Table Of Contents
L2TP Congestion Avoidance
The L2TP Congestion Avoidance feature provides packet flow control and congestion avoidance by throttling Layer 2 Transport Protocol (L2TP) control messages as described in RFC 2661. Throttling L2TP control message packets prevents dropped sessions when the peer's input buffer overflows.
Before the introduction of the L2TP Congestion Avoidance feature, the window size used to send packets between the network access server (NAS) and the tunnel server was set to the value advertised by the peer endpoint and was never changed. Configuring the L2TP Congestion Avoidance feature allows the L2TP packet window to be dynamically resized using a sliding window mechanism. The window size grows larger when packets are delivered successfully, and is reduced when dropped packets must be retransmitted.
L2TP congestion avoidance is useful in networks with a relatively high rate of calls being placed by either tunnel endpoint. L2TP congestion avoidance is also useful on highly scalable platforms such as the Cisco 10000 router, which supports a large number of simultaneous sessions.
Configuration Information
Configuration information is included in the "VPDN Tunnel Management" chapter in the Cisco IOS VPDN Configuration Guide, Release 12.4T, at the following URL:
•http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcg/tvpdn_c/vpc7tmht.htm
Command Reference
This section documents new and modified commands.
debug vpdn
To troubleshoot Layer 2 Forwarding (L2F) or Layer 2 Tunnel Protocol (L2TP) virtual private dialup network (VPDN) tunneling events and infrastructure, use the debug vpdn command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug vpdn {call {event | fsm} | error | event [disconnect] | l2tp-sequencing | l2x-data | l2x-errors | l2x-events | l2x-packets | message | packet [detail | errors] | sss {error | event | fsm}}
no debug vpdn {call {event | fsm} | error | event [disconnect] | l2tp-sequencing | l2x-data | l2x-errors | l2x-events | l2x-packets | message | packet [detail | errors] | sss {error | event | fsm}}
Syntax Description
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Note that the debug vpdn packet and debug vpdn packet detail commands generate several debug operations per packet. Depending on the L2TP traffic pattern, these commands may cause the CPU load to increase to a high level that impacts performance.
Examples
This section contains the following examples:
•Debugging VPDN Events on a NAS—Normal L2F Operations
•Debugging VPDN Events on the Tunnel Server—Normal L2F Operations
•Debugging VPDN Events on the NAS—Normal L2TP Operations
•Debugging VPDN Events on the Tunnel Server—Normal L2TP Operations
•Debugging Protocol-Specific Events on the NAS—Normal L2F Operations
•Debugging Protocol-Specific Events on the Tunnel Server—Normal L2F Operations
•Displaying L2TP Congestion Avoidance Settings
•Debugging Errors on the NAS—L2F Error Conditions
•Debugging L2F Control Packets for Complete Information
•Debugging an L2TPv3 Xconnect Session—Normal Operations
•Debugging Control Channel Authentication Events
Debugging VPDN Events on a NAS—Normal L2F Operations
The network access server (NAS) has the following VPDN configuration:
vpdn-group 1request-dialinprotocol l2fdomain cisco.cominitiate-to ip 172.17.33.125username nas1 password nas1The following is sample output from the debug vpdn event command on a NAS when an L2F tunnel is brought up and Challenge Handshake Authentication Protocol (CHAP) authentication of the tunnel succeeds:
Router# debug vpdn event%LINK-3-UPDOWN: Interface Async6, changed state to up*Mar 2 00:26:05.537: looking for tunnel -- cisco.com --*Mar 2 00:26:05.545: Async6 VPN Forwarding...*Mar 2 00:26:05.545: Async6 VPN Bind interface direction=1*Mar 2 00:26:05.553: Async6 VPN vpn_forward_user user6@cisco.com is forwarded%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up*Mar 2 00:26:06.289: L2F: Chap authentication succeeded for nas1.The following is sample output from the debug vpdn event command on a NAS when the L2F tunnel is brought down normally:
Router# debug vpdn event%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down%LINK-5-CHANGED: Interface Async6, changed state to reset*Mar 2 00:27:18.865: Async6 VPN cleanup*Mar 2 00:27:18.869: Async6 VPN reset*Mar 2 00:27:18.873: Async6 VPN Unbind interface%LINK-3-UPDOWN: Interface Async6, changed state to downTable 1 describes the significant fields shown in the two previous displays. The output describes normal operations when an L2F tunnel is brought up or down on a NAS.
