|
|
Much of NetWare's networking technology was derived from Xerox Network Systems (XNS), a networking system created by Xerox Corporation in the late 1970s.
By the early 1990s, NetWare's NOS market share had risen to between 50 percent and 75 percent. With more than 500,000 NetWare networks installed worldwide and an accelerating movement to connect networks to other networks, NetWare and its supporting protocols often coexist on the same physical channel with many other popular protocols, including TCP/IP, DECnet, and AppleTalk.
A primary characteristic of the client/server system is that remote access is transparent to the user. This is accomplished through remote procedure calls, a process by which a local computer program running on a client sends a procedure call to a remote server. The server executes the remote procedure call and returns the requested information to the local computer client.
Figure 8-1 illustrates a simplified view of NetWare's best-known protocols and their relationship to the OSI reference model. With appropriate drivers, NetWare can run on any media-access protocol. The figure lists those media-access protocols currently supported with NetWare drivers.

Internetwork Packet Exchange (IPX) is Novell's original network-layer protocol. When a device to be communicated with is located on a different network, IPX routes the information to the destination through any intermediate networks. Figure 8-2 shows the IPX packet format.

The fields of the IPX packet are as follows:
Although IPX was derived from XNS, it has several unique features. From the standpoint of routing, the encapsulation mechanisms of these two protocols are the most important difference. Encapsulation is the process of packaging upper-layer protocol information and data into a frame. For Ethernet, XNS uses standard Ethernet encapsulation, whereas IPX packets are encapsulated in Ethernet Version 2.0 or IEEE 802.3 without the IEEE 802.2 information that typically accompanies these frames. Figure 8-3 illustrates Ethernet, standard IEEE 802.3, and IPX encapsulation.

To route packets in an internetwork, IPX uses a dynamic routing protocol called the Routing Information Protocol (RIP). Like XNS, RIP derived from work done at Xerox for the XNS protocol -family.
In addition to the difference in encapsulation mechanisms, Novell also added a protocol called the Service Advertising Protocol (SAP) to its IPX protocol family. SAP allows nodes that provide services (such as file servers and print servers) to advertise their addresses and the services they provide.
Novell also supports IBM logical unit (LU) 6.2 network addressable units (NAUs). LU 6.2 allows peer-to-peer connectivity across IBM communication environments. Using NetWare's LU 6.2 capability, NetWare nodes can exchange information across an IBM network. NetWare packets are encapsulated within LU 6.2 packets for transit across the IBM network.
Sequenced Packet Exchange (SPX) is the most commonly used NetWare transport protocol. Novell derived this protocol from the XNS Sequenced Packet Protocol (SPP). As with the Transmission Control Protocol (TCP) and many other transport protocols, SPX is a reliable, connection-oriented protocol that supplements the datagram service provided by Layer 3 protocols.
Novell also offers Internet Protocol (IP) support in the form of User Datagram Protocol (UDP)/IP encapsulation of other Novell packets, such as SPX/IPX packets. IPX datagrams are encapsulated inside UDP/IP headers for transport across an IP-based internetwork.
NetWare supports a wide variety of upper-layer protocols, but several are somewhat more popular than others. The NetWare shell runs in clients (often called workstations in the NetWare community) and intercepts application I/O calls to determine whether they require network access for satisfaction. If they do, the NetWare shell packages the requests and sends them to lower-layer software for processing and network transmission. If they do not, they are simply passed to local I/O resources. Client applications are unaware of any network access required for completion of application calls. NetWare remote-procedure call (NetWare RPC) is another more general redirection mechanism supported by Novell.
NCP is a series of server routines designed to satisfy application requests coming from, for example, the NetWare shell. Services provided by NCP include file access, printer access, name management, accounting, security, and file synchronization.
NetWare also supports the Network Basic Input/Output System (NetBIOS) session-layer interface specification from IBM and Microsoft. NetWare's NetBIOS emulation software allows programs written to the industry-standard NetBIOS interface to run within the NetWare system.
NetWare application-layer services include NetWare Message Handling Service (NetWare MHS), Btrieve, NetWare loadable modules (NLMs), and various IBM connectivity features. NetWare MHS is a message delivery system that provides electronic mail transport. Btrieve is Novell's implementation of the binary tree (btree) database access mechanism. NLMs are implemented as add-on modules that attach into the NetWare system. NLMs for alternate protocol stacks, communication services, database services, and many other services are currently available from Novell and third parties.
The following sections outline the most common issues in Novell IPX networks:
Symptom: Clients cannot make connections to servers located on the same LAN. Also, clients cannot connect to servers on remote networks.
Table 8-1 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Misconfigured | Step 1 Make sure the software on both clients and servers is the current version, is configured correctly, and has loaded correctly. On clients, check the network drivers and the configuration specified in the net.cfg file. Step 2 On servers, make certain that SAPs1 are being generated properly and that any NLMs2 are loaded properly. Use the track on command to monitor routing and SAP activity. Step 3 Check the encapsulation on clients and servers to make sure they are not mismatched. For specific information on configuring your client or server, refer to the documentation provided with the device. |
Not enough user | Make sure there is a sufficient number of NetWare user licenses available. Use the Monitor utility screen on a NetWare server to see the total number of connections available and the number of connections in use. |
Mismatched network | All servers attached to the same cable must bind to the same external network number. If there are mismatched network numbers, packets will not be forwarded properly. Step 1 Watch for error messages on the system console similar to the following: Router configuration error detected Node address claims network x should be y These error messages indicate that a server on the LAN has a conflicting network number. Node address is the node address of the network card from which the incorrect address came. x is the network number specified in packets received from the node. y is the network number configured on the server generating the error. Step 2 All servers on the same LAN must have the same external network number (if they use the same frame type). If the network numbers do not match, reconfigure the conflicting server with the correct external network number. |
Client, server, or | Check all NIC3, transceivers, hub ports, switches, and other hardware. Check all appropriate LEDs to see whether there are error indications. Replace any faulty or malfunctioning hardware. For information on troubleshooting a client, server, or other hardware problem not related to Cisco routers, refer to the documentation provided with the hardware. |
Media problem | Step 1 Check all cabling and connections. Make sure cables are not damaged and that all connections are correct and make proper contact. Step 2 Use the show interfaces exec command to check for input or output errors or other indications of problems on the media. Step 3 If the command output shows excessive errors, use the clear interface counter privileged exec command to clear the interface counters. Step 4 Check the output of the show interfaces command again. If the errors are incrementing rapidly, there is probably a problem with the media. For more detailed information on troubleshooting media problems, refer to the troubleshooting chapter that covers the media type used in your network. |
| 1SAP = Service Advertising Protocol 2NLM = NetWare loadable module 3NIC = Network interface card |
Symptom: Clients cannot make connections to servers on another network over one or more routers interconnected by LAN networks. Clients can connect to servers on their local network. Table 8-2 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
|
Step 2 If the interface is administratively down, use the no shutdown interface configuration command to bring the interface Step 3 If the interface or line protocol is down, refer to the troubleshooting chapter that covers the media type used in your network. | |
