Neighbor 10.1.2.1 (Ethernet1/0) is down: peer restarted *Jan 23 19:00:00.170: %DUAL-5-NBRCHANGE: EIGRP-IPv6 100: Neighbor 10.1.2.1 (Ethernet1/0) is up: new adjacency *Jan 23 19:00:00.170: EIGRP: NSF: Enqueuing NULL update to 10.1.2.1, flags 0x1:(INIT)
debug eigrp packets
To display debugging information about Enhanced Interior Gateway Routing Protocol (EIGRP) packets, use the debug eigrp packets command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug eigrp packets [ SIAquery | SIAreply | ack | hello | ipxsap | probe | query | reply | request | retry | stub | terse | update | verbose ] [ detail ]
no debug eigrp packets
Syntax Description
SIAquery |
(Optional) Enables debugging of stuck-in-active (SIA) query messages. |
SIAreply |
(Optional) Enables debugging of SIA reply messages. |
ack |
(Optional) Enables debugging of EIGRP acknowledgment packets. |
hello |
(Optional) Enables debugging of EIGRP hello packets. |
ipxsap |
(Optional) Enables debugging of EIGRP Internetwork Packet Exchange (IPX) Service Advertisement Protocol (SAP) packets. |
probe |
(Optional) Enables debugging of EIGRP probe packets. |
query |
(Optional) Enables debugging of EIGRP query packets. |
reply |
(Optional) Enables debugging of EIGRP reply packets. |
request |
(Optional) Enables debugging of EIGRP request packets. |
retry |
(Optional) Enables debugging of EIGRP retry packets. |
stub |
(Optional) Enables debugging of EIGRP stub packets. |
terse |
(Optional) Enables debugging of all EIGRP packets except hello packets. |
update |
(Optional) Enables debugging of EIGRP update packets. |
verbose |
(Optional) Enables debugging of all EIGRP packets. |
detail |
(Optional) Enables detailed debugging of packets, depending on any of the keywords specified in the command. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.0(7)T |
This command was introduced. |
12.4(6)T |
This command was modified. Support for IPv6 was added. |
12.2(33)SRB |
This command was integrated into Cisco IOS Release 12.2(33)SRB. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Cisco IOS XE Release 2.1 |
This command was implemented on Cisco ASR 1000 Series Aggregation Services Routers. |
15.2(4)S |
This command was modified. The detail keyword was added. |
Cisco IOS XE Release 3.7S |
This command was modified. The detail keyword was added. |
Usage Guidelines
Use the debug eigrp packets command to analyze messages traveling between local and remote hosts.
Note | Although this command accepts a number of keywords, we do not recommend their use. |
Examples
The following sample output from the debug eigrp packets command displays the transmission and receipt of EIGRP packets. These packet types may be hello, update, request, query, or reply packets. The sequence and acknowledgment numbers used by the EIGRP reliable transport algorithm are shown in the output. Wherever applicable, the network-layer address of the neighboring router is also included.
Device# debug eigrp packets *May 24 15:33:10.255: EIGRP: Sending HELLO on Ethernet0/1 *May 24 15:33:10.255: AS 109, Flags 0x0, Seq 0, Ack 0 *May 24 15:33:10.255: EIGRP: Sending HELLO on Ethernet0/1 *May 24 15:33:10.255: AS 109, Flags 0x0, Seq 0, Ack 0 *May 24 15:33:10.255: EIGRP: Sending HELLO on Ethernet0/1 *May 24 15:33:10.255: AS 109, Flags 0x0, Seq 0, Ack 0 *May 24 15:33:10.255: EIGRP: Received UPDATE on Ethernet0/1 from 192.168.78.24, *May 24 15:33:10.255: AS 109, Flags 0x1, Seq 1, Ack 0 *May 24 15:33:10.255: EIGRP: Sending HELLO/ACK on Ethernet0/1 to 192.168.78.24, *May 24 15:33:10.255: AS 109, Flags 0x0, Seq 0, Ack 1 *May 24 15:33:10.255: EIGRP: Sending HELLO/ACK on Ethernet0/1 to 192.168.78.24, *May 24 15:33:10.255: AS 109, Flags 0x0, Seq 0, Ack 1 *May 24 15:33:10.255: EIGRP: Received UPDATE on Ethernet0/1 from 192.168.78.24, *May 24 15:33:10.255 AS 109, Flags 0x0, Seq 2, Ack 0
The following sample output from the debug eigrp packets hello detail command displays debugging details of EIGRP hello packets:
Device# debug eigrp packets hello detail *May 25 15:33:10.255: EIGRP: Sending HELLO on Et1/0 - paklen 20 *May 25 15:33:10.255: AS 1, Flags 0x0:(NULL), Seq 0/0 interfaceQ 0/0 iidbQ un/rely 0/0 *May 25 15:33:10.255: {type = 1, length = 12} *May 25 15:33:10.255: {vector = { *May 25 15:33:10.255: {01000100 0000000F} *May 25 15:33:10.255: } *May 25 15:33:10.255: {type = 4, length = 8} *May 25 15:33:10.255: {vector = { *May 25 15:33:10.255: {0B000200} *May 25 15:33:10.255: } *May 25 15:33:10.695: EIGRP: Sending HELLO on Et0/2 - paklen 20 *May 25 15:33:10.695: AS 1, Flags 0x0:(NULL), Seq 0/0 interfaceQ 0/0 iidbQ un/rely 0/0 *May 25 15:33:10.695: {type = 1, length = 12} *May 25 15:33:10.695: {vector = { *May 25 15:33:10.695: {01000100 0000000F} *May 25 15:33:10.695: } *May 25 15:33:10.695: {type = 4, length = 8} *May 25 15:33:10.695: {vector = { *May 25 15:33:10.695: {0B000200} *May 25 15:33:10.695: }
The table below describes the significant fields shown in the displays.
Field |
Description |
---|---|
EIGRP: |
EIGRP packet information. |
AS 109 |
Autonomous system number. |
Flags 0x0 |
A flag of 1 means that the sending device is informing the receiving device that this is the first packet that is being sent to the receiver. A flag of 2 is a multicast that should be conditionally received by devices that have been previously set with the conditionally receive (CR) bit. This bit gets set when the sender of the multicast has previously sent a sequence packet explicitly telling the packet to set the CR bit. A flag of 0X0 means no flags are set on the packet. |
HELLO |
Hello packets are neighbor discovery packets. They are used to determine whether neighbors are still alive. As long as neighbors receive the hello packets that a device is sending, the neighbors validate the device and any routing information sent by the device. |
debug eigrp service-family
To troubleshoot an Enhanced Interior Gateway Routing Protocol (EIGRP) service-family external client, client, neighbor, notification, topology, or a VRF instance, use the debug eigrp service-familycommand in privileged EXEC mode.
{ debug eigrp service-family [ external-client { client client-label | messages [client-label] | protocol [client-label] } ] | { ipv4 | ipv6 } [ [ vrf vrf-name | autonomous-system-number | service-instance-number ] | client client-label | neighbor neighbor-ip-address | notifications topology service-instance-number ] }
Syntax Description
external-client |
(Optional) Displays information for a Cisco SAF External Client. |
client |
Displays information for managing clients and TCP connections. |
messages |
(Optional) Reliability metric. The range is 0 to 255, entered in increments of 2.5 where 255 is 100-percent reliable. |
protocol |
(Optional) Displays information on an external-client protocol. |
client-label |
(Optional) Displays a client, message, or protocol debug for the specified Cisco SAF External Client. |
ipv4 |
Specifies the IP Version 4 address family for this debug. |
ipv6 |
Specifies the IP Version 6 address family for this debug. |
vrf |
(Optional) Specifies all virtual routing forwarding (VRF) instance tables or a specific VRF table for an IP address. |
vrf-name |
(Optional) Specifies a VRF table for an IP address. |
autonomous-system-number |
The Autonomous system number. |
service-instance- number |
(Optional) Service-instance number between 1 and 65535. Service instance numbers display as: service:subservice:instance.instance.instance.instance. |
client |
(Optional) Displays EIGRP client information. |
client-label |
(Optional) A specific client. |
neighbors |
(Optional) Displays EIGRP neighbor debugging information. |
neighbor-ip- address |
(Optional) The IP address of the neighbor. |
notifications |
(Optional) Displays EIGRP notification debugging information. |
topology |
(Optional) Specifies a service topology. |
service-instance- number |
(Optional) Service-instance number between 1 and 65535. Topology service instance numbers display as: service:subservice:instance.instance.instance.instance. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
15.0(1)M |
This command was introduced. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
12.2(33)XNE |
This command was integrated into Cisco IOS Release 12.2(33)XNE. |
Cisco IOS XE Release 2.5 |
This command was integrated into Cisco IOS XE Release 2.5. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
15.2(1)S |
This command was deprecated in Cisco IOS Release 15.2(1)S and replaced by the debug service-routing xmcp command. |
Cisco IOS XE Release 3.5S |
This command was deprecated in Cisco IOS XE Release 3.5S and replaced by the debug service-routing xmcp command. |
15.2(2)T |
This command was deprecated in Cisco IOS Release 15.2(2)T and replaced by the debug service-routing xmcp command. |
Usage Guidelines
Use the debug eigrp service-family external-client clientcommand to display information to help manage clients and TCP connections. Use the debug eigrp service-family external-client messagescommand to display message content and decoded messages. Use the debug eigrp service-family external-client protocolcommand to display encode and decode information to help manage the interaction with the Cisco SAF internal API.
Note | Using the debug eigrp service-family ipv6 commands requires an IPv6-enabled SAF client, which currently does not exist. |
Examples
The following is sample output of a Cisco SAF External-Client debugging message: Router# debug eigrp service-family external-client messages *Jun 11 14:25:10.051: 2 found c1 c1 *Jun 11 14:25:10.051: SAF-EC: 100 byte message from c1 *Jun 11 14:25:10.051: 0001 0050 7F5A 9BC7 D285 A1D8 3C54 552F 37AE 655B 0014 0005 2253 4146 2200 *Jun 11 14:25:10.051: 0000 0006 0005 756E 616D 6500 0000 1005 0002 6331 0000 1003 0004 0001 0000 *Jun 11 14:25:10.051: 1001 0002 6331 0000 1004 0004 0000 0005 0008 0014 45F4 57A9 42CF 0556 4077 *Jun 11 14:25:10.051: 7AA3 B94A 703F 1BA3 ACA7 *Jun 11 14:25:10.051: *Jun 11 14:25:10.051: Class: Success Response Method: Register *Jun 11 14:25:10.051: Packet Length: 52 Not including 20 byte Saf Header *Jun 11 14:25:10.051: Magic Cookie: 7F5A9BC7 Transaction ID: D285A1D83C54552F37AE65 Router#5B *Jun 11 14:25:10.051: Realm: 014: Length: 5: "SAF" *Jun 11 14:25:10.051: Keep Alive: 1006: Length: 4: 360000 *Jun 11 14:25:10.051: Client Handle: 1002: Length: 4: 2 *Jun 11 14:25:10.051: Message Integrity: 008: Length: 20: 86839D4C64E36476D743AAF26112D28C32E3DF99 *Jun 11 14:25:10.051: 0101 0034 7F5A 9BC7 D285 A1D8 3C54 552F 37AE 655B 0014 0005 2253 4146 2200 *Jun 11 14:25:10.051: 0000 1006 0004 0005 7E40 1002 0004 0000 0002 0008 0014 8683 9D4C 64E3 6476 *Jun 11 14:25:10.051: D743 AAF2 6112 D28C 32E3 DF99 *Jun 11 14:25:10.055: *Jun 11 14:25:10.055: SAF-EC: kicked timer 360000 The following is sample output of a Cisco SAF External-Client debugging protocol message: Router# debug eigrp service-family external-client protocol *Jun 11 14:27:11.467: SAF-EC: attribute found, type: 1005 *Jun 11 14:27:11.467: No error *Jun 11 14:27:11.467: Class: Request Method: Register *Jun 11 14:27:11.467: Packet Length: 80 bytes Not including 20 byte Saf Header *Jun 11 14:27:11.467: Magic Cookie: 7F5A9BC7 Transaction ID: 8F1F3F36EE43784D0DFABEA6 *Jun 11 14:27:11.467: Realm: 014: Length: 5: "SAF" *Jun 11 14:27:11.467: Username: 006: Length: 5: uname *Jun 11 14:27:11.467: Client Label: 1005: Length: 2: c1 *Jun 11 14:27:11.467: Protocol Version: 1003: Length: 4: 10000 *Jun 11 14:27:11.467: Client Name: 1001: Length: 2: c1 *Jun 11 14:27:11.467: Page Size: 1004: Length: 4: 5 Router# *Jun 11 14:27:11.467: Message Integrity: 008: Length: 20: AB3D7C39E4E0673B1539750D6E21A79ACFCE51F8 *Jun 11 14:27:11.467: SAF-EC: request start. *Jun 11 14:27:11.467: SAF-EC: client successfully registered. client_handle 3 Router#
Related Commands
Command |
Description |
---|---|
exit-service-family |
Exits service-family configuration mode. |
router eigrp |
Configures the EIGRP process. |
service-family |
Specifies service-family configuration mode. |
debug eigrp transmit
To display transmittal messages sent by the Enhanced Interior Gateway Routing Protocol (EIGRP), use the debug eigrp transmit command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug eigrp transmit [ack] [build] [detail] [link] [packetize] [peerdown] [sia] [startup] [strange]
no debug eigrp transmit [ack] [build] [detail] [link] [packetize] [peerdown] [sia] [startup] [strange]
Syntax Description
ack |
(Optional) Information for acknowledgment (ACK) messages sent by the system. |
build |
(Optional) Build information messages (messages that indicate that a topology table was either successfully built or could not be built). |
detail |
(Optional) Additional detail for debug output. |
link |
(Optional) Information regarding topology table linked-list management. |
packetize |
(Optional) Information regarding topology table linked-list management. |
peerdown |
(Optional) Information regarding the impact on packet generation when a peer is down. |
sia |
(Optional) Stuck-in-active (SIA) messages. |
startup |
(Optional) Information regarding peer startup and initialization packets that have been transmitted. |
strange |
(Optional) Unusual events relating to packet processing. |
Command Default
Debugging for EIGRP transmittal messages is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1 |
This command was introduced. |
12.4(6)T |
Support for IPv6 was added. |
12.2(33)SRB |
This command was integrated into Cisco IOS Release 12.2(33)SRB. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Cisco IOS XE Release 2.1 |
This command was introduced on Cisco ASR 1000 Series Routers. |
Examples
The following is sample output from the debug eigrp transmit command:
Router# debug eigrp transmit EIGRP Transmission Events debugging is on (ACK, PACKETIZE, STARTUP, PEERDOWN, LINK, BUILD, STRANGE, SIA, DETAIL) Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router#(config)# router eigrp 100 Router#(config-router)# network 10.4.9.0 0.0.0.255 Router#(config-router)# 5d22h: DNDB UPDATE 10.0.0.0/8, serno 0 to 1, refcount 0 Router#(config-router)#
debug elb-pal-pd
To display debugging information related to the Ethernet Data Plane Loopback feature, use the debug elb-pal-pd command in the privileged EXEC mode. To disable the debugging function, use the no form of this command.
debug elb-pal-pd { all | error | event }
no debug elb-pal-pd { all | error | event }
Syntax Description
all |
Displays all the debugging information pertaining to the Ethernet data plane loopback configuration. |
error |
Displays debugging information pertaining to the Ethernet data plane loopback configuration errors. |
event |
Displays debugging information pertaining to the Ethernet data plane loopback configuration changes. |
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release | Modification |
---|---|
15.4(1)T |
This command was introduced into Cisco IOS Release 15.4(1)T. |
Usage Guidelines
Use this command to display the errors that occur when the Ethernet Data Plane Loopback feature is configured on the following routers:
Examples
The following is a sample output of the debug elb-pal-pd event command:
Device# debug elb-pal-pd event elb pal pd event debugging is on
The following is a sample output of the ethernet loopback start local interface command:
Device# ethernet loopback start local interface GigabitEthernet0/2.301 external timeout none This is an intrusive loopback and the packets matched with the service will not be able to pass through. Continue? (yes/[no]): yes Router# *Nov 27 20:34:37.200: elb service info in PAL: session id 1, interface GigabitEthernet0/2.301, si_handle 0x0, dir Facility, session_type 3,src mac 0000.0000.0000, dest mac 0000.0000.0000, dot1q_bl , second_dot1q_bl , cos 8, oui 0 etype 0, filter_option_flags 0 *Nov 27 20:34:37.200: elb_pd_sb_init *Nov 27 20:34:37.200: cn_xfr_ge_elb_pd_loopback: on_off 1, hwidb 0x3CFFC364, elb_pd_intf_lpbk_count 1 *Nov 27 20:34:37.200: elb_pal_pd_loopback_wrapper: elb_pal_pd_loopback action succeeded. *Nov 27 20:34:37.200: elb_pal_pd_start_lb: filter_out_vlan 0x0000, filter_in_vlan 0x0000, intf_out_vlan 0xFFFF, intf_in_vlan 0xFFFF *Nov 27 20:34:37.200: elb_pal_pd_start_lb: option_flag 0x00000000, filter_dir 1, loopback_on_off 1, session_type 3 *Nov 27 20:34:37.200: elb_pal_pd_start_lb: elb_pal_pd_num_intf_lpbk 1 *Nov 27 20:34:37.200: %E_DLB-6-DATAPLANE_LOOPBACK_START: Ethernet Dataplane Loopback Start on interface GigabitEthernet0/2.301 with session id 1 Router#
Related Commands
Command |
Description |
---|---|
ethernet loopback start local interface |
Starts Ethernet external loopback on the subinterface. |
debug emm
To debug Embedded Menu Manager (EMM) Menu Definition Files (MDFs), use the debug emmcommand in user EXEC or privileged EXEC mode. To disable debugging, use the no form of this command.
debug emm
no debug emm
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled.
Command Modes
User EXEC (#)
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(20)T |
This command was introduced. |
Usage Guidelines
Do not run this command on the same vty as the EMM menu.
Examples
The following is sample output from the debug emmcommand. The output is described in the EMM XML Schema Definition (XSD), which is available for download at this website:
http://forums.cisco.com/eforum/servlet/EEM?page=main
Router# debug emm EMM debugging is on *Jun 10 15:45:42.043: Looking for MenuTitle, parent = Menu *Jun 10 15:45:42.063: Looking for GlobalTCL, parent = Menu *Jun 10 15:45:42.083: Looking for MenuTitle, parent = Menu
Related Commands
Command |
Description |
---|---|
emm |
Loads and launches preconfigured MDFs or launches loaded preconfigured EMM menus. |
emm clear |
Changes the terminal clear-screen escape sequence. |
show mdf |
Displays loaded preconfigured MDFs. |
debug eou
To display information about Extensible Authentication Protocol over User Datagram Protocol (UDP) (EAPoUDP), use the debug eou command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug eou { all | eap | errors | events | packets | ratelimit | sm }
no debug eou { all | eap | errors | events | packets | ratelimit | sm }
Syntax Description
all |
Displays all EAPoUDP information. |
eap |
Displays EAPoUDP packets. |
errors |
Displays information about EAPoUDP packet errors. |
events |
Displays information about EAPoUDP events. |
packets |
Displays EAPoUDP packet-related information. |
ratelimit |
Displays EAPoUDP posture-validation information. |
sm |
Displays EAPoUDP state machine transitions. |
Command Default
If you do not enter any keywords, debugging is turned on for all EAPoUDP messages.
Command Modes
Privileged EXEC #
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2(33)SXI |
This command was integrated into Cisco IOS Release 12.2(33)SXI. |
Examples
The following sample output from the debug eou all command shows all EAPoUDP information:
Router# debug eou all *Apr 9 19:30:40.782: eou-ev:EOU Init Validation for idb= FastEthernet0/0.420 src_mac= 0001.027c.f364 src_ip= 10.0.0.1 *Apr 9 19:30:40.786: eou_auth 10.0.0.1: initial state eou_initialize has enter *Apr 9 19:30:40.786: @@@ eou_auth 10.0.0.1: eou_initialize -> eou_hello *Apr 9 19:30:40.786: eou-ev:eou_send_hello_request: Send Hello Request host= 10.0.0.15 eou_port= 5566 (hex) *Apr 9 19:30:40.790: EAPoUDP (tx) Flags:0 Ver=1 opcode=2 Len=8 MsgId=3839857370 Assoc ID=0 *Apr 9 19:30:40.790: Dumping TLV contents *Apr 9 19:30:40.790: TLV M:1 R:0 Type=ASSOCIATION ID Length=4 Association=-1994800267 *Apr 9 19:30:40.999: EAPoUDP (rx) Flags:128 Ver=1 opcode=2 Len=24 MsgId=3839857370 Assoc ID=2300167029 *Apr 9 19:30:40.999: Dumping TLV contents *Apr 9 19:30:40.999: TLV M:1 R:0 Type=COOKIE PAYLOAD Length=12 07167CE0: 8919C375 259B6D41 5FEA5D27 ..Cu%.mA_j]' 07167CF0: *Apr 9 19:30:40.999: TLV M:1 R:0 Type=ASSOCIATION ID Length=4 Association=1016688999 *Apr 9 19:31:50.048: @@@ eou_auth 10.0.0.1: eou_eap -> eou_eap *Apr 9 19:31:50.048: eou-ev:10.0.0.1: msg = 24(eventEouEapSuccess) *Apr 9 19:31:50.048: eou_auth 10.0.0.1: during state eou_eap, got event 14(eouEapSuccess) *Apr 9 19:31:50.048: @@@ eou_auth 10.0.0.1: eou_eap -> eou_result *Apr 9 19:31:50.052: eou-ev:Starting RESULT timer 3(10.0.0.1)
Related Commands
Command |
Description |
---|---|
debug eap |
Displays information about EAP messages. |
debug ip admission eapoudp |
Displays information about EAPoUDP network admission control events. |
debug epc
To enable debugging of embedded packet capture (EPC) infrastructure, use the debug epc command in privileged EXEC mode. To disable debugging of packet capture infrastructure, use the no form of this command.
debug epc { capture-point | provision }
no debug epc { capture-point | provision }
Syntax Description
capture-point |
Specifies debugging of the capture point configuration. |
provisioning |
Specifies debugging of capture provisioning. |
Command Default
Debug messages are not logged.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Release 3.7S |
This command was introduced. |
Examples
The following example shows how to enable debugging of the Embedded Packet Capture (EPC) capture point:
Device# debug epc capture-point EPC capture point operations debugging is on Device# monitor capture mycap start *Jul 4 14:17:15.463: EPC CP: Starting the capture cap1 *Jul 4 14:17:15.463: EPC CP: (brief=3, detailed=4, dump=5) = 0 *Jul 4 14:17:15.463: EPC CP: final check before activation *Jul 4 14:17:15.463: EPC CP: setting up c3pl infra *Jul 4 14:17:15.463: EPC CP: Setup c3pl acl-class-policy *Jul 4 14:17:15.463: EPC CP: Creating a class *Jul 4 14:17:15.464: EPC CP: Creating a class : Successful *Jul 4 14:17:15.464: EPC CP: class-map Created *Jul 4 14:17:15.464: EPC CP: creating policy-name epc_policy_cap1 *Jul 4 14:17:15.464: EPC CP: Creating Policy epc_policy_cap1 of type 49 and client type 21 *Jul 4 14:17:15.464: EPC CP: Storing a Policy *Jul 4 14:17:15.464: EPC CP: calling ppm_store_policy with epc_policy *Jul 4 14:17:15.464: EPC CP: Creating Policy : Successful *Jul 4 14:17:15.464: EPC CP: policy-map created *Jul 4 14:17:15.464: EPC CP: creating filter for ANY *Jul 4 14:17:15.464: EPC CP: Adding acl to class : Successful *Jul 4 14:17:15.464: EPC CP: Setup c3pl class to policy *Jul 4 14:17:15.464: EPC CP: Attaching Class to Policy *Jul 4 14:17:15.464: EPC CP: Attaching epc_class_cap1 to epc_policy_cap1 *Jul 4 14:17:15.464: EPC CP: Attaching Class to Policy : Successful *Jul 4 14:17:15.464: EPC CP: setting up c3pl qos *Jul 4 14:17:15.464: EPC CP: DBG> Set packet rate limit to 1000 *Jul 4 14:17:15.464: EPC CP: creating action for policy_map epc_policy_cap1 class_map epc_class_cap1 *Jul 4 14:17:15.464: EPC CP: DBG> Set packet rate limit to 1000 *Jul 4 14:17:15.464: EPC CP: Activating Interface GigabitEthernet1/0/1 direction both *Jul 4 14:17:15.464: EPC CP: Id attached 0 *Jul 4 14:17:15.464: EPC CP: inserting into active lists *Jul 4 14:17:15.464: EPC CP: Id attached 0 *Jul 4 14:17:15.465: EPC CP: inserting into active lists *Jul 4 14:17:15.465: EPC CP: Activating Vlan *Jul 4 14:17:15.465: EPC CP: Deleting all temp interfaces *Jul 4 14:17:15.465: %BUFCAP-6-ENABLE: Capture Point cap1 enabled. *Jul 4 14:17:15.465: EPC CP: Active Capture 1 Device# monitor capture mycap stop *Jul 4 14:17:31.963: EPC CP: Stopping the capture cap1 *Jul 4 14:17:31.963: EPC CP: Warning: unable to unbind capture cap1 *Jul 4 14:17:31.963: EPC CP: Deactivating policy-map *Jul 4 14:17:31.963: EPC CP: Policy epc_policy_cap1 *Jul 4 14:17:31.964: EPC CP: Deactivating policy-map Successful *Jul 4 14:17:31.964: EPC CP: removing povision feature *Jul 4 14:17:31.964: EPC CP: Found action for policy-map epc_policy_cap1 class-map epc_class_cap1 *Jul 4 14:17:31.964: EPC CP: cleanning up c3pl infra *Jul 4 14:17:31.964: EPC CP: Removing Class epc_class_cap1 from Policy *Jul 4 14:17:31.964: EPC CP: Removing Class from epc_policy_cap1 *Jul 4 14:17:31.964: EPC CP: Successfully removed *Jul 4 14:17:31.964: EPC CP: Removing acl mac from class *Jul 4 14:17:31.964: EPC CP: Removing acl from class : Successful *Jul 4 14:17:31.964: EPC CP: Removing all policies *Jul 4 14:17:31.964: EPC CP: Removing Policy epc_policy_cap1 *Jul 4 14:17:31.964: EPC CP: Removing Policy : Successful *Jul 4 14:17:31.964: EPC CP: Removing class epc_class_cap1 *Jul 4 14:17:31.965: EPC CP: Removing class : Successful *Jul 4 14:17:31.965: %BUFCAP-6-DISABLE: Capture Point cap1 disabled. *Jul 4 14:17:31.965: EPC CP: Active Capture 0
The following example shows how to enable debugging of EPC provisioning:
Device# debug epc provision EPC provisioning debugging is on Device# monitor capture mycap start *Jul 4 14:17:54.991: EPC PROV: No action found for policy-map epc_policy_cap1 class-map epc_class_cap1 *Jul 4 14:17:54.991: EPC PROV: *Jul 4 14:17:54.991: Attempting to install service policy epc_policy_cap1 *Jul 4 14:17:54.992: EPC PROV: Attached service policy to epc idb subblock *Jul 4 14:17:54.992: EPC PROV: Successful. Create feature object *Jul 4 14:17:54.992: EPC PROV: *Jul 4 14:17:54.992: Attempting to install service policy epc_policy_cap1 *Jul 4 14:17:54.992: EPC PROV: Successful. Create feature object *Jul 4 14:17:54.992: %BUFCAP-6-ENABLE: Capture Point cap1 enabled. Device# monitor capture mycap stop *Jul 4 14:18:02.503: EPC PROV: Successful. Remove feature object *Jul 4 14:18:02.504: EPC PROV: Successful. Remove feature object *Jul 4 14:18:02.504: EPC PROV: Destroyed epc idb subblock *Jul 4 14:18:02.504: EPC PROV: Found action for policy-map epc_policy_cap1 class-map epc_class_cap1 *Jul 4 14:18:02.504: EPC PROV: Deleting EPC action *Jul 4 14:18:02.504: EPC PROV: Successful. CLASS_REMOVE, policy-map epc_policy_cap1, class epc_class_cap1 *Jul 4 14:18:02.504: %BUFCAP-6-DISABLE: Capture Point cap1 disabled.
Related Commands
Command |
Description |
---|---|
monitor capture start |
Starts the capture of packet data at a traffic trace point into a buffer. |
monitor capture stop |
Stops the capture of packet data at a traffic trace point. |
debug ephone alarm
To set SkinnyStation alarm messages debugging for the Cisco IP phone, use the debug ephone alarmcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone alarm [ mac-address mac-address ]
no debug ephone alarm [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)XT |
This command was introduced on the following platforms: Cisco 1750, Cisco 1751, Cisco 2600 series and Cisco 3600 series multiservice routers; and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(8)T |
This command was implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone alarm command shows all the SkinnyStation alarm messages sent by the Cisco IP phone. Under normal circumstances, this message is sent by the Cisco IP phone just before it registers, and the message has the severity level for the alarm set to “Informational” and contains the reason for the phone reboot or re-register. This type of message is entirely benign and does not indicate an error condition.
If the mac-address keyword is not used, the debug ephone alarm command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following example shows a SkinnyStation alarm message that is sent before the Cisco IP phone registers:
Router# debug ephone alarm phone keypad reset CM-closed-TCP CM-bad-state
Related Commands
Command |
Description |
---|---|
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone blf
To display debugging information for Busy Lamp Field (BLF) presence features, use the debug ephone blf command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ephone blf [ mac-address mac-address ]
no debug ephone blf [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a specific IP phone. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.4(11)XJ |
This command was introduced. |
12.4(15)T |
This command was integrated into Cisco IOS Release 12.4(15)T. |
Usage Guidelines
Use this command for troubleshooting BLF speed-dial and BLF call-list features for phones in a presence service.
Examples
The following is sample output from the debug ephone blf command.
Router# debug ephone blf EPHONE BLF debugging is enabled *Sep 4 07:18:26.307: skinny_asnl_callback: subID 16 type 4 *Sep 4 07:18:26.307: ASNL_RESP_NOTIFY_INDICATION *Sep 4 07:18:26.307: ephone-1[1]:ASNL notify indication message, feature index 4, subID [16] *Sep 4 07:18:26.307: ephone-1[1]:line status 6, subID [16] *Sep 4 07:18:26.307: ephone-1[1]:StationFeatureStatV2Message sent, status 2 *Sep 4 07:18:26.307: skinny_asnl_callback: subID 23 type 4 *Sep 4 07:18:26.307: ASNL_RESP_NOTIFY_INDICATION *Sep 4 07:18:26.307: ephone-2[2]:ASNL notify indication message, feature index 2, subID [23] *Sep 4 07:18:26.311: ephone-2[2]:line status 6, subID [23] *Sep 4 07:18:26.311: ephone-2[2]:StationFeatureStatV2Message sent, status 2 *Sep 4 07:18:28.951: skinny_asnl_callback: subID 16 type 4 *Sep 4 07:18:28.951: ASNL_RESP_NOTIFY_INDICATION *Sep 4 07:18:28.951: ephone-1[1]:ASNL notify indication message, feature index 4, subID [16] *Sep 4 07:18:28.951: ephone-1[1]:line status 1, subID [16] *Sep 4 07:18:28.951: ephone-1[1]:StationFeatureStatV2Message sent, status 1 *Sep 4 07:18:28.951: skinny_asnl_callback: subID 23 type 4 *Sep 4 07:18:28.951: ASNL_RESP_NOTIFY_INDICATION *Sep 4 07:18:28.951: ephone-2[2]:ASNL notify indication message, feature index 2, subID [23] *Sep 4 07:18:28.951: ephone-2[2]:line status 1, subID [23] *Sep 4 07:18:28.951: ephone-2[2]:StationFeatureStatV2Message sent, status 1
Related Commands
Command |
Description |
---|---|
blf-speed-dial |
Enables BLF monitoring for a speed-dial number on a phone registered to Cisco Unified CME. |
presence call-list |
Enables BLF monitoring for call lists and directories on phones registered to a Cisco Unified CME router. |
show presence global |
Displays configuration information about the presence service. |
show presence subscription |
Displays information about active presence subscriptions. |
debug ephone ccm-compatible
To display Cisco CallManager notification updates for calls between Cisco CallManager and Cisco CallManager Express, use the debug ephone ccm-compatiblecommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone ccm-compatible [ mac-address mac-address ]
no debug ephone ccm-compatible [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a Cisco IP phone for debugging. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(7)T |
This command was introduced. |
Usage Guidelines
This command displays call flow notification information for all calls between Cisco CallManager and Cisco CallManager Express, but it is most useful for filtering out specific information for transfer and forward cases. For basic call information, use the debug ephone state command.
If you do not specify the mac-address keyword, the debug ephone ccm-compatible command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the no form of this command with the mac-address keyword.
Debugging can be enabled or disabled on any number of Cisco IP phones. Cisco IP phones that have debugging enabled are listed in the debug field of the show ephone command output. When debugging is enabled for a Cisco IP phone, debug output is displayed for all phone extensions (virtual voice ports) associated with that phone.
Examples
The following sample output displays call flow notifications between Cisco CallManager and Cisco CallManager Express:
Router# debug ephone ccm-compatible *May 1 04:30:02.650:ephone-2[2]:DtAlertingTone/DtHoldTone - mediaActive reset during CONNECT *May 1 04:30:02.654:ephone-2[2]:DtHoldTone - force media STOP state *May 1 04:30:02.654://93/xxxxxxxxxxxx/CCAPI/ccCallNotify:(callID=0x5D,nData-> bitmask=0x00000007) *May 1 04:30:02.654://93/xxxxxxxxxxxx/VTSP:(50/0/3):-1:0:5/vtsp_process_event: vtsp:[50/0/3 (93), S_CONNECT, E_CC_SERVICE_MSG] *May 1 04:30:02.654://93/xxxxxxxxxxxx/VTSP:(50/0/3):-1:0:5/act_service_msg_dow n:. *May 1 04:30:02.658:dn_callerid_update DN 3 number= 12009 name= CCM7960 in state CONNECTED *May 1 04:30:02.658:dn_callerid_update (incoming) DN 3 info updated to *May 1 04:30:02.658:calling= 12009 called= 13003 origCalled= *May 1 04:30:02.658:callingName= CCM7960, calledName= , redirectedTo = *May 1 04:30:02.658:ephone-2[2][SEP003094C2999A]:refreshDisplayLine for line 1 DN 3 chan 1 *May 1 04:30:03.318:ephone-2[2]:DisplayCallInfo incoming call *May 1 04:30:03.318:ephone-2[2]:Call Info DN 3 line 1 ref 24 called 13003 calling 12009 origcalled 13003 calltype 1 *May 1 04:30:03.318:ephone-2[2]:Original Called Name UUT4PH3 *May 1 04:30:03.318:ephone-2[2]:CCM7960 calling *May 1 04:30:03.318:ephone-2[2]:UUT4PH3
Related Commands
Command |
Description |
---|---|
debug ephone state |
Displays call state information. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
show ephone |
Displays information about registered Cisco IP phones. |
debug ephone detail
To set detail debugging for the Cisco IP phone, use the debug ephone detail command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone detail [ mac-address mac-address ]
no debug ephone detail [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone detail command includes the error and state levels.
If the mac-address keyword is not used, the debug ephone detail command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of detail debugging of the Cisco IP phone with MAC address 0030.94c3.8724. The sample is an excerpt of some of the activities that takes place during call setup, connected state, active call, and the call being disconnected.
Router# debug ephone detail mac-address 0030.94c3.8724 Ephone detail debugging is enabled 1d04h: ephone-1[1]:OFFHOOK . . 1d04h: Skinny Call State change for DN 1 SIEZE . . 1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsOffHook . . 1d04h: ephone-1[1]:SetLineLamp 1 to ON . . 1d04h: ephone-1[1]:KeypadButtonMessage 5 . . 1d04h: ephone-1[1]:KeypadButtonMessage 0 . . 1d04h: ephone-1[1]:KeypadButtonMessage 0 . . 1d04h: ephone-1[1]:KeypadButtonMessage 2 . . 1d04h: ephone-1[1]:Store ReDial digit: 5002 . SkinnyTryCall to 5002 instance 1 . . 1d04h: ephone-1[1]:Store ReDial digit: 5002 1d04h: ephone-1[1]: SkinnyTryCall to 5002 instance 1 . . 1d04h: Skinny Call State change for DN 1 ALERTING . . 1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsRingOut . . 1d04h: ephone-1[1]:SetLineLamp 1 to ON 1d04h: SetCallInfo calling dn 1 dn 1 calling [5001] called [5002] . . 1d04h: ephone-1[1]: Jane calling 1d04h: ephone-1[1]: Jill . . 1d04h: SkinnyUpdateDnState by EFXS_RING_GENERATE for DN 2 to state RINGING . . 1d04h: SkinnyGetCallState for DN 2 CONNECTED . . 1d04h: ephone-1[1]:SetLineLamp 3 to ON 1d04h: ephone-1[1]:UpdateCallState DN 1 state 4 calleddn 2 . . 1d04h: Skinny Call State change for DN 1 CONNECTED . . 1d04h: ephone-1[1]:OpenReceive DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80 . . 1d04h: ephone-1[1]:OpenReceiveChannelAck 1.2.172.21 port=20180 1d04h: ephone-1[1]:Outgoing calling DN 1 Far-ephone-2 called DN 2 1d04h: SkinnyGetCallState for DN 1 CONNECTED . . 1d04h: ephone-1[1]:SetCallState line 3 DN 2 TsOnHook . . 1d04h: ephone-1[1]:SetLineLamp 3 to OFF . . 1d04h: ephone-1[1]:SetCallState line 1 DN 1 TsOnHook . . 1d04h: ephone-1[1]:Clean Up Speakerphone state 1d04h: ephone-1[1]:SpeakerPhoneOnHook 1d04h: ephone-1[1]:Clean up activeline 1 1d04h: ephone-1[1]:StopTone sent to ephone 1d04h: ephone-1[1]:Clean Up phone offhook state 1d04h: SkinnyGetCallState for DN 1 IDLE 1d04h: called DN -1, calling DN -1 phone -1 1d04h: ephone-1[1]:SetLineLamp 1 to OFF 1d04h: UnBinding ephone-1 from DN 1 1d04h: UnBinding called DN 2 from DN 1 1d04h: ephone-1[1]:ONHOOK 1d04h: ephone-1[1]:SpeakerPhoneOnHook 1d04h: ephone-1[1]:ONHOOK NO activeline .
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone error
To set error debugging for the Cisco IP phone, use the debug ephone error command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone error [ mac-address mac-address ]
no debug ephone error [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone error command cancels debugging at the detail and state level.
If the mac-address keyword is not used, the debug ephone error command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of error debugging for the Cisco IP phone with MAC address 0030.94c3.8724:
Router# debug ephone error mac-address 0030.94c3.8724 EPHONE error debugging is enabled socket [2] send ERROR 11 Skinny Socket [2] retry failure
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone extension-assigner
To display status messages produced by the extension assigner application, use the debug ephone extension-assigner command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone extension-assigner
no debug ephone extension-assigner
Syntax Description
This command has no arguments or keywords.
Command Default
Debug ephone extension-assigner is disabled.
Command Modes
Privileged EXEC
Command History
Cisco IOS Release |
Cisco Product |
Modification |
---|---|---|
12.4(4)XC4 |
Cisco Unified CME 4.0(3) |
This command was introduced. |
12.4(11)XJ |
Cisco Unified CME 4.1 |
This command was introduced. |
12.4(15)T |
Cisco Unified CME 4.1 |
This command was integrated into Cisco IOS Release 12.4(15)T. |
Usage Guidelines
This command displays status messages produced by the extension assigner application, including messages related to the functions performed by the following Tcl commands:
phone query--Verifies whether the ephone tag has been assigned a MAC address.
phone assign--Binds the MAC address from the caller’s phone to a preexisting ephone template.
phone unassign--Removes the MAC address from the ephone tag.
Before using this command, you must load the Tcl script for the extension assigner application.
Examples
The following is sample output of extension assigner debugging as the extension assigner application queries phones for their status and issues commands to assign or unassign extension numbers.
*Jun 9 19:08:10.627: ephone_query: inCallID=47, tag=4, ephone_tag=4 *Jun 9 19:08:10.627: extAssigner_IsEphoneMacPreset: ephone_tag = 4, ipKeyswitch.max_ephones = 96 *Jun 9 19:08:10.627: extAssigner_IsEphoneMacPreset: ephone_ptr->mac_addr_str = 000B46BDE075, MAC_EXT_RESERVED_VALUE = 02EAEAEA0000 *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: callID = 47 *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->physical_interface_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->type (6); CC_IF_TELEPHONY (6) *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: htsp->sig_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:10.627: SkinnyGetActivePhoneIndexFromCallid: dn = 4, chan = 1 *Jun 9 19:08:10.627: ephone_query: EXTASSIGNER_RC_SLOT_ASSIGNED_TO_CALLING_PHONE *Jun 9 19:08:22.763: ephone_unassign: inCallID=47, tag=4, ephone_tag=4 *Jun 9 19:08:22.763: extAssigner_IsEphoneMacPreset: ephone_tag = 4, ipKeyswitch.max_ephones = 96 *Jun 9 19:08:22.763: extAssigner_IsEphoneMacPreset: ephone_ptr->mac_addr_str = 000B46BDE075, MAC_EXT_RESERVED_VALUE = 02EAEAEA000 *Jun 9 19:08:22.763: is_ephone_auto_assigned: button-1 dn_tag=4 *Jun 9 19:08:22.763: is_ephone_auto_assigned: NO *Jun 9 19:08:22.763: SkinnyGetActivePhoneIndexFromCallid: callID = 47 *Jun 9 19:08:22.763: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->physical_interface_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:22.767: SkinnyGetActivePhoneIndexFromCallid: vdbPtr->type (6); CC_IF_TELEPHONY (6) *Jun 9 19:08:22.767: SkinnyGetActivePhoneIndexFromCallid: htsp->sig_type (26); CV_VOICE_EFXS (26) *Jun 9 19:08:22.767: SkinnyGetActivePhoneIndexFromCallid: dn = 4, chan = 1 *Jun 9 19:08:29.795: ephone-4[8]:fStationOnHookMessage: Extension Assigner request restart, cmd=2, new mac=02EAEAEA0004, ephone_tag=4 *Jun 9 19:08:30.063: %IPPHONE-6-UNREGISTER_NORMAL: ephone-4:SEP000B46BDE075 IP:5.5.0.1 Socket:8 DeviceType:Phone has unregistered normally. *Jun 9 19:08:30.063: ephone-4[8][SEP000B46BDE075]:extAssigner_assign: new mac=02EAEAEA0004, ephone-tag=4 *Jun 9 19:08:30.063: extAssigner_simple_assign: mac=02EAEAEA0004, tag=4 *Jun 9 19:08:30.063: ephone_updateCNF: update cnf_file ephone_tag=4 *Jun 9 19:08:30.063: extAssigner_assign: restart again (mac=02EAEAEA0004) ephone_tag=4 *Jun 9 19:08:30.131: %IPPHONE-6-REG_ALARM: 23: Name=SEP000B46BDE075 Load=8.0(2.0) Last=Reset-Restart *Jun 9 19:08:30.135: %IPPHONE-6-REGISTER_NEW: ephone-7:SEP000B46BDE075 IP:5.5.0.1 Socket:10 DeviceType:Phone has registered. *Jun 9 19:08:30.503: %IPPHONE-6-UNREGISTER_NORMAL: ephone-7:SEP000B46BDE075 IP:5.5.0.1 Socket:10 DeviceType:Phone has unregistered normally. *Jun 9 19:08:43.127: %IPPHONE-6-REG_ALARM: 22: Name=SEP000B46BDE075 Load=8.0(2.0) Last=Reset-Reset *Jun 9 19:08:43.131: %IPPHONE-6-REGISTER: ephone-7:SEP000B46BDE075 IP:5.5.0.1 Socket:13 DeviceType:Phone has registered.
Related Commands
Command |
Description |
---|---|
debug ephone state |
Sets state debugging for Cisco IP phones. |
debug voip application script |
Displays status messages produced by voice over IP application scripts. |
debug ephone lpcor
To display debugging information for calls using the logical partitioning class of restriction (LPCOR) feature, use the debug ephone lpcor command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ephone lpcor [ mac-address mac-address ]
no debug ephone lpcor [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a specific IP phone. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
15.0(1)XA |
This command was introduced. |
15.1(1)T |
This command was integrated into Cisco IOS Release 15.1(1)T. |
Usage Guidelines
Use this command for troubleshooting LPCOR calls to phones in a Cisco Unified CME system.
If the mac-address keyword is not used, this command debugs all phones that are registered to the Cisco Unified CME router. You can disable debugging for specific phones by using the mac-address keyword with the no form of this command.
Examples
The following is sample output from the debug ephone lpcor command for a call between ephone-1 and ephone-2 that was blocked by LPCOR policy validation:
Router# debug ephone lpcor *Jun 24 11:23:45.599: ephone-1[0/3][SEP003094C25F38]:ephone_get_lpcor_index: dir 0 *Jun 24 11:23:46.603: ephone-2[1/2][SEP0021A02DB62A]:ephone_get_lpcor_index: dir 1
Related Commands
Command |
Description |
---|---|
debug voip application lpcor |
Enables debugging of the LPCOR application system. |
debug voip lpcor |
Displays debugging information for the LPCOR feature. |
lpcor incoming |
Associates an incoming call with a LPCOR resource-group policy. |
lpcor outgoing |
Associates an outgoing call with a LPCOR resource-group policy. |
show ephone |
Displays information about phones registered to Cisco Unified CME. |
show voice lpcor policy |
Displays the LPCOR policy for the specified resource group. |
debug ephone keepalive
To set keepalive debugging for the Cisco IP phone, use the debug ephone keepalive command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone keepalive [ mac-address mac-address ]
no debug ephone keepalive [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone keepalive command sets keepalive debugging.
If the mac-address keyword is not used, the debug ephone keepalive command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of the keepalive status for the Cisco IP phone with MAC address 0030.94C3.E1A8:
Router# debug ephone keepalive mac-address 0030.94c3.E1A8 EPHONE keepalive debugging is enabled for phone 0030.94C3.E1A8 1d05h: ephone-1 Set interface FastEthernet0/0 ETHERNET 1d05h: ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 1d05h: ephone-1 Set interface FastEthernet0/0 ETHERNET 1d05h: ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 1d05h: Skinny Checking for stale sockets 1d05h: ephone-1 Set interface FastEthernet0/0 ETHERNET 1d05h: ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 1d05h: ephone-1 Set interface FastEthernet0/0 ETHERNET 1d05h: ephone-1[1]:Keepalive socket[1] SEP003094C3E1A8 1d05h: Skinny active socket list (3/96): 1 2 4
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone loopback
To set debugging for loopback calls, use the debug ephone loopback command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ephone loopback [ mac-address mac-address ]
no debug ephone loopback [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a Cisco IP phone for debugging. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)XT |
This command was introduced for Cisco IOS Telephony Services (now known as Cisco CallManager Express) Version 2.0 on the Cisco 1750, Cisco 1751, Cisco 2600 series, Cisco 3600 series, and Cisco IAD2420 series. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T. |
Usage Guidelines
The debug ephone loopback command sets debugging for incoming and outgoing calls on all loopback-dn pairs or on the single loopback-dn pair that is associated with the IP phone that has the MAC address specified in this command.
If you enable the debug ephone loopback command and the debug ephone pak command at the same time, the output displays packet debug output for the voice packets that are passing through the loopback-dn pair.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with that Cisco IP phone.
Examples
The following example contains two excerpts of output for a call that is routed through a loopback. The first excerpt is output from the show running-config command and displays the loopback configuration used for this example. The second excerpt is output from the debug ephone loopback command.
Router# show running-config . . . ephone-dn 14 number 1514 ! ! ephone-dn 42 number 17181.. loopback-dn 43 forward 4 no huntstop ! ! ephone-dn 43 number 19115.. loopback-dn 42 forward 4 ! . . .
A loopback call is started. An incoming call to 1911514 (ephone-dn 43) uses the loopback pair of ephone-dns to become an outgoing call to extension 1514. The number in the outgoing call has only four digits because the loopback-dn command specifies forwarding of four digits. The outgoing call uses ephone-dn 42, which is also specified in the l oopback-dn command under ephone-dn 43. When the extension at 1514 rings, the following debug output is displayed:
Router# debug ephone loopback Mar 7 00:57:25.376:Pass processed call info to special DN 43 chan 1 Mar 7 00:57:25.376:SkinnySetCallInfoLoopback DN 43 state IDLE to DN 42 state IDLE Mar 7 00:57:25.376:Called Number = 1911514 Called Name = Mar 7 00:57:25.376:Calling Number = 8101 Calling Name = orig Called Number = Copy Caller-ID info from Loopback DN 43 to DN 42 Mar 7 00:57:25.376:DN 43 Forward 1514 Mar 7 00:57:25.376:PredictTarget match 1514 DN 14 is idle Mar 7 00:57:25.380:SkinnyUpdateLoopbackState DN 43 state RINGING calledDn -1 Mar 7 00:57:25.380:Loopback DN 42 state IDLE Mar 7 00:57:25.380:Loopback DN 43 calledDN -1 callingDn -1 G711Ulaw64k Mar 7 00:57:25.380:SkinnyUpdateLoopbackState DN 43 to DN 42 signal OFFHOOK Mar 7 00:57:25.380:SetDnCodec Loopback DN 43 codec 4:G711Ulaw64k vad 0 size 160 Mar 7 00:57:25.380:SkinnyDnToneLoopback DN 42 state SIEZE to DN 43 state RINGING Mar 7 00:57:25.380:TONE ON DtInsideDialTone Mar 7 00:57:25.380:SkinnyDnToneLoopback called number = 1911514 Mar 7 00:57:25.380:DN 43 Forward 1514 Mar 7 00:57:25.380:DN 42 from 43 Dial 1514 Mar 7 00:57:25.384:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:25.384:TONE OFF Mar 7 00:57:25.384:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:25.384:TONE OFF Mar 7 00:57:25.384:SkinnyUpdateLoopbackState DN 42 state ALERTING calledDn -1 Mar 7 00:57:25.384:Loopback DN 43 state RINGING Mar 7 00:57:25.384:Loopback Alerting DN 42 calledDN -1 callingDn -1 G711Ulaw64k Mar 7 00:57:25.388:ephone-5[7]:DisplayCallInfo incoming call Mar 7 00:57:25.388:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:25.388:TONE ON DtAlertingTone Mar 7 00:57:25.388:SkinnyDnToneLoopback DN 42 to DN 43 deferred alerting by DtAlertingTone Mar 7 00:57:25.388:EFXS_STATE_ONHOOK_RINGING already done for DN 43 chan 1 Mar 7 00:57:25.388:Set prog_ind 0 for DN 42 chan 1 . . .
When extension 1514 answers the call, the following debug output is displayed:
. . . Mar 7 00:57:32.158:SkinnyDnToneLoopback DN 42 state ALERTING to DN 43 state RINGING Mar 7 00:57:32.158:TONE OFF Mar 7 00:57:32.158:dn_support_g729 true DN 42 chan 1 (loopback) Mar 7 00:57:32.158:SetDnCodec Loopback DN 43 codec 4:G711Ulaw64k vad 0 size 160 Mar 7 00:57:32.158:SkinnyUpdateLoopbackState DN 42 state CALL_START calledDn 14 Mar 7 00:57:32.158:Loopback DN 43 state RINGING Mar 7 00:57:32.158:SkinnyUpdateLoopbackState DN 42 to DN 43 deferred alerting by CALL_START already sent Mar 7 00:57:32.158:SetDnCodec reassert defer_start for DN 14 chan 1 Mar 7 00:57:32.158:Delay media until loopback DN 43 is ready Mar 7 00:57:32.158:SkinnyUpdateLoopbackCodec check for DN 14 chan 1 from DN 42 loopback DN 43 Mar 7 00:57:32.158:SkinnyUpdateLoopbackCodec DN chain is 14 1, other=42, lb=43, far=-1 1, final=43 1 Mar 7 00:57:32.158:SkinnyUpdateLoopbackCodec DN 14 chan 1 DN 43 chan 1 codec 4 match Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 42 state CONNECTED calledDn 14 Mar 7 00:57:32.162:Loopback DN 43 state RINGING Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 42 to DN 43 signal ANSWER Mar 7 00:57:32.162:Loopback DN 42 calledDN 14 callingDn -1 G711Ulaw64k Mar 7 00:57:32.162:Loopback DN 43 calledDN -1 callingDn -1 incoming G711Ulaw64k Mar 7 00:57:32.162:ephone-5[7][SEP000DBDBEF37D]:refreshDisplayLine for line 1 DN 14 chan 1 Mar 7 00:57:32.162:dn_support_g729 true DN 43 chan 1 (loopback) Mar 7 00:57:32.162:SetDnCodec Loopback DN 42 codec 4:G711Ulaw64k vad 0 size 160 Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 state CALL_START calledDn -1 Mar 7 00:57:32.162:Loopback DN 42 state CONNECTED Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 has defer_dn 14 chan 1 set Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 has defer_dn 14 chan 1: -invoke SkinnyOpenReceive Mar 7 00:57:32.162:SkinnyUpdateLoopbackCodec check for DN 14 chan 1 from DN 42 loopback DN 43 Mar 7 00:57:32.162:SkinnyUpdateLoopbackCodec DN chain is 14 1, other=42, lb=43, far=-1 1, final=43 1 Mar 7 00:57:32.162:SkinnyUpdateLoopbackCodec DN 14 chan 1 DN 43 chan 1 codec 4 match Mar 7 00:57:32.162:SkinnyUpdateLoopbackState DN 43 state CALL_START calledDn -1 Mar 7 00:57:32.162:Loopback DN 42 state CONNECTED Mar 7 00:57:32.454:SkinnyGetDnAddrInfo DN 43 LOOPBACK update media address to 10.0.0.6 25390 from DN 14 Mar 7 00:57:33.166:ephone-5[7]:DisplayCallInfo incoming call . . .
When the called extension, 1514, goes back on-hook, the following debug output is displayed:
. . . Mar 7 00:57:39.224:Loopback DN 42 disc reason 16 normal state CONNECTED Mar 7 00:57:39.224:SkinnyUpdateLoopbackState DN 42 state CALL_END calledDn -1 Mar 7 00:57:39.224:Loopback DN 43 state CONNECTED Mar 7 00:57:39.224:SkinnyUpdateLoopbackState DN 42 to DN 43 signal ONHOOK Mar 7 00:57:39.236:SkinnyDnToneLoopback DN 42 state IDLE to DN 43 state IDLE Mar 7 00:57:39.236:TONE OFF Mar 7 00:57:39.236:SkinnyDnToneLoopback DN 43 state IDLE to DN 42 state IDLE Mar 7 00:57:39.236:TONE OFF
The below table describes the significant fields shown in the display.
Related Commands
Command |
Description |
---|---|
debug ephone pak |
Provides voice packet level debugging. |
loopback-dn |
Configures loopback-dn virtual loopback voice ports used to establish demarcation points for VoIP voice calls and supplementary services. |
show ephone |
Displays information about registered Cisco IP phones. |
show ephone-dn loopback |
Displays information for ephone-dns that have been set up for loopback calls. |
debug ephone message
To enable message tracing between ephones, use the debug ephone messagecommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone message [detail]
no debug ephone message
Syntax Description
detail |
(Optional) Displays signaling connection control protocol (SCCP) messages sent and received between ephones in the Cisco Unified CallManager Express (Cisco Unified CME) system. |
Command Modes
Privileged EXEC
Command History
Cisco IOS Release |
Modification |
---|---|
12.4(4)XC |
This command was introduced. |
12.4(9)T |
This command was integrated into Cisco IOS Release 12.4(9)T. |
Usage Guidelines
The debug ephone message command enables message tracing between ephones.
The debug ephone command debugs all ephones associated with a Cisco Unified CME router.
You can enable or disable debugging on any number of ephones. To see the ephones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a ephone, the debug output is displayed for the directory numbers associated with the ephone.
Examples
The following is sample output for the debug ephone message command for ephones:
Router# debug ephone message EPHONE skinny message debugging is enabled *Jul 17 12:12:54.883: Received message from phone 7, SkinnyMessageID = StationKe epAliveMessageID *Jul 17 12:12:54.883: Sending message to phone 7, SkinnyMessageID = StationKe epAliveAckMessageID
The following command disables ephone message debugging:
Router# no debug ephone message EPHONE skinny message debugging is disabled
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the ephone. |
debug ephone detail |
Sets detail debugging for the ephone. |
debug ephone error |
Sets error debugging for the ephone. |
debug ephone mwi |
Sets MWI debugging for the ephone. |
debug ephone pak |
Provides voice packet level debugging and displays the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the ephone. |
debug ephone state |
Sets state debugging for the ephone. |
debug ephone statistics |
Sets statistics debugging for the ephone. |
debug ephone video |
Sets video debugging for the ephone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
show ephone |
Displays information about ephones. |
debug ephone mlpp
To display debugging information for Multilevel Precedence and Preemption (MLPP) calls to phones in a Cisco Unified CME system, use the debug ephone mlppcommand in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ephone mlpp [ mac-address mac-address ]
no debug ephone mlpp [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a specific IP phone. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(22)YB |
This command was introduced. |
12.4(24)T |
This command was integrated into Cisco IOS Release 12.4(24)T . |
Usage Guidelines
Use this command to troubleshoot calls that use the MLPP service.
Examples
The following is sample output from the debug ephone mlpp command. This example shows output for the following call scenario:
Ephone 1 is connected to ephone 3 (nonMLPP call).
Ephone 4 makes an MLPP call to ephone 3. Preemption tone is played to both ephone 1 and 3.
Ephone 3 is disconnected after the preemption tone timeout and precedence ringing.
Ephone 3 answers the MLPP call and is connected to ephone 4.
Router# debug ephone mlpp Sep 5 14:23:00.499: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:00.499: ephone-4[3/3][SEP001AE2BC3EE7]:max precedence=0 Sep 5 14:23:02.299: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp_ephone_display_update callID=294 Sep 5 14:23:02.299: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:02.299: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 Sep 5 14:23:02.303: ephone-3[2/1][SEP001B54BA0D64]:preemption=1 Sep 5 14:23:02.303: ephone-3[2/1][SEP001B54BA0D64]:preemption=1 Sep 5 14:23:02.303: mlpp_ephone_find_call: preempt_htsp=1774234732, prempt_htsp->mlpp_preemptor_cid=294 Sep 5 14:23:02.303: //294/A6B5C03A8141/VOIP-MLPP/voice_mlpp_get_preemptInfo: mlpp_ephone_find_call is successful Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 Sep 5 14:23:02.303: ephone-6[5/6][SEP0018187F49FD]:indication=1 Sep 5 14:23:02.303: ephone-6[5/6][SEP0018187F49FD]:mlpp precedence=4, domain=0 Sep 5 14:23:02.303: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:02.307: ephone-1[0/2][SEP0014A9818797]:indication=1 Sep 5 14:23:02.307: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:02.307: ephone-1[0/2][SEP0014A9818797]:indication=1DtPreemptionTone Sep 5 14:23:02.307: ephone-3[2/1][SEP001B54BA0D64]:indication=1DtPreemptionTone Sep 5 14:23:07.307: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:07.307: ephone-1[0/2][SEP0014A9818797]:indication=1 Sep 5 14:23:07.319: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:07.319: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:07.319: ephone-3[2/1][SEP001B54BA0D64]:mlpp precedence=4, domain=0 Sep 5 14:23:07.319: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:07.319: ephone-3[2/1][SEP001B54BA0D64]: MLPP Precedence Ring 6 instead Sep 5 14:23:10.623: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:10.623: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:10.623: ephone-3[2/1][SEP001B54BA0D64]:mlpp precedence=4, domain=0 Sep 5 14:23:10.623: ephone-3[2/1][SEP001B54BA0D64]:indication=1 Sep 5 14:23:10.623: ephone-3[2/1][SEP001B54BA0D64]:mlpp precedence=4, domain=0 Sep 5 14:23:10.623: ephone-4[3/3][SEP001AE2BC3EE7]:indication=1 Sep 5 14:23:10.623: ephone-4[3/3][SEP001AE2BC3EE7]:mlpp precedence=4, domain=0 Sep 5 14:23:10.623: ephone-6[5/6][SEP0018187F49FD]:indication=1 Sep 5 14:23:10.623: ephone-6[5/6][SEP0018187F49FD]:mlpp precedence=4, domain=0
Related Commands
Command |
Description |
---|---|
debug voice mlpp |
Displays debugging information for MLPP service. |
mlpp indication |
Enables MLPP indication on an SCCP phone or analog FXS port. |
mlpp max-precedence |
Sets the maximum precedence (priority) level that a phone user can specify when making an MLPP call. |
mlpp preemption |
Enables preemption capability on an SCCP phone or analog FXS port. |
debug ephone moh
To set debugging for music on hold (MOH), use the debug ephone mohcommand in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ephone moh [ mac-address mac-address ]
no debug ephone moh [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a Cisco IP phone for debugging. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)XT |
This command was introduced for Cisco IOS Telephony Services (now known as Cisco CallManager Express) Version 2.0 and Cisco Survivable Remote Site Telephony (SRST) Version 2.0 on the Cisco 1750, Cisco 1751, Cisco 2600 series, Cisco 3600 series, and Cisco IAD2420 series. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T. |
Usage Guidelines
Always use the no moh command before modifying or replacing the MOH file in Flash memory.
When a configuration using the multicast moh command is used and the debug ephone moh command is enabled, if you delete or modify the MOH file in the router's Flash memory, the debug output can be excessive and can flood the console. The multicast MOH configuration should be removed before using the no moh command when the debug ephone moh command is enabled.
Examples
The following sample output shows MOH activity prior to the first MOH session. Note that if you enable multicast MOH, that counts as the first session.
