|
|
Use the debug modem privileged EXEC command to observe modem line activity on an access server. The no form of this command disables debugging output.
debug modemSyntax Description
This command has no arguments or keywords.
Examples
The following is sample output from the debug modem command:
Router# debug modem 15:25:51: TTY4: DSR came up 15:25:51: tty4: Modem: IDLE->READY 15:25:51: TTY4: Autoselect started 15:27:51: TTY4: Autoselect failed 15:27:51: TTY4: Line reset 15:27:51: TTY4: Modem: READY->HANGUP 15:27:52: TTY4: dropping DTR, hanging up 15:27:52: tty4: Modem: HANGUP->IDLE 15:27:57: TTY4: restoring DTR 15:27:58: TTY4: DSR came up
The output shows when the modem line changes state.
Syntax Description
slot/port (Optional) Slot and modem port number. group group-number (Optional) Modem group.
Usage Guidelines
Use the debug modem csm command to troubleshoot call switching problems. With this command, you can trace the complete sequence of switching incoming and outgoing calls.
Examples
The following is the sample output from the debug modem csm command. In this example, a call enters the modem (incoming) on slot 1 port 0.
Router(config)# service timestamps debug uptime Router(config)# end Router# debug modem csm 00:04:09: ccpri_ratetoteup bear rate is 10 00:04:09: CSM_MODEM_ALLOCATE: slot 1 and port 0 is allocated. 00:04:09: MODEM_REPORT(0001): DEV_INCALL at slot 1 and port 0 00:04:09: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 0 00:04:11: CSM_RING_INDICATION_PROC: RI is on 00:04:13: CSM_RING_INDICATION_PROC: RI is off 00:04:15: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 0 00:04:15: MODEM_REPORT(0001): DEV_CONNECTED at slot 1 and port 0 00:04:15: CSM_PROC_IC2_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 0
The following is the sample output from the debug modem csm command when call is dialed from the modem into the network (outgoing) from slot 1 port 2:
Router# debug modem csm atdt16665202 00:11:21: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 2 00:11:21: T1_MAIL_FROM_NEAT: DC_READY_RSP: mid = 1, slot = 0, unit = 0 00:11:21: CSM_PROC_OC1_REQUEST_DIGIT: CSM_EVENT_DIGIT_COLLECT_READY at slot 1, port 2 00:11:24: T1_MAIL_FROM_NEAT: DC_FIRST_DIGIT_RSP: mid = 1, slot = 0, unit = 0 00:11:24: CSM_PROC_OC2_COLLECT_1ST_DIGIT: CSM_EVENT_GET_1ST_DIGIT at slot 1, port 2 00:11:27: T1_MAIL_FROM_NEAT: DC_ALL_DIGIT_RSP: mid = 1, slot = 0, unit = 0 00:11:27: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS (16665202) at slot 1, port 2 00:11:27: ccpri_ratetoteup bear rate is 10 00:11:27: MODEM_REPORT(A000): DEV_CALL_PROC at slot 1 and port 2 00:11:27: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port 2 00:11:31: MODEM_REPORT(A000): DEV_CONNECTED at slot 1 and port 2 00:11:31: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 2 CONNECT 19200/REL - MNP
The following is sample output from the debug modem csm command for an incoming call:
5300# debug modem csm
5300#1.19.36.7 2001
Trying 1.19.36.7, 2001 ... Open
atdt111222333444555666
*Apr 7 12:39:42.475: Mica Modem(1/0): Rcvd Dial String(111222333444555666)
*Apr 7 12:39:42.475: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 0
*Apr 7 12:39:42.479: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_CHANNEL_LOCK at slot 1 and port 0
*Apr 7 12:39:42.479: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_BCHAN_ASSIGNED at slot 1, port 0
*Apr 7 12:39:42.479: Mica Modem(1/0): Configure(0x1)
*Apr 7 12:39:42.479: Mica Modem(1/0): Configure(0x5)
*Apr 7 12:39:42.479: Mica Modem(1/0): Call Setup
*Apr 7 12:39:42.479: neat msg at slot 0: (1/0): Tx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.491: neat msg at slot 0: (0/0): Rx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.531: VDEV_ALLOCATE: slot 1 and port 3 is allocated.
*Apr 7 12:39:42.531: CSM_RX_CAS_EVENT_FROM_NEAT:(0004): EVENT_CALL_DIAL_IN at slot 1 and port 3
*Apr 7 12:39:42.531: CSM_PROC_IDLE: CSM_EVENT_DSX0_CALL at slot 1, port 3
*Apr 7 12:39:42.531: Mica Modem(1/3): Configure(0x0)
*Apr 7 12:39:42.531: Mica Modem(1/3): Configure(0x5)
*Apr 7 12:39:42.531: Mica Modem(1/3): Call Setup
*Apr 7 12:39:42.595: Mica Modem(1/0): State Transition to Call Setup
*Apr 7 12:39:42.655: Mica Modem(1/3): State Transition to Call Setup
*Apr 7 12:39:42.655: Mica Modem(1/3): Went offhook
*Apr 7 12:39:42.655: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 3
*Apr 7 12:39:42.671: neat msg at slot 0: (0/0): Tx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.691: neat msg at slot 0: (1/0): Rx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:42.731: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1 and port 0
*Apr 7 12:39:42.731: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0
*Apr 7 12:39:42.731: Mica Modem(1/0): Generate digits:called_party_num= len=1
*Apr 7 12:39:42.835: Mica Modem(1/3): Rcvd Digit detected(#)
*Apr 7 12:39:42.835: CSM_PROC_IC2_COLLECT_ADDR_INFO: CSM_EVENT_KP_DIGIT_COLLECTED (DNIS=, ANI=) at slot 1, port 3
*Apr 7 12:39:42.855: neat msg at slot 0: (0/0): Tx LOOP_OPEN (ABCD=0101)
*Apr 7 12:39:42.871: neat msg at slot 0: (1/0): Rx LOOP_OPEN (ABCD=0101)
*Apr 7 12:39:42.899: Mica Modem(1/0): Rcvd Digits Generated
*Apr 7 12:39:42.911: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_END_TX_TONE at slot 1 and port 0
*Apr 7 12:39:42.911: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_END_TX_TONE at slot 1, port 0
*Apr 7 12:39:42.911: Mica Modem(1/0): Generate digits:called_party_num=A len=1
*Apr 7 12:39:43.019: Mica Modem(1/0): Rcvd Digits Generated
*Apr 7 12:39:43.019: CSM_PROC_OC4_DIALING: CSM_EVENT_TONE_GENERATED at slot 1, port 0
*Apr 7 12:39:43.019: Mica Modem(1/3): Rcvd Digit detected(A)
*Apr 7 12:39:43.335: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1 and port 0
*Apr 7 12:39:43.335: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0
*Apr 7 12:39:43.335: Mica Modem(1/0): Generate digits:called_party_num=111222333444555666 len=19
*Apr 7 12:39:43.439: Mica Modem(1/3): Rcvd Digit detected(1)
*Apr 7 12:39:43.559: Mica Modem(1/3): Rcvd Digit detected(1)
*Apr 7 12:39:43.619: Mica Modem(1/3): Rcvd Digit detected(1)