Mismatched Ethernet | Step 1 Use the show ipx interface privileged exec command to check the encapsulation type specified in the router configuration. By default, Cisco routers use Novell's Frame Type Ethernet 802.3 encapsulation. (Cisco refers to this as novell-ether encapsulation.) Step 2 Compare the encapsulation type configured on router interfaces with the encapsulation type that is being used by clients and servers. Step 3 If the router uses one encapsulation type but the clients and servers use a different type, then there is a mismatch. Change the encapsulation type used on either the clients and servers or the router, as appropriate, so that all devices use the same encapsulation method. On routers, specify the encapsulation type with the ipx network network encapsulation encapsulation-type interface configuration command. For information on changing the encapsulation type on clients and servers, consult the vendor documentation. |
If you are using NetWare 3.12 or above and you have LIPX enabled, a client and server could conceivably negotiate a packet size larger than a router could support. This can cause intermediate routers to drop packets. Without LIPX, the server checks the network number for the buffer size request packet from the client, and if the network number is different from the server's (which means the packet is from another network over a router), it orders clients to use 512 bytes (hard coded) instead. For information on configuring LIPX, refer to the vendor documentation. | |
Ring speed specification | In a Token Ring environment, all devices must agree on the configured ring speed (4 or 16 Mbps), or connectivity will fail. Step 1 Use the show interfaces token exec command on the router. Look for the ring speed value in the output. Compare this value with the ring speed specification on Novell servers. Step 2 If the ring speeds do not match, change the server or router configuration, as appropriate, so that all stations agree on the ring speed. On routers, use the ring-speed interface configuration command to change the ring speed. For information about configuring the ring speed on Novell servers, consult the vendor documentation. |
Duplicate node | Step 1 Use the show running-config privileged exec command to examine the current configuration of each router in the path. Step 2 Check the node number specified in the ipx routing node global configuration command. The node number is either a user-specified node number or the MAC address of the first Ethernet, Token Ring, or FDDI2 in the router. Step 3 The node number configured on each router must be unique. If the number is the same on multiple routers, enter the no ipx routing global configuration command to disable IPX routing on the router. Step 4 Reinitialize IPX routing by entering the ipx routing command (do not specify a node number). Use the show running-config command to verify that the rest of the IPX configuration is still correct. |
Duplicate network | Every network number must be unique throughout the entire Novell IPX internetwork. A duplicate network number will prevent packets from being forwarded properly. Step 1 Use the show ipx servers and the show ipx route privileged exec commands. Check the output of these commands for server addresses that have been learned from the wrong interface. For example, if you know that you have a server on the local network with network number 3c.0000.0c01.2345 and the show command output shows that this server is located on a remote network, there is probably a server on the remote network that's using the same network number. Step 2 If you suspect a duplicate network number, use a process of elimination to identify the misconfigured server. This can be difficult, particularly if you do not have access to every network device in the Novell IPX internetwork. When you have identified the misconfigured server, modify the server configuration to eliminate the duplicate network number. |
Router hardware | Check all router ports, interface processors, and other router hardware. Make sure cards are seated properly and that no hardware is damaged. Replace faulty or malfunctioning hardware. For detailed information on troubleshooting router hardware problems, refer to Chapter 3, "Troubleshooting Hardware and Booting Problems." |
Step 1 Use the show ipx traffic exec command on intermediate routers. Determine whether the bad hop count field is incrementing. Step 2 If the bad hop count counter is incrementing, use a network analyzer to look for packet loops on suspect segments. Look for RIP3 and SAP updates as well. If a backdoor bridge exists, you are likely to see hop counts that increment to 16, at which time the route disappears and reappears unpredictably. Step 3 Look for packets from known remote network numbers that appear on the local network. Look for packets whose source address is the MAC4 address of the remote node instead of the MAC address of the router. Step 4 Examine packets on each segment. A back door is present on the segment if packets appear whose source address is the MAC address of a remote node instead of that of the router. Step 5 Remove the backdoor bridge to close the loop. | |
Routing protocol | Misconfigurations and other routing protocol issues can cause connectivity and performance problems. For information on troubleshooting specific IPX routing protocols, see the appropriate section later in this chapter. |
| 1LIPX = Large Internet Packet Exchange 2FDDI = Fiber Distributed Data Interface 3RIP = Routing Information Protocol 4MAC = Media Access Control |
Symptom: Clients cannot connect to servers over a packet-switched network (PSN), such as Frame Relay, X.25, or SMDS. Clients can connect to local servers.
Table 8-3 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Address mapping error | Step 1 Use the show running-config privileged exec command to view the configuration of the router. Step 2 Depending on your PSN environment, look for any x25 map ipx, frame-relay map ipx1, or smds static-map ipx interface configuration command entries in the router configuration. Make sure the address mapping specified by these commands is correct:
For more information about configuring address maps, refer to the Cisco IOS Wide-Area Networking Configuration Guide and Wide Area Networking Command Reference. |
Step 1 Use the show interfaces privileged exec command to determine the encapsulation type being used (such as X.25, Frame Relay, or SMDS encapsulation). Look for output similar to the following: Serial0 is up, line protocol is up Hardware is MCI Serial Internet address is 192.168.54.92 255.255.255.0 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255 Encapsulation FRAME-RELAY, loopback not set, keepalive set (10 sec) Step 2 If an encapsulation command is not present, the default is HDLC4 encapsulation. For PSN interconnection, you must explicitly specify the proper encapsulation type (such as encapsulation x25 for an X.25 connection). Configure the proper encapsulation type and use the show interfaces command to verify that the encapsulation type is correct. | |
Misconfigured DLCI assignments (Frame Relay only) | Step 1 Use the show frame-relay map exec command on the hub router to see the Frame Relay map assignments currently configured. Step 2 Check each Frame Relay map statement to ensure that the DLCI assignments are correctly configured. Make sure you use the DLCIs obtained from your Frame Relay provider. Remember that DLCI values are locally significant. |
Misconfigured LMI5 type (Frame Relay only) | Step 1 Use the debug frame-relay lmi privileged exec command to see the LMI type being used by the Frame Relay switch. Step 2 The LMI type is determined by your Frame Relay provider. Make sure you use the LMI type specified by the provider. |
This problem is most likely to occur on the hub router in a Frame Relay hub-and-spoke topology. Step 1 Use the show interfaces privileged exec command to check for dropped Frame Relay broadcast frames. Step 2 If the number of drops on the broadcast queue is excessively high, increase the size of the queue using the frame-relay broadcast-queue size byte-rate packet-rate interface configuration command. Command Syntax: frame-relay broadcast-queue size byte-rate packet-rate Command Syntax:
| |
Hub router not forwarding SAPs (Frame Relay only) | In a Frame Relay hub-and-spoke topology, SAPs received on one of the hub router's interfaces will not be forwarded back out the same interface because of the split horizon rule, which states that an incoming packet cannot be placed on the same network interface from which it originated, preventing an infinite routing loop if a link fails. To allow SAPs to be forwarded appropriately, you must configure subinterfaces on the Frame Relay interface of the hub router. Assign a subinterface to each spoke site. The hub router will treat each subinterface as a physical interface, allowing it to advertise SAPs without violating the split horizon rule. For specific information on configuring subinterfaces, see the Wide-Area Networking Configuration Guide. Note: Other problems can prevent a router from forwarding SAP packets. For more information, see the section "IPX RIP: SAP Updates Not Propagated by Router" later in this chapter. |
Missing or misconfigured multicast address (SMDS only) | Step 1 Use the show running-config privileged exec command to view the router configuration. Check for an smds multicast ipx interface configuration command entry. Step 2 If the command is not present, add it to the configuration. If the command is present, confirm that the multicast address configured is correct. The SMDS multicast address is specified by your SMDS provider. |
Symptom: Clients cannot connect to servers over an ISDN link. Clients can connect to local servers.