Router# debug ephone moh Mar 7 00:52:33.817:MOH AU file Mar 7 00:52:33.817:skinny_open_moh_play set type to 3 Mar 7 00:52:33.825: 2E73 6E64 0000 0018 0007 3CCA 0000 0001 Mar 7 00:52:33.825: 0000 1F40 0000 0001 FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF Mar 7 00:52:33.825: Mar 7 00:52:33.825:AU file processing Found .snd Mar 7 00:52:33.825:AU file data start at 24 end at 474338 Mar 7 00:52:33.825:AU file codec Media_Payload_G711Ulaw64k Mar 7 00:52:33.825:MOH read file header type AU start 24 end 474338 Mar 7 00:52:33.825:MOH pre-read block 0 at write-offset 0 from 24 Mar 7 00:52:33.833:MOH pre-read block 1 at write-offset 8000 from 8024 Mar 7 00:52:33.845:Starting read server with play-offset 0 write-offset 16000
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
type |
0--invalid 1--raw file 2--wave format file (.wav) 3--AU format (.au) 4--live feed |
AU file processing Found .snd |
A .snd header was located in the AU file. |
AU file data start at, end at |
Data start and end file offset within the MOH file, as indicated by the file header. |
read file header type |
File format found (AU, WAVE, or RAW). |
pre-read block, write-offset |
Location in the internal MOH buffer to which data is being written, and location from which that data was read in the file. |
play-offset, write-offset |
Indicates the relative positioning of MOH file read-ahead buffering. Data is normally written from a Flash file into the internal circular buffer, ahead of the location from which data is being played or output. |
Related Commands
Command |
Description |
---|---|
moh (telephony-service) |
Generates an audio stream from a file for MOH in a Cisco CME system. |
multicast moh |
Uses the MOH audio stream as a multicast source in a Cisco CME system. |
debug ephone mwi
To set message waiting indication (MWI) debugging for the Cisco IOS Telephony Service router, use the debug ephone mwicommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone mwi
no debug ephone mwi
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)XT |
This command was introduced on the following platforms: Cisco 1750, Cisco 1751, Cisco 2600 series and Cisco 3600 series multiservice routers; and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(8)T |
This command was implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone mwi command sets message waiting indication debugging for the Cisco IOS Telephony Service router. Because the MWI protocol activity is not specific to any individual Cisco IP phone, setting the MAC address keyword qualifier for this command is not useful.
Note | Unlike the other related debug ephone commands, the mac-address keyword does not help debug a particular Cisco IP phone. |
Examples
The following is sample output of the message waiting indication status for the Cisco IOS Telephony Service router:
Router# debug ephone mwi
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone pak
To provide voice packet level debugging and to print the contents of one voice packet in every 1024 voice packets, use the debug ephone pak command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone pak [ mac-address mac-address ]
no debug ephone pak [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone pak command provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets.
If the mac-address keyword is not used, the debug ephone pak command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of packet debugging for the Cisco IP phone with MAC address 0030.94c3.8724:
Router# debug ephone pak mac-address 0030.94c3.8724 EPHONE packet debugging is enabled for phone 0030.94c3.8724 01:29:14: ***ph_xmit_ephone DN 3 tx_pkts 5770 dest=10.2.1.1 orig len=32 pakcopy=0 discards 27 ip_enctype 0 0 last discard: unsupported payload type 01:29:14: to_skinny_duration 130210 offset -30 last -40 seq 0 adj 0 01:29:14: IP: 45B8 003C 0866 0000 3F11 3F90 2800 0001 0A02 0101 01:29:14: TTL 63 TOS B8 prec 5 01:29:14: UDP: 07D0 6266 0028 0000 01:29:14: sport 2000 dport 25190 length 40 checksum 0 01:29:14: RTP: 8012 16AF 9170 6409 0E9F 0001 01:29:14: is_rtp:1 is_frf11:0 vlen:0 delta_t:160 vofr1:0 vofr2:0 scodec:11 rtp_bits:8012 rtp_codec:18 last_bad_payload 19 01:29:14: vencap FAILED 01:29:14: PROCESS SWITCH 01:29:15: %SYS-5-CONFIG_I: Configured from console by console 01:29:34: ***SkinnyPktIp DN 3 10.2.1.1 to 40.0.0.1 pkts 4880 FAST sw 01:29:34: from_skinny_duration 150910 01:29:34: nw 3BBC2A8 addr 3BBC2A4 mac 3BBC2A4 dg 3BBC2C4 dgs 2A 01:29:34: MAC: 1841 0800 01:29:34: IP: 45B8 0046 682E 0000 3E11 E0BD 0A02 0101 2800 0001 01:29:34: TTL 62 TOS B8 prec 5 01:29:34: UDP: 6266 07D0 0032 0000 01:29:34: sport 25190 dport 2000 length 50 checksum 0 01:29:34: RTP: 8012 55FF 0057 8870 3AF4 C394 01:29:34: RTP: rtp_bits 8012 seq 55FF ts 578870 ssrc 3AF4C394 01:29:34: PAYLOAD: 01:29:34: 1409 37C9 54DE 449C 3B42 0446 3AAB 182E 01:29:34: 56BC 5184 58E5 56D3 13BE 44A7 B8C4 01:29:34: 01:29:37: ***ph_xmit_ephone DN 3 tx_pkts 6790 dest=10.2.1.1 orig len=32 pakcopy=0 discards 31 ip_enctype 0 0 last discard: unsupported payload type 01:29:37: to_skinny_duration 153870 offset -150 last -40 seq 0 adj 0 01:29:37: IP: 45B8 003C 0875 0000 3F11 3F81 2800 0001 0A02 0101 01:29:37: TTL 63 TOS B8 prec 5 01:29:37: UDP: 07D0 6266 0028 0000 01:29:37: sport 2000 dport 25190 length 40 checksum 0 01:29:37: RTP: 8012 1AAF 9173 4769 0E9F 0001 01:29:37: is_rtp:1 is_frf11:0 vlen:0 delta_t:160 vofr1:0 vofr2:0
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone qov
To display quality of voice (QOV) statistics for calls when preset limits are exceeded, use the debug ephone qovcommand in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ephone qov [ mac-address mac-address ]
no debug ephone qov [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a Cisco IP phone for debugging. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(15)ZJ2 |
This command was introduced for Cisco CallManager Express 3.0 and Cisco Survivable Remote Site Telephony (SRST) Version 3.0. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T. |
Usage Guidelines
Once enabled, the debug ephone qov command produces output only when the QOV statistics reported by phones exceed preset limits. Phones are polled every few seconds for QOV statistics on VoIP calls only, not on local PSTN calls. An output report is produced when limits are surpassed for either or both of the following:
Lost packets--A report is triggered when two adjacent QOV samples show an increase of four or more lost packets between samples. The report is triggered by an increase of lost packets in a short period of time, not by the total number of lost packets.
Jitter and latency--A report is triggered when either jitter or latency exceeds 100 milliseconds.
To receive a QOV report at the end of each call regardless of whether the QOV limits have been exceeded, enable the debug ephone alarm command in addition to the debug ephone qov command.
The debug ephone statistics command displays the raw statistics that are polled from phones and used to generate QOV reports.
Examples
The following sample output describes QOV statistics for a call on ephone 5:
Router# debug ephone qov Mar 7 00:54:57.329:ephone-5[7]:QOV DN 14 chan 1 (1514) ref 4 called=1514 calling=8101 Mar 7 00:54:57.329:ephone-5[7][SEP000DBDBEF37D]:Lost 91 Jitter 0 Latency 0 Mar 7 00:54:57.329:ephone-5[7][SEP000DBDBEF37D]:previous Lost 0 Jitter 0 Latency 0 Mar 7 00:54:57.329:ephone-5[7][SEP000DBDBEF37D]:Router sent 1153 pkts, current phone got 1141 received by all (shared) phones 0 Mar 7 00:54:57.329:ephone-5[7]:worst jitter 0 worst latency 0 Mar 7 00:54:57.329:ephone-5[7]:Current phone sent 1233 packets Mar 7 00:54:57.329:ephone-5[7]:Signal Level to phone 3408 (-15 dB) peak 3516 (-15 dB)
The following table describes the significant fields shown in the display.
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Displays alarm messages for IP phones. |
debug ephone statistics |
Displays call statistics for IP phones. |
debug ephone raw
To provide raw low-level protocol debugging display for all Skinny Client Control Protocol (SCCP) messages, use the debug ephone raw command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone raw [ mac-address mac-address ]
no debug ephone raw [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone raw command provides raw low-level protocol debug display for all SCCP messages. The debug display provides byte level display of Skinny TCP socket messages.
If the mac-address keyword is not used, the debug ephone raw command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of raw protocol debugging for the Cisco IP phone with MAC address 0030.94c3.E1A8:
Router# debug ephone raw mac-address 0030.94c3.E1A8 EPHONE raw protocol debugging is enabled for phone 0030.94C3.E1A8 1d05h: skinny socket received 4 bytes on socket [1] 0 0 0 0 1d05h: 1d05h: SkinnyMessageID = 0 1d05h: skinny send 4 bytes 4 0 0 0 0 0 0 0 0 1 0 0 1d05h: socket [1] sent 12 bytes OK (incl hdr) for ephone-(1) 1d06h: skinny socket received 4 bytes on socket [1] 0 0 0 0 1d06h: 1d06h: SkinnyMessageID = 0 1d06h: skinny send 4 bytes 4 0 0 0 0 0 0 0 0 1 0 0 1d06h: socket [1] sent 12 bytes OK (incl hdr) for ephone-(1)
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone register
To set registration debugging for the Cisco IP phone, use the debug ephone register command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone register [ mac-address mac-address ]
no debug ephone register [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone register command sets registration debugging for the Cisco IP phones.
If the mac-address keyword is not used, the debug ephone register command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of registration debugging for the Cisco IP phone with MAC address 0030.94c3.8724:
Router# debug ephone register mac-address 0030.94c3.8724 Ephone registration debugging is enabled 1d06h: New Skinny socket accepted [1] (2 active) 1d06h: sin_family 2, sin_port 50778, in_addr 10.1.0.21 1d06h: skinny_add_socket 1 10.1.0.21 50778 1d06h: ephone-(1)[1] StationRegisterMessage (2/3/12) from 10.1.0.21 1d06h: ephone-(1)[1] Register StationIdentifier DeviceName SEP003094C3E1A8 1d06h: ephone-(1)[1] StationIdentifier Instance 1 deviceType 7 1d06h: ephone-1[-1]:stationIpAddr 10.1.0.21 1d06h: ephone-1[-1]:maxStreams 0 1d06h: ephone-(1) Allow any Skinny Server IP address 10.1.0.6 . . . 1d06h: ephone-1[1]:RegisterAck sent to ephone 1: keepalive period 30 .
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
debug ephone statistics |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone sccp-state
To set debugging for the SCCP call state, use the debug ephone sccp-state command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone sccp-state [ mac-address mac-address ]
no debug ephone sccp-state [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a phone. |
Command Default
Debugging is not enabled for SCCP state.
Command Modes
Privileged EXEC
Command History
Cisco IOS Release |
Modification |
---|---|
12.4(4)XC |
This command was introduced. |
12.4(9)T |
This command was integrated into Cisco IOS Release 12.4(9)T. |
Usage Guidelines
This command is used with Cisco Unified CallManager Express (Cisco Unified CME).
This command outputs only the debug messages that correspond to SCCP messages sent to IP phones to indicate the SCCP phone call state, such as RingIn, OffHook, Connected, and OnHook. These debug messages are also included in the output for the debug ephone detail command among other information.
Examples
The following example sets SCCP state debugging for one Cisco Unified CME phone with the MAC address of 678B.AEF9.DAB5.
Router# debug ephone sccp-state mac-address 678B.AEF9.DAB5 EPHONE SCCP state message debugging is enabled for ephones 000B.BEF9.DFB5 *Mar 8 06:38:45.863: %ISDN-6-CONNECT: Interface Serial2/0/0:22 is now connected to 4085254871 unknown *Mar 8 06:38:50.487: ephone-2[13]:SetCallState line 4 DN 60(60) chan 1 ref 100 TsRingIn *Mar 8 06:38:52.399: ephone-2[13]:SetCallState line 4 DN 60(-1) chan 1 ref 100 TsOffHook *Mar 8 06:38:52.399: ephone-2[13]:SetCallState line 4 DN 60(-1) chan 1 ref 100 TsConnected *Mar 8 06:38:58.415: %ISDN-6-CONNECT: Interface Serial2/0/0:22 is now connected to 4085254871 unknown *Mar 8 06:38:59.963: ephone-2[13]:SetCallState line 4 DN 60(-1) chan 1 ref 100 TsOnHook *Mar 8 06:38:59.975: %ISDN-6-DISCONNECT: Interface Serial2/0/0:22 disconnected from 4085254871 , call lasted 7 seconds
Related Commands
Command |
Description |
---|---|
debug ephone detail |
Sets detail debugging for one or all Cisco Unified IP phones. |
debug ephone state
To set state debugging for the Cisco IP phone, use the debug ephone state command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone state [ mac-address mac-address ]
no debug ephone state [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on Cisco 1760 routers. |
Usage Guidelines
The debug ephone state command sets state debugging for the Cisco IP phones.
If the mac-address keyword is not used, the debug ephone state command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of state debugging for the Cisco IP phone with MAC address 0030.94c3.E1A8:
Router# debug ephone state mac-address 0030.94c3.E1A8 EPHONE state debugging is enabled for phone 0030.94C3.E1A8 1d06h: ephone-1[1]:OFFHOOK 1d06h: ephone-1[1]:SIEZE on activeline 0 1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsOffHook 1d06h: ephone-1[1]:Skinny-to-Skinny call DN 1 to DN 2 instance 1 1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsRingOut 1d06h: ephone-1[1]:Call Info DN 1 line 1 ref 158 called 5002 calling 5001 1d06h: ephone-1[1]: Jane calling 1d06h: ephone-1[1]: Jill 1d06h: ephone-1[1]:SetCallState line 3 DN 2 TsRingIn 1d06h: ephone-1[1]:Call Info DN 2 line 3 ref 159 called 5002 calling 5001 1d06h: ephone-1[1]: Jane calling 1d06h: ephone-1[1]: Jill 1d06h: ephone-1[1]:SetCallState line 3 DN 2 TsCallRemoteMultiline 1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsConnected 1d06h: ephone-1[1]:OpenReceive DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80 1d06h: ephone-1[1]:OpenReceiveChannelAck 1.2.172.21 port=24010 1d06h: ephone-1[1]:StartMedia 1.2.172.22 port=24612 1d06h: DN 1 codec 4:G711Ulaw64k duration 10 ms bytes 80 1d06h: ephone-1[1]:CloseReceive 1d06h: ephone-1[1]:StopMedia 1d06h: ephone-1[1]:SetCallState line 3 DN 2 TsOnHook 1d06h: ephone-1[1]:SetCallState line 1 DN 1 TsOnHook 1d06h: ephone-1[1]:SpeakerPhoneOnHook 1d06h: ephone-1[1]:ONHOOK 1d06h: ephone-1[1]:SpeakerPhoneOnHook 1d06h: SkinnyReportDnState DN 1 ONHOOK
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone |
Sets statistics debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone statistics
To set call statistics debugging for the Cisco IP phone, use the debug ephone statistics command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone statistics [ mac-address mac-address ]
no debug ephone statistics [ mac-address mac-address ]
Syntax Description
mac-address |
(Optional) Defines the MAC address of the Cisco IP phone. |
mac-address |
(Optional) Specifies the MAC address of the Cisco IP phone. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)YD |
This command was introduced on the following platforms: Cisco 2600 series and Cisco 3600 series multiservice routers, and Cisco IAD2420 series Integrated Access Devices (IADs). |
12.2(2)XT |
This command was implemented on the Cisco 1750 and Cisco 1751 multiservice routers. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T and implemented on the Cisco 3725 and Cisco 3745 routers. |
12.2(8)T1 |
This command was implemented on the Cisco 2600-XM and Cisco 2691 routers. |
12.2(11)T |
This command was implemented on the Cisco 1760 routers. |
Usage Guidelines
The debug ephone statistics command provides a debug monitor display of the periodic messages from the Cisco IP phone to the router. These include transmit-and-receive packet counts and an estimate of drop packets. The call statistics can also be displayed for live calls using the show ephone command.
If the mac-address keyword is not used, the debug ephone statistics command debugs all Cisco IP phones that are registered to the router. You can remove debugging for the Cisco IP phones that you do not want to debug by using the mac-address keyword with the no form of this command.
You can enable or disable debugging on any number of Cisco IP phones. To see the Cisco IP phones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a Cisco IP phone, the debug output is displayed for the directory numbers associated with the Cisco IP phone.
Examples
The following is sample output of statistics debugging for the Cisco IP phone with MAC address 0030.94C3.E1A8:
Router# debug ephone statistics mac-address 0030.94C3.E1A8 EPHONE statistics debugging is enabled for phone 0030.94C3.E1A8 1d06h: Clear Call Stats for DN 1 call ref 162 1d06h: Clear Call Stats for DN 1 call ref 162 1d06h: Clear Call Stats for DN 1 call ref 162 1d06h: Clear Call Stats for DN 2 call ref 163 1d06h: ephone-1[1]:GetCallStats line 1 ref 162 DN 1: 5001 1d06h: ephone-1[1]:Call Stats for line 1 DN 1 5001 ref 162 1d06h: ephone-1[1]:TX Pkts 0 bytes 0 RX Pkts 0 bytes 0 1d06h: ephone-1[1]:Pkts lost 4504384 jitter 0 latency 0 1d06h: ephone-1[1]:Src 0.0.0.0 0 Dst 0.0.0.0 0 bytes 80 vad 0 G711Ulaw64k 1d06h: ephone-1[1]:GetCallStats line 1 ref 162 DN 1: 5001 1d06h: STATS: DN 1 Packets Sent 0 1d06h: STATS: DN 2 Packets Sent 0 1d06h: ephone-1[1]:Call Stats found DN -1 from Call Ref 162 1d06h: ephone-1[1]:Call Stats for line 0 DN -1 5001 ref 162 1d06h: ephone-1[1]:TX Pkts 275 bytes 25300 RX Pkts 275 bytes 25300 1d06h: ephone-1[1]:Pkts lost 0 jitter 0 latency 0
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the Cisco IP phone. |
debug ephone detail |
Sets detail debugging for the Cisco IP phone. |
debug ephone error |
Sets error debugging for the Cisco IP phone. |
debug ephone keepalive |
Sets keepalive debugging for the Cisco IP phone. |
debug ephone loopback |
Sets MWI debugging for the Cisco IP phone. |
debug ephone pak |
Provides voice packet level debugging and prints the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the Cisco IP phone. |
debug ephone state |
Sets state debugging for the Cisco IP phone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
debug ephone video
To set video debugging for ephones, use the debug ephone video command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone video
no debug ephone video
Syntax Description
This command has no arguments or keywords.
Command Default
Debugging is disabled for ephone video.
Command Modes
Privileged EXEC
Command History
Cisco IOS Release |
Modification |
---|---|
12.4(4)XC |
This command was introduced. |
12.4(9)T |
This command was integrated into Cisco IOS Release 12.4(9)T. |
Usage Guidelines
The debug ephone video command sets ephone video traces, which provide information about different video states for the call, including video capabilities selection, start, and stop.
The debug ephone command debugs all ephones that are registered to the Cisco Unified CallManager Express (Cisco Unified CME) system.
You can enable or disable debugging on any number of ephones. To see the ephones that have debugging enabled, enter the show ephone command and look at the debug field in the output. When debugging is enabled for a ephone, the debug output is displayed for the directory numbers associated with the ephone.
Examples
The following is sample output for the debug ephone video command for ephones:
Router# debug ephone video *Mar 13 16:10:02.703: SkinnyVideoCodecMatch_Caps2Caps: match capability: tx_idxcap = 4, tx_idxpref = 3, *Mar 13 16:10:02.703: rx_idxcap = 0, rx_idxpref = 0, videoBitRate = 7040 tx_mpi = 1 *Mar 13 16:10:04.711: ephone-19[1][SEPFFFA00000019]:checkToOpenMultiMedia: dn=19, chan=1 *Mar 13 16:10:04.711: ephone-19[1]:skinnyDP[19].s2s = 0 *Mar 13 16:10:04.711: ephone-19[1]:s2s is not set - hence not video capable *Mar 13 16:10:04.719: ephone-19[1][SEPFFFA00000019]:SkinnyStartMultiMediaTransmission: chan 1 dn 19 *Mar 13 16:10:04.723: ephone-19[1]:Accept OLC and open multimedia channel *Mar 13 16:10:04.723: ephone-19[1][SEPFFFA00000019]:SkinnyOpenMultiMediaReceiveChannel: dn 19 chan 1 *Mar 13 16:10:04.967: ephone-19[1][SEPFFFA00000019]:fStationOpenReceiveChannelAckMessage: MEDIA_DN 19 MEDIA_CHAN 1 *Mar 13 16:10:04.967: ephone-19[1]:fStationOpenMultiMediaReceiveChannelAckMessage: *Mar 13 16:10:04.967: ephone-19[1]:Other_dn == -1 sk3745-2# *Mar 13 16:10:14.787: ephone-19[1]:SkinnyStopMedia: Stop Multimedia *Mar 13 16:10:14.787: ephone-19[1][SEPFFFA00000019]:SkinnyCloseMultiMediaReceiveChannel: passThruPartyID = 0, callReference = 23 *Mar 13 16:10:14.787: ephone-19[1]:SkinnyStopMultiMediaTransmission: line 1 chan 1 dn 19
Related Commands
Command |
Description |
---|---|
debug ephone alarm |
Sets SkinnyStation alarm messages debugging for the ephone. |
debug ephone detail |
Sets detail debugging for the ephone. |
debug ephone error |
Sets error debugging for the ephone. |
debug ephone message |
Sets message debugging for the ephone. |
debug ephone mwi |
Sets MWI debugging for the ephone. |
debug ephone pak |
Provides voice packet level debugging and displays the contents of one voice packet in every 1024 voice packets. |
debug ephone raw |
Provides raw low-level protocol debugging display for all SCCP messages. |
debug ephone register |
Sets registration debugging for the ephone. |
debug ephone state |
Sets state debugging for the ephone. |
debug ephone statistics |
Sets statistics debugging for the ephone. |
show debugging |
Displays information about the types of debugging that are enabled for your router. |
show ephone |
Displays information about registered ephones. |
debug ephone vm-integration
To display pattern manipulation information used for integration with voice-mail applications, use the debug ephone vm-integrationcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone vm-integration [ mac-address mac-address ]
no debug ephone vm-integration [ mac-address mac-address ]
Syntax Description
mac-address mac-address |
(Optional) Specifies the MAC address of a Cisco IP phone for debugging. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(7)T |
This command was introduced. |
Usage Guidelines
This command displays the voice-mail integration patterns that were created using the pattern commands in vm-integration configuration mode. The patterns are used to forward calls to a voice-mail number that is set with the voicemail command.
If you do not specify the mac-address keyword, the debug ephone vm-integration command debugs all Cisco IP phones that are registered to the router. To remove debugging for Cisco IP phones, enter the no form of this command with the mac-address keyword.
Examples
The following sample output shows information for the vm-integration tokens that have been defined:
Router# debug ephone vm-integration *Jul 23 15:38:03.294:ephone-3[3]:StimulusMessage 15 (1) From ephone 2 *Jul 23 15:38:03.294:ephone-3[3]:Voicemail access number pattern check *Jul 23 15:38:03.294:SkinnyGetCallState for DN 3 chan 1 IDLE *Jul 23 15:38:03.294:called DN -1 chan 1, calling DN -1 chan 1 phone -1 s2s:0 *Jul 23 15:38:03.294:dn number for dn 3 is 19003 *Jul 23 15:38:03.294:Updated number for token 1 is 19003 *Jul 23 15:38:03.294:CDN number for dn 3 is *Jul 23 15:38:03.294:Updated number for token 2 is *Jul 23 15:38:03.294:Updated number for token 0 is *Jul 23 15:38:03.294:Update is 219003* *Jul 23 15:38:03.294:New Voicemail number is 19101219003*
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
token 0 |
First token that was defined in the pattern. |
token 1 |
Second token that was defined in the pattern. |
token 2 |
Third token that was defined in the pattern. |
Related Commands
Command |
Description |
---|---|
pattern direct |
Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system when a user presses the Messages button on a phone. |
pattern ext-to-ext busy |
Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system once an internal extension reaches a busy extension and the call is forwarded to voice mail. |
pattern ext-to-ext no-answer |
Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system once an internal extension fails to connect to an extension and the call is forwarded to voice mail. |
pattern trunk-to-ext busy |
Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system once an external trunk call reaches a busy extension and the call is forwarded to voice mail. |
pattern trunk-to-ext no-answer |
Configures the DTMF digit pattern forwarding necessary to activate the voice-mail system when an external trunk call reaches an unanswered extension and the call is forwarded to voice mail. |
vm-integration |
Enters voice-mail integration configuration mode and enables voice-mail integration with DTMF and analog voice-mail systems. |
voicemail |
Defines the telephone number that is speed-dialed when the Messages button on a Cisco IP phone is pressed. |
debug ephone whisper-intercom
To display debugging messages for the Whisper Intercom feature, use the debug ephone whisper-intercom command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ephone whisper-intercom
no debug ephone whisper-intercom
Syntax Description
This command has no arguments or keywords.
Command Default
Debugging for Whisper Intercom is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(22)YB |
This command was introduced. |
12.4(24)T |
This command was integrated into Cisco IOS Release 12.4(24 |
Usage Guidelines
This command displays debugging information about the Whisper Intercom feature configured on a directory number of a SCCP phone.
Examples
The following example displays output from the debug ephone whisper-intercom command:
Router# debug ephone whisper-intercom ephone-1[0] Mac:1111.C1C1.0001 TCP socket:[8] activeLine:0 whisperLine:2 REGISTERED in SCCP ver 12/12 max_streams=3 mediaActive:0 whisper_mediaActive:0 startMedia:1 offhook:1 ringing:0 reset:0 reset_sent:0 paging 0 debug:0 caps:5 IP:10.6.2.185 9237 7970 keepalive 16 max_line 8 button 1: dn 1 number 2001 CH1 IDLE CH2 IDLE button 2: dn 161 number 6001 auto dial 6002 CH1 WHISPER Preferred Codec: g711ulaw Active Call on DN 161 chan 1 :6001 0.0.0.0 0 to 10.6.2.185 9280 via 10.6.2.185 G711Ulaw64k 160 bytes no vad Tx Pkts 0 bytes 0 Rx Pkts 0 bytes 0 Lost 0 Jitter 0 Latency 0 callingDn -1 calledDn 162 ephone-2[1] Mac:1111.C1C1.0002 TCP socket:[7] activeLine:0 whisperLine:2 REGISTERED in SCCP ver 12/12 max_streams=3 mediaActive:0 whisper_mediaActive:1 startMedia:0 offhook:1 ringing:0 reset:0 reset_sent:0 paging 0 debug:0 caps:5 IP:10.6.2.185 9240 7970 keepalive 16 max_line 8 button 1: dn 2 number 2002 CH1 IDLE CH2 IDLE button 2: dn 162 number 6002 auto dial 6001 CH1 WHISPER Preferred Codec: g711ulaw Active Call on DN 162 chan 1 :6002 10.6.2.185 9280 to 10.6.2.254 2000 via 10.6.2.185 G711Ulaw64k 160 bytes no vad Tx Pkts 0 bytes 0 Rx Pkts 0 bytes 0 Lost 0 Jitter 0 Latency 0 callingDn 161 calledDn -1
Related Commands
Command |
Description |
---|---|
show ephone-dn whisper |
Displays information about whisper intercom ephone-dns that have been created in Cisco Unified CME. |
whisper-intercom |
Enables the Whisper Intercom feature on a directory number. |
debug epmpal
To enable debugging of the Y.1731 Ethernet performance monitoring functions, use the debug epmpal command in the privileged EXEC mode. To disable the debugging function, use the no form of this command.
debug epmpal { all | api | rx | tx }
no debug epmpal { all | api | rx | tx }
Syntax Description
all |
Enables debugging of all the performance-monitoring events. |
api |
Enables debugging of the application program interface (API) events. |
rx |
Enables debugging of the receive events. |
tx |
Enables debugging of the transmit events. |
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release | Modification |
---|---|
15.4(1)T |
This command was introduced into Cisco IOS Release 15.4(1)T. |
Usage Guidelines
Use this command to troubleshoot the Y.1731 Ethernet performance-monitoring functions on the following routers:
Examples
The following is a sample output of the debug epmpal rx command:
Device# debug epmpal rx EPM platform pkt receive events debugging is on
The following is a sample output of the clear log command:
Device# clear log Clear logging buffer [confirm]
The following is a sample output of the show log command:
Device# show log Syslog logging: enabled (0 messages dropped, 7 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) No Active Message Discriminator. No Inactive Message Discriminator. Console logging: disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level debugging, 100 messages logged, xml disabled, filtering disabled Exception Logging: size (8192 bytes) Count and timestamp logging messages: disabled Persistent logging: disabled No active filter modules. Trap logging: level informational, 90 message lines logged Logging Source-Interface: VRF Name: Log Buffer (1000000 bytes): *Jul 15 16:56:35.383: Rcvd message of type 47, setting l2cos to 5, vlan_id to 1200. *Jul 15 16:56:35.383: Timestamped incoming DMR packet with 3582896195:383921796. *Jul 15 16:56:36.383: Rcvd message of type 47, setting l2cos to 5, vlan_id to 1200. *Jul 15 16:56:36.383: Timestamped incoming DMR packet with 3582896196:383799732. *Jul 15 16:56:37.379: Rcvd message of type 47, setting l2cos to 5, vlan_id to 1200. *Jul 15 16:56:37.379: Timestamped incoming DMR packet with 3582896197:383677668.
Related Commands
Command |
Description |
---|---|
clear log |
Clears messages from the logging buffer. |
show log |
Displays the contents of the standard syslog buffer. |
debug errors
To display errors, use the debug errors command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug errors
no debug errors
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug errors command:
Router# debug errors (2/0): Encapsulation error, link=7, host=836CA86D. (4/0): VCD#7 failed to echo OAM. 4 tries
The first line of output indicates that a packet was routed to the interface, but no static map was set up to route that packet to the proper virtual circuit.
The second line of output shows that an OAM F5 (virtual circuit) cell error occurred.
debug eswilp
To enable debugging of Ethernet switch network module features, use the debug eswilp command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug eswilp { dot1x | filtermgr | fltdrv | igmp | port-driver | power-supply | span | switch-pm }
no debug eswilp { dot1x | filtermgr | fltdrv | igmp | port-driver | power-supply | span | switch-pm }
Syntax Description
dot1x |
Displays Ethernet Switch with Inline Power (ESWILP) 802.1x debugging messages. |
filtermgr |
Displays ESWILP filter manager debugging messages. |
fltdrv |
Displays ESWILP filter driver debugging messages. |
igmp |
Displays ESWILP Internet Group Management Protocol (IGMP) debugging messages. |
port-driver |
Displays ESWILP port driver debugging messages. |
power-supply |
Displays ESWILP power supply information debugging messages. |
span |
Displays ESWILP Switched Port Analyzer (SPAN) debugging messages. |
switch-pm |
Displays ESWILP switch port manager debugging messages. |
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(6)EA2 |
This command was introduced. |
12.2(15)ZJ |
This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. The dot1x, filtermgr, and fltdrv keywords were added. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The undebug eswilp command is the same as the no debug eswilp command.
Examples
The following example shows debugging messages for the IGMP snooping services on the Ethernet switch network module being displayed:
Router# debug eswilp igmp
Related Commands
Command |
Description |
---|---|
show debugging |
Displays information about the types of debugging that are enabled. |
debug ethernet cfm all
To enable all Ethernet connectivity fault management (CFM) debug messages, use the debug ethernet cfm all command in privileged EXEC mode. To disable all Ethernet CFM debug messages, use the no form of this command.
Cisco pre-Standard CFM Draft 8 (CFM D8) ethernet cfm all [ domain domain-name | level level-id ] [ evc evc-name | vlan vlan-id ]
no debug ethernet cfm all [ domain domain-name | level level-id ] [ evc evc-name | vlan vlan-id ]
CFM IEEE 802.1ag Standard (CFM IEEE)debug ethernet cfm all [ domain domain-name ] [ port | vlan vlan-id ]
no debug ethernet cfm all [ domain domain-name ] [ port | vlan vlan-id ]
Syntax Description
domain |
(Optional) Indicates that a domain is specified. |
domain-name |
(Optional) String of a maximum of 154 characters. |
level |
(Optional) Indicates that a maintenance level is specified. |
level-id |
(Optional) Integer in the range of 0 to 7 that specifies the maintenance level. |
evc |
(Optional) Identifies the Ethernet virtual connection (EVC). An EVC is an association of two or more user network interfaces (UNIs). |
evc-name |
(Optional) String that identifies the EVC name. |
port |
(Optional) Indicates a DOWN service direction with no VLAN association (untagged). |
vlan |
(Optional) Indicates that a VLAN is specified. |
vlan-id |
(Optional) Integer in the range of 1 to 4094 that identifies the affected VLAN. |
Command Default
All debug commands are enabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SRA |
This command was introduced. |
12.4(11)T |
This command was integrated into Cisco IOS Release 12.4(11)T. |
12.2(33)SRD |
The evc keyword and evc-name argument were introduced on the Cisco 7600 Series Route Switch Processor 720 (RSP 720) and the Cisco 7600 Series Supervisor Engine 720. |
12.2(33)SXI2 |
This command was integrated into Cisco IOS Release 12.2(33)SXI2. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
15.1(1)T |
This command was integrated into Cisco IOS Release 15.1(1)T. |
12.2(50)SY |
This command was integrated into Cisco IOS Release 12.2(50)SY. |
Cisco IOS XE Release 3.5S |
This command was integrated into Cisco IOS XE Release 3.5S. |
15.3(1)S |
This command was integrated into Cisco IOS Release 15.3(1)S. |
Usage Guidelines
In CFM IEEE, if a domain name has more than 43 characters, a warning message is displayed notifying that the maintenance domain ID (MDID) will be truncated to 43 characters in continuity check messages (CCMs) if “id <fmt> <MDID>” is not configured.
This command allows you to conditionally enable debug messages. The messages depend on the version of CFM you are running. When CFM IEEE is running, you are prompted to respond “yes” or “no.” The messages relate to the following:
Maintenance domain
Maintenance level
Maintenance domain plus VLAN or EVC
Maintenance level plus VLAN or EVC
Additionally, you can filter debug messages by the following:
Maintenance domain
Maintenance level
VLAN or EVC
Combination of maintenance domain and VLAN or EVC
Combination of maintenance level and VLAN or EVC
The output from the debug ethernet cfm all command is a log of activity that shows all Ethernet CFM-related debug messages. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm all command:
Router# debug ethernet cfm all domain Domain_L5 vlan 9 This may impact network performance. Continue? (yes/[no]): yes Ethernet CFM level 5 domain Domain_L5 vlan 9 packet debugging is on Ethernet CFM level 5 domain Domain_L5 vlan 9 event debugging is on Router# Jun 17 21:41:49.839: CFM-PKT: Received a CC packet with MPID 401, level 5, vlan 9 from interface Ethernet0/0.9 Jun 17 21:41:49.839: CFM-EVT: Found remote mep for domain Domain_L5, level 5 vlan 9, mpid 401 mac aabb.cc03.bb99 Jun 17 21:41:49.839: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L5 level 5, vlan 9 mac aabb.cc03.bb99 intf Ethernet0/0.9 Router# Jun 17 21:41:56.007: CFM-PKT: Sending Up direction MEP 220 CC message, level 5, vlan 9 Router# Jun 17 21:42:00.539: CFM-PKT: Received a CC packet with MPID 401, level 5, vlan 9 from interface Ethernet0/0.9 Jun 17 21:42:00.539: CFM-EVT: Found remote mep for domain Domain_L5, level 5 vlan 9, mpid 401 mac aabb.cc03.bb99 Jun 17 21:42:00.539: CFM-EVT: Updated rmep in MIP CCDB, domain Domain_L5 level 5, vlan 9 mac aabb.cc03.bb99 intf Ethernet0/0.9
Related Commands
Command |
Description |
---|---|
debug ethernet cfm diagnostic |
Enables low-level diagnostic debugging of Ethernet CFM general or packet-related events. |
debug ethernet cfm error |
Enables debugging of Ethernet CFM errors. |
debug ethernet cfm events |
Enables debugging of Ethernet CFM events. |
debug ethernet cfm packets |
Enables debugging of Ethernet CFM message packets. |
debug ethernet cfm diagnostic
To enable low-level diagnostic debugging of Ethernet connectivity fault management (CFM) general events or packet-related events, use the debug ethernet cfm diagnostic command in privileged EXEC mode. To disable the debugging, use the no form of this command.
Cisco pre-Standard CFM Draft 1 (CFM D1)
debug ethernet cfm diagnostic [ events | packets ]
no debug ethernet cfm diagnostic [ events | packets ]
CFM IEEE 802.1ag Standard (CFM IEEE) debug ethernet cfm diagnostic [ ais | events | lck | mip-autocreate | packets [ ais | cc | lb | lck | lt ] ]
no debug ethernet cfm diagnostic [ ais | events | lck | mip-autocreate | packets [ ais | cc | lb | lck | lt ] ]
Syntax Description
ais |
(Optional) Triggers debugging of Alarm Indication Signal (AIS) activities. |
events |
(Optional) Triggers debugging of events. |
lck |
(Optional) Triggers debugging of lck events. |
mip-autocreate |
(Optional) Triggers debugging of MIP autocreate activities. |
packets |
(Optional) Triggers debugging of packets. |
ais |
(Optional) Triggers debugging of alarm indication signal (AIS) packets. |
cc |
(Optional) Triggers debugging of continuity check (cc) packets. |
lb |
(Optional) Triggers debugging of loopback (lb) packets. |
lt |
(Optional) Triggers debugging of linktrace (lt) packets. |
Command Default
Diagnostic debugging for both events and packets is enabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SRA |
This command was introduced. |
12.4(11)T |
This command was integrated into Cisco IOS Release 12.4(11)T. |
12.2(33)SXI2 |
This command was integrated into Cisco IOS Release 12.2(33)SXI2. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
15.1(1)T |
This command was integrated into Cisco IOS Release 15.1(1)T. |
Cisco IOS XE Release 3.5S |
This command was integrated into Cisco IOS XE Release 3.5S. |
15.3(1)S |
This command was integrated into Cisco IOS Release 15.3(1)S. |
Usage Guidelines
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm diagnostic command with no options specified:
Router# debug ethernet cfm diagnostic Ethernet CFM diagnostic events debugging is on Ethernet CFM diagnostic packets debugging is on Ethernet CFM diagnostic mip_autocreate debugging is on Ethernet CFM diagnostic ais debugging is on Ethernet CFM diagnostic lck debugging is on Ethernet CFM diagnostic packet cc debugging is on Ethernet CFM diagnostic packet lb debugging is on Ethernet CFM diagnostic packet lt debugging is on Ethernet CFM diagnostic packet filter debugging is on Ethernet CFM diagnostic packet ais debugging is on Ethernet CFM diagnostic packet lck debugging is on Router# Router# *Jun 17 21:48:56.803: CFM-PKT: Sending Up direction MEP 401 CC message, level 5, vlan 9 *Jun 17 21:48:56.803: CFMPAL-PKT: pak (CC) sent to interface Ethernet0/0.1 (linktype=1AG) Router# *Jun 17 21:49:00.535: CFMPAL-PKT: Received a CFM packet (CC) from port Ethernet0/0.11 (linktype=1AG) *Jun 17 21:49:00.535: cc_filter, service mcl = 7 for vlan = 11 *Jun 17 21:49:00.535: ecfm_pal_cc_filter:computed levels - fl = -1, fm = -1, hm = -1, level = 7 *Jun 17 21:49:00.535: ecfm_pal_cc_filter:hi_ofm=-1, lo_ofm=-1, hi_ifm=-1, lo_ifm=-1, mcl=7, mip_level=-1 *Jun 17 21:49:00.535: pak_level EQUAL MCL *Jun 17 21:49:00.535: L > fl, Punt and Forward *Jun 17 21:49:00.535: CFMPAL-EVT: packet not sent out on Ethernet0/1.11, hmep = 7 *Jun 17 21:49:00.535: CFM-PKT: Received a CC packet from interface Ethernet0/0.11 *Jun 17 21:49:00.535: CFM-PKT: cfm packet dump - 105 bytes, interface Ethernet0/0.11, vlan 11 *Jun 17 21:49:00.535: CFM-PKT: ethernet CFM (1AG) message dump, dest: 0180.c200.0037 src: aabb.cc03.b999 Version: 0 Maintenance Level: 7 MsgType: CC(1) Flags: 0x5 First TLV Offset: 70 *Jun 17 21:49:00.535: 01 80 C2 00 00 37 AA BB CC 03 B9 99 89 02 E0 01 05 46 26 FB AC E5 00 65 04 *Jun 17 21:49:00.535: 09 44 6F 6D 61 69 6E 5F 4C 37 02 0B 63 75 73 74 5F 37 30 30 5F 6C 37 00 00 *Jun 17 21:49:00.535: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 *Jun 17 21:49:00.535: 00 00 00 00 00 00 00 00 00 2C 20 56 65 02 00 01 02 04 00 01 01 1F 00 05 00 *Jun 17 21:49:00.535: 00 0C 01 02 00 *Jun 17 21:49:00.535: CFM-PKT: Received a CC packet with MPID 101, level 7, vlan 11 from interface Ethernet0/0.11 *Jun 17 21:49:00.535: CFMPAL-I-PKT: pak (CC) sent to interface Ethernet0/2.1 (linktype=1AG) Router# *Jun 17 21:49:02.675: CFM-PKT: Sending Up direction MEP 301 CC message, level 7, vlan 11 *Jun 17 21:49:02.675: CFMPAL-PKT: pak (CC) sent to interface Ethernet0/0.11 (linktype=1AG) *Jun 17 21:49:02.675: CFMPAL-PKT: pak (CC) sent to interface Ethernet0/2.1 (linktype=1AG) *Jun 17 21:49:02.943: CFMPAL-PKT: Received a CFM packet (CC) from port Ethernet0/0.1 (linktype=1AG) *Jun 17 21:49:02.947: cc_filter, service mcl = 5 for vlan = 9 *Jun 17 21:49:02.947: ecfm_pal_cc_filter:computed levels - fl = -1, fm = -1, hm = -1, level = 5 *Jun 17 21:49:02.947: ecfm_pal_cc_filter:hi_ofm=-1, lo_ofm=-1, hi_ifm=-1, lo_ifm=-1, mcl=5, mip_level=-1 *Jun 17 21:49:02.947: pak_level EQUAL MCL *Jun 17 21:49:02.947: L > fl, Punt and Forward *Jun 17 21:49:02.947: CFMPAL-EVT: packet not sent out on Ethernet0/1.1, hmep = 5 *Jun 17 21:49:02.947: CFM-PKT: Received a CC packet from interface Ethernet0/0.1 *Jun 17 21:49:02.947: CFM-PKT: cfm packet dump - 105 bytes, interface Ethernet0/0.1, vlan 9 *Jun 17 21:49:02.947: CFM-PKT: ethernet CFM (1AG) message dump, dest: 0180.c200.0035 src: aabb.cc03.b999 Version: 0 Maintenance Level: 5 MsgType: CC(1) Flags: 0x5 First TLV Offset: 70 *Jun 17 21:49:02.947: 01 80 C2 00 00 35 AA BB CC 03 B9 99 89 02 A0 01 05 46 06 5B 0C 0E 00 DC 04 Router# *Jun 17 21:49:02.947: 09 44 6F 6D 61 69 6E 5F 4C 35 02 0B 63 75 73 74 5F 35 30 30 5F 6C 35 00 00 *Jun 17 21:49:02.947: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 *Jun 17 21:49:02.947: 00 00 00 00 00 00 00 00 00 2C 20 56 65 02 00 01 02 04 00 01 01 1F 00 05 00 *Jun 17 21:49:02.947: 00 0C 01 02 00 *Jun 17 21:49:02.947: CFM-PKT: Received a CC packet with MPID 220, level 5, vlan 9 from interface Ethernet0/0.1
Related Commands
Command |
Description |
---|---|
debug ethernet cfm all |
Enables all Ethernet CFM debug messages. |
debug ethernet cfm error |
Enables debugging of Ethernet CFM errors. |
debug ethernet cfm events |
Enables debugging of Ethernet CFM events. |
debug ethernet cfm packets |
Enables debugging of Ethernet CFM message packets. |
debug ethernet cfm error
To enable debugging of Ethernet connectivity fault management (CFM) errors, use the debug ethernet cfm error command in privileged EXEC mode. To disable the debugging, use the no form of this command.
debug ethernet cfm error
no debug ethernet cfm error
Syntax Description
This command has no arguments or keywords.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SXI2 |
This command was introduced. This command replaces the debug ethernet cfm errors command. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
15.1(1)T |
This command was integrated into Cisco IOS Release 15.1(1)T. |
Usage Guidelines
There is no filtering capability for this command. The output from this command is a log of activity.
Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm error command:
Device# debug ethernet cfm error Ethernet CFM error debugging is on Device# Device# Device#! turn off cc messages on the other side for vlan 9 Device# *Jun 17 21:53:44.955: CFM-ERR: Lifetime timer fired for level 5, vlan 9 mac aabb.cc03.b999, mpid 220 Device# Device# show ethernet cfm error -------------------------------------------------------------------------------- MPID Domain Id Mac Address Type Id Lvl MAName Reason Age -------------------------------------------------------------------------------- 220 Domain_L5 aabb.cc03.b999 Vlan 9 5 cust_500_l5 Lifetime Timer Expired 17s
Related Commands
Command |
Description |
---|---|
debug ethernet cfm all |
Enables all Ethernet CFM debug messages. |
debug ethernet cfm diagnostic |
Enables low-level diagnostic debugging of Ethernet CFM general events or packet-related events. |
debug ethernet cfm events |
Enables debugging of Ethernet CFM events. |
debug ethernet cfm packets |
Enables debugging of Ethernet CFM message packets. |
debug ethernet cfm errors
Note | Effective with Cisco IOS Release 12.2(33)SXI2, the debug ethernet cfm errors command is replaced by the debug ethernet cfm error command. See the debug ethernet cfm error command for more information. |
To enable debugging of Ethernet connectivity fault management (CFM) errors, use the debug ethernet cfm errorscommand in privileged EXEC mode. To disable the debugging, use the no form of this command.
debug ethernet cfm errors
no debug ethernet cfm errors
Syntax Description
This command has no keywords or arguments.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(33)SRA |
This command was introduced. |
12.4(11)T |
This command was integrated into Cisco IOS Release 12.4(11)T. |
12.2(33)SXI2 |
This command was replaced by the debug ethernet cfm error command. |
Cisco IOS XE Release 3.5S |
This command was integrated into Cisco IOS XE Release 3.5S. |
Usage Guidelines
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following example shows output of the debug ethernet cfm errors command:
Router# debug ethernet cfm errors 10:46:26: CFM-ERR: MPID matched with a local MEP!, level 5, svlan 2, mpid 50 10:46:26: CFM-ERR: Received duplicate mpid 50 due to configuration error for level 5, svlan 2 10:48:55: CFM-ERR: Lifetime timer fired for level 4, svlan 2 mac aabb.cc00.0501, mpid 43 10:48:56: CFM-ERR: Lifetime timer fired for level 6, svlan 2 mac aabb.cc00.0300, mpid 21 10:48:57: CFM-ERR: Lifetime timer fired for level 5, svlan 5 mac aabb.cc00.0602, mpid 60
Related Commands
Command |
Description |
---|---|
debug ethernet cfm all |
Enables all Ethernet CFM debug messages. |
debug ethernet cfm diagnostic |
Enables low-level diagnostic debugging of Ethernet CFM general events or packet-related events. |
debug ethernet cfm events |
Enables debugging of Ethernet CFM events. |
debug ethernet cfm packets |
Enables debugging of Ethernet CFM message packets. |
debug ethernet cfm ha
To enable debugging of Ethernet connectivity fault management (CFM) high availability (HA) features, use the debug ethernet cfm ha command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ethernet cfm ha
no debug ethernet cfm ha
Syntax Description
This command has no arguments or keywords.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SRD |
This command was introduced. |
12.2(33)SXI2 |
This command was integrated into Cisco IOS Release 12.2(33)SXI2. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
Examples
The following example shows sample output of the debug ethernet cfm ha command:
Device# debug ethernet cfm ha 00:18:12: CFM-HA: RF progression Callbk CID 207, Seq 169, Event RF_PROG_STANDBY_FILESYS, Op 0, State ACTIVE, Peer STANDBY COLD-FILESYS 00:04:30: %SYS-SPSTBY-6-BOOTTIME: Time taken to reboot after reload = 391 seconds 00:18:22: CFM-HA: RF progression Callbk CID 207, Seq 169, Event RF_PROG_STANDBY_BULK, Op 0, State ACTIVE, Peer STANDBY COLD-BULK 00:18:22: CFM-HA: All Remote Mep Action 1 00:18:22: CFM-HA: MIP CCDB Bulk Sync Invoked 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Get buffer size 8 msg 1 00:18:22: CFM-HA: Event to Sync Buffer: Add MIP CCDB : vlan 100, level 5, mpid 100, version 2, lifetime 210000, addr 0014.69b6.200e, id_fmt 4 ma_fmt 2 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Event to Sync Buffer: Add MIP CCDB : vlan 200, level 6, mpid 1998, version 2, lifetime 35000, addr 0014.f15c.a403, id_fmt 4 ma_fmt 2 00:18:22: CFM-HA: Get buffer size 316 msg 4 00:18:22: CFM-HA: Sending 2 records in Bulk 00:18:22: CFM-HA: All Remote Mep Action 1 00:18:22: CFM-HA:MEP CCDB Bulk Sync Invoked 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Get buffer size 8 msg 1 00:18:22: CFM-HA: Event to Sync Buffer: Add MEP CCDB: vlan 100, level 5, mpid 100, port_state 2, archive FALSE , intf_state 1, ccheck_rmep_ok FALSE, addr 0014.69b6.200e, name 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Event to Sync Buffer: Add MEP CCDB: vlan 200, level 6, mpid 1998, port_state 2, archive FALSE , intf_state 1, ccheck_rmep_ok FALSE, addr 0014.f15c.a403, name 00:18:22: CFM-HA: Get buffer size 284 msg 2 00:18:22: CFM-HA: Sending 2 records in Bulk
Related Commands
Command |
Description |
---|---|
debug ethernet cfm all |
Enables all Ethernet CFM debug messages. |
debug ethernet cfm diagnostic |
Enables low-level diagnostic debugging of Ethernet CFM general or packet-related events. |
debug ethernet cfm error |
Enables debugging of Ethernet CFM errors. |
debug ethernet cfm events |
Enables debugging of Ethernet CFM events. |
debug ethernet cfm packets |
Enables debugging of Ethernet CFM message packets. |
debug ethernet cfm packets
To enable debugging of Ethernet connectivity fault management (CFM) message packets, use the debug ethernet cfm packets command in privileged EXEC mode. To disable the debugging, use the no form of this command.
debug ethernet cfm packets [ domain domain-name | level level-id ] [ evc evc-name | vlan vlan-id ]
no debug ethernet cfm packets [ domain domain-name | level level-id ] [ evc evc-name | vlan vlan-id ]
debug ethernet cfm packets [ domain domain-name ] [ port | vlan vlan-id ]
no debug ethernet cfm packets [ domain domain-name ] [ port | vlan vlan-id ]
Syntax Description
domain |
(Optional) Indicates that a domain is specified. |
domain-name |
(Optional) String of a maximum of 154 characters. |
level |
(Optional) Indicates that a maintenance level is specified. |
level-id |
(Optional) Integer in the range of 0 to 7 that specifies the maintenance level. |
evc |
(Optional) Identifies the Ethernet virtual connection (EVC). An EVC is an association of two or more user network interfaces (UNIs). |
evc-name |
(Optional) String that identifies the EVC name. |
port |
(Optional) Indicates a DOWN service direction with no VLAN association (untagged). |
vlan |
(Optional) Indicates that a VLAN is specified. |
vlan-id |
(Optional) Integer in the range of 1 to 4094. |
Command Default
Debugging is enabled for all domains and VLANs.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SRA |
This command was introduced. |
12.4(11)T |
This command was integrated into Cisco IOS Release 12.4(11)T. |
12.2(33)SRD |
The evc keyword and evc-name argument were introduced on the Cisco 7600 Series Route Switch Processor 720 (RSP 720) and the Cisco 7600 Series Supervisor Engine 720. |
12.2(33)SXI2 |
This command was integrated into Cisco IOS Release 12.2(33)SXI2. |
12.2(33)SRE |
This command was integrated into Cisco IOS Release 12.2(33)SRE. |
15.1(1)T |
This command was integrated into Cisco IOS Release 15.1(1)T. |
12.2(50)SY |
This command was integrated into Cisco IOS Release 12.2(50)SY. |
Cisco IOS XE Release 3.5S |
This command was integrated into Cisco IOS XE Release 3.5S. |
15.3(1)S |
This command was integrated into Cisco IOS Release 15.3(1)S |
Usage Guidelines
In CFM IEEE, if a domain name has more than 43 characters, a warning message is displayed notifying that the maintenance domain ID (MDID) will be truncated to 43 characters in continuity check messages (CCMs) if “id <fmt> <MDID>” is not configured.
This command allows you to filter debug messages. The messages depend on the version of CFM you are running. When CFM IEEE is running, you are prompted to respond “yes” or “no.” The messages relate to the following:
Maintenance domain
Maintenance level
VLAN or EVC
Combination of maintenance domain and VLAN or EVC
Combination of maintenance level and VLAN or EVC
The output from this command is a log of activity. Use this command to troubleshoot Ethernet CFM in your network.
Examples
The following is sample output of the debug ethernet cfm packets command:
Router# debug ethernet cfm packets Ethernet CFM packet debugging is on for all Router# *Jun 17 22:03:38.059: CFM-PKT: Sending Up direction MEP 301 CC message, level 7, vlan 11 Router# *Jun 17 22:03:42.879: CFM-PKT: Sending Up direction MEP 401 CC message, level 5, vlan 9 Router# *Jun 17 22:03:46.431: CFM-PKT: Received a CC packet with MPID 220, level 5, vlan 9 from interface Ethernet0/0.1 *Jun 17 22:03:46.703: CFM-PKT: Received a CC packet with MPID 101, level 7, vlan 11 from interface Ethernet0/0.11 Router# *Jun 17 22:03:48.783: CFM-PKT: Sending Up direction MEP 301 CC message, level 7, vlan 11 Router# *Jun 17 22:03:53.571: CFM-PKT: Sending Up direction MEP 401 CC message, level 5, vlan 9 Router# *Jun 17 22:03:57.083: CFM-PKT: Received a CC packet with MPID 220, level 5, vlan 9 from interface Ethernet0/0.1 *Jun 17 22:03:57.355: CFM-PKT: Received a CC packet with MPID 101, level 7, vlan 11 from interface Ethernet0/0.11 Router#
Related Commands
Command |
Description |
---|---|
debug ethernet cfm all |
Enables all Ethernet CFM debug messages. |
debug ethernet cfm diagnostic |
Enables low-level diagnostic debugging of Ethernet CFM general events or packet-related events. |
debug ethernet cfm error |
Enables debugging of Ethernet CFM errors. |
debug ethernet cfm events |
Enables debugging of Ethernet CFM events. |
debug ethernet cfm pm
To enable debug messages for Ethernet connectivity fault management (CFM) performance monitoring, use the debug ethernet cfm pmcommand in privileged EXEC mode. To disable Ethernet CFM performance monitoring debug messages, use the no form of this command.
debug ethernet cfm pm { diagnostic | { error | events | ipc | packets } [ session session-id ] }
no debug ethernet cfm pm { diagnostic | { error | events | ipc | packets } [ session session-id ] }
Syntax Description
diagnostic |
Specifies debugging for performance monitoring diagnostic information. |
error |
Specifies debugging for performance monitoring error information. |
events |
Specifies debugging for performance monitoring event information. |
ipc |
Specifies debugging for performance monitoring Internet protocol communications (IPC). |
packets |
Specifies debugging for performance monitoring packet information. |
session |
(Optional) Indicates a specific session. |
session-id |
(Optional) Integer that identifies a session. Range is 0 to 9999999. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
15.1(2)S |
This command was introduced. |
Cisco IOS XE Release 3.5S |
This command was integrated into Cisco IOS XE Release 3.5S. |
Usage Guidelines
Per session debugging is recommended to reduce the number of debugs and to manage console output.
Use the debug ethernet cfm pm command with the diagnostic keyword to perform debugging while a session is being created.
Examples
The following example shows how to initiate debug messages for CFM performance monitoring events in session 25:
Router# debug ethernet cfm pm events session 25
debug ethernet event microwave
Enables debugging for Ethernet microwave events, use the debug ethernet event microwave command in privileged EXEC mode. To disable debugging of these events, use the no form of this command.
debug ethernet event microwave [all] [errors]
no debug ethernet event microwave
Syntax Description
all |
(Optional) Displays debugging output for all Ethernet microwave events. |
errors |
(Optional) Displays debugging output associated with bandwidth errors. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Release 3.8S |
This command was introduced. |
Examples
The following is sample output from the debug ethernet event microwave command. In this example, debugging for Ethernet microwave events has been enabled:
Device# debug ethernet event microwave Ethernet Microwave Event Error debugging is on
debug ethernet l2ctrl
To enable debugging messages for Ethernet Layer 2 Control (L2ctrl), use the debug ethernet l2ctrl command in privileged EXEC mode. To disable debugging messages for Ethernet L2CTRL, use the no form of this command.
debug ethernet l2ctrl { all | errors | events }
no debug ethernet l2ctrl { all | errors | events }
Syntax Description
all |
Displays all Ethernet L2CTRL debugging messages. |
errors |
Displays Ethernet L2CTRL error information |
events |
Displays Ethernet L2CTRL event information. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SRD |
This command was introduced. |
Examples
The following is sample output from the debug ethernet l2ctrl events command:
When bridge-domain of 30 is defined on a service instance 3 at gigabitethernet interface 1/0/0 the output is as follows:
Router# debug ethernet l2ctrl events 17:17:03.174: EI/L2CTRL/ADD/EV: Gi1/0/0 (if_num 10) efp 3 (0x4944B5E8) vlan 30 state Up
When bridge-domain of 30 is not configured on service instance 3 at gigabitethernet interface 1/0/0 the output is as follows:
Router# debug ethernet l2ctrl events 17:16:30.546: EI/L2CTRL/DELETE/EV: Gi1/0/0 efp 3 vlan 30
The following is sample output from debug ethernet l2ctrl errors command:
Router# debug ethernet l2ctrl errors 17:16:30.546: DELETE/ERR: no vport found for Gi1/0/0 efp 3
Related Commands
Command |
Description |
---|---|
debug l2ctrl |
Enables debugging for L2CTRL. |
debug ethernet lmi
To enable debugging of Ethernet Local Management Interface (LMI) messages on all interfaces or on a specified interface, use the debug ethernet lmi command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ethernet lmi { all | errors | events | ha | packets } [ interface type number ]
no debug ethernet lmi { all | errors | events | ha | packets } [ interface type number ]
Syntax Description
all |
When you use the all keyword, keep in mind the number of interfaces that support Ethernet LMI. Some messages may be lost if many interfaces are supported. |
errors |
Use of the errors keyword enables debugging of Ethernet LMI errors such as invalid messages; for example, unexpected information element (IE) and mandatory IE missing. |
events |
Use of the events keyword enables debugging of Ethernet LMI events such as status changes, timeouts, and messages received. |
ha |
Use of the ha keyword enables debugging of Ethernet LMI high availability messages. |
packets |
Use of the packets keyword enables debugging of decoded Ethernet LMI packets. |
interface |
(Optional) Specifies an interface to use to filter debug messages. |
type |
(Optional) String that identifies the type of interface. Valid options are the following: |
number |
(Optional) Integer that identifies the interface. |
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC(#)
Command History
Release |
Modification |
---|---|
12.4(9)T |
This command was introduced. |
12.2(33)SRB |
Support for this command on the Cisco 7600 router was integrated into Cisco IOS Release 12.2(33)SRB. |
12.2(33)SRD |
This command was modified. The ha keyword was added. |
15.3(1)S |
This command was integrated into Cisco IOS Release 15.3(1)S. |
Cisco IOS XE Release 3.8S |
This command was integrated into Cisco IOS XE Release 3.8S. |
Usage Guidelines
The output from this command is a log of activity. Use this command to troubleshoot Ethernet LMI in your network.
Examples
The following example output from the debug ethernet lmi all command shows event and packet messages:
Device# debug ethernet lmi all Ethernet LMI errors debugging is on Ethernet LMI ha debugging is on Ethernet LMI packets debugging is on Ethernet LMI events debugging is on Ethernet LMI packets hex debugging is on 00:29:32: ELMI Et0/0 EVENT: ce_event: State 0x0, Event 0x4 00:29:32: ELMI Et0/0 EVENT: Old State=0x0, Event=0x4, New State=0x2 00:29:32: ELMI Et0/0 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_SENT 00:29:32: ELMI Et0/0 PKT HEX: TX->:0x01750101010202B4B30305000000000400000000000 00:29:32: ELMI Et0/0 PACKET: Outgoing Protocol Version : 0x1 Message : STATUS ENQ (0x75) Report Type : Check Sequence Number : Snd(0xB4), Rcv(0xB3) Data Instance : Value(0x4) 00:29:32: ELMI Et0/0 PKT HEX: RX<-:0x017D0101010202B4B40305000000000400000000000 00:29:32: ELMI Et0/0 PACKET: Incoming Protocol Version : 0x1 Message : STATUS (0x7D) Report Type : Check Sequence Number : Snd(0xB4), Rcv(0xB4) Data Instance : Value(0x4) 00:29:32: ELMI Et0/0 EVENT: ce_event: State 0x2, Event 0x1 00:29:32: ELMI Et0/0 EVENT: Update seq: current send 0xB4 rcv 0xB3 00:29:32: ELMI Et0/0 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_RCVD 00:29:32: ELMI Et0/0 EVENT: Old State=0x2, Event=0x1, New State=0x0 00:06:30: ELMI HA: cpf_status_callback status 2 00:07:37: ELMI HA: RF progression Callbk CID 202, Seq 142, Event RF_PROG_STANDBY_CONFIG, Op 0, State ACTIVE, Peer STANDBY COLD-CONFIG 00:07:37: ELMI HA: ISSU: Force negotiation version to V1 00:07:51: ELMI HA: RF progression Callbk CID 202, Seq 142, Event RF_PROG_STANDBY_FILESYS, Op 0, State ACTIVE, Peer STANDBY COLD-FILESYS
The following example output from the debug ethernet lmi all command shows detailed information about the user-network interfaces (UNIs) and Ethernet virtual connections (EVCs) for packet messages.