*Apr 7 12:39:43.743: Mica Modem(1/3): Rcvd Digit detected(2)
*Apr 7 12:39:43.859: Mica Modem(1/3): Rcvd Digit detected(2)
*Apr 7 12:39:43.919: Mica Modem(1/3): Rcvd Digit detected(2)
*Apr 7 12:39:44.043: Mica Modem(1/3): Rcvd Digit detected(3)
*Apr 7 12:39:44.163: Mica Modem(1/3): Rcvd Digit detected(3)
*Apr 7 12:39:44.223: Mica Modem(1/3): Rcvd Digit detected(3)
*Apr 7 12:39:44.339: Mica Modem(1/3): Rcvd Digit detected(4)
*Apr 7 12:39:44.459: Mica Modem(1/3): Rcvd Digit detected(4)
*Apr 7 12:39:44.523: Mica Modem(1/3): Rcvd Digit detected(4)
*Apr 7 12:39:44.639: Mica Modem(1/3): Rcvd Digit detected(5)
*Apr 7 12:39:44.763: Mica Modem(1/3): Rcvd Digit detected(5)
*Apr 7 12:39:44.883: Mica Modem(1/3): Rcvd Digit detected(5)
*Apr 7 12:39:44.943: Mica Modem(1/3): Rcvd Digit detected(6)
*Apr 7 12:39:45.063: Mica Modem(1/3): Rcvd Digit detected(6)
*Apr 7 12:39:45.183: Mica Modem(1/3): Rcvd Digit detected(6)
*Apr 7 12:39:45.243: Mica Modem(1/3): Rcvd Digit detected(B)
*Apr 7 12:39:45.243: CSM_PROC_IC2_COLLECT_ADDR_INFO: CSM_EVENT_DNIS_COLLECTED (DNIS=111222333444555666, ANI=) at slot 1, port 3
*Apr 7 12:39:45.363: Mica Modem(1/0): Rcvd Digits Generated
*Apr 7 12:39:45.891: neat msg at slot 0: (0/0): Tx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:45.907: neat msg at slot 0: (1/0): Rx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:46.115: neat msg at slot 0: (0/0): Tx LOOP_OPEN (ABCD=0101)
*Apr 7 12:39:46.131: neat msg at slot 0: (1/0): Rx LOOP_OPEN (ABCD=0101)
*Apr 7 12:39:46.175: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_START_TX_TONE at slot 1 and port 0
*Apr 7 12:39:46.175: CSM_PROC_OC4_DIALING: CSM_EVENT_DSX0_START_TX_TONE at slot 1, port 0
*Apr 7 12:39:46.175: Mica Modem(1/0): Generate digits:called_party_num= len=3
*Apr 7 12:39:46.267: Mica Modem(1/3): Rcvd Digit detected(#)
*Apr 7 12:39:46.387: Mica Modem(1/3): Rcvd Digit detected(A)
*Apr 7 12:39:46.447: Mica Modem(1/3): Rcvd Digit detected(B)
*Apr 7 12:39:46.447: CSM_PROC_IC2_COLLECT_ADDR_INFO: CSM_EVENT_ADDR_INFO_COLLECTED (DNIS=111222333444555666, ANI=) at slot 1, port 3
*Apr 7 12:39:46.507: Mica Modem(1/0): Rcvd Digits Generated
*Apr 7 12:39:46.507: CSM_PROC_OC4_DIALING: CSM_EVENT_ADDR_INFO_COLLECTED at slot 1, port 0
*Apr 7 12:39:47.127: CSM_RX_CAS_EVENT_FROM_NEAT:(0004): EVENT_CHANNEL_CONNECTED at slot 1 and port 3
*Apr 7 12:39:47.127: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_DSX0_CONNECTED at slot 1, port 3
*Apr 7 12:39:47.127: Mica Modem(1/3): Link Initiate
*Apr 7 12:39:47.131: neat msg at slot 0: (0/0): Tx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:47.147: neat msg at slot 0: (1/0): Rx LOOP_CLOSURE (ABCD=1101)
*Apr 7 12:39:47.191: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_CHANNEL_CONNECTED at slot 1 and port 0
*Apr 7 12:39:47.191: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_DSX0_CONNECTED at slot 1, port 0
*Apr 7 12:39:47.191: Mica Modem(1/0): Link Initiate
*Apr 7 12:39:47.227: Mica Modem(1/3): State Transition to Connect
*Apr 7 12:39:47.287: Mica Modem(1/0): State Transition to Connect
*Apr 7 12:39:49.103: Mica Modem(1/0): State Transition to Link
*Apr 7 12:39:52.103: Mica Modem(1/3): State Transition to Link
*Apr 7 12:40:00.927: Mica Modem(1/3): State Transition to Trainup
*Apr 7 12:40:00.991: Mica Modem(1/0): State Transition to Trainup
*Apr 7 12:40:02.615: Mica Modem(1/0): State Transition to EC Negotiating
*Apr 7 12:40:02.615: Mica Modem(1/3): State Transition to EC Negotiating
CONNECT 31200 /V.42/V.42bis
5300>
*Apr 7 12:40:05.983: Mica Modem(1/0): State Transition to Steady State
*Apr 7 12:40:05.983: Mica Modem(1/3): State Transition to Steady State+++
OK
ath
*Apr 7 12:40:09.167: Mica Modem(1/0): State Transition to Steady State Escape
*Apr 7 12:40:10.795: Mica Modem(1/0): State Transition to Terminating
*Apr 7 12:40:10.795: Mica Modem(1/3): State Transition to Terminating
*Apr 7 12:40:11.755: Mica Modem(1/3): State Transition to Idle
*Apr 7 12:40:11.755: Mica Modem(1/3): Went onhook
*Apr 7 12:40:11.755: CSM_PROC_IC5_OC6_CONNECTED: CSM_EVENT_MODEM_ONHOOK at slot 1, port 3
*Apr 7 12:40:11.755: VDEV_DEALLOCATE: slot 1 and port 3 is deallocated
*Apr 7 12:40:11.759: neat msg at slot 0: (0/0): Tx LOOP_OPEN (ABCD=0101)
*Apr 7 12:40:11.767: neat msg at slot 0: (1/0): Rx LOOP_OPEN (ABCD=0101)
*Apr 7 12:40:12.087: neat msg at slot 0: (1/0): Tx LOOP_OPEN (ABCD=0101)
*Apr 7 12:40:12.091: neat msg at slot 0: (0/0): Rx LOOP_OPEN (ABCD=0101)
*Apr 7 12:40:12.111: CSM_RX_CAS_EVENT_FROM_NEAT:(A001): EVENT_CALL_IDLE at slot 1 and port 0
*Apr 7 12:40:12.111: CSM_PROC_IC5_OC6_CONNECTED: CSM_EVENT_DSX0_DISCONNECTED at slot 1, port 0
*Apr 7 12:40:12.111: Mica Modem(1/0): Link Terminate(0x6)
*Apr 7 12:40:12.779: Mica Modem(1/3): State Transition to Terminating
*Apr 7 12:40:12.839: Mica Modem(1/3): State Transition to Idle
*Apr 7 12:40:13.495: Mica Modem(1/0): State Transition to Idle
*Apr 7 12:40:13.495: Mica Modem(1/0): Went onhook
*Apr 7 12:40:13.495: CSM_PROC_IC6_OC8_DISCONNECTING: CSM_EVENT_MODEM_ONHOOK at slot 1, port 0
*Apr 7 12:40:13.495: VDEV_DEALLOCATE: slot 1 and port 0 is deallocated
5300#disc
Closing connection to 1.19.36.7 [confirm]
5300#
*Apr 7 12:40:18.783: Mica Modem(1/0): State Transition to Terminating
*Apr 7 12:40:18.843: Mica Modem(1/0): State Transition to Idle
5300#
The MICA modem goes through the following internal link states when the call comes in: 1. Call Setup, 2. Off Hook, 3. Connect, 4. Link, 5. Trainup, 6. EC Negotiation, 7. Steady State
The following describes the CSM activity for an incoming call:
When a voice call comes in, CSM is informed of the incoming call. This allocates the modem and sends the Call Setup message to the MICA modem. The Call_Proc message is sent through D channel. The modem sends an offhook message to CSM by sending the state change to Call Setup. The D channel then sends a CONNECT message. When the CONNECT_ACK message is received, the Link initiate message is sent to the MICA modem and it negotiates the connection with remote modem. In these debug examples, a modem on slot 1 and port 13 is allocated. It goes through its internal states before it is in Steady State and answers the call.