Debugging VPDN Events on the Tunnel Server—Normal L2F Operations
The tunnel server has the following VPDN configuration, which uses nas1 as the tunnel name and the tunnel authentication name. The tunnel authentication name might be entered in a user's file on an authentication, authorization, and accounting (AAA) server and used to define authentication requirements for the tunnel.
vpdn-group 1accept-dialinprotocol l2fvirtual-template 1terminate-from hostname nas1The following is sample output from the debug vpdn event command on the tunnel server when an L2F tunnel is brought up successfully:
Router# debug vpdn eventL2F: Chap authentication succeeded for nas1.Virtual-Access3 VPN Virtual interface created for user6@cisco.comVirtual-Access3 VPN Set to Async interfaceVirtual-Access3 VPN Clone from Vtemplate 1 block=1 filterPPP=0%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to upVirtual-Access3 VPN Bind interface direction=2Virtual-Access3 VPN PPP LCP accepted sent & rcv CONFACK%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to upThe following is sample output from the debug vpdn event command on a tunnel server when an L2F tunnel is brought down normally:
Router# debug vpdn event%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to downVirtual-Access3 VPN cleanupVirtual-Access3 VPN resetVirtual-Access3 VPN Unbind interfaceVirtual-Access3 VPN reset%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to downTable 2 describes the fields shown in two previous outputs. The output describes normal operations when an L2F tunnel is brought up or down on a tunnel server.
Debugging VPDN Events on the NAS—Normal L2TP Operations
The following is sample output from the debug vpdn event command on the NAS when an L2TP tunnel is brought up successfully:
Router# debug vpdn event20:19:17: L2TP: I SCCRQ from ts1 tnl 820:19:17: L2X: Never heard of ts120:19:17: Tnl 7 L2TP: New tunnel created for remote ts1, address 172.21.9.420:19:17: Tnl 7 L2TP: Got a challenge in SCCRQ, ts120:19:17: Tnl 7 L2TP: Tunnel state change from idle to wait-ctl-reply20:19:17: Tnl 7 L2TP: Got a Challenge Response in SCCCN from ts120:19:17: Tnl 7 L2TP: Tunnel Authentication success20:19:17: Tnl 7 L2TP: Tunnel state change from wait-ctl-reply to established20:19:17: Tnl 7 L2TP: SM State established20:19:17: Tnl/Cl 7/1 L2TP: Session FS enabled20:19:17: Tnl/Cl 7/1 L2TP: Session state change from idle to wait-for-tunnel20:19:17: Tnl/Cl 7/1 L2TP: New session created20:19:17: Tnl/Cl 7/1 L2TP: O ICRP to ts1 8/120:19:17: Tnl/Cl 7/1 L2TP: Session state change from wait-for-tunnel to wait-connect20:19:17: Tnl/Cl 7/1 L2TP: Session state change from wait-connect to established20:19:17: Vi1 VPDN: Virtual interface created for bum1@cisco.com20:19:17: Vi1 VPDN: Set to Async interface20:19:17: Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking20:19:18: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up20:19:18: Vi1 VPDN: Bind interface direction=220:19:18: Vi1 VPDN: PPP LCP accepting rcv CONFACK20:19:19: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
Debugging VPDN Events on the Tunnel Server—Normal L2TP Operations
The following is sample output from the debug vpdn event command on the tunnel server when an L2TP tunnel is brought up successfully:
Router# debug vpdn event20:47:33: %LINK-3-UPDOWN: Interface Async7, changed state to up20:47:35: As7 VPDN: Looking for tunnel -- cisco.com --20:47:35: As7 VPDN: Get tunnel info for cisco.com with NAS nas1, IP 172.21.9.1320:47:35: As7 VPDN: Forward to address 172.21.9.1320:47:35: As7 VPDN: Forwarding...20:47:35: As7 VPDN: Bind interface direction=120:47:35: Tnl/Cl 8/1 L2TP: Session FS enabled20:47:35: Tnl/Cl 8/1 L2TP: Session state change from idle to wait-for-tunnel20:47:35: As7 8/1 L2TP: Create session20:47:35: Tnl 8 L2TP: SM State idle20:47:35: Tnl 8 L2TP: Tunnel state change from idle to wait-ctl-reply20:47:35: Tnl 8 L2TP: SM State wait-ctl-reply20:47:35: As7 VPDN: bum1@cisco.com is forwarded20:47:35: Tnl 8 L2TP: Got a challenge from remote peer, nas120:47:35: Tnl 8 L2TP: Got a response from remote peer, nas120:47:35: Tnl 8 L2TP: Tunnel Authentication success20:47:35: Tnl 8 L2TP: Tunnel state change from wait-ctl-reply to established20:47:35: Tnl 8 L2TP: SM State established20:47:35: As7 8/1 L2TP: Session state change from wait-for-tunnel to wait-reply20:47:35: As7 8/1 L2TP: Session state change from wait-reply to established20:47:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async7, changed state to upDebugging Protocol-Specific Events on the NAS—Normal L2F Operations
The following is sample output from the debug vpdn l2x-events command on the NAS when an L2F tunnel is brought up successfully:
Router# debug vpdn l2x-events%LINK-3-UPDOWN: Interface Async6, changed state to up*Mar 2 00:41:17.365: L2F Open UDP socket to 172.21.9.26*Mar 2 00:41:17.385: L2F_CONF received*Mar 2 00:41:17.389: L2F Removing resend packet (type 1)*Mar 2 00:41:17.477: L2F_OPEN received*Mar 2 00:41:17.489: L2F Removing resend packet (type 2)*Mar 2 00:41:17.493: L2F building nas2gw_mid0%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up*Mar 2 00:41:18.613: L2F_OPEN received*Mar 2 00:41:18.625: L2F Got a MID management packet*Mar 2 00:41:18.625: L2F Removing resend packet (type 2)*Mar 2 00:41:18.629: L2F MID synced NAS/HG Clid=7/15 Mid=1 on Async6The following is sample output from the debug vpdn l2x-events command on a NAS when an L2F tunnel is brought down normally:
Router# debug vpdn l2x-events%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down%LINK-5-CHANGED: Interface Async6, changed state to reset*Mar 2 00:42:29.213: L2F_CLOSE received*Mar 2 00:42:29.217: L2F Destroying mid*Mar 2 00:42:29.217: L2F Removing resend packet (type 3)*Mar 2 00:42:29.221: L2F Tunnel is going down!*Mar 2 00:42:29.221: L2F Initiating tunnel shutdown.*Mar 2 00:42:29.225: L2F_CLOSE received*Mar 2 00:42:29.229: L2F_CLOSE received*Mar 2 00:42:29.229: L2F Got closing for tunnel*Mar 2 00:42:29.233: L2F Removing resend packet*Mar 2 00:42:29.233: L2F Closed tunnel structure%LINK-3-UPDOWN: Interface Async6, changed state to down*Mar 2 00:42:31.793: L2F Closed tunnel structure*Mar 2 00:42:31.793: L2F Deleted inactive tunnelTable 3 describes the fields shown in the displays.
Debugging Protocol-Specific Events on the Tunnel Server—Normal L2F Operations
The following is sample output from the debug vpdn l2x-events command on a tunnel server when an L2F tunnel is created:
Router# debug vpdn l2x-eventsL2F_CONF receivedL2F Creating new tunnel for nas1L2F Got a tunnel named nas1, respondingL2F Open UDP socket to 172.21.9.25L2F_OPEN receivedL2F Removing resend packet (type 1)L2F_OPEN receivedL2F Got a MID management packet%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to upThe following is sample output from the debug vpdn l2x-events command on a tunnel server when the L2F tunnel is brought down normally:
Router# debug vpdn l2x-eventsL2F_CLOSE receivedL2F Destroying midL2F Removing resend packet (type 3)L2F Tunnel is going down!L2F Initiating tunnel shutdown.%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to downL2F_CLOSE receivedL2F Got closing for tunnelL2F Removing resend packetL2F Removing resend packetL2F Closed tunnel structureL2F Closed tunnel structureL2F Deleted inactive tunnel%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to downTable 4 describes the significant fields shown in the displays.