Device# debug ethernet lmi all Ethernet LMI errors debugging is on Ethernet LMI ha debugging is on Ethernet LMI packets debugging is on Ethernet LMI events debugging is on Ethernet LMI packets hex debugging is on Jun 16 18:59:49.372: ELMI Gi0/1 PKT HEX: RX<-:0x017D0101000202D30103050000000004 Jun 16 18:59:49.372: ELMI Gi0/1 PACKET: Incoming Protocol Version : 0x1 Message : STATUS (0x7D) Report Type : Full Sequence Number : Snd(0xD3), Rcv(0x1) Data Instance : Value(0x4) UNI : Bundle UNI Id : 'uni_sandiego' EVC Status : Evc Ref(0x1), New, Active EVC Parameters : Point-to-Point EVC Id : 'EVC_P2P_110' Remote UNI Sum : Cfgd(1), Up(1) EVC Status : Evc Ref(0x2), New, Active EVC Parameters : MultiPoint-to-MultiPoint EVC Id : 'EVC_MP2MP_101' Remote UNI Sum : Cfgd(2), Up(2) CEVLAN EVC Map : Evc Ref(0x1), Seq(0x1) EVC Map : Num Vlans(1), 110 CEVLAN EVC Map : Evc Ref(0x2), Seq(0x1) EVC Map : Num Vlans(1), 101 Remote UNI Status : Evc Ref(0x1), Uni Ref(0x26), Up UNI Id o deb al : 'cisco_newyork' Remote UNI Status : Evc Ref(0x2), Uni Ref(0x1D), Up UNI Id : 'uni_newyork' Remote UNI Status : Evc Ref(0x2), Uni Ref(0x96), Up UNI Id : 'miami-detroit' Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: ce_event: State 0x1, Event 0x0 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update seq: current send 0x1 rcv 0x0 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update uni: Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_sts: ref_id: 0x1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_param: type 0x0 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_id Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update remote_uni_sum cfgd 1 up 1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_sts: ref_id: 0x2 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_param: type 0x1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_id Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update remote_uni_sum cfgd 2 up 2 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update cevlan_evc_map: ref_id: 0x1 seq#1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_map: num_vlans 1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update cevlan_evc_map: ref_id: 0x2 seq# 1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update evc_map: num_vlans 1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update remote_uni_det: evc ref_id: 0x1 u6 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update remote_uni_det: evc ref_id: 0x2 uD Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: Update remote_uni_det: evc ref_id: 0x2 u6 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: upd_lmi_db: new uni_evc ref 0x1 Jun 16 18:59:49.372: ELMI Gi0/1 EVENT: upd_lmi_db: new uni_evc ref 0x2 Jun 16 18:59:49.372: %ETHER_LMI-6-MISMATCHED_VLAN_NOT_CONFIGURED: VLAN 101,110 1 Jun 16 18:59:49.372: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthn Jun 16 18:59:49.376: ELMI Gi0/1 EVENT: Update di: current 0x0 rcvd 0x4 Jun 16 18:59:49.376: ELMI Gi0/1 EVENT: Old State=0x1, Event=0x0, New State=0x0 Jun 16 18:59:49.376: ELMI Gi0/1 EVENT: Updated Stat Type: ETHER_LMI_ST_LFULL_MSD Jun 16 18:59:50.100: %SYS-5-CONFIG_I: Configured from console by console Jun 16 18:59:59.376: ELMI Gi0/1 EVENT: ce_event: State 0x0, Event 0x4 Jun 16 18:59:59.376: ELMI Gi0/1 EVENT: Old State=0x0, Event=0x4, New State=0x2 Jun 16 18:59:59.376: ELMI Gi0/1 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_SENT
The following example shows output of the debug ethernet lmi all interface command.
Device# debug ethernet lmi all interface ethernet 0/0 Ethernet LMI errors debugging is on for Ethernet0/0 Ethernet LMI ha debugging is on for Ethernet0/0 Ethernet LMI packets debugging is on for Ethernet0/0 Ethernet LMI events debugging is on for Ethernet0/0 Ethernet LMI packets hex debugging is on for Ethernet0/0 00:45:14: ELMI Et0/0 EVENT: ce_event: State 0x0, Event 0x4 00:45:14: ELMI Et0/0 EVENT: Old State=0x0, Event=0x4, New State=0x2 00:45:14: ELMI Et0/0 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_SENT 00:45:14: ELMI Et0/0 PKT HEX: TX->:0x0175010101020213120305000000000400000000000 00:45:14: ELMI Et0/0 PACKET: Outgoing Protocol Version : 0x1 Message : STATUS ENQ (0x75) Report Type : Check Sequence Number : Snd(0x13), Rcv(0x12) Data Instance : Value(0x4) 00:45:14: ELMI Et0/0 PKT HEX: RX<-:0x017D010101020213130305000000000400000000000 00:45:14: ELMI Et0/0 PACKET: Incoming Protocol Version : 0x1 Message : STATUS (0x7D) Report Type : Check Sequence Number : Snd(0x13), Rcv(0x13) Data Instance : Value(0x4) 00:45:14: ELMI Et0/0 EVENT: ce_event: State 0x2, Event 0x1 00:45:14: ELMI Et0/0 EVENT: Update seq: current send 0x13 rcv 0x12 00:45:14: ELMI Et0/0 EVENT: Updated Stat Type: ETHER_LMI_ST_LMSG_RCVD 00:45:14: ELMI Et0/0 EVENT: Old State=0x2, Event=0x1, New State=0x0
debug ethernet nid
To display detailed debugging information related to the Network Interface Device (NID) functionality, use the debug ethernet nid command in the privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ethernet nid { configuration | packet egress | packet ingress }
no debug ethernet nid { configuration | packet egress | packet ingress }
Syntax Description
configuration |
Enables debugging of configuration-related issues. |
packet egress |
Enables debugging of packet-processing-related (VLAN tag push) issues on the egress side. |
packet ingress |
Enables debugging of packet-processing-related (VLAN tag pop) issues on the ingress side. |
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release | Modification |
---|---|
15.4(1)T |
This command was introduced into Cisco IOS Release 15.4(1)T. |
Usage Guidelines
Use the debug ethernet nid command to troubleshoot issues related to the NID functionality configured on a Layer 3 interface on the following routers:
Examples
The following is a sample output of the debug ethernet nid configuration command:
Device# debug ethernet nid configuration *Nov 20 01:23:40.643: Port Tagging mode issued on GigabitEthernet0/0 *Nov 20 01:23:40.651: Port Tagging mode issued on GigabitEthernet0/0 *Nov 20 01:23:40.651: Successfully destroyed NID HW Subblock *Nov 20 01:23:44.995: Port Tagging mode issued on GigabitEthernet0/0 *Nov 20 01:23:45.023: Configuring vlan_type 65, vlan_dot1q_id 1000 *Nov 20 01:23:45.023: No encap configuration existing on the interface *Nov 20 01:23:45.023: Successfully created NID HW SB on Gi0/0 *Nov 20 01:23:45.023: Successfully added encap to the subblock *Nov 20 01:23:45.023: nid vlan type is 65, vlan id is 1000, is_cos_cfgd is 0, cos is 0 *Nov 20 01:23:45.039: Cofiguring cos value 5 *Nov 20 01:23:45. 039: Successfully modified cos value *Nov 20 01:23:45.039: nid vlan type is 65, vlan id is 1000, is_cos_cfgd is 1, cos is 5
debug ethernet oam
To enable all Ethernet operations, administration, and maintenance (OAM) debugging, use the debug ethernet oamcommand in privileged EXEC mode. To disable Ethernet OAM debuging, use the no form of this command.
debug ethernet oam { all | config | ha | link-monitor | loopback | packet { decode | rx | tx } | sm }
no debug ethernet oam { all | config | ha | link-monitor | loopback | packet { decode | rx | tx } | sm }
Syntax Description
all |
Debugging for all Ethernet OAM flags is on. |
config |
Debugging for Ethernet OAM configurations is on. |
ha |
Debugging for Ethernet OAM high-availability events is on. |
link-monitor |
Debugging for Ethernet OAM link monitoring is on. |
loopback |
Debugging for Ethernet OAM loopback messages is on. |
packet |
Debugging for Ethernet OAM protocol data units (PDUs) is on. |
decode |
Decoding for ingress or egress OAMPDUs, or both, is on. |
rx |
Debugging for Ethernet ingress OAMPDUs is on. |
tx |
Debugging for Ethernet egress OAMPDUs is on. |
sm |
Debugging for the Ethernet OAM state machine is on. |
Command Default
All Ethernet OAM debug commands are enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(33)SRA |
This command was introduced. |
12.4(15)T |
This command was integrated into Cisco IOS Release 12.4(15)T. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Cisco IOS XE Release 3.5S |
This command was integrated into Cisco IOS XE Release 3.5S. |
Usage Guidelines
When you use the all keyword, keep in mind the number of interfaces supporting Ethernet OAM. If many interfaces are supported, some messages may be lost and system performance can degrade.
The ha keyword is not available in Cisco IOS Release 12.4(15)T.
The output from this command is a log of activity. Use this command to troubleshoot Ethernet OAM in your network.s
Examples
The following example shows output of the debug ethernet oam all command:
Router# debug ethernet oam all *Aug 17 14:00:53.732: ether_oam_port Gi2/9: during state INACTIVE, got event 3(link_up) *Aug 17 14:00:53.732: @@@ ether_oam_port Gi2/9: INACTIVE -> FAULT *Aug 17 14:00:53.732: ether_oam_port Gi2/9: idle during state FAULT *Aug 17 14:00:53.732: @@@ ether_oam_port Gi2/9: FAULT -> FAULT2 *Aug 17 14:00:53.732: ether_oam_port Gi2/9: during state FAULT2, got event 6(mode_active) *Aug 17 14:00:53.732: @@@ ether_oam_port Gi2/9: FAULT2 -> ACTIVE_SEND_LOCAL *Aug 17 14:00:54.212: EOAM RX PAK(Gi2/9): *Aug 17 14:00:54.212: 03 00 08 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:54.212: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 *Aug 17 14:00:54.212: 00 00 00 00 00 00 00 00 *Aug 17 14:00:54.212: ether_oam_port Gi2/9: during state SEND_LOCAL_REMOTE, got event 8(local_satisfied) 1w5d: %ETHERNET_OAM-6-ENTER_SESSION: The client on interface Gi2/11 has entered the OAM session. *Aug 17 14:00:55.212: EOAM RX PAK(Gi2/9): *Aug 17 14:00:55.212: 03 00 50 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:55.212: 00 00 00 SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1032(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): FRMPRD w=10000000 lt=1 ht=0 t_frm=1 err_frm=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:55.740: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:55.832: EOAM TX PAK(Gi2/9): *Aug 17 14:00:55.832: 03 00 50 00 0 1 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:55.832: 00 00 00 01 02 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:55.832: 00 00 00 01 *Aug 17 14:00:55.832: EOAM TX PAK(Gi2/9): 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:56.212: 00 00 00 01 02 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:56.212: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 *Aug 17 14:00:56.212: EOAM RX PAK(Gi2/9): infotlv w/ same revision *Aug 17 14:00:56.820: EOAM LM(Gi2/9): SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1000(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:00:56.820: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:00:56.820: EOAM LM(Gi2/9): 05 FRMPRD w=10000000 lt=1 ht=0 t_frm=3 err_frm=0 *Aug 17 14:00:57.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:57.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:57.856: EOAM TX PAK(Gi2/9): *Aug 17 14:00:57.856: 03 00 50 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:57.856: 00 00 00 01 02 10 01 00 00 00 0D 17 14:00:58.212: 05 DC 00 00 0C *Aug 17 14:00:57.856: 00 00 00 01 *Aug 17 14:00:57.856: EOAM TX PAK(Gi2/9): sent OAMPDU w/ op=0 *Aug 17 14:00:58.212: EOAM RX PAK(Gi2/9): *Aug 17 14:00:58.212: EOAM RX PAK(Gi2/9): infotlv w/ same revision *Aug 17 14:00:58.820: EOAM LM(Gi2/9): SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1000(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): FRMPRD w=10000000 lt=1 ht=0 t_frm=4 err_frm=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:58.820: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:58.856: EOAM TX PAK(Gi2/9): *Aug 17 14:00:58.856: 03 00 50 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:58.856: 00 00 00 01 02 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:00:58.856: 00 sent OAMPDU w/ op=0w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:00:59.856: EOAM TX PAK(Gi2/9): *Aug 17 14:00:59.856: 03 00 50 00 01 10 01 00 00 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): SYMPRD w=104857600 lt=1 ht=0 elapsed_time=1008(ms) rx_sym=1000000000 err_sym=0 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): FRM w=1 lt=1 ht=0 t_frm=0 err_frm=0 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): FRMPRD w=10000000 lt=1 ht=0 t_frm=6 err_frm=0 *Aug 17 14:01:00.832: EOAM LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:01:00.832: EOA M LM(Gi2/9): w=1 lt=10 ht=0 err_frm=0 *Aug 17 14:01:00.856: EOAM TX PAK(Gi2/9): *Aug 17 14:01:00.856: 03 00 50 00 01 10 01 00 00 00 0D 05 DC 00 00 0C *Aug 17 14:01:00.856: 00 00
debug ethernet ring g8032 errors
To enable debugging of Ethernet Ring Protocol (ERP) errors, use the debug ethernet ring g8032 errors command in privileged EXEC mode.
debug ethernet ring g8032 errors [ ring-name [ instance instance-id ] ]
Syntax Description
ring-name |
(Optional) Ethernet ring name. |
instance instance-id |
(Optional) Enter the instance keyword followed by the instance identifier. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Release 3.6S |
This command was introduced. |
15.2(4)S |
This command was integrated into Cisco IOS Release 15.2(4)S. |
Usage Guidelines
This command can be used to debug the errors for all ERP instances in an ERP ring, for an ERP instance for a specified ERP ring, or for all ERP instances configured on the device.
Examples
The following example shows how to enable the debug ethernet ring g8032 errors command. Output is generated only when error conditions are encountered.
Device# debug ethernet ring g8032 errors
debug ethernet ring g8032 events
To enable debugging of Ethernet Ring Protocol (ERP) events, use the debug ethernet ring g8032 events command in privileged EXEC mode.
debug ethernet ring g8032 events [ ring-name [ instance instance-id ] ]
Syntax Description
ring-name |
(Optional) Ethernet ring name. |
instance instance-id |
(Optional) Enter the instance keyword followed by the instance identifier. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Release 3.6S |
This command was introduced. |
15.2(4)S |
This command was integrated into Cisco IOS Release 15.2(4)S. |
Usage Guidelines
This command can be used to debug the events for all ERP instances in an ERP ring, for an ERP instance for a specified ERP ring, or for all ERP instances configured on the device.
Examples
The following example shows how to enable the debug ethernet ring g8032 events command. Output is generated only when error conditions are encountered.
Device# debug ethernet ring g8032 events
debug ethernet ring g8032 fsm
To enable debugging of Finite State Machine (FSM) state changes for Ethernet Ring Protocol (ERP) instances, use the debug ethernet ring g8032 fsm command in privileged EXEC mode.
debug ethernet ring g8032 fsm [ ring-name [ instance instance-id ] ] [ detail ]
Syntax Description
ring-name |
(Optional) Ethernet ring name. |
instance instance-id |
(Optional) Enter the instance keyword followed by the instance identifier. |
detail |
(Optional) Displays detailed information. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Release 3.6S |
This command was introduced. |
15.2(4)S |
This command was integrated into Cisco IOS Release 15.2(4)S. |
Usage Guidelines
This command can be used to debug the FSM state changes for all ERP instances in an ERP ring, for an ERP instance for a specified ERP ring, or for all ERP instances configured on the device.
Examples
The following example shows how to enable the debug ethernet ring g8032 fsm command. Output is generated only when error conditions are encountered.
Device# debug ethernet ring g8032 fsm
debug ethernet ring g8032 packets
To enable debugging of Ethernet Ring Protocol (ERP) packets, use the debug ethernet ring g8032 packets command in privileged EXEC mode.
debug ethernet ring g8032 packets [ ring-name [ instance instance-id ] ] [ detail ]
Syntax Description
ring-name |
(Optional) Ethernet ring name. |
instance instance-id |
(Optional) Enter the instance keyword followed by the instance identifier. |
detail |
(Optional) Displays detailed information. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS XE Release 3.6S |
This command was introduced. |
15.2(4)S |
This command was integrated into Cisco IOS Release 15.2(4)S. |
Usage Guidelines
This command can be used to debug the packets for all ERP instances in an ERP ring, for an ERP instance for a specified ERP ring, or for all ERP instances configured on the device.
Examples
The following example shows how to enable the debug ethernet ring g8032 packets command. Output is generated only when error conditions are encountered.
Device# debug ethernet ring g8032 packets
debug ethernet service
To enable debugging of Ethernet customer service instances, use the debug ethernet service command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ethernet service { all | api | error | evc [evc-id] | ha | instance [ id id | interface type number [ dynamic | mac ] | qos ] | interface type number | microblock | oam-mgr }
no debug ethernet service { all | api | error | evc | ha | instance | interface | microblock | oam-mgr }
Syntax Description
all |
Displays all Ethernet customer-service debug messages. |
api |
Displays debug messages about the interaction between the Ethernet infrastructure and its clients. |
error |
Displays Ethernet customer service error messages occurring in the Ethernet infrastructure subsystem. |
evc |
Displays Ethernet virtual circuit (EVC) debug messages. |
evc-id |
(Optional) String from 1 to 100 characters that identifies an EVC for debugging. |
ha |
Displays High Availability (HA) Ethernet service debug messages. |
instance |
Displays debug messages related to Ethernet customer service instances. |
id |
(Optional) Displays Ethernet service-instance debug messages for a specific Ethernet service instance ID and interface. |
id |
(Optional) Integer in the range from 1 to 4294967295 that is the service identifier. |
interface |
Displays debugging for Ethernet services on all interfaces or on a specified interface. (Optional) When used as an option with the instance keyword, service instance debug messages for the interface are displayed. |
type number |
Type and number of the physical interface. |
dynamic |
(Optional) Displays debug messages for the Ethernet Layer 2 (L2) context dynamic service instances. |
mac |
(Optional) Displays debug messages for MAC address activity. |
qos |
Displays debug messages for the Ethernet service quality of service (QoS). |
microblock |
Displays debug messages for the Ethernet service microblocks. |
oam-mgr |
Displays debug messages for the Ethernet operations, administration, and maintenance (OAM) manager component of the infrastructure. |
Command Default
Ethernet service debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(25)SEG |
This command was introduced. |
12.2(33)SRB |
This command was implemented on the Cisco 7600 series routers. |
12.2(33)SRD |
The ha keyword was added. |
15.1(2)S |
This command was modified. The dynamic keyword was added. |
Cisco IOS XE Release 3.8S |
This command was integrated into Cisco IOS XE Release 3.8S. |
Usage Guidelines
The debug ethernet service command is useful for troubleshooting. The undebug ethernet service command is the same as the no debug ethernet service command.
When you use the evc keyword without specifying an EVC ID, debugging is enabled for all EVCs on the system.
When you use the instance keyword without specifying options, debugging for all service instances is enabled. If a service instance ID and interface are specified, only debug messages for the associated service instance are displayed. If only an interface is specified, debug messages for all service instances on that interface only are displayed.
Examples
The following example shows output after issuing the debug ethernet service all command:
Device# debug ethernet service all Ethernet service error debugging is on Ethernet service api debugging is on Ethernet service interface debugging is on Ethernet service instance debugging is on Ethernet service instance qos debugging is on Ethernet service evc debugging is on Ethernet service OAM Manager debugging is on Ethernet service ha debugging is on
Related Commands
Command |
Description |
---|---|
show debugging |
Displays information about the types of debugging that are enabled. |
debug ethernet service instance dynamic
To enable debugging of Ethernet Layer 2 (L2) context service instances, use the debug ethernet service instance dynamiccommand in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ethernet service instance dynamic { errors | events | ha { errors | events } | issu { errors | events } }
no debug ethernet service
Syntax Description
errors |
Displays Ethernet L2 context error messages occurring in the Ethernet infrastructure subsystem. |
events |
Enables debugging L2 context events. |
ha |
Enables debugging for High Availability (HA) Ethernet service errors or events. |
issu |
Enables debugging for In-Service Software Upgrade (ISSU) errors or events. |
Command Default
Ethernet L2 context service instance debugging is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
15.1(2)S |
This command was introduced. |
Usage Guidelines
The debug ethernet service instance dynamiccommand is useful for troubleshooting. The undebug ethernet service instance dynamiccommand is the same as the no debug ethernet service instance dynamiccommand.
Examples
The following example shows how to enable Ethernet L2 context service instance debugging:
Router# debug ethernet service instance dynamic
Related Commands
Command |
Description |
---|---|
show debugging |
Displays information about the types of debugging that are enabled. |
debug event manager
To turn on the debugging output of Embedded Event Manager (EEM) processes, use the debug event manager command in privileged EXEC mode. To turn off debugging output, use the no form of this command or the undebugcommand.
debug event manager { action cli | action cns | action mail | all | api calls | api errors | common | detector all | detector appl | detector cli | detector config | detector counter | detector env | detector gold | detector interface | detector ioswdsysmon | detector ipsla | detector nf | detector none | detector oir | detector resource | detector rf | detector routing | detector rpc | detector snmp | detector snmp-notification | detector syslog | detector test | detector timer | detector track | metricdir | policydir | server ISSU | server events | server scheduling | snap calls | snap errors | tcl cli_library | tcl commands | tcl smtp_library | xml parser }
no debug event manager { action cli | action cns | action mail | all | api calls | api errors | common | detector all | detector appl | detector cli | detector config | detector counter | detector env | detector gold | detector interface | detector ioswdsysmon | detector ipsla | detector nf | detector none | detector oir | detector resource | detector rf | detector routing | detector rpc | detector snmp | detector snmp-notification | detector syslog | detector test | detector timer | detector track | metricdir | policydir | server ISSU | server events | server scheduling | snap calls | snap errors | tcl cli_library | tcl commands | tcl smtp_library | xml parser }
Syntax Description
action cli |
Displays debugging messages about command-line interface (CLI) event messages. |
||
action cns |
Displays debugging messages about Cisco Networking Services (CNS) event messages. |
||
action mail |
Displays debugging messages about e-mail event messages. |
||
all |
Displays all debugging messages. |
||
api calls |
Displays debugging messages about EEM client application programming interface (API) calls. |
||
api errors |
Displays debugging messages about EEM client API errors. |
||
common |
Displays common library code debugging messages. |
||
detector all |
Displays all event detector debugging messages. |
||
detector appl |
Displays debugging messages about the application-specific event detector.
|
||
detector cli |
Displays debugging messages about the CLI event detector. |
||
detector config |
Displays debugging messages about the config event detector. |
||
detector counter |
Displays debugging messages about the counter event detector. |
||
detector env |
Displays debugging messages about the environmental event detector. |
||
detector gold |
Displays debugging messages about the GOLD event detector. |
||
detector interface |
Displays debugging messages about the interface counter event detector. |
||
detector ioswdsysmon |
Displays debugging messages about the IOS watchdog event detector. |
||
detector ipsla |
Displays debugging messages about the IP SLA event detector. |
||
detector nf |
Displays debugging messages about the NetFlow event detector. |
||
detector none |
Displays debugging messages about the none event detector. |
||
detector oir |
Displays debugging messages about the OIR event detector. |
||
detector resource |
Displays debugging messages about the Embedded Resource Manager (ERM) event detector. |
||
detector rf |
Displays debugging messages about the redundancy-facility (RF) event detector. |
||
detector routing |
Displays debugging messages about the routing event detector. |
||
detector rpc |
Displays debugging messages about the remote procedure call (RPC) event detector. |
||
detector snmp |
Displays debugging messages about the Simple Network Management Protocol (SNMP) event detector. |
||
detector snmp-notification |
Displays debugging messages about the SNMP notification event detector. |
||
detector syslog |
Displays debugging messages about the syslog event detector. |
||
detector test |
Displays debugging messages about the test event detector. |
||
detector timer |
Displays debugging messages about the timer event detector. |
||
detector track |
Displays debugging messages about the Enhanced Object Tracking (EOT). |
||
metricdir |
Displays debugging messages about the EEM metric event detector. |
||
policydir |
Displays debugging messages about the EEM policy director. |
||
server ISSU |
Displays debugging messages about In-Service Software Upgrade (ISSU) server events. |
||
server events |
Displays debugging messages about the EEM server events. |
||
server scheduling |
Displays all debugging messages about the EEM server scheduling events. |
||
snap calls |
Displays debugging messages about EEM SNAP client application programming interface (API) calls. |
||
snap errors |
Displays debugging messages about EEM SNAP client API errors. |
||
tcl cli_library |
Displays all debugging messages about the Tool Command Language (Tcl) command-line interface (CLI) library. |
||
tcl commands |
Displays all debugging messages about the Tcl commands. |
||
tcl smtp_library |
Displays all debugging messages about the Tcl Simple Mail Transfer Protocol (SMTP) library. |
||
xml parser |
Displays debugging messages about the EEM XML parser. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.0(26)S |
This command was introduced. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T. |
12.3(2)XE |
This command was integrated into Cisco IOS Release 12.3(2)XE. |
12.2(25)S |
The detector application, detector counter, detector interface, detector ioswdsysmon,and detector timer keywords were added and this command was integrated into Cisco IOS Release 12.2(25)S. |
12.3(14)T |
The action cli, action mail, detector all, detector cli, detector none, detector oir, and metricdirkeywords were added. |
12.2(28)SB |
This command was integrated into Cisco IOS Release 12.2(28)SB. |
12.4(2)T |
The detector resource, detector rf, and detector trackkeywords were added. |
12.2(18)SXF4 |
The detector gold keyword was added and this command was integrated into Cisco IOS Release 12.2(18)SXF4 to support Software Modularity images only. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2(18)SXF5 |
This command was integrated into Cisco IOS Release 12.2(18)SXF5. |
12.4(20)T |
The common, detector config, detector env, detector rf, detector snmp-notification, detector test, server ISSU, and xml parser keywords were added and the detector application keyword was replaced with the detector appl keyword. |
12.4(22)T |
The detector ipsla, detector nf, and detector routing keywords were added. |
15.1(1)SY |
This command was integrated into Cisco IOS Release 15.1(1)SY. |
Usage Guidelines
Use the debug event manager command to troubleshoot EEM command operations.
Note | Use any debugging command with caution because the volume of generated output can slow or stop the router operations. We recommend that this command be used only under the supervision of a Cisco engineer. |
Examples
The following example turns on debugging messages about EEM server events and then configures an applet to write a message--Test message--to syslog. The debug output that follows displays the various EEM operations that occur as the applet is processed.
Router# debug event manager server events Debug Embedded Event Manager server events debugging is on Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# event manager applet timer-test Router(config-applet)# event timer countdown time 20 Router(config-applet)# action label1 syslog msg "Test message" Router(config-applet)# end 03:46:55: fh_server: fh_io_msg: received msg 6 from client jobid 11 03:46:55: fh_server: fh_io_msg: handling event register with esid = 23 03:46:55: fh_msg_send_to_fd: receive a reply msg, minor: 5 03:46:55: fh_server: fh_io_msg: received msg 26 from client jobid 11 03:46:55: fh_msg_send_to_fd: receive a reply msg, minor: 5 03:46:55: %SYS-5-CONFIG_I: Configured from console by console 03:47:15: fd_pulse_hndlr: received a pulse from /dev/fm/fd_timer 03:47:15: fh_msg_send_to_fd: receive a reply msg, minor: 5 03:47:15: fd_pulse_hndlr: received FH_MSG_EVENT_PUBLISH 03:47:15: fh_schedule_callback: fh_schedule_callback: cc=632C0B68 prev_epc=0; epc=63A41670 03:47:15: fh_io_msg: received FH_MSG_API_INIT; jobid=13, processid=82, client=3, job name=EEM Callback Thread 03:47:15: fh_server: fh_io_msg: received msg 10 from client jobid 13 03:47:15: %HA_EM-6-LOG: timer-test: Test message 03:47:15: fh_server: fh_io_msg: received msg 62 from client jobid 13 03:47:15: fh_schedule_callback: fh_schedule_callback: cc=632C0B68 prev_epc=63A41670; epc=0 03:47:15: fh_server: fh_io_msg: received msg 1 from client jobid 13 03:47:15: fh_io_msg: received FH_MSG_API_CLOSE client=3
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
Debug Embedded Event Manager server events debugging |
Indicates the type of debugging output and whether the debugging is on or off. |
fh_server |
Indicates a server event message. |
fh_io_msg |
Indicates that a message has been sent to, or received from, a client process. |
fh_msg_send_to_fd |
Indicates that a message has been sent to the event detector. |
fd_pulse_hndlr |
Indicates that a message has been received by the event detector pulse handler. |
debug events
To display events, use the debug events command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug events
no debug events
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
This command displays events that occur on the interface processor and is useful for diagnosing problems in an network. It provides an overall picture of the stability of the network. In a stable network, the debug events command does not return any information. If the command generates numerous messages, the messages can indicate the possible source of problems.
When configuring or making changes to a router or interface for, enable the debug events command. Doing so alerts you to the progress of the changes or to any errors that might result. Also use this command periodically when you suspect network problems.
Examples
The following is sample output from the debug events command:
Router# debug events RESET(4/0): PLIM type is 1, Rate is 100Mbps aip_disable(4/0): state=1 config(4/0) aip_love_note(4/0): asr=0x201 aip_enable(4/0) aip_love_note(4/0): asr=0x4000 aip_enable(4/0): restarting VCs: 7 aip_setup_vc(4/0): vc:1 vpi:1 vci:1 aip_love_note(4/0): asr=0x200 aip_setup_vc(4/0): vc:2 vpi:2 vci:2 aip_love_note(4/0): asr=0x200 aip_setup_vc(4/0): vc:3 vpi:3 vci:3 aip_love_note(4/0): asr=0x200 aip_setup_vc(4/0): vc:4 vpi:4 vci:4 aip_love_note(4/0): asr=0x200 aip_setup_vc(4/0): vc:6 vpi:6 vci:6 aip_love_note(4/0): asr=0x200 aip_setup_vc(4/0): vc:7 vpi:7 vci:7 aip_love_note(4/0): asr=0x200 aip_setup_vc(4/0): vc:11 vpi:11 vci:11 aip_love_note(4/0): asr=0x200
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
PLIM type |
Indicates the interface rate in Mbps. Possible values are:
|
state |
Indicates current state of the ATM Interface Processor (AIP). Possible values are:
|
asr |
Defines a bitmask, which indicates actions or completions to commands. Valid bitmask values are:
|
The following line indicates that the AIP was reset. The PLIM detected was 1, so the maximum rate is set to 100 Mbps.
RESET(4/0): PLIM type is 1, Rate is 100Mbps
The following line indicates that the AIP was given a shutdown command, but the current configuration indicates that the AIP should be up:
aip_disable(4/0): state=1
The following line indicates that a configuration command has been completed by the AIP:
aip_love_note(4/0): asr=0x201
The following line indicates that the AIP was given a no shutdown command to take it out of the shutdown state:
aip_enable(4/0)
The following line indicates that the AIP detected a carrier state change. It does not indicate that the carrier is down or up, only that it has changed.
aip_love_note(4/0): asr=0x4000
The following line of output indicates that the AIP enable function is restarting all permanent virtual circuits (PVCs) automatically:
aip_enable(4/0): restarting VCs: 7
The following lines of output indicate that PVC 1 was set up and a successful completion code was returned:
aip_setup_vc(4/0): vc:1 vpi:1 vci:1 aip_love_note(4/0): asr=0x200
debug fax dmsp
To troubleshoot the fax Document Media Service Provider (DMSP), use the debug fax dmsp command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax dmsp [ all | default | detail | error [ call [informational] | software [informational] ] | event | function | inout ]
no debug fax dmsp
Syntax Description
all |
(Optional) Displays all fax DMSP debugging messages. |
default |
(Optional) Displays fax DMSP error and inout information. This option also runs if no keywords are added. |
detail |
(Optional) Displays fax DMSP background messages. |
error |
(Optional) Displays fax DMSP error messages. |
call |
(Optional) Displays call processing errors. |
informational |
(Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. |
software |
(Optional) Displays software errors. |
event |
(Optional) Displays fax DMSP events. |
function |
(Optional) Displays fax DMSP functions. |
inout |
(Optional) Displays fax DMSP in/out functions. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command replaces the debug dmsp doc-to-fax and debug dmsp fax-to-doc commands. |
Examples
The following is sample output from the debug fax dmsp all command:
Router# debug fax dmsp all 2d07h: //70/67D6061D8012/DMSP/docmsp_call_setup_request: ramp data dir=ONRAMP, conf dir=DEST 2d07h: //70/67D6061D8012/DMSP/docmsp_caps_ind: cid(0x46), srcCallID(0x44) 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: conf id(0x33), srcCallID(0x46), dstCallID(0x44), ramp data dir=ONRAMP, conf dir=DEST, encode out=1 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: Bridge done 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: conf id(0x34), srcCallID(0x46), dstCallID(0x45), ramp data dir=ONRAMP, conf dir=SRC, encode out=1 2d07h: //70/67D6061D8012/DMSP/docmsp_bridge: Bridge done 2d07h: //70/67D6061D8012/DMSP/docmsp_xmit: srcCallID(0x44), dstCallID(0x46), direction=0 2d07h: //68/67D6061D8012/DMSP/docmsp_process_rcv_data: evID=0, proto_flag=3, srcCallID(0x44), dstCallID(0x46) 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_data_process: START_OF_CONNECTION 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_data_process: START_OF_FAX_PAGE 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_get_buffer_callback: tiff_segment=0x63A88ECC 2d07h: //70/67D6061D8012/DMSP_ON/docmsp_tiff_writer_get_buffer_callback: tiff_segment=0x63D58944 2d07h: //70/67D6061D8012/DMSP/docmsp_process_rcv_data: Done
The following table describes the significant fields shown in the display.
Field |
Description |
---|---|
//70/67D6061D8012/DMSP/ docmsp_call_setup_request: |
The format of this message is //callid/GUID/DMSP/function name: |
ramp data dir |
Indicates if the data direction is on-ramp or off-ramp. |
conf dir |
Indicates if the data is from the source or destination. |
docmsp_bridge: |
Indicates that the DMSP is setting up a bridge to the destination. |
docmsp_xmit: |
Indicates that the DMSP is transmitting. |
docmsp_process_rcv_data: |
Indicates that the DMSP is starting the process to receive data. |
docmsp_tiff_writer_data_process: |
Indicates the process that is being started. |
docmsp_tiff_writer_get_buffer_ callback: |
Indicates the segment for the DMSP TIFF writer get_buffer_callback parameter. |
debug fax fmsp
To troubleshoot the Fax Media Service Provider (FMSP), use the debug fax fmsp command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax fmsp [ all | default | detail | error [ call [informational] | software [informational] ] | event | function | inout | receive | send ]
no debug fax fmsp
Syntax Description
all |
(Optional) Displays all fax FMSP debugging messages. |
default |
(Optional) Displays fax FMSP error and inout information. This option also runs if no keywords are added. |
detail |
(Optional) Displays fax FMSP background messages. |
error |
(Optional) Displays fax FMSP error messages. |
call |
(Optional) Displays call processing errors. |
informational |
(Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. |
software |
(Optional) Displays software errors. |
event |
(Optional) Displays fax FMSP events. |
function |
(Optional) Displays fax FMSP functions. |
inout |
(Optional) Displays fax FMSP in/out functions. |
receive |
(Optional) Receives T.30 or T.38 debugs. |
send |
(Optional) Sends T.30 or T.38 debugs. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command replaces the debug fmsp receive and debug fmsp send commands. |
Examples
The following is sample output from the debug fax fmsp all command:
Router# debug fax fmsp all 2d08h: //76/90A52CB88014/FMSP/faxmsp_call_setup_request: session(0x63A8A474), vdbPtr(0x62CA45A8),data dir=ONRAMP, conf dir=DEST 2d08h: //76/90A52CB88014/FMSP/faxmsp_bridge: confID(0x38), srcCID(0x4C), dstCID(0x4B) 2d08h: //76/90A52CB88014/FMSP/faxmsp_bridge: ramp data dir=ONRAMP, conf dir=DEST 2d08h: //76/90A52CB88014/FMSP/faxmsp_bridge: Explicit caps ind. done; Wait for registry cap ind 2d08h: //76/90A52CB88014/FMSP/faxmsp_caps_ind: per_bridge_info(0x63D52FD8), cap_ind_state(0x6) 2d08h: //76/90A52CB88014/FMSP/faxmsp_caps_ind[1617]: 2d08h: //76/90A52CB88014/FMSP/faxmsp_caps_ack: direction=0, srcCID(0x4B), dstCID(0x0) 2d08h: //76/90A52CB88014/FMSP/faxmsp_codec_download_done: per_bridge_info(0x63D52FD8), application_data(0x63C54698), state(0x2), direction=2 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x402897C0), bufferBegin(0x63A86B5C), dataBegin(0x402897EC) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x40289B50), bufferBegin(0x63C55794), dataBegin(0x40289B7C) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x40851E58), bufferBegin(0x63D4EAE4), dataBegin(0x40851E84) 2d08h: //76/90A52CB88014/FMSP/faxmsp_xmit: srcCallID(0x4B), dstCallID(0x4C) 2d08h: //76/90A52CB88014/FMSP/faxmsp_xmit[1813]: 2d08h: //76/90A52CB88014/FMSP/faxmsp_process_rcv_data: state(0x1), evID=918065, evProtoFlag=2 2d08h: //76/90A52CB88014/FMSP/t38_rx_buffer: t38 rx msg dump (size=6): 00 00 01 00 00 00 2d08h: //76/90A52CB88014/FMSP/faxmsp_process_rcv_data[1994]: 2d08h: //76/90A52CB88014/FMSP/fax2_phaseB_receive: CSI_PACKET(8881111) DIS_PACKET(speed=5, resolution=1, encoding=1) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x40289690), bufferBegin(0x63A7E798), dataBegin(0x402896BC) 2d08h: //76/90A52CB88014/FMSP/faxMsp_get_tx_buffer: event(0x4028858C), bufferBegin(0x63B89AC0), dataBegin(0x402885B8) 2d08h: //76/90A52CB88014/FMSP/t38_tx_command: t38 tx msg dump (size=47): 00 04 2A C0 04 80 00 16 FF C0 02 8C 8C 8C 8C 1C 1C 1C 04 04 04 04 04 04 04 04 04 04 04 04 04 28 00 09 FF C8 01 00 77 1F 01 01 19 80 40 00 00 2d08h: //76/90A52CB88014/FMSP/fax2_phaseB_receive: fax2_response_receive, PROCESSING
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
//76/90A52CB88014/FMSP/ faxmsp_call_setup_request: |
The format of this message is //callid/GUID/FMSP/function name
|
ramp data dir |
Indicates if the data direction is on-ramp or off-ramp. |
conf dir |
Indicates if the data is from the source or destination. |
faxmsp_bridge: |
Indicates that the FMSP is setting up a bridge to the destination. |
faxmsp_xmit: |
Indicates that the FMSP is transmitting data. |
faxmsp_process_rcv_data: |
Indicates that the FMSP is beginning the process to receive data. |
t38_rx_buffer: |
Shows the contents of the T.38 transmit buffer. |
t38_tx_command: |
Shows the T.38 transmit command. |
debug fax foip
To troubleshoot fax mail, use the debug fax foip command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax foip [ all | default | detail | error [ call [informational] | software [informational] ] | event | function | inout ]
no debug fax foip
Syntax Description
all |
(Optional) Displays all fax mail debugging messages. |
default |
(Optional) Displays fax mail error and inout information. This option also runs if no keywords are added. |
detail |
(Optional) Displays fax mail background messages. |
error |
(Optional) Displays fax mail error messages. |
call |
(Optional) Displays call processing errors. |
informational |
(Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. |
software |
(Optional) Displays software errors. |
event |
(Optional) Displays fax mail events. |
function |
(Optional) Displays fax mail functions. |
inout |
(Optional) Displays fax mail in/out functions. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command replaces the debug foip off-ramp and debug foip on-ramp commands. |
Examples
The following is sample output from the debug fax foip all command:
Router# debug fax foip all 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_call_handoff: Authentication: Id: 0 Method: IVR or unknown Status: SUCCESS Enabled: FALSE Template: List: fax MailtoAddress: Calling Oct3A=0x0 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_vtsp_fmsp: Begin Conferencing VTSP and FMSP 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_vtsp_fmsp[887]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_change_state: Old State=0, New State=1 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_call_handoff[2953]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_validate_context[930]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_created: VTSP and FMSP Are Conferenced; Waiting for FMSP Call Detail Event 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_change_state: Old State=1, New State=2 2d07h: %ISDN-6-CONNECT: Interface Serial2:30 is now connected to unknown 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_validate_context[930]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_msp_event: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Prepare MSPI Call Setup Request 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Envelope From=FAX=7771111@cisco.com 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Envelope To=jdoe@server.cisco.com 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: RFC822 To Comment=dileung 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Faxmail Subject=hagar-c5300-bw12 subject line here 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Disposition Notification= 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Originator TSI=RFC822 From Comment= 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Auth/Account ID: `0' 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_setup_mspi: Call Setup Request To MSPI 2d07h: //37/67E715B7800A/FOIP_ON/lapp_on_setup_mspi[748]: 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_fmsp_dmsp: Starting Conference with FMSP and DMSP 2d07h: //35/67E715B7800A/FOIP_ON/lapp_on_conference_fmsp_dmsp: Tiff File Created; Time=2003:06:05 22:46:48
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
//35/67E715B7800A/FOIP_ON/ lapp_on_call_handoff: |
The format of this message is //callid/GUID/FOIP_ON/function name:
|
lapp_on_conference_vtsp_fmsp: |
Indicates that fax mail is starting a conference for VTSP and FMSP. |
lapp_on_change_state |
Indicates that the fax mail is changing state. |
lapp_on_conference_created |
Indicates that the conference is working properly between the VTSP and FMSP. |
lapp_on_setup_mspi: |
Indicates that fax mail is displaying an MPSI event. |
lapp_on_conference_fmsp_dmsp: |
Indicates that fax mail is starting a conference for FMSP and DMSP. |
debug fax mmoip aaa
To display output relating to authentication, authorization, and accounting (AAA) services using multimedia mail over IP (MMoIP) for the Store and Forward Fax feature, use the debug fax mmoip aaa command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax mmoip aaa [ all | default | error [ call [informational] | software [informational] ] | inout ]
no debug fax mmoip aaa
Syntax Description
all |
(Optional) Displays all MMoIP AAA debugging messages. |
default |
(Optional) Displays MMoIP AAA error and inout information. This option also runs if no keywords are added. |
error |
(Optional) Displays MMoIP AAA error messages. |
call |
(Optional) Displays call processing errors. |
informational |
(Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. |
software |
(Optional) Displays software errors. |
inout |
(Optional) Displays MMoIP AAA in/out functions. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command replaces the debug mmoip aaa command. |
Examples
The following example shows output from the debug fax mmoip aaa all command for an onramp fax connection:
Router# debug fax mmoip aaa all 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: UID=3 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_account_id_origin=NONE_ID 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_msg_id=00012003151904623@Router.cisco.com, Length=39 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_pages=0 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_connect_speed=disable bps 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_mdn_flag=FALSE 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: fax_auth_status=USER NOT AUTHENTICATED 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: email_server_address=172.19.140.112 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: email_server_ack_flag=TRUE 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: gateway_id=Router.cisco.com 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: call_type=Fax Receive 16:22:04: //3/D9242FD08002/MMOIP_AAA_ON/mmoip_aaa_accounting_onramp: abort_cause=10
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
//3/D9242FD08002/ MMOIP_AAA_ON/ mmoip_aaa_accounting_onramp |
The format of this message is //callid/GUID/module name/function name:
|
fax_msg_id=00012003151904623 @Router.cisco.com |
Displays the fax message ID. |
gateway_id=Router.cisco.com |
Displays the name of the router. |
call_type=Fax Receive |
Indicates that the fax is being received. |
debug fax mspi
To troubleshoot the fax Mail Service Provider Interface (MSPI), use the debug fax mspi command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax mspi [ all | default | detail | error [ call [informational] | software [informational] ] | event | function | inout ]
no debug fax mspi
Syntax Description
all |
(Optional) Displays all fax MSPI debugging messages. |
default |
(Optional) Displays fax MSPI error and inout information. This option also runs if no keywords are added. |
detail |
(Optional) Displays fax MSPI background messages. |
error |
(Optional) Displays fax MSPI error messages. |
call |
(Optional) Displays call processing errors. |
informational |
(Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. |
software |
(Optional) Displays software errors. |
event |
(Optional) Displays fax MSPI events. |
function |
(Optional) Displays fax MSPI functions. |
inout |
(Optional) Displays fax MSPI in/out functions. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command replaces the debug mspi receive and debug mspi send commands. |
Examples
The following is sample output from the debug fax mspi all command:
Router# debug fax mspi all Router# 2d07h: %ISDN-6-CONNECT: Interface Serial2:30 is now connected to unknown 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_call_setup_request: Outgoing Peer Tag=22 Envelope From=FAX=5550121@cisco.com Envelope To=jdoe@server.cisco.com Mime Outer Type=2 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_check_connect: MMccb(Count=0) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_check_connect: SMTP Connected To The Server ! 2d07h: //41/ACF704FA800B/MSPI/mspi_bridge: MMccb(State=CONNECTED, Type=Onramp), Destination Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=0), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=1), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=2), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=3), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: MMccb(Call State=CONFERENCED, Buffer Count=9) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: MMccb(Call State=CONFERENCED, Buffer Count=8) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: MMccb(Call State=CONFERENCED, Buffer Count=7) 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_onramp_buff_finished_callback: 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=0), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=1), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=2), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=3), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=4), Source Call Id=0x2A 2d07h: //41/ACF704FA800B/MSPI_ON/mspi_xmit: MMccb(State=CONFERENCED, Type=Onramp, Buffer Count=5), Source Call Id=0x2A Router#
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
/41/ACF704FA800B/MSPI_ON/mspi_call_setup_request: |
The format of this message is //callid/GUID/module name/function name:
|
Outgoing Peer Tag=22 |
Indicates the unique dial peer tag. |
Envelope From=FAX=5550121@cisco.com |
Indicates the sender of the fax mail message. |
Envelope To=jdoe@server.cisco.com |
Indicates the receiver of the fax mail message. |
mspi_xmit: |
Indicates that the MSPI is transmitting data. |
State=CONFERENCED |
Describes the MPSI state. |
Type=Onramp |
Describes whether the fax is on-ramp or off-ramp. |
Buffer Count=0 |
Indicates the buffer count. |
Source Call Id=0x2A |
Identifies the source call ID. |
debug fax mta
To troubleshoot the fax Mail Transfer Agent (MTA), use the debug fax mta command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax mta [ all | default | detail | error [ call [informational] | software [informational] ] | event | function | inout ]
no debug fax mta
Syntax Description
all |
(Optional) Displays all fax MTA debugging messages. |
default |
(Optional) Displays fax MTA error and inout information. This option also runs if no keywords are added. |
detail |
(Optional) Displays fax MTA background messages. |
error |
(Optional) Displays fax MTA error messages. |
call |
(Optional) Displays call processing errors. |
informational |
(Optional) Displays minor errors and major errors. Without the informational keyword, only major errors are displayed. |
software |
(Optional) Displays software errors. |
event |
(Optional) Displays fax MTA events. |
function |
(Optional) Displays fax MTA functions. |
inout |
(Optional) Displays fax MTA in/out functions. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command replaces the debug mta receive all, debug mta send all, and debug mta send rcpt-to commands. |
Examples
The following is sample output from the debug fax mta all command:
Router# debug fax mta all 2d07h: %ISDN-6-CONNECT: Interface Serial2:30 is now connected to unknown 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_new_context_guid[2177]: 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_open: from=FAX=7771111@cisco.com, to=jdoe@server.cisco.com 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_open[1868]: 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_add_headers: from_comment= 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_work_routine: socket 0 readable for first time 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 220 vip2-das.cisco.com ESMTP Sendmail 8.9.3/8.9.3; Thu, 5 Jun 2003 23:24:54 -0700 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: EHLO Router.cisco.com 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-vip2-das.cisco.com Hello [172.19.140.108], pleased to meet you 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-EXPN 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-VERB 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-8BITMIME 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-SIZE 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-DSN 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-ONEX 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-ETRN 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250-XUSR 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250 HELP 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: MAIL FROM:<FAX=7771111@cisco.com> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250 <FAX=7771111@cisco.com>... Sender ok 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: RCPT TO:<jdoe@server.cisco.com> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 250 <jdoe@server.cisco.com>... Recipient ok 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_getln: (C)R: 354 Enter mail, end with "." on a line by itself 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: Received: by Router.cisco.com for <jdoe@server.cisco.com> (with Cisco NetWorks); Thu, 05 Jun 2003 23:11:09 +0000 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: To: "jdoe" <jdoe@server.cisco.com> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: Message-ID: <00222003231109198@Router.cisco.com> 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_writeln: (C)S: Date: Thu, 05 Jun 2003 23:11:09 +0000 2d07h: //-1/CEB9FA0B800E/SMTPC/esmtp_client_engine_write: return code=0
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
//-1/CEB9FA0B800E/SMTPC/ esmtp_client_engine_open: |
The format of this message is //callid/GUID/module name/function name:
|
from=FAX=7771111@cisco.com |
Indicates the sender of the fax mail message. |
to=jdoe@server.cisco.com |
Indicates the receiver of the fax mail message. |
esmtp_client_engine_writeln: |
Indicates that the fax mail client engine is writing data. |
esmtp_client_engine_getln: |
Indicates that the fax mail client engine is receiving data. |
debug fax relay capture-log
To display debug capture log of the fax calls, use the debug fax relay capture-log command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax relay capture-log { { best-effort | called-number | calling-number } { all-call | error-only | failure-only } | file-destination filename | smart-match { error-only | failure-only } }
no debug fax relay capture-log
Syntax Description
best-effort all-call |
Enables best effort capture for all fax relay sessions. |
best-effort error-only |
Enables best effort capture for error fax relay sessions. |
best-effort failure-only |
Enables best effort capture for failure fax relay sessions. |
called-number all-call |
Enables debug capture for all fax calls processed from this called number. |
called-number error-only |
Enables debug capture for error fax calls processed to this called number. |
called-number failure-only |
Enables debug capture for failed fax calls processed to this called number. |
calling-number all-call |
Enables debug capture for all fax calls processed from this calling number. |
calling-number error-only |
Enables debug capture for error fax calls processed from this calling number. |
calling-number failure-only |
Enables debug capture for failed fax calls processed from this calling number. |
file-destination filename |
File URL to capture all fax data logs. |
smart-match error-only |
Enables debug capture for the fax relay session on DSP error history. |
smart-match failure-only |
Enables debug capture for the fax relay session on DSP failure history. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS 15.4(1)T |
This command was introduced. |
Cisco IOS XE 3.11S |
This command was integrated into Cisco IOS XE 3.11S. |
Examples
The following command enables debugging for best effort capture for all fax relay sessions:
Router# debug fax relay capture-log best-effort all-call Debugging fax relay capture-log best-effort all
Related Commands
Command |
Description |
---|---|
debug fax relay event-log |
Displays event debug details for all fax relay sessions or calls. |
debug fax relay t30 |
Enables debugging messages for T.30 real-time fax. |
debug fax relay event-log
To display event debug details for all fax relay sessions or calls, use the debug fax relay event-log command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax relay event-log { all-call | error-only | failure-only | file-destination filename }
no debug fax relay event-log
Syntax Description
all-call |
Displays call log for all fax calls. |
error-only |
Displays call log for the error fax calls. |
failure-only |
Displays call log for the failed fax calls. |
file-destination filename |
File URL to capture all fax data logs. |
Command Default
No default behavior or values.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
Cisco IOS 15.4(1)T |
This command was introduced. |
Cisco IOS XE 3.11S |
This command was integrated into Cisco IOS XE 3.11S. |
Examples
The following command enables event debugging details for all fax relay sessions:
Router# debug fax relay event-log all-call Debugging fax relay event-log all-call
Related Commands
Command |
Description |
---|---|
debug fax relay capture-log |
Displays debug capture log of the fax calls. |
debug fax relay t30 |
Enables debugging messages for T.30 real-time fax. |
debug fax relay t30
To display debugging messages for T.30 real-time fax, use the debug fax relay t30 command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fax relay t30 { all | calling-number string | called-number string }
no debug fax relay t30
Syntax Description
all |
Enables debugging for all incoming and outgoing calls. |
calling-number |
Enables debugging for incoming numbers that begin with a specified string of digits. |
called-number |
Enables debugging for outgoing numbers that begin with a specified string of digits. |
string |
Digits that specify the incoming or outgoing number. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)XB1 |
The debug fax relay t30 command was introduced on Cisco AS5350, Cisco AS5400, and Cisco AS5850 access servers. |
12.2(11)T |
This command was integrated into Cisco IOS Release 12.2(11)T for the Cisco AS5350, Cisco AS5400, and Cisco AS5850 access servers. |
Usage Guidelines
The incoming or outgoing numbers must be a valid E.164 destination. The period symbol (.) as a wildcard should not be used. Instead of a wildcard, leave the space blank to indicate that any numbers can be valid.
There are no limits to the number of debug entries. The number entered generates a match if the calling or called number matches up to the final number of the debug entry. For example, the 408555 entry would match 408555, 4085551, 4085551212, or any other number starting with 408555.
Examples
The following command enables debugging for any incoming calls that start with 408555:
Router# debug fax relay t30 calling-number 408555 Debugging fax relay t30 from 408555
The following command enables debugging for any calls received to a number starting with 555-1212:
Router# debug fax relay t30 called-number 4155551212 Debugging fax relay t30 to 4155551212
The following command displays all debug entries:
Router# debug fax relay t30 all Debugging fax relay t30 from 408555 Debugging fax relay t30 to 4155551212
debug fddi smt-packets
To display information about Station Management (SMT) frames received by the router, use the debug fddi smt-packetscommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fddi smt-packets
no debug fddi smt-packets
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug fddi smt-packetscommand. In this example, an SMT frame has been output by FDDI 1/0. The SMT frame is a next station addressing (NSA) neighbor information frame (NIF) request frame with the parameters as shown.
Router# debug fddi smt-packets SMT O: Fddi1/0, FC=NSA, DA=ffff.ffff.ffff, SA=00c0.eeee.be04, class=NIF, type=Request, vers=1, station_id=00c0.eeee.be04, len=40 - code 1, len 8 -- 000000016850043F - code 2, len 4 -- 00010200 - code 3, len 4 -- 00003100 - code 200B, len 8 -- 0000000100000000
The table below describes the significant fields shown in the display.
Field |
Description |
---|---|
SMT O |
SMT frame was sent from FDDI interface 1/0. Also, SMT I indicates that an SMT frame was received on the FDDI interface 1/0. |
Fddi1/0 |
Interface associated with the frame. |
FC |
Frame control byte in the MAC header. |
DA, SA |
Destination and source addresses in FDDI form. |
class |
Frame class. Values can be echo frame (ECF), neighbor information frame (NIF), parameter management frame (PMF), request denied frame (RDF), status information frame (SIF), and status report frame (SRF). |
type |
Frame type. Values can be Request, Response, and Announce. |
vers |
Version identification. Values can be 1 or 2. |
station_id |
Station identification. |
len |
Packet size. |
code 1, len 8 -- 000000016850043F |
Parameter type X’0001--upstream neighbor address (UNA), parameter length in bytes, and parameter value. SMT parameters are described in the SMT specification ANSI X3T9. |
debug filesystem
To enable ATA ROM monitor library (monlib) debugging messages, use the debug filesystemcommand in privileged EXEC mode. To disable ATA monlib debugging messages, use the no form of this command.
debug filesystem { disk0 | disk1 }
no debug filesystem { disk0 | disk1 }
Syntax Description
disk0 |
Selects disk 0 as the disk on which to enable or disable debugging. |
disk1 |
Selects disk 1 as the disk on which to enable or disable debugging. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(7)T |
This command was introduced. |
12.2(25)S |
This command was integrated into Cisco IOS Release 12.2(25)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug filesystem command enables the display of ATA monlib debugging messages during boot operations.
To display the debugging messages when ROMMON accesses the PCMCIA disk, the ROMMON must have disk support. In other words, if a dev command is entered in ROMMON mode, the output should display the supported disks as shown in the following example:
rommon 1> dev Devices in device table: id name bootflash: boot flash slot0: PCMCIA slot 0 slot1: PCMCIA slot 1 disk0: PCMCIA slot 0 disk1: PCMCIA slot 1 eprom: eprom
Examples
The following example shows how to enable ATA monlib debugging messages on disk 0, reboot the router to view ATA monlib debugging messages, and then disable ATA monlib debugging messages:
Router# debug filesystem disk0 rommon 1> boot disk0:c7200-is-mz.123-5.7.PI3a Initializing ATA monitor library....... ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 8, sector = 3, cyl_low = 0, cyl_high = 0, head = 171 ATA_read_sector:dev = 0, retval = 0 dfs_openfile:Using monlib version 2 dfs_openfile:Using version info 1 dfs_openfile:finding file.. /c7200-is-mz.123-5.7.PI3a ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 1, sector = 15, cyl_low = 0, cyl_high = 0, head = 163 ATA_read_sector:dev = 0, retval = 0 ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 128, sector = 35, cyl_low = 0, cyl_high = 0, head = 171 ATA_read_sector:dev = 0, retval = 0 dfs_openfile:opened file.. /c7200-is-mz.123-5.7.PI3a with fd = 0 DFSLIB_read:reading file.. fd = 0, byte_count = 4 DFSLIB_read:read from.. fd = 0, byte_count = 4, retval = 4 DFSLIB_read:reading file.. fd = 0, byte_count = 52 DFSLIB_read:read from.. fd = 0, byte_count = 52, retval = 52 DFSLIB_read:reading file.. fd = 0, byte_count = 40 DFSLIB_read:read from.. fd = 0, byte_count = 40, retval = 40 . . . DFSLIB_read:reading file.. fd = 0, byte_count = 40 DFSLIB_read:read from.. fd = 0, byte_count = 40, retval = 40 DFSLIB_read:reading file.. fd = 0, byte_count = 19539160 ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 1, sector = 15, cyl_low = 0, cyl_high = 0, head = 163 ATA_read_sector:dev = 0, retval = 0 ATA_read_sector:dev = 0 . . . ATA_read_sector:dev = 0 ATA_data_xfer:1:dev = 0, command = 32, nsecs = 19, sector = 1, cyl_low = 38, cyl_high = 0, head = 169 ATA_read_sector:dev = 0, retval = 0 DFSLIB_read:read from.. fd = 0, byte_count = 19539160, retval = 19539160 Self decompressing the image :##################################################################### #################################################################################################### ############################################################### [OK] Router# no debug filesystem disk0
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
dev = |
The number of the device being accessed. |
command = |
The operation that is being executed. |
nsecs = |
The number of sectors on the device. |
sector = |
The starting sector. |
cyl_low =, cyl_high = |
The starting cylinder, low and high. |
head = |
The head number. |
retval = |
The status of the operation being executed. |
debug firewall
To enable debugging for events, errors and SCP communication of ASA SM, use the debug firewall command in the global configuration mode. Run the command from RP of Supervisor. To disable the debugging, use the no form of the command
debug firewall { all | errors | events | scp }
no debug firewall { all | errors | events | scp }
Syntax Description
all |
Displays the following: The output for all errors in the processes for ASA SM, and the output of all ongoing processes |
errors | Displays the output for errors in the processes for ASA SM |
events | Displays the output of all ongoing processes for ASA SM |
scp | Displays the debug output if SCP messages are dropped between the Supervisor SP or RP, and the linecard. It also displays the debug output for the SCP communication check between the line card and Supervisor. |
Command Default
None
Command Modes
Global configuration
Command History
Release | Modification |
---|---|
15.2(4)S2 |
This command was introduced on the Cisco 7600 series routers |
Usage Guidelines
Use the debug command only to troubleshoot specific problems, or during troubleshooting sessions with Cisco technical support staff.