Table 8-4 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Static RIP and SAP statements missing or misconfigured | Step 1 Use the show running-config privileged exec command to view the router configuration. Check for ipx route and ipx sap global configuration command entries. Both commands, which specify static routes and static SAP entries, respectively, are required in an ISDN environment so that clients and servers on the local network are aware of clients and servers on the remote network. Step 2 If you do not have static routes and static SAP entries configured, configure them using the ipx route and ipx sap commands. For detailed information on configuring static routes and SAP entries, refer to the Cisco IOS Network Protocols Configuration Guide, Part 1 and Network Protocols Command Reference, Part 1. |
Access lists specified in dialer lists misconfigured | Step 1 Use the show running-config privileged exec command to view the router configuration. Check the access lists configured for use by dialer lists. Step 2 Make sure the access lists deny only RIP routing updates, SAP advertisements, and Novell serialization packets. If other packets are denied, connectivity problems can occur. Step 3 Make sure access lists end with an access-list access-list-number permit -1 statement, which permits all other IPX traffic to trigger the dialer. |
Table 8-5 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Step 1 Use the debug ipx packet privileged exec command or a network analyzer to look for Novell packets with a specification of type 20. Caution: Exercise caution when using the debug ipx packet command. Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. Step 2 Use the show running-config privileged exec command to check for ipx type-20-propagation interface configuration command entries on routers in the path from client to server. Step 3 If the ipx type-20-propagation command is not present, add it to the interface configuration for every router interface in the path from client to server. | |
Step 1 Use the debug ipx packet privileged exec command or a network analyzer to look for Novell packets with a specification other than type 20 (such as type 0 or type 4). Sometimes applications do not conform to the Novell standard and use packet types other than type 20. Caution: Exercise caution when using the debug ipx packet command. Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. Step 2 If you see packets other than type 20, use the show running-config privileged exec command to view the router configuration. Check to see whether the ipx helper-address interface configuration command is configured on the interface to which the client is attached. Step 3 If the ipx helper-address command is not present, configure it on the router interfaces. Make sure the helper address is the IPX protocol address of the NetBIOS server that the client needs to reach. The following is the syntax for the ipx helper-address command: ipx helper-address network.node Syntax Description:
| |
Make sure your workstation is running NetBIOS over IPX and not NetBIOS over another protocol, such as NetBEUI. For information about what protocols your workstation is running, refer to the vendor documentation. |
Symptom: IPX RIP routers are blocking connections. Clients cannot connect to servers over one or more routers running IPX RIP.
Table 8-6 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
IPX RIP routing not configured o0r misconfigured on the router | Step 1 Use the show running-config privileged exec command to view the router configuration. Step 2 Check the configuration to make sure there is an ipx routing global configuration command entry. If there is not, enter the ipx routing command to enable IPX routing. Issuing the ipx routing command on a router automatically enables IPX RIP routing on all interfaces that have a network number assigned to them. |
Missing ipx network commands on interface | Step 1 Use the show ipx interface privileged exec command to view the state of all IPX interfaces. Step 2 If the output indicates that there are no interfaces running IPX, or if an interface that should be running IPX is not, you must configure the appropriate interfaces with an IPX address. The Novell server administrator can provide the IPX network number for the segment to which your router is attached. |
|
ipx network network [encapsulation encapsulation-type [secondary]] Syntax Description:
| |
| |
RIP timer mismatch | You can change RIP timer values changed on servers running NetWare 4.x or later. Mismatches between routers and servers can cause connectivity problems. Step 1 Use the show ipx interfaces privileged exec command on the router to view the state of IPX interfaces. Look for output similar to the following: C4500#show ipx interface [...] Updates each 60 seconds, aging multiples RIP: 3 SAP: 3 [...] Compare the timer value configured on the router with that configured on Novell servers. Step 2 The timer values configured on servers and routers should be the same across the whole IPX network. Reconfigure the router or the servers to bring the timer values into conformance. On the router, use the ipx update-time interface configuration command to change the RIP timer interval. For information on changing the timer value configured on Novell servers, consult your server documentation. |
Step 1 Use the debug ipx routing activity privileged exec command on the router. Look for routing updates sent by the router out each interface. Step 2 If you do not see RIP updates being sent out the interfaces, try disabling RIP routing using the no ipx routing global configuration command and then reenabling it using the ipx routing command. Use the show running-config command to verify that the rest of the IPX configuration is still correct. Step 3 If disabling and reenabling IPX does not work, try restarting the router. | |
Step 1 Use the show access-lists privileged exec command on suspect routers to see whether there are Novell IPX access lists configured. Step 2 Use the show running-config privileged exec command to view the router configuration. You can see whether access lists are specified in an ipx input-network-filter or ipx output-network-filter interface configuration command. Examples: In the following example, access list 876 controls which networks are added to the routing table when IPX routing updates are received on Ethernet Interface 1: access-list 876 permit 1b interface ethernet 1 ipx input-network-filter 876 Routing updates for Network 1b will be accepted. Routing updates for all other networks are implicitly denied and are not added to the routing table. The following example is a variation of the preceding that explicitly denies Network 1a and explicitly allows updates for all other networks: access-list 876 deny 1a access-list 876 permit -1 | |
Step 3 If access lists are used by one of these commands, disable the filters by using the no ipx input-network-filter or no ipx output-network-filter command. Step 4 Check whether the client can access the server normally. If the connection is successful, one access list or more needs modification. Step 5 To isolate the problem access list, apply one IPX filter at a time until you can no longer create connections. Step 6 When the problem access list is isolated, examine each access-list statement to see whether it blocks traffic from desired networks. If it does, configure explicit permit statements for networks that you want to be advertised normally in updates. Step 7 After altering the access list, re-enable the filter to make sure connections between the client and the server still work. Continue testing access lists until all your filters are enabled and the client can still connect to the server. | |
Step 1 Use the show ipx route privileged exec command to see the IPX routing table. Step 2 Examine the routing table and make sure routes have been learned by the expected protocol and from the expected interface. Step 3 Use the show running-config privileged exec command to view the router configuration. Check each ipx router global configuration command entry and the associated redistribute commands, if any. | |
Step 4 Make certain redistribution is configured between IPX RIP and the desired protocols. Make sure all the desired networks are specified for redistribution. Note: Route redistribution is enabled automatically between IPX RIP and Enhanced IGRP1 and between IPX RIP and NLSP.2 For detailed information on configuring route redistribution, see the Network Protocols Configuration Guide, Part 1. | |
Router not propagating SAPs | For information on troubleshooting this problem, refer to the following section "IPX RIP: SAP Updates Not Propagated by Router." |
| 1Enhanced IGRP = Enhanced Interior Gateway Routing Protocol 2NLSP = NetWare Link Services Protocol |
Symptom: Novell SAP packets are not forwarded through a router running IPX RIP. Clients might be unable to connect to servers over one or more routers, or they might intermittently be able to connect.