5300# debug modem csm Modem Management Call Switching Module debugging is on *May 13 15:01:00.609: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xE, ces=0x1 bchan=0x12, event=0x1, cause=0x0 *May 13 15:01:00.609: VDEV_ALLOCATE: slot 1 and port 13 is allocated. *May 13 15:01:00.609: MODEM_REPORT(000E): DEV_INCALL at slot 1 and port 13 *May 13 15:01:00.609: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 13 *May 13 15:01:00.609: Mica Modem(1/13): Configure(0x0) *May 13 15:01:00.609: Mica Modem(1/13): Configure(0x0) *May 13 15:01:00.609: Mica Modem(1/13): Configure(0x6) *May 13 15:01:00.609: Mica Modem(1/13): Call Setup *May 13 15:01:00.661: Mica Modem(1/13): State Transition to Call Setup *May 13 15:01:00.661: Mica Modem(1/13): Went offhook *May 13 15:01:00.661: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 13 *May 13 15:01:00.661: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xE, ces=0x1 bchan=0x12, event=0x4, cause=0x0 *May 13 15:01:00.661: MODEM_REPORT(000E): DEV_CONNECTED at slot 1 and port 13 *May 13 15:01:00.665: CSM_PROC_IC3_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 13 *May 13 15:01:00.665: Mica Modem(1/13): Link Initiate *May 13 15:01:00.693: Mica Modem(1/13): State Transition to Connect *May 13 15:01:01.109: Mica Modem(1/13): State Transition to Link *May 13 15:01:09.433: Mica Modem(1/13): State Transition to Trainup *May 13 15:01:11.541: Mica Modem(1/13): State Transition to EC Negotiating *May 13 15:01:12.501: Mica Modem(1/13): State Transition to Steady State
The following describes the status of CSM when a call is connected:
The show modem csm x/y is similar to AS5200. For an active incoming analog call, the modem_status and csm_status should be VDEV_STATUS_ACTIVE_CALL and CSM_IC4_CONNECTED, respectively.
5300# show modem csm 1/13 MODEM_INFO: slot 1, port 13, unit 0, modem_mask=0x0000, modem_port_offset=0 tty_hwidb=0x60D0BCE0, modem_tty=0x60B6FE7C, oobp_info=0x00000000, modem_pool=0x60ADC998 modem_status(0x0002):VDEV_STATUS_ACTIVE_CALL. csm_state(0x0204)=CSM_IC4_CONNECTED, csm_event_proc=0x600C6968, current call thru PRI line invalid_event_count=0, wdt_timeout_count=0 wdt_timestamp_started is not activated wait_for_dialing:False, wait_for_bchan:False pri_chnl=TDM_PRI_STREAM(s0, u0, c18), modem_chnl=TDM_MODEM_STREAM(s1, c13) dchan_idb_start_index=0, dchan_idb_index=0, call_id=0x000E, bchan_num=18 csm_event=CSM_EVENT_ISDN_CONNECTED, cause=0x0000 ring_indicator=0, oh_state=0, oh_int_enable=0, modem_reset_reg=0 ring_no_answer=0, ic_failure=0, ic_complete=1 dial_failure=0, oc_failure=0, oc_complete=0 oc_busy=0, oc_no_dial_tone=0, oc_dial_timeout=0 remote_link_disc=0, stat_busyout=0, stat_modem_reset=0 oobp_failure=0 call_duration_started=1d02h, call_duration_ended=00:00:00, total_call_duration=00:00:00 The calling party phone number = 4085552400 The called party phone number = 4085551400 total_free_rbs_timeslot = 0, total_busy_rbs_timeslot = 0, total_dynamic_busy_rbs_timeslot = 0, total_static_busy_rbs_timeslot = 0, min_free_modem_threshold = 6
The following describes the CSM activity for an outgoing call:
For MICA modems, the dial tone is not required to initiate an outbound call. Unlike the AS5200, the digit collection step is not required. The dialed digit string is sent to CSM in the outgoing request to CSM. CSM signals the D-channel to generate an outbound voice-call, and the B-channel assigned is connected to modem and CSM.
The modem is ordered to connect to the remote side with a CONNECT message, and by sending a link initiate message, then the modem starts to train.
5300# debug modem csm Modem Management Call Switching Module debugging is on 5300# debug isdn q931 ISDN Q931 packets debugging is on *May 15 12:48:42.377: Mica Modem(1/0): Rcvd Dial String(5552400) *May 15 12:48:42.377: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 0 *May 15 12:48:42.377: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS at slot 1, port 0 *May 15 12:48:42.377: CSM_PROC_OC3_COLLECT_ALL_DIGIT: called party num: (5552400) at slot 1, port 0 *May 15 12:48:42.381: process_pri_call making a voice_call. *May 15 12:48:42.381: ISDN Se0:23: TX -> SETUP pd = 8 callref = 0x0011 *May 15 12:48:42.381: Bearer Capability i = 0x8090A2 *May 15 12:48:42.381: Channel ID i = 0xE1808397 *May 15 12:48:42.381: Called Party Number i = 0xA1, '5552400' *May 15 12:48:42.429: ISDN Se0:23: RX <- CALL_PROC pd = 8 callref = 0x8011 *May 15 12:48:42.429: Channel ID i = 0xA98397 *May 15 12:48:42.429: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xA011, ces=0x1 bchan=0x16, event=0x3, cause=0x0 *May 15 12:48:42.429: MODEM_REPORT(A011): DEV_CALL_PROC at slot 1 and port 0 *May 15 12:48:42.429: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port 0 *May 15 12:48:42.429: Mica Modem(1/0): Configure(0x1) *May 15 12:48:42.429: Mica Modem(1/0): Configure(0x0) *May 15 12:48:42.429: Mica Modem(1/0): Configure(0x6) *May 15 12:48:42.429: Mica Modem(1/0): Call Setup *May 15 12:48:42.489: Mica Modem(1/0): State Transition to Call Setup *May 15 12:48:42.589: ISDN Se0:23: RX <- ALERTING pd = 8 callref = 0x8011 *May 15 12:48:43.337: ISDN Se0:23: RX <- CONNECT pd = 8 callref = 0x8011 *May 15 12:48:43.341: MODEM_REPORT:dchan_idb=0x60D437F8, call_id=0xA011, ces=0x1 bchan=0x16, event=0x4, cause=0x0 *May 15 12:48:43.341: MODEM_REPORT(A011): DEV_CONNECTED at slot 1 and port 0 *May 15 12:48:43.341: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1, port 0 *May 15 12:48:43.341: Mica Modem(1/0): Link Initiate *May 15 12:48:43.341: ISDN Se0:23: TX -> CONNECT_ACK pd = 8 callref = 0x0011 *May 15 12:48:43.385: Mica Modem(1/0): State Transition to Connect *May 15 12:48:43.849: Mica Modem(1/0): State Transition to Link *May 15 12:48:52.665: Mica Modem(1/0): State Transition to Trainup *May 15 12:48:54.661: Mica Modem(1/0): State Transition to EC Negotiating *May 15 12:48:54.917: Mica Modem(1/0): State Transition to Steady State
Related Commands
Creates modem startup messages between the network management software and the modem on the specificed OOB port. Performs a call trace on the specified modem, which allows you to determine why calls are terminated.
Command
Description
Use the debug modem dsip privileged EXEC command to display output for modem control messages that are received or sent to the router. To disable the output, use the no form of this command.
debug modem dsip {tty-range | group | shelf/slot/port}
Syntax Description
tty-range Modem TTY number or range. You can specify a single TTY line number or a range from 0 through the number of modems you have in your Cisco AS5800. Be sure to include a dash (-) between the range values you specify. group Modem group information. shelf/slot/port Location of the modem by shelf/slot/port numbers for internal modems.
Command History
11.3(2)AA This command was introduced.
Release
Modification
Usage Guidelines
The debug modem dsip command displays each DSIP message that relates to a modem and is transmitted from or received at the router shelf. This command can be applied to a single modem or a group of modems.