Examples
debug firewall all Router# debug firewall all Firewall debug errors debugging is on Firewall debug events debugging is on Firewall debug scp debugging is on Router#
If the ASA module works as expected, and no configuration is performed on the module, no logs are generated for the command. However, if you configure the firewall VLAN-group with debugging enabled, the output is as follows:
May 5 22:45:13.060 PDT: config_firewall_command(): csb->which = 0, csb->nvgen = 1, csb->sense = 1, obj_1 = 0, obj_2 =, obj_2(int) =2 May 5 22:45:52.853 PDT: config_firewall_command(): csb->which = 1, csb->nvgen = 0, csb->sense = 1, obj_1 = 900, obj_2 =100, obj_2(int) =0 May 5 22:46:45.189 PDT: config_firewall_command(): csb->which = 0, csb->nvgen = 1, csb->sense = 1, obj_1 = 0, obj_2 =, obj_2(int) =2
debug flow exporter
To enable debugging output for Flexible NetFlow flow exporters, use the debug flow exporter command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug flow exporter [ [name] exporter-name ] [error] [event] [ packets number ]
no debug flow exporter [ [name] exporter-name ] [error] [event] [ packets number ]
Syntax Description
name |
(Optional) Specifies the name of a flow exporter. |
exporter-name |
(Optional) The name of a flow exporter that was previously configured. |
error |
(Optional) Enables debugging for flow exporter errors. |
event |
(Optional) Enables debugging for flow exporter events. |
packets |
(Optional) Enables packet-level debugging for flow exporters. |
number |
(Optional) The number of packets to debug for packet-level debugging of flow exporters. Range: 1 to 65535. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(9)T |
This command was introduced. |
12.2(31)SB2 |
This command was integrated into Cisco IOS Release 12.2(31)SB2. |
12.0(33)S |
This command was modified. Support for this command was implemented on the Cisco 12000 series routers. |
12.2(33)SRC |
This command was modified. Support for this command was implemented on the Cisco 7200 series routers. |
12.2(33)SRE |
This command was modified. Support for this command was implemented on the Cisco 7300 Network Processing Engine (NPE) series routers. |
12.2(50)SY |
This command was integrated into Cisco IOS Release 12.2(50)SY. |
Cisco IOS XE Release 3.2SE |
This command was integrated into Cisco IOS XE Release 3.2SE. |
Examples
The following example indicates that a flow exporter packet has been queued for process send:
Router# debug flow exporter May 21 21:29:12.603: FLOW EXP: Packet queued for process send
Related Commands
Command |
Description |
---|---|
clear flow exporter |
Clears the Flexible NetFlow statistics for exporters. |
debug flow monitor
To enable debugging output for Flexible NetFlow flow monitors, use the debug flow monitor command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug flow monitor [error] [ [name] monitor-name [cache] [error] [ packets packets ] ]
no debug flow monitor [error] [ [name] monitor-name [cache] [error] [ packets packets ] ]
Syntax Description
error |
(Optional) Enables debugging for flow monitor errors. |
name |
(Optional) Specifies the name of a flow monitor. |
monitor-name |
(Optional) The name of a flow monitor that was previously configured. |
cache |
(Optional) Enables debugging for the flow monitor cache. |
packets |
(Optional) Enables packet-level debugging for flow monitors. |
packets |
(Optional) The number of packets to debug for packet-level debugging of flow monitors. Range: 1 to 65535. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(9)T |
This command was introduced. |
12.2(31)SB2 |
This command was integrated into Cisco IOS Release 12.2(31)SB2. |
12.0(33)S |
This command was modified. Support for this command was implemented on the Cisco 12000 series routers. |
12.2(33)SRC |
This command was modified. Support for this command was implemented on the Cisco 7200 series routers. |
12.2(33)SRE |
This command was modified. Support for this command was implemented on the Cisco 7300 Network Processing Engine (NPE) series routers. |
12.2(50)SY |
This command was integrated into Cisco IOS Release 12.2(50)SY. |
Cisco IOS XE Release 3.2SE |
This command was integrated into Cisco IOS XE Release 3.2SE. |
Examples
The following example shows that the cache for FLOW-MONITOR-1 was deleted:
Router# debug flow monitor FLOW-MONITOR-1 cache May 21 21:53:02.839: FLOW MON: 'FLOW-MONITOR-1' deleted cache
Related Commands
Command |
Description |
---|---|
clear flow monitor |
Clears the Flexible NetFlow flow monitor. |
debug flow record
To enable debugging output for Flexible NetFlow flow records, use the debug flow record command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug flow record [ [name] record-name | netflow-original | netflow { ipv4 | ipv6 } record [peer] | netflow-v5 | options { exporter-statistics | interface-table | sampler-table | vrf-id-name-table } ]
no debug flow record [ [name] record-name | netflow-original | netflow { ipv4 | ipv6 } record [peer] | netflow-v5 | options { exporter-statistics | interface-table | sampler-table | vrf-id-name-table } ]
Cisco Catalyst 6500 Switches in Cisco IOS Release 12.2(50)SY
debug flow record [ [name] record-name | netflow-v5 | options { exporter-statistics | interface-table | sampler-table | vrf-id-name-table } | platform-original { ipv4 | ipv6 } record [ detailed | error ] ]
no debug flow record [ [name] record-name | netflow-v5 | options { exporter-statistics | interface-table | sampler-table | vrf-id-name-table } | platform-original { ipv4 | ipv6 } record [ detailed | error ] ]
Cisco IOS XE Release 3.2SE
debug flow record [ [name] record-name | netflow { ipv4 | ipv6 } record [peer] | netflow-v5 | options sampler-table ]
no debug flow record [ [name] record-name | netflow { ipv4 | ipv6 } record [peer] | netflow-v5 | options sampler-table ]
Syntax Description
name |
(Optional) Specifies the name of a flow record. |
||
record-name |
(Optional) Name of a user-defined flow record that was previously configured. |
||
netflow-original |
(Optional) Specifies the traditional IPv4 input NetFlow with origin autonomous systems. |
||
netflow {ipv4 | ipv6} record |
(Optional) Specifies the name of the NetFlow predefined record. See the table below. |
||
peer |
(Optional) Includes peer information for the NetFlow predefined records that support the peer keyword.
|
||
options |
(Optional) Includes information on other flow record options. |
||
exporter-statistics |
(Optional) Includes information on the flow exporter statistics. |
||
interface-table |
(Optional) Includes information on the interface tables. |
||
sampler-table |
(Optional) Includes information on the sampler tables. |
||
vrf-id-name-table |
(Optional) Includes information on the virtual routing and forwarding (VRF) ID-to-name tables. |
||
platform-original ipv4 record |
Configures the flow monitor to use one of the predefined IPv4 records. |
||
platform-original ipv6 record |
Configures the flow monitor to use one of the predefined IPv6 records. |
||
detailed |
(Optional) Displays detailed information. |
||
error |
(Optional) Displays errors only. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(9)T |
This command was introduced. |
12.2(31)SB2 |
This command was integrated into Cisco IOS Release 12.2(31)SB2. |
12.0(33)S |
This command was modified. Support for this command was implemented on the Cisco 12000 series routers. |
12.2(33)SRC |
This command was modified. Support for this command was implemented on the Cisco 7200 series routers. |
12.4(20)T |
This command was modified. The ipv6 keyword was added in Cisco IOS Release 12.4(20)T. |
15.0(1)M |
This command was modified. The vrf-id-name-table keyword was added. |
12.2(33)SRE |
This command was modified. Support for this command was implemented on the Cisco 7300 Network Processing Engine (NPE) series routers. |
12.2(50)SY |
This command was integrated into Cisco IOS Release 12.2(50)SY without support for the netflow-original, netflow, ipv4, netflow, ipv6 and peer keywords. The platform-original ipv4 and platform-originalipv6 keywords were added. |
Cisco IOS XE Release 3.2SE |
This command was integrated into Cisco IOS XE Release 3.2SE without the support for the netflow-original, options exporter-statistics, options interface-table and option vrf-id-name-table keywords. |
Usage Guidelines
The table below describes the keywords and descriptions for the record argument.
Keyword |
Description |
IPv4 Support |
IPv6 Support |
||
---|---|---|---|---|---|
as |
Autonomous system record. |
Yes |
Yes |
||
as-tos |
Autonomous system and type of service (ToS) record. |
Yes |
— |
||
bgp-nexthop-tos |
BGP next-hop and ToS record. |
Yes |
— |
||
bgp-nexthop |
BGP next-hop record. |
— |
Yes |
||
destination |
Original 12.2(50)SY platform IPv4/IPv6 destination record. |
Yes |
Yes |
||
destination-prefix |
Destination prefix record.
|
Yes |
Yes |
||
destination-prefix-tos |
Destination prefix and ToS record. |
Yes |
— |
||
destination-source |
Original 12.2(50)SY platform IPv4/IPv6 destination-source record. |
Yes |
Yes |
||
full |
Original 12.2(50)SY platform IPv4/IPv6 full record. |
Yes |
Yes |
||
interface-destination |
Original 12.2(50)SY platform IPv4/IPv6 interface-destination record. |
Yes |
Yes |
||
interface-destination- source |
Original 12.2(50)SY platform IPv4/IPv6 interface-destination-source record. |
Yes |
Yes |
||
interface-full |
Original 12.2(50)SY platform IPv4/IPv6 interface-full record. |
Yes |
Yes |
||
interface-source |
Original 12.2(50)SY platform IPv4/IPv6 interface-source only record. |
Yes |
Yes |
||
original-input |
Traditional IPv4 input NetFlow. |
Yes |
Yes |
||
original-output |
Traditional IPv4 output NetFlow. |
Yes |
Yes |
||
prefix |
Source and destination prefixes record.
|
Yes |
Yes |
||
prefix-port |
Prefix port record.
|
Yes |
— |
||
prefix-tos |
Prefix ToS record. |
Yes |
— |
||
protocol-port |
Protocol ports record.
|
Yes |
Yes |
||
protocol-port-tos |
Protocol port and ToS record.
|
Yes |
— |
||
source |
Original 12.2(50)SY platform IPv4/IPv6 source only record. |
Yes |
Yes |
||
source-prefix |
Source autonomous system and prefix record.
|
Yes |
Yes |
||
source-prefix-tos |
Source prefix and ToS record. |
Yes |
— |
Examples
The following example enables debugging for the flow record:
Router# debug flow record FLOW-record-1
Related Commands
Command |
Description |
---|---|
flow record |
Create a Flexible NetFlow flow record. |
debug flow-sampler
To enable debugging output for NetFlow sampler activity, use the debug flow-sampler command in privileged EXEC mode. To disable debugging output for NetFlow sampler activity, use the no form of this command.
debug flow-sampler { class-based | events | ipc | match }
no debug flow-sampler { class-based | events | ipc | match }
Syntax Description
class-based |
Displays debug messages for class-based NetFlow samplers. |
events |
Displays debug messages when a NetFlow sampler map is added, deleted, or applied to an interface. |
ipc |
Displays NetFlow sampler-related debug messages for interprocess communications (IPC) between the route processor and line cards. |
match |
Displays debug messages when a packet is sampled (is matched with a NetFlow sampler). |
Command Default
Debugging output for NetFlow sampler activity is disabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(2)T |
This command was introduced. |
12.2(18)S |
This command was integrated into Cisco IOS Release 12.2(18)S. |
12.0(26)S |
This command was integrated into Cisco IOS Release 12.0(26)S. |
12.3(4)T |
The class-based keyword was added. |
12.2(27)SBC |
This command was integrated into Cisco IOS Release 12.2(27)SBC. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
Because debugging output is assigned high priority in the CPU process, you should use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, you should use debug commands during periods of lower network traffic and fewer users. Debugging during these periods reducess the likelihood that increased debug command processing overhead will affect system use.
Examples
The following is sample output from the debug flow-sampler events command:
Router# debug flow-sampler events Flow sampler events debugging is on Router# configure terminal Router(config# no flow-sampler mysampler2 Router(config)# 5d00h: Flow: Sampler mysampler2 detached from FastEthernet0/1 5d00h: Flow: Sampler mysampler2 deleted
The following is sample output from the debug flow-sampler match command:
Router# debug flow-sampler match Flow sampler match debugging is on Router# 4d23h: Flow: Packet matched sampler mysampler1 on interface FastEthernet0/0 Router# 4d23h: Flow: Packet matched sampler mysampler1 on interface FastEthernet0/0 Router# 4d23h: Flow: Packet matched sampler mysampler1 on interface FastEthernet0/0 Router# 4d23h: Flow: Packet matched sampler mysampler1 on interface FastEthernet0/0
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
Sampler |
Name of the NetFlow sampler. |
id |
Unique ID of the NetFlow sampler. |
packets matched |
Number of packets matched (sampled) for the NetFlow sampler. |
mode |
NetFlow sampling mode. |
sampling interval is |
NetFlow sampling interval (in packets). |
Related Commands
Command |
Description |
---|---|
flow-sampler |
Enables a Random Sampled NetFlow sampler. |
flow-sampler-map |
Defines a Random Sampled NetFlow sampler map. |
ip flow-export |
Enables the export of NetFlow data to a collector. |
mode (flow sampler map) |
Specifies a Random Sampled NetFlow sampling mode and sampling rate. |
netflow-sampler |
Enables a class-based NetFlow sampler. |
show flow-sampler |
Displays attributes (including mode, sampling rate, and number of sampled packets) of one or all Random Sampled NetFlow samplers. |
show ip flow export |
Displays the statistics for the NetFlow data export. |
debug fm ipv6 pbr
To enable debugging of IPv6 policy-based routing information, use the debug fm ipv6 pbr command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug fm ipv6 policy [ all | events | vmrs ]
no debug fm ipv6 policy [ all | events | vmrs ]
Syntax Description
all |
(Optional) Enables all policy-based routing (PBR) debugging information. |
events |
(Optional) Enables debugging of all IPv6 PBR events. |
vmrs |
(Optional) Enables debugging of PBR value mask results (VMRs). |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SXI4 |
This command was introduced. |
15.1(1)SY |
This command was integrated into Cisco IOS Release 15.1(1)SY. |
Usage Guidelines
Do not use the debug fm ipv6 pbr command unless you suspect a problem with IPv6 policy-based routing.
Examples
The following example enables debugging of IPv6 PBR information:
Device# debug fm ipv6 pbr
debug fm private-hosts
To enable debug messages for the Private Hosts feature manager, use the debug fm private-hosts command in privileged EXEC mode.
debug fm private-hosts { all | vmr | unusual | events }
Syntax Description
all |
Enable debug messages for all Private Hosts errors and events. |
vmr |
Enable debug messages for the Multicast VLAN Registration (MVR) feature. |
unusual |
Enable debug messages for unexpected Private Hosts behavior. |
events |
Enable debug messages for Private Hosts events. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(33)SRB |
This command was introduced. |
Examples
The following example shows sample command output:
Router# debug fm private-hosts all fm private-hosts vmr debugging is on fm private-hosts unusual debugging is on fm private-hosts events debugging is on Router#
Related Commands
Command |
Description |
---|---|
debug private-hosts |
Enables debug messages for Private Hosts. |
debug fm raguard
To display information about router advertisement (RA) guard debugging activity, use the debug fm raguardcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fm raguard [ all | events | error | vmr ]
no debug fm raguard
Syntax Description
all |
(Optional) All RA guard debugging information is displayed. |
events |
(Optional) Information about RA guard debugging events is displayed. |
error |
(Optional) Information about RA guard debugging errors is displayed. |
vmr |
(Optional) Information about debugging value mask results (VMRs) is displayed. |
Command Default
RA guard debugging information is not displayed.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(33)SXI4 |
This command was introduced. |
12.2(54)SG |
This command was modified. Support for Cisco IOS Release 12.2(54)SG was added. |
Usage Guidelines
Do not use the debug fm raguardcommand unless you suspect a problem with IPv6 RA guard.
Examples
The following example enables you to view IPv6 RA guard debugging activity:
Router# debug fm raguard
debug fmsp receive
Note | Effective with release 12.3(8)T, the debug fmsp receive command is replaced by the debug fax fmsp command. See the debug fax fmsp command for more information. |
To display debugging messages for Fax Media Services Provider (FMSP) receive, use the debug fmsp receivecommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fmsp receive [ t30 | t38 ]
no debug fmsp receive [ t30 | t38 ]
Syntax Description
t30 |
(Optional) Specifies the T.30 fax protocol. |
t38 |
(Optional) Specifies the T.38 fax protocol. |
Command Default
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(3)XI |
This command was introduced on the Cisco AS5300 access server. |
12.2(8)T |
This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. |
12.2(13)T |
Support for this command was implemented in Cisco 7200 series images. |
12.3(8)T |
This command was replaced by the debug fax fmsp command. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Examples
The following is sample output from the debug fmsp receivecommand:
Router# debug fmsp receive *Oct 16 08:31:33.243: faxmsp_call_setup_request: call id=28 *Oct 16 08:31:33.243: faxmsp_call_setup_request: ramp data dir=ONRAMP, conf dir=DEST *Oct 16 08:31:33.243: faxmsp_bridge(): cfid=19, srccid=28, dstcid=27 *Oct 16 08:31:33.243: faxmsp_bridge(): ramp data dir=ONRAMP, conf dir=DEST *Oct 16 08:31:33.243: faxmsp_bridge(): Explicit caps ind. done; will wait for registry caps ind *Oct 16 08:31:33.243: faxmsp_caps_ind: call id=28, src=27 *Oct 16 08:31:33.243: faxmsp_caps_ack: call id src=27 *Oct 16 08:31:33.279: faxmsp_call_setup_request: call id=29 *Oct 16 08:31:33.279: faxmsp_call_setup_request: ramp data dir=OFFRAMP, conf dir=SRC *Oct 16 08:31:33.283: faxmsp_bridge(): cfid=20, srccid=29, dstcid=26 *Oct 16 08:31:33.283: faxmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC *Oct 16 08:31:33.283: faxmsp_bridge(): Explicit caps ind. done; will wait for registry caps ind *Oct 16 08:31:33.283: faxmsp_caps_ind: call id=29, src=26 *Oct 16 08:31:33.283: faxmsp_caps_ack: call id src=26 *Oct 16 08:31:33.635: faxmsp_codec_download_done: call id=29 *Oct 16 08:31:33.635: faxmsp_codec_download_done: call id=28 *Oct 16 08:31:33.643: faxmsp_xmit: callid src=26, dst=29 *Oct 16 08:31:33.643: faxmsp_xmit: callid src=27, dst=28 *Oct 16 08:31:33.643: faxmsp_process_rcv_data: call id src=26, dst=29
Related Commands
Command |
Description |
---|---|
debug fmsp send |
Displays debugging messages for FMSP send. |
debug fmsp send
Note | Effective with release 12.3(8)T, the debug fmsp sendcommand is replaced by the debug fax fmsp command. See the debug fax fmsp command for more information. |
To display debugging messages for Fax Media Services Provider (FMSP) send, use the debug fmsp send command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fmsp send [ t30 | t38 ]
no debug fmsp send [ t30 | t38 ]
Syntax Description
t30 |
(Optional) Specifies the T.30 fax protocol. |
t38 |
(Optional) Specifies the T.38 fax protocol. |
Command Default
No default behavior or values.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.1(3)XI |
This command was introduced on the Cisco AS5300 access server. |
12.2(8)T |
This command was implemented on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. |
12.2(13)T |
This feature was implemented on the Cisco 7200 series routers. |
12.3(8)T |
This command was replaced by the debug fax fmsp command. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following is sample output from the debug fmsp sendcommand:
Router# debug fmsp send Jan 1 05:02:56.782: faxmsp_call_setup_request: call id=21 Jan 1 05:02:56.782: faxmsp_call_setup_request: ramp data dir=OFFRAMP, conf dir=SRC Jan 1 05:02:56.782: faxmsp_bridge(): cfid=7, srccid=21, dstcid=20 Jan 1 05:02:56.782: faxmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC Jan 1 05:02:56.782: faxmsp_bridge(): Explicit caps ind. done; will wait for registry caps ind Jan 1 05:02:56.782: faxmsp_caps_ind: call id=21, src=20 Jan 1 05:02:56.782: faxmsp_caps_ack: call id src=20 Jan 1 05:02:57.174: faxmsp_codec_download_done: call id=21 Jan 1 05:02:57.174: faxMsp_tx_buffer callID=21 Jan 1 05:02:57.178: faxMsp_tx_buffer callID=21 Jan 1 05:02:57.178: faxMsp_tx_buffer callID=21 Jan 1 05:02:57.178: faxMsp_tx_buffer callID=21 Jan 1 05:02:57.182: faxmsp_xmit: callid src=20, dst=21 Jan 1 05:02:57.182: faxmsp_process_rcv_data: call id src=20, dst=21 Jan 1 05:03:01.814: faxmsp_xmit: callid src=20, dst=21 Jan 1 05:03:01.814: faxmsp_process_rcv_data: call id src=20, dst=21 Jan 1 05:03:01.814: faxMsp_tx_buffer callID=21 Jan 1 05:03:02.802: faxmsp_xmit: callid src=20, dst=21 Jan 1 05:03:02.802: faxmsp_process_rcv_data: call id src=20, dst=21 Jan 1 05:03:02.822: faxmsp_xmit: callid src=20, dst=21 Jan 1 05:03:02.822: faxmsp_process_rcv_data: call id src=20, dst=21 Jan 1 05:03:02.854: faxmsp_xmit: callid src=20, dst=21 Jan 1 05:03:02.854: faxmsp_process_rcv_data: call id src=20, dst=21
Related Commands
Command |
Description |
---|---|
debug fax relay t30 |
Displays debugging messages for FMSP receive. |
debug foip off-ramp
Note | Effective with release 12.3(8)T, the debug foip off-rampcommand is replaced by the debug fax foipcommand. See the debug fax foipcommand for more information. |
To display debugging messages for off-ramp fax mail, use the debug foip off-rampcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug foip off-ramp
no debug foip off-ramp
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(3)XI |
This command was introduced on the Cisco AS5300 access server. |
12.2(8)T |
This command was introduced on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. |
12.2(13)T |
This feature was implemented on the Cisco 7200 series routers. |
12.3(8)T |
This command was replaced by the debug fax foip command. |
Examples
The following is sample output from the debug foip off-rampcommand:
Router# debug foip off-ramp Jan 1 02:31:17.539: lapp off: CC_EV_CALL_HANDOFF, cid(0xB) Jan 1 02:31:17.539: loffHandoff: called number=5271714, callid=0xB Jan 1 02:31:17.543: loffSetupPeer: cid1(0xB) Jan 1 02:31:17.543: destPat(5271714),matched(1),pref(5),tag(20),encap(1) Jan 1 02:31:22.867: lapp off: CC_EV_CALL_CONNECTED, cid(0xC) Jan 1 02:31:22.867: st=CALL_SETTING cid(0xB,0x0,0x0,0xC),cfid(0x0,0x0,0x0) Jan 1 02:31:22.867: loffConnected Jan 1 02:31:22.867: loffFlushPeerTagQueue cid(11) peer list: (empty) Jan 1 02:31:22.867: lapp off: CC_EV_CONF_CREATE_DONE, cid(0xC), cid2(0xD), cfid(0x1) Jan 1 02:31:22.867: st=CONFERENCING3 cid(0xB,0x0,0xD,0xC),cfid(0x0,0x0,0x1) Jan 1 02:31:22.867: loffConfDone3 Jan 1 02:31:30.931: lapp off: CC_EV_FROM_FMSP_ON_CALL_DETAIL, cid(0xD) Jan 1 02:31:30.931: st=WAIT_SESS_INFO cid(0xB,0x0,0xD,0xC),cfid(0x0,0x0,0x1) Jan 1 02:31:30.931: loffSessionInfo Jan 1 02:31:30.931: encd=2, resl=2, spd=26, min_scan_len=0, csid= 4085271714 Jan 1 02:31:30.931: lapp off: CC_EV_CONF_CREATE_DONE, cid(0xD), cid2(0xE), cfid(0x2) Jan 1 02:31:30.931: st=CONFERENCING2 cid(0xB,0xE,0xD,0xC),cfid(0x0,0x2,0x1) Jan 1 02:31:30.931: loffConfDone2
Related Commands
Command |
Description |
---|---|
debug foip on-ramp |
Displays debugging messages for on-ramp fax mail. |
debug foip on-ramp
Note | Effective with release 12.3(8)T, the debug foip on-rampcommand is replaced by the debug fax foipcommand. See the debug fax foipcommand for more information. |
To display debugging messages for on-ramp fax mail, use the debug foip on-rampcommandinprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug foip on-ramp
no debug foip on-ramp
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(3)XI |
This command was introduced on the Cisco AS5300 access server. |
12.2(8)T |
This command was introduced on the Cisco 1751 access routers, Cisco 3725 access routers, and Cisco 3745 access routers. |
12.2(13)T |
This feature was implemented on the Cisco 7200 series routers. |
12.3(8)T |
This command was replaced by the debug fax foipcommand. |
Examples
The following is sample output from the debug foip on-rampcommand:
Router# debug foip on-ramp *Oct 16 08:07:01.947: lapp_on_application: Incoming Event: (15 = CC_EV_CALL_HANDOFF), CID(11), DISP(0) *Oct 16 08:07:01.947: lapp_on_call_handoff: Authentication enabled = FALSE *Oct 16 08:07:01.947: lapp_on_call_handoff: Authentication ID = 0 *Oct 16 08:07:01.947: lapp_on_call_handoff: Authentication ID source = IVR or unknown *Oct 16 08:07:01.947: lapp_on_call_handoff: Authentication status = SUCCESS *Oct 16 08:07:01.947: lapp_on_call_handoff: Accounting enabled = FALSE *Oct 16 08:07:01.947: lapp_on_call_handoff: Accounting method list = fax *Oct 16 08:07:01.947: lapp_on_conference_vtsp_fmsp: Begin conferencing VTSP and FMSP... *Oct 16 08:07:01.951: lapp_on_change_state: old state(0) new state(1) *Oct 16 08:07:01.951: lapp_on_application: Incoming Event: (29 = CC_EV_CONF_CREATE_DONE), CID(11), DISP(0) *Oct 16 08:07:01.951: lapp_on_application: Current call state = 1 *Oct 16 08:07:01.951: lapp_on_conference_created: The VTSP and the FMSP are conferenced *Oct 16 08:07:01.951: lapp_on_conference_created: Wait for FMSP call detail event
Related Commands
Command |
Description |
---|---|
debug foip off-ramp |
Displays debugging messages for off-ramp fax mail. |
debug format
To verify the syntax of eXtensible Markup Language Programmatic Interface (XML-PI) spec files, use the debug formatcommand in privileged EXEC mode. To disable debugging, use the no form of this command.
debug format { all | error }
no debug format { all | error }
Syntax Description
all |
Specifies verbose mode to display selected debug data with comments followed by full debug output. |
error |
Displays minimal format error statements. |
Command Default
This command is disabled by default.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(20)T |
This command was introduced. |
12.2(33)SRE |
This command was modified. It was integrated into Cisco IOS Release 12.2(33)SRE. |
12.2(50)SY |
This command was integrated into Cisco IOS Release 12.2(50)SY. |
Usage Guidelines
Use the debug format allcommand to troubleshoot errors in XML-PI spec files. The command displays XML output, the XML Schema Definition (XSD), and parsing locations. For less verbose output, use the debug format errorcommand.
Examples
The following examples show how to use the verbose output from the debug format allcommand to troubleshoot spec file entries based on information collected from the show interfaces command.
Begin by displaying the show interfaces command output.
Router# show interfaces FastEthernet0/0 is up, line protocol is up Hardware is i82543 (Livengood), address is 000b.60dc.9408 (bia 000b.60dc.9408) Internet address is 10.4.4.5/8 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:07, output 00:00:03, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 769 packets input, 121369 bytes Received 696 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog 0 input packets with dribble condition detected 959 packets output, 94185 bytes, 0 underruns 2 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 2 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out FastEthernet0/1 is down, line protocol is down Hardware is i82543 (Livengood), address is 000b.60dc.9406 (bia 000b.60dc.9406) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Unknown duplex, Unknown Speed, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output never, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog 0 input packets with dribble condition detected 0 packets output, 0 bytes, 0 underruns 2 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 2 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Loopback0 is up, line protocol is up Hardware is Loopback MTU 1514 bytes, BW 8000000 Kbit, DLY 5000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation LOOPBACK, loopback not set Last input never, output never, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/0 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 output buffer failures, 0 output buffers swapped out
The next step is to generate XML output for the show interfacescommand:
Router# show interfaces | format slot0:spec3.3.odm <?xml version="1.0" encoding="UTF-8"?> <ShowInterfaces> <Interface> <Name>FastEthernet0/0</Name> <State>UP</State> <lineprotocol>up</lineprotocol> <Hardware>i82543</Hardware> <address>000b.60dc.9408</address> <bia>000b.60dc.9408</bia> <Internetaddress>10.4.4.5/8</Internetaddress> <MTU>1500</MTU> <BW>100000</BW> <DLY>100</DLY> <reliability>255/255,</reliability> <txload>1/255,</txload> <rxload>1/255</rxload> <Encapsulation>ARPA,</Encapsulation> <loopback>Notset</loopback> <Keepalive>Set</Keepalive> <KeepAliveInterval>10</KeepAliveInterval> <TunnelInfo> </TunnelInfo> <DuplexInfo> <Duplextype>duplex,</Duplextype> <DuplexSpeed>100Mb/s,</DuplexSpeed> </DuplexInfo> <ARPtype>ARPA,</ARPtype> <ARPTimeout>04:00:00</ARPTimeout> <LMIInfo> </LMIInfo> <BroadcastInfo> </BroadcastInfo> <Lastinput>00:00:26,</Lastinput> <output>00:00:08,</output> <outputhang>never</outputhang> <LastclearingOfCounters>never</LastclearingOfCounters> <Inputqueue> <Size>0/75/0/0</Size> <Max>0/75/0/0</Max> <Drops>0/75/0/0</Drops> <flushes>0/75/0/0</flushes> </Inputqueue> <Totaloutputdrops>0</Totaloutputdrops> <Queueingstrategy>fifo</Queueingstrategy> <Outputqueue> <Size>0/40</Size> <Max>0/40</Max> </Outputqueue> <Conversations> </Conversations> <ReservedConversations> </ReservedConversations> <Fiveminuteinputrateinbits>0</Fiveminuteinputrateinbits> <Fiveminuteinputrateinpkts>0</Fiveminuteinputrateinpkts> <Fiveminuteoutputrateinbits>0</Fiveminuteoutputrateinbits> <Fiveminuteoutputrateinpkts>0</Fiveminuteoutputrateinpkts> <L2Switched> </L2Switched> <L3in> </L3in> <L3out> </L3out> <packetsinput>771</packetsinput> <nobuffer>0</nobuffer> <broadcasts>0</broadcasts> <runts>0</runts> <giants>0</giants> <throttles>0</throttles> <inputerrors>0</inputerrors> <CRC>0</CRC> <frame>0</frame> <overrun>0</overrun> <ignored>0</ignored> <packetsoutput>0</packetsoutput> <underruns>0</underruns> <outputerrors>0</outputerrors> <collisions>0</collisions> <interfaceresets>0</interfaceresets> <outputbufferfailures>0</outputbufferfailures> <outputbuffersswappedout>0</outputbuffersswappedout> </Interface> </ShowInterfaces>
Analyze the two outputs: In this case, output about only one interface is listed in the show interfaces | format slot0:spec3.3.odm command, but based on the original show interfaces command output, it was expected that there would be output about three interfaces.
Enter the following commands to enable the verbose debugging mode that displays all Operational Data Model (ODM) errors:
Router# debug format all Router# show interfaces | format slot0:spec3.3.odm
The debug format statements are read in groups of two lines. As the following example shows, the first line describes what the attempted match was; the second line provides the offset and the byte count from the beginning of the show interfacescommand output that the cursor of the screen scraper has reached.
*May 4 01:20:35.279: ODM: Could not match Property mcast *May 4 01:20:35.279: offset 703: 5 minute output rate 0 bits/sec, 0 packets/sec
The following example shows where the spec file entry (SFE) caused the ODM algorithm to return a truncated XML. Notice how the offset jumps from 703 to 3001. This is a large jump that implies a search between multicast and IP multicast probably caused the screen scraper to jump too far into the text. Because the cursor is not at a buffer, this condition is the likely candidate for the error. Looking at the spec file entry and doing a manual search through the show command output will confirm this suspicion.
*May 4 01:20:35.279: offset 703: 5 minute output rate 0 bits/sec, 0 packets/sec 786 pa *May 4 01:20:35.279: ODM: Could not match Property mcast *May 4 01:20:35.279: offset 703: 5 minute output rate 0 bits/sec, 0 packets/sec 786 pa *May 4 01:20:35.279: ODM: Could not match Property IP multicasts *May 4 01:20:35.279: offset 3001: no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 *May 4 01:20:35.279: ODM: Could not match Property watchdog *May 4 01:20:35.279: offset 3122: ignored, 0 abort 0 packets output, 0 bytes, 0 underru *May 4 01:20:35.279: ODM: Could not match Property input packets with dribble condition detected Be sure to disable the debug command.
Related Commands
Command |
Description |
---|---|
show interfaces |
Displays statistics for all interfaces configured on the router or access server |
debug fpm event
Note | Effective with Cisco IOS Release 15.2(4)M, the debug fpm event command is not available in Cisco IOS software. |
To display protocol information from the designated protocol header description field (PHDF), use the debug fpm eventcommand in privileged EXEC mode. To disable debugging messages, use the no form of this command.
debug fpm event
no debug fpm event
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.4(4)T |
This command was introduced. |
12.2(18)ZY |
This command was integrated into Cisco IOS Release 12.2(18)ZY on the Catalyst 6500 series of switches equipped with the Programmable Intelligent Services Accelerator (PISA). |
15.2(4)M |
This command was removed from the Cisco IOS software. |
Examples
The following sample output is from the debug fpm eventcommand:
Router# debug fpm event *Jun 21 09:22:21.607: policy-classification-inline(): matches class: class-default *Jun 21 09:22:21.607: packet-access-control(): policy-map: fpm-policy, dir: input, match. retval: 0x0, ip-flags: 0x80000000
debug frame-relay
To display debugging information about the packets received on a Frame Relay interface, use the debug frame-relay command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay
no debug frame-relay
Syntax Description
This command has no arguments or keywords.
Command Default
This command is disabled by default.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
9.00 |
This command was introduced. |
12.2(13)T |
Support for Banyan VINES was removed. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
This command helps you analyze the packets that have been received. However, because the debug frame-relay command generates a substantial amount of output, use it only when the rate of traffic on the Frame Relay network is less than 25 packets per second.
To analyze the packets that have been sent on a Frame Relay interface, use the d ebug frame-relay packet command.
Examples
The following is sample output from the debug frame-relay command:
Router# debug frame-relay Serial0(i): dlci 500(0x7C41), pkt type 0x809B, datagramsize 24 Serial1(i): dlci 1023(0xFCF1), pkt type 0x309, datagramsize 13 Serial0(i): dlci 500(0x7C41), pkt type 0x809B, datagramsize 24 Serial1(i): dlci 1023(0xFCF1), pkt type 0x309, datagramsize 13 Serial0(i): dlci 500(0x7C41), pkt type 0x809B, datagramsize 24
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
Serial0(i): |
Indicates that serial interface 0 has received this Frame Relay datagram as input. |
dlci 500(0x7C41) |
Indicates the value of the data-link connection identifier (DLCI) for this packet in decimal (and q922). In this case, 500 has been configured as the multicast DLCI. |
pkt type 0x809B |
Indicates the packet type code. Possible supported signalling message codes are as follows:
Possible supported Ethernet type codes are:
Possible High-Level Data Link Control (HDLC) type codes are as follows:
|
datagramsize 24 |
Indicates size of this datagram (in bytes). |
debug frame-relay adjacency
To display information pertaining to an adjacent node that has one or more Frame Relay permanent virtual circuit (PVC) bundles, use the debug frame-relay adjacency command in privileged EXEC mode. To stop displaying the adjacent node information, use the no form of this command.
debug frame-relay adjacency { pvc [dlci] | vc-bundle [vc-bundle-name] }
no debug frame-relay adjacency { pvc [dlci] | vc-bundle [vc-bundle-name] }
Syntax Description
pvc |
Displays information regarding the adjacent PVC only. |
dlci |
(Optional) Data-link connection identifier for a specific PVC. |
vc-bundle |
Displays information regarding the adjacent PVC bundle and its members. |
vc-bundle-name |
(Optional) Name of the PVC bundle. |
Command Default
No default behaviors or values.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(13)T |
This command was introduced. |
12.2(28)SB |
This command was integrated into Cisco IOS Release 12.2(28)SB. |
Usage Guidelines
Use this command to monitor adjacency activity and status for an adjacent node.
Note | Debug messages that are prefixed with “FR_ADJ” (instead of “FR-ADJ”) indicate serious failures in the Frame Relay PVC bundle performance. Contact the Cisco Technical Assistance Center (TAC) if you see debugging messages with this prefix. |
Examples
The following sample output from the debug frame-relay adjacency vc-bundle command shows PVC bundle “MP-4-dynamic” going down. Each bundle member PVC is marked for removal from the CEF adjacency table, and then the adjacency for the PVC bundle itself is marked for removal. The adjacencies are actually removed from the table later when a background clean-up process runs.
Router# debug frame-relay adjacency vc-bundle MP-4-dynamic 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 400: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 401: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 402: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 403: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 404: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 405: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 406: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: member 407: removing adj 00:46:35: FR-ADJ: vcb MP-4-dynamic: ip 10.2.2.2: removing primary adj
Related Commands
Command |
Description |
---|---|
debug frame-relay vc-bundle |
Displays information pertaining to all the PVC bundles configured on the router. |
debug frame-relay callcontrol
To display Frame Relay Layer 3 (network layer) call control information, use the debug frame-relay callcontrolcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay callcontrol
no debug frame-relay callcontrol
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
The debug frame-relay callcontrolcommand is used specifically for observing FRF.4/Q.933 signalling messages and related state changes. The FRF.4/Q.933 specification describes a state machine for call control. The signalling code implements the state machine. The debug statements display the actual event and state combinations.
The Frame Relay switched virtual circuit (SVC) signalling subsystem is an independent software module. When used with the debug frame-relay networklayerinterfac e command, the debug frame-relay callcontrol command provides a better understanding of the call setup and teardown sequence. The debug frame-relay networklayerinterface command provides the details of the interactions between the signalling subsystem on the router and the Frame Relay subsystem.
Examples
State changes can be observed during a call setup on the calling party side. The debug frame-relay networklayerinterface command shows the following state changes or transitions:
STATE_NULL -> STATE_CALL_INITIATED -> STATE_CALL_PROCEEDING->STATE_ACTIVE
The following messages are samples of output generated during a call setup on the calling side:
6d20h: U0_SetupRequest: Serial0 6d20h: L3SDL: Ref: 1, Init: STATE_NULL, Rcvd: SETUP_REQUEST, Next: STATE_CALL_INITIATED 6d20h: U1_CallProceeding: Serial0 6d20h: L3SDL: Ref: 1, Init: STATE_CALL_INITIATED, Rcvd: MSG_CALL_PROCEEDING, Next: STATE_CALL_PROCEEDING 6d20h: U3_Connect: Serial0 6d20h: L3SDL: Ref: 1, Init: STATE_CALL_PROCEEDING, Rcvd: MSG_CONNECT, Next: STATE_ACTIVE 6d20h:
The following messages are samples of output generated during a call setup on the called party side. Note the state transitions as the call goes to the active state:
STATE_NULL -> STATE_CALL_PRESENT-> STATE_INCOMING_CALL_PROCEEDING->STATE_ACTIVE 1w4d: U0_Setup: Serial2/3 1w4d: L3SDL: Ref: 32769, Init: STATE_NULL, Rcvd: MSG_SETUP, Next: STATE_CALL_PRESENT 1w4d: L3SDL: Ref: 32769, Init: STATE_CALL_PRESENT, Rcvd: MSG_SETUP, Next: STATE_INCOMING_CALL_PROC 1w4d: L3SDL: Ref: 32769, Init: STATE_INCOMING_CALL_PROC, Rcvd: MSG_SETUP, Next: STATE_ACTIVE
The below table explains the possible call states.
Call State |
Description |
---|---|
Null |
No call exists. |
Call Initiated |
User has requested the network to establish a call. |
Outgoing Call Proceeding |
User has received confirmation from the network that the network has received all call information necessary to establish the call. |
Call Present |
User has received a request to establish a call but has not yet responded. |
Incoming Call Proceeding |
User has sent acknowledgment that all call information necessary to establish the call has been received (for an incoming call). |
Active |
On the called side, the network has indicated that the calling user has been awarded the call. On the calling side, the remote user has answered the call. |
Disconnect Request |
User has requested that the network clear the end-to-end call and is waiting for a response. |
Disconnect Indication |
User has received an invitation to disconnect the call because the network has disconnected the call. |
Release Request |
User has requested that the network release the call and is waiting for a response. |
Related Commands
Command |
Description |
---|---|
debug fax relay t30 |
Displays debugging information about the packets that are received on a Frame Relay interface. |
debug frame-relay networklayerinterface |
Displays NLI information. |
debug frame-relay end-to-end keepalive
To display debug messages for the Frame Relay End-to-End Keepalive feature, use the debug frame-relay end-to-end keepalive command. Use the no form of this command to disable the display of debug messages.
debug frame-relay end-to-end keepalive { events | packet }
no debug frame-relay end-to-end keepalive { events | packet }
Syntax Description
events |
Displays keepalive events. |
packet |
Displays keepalive packets sent and received. |
Command History
Release |
Modification |
---|---|
12.0(5)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
We recommend that both commands be enabled.
Examples
The following examples show typical output from the debug frame-relay end-to-end keepalive packet command. The following example shows output for an outgoing request packet:
EEK (o, Serial0.1 DLCI 200): 1 1 1 3 2 4 3
The seven number fields that follow the colon signify the following:
Field |
Description |
---|---|
first (example value = 1) |
Information Element (IE) type. |
second (example value = 1) |
IE length. |
third (example value = 1) |
Report ID. 1 = request, 2 = reply. |
fourth (example value = 3) |
Next IE type. 3 = LIV ID (Keepalive ID). |
fifth (example value = 2) |
IE length. (This IE is a Keepalive IE.) |
sixth (example value = 4) |
Send sequence number. |
seventh (example value = 3) |
Receive sequence number. |
The following example shows output for an incoming reply packet:
EEK (i, Serial0.1 DLCI 200): 1 1 2 3 2 4 4
The seven number fields that follow the colon signify the following:
Field |
Description |
---|---|
first (example value = 1) |
Information Element (IE) type. |
second (example value = 1) |
IE length. |
third (example value = 2) |
Report ID. 1 = request, 2 = reply. |
fourth (example value = 3) |
Next IE type. 3 = LIV ID (Keepalive ID). |
fifth (example value = 2) |
IE length. (This IE is a Keepalive IE.) |
sixth (example value = 4) |
Send sequence number. |
seventh (example value = 4) |
Receive sequence number. |
The following example shows typical output from the debug frame-relay end-to-end keepalive events command:
EEK SUCCESS (request, Serial0.2 DLCI 400) EEK SUCCESS (reply, Serial0.1 DLCI 200) EEK sender timeout (Serial0.1 DLCI 200)
debug frame-relay events
To display debugging information about Frame Relay Address Resolution Protocol (ARP) replies on networks that support a multicast channel and use dynamic addressing, use the debug frame-relay events command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay events
no debug frame-relay events
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
11.3 |
This command was introduced. |
12.0(23)S |
This command was integrated into Cisco IOS Release 12.0(23)S for the Frame Relay over MPLS feature. |
12.2(14)S |
This command was integrated into Cisco IOS Release 12.2(14)S. |
12.2(15)T |
This command was integrated into Cisco IOS Release 12.2(15)T. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
This command is useful for identifying the cause of end-to-end connection problems during the installation of a Frame Relay network or node.
Note | Because the debug frame-relay events command does not generate much output, you can use it at any time, even during periods of heavy traffic, without adversely affecting other users on the system. |
Examples
The following is sample output from the debug frame-relay events command:
Router# debug frame-relay events Serial2(i): reply rcvd 172.16.170.26 126 Serial2(i): reply rcvd 172.16.170.28 128 Serial2(i): reply rcvd 172.16.170.34 134 Serial2(i): reply rcvd 172.16.170.38 144 Serial2(i): reply rcvd 172.16.170.41 228 Serial2(i): reply rcvd 172.16.170.65 325
As the output shows,the debug frame-relay events command returns one specific message type. The first line, for example, indicates that IP address 172.16.170.26 sent a Frame Relay ARP reply; this packet was received as input on serial interface 2. The last field (126) is the data-link connection identifier (DLCI) to use when communicating with the responding router.
For Frame Relay over MPLS, the following is sample output for the debug frame-relay events command. The command output shows the status of the VCs.
Router# debug frame-relay events Frame Relay events debugging is on
This example shows the messages that are displayed when you shut the core-facing interface on a provider edge (PE) router:
04:40:38:%SYS-5-CONFIG_I: Configured from console by consolenf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface hssi2/0 Router(config-if)# shut 04:40:43:%OSPF-5-ADJCHG: Process 10, Nbr 12.12.12.12 on Hssi2/0 from FULL to DOWN, Neighbor Down: Interface down or detached 04:40:43: FRoMPLS [12.12.12.12, 100]: PW pvc_status set INACTIVE 04:40:43: FRoMPLS [12.12.12.12, 100]: Setting pw segment DOWN 04:40:43: FRoMPLS [12.12.12.12, 100]: Setting connection DOWN 04:40:43: FRoMPLS [12.12.12.12, 101]: PW pvc_status set INACTIVE 04:40:43: FRoMPLS [12.12.12.12, 101]: Setting pw segment DOWN 04:40:43: FRoMPLS [12.12.12.12, 101]: Setting connection DOWN 04:40:45:%LINK-5-CHANGED: Interface Hssi2/0, changed state to administratively down 04:40:46:%LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi2/0, changed state to down
This example shows the messages that are displayed when you enable the core-facing interface on a PE router:
Router(config-if)# no shut 04:40:56:%LINK-3-UPDOWN: Interface Hssi2/0, changed state to up 04:40:57:%LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi2/0, changed state to up 04:41:06:%OSPF-5-ADJCHG: Process 10, Nbr 12.12.12.12 on Hssi2/0 from LOADING to FULL, Loading Done 04:41:19: FRoMPLS [12.12.12.12, 100]: PW pvc_status set ACTIVE 04:41:19: FRoMPLS [12.12.12.12, 100]: Setting pw segment UP 04:41:19: FRoMPLS [12.12.12.12, 101]: PW pvc_status set ACTIVE 04:41:19: FRoMPLS [12.12.12.12, 101]: Setting pw segment UP
This example shows the messages that are displayed when you shut the edge-facing interface on a PE router:
Router(config)# interface pos4/0 Router(config-if)# shut 04:42:50: FRoMPLS [12.12.12.12, 100]: acmgr_circuit_down 04:42:50: FRoMPLS [12.12.12.12, 100]: Setting connection DOWN 04:42:50: FRoMPLS [12.12.12.12, 100]: PW pvc_status set INACTIVE 04:42:52:%LINK-5-CHANGED: Interface POS4/0, changed state to administratively down 04:42:53:%LINEPROTO-5-UPDOWN: Line protocol on Interface POS4/0, changed state to down
This example shows the messages that are displayed when you enable the edge-facing interface on a PE router:
Router(config)# interface pos4/0 Router(config-if)# no shut 04:43:20:%LINK-3-UPDOWN: Interface POS4/0, changed state to up c72-33-2(config-if)# 04:43:20: FRoMPLS [12.12.12.12, 100]: Local up, sending acmgr_circuit_up 04:43:20: FRoMPLS [12.12.12.12, 100]: PW nni_pvc_status set ACTIVE 04:43:20: FRoMPLS [12.12.12.12, 100]: PW pvc_status set ACTIVE 04:43:20: FRoMPLS [12.12.12.12, 100]: Setting pw segment UP
debug frame-relay foresight
To observe Frame Relay traces relating to traffic shaping with router ForeSight enabled, use the debug frame-relay foresightcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay foresight
no debug frame-relay foresight
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Examples
The following is sample output that shows the display message returned in response to the debug frame-relay foresight command:
Router# debug frame-relay foresight FR rate control for DLCI 17 due to ForeSight msg
This message indicates the router learned from the ForeSight message that data-link connection identifier (DLCI) 17 is now experiencing congestion. The output rate for this circuit should be slowed down, and in the router this DLCI is configured to adapt traffic shaping in response to foresight messages.
Related Commands
Command |
Description |
---|---|
show frame-relay pvc |
Displays statistics about PVCs for Frame Relay interfaces. |
debug frame-relay fragment
To display information related to Frame Relay fragmentation on a permanent virtual circuit (PVC), use the debug frame-relay fragment command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay fragment [ event | interface type number dlci ]
no debug frame-relay fragment [ event | interface type number dlci ]
Syntax Description
event |
(Optional) Displays event or error messages related to Frame Relay fragmentation. |
interface |
(Optional) Displays fragments received or sent on the specified interface. |
type |
(Optional) The interface type for which you wish to display fragments received or sent. |
number |
(Optional) The Interface number. |
dlci |
(Optional) The data-link connection identifier (DLCI) value of the PVC for which you wish to display fragments received or sent. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.0(3)XG |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
This command will display event or error messages related to Frame Relay fragmentation; it is only enabled at the PVC level on the selected interface.
This command is not supported on the Cisco MC3810 networking device for fragments received by a PVC configured via the voice-encap command.
Examples
The following is sample output from the debug frame-relay fragment command:
Router# debug frame-relay fragment interface serial 0/0 109 This may severely impact network performance. You are advised to enable 'no logging console debug'. Continue?[confirm] Frame Relay fragment/packet debugging is on Displaying fragments/packets on interface Serial0/0 dlci 109 only Serial0/0(i): dlci 109, rx-seq-num 126, exp_seq-num 126, BE bits set, frag_hdr 04 C0 7E Serial0/0(o): dlci 109, tx-seq-num 82, BE bits set, frag_hdr 04 C0 52
The following is sample output from the debug frame-relay fragment event command:
Router# debug frame-relay fragment event This may severely impact network performance. You are advised to enable 'no logging console debug'. Continue?[confirm] Frame Relay fragment event/errors debugging is on Frame-relay reassembled packet is greater than MTU size, packet dropped on serial 0/0 dlci 109 Unexpected B bit frame rx on serial0/0 dlci 109, dropping pending segments Rx an out-of-sequence packet on serial 0/0 dlci 109, seq_num_received 17 seq_num_expected 19
Related Commands
Command |
Description |
---|---|
debug ccfrf11 session |
Displays the ccfrf11 function calls during call setup and teardown. |
debug ccsip all |
Displays the ccswvoice function calls during call setup and teardown. |
debug ccsw voice vofr-session |
Displays the ccswvoice function calls during call setup and teardown. |
debug voice vofr |
Displays Cisco trunk and FRF.11 trunk call setup attempts; shows which dial peer is used in the call setup. |
debug vpm error |
Displays the behavior of the Holst state machine. |
debug vtsp port |
Displays the behavior of the VTSP state machine. |
debug vtsp vofr subframe |
Displays the first 10 bytes (including header) of selected VoFR subframes for the interface. |
debug frame-relay hqf
To display debug messages for Frame Relay (FR) hierarchical queueing framework (HQF) events, use the debug frame-relay hqfcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay hqf
no debug frame-relay hqf
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(28)SB |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
Use the debug frame-relay hqf command to track which quality of service (QoS) features are being used on an interface. QoS for a given FR interface changes depending on the commands being used.
Note | You cannot configure weighted fair queueing (WFQ) with HQF; they are mutually exclusive. |
To use HQF on an interface, you must complete the following tasks:
Install an interface level service policy without legacy queueing or payload compression.
Attach a Modular Quality of Service (QoS) Command-Line Interface (CLI) (MQC) service policy to a permanent virtual circuit (PVC) with no legacy restrictions.
This task is accomplished by adding a service policy to a frame map class. A valid MQC service policy shapes all traffic via the class default and has a child policy to support any further traffic classification, as shown in the following example:
policy-map llq class voice priority 32 policy-map shape1 class class-default shape average 96000 service-policy llq policy-map shape2 class class-default shape average 128000 service-policy llq map-class frame-relay mqc-class1 service-policy output shape1 map-class frame-relay mqc-class2 service-policy output shape2 interface serial4/0 encapsulation frame-relay frame-relay class mqc-class1 <----- Map-class installed frame-relay interface-dlci 16 <----- Inherits map-class1 frame-relay interface-dlci 17 class mqc-class2 <----- Map-class installed for DLCI 17
Examples
The following is sample output from the debug frame-relay hqfcommand:
Router# debug frame-relay hqf debug frame-relay hqf is enabled
Router# show running-configuration . . . 00:25:54: %SYS-5-CONFIG_I: Configured from console by console serial4/1 Building configuration... Current configuration : 167 bytes ! interface Serial4/1 serial restart-delay 0 service-policy output shape end
The following commands and subsequent output show events that occur when HQF is enabled or disabled as a result of queueing changes at the interface level while debugging is on:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface serial4/1 Router(config-if)# policy-map shape Router(config-pmap)# class class-default Router(config-pmap-c)# shape average 128000 1000 Router(config-pmap-c)# interface serial4/1 Router(config-if)# encapsulation frame-relay Router(config-if)# frame-relay fragment 80 end-to-end Router(config-if)# service-policy output shape Router(config-if)# frame-relay map ip 10.0.0.1 16 payload frf9 stac 00:26:52: Serial4/1- Setting up interface for legacy QOS. <---Indicates legacy QoS is being installed on an interface. 00:26:52: Legacy fair-queueing installed on interface. <---Indicates that legacy QoS is being installed and HQF is being removed. You see this only with interface fragmentation and service policies since these policies must be able to support both QoS mechanisms. This usually means that either payload compression has been enabled on an interface or legacy queueing has been set up on the main interface. Router(config-if)# no frame-relay map ip 10.0.0.1 16 payload frf9 stac 00:27:08: Serial4/1- Setting up HQF/MQC QOS. <---Indicates that the last legacy restriction has been removed and HQF is being installed on the interface. 00:27:08: Serial4/1- Setting up interface for legacy QOS. <--- Indicates that legacy QoS is being installed on the interface. Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface serial4/1 Router(config-if)# frame-relay map ip 10.0.0.1 16 Router(config-if)# no service-policy output shape Router(config-if)# no frame-relay fragment 80 end-to-end
The following commands and subsequent output show events that occur when HQF is enabled or disabled as a result of queueing changes at the PVC level while debugging is on:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# interface serial4/1 Router(config-if)# map-class frame-relay frts-shape Router(config-map-class)# frame-relay fragment 80 Router(config-map-class)# service-policy output shape Router(config-map-class)# interface serial4/1 Router(config-if)# frame-relay interface-dlci 16 Router(config-fr-dlci)# class frts-shape 00:28:54: Serial4/1- Setting up HQF/MQC QOS. <---Indicates that the last legacy restriction has been removed and that HQF is being installed on the interface. Router(config-fr-dlci)# no class frts-shape 00:29:02: Serial4/1- Setting up interface for legacy QOS. <--- Indicates that legacy QoS has been installed on the interface.
Related Commands
Command |
Description |
---|---|
show debug |
Displays active debug output. |
debug frame-relay informationelements
To display information about Frame Relay Layer 3 (network layer) information element parsing and construction, use the debug frame-relay informationelementscommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay informationelements
no debug frame-relay informationelements
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
Within the FRF.4/Q.933 signalling specification, messages are divided into subunits called information elements. Each information element defines parameters specific to the call. These parameters can be values configured on the router, or values requested from the network.
The debug frame-relay informationelementscommand shows the signalling message in hexadecimal format. Use this command to determine parameters being requested and granted for a call.
Caution | Use the debug frame-relay informationelementscommand when the debug frame-relay callcontrol command does not explain why calls are not being set up. |
Note | The debug frame-relay informationelementscommand displays a substantial amount of information in bytes. You must be familiar with FRF.4/Q.933 to decode the information contained within the debug output. |
Examples
The following is sample output from the debug frame-relay informationelements command. In this example, each information element has a length associated with it. For those with odd-numbered lengths, only the specified bytes are valid, and the extra byte is invalid. For example, in the message “Call Ref, length: 3, 0x0200 0x0100,” only “02 00 01” is valid; the last “00” is invalid.
lw0d# debug frame-relay informationelements Router: Outgoing MSG_SETUP Router: Dir: U --> N, Type: Prot Disc, length: 1, 0x0800 Router: Dir: U --> N, Type: Call Ref, length: 3, 0x0200 0x0100 Router: Dir: U --> N, Type: Message type, length: 1, 0x0500 Router: Dir: U --> N, Type: Bearer Capability, length: 5, 0x0403 0x88A0 0xCF00 Router: Dir: U --> N, Type: DLCI, length: 4, 0x1902 0x46A0 Router: Dir: U --> N, Type: Link Lyr Core, length: 27, 0x4819 0x090B 0x5C0B 0xDC0A Router: 0x3140 0x31C0 0x0B21 0x4021 Router: 0xC00D 0x7518 0x7598 0x0E09 Router: 0x307D 0x8000 Router: Dir: U --> N, Type: Calling Party, length: 12, 0x6C0A 0x1380 0x3837 0x3635 Router: 0x3433 0x3231 Router: Dir: U --> N, Type: Calling Party Subaddr, length: 4, 0x6D02 0xA000 Router: Dir: U --> N, Type: Called Party, length: 11, 0x7009 0x9331 0x3233 0x3435 Router: 0x3637 0x386E Router: Dir: U --> N, Type: Called Party Subaddr, length: 4, 0x7102 0xA000 Router: Dir: U --> N, Type: Low Lyr Comp, length: 5, 0x7C03 0x88A0 0xCE65 Router: Dir: U --> N, Type: User to User, length: 4, 0x7E02 0x0000
The following table explains the information elements shown in the example.
Information Element |
Description |
---|---|
Prot Disc |
Protocol discriminator. |
Call Ref |
Call reference. |
Message type |
Message type such as setup, connect, and call proceeding. |
Bearer Capability |
Coding format such as data type, and Layer 2 and Layer 3 protocols. |
DLCI |
Data-link connection identifier. |
Link Lyr Core |
Link-layer core quality of service (QoS) requirements. |
Calling Party |
Type of source number (X121/E164) and the number. |
Calling Party Subaddr |
Subaddress that originated the call. |
Called Party |
Type of destination number (X121/E164) and the number. |
Called Party Subaddr |
Subaddress of the called party. |
Low Lyr Comp |
Coding format, data type, and Layer 2 and Layer 3 protocols intended for the end user. |
User to User |
Information between end users. |
Related Commands
Command |
Description |
---|---|
debug frame-relay callcontrol |
Displays Frame Relay Layer 3 (network layer) call control information. |
debug frame-relay ip tcp header-compression
To display debugging information about TCP/IP header compression on Frame Relay interfaces, use the debug frame-relay ip tcp header-compressioncommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay ip tcp header-compression
no debug frame-relay ip tcp header-compression
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
10.0 |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.4(9)T |
This command was modified to display debugging output for control protocol frames for Frame Relay Forum Implementation Agreement (FRF) .20. |
12.4(11)T |
This command was modified to display debugging output for Enhanced Compressed Real-Time Transport Protocol (ECRTP). |
Usage Guidelines
The debug frame-relay ip tcp header-compressioncommand shows the control packets that are passed to initialize IP header compression (IPHC) on a permanent virtual circuit (PVC). For Cisco IPHC, typically two packets are passed: one sent and one received per PVC. (Inverse Address Resolution Protocol (InARP) packets are sent on PVCs that do not have a mapping defined between a destination protocol address and the data-link connection identifier (DLCI) or Frame Relay PVC bundle that connects to the destination address.) For FRF .20 IPHC, typically four packets are passed per PVC.
Debug messages are displayed only if the IPHC control protocol is renegotiated (for an interface or PVC state change or for a configuration change).
Examples
The following is sample output from the debug frame-relayip tcp header-compression command when Cisco IPHC (not FRF .20 IPHC) is configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression *Nov 14 09:22:07.991: InARP REQ: Tx compr_flags 43 *Nov 14 09:22:08.103: InARP RSP: Rx compr_flags: 43
The following is sample output from the debug frame-relayip tcp header-compression command when FRF .20 IPHC (without either Real-time Transport Protocol (RTP) or ECRTP) is configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression FRF20(DLCI 16): Rxed Request, state 0 : ident 0, tot len 19, conf_opts FE, len 15 negotiation codes 1, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 FRF20(DLCI 16): Txed Ack, state 0 : ident 0, tot len 19, conf_opts FE, len 15 negotiation codes 1, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 FRF20(DLCI 16): Txed Request, state 0 : ident 3, tot len 19, conf_opts FE, len 15 negotiation codes 0, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 FRF20(DLCI 16): Rxed Ack, state 2 : ident 3, tot len 19, conf_opts FE, len 15 negotiation codes 0, version 1 Par: IPV4, len 12, TCP_SPACE 16, NON_TCP_SPACE 0, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 *Nov 14 09:18:37.019: FRF20(DLCI 16): STARTING IPHC
The following is sample output from the debug frame-relayip tcp header-compression command when FRF .20 IPHC and RTP are configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression FRF20(DLCI 16): Txed Request, state 1 : ident 0, tot len 21, conf_opts FE, len 17 negotiation codes 1, version 1 Par: IPV4, len 14, TCP_SPACE 16, NON_TCP_SPACE 16, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 01:33:06: Subopt: rtp enabled
The following is sample output from the debug frame-relayip tcp header-compression command when FRF .20 IPHC and ECRTP are configured in the IPHC profile:
Router# debug frame-relay ip tcp header-compression FRF20(DLCI 16): Txed Request, state 1 : ident 0, tot len 21, conf_opts FE, len 17 negotiation codes 1, version 1 Par: IPV4, len 14, TCP_SPACE 16, NON_TCP_SPACE 16, F_MAX_PERIOD 256, F_MAX_TIME 5, MAX_HEADER 168 01:33:06: Subopt: ecrtp enabled
The below table describes the significant fields shown in the displays.