Table 8-7 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
SAP timer mismatch | Step 1 Use the show running-config privileged exec command to view the router configuration. Look for ipx sap-interval interface configuration command entries. Example: In the following example, SAP updates are sent (and expected) on serial interface 0 every five minutes: interface serial 0 ipx sap-interval 5 Step 2 On LAN interfaces, it is recommended that you use the default SAP interval of one minute because the interval on servers cannot be changed. To restore the default value, use the no ipx sap-interval command. The following is the syntax for the ipx sap-interval command: ipx sap-interval minutes no ipx sap-interval Syntax Description:
On serial interfaces, make sure whatever interval you configure is the same on both sides of the serial link. Use the ipx sap-interval interface configuration command to change the SAP interval. |
Misconfigured SAP filters | Step 1 Use the show access-lists privileged exec command on suspect routers to see whether there are Novell IPX access lists configured. Use the show running-config privileged exec command to see whether there are SAP filters that use any of the configured access lists. At the end of this chapter is a list of Novell SAPs that includes the SAP description and hex and decimal values. Step 2 If SAP filters are configured, disable them by removing ipx input-sap-filter and ipx output-sap-filter interface configuration commands as appropriate (using the no version of the command). Step 3 Use the debug ipx sap activity privileged exec command to see whether SAP traffic is forwarded normally. The debug command output shows the server name, network number, and MAC address of SAP packets. Caution: Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it Step 4 If SAP information is forwarded properly by the router, a SAP filter is causing SAP updates to be dropped by the router. Step 5 To isolate the problem SAP filter, reenable filters one at a time until SAP packets are no longer forwarded by the router. Step 6 Change the referenced access list to allow the SAP traffic you want to be forwarded to pass through the router. Make sure all necessary ports are configured with an explicit permit statement. Step 7 Continue enabling filters one at a time and checking to see that SAP traffic is still being forwarded properly until you have verified that all filters are configured properly. |
Novell server not sending SAP updates | Step 1 Use the debug ipx sap activity privileged exec command or a protocol analyzer to look for SAP updates from servers. Caution: Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. Step 2 If a server is not sending SAP updates, make sure the server is attached to the network and is up and running. Step 3 Make sure the server is properly configured to send SAPs. For information on configuring your server software properly, refer to your vendor documentation. |
Novell servers not processing SAP updates as quickly as router is generating them | Step 1 Use the show interfaces privileged exec command to check for output drops. Step 2 If there are excessive drops, use the show ipx servers exec command on the router. Compare the output of this command with the output of the display servers system console command on Novell servers. Step 3 If the display servers output for a Novell server shows only a partial listing of the SAP entries shown by the router, the Novell servers might not be able to process SAP updates as quickly as the router is generating them. Step 4 Use the ipx output-sap-delay interface configuration command to configure the delay between packets in a multipacket SAP update. Novell specifies a delay of 55 ms. Syntax: The following is the syntax for the ipx output-sap-delay command: ipx output-sap-delay delay Syntax Description:
|
Table 8-8 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
IPX Enhanced IGRP is | Unlike IPX RIP, IPX Enhanced IGRP is not enabled by default on all interfaces when the ipx routing global configuration command is issued. Step 1 Use the show running-config privileged exec command to view the router configuration. Step 2 Check the configuration to make sure there is an ipx routing global configuration command entry. This command enables IPX routing globally. Step 3 If the command is not present, use the ipx routing global configuration command to enable IPX routing. The following is the syntax for the ipx routing command: ipx routing [node] Syntax Description:
If you omit node, the router uses the hardware MAC address currently assigned to it as its node address. This is the MAC address of the first Ethernet, Token Ring, or FDDI interface card. If no satisfactory interfaces are present in the router (for example, there are only serial interfaces), you must specify node. |
IPX Enhanced IGRP not configured or is misconfigured on the router | Step 4 Check the router configuration for an ipx router eigrp autonomous-system-number global configuration command and associated ipx network interface configuration commands. Step 5 If these commands are not present, configure the Enhanced IGRP process and then assign it to the appropriate interfaces with the ipx network commands. The following example enables RIP on networks 1 and 2 and Enhanced IGRP on network 1:
|
Missing ipx network command on interface | Step 1 Use the show ipx interface privileged exec command to view the state of all IPX interfaces. Step 2 If the output indicates that there are no interfaces running IPX, or if an interface that should be running IPX is not, you must configure the appropriate interfaces with an IPX address. To enable IPX protocol processing on an interface, enter the ipx network number interface configuration command. |
IPX RIP not enabled on network with connected Novell servers | Novell servers do not understand IPX Enhanced IGRP. You must ensure that IPX RIP is enabled on interfaces connected to LAN segments with attached Novell servers. Use the show running-config privileged exec command on suspect routers to view the router configuration. Make sure that any interfaces connected to a LAN segment with attached Novell servers have IPX RIP enabled. It is not necessary to disable the other routing protocol, but running IPX Enhanced IGRP and IPX RIP on the same interface can sometimes create performance problems. |
Misconfigured filters | Step 1 Use the show access-lists privileged exec command on suspect routers to see whether there are Novell IPX access lists configured. Step 2 Use the show running-config privileged exec command to view the router configuration. See whether access lists are specified in an ipx input-network-filter or ipx output-network-filter interface configuration command. Step 3 If access lists are used by one of these commands, disable the filters using the no ipx input-network-filter or no ipx output-network-filter command. Step 4 Check whether the client can access the server normally. If the connection is successful, one access list or more needs modification. Step 5 To isolate the problem access list, apply one IPX filter at a time until you can no longer create connections. Step 6 When the problem access list is isolated, examine each access-list statement to see whether it is blocking traffic from desired networks. If it is, configure explicit permit statements for networks that you want to be advertised normally in updates. Step 7 After altering the access list, reenable the filter to make sure connections between the client and the server still work. Continue testing access lists until all your filters are enabled and the client can still connect to the server. |
Routes not redistributed properly | Route redistribution between IPX Enhanced IGRP autonomous systems and between Enhanced IGRP and other routing protocols is not enabled by default. You must manually configure redistribution between different autonomous systems or routing protocols. Step 1 Use the show running-config privileged exec command on any routers that border two Enhanced IGRP autonomous systems. Look for redistribute protocol IPX router configuration command entries. Step 2 If the command is not present, you must enter the appropriate redistribute protocol command to allow route redistribution between different autonomous systems or routing protocols. For detailed information on configuring route redistribution, see the Network Protocols Configuration Guide, Part 1. |
Routers not establishing neighbors properly | For information on troubleshooting this problem, see the section "IPX Enhanced IGRP: Routers Not Establishing Neighbors" later in this chapter. |
Router not propagating SAPs | For information on troubleshooting this problem, refer to the section "IPX Enhanced IGRP: SAP Updates Not Propagated by Router" later in this chapter. |
Symptom: IPX Enhanced IGRP routers do not establish neighbors properly. Routers that are known to be connected do not appear in the neighbor table.