Displaying L2TP Congestion Avoidance Settings
The following partial example of the debug vpdn l2x-events command is useful for monitoring a network running the L2TP Congestion Avoidance feature. The report shows that the congestion window (CWND) window has been reset to 1 because of packet retransmissions:
Router# debug vpdn l2x-events
...*Jul 15 19:02:57.963: Tnl 47100 L2TP: Congestion Control event received is retransmission*Jul 15 19:02:57.963: Tnl 47100 L2TP: Congestion Window size, Cwnd 1*Jul 15 19:02:57.963: Tnl 47100 L2TP: Slow Start threshold, Ssthresh 2*Jul 15 19:02:57.963: Tnl 47100 L2TP: Remote Window size, 500*Jul 15 19:02:57.963: Tnl 47100 L2TP: Control channel retransmit delay set to 4 seconds*Jul 15 19:03:01.607: Tnl 47100 L2TP: Update ns/nr, peer ns/nr 2/5, our ns/nr 5/2The following partial example shows that traffic has been restarted with L2TP congestion avoidance throttling traffic:
Router# debug vpdn l2x-events
...*Jul 15 14:45:16.123: Tnl 30597 L2TP: Control channel retransmit delay set to 2 seconds*Jul 15 14:45:16.123: Tnl 30597 L2TP: Tunnel state change from idle to wait-ctl-reply*Jul 15 14:45:16.131: Tnl 30597 L2TP: Congestion Control event received is positive acknowledgement*Jul 15 14:45:16.131: Tnl 30597 L2TP: Congestion Window size, Cwnd 2*Jul 15 14:45:16.131: Tnl 30597 L2TP: Slow Start threshold, Ssthresh 500*Jul 15 14:45:16.131: Tnl 30597 L2TP: Remote Window size, 500*Jul 15 14:45:16.131: Tnl 30597 L2TP: Congestion Ctrl Mode is Slow StartTable 5 briefly describes the sigificant fields shown in the displays. See RFC 2661 for more details about the information in the reports for L2TP congestion avoidance.
Debugging Errors on the NAS—L2F Error Conditions
The following is sample output from the debug vpdn error command on a NAS when the L2F tunnel is not set up:
Router# debug vpdn error%LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to down%LINK-5-CHANGED: Interface Async1, changed state to reset%LINK-3-UPDOWN: Interface Async1, changed state to down%LINK-3-UPDOWN: Interface Async1, changed state to up%LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to upVPDN tunnel management packet failed to authenticateVPDN tunnel management packet failed to authenticateTable 6 describes the significant fields shown in the display.
The following is sample output from the debug vpdn l2x-errors command:
Router# debug vpdn l2x-errors%LINK-3-UPDOWN: Interface Async1, changed state to upL2F Out of sequence packet 0 (expecting 0)L2F Tunnel authentication succeeded for cisco.comL2F Received a close request for a non-existent midL2F Out of sequence packet 0 (expecting 0)L2F packet has bogus1 key 1020868 D248BA0FL2F packet has bogus1 key 1020868 D248BA0FTable 7 describes the significant fields shown in the display.
Debugging L2F Control Packets for Complete Information
The following is sample output from the debug vpdn l2x-packets command on a NAS. This example displays a trace for a ping command.