Field |
Description |
---|---|
InARP REQ: Tx |
Indicates that an InARP request was sent or received. Following are the possible values:
|
InARP RSP: Rx |
Indicates that an InARP response was sent or received. Following are the possible values:
|
compr_flags: 43 |
Compression flags that Frame Relay peers use to negotiate Cisco IPHC options. It consists of a bit mask, and the number is displayed in hexadecimal format. Following are the bits:
|
FRF20(DLCI 16) |
Indicates that the DLCI for this packet is configured with FRF .20 IPHC. |
Txed Request |
Direction of the IPHC control protocol message. Following are the possible values:
Txed (transmitted) or Rxed (received) indicates the message direction, and Request or Ack (acknowledgement) indicates the message type. A peer sends a request indicating its configuration, and the other peer replies with an acknowledgement indicating its configuration. The lowest configuration value of this two-frame exchange sets the parameters in one direction. This means that typically four frames are exchanged in total: two Request/Ack pairs, with each pair negotiating the parameters in one direction. |
state 1 |
State of the FRF .20 IPHC protocol request. Following are the possible values: 0--FRF20_DISABLED. FRF .20 is disabled (because of an inactive PVC, an interface that is down, or a configuration mismatch). 1--FRF20_REQ_SENT. An FRF .20 control protocol request has been sent. 2--FRF20_REQ_RXED. An FRF .20 control protocol request has been received. 3--FRF20_WAIT_REQ. An FRF .20 control protocol request has been sent and acknowledged, and the local end is waiting for a request from the peer. 4--FRF20_OPERATIONAL. The FRF .20 control protocol is successfully negotiated, and frames can be compressed. |
ident 0 |
Identifier. This is the transaction number used to correlate an FRF .20 control protocol request with an acknowledgement. This number is the same in messages that correspond to each other. |
tot len 21 |
Sum (in bytes) of the lengths of the following:
|
conf_opts FE |
Type of PPP parameter (expressed in hexadecimal). For FRF .20, the only possible value is FE (254 in decimal). |
len 17 |
Total length of all parameters (in bytes). |
negotiation codes 1 |
Negotiation state with the peer. Following are the possible values:
With a response only, sending a response frame completes the negotiation. With a response and initiate request, the local peer also must send a request. |
version 1 |
Version of the FRF .20 control protocol. |
Par |
List of parameters and values. |
IPV4 |
Datagram type. The value is always IPV4, because Cisco IPHC does not support IPv6. |
len 14 |
Total length (in bytes) of all parameters starting with IP type and ending with associated suboptions (if any). The value is greater than or equal to 12 depending on the suboptions. |
TCP_SPACE 16 |
Maximum value of a TCP context identifier (CID) in the space of context identifiers allocated for TCP. Range: 3-255. Default value: 16. A value of zero means that TCP headers are not being compressed. |
NON_TCP_SPACE 16 |
Maximum value of a context identifier (CID) in the space of context identifiers allocated for non-TCP. Range: 3-1000. Cisco routers do not support the maximum value (65535) of the FRF .20 specification. Default value: 16. A value of zero means that non-TCP headers are not being compressed. These context identifiers are carried in COMPRESSED_NON_TCP, COMPRESSED_UDP and COMPRESSED_RTP packet headers. |
F_MAX_PERIOD 256 |
Largest number of compressed non-TCP headers that can be sent without sending a full header. Range: 1-65535. Default value: 256. A value of zero indicates infinity, which means that the number of consecutive COMPRESSED_NON_TCP headers is unlimited. |
F_MAX_TIME 5 |
Maximum time interval (in seconds) between full (uncompressed) headers. Range: 1-255. Default value: 5. A value of zero indicates infinity (meaning that no full headers will be transmitted). |
MAX_HEADER 168 |
Largest header size (in bytes) that can be compressed. Range: 60-168. Cisco routers do not support the full range of values (60-65535) of the FRF .20 specification. Default value: 168. |
01:33:06 |
Timestamp of the debug command output. |
Subopt |
Compression suboptions that are enabled. The value is either rtp or ecrtp. |
debug frame-relay lapf
To display Frame Relay switched virtual circuit (SVC) Layer 2 information, use the debug frame-relay lapf command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay lapf
no debug frame-relay lapf
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
Use the debug frame-relay lapf command to troubleshoot the data-link control portion of Layer 2 that runs over data-link connection identifier (DLCI) 0. Use this command only if you have a problem bringing up Layer 2. You can use the show interface serial command to determine the status of Layer 2. If it shows a Link Access Procedure, Frame Relay (LAPF) state of down, Layer 2 has a problem.
Examples
The following is sample output from the debug frame-relay lapfcommand. In this example, a line being brought up indicates an exchange of set asynchronous balanced mode extended (SABME) and unnumbered acknowledgment (UA) commands. A SABME is initiated by both sides, and a UA is the response. Until the SABME gets a UA response, the line is not declared to be up. The p/f value indicates the poll/final bit setting. TX means send, and RX means receive.
Router# debug frame-relay lapf Router: *LAPF Serial0 TX -> SABME Cmd p/f=1 Router: *LAPF Serial0 Enter state 5 Router: *LAPF Serial0 RX <- UA Rsp p/f=1 Router: *LAPF Serial0 lapf_ua_5 Router: *LAPF Serial0 Link up! Router: *LAPF Serial0 RX <- SABME Cmd p/f=1 Router: *LAPF Serial0 lapf_sabme_78 Router: *LAPF Serial0 TX -> UA Rsp p/f=1
In the following example, a line in an up LAPF state should see a steady exchange of RR (receiver ready) messages. TX means send, RX means receive, and N(R) indicates the receive sequence number.
Router# debug frame-relay lapf Router: *LAPF Serial0 T203 expired, state = 7 Router: *LAPF Serial0 lapf_rr_7 Router: *LAPF Serial0 TX -> RR Rsp p/f=1, N(R)= 3 Router: *LAPF Serial0 RX <- RR Cmd p/f=1, N(R)= 3 Router: *LAPF Serial0 lapf_rr_7 Router: *LAPF Serial0 TX -> RR Rsp p/f=1, N(R)= 3 Router: *LAPF Serial0 RX <- RR Cmd p/f=1, N(R)= 3 Router: *LAPF Serial0 lapf_rr_7
debug frame-relay lmi
To display information on the local management interface (LMI) packets exchanged by the router and the Frame Relay service provider, use the debug frame-relay lmicommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay lmi [ interface name ]
no debug frame-relay lmi [ interface name ]
Syntax Description
interface name |
(Optional) The name of interface. |
Command Modes
Privileged EXEC
Usage Guidelines
You can use this command to determine whether the router and the Frame Relay switch are sending and receiving LMI packets properly.
Note | Because the debug frame-relay lmi command does not generate much output, you can use it at any time, even during periods of heavy traffic, without adversely affecting other users on the system. |
Examples
The following is sample output from the debug frame-relay lmi command:
The first four lines describe an LMI exchange. The first line describes the LMI request the router has sent to the switch. The second line describes the LMI reply the router has received from the switch. The third and fourth lines describe the response to this request from the switch. This LMI exchange is followed by two similar LMI exchanges. The last six lines consist of a full LMI status message that includes a description of the two permanent virtual circuits (PVCs) of the router.
The below table describes the significant fields shown in the first line of the display.
Field |
Description |
---|---|
Serial1(out) |
Indicates that the LMI request was sent out on serial interface 1. |
StEnq |
Command mode of message, as follows: |
clock 20212760 |
System clock (in milliseconds). Useful for determining whether an appropriate amount of time has transpired between events. |
myseq 206 |
Myseq counter maps to the CURRENT SEQ counter of the router. |
yourseen 136 |
Yourseen counter maps to the LAST RCVD SEQ counter of the switch. |
DTE up |
Line protocol up/down state for the DTE (user) port. |
The below table describes the significant fields shown in the third and fourth lines of the display.
Field |
Description |
---|---|
RT IE 1 |
Value of the report type information element. |
length 1 |
Length of the report type information element (in bytes). |
type 1 |
Report type in RT IE. |
KA IE 3 |
Value of the keepalive information element. |
length 2 |
Length of the keepalive information element (in bytes). |
yourseq 138 |
Yourseq counter maps to the CURRENT SEQ counter of the switch. |
myseq 206 |
Myseq counter maps to the CURRENT SEQ counter of the router. |
The below table describes the significant fields shown in the last line of the display.
Field |
Description |
---|---|
PVC IE 0x7 |
Value of the PVC information element type. |
length 0x6 |
Length of the PVC IE (in bytes). |
dlci 401 |
DLCI decimal value for this PVC. |
status 0 |
Status value. Possible values include the following: |
bw 56000 |
Committed information rate (in decimal) for the DLCI. |
debug frame-relay multilink
To display debug messages for multilink Frame Relay bundles and bundle links, use the debug frame-relay multilinkcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay multilink [ control [ mfr number | serial number ] ]
no debug frame-relay multilink
Syntax Description
control |
(Optional) Displays incoming and outgoing bundle link control messages and bundle link status changes. |
mfr number |
(Optional) Displays information for a specific bundle interface. |
serial number |
(Optional) Displays information for a specific bundle link interface. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.0(17)S |
This command was introduced. |
12.0(24)S |
This command was introduced on VIP-enabled Cisco 7500 series routers. |
12.2(8)T |
This command was integrated into Cisco IOS Release 12.2(8)T. |
12.2(14)S |
This command was integrated into Cisco IOS Release 12.2(14)S. |
12.2(17b)SXA |
This command was integrated into Cisco IOS Release 12.2(17b)SXA. |
12.2(28)SB |
This command was integrated into Cisco IOS Release 12.2(28)SB. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
Caution | Using the debug frame-relay multilink command without the control keyword could severely impact router performance and is not recommended. |
Using the debug frame-relay multilink command without the mfr or serial keywords displays error conditions that occur at the bundle layer.
Examples
The following example shows output from the debug frame-relay multilink command for bundle “MFR0,” which has three bundle links:
Router# debug frame-relay multilink control MFR0 00:42:54:Serial5/3(o):msg=Add_link, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Idle E1 00 01 01 07 4D 46 52 30 00 00:42:54:Serial5/2(o):msg=Add_link, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Idle E1 00 01 01 07 4D 46 52 30 00 00:42:54:Serial5/1(o):msg=Add_link, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Idle E1 00 01 01 07 4D 46 52 30 00 00:42:54:%LINK-3-UPDOWN:Interface MFR0, changed state to down 00:42:54:Serial5/3(i):msg=Add_link_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Add_sent E1 00 02 01 07 4D 46 52 30 00 00:42:54:Serial5/2(i):msg=Add_link_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Add_sent E1 00 02 01 07 4D 46 52 30 00 00:42:54:Serial5/1(i):msg=Add_link_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Add_sent E1 00 02 01 07 4D 46 52 30 00 00:42:54:%SYS-5-CONFIG_I:Configured from console by console 00:43:00:Serial5/1(i):msg=Add_link, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Ack_rx E1 00 01 01 07 4D 46 52 30 00 00:43:00:Serial5/1(o):msg=Add_link_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Ack_rx E1 00 02 01 07 4D 46 52 30 00 00:43:00:%LINK-3-UPDOWN:Interface MFR0, changed state to up 00:43:00:Serial5/1(i):msg=Hello, Link=Serial5/1, Bundle=MFR0, Linkid=Serial5/1, BL state=Up E1 00 04 03 06 30 A7 E0 54 00 00:43:00:Serial5/1(o):msg=Hello_ack, Link=Serial5/1, Bundle=MFR0, Link id=Serial5/1, BL state=Up E1 00 05 03 06 90 E7 0F C2 06 00:43:01:Serial5/2(i):msg=Add_link, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Ack_rx E1 00 01 01 07 4D 46 52 30 00 00:43:01:Serial5/2(o):msg=Add_link_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Ack_rx E1 00 02 01 07 4D 46 52 30 00 00:43:01:Serial5/2(i):msg=Hello, Link=Serial5/2, Bundle=MFR0, Linkid=Serial5/2, BL state=Up E1 00 04 03 06 30 A7 E0 54 00 00:43:01:Serial5/2(o):msg=Hello_ack, Link=Serial5/2, Bundle=MFR0, Link id=Serial5/2, BL state=Up E1 00 05 03 06 90 E7 0F C2 06 00:43:01:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/1, changed state to up 00:43:01:Serial5/3(i):msg=Add_link, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Ack_rx E1 00 01 01 07 4D 46 52 30 00 00:43:01:Serial5/3(o):msg=Add_link_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Ack_rx E1 00 02 01 07 4D 46 52 30 00 00:43:01:Serial5/3(i):msg=Hello, Link=Serial5/3, Bundle=MFR0, Linkid=Serial5/3, BL state=Up E1 00 04 03 06 30 A7 E0 54 00 00:43:01:Serial5/3(o):msg=Hello_ack, Link=Serial5/3, Bundle=MFR0, Link id=Serial5/3, BL state=Up E1 00 05 03 06 90 E7 0F C2 06 00:43:02:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/2 , changed state to up 00:43:02:%LINEPROTO-5-UPDOWN:Line protocol on Interface Serial5/3 , changed state to up
The table below describes the significant fields shown in the display.
Field |
Description |
---|---|
msg |
Type of bundle link control message that was sent or received. |
Link |
Interface number of the bundle link. |
Bundle |
Bundle with which the link is associated. |
Link id |
Bundle link identification name. |
BL state |
Operational state of the bundle link. |
Related Commands
Command |
Description |
---|---|
show frame-relay multilink |
Displays configuration information and statistics about multilink Frame Relay bundles and bundle links. |
debug frame-relay networklayerinterface
To display Network Layer Interface (NLI) information, use the debug frame-relay networklayerinterfacecommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay networklayerinterface
no debug frame-relay networklayerinterface
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
The Frame Relay switched virtual circuit (SVC) signaling subsystem is decoupled from the rest of the router code by means of the NLI intermediate software layer.
The debug frame-relay networklayerinterfacecommand shows activity within the network-layer interface when a call is set up or torn down. All output that contains an NL relates to the interaction between the Q.933 signaling subsystem and the NLI.
Note | The debug frame-relay networklayerinterface command has no significance to anyone not familiar with the inner workings of the Cisco IOS software. This command is typically used by service personnel to debug problem situations. |
Examples
The following is sample output from the debug frame-relay networklayerinterface command. This example displays the output generated when a call is set up. The second example shows the output generated when a call is torn down.
Router# debug frame-relay networklayerinterface Router: NLI STATE: L3_CALL_REQ, Call ID 1 state 0 Router: NLI: Walking the event table 1 Router: NLI: Walking the event table 2 Router: NLI: Walking the event table 3 Router: NLI: Walking the event table 4 Router: NLI: Walking the event table 5 Router: NLI: Walking the event table 6 Router: NLI: Walking the event table 7 Router: NLI: Walking the event table 8 Router: NLI: Walking the event table 9 Router: NLI: NL0_L3CallReq Router: NLI: State: STATE_NL_NULL, Event: L3_CALL_REQ, Next: STATE_L3_CALL_REQ Router: NLI: Enqueued outgoing packet on holdq Router: NLI: Map-list search: Found maplist bermuda Router: daddr.subaddr 0, saddr.subaddr 0, saddr.subaddr 0 Router: saddr.subaddr 0, daddr.subaddr 0, daddr.subaddr 0 Router: nli_parameter_negotiation Router: NLI STATE: NL_CALL_CNF, Call ID 1 state 10 Router: NLI: Walking the event table 1 Router: NLI: Walking the event table 2 Router: NLI: Walking the event table 3 Router: NLI: NLx_CallCnf Router: NLI: State: STATE_L3_CALL_REQ, Event: NL_CALL_CNF, Next: STATE_NL_CALL_CNF Router: Checking maplist “junk” Router: working with maplist “bermuda” Router: Checking maplist “bermuda” Router: working with maplist “bermuda” Router: NLI: Emptying holdQ, link 7, dlci 100, size 104 Router# debug frame-relay networklayerinterface Router: NLI: L3 Call Release Req for Call ID 1 Router: NLI STATE: L3_CALL_REL_REQ, Call ID 1 state 3 Router: NLI: Walking the event table 1 Router: NLI: Walking the event table 2 Router: NLI: Walking the event table 3 Router: NLI: Walking the event table 4 Router: NLI: Walking the event table 5 Router: NLI: Walking the event table 6 Router: NLI: Walking the event table 7 Router: NLI: Walking the event table 8 Router: NLI: Walking the event table 9 Router: NLI: Walking the event table 10 Router: NLI: NLx_L3CallRej Router: NLI: State: STATE_NL_CALL_CNF, Event: L3_CALL_REL_REQ, Next: STATE_L3_CALL_REL_REQ Router: NLI: junk: State: STATE_NL_NULL, Event: L3_CALL_REL_REQ, Next: STATE_NL_NULL Router: NLI: Map-list search: Found maplist junk Router: daddr.subaddr 0, saddr.subaddr 0, saddr.subaddr 0 Router: saddr.subaddr 0, daddr.subaddr 0, daddr.subaddr 0 Router: nli_parameter_negotiation Router: NLI STATE: NL_REL_CNF, Call ID 1 state 0 Router: NLI: Walking the event table 1 Router: NLI: Walking the event table 2 Router: NLI: Walking the event table 3 Router: NLI: Walking the event table 4 Router: NLI: Walking the event table 5 Router: NLI: Walking the event table 6 Router: NLI: Walking the event table 7 Router: NLI: NLx_RelCnf Router: NLI: State: STATE_NL_NULL, Event: NL_REL_CNF, Next: STATE_NL_NULL
The below table describes the significant states and events shown in the display.
State and Event |
Description |
---|---|
L3_CALL_REQ |
Internal call setup request. Network layer indicates that an SVC is required. |
STATE_NL_NULL |
Call in initial state--no call exists. |
STATE_L3_CALL_REQ |
Setup message sent out and waiting for a reply. This is the state the network-layer state machine changes to when a call request is received from Layer 3 but no confirmation has been received from the network. |
NL_CALL_CNF |
Message sent from the Q.933 signalling subsystem to the NLI asking that internal resources be allocated for the call. |
STATE_L3_CALL_CNF |
Q.933 state indicating that the call is active. After the network confirms a call request using a connect message, the Q.933 state machine changes to this state. |
STATE_NL_CALL_CNF |
Internal software state indicating that software resources are assigned and the call is up. After Q.933 changes to the STATE_L3_CALL_CNF state, it sends an NL_CALL_CNF message to the network-layer state machine, which then changes to the STATE_NL_CALL_CNF state. |
L3_CALL_REL_REQ |
Internal request to release the call. |
STATE_L3_CALL_REL_REQ |
Internal software state indicating the call is in the process of being released. At this point, the Q.933 subsystem is told that the call is being released and a disconnect message goes out for the Q.933 subsystem. |
NL_REL_CNF |
Indication from the Q.933 signalling subsystem that the signalling subsystem is releasing the call. After receiving a release complete message from the network indicating that the release process is complete, the Q.933 subsystem sends an NL_REL_CNF event to the network-layer subsystem. |
Related Commands
Command |
Description |
---|---|
debug frame-relay callcontrol |
Displays Frame Relay Layer 3 (network layer) call control information. |
debug frame-relay packet
To display information on packets that have been sent on a Frame Relay interface, use the debug frame-relay packet command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay packet [ interface name [ dlci value ] ]
no debug frame-relay packet [ interface name [ dlci value ] ]
Syntax Description
interface name |
(Optional) Name of interface or subinterface. |
dlci value |
(Optional) Data-link connection indentifier (DLCI) decimal value. |
Command Modes
Privileged EXEC
Usage Guidelines
This command helps you analyze the packets that are sent on a Frame Relay interface. Because the debug frame-relay packet command generates a substantial amount of output, only use it when traffic on the Frame Relay network is fewer than 25 packets per second. Use the options to limit the debugging output to a specific DLCI or interface.
To analyze the packets received on a Frame Relay interface, use the debug frame-relay command.
Examples
The following is sample output from the debug frame-relay packetcommand:
The debug frame-relay packetoutput consists of groups of output lines; each group describes a Frame Relay packet that has been sent. The number of lines in the group can vary, depending on the number of DLCIs on which the packet was sent. For example, the first two pairs of output lines describe two different packets, both of which were sent out on a single DLCI. The last three lines describe a single Frame Relay packet that was sent out on two DLCIs.
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
Serial0: |
Interface that has sent the Frame Relay packet. |
broadcast = 1 |
Destination of the packet. Possible values include the following: |
link 809B |
Link type, as documented in the debug frame-relaycommand. |
addr 65535.255 |
Destination protocol address for this packet. In this case, it is an AppleTalk address. |
Serial0(o): |
(o) indicates that this is an output event. |
DLCI 500 |
Decimal value of the DLCI. |
type 809B |
Packet type, as documented under the debug frame-relay command. |
size 24 |
Size of this packet (in bytes). |
The following lines describe a Frame Relay packet sent to a particular address; in this case AppleTalk address 10.2:
Serial0: broadcast - 0, link 809B, addr 10.2 Serial0(o):DLCI 100 type 809B size 104
The following lines describe a Frame Relay packet that went out on two different DLCIs, because two Frame Relay map entries were found:
Serial0: broadcast search Serial0(o):DLCI 300 type 809B size 24 Serial0(o):DLCI 400 type 809B size 24
The following lines do not appear. They describe a Frame Relay packet sent to a true broadcast address.
Serial1: broadcast search Serial1(o):DLCI 400 type 800 size 288
debug frame-relay ppp
To display debugging information, use the debug frame-relay pppcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay ppp
no debug frame-relay ppp
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
This command displays error messages for link states and Local Management Interface (LMI) status changes for PPP over Frame Relay sessions.
To debug process-switched packets, use the debug frame-relay packet or debug ppp packet commands. To analyze the packets that have been sent on a Frame Relay interface, use the debug frame-relay packe t command.
The debug frame-relay pppcommand is generated from process-level switching only and is not CPU intensive.
Examples
The following shows output from the debug frame-relay ppp command where the encapsulation failed for VC 100.
Router# debug frame-relay ppp FR-PPP: encaps failed for FR VC 100 on Serial0 down FR-PPP: input- Serial0 vc or va down, pak dropped
The following shows the output from the debug frame relay pppand debug frame-relay packet commands.This example shows a virtual interface (virtual interface 1) establishing a PPP connection over PPP.
Router# debug frame-relay ppp Router# debug frame-relay packet Vi1 LCP: O CONFREQ [Closed] id 1 len 10 Vi1 LCP: MagicNumber 0xE0638565 (0x0506E0638565) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 PPP: I pkt type 0xC021, datagramsize 14 Vi1 LCP: I CONFACK [REQsent] id 1 len 10 Vi1 LCP: MagicNumber 0xE0638565 (0x0506E0638565) Vi1 PPP: I pkt type 0xC021, datagramsize 14 Vi1 LCP: I CONFREQ [ACKrcvd] id 6 len 10 Vi1 LCP: MagicNumber 0x000EAD99 (0x0506000EAD99) Vi1 LCP: O CONFACK [ACKrcvd] id 6 len 10 Vi1 LCP: MagicNumber 0x000EAD99 (0x0506000EAD99) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 IPCP: O CONFREQ [Closed] id 1 len 10 Vi1 IPCP: Address 170.100.9.10 (0x0306AA64090A) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 PPP: I pkt type 0x8021, datagramsize 14 Vi1 IPCP: I CONFREQ [REQsent] id 1 len 10 Vi1 IPCP: Address 170.100.9.20 (0x0306AA640914) Vi1 IPCP: O CONFACK [REQsent] id 1 len 10 Vi1 IPCP: Address 170.100.9.20 (0x0306AA640914) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 PPP: I pkt type 0x8021, datagramsize 14 Vi1 IPCP: I CONFACK [ACKsent] id 1 len 10 Vi1 IPCP: Address 170.100.9.10 (0x0306AA64090A) Vi1 PPP: I pkt type 0xC021, datagramsize 16 Vi1 LCP: I ECHOREQ [Open] id 1 len 12 magic 0x000EAD99 Vi1 LCP: O ECHOREP [Open] id 1 len 12 magic 0xE0638565 Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 18 Vi1 LCP: O ECHOREQ [Open] id 1 len 12 magic 0xE0638565 Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 18 Vi1 LCP: echo_cnt 4, sent id 1, line up
The following shows the output for the debug frame-relay ppp and debug frame-relay packet commands that report a failed PPP over Frame Relay session. The problem is due to a challenge handshake authentication protocol (CHAP) failure.
Router# debug frame-relay ppp Router# debug frame-relay packet Vi1 LCP: O CONFREQ [Listen] id 24 len 10 Vi1 LCP: MagicNumber 0xE068EC78 (0x0506E068EC78) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 16 Vi1 PPP: I pkt type 0xC021, datagramsize 19 Vi1 LCP: I CONFREQ [REQsent] id 18 len 15 Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x0014387E (0x05060014387E) Vi1 LCP: O CONFACK [REQsent] id 18 len 15 Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x0014387E (0x05060014387E) Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 21 Vi1 PPP: I pkt type 0xC021, datagramsize 14 Vi1 LCP: I CONFACK [ACKsent] id 24 len 10 Vi1 LCP: MagicNumber 0xE068EC78 (0x0506E068EC78) Vi1 PPP: I pkt type 0xC223, datagramsize 32 Vi1 CHAP: I CHALLENGE id 12 len 28 from "krishna" Vi1 LCP: O TERMREQ [Open] id 25 len 4 Serial2/1(o): dlci 201(0x3091), NLPID 0x3CF(PPP), datagramsize 10 Vi1 PPP: I pkt type 0xC021, datagramsize 8 Vi1 LCP: I TERMACK [TERMsent] id 25 len 4 Serial2/1(i): dlci 201(0x3091), pkt type 0x2000, datagramsize 303 %SYS-5-CONFIG_I: Configured from console by console Vi1 LCP: TIMEout: Time 0x199580 State Listen
debug frame-relay pseudowire
To display events and error conditions that occur when binding a Frame Relay data-link connection identifier (DLCI) to a pseudowire, use the debug frame-relay pseudowirecommand in privileged EXEC mode. To disable the display of these events and error conditions, use the no form of this command.
debug frame-relay pseudowire
no debug frame-relay pseudowire
Syntax Description
This command contains no arguments or keywords.
Command Default
DLCI events and errors are not displayed.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.0(26)S |
This command was introduced. |
12.2(25)S |
This command was integrated into Cisco IOS Release 12.2(25)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.4(11)T |
This command was integrated into Cisco IOS Release 12.4(11)T. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Usage Guidelines
The following are examples of Frame Relay pseudowire events:
Command-line interface (CLI) provisioning events
Pseudowire circuit status updates
Failures occurring during the management of these events
Examples
The following example enables the display of Frame Relay pseudowire events. In this example, the interface has been shut down and then enabled.
Router# debug frame-relay pseudowire Router(config)# interface hssi1/0/0 Router(config-if)# shutdown 09:18:33.303: FRoPW [10.15.15.15, 100]: acmgr_circuit_down 09:18:33.303: FRoPW [10.15.15.15, 100]: SW AC update circuit state to down 09:18:33.303: FRoPW [10.15.15.15, 100]: Setting connection DOWN 09:18:35.299: %LINK-5-CHANGED: Interface Hssi1/0/0, changed state to administratively down 09:18:36.299: %LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi1/0/0, changed state to down Router(config-if)# no shutdown 09:18:41.919: %LINK-3-UPDOWN: Interface Hssi1/0/0, changed state to up 09:18:41.919: FRoPW [10.15.15.15, 100]: Local up, sending acmgr_circuit_up 09:18:41.919: FRoPW [10.15.15.15, 100]: Setting pw segment UP 09:18:41.919: FRoPW [10.15.15.15, 100]: PW nni_pvc_status set ACTIVE 09:18:41.919: label_oce_get_label_bundle: flags 14 label 28 09:18:42.919: %LINEPROTO-5-UPDOWN: Line protocol on Interface Hssi1/0/0, changed state to up
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
Time (09.18.41) |
When the event occurred (in hours, minutes, and seconds). |
[10.15.15.15, 100] |
10.15.15.15 is the IP address of the peer provider edge (PE) router. 100 is the DLCI number of the Frame Relay permanent virtual circuit (PVC) used for this pseudowire. |
debug frame-relay redundancy
To debug Frame Relay and Multilink Frame Relay redundancy on the networking device, use the debug frame-relay redundancy command in privileged EXEC mode. To disable the display of debugging output, use the no form of this command.
debug frame-relay redundancy
no debug frame-relay redundancy
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.0(22)S |
This command was introduced on the Cisco 7500 series and Cisco 10000 series Internet routers. |
12.2(18)S |
This command was integrated into Cisco IOS Release 12.2(18)S on Cisco 7500 series routers. |
12.2(20)S |
Support was added for the Cisco 7304 router. The Cisco 7500 series router is not supported in Cisco IOS Release 12.2(20)S. |
12.0(28)S |
SSO support was added to the Multilink Frame Relay feature on the Cisco 12000 series Internet router. |
12.2(25)S |
SSO support was added to the Multilink Frame Relay feature on the Cisco 12000 series Internet router. |
12.2(28)SB |
This command was integrated into Cisco IOS Release 12.2(28)SB. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2(33)SXH |
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Usage Guidelines
Use this command to debug Frame Relay synchronization problems. The debug frame-relay redundancy command logs synchronization events and errors.
Examples
The following example displays debug messages regarding Frame Relay redundancy on the networking device:
Router# debug frame-relay redundancy
Related Commands
Command |
Description |
---|---|
frame-relay redundancy auto-sync lmi-sequence-numbers |
Configures LMI synchronization parameters. |
debug frame-relay switching
To display debugging messages for switched Frame Relay permanent virtual circuits (PVCs), use the debug frame-relay switchingcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug frame-relay switching interface interface dlci [ interval interval ]
no debug frame-relay switching
Syntax Description
interface interface |
The name of the Frame Relay interface. |
dlci |
The DLCI number of the switched PVC to be debugged. |
interval interval |
(Optional) Interval in seconds at which debugging messages will be updated. |
Command Default
The default interval is 1 second.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.0(12)S |
This command was introduced. |
12.1(5)T |
This command was integrated into Cisco IOS Release 12.1(5)T. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug frame-relay switching command can be used only on switched Frame Relay PVCs, not terminated PVCs.
Debug statistics are displayed only if they have changed.
Note | Although statistics are displayed at configured intervals, there may be a delay between the occurrence of a debug event (such as a packet drop) and the display of that event. The delay may be as much as the configured interval plus 10 seconds. |
Examples
The following is sample output from the debug frame-relay switching command:
Router# debug frame-relay switching interface s2/1 1000 interval 2 Frame Relay switching debugging is on Display frame switching debug on interface Serial2/1 dlci 1000 1d02h: Serial2/1 dlci 1000: 32 packets switched to Serial2/0 dlci 1002 1d02h: Serial2/1 dlci 1000: 1800 packets output 1d02h: Serial2/1 dlci 1000: 4 packets dropped - outgoing PVC inactive 1d02h: Serial2/1 dlci 1000: Incoming PVC status changed to ACTIVE 1d02h: Serial2/1 dlci 1000: Outgoing PVC status changed to ACTIVE 1d02h: Serial2/1 dlci 1000: Incoming interface hardware module state changed to UP 1d02h: Serial2/1 dlci 1000: Outgoing interface hardware module state changed to UP
debug frame-relay vc-bundle
To display information about the Frame Relay permanent virtual circuit (PVC) bundles that are configured on a router, use the debug frame-relay vc-bundle command in privileged EXEC mode. To stop the display, use the no form of this command.
debug frame-relay vc-bundle { detail | state-change } [vc-bundle-name]
no debug frame-relay vc-bundle { detail | state-change } [vc-bundle-name]
Syntax Description
detail |
Displays detailed information about the members of the bundle specified by vc-bundle-name. Displays detailed information about the members of all PVC bundles if vc-bundle-name is not specified. |
state-change |
Displays information pertaining only to the state changes of the PVC bundle and PVC bundle members specified by vc-bundle-name. Displays state-change information for all PVC bundles and bundle members if vc-bundle-name is not specified. |
vc-bundle-name |
(Optional) Specifies a particular PVC bundle. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(13)T |
This command was introduced. |
12.2(28)SB |
This command was integrated into Cisco IOS Release 12.2(28)SB. |
Usage Guidelines
Use this command to monitor state changes and Inverse ARP activity for one or all of the PVC bundles and bundle members configured on a router.
Note | Debugging messages that are prefixed with “FR_VCB” (instead of “FR-VCB”) indicate serious failures in the Frame Relay PVC bundle performance. Contact the Cisco Technical Assistance Center (TAC) if you see debugging messages with this prefix. |
Examples
The following is sample output from the debug frame-relay vc-bundlecommandthat shows Inverse ARP information for the PVC bundle. PVC bundle member 406 is the only PVC in the bundle to handle Inverse ARP packets. The Inverse ARP packets coming in on other bundle member PVCs are dropped.
Router# debug frame-relay vc-bundle 00:23:48:FR-VCB:MP-4-dynamic:inarp received on elected member 406 00:23:48:FR-VCB:MP-4-dynamic:installing dynamic map 00:23:48:FR-VCB:MP-4-dynamic:dropping inarp received on member 407 00:23:52:FR-VCB:MP-4-dynamic:sending inarp pkt on member 406
In the following example the PVC bundle goes down because the protected group goes down. All information about active transmission on each PVC is removed.
00:58:27:FR-VCB:MP-4-dynamic:member 402 state changed to DOWN 00:58:27:FR-VCB:MP-4-dynamic:protected group is DOWN 00:58:27:FR-VCB:MP-4-dynamic:state changed to DOWN 00:58:27:FR-VCB:MP-4-dynamic:active table reset
The following is sample output from the debug frame-relay vc-bundle detail command. State change and Inverse ARP activity is displayed for all PVC bundles and bundle members on the router.
Router# debug frame-relay adjacency vc-bundle detail 00:33:40: FR-VCB: MP-4-dynamic: member 404 state changed to UP 00:33:40: FR-VCB: MP-4-dynamic: active table update 00:33:40: FR-VCB: MP-3-static: sending inarp pkt on member 300 00:33:41: FR-VCB: MP-3-static: inarp received on elected member 300 00:33:48: FR-VCB: MP-3-static: inarp received on elected member 300 00:33:48: FR-VCB: MAIN-1-static: dropping inarp received on member 100 00:33:48: FR-VCB: MP-4-dynamic: dropping inarp received on member 404 00:33:48: FR-VCB: MP-4-dynamic: dropping inarp received on member 405 00:33:48: FR-VCB: P2P-5: dropping inarp received on member 507 00:33:48: FR-VCB: MP-3-static: dropping inarp received on member 303 00:33:48: FR-VCB: MAIN-2-dynamic: dropping inarp received on member 202 00:33:48: FR-VCB: MAIN-1-static: dropping inarp received on member 107 00:33:48: FR-VCB: MP-3-static: dropping inarp received on member 305 00:33:48: FR-VCB: MAIN-1-static: dropping inarp received on member 105 00:33:49: FR-VCB: P2P-5: dropping inarp received on member 505 00:33:49: FR-VCB: P2P-5: dropping inarp received on member 504 00:33:49: FR-VCB: P2P-5: dropping inarp received on member 503 00:33:49: FR-VCB: P2P-5: dropping inarp received on member 502 00:33:49: FR-VCB: P2P-5: dropping inarp received on member 501
Related Commands
Command |
Description |
---|---|
debug frame-relay adjacency |
Displays information pertaining to an adjacent node that has one or more Frame Relay PVC bundles. |
debug frame-relay virtual
To display debugging messages for the virtual Frame Relay interface, use the debug frame-relay virtualcommand in privileged EXEC mode.
debug frame-relay virtual destination interface
Syntax Description
destination interface |
Enables the debugging messages for that specific interface. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)T |
This command was introduced. |
Usage Guidelines
Use the debug frame-relay virtual command to display debugging messages for the virtual Frame Relay interface. The debug frame-relay virtual command produces output only when problems occur.
Examples
The following example shows the output if one of the routers has not been configured. This output occurs when the other end is trying to send the receiving box Frame Relay packets.
VFR: Radio1/0 has no VFR for 00:00:C068:6F:AA
Related Commands
Command |
Description |
---|---|
frame-relay over radio |
Links the virtual Frame Relay interface to the specified radio interface and destination MAC address. |
interface virtual-framerelay |
Defines the virtual interface and then associates the interface with a specific wireless connection. |
show virtual-framerelay |
Shows the output of the interface virtual-frame relay command. |
debug fras error
To display information about Frame Relay access support (FRAS) protocol errors, use the debug fras errorcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fras error
no debug fras error
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
For complete information on the FRAS process, use the debug fras message along with the debug fras error command.
Examples
The following is sample output from the debug fras errorcommand. This example shows that no logical connection exists between the local station and remote station in the current setup.
Router# debug fras error FRAS: No route, lmac 1000.5acc.7fb1 rmac 4fff.0000.0000, lSap=0x4, rSap=0x4 FRAS: Can not find the Setup
Related Commands
Command |
Description |
---|---|
debug cls message |
Displays information about CLS messages. |
debug fras message |
Displays general information about FRAS messages. |
debug fras state |
Displays information about FRAS data-link control state changes. |
debug fras-host activation
To display the Logical Link Control, Type 2 (LLC2) session activation and deactivation frames (such as XID, SABME, DISC, UA) that are being handled by the Frame Relay access support (FRAS) host, use the debug fras-host activation command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fras-host activation
no debug fras-host activation
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
If many LLC2 sessions are being activated or deactivated at any time, this command may generate a substantial amount of output to the console.
Examples
The following is sample output from the debug fras-host activation command:
Router# debug fras-host activation FRHOST: Snd TST C to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x00 SSAP = 0x04 FRHOST: Fwd BNN XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd HOST XID to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP = 0x05 FRHOST: Fwd BNN XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd HOST SABME to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd BNN UA to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x05
The first line indicates that the FRAS Host sent a TEST Command to the host. In the second line, the FRAS Host forwards an XID frame from a BNN device to the host. In the third line, the FRAS Host forwards an XID from the host to the BNN device.
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
DA |
Destination MAC address of the frame. |
SA |
Source MAC address of the frame. |
DSAP |
Destination SAP of the frame. |
SSAP |
Source SAP of the frame. |
debug fras-host error
To enable the Frame Relay access support (FRAS) Host to send error messages to the console, use the debug fras-host errorcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fras-host error
no debug fras-host error
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug fras-host errorcommand when the I-field in a TEST Response frame from a host does not match the I-field of the TEST Command sent by the FRAS Host:
Router# debug fras-host error FRHOST: SRB TST R Protocol Violation - LLC I-field not maintained.
debug fras-host packet
To see which Logical Link Control, type 2 (LLC2) session frames are being handled by the Frame Relay access support (FRAS) Host, use the debug fras-host packetcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fras-host packet
no debug fras-host packet
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
Caution | Use this command with great care. If many LLC2 sessions are active and passing data, this command may generate a substantial amount of output to the console and impact device performance. |
Examples
The following is sample output from the debug fras-host packet command:
Router# debug fras-host packet FRHOST: Snd TST C to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x00 SSAP = 0x04 FRHOST: Fwd BNN XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd HOST XID to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP = 0x05 FRHOST: Fwd BNN XID to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd HOST SABME to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd BNN UA to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x05 FRHOST: Fwd HOST LLC-2 to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd BNN LLC-2 to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x05 FRHOST: Fwd HOST LLC-2 to BNN, DA = 400f.dddd.001e SA = 4001.3745.1088 DSAP = 0x04 SSAP = 0x04 FRHOST: Fwd BNN LLC-2 to HOST, DA = 4001.3745.1088 SA = 400f.dddd.001e DSAP = 0x04 SSAP = 0x04
The debug fras-host packet output contains all of the output from the debug fras-host activation command and additional information. The first six lines of this sample display are the same as the output from the debug fras-host activationcommand. The last lines show LLC-2 frames being sent between the Frame Relay Boundary Network Node (BNN) device and the host.
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
DA |
Destination MAC address of the frame. |
SA |
Source MAC address of the frame. |
DSAP |
Destination service access point (SAP) of the frame. |
SSAP |
Source SAP of the frame. |
debug fras-host snmp
To display messages to the console describing Simple Network Management Protocol (SNMP) requests to the Frame Relay access support (FRAS) Host MIB, use the debug fras-host snmpcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fras-host snmp
no debug fras-host snmp
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
Use of this command may result in a substantial amount of output to the screen. Only use this command for problem determination.
Examples
The following is sample output from the debug fras-host snmp command. In this example, the MIB variable k_frasHostConnEntry_get() is providing SNMP information for the FRAS host.
Router# debug fras-host snmp k_frasHostConnEntry_get(): serNum = -1, vRingIfIdx = 31, frIfIdx = 12 Hmac = 4001.3745.1088, frLocSap = 4, Rmac = 400f.dddd.001e, frRemSap = 4
The below table describes the significant fields shown in the display.
Field |
Description |
---|---|
serNum |
Serial number of the SNMP request. |
vRingIfIdx |
Interface index of a virtual Token Ring. |
frIfIdx |
Interface index of a Frame Relay serial interface. |
Hmac |
MAC address associated with the host for this connection. |
frLocSap |
SAP associated with the host for this connection. |
Rmac |
MAC address associated with the FRAD for this connection. |
frRemSap |
LLC 2 SAP associated with the FRAD for this connection. |
debug fras message
To display general information about Frame Relay access support (FRAS) messages, use the debug fras messagecommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fras message
no debug fras message
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Usage Guidelines
For complete information on the FRAS process, use the debug fras error command along with the debug fras message command.
Examples
The following is sample output from the debug fras messagecommand. This example shows incoming Cisco Link Services (CLS) primitives.
Router# debug fras message FRAS: receive 4C23 FRAS: receive CC09
Related Commands
Command |
Description |
---|---|
debug cls message |
Limits output for some debugging commands based on the interfaces. |
debug fras error |
Displays information about FRAS protocol errors. |
debug fras state |
Displays information about FRAS data-link control state changes. |
debug fras state
To display information about Frame Relay access support (FRAS) data-link control link-state changes, use the debug fras statecommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug fras state
no debug fras state
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug fras statecommand. This example shows the state changing from a request open station is sent state to an exchange XID state.
Possible states are the following: reset, request open station is sent, exchange xid, connection request is sent, signal station wait, connection response wait, connection response sent, connection established, disconnect wait, and number of link states.
Router# debug fras state FRAS: TR0 (04/04) oldstate=LS_RQOPNSTNSENT, input=RQ_OPNSTN_CNF FRAS: newstate=LS_EXCHGXID
Related Commands
Command |
Description |
---|---|
debug cls message |
Limits output for some debug commands based on the interfaces. |
debug fras error |
Displays information about FRAS protocol errors. |
debug fras message |
Displays general information about FRAS messages. |
debug ftpserver
To display information about the FTP server process, use the debug ftpservercommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ftpserver
no debug ftpserver
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug ftpservercommand:
Router# debug ftpserver Mar 3 10:21:10: %FTPSERVER-6-NEWCONN: FTP Server - new connection made. -Process= "TCP/FTP Server", ipl= 0, pid= 53 Mar 3 10:21:10: FTPSRV_DEBUG:FTP Server file path: 'disk0:' Mar 3 10:21:10: FTPSRV_DEBUG:(REPLY) 220 Mar 3 10:21:10: FTPSRV_DEBUG:FTProuter IOS-FTP server (version 1.00) ready. Mar 3 10:21:10: FTPSRV_DEBUG:FTP Server Command received: 'USER aa' Mar 3 10:21:20: FTPSRV_DEBUG:(REPLY) 331 Mar 3 10:21:20: FTPSRV_DEBUG:Password required for 'aa'. Mar 3 10:21:20: FTPSRV_DEBUG:FTP Server Command received: 'PASS aa' Mar 3 10:21:21: FTPSRV_DEBUG:(REPLY) 230 Mar 3 10:21:21: FTPSRV_DEBUG:Logged in. Mar 3 10:21:21: FTPSRV_DEBUG:FTP Server Command received: 'SYST' Mar 3 10:21:21: FTPSRV_DEBUG:(REPLY) 215 Mar 3 10:21:21: FTPSRV_DEBUG:Cisco IOS Type: L8 Version: IOS/FTP 1.00 Mar 3 10:21:21: FTPSRV_DEBUG:FTP Server Command received: 'PWD' Mar 3 10:21:35: FTPSRV_DEBUG:(REPLY) 257 Mar 3 10:21:39: FTPSRV_DEBUG:FTP Server Command received: 'CWD disk0:/syslogd.d'r/' Mar 3 10:21:45: FTPSRV_DEBUG:FTP Server file path: 'disk0:/syslogd.dir' Mar 3 10:21:45: FTPSRV_DEBUG:(REPLY) 250 Mar 3 10:21:45: FTPSRV_DEBUG:CWD command successful. Mar 3 10:21:45: FTPSRV_DEBUG:FTP Server Command received: 'PORT 171,69,30,20,22',32 Mar 3 10:21:46: FTPSRV_DEBUG:(REPLY) 200 Mar 3 10:21:46: FTPSRV_DEBUG:PORT command successful. Mar 3 10:21:46: FTPSRV_DEBUG:FTP Server Command received: 'LIST' Mar 3 10:21:47: FTPSRV_DEBUG:FTP Server file path: 'disk0:/syslogd.dir/.' Mar 3 10:21:47: FTPSRV_DEBUG:(REPLY) 220 Mar 3 10:23:11: FTPSRV_DEBUG:Opening ASCII mode data connection for file list. Mar 3 10:23:11: FTPSRV_DEBUG:(REPLY) 226 Mar 3 10:23:12: FTPSRV_DEBUG:Transfer complete. Mar 3 10:23:12: FTPSRV_DEBUG:FTP Server Command received: 'TYPE I' Mar 3 10:23:14: FTPSRV_DEBUG:(REPLY) 200 Mar 3 10:23:14: FTPSRV_DEBUG:Type set to I. Mar 3 10:23:14: FTPSRV_DEBUG:FTP Server Command received: 'PORT 171,69,30,20,22',51 Mar 3 10:23:20: FTPSRV_DEBUG:(REPLY) 200 Mar 3 10:23:20: FTPSRV_DEBUG:PORT command successful. Mar 3 10:23:20: FTPSRV_DEBUG:FTP Server Command received: 'RETR syslogd.1' Mar 3 10:23:21: FTPSRV_DEBUG:FTP Server file path: 'disk0:/syslogd.dir/syslogd.1' Mar 3 10:23:21: FTPSRV_DEBUG:FTPSERVER: Input path passed Top-dir(disk0:/syslogd.dir/) test. Mar 3 10:23:21: FTPSRV_DEBUG:(REPLY) 150 Mar 3 10:23:21: FTPSRV_DEBUG:Opening BINARY mode data connection for syslogd.1 (607317 bytes). Mar 3 10:23:21: FTPSRV_DEBUG:(REPLY) 226 Mar 3 10:23:29: FTPSRV_DEBUG:Transfer complete.
The sample output corresponds to the following FTP client session. In this example, the user connects to the FTP server, views the contents of the top-level directory, and gets a file.
FTPclient% ftp FTProuter Connected to FTProuter.cisco.com. 220 FTProuter IOS-FTP server (version 1.00) ready. Name (FTProuter:me): aa 331 Password required for 'aa'. Password: 230 Logged in. Remote system type is Cisco. ftp> pwd 257 "disk0:/syslogd.dir/" is current directory. ftp> dir 200 PORT command successful. 150 Opening ASCII mode data connection for file list. syslogd.1 syslogd.2 syslogd.3 syslogd.4 syslogd.5 syslogd.6 syslogd.7 syslogd.8 syslogd.9 syslogd.cur 226 Transfer complete. ftp> bin 200 Type set to I. ftp> get syslogd.1 200 PORT command successful. 150 Opening BINARY mode data connection for syslogd.1 (607317 bytes). 226 Transfer complete. 607317 bytes received in 7.7 seconds (77 Kbytes/s) ftp>
The following debug ftpserver command output indicates that no top-level directory is specified. Therefore, the client cannot access any location on the FTP server. Use the ftp-server topdir command to specify the top-level directory.
Mar 3 10:29:14: FTPSRV_DEBUG:(REPLY) 550 Mar 3 10:29:14: FTPSRV_DEBUG:Access denied to 'disk0:'
debug gatekeeper gup
To display the Gatekeeper Update Protocol (GUP) events or Abstract Syntax Notation 1 (ASN.1) details, use the debug gatekeeper gupcommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug gatekeeper gup { events | asn1 }
no debug gatekeeper gup { events | asn1 }
Syntax Description
events |
Displays a message whenever a GUP announcement is sent or received. GUP is the protocol used between individual gatekeepers in a cluster, which keeps all the gatekeepers synchronized with all endpoints registered on the cluster. |
asn1 |
ASN.1 library. ASN.1 is an International Telecommunication Union (ITU) standard for protocol syntax and message encoding. Entering this keyword causes a packet dump of all GUP announcement messages. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)XM |
This command was introduced. |
12.2(2)T |
This command was integrated into Cisco IOS Release 12.2(2)T. |
12.2(2)XB1 |
This command was implemented on the Cisco AS5850 universal gateway. |
Examples
The following example shows how to enable a packet dump of all GUP announcement messages:
Router# debug gatekeeper gup asn1 00:10:21:ENCODE BUFFER::= 00 0A2A8648 86F70C0A 00000120 001E8001 86A08001 86A00547 656E6576 614E0000 00000142 80004700 65006E00 65007600 61080050 00610072 00690073 00000000 0000 00:10:21: 00:10:21:PDU ::= value GUP_Information ::= protocolIdentifier { 1 2 840 113548 10 0 0 1 } message announcementIndication : announcementInterval 30 endpointCapacity 100000 callCapacity 100000 hostName '47656E657661'H percentMemory 39 percentCPU 0 currentCalls 0 currentEndpoints 0 zoneInformation gatekeeperIdentifier {"Geneva"} altGKIdentifier {"Paris"} totalBandwidth 0 interzoneBandwidth 0 remoteBandwidth 0 RAW_BUFFER::= 00 0A2A8648 86F70C0A 00000120 001E800B 858A8001 86A00144 80007400 6F007200 6E006100 64006F00 2D006700 6B120063 00790063 006C006F 006E0065 002D0067 006B0000 00000000 *Mar 3 15:40:31: *Mar 3 15:40:31:Sending GUP ANNOUNCEMENT INDICATION to 172.18.195.140RAW_BUFFER::= 00 0A2A8648 86F70C0A 00000120 001E800A EF8A8001 86A00144 80006300 79006300 6C006F00 6E006500 2D006700 6B120074 006F0072 006E0061 0064006F 002D0067 006B0000 00000000 *Mar 3 15:40:31:PDU DATA = 60EAB248 value GUP_Information ::= protocolIdentifier { 1 2 840 113548 10 0 0 1 } message announcementIndication : { announcementInterval 30 endpointCapacity 716682 callCapacity 100000 zoneInformation gatekeeperIdentifier {"cyclone-gk"} altGKIdentifier {"tornado-gk"} totalBandwidth 0 interzoneBandwidth 0 remoteBandwidth 0 Mar 3 15:40:31:Received GUP ANNOUNCEMENT INDICATION from 172.18.195.140 u all All possible debugging has been turned off
Related Commands
Command |
Description |
---|---|
load-balance |
Configures load balancing. |
debug gatekeeper load
To display gatekeeper load-balancing debug events, use the debug gatekeeper loadcommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug gatekeeper load events
no debug gatekeeper load events
Syntax Description
events |
Displays a message whenever a load-balancing message is sent or received. |
Command Default
Debugging is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)XM |
This command was introduced. |
12.2(2)T |
This command was integrated into Cisco IOS Release 12.2(2)T. |
12.2(2)XB1 |
This command was implemented on the Cisco AS5850 universal gateway. |
Examples
The following is sample output for the debug gatekeeper load command.
Note | The following output examples are independent of each other and would not ordinarily be seen at the same time. |
Router# debug gatekeeper load Router# Router# s how debugging gk load-balancing debug level = Events Router# gk_load_overloaded:Overloaded, 5-second CPU utilization too high gk_load_overloaded:Overloaded due to excessive calls/endpoints gk_load_balance_endpt_request:load balance occurred. New load_balance_count=2
Related Commands
Command |
Description |
---|---|
load-balance |
Configures load balancing. |
debug gatekeeper server
To trace all the message exchanges between the Cisco IOS Gatekeeper and the external applications, use the debug gatekeeper server command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug gatekeeper server
no debug gatekeeper server
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.1(1)T |
This command was introduced. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
Use this command to see information about a Gatekeeper server. This command shows any errors that occur in sending messages to the external applications or in parsing messages from the external applications.
Examples
The following example shows debugging information about a Gatekeeper server:
Router# debug gatekeeper servers Router# show debug Gatekeeper: Gatekeeper Server Messages debugging is on
To turn the Gatekeeper server debugging message off, see the following examples:
Router# no debug all Router# no debug gatekeeper servers
Related Commands
Command |
Description |
---|---|
show gatekeeper server |
Displays information about the Gatekeeper servers configured on your network by ID. |
debug ggsn quota-server
To display debug information related to quota server processing on the GGSN, use the debug ggsn quota-serverprivilege EXEC command.
debug ggsn quota-server [ detail | packets [dump] | events | parsing | errors ]
Syntax Description
detail |
Displays extended details about quota server operations on the GGSN. |
packets |
Displays packets sent between the quota server process on the GGSN and the CSG. Optionally, displays output in hexadecimal notation. |
events |
Displays events related to quota server processing on the GGSN. |
parsing |
Displays details about GTP TLV parsing between the quota server and the Content Services Gateway. |
errors |
Displays errors related to quota server processing on the GGSN. |
Command Default
No default behavior or values.
Command Modes
Privilege EXEC (#)
Command History
Release |
Modification |
---|---|
12.3(14)YQ |
This command was introduced. |
12.4(9)T |
This command was integrated into Cisco IOS Release 12.4(9)T. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between the GGSN quota server process and the CSG.
Examples
The following example enables the display of detailed quota server processing debug output--pre-allocated quota and quota push:
Router#debug ggsn quota-server detail ggsn quota-server details debugging is on Router# Jun 2 02:40:39.391: GGSN-QS:Encoding QUOTA PUSH REQUEST Jun 2 02:40:39.391: GGSN-QS:Adding TLV USER_INDEX Jun 2 02:40:39.391: GGSN-QS: IP Address: 3.3.3.1 User ID: 12345 Jun 2 02:40:39.391: GGSN-QS:Adding TLV SERVICE_ID: 1 Jun 2 02:40:39.391: GGSN-QS:Adding TLV QUADRANS_GRANTED Jun 2 02:40:39.391: GGSN-QS: Quadrans: 1250 Threshold: 1000 Units: SECONDS Jun 2 02:40:39.391: GGSN-QS:Adding TLV QUADRANS_GRANTED Jun 2 02:40:39.391: GGSN-QS: Quadrans: 5000 Threshold: 5000 Units: BYTES_IP Jun 2 02:40:39.391: GGSN-QS:Adding TLV TIMEOUT: 50000 Jun 2 02:40:39.391: GGSN-QS:Adding TLV TARIFF_TIME: 1147698000 Jun 2 02:40:39.391: GGSN-QS:Sending QUOTA_PUSH_REQ from QS (4.4.4.4:3386) to CSG (30.1.1.1:3386) Jun 2 02:40:39.395: pak=0x6523B5B0, datagramstart=0x200143D8, network_start=0x200143BC datagramsize 91 Jun 2 02:40:39.395: GGSN-QS msgtype 0xF0, seq 1, len 85, from 4.4.4.4:3386 to 30.1.1.1:3386 200143D0: 0FF00055 00017E01 .p.U..~. 200debug ggsn quota-server detail143E0: FC005001 31000000 4A002E00 46001400 |.P.1...J...F... 200143F0: 09030303 01313233 34350015 00013100 .....12345....1. 20014400: 2D000E00 00000000 0004E201 03000003 -.........b..... 20014410: E8002D00 0E000000 00000013 88020300 h.-............. 20014420: 00138800 17000400 00C35000 4D000444 .........CP.M..D 20014430: 687B50 h{P Jun 2 02:40:39.395: GGSN-QS:Received Data Record Transfer Response from (30.1.1.1:3386) Sequence number 1 Jun 2 02:40:39.395: GGSN-QS:Cause = 128 Jun 2 02:40:39.395: GGSN-QS:Request Responded Sequence Number = 1 Jun 2 02:40:39.395: GGSN-QS:Private Ext IE length 32 QM Rsp length 29 Jun 2 02:40:39.395: GGSN-QS:Received message QUOTA_PUSH_RESP from CSG Jun 2 02:40:39.395: GGSN-QS:UserIndex TLV: IP Address 3.3.3.1 UserName/MSISDN 12345 Jun 2 02:40:39.395: GGSN-QS:Session ID TLV: 1736898353 Jun 2 02:40:39.395: GGSN-QS:Service ID TLV: 1 Jun 2 02:40:39.399: GGSN-QS:Detected real CSG 30.1.1.1 for virtual CSG 30.1.1.1 Jun 2 02:40:39.399: GGSN-QS:real CSG newly detected ggsn quota-server details debugging is on Router#
debug glbp errors
To display debugging messages about Gateway Load Balancing Protocol (GLBP) error conditions, use the debug glbp errors command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug glbp errors
no debug glbp errors
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(14)S |
This command was introduced. |
12.2(15)T |
This command was integrated into Cisco IOS Release 12.2(15)T. |
12.2(17b)SXA |
This command was integrated into Cisco IOS Release 12.2(17b)SXA. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Examples
The following is sample output from the debug glbp errorscommand:
Router# debug glbp errors GLBP Errors debugging is on 1d19h: GLBP: Fa0/0 API active virtual address 10.21.8.32 not found 1d19h: GLBP: Fa0/0 API active virtual address 10.21.8.32 not found 1d19h: GLBP: Fa0/0 API active virtual address 10.21.8.32 not found
Related Commands
Command |
Description |
---|---|
debug condition glbp |
Displays debugging messages about GLBP that match specific conditions. |
debug glbp events
To display debugging messages about Gateway Load Balancing Protocol (GLBP) events that are occurring, use the debug glbp events command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug glbp events [ all | api | cache | detail | ha | icmp | protocol | redundancy | terse | track ]
no debug glbp events [ all | api | cache | detail | ha | icmp | protocol | redundancy | terse | track ]
Syntax Description
all |
(Optional) Displays all debugging output about GLBP events. |
api |
(Optional) Displays GLBP API events. |
cache |
(Optional) Displays GLBP client cache events. |
detail |
(Optional) Displays detailed debugging output about GLBP events. |
ha |
(Optional) Displays GLBP high-availability (HA) events. |
icmp |
(Optional) Displays GLBP Internet Control Message Protocol (ICMP) events. |
protocol |
(Optional) Displays GLBP protocol events. |
redundancy |
(Optional) Displays GLBP redundancy events. |
terse |
(Optional) Displays a limited range of debugging output about GLBP events. |
track |
(Optional) Displays GLBP tracking events. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(14)S |
This command was introduced. |
12.2(15)T |
This command was integrated into Cisco IOS Release 12.2(15)T. |
12.2(17b)SXA |
This command was integrated into Cisco IOS Release 12.2(17b)SXA. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2(31)SB2 |
This command was enhanced to display information about GLBP support of Stateful Switchover (SSO). The ha keyword was added. |
12.4(15)T |
The cache keyword was added. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following is sample output from the debug glbp eventscommand when the terse keyword is specified:
Router# debug glbp events terse GLBP Events debugging is on (protocol, redundancy, track)
The following is sample output from the debug glbp eventscommand on an active RP displaying an interface shutdown event:
Router# debug glbp events GLBP Events debugging is on *Sep 15 09:14:53.583: GLBP: Et0/0 API Software interface going down *Sep 15 09:14:53.583: GLBP: Et0/0 API Software interface going down *Sep 15 09:14:53.583: GLBP: Et0/0 Interface down *Sep 15 09:14:53.583: GLBP: Et0/0 1.1 Listen: e/Forwarder disabled *Sep 15 09:14:53.583: GLBP: Et0/0 1.1 Listen -> Init *Sep 15 09:14:53.583: GLBP: Et0/0 Fwd 1.1 HA Encoded (state Init) into sync buffer *Sep 15 09:14:53.583: GLBP: Et0/0 1.2 Active: e/Forwarder disabled *Sep 15 09:14:53.583: GLBP: Et0/0 1.2 Active -> Init *Sep 15 09:14:53.583: %GLBP-6-FWDSTATECHANGE: Ethernet0/0 Grp 1 Fwd 2 state Active -> Init *Sep 15 09:14:53.583: GLBP: Et0/0 Fwd 1.2 HA Encoded (state Init) into sync buffer *Sep 15 09:14:53.583: GLBP: Et0/0 1 Standby: e/GLBP disabled *Sep 15 09:14:53.583: GLBP: Et0/0 1 Active router IP is unknown, was 172.24.1.2 *Sep 15 09:14:53.583: GLBP: Et0/0 1 Standby router is unknown, was local *Sep 15 09:14:53.583: GLBP: Et0/0 1 Standby -> Init *Sep 15 09:14:53.583: GLBP: Et0/0 Grp 1 HA Encoded (state Init) into sync buffer *Sep 15 09:14:55.583: %LINK-5-CHANGED: Interface Ethernet0/0, changed state to administratively down *Sep 15 09:14:55.587: GLBP: API Hardware state change *Sep 15 09:14:56.595: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/0, changed state to down
The following is sample output from the debug glbp eventscommand on a standby RP displaying an interface shutdown event:
RouterRP-standby# debug glbp events GLBP Events debugging is on . . . *Sep 15 09:14:53.691: GLBP: Et0/0 Fwd 1.1 HA sync, state Listen -> Init *Sep 15 09:14:53.691: GLBP: Et0/0 Fwd 1.2 HA sync, state Active -> Init *Sep 15 09:14:53.691: GLBP: Et0/0 Grp 1 HA sync, state Standby -> Init
The following is sample output from the debug glbp eventscommand when the cache keyword is specified:
Router# debug glbp events cache GLBP Events debugging is on (cache) Jun 30 08:57:50.171: GLBP: Et0/0 1 Added client cache entry for 7bcf.e03d.d3bd Jun 30 08:57:50.171: GLBP: Et0/0 1 Added client cache entry for c5e8.46eb.8a86 Jun 30 08:57:50.171: GLBP: Et0/0 1 Added client cache entry for 69e5.9d95.0f7e Jun 30 08:57:50.171: GLBP: Et0/0 1 Added client cache entry for 986e.d98a.1607 Jun 30 08:57:50.171: GLBP: Et0/0 1 Added client cache entry for 1843.ee62.f62e Jun 30 08:57:50.171: GLBP: Et0/0 1 Added client cache entry for 5f4c.cfc4.5dc1
Related Commands
Command |
Description |
---|---|
debug condition glbp |
Displays debugging messages about GLBP that match specific conditions. |
debug glbp packets
To display summary information about Gateway Load Balancing Protocol (GLBP) packets being sent or received, use the debug glbp packets command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug glbp packets [ all | detail | hello | reply | request | terse ]
no debug glbp packets [ all | detail | hello | reply | request | terse ]
Syntax Description
all |
(Optional) Displays all debugging output about GLBP packets. |
detail |
(Optional) Displays detailed debugging output about GLBP packets. |
hello |
(Optional) Displays debugging output about GLBP hello packets. |
reply |
(Optional) Displays debugging output about GLBP reply packets. |
request |
(Optional) Displays debugging output about GLBP request packets. |
terse |
(Optional) Displays a limited range of debugging output about GLBP packets. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(14)S |
This command was introduced. |
12.2(15)T |
This command was integrated into Cisco IOS Release 12.2(15)T. |
12.2(17b)SXA |
This command was integrated into Cisco IOS Release 12.2(17b)SXA. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Examples
The following sample output from the debug glbp packetscommand shows debugging output about GLBP hello packets:
Router# debug glbp packets hello GLBP Packets debugging is on (Hello) 1d19h: GLBP: Fa0/0 Grp 10 Hello out 10.21.8.32 VG Active pri 254 vIP 10.21.8.10 1 1d19h: GLBP: Fa0/0 Grp 10 Hello out 10.21.8.32 VG Active pri 254 vIP 10.21.8.10 1 1d19h: GLBP: Fa0/0 Grp 10 Hello out 10.21.8.32 VG Active pri 254 vIP 10.21.8.10 1 1d19h: GLBP: Fa0/0 Grp 10 Hello out 10.21.8.32 VG Active pri 254 vIP 10.21.8.10 1
Related Commands
Command |
Description |
---|---|
debug condition glbp |
Displays debugging messages about GLBP that match specific conditions. |
debug glbp terse
To display a limited range of debugging messages about Gateway Load Balancing Protocol (GLBP) errors, events, and packets, use the debug glbp terse command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug glbp terse
no debug glbp terse
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(14)S |
This command was introduced. |
12.2(15)T |
This command was integrated into Cisco IOS Release 12.2(15)T. |
12.2(17b)SXA |
This command was integrated into Cisco IOS Release 12.2(17b)SXA. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following is sample output from the debug glbp tersecommand:
Router# debug glbp terse GLBP: GLBP Errors debugging is on GLBP Events debugging is on (protocol, redundancy, track) GLBP Packets debugging is on (Request, Reply)
Related Commands
Command |
Description |
---|---|
debug condition glbp |
Displays debugging messages about GLBP that match specific conditions. |
debug glbp errors |
Displays debugging messages about GLBP errors. |
debug glbp events |
Displays debugging messages about GLBP events. |
debug glbp packets |
Displays debugging messages about GLBP packets. |
debug gprs category fsm event
To display debug information related to service-aware GGSN category events, and state transactions, use the debug gprs category fsm eventprivilege EXEC command.
debug gprs category fsm event
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command Modes
Privilege EXEC (#)
Command History
Release |
Modification |
---|---|
12.3(14)YQ |
This command was introduced. |
12.4(9)T |
This command was integrated into Cisco IOS Release 12.4(9)T. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with eGGSN processing.