Table 8-9 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Routers are in different autonomous systems | Step 1 Neighbor relationships will not be established between routers in different autonomous systems. Make sure the routers you want to be neighbors are in the same autonomous system. Step 2 Use the show running-config privileged exec command to view the router configuration. Check the ipx router eigrp command entries to see which autonomous systems the router belongs to. |
Hello or hold-time timer mismatch | Step 1 Use the show running-config privileged exec command on each router in the network. Look for ipx hello-interval eigrp and ipx hold-time eigrp interface configuration command entries. The values configured by these commands should be the same for all IPX routers in the network. Step 2 If any router has a conflicting hello interval or hold-time value, reconfigure it to conform with the rest of the routers on the network. You can return these values to their defaults with the no ipx hello-interval eigrp and no ipx hold-time interval eigrp interface configuration commands. |
Step 1 Use the show interfaces privileged exec command to check whether the interface is up and functioning correctly. The following is sample output from the show interfaces command: Router#show interfaces fastethernet1/0 FastEthernet1/0 is up, line protocol is up Hardware is cyBus FastEthernet Interface, address is 0010.5498.d020 (bia 0010. 5498.d020) Internet address is 210.84.3.33/24 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, rely 230/255, load 1/255 Encapsulation ARPA, loopback not set, keepalive set (10 sec), hdx, 100BaseTX/FX Step 2 Use the show ipx eigrp neighbors privileged exec command to make sure all Enhanced IGRP neighbors are shown in the neighbor table. Step 3 If not all neighbors are in the neighbor table, there might be a link problem. Refer to other chapters in this book for information on troubleshooting specific link types. |
Table 8-10 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Misconfigured SAP filters | Step 1 Use the show access-lists privileged exec command on suspect routers to see whether there are Novell IPX access lists configured. Use the show running-config privileged exec command to see whether there are SAP filters that use any of the configured access lists. At the end of this chapter is a list of Novell SAPs that includes the SAP description and hex and decimal values. Step 2 If SAP filters are configured, disable them by removing the ipx input-sap-filter and ipx output-sap-filter interface configuration commands as appropriate (using the no version of the command). Step 3 Use the debug ipx sap activity privileged exec command to see whether SAP traffic is being forwarded normally. The debug command output shows the server name, network number, and MAC address of SAP packets. Caution: Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. Step 4 If SAP information is being forwarded properly by the router, a SAP filter is causing SAP updates to be dropped by the router. Step 5 To isolate the problem SAP filter, reenable filters one at a time until SAP packets are no longer forwarded by the router. Step 6 Change the referenced access list to allow the SAP traffic you want to be forwarded to pass through the router. Make sure all necessary ports are configured with an explicit permit statement. Step 7 Continue enabling filters one at a time and checking to see that SAP traffic is being forwarded properly until you have verified that all filters are configured properly. |
SAP updates are being sent incrementally rather than periodically | Connectivity problems can occur when LAN interfaces are configured to send incremental (not periodic) SAP updates on segments that have attached Novell clients or servers. Incremental SAP updates are sent only when there is a change in the SAP table. Step 1 Use the show running-config privileged exec command to view the router configuration. Look for ipx sap-incremental eigrp interface configuration command entries on interfaces with attached Novell clients or servers. Step 2 If the command is present and the interface in question has attached Novell clients or servers, you must disable the ipx sap-incremental eigrp command. This command should be configured on an interface only if all the nodes attached to that interface are Enhanced IGRP peers. |
Link problem | Step 1 Use the show interfaces privileged exec command and look for drops and interface resets. The following is sample output from the show interfaces command: Router#show interfaces fastethernet 1/0 FastEthernet1/0 is up, line protocol is up Hardware is cyBus FastEthernet Interface, address is 0010.5498.d020 (bia 0010. 5498.d020) Internet address is 208.84.3.33/24 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, rely 255/255, load 1/255 Encapsulation ARPA, loopback not set, keepalive set (10 sec), hdx, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:07, output 00:00:07, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75, 0 drops |
Link problem | Step 2 If you see many drops or interface resets, use the debug ipx sap activity privileged exec command and then the clear ipx eigrp neighbor privileged exec command. Caution: Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. If there is a link problem, the debug ipx sap activity command will not produce any output. Step 3 Refer to the appropriate chapter elsewhere in this book for information on troubleshooting the particular link type. For example, for serial links, refer to Chapter 15, "Troubleshooting Serial Line Problems." |
%DUAL-3-SIA: Route 3c.0800.0c00.4321 Stuck-in-Active
For a more detailed explanation of Enhanced IGRP Active mode, see the section "Enhanced IGRP and Active/Passive Modes" later in this chapter.