Router# debug vpdn l2x-packetsL2F SENDING (17): D0 1 1 10 0 0 0 4 0 11 0 0 81 94 E1 A0 4L2F header flags: 53249 version 53249 protocol 1 sequence 16 mid 0 cid 4length 17 offset 0 key 1701976070L2F RECEIVED (17): D0 1 1 10 0 0 0 4 0 11 0 0 65 72 18 6 5L2F SENDING (17): D0 1 1 11 0 0 0 4 0 11 0 0 81 94 E1 A0 4L2F header flags: 53249 version 53249 protocol 1 sequence 17 mid 0 cid 4length 17 offset 0 key 1701976070L2F RECEIVED (17): D0 1 1 11 0 0 0 4 0 11 0 0 65 72 18 6 5L2F header flags: 57345 version 57345 protocol 2 sequence 0 mid 1 cid 4length 32 offset 0 key 1701976070L2F-IN Output to Async1 (16): FF 3 C0 21 9 F 0 C 0 1D 41 AD FF 11 46 87L2F-OUT (16): FF 3 C0 21 A F 0 C 0 1A C9 BD FF 11 46 87L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4length 32 offset 0 key -2120949344L2F-OUT (101): 21 45 0 0 64 0 10 0 0 FF 1 B9 85 1 0 0 3 1 0 0 1 8 0 62 B10 0 C A8 0 0 0 0 0 11 E E0 AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CDAB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD ABCD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CDL2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4length 120 offset 3 key -2120949344L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4length 120 offset 3 key 1701976070L2F-IN Output to Async1 (101): 21 45 0 0 64 0 10 0 0 FF 1 B9 85 1 0 0 1 1 00 3 0 0 6A B1 0 0 C A8 0 0 0 0 0 11 E E0 AB CD AB CD AB CD AB CD AB CD AB CDAB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD ABCD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CDTable 8 describes the significant fields shown in the display.
Debugging an L2TPv3 Xconnect Session—Normal Operations
The following example shows output from the debug vpdn l2x-events command for an L2TP version 3 (L2TPv3) xconnect session on an Ethernet interface:
Router# debug vpdn l2x-events23:31:18: L2X: l2tun session [1669204400], event [client request], old state [open], new state [open]23:31:18: L2X: L2TP: Received L2TUN message <Connect>23:31:18: Tnl/Sn58458/28568 L2TP: Session state change from idle to wait-for-tunnel23:31:18: Tnl/Sn58458/28568 L2TP: Create session23:31:18: Tnl58458 L2TP: SM State idle23:31:18: Tnl58458 L2TP: O SCCRQ23:31:18: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds23:31:18: Tnl58458 L2TP: Tunnel state change from idle to wait-ctl-reply23:31:18: Tnl58458 L2TP: SM State wait-ctl-reply23:31:18: Tnl58458 L2TP: I SCCRP from router23:31:18: Tnl58458 L2TP: Tunnel state change from wait-ctl-reply to established23:31:18: Tnl58458 L2TP: O SCCCN to router tnlid 801223:31:18: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds23:31:18: Tnl58458 L2TP: SM State established23:31:18: Tnl/Sn58458/28568 L2TP: O ICRQ to router 8012/023:31:18: Tnl/Sn58458/28568 L2TP: Session state change from wait-for-tunnel to wait-reply23:31:19: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds23:31:20: %LINK-3-UPDOWN: Interface Ethernet2/1, changed state to up23:31:21: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet2/1, changed state to up23:31:25: L2X: Sending L2TUN message <Connect OK>23:31:25: Tnl/Sn58458/28568 L2TP: O ICCN to router 8012/3514923:31:25: Tnl58458 L2TP: Control channel retransmit delay set to 1 seconds23:31:25: Tnl/Sn58458/28568 L2TP: Session state change from wait-reply to established23:31:25: L2X: l2tun session [1669204400], event [server response], old state [open], new state [open]23:31:26: Tnl58458 L2TP: Control channel retransmit delay set to 1 secondsDebugging Control Channel Authentication Events
The following debug messages show control channel authentication failure events in Cisco IOS Release 12.0(31)S:
Router# debug vpdn l2x-events!Tnl41855 L2TP: Per-Tunnel auth counter, Overall Failed, now 1Tnl41855 L2TP: Tunnel auth counter, Overall Failed, now 219!Related Commands
l2tp congestion-control
To enable Layer 2 Transport Protocol (L2TP) congestion avoidance, use the l2tp congestion-control command in global configuration mode. To disable L2TP congestion avoidance (default state), use the no form of this command.
l2tp congestion-control
no l2tp congestion-control
Syntax Description
This command has no arguments or keywords.
Command Default
L2TP congestion avoidance is disabled.
Command Modes
Global configuration
Command History
Release Modification12.2(28)SB
This command was introduced.
12.4(15)T
This command was integrated into Cisco IOS Release 12.4(15)T and support was added for L2TP congestion avoidance statistics.