Examples
Examples
The following example enables the display of eGGSN events and state transactions--pre-allocated quota. This is PDP context create, prepaid user data transfer, and then context teardown.
PDP Context Create:
Router#debug gprs category fsm event eGGSN category fsm event debugging is on Router# Jun 2 02:55:08.491: GPRS:1234050000000010:created service-aware subblock Jun 2 02:55:11.383: GPRS:1234050000000010:it is the only one PDP of the user, need CCR msg Jun 2 02:55:11.383: GPRS:1234050000000010:sent ccr_init Jun 2 02:55:11.823: GPRS:1234050000000010:create new category 1 Jun 2 02:55:11.823: GPRS:1234050000000010:shdb 0xFB00001C created for category 1 (handle 0x8C000007) Jun 2 02:55:11.823: GPRS:1234050000000010:successfully create a category Jun 2 02:55:14.623: GPRS:1234050000000010:created sync_object for CREATE_PDP Jun 2 02:55:14.623: GPRS:1234050000000010:get 1 impacted categories into sync_object for CREATE_PDP Jun 2 02:55:14.623: GPRS:1234050000000010:insert category 1 from sync_object for CREATE_PDP Jun 2 02:55:14.623: GPRS:1234050000000010:number of really impacted by CREATE_PDP = 1 Jun 2 02:55:14.623: GPRS:1234050000000010:FSM_ggsn_rcvd_quota Jun 2 02:55:14.623: GPRS:1234050000000010:category 1 trans from INIT to PENDING QP on event CCA_QUOTA Jun 2 02:55:14.627: GPRS:1234050000000010:FSM_ggsn_rcvd_qp_ack_in_qp Jun 2 02:55:14.627: GPRS:1234050000000010:remove category 1 from sync_object for CREATE_PDP 0 still pending in the sync_object Jun 2 02:55:14.627: GPRS:1234050000000010:send Create PDP Context Res to SGSN Jun 2 02:55:14.627: GPRS:1234050000000010:delete sync object for CREATE_PDP, it has 0 categories Jun 2 02:55:14.627: GPRS:1234050000000010:category 1 trans from PENDING QP to AUTHORIZED on event CSG_QP_ACK Router# Router#
PDP Context Delete:
Router# Jun 2 02:55:31.455: GPRS:1234050000000010:look up category by 1 found 65EEB128 Jun 2 02:55:31.455: GPRS:1234050000000010:FSM_ggsn_rcvd_stop Jun 2 02:55:31.455: GPRS:category 1 report usage queue size = 2 Jun 2 02:55:31.455: GPRS:1234050000000010:usage unit has total_octets 0 Jun 2 02:55:31.455: GPRS:1234050000000010:usage unit has total_octets 300 Jun 2 02:55:31.455: GPRS:1234050000000010:category 1 , usage 6615E470 Jun 2 02:55:31.455: GPRS:1234050000000010:no sync_object for service stop Jun 2 02:55:31.455: %GPRSFLTMG-4-CHARGING: GSN: 0.0.0.0, TID: 0000000000000000, APN: NULL, Reason: 1, unexpected CSG usage report cause Jun 2 02:55:31.455: GPRS:1234050000000010:send CCR_UPDATE to DCCA server return ok Jun 2 02:55:31.455: GPRS:releasing 2 usages in category Jun 2 02:55:31.455: GPRS:release_usage_parameter Jun 2 02:55:31.455: GPRS:1234050000000010:category 1 trans from AUTHORIZED to IDLE on event CSG_SERVICE_STOP Jun 2 02:55:34.939: GPRS:1234050000000010:eggsn_get_final_usage_report Jun 2 02:55:34.939: GPRS:1234050000000010:freeing all categories Jun 2 02:55:34.939: GPRS:1234050000000010:delete_category 1 Jun 2 02:55:34.939: GPRS:1234050000000010:freeing service-aware subblock Router#
Example 2--PDPs without Pre-Allocated Quota
The following example enables the display of eGGSN events and state transactions--for PDPs without pre-allocated quota.
PDP Context Create:
Router#debug gprs category fsm event eGGSN category fsm event debugging is on Router# Jun 2 02:58:45.727: GPRS:1234050000000010:created service-aware subblock Jun 2 02:58:48.623: GPRS:1234050000000010:it is the only one PDP of the user, need CCR msg Jun 2 02:58:48.623: GPRS:1234050000000010:sent ccr_init Router#
PDP Context Delete:
Router# Jun 2 02:59:06.975: GPRS:1234050000000010:eggsn_get_final_usage_report Jun 2 02:59:06.975: GPRS:1234050000000010:freeing all categories Jun 2 02:59:06.975: GPRS:1234050000000010:freeing service-aware subblock Router
debug gprs charging
To display information about general packet radio service (GPRS) charging functions on the gateway GPRS support node (GGSN), use the debug gprs charging command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug gprs charging { events | packets }
no debug gprs charging { events | packets }
Syntax Description
events |
Displays events related to GPRS charging processing on the GGSN. |
packets |
Displays GPRS charging packets that are sent between the GGSN and the charging gateway. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.1(1)GA |
This command was introduced. |
12.1(3)T |
This command was integrated into Cisco IOS Release 12.1(3)T. |
12.2(4)MX |
This command was integrated into Cisco IOS Release 12.2(4)MX. |
12.2(8)YD |
This command was integrated into Cisco IOS Release 12.2(8)YD. |
12.2(8)B |
This command was integrated into Cisco IOS Release 12.2(8)B. |
12.2(8)YY |
This command was integrated into Cisco IOS Release 12.2(8)YY. |
12.3(4)T |
This command was integrated into Cisco IOS Release 12.3(4)T. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command is useful for system operators if problems are encountered with GPRS charging functions.
Caution | Because the debug gprs chargingcommand generates a substantial amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following example enables the display of events related to GPRS charging events on the GGSN:
Router# debug gprs charging events
The following example enables the display of GPRS charging packets sent between the GGSN and the charging gateway:
Router# debug gprs charging events
debug gprs dcca
To display troubleshooting information about Diameter Credit Control Application (DCCA) processing on the gateway GPRS support node (GGSN), use the debug gprs dccaprivilege EXEC command.
debug gprs dcca
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command Modes
Privilege EXEC (#)
Command History
Release |
Modification |
---|---|
12.3(14)YQ |
This command was introduced. |
12.4(9)T |
This command was integrated into Cisco IOS Release 12.4(9)T. |
Usage Guidelines
This command is useful for system operators and development engineers if Diameter protocol problems are encountered on the GGSN.
Examples
Examples
The following is a sample of DCCA debug information with pre-allocated quota.
Router#debug gprs dcca Router# Jun 2 03:13:45.827: GPRS:1234050000000010:GPRS:DCCA: 3GPP-IMSI : 214350000000000 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-Charging-Id : 613053186 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-PDP-Type : 0 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-CG-Address : 20.1.1.1 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-QoS-Profile : 99-0911012964FFFF1100FFFF Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-SGSN-Address : 11.20.1.1 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-Address : 10.20.61.1 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-IMSI-MCC-MNC : 21435 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-MCC-MNC : 001002 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-NSAPI : 1 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS:DCCA: 3GPP-Selection-Mode : 0 Jun 2 03:13:45.831: GPRS:1234050000000010:3GPP-Charging-Char : 0100 Jun 2 03:13:45.831: GPRS:1234050000000010:GPRS DCCA: Starting Tx timer , value = 100000 Jun 2 03:13:45.831: GPRS:1234050000000010:DCCA FSM:Event = CCR_INITIAL, Old State = IDLE, New State = PENDING_I Jun 2 03:13:46.287: GPRS:1234050000000010:GPRS DCCA: Result-Code = 2001 Jun 2 03:13:46.287: GPRS:1234050000000010:GPRS DCCA: Stopping Tx timer Jun 2 03:13:46.287: GPRS:1234050000000010:GPRS DCCA: Result-Code for Category : 1 = 2001 Jun 2 03:13:46.287: GPRS:1234050000000010:DCCA FSM:Event = CCA_SUCCESS, Old State = PENDING_I, New State = OPEN Router# Router#show gprs gtp pdp tid 1234050000000010 ser all Diameter Credit Control: Enabled Current Billing status: Prepaid Reason to convert to postpaid: N/A Charging Profile Index: 1 DCCA profile name: dcca-profile1, Source: charging profile Rule base id: 1, Source: DCCA server ServiceID State Quota(octets) 1 AUTHORIZED 5000 Router# PDP being deleted
Examples
The following is a sample of DCCA debug information without pre-allocated quota.
Router#show debug GPRS: GPRS DCCA Events debugging is on Router# Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-IMSI : 214350000000000 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-Charging-Id : 613053181 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-PDP-Type : 0 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-CG-Address : 20.1.1.1 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-QoS-Profile : 99-0911012964FFFF1100FFFF Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-SGSN-Address : 11.20.1.1 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-Address : 10.20.61.1 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-IMSI-MCC-MNC : 21435 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-MCC-MNC : 001002 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-NSAPI : 1 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS:DCCA: 3GPP-Selection-Mode : 0 Jun 2 03:05:07.743: GPRS:1234050000000010:3GPP-Charging-Char : 0100 Jun 2 03:05:07.743: GPRS:1234050000000010:GPRS DCCA: Starting Tx timer , value = 100000 Jun 2 03:05:07.743: GPRS:1234050000000010:DCCA FSM:Event = CCR_INITIAL, Old State = IDLE, New State = PENDING_I Jun 2 03:05:08.167: GPRS:1234050000000010:GPRS DCCA: Result-Code = 2001 Jun 2 03:05:08.167: GPRS:1234050000000010:GPRS DCCA: Stopping Tx timer Jun 2 03:05:08.167: GPRS:1234050000000010:DCCA FSM:Event = CCA_SUCCESS, Old State = PENDING_I, New State = OPEN Router# gprs5-72b#sgpt 1234050000000010 ser all Diameter Credit Control: Enabled Current Billing status: Prepaid Reason to convert to postpaid: N/A Charging Profile Index: 1 DCCA profile name: dcca-profile1, Source: charging profile Rule base id: 1, Source: DCCA server ServiceID State Quota(octets) gprs5-72b#clear gprs gtp pdp all PDP deleted Router# Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-IMSI : 214350000000000 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-Charging-Id : 613053181 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-PDP-Type : 0 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-CG-Address : 20.1.1.1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-QoS-Profile : 99-0911012964FFFF1100FFFF Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-SGSN-Address : 11.20.1.1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-Address : 10.20.61.1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-IMSI-MCC-MNC : 21435 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-GGSN-MCC-MNC : 001002 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-NSAPI : 1 Jun 2 03:05:28.459: GPRS:1234050000000010:GPRS:DCCA: 3GPP-Selection-Mode : 0 Jun 2 03:05:28.459: GPRS:1234050000000010:3GPP-Charging-Char : 0100 Jun 2 03:05:28.463: GPRS:1234050000000010:GPRS DCCA: Stopping Tx timer Jun 2 03:05:28.463: GPRS:1234050000000010:DCCA FSM:Event = CCR_FINAL, Old State = OPEN, New State = PENDING_T Jun 2 03:05:28.463: GPRS:1234050000000010:GPRS DCCA: Stopping Tx timer Jun 2 03:05:28.871: GPRS:GPRS DCCA: DCCA request was cancelled, Droping AAA reply Router# Router#sgpt 1234050000000010 ser all %ERROR: Cannot find the PDP Router#
debug gprs dfp
To display debug messages for GPRS DFP weight calculation, use the debug gprs dfpprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs dfp
no debug gprs dfp
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.1(9)E |
This command was introduced. |
12.2(4)MX |
This command was incorporated in Cisco IOS Release 12.2(4)MX. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)YW |
This command was incorporated in Cisco IOS Release 12.2(8)YW. |
12.3(2)XB |
This command was incorporated in Cisco IOS Release 12.3(2)XB. |
12.3(8)XU |
This command was incorporated in Cisco IOS Release 12.3(8)XU. |
12.3(11)YJ |
This command was incorporated in Cisco IOS Release 12.3(11)YJ. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
Usage Guidelines
See the following caution before using debug commands:
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network flows and fewer users. Debugging during these periods reduces the effect these commands have on other users on the system. |
This command displays debug messages for GPRS DFP weight calculation. To display debug messages for the DFP agent subsystem, use the debug ip dfp agentcommand.
Examples
The following example configures a debug session to check all GPRS DFP weight calculation:
Router# debug gprs dfp GPRS DFP debugging is on Router#
The following example stops all debugging:
Router# no debug all All possible debugging has been turned off Router#
debug gprs dhcp
To display information about Dynamic Host Configuration Protocol (DHCP) processing on the GGSN, use the debug gprs dhcpprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs dhcp
no debug gprs dhcp
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.2(4)MX |
This command was introduced. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)YW |
This command was incorporated in Cisco IOS Release 12.2(8)YW. |
12.3(2)XB |
This command was incorporated in Cisco IOS Release 12.3(2)XB. |
12.3(8)XU |
This command was incorporated in Cisco IOS Release 12.3(8)XU. |
12.3(11)YJ |
This command was incorporated in Cisco IOS Release 12.3(11)YJ. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with DHCP processing on the GGSN. To display standard debug messages between the DHCP client on the router and a DHCP server, you can also use the debug dhcp or debug dhcp detail commands with the debug gprs dhcp command.
Caution | Because the debug gprs dhcpcommand generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following example shows sample output for DHCP processing on the GGSN :
Router# debug gprs dhcp 2d13h: GPRS:DHCP req:TID 1111111100000099, Req 1 2d13h: GPRS:Requesting IP address for pdp 1111111100000099 from server 172.16.0.8 tableid 0 2d13h: GPRS:DHCP ip allocation pass (10.88.17.43) for pdp 1111111100000099 2d13h: GPRS:Using DHCP ip address 10.88.17.43 for pdp 1111111100000099
The following example shows sample output for standard debug messaging for DHCP processing on the router between the DHCP client and a DHCP server:
2d13h: DHCP: proxy allocate request 2d13h: DHCP: new entry. add to queue 2d13h: DHCP: SDiscover attempt # 1 for entry: 2d13h: DHCP: SDiscover: sending 283 byte length DHCP packet 2d13h: DHCP: SDiscover with directed serv 172.16.0.8, 283 bytes 2d13h: DHCP: XID MATCH in dhcpc_for_us() 2d13h: DHCP: Received a BOOTREP pkt 2d13h: DHCP: offer received from 172.16.0.8 2d13h: DHCP: SRequest attempt # 1 for entry: 2d13h: DHCP: SRequest- Server ID option: 172.16.0.8 2d13h: DHCP: SRequest- Requested IP addr option: 10.88.17.43 2d13h: DHCP: SRequest placed lease len option: 604800 2d13h: DHCP: SRequest: 301 bytes 2d13h: DHCP: SRequest: 301 bytes 2d13h: DHCP: XID MATCH in dhcpc_for_us() 2d13h: DHCP: Received a BOOTREP pkt 2d13h: DHCP Proxy Client Pooling: ***Allocated IP address: 10.88.17.43
Related Commands
Command |
Description |
---|---|
debug dhcp |
Displays debug messages between the DHCP client on the router and a DHCP server. |
debug gprs gtp
To display information about the GPRS Tunneling Protocol (GTP), use the debug gprs gtpprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs gtp { events | messages | packets }
no debug gprs gtp { events | messages | packets }
Syntax Description
events |
Displays events related to GTP processing on the GGSN. |
messages |
Displays GTP signaling messages that are sent between the SGSN and GGSN. |
packets |
Displays GTP packets that are sent between the SGSN and GGSN. |
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.1(1)GA |
This command was introduced. |
12.1(5)T |
This command was integrated in Cisco IOS Release 12.1(5)T. |
12.2(4)MX |
This command was incorporated in Cisco IOS Release 12.2(4)MX, and the ppp {details | events} option was added. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)YW |
This command was incorporated in Cisco IOS Release 12.2(8)YW. |
12.3(2)XB |
This command was incorporated in Cisco IOS Release 12.3(2)XB. |
12.3(8)XU |
This command was incorporated in Cisco IOS Release 12.3(8)XU. |
12.3(11)YJ |
This command was incorporated in Cisco IOS Release 12.3(11)YJ. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between the GGSN and the SGSN using GTP.
Note | Because the debug gprs gtpcommand generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following example enables the display of events related to GTP processing on the GGSN :
Router# debug gprs gtp events
The following example enables the display of GTP signaling messages :
Router# debug gprs gtp messages
The following example enables the display of GTP packets sent between the SGSN and GGSN :
Router# debug gprs gtp packets
The following example enables the display of GTP PPP events between the SGSN and GGSN :
Router# debug gprs gtp ppp events
The following example enables the display of detailed GTP PPP debug output along with GTP PPP events between the SGSN and GGSN :
Router# debug gprs gtp ppp details Router# debug gprs gtp ppp events
debug gprs gtp parsing
To display information about the parsing of GPRS Tunneling Protocol (GTP) information elements (IEs) in signaling requests, use the debug gprs gtp parsingprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs gtp parsing
no debug gprs gtp parsing
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.2(4)MX |
This command was introduced. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)YW |
This command was incorporated in Cisco IOS Release 12.2(8)YW. |
12.3(2)XB |
This command was incorporated in Cisco IOS Release 12.3(2)XB. |
12.3(8)XU |
This command was incorporated in Cisco IOS Release 12.3(8)XU. |
12.3(11)YJ |
This command was incorporated in Cisco IOS Release 12.3(11)YJ. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
Usage Guidelines
This command is useful for system operators and development engineers to verify parsing of GTP IEs in signaling requests that are received by GDM or by the GGSN. If the packet is parsed successfully, you will receive a message along with the TID for the packet as shown in the following example:
GPRS:TID:7300000000000000:Packet Parsed successfully
The debug gprs gtp parsing command can be used to verify GDM or GGSN processing of IEs.
Note | Because the debug gprs gtp parsingcommand generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following example enables the display of debug messages that occur while GDM or the GGSN parses GTP IEs :
Router# debug gprs gtp parsing
debug gprs gtp ppp
To display information about PPP PDP type processing on the GGSN, use the debug gprs gtp pppprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs gtp ppp { events | details }
no debug gprs gtp ppp { events | details }
Syntax Description
events |
Displays messages specific to certain conditions that are occurring during PPP PDP type processing. |
details |
Displays more extensive and lower-level messages related to PPP PDP type processing. |
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.2(4)MX |
This command was introduced. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)YW |
This command was incorporated in Cisco IOS Release 12.2(8)YW. |
12.3(2)XB |
This command was incorporated in Cisco IOS Release 12.3(2)XB. |
12.3(8)XU |
This command was incorporated in Cisco IOS Release 12.3(8)XU. |
12.3(11)YJ |
This command was incorporated in Cisco IOS Release 12.3(11)YJ. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with PPP PDP type processing on the GGSN.
You can enable both forms of the debug gprs gtp ppp command at the same time, as separate command line entries. The events keyword generates output specific to certain conditions that are occurring, which helps qualify the output being received using the details option.
Note | Because the debug gprs gtp pppcommand generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following debug examples provide sample output for a create PDP context request and clear PDP context using PPP PDP type on the GGSN. The examples show output while both debug events and details are enabled on the GGSN.
Example 1
The following example displays details and events output related to PPP PDP context processing for a create PDP context requested received by the GGSN :
Router# debug gprs gtp ppp events GTP PPP events display debugging is on Router# debug gprs gtp ppp details GTP PPP details display debugging is on 7200b# 3d23h: GPRS: 3d23h: GTP-PPP Fa1/0: Create new gtp_ppp_info 3d23h: GPRS: 3d23h: GTP-PPP: domain gprs.cisco.com not in any VPDN group 3d23h: GPRS: 3d23h: GTP-PPP: aaa-group accounting not configured under APN gprs.cisco.com 3d23h: GPRS:GTP-PPP: Don't cache internally generated pak's header 3d23h: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_cstate_react changing states 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS: 3d23h: GTP-PPP: Vi2: Concat names user00 & gprs.cisco.com 3d23h: GPRS: 3d23h: GTP-PPP: New username after concat: user00@gprs.cisco.com 3d23h: GPRS: 3d23h: GTP-PPP: Vi2: Concat names user00@gprs.cisco.com & gprs.cisco.com 3d23h: GPRS: 3d23h: GTP-PPP: New username after concat: user00@gprs.cisco.com 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to up 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_protocol_up is notified about intf UP 3d23h: GPRS:
3d23h: GTP-PPP Vi2: PDP w/ MS addr 98.102.0.1 inserted into IP radix tree
Examples
The following example displays both details and events related to PPP PDP type processing after clearing PDP contexts on the GGSN :
Router# clear gprs gtp pdp-context all 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS:GTP-PPP: pdp_entry 0x62F442A4, recv ppp data pak 3d23h: GPRS:GTP-PPP Vi2: proc_udp_input pak's linktype = 30 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_pdp_terminate shutting down the vaccess 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_pdp_shut_va shutting down intf 3d23h: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_cstate_react changing states 3d23h: GPRS: 3d23h: GTP-PPP Vi2: gtp_ppp_free_va resetting intf vectors 3d23h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to down
debug gprs gtp ppp-regeneration
To display information about PPP regeneration processing on the GGSN, use the debug gprs gtp ppp-regenerationprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs gtp ppp-regeneration { events | details }
no debug gprs gtp ppp-regeneration { events | details }
Syntax Description
events |
Displays messages specific to certain conditions that are occurring during PPP regeneration processing. |
details |
Displays more extensive and lower-level messages related to PPP regeneration processing. |
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.2(4)MX |
This command was introduced. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)YW |
This command was incorporated in Cisco IOS Release 12.2(8)YW. |
12.3(2)XB |
This command was incorporated in Cisco IOS Release 12.3(2)XB. |
12.3(8)XU |
This command was incorporated in Cisco IOS Release 12.3(8)XU. |
12.3(11)YJ |
This command was incorporated in Cisco IOS Release 12.3(11)YJ. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between GDM and a GGSN.
You can enable both forms of the debug gprs gtp ppp-regeneration command at the same time, as separate command line entries. The events keyword generates output specific to certain conditions that are occurring, which helps qualify the output being received using the details option.
Note | Because the debug gprs gtp ppp-regenerationcommand generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following debug examples provide sample output for a create PDP context request and clear PDP context using PPP regeneration on the GGSN. The examples show output while both debug events and details are enabled on the GGSN.
Example 1
The following example displays details and events output related to PPP regeneration processing for a create PDP context requested received by the GGSN :
Router# debug gprs gtp ppp-regeneration details GTP PPP regeneration details display debugging is on Router# debug gprs gtp ppp-regeneration events GTP PPP regeneration events display debugging is on 06:24:02: PPP-REGEN state counters: pending counter is 0 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 1 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:Authen: PAP username: tomy1@corporate_1.com 06:24:02: GPRS:1011111111500001:Session timer started 06:24:02: GPRS:Processing PPP regen reqQ 06:24:02: GPRS:1011111111500001:Processing Initiate PPP regen from reqQ 06:24:02: GPRS:1011111111500001:got event [REQUEST PPP REGEN] in state [IDLE] 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 1 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [IDLE->AUTHORIZING] on event [REQUEST PPP REGEN] 06:24:02: GPRS:1011111111500001:Got VPN authorization info 06:24:02: GPRS:1011111111500001:got event [AUTHOR SUCCESS] in state [AUTHORIZING] 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 1 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [AUTHORIZING->VPDN CONNECTING] on event [AUTHOR SUCCESS] 06:24:02: GPRS:1011111111500001:Author succeeded, establishing the tunnel 06:24:02: GPRS:1011111111500001:Create/Clone vaccess to negotiate PPP 06:24:02: GPRS:1011111111500001:no need to set NS ppp_config 06:24:02: GPRS:1011111111500001:MS no static IP addr. Get one via IPCP 06:24:02: GPRS:1011111111500001:VPDN to inform PPP regen: CONNECTED 06:24:02: GPRS:1011111111500001:got event [VPDN CONNECTED] in state [VPDN CONNECTING] 06:24:02: PPP-REGEN state counters: pending counter is 1 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 1 06:24:02: State[PPP CONNECTED] counter is 0 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [VPDN CONNECTING->PPP NEGOTIATING] on event [VPDN CONNECTED] 06:24:02: GPRS:1011111111500001:Start PPP negotiations on vaccess 06:24:02: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up 06:24:02: GPRS:1011111111500001:IPCP is up 06:24:02: GPRS:1011111111500001:LNS allocates 10.100.1.1 for MS 06:24:02: GPRS:1011111111500001:IP addr 10.100.1.1 is negotiated for MS 06:24:02: GPRS:1011111111500001:PPP connected 06:24:02: GPRS:1011111111500001:got event [PPP NEGOTIATED] in state [PPP NEGOTIATING] 06:24:02: PPP-REGEN state counters: pending counter is 0 06:24:02: State[IDLE] counter is 0 06:24:02: State[AUTHORIZING] counter is 0 06:24:02: State[VPDN CONNECTING] counter is 0 06:24:02: State[PPP NEGOTIATING] counter is 0 06:24:02: State[PPP CONNECTED] counter is 1 06:24:02: State[PPP TERMINATING] counter is 0 06:24:02: GPRS:1011111111500001:state [PPP NEGOTIATING->PPP CONNECTED] on event [PPP NEGOTIATED] 06:24:02: GPRS:1011111111500001:PPP succeeded negotiation, session established 06:24:02: GPRS:1011111111500001:Session timer stopped 06:24:03: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to up
Examples
The following example displays both details and events related to PPP regeneration processing after clearing PDP contexts on the GGSN :
Router# clear gprs gtp pdp-context all 06:28:05: PPP-REGEN state counters: pending counter is 0 06:28:05: State[IDLE] counter is 0 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 1 06:28:05: State[PPP TERMINATING] counter is 0 06:28:05: GPRS:1011111111500001:PPP regen current state PPP CONNECTED 06:28:05: GPRS:1011111111500001:GTP disconnecting the PPP regen session 06:28:05: GPRS:Processing PPP regen reqQ 06:28:05: GPRS:1011111111500001:Processing Disconnect PPP regen from reqQ 06:28:05: GPRS:1011111111500001:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] 06:28:05: PPP-REGEN state counters: pending counter is 1 06:28:05: State[IDLE] counter is 0 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 0 06:28:05: State[PPP TERMINATING] counter is 1 06:28:05: GPRS:1011111111500001:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] 06:28:05: GPRS:1011111111500001:Cancel request after VPND tunnel is up 06:28:05: PPP-REGEN state counters: pending counter is 1 06:28:05: State[IDLE] counter is 0 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 0 06:28:05: State[PPP TERMINATING] counter is 1 06:28:05: GPRS:1011111111500001:PPP down 06:28:05: GPRS:1011111111500001:got event [PPP FAILED] in state [PPP TERMINATING] 06:28:05: PPP-REGEN state counters: pending counter is 1 06:28:05: State[IDLE] counter is 1 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 0 06:28:05: State[PPP TERMINATING] counter is 0 06:28:05: GPRS:1011111111500001:state [PPP TERMINATING->IDLE] on event [PPP FAILED] 06:28:05: GPRS:1011111111500001:LCP went down 06:28:05: GPRS:1011111111500001:VPDN disconnect 06:28:05: GPRS:1011111111500001:got event [CLEANUP CONTEXT] in state [IDLE] 06:28:05: GPRS:1011111111500001:state [IDLE->IDLE] on event [CLEANUP CONTEXT] 06:28:05: GPRS:1011111111500001:Freeing context structure 06:28:05: GPRS:1011111111500001:VPDN handle invalid, no need to free it 06:28:05: GPRS:1011111111500001:remove PPP regen context from Vi2 06:28:05: GPRS:1011111111500001:Session timer stopped 06:28:05: PPP-REGEN state counters: pending counter is 0 06:28:05: State[IDLE] counter is 0 06:28:05: State[AUTHORIZING] counter is 0 06:28:05: State[VPDN CONNECTING] counter is 0 06:28:05: State[PPP NEGOTIATING] counter is 0 06:28:05: State[PPP CONNECTED] counter is 0 06:28:05: State[PPP TERMINATING] counter is 0 06:28:05: GPRS:1011111111500001:PPP regen context 0x633F196C released 06:28:05: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down 06:28:06: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to down
debug gprs gtp-director
To display information about the GTP Director Module (GDM), use the debug gprs gtp-directorprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs gtp-director { events | packets }
no debug gprs gtp-director { events | packets }
Syntax Description
events |
Displays events related to GDM processing. |
packets |
Displays packets that are sent between GDM and a GGSN. |
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.2(4)MX |
This command was introduced. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)B |
This command was incorporated in Cisco IOS Release 12.2(8)B. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between GDM and an SGSN, or between GDM and a GGSN.
Note | Because the debug gprs gtp-directorcommand generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following debug examples provide sample output for a create PDP context request, delete PDP context request, and clear PDP context using PPP regeneration on the GGSN. The first three examples show output related to debug events messaging only. The last three examples show output while both debug events and details are enabled on the GGSN.
Examples
The following example displays events related to PPP regeneration processing for a create PDP context requested received by the GGSN :
Router# debug gprs gtp-director events *Mar 1 00:02:42.787: GPRS:1111110000000000:Authen: PAP username: user@pdn.com *Mar 1 00:02:42.787: GPRS:1111110000000000:Processing Initiate PPP regen from reqQ *Mar 1 00:02:42.787: GPRS:1111110000000000:got event [REQUEST PPP REGEN] in state [IDLE] *Mar 1 00:02:42.787: GPRS:1111110000000000:state [IDLE->AUTHORIZING] on event [REQUEST PPP REGEN] *Mar 1 00:02:42.787: GPRS:1111110000000000:Got VPN authorization info *Mar 1 00:02:42.787: GPRS:1111110000000000:got event [AUTHOR SUCCESS] in state [AUTHORIZING] *Mar 1 00:02:42.787: GPRS:1111110000000000:state [AUTHORIZING->VPDN CONNECTING] on event [AUTHOR SUCCESS] *Mar 1 00:02:42.787: GPRS:1111110000000000:Author succeeded, establishing the tunnel *Mar 1 00:02:42.787: GPRS:1111110000000000:Create/Clone vaccess to negotiate PPP *Mar 1 00:02:42.791: GPRS:1111110000000000:MS no static IP addr. Get one via IPCP *Mar 1 00:02:42.827: GPRS:1111110000000000:VPDN to inform PPP regen: CONNECTED *Mar 1 00:02:42.827: GPRS:1111110000000000:got event [VPDN CONNECTED] in state [VPDN CONNECTING] *Mar 1 00:02:42.827: GPRS:1111110000000000:state [VPDN CONNECTING->PPP NEGOTIATING] on event [VPDN CONNECTED] *Mar 1 00:02:42.827: GPRS:1111110000000000:Start PPP negotiations on vaccess *Mar 1 00:02:42.831: %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up *Mar 1 00:02:42.835: GPRS:1111110000000000:IPCP is up *Mar 1 00:02:42.835: GPRS:1111110000000000:IP addr 10.10.1.187 is negotiated for MS *Mar 1 00:02:42.835: GPRS:1111110000000000:DNS - Primary: 10.3.0.1 Secondary: 0.0.0.0 NetBios - Primary: 0.0.0.0, Secondary: 0.0.0.0 *Mar 1 00:02:42.835: GPRS:1111110000000000:PPP connected *Mar 1 00:02:42.835: GPRS:1111110000000000:got event [PPP NEGOTIATED] in state [PPP NEGOTIATING] *Mar 1 00:02:42.835: GPRS:1111110000000000:state [PPP NEGOTIATING->PPP CONNECTED] on event [PPP NEGOTIATED] *Mar 1 00:02:42.835: GPRS:1111110000000000:PPP succeeded negotiation, session established *Mar 1 00:02:43.835: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up
Example 2
The following example displays events related to PPP regeneration processing for a delete PDP context requested received by the GGSN :
Router# debug gprs gtp-director events *Mar 1 00:03:18.331: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:03:18.331: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ *Mar 1 00:03:18.331: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:03:18.331: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:03:18.331: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:03:18.335: GPRS:1111110000000000:PPP down *Mar 1 00:03:18.335: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:03:18.339: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:03:18.339: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:03:18.339: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:03:18.339: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:03:18.339: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:03:18.339: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:03:18.339: GPRS:1111110000000000:Freeing context structure *Mar 1 00:03:18.339: %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down *Mar 1 00:03:19.331: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
Example 3
The following example displays events related to PPP regeneration processing as the GGSN clears a PDP context request :
Router# debug gprs gtp-director events *Mar 1 00:04:50.083: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:04:50.083: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ *Mar 1 00:04:50.083: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:04:50.083: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:04:50.083: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:04:50.087: GPRS:1111110000000000:PPP down *Mar 1 00:04:50.087: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:04:50.091: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:04:50.091: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:04:50.091: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:04:50.091: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:04:50.091: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:04:50.091: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:04:50.091: GPRS:1111110000000000:Freeing context structure *Mar 1 00:04:50.091: %LINK-3-UPDOWN: Interface Virtual-Access4, changed state to down *Mar 1 00:04:51.083: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access4, changed state to down
Example 4
The following example displays both debug events and details related to PPP regeneration processing for a create PDP context requested received by the GGSN :
Router# debug gprs gtp-director events Router# debug gprs gtp-director details *Mar 1 00:05:21.083: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:21.083: State[IDLE] counter is 0 *Mar 1 00:05:21.083: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.083: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.083: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.083: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.083: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.087: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.087: State[IDLE] counter is 1 *Mar 1 00:05:21.087: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.087: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.087: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.087: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.087: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.087: GPRS:1111110000000000:Authen: PAP username: user@pdn.com *Mar 1 00:05:21.087: GPRS:1111110000000000:Session timer started *Mar 1 00:05:21.087: GPRS:1111110000000000:Processing Initiate PPP regen from reqQ *Mar 1 00:05:21.087: GPRS:1111110000000000:got event [REQUEST PPP REGEN] in state [IDLE] *Mar 1 00:05:21.087: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.087: State[IDLE] counter is 0 *Mar 1 00:05:21.087: State[AUTHORIZING] counter is 1 *Mar 1 00:05:21.087: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.087: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.087: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.087: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.087: GPRS:1111110000000000:state [IDLE->AUTHORIZING] on event [REQUEST PPP REGEN] *Mar 1 00:05:21.087: GPRS:1111110000000000:Got VPN authorization info *Mar 1 00:05:21.087: GPRS:1111110000000000:got event [AUTHOR SUCCESS] in state [AUTHORIZING] *Mar 1 00:05:21.087: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.087: State[IDLE] counter is 0 *Mar 1 00:05:21.087: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.087: State[VPDN CONNECTING] counter is 1 *Mar 1 00:05:21.087: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:21.087: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.087: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.087: GPRS:1111110000000000:state [AUTHORIZING->VPDN CONNECTING] on event [AUTHOR SUCCESS] *Mar 1 00:05:21.087: GPRS:1111110000000000:Author succeeded, establishing the tunnel *Mar 1 00:05:21.087: GPRS:1111110000000000:Create/Clone vaccess to negotiate PPP *Mar 1 00:05:21.091: GPRS:1111110000000000:MS no static IP addr. Get one via IPCP *Mar 1 00:05:21.127: GPRS:1111110000000000:VPDN to inform PPP regen: CONNECTED *Mar 1 00:05:21.127: GPRS:1111110000000000:got event [VPDN CONNECTED] in state [VPDN CONNECTING] *Mar 1 00:05:21.127: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:21.127: State[IDLE] counter is 0 *Mar 1 00:05:21.127: State[AUTHORIZING] counter is 0 *Mar 1 00:05:21.127: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:21.127: State[PPP NEGOTIATING] counter is 1 *Mar 1 00:05:21.127: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:21.127: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:21.127: GPRS:1111110000000000:state [VPDN CONNECTING->PPP NEGOTIATING] on event [VPDN CONNECTED] *Mar 1 00:05:21.127: GPRS:1111110000000000:Start PPP negotiations on vaccess *Mar 1 00:05:21.131: %LINK-3-UPDOWN: Interface Virtual-Access5, changed state to up *Mar 1 00:05:22.135: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access5, changed state to up *Mar 1 00:05:23.143: GPRS:1111110000000000:IPCP is up *Mar 1 00:05:23.143: GPRS:1111110000000000:LNS allocates 10.10.1.187 for MS *Mar 1 00:05:23.143: GPRS:1111110000000000:IP addr 10.10.1.187 is negotiated for MS *Mar 1 00:05:23.143: GPRS:1111110000000000:DNS - Primary: 10.3.0.1 Secondary: 0.0.0.0 NetBios - Primary: 0.0.0.0, Secondary: 0.0.0.0 *Mar 1 00:05:23.143: GPRS:1111110000000000:PPP connected *Mar 1 00:05:23.143: GPRS:1111110000000000:got event [PPP NEGOTIATED] in state [PPP NEGOTIATING] *Mar 1 00:05:23.143: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:23.143: State[IDLE] counter is 0 *Mar 1 00:05:23.143: State[AUTHORIZING] counter is 0 *Mar 1 00:05:23.143: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:23.143: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:23.143: State[PPP CONNECTED] counter is 1 *Mar 1 00:05:23.143: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:23.143: GPRS:1111110000000000:state [PPP NEGOTIATING->PPP CONNECTED] on event [PPP NEGOTIATED] *Mar 1 00:05:23.143: GPRS:1111110000000000:PPP succeeded negotiation, session established *Mar 1 00:05:23.143: GPRS:1111110000000000:Session timer stopped
Example 5
The following example displays both debug events and details related to PPP regeneration processing for a delete PDP context requested received by the GGSN :
Router# debug gprs gtp-director events Router# debug gprs gtp-director details *Mar 1 00:05:52.399: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:52.399: State[IDLE] counter is 0 *Mar 1 00:05:52.399: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.399: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:52.399: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.399: State[PPP CONNECTED] counter is 1 *Mar 1 00:05:52.399: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:52.399: GPRS:1111110000000000:PPP regen current state PPP CONNECTED *Mar 1 00:05:52.399: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:05:52.399: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ *Mar 1 00:05:52.399: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:05:52.399: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:52.399: State[IDLE] counter is 0 *Mar 1 00:05:52.399: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.399: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:52.399: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.399: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:52.399: State[PPP TERMINATING] counter is 1 *Mar 1 00:05:52.399: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:05:52.399: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:05:52.403: GPRS:1111110000000000:PPP down *Mar 1 00:05:52.403: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:05:52.407: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:05:52.407: State[IDLE] counter is 1 *Mar 1 00:05:52.407: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.407: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:52.407: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.407: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:52.407: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:52.407: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:05:52.407: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:05:52.407: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:05:52.407: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:05:52.407: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:05:52.407: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:05:52.407: GPRS:1111110000000000:Freeing context structure *Mar 1 00:05:52.407: GPRS:1111110000000000:Session timer stopped *Mar 1 00:05:52.407: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:05:52.407: State[IDLE] counter is 0 *Mar 1 00:05:52.407: State[AUTHORIZING] counter is 0 *Mar 1 00:05:52.407: State[VPDN CONNECTING] counter is 0 *Mar 1 00:05:52.407: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:05:52.407: State[PPP CONNECTED] counter is 0 *Mar 1 00:05:52.407: State[PPP TERMINATING] counter is 0 *Mar 1 00:05:52.407: GPRS:1111110000000000:PPP regen context 0x6219F4BC released *Mar 1 00:05:52.407: GPRS:GTP-PPP-REGEN context magic(0x619D4FBC) invalid *Mar 1 00:05:52.407: %LINK-3-UPDOWN: Interface Virtual-Access5, changed state to down *Mar 1 00:05:53.399: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access5, changed state to down
Example 6
The following example displays both debug events and details related to PPP regeneration processing as the GGSN clears a PDP context request :
Router# debug gprs gtp-director events Router# debug gprs gtp-director details *Mar 1 00:06:34.907: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:06:34.907: State[IDLE] counter is 0 *Mar 1 00:06:34.907: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.907: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.907: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.907: State[PPP CONNECTED] counter is 1 *Mar 1 00:06:34.907: State[PPP TERMINATING] counter is 0 *Mar 1 00:06:34.907: GPRS:1111110000000000:PPP regen current state PPP CONNECTED *Mar 1 00:06:34.907: GPRS:1111110000000000:GTP disconnecting the PPP regen session *Mar 1 00:06:34.907: GPRS:1111110000000000:Processing Disconnect PPP regen from reqQ *Mar 1 00:06:34.907: GPRS:1111110000000000:got event [CANCEL REGEN'ED PPP] in state [PPP CONNECTED] *Mar 1 00:06:34.907: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:06:34.907: State[IDLE] counter is 0 *Mar 1 00:06:34.907: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.907: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.907: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.907: State[PPP CONNECTED] counter is 0 *Mar 1 00:06:34.907: State[PPP TERMINATING] counter is 1 *Mar 1 00:06:34.907: GPRS:1111110000000000:state [PPP CONNECTED->PPP TERMINATING] on event [CANCEL REGEN'ED PPP] *Mar 1 00:06:34.907: GPRS:1111110000000000:Cancel request after VPND tunnel is up *Mar 1 00:06:34.911: GPRS:1111110000000000:PPP down *Mar 1 00:06:34.911: GPRS:1111110000000000:got event [PPP FAILED] in state [PPP TERMINATING] *Mar 1 00:06:34.915: PPP-REGEN state counters: pending counter is 1 *Mar 1 00:06:34.915: State[IDLE] counter is 1 *Mar 1 00:06:34.915: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.915: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.915: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.915: State[PPP CONNECTED] counter is 0 *Mar 1 00:06:34.915: State[PPP TERMINATING] counter is 0 *Mar 1 00:06:34.915: GPRS:1111110000000000:state [PPP TERMINATING->IDLE] on event [PPP FAILED] *Mar 1 00:06:34.915: GPRS:1111110000000000:PPP failed negotiation *Mar 1 00:06:34.915: GPRS:1111110000000000:got event [CLEANUP CONTEXT] in state [IDLE] *Mar 1 00:06:34.915: GPRS:1111110000000000:VPDN to inform PPP regen: DISCONNECTED *Mar 1 00:06:34.915: GPRS:1111110000000000:got event [VPDN DISCONNECTED] in state [IDLE] *Mar 1 00:06:34.915: GPRS:1111110000000000:state [IDLE->IDLE] on event [CLEANUP CONTEXT] *Mar 1 00:06:34.915: GPRS:1111110000000000:Freeing context structure *Mar 1 00:06:34.915: GPRS:1111110000000000:Session timer stopped *Mar 1 00:06:34.915: PPP-REGEN state counters: pending counter is 0 *Mar 1 00:06:34.915: State[IDLE] counter is 0 *Mar 1 00:06:34.915: State[AUTHORIZING] counter is 0 *Mar 1 00:06:34.915: State[VPDN CONNECTING] counter is 0 *Mar 1 00:06:34.915: State[PPP NEGOTIATING] counter is 0 *Mar 1 00:06:34.915: State[PPP CONNECTED] counter is 0 *Mar 1 00:06:34.915: State[PPP TERMINATING] counter is 0 *Mar 1 00:06:34.915: GPRS:1111110000000000:PPP regen context 0x62196E10 released *Mar 1 00:06:34.915: GPRS:GTP-PPP-REGEN context magic(0x619D4FBC) invalid *Mar 1 00:06:34.915: %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down *Mar 1 00:06:35.907: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
debug gprs radius
To display information about Remote Access Dial-In User Service (RADIUS) processing on the GGSN, use the debug gprs radiusprivileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs radius
no debug gprs radius
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command History
Release |
Modification |
---|---|
12.2(4)MX |
This command was introduced. |
12.2(8)YD |
This command was incorporated in Cisco IOS Release 12.2(8)YD. |
12.2(8)YW |
This command was incorporated in Cisco IOS Release 12.2(8)YW. |
12.3(2)XB |
This command was incorporated in Cisco IOS Release 12.3(2)XB. |
12.3(8)XU |
This command was incorporated in Cisco IOS Release 12.3(8)XU. |
12.3(11)YJ |
This command was incorporated in Cisco IOS Release 12.3(11)YJ. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
Usage Guidelines
This command is useful for system operators and development engineers if problems are encountered with communication between a RADIUS server and the GGSN.
Note | Because the debug gprs radiuscommand generates a significant amount of output, use it only when traffic on the GPRS network is low, so other activity on the system is not adversely affected. |
Examples
The following example enables the display of debug messages related to RADIUS processing on the GGSN :
Router# debug gprs radius
debug gprs redundancy
To display debug messages, errors, events, or packets related to GTP session redundancy (GTP-SR), use the debug gprs redundancy privileged EXEC command. To disable debugging output, use the no form of this command.
debug gprs redundancy [ debug | errors | events | packets ]
no debug gprs redundancy [ debug | errors | events | packets ]
Syntax Description
debug |
Displays debug messages related to GTP-SR. |
errors |
Displays errors related to GTP-SR. |
events |
Displays events related to GTP-SR. |
packets |
Displays packets related to GTP-SR packets. |
Command Default
Disabled.
Command Modes
Global configuration (config)
Command History
Release |
Modification |
---|---|
12.3(11)YJ |
This command was introduced. |
12.3(14)YQ |
This command was incorporated in Cisco IOS Release 12.3(14)YQ. |
12.4(9)T |
This command was integrated into Cisco IOS Release 12.4(9)T. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command displays debug level messages, errors, events, or packets for GTP-SR. It is useful for system operators and development engineers if problems are encountered with communication between the two GGSNs configured as an redundant pair and on which GTP-SR is enabled.
Examples
Example 1
The following sample outputs is for a GGSN failover and switchover of Standby to Active. There is no PDP context involved in this debug collection.
Active GGSN:
Router-a#show gprs redundancy GPRS redundancy is enabled and Unit-Status is Standby Redundancy Transport Infrastructure status Redundancy Infrastructure state: STANDBY HOT Peer Redundancy Infrastructure state: ACTIVE GGSN Redundancy system up since: 21:29:21 EDT Aug 19 2000 Time of last switchover: never Total Number of Switchovers: 2 GPRS Redundancy Statistics Last cleared: never CheckPointed-From-Active Statistics Total Number of Messages: 129 Number of Context Setup messages: 19 Number of Context Modify messages: 3 Number of Context Remove messages: 19 Number of Path Setup messages: 34 Number of Path Modify messages: 5 Number of Path Remove messages: 34 Number of CGF Ready messages: 1 Number of CGF Modify messages: 0 Number of CGF Remove messages: 0 Number of Internal State messages: 7 Router-a#debug gprs redundancy GPRS CF packets debugging is on GPRS CF events debugging is on GPRS CF errors debugging is on GPRS CF debug debugging is on Router-a# Router-a# Router-a# MWAM 10/2: 000064: Jun 1 2006 18:19:00.975 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1100 Grp 51 state Standby -> Active MWAM 10/2: 000065: Jun 1 2006 18:19:00.975 EDT: GTP-SR: RF_Status=403-RF_STATUS_MAINTENANCE_ENABLE RFState=9-ACTIVE-FAST operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000066: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=200-RF_PROG_ACTIVE_FAST RFState=9-ACTIVE-FAST operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000067: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active Fast MWAM 10/2: 000068: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=201-RF_PROG_ACTIVE_DRAIN RFState=10-ACTIVE-DRAIN operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000069: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active Drain MWAM 10/2: 000070: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=202-RF_PROG_ACTIVE_PRECONFIG RFState=11-ACTIVE_PRECONFIG operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000071: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active PreConfig MWAM 10/2: 000072: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=203-RF_PROG_ACTIVE_POSTCONFIG RFState=12-ACTIVE_POSTCONFIG operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000073: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active PostConfig MWAM 10/2: 000074: Jun 1 2006 18:19:00.979 EDT: GTP-SR: RF_Event=204-RF_PROG_ACTIVE RFState=13-ACTIVE operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000075: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Received RF Progression Active MWAM 10/2: 000076: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Start of the Standby-to-Active transition MWAM 10/2: 000077: Jun 1 2006 18:19:00.979 EDT: GTP_SR: Old State Standby,Event Active Fast Received, New State Active MWAM 10/2: 000078: Jun 1 2006 18:19:00.979 EDT: GTP-SR:Context Type OWN, Handler Sync, Context Event OWN Ready, Context Sub Event No Sub Event MWAM 10/2: 000079: Jun 1 2006 18:19:00.979 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000080: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Event OWN Ready, Sub Event No Sub Event MWAM 10/2: 000081: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Removing element from state-list Initialized, final count 2 MWAM 10/2: 000082: Jun 1 2006 18:19:00.979 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000083: Jun 1 2006 18:19:00.979 EDT: GTP-SR:Context Type CGF, Handler Sync, Context Event CGF Ready, Context Sub Event No Sub Event MWAM 10/2: 000084: Jun 1 2006 18:19:00.979 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000085: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Event CGF Ready, Sub Event No Sub Event MWAM 10/2: 000086: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Removing element from state-list Initialized, final count 1 MWAM 10/2: 000087: Jun 1 2006 18:19:00.979 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 3 MWAM 10/2: 000088: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Invalid shdb 0x0 MWAM 10/2: 000089: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Transition CG 10.0.250.114 to (state 0) MWAM 10/2: 000090: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Invalid shdb 0x0 MWAM 10/2: 000091: Jun 1 2006 18:19:00.979 EDT: GTP-SR: Transition CG 10.0.250.115 to (state 0) MWAM 10/2: 000092: Jun 1 2006 18:19:00.983 EDT: GTP-SR: SHDB AVL tree cleanup to start in 10 sec MWAM 10/2: 000093: Jun 1 2006 18:19:00.983 EDT: GTP-SR: Completion of Standby-to-Active transition MWAM 10/2: 000094: Jun 1 2006 18:19:00.983 EDT: GTP-SR: Chkpt Status Flow Off Indication MWAM 10/2: 000095: Jun 1 2006 18:19:00.987 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.301 Grp 51 state Standby -> Active MWAM 10/2: 000096: Jun 1 2006 18:19:00.987 EDT: GTP-SR: RF_Status=400-RF_STATUS_PEER_PRESENCE RFState=13-ACTIVE operand=0 RFPeerState=13-ACTIVE MWAM 10/2: 000097: Jun 1 2006 18:19:00.987 EDT: GTP-SR: zero elements to move to other list MWAM 10/2: 000098: Jun 1 2006 18:19:00.987 EDT: GTP-SR: zero elements to move to other list MWAM 10/2: 000099: Jun 1 2006 18:19:00.987 EDT: GTP-SR: RF_Status=401-RF_STATUS_PEER_COMM RFState=13-ACTIVE operand=0 RFPeerState=1-DISABLED MWAM 10/2: 000100: Jun 1 2006 18:19:01.107 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1151 Grp 51 state Standby -> Active MWAM 10/2: 000101: Jun 1 2006 18:19:01.155 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.250 Grp 51 state Standby -> Active MWAM 10/2: 000102: Jun 1 2006 18:19:01.295 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1101 Grp 51 state Standby -> Active MWAM 10/2: 000103: Jun 1 2006 18:19:01.355 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1251 Grp 51 state Standby -> Active MWAM 10/2: 000104: Jun 1 2006 18:19:01.451 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.1201 Grp 51 state Standby -> Active MWAM 10/2: 000105: Jun 1 2006 18:19:01.459 EDT: %HSRP-6-STATECHANGE: GigabitEthernet0/0.220 Grp 51 state Standby -> Active Router-2# MWAM 10/2: 000106: Jun 1 2006 18:19:10.983 EDT: GTP-SR: SHDB AVL tree cleanup has 3 nodes removed, 0 leftover Router-a# Router-a# Router-a# MWAM 10/2: 000107: Jun 1 2006 18:20:25.947 EDT: GTP-SR: Chkpt Status Flow Off Indication MWAM 10/2: 000108: Jun 1 2006 18:20:25.947 EDT: GTP-SR: RF_Status=400-RF_STATUS_PEER_PRESENCE RFState=13-ACTIVE operand=1 RFPeerState=1-DISABLED MWAM 10/2: 000109: Jun 1 2006 18:20:25.947 EDT: GTP-SR: RF_Status=401-RF_STATUS_PEER_COMM RFState=13-ACTIVE operand=1 RFPeerState=1-DISABLED MWAM 10/2: 000110: Jun 1 2006 18:20:25.947 EDT: GTP-SR: RF_Event=300-RF_PROG_PLATFORM_SYNC RFState=13-ACTIVE operand=0 RFPeerState=0-UNKNOWN MWAM 10/2: 000111: Jun 1 2006 18:20:25.947 EDT: GTP-SR: Received RF Progression Platform Sync MWAM 10/2: 000112: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=102-RF_PROG_STANDBY_CONFIG RFState=13-ACTIVE operand=0 RFPeerState=5-STANDBY COLD-CONFIG MWAM 10/2: 000113: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Standby Config MWAM 10/2: 000114: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=103-RF_PROG_STANDBY_FILESYS RFState=13-ACTIVE operand=0 RFPeerState=6-STANDBY COLD-FILESYS MWAM 10/2: 000115: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Stadnby Filesys MWAM 10/2: 000116: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=104-RF_PROG_STANDBY_BULK RFState=13-ACTIVE operand=0 RFPeerState=7-STANDBY COLD-BULK MWAM 10/2: 000117: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Standby Bulk MWAM 10/2: 000118: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Active GGSN sending Bulk Sync finished Msg MWAM 10/2: 000119: Jun 1 2006 18:20:53.899 EDT: GTP-SR: packing csg_path vaddr: 10.0.250.91 MWAM 10/2: 000120: Jun 1 2006 18:20:53.899 EDT: GTP-SR: packing csg_path port: 4386 MWAM 10/2: 000121: Jun 1 2006 18:20:53.899 EDT: GTP-SR: packing csg_path state: 1 MWAM 10/2: 000122: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000123: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000124: Jun 1 2006 18:20:53.899 EDT: GTP-SR: adding element in state-list Synched, final count 1 MWAM 10/2: 000125: Jun 1 2006 18:20:53.899 EDT: GTP-SR: sync next charging id 0x1C0AA436, local rsn 0x6B76EBDE MWAM 10/2: 000126: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Packing Pair Boot time 21:29:21 EDT Aug 19 2000 MWAM 10/2: 000127: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Packing Switcover Count 3 MWAM 10/2: 000128: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Packing local restart_count 21 MWAM 10/2: 000129: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000130: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 1 MWAM 10/2: 000131: Jun 1 2006 18:20:53.899 EDT: GTP-SR: adding element in state-list Synched, final count 2 MWAM 10/2: 000132: Jun 1 2006 18:20:53.899 EDT: GTP-SR: sync cgf gw 10.0.250.114, operatemode NOT ACTIVE, nextseq 0x7530 MWAM 10/2: 000133: Jun 1 2006 18:20:53.899 EDT: GTP-SR: sync cgf gw 10.0.250.115, operatemode NOT ACTIVE, nextseq 0x7530 MWAM 10/2: 000134: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000135: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 0 MWAM 10/2: 000136: Jun 1 2006 18:20:53.899 EDT: GTP-SR: adding element in state-list Synched, final count 3 MWAM 10/2: 000137: Jun 1 2006 18:20:53.899 EDT: GTP-SR:Active took time of 0 msec to transfer data for bulk sync MWAM 10/2: 000138: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Empty list to sync MWAM 10/2: 000139: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Redundancy RF Event Received is Standby Bulk Sync End MWAM 10/2: 000140: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Redundancy Event is Invalid MWAM 10/2: 000141: Jun 1 2006 18:20:53.899 EDT: GTP-SR: RF_Event=105-RF_PROG_STANDBY_HOT RFState=13-ACTIVE operand=0 RFPeerState=8-STANDBY HOT MWAM 10/2: 000142: Jun 1 2006 18:20:53.899 EDT: GTP-SR: Received RF Progression Standby Hot Router-b Router-b#show gprs redundancy GPRS redundancy is enabled and Unit-Status is Active Redundancy Transport Infrastructure status Redundancy Infrastructure state: ACTIVE Peer Redundancy Infrastructure state: STANDBY HOT GGSN Redundancy system up since: 21:29:21 EDT Aug 19 2000 Time of last switchover: Total Number of Switchovers: 3 GPRS Redundancy Statistics Last cleared: never CheckPointed-To-Standby Statistics Total Number of Messages: 3 Number of Context Setup messages: 0 Number of Context Modify messages: 0 Number of Context Remove messages: 0 Number of Path Setup messages: 0 Number of Path Modify messages: 0 Number of Path Remove messages: 0 Number of CGF Ready messages: 1 Number of CGF Modify messages: 0 Number of CGF Remove messages: 0 Number of Internal State messages: 1
Examples
The following sample outputs is for PDP context setup, prepaid user traffic, and then PDP context teardown. The debug is given for both Active and Standby GGSN. There is no GGSN switchover.