Table 8-11 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Active timer value is misconfigured | Step 1 The active timer specifies the maximum period of time that an Enhanced IGRP router will wait for replies to its queries. If the active timer value is set too low, there might not be enough time for all the neighboring routers to send their replies to the active router. A value of 3 (3 minutes, which is the default value) is strongly recommended to allow all Enhanced IGRP neighbors to reply to queries. Step 2 Check the configuration of each Enhanced IGRP router using the show running-config privileged exec command. Look for a timers active-time router configuration command entry. Step 3 The value set by the timers active-time command should be consistent among routers in the same autonomous system. A value of 3 (3 minutes, which is the default value) is strongly recommended to allow all Enhanced IGRP neighbors to reply to queries. |
Interface or other hardware problem | Step 1 Use the show ipx eigrp neighbors exec command and examine the Uptime and Q Cnt (queue count) fields in the output. The following is sample output from the show ipx eigrp neighbors command: Router# show ipx eigrp neighbors IPX EIGRP Neighbors for process 200
H Address Interface Hold Uptime Q Seq SRTT RTO
(secs) (h:m:s) Cnt Num (ms) (ms)
6 90.0000.0c02.096e Tunnel44444 13 0:30:57 0 21 9 20
5 80.0000.0c02.34f2 Fddi0 12 0:31:17 0 62 14 28
4 83.5500.2000.a83c TokenRing2 13 0:32:36 0 626 16 32
3 98.0000.3040.a6b0 TokenRing1 12 0:32:37 0 43 9 20
2 80.0000.0c08.cbf9 Fddi0 12 0:32:37 0 624 19 38
1 85.aa00.0400.153c Ethernet2 12 0:32:37 0 627 15 30
0 82.0000.0c03.4d4b Hssi0 12 0:32:38 0 629 12 24
If the uptime counter is continually resetting or if the queue count is consistently high, there might be a hardware problem. Step 2 Check the output of the "Stuck-in-Active" error message. The output indicates the general direction of the problem node, but if there are multiple nodes in that direction, the problem could be in any one of them. Step 3 Make sure the suspect router still works. Check the interfaces on the suspect router. Make sure the interface and line protocol are up and determine whether the interface is dropping packets. For more information on troubleshooting hardware, see Chapter 3, "Troubleshooting Hardware and Booting Problems." |
Flapping route | Step 1 Check for a flapping serial route (caused by heavy traffic load) by using the show interfaces privileged exec command. Flapping is a routing problem where an advertised route between two nodes alternates (flaps) back and forth between two paths due to a network problem that causes intermittent interface failures. You might have a flapping route if there are large numbers of resets and carrier transitions. Step 2 If there is a flapping route, queries and replies might not be forwarded reliably. Route flapping caused by heavy traffic on a serial link can cause queries and replies to be lost, resulting in the active timer timing out. Take steps to reduce traffic on the link or to increase the bandwidth of the link. For more information about troubleshooting serial lines, refer to Chapter 3, "Troubleshooting Serial Line Problems." |
If the Enhanced IGRP router loses the connection to a network, it becomes active for that network. The router sends out queries to all its neighbors in order to find a new route. The router remains in Active mode until it has either received replies from all its neighbors or until the active timer, which determines the maximum period of time a router will stay active, has expired.
If the router receives a reply from each of its neighbors, it computes the new next hop to the network and becomes passive for that network. However, if the active timer expires, the router removes any neighbors that did not reply from its neighbor table, again enters Active mode, and issues a "Stuck-in-Active" message to the console.
Symptom: Connectivity between clients and servers is intermittent. Clients might be able to connect some of the time, but at other times no connectivity to certain servers or networks is possible.
Table 8-12 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
SAP timer mismatch | Step 1 Use the show running-config privileged exec command to view the router configuration. Look for ipx sap-interval interface configuration command entries. Step 2 On LAN interfaces, it is recommended that you use the default SAP interval of 1 minute because the interval on servers cannot be changed. To restore the default value, you can use the no ipx sap-interval command. On serial interfaces, make sure that whatever interval you configure is the same on both sides of the serial link. Use the ipx sap-interval interface configuration command to change the SAP interval. |
RIP timer mismatch | You can change RIP timer values on servers running NetWare 4.x or later. Mismatches between routers and servers can cause connectivity problems. Step 1 Use the show ipx interfaces privileged exec command on the router to view the state of IPX interfaces. Look for output similar to the following: C4500#show ipx interface [...] Updates each 60 seconds, aging multiples RIP: 3 SAP: 3 [...] Compare the timer value configured on the router with that configured on Novell servers. Step 2 The timer values configured on servers and routers should be the same across the entire IPX network. Reconfigure the router or the servers to bring the timer values into conformance. On the router, use the ipx update-time interface configuration command to change the RIP timer interval. For information on changing the timer value configured on Novell servers, consult your server documentation. |
In IPX Enhanced IGRP environments, problems can occur when interfaces are configured to send incremental (not periodic) SAP updates on segments that have attached Novell servers. (Incremental SAP updates are sent only when there is a change in the SAP table.) Step 1 Use the show running-config privileged exec command to view the router configuration. Check to see whether there are ipx sap-incremental eigrp interface configuration command entries enabled on interfaces with attached Novell clients or servers. Step 2 If the incremental command is present and the interface in question has attached Novell clients or servers, you must disable the ipx sap-incremental eigrp command by using the no version of the command. This command should be configured on an interface only if all the nodes attached to that interface are Enhanced IGRP peers. | |
Novell servers not processing SAP updates as quickly as router is generating them | Step 1 Use the show interfaces privileged exec command to check for output drops. Step 2 If there are excessive drops, use the show ipx servers exec command on the router. Compare the output of this command with the output of the display servers system console command on Novell servers. Step 3 If the display servers output for a Novell server shows only a partial listing of the SAP entries shown by the router, the Novell servers might be unable to process SAP updates as quickly as the router is generating them. Step 4 Use the ipx output-sap-delay interface configuration command to configure the delay between packets in a multipacket SAP update. Novell specifies a delay of 55 ms. |
Slow serial lines can cause the router to drop SAP packets before they are transmitted. Step 1 Use the show interfaces serial exec command and examine the output queue drops field. A large number of dropped packets might indicate that SAP updates are being dropped before they can be transmitted across the serial link. Step 2 Use the show ipx servers exec command on the router. Compare the output of this command with the output of the display servers system console command on Novell servers.
Step 3 If the display servers output for a Novell server shows only Step 4 Eliminate the forwarding of any SAP updates that are not absolutely necessary. Configure filters using the ipx input-sap-filter, ipx output-sap-filter, and ipx router-sap-filter interface configuration commands, as appropriate. Step 5 Increasing the output hold queue on the serial interface might also improve performance. Use the hold-queue length out interface configuration command to increase the output hold queue length. The default output hold-queue limit is 100 packets. The general rule when using the hold-queue command is for slow links, use a small output hold-queue limit. This approach prevents storing packets at a rate that exceeds the transmission capability of the link. For fast links, use a large output hold-queue limit. A fast link may be busy for a short time (and thus require the hold queue), but can empty the output hold queue quickly when capacity returns. Step 6 If SAP filters and increased queue lengths do not solve the problem, increase the available bandwidth if possible. Add a second serial line or obtain a single link with more available bandwidth.1 | |
Router is stuck in active mode (EIGRP only) | If you consistently receive "Stuck-in-Active" messages about a particular network, you probably have a flapping route (typically caused by heavy traffic load). Route flapping can cause routes to come and go in the routing table, resulting in intermittent connectivity to some networks. Take steps to reduce traffic on the link or to increase the bandwidth of the link. For more information about troubleshooting serial lines, refer to Chapter 15, "Troubleshooting Serial Line Problems." |
| 1If increasing the bandwidth is not possible, buffer management might help alleviate the problem. Contact the Cisco Technical Assistance Center for assistance in tuning buffers. |
Symptom: Slow network performance is experienced in a Novell IPX network.