Usage Guidelines
The l2tp congestion-control command operates as a user-controlled on-off switch. An L2TP sliding window mechanism is enabled or disabled by this command, but only for those tunnels that come up after the configuration has been applied. In other words, tunnels that exist when the l2tp congestion-control command is enabled remain unaffected by the command. The reason for this is to avoid a situation where the the sliding window mechanism is enabled at a point in transmissions where the existing size of the resend queue is much larger than the congestion window. It is not desirable, nor is there a reason, for the configuration to have to apply to all L2TP tunnels.
The congestion window size is not allowed to exceed the size of the advertised window obtained from the receive window size set by the l2tp tunnel receive-window VPDN group configuration command. Lowering the value of the receive window will result in lowering the number of calls per second being negotiated, and if a network is congested, the receive window size should be lowered. Increasing this value depends on how congested the network is. When the network becomes less congested, the receive window size can be increased again.
Examples
The following example enables L2TP congestion avoidance:
Router(config)# l2tp congestion-control
Related Commands
show vpdn tunnel
To display information about active Layer 2 tunnels for a virtual private dialup network (VPDN), use the show vpdn tunnel command in privileged EXEC mode.
show vpdn tunnel [l2f | l2tp | pptp] [all [filter] | packets [filter] | state [filter] | summary [filter] | transport [filter]]
Syntax Description
l2f
(Optional) Specifies that only information about Layer 2 Forwarding (L2F) tunnels will be displayed.
l2tp
(Optional) Specifies that only information about Layer 2 Tunnel Protocol (L2TP) tunnels will be displayed.
pptp
(Optional) Specifies that only information about Point-to-Point Tunnel Protocol (PPTP) tunnels will be displayed.
all
(Optional) Displays summary information about all active tunnels.
filter
(Optional) One of the filter parameters defined in Table 9.
packets
(Optional) Displays packet numbers and packet byte information.
state
(Optional) Displays state information for a tunnel.
summary
(Optional) Displays a summary of tunnel information.
transport
(Optional) Displays tunnel transport information.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Use the show vpdn tunnel command to display detailed information about L2TP, L2F, and PPTP VPDN tunnels.
Table 9 defines the filter parameters available to refine the output of the show vpdn tunnel command. You may use any one of the filter parameters in place of the filter argument.
Examples
The following is sample output from the show vpdn tunnel command for L2F and L2TP sessions:
Router# show vpdn tunnelL2TP Tunnel Information (Total tunnels=1 sessions=1)LocID RemID Remote Name State Remote Address Port Sessions2 10 router1 est 172.21.9.13 1701 1L2F TunnelNAS CLID HGW CLID NAS Name HGW Name State9 1 nas1 HGW1 open172.21.9.4 172.21.9.232%No active PPTP tunnelsTable 10 describes the significant fields shown in the display.
The following example shows L2TP tunnel activity, including information about the L2TP congestion avoidance:
Router# show vpdn tunnel l2tp all
L2TP Tunnel Information Total tunnels 1 sessions 1Tunnel id 30597 is up, remote id is 45078, 1 active sessionsTunnel state is established, time since change 00:08:27Tunnel transport is UDP (17)Remote tunnel name is LAC1Internet Address 172.18.184.230, port 1701Local tunnel name is LNS1Internet Address 172.18.184.231, port 1701Tunnel domain unknownVPDN group for tunnel is 1L2TP class for tunnel is4 packets sent, 3 received194 bytes sent, 42 receivedLast clearing of "show vpdn" counters neverControl Ns 2, Nr 4Local RWS 500, Remote RWS 500Control channel Congestion Control is enabledCongestion Window size, Cwnd 3Slow Start threshold, Ssthresh 500Mode of operation is Slow StartTunnel PMTU checking disabledRetransmission time 1, max 2 secondsUnsent queuesize 0, max 0Resend queuesize 0, max 1Total resends 0, ZLB ACKs sent 2Current nosession queue check 0 of 5Retransmit time distribution: 0 0 0 0 0 0 0 0 0Sessions disconnected due to lack of resources 0Control message authentication is disabledTable 11 describes the significant fields shown in the display.
Related Commands
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2007 Cisco Systems, Inc. All rights reserved.