Active GGSN:
Router-a#debug gprs redundancy GPRS CF packets debugging is on GPRS CF events debugging is on GPRS CF errors debugging is on GPRS CF debug debugging is on Router-a#show gprs redundancy GPRS redundancy is enabled and Unit-Status is Active Redundancy Transport Infrastructure status Redundancy Infrastructure state: ACTIVE Peer Redundancy Infrastructure state: STANDBY HOT GGSN Redundancy system up since: 21:29:21 EDT Aug 19 2000 Time of last switchover: Total Number of Switchovers: 4 GPRS Redundancy Statistics Last cleared: never CheckPointed-To-Standby Statistics Total Number of Messages: 3 Number of Context Setup messages: 0 Number of Context Modify messages: 0 Number of Context Remove messages: 0 Number of Path Setup messages: 0 Number of Path Modify messages: 0 Number of Path Remove messages: 0 Number of CGF Ready messages: 1 Number of CGF Modify messages: 0 Number of CGF Remove messages: 0 Number of Internal State messages: 1 Router-a# MWAM 10/2: 000073: Aug 24 2000 23:18:55.947 EDT: GTP-SR:pdpmcb handle for pdpmcb (0x24D2FC3C) is (0x3A000001) MWAM 10/2: 000074: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000075: Aug 24 2000 23:18:55.963 EDT: GTP-SR: adding element in state-list Initialized, final count 2 MWAM 10/2: 000076: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000077: Aug 24 2000 23:18:55.963 EDT: GTP-SR: adding element in state-list Initialized, final count 3 MWAM 10/2: 000078: Aug 24 2000 23:18:55.963 EDT: GTP-SR:Context Type Path, Handler Sync, Context Event Path Setup, Context Sub Event No Sub Event MWAM 10/2: 000079: Aug 24 2000 23:18:55.963 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000080: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Event Path Setup, Sub Event No Sub Event MWAM 10/2: 000081: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Removing element from state-list Initialized, final count 2 MWAM 10/2: 000082: Aug 24 2000 23:18:55.963 EDT: GTP-SR: adding element in state-list Dynamic Sync Ready, final count 1 MWAM 10/2: 000083: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000084: Aug 24 2000 23:18:55.963 EDT: GTP-SR: adding element in state-list Initialized, final count 3 MWAM 10/2: 000085: Aug 24 2000 23:18:55.963 EDT: GTP-SR:Context Type Path, Handler Sync, Context Event Path Setup, Context Sub Event No Sub Event MWAM 10/2: 000086: Aug 24 2000 23:18:55.963 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000087: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Event Path Setup, Sub Event No Sub Event MWAM 10/2: 000088: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Removing element from state-list Initialized, final count 2 MWAM 10/2: 000089: Aug 24 2000 23:18:55.963 EDT: GTP-SR: adding element in state-list Dynamic Sync Ready, final count 2 MWAM 10/2: 000090: Aug 24 2000 23:18:55.963 EDT: GTP-SR:packing pathcb->gtpv 1 MWAM 10/2: 000091: Aug 24 2000 23:18:55.963 EDT: GTP-SR:Local IP address 166.11.0.11, and port 2123 MWAM 10/2: 000092: Aug 24 2000 23:18:55.963 EDT: GTP-SR:Remote IP address 10.10.50.3, and port 2123 MWAM 10/2: 000093: Aug 24 2000 23:18:55.963 EDT: GTP-SR:packing pathcb->num_data_socks 0 MWAM 10/2: 000094: Aug 24 2000 23:18:55.963 EDT: GTP-SR:packing pathcb->flags 9 MWAM 10/2: 000095: Aug 24 2000 23:18:55.963 EDT: GTP-SR:packing pathcb->restart_count_remote 1 MWAM 10/2: 000096: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Different lengths during path create: allowed: 63, packed: 23 MWAM 10/2: 000097: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000098: Aug 24 2000 23:18:55.963 EDT: GTP-SR: Removing element from state-list Dynamic Sync Ready, final count 1 MWAM 10/2: 000099: Aug 24 2000 23:18:55.963 EDT: GTP-SR: adding element in state-list Synched, final count 4 MWAM 10/2: 000100: Aug 24 2000 23:18:55.963 EDT: GTP-SR:packing pathcb->gtpv 1 MWAM 10/2: 000101: Aug 24 2000 23:18:55.963 EDT: GTP-SR:Local IP address 166.11.0.11, and port 2152 MWAM 10/2: 000102: Aug 24 2000 23:18:55.963 EDT: GTP-SR:Remote IP address 10.10.50.3, and port 2152 MWAM 10/2: 000103: Aug 24 2000 23:18:55.967 EDT: GTP-SR:packing pathcb->num_data_socks 0 MWAM 10/2: 000104: Aug 24 2000 23:18:55.967 EDT: GTP-SR:packing pathcb->flags 8 MWAM 10/2: 000105: Aug 24 2000 23:18:55.967 EDT: GTP-SR:packing pathcb->restart_count_remote 0 MWAM 10/2: 000106: Aug 24 2000 23:18:55.967 EDT: GTP-SR: Different lengths during path create: allowed: 63, packed: 23 MWAM 10/2: 000107: Aug 24 2000 23:18:55.967 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000108: Aug 24 2000 23:18:55.967 EDT: GTP-SR: Removing element from state-list Dynamic Sync Ready, final count 0 MWAM 10/2: 000109: Aug 24 2000 23:18:55.967 EDT: GTP-SR: adding element in state-list Synched, final count 5 MWAM 10/2: 000110: Aug 24 2000 23:18:55.967 EDT: GTP-SR: Empty list to sync MWAM 10/2: 000111: Aug 24 2000 23:18:55.967 EDT: GTP-SR: Empty list to sync MWAM 10/2: 000112: Aug 24 2000 23:19:01.583 EDT: GTP-SR: Creating red context for category ID 4 username 100000000000000 on APN ms-apn MWAM 10/2: 000113: Aug 24 2000 23:19:01.583 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000114: Aug 24 2000 23:19:01.583 EDT: GTP-SR: adding element in state-list Initialized, final count 3 MWAM 10/2: 000115: Aug 24 2000 23:19:01.583 EDT: GTP-SR: Removing element from state-list Initialized, final count 2 MWAM 10/2: 000116: Aug 24 2000 23:19:01.583 EDT: GTP-SR: adding element in state-list Synched, final count 6 MWAM 10/2: 000117: Aug 24 2000 23:19:01.583 EDT: GPRS:0100000000000050:shdb 0x95000008 created for category 4 (handle 0xD0000001) MWAM 10/2: 000118: Aug 24 2000 23:19:01.591 EDT: GTP-SR: Don't checkpoint QP4QR Clear for Create/Update after a Quota Push Resp MWAM 10/2: 000119: Aug 24 2000 23:19:01.591 EDT: GTP-SR:Context Type PDP, Handler Sync, Context Event Context Setup, Context Sub Event No Sub Event MWAM 10/2: 000120: Aug 24 2000 23:19:01.591 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000121: Aug 24 2000 23:19:01.591 EDT: GTP-SR: Event Context Setup, Sub Event No Sub Event MWAM 10/2: 000122: Aug 24 2000 23:19:01.591 EDT: GTP-SR: Removing element from state-list Initialized, final count 1 MWAM 10/2: 000123: Aug 24 2000 23:19:01.591 EDT: GTP-SR: adding element in state-list Dynamic Sync Ready, final count 1 MWAM 10/2: 000124: Aug 24 2000 23:19:01.591 EDT: GTP-SR: for pdpmcb: 221 bytes to be packed MWAM 10/2: 000125: Aug 24 2000 23:19:01.591 EDT: GTP-SR: pdpmcb bitmap = 14346 MWAM 10/2: 000126: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->user-name 91100000000000000 MWAM 10/2: 000127: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->msisdn 9101000000000000F000 MWAM 10/2: 000128: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->selection_mode 0 MWAM 10/2: 000129: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->remove_staticIP 0 MWAM 10/2: 000130: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->llcframenum 0 MWAM 10/2: 000131: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->idle_timeout 3600 MWAM 10/2: 000132: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->session_timeout 0 MWAM 10/2: 000133: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpmcb_handle 973078529 MWAM 10/2: 000134: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->shdb 2080374789 MWAM 10/2: 000135: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing apn_name ms-apn MWAM 10/2: 000136: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing apnvalue ms-apn MWAM 10/2: 000137: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->teid 4194305 MWAM 10/2: 000138: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->imsi 01000000000000F0 MWAM 10/2: 000139: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.static_addr_allocated 0 MWAM 10/2: 000140: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.dynamic_addr_allocated 1 MWAM 10/2: 000141: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.dynamic_addr_requested 1 MWAM 10/2: 000142: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.addr_source 3 MWAM 10/2: 000143: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.allocated_prefix_len 16 MWAM 10/2: 000144: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.aggregate_prefix_len 16 MWAM 10/2: 000145: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.pdp_type_org 1 MWAM 10/2: 000146: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.pdp_type_num 33 MWAM 10/2: 000147: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->pdpaddr.addrlen 6 MWAM 10/2: 000148: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb-ggsn_addr_si 166.11.0.11 MWAM 10/2: 000149: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb-ggsn_addr_data 166.11.0.11 MWAM 10/2: 000150: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpmcb->msisdn_len 9nGTP-SR:packing aaa charging profile index -1, MWAM 10/2: 000151: Aug 24 2000 23:19:01.591 EDT: GTP-SR:pdpmcb encoded len_t 0 MWAM 10/2: 000152: Aug 24 2000 23:19:01.591 EDT: GTP-SR: pdpcb bitmap = 0 MWAM 10/2: 000153: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_cntl_remote 1 MWAM 10/2: 000154: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_local 4194306 MWAM 10/2: 000155: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_remote 1000 MWAM 10/2: 000156: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->tid 0100000000000050 MWAM 10/2: 000157: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing naspi = 5 MWAM 10/2: 000158: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->internal_flags 9175041 MWAM 10/2: 000159: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->mnrgflag 0 MWAM 10/2: 000160: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->open_cdr_sent 0 MWAM 10/2: 000161: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->charging_reserved 0 MWAM 10/2: 000162: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->pri 1 MWAM 10/2: 000163: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fastswitchable 0 MWAM 10/2: 000164: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb-sgsn_addr_sig 10.10.50.3 MWAM 10/2: 000165: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb-sgsn_addr_data 10.10.50.3 MWAM 10/2: 000166: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->sequence_sig 1 MWAM 10/2: 000167: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_sig_up 0 MWAM 10/2: 000168: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_data1_up 0 MWAM 10/2: 000169: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_sig_down 0 MWAM 10/2: 000170: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_data1_down 0 MWAM 10/2: 000171: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->fl_data2 0 MWAM 10/2: 000172: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->cause 128 MWAM 10/2: 000173: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->restart_count 0 MWAM 10/2: 000174: Aug 24 2000 23:19:01.591 EDT: GTP-SR: packing pdpcb->create_time Aug 24 2000 23:18:56 MWAM 10/2: 000175: Aug 24 2000 23:19:01.591 EDT: GTP-SR: packing pdpcb->last_access_time Aug 24 2000 23:18:56 MWAM 10/2: 000176: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->gtpv1_qos_req.qos_profile 152109353l MWAM 10/2: 000177: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->gtpv1_qos_neg.qos_profile 152109353l MWAM 10/2: 000178: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_cntl_remote 1 MWAM 10/2: 000179: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_local 4194306 MWAM 10/2: 000180: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->teid_data_remote 1000 MWAM 10/2: 000181: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->charging_id 471179447 MWAM 10/2: 000182: Aug 24 2000 23:19:01.591 EDT: GTP-SR:packing pdpcb->cdr_recseqnum 0 MWAM 10/2: 000183: Aug 24 2000 23:19:01.591 EDT: GTP-SR: packing of pdpcb->reorder_required FF MWAM 10/2: 000184: Aug 24 2000 23:19:01.591 EDT: GPRS:0100000000000050: GTP-SR: Successfully pack PDP MWAM 10/2: 000185: Aug 24 2000 23:19:01.591 EDT: GTP-SR: rulebase ID MS packed MWAM 10/2: 000186: Aug 24 2000 23:19:01.591 EDT: GTP-SR: cc_session ccfh 0 failover_supported 1 reqnum 1 packed MWAM 10/2: 000187: Aug 24 2000 23:19:01.591 EDT: GTP-SR: cc_session dest_host ips-clcis1.cisco.com dest_realm cisco.com packed MWAM 10/2: 000188: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category ID 4 packed: MWAM 10/2: 000189: Aug 24 2000 23:19:01.591 EDT: GTP-SR: sync data len 164 MWAM 10/2: 000190: Aug 24 2000 23:19:01.591 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000191: Aug 24 2000 23:19:01.591 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000192: Aug 24 2000 23:19:01.591 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000193: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category state AUTHORIZED MWAM 10/2: 000194: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000195: Aug 24 2000 23:19:01.591 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000196: Aug 24 2000 23:19:01.591 EDT: GTP-SR: sync flag 0x0 MWAM 10/2: 000197: Aug 24 2000 23:19:01.591 EDT: GTP-SR: quotas included MWAM 10/2: 000198: Aug 24 2000 23:19:01.591 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000199: Aug 24 2000 23:19:01.591 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000200: Aug 24 2000 23:19:01.595 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000201: Aug 24 2000 23:19:01.595 EDT: GTP-SR: Removing element from state-list Dynamic Sync Ready, final count 0 MWAM 10/2: 000202: Aug 24 2000 23:19:01.595 EDT: GTP-SR: adding element in state-list Synched, final count 7 MWAM 10/2: 000203: Aug 24 2000 23:19:01.595 EDT: GTP-SR: Empty list to sync MWAM 10/2: 000204: Aug 24 2000 23:19:03.939 EDT: GTP-SR:Context Type PDP, Handler Sync, Context Event Context Setup, Context Sub Event No Sub Event MWAM 10/2: 000205: Aug 24 2000 23:19:03.939 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000206: Aug 24 2000 23:19:03.939 EDT: GTP-SR: Event Context Setup, Sub Event No Sub Event MWAM 10/2: 000207: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Checkpoint SGSN init deletion via a category before final MCB deletion MWAM 10/2: 000208: Aug 24 2000 23:19:04.463 EDT: GTP-SR:Context Type Category, Handler Update, Context Event Category update, Context Sub Event No Sub Event MWAM 10/2: 000209: Aug 24 2000 23:19:04.463 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000210: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Event Category update, Sub Event No Sub Event MWAM 10/2: 000211: Aug 24 2000 23:19:04.463 EDT: GTP-SR: MCB internal flags 0x5802 packed MWAM 10/2: 000212: Aug 24 2000 23:19:04.463 EDT: GTP-SR: cc_session reqnum 1 packed MWAM 10/2: 000213: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category ID 4 packed: MWAM 10/2: 000214: Aug 24 2000 23:19:04.463 EDT: GTP-SR: sync data len 52 MWAM 10/2: 000215: Aug 24 2000 23:19:04.463 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000216: Aug 24 2000 23:19:04.463 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000217: Aug 24 2000 23:19:04.463 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000218: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category state PENDING_SERVICE_STOP MWAM 10/2: 000219: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000220: Aug 24 2000 23:19:04.463 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000221: Aug 24 2000 23:19:04.463 EDT: GTP-SR: sync flag 0xA MWAM 10/2: 000222: Aug 24 2000 23:19:04.463 EDT: GTP-SR: quotas not included MWAM 10/2: 000223: Aug 24 2000 23:19:04.463 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000224: Aug 24 2000 23:19:04.463 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000225: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Different lengths during category sync: allowed 188, packed 56 MWAM 10/2: 000226: Aug 24 2000 23:19:04.463 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000227: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Checkpoint final MCB deletion after sending a CCR Final MWAM 10/2: 000228: Aug 24 2000 23:19:04.467 EDT: GTP-SR:Context Type PDP, Handler Delete, Context Event Context Remove, Context Sub Event No Sub Event MWAM 10/2: 000229: Aug 24 2000 23:19:04.467 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000230: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Event Context Remove, Sub Event No Sub Event MWAM 10/2: 000231: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Checkpoint final MCB deletion MWAM 10/2: 000232: Aug 24 2000 23:19:04.467 EDT: GTP-SR:Context Type PDP, Handler Delete, Context Event Context Remove, Context Sub Event No Sub Event MWAM 10/2: 000233: Aug 24 2000 23:19:04.467 EDT: GTP-SR:State of Redundancy Context is Synched MWAM 10/2: 000234: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Event Context Remove, Sub Event No Sub Event MWAM 10/2: 000235: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Different lengths during PDP delete: allowed: 40, packed: 0 MWAM 10/2: 000236: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Ckpt Message was sucessfully sent MWAM 10/2: 000237: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Removing element from state-list Synched, final count 6 MWAM 10/2: 000238: Aug 24 2000 23:19:04.467 EDT: GTP-SR: adding element in state-list Delete, final count 1 MWAM 10/2: 000239: Aug 24 2000 23:19:04.467 EDT: GTP-SR: Removing element from state-list Delete, final count 0 MWAM 10/2: 000240: Aug 24 2000 23:19:04.467 EDT: GTP-SR: No redundancy context for sending a down event to standby MWAM 10/2: 000241: Aug 24 2000 23:19:04.471 EDT: GTP-SR: Removing element from state-list Synched, final count 5 Router-a# Router-a#
Standby GGSN:
Router-b#debug gprs redundancy GPRS CF packets debugging is on GPRS CF events debugging is on GPRS CF errors debugging is on GPRS CF debug debugging is on Router-b#sh gprs redun GPRS redundancy is enabled and Unit-Status is Standby Redundancy Transport Infrastructure status Redundancy Infrastructure state: STANDBY HOT Peer Redundancy Infrastructure state: ACTIVE GGSN Redundancy system up since: 21:29:21 EDT Aug 19 2000 Time of last switchover: never Total Number of Switchovers: 4 GPRS Redundancy Statistics Last cleared: never CheckPointed-From-Active Statistics Total Number of Messages: 3 Number of Context Setup messages: 0 Number of Context Modify messages: 0 Number of Context Remove messages: 0 Number of Path Setup messages: 0 Number of Path Modify messages: 0 Number of Path Remove messages: 0 Number of CGF Ready messages: 1 Number of CGF Modify messages: 0 Number of CGF Remove messages: 0 Number of Internal State messages: 1 Router-b# MWAM 10/2: 000065: Jun 1 2006 18:28:06.591 EDT: GTP-SR: Redundancy RF Event Received is Create Redundancy Context MWAM 10/2: 000066: Jun 1 2006 18:28:06.591 EDT: GTP-SR: Redundancy Event is Path Setup MWAM 10/2: 000067: Jun 1 2006 18:28:06.591 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000068: Jun 1 2006 18:28:06.591 EDT: GTP-SR: adding element in state-list Initialized, final count 4 MWAM 10/2: 000069: Jun 1 2006 18:28:06.591 EDT: GTP-SR Packet Dump: Len for dump: org_len=63, len=63 MWAM 10/2: 000070: Jun 1 2006 18:28:06.591 EDT: 1 0 0 0 0 0 0 0 9 1 A6 B 0 B 8 4B MWAM 10/2: 000071: Jun 1 2006 18:28:06.591 EDT: A A 32 3 8 4B 1 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000072: Jun 1 2006 18:28:06.591 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000073: Jun 1 2006 18:28:06.595 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000074: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->gtpv 1 MWAM 10/2: 000075: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Local IP address 166.11.0.11, and port 2123 MWAM 10/2: 000076: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Remote IP address 10.10.50.3, and port 2123 MWAM 10/2: 000077: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->num_data_socks 0 MWAM 10/2: 000078: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->flags 9 MWAM 10/2: 000079: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing restart_count_remote 1 MWAM 10/2: 000080: Jun 1 2006 18:28:06.595 EDT: GTP-SR:Context Type Path, Handler Sync, Context Event Path Setup, Context Sub Event No Sub Event MWAM 10/2: 000081: Jun 1 2006 18:28:06.595 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000082: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Event Path Setup, Sub Event No Sub Event MWAM 10/2: 000083: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Removing element from state-list Initialized, final count 3 MWAM 10/2: 000084: Jun 1 2006 18:28:06.595 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000085: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Redundancy RF Event Received is Create Redundancy Context MWAM 10/2: 000086: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Redundancy Event is Path Setup MWAM 10/2: 000087: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000088: Jun 1 2006 18:28:06.595 EDT: GTP-SR: adding element in state-list Initialized, final count 4 MWAM 10/2: 000089: Jun 1 2006 18:28:06.595 EDT: GTP-SR Packet Dump: Len for dump: org_len=63, len=63 MWAM 10/2: 000090: Jun 1 2006 18:28:06.595 EDT: 1 0 0 0 0 0 0 0 8 1 A6 B 0 B 8 68 MWAM 10/2: 000091: Jun 1 2006 18:28:06.595 EDT: A A 32 3 8 68 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000092: Jun 1 2006 18:28:06.595 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000093: Jun 1 2006 18:28:06.595 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000094: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->gtpv 1 MWAM 10/2: 000095: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Local IP address 166.11.0.11, and port 2152 MWAM 10/2: 000096: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Remote IP address 10.10.50.3, and port 2152 MWAM 10/2: 000097: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->num_data_socks 0 MWAM 10/2: 000098: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing u_path->flags 8 MWAM 10/2: 000099: Jun 1 2006 18:28:06.595 EDT: GTP-SR: un-packing restart_count_remote 0 MWAM 10/2: 000100: Jun 1 2006 18:28:06.595 EDT: GTP-SR:Context Type Path, Handler Sync, Context Event Path Setup, Context Sub Event No Sub Event MWAM 10/2: 000101: Jun 1 2006 18:28:06.595 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000102: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Event Path Setup, Sub Event No Sub Event MWAM 10/2: 000103: Jun 1 2006 18:28:06.595 EDT: GTP-SR: Removing element from state-list Initialized, final count 3 MWAM 10/2: 000104: Jun 1 2006 18:28:06.595 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 3 MWAM 10/2: 000105: Jun 1 2006 18:28:12.223 EDT: GTP-SR: Redundancy RF Event Received is Create Redundancy Context MWAM 10/2: 000106: Jun 1 2006 18:28:12.223 EDT: GTP-SR: Redundancy Event is Context Setup MWAM 10/2: 000107: Jun 1 2006 18:28:12.223 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000108: Jun 1 2006 18:28:12.223 EDT: GTP-SR: adding element in state-list Initialized, final count 4 MWAM 10/2: 000109: Jun 1 2006 18:28:12.223 EDT: GTP-SR Packet Dump: Len for dump: org_len=755, len=128 MWAM 10/2: 000110: Jun 1 2006 18:28:12.223 EDT: 1 1 39 31 31 30 30 30 30 30 30 30 30 30 30 30 MWAM 10/2: 000111: Jun 1 2006 18:28:12.223 EDT: 30 30 30 0 0 0 0 91 1 0 0 0 0 0 0 F0 MWAM 10/2: 000112: Jun 1 2006 18:28:12.223 EDT: 0 0 0 0 0 0 E 10 0 0 0 0 0 0 0 0 MWAM 10/2: 000113: Jun 1 2006 18:28:12.223 EDT: C0 23 1 8 5 63 69 73 63 6F 31 31 31 63 69 73 MWAM 10/2: 000114: Jun 1 2006 18:28:12.227 EDT: 63 6F 0 7C 0 0 5 0 0 8 0 0 0 0 0 0 MWAM 10/2: 000115: Jun 1 2006 18:28:12.227 EDT: 0 0 0 40 0 1 1 0 0 0 0 0 0 F0 B 1 MWAM 10/2: 000116: Jun 1 2006 18:28:12.227 EDT: 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000117: Jun 1 2006 18:28:12.227 EDT: 0 0 0 1 1 0 0 0 3 10 10 1 21 0 6 0 MWAM 10/2: 000118: Jun 1 2006 18:28:12.227 EDT: ... MWAM 10/2: 000119: Jun 1 2006 18:28:12.231 EDT: GTP-SR:pdpmcb handle for pdpmcb (0x24AA0CCC) is (0x41000001) MWAM 10/2: 000120: Jun 1 2006 18:28:12.231 EDT: GTP-SR: un-packing # of PDPs packed = 1 MWAM 10/2: 000121: Jun 1 2006 18:28:12.231 EDT: GTP-SR: un-packing pdpmcb->user-name 91100000000000000 MWAM 10/2: 000122: Jun 1 2006 18:28:12.231 EDT: GTP-SR: un-packing pdpmcb->msisdn 9101000000000000F000 MWAM 10/2: 000123: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->selection_mode 0 MWAM 10/2: 000124: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->remove_staticIP 0 MWAM 10/2: 000125: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->llcframenum 0 MWAM 10/2: 000126: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->idle_timeout 3600 MWAM 10/2: 000127: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->session_timeout 0 MWAM 10/2: 000128: Jun 1 2006 18:28:12.235 EDT: GTP-SR: pdpmcb bitmap = 30730 MWAM 10/2: 000129: Jun 1 2006 18:28:12.235 EDT: GTP-SR: apn name is ms-apn MWAM 10/2: 000130: Jun 1 2006 18:28:12.235 EDT: GTP-SR: packing pdpmcb->teid 4194305 MWAM 10/2: 000131: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->imsi 01000000000000F0 MWAM 10/2: 000132: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.pdp_addr 11.1.0.1 MWAM 10/2: 000133: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.static_addr_allocated 0 MWAM 10/2: 000134: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.dynamic_addr_allocated 1 MWAM 10/2: 000135: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.dynamic_addr_requested 1 MWAM 10/2: 000136: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.addr_source 3 MWAM 10/2: 000137: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.allocated_prefix_len 16 MWAM 10/2: 000138: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.aggregate_prefix_len 16 MWAM 10/2: 000139: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.pdp_type_org 1 MWAM 10/2: 000140: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.pdp_type_num 33 MWAM 10/2: 000141: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.addrlen 6 MWAM 10/2: 000142: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->pdpaddr.dhcp_addr 0.0.0.0 MWAM 10/2: 000143: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb-ggsn_addr_si 166.11.0.11 MWAM 10/2: 000144: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb-ggsn_addr_data 166.11.0.11 MWAM 10/2: 000145: Jun 1 2006 18:28:12.235 EDT: GTP-SR: un-packing pdpmcb->msisdn_len 9 MWAM 10/2: 000146: Jun 1 2006 18:28:12.247 EDT: GTP-SR: Got teid=4194305, as requested MWAM 10/2: 000147: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb->gtpv1_qos_req.qos_profile 152109353l MWAM 10/2: 000148: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb->gtpv1_qos_neg.qos_profile 152109353l MWAM 10/2: 000149: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb bitmap = 0 MWAM 10/2: 000150: Jun 1 2006 18:28:12.247 EDT: GTP-SR: un-packing pdpcb->tid0100000000000050 MWAM 10/2: 000151: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing nsapi = 5 MWAM 10/2: 000152: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->internal_flags 9175041 MWAM 10/2: 000153: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->mnrgflag 0 MWAM 10/2: 000154: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->open_cdr_sent 0 MWAM 10/2: 000155: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->charging_reserved 0 MWAM 10/2: 000156: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->pri 1 MWAM 10/2: 000157: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb->fastswitchable 0 MWAM 10/2: 000158: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb-sgsn_addr_sig 10.10.50.3 MWAM 10/2: 000159: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing pdpcb-sgsn_addr_data 10.10.50.3 MWAM 10/2: 000160: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->sequence_sig 1 MWAM 10/2: 000161: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_sig_up 0 MWAM 10/2: 000162: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_data1_up 0 MWAM 10/2: 000163: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_sig_down 0 MWAM 10/2: 000164: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_data1_down 0 MWAM 10/2: 000165: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->fl_data2 0 MWAM 10/2: 000166: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->cause 128 MWAM 10/2: 000167: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->restart_count 0 MWAM 10/2: 000168: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->create_time Apr 13 2006 01:25:25 MWAM 10/2: 000169: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->last_access_time Apr 13 2006 01:25:25 MWAM 10/2: 000170: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->teid_cntl_remote 1 MWAM 10/2: 000171: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->teid_data_local 4194306 MWAM 10/2: 000172: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->teid_data_remote 1000 MWAM 10/2: 000173: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->charging_id 471179447 MWAM 10/2: 000174: Jun 1 2006 18:28:12.251 EDT: GTP-SR: unpacking pdpcb->cdr_recseqnum 0 MWAM 10/2: 000175: Jun 1 2006 18:28:12.251 EDT: GTP-SR: un-packing of pdpcb->reorder_required FF MWAM 10/2: 000176: Jun 1 2006 18:28:12.251 EDT: GTP-SR: We wanted teid 4194306, and got 4194306 MWAM 10/2: 000177: Jun 1 2006 18:28:12.251 EDT: GTP-SR: Got teid 4194306 as requested MWAM 10/2: 000178: Jun 1 2006 18:28:12.251 EDT: pdp_create_by_tid on standby:tid 100000050, pdp 24A90B24 MWAM 10/2: 000179: Jun 1 2006 18:28:12.251 EDT: GPRS:0100000000000050: GTP-SR: Successfully unpack PDP MWAM 10/2: 000180: Jun 1 2006 18:28:12.251 EDT: GTP-SR: rulebase ID MS unpacked MWAM 10/2: 000181: Jun 1 2006 18:28:12.251 EDT: GTP-SR: cc_session ccfh 0 failover_supported 1 reqnum 1 packed MWAM 10/2: 000182: Jun 1 2006 18:28:12.251 EDT: GTP-SR: new cc_session dest_host ips-clcis1.cisco.com unpacked MWAM 10/2: 000183: Jun 1 2006 18:28:12.251 EDT: GTP-SR: new cc_session dest_realm cisco.com unpacked MWAM 10/2: 000184: Jun 1 2006 18:28:12.251 EDT: GTP-SR: Unpacking 1 categories MWAM 10/2: 000185: Jun 1 2006 18:28:12.251 EDT: GTP-SR: Unpacking category of ID 4 MWAM 10/2: 000186: Jun 1 2006 18:28:12.255 EDT: GTP-SR: Creating red context for category ID 4 username 100000000000000 on APN ms-apn MWAM 10/2: 000187: Jun 1 2006 18:28:12.255 EDT: GTP-SR: Need to allocate redundancy context MWAM 10/2: 000188: Jun 1 2006 18:28:12.255 EDT: GTP-SR: adding element in state-list Initialized, final count 5 MWAM 10/2: 000189: Jun 1 2006 18:28:12.255 EDT: GTP-SR: Removing element from state-list Initialized, final count 4 MWAM 10/2: 000190: Jun 1 2006 18:28:12.255 EDT: GTP-SR: adding element in state-list Synched, final count 1 MWAM 10/2: 000191: Jun 1 2006 18:28:12.255 EDT: GPRS:0100000000000050:shdb 0xC6000008 created for category 4 (handle 0xDE000001) MWAM 10/2: 000192: Jun 1 2006 18:28:12.255 EDT: GTP-SR: red context installed for the new category (shdb: active 0x95000008, standby 0xC6000008) MWAM 10/2: 000193: Jun 1 2006 18:28:12.255 EDT: GTP-SR: new category ID 4 unpacked: MWAM 10/2: 000194: Jun 1 2006 18:28:12.255 EDT: GTP-SR: sync data len 164 MWAM 10/2: 000195: Jun 1 2006 18:28:12.255 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000196: Jun 1 2006 18:28:12.255 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000197: Jun 1 2006 18:28:12.255 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000198: Jun 1 2006 18:28:12.255 EDT: GTP-SR: category state AUTHORIZED MWAM 10/2: 000199: Jun 1 2006 18:28:12.255 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000200: Jun 1 2006 18:28:12.255 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000201: Jun 1 2006 18:28:12.255 EDT: GTP-SR: sync flag 0x0 MWAM 10/2: 000202: Jun 1 2006 18:28:12.255 EDT: GTP-SR: quotas included MWAM 10/2: 000203: Jun 1 2006 18:28:12.255 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000204: Jun 1 2006 18:28:12.255 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000205: Jun 1 2006 18:28:12.255 EDT: GTP-SR: address received from active with radius source is MWAM 10/2: 000206: Jun 1 2006 18:28:12.259 EDT: GTP-SR:Context Type PDP, Handler Sync, Context Event Context Setup, Context Sub Event No Sub Event MWAM 10/2: 000207: Jun 1 2006 18:28:12.259 EDT: GTP-SR:State of Redundancy Context is Initialized MWAM 10/2: 000208: Jun 1 2006 18:28:12.259 EDT: GTP-SR: Event Context Setup, Sub Event No Sub Event MWAM 10/2: 000209: Jun 1 2006 18:28:12.259 EDT: GTP-SR: Removing element from state-list Initialized, final count 3 MWAM 10/2: 000210: Jun 1 2006 18:28:12.259 EDT: GTP-SR: adding element in state-list Bulk Synch Ready, final count 4 MWAM 10/2: 000211: Jun 1 2006 18:28:15.091 EDT: GTP-SR: Redundancy RF Event Received is Update Redundancy Context MWAM 10/2: 000212: Jun 1 2006 18:28:15.091 EDT: GTP-SR: Redundancy Event is Category update MWAM 10/2: 000213: Jun 1 2006 18:28:15.091 EDT: GTP-SR: red context found (active shdb 0x95000008, standby shdb 0xC6000008) MWAM 10/2: 000214: Jun 1 2006 18:28:15.091 EDT: GTP-SR Packet Dump: Len for dump: org_len=188, len=128 MWAM 10/2: 000215: Jun 1 2006 18:28:15.091 EDT: 7C 0 0 5 0 0 58 2 0 0 0 1 0 34 34 0 MWAM 10/2: 000216: Jun 1 2006 18:28:15.091 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 95 MWAM 10/2: 000217: Jun 1 2006 18:28:15.091 EDT: 0 0 8 0 0 19 1A 0 0 0 21 0 0 0 0 0 MWAM 10/2: 000218: Jun 1 2006 18:28:15.091 EDT: 0 0 9 0 0 0 3 0 0 A 0 0 0 0 0 0 MWAM 10/2: 000219: Jun 1 2006 18:28:15.091 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000220: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000221: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000222: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000223: Jun 1 2006 18:28:15.095 EDT: ... MWAM 10/2: 000224: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category found with handle 0xDE000001 shdbs: active 0x95000008 standby 0xC6000008 (MCB shdbs: active 0x7C000005, standby 0xC6000008) MWAM 10/2: 000225: Jun 1 2006 18:28:15.095 EDT: GTP-SR: MCB internal flags 0x5802 unpacked MWAM 10/2: 000226: Jun 1 2006 18:28:15.095 EDT: GTP-SR: cc_session reqnum 1 unpacked and installed MWAM 10/2: 000227: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Unpacking category of ID 4 MWAM 10/2: 000228: Jun 1 2006 18:28:15.095 EDT: GTP-SR: sync obj created in prep for MCB deletion MWAM 10/2: 000229: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category ID 4 unpacked: MWAM 10/2: 000230: Jun 1 2006 18:28:15.095 EDT: GTP-SR: sync data len 52 MWAM 10/2: 000231: Jun 1 2006 18:28:15.095 EDT: GTP-SR: active shdb 0x95000008 MWAM 10/2: 000232: Jun 1 2006 18:28:15.095 EDT: GTP-SR: CSG session ID 27599459844129 MWAM 10/2: 000233: Jun 1 2006 18:28:15.095 EDT: GTP-SR: chrg last svc rec seqnum 0 MWAM 10/2: 000234: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category state PENDING_SERVICE_STOP MWAM 10/2: 000235: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category state trigger flags 0x3 MWAM 10/2: 000236: Jun 1 2006 18:28:15.095 EDT: GTP-SR: category sub flags 0x0 MWAM 10/2: 000237: Jun 1 2006 18:28:15.095 EDT: GTP-SR: sync flag 0xA MWAM 10/2: 000238: Jun 1 2006 18:28:15.095 EDT: GTP-SR: quotas not included MWAM 10/2: 000239: Jun 1 2006 18:28:15.095 EDT: GTP-SR: last req timestamp 0 MWAM 10/2: 000240: Jun 1 2006 18:28:15.095 EDT: GTP-SR: last req seqnum 0 MWAM 10/2: 000241: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Redundancy RF Event Received is Redundancy Context Delete MWAM 10/2: 000242: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Redundancy Event is Context Remove MWAM 10/2: 000243: Jun 1 2006 18:28:15.095 EDT: GTP-SR Packet Dump: Len for dump: org_len=40, len=40 MWAM 10/2: 000244: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000245: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MWAM 10/2: 000246: Jun 1 2006 18:28:15.095 EDT: 0 0 0 0 0 0 0 0 MWAM 10/2: 000247: Jun 1 2006 18:28:15.095 EDT: GPRS:GTP-SR: Deleting v1 MCB on the standby MWAM 10/2: 000248: Jun 1 2006 18:28:15.095 EDT: GPRS:0100000000000050:GTP-SR: Deleting v1 PDP on the standby MWAM 10/2: 000249: Jun 1 2006 18:28:15.095 EDT: GTP-SR: MCB deletion sync obj deleted MWAM 10/2: 000250: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Removing element from state-list Synched, final count 0 MWAM 10/2: 000251: Jun 1 2006 18:28:15.095 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 3 MWAM 10/2: 000252: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy RF Event Received is Redundancy Context Delete MWAM 10/2: 000253: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy Event is Path Remove MWAM 10/2: 000254: Jun 1 2006 18:29:15.103 EDT: GTP-SR:Context Type Path, Handler Delete, Context Event Path Remove, Context Sub Event No Sub Event MWAM 10/2: 000255: Jun 1 2006 18:29:15.103 EDT: GTP-SR:State of Redundancy Context is Bulk Synch Ready MWAM 10/2: 000256: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Event Path Remove, Sub Event No Sub Event MWAM 10/2: 000257: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 2 MWAM 10/2: 000258: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy RF Event Received is Redundancy Context Delete MWAM 10/2: 000259: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Redundancy Event is Path Remove MWAM 10/2: 000260: Jun 1 2006 18:29:15.103 EDT: GTP-SR:Context Type Path, Handler Delete, Context Event Path Remove, Context Sub Event No Sub Event MWAM 10/2: 000261: Jun 1 2006 18:29:15.103 EDT: GTP-SR:State of Redundancy Context is Bulk Synch Ready MWAM 10/2: 000262: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Event Path Remove, Sub Event No Sub Event MWAM 10/2: 000263: Jun 1 2006 18:29:15.103 EDT: GTP-SR: Removing element from state-list Bulk Synch Ready, final count 1
Related Commands
Command |
Description |
---|---|
clear gprs redundancy statistics |
Clears statistics related to GTP-SR. |
gprs redundancy |
Enables GTP-SR on a GGSN. |
gprs redundancy charging sync-window cdr rec-seqnum |
Configures the window size used to determine when the CDR record sequence number needs to be synchronized to the Standby GGSN. |
gprs redundancy charging sync-window gtpp seqnum |
Configures the window size used to determine when the GTP’ sequence number needs to be synchronized to the Standby GGSN. |
show gprs redundancy |
Displays statistics related to GTP-SR. |
debug gvrp
To display GVRP debugging information, use the debug gvrpcommand in privileged EXEC mode. To disable debugging outpu, use the no form of this command.
debug gvrp { all | config | error | event | ha | packets | switch }
no debug gvrp
Syntax Description
all |
(Optional) Enables all levels of debugging |
config |
(Optional) Displays user configuration. |
error |
(Optional) Enables error level debugging. |
event |
(Optional) Enables event level debugging. |
ha |
(Optional) Enables ha level debugging. |
packets |
(Optional) Enables packet level debugging. |
switch |
(Optional) Enables switch level debugging. |
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(33)SRB |
This command was introduced. |
Usage Guidelines
Conditional interface debugging can be used to limit the debugging output messages related to an interface.
Examples
The following example shows how to enable all levels of debugging:
debug gvrp all
Related Commands
Command |
Description |
---|---|
show gvrp interface |
Displays details of the adininstrative and operational GVRP states of all or one particular .1Q trunk port in the device. |
show gvrp summary |
Displays the GVRP configuration at the device leve. |
debug h225
To display additional information about the actual contents of H.225 Registration, Admission, and Status Protocol (RAS) messages, use the debug h225 command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug h225 { asn1 | events }
no debug h225
Syntax Description
asn1 |
Indicates that only the Abstract Syntax Notation One (ASN.1) contents of any H.225 message sent or received will be displayed. |
events |
Indicates that key Q.931 events that occur when placing an H.323 call from one gateway to another will be displayed. |
Command Default
Disabled
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
11.3(6)NA2 |
This command was introduced. |
12.2(2)XB1 |
This command was implemented on the Cisco AS5850. |
12.2(11)T |
This command was integrated into Cisco IOS Release 12.2(11)T. |
Usage Guidelines
Both versions of the debug h225 command display information about H.225 messages. H.225 messages are used to exchange RAS information between gateways and gatekeepers as well as to exchange Q.931 information between gateways.
The debug h225 events command displays key Q.931 events that occur when placing an H.323 call from one gateway to another. Q.931 events are carried in H.225 messages. This command enables you to monitor Q.931 state changes such as setup, alert, connected, and released.
Note | Although the debug information includes the hexadecimal output of the entire H.225 message, only the key state changes are decoded. |
The debug h225 asn1 command displays the ASN.1 contents of any H.225 message sent or received that contains ASN.1 content. Not all H.225 messages contain ASN.1 content. Some messages contain both Q.931 information and ASN.1 information; if you enter this command, only ASN.1 information will be displayed.
Examples
The following sample output for the debug h225 events command shows a call being placed from gateway GW13 to gateway GW14. Before the call was placed, the gateway exchanged RAS messages with the gatekeeper. Because RAS messages do not contain Q.931 information, these messages do not appear in this output.
Router# debug h225 events H.225 Event Messages debugging is on Router# *Mar 2 02:47:14.689: H225Lib::h225TConn:connect in progress on socket [2] *Mar 2 02:47:14.689: H225Lib::h225TConn:Q.931 Call State is initialized to be [Null]. *Mar 2 02:47:14.697:Hex representation of the SETUP TPKT to send.0300004D080200DC05040380C0A36C0991313323313333303070099131342331343330307E00260500800 60008914A000102004B1F5E5D8990006C0000000005BF7454000C0700000000000000 *Mar 2 02:47:14.701: *Mar 2 02:47:14.701: H225Lib::h225SetupRequest:Q.931 SETUP sent from socket [2] *Mar 2 02:47:14.701: H225Lib::h225SetupRequest:Q.931 Call State changed to [Call Initiated]. *Mar 2 02:47:14.729:Hex representation of the received TPKT03000021080280DC013401017E0012050340060008914A000100000109350E2B28 *Mar 2 02:47:14.729: *Mar 2 02:47:14.729: H225Lib::h225RecvData:Q.931 ALERTING received from socket [2] *Mar 2 02:47:14.729: H225Lib::h225RecvData:Q.931 Call State changed to [Call Delivered]. *Mar 2 02:47:17.565:Hex representation of the received TPKT03000034080280DC07040380C0A37E0023050240060008914A0001000109350E2B2802004B1F5E5D899000 6C0000000005BF7454 *Mar 2 02:47:17.569: *Mar 2 02:47:17.569: H225Lib::h225RecvData:Q.931 CONNECT received from socket [2] *Mar 2 02:47:17.569: H225Lib::h225RecvData:Q.931 Call State changed to [Active]. *Mar 2 02:47:23.273:Hex representation of the received TPKT0300001A080280DC5A080280107E000A050500060008914A0001 *Mar 2 02:47:23.273: *Mar 2 02:47:23.273: H225Lib::h225RecvData:Q.931 RELEASE COMPLETE received from socket [2] *Mar 2 02:47:23.273: H225Lib::h225RecvData:Q.931 Call State changed to [Null]. *Mar 2 02:47:23.293:Hex representation of the RELEASE COMPLETE TPKT to send.0300001A080200DC5A080280107E000A050500060008914A0001 *Mar 2 02:47:23.293: *Mar 2 02:47:23.293: H225Lib::h225TerminateRequest:Q.931 RELEASE COMPLETE sent from socket [2]. Call state changed to [Null]. *Mar 2 02:47:23.293: H225Lib::h225TClose:TCP connection from socket [2] closed
The following output shows the same call being placed from gateway GW13 to gateway GW14 using the debug h225 asn1 command. The output is very long, but you can track the following information:
The admission request to the gatekeeper.
The admission confirmation from the gatekeeper.
The ASN.1 portion of the H.225/Q.931 setup message from the calling gateway to the called gateway.
The ASN.1 portion of the H.225/Q.931 setup response from the called gateway, indicating that the call has proceeded to alerting state.
The ASN.1 portion of the H.225/Q.931 message from the called gateway, indicating that the call has been connected.
The ASN.1 portion of the H.225/Q.931 message from the called gateway, indicating that the call has been released.
The ANS.1 portion of the H.225 RAS message from the calling gateway to the gatekeeper, informing it that the call has been disengaged.
The ASN.1 portion of the H.225 RAS message from the gatekeeper to the calling gateway, confirming the disengage request.
The ASN.1 portion of the H.225/Q.931 release complete message sent from the called gateway to the calling gateway.
Router# debug h225 asn1 H.225 ASN1 Messages debugging is on Router# value RasMessage ::= admissionRequest : *Mar 2 02:48:18.445: { *Mar 2 02:48:18.445: requestSeqNum 03320, *Mar 2 02:48:18.445: callType pointToPoint :NULL, *Mar 2 02:48:18.445: callModel direct :NULL, *Mar 2 02:48:18.445: endpointIdentifier "60D6BA4C00000001", *Mar 2 02:48:18.445: destinationInfo *Mar 2 02:48:18.445: { *Mar 2 02:48:18.445: e164 :"14#14300" *Mar 2 02:48:18.445: }, *Mar 2 02:48:18.449: srcInfo *Mar 2 02:48:18.449: { *Mar 2 02:48:18.449: e164 :"13#13300" *Mar 2 02:48:18.449: }, *Mar 2 02:48:18.449: bandWidth 0640, *Mar 2 02:48:18.449: callReferenceValue 0224, *Mar 2 02:48:18.449: conferenceID '4B1F5E5D899000720000000005C067A4'H, *Mar 2 02:48:18.449: activeMC FALSE, *Mar 2 02:48:18.449: answerCall FALSE *Mar 2 02:48:18.449: } *Mar 2 02:48:18.449:25800CF7 00F00036 00300044 00360042 00410034 00430030 00300030 00300030 00300030 00310103 80470476 33010380 46046633 40028000 E04B1F5E 5D899000 72000000 0005C067 A400 29000CF7 40028000 0109350E 06B80077 value RasMessage ::= admissionConfirm : *Mar 2 02:48:18.469: { *Mar 2 02:48:18.469: requestSeqNum 03320, *Mar 2 02:48:18.469: bandWidth 0640, *Mar 2 02:48:18.469: callModel direct :NULL, *Mar 2 02:48:18.469: destCallSignalAddress ipAddress : *Mar 2 02:48:18.469: { *Mar 2 02:48:18.469: ip '0109350E'H, *Mar 2 02:48:18.469: port 01720 *Mar 2 02:48:18.469: }, *Mar 2 02:48:18.469: irrFrequency 0120 *Mar 2 02:48:18.473: } *Mar 2 02:48:18.473:value H323-UserInformation ::= *Mar 2 02:48:18.481:{ *Mar 2 02:48:18.481: h323-uu-pdu *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: h323-message-body setup : *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: protocolIdentifier { 0 0 8 2250 0 1 }, *Mar 2 02:48:18.481: sourceInfo *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: terminal *Mar 2 02:48:18.481: { *Mar 2 02:48:18.481: }, *Mar 2 02:48:18.481: mc FALSE, *Mar 2 02:48:18.481: undefinedNode FALSE *Mar 2 02:48:18.481: }, *Mar 2 02:48:18.481: activeMC FALSE, *Mar 2 02:48:18.481: conferenceID '4B1F5E5D899000720000000005C067A4'H, *Mar 2 02:48:18.481: conferenceGoal create :NULL, *Mar 2 02:48:18.485: callType pointToPoint :NULL, *Mar 2 02:48:18.485: sourceCallSignalAddress ipAddress : *Mar 2 02:48:18.485: { *Mar 2 02:48:18.485: ip '00000000'H, *Mar 2 02:48:18.485: port 00 *Mar 2 02:48:18.485: } *Mar 2 02:48:18.485: } *Mar 2 02:48:18.485: } *Mar 2 02:48:18.485:} *Mar 2 02:48:18.485:00800600 08914A00 0102004B 1F5E5D89 90007200 00000005 C067A400 0C070000 00000000 00 value H323-UserInformation ::= *Mar 2 02:48:18.525:{ *Mar 2 02:48:18.525: h323-uu-pdu *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: h323-message-body alerting : *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: protocolIdentifier { 0 0 8 2250 0 1 }, *Mar 2 02:48:18.525: destinationInfo *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: mc FALSE, *Mar 2 02:48:18.525: undefinedNode FALSE *Mar 2 02:48:18.525: }, *Mar 2 02:48:18.525: h245Address ipAddress : *Mar 2 02:48:18.525: { *Mar 2 02:48:18.525: ip '0109350E'H, *Mar 2 02:48:18.525: port 011050 *Mar 2 02:48:18.525: } *Mar 2 02:48:18.525: } *Mar 2 02:48:18.525: } *Mar 2 02:48:18.525:} *Mar 2 02:48:18.525:value H323-UserInformation ::= *Mar 2 02:48:22.753:{ *Mar 2 02:48:22.753: h323-uu-pdu *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: h323-message-body connect : *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: protocolIdentifier { 0 0 8 2250 0 1 }, *Mar 2 02:48:22.753: h245Address ipAddress : *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: ip '0109350E'H, *Mar 2 02:48:22.753: port 011050 *Mar 2 02:48:22.753: }, *Mar 2 02:48:22.753: destinationInfo *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: terminal *Mar 2 02:48:22.753: { *Mar 2 02:48:22.753: }, *Mar 2 02:48:22.757: mc FALSE, *Mar 2 02:48:22.757: undefinedNode FALSE *Mar 2 02:48:22.757: }, *Mar 2 02:48:22.757: conferenceID '4B1F5E5D899000720000000005C067A4'H *Mar 2 02:48:22.757: } *Mar 2 02:48:22.757: } *Mar 2 02:48:22.757:} *Mar 2 02:48:22.757:value H323-UserInformation ::= *Mar 2 02:48:27.109:{ *Mar 2 02:48:27.109: h323-uu-pdu *Mar 2 02:48:27.109: { *Mar 2 02:48:27.109: h323-message-body releaseComplete : *Mar 2 02:48:27.109: { *Mar 2 02:48:27.109: protocolIdentifier { 0 0 8 2250 0 1 } *Mar 2 02:48:27.109: } *Mar 2 02:48:27.109: } *Mar 2 02:48:27.109:} *Mar 2 02:48:27.109:value RasMessage ::= disengageRequest : *Mar 2 02:48:27.117: { *Mar 2 02:48:27.117: requestSeqNum 03321, *Mar 2 02:48:27.117: endpointIdentifier "60D6BA4C00000001", *Mar 2 02:48:27.117: conferenceID '4B1F5E5D899000720000000005C067A4'H, *Mar 2 02:48:27.121: callReferenceValue 0224, *Mar 2 02:48:27.121: disengageReason normalDrop :NULL *Mar 2 02:48:27.121: } *Mar 2 02:48:27.121:3C0CF81E 00360030 00440036 00420041 00340043 00300030 00300030 00300030 00300031 4B1F5E5D 89900072 00000000 05C067A4 00E020 400CF8 value RasMessage ::= disengageConfirm : *Mar 2 02:48:27.133: { *Mar 2 02:48:27.133: requestSeqNum 03321 *Mar 2 02:48:27.133: } *Mar 2 02:48:27.133:value H323-UserInformation ::= *Mar 2 02:48:27.133:{ *Mar 2 02:48:27.133: h323-uu-pdu *Mar 2 02:48:27.133: { *Mar 2 02:48:27.133: h323-message-body releaseComplete : *Mar 2 02:48:27.133: { *Mar 2 02:48:27.133: protocolIdentifier { 0 0 8 2250 0 1 } *Mar 2 02:48:27.133: } *Mar 2 02:48:27.133: } *Mar 2 02:48:27.133:} *Mar 2 02:48:27.133:05000600 08914A00 01
debug h225 asn1
To display ASN1 contents of RAS an d Q.931 messages, use the debug h255 asn1 privileged EXEC command. The no form of this command disables debugging output.
debug h255 asn1
no debug h255 asn1
Syntax Description
This command has no arguments or keywords.
Command History
Release |
Modification |
---|---|
11.3(2)NA |
This command was introduced. |
12.0(3)T |
This command was modified. |
12.2(15)T |
This command is no longer supported in Cisco IOS Mainline or Technology-based (T) releases. It may continue to appear in Cisco IOS 12.2S-family releases. |
Usage Guidelines
Note | This command slows down the system considerably. Connections may time out. |
Examples
Examples
The following output shows two proxy call scenarios. A trace is collected on the gatekeeper with ASN1 turned on. The call is being established.
Router# debug h225 asn1 H.225 ASN1 Messages debugging is on Router#24800006 03C00030 00300036 00380041 00450037 00430030 00300030 00300030 00300030 00310140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D020180 AAAA4006 00700074 0065006C 00320031 0033401E 0000015F C8490FB4 B9D111BF AF0060B0 00E94500 value RasMessage ::= admissionRequest : { requestSeqNum 7, callType pointToPoint : NULL, endpointIdentifier "0068AE7C00000001", destinationInfo { h323-ID : "ptel23@zone2.com" }, srcInfo { e164 : "7777", h323-ID : "ptel213" }, bandWidth 7680, callReferenceValue 1, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall FALSE } value RasMessage ::= admissionConfirm : { requestSeqNum 7, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '65000001'H, port 1720 }, irrFrequency 30 } 29000006 401E0000 65000001 06B8001D 2480001D 03C00030 00300036 00380041 00390036 00300030 00300030 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D014006 00700074 0065006C 00320031 00334002 8000015F C8490FB4 B9D111BF AF0060B0 00E94540 value RasMessage ::= admissionRequest : { requestSeqNum 30, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo { h323-ID : "ptel23@zone2.com" }, srcInfo { h323-ID : "ptel213" }, bandWidth 640, callReferenceValue 1, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall TRUE } value ACFnonStandardInfo ::= { srcTerminalAlias { e164 : "7777", h323-ID : "ptel213" }, dstTerminalAlias { h323-ID : "ptel23@zone2.com" }, dstProxyAlias { h323-ID : "px2" }, dstProxySignalAddress { ip '66000001'H, port 1720 } } C00203AA AA800600 70007400 65006C00 32003100 3301800F 00700074 0065006C 00320033 0040007A 006F006E 00650032 002E0063 006F006D 01800200 70007800 32660000 0106B8 value RasMessage ::= admissionConfirm : { requestSeqNum 30, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, irrFrequency 30, nonStandardData { nonStandardIdentifier h221NonStandard : { t35CountryCode 181, t35Extension 0, manufacturerCode 18 }, data 'C00203AAAA8006007000740065006C00320031003301800F007000740065006C003200 ...'H } } 2980001D 401E0000 66000001 06B8001D 40B50000 1247C002 03AAAA80 06007000 74006500 6C003200 31003301 800F0070 00740065 006C0032 00330040 007A006F 006E0065 0032002E 0063006F 006D0180 02007000 78003266 00000106 B8 24C0001E 03C00030 00300036 00380041 00390036 00300030 00300030 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D006600 000106B8 020180AA AA400600 70007400 65006C00 32003100 33401E00 00435FC8 490FB4B9 D111BFAF 0060B000 E94500 value RasMessage ::= admissionRequest : { requestSeqNum 31, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo { h323-ID : "ptel23@zone2.com" }, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, srcInfo { e164 : "7777", h323-ID : "ptel213" }, bandWidth 7680, callReferenceValue 67, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall FALSE } value RasMessage ::= admissionConfirm : { requestSeqNum 31, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, irrFrequency 30 }
Examples
The following output shows two proxy call scenarios. A trace is collected on the source proxy with ASN1 turned on. The call is being torn down
Router# debug h225 asn1 H.225 ASN1 Messages debugging is on Router# value H323-UserInformation ::= { h323-uu-pdu { h323-message-body setup : { protocolIdentifier { 0 0 8 2250 0 1 }, sourceAddress { h323-ID : "ptel213" }, sourceInfo { terminal { }, mc FALSE, undefinedNode FALSE }, destinationAddress { h323-ID : "ptel23@zone2.com" }, activeMC FALSE, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, conferenceGoal create : NULL, callType pointToPoint : NULL, sourceCallSignalAddress ipAddress : { ip '3200000C'H, port 1720 } } } } value RasMessage ::= admissionRequest : { requestSeqNum 30, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo { h323-ID : "ptel23@zone2.com" }, srcInfo { h323-ID : "ptel213" }, bandWidth 640, callReferenceValue 1, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall TRUE } 2480001D 03C00030 00300036 00380041 00390036 00300030 00300030 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D014006 00700074 0065006C 00320031 00334002 8000015F C8490FB4 B9D111BF AF0060B0 00E94540 2980001D 401E0000 66000001 06B8001D 40B50000 1247C002 03AAAA80 06007000 74006500 6C003200 31003301 800F0070 00740065 006C0032 00330040 007A006F 006E0065 0032002E 0063006F 006D0180 02007000 78003266 00000106 B8 value RasMessage ::= admissionConfirm : { requestSeqNum 30, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, irrFrequency 30, nonStandardData { nonStandardIdentifier h221NonStandard : { t35CountryCode 181, t35Extension 0, manufacturerCode 18 }, data 'C00203AAAA8006007000740065006C00320031003301800F007000740065006C003200 ...'H } } C00203AA AA800600 70007400 65006C00 32003100 3301800F 00700074 0065006C 00320033 0040007A 006F006E 00650032 002E0063 006F006D 01800200 70007800 32660000 0106B8 value ACFnonStandardInfo ::= { srcTerminalAlias { e164 : "7777", h323-ID : "ptel213" }, dstTerminalAlias { h323-ID : "ptel23@zone2.com" }, dstProxyAlias { h323-ID : "px2" }, dstProxySignalAddress { ip '66000001'H, port 1720 } } value RasMessage ::= admissionRequest : { requestSeqNum 31, callType pointToPoint : NULL, endpointIdentifier "0068A96000000002", destinationInfo { h323-ID : "ptel23@zone2.com" }, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, srcInfo { e164 : "7777", h323-ID : "ptel213" }, bandWidth 7680, callReferenceValue 67, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, activeMC FALSE, answerCall FALSE } 24C0001E 03C00030 00300036 00380041 00390036 00300030 00300030 00300030 00300030 00320140 0F007000 74006500 6C003200 33004000 7A006F00 6E006500 32002E00 63006F00 6D006600 000106B8 020180AA AA400600 70007400 65006C00 32003100 33401E00 00435FC8 490FB4B9 D111BFAF 0060B000 E94500 2900001E 401E0000 66000001 06B8001D value RasMessage ::= admissionConfirm : { requestSeqNum 31, bandWidth 7680, callModel direct : NULL, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, irrFrequency 30 } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body callProceeding : { protocolIdentifier { 0 0 8 2250 0 1 }, destinationInfo { gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE } } } } 01000600 08914A00 01088001 2800 value H323-UserInformation ::= { h323-uu-pdu { h323-message-body setup : { protocolIdentifier { 0 0 8 2250 0 1 }, sourceAddress { h323-ID : "ptel213" }, sourceInfo { vendor { vendor { t35CountryCode 181, t35Extension 0, manufacturerCode 18 } }, gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE }, destinationAddress { h323-ID : "ptel23@zone2.com" }, destCallSignalAddress ipAddress : { ip '66000001'H, port 1720 }, activeMC FALSE, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H, conferenceGoal create : NULL, callType pointToPoint : NULL, sourceCallSignalAddress ipAddress : { ip '65000001'H, port 1720 }, remoteExtensionAddress h323-ID : "ptel23@zone2.com" } } } 00B80600 08914A00 01014006 00700074 0065006C 00320031 00332800 B5000012 40012800 01400F00 70007400 65006C00 32003300 40007A00 6F006E00 65003200 2E006300 6F006D00 66000001 06B8005F C8490FB4 B9D111BF AF0060B0 00E94500 0E070065 00000106 B822400F 00700074 0065006C 00320033 0040007A 006F006E 00650032 002E0063 006F006D value H323-UserInformation ::= { h323-uu-pdu { h323-message-body callProceeding : { protocolIdentifier { 0 0 8 2250 0 1 }, destinationInfo { gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE } } } } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body alerting : { protocolIdentifier { 0 0 8 2250 0 1 }, destinationInfo { mc FALSE, undefinedNode FALSE } } } } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body alerting : { protocolIdentifier { 0 0 8 2250 0 1 }, destinationInfo { mc FALSE, undefinedNode FALSE } } } } 03000600 08914A00 010000 value H323-UserInformation ::= { h323-uu-pdu { h323-message-body connect : { protocolIdentifier { 0 0 8 2250 0 1 }, h245Address ipAddress : { ip '66000001'H, port 11011 }, destinationInfo { gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE }, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H } } } value H323-UserInformation ::= { h323-uu-pdu { h323-message-body connect : { protocolIdentifier { 0 0 8 2250 0 1 }, h245Address ipAddress : { ip '65000001'H, port 11007 }, destinationInfo { gateway { protocol { h323 : { } } }, mc FALSE, undefinedNode FALSE }, conferenceID '5FC8490FB4B9D111BFAF0060B000E945'H } } } 02400600 08914A00 01006500 00012AFF 08800128 005FC849 0FB4B9D1 11BFAF00 60B000E9 45
Example 3
The following output shows two proxy call scenarios. A trace is collected on a destination router where both destination proxy and destination Gatekeeper coexist. Both RAS and H.225 traces are enabled for one complete call.
px2# RASLib::RASRecvData: successfully rcvd message of length 80 from 40.0.0.33:1585 RASLib::RASRecvData: LRQ rcvd from [40.0.0.33:1585] on sock [6880372] RASlib::ras_sendto: msg length 111 sent to 40.0.0.33 RASLib::RASSendLCF: LCF sent to 40.0.0.33 H225Lib::h225TAccept: TCP connection accepted from 101.0.0.1:11002 on socket [2] H225Lib::h225TAccept: Q.931 Call State is initialized to be [Null]. Hex representation of the received TPKT 030000A60802008005040488988CA56C0591373737377E008D0500B8060008914A000101400 6007000740065006C0032003100332800B50000124001280001400F007000740065006C00320 0330040007A006F006E00650032002E0063006F006D006600000106B8003DC8490FB4B9D111B FAF0060B000E945000E07006500000106B822400F007000740065006C003200330040007A006 F006E00650032002E0063006F006D H225Lib::h225RecvData: Q.931 SETUP received from socket [2] H225Lib::h225RecvData: State changed to [Call Present]. RASlib::ras_sendto: msg length 119 sent to 102.0.0.1 RASLib::RASSendARQ: ARQ sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 119 from 102.0.0.1:24999 RASLib::RASRecvData: ARQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 16 sent to 70.0.0.31 RASLib::RASSendACF: ACF sent to 70.0.0.31 RASLib::RASRecvData: successfully rcvd message of length 16 from 102.0.0.1:1719 RASLib::RASRecvData: ACF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] RASlib::ras_sendto: msg length 119 sent to 102.0.0.1 RASLib::RASSendARQ: ARQ sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 119 from 102.0.0.1:24999 RASLib::RASRecvData: ARQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 16 sent to 70.0.0.31 RASLib::RASSendACF: ACF sent to 70.0.0.31 RASLib::RASRecvData: successfully rcvd message of length 16 from 102.0.0.1:1719 RASLib::RASRecvData: ACF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] Hex representation of the CALL PROCEEDING TPKT to send. 0300001B08028080027E000F050100060008914A00010880012800 H225Lib::h225CallProcRequest: Q.931 CALL PROCEEDING sent from socket [2]. Call state remains unchanged (Q.931 FSM simplified for H.225.0) H225Lib::h225TConn: connect in progress on socket [4] H225Lib::h225TConn: Q.931 Call State is initialized to be [Null]. Hex representation of the SETUP TPKT to send. 030000A50802008005040388C0A56C0591373737377E008D0500B8060008914A00010140060 07000740065006C0032003100332800B50000124001280001400F007000740065006C0032003 30040007A006F006E00650032002E0063006F006D005A00000D06B8003DC8490FB4B9D111BFA F0060B000E945000E07006600000106B822400F007000740065006C003200330040007A006F0 06E00650032002E0063006F006D H225Lib::h225SetupRequest: Q.931 SETUP sent from socket [4] H225Lib::h225SetupRequest: Q.931 Call State changed to [Call Initiated]. RASLib::RASRecvData: successfully rcvd message of length 123 from 90.0.0.13:1700 RASLib::RASRecvData: ARQ rcvd from [90.0.0.13:1700] on sock [0x68FC74] RASlib::ras_sendto: msg length 16 sent to 90.0.0.13 RASLib::RASSendACF: ACF sent to 90.0.0.13 Hex representation of the received TPKT 0300001808028080027E000C050100060008914A00010200 H225Lib::h225RecvData: Q.931 CALL PROCEEDING received from socket [4] Hex representation of the received TPKT 0300001808028080017E000C050300060008914A00010200 H225Lib::h225RecvData: Q.931 ALERTING received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Call Delivered]. Hex representation of the ALERTING TPKT to send. 0300001808028080017E000C050300060008914A00010000 H225Lib::h225AlertRequest: Q.931 ALERTING sent from socket [2]. Call state changed to [Call Received]. Hex representation of the received TPKT 0300003508028080070404889886A57E0023050240060008914A0001005A00000D06A402003 DC8490FB4B9D111BFAF0060B000E945 H225Lib::h225RecvData: Q.931 CONNECT received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Active]. Hex representation of the CONNECT TPKT to send. 030000370802808007040388C0A57E0026050240060008914A000100660000012AFC0880012 8003DC8490FB4B9D111BFAF0060B000E945 H225Lib::h225SetupResponse: Q.931 CONNECT sent from socket [2] H225Lib::h225SetupResponse: Q.931 Call State changed to [Active]. RASlib::ras_sendto: msg length 108 sent to 102.0.0.1 RASLib::RASSendIRR: IRR sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 108 from 102.0.0.1:24999 RASLib::RASRecvData: IRR rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASLib::RASRecvData: successfully rcvd message of length 101 from 90.0.0.13:1700 RASLib::RASRecvData: IRR rcvd from [90.0.0.13:1700] on sock [0x68FC74] Hex representation of the received TPKT 0300001A080280805A080280107E000A050500060008914A0001 H225Lib::h225RecvData: Q.931 RELEASE COMPLETE received from socket [2] H225Lib::h225RecvData: Q.931 Call State changed to [Null]. RASlib::ras_sendto: msg length 55 sent to 102.0.0.1 RASLib::RASSendDRQ: DRQ sent to 102.0.0.1 H225Lib::h225RecvData: no connection on socket [2] RASLib::RASRecvData: successfully rcvd message of length 55 from 102.0.0.1:24999 RASLib::RASRecvData: DRQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 3 sent to 70.0.0.31 RASLib::RASSendDCF: DCF sent to 70.0.0.31 Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280805A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [2]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [2] closed RASlib::ras_sendto: msg length 55 sent to 102.0.0.1 RASLib::RASSendDRQ: DRQ sent to 102.0.0.1 RASLib::RASRecvData: successfully rcvd message of length 3 from 102.0.0.1:1719 RASLib::RASRecvData: DCF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] RASLib::RASRecvData: successfully rcvd message of length 55 from 102.0.0.1:24999 RASLib::RASRecvData: DRQ rcvd from [102.0.0.1:24999] on sock [0x68FC74] RASlib::ras_sendto: msg length 3 sent to 70.0.0.31 RASLib::RASSendDCF: DCF sent to 70.0.0.31 RASLib::RASRecvData: successfully rcvd message of length 3 from 102.0.0.1:1719 RASLib::RASRecvData: DCF rcvd from [102.0.0.1:1719] on sock [0x67E6A4] Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280805A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [4]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [4] closed RASLib::RASRecvData: successfully rcvd message of length 55 from 90.0.0.13:1700 RASLib::RASRecvData: DRQ rcvd from [90.0.0.13:1700] on sock [0x68FC74] RASlib::ras_sendto: msg length 3 sent to 90.0.0.13 RASLib::RASSendDCF: DCF sent to 90.0.0.13
debug h225 events
To display Q.931 events, use the debug h225 events privileged EXEC command. The no form of this command disables debugging output.
debug h225 events
no debug h255 events
Syntax Description
This command has no arguments or keywords.