Table 8-13 outlines the problems that might cause this symptom and describes solutions to those problems.
| Possible Problem | Solution |
|---|---|
Novell servers not processing SAP updates as quickly as router is generating them | Step 1 Use the show interfaces privileged exec command to check for output drops. Step 2 If there are excessive drops, use the show ipx servers exec command on the router. Compare the output of this command with the output of the display servers system console command on Novell servers. Step 3 If the display servers output for a Novell server shows only a partial listing of the SAP entries shown by the router, the Novell servers might be unable to process SAP updates as quickly as the router is generating them. Step 4 Use the ipx output-sap-delay interface configuration command to configure the delay between packets in a multipacket SAP update. Novell specifies a delay of 55 ms. |
Periodic SAP updates are using excessive bandwidth | In a non-IPX RIP environment (such as on a serial link running Enhanced IGRP), you can reduce SAP traffic by configuring routers to send incremental rather than periodic SAP updates. Incremental SAP updates are sent only when there is a change to the SAP table. You should have incremental SAP updates enabled only on interfaces that have no Novell clients or servers attached. Novell clients and servers require periodic SAP updates. Use the ipx sap-incremental eigrp interface configuration command to enable incremental SAP updates. |
IPX RIP and IPX Enhanced IGRP are enabled on the same interface | Running both IPX Enhanced IGRP and IPX RIP on the same interface is sometimes desired or required in an IPX network. However, doing so can cause performance problems in some cases by creating excess traffic and processor overhead. Step 1 Use the show running-config privileged exec command to view the router configuration. Check the network router configuration commands associated with ipx router rip and the ipx router eigrp global configuration commands to see whether both routing protocols are enabled on the same interface. Step 2 If both protocols are enabled, determine whether one or the other can be disabled without affecting the proper operation of the network. If there is no need for both protocols to be running on the same interface, remove the superfluous configuration commands as appropriate. |
Router is stuck in active mode (Enhanced IGRP only) | If you consistently receive "Stuck-in-Active" messages about a particular network, you probably have a flapping route (typically caused by heavy traffic load). Route flapping can force routers to use a less preferred route, resulting in slower performance. Take steps to reduce traffic on the link or increase the bandwidth of the link. For more information about troubleshooting serial lines, refer to Chapter 15, "Troubleshooting Serial Line Problems." |
The list of Novell SAPs in Table 8-14 is unverified information contributed from various sources. Novell, in an official capacity, does not and has not provided any of this information.
| Decimal | Hex | SAP Description |
|---|---|---|
0 | 0000 | Unknown |
1 | 0001 | User |
2 | 0002 | User Group |
3 | 0003 | Print Queue or Print Group |
4 | 0004 | File Server (SLIST source) |
5 | 0005 | Job Server |
6 | 0006 | Gateway |
7 | 0007 | Print Server or Silent Print Server |
8 | 0008 | Archive Queue |
9 | 0009 | Archive Server |
10 | 000a | Job Queue |
11 | 000b | Administration |
15 | 000F | Novell TI-RPC |
23 | 0017 | Diagnostics |
32 | 0020 | NetBIOS |
33 | 0021 | NAS SNA Gateway |
35 | 0023 | NACS Async Gateway or Asynchronous Gateway |
36 | 0024 | Remote Bridge or Routing Service |
38 | 0026 | Bridge Server or Asynchronous Bridge Server |
39 | 0027 | TCP/IP Gateway Server |
40 | 0028 | Point to Point (Eicon) X.25 Bridge Server |
41 | 0029 | Eicon 3270 Gateway |
42 | 002a | CHI Corp |
44 | 002c | PC Chalkboard |
45 | 002d | Time Synchronization Server or Asynchronous Timer |
46 | 002e | ARCserve 5.0 / Palindrome Backup Director 4.x (PDB4) |
69 | 0045 | DI3270 Gateway |
71 | 0047 | Advertising Print Server |
74 | 004a | NetBlazer Modems |
75 | 004b | Btrieve VAP/NLM 5.0 |
76 | 004c | Netware SQL VAP/NLM Server |
77 | 004d | Xtree Network Version Netware XTree |
80 | 0050 | Btrieve VAP 4.11 |
82 | 0052 | QuickLink (Cubix) |
83 | 0053 | Print Queue User |
88 | 0058 | Multipoint X.25 Eicon Router |
96 | 0060 | STLB/NLM |
100 | 0064 | ARCserve |
102 | 0066 | ARCserve 3.0 |
114 | 0072 | WAN Copy Utility |
122 | 007a | TES-Netware for VMS |
146 | 0092 | WATCOM Debugger or Emerald Tape Backup Server |
149 | 0095 | DDA OBGYN |
152 | 0098 | Netware Access Server (Asynchronous gateway) |
154 | 009a | Netware for VMS II or Named Pipe Server |
155 | 009b | Netware Access Server |
158 | 009e | Portable Netware Server or SunLink NVT |
161 | 00a1 | Powerchute APC UPS NLM |
170 | 00aa | LAWserve |
172 | 00ac | Compaq IDA Status Monitor |
256 | 0100 | PIPE STAIL |
258 | 0102 | LAN Protect Bindery |
259 | 0103 | Oracle DataBase Server |
263 | 0107 | Netware 386 or RSPX Remote Console |
271 | 010f | Novell SNA Gateway |
273 | 0111 | Test Server |
274 | 0112 | Print Server (HP) |
276 | 0114 | CSA MUX (f/Communications Executive) |
277 | 0115 | CSA LCA (f/Communications Executive) |
278 | 0116 | CSA CM (f/Communications Executive) |