Examples
The following examples show a display of the available debug modem command options, and
debug modem dsip command options:
AS5800# debug modem ? dsip Modem DSIP activity maintenance Modem maintenance activity oob Modem out of band activity trace Call Trace Upload traffic Modem data traffic <cr> AS5800# debug modem dsip ? <0-935> First Modem TTY Number group Modem group information x/y/z Shelf/Slot/Port for Internal Modems <cr>
The following example indicates that an RTS status message was received from the router shelf, and an ACK message was sent back:
AS5800# debug modem dsip 00:11:02: RSMODEM_SEND-1/2/06: MODEM_RING_INDICATION_MSG cci1 si0 ms0 mm65535,0 dc0 00:11:02: RSMODEM_sRCV-1/2/06:l12,MODEM_CALL_ACK_MSG: 00:11:02: RSMODEM_SEND-1/2/06: MODEM_CALL_ACCEPT_MSG 00:11:11: RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 0 36 21 00:11:18: RSMODEM_sRCV-1/2/06:l12,MODEM_SET_DCD_STATE_MSG: 1 00:11:19: RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 00:11:19: RSMODEM_dRCV-2:l1258607996,MODEM_RTS_STATUS_MSG: 0 6 0 23 0 0 0 0 0 00:11:23: RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 0 150 21 00:12:31: RSMODEM_sRCV-1/2/06:l12,MODEM_SET_DCD_STATE_MSG: 0 00:12:31: RSMODEM_SEND-1/2/06: MODEM_CALL_HANGUP_MSG 00:12:31: RSMODEM_sRCV-1/2/06:l12,MODEM_ONHOOK_MSG: 00:12:32: RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 00:12:32: RSMODEM_SEND-1/2/06: MODEM_SET_DTR_STATE_MSG 0 00:12:32: RSMODEM_dRCV-2:l1258659676,MODEM_RTS_STATUS_MSG: 0 6 0 16 0 0 0 0 0 00:12:32: RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 00:12:32: RSMODEM_dRCV-2:l1258600700,MODEM_RTS_STATUS_MSG: 0 6 0 13 0 0 0 0 0 00:12:33: RSMODEM_SEND-1/2/06: MODEM_SET_DTR_STATE_MSG 0 00:12:33: RSMODEM_SEND-1/2/06: MODEM_RTS_STATUS_MSG 1 00:12:33: RSMODEM_dRCV-2:l1258662108,MODEM_RTS_STATUS_MSG: 0 6 0 16 0 0 0 0 0 00:12:35: RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 1 34 22 00:12:38: RSMODEM_SEND-1/2/06: MODEM_SET_DTR_STATE_MSG 1 00:12:47: RSMODEM_sRCV-2:l0,MODEM_POLL_MSG: 0 16 0 7 0 146 0 12 22
Table 105 lists the field descriptions for the debug modem dsip command.
| Field | Description |
|---|---|
RSMODEM_SEND-1/2/06 | Router shelf modem shelf sends a MODEM_RING_INDICATION_MSG message. |
RSMODEM_sRCV-1/2/06 | Router shelf modem received a MODEM_CALL_ACK_MSG message. |
MODEM_CALL_ACCEPT_MSG | Router shelf accepts the call. |
MODEM_CALL_HANGUP_MSG | Router shelf sends a hangup message. |
MODEM_RTS_STATUS_MSG | Request to send message status. |
Related Commands
Displays output for framed, unframed, and asynchronous data transmission received from the modem cards. Displays output for DSIP used between the router shelf and the dial shelf.
Command
Description
Syntax Description
slot/modem-port (Optional) Slot and modem port number. group group-number (Optional) Modem group.
Usage Guidelines
The message types and sequence numbers that appear in the debug output are initiated by the Modem Out-of-Band (OOB) Protocol and used by service personnel for debugging purposes.
![]() |
Caution Entering the debug modem oob command without specifying a slot and modem number debugs all out-of-band ports, which generates a significant amount of information. |
Examples
The following is sample output from the debug modem oob command. This example debugs the out-of-band port on modem 2/0, which creates modem startup messages between the network management software and the modem.
Router# debug modem oob 2/0 MODEM(2/0): One message sent --Message type:3, Sequence number:0 MODEM(2/0): Modem DC session data reply MODEM(2/0): One message sent --Message type:83, Sequence number:1 MODEM(2/0): DC session event = MODEM(2/0): One message sent --Message type:82, Sequence number:2 MODEM(2/0): No status changes since last polled MODEM(2/0): One message sent --Message type:3, Sequence number:3 MODEM(2/0): Modem DC session data reply MODEM(2/0): One message sent --Message type:83, Sequence number:4
Related Commands
Debugs the CSM, used to connect calls on the modem. Performs a call trace on the specified modem, which allows you to determine why calls are terminated.
Command
Description
Syntax Description
normal (Optional) Uploads the call trace to the syslog server on normal call termination (for example, a local user hangup or a remote user hangup). abnormal (Optional) Uploads the call trace to the syslog server on abnormal call termination (for example, any call termination other than normal termination, such as a lost carrier or a watchdog timeout). all (Optional) Uploads the call trace on all call terminations including normal and abnormal call termination. slot/modem-port (Optional) Slot and modem port number. group group-number (Optional) Modem group.
Usage Guidelines
The debug modem trace command applies only to manageable modems. For additional information, use the show modem command.
Examples
The following is sample output from the debug modem trace abnormal command:
Router# debug modem trace abnormal 1/14 Modem 1/14 Abnormal End of Connection Trace. Caller 123-4567 Start-up Response: AS5200 Modem, Firmware 1.0 Control Reply: 0x7C01 DC session response: brasil firmware 1.0 RS232 event: DSR=On, DCD=On, RI=Off, TST=Off changes: RTS=No change, DTR=No change, CTS=No change changes: DSR=No change, DCD=No change, RI=No change, TST=No change Modem State event: Connected Connection event: Speed = 19200, Modulation = VFC Direction = Originate, Protocol = reliable/LAPM, Compression = V42bis DTR event: DTR On Modem Activity event: Data Active Modem Analog signal event: TX = -10, RX = -24, Signal to noise = -32 End connection event: Duration = 10:34-11:43, Number of xmit char = 67, Number of rcvd char = 88, Reason: Watchdog Time-out.
Related Commands
Debugs the CSM, used to connect calls on the modem. Creates modem startup messages between the network management software and the modem on the specificed OOB port.
Command
Description
Use the debug modem traffic privileged EXEC command to display output for framed, unframed, and asynchronous data transmitted received from the modem cards. To disable output, use the no form of this command.
debug modem trafficSyntax Description
This command was no arguments or keywords.
Command History
11.3(2)AA This command was introduced.
Release
Modification
Usage Guidelines
The debug modem traffic command displays output for framed, unframed, and asynchronous data transmitted or received by the modem cards.
Examples
The following example displays information about each unframed or framed data transmitted to or received from the modem cards:
AS5800# debug modem traffic MODEM-RAW-TX:modem = 6/5/00, length = 1, data = 0x61, 0xFF, 0x7D, 0x23 MODEM-RAW-RX:modem = 6/5/00, length = 1, data = 0x61, 0x0, 0x0, 0x0
The information indicates unframed asynchronous data transmission and reception involving the modem on shelf 6, slot 5, port 00.
The following example displays framed asynchronous data transmission and reception involving the modem on shelf 6, slot 5, port 00:
AS5800# debug modem traffic MODEM-FRAMED-TX:modem = 6/5/00, length = 8, data = 0xFF, 0x3, 0x82 MODEM-FRAMED-RX:modem = 6/5/00, length = 14, data = 0xFF, 0x3, 0x80
Related Commands
Displays output for modem control messages that are received or sent to the router.
Command
Description
Use the debug mpoa client privileged EXEC command to display MPC debug information.
The no form of this command disables debugging output.
Syntax Description
all (Optional) Shows debugging information for all MPC activity. data (Optional) Shows debugging information for data plane activity only. This option applies only to routers. egress (Optional) Shows debugging information for egress functionality only. general (Optional) Shows general debugging information only. ingress (Optional) Shows debugging information for ingress functionality only. keep-alives (Optional) Keyword that shows debugging information for keepalive activity only. platform-specific (Optional) Shows debugging information for specific platforms only. This option applies only to the Catalyst 5000 series ATM module. name mpc-name (Optional) Specifies the name of the MPC with the specified name.
Defaults
The default is debugging turned on for all MPCs.
Command History
11.3 This command was introduced.
Release
Modification
Examples
The following shows how to turn on debugging for the MPC ip_mpc:
ATM# debug mpoa client all name ip_mpc
Related Commands
Displays information about the MPOA server.
Command
Description
Use the debug mpoa server privileged EXEC command to display information about the MPOA server. This command optionally limits the output only to the specified MPS. The no form of this command disables debugging output.
debug mpoa server [name mps-name]
Syntax Description
name mps-name (Optional) Specifies the name of a MPOA server.
Command History
11.3 This command was introduced.
Release
Modification
Examples
The following turns on debugging only for the MPS named ip_mps:
Router# debug mpoa server name ip_mps
Related Commands
Displays MPC debug information.
Command
Description
Syntax Description
error (Optional) Displays the error situation for each circuit. event (Optional) Displays the packets received and transmitted for each circuit. flow-control (Optional) Displays the flow control information for each circuit. state (Optional) Displays the state changes for each circuit.
Usage Guidelines
NCIA is an architecture developed by Cisco for accessing SNA applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP backbones.
You cannot enable debugging output for a particular client or particular circuit.
![]() |
Caution Do not enable the debug ncia circuit command during normal operation because this command generates a large amount of output messages and could slow down the router. |
Examples
The following is sample output from the debug ncia circuit error command. In this example, the possible errors are displayed. The first error message indicates that the router is out of memory. The second message indicates that the router has an invalid circuit control block. The third message indicates that the router is out of memory. The remaining messages identify errors related to the finite state machine.
Router# debug ncia circuit error NCIA: ncia_circuit_create memory allocation fail NCIA: ncia_send_ndlc: invalid circuit control block NCIA: send_ndlc: fail to get buffer for ndlc primitive xxx NCIA: ncia circuit fsm: Invalid input NCIA: ncia circuit fsm: Illegal state NCIA: ncia circuit fsm: Illegal input NCIA: ncia circuit fsm: Unexpected input NCIA: ncia circuit fsm: Unknown error rtn code
The following is sample output from the debug ncia circuit event command. In this example, a session start-up sequence is displayed.
Router# debug ncia circuit event NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_START_DL, Len: 24, tmac: 4000.1060.1000, tsap: 4, csap 8, oid: 8A91E8, tid 0, lfs 16, ws 1 NCIA: create circuit: saddr 4000.1060.1000, ssap 4, daddr 4000.3000.0003, dsap 8 sid: 8B09A8 NCIA: send NDLC_DL_STARTED to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_DL_STARTED, Len: 2,4 tmac: 4000.1060.1000, tsap: 4, csap 8, oid: 8A91E8, tid 8B09A8, lfs 16, ws 1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8B09A8, FC 0x81 NCIA: send NDLC_XID_FRAME to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8A91E8, FC 0xC1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 18, sid: 8B09A8, FC 0xC1 NCIA: send NDLC_CONTACT_STN to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_CONTACT_STN, Len: 12, sid: 8A91E8, FC 0xC1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_STN_CONTACTED, Len: 12, sid: 8B09A8, FC 0xC1 NCIA: send NDLC_INFO_FRAME to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_INFO_FRAME, Len: 30, sid: 8A91E8, FC 0xC1
Table 106 describes the significant fields in the output.
| Field | Description |
|---|---|
IN | Incoming message from client. |
OUT | Outgoing message to client. |
Ver_Id | NDLC version ID. |
MsgType | NDLC message type. |
Len | NDLC message length. |
tmac | Target MAC. |
tsap | Target SAP. |
csap | Client SAP. |
oid | Origin ID. |
tid | Target ID |
lfs | Largest frame size flag. |
ws | Window size. |
saddr | Source MAC address. |
ssap | Source SAP. |
daddr | Destination MAC address. |
dsap | Destination SAP. |
sid | Session ID. |
FC | Flow control flag. |
In the following messages, an NDLC_START_DL messages is received from a client. to start a data link session:
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_START_DL, Len: 24, tmac: 4000.1060.1000, tsap: 4, csap 8, oid: 8A91E8, tid 0, lfs 16, ws 1 NCIA: create circuit: saddr 4000.1060.1000, ssap 4, daddr 4000.3000.0003, dsap 8 sid: 8B09A8
The next two messages indicate that an NDLC_DL_STARTED message is sent to a client. The server informs the client that a data link session is started.
NCIA: send NDLC_DL_STARTED to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_DL_STARTED, Len: 2,4 tmac: 4000.1060.1000, tsap: 4, csap 8, oid: 8A91E8, tid 8B09A8, lfs 16, ws 1
In the following two messages, an NDLC_XID_FRAME message is received from a client, and the client starts an XID exchange:
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8B09A8, FC 0x81 NCIA: send NDLC_XID_FRAME to client 10.2.20.3 for ckt: 8B09A8
In the following two messages, an NDLC_XID_FRAME message is sent from a client, and an DLC_XID_FRAME message is received from a client:
NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 12, sid: 8A91E8, FC 0xC1 NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_XID_FRAME, Len: 18, sid: 8B09A8, FC 0xC1
The next two messages show that an NDLC_CONTACT_STN message is sent to a client:
NCIA: send NDLC_CONTACT_STN to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_CONTACT_STN, Len: 12, sid: 8A91E8, FC 0xC1
In the following message, an NDLC_STN_CONTACTED message is received from a client. The client informs server that the station has been contacted.
NCIA(IN): Ver_Id: 0x81, MsgType: NDLC_STN_CONTACTED, Len: 12, sid: 8B09A8, FC 0xC1
In the last two messages, an NDLC_INFO_FRAME is sent to a client, and the server sends data to the client:
NCIA: send NDLC_INFO_FRAME to client 10.2.20.3 for ckt: 8B09A8 NCIA(OUT): Ver_Id: 0x81, MsgType: NDLC_INFO_FRAME, Len: 30, sid: 8A91E8, FC 0xC1
The following is sample output from the debug ncia circuit flow-control command. In this example, the flow control in a session start-up sequence is displayed.
Router# debug ncia circuit flow-control NCIA: no flow control in NDLC_DL_STARTED frame NCIA: receive Increment Window Op for circuit 8ADE00 NCIA: ncia_flow_control_in FC 0x81, IW 1 GP 2 CW 2, Client IW 1 GP 0 CW 1 NCIA: grant client more packet by sending Repeat Window Op NCIA: ncia_flow_control_out FC: 0xC1, IW 1 GP 2 CW 2, Client IW 1 GP 2 CW 2 NCIA: receive FCA for circuit 8ADE00 NCIA: receive Increment Window Op for circuit 8ADE00 NCIA: ncia_flow_control_in FC 0xC1, IW 1 GP 5 CW 3, Client IW 1 GP 2 CW 2 NCIA: grant client more packet by sending Repeat Window Op NCIA: ncia_flow_control_out FC: 0xC1, IW 1 GP 5 CW 3, Client IW 1 GP 5 CW 3 NCIA: receive FCA for circuit 8ADE00 NCIA: receive Increment Window Op for circuit 8ADE00 NCIA: ncia_flow_control_in FC 0xC1, IW 1 GP 9 CW 4, Client IW 1 GP 5 CW 3 NCIA: grant client more packet by sending Repeat Window Op NCIA: ncia_flow_control_out FC: 0xC1, IW 1 GP 8 CW 4, Client IW 1 GP 9 CW 4 NCIA: reduce ClientGrantPacket by 1 (Granted: 8) NCIA: receive FCA for circuit 8ADE00 NCIA: receive Increment Window Op for circuit 8ADE00
Table 107 describes the significant fields in the output.
| Field | Description |
|---|---|
IW | Initial window size. |
GP | Granted packet number. |
CW | Current window size. |
The following is sample output from the debug ncia circuit state command. In this example, a session start-up sequence is displayed.
Router# debug ncia circuit state NCIA: pre-server fsm: event CONN_OPENED NCIA: pre-server fsm: event NDLC_PRIMITIVES NCIA: server event: WAN - STDL state: CLSOED NCIA: ncia server fsm action 32 NCIA: circuit state: CLOSED -> START_DL_RCVD NCIA: server event: DLU - TestStn.Rsp state: START_DL_RCVD NCIA: ncia server fsm action 17 NCIA: circuit state: START_DL_RCVD -> DL_STARTED_SND NCIA: pre-server fsm: event NDLC_PRIMITIVES NCIA: server event: WAN - XID state: DL_STARTED_SND NCIA: ncia server fsm action 33 NCIA: circuit state: DL_STARTED_SND -> DL_STARTED_SND NCIA: server event: DLU - ReqOpnStn.Req state: DL_STARTED_SND NCIA: ncia server fsm action 33 NCIA: circuit state: DL_STARTED_SND -> OPENED NCIA: server event: DLU - Id.Rsp state: OPENED NCIA: ncia server fsm action 11 NCIA: circuit state: OPENED -> OPENED NCIA: pre-server fsm: event NDLC_PRIMITIVES NCIA: server event: WAN - XID state: OPENED NCIA: ncia server fsm action 33 NCIA: circuit state: OPENED -> OPENED NCIA: server event: DLU - Connect.Req state: OPENED NCIA: ncia server fsm action 6 NCIA: circuit state: OPENED -> CONNECT_PENDING NCIA: pre-server fsm: event NDLC_PRIMITIVES NCIA: server event: WAN - CONR state: CONNECT_PENDING NCIA: ncia server fsm action 33 --> CLS_CONNECT_CNF sets NciaClsBusy NCIA: circuit state: CONNECT_PENDING -> CONNECTED NCIA: server event: DLU - Flow.Req (START) state: CONNECTED NCIA: ncia server fsm action 25 --> unset NciaClsBusy NCIA: circuit state: CONNECTED -> CONNECTED NCIA: server event: DLU - Data.Rsp state: CONNECTED NCIA: ncia server fsm action 8 NCIA: circuit state: CONNECTED -> CONNECTED
Table 108 describes the significant fields in the output.
| Field | Description |
|---|---|
WAN | Event from WAN (client). |
DLU | Event from upstream module---dependent logical unit (DLU). |
ADMIN | Administrative event. |
TIMER | Timer event. |
Related Commands
Enables debugging of DLSw+. Displays debug information for all NCIA client processing that occurs in the router. Displays debug information for the NCIA server and its upstream software modules.
Command
Description
Syntax Description
ip-address (Optional) Remote client IP address. error (Optional) Triggers the recording of messages only when errors occur. The current state and event of a NCIA client are normally included in the message. If you do not specify an IP address, the error messages are logged for all active clients. event (Optional) Triggers the recording of messages that describe the current state and event---and sometimes the action that just completed---for the NCIA client. If you do not specify an IP address, the messages are logged for all active clients. message (Optional) Triggers the recording of messages that contain up to the first 32 bytes of data in a TCP packet sent to or received from an NCIA client. If you do not specify an IP address, the messages are logged for all active clients.
Usage Guidelines
NCIA is an architecture developed by Cisco for accessing SNA applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP backbones.
Use the debug ncia client event command to determine the sequences of activities that occur while a NCIA client is in different processing states.
Use the debug ncia client error command to see only certain error conditions that occur.
Use the debug ncia client message command to see only the first 32 bytes of data in a TCP packet sent to or received from an NCIA client.
The debug ncia client command can be used in conjunction with the debug ncia server and debug ncia circuit commands to get a complete picture of NCIA activity.
Examples
The following is sample output from the debug ncia circuit command. Following the example is a description of each sample output message.
Router# debug ncia client NCIA: Passive open 10.2.20.123(1088) -> 1973 NCIA: index for client hash queue is 27 NCIA: number of element in client hash queue 27 is 1 NCIA: event PASSIVE_OPEN, state NCIA_CLOSED for client 10.2.20.123 NCIA: Rcvd msg type NDLC_CAP_XCHG in tcp packet for client 10.2.20.123 NCIA: First 17 byte of data rcvd: 811200110000000000000400050104080C NCIA: Sent msg type NDLC_CAP_XCHG in tcp packet to client 10.2.20.123 NCIA: First 17 byte of data sent: 811200111000000010000400050104080C NCIA: event CAP_CMD_RCVD, state NCIA_CAP_WAIT, for client 10.2.20.123, cap xchg cmd sent NCIA: Rcvd msg type NDLC_CAP_XCHG in tcp packet for client 10.2.20.123 NCIA: First 17 byte of data rcvd: 811200111000000010000000050104080C NCIA: event CAP_RSP_RCVD, state NCIA_CAP_NEG for client 10.2.20.123 NCIA: Rcvd msg type NDLC_PEER_TEST_REQ in tcp packet for client 10.2.20.123 NCIA: First 4 byte of data rcvd: 811D0004 NCIA: event KEEPALIVE_RCVD, state NCIA_OPENED for client 10.2.20.123 NCIA: Sent msg type NDLC_PEER_TEST_RSP in tcp packet to client 10.2.20.123 NCIA: First 4 byte of data sent: 811E0004IA NCIA: event TIME_OUT, state NCIA_OPENED, for client 10.2.20.123, keepalive_count = 0 NCIA: Sent msg type NDLC_PEER_TEST_REQ, in tcp packet to client 10.2.20.123 NCIA: First 4 byte of data sent: 811D0004 NCIA: Rcvd msg type NDLC_PEER_TEST_RSP in tcp packet for client 10.2.20.123 NCIA: First 4 byte of data rcvd: 811E0004 NCIA: event KEEPALIVE_RSP_RCVD, state NCIA_OPENED for client 10.2.20.123 NCIA: Error, event PASIVE_OPEN, state NCIA_OPENED, for client 10.2.20.123, should not have occurred. NCIA: Error, active_open for pre_client_fsm while client 10.2.20.123 is active or not configured, registered.
Messages in lines 1 through 12 show the events that occur when a client connects to the router (the NCIA server). These messages show a passive_open process.
Messages in lines 13 to 17 show the events that occur when a TIME_OUT event is detected by a client PC workstation. The workstation sends an NDLC_PEER_TEST_REQ message to the NCIA server, and the router responds with an NDLC_PEER_TEST_RSP message.
Messages in lines 18 to 23 show the events that occur when a TIME_OUT event is detected by the router (the NCIA server). The router sends an NDLC_PEER_TEST_REQ message to the client PC workstation, and the PC responds with an NDLC_PEER_TEST_RSP message.
When you use the debug ncia client message command, the messages shown on lines 6, 8, 11, 14, 17, 20, and 22 are output in addition to other messages not shown in this example.
When you use the debug ncia client error command, the messages shown on lines 24 and 25 are output in addition to other messages not shown in this example.
Related Commands
Displays debug information for all NCIA client processing that occurs in the router. Displays debug information for the NCIA server and its upstream software modules.
Command
Description
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
NCIA is an architecture developed by Cisco for accessing SNA applications. This architecture allows native SNA interfaces on hosts and clients to access TCP/IP backbones.
The debug ncia server command displays all Cisco Link Services (CLS) messages between the NCIA server and its upstream modules, such as data-link switching (DLSw) and downstream physical units (DSPUs). Use this command when a problem exists between the NCIA server and other software modules within the router.
You cannot enable debugging output for a particular client or particular circuit.
Examples
The following is sample output from the debug ncia server command. In this example, a session start-up sequence is displayed. Following the example is a description of each group of sample output messages.
Router# debug ncia server NCIA: send CLS_TEST_STN_IND to DLU NCIA: Receive TestStn.Rsp NCIA: send CLS_ID_STN_IND to DLU NCIA: Receive ReqOpnStn.Req NCIA: send CLS_REQ_OPNSTN_CNF to DLU NCIA: Receive Id.Rsp NCIA: send CLS_ID_IND to DLU NCIA: Receive Connect.Req NCIA: send CLS_CONNECT_CNF to DLU NCIA: Receive Flow.Req NCIA: Receive Data.Req NCIA: send CLS_DATA_IND to DLU NCIA: send CLS_DISC_IND to DLU NCIA: Receive Disconnect.Rsp
In the following messages, the client is sending a test message to the host and the test message is received by the host:
NCIA: send CLS_TEST_STN_IND to DLU NCIA: Receive TestStn.Rsp
In the next message, the server is sending an XID message to the host:
NCIA: send CLS_ID_STN_IND to DLU
In the next two messages, the host opens the station and the server responds:
NCIA: Receive ReqOpnStn.Req NCIA: send CLS_REQ_OPNSTN_CNF to DLU
In the following two messages, the client is performing an XID exchange with the host:
NCIA: Receive Id.Rsp NCIA: send CLS_ID_IND to DLU
In the next group of messages, the host attempts to establish a session with the client:
NCIA: Receive Connect.Req NCIA: send CLS_CONNECT_CNF to DLU NCIA: Receive Flow.Req
In the next two messages, the host sends data to the client:
NCIA: Receive Data.Req NCIA: send CLS_DATA_IND to DLU
In the last two messages, the client closes the session:
NCIA: send CLS_DISC_IND to DLU NCIA: Receive Disconnect.Rsp
Related Commands
Enables debugging of DLSw+. Displays circuit-related information between the NCIA server and client. Displays debug information for all NCIA client processing that occurs in the router.
Command
Description
Use the debug netbios error privileged EXEC command to display information about Network Basic Input/Output System (NetBIOS) protocol errors. The no form of this command disables debugging output.
debug netbios errorSyntax Description
This command has no arguments or keywords.
Usage Guidelines
For complete information on the NetBIOS process, use the debug netbios packet command along with the debug netbios error command.
Examples
The following is sample output from the debug netbios error command. This example shows that an illegal packet has been received on the async interface.
Router# debug netbios error
Async1 nbf Bad packet
Related Commands
Displays name caching activities on a router. Displays general information about NetBIOS packets.
Command
Description
Use the debug netbios-name-cache privileged EXEC command to display name caching activities on a router. The no form of this command disables debugging output.
debug netbios-name-cacheSyntax Description
This command has no arguments or keywords.
Usage Guidelines
Examine the display to diagnose problems in NetBIOS name caching.
Examples
The following is sample output from the debug netbios-name-cache command:
Router# debug netbios-name-cache NETBIOS: L checking name ORINDA, vrn=0 NetBIOS name cache table corrupted at offset 13 NetBIOS name cache table corrupted at later offset, at location 13 NETBIOS: U chk name=ORINDA, addr=1000.4444.5555, idb=TR1, vrn=0, type=1 NETBIOS: U upd name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1 NETBIOS: U add name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1 NETBIOS: U no memory to add cache entry. name=ORINDA,addr=1000.4444.5555 NETBIOS: Invalid structure detected in netbios_name_cache_ager NETBIOS: flushed name=ORINDA, addr=1000.4444.5555 NETBIOS: expired name=ORINDA, addr=1000.4444.5555 NETBIOS: removing entry. name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0 NETBIOS: Tossing ADD_NAME/STATUS/NAME/ADD_GROUP frame NETBIOS: Lookup Failed -- not in cache NETBIOS: Lookup Worked, but split horizon failed NETBIOS: Could not find RIF entry NETBIOS: Cannot duplicate packet in netbios_name_cache_proxy
![]() |
Note The sample display is a composite output. Debugging output that you actually see would not necessarily occur in this sequence. |
Table 109 describes selected output fields.
| Field | Description |
|---|---|
NETBIOS | NetBIOS name caching debugging output. |
L, U | L means lookup; U means update. |
addr=1000.4444.5555 | MAC address of machine being looked up in NetBIOS name cache. |
idb=TR1 | Indicates that the name of machine was learned from Token Ring interface number 1; idb is into interface data block. |
vrn=0 | Packet comes from virtual ring number 0. This packet actually comes from a real Token Ring interface, because virtual ring number 0 is not valid. |
type=1 | Indicates the way that the router learned about the specified machine. The possible values are as follows:
|
With the first line of output, the router declares that it has examined the NetBIOS name cache table for the machine name ORINDA and that the packet that prompted the lookup came from virtual ring 0. In this case, this packet comes from a real interface---virtual ring number 0 is not valid.
NETBIOS: L checking name ORINDA, vrn=0
The following two lines indicate that an invalid NetBIOS entry exists and that the corrupted memory was detected. The invalid memory will be removed from the table; no action is needed.
NetBIOS name cache table corrupted at offset 13 NetBIOS name cache table corrupted at later offset, at location 13
The following line indicates that the router attempted to check the NetBIOS cache table for the name ORINDA with MAC address 1000.4444.5555. This name was obtained from Token Ring interface 1. The type field indicates that the name was learned from traffic.
NETBIOS: U chk name=ORINDA, addr=1000.4444.5555, idb=TR1, vrn=0, type=1
The following line indicates that the NetBIOS name ORINDA is in the name cache table and was updated to the current value:
NETBIOS: U upd name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1
The following line indicates that the NetBIOS name ORINDA is not in the table and must be added to the table:
NETBIOS: U add name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0,type=1
The following line indicates that there was insufficient cache buffer space when the router tried to add this name:
NETBIOS: U no memory to add cache entry. name=ORINDA,addr=1000.4444.5555
The following line indicates that the NetBIOS ager detects an invalid memory in the cache. The router clears the entry; no action is needed.
NETBIOS: Invalid structure detected in netbios_name_cache_ager
The following line indicates that the entry for ORINDA was flushed from the cache table:
NETBIOS: flushed name=ORINDA, addr=1000.4444.5555
The following line indicates that the entry for ORINDA timed out and was flushed from the cache table:
NETBIOS: expired name=ORINDA, addr=1000.4444.5555
The following line indicates that the router removed the ORINDA entry from its cache table:
NETBIOS: removing entry. name=ORINDA,addr=1000.4444.5555,idb=TR1,vrn=0
The following line indicates that the router discarded a NetBIOS packet of type ADD_NAME, STATUS, NAME_QUERY, or ADD_GROUP. These packets are discarded when multiple copies of one of these packet types are detected during a certain period of time.
NETBIOS: Tossing ADD_NAME/STATUS/NAME/ADD_GROUP frame
The following line indicates that the system could not find a NetBIOS name in the cache:
NETBIOS: Lookup Failed -- not in cache
The following line indicates that the system found the destination NetBIOS name in the cache, but located on the same ring from which the packet came. The router will drop this packet because the packet should not leave this ring.
NETBIOS: Lookup Worked, but split horizon failed
The following line indicates that the system found the NetBIOS name in the cache, but the router could not find the corresponding RIF. The packet will be sent as a broadcast frame.
NETBIOS: Could not find RIF entry
The following line indicates that no buffer was available to create a NetBIOS name-cache proxy. A proxy will not be created for the packet, which will be forwarded as a broadcast frame.
NETBIOS: Cannot duplicate packet in netbios_name_cache_proxy
Related Commands
Displays information about NetBIOS protocol errors. Displays general information about NetBIOS packets.
Command
Description
Use the debug netbios packet privileged EXEC command to display general information about NetBIOS packets. The no form of this command disables debugging output.
debug netbios packetSyntax Description
This command has no arguments or keywords.
Usage Guidelines
For complete information on the NetBIOS process, use the debug netbios error command along with the debug netbios packet command.
Examples
The following is sample output from the debug netbios packet and debug netbios error commands. This example shows the LLC header for an asynchronous interface followed by the NetBIOS information. For additional information on the NetBIOS fields, refer to IBM LAN Technical Reference IEEE 802.2.
Router# debug netbios packet
Async1 (i) U-format UI C_R=0x0
(i) NETBIOS_ADD_NAME_QUERY
Resp_correlator= 0x6F 0x0
Src name=CS-NT-1
Async1 (i) U-format UI C_R=0x0
(i) NETBIOS_ADD_GROUP_QUERY
Resp_correlator= 0x6F 0x0
Src name=COMMSERVER-WG
Async1 (i) U-format UI C_R=0x0
(i) NETBIOS_ADD_NAME_QUERY
Resp_correlator= 0x6F 0x0
Src name=CS-NT-1
Ethernet0 (i) U-format UI C_R=0x0
(i) NETBIOS_DATAGRAM
Length= 0x2C 0x0
Dest name=COMMSERVER-WG
Src name=CS-NT-3
Related Commands
Displays information about NetBIOS protocol errors. Displays name caching activities on a router.
Command
Description
Use the debug nhrp privileged EXEC command to display information about Next Hop Resolution Protocol (NHRP) activity. The no form of this command disables debugging output.
debug nhrpSyntax Description
This command has no arguments or keywords.
Usage Guidelines
Use this command when some nodes on a TCP/IP or IPX network are not responding. It shows whether the router is sending or receiving NHRP packets.
Examples
The following is sample output from the debug nhrp command:
Router# debug nhrp
NHRP: Cache update 172.19.145.57 None
NHRP: Sent request src 172.19.145.56 dst 255.255.255.255
NHRP M: id 0 src 172.19.145.56 dst 172.19.145.57
NHRP: Encapsulation succeeded. MAC addr ffff.ffff.ffff.
NHRP: O 86 bytes out Ethernet1 dest 255.255.255.255
NHRP: Recv reply Size 64
NHRP M: id 0 src 172.19.145.56 dst 172.19.145.57
NHRP: Cache update 172.19.145.57 0000.0c14.59d3.
Table 110 describes the fields shown in the display.
| Field | Descriptions |
|---|---|
NHRP and NHRP M | NHRP debugging output and mandatory header debugging output. |
Cache update | NHRP cache is being revised. |
Sent request src dst | NHRP request packet was sent from the specified source address. NHRP packet was sent to the specified destination address. |
id src dst | Sequence number of the packet. Sequence number of the source address. Sequence number of the destination address. |
Encapsulation succeeded. MAC addr | NHRP packet was successfully encapsulated. Link layer address used as the destination address for the NHRP packet. |
O 86 bytes out Ethernet1 dest | Size of the NHRP packet (in this case, the output was |
Recv reply Size | Indicates receipt of an NHRP reply packet and the size of the packet excluding the link layer header. |
Related Commands
Displays information about NHRP option processing. Displays a dump of NHRP packets.
Command
Description
To display the extensions portion of an NHRP packet, use the debug nhrp extension privileged EXEC command. The no form of this command disables debugging output.
debug nhrp extensionSyntax Description
This command has no arguments or keywords.
Examples
The following is sample output from the debug nhrp extension command:
Router# debug nhrp extension
NHRP extension processing debugging is on
Router#
Forward Transit NHS Record Extension(4):
(C-1) code: no error(0)
prefix: 0, mtu: 9180, hd_time: 7200
addr_len: 20(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0
client NBMA: 47.0091810000000002ba08e101.525354555354.01
client protocol: 135.206.58.54
Reverse Transit NHS Record Extension(5):
Responder Address Extension(3):
(C) code: no error(0)
prefix: 0, mtu: 9180, hd_time: 7200
addr_len: 20(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0
client NBMA: 47.0091810000000002ba08e101.525354555355.01
client protocol: 135.206.58.55
Forward Transit NHS Record Extension(4):
(C-1) code: no error(0)
prefix: 0, mtu: 9180, hd_time: 7200
addr_len: 20(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0
client NBMA: 47.0091810000000002ba08e101.525354555354.01
client protocol: 135.206.58.54
Reverse Transit NHS Record Extension(5):
Responder Address Extension(3):
Forward Transit NHS Record Extension(4):
Reverse Transit NHS Record Extension(5):
Use the debug nhrp options privileged EXEC command to display information about NHRP option processing. The no form of this command disables debugging output.
debug nhrp optionsSyntax Description
This command has no arguments or keywords.
Usage Guidelines
Use this command to show you whether there are problems or error situations with NHRP option processing (for example, unknown options).
Examples
The following is sample output from the debug nhrp options command:
Router# debug nhrp options
NHRP-OPT: MASK 4
NHRP-OPT-MASK: FFFFFFFF
NHRP-OPT: NETID 4
NHRP-OPT: RESPONDER 4
NHRP-OPT: RECORD 0
NHRP-OPT: RRECORD 0
Table 111 describes the fields.
| Field | Descriptions |
|---|---|
NHRP-OPT | NHRP options debugging output. |
MASK 4 | Number of bytes of information in the destination prefix option. |
NHRP-OPT-MASK | Contents of the destination prefix option. |
NETID | Number of bytes of information in the subnetwork identifier option. |
RESPONDER | Number of bytes of information in the responder address option. |
RECORD | Forward record option. |
RRECORD | Reverse record option. |
Related Commands
Displays information about NHRP activity. Displays a dump of NHRP packets.
Command
Description
To display a dump of NHRP packets, use the debug nhrp packet privileged EXEC command. The no form of this command disables debugging output.
debug nhrp packetSyntax Description
This command has no arguments or keywords.
Examples
The following is sample output from the debug nhrp packet command:
Router# debug nhrp packet
NHRP activity debugging is on
Router#
NHRP: Send Purge Request via ATM3/0.1, packet size: 72
src: 135.206.58.55, dst: 135.206.58.56
(F) afn: NSAP(3), type: IP(800), hop: 255, ver: 1
shtl: 20(NSAP), sstl: 0(NSAP)
(M) flags: "reply required", reqid: 2
src NBMA: 47.0091810000000002ba08e101.525354555355.01
src protocol: 135.206.58.55, dst protocol: 135.206.58.56
(C-1) code: no error(0)
prefix: 0, mtu: 9180, hd_time: 0
addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0
client protocol: 135.206.58.130
NHRP: Receive Purge Reply via ATM3/0.1, packet size: 72
(F) afn: NSAP(3), type: IP(800), hop: 254, ver: 1
shtl: 20(NSAP), sstl: 0(NSAP)
(M) flags: "reply required", reqid: 2
src NBMA: 47.0091810000000002ba08e101.525354555355.01
src protocol: 135.206.58.55, dst protocol: 135.206.58.56
(C-1) code: no error(0)
prefix: 0, mtu: 9180, hd_time: 0
addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0
client protocol: 135.206.58.130
Use the debug nhrp rate privileged EXEC command to display information about NHRP traffic rate limits. The no form of this command disables debugging output.
debug nhrp rateSyntax Description
This command has no arguments or keywords.
Usage Guidelines
Use this command to verify that the traffic is consistent with the setting of the NHRP commands (such as ip nhrp use and ip max-send commands).
Examples
The following is sample output from the debug nhrp rate command:
Router# debug nhrp rate
NHRP-RATE: Sending initial request
NHRP-RATE: Retransmitting request (retrans ivl 2)
NHRP-RATE: Retransmitting request (retrans ivl 4)
NHRP-RATE: Ethernet1: Used 3
Table 112 describes the fields.
| Field | Descriptions |
|---|---|
NHRP-RATE | NHRP rate debugging output. |
Sending initial request | First time an attempt was made to send an NHRP packet to a particular destination. |
Retransmitting request | Indicates that the NHRP packet was retransmitted, and shows the time interval (in seconds) to wait before the NHRP packet is retransmitted again. |
Ethernet1: Used 3 | Interface over which the NHRP packet was transmitted. Number of packets sent out of the default maximum 5 (in this case, 3 were sent). |
Related Commands
Displays information about NHRP activity. Displays information about NHRP option processing
Command
Description
Use the debug packet privileged EXEC command to display information on packets that the network can not classify. The no form of this command disables debugging output.
debug packetSyntax Description
This command has no arguments or keywords.
Examples
The following is sample output from the debug packet command:
Router# debug packet Ethernet0: Unknown ARPA, src 0000.0c00.6fa4, dst ffff.ffff.ffff, type 0x0a0 data 00000c00f23a00000c00ab45, len 60 Serial3: Unknown HDLC, size 64, type 0xaaaa, flags 0x0F00 Serial2: Unknown PPP, size 128 Serial7: Unknown FRAME-RELAY, size 174, type 0x5865, DLCI 7a Serial0: compressed TCP/IP packet dropped
Table 113 describes significant fields.
| Field | Description |
|---|---|
Ethernet0 | Name of the Ethernet interface that received the packet. |
Unknown | Network could not classify this packet. Examples include packets with unknown link types. |
ARPA | Packet uses ARPA-style encapsulation. Possible encapsulation styles vary depending on the media command mode (MCM) and encapsulation style. Ethernet (MCM)---Encapsulation