Command History
Release |
Modification |
---|---|
11.3(2)NA |
This command was introduced. |
12.0(3)T |
This command was modified. |
12.2(15)T |
This command is no longer supported in Cisco IOS Mainline or Technology-based (T) releases. It may continue to appear in Cisco IOS 12.2S-family releases. |
Examples
The following are sample output from the debug h225 events command.
Examples
The following output shows two proxy call scenarios. A trace is collected on the source proxy with H.225 turned on. The call is being established.
Router# debug h225 events H.225 Event Messages debugging is on Router# H225Lib::h225TAccept: TCP connection accepted from 50.0.0.12:1701 on socket [2] H225Lib::h225TAccept: Q.931 Call State is initialized to be [Null]. Hex representation of the received TPKT 0300007408020001050404889886A56C0580373737377E005B0500B0060008914A000101400 6007000740065006C003200310033020001400F007000740065006C003200330040007A006F0 06E00650032002E0063006F006D004EC8490FB4B9D111BFAF0060B000E945000C07003200000 C06B8 H225Lib::h225RecvData: Q.931 SETUP received from socket [2] H225Lib::h225RecvData: State changed to [Call Present]. Hex representation of the CALL PROCEEDING TPKT to send. 0300001B08028001027E000F050100060008914A00010880012800 H225Lib::h225CallProcRequest: Q.931 CALL PROCEEDING sent from socket [2]. Call state remains unchanged (Q.931 FSM simplified for H.225.0) H225Lib::h225TConn: connect in progress on socket [4] H225Lib::h225TConn: Q.931 Call State is initialized to be [Null]. Hex representation of the SETUP TPKT to send. 030000A60802008405040488988CA56C0591373737377E008D0500B8060008914A000101400 6007000740065006C0032003100332800B50000124001280001400F007000740065006C00320 0330040007A006F006E00650032002E0063006F006D006600000106B8004EC8490FB4B9D111B FAF0060B000E945000E07006500000106B822400F007000740065006C003200330040007A006 F006E00650032002E0063006F006D H225Lib::h225SetupRequest: Q.931 SETUP sent from socket [4] H225Lib::h225SetupRequest: Q.931 Call State changed to [Call Initiated]. Hex representation of the received TPKT 0300001B08028084027E000F050100060008914A00010880012800 H225Lib::h225RecvData: Q.931 CALL PROCEEDING received from socket [4] Hex representation of the received TPKT 0300001808028084017E000C050300060008914A00010000 H225Lib::h225RecvData: Q.931 ALERTING received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Call Delivered]. Hex representation of the ALERTING TPKT to send. 0300001808028001017E000C050300060008914A00010000 H225Lib::h225AlertRequest: Q.931 ALERTING sent from socket [2]. Call state changed to [Call Received]. Hex representation of the received TPKT 030000370802808407040388C0A57E0026050240060008914A000100660000012AFF0880012 8004EC8490FB4B9D111BFAF0060B000E945 H225Lib::h225RecvData: Q.931 CONNECT received from socket [4] H225Lib::h225RecvData: Q.931 Call State changed to [Active]. Hex representation of the CONNECT TPKT to send. 0300003808028001070404889886A57E0026050240060008914A000100650000012AFC08800 128004EC8490FB4B9D111BFAF0060B000E945 H225Lib::h225SetupResponse: Q.931 CONNECT sent from socket [2] H225Lib::h225SetupResponse: Q.931 Call State changed to [Active].
Examples
The following output shows two proxy call scenarios. A trace is collected on the source proxy with H.225 turned on. The call is being torn down.
Router# debug h225 events H.225 Event Messages debugging is on Router# Hex representation of the received TPKT 0300001A080200015A080200907E000A050500060008914A0001 H225Lib::h225RecvData: Q.931 RELEASE COMPLETE received from socket [2] H225Lib::h225RecvData: Q.931 Call State changed to [Null]. H225Lib::h225RecvData: no connection on socket [2] Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280015A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [2]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [2] closed Hex representation of the RELEASE COMPLETE TPKT to send. 0300001A080280845A080280107E000A050500060008914A0001 H225Lib::h225TerminateRequest: Q.931 RELEASE COMPLETE sent from socket [4]. Call state changed to [Null]. H225Lib::h225TClose: TCP connection from socket [4] closed
debug h245 asn1
To display Abstract Syntax Notation One (ASN.1) contents of H.245 messages, use the debug h245 asn1 command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug h245 asn1
no debug h245 asn1
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
11.3(2)NA |
This command was introduced. |
12.0(3)T |
This command was integrated into Cisco IOS Release 12.0(3)T. |
Usage Guidelines
Note | This command slows the system down considerably. Connections may time out. |
debug h245 events
To display H.245 events, use the debug h245 eventscommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug h245 events
no debug h245 events
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
11.3(2)NA |
This command was introduced. |
12.0(3)T |
This command was integrated into Cisco IOS Release 12.0(3)T. |
debug h245 srtp
To display H.245 Secure Real-Time Transport Protocol (SRTP) messages, use the debug h245 srtpcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug h245 srtp
no debug h245 srtp
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.4(6)T1 |
This command was introduced. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
To reduce the system impact of the output that this command generates, use the debug h245 srtp command during times of minimal system traffic. To reduce system overhead and redirect logging to an internal buffer, use the logging buffered command.
Use the debug h225 asn1 command to display Abstract Syntax Notation One (ASN.1) contents of H.225 messages.
Use the debug h245 asn1 command to display ASN.1 contents of H.245 messages.
The output from the debug h245 srtp command is primarily used by Cisco technical personnel. See the “Examples” section for an explanation of selected fields.
Examples
The following example displays SRTP messages exchanged during H.225 and H.245 signaling:
Router# debug h245 srtp H.245 SRTP Messages debugging is on SY3725_1# 000072: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_post_call_setup_request: cch323_post_call_setup_request:1015: SRTP added to ev for stream:SRTP_TX_STREAM. 000073: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000074: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_dump_srtp_media_params:
The following lines show SRTP media parameters:
ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x0, crypto_suite=0x0, master_key_len=0x0, master_salt_len=0x0, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000075: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_dump_srtp_sess_params:
The following lines show SRTP session parameters:
lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x0, encryptedsrtp=0x0, encryptedsrtcp=0x0, fecorder=0x0, windowsizehint=0x0 000076: Mar 16 16:46:38.237: cch323_post_call_setup_request:993: callID = 0x4PeercallID = 0x3params->incomingCallid = 0x3srtp_params_caps = 0x0i=1 000077: Mar 16 16:46:38.237: //-1/xxxxxxxxxxxx/H323/cch323_post_call_setup_request: cch323_post_call_setup_request:1021: SRTP NOT added to ev 000078: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_set_srtp_call: ../voip/cch323/gw/os/src/h323_gw_dialpeer.c:cch323_set_srtp_call:3420: SRTP configuration:
The following lines show SRTP configuration. Fields having a value set to 1 show that SRTP is enabled.
peer->voice_peer_tag = 101, ccb->srtp_call = 1, ccb->srtp_fallback = 1, ccb->srtp_transparent = 1 000079: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_get_caps_chn_info: Local[TX] SRTP Info:../voip/cch323/gw/src/cch323_h245_iwf_util.c:cch323_get_caps_chn_info:148 000080: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps:
The following lines show SRTP capabilities:
crypto_bm=0x1, codec_bm=0xB. 000081: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x0, crypto_suite=0x0, master_key_len=0x0, master_salt_len=0x0, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000082: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x0, encryptedsrtp=0x0, encryptedsrtcp=0x0, fecorder=0x0, windowsizehint=0x0 000083: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_get_caps_chn_info: Remote[RX] SRTP Info:../voip/cch323/gw/src/cch323_h245_iwf_util.c:cch323_get_caps_chn_info:151 000084: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps:
The following line shows SRTP capability for the DSP, indicated by the crypto_bm field. A value of 0x0 indicates the DSP is not SRTP capable.
crypto_bm=0x0, codec_bm=0x0. 000085: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x0, crypto_suite=0x0, master_key_len=0x0, master_salt_len=0x0, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000086: Mar 16 16:46:38.241: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x0, encryptedsrtp=0x0, encryptedsrtcp=0x0, fecorder=0x0, windowsizehint=0x0 000087: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_build_local_encoded_fastStartOLCs: ../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_local_encoded_fastStartOLCs:1518: OGW: generating Keys. 000088: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:31: Entry 000089: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: Generated SRTP info:../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:83 000090: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000091: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000092: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000093: Mar 16 16:46:38.245: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:86: Exit 000094: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:31: Entry 000095: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: Generated SRTP info:../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:83 000096: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x0, codec_bm=0x0. 000097: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x0, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000098: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000099: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/cch323_generate_srtp_info: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_generate_srtp_info:86: Exit 000100: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/build_fastStart_OLCs: FWD OLC SRTP params:../voip/cch323/gw/src/cch323_h245_util.c:build_fastStart_OLCs:1403 000101: Mar 16 16:46:38.249: //4/CCB23DEA8003/H323/build_fastStart_OLCs: RVR OLC SRTP Params:../voip/cch323/gw/src/cch323_h245_util.c:build_fastStart_OLCs:1417 000102: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_build_olc_for_ccapi: ../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_olc_for_ccapi:1690: WE ARE OGW.
The following lines show the outgoing gateway sending SRTP capabilities:
000103: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_build_olc_for_ccapi: Local SRTP Info:../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_olc_for_ccapi:1779 000104: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000105: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000106: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40
The following lines show that the gateway has received SRTP capabilities from the remote end:
000107: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_build_olc_for_ccapi: Remote SRTP Info:../voip/cch323/gw/src/cch323_h245_util.c:cch323_build_olc_for_ccapi:1783 000108: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0x1. 000109: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000110: Mar 16 16:46:38.301: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000111: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/h323_common_setup_rtcp_parameters: ../voip/cch323/gw/os/src/h323_gw_rtpapi.c:h323_common_setup_rtcp_parameters:378:olc->rtcp_session.srtp_services:3 000112: Mar 16 16:46:38.305: vtsp_call_ssrc_update: updated ssrc=0x5227F02 000113: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:369: Entry 000114: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:416: TX [Local] SRTP Info . 000115: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000116: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:448: RX [Remote] SRTP Info . 000117: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000118: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: % SRTP Library session creation, id:0x80000002, context:0x653E0CF8, num_context=2, rtp:0x653D2CF4, rtp_session:0x66D79B00 000119: Mar 16 16:46:38.305: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:514: Exit 000120: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/h323_common_setup_rtcp_parameters: ../voip/cch323/gw/os/src/h323_gw_rtpapi.c:h323_common_setup_rtcp_parameters:378:olc->rtcp_session.srtp_services:3 000121: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:369: Entry 000122: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:416: TX [Local] SRTP Info . 000123: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000124: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:448: RX [Remote] SRTP Info . 000125: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000126: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: % SRTP Library session update with 2 keysid:0x80000002 context:0x653E0CF8 000127: Mar 16 16:46:38.313: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:514: Exit 000128: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/h323_common_setup_rtcp_parameters: ../voip/cch323/gw/os/src/h323_gw_rtpapi.c:h323_common_setup_rtcp_parameters:378:olc->rtcp_session.srtp_services:3 000129: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:369: Entry 000130: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:416: TX [Local] SRTP Info . 000131: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000132: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:448: RX [Remote] SRTP Info . 000133: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000134: Mar 16 16:46:38.317: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: % SRTP Library session update with 2 keysid:0x80000002 context:0x653E0CF8 000135: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_setup_srtp_session: ../voip/cch323/gw/os/src/h323_gw_srtpapi.c:cch323_setup_srtp_session:514: Exit 000136: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_h245_cap_ind: Updated CCB(0x66D8D2D4) with TCS Remote SRTP Info: 000137: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000138: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000139: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000140: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_update_tcs_nonstd_info: cch323_update_tcs_nonstd_info:5800: Posting TCS SRTP caps to other callleg. 000141: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_caps: crypto_bm=0x1, codec_bm=0xB. 000142: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_media_params: ssrc_sel=0x0, srtp_ssrc=0x0, crypto_services=0x3, crypto_suite=0x1, master_key_len=0x10, master_salt_len=0xE, master_key=0xxxxxxxxxxxxxxxxx, master_salt=0xxxxxxxxxxxxxxx 000143: Mar 16 16:46:38.321: //4/CCB23DEA8003/H323/cch323_dump_srtp_sess_params: lifetime=0x0, mki=0x, mki_length=0x0, kdr=0x18, encryptedsrtp=0x1, encryptedsrtcp=0x1, fecorder=0x0, windowsizehint=0x40 000144: Mar 16 16:46:38.325: //4/CCB23DEA8003/H323/cch323_h245_cap_ind: cch323_h245_cap_ind:360 cch323_update_tcs_nonstd_info failed
Related Commands
Command |
Description |
---|---|
debug h225 asn1 |
Displays ASN.1 contents of H.225 messages. |
debug h245 asn1 |
Displays ASN.1 contents of H.245 messages. |
logging buffered |
Enables system message logging to a local buffer. |
srtp (voice) |
Enables secure calls globally. |
srtp (dial-peer) |
Enables secure calls for a specific dial peer. |
debug h323-annexg
To display all pertinent Annex G messages that have been transmitted and received, use the debug h323-annexg command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug h323-annexg { asn1 | errors | events | inout }
no debug h323-annexg
Syntax Description
asn1 |
Displays the Annex G ASN.1 messages. |
errors |
Displays the Annex G error messages encountered during processing. |
events |
Displays the Annex G events received from the state machine. |
inout |
(Optional) This functionality is not yet implemented. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)XA |
This command was introduced. |
12.2(4)T |
This command was integrated into Cisco IOS Release 12.2(4)T. |
12.2(2)XB1 |
This command was implemented on the Cisco AS5850. |
12.2(11)T |
This command was implemented on the Cisco AS5850. |
Examples
The following is sample output from the debug h323-annexg events command:
Router# debug h323-annexg events Aug 16 14:03:40.983:be_process:BE QUEUE_EVENT (minor 73) wakeup Aug 16 14:03:40.983:be_sm:Received event BE_EV_DO_QUERY Aug 16 14:03:40.983:<- query_neighbor:Sent descriptorIDRequest to 172.18.195.46:2099 [320] Aug 16 14:03:40.983:be_sm:Started query-timer of 1 minutes for neighbor at 172.18.195.46 Aug 16 14:03:40.991:-> nxg_recv_msg:Rcvd dscrptrIDCnfrmtn from 172.18.195.46:2099 [320] Aug 16 14:03:41.531:<- send_descriptor_request:Sent descriptorRequest to 172.18.195.46:2099 [321] Aug 16 14:03:41.539:-> nxg_recv_msg:Rcvd descriptorConfirmation from 172.18.195.46:2099 [321] Aug 16 14:03:41.539:handle_descriptor_cfm:Descriptor from neighbor 172.18.195.46 unchanged, TTL is 60 Seconds
Related Commands
Command |
Description |
---|---|
emulate |
Displays all pertinent Annex E messages that have been transmitted and received. |
debug hccp timing
To display debug messages for the timing of HCCP events, use the debug hccp timingcommand in privileged EXEC mode. To disable the debug message output, use the noform of this command.
debug hccp timing [if-config]
no debug hccp timing [if-config]
Syntax Description
if-config |
(Optional) Displays debugging messages showing the timing of the reconfiguration of cable interfaces during HCCP redundancy operations. |
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(3a)EC |
This command was introduced. |
12.2(4)XF1, 12.2(4)BC1 |
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router. |
12.2(11)BC1 |
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router. |
12.2(15)BC1 |
The if-config option was added. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
You must activate the debug hccp events command before the debug hccp timingcommand will generate any debug message output.
Examples
The following example shows typical output for the debug hccp timing command:
Router# debug hccp events Router# debug hccp timing HCCP timing measurement debugging is on May 31 10:21:07.609 HCCP P is busy. Deactivating 1 6 May 31 10:21:07.609 HCCP P is busy. Deactivating 2 6 May 31 10:21:08.705 HCCP hwif_goingdown for Cable8/1/0. Deactivate 1 6 May 31 10:21:08.705 HCCP hwif_goingdown for Cable8/1/1. Deactivate 2 6 May 31 10:21:08.773 HCCP 2 6 Working: become standby - 68 msec May 31 10:21:08.793 HCCP 1 6 Working: become standby - 20 msec May 31 10:21:10.730 HCCP 1 1 Working: turn on "uc" - 8 msec May 31 10:21:10.730 HCCP 1 1 Working: turn on "nru" - 0 msec May 31 10:21:10.734 HCCP 1 1 Working: become active - 4 msec May 31 10:21:10.774 HCCP 2 1 Working: turn on "uc" - 52 msec May 31 10:21:10.774 HCCP 2 1 Working: turn on "nru" - 0 msec May 31 10:21:10.774 HCCP 2 1 Working: become active - 0 msec May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 1 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 6 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 3 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 2 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 5 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/0. Deactivate 1 4 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 1 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 3 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 6 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 2 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 4 May 31 10:21:12.350 HCCP hwif_goingdown for Cable5/1/1. Deactivate 2 5 May 31 10:21:13.726 HCCP 1 1 Protect: turn off "uc" - 1972 msec May 31 10:21:13.790 HCCP 2 1 Protect: turn off "uc" - 2036 msec May 31 10:21:14.422 HCCP 1 1 Protect: turn off "nru" - 696 msec May 31 10:21:14.422 HCCP 1 1 Protect: unload config (if) - 0 msec May 31 10:21:14.438 HCCP 1 1 Protect: unload config (subif) - 16 msec May 31 10:21:14.702 HCCP 1 1 Protect: unload config (ds) - 264 msec May 31 10:21:14.702 HCCP 1 1 Protect: become standby - 0 msec May 31 10:21:16.078 HCCP 2 1 Protect: turn off "nru" - 2288 msec May 31 10:21:16.078 HCCP 2 1 Protect: unload config (if) - 0 msec May 31 10:21:16.078 HCCP 2 1 Protect: unload config (subif) - 0 msec May 31 10:21:16.599 HCCP 2 1 Protect: unload config (ds) - 520 msec May 31 10:21:16.599 HCCP 2 1 Protect: become standby - 0 msec May 31 10:21:17.014 HCCP: P missed hello ack in LEARN state and is locked. Deactivate 4 1 May 31 10:21:17.014 HCCP 4 1 Protect: turn off "rfswitch" - 52 msec May 31 10:21:17.593 HCCP 3 1 Working: turn on "rfswitch" - 0 msec May 31 10:21:17.593 HCCP 3 1 Working: become active - 0 msec May 31 10:21:18.112 HCCP 1 1 Protect: load config (if) - 0 msec May 31 10:21:18.112 HCCP 1 1 Protect: load config (subif) - 4 msec May 31 10:21:18.331 HCCP 1 1 Protect: load config (ds) - 100 msec May 31 10:21:18.331 HCCP 2 1 Working: turn off "rfswitch" - 0 msec May 31 10:21:18.331 HCCP 2 Cable5/0/1 Protect: resolve conflict Learn->Teach May 31 10:21:18.331 HCCP 2 1 Protect: load config (if) - 0 msec May 31 10:21:18.331 HCCP 2 1 Protect: load config (subif) - 0 msec May 31 10:21:19.691 HCCP 2 1 Protect: load config (ds) - 76 msec May 31 10:21:20.112 HCCP 2 1 Protect: turn on "rfswitch" - 48 msec May 31 10:21:20.112 HCCP 2 1 Protect: become active - 0 msec May 31 10:21:20.112 HCCP 2 1 Protect: load config (ds) - 76 msec May 31 10:21:20.112 HCCP 2 1 Protect: turn on "rfswitch" - 48 msec May 31 10:21:20.112 HCCP 2 1 Protect: become active - 0 msec
The following example shows typical output for the debug hccp timing if-config command:
Router# debug hccp events Router# debug hccp timing if-config HCCP Timing measurements messages of (UN)LOAD IF config CLI is on HCCP 1 1 Working: unload config (ds) - 112 msec HCCP 1 1 Protect: load config (ds) - 123 msec HCCP 1 1 Protect: load config (chnl set freq) - 35 msec
Related Commands
Command |
Description |
---|---|
debug hccp authentication |
Displays authentication debug messages for HCCP groups. |
debug hccp channel-switch |
Displays debug messages related to an RF or channel switch that is being used for HCCP N+1 (1:n) redundancy. |
debug hccp events |
Displays debug messages for all HCCP group interaction. |
debug hccp inter-db |
Displays debug messages for the inter-database events during HCCP operations. |
debug hccp plane |
Displays debug messages for HCCP-related messages sent between the router’s control plane and data backplane. |
debug hccp sync |
Displays debug messages for HCCP synchronization messages. |
debug hpi
Note | Effective with release 12.3(8)T, the debug hpicommand is replaced by the debug voip hpicommand. See the debug voip hpicommand for more information. |
To enable debugging for Host Port Interface (HPI) message events, use the debug hpi command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug hpi { all | buffer size | capture | command | destination url | detail | error | notification | response | stats }
no debug hpi { all | buffer size | capture | command | destination url | detail | error | notification | response | stats }
Syntax Description
all |
Enables all HPI debug options (command, detail, error, notification, and response). |
buffer size |
Sets the maximum amount of memory (in bytes) that the capture system allocates for its buffers when it is active. Valid size range is from 0 to 9000000. Default is 0. |
capture |
Displays HPI capture. |
command |
Displays commands that are being sent to the 54x DSP. |
destination url |
Turns capture on if it was off and sends the output to the specified URL. If capture was previously enabled for a different URL, the existing URL is closed, the new URL is opened, and output is sent to the new URL. |
detail |
Displays additional detail for the HPI debugs that are enabled. |
error |
Displays any HPI errors. |
notification |
Displays notification messages sent that are from the 54x DSP (for example, tone detection notification). |
response |
Displays responses (to commands) that are sent by the 54x DSP (for example, responses to statistic requests). |
stats |
Displays HPI statistics. |
Command Default
This command is not enabled.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.1(5)XM |
This command was introduced on the Cisco AS5300 and Cisco AS5800. |
12.2(2)T |
This command was implemented on the Cisco 1700, Cisco 2600 series, Cisco 3600 series, and the Cisco MC3810. The stats keyword was added. |
12.2(10), 12.2(11)T |
This command was implemented on the Cisco 827, Cisco 2400, Cisco 7200 series, and Cisco CVA 120. The following keywords were added: buffer, capture, and destination. |
12.3(8)T |
This command was replaced by the debug voip hpi command. |
Usage Guidelines
This command enables debugging for HPI message events, which are used to communicate with digital signal processors (DSPs).
When used with the Voice DSP Control Message Logger feature, the debug hpi buffer command sets the maximum amount of memory (in bytes) that the capture system can allocate for its buffers when it is active. The debug hpi capture destination url command turns capture on if it was off and sends the output to the given URL. If capture was previously enabled for a different URL, the existing URL is closed, the new URL is opened, and output is sent to the new URL.
When you use the no debug hpi capture command, the capture option is turned off if it was on, any open files are closed, and any allocated memory is released.
Use the debug hpi all command to view gateway DSP modem relay termination codes. The DSP-to-host messages for the modem relay termination indicate to the host the modem relay session termination time, physical or link layer, and other probable causes for disconnection. On receiving this indication from the DSP, the host can disconnect the call or place the channel in the modem passthrough state.
When this command is used on a Cisco AS5300 during a calling session, the Cisco AS5300 displays the following information (of severity 6 whereas ordinary debug information is severity 7) on the screen by default:
2w6d:%ISDN-6-DISCONNECT:Interface Serial0:18 disconnected from 22022 , call lasted 12 seconds 2w6d:%ISDN-6-DISCONNECT:Interface Serial1:9 disconnected from 32010 , call lasted 14 seconds 2w6d:%ISDN-6-CONNECT:Interface Serial3:2 is now connected to 52003 2w6d:%ISDN-6-CONNECT:Interface Serial2:11 is now connected to 42002
To disable this default information on the Cisco AS5300 and to block the display of the debug hpi capture and show voice hpi capture commands, set the login console to a severity lower than 6.
Examples
The following example turns on the debug output from capture routines:
Router# debug hpi capture HPI Capture/Logger debugging is on
Related Commands
Command |
Description |
---|---|
show voice hpi capture |
Verifies capture status and statistics. |
debug http client
To display debugging messages for the HTTP client, use the debug http clientcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug http client { all | api | background | cache | error | main | msg | socket }
no debug http client { all | api | background | cache | error | main | msg | socket }
Syntax Description
all |
Displays all debugging messages for the HTTP client. |
api |
Displays debugging information for the HTTP client application programming interface (API) process. |
background |
Displays background messages. |
cache |
Displays debugging information for the HTTP client cache module. |
error |
Displays the HTTP client error messages. |
main |
Displays debugging information for the HTTP client main process. |
msg |
Displays the HTTP client messages. |
socket |
Displays the HTTP client socket messages. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(2)XB |
This command was introduced on the Cisco AS5300, Cisco AS5350, and Cisco AS5400. |
12.2(11)T |
This command was implemented on the Cisco 3640 and Cisco 3660, and the background keyword was added. |
Usage Guidelines
The output of this command is effected by the debug condition application voice command. If the debug condition application voice command is configured and the <cisco-debug> element is enabled in the VoiceXML document, debugging output is limited to the VoiceXML application named in the debug condition application voice command.
Note | We recommend that you log output from the debug http client msg and debug http client socket commands to a buffer, rather than sending the output to the console; otherwise, the size of the output could severely impact the performance of the gateway. |
Examples
The following is sample output from the debug http client api command:
Router# debug http client api HTTP Client API Process debugging is on *Jan 3 10:58:48.609: httpc_send_ev: event sent to HTTP Client: *Jan 3 10:58:48.609: method (GET), url (http://serverX.com/vxml/test/prompts/9.au) *Jan 3 10:58:48.609: callback (61008E78), argp (63590DB4), sid (0), timeout (60), retries (2) *Jan 3 10:58:48.609: httpc_free: app freeing response data(626FA608) *Jan 3 10:58:59.353: httpc_send_ev: event sent to HTTP Client: *Jan 3 10:58:59.353: method (GET), url (http://1.7.100.1/vxml/test/dropoffRecord) *Jan 3 10:58:59.353: callback (61008E78), argp (6393B684), sid (0), timeout (60), retries (0) *Jan 3 10:58:59.369: httpc_free: app freeing response data(626F9348) *Jan 3 10:59:45.033: httpc_send_ev: event sent to HTTP Client: *Jan 3 10:59:45.033: method (POST), url (http://rtsp-ws/dropoffAppend.php?append=&disconnect=1) *Jan 3 10:59:45.033: callback (60FE9064), argp (63448820), sid (7179), timeout (0), retries (0) *Jan 3 10:59:57.369: httpc_free: app freeing response data(626F9340)
The following is sample output from the debug http client cache command:
Router# debug http client cache HTTP Client Cache Module debugging is on *Jan 3 11:53:52.817: httpc_cache_rsp_return: cache(626F8E50)URL:http://serverX.com/vxml/test/root.vxml *Jan 3 11:53:52.829: httpc_cache_entry_free: cache(626F8B30)URL:http://serverX.com/vxml/test/getPhoneInfo.vxml?ani=1234567&dnis=7654321 *Jan 3 11:53:52.837: httpc_cache_entry_free: cache(626F9710)URL:http://1.7.100.1/vxml/test/engine.vxml?flow=iso *Jan 3 11:53:52.853: httpc_cache_rsp_return: cache(626F8B30)URL:http://1.7.100.1/vxml/test/root.vxml *Jan 3 11:53:52.873: httpc_cache_rsp_return: cache(626F9030)URL:http://1.7.100.1/vxml/test/getExtension.vxml *Jan 3 11:53:59.517: httpc_cache_entry_free: cache(626F9170)URL:http://1.7.100.1/vxml/test/checkExtension.vxml?extension=1234&attempt=1 *Jan 3 11:53:59.545: httpc_cache_rsp_return: cache(626F9A30)URL:http://1.7.100.1/vxml/test/dropoff.vxml *Jan 3 11:54:10.361: httpc_cache_rsp_return: cache(626F9DF0)URL:http://serverX.com/vxml/test/init.vxml *Jan 3 11:54:10.361: httpc_cache_rsp_return: cache(626FA430)URL:http://1.7.100.1/vxml/test/dropoffRecord *Jan 4 00:20:23.474: httpc_cache_store: entry(http://ServerY.com/vxml/init.vxml) size(10114 bytes) is too large to cache.
The following is sample output from the debug http client main command:
Router# debug http client main HTTP Client Main Process debugging is on *Jan 3 11:56:05.885: httpc_get, url: http://serverX.com/vxml/test/root.vxml *Jan 3 11:56:05.889: httpc_msg_send, sid: 0, method: 83951618 *Jan 3 11:56:05.889: httpc_enqueue_wmsg, sid: 0, method: 83951618 *Jan 3 11:56:05.893: httpc_process_write_queue, socket writeble fd: 0, process enqueued msg, sid: 0, method: 83951618 *Jan 3 11:56:05.893: httpc_msg_write, sid: 0, method: 83951618 *Jan 3 11:56:05.901: HTTPC_MSG_COMPLETE: rsp_code(304),msg(62C9C25C)URL:http://serverX.com/vxml/test/root.vxml, fd(0) *Jan 3 11:56:05.901: httpc_process_redirect_rsp: msg(62C9C25C)URL:http://serverX.com/vxml/test/root.vxml, response code HTTPC_NOT_MODIFIED_304 *Jan 3 11:56:05.913: httpc_get, url: http://serverX.com/vxml/test/getPhoneInfo.vxml?ani=1234567&dnis=7654321 *Jan 3 11:56:05.917: httpc_msg_send, sid: 0, method: 65538 *Jan 3 11:56:05.917: httpc_enqueue_wmsg, sid: 0, method: 65538 *Jan 3 11:56:05.917: httpc_process_write_queue, socket writeble fd: 1, process enqueued msg, sid: 0, method: 65538 *Jan 3 11:56:05.917: httpc_msg_write, sid: 0, method: 65538 *Jan 3 11:56:05.925: HTTPC_MSG_COMPLETE: rsp_code(200),msg(62CB5824)URL:http://serverX.com/vxml/test/getPhoneInfo.vxml?ani=1234567& dnis=7654321, fd(1) *Jan 3 11:56:05.929: httpc_get, url: http://1.7.100.1/vxml/test/engine.vxml?flow=iso *Jan 3 11:56:05.929: httpc_msg_send, sid: 0, method: 65538 *Jan 3 11:56:05.929: httpc_enqueue_wmsg, sid: 0, method: 65538 *Jan 3 11:56:05.929: httpc_process_free_rsp: User returns noncache response (626F9670) *Jan 3 11:56:05.929: httpc_process_write_queue, socket writeble fd: 1, process enqueued msg, sid: 0, method: 65538 *Jan 3 11:56:05.929: httpc_msg_write, sid: 0, method: 65538 *Jan 3 11:56:05.937: HTTPC_MSG_COMPLETE: rsp_code(200),msg(62CB03AC)URL:http://1.7.100.1/vxml/test/engine.vxml?flow=iso, fd(1)
The following is sample output from the debug http client msg command:
Router# debug http client msg HTTP Client: HTTP Client Messages debugging is on *Jan 1 05:07:30.534: HTTP Client write buffer fd(0): GET /vxml/abcdefg/test/init.vxml HTTP/1.1 Host: c5300-2 Content-Type: application/x-www-form-urlencoded Connection: Keep-Alive Accept: text/vxml; level = 1, text/plain, text/html, audio/basic User-Agent: Cisco-IOS-C5300/12.2(20010829:180555) VoiceXML/1.0 *Jan 1 05:07:30.538: about to send data to socket 0 : first 263 bytes of data: 62397130: 47455420 GET 62397140: 2F76786D 6C2F6162 63646566 672F7465 /vxml/abcdefg/te 62397150: 73742F69 6E69742E 76786D6C 20485454 st/init.vxml HTT 62397160: 502F312E 310D0A48 6F73743A 20633533 P/1.1..Host: c53 62397170: 30302D32 0D0A436F 6E74656E 742D5479 00-2..Content-Ty 62397180: 70653A20 6170706C 69636174 696F6E2F pe: application/ 62397190: 782D7777 772D666F 726D2D75 726C656E x-www-form-urlen 623971A0: 636F6465 640D0A43 6F6E6E65 6374696F coded..Connectio 623971B0: 6E3A204B 6565702D 416C6976 650D0A41 n: Keep-Alive..A 623971C0: 63636570 743A2074 6578742F 76786D6C ccept: text/vxml 623971D0: 3B206C65 76656C20 3D20312C 20746578 ; level = 1, tex 623971E0: 742F706C 61696E2C 20746578 742F6874 t/plain, text/ht 623971F0: 6D6C2C20 61756469 6F2F6261 7369630D ml, audio/basic. 62397200: 0A557365 722D4167 656E743A 20436973 .User-Agent: Cis 62397210: 636F2D49 4F532D43 35333030 2F31322E co-IOS-C5300/12. 62397220: 32283230 30313038 32393A31 38303535 2(20010829:18055 62397230: 35292056 6F696365 584D4C2F 312E300D 5) VoiceXML/1.0. 62397240: 0A0D0A00 .... *Jan 1 05:07:30.546: read data from socket 0 : first 400 bytes of data: 628DE8F0: 48545450 2F312E31 20323030 HTTP/1.1 200 628DE900: 204F4B0D 0A446174 653A2046 72692C20 OK..Date: Fri, 628DE910: 33312041 75672032 30303120 30373A30 31 Aug 2001 07:0 628DE920: 363A3335 20474D54 0D0A5365 72766572 6:35 GMT..Server 628DE930: 3A204170 61636865 2F312E33 2E313120 : Apache/1.3.11 628DE940: 28556E69 78292041 70616368 654A5365 (Unix) ApacheJSe 628DE950: 72762F31 2E300D0A 4C617374 2D4D6F64 rv/1.0..Last-Mod 628DE960: 69666965 643A2057 65642C20 3233204D ified: Wed, 23 M 628DE970: 61792032 30303120 31353A35 333A3233 ay 2001 15:53:23 628DE980: 20474D54 0D0A4554 61673A20 22323430 GMT..ETag: "240 628DE990: 37642D31 39322D33 62306264 63663322 7d-192-3b0bdcf3" 628DE9A0: 0D0A4163 63657074 2D52616E 6765733A ..Accept-Ranges: 628DE9B0: 20627974 65730D0A 436F6E74 656E742D bytes..Content- 628DE9C0: 4C656E67 74683A20 3430320D 0A4B6565 Length: 402..Kee 628DE9D0: 702D416C 6976653A 2074696D 656F7574 p-Alive: timeout 628DE9E0: 3D352C20 6D61783D 31300D0A 436F6E6E =5, max=10..Conn 628DE9F0: 65637469 6F6E3A20 4B656570 2D416C69 ection: Keep-Ali 628DEA00: 76650D0A 436F6E74 656E742D 54797065 ve..Content-Type 628DEA10: 3A207465 78742F76 786D6C0D 0A0D0A3C : text/vxml....< 628DEA20: 3F786D6C 20766572 73696F6E 3D22312E ?xml version="1. 628DEA30: 30223F3E 0A3C7678 6D6C2076 65727369 0"?>.<vxml versi 628DEA40: 6F6E3D22 312E3022 20617070 6C696361 on="1.0" applica 628DEA50: 74696F6E 3D22726F 6F742E76 786D6C22 tion="root.vxml" 628DEA60: 3E0A2020 3C666F72 6D3E0A20 2020203C >. <form>. < 628DEA70: 626C6F63 6B3E0A20 20202020 203C212D block>. <!- 628DEA80: 2D0A2020 20 -. *Jan 1 05:07:30.550: httpc_decode_msgheader: Client ignores this header: Server: Apache/1.3.11 (Unix) ApacheJServ/1.0 *Jan 1 05:07:30.554: httpc_decode_msgheader: Client ignores this header: Accept-Ranges: bytes *Jan 1 05:07:30.554: processing server rsp msg: msg(62C711C4)URL:http://vvv.com/vxml/abcdefg/test/init.vxml, fd(0): *Jan 1 05:07:30.554: Request msg: GET /vxml/abcdefg/test/init.vxml HTTP/1.1 *Jan 1 05:07:30.554: Message Response Code: 200 *Jan 1 05:07:30.554: Message Rsp Decoded Headers: *Jan 1 05:07:30.554: Date:Fri, 31 Aug 2001 07:06:35 GMT *Jan 1 05:07:30.554: Content-Length:402 *Jan 1 05:07:30.554: Content-Type:text/vxml *Jan 1 05:07:30.554: ETag:"2407d-192-3b0bdcf3" *Jan 1 05:07:30.554: Last-Modified:Wed, 23 May 2001 15:53:23 GMT *Jan 1 05:07:30.554: Connection:Keep-Alive *Jan 1 05:07:30.554: Keep-Alive:timeout=5, max=10 *Jan 1 05:07:30.554: httpc_dump_msg: headers: *Jan 1 05:07:30.554: HTTP/1.1 200 OK Date: Fri, 31 Aug 2001 07:06:35 GMT Server: Apache/1.3.11 (Unix) ApacheJServ/1.0 Last-Modified: Wed, 23 May 2001 15:53:23 GMT ETag: "2407d-192-3b0bdcf3" Accept-Ranges: bytes Content-Length: 402 Keep-Alive: timeout=5, max=10 Connection: Keep-Alive Content-Type: text/vxml *Jan 1 05:07:30.558: httpc_dump_msg: body: *Jan 1 05:07:30.558: <?xml version="1.0"?> <vxml version="1.0" application="root.vxml"> <form> <block> <!-- <var name="ani" expr="session.telephone.ani"/> <var name="dnis" expr="session.telephone.dnis"/> --> <var name="ani" expr="1234567"/> <var name="dnis" expr="7654321"/> <submit next="getPhoneInfo.vxml" method="get" namelist="ani dnis"/> </block> </form> </vxml>
The following is sample output from the debug http client socket command:
Router# debug http client socket HTTP Client Sockets debugging is on *Jan 3 11:32:38.353: httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(0) port(80) *Jan 3 11:32:38.377: httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(1) port(80) *Jan 3 11:32:38.381: httpc_socket_cleanup: fd(1) *Jan 3 11:32:38.389: httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(1) port(80) *Jan 3 11:32:38.393: httpc_socket_cleanup: fd(1) *Jan 3 11:32:38.397: httpc_process_read_ev: HTTPC SOCK_PENDING --> SOCK_CONNECTED fd(1) port(80) *Jan 3 11:32:40.361: httpc_socket_cleanup: fd(0) *Jan 3 11:32:40.413: httpc_socket_cleanup: fd(1) *Jan 3 11:40:43.557: httpc socket_connect failed fd(2)
The following is sample output from the debug http client error command:
Router# debug http client error HTTP Client Error debugging is on *Jan 3 12:07:40.209: HTTPC URL:http://serverX.com/vxml/test.vxml, Server rsp_code(404), fd(0) *Jan 3 12:08:01.677: HTTPC SOCK_FAIL() - msg(62CA5FB4)URL:http://serverX/vxml/test.vxml *Jan 3 12:08:01.677: httpc_free: NULL pointer argument *Jan 3 12:08:01.677: HTTPC URL:http://serverX/vxml/test.vxml, MSG_XMIT_ERROR, fd(-1) Jan 3 23:44:06 PDT: HTTPC URL:http://serverY.com:9000/ivr/sid-351/dropoffDeposit?pri=0&disconnect=1, TIMEOUT(60000 msec), fd(-1) Jan 3 23:44:07 PDT: HTTPC msg timeout waiting for rsp - fd(21) Jan 3 23:44:07 PDT: httpc_free: NULL pointer argument Jan 4 02:45:07 PDT: HTTPC msg timeout waiting for rsp - fd(0) Jan 4 02:45:07 PDT: HTTPC URL:http://rtsp-ws/dropoffAppend.php?append=&disconnect=1, TIMEOUT(10000 msec), fd(-1) Jan 4 02:46:07 PDT: httpc_msg_read: URL(http://1.7.100.1/vxml/root.vxml) - msg length not available.Failed to parse message body. Jan 4 02:46:07 PDT: httpc_msg_read: ERROR - DECODE Jan 4 02:46:08 PDT: HTTPC bad message read - fd(6), conp(632A93B4), msg(63280794)URL:http://1.7.100.1/vxml/test/root.vxml, len(1611) Jan 4 02:46:08 PDT: First 400 bytes read from socket: 6241D9C0: 3C3F78 <?x 6241D9D0: 6D6C2076 65727369 6F6E3D22 312E3022 ml version="1.0" 6241D9E0: 3F3E0A3C 76786D6C 20766572 73696F6E ?>.<vxml version 6241D9F0: 3D22312E 30223E0A 0A20203C 70726F70 ="1.0">.. <prop 6241DA00: 65727479 206E616D 653D2263 61636869 erty name="cachi 6241DA10: 6E672220 76616C75 653D2273 61666522 ng" value="safe" 6241DA20: 2F3E0A20 203C7072 6F706572 7479206E />. <property n 6241DA30: 616D653D 2274696D 656F7574 22207661 ame="timeout" va 6241DA40: 6C75653D 22333073 222F3E0A 20203C70 lue="30s"/>. <p 6241DA50: 726F7065 72747920 6E616D65 3D226665 roperty name="fe 6241DA60: 74636874 696D656F 75742220 76616C75 tchtimeout" valu 6241DA70: 653D2236 3073222F 3E0A2020 3C70726F e="60s"/>. <pro 6241DA80: 70657274 79206E61 6D653D22 696E7075 perty name="inpu 6241DA90: 746D6F64 65732220 76616C75 653D2264 tmodes" value="d 6241DAA0: 746D6622 2F3E0A0A 20203C76 6172206E tmf"/>.. <var n 6241DAB0: 616D653D 22736964 22206578 70723D22 ame="sid" expr=" 6241DAC0: 27313131 31312722 2F3E0A20 203C7661 '11111'"/>. <va 6241DAD0: 72206E61 6D653D22 6C632220 65787072 r name="lc" expr 6241DAE0: 3D222765 6E2D7573 27222F3E 0A20203C ="'en-us'"/>. < 6241DAF0: 76617220 6E616D65 3D226861 6E646C65 var name="handle 6241DB00: 22206578 70723D22 74727565 222F3E0A " expr="true"/>. 6241DB10: 0A20203C 63617463 68206576 656E743D . <catch event= 6241DB20: 2274656C 6570686F 6E652E64 6973636F "telephone.disco 6241DB30: 6E6E6563 74222063 6F6E643D 2268616E nnect" cond="han 6241DB40: 646C6522 3E0A2020 20203C61 73736967 dle">. <assig 6241DB50: 6E206E61 6D653D22 68616E64 6C65 n name="handle Jan 4 02:47:08 PDT: httpc_free: NULL pointer argument Jan 4 02:47:09 PDT: HTTPC URL:http://1.7.100.1/vxml/test/root.vxml, MSG_DECODE_ERROR, fd(6) Jan 4 03:47:09 PDT: WARNING:httpc_msg_retry: msg(6325CDD4):http://vvv.com/vxml/prompts/5.au
Related Commands
Command |
Description |
---|---|
debug condition application voice |
Displays debugging messages for only the specified VoiceXML application. |
debug voip ivr |
Displays debugging messages for VoIP IVR interactions. |
debug vxml |
Displays debugging messages for VoIP VoiceXML interactions. |
debug http client cookie
To display debugging traces for cookie-related processes, including sending, receiving, validating, storing, and expiring a cookie, use the debug http client cookie command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug http client cookie
no debug http client cookie
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.3(8)T |
This command was introduced. |
Examples
The following sample output from the debug http client cookiecommand shows that a cookie is being received and stored:
Router# debug http client cookie *May 6 23:23:41.995: //38//HTTPC:/httpc_decode_msgheader: received cookie:TestCookieX=username; path=/; domain=.cisco.com URL:http://rtsp-ws.cisco.com/cookie.php *May 6 23:23:41.995: //38//HTTPC:/httpc_decode_msgheader: received cookie:TestCookieY=password; expires=Thu, 06-May-04 22:30:47 GMT; path=/; domain=.cisco.com URL:http://rtsp-ws.cisco.com/cookie.php *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: validating cookie:TestCookieX=username; path=/; domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: store cookie:TestCookieX=username path=/ domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: rtsp-7#validating cookie:TestCookieY=password; expires=Thu, 06-May-04 22:30:47 GMT; path=/; domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_cookie_store: store cookie:TestCookieY=password path=/ domain=.cisco.com *May 6 23:23:41.995: //38//HTTPC:/httpc_process_response: TestCookieY=password path=/ domain=.cisco.com TestCookieX=username path=/ domain=.cisco.com
Related Commands
Command |
Description |
---|---|
http client cache memory |
Configures the memory limits for the HTTP client cache. |
http client cache refresh |
Configures the refresh time for the HTTP client cache. |
http client cookie |
Enables the HTTP client to send and receive cookies. |
show http client cookie |
Displays cookies that are being stored by the HTTP client. |
debug hw-module all upgrade
To enable debug messages for field-programmable devices (FPDs), use the debug hw-module all upgradecommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module all upgrade [ error | event ]
no debug hw-module all upgrade [ error | event ]
Syntax Description
all |
Enable debug messaging for all supported modules in the system. |
error |
(Optional) Enables display of FPD upgrade error messages. |
event |
(Optional) Enables display of FPD upgrade event messages. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2(33)SCB |
This command was integrated into Cisco IOS Release 12.2(33)SCB. The FPD image upgrade is supported only for the SPAs inserted in the Cisco SIP 600 on a Cisco uBR100012 router. |
Usage Guidelines
The debug hw-module all upgradecommand is intended for use by Cisco Systems technical support personnel.
If you attempt to use this command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
For more information about FPD upgrades on SPA interface processors (SIPs) and shared port adapters (SPAs), refer to the Cisco 7600 Series Router SIP, SSC, and SPA Software Configuration Guide.
Examples
The following example enables FPD upgrade debug messages for all supported card types on the Cisco 7600 series router:
Router# debug hw-module all upgrade
debug hw-module subslot
To debug a shared port adapter SPA and all of its interfaces, use the debug hw-module subslotcommandin privileged EXEC configuration mode.
debug hw-module subslot slotsubslot { all | driver | fpga | if | mac | phy | tcam | upgrade [ error | event ] intr | force-intr }
no debug hw-module subslot slotsubslot { all | driver | fpga | if | mac | phy | tcam | upgrade [ error | event ] intr | force-intr }
Syntax Description
slot |
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding “Identifying Slots and Subslots for SIPs and SPAs” topic in the platform-specific SPA software configuration guide. |
||
/ subslot |
Secondary slot number on a SIP where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding “Specifying the Interface Address on a SPA” topic in the platform-specific SPA software configuration guide for subslot information. |
||
all |
Enables all SPA debug messages. |
||
driver |
Enables debug messages for SPA drivers. |
||
fpga |
Enables debug messages related to SPA field programmable gate array (FPGA) processing. |
||
if |
Enables debug messages related to SPA interface processing |
||
mac |
Enables debug messages related to SPA MAC driver processing. |
||
phy |
Enables debug messages related to SPA PHY driver processing. |
||
tcam |
Enables debug messages related to SPA ternary content addressable memory (TCAM) processing. |
||
upgrade [error | event |
Enables debug messages related to Field-Programmable Device (FPD) upgrade information. |
||
intr |
Enables debug messages related to SPA interrupts.
|
||
force-intr |
Enables debug messages related to manually forced SPA interrupts.
|
Command Default
No default behavior or values.
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(20)S2 |
Thiscommand was introduced. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The debug hw-module subslot command is intended for use by Cisco Systems technical support personnel.
If you attempt to use this command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example enables interface debug messages for the 4-Port 10/100 Fast Ethernet located in the top subslot (0) of the MSC that is installed in slot 4 of the Cisco 7304 router and shows an interface being shut down and restarted:
Router# debug hw-module subslot 4/0 if SPA 4xFE/2xGE interface debugging is on Router# conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)# int fast 4/0/0 Router(config-if)# shut Router(config-if)# 4d01h: Interface FastEthernet4/0/0, stopping the devices 4d01h: Interface FastEthernet4/0/0, Turning off the port LED Router(config-if)# 4d01h: %LINK-5-CHANGED: Interface FastEthernet4/0/0, changed state to administratively down 4d01h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet4/0/0, changed state to down Router(config-if)# Router(config-if)# no shut Router(config-if)# 4d01h: Interface FastEthernet4/0/0, stopping the devices 4d01h: Interface FastEthernet4/0/0, clearing the MAC address filter table 4d01h: Interface FastEthernet4/0/0, Disabling promiscuous mode 4d01h: Interface FastEthernet4/0/0, setting the MAC address to 00b0.64ff.4480 4d01h: Interface FastEthernet4/0/0, Disabling promiscuous mode 4d01h: Interface FastEthernet4/0/0, configuring media_type = RJ45, speed = Auto Speed, duplex = Auto Duplex, mode = auto-negotiation 4d01h: Interface FastEthernet4/0/0, starting the devices 4d01h: Interface FastEthernet4/0/0, clearing the hardware counters 4d01h: %LINK-3-UPDOWN: Interface FastEthernet4/0/0, changed state to up 4d01h: Interface FastEthernet4/0/0, Setting port LED to green 4d01h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet4/0/0, changed state to up
Related Commands
Command |
Description |
---|---|
show controllers fastethernet |
Displays Fast Ethernet interface information, transmission statistics and errors, and applicable MAC destination address and VLAN filtering tables. |
show controllers gigabitethernet |
Displays Gigabit Ethernet interface information, transmission statistics and errors, and applicable MAC destination address and VLAN filtering tables. |
show tcam-mgr subslot |
Displays TCAM manager information for SPAs. |
test hw-module subslot mac |
Tests the MAC device on a SPA. |
test hw-module subslot phy |
Tests the PHY device on a SPA. |
test hw-module subslot tcam |
Tests the TCAM device on a SPA. |
test tcam-mgr subslot |
Tests the TCAM manager for a SPA. |
debug hw-module subslot commands
To enable debug messages for control plane configuration and commands on a shared port adapter (SPA), use the debug hw-module subslot commandscommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module subslot { slotsubslot | all } commands
no debug hw-module subslot { slotsubslot | all } commands
Syntax Description
slot |
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding “Identifying Slots and Subslots for SIPs and SPAs” topic in the platform-specific SPA software configuration guide. |
/ subslot |
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding “Specifying the Interface Address on a SPA” topic in the platform-specific SPA software configuration guide for subslot information. |
all |
Enable debug messaging for all supported modules in the system. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.0(31)S |
This command was integrated into Cisco IOS Release 12.0(31)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug hw-module subslotcommands are intended for use by Cisco Systems technical support personnel.
If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example enables control plane debug messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 commands
debug hw-module subslot errors
To enable debug messages for error handling and race conditions on a shared port adapter (SPA), use the debug hw-module subslot errorscommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module subslot { slotsubslot | all } errors
no debug hw-module subslot { slotsubslot | all } errors
Syntax Description
slot |
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding “Identifying Slots and Subslots for SIPs and SPAs” topic in the platform-specific SPA software configuration guide. |
/ subslot |
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding “Specifying the Interface Address on a SPA” topic in the platform-specific SPA software configuration guide for subslot information. |
all |
Enable debug messaging for all supported modules in the system. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.0(31)S |
This command was integrated into Cisco IOS Release 12.0(31)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug hw-module subslotcommands are intended for use by Cisco Systems technical support personnel.
If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example enables error handling debug messages for the SPA located in the top subslot (0) of the SPA that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 errors
debug hw-module subslot events
To enable debug messages for control plane event notifications on a shared port adapter (SPA), use the debug hw-module subslot eventscommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module subslot { slotsubslot | all } events
no debug hw-module subslot { slotsubslot | all } events
Syntax Description
slot |
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding “Identifying Slots and Subslots for SIPs and SPAs” topic in the platform-specific SPA software configuration guide. |
/ subslot |
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding “Specifying the Interface Address on a SPA” topic in the platform-specific SPA software configuration guide for subslot information. |
all |
Enable debug messaging for all supported modules in the system. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.0(31)S |
This command was integrated into Cisco IOS Release 12.0(31)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug hw-module subslotcommands are intended for use by Cisco Systems technical support personnel.
If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example enables control plane event messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 events
debug hw-module subslot interrupts
To enable debug messages for interrupt handling on a shared port adapter (SPA), use the debug hw-module subslot interruptscommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module subslot interruptsslot/subslot | | allinterface
no debug hw-module subslot interruptsslot /subslot | | allinterface
Syntax Description
slot |
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding “Identifying Slots and Subslots for SIPs and SPAs” topic in the platform-specific SPA software configuration guide. |
/ subslot |
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding “Specifying the Interface Address on a SPA” topic in the platform-specific SPA software configuration guide for subslot information. |
all |
Enable debug messaging for all supported modules in the system. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.0(31)S |
This command was integrated into Cisco IOS Release 12.0(31)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug hw-module subslotcommands are intended for use by Cisco Systems technical support personnel.
If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example enables interrupt handling debug messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router :
Router# debug hw-module subslot 4/0 interrupts
debug hw-module subslot ipcshim
To enable debug messages for Inter-Process Communication (IPC) shim application processing for all supported modules in the system, use the debug hw-module subslot ipcshimcommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module subslot all ipcshim
no debug hw-module subslot all ipcshim
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug hw-module subslotcommands are intended for use by Cisco Systems technical support personnel.
The debug hw-module subslot ipcshimcommand is only supported by certain shared port adapters (SPAs).
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example enables IPC SHIM application debug messages for all supported modules in the router:
Router# debug hw-module subslot all ipcshim
debug hw-module subslot oir
To enable debug messages for online insertion and removal (OIR) processing on a shared port adapter (SPA), use the debug hw-module subslot oircommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module subslot { slotsubslot | all } oir { plugin | state-machine }
no debug hw-module subslot { slotsubslot | all } oir { plugin | state-machine }
Syntax Description
slot |
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding “Identifying Slots and Subslots for SIPs and SPAs” topic in the platform-specific SPA software configuration guide. |
/ subslot |
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding “Specifying the Interface Address on a SPA” topic in the platform-specific SPA software configuration guide for subslot information. |
all |
Enable debug messaging for all supported modules in the system. |
plugin |
Enable debug messaging for platform-provided plugin routines. |
state-machine |
Enable debug messaging for SPA OIR state machines. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC (#)
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.0(31)S |
This command was integrated into Cisco IOS Release 12.0(31)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The debug hw-module subslotcommands are intended for use by Cisco Systems technical support personnel.
If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example shows enabling of OIR plugin debug messages for the SPA located in subslot 1 of the SIP that is installed in slot 4 of the router , and the corresponding messages during a SPA reload:
Router# debug hw-module subslot 4/1 oir plugin WARNING: This command is not intended for production use and should only be used under the supervision of Cisco Systems technical support personnel. SPA subslot 4/1: SPA specific oir handling debugging is on Router# hw-module subslot 4/1 reload Router# Mar 26 01:35:04: cwrp_handle_spa_oir_tsm_event: subslot 4/1 event=9 Mar 26 01:35:04: cwrp_handle_spa_oir_tsm_event: subslot 4/1 event=1 Router# Mar 26 01:35:09: cwrp_handle_spa_oir_tsm_event: subslot 4/1 event=0 Mar 26 01:35:10: cwrp_handle_spa_oir_tsm_event: subslot 4/1 event=2
debug hw-module subslot periodic
To enable debug messages for periodic processing on a shared port adapter (SPA), use the debug hw-module subslot periodiccommandin privileged EXEC configuration mode. To disable debug messages, use the no form of the command.
debug hw-module subslot { slotsubslot | all } periodic
no debug hw-module subslot { slotsubslot | all } periodic
Syntax Description
slot |
Chassis slot number. Refer to the appropriate hardware manual for slot information. For SIPs, refer to the platform-specific SPA hardware installation guide or the corresponding “Identifying Slots and Subslots for SIPs and SPAs” topic in the platform-specific SPA software configuration guide. |
/ subslot |
Secondary slot number on a SPA interface processor (SIP) where a SPA is installed. Refer to the platform-specific SPA hardware installation guide and the corresponding “Specifying the Interface Address on a SPA” topic in the platform-specific SPA software configuration guide for subslot information. |
all |
Enable debug messaging for all supported modules in the system. |
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release |
Modification |
---|---|
12.2(18)SXE |
Thiscommand was introduced. |
12.0(31)S |
This command was integrated into Cisco IOS Release 12.0(31)S. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The debug hw-module subslotcommands are intended for use by Cisco Systems technical support personnel.
If you attempt to use a debug hw-module subslot command without a SPA installed, or with an incompatible SPA installed, the keyword options are not provided.
Caution | Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco Systems technical support personnel. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. |
Examples
The following example enables periodic processing debug messages for the SPA located in the top subslot (0) of the SIP that is installed in slot 4 of a router:
Router# debug hw-module subslot 4/0 periodic