279 | 0117 | CSA SMA (f/Communications Executive) |
280 | 0118 | CSA DBA (f/Communications Executive) |
281 | 0119 | CSA NMA (f/Communications Executive) |
282 | 011a | CSA SSA (f/Communications Executive) |
283 | 011b | CSA STATUS (f/Communications Executive) |
286 | 011e | CSA APPC (f/Communications Executive) |
294 | 0126 | SNA TEST SSA Profile |
298 | 012a | CSA TRACE (f/Communications Executive) |
299 | 012b | Netware for SAA |
301 | 012e | IKARUS virus scan utility |
304 | 0130 | Communications Executive |
307 | 0133 | NNS Domain Server or Netware Naming Services Domain |
309 | 0135 | Netware Naming Services Profile |
311 | 0137 | Netware 386 Print Queue or NNS Print Queue |
321 | 0141 | LAN Spool Server (Vap, Intel) |
338 | 0152 | IRMALAN Gateway |
340 | 0154 | Named Pipe Server |
358 | 0166 | NetWare Management |
360 | 0168 | Intel PICKIT Comm Server or Intel CAS Talk Server |
369 | 0171 | UNKNOWN |
371 | 0173 | Compaq |
372 | 0174 | Compaq SNMP Agent |
373 | 0175 | Compaq |
384 | 0180 | XTree Server or XTree Tools |
394 | 018A | UNKNOWN |
432 | 01b0 | GARP Gateway (net research) |
433 | 01b1 | Binfview (Lan Support Group) |
447 | 01bf | Intel LanDesk Manager |
458 | 01ca | AXTEC |
459 | 01cb | Shiva NetModem/E |
460 | 01cc | Shiva LanRover/E |
461 | 01cd | Shiva LanRover/T |
472 | 01d8 | Castelle FAXPress Server |
474 | 01da | Castelle LANPress Print Server |
476 | 01dc | Castille FAX/Xerox 7033 Fax Server/Excel Lan Fax |
496 | 01f0 | LEGATO |
501 | 01f5 | LEGATO |
563 | 0233 | NMS Agent or Netware Management Agent |
567 | 0237 | NMS IPX Discovery or LANtern Read/Write Channel |
568 | 0238 | NMS IP Discovery or LANtern Trap/Alarm Channel |
570 | 023a | LABtern |
572 | 023c | MAVERICK |
574 | 023e | UNKNOWN |
575 | 023f | Used by 11 various Novell Servers / Novell SMDR |
590 | 024e | Netware Connect |
618 | 026a | Network Management Service (NMS) Console |
619 | 026b | Time Synchronization Server (Netware 4.x) |
632 | 0278 | Directory Server (Netware 4.x) |
989 | 03dd | Banyan ENS for Netware Client NLM |
772 | 0304 | Novell SAA Gateway |
776 | 0308 | COM or VERMED 1 |
778 | 030a | Galacticomm's Worldgroup Server |
780 | 030c | Intel Netport 2 or HP JetDirect or HP Quicksilver |
800 | 0320 | Attachmate Gateway |
807 | 0327 | Microsoft Diagnostiocs |
808 | 0328 | WATCOM SQL server |
821 | 0335 | MultiTech Systems Multisynch Comm Server |
835 | 2101 | Performance Technology Instant Internet |
853 | 0355 | Arcada Backup Exec |
858 | 0358 | MSLCD1 |
865 | 0361 | NETINELO |
894 | 037e | Twelve Novell file servers in the PC3M family |
895 | 037f | ViruSafe Notify |
902 | 0386 | HP Bridge |
903 | 0387 | HP Hub |
916 | 0394 | NetWare SAA Gateway |
923 | 039b | Lotus Notes |
951 | 03b7 | Certus Anti Virus NLM |
964 | 03c4 | ARCserve 4.0 (Cheyenne) |
967 | 03c7 | LANspool 3.5 (Intel) |
983 | 03d7 | Lexmark printer server (type 4033-011) |
984 | 03d8 | Lexmark XLE printer server (type 4033-301) |
990 | 03de | Gupta Sequel Base Server or NetWare SQL |
993 | 03e1 | Univel Unixware |
996 | 03e4 | Univel Unixware |
1020 | 03fc | Intel Netport |
1021 | 03fd | Print Server Queue |
1196 | 04ac | On-Time Scheduler NLM |
1034 | 040A | ipnServer |
1035 | 040B | UNKNOWN |
1037 | 040D | LVERRMAN |
1038 | 040E | LVLIC |
1040 | 0410 | UNKNOWN |
1044 | 0414 | Kyocera |
1065 | 0429 | Site Lock Virus (Brightworks) |
1074 | 0432 | UFHELP R |
1075 | 0433 | Synoptics 281x Advanced SNMP Agent |
1092 | 0444 | Microsoft NT SNA Server |
1096 | 0448 | Oracle |
1100 | 044c | ARCserve 5.01 |
1111 | 0457 | Canon GP55 |
1114 | 045a | QMS Printers |
1115 | 045b | Dell SCSI Array (DSA) Monitor |
1169 | 0491 | NetBlazer Modems |
1200 | 04b0 | CD-Net (Meridian) |
1217 | 04C1 | UNKNOWN |
1299 | 0513 | Emulux NQA |
1312 | 0520 | Site Lock Checks |
1321 | 0529 | Site Lock Checks (Brightworks) |
1325 | 052d | Citrix OS/2 App Server |
1343 | 0535 | Tektronix |
1344 | 0536 | Milan |
1387 | 056b | IBM 8235 modem server |
1388 | 056c | Shiva LanRover/E PLUS |
1389 | 056d | Shiva LanRover/T PLUS |
1408 | 0580 | McAfee's NetShield anti-virus |
1466 | 05BA | Compatible Systems Routers |
1569 | 0621 | IBM AntiVirus NLM |
1571 | 0623 | UNKNOWN |
1900 | 076C | Xerox |
1947 | 079b | Shiva LanRover/E 115 |
1958 | 079c | Shiva LanRover/T 115 |
2154 | 086a | ISSC collector NLMs |
2175 | 087f | ISSC DAS agent for AIX |
2857 | 0b29 | Site Lock |
3113 | 0c29 | Site Lock Applications |
3116 | 0c2c | Licensing Server |
9088 | 2380 | LAI Site Lock |
9100 | 238c | Meeting Maker |
18440 | 4808 | Site Lock Server or Site Lock Metering VAP/NLM |
21845 | 5555 | Site Lock User |
25362 | 6312 | Tapeware |
28416 | 6f00 | Rabbit Gateway (3270) |
30467 | 7703 | MODEM |
32770 | 8002 | NetPort Printers (Intel) or LANport |
32776 | 8008 | WordPerfect Network Version |
34238 | 85BE | Cisco Enhanced Interior Routing Protocol (EIGRP) |
34952 | 8888 | WordPerfect Network Version or Quick Network Management |
36864 | 9000 | McAfee's NetShield anti-virus |
38404 | 9604 | CSA-NT_MON |
46760 | b6a8 | Ocean Isle Reachout Remote Control |
61727 | f11f | Site Lock Metering VAP/NLM |
61951 | f1ff | Site Lock |
62723 | F503 | SCA-NT |
64507 | fbfb | TopCall III fax server |
65535 | ffff | Any Service or Wildcard |
0 | 0000 |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue May 16 15:03:34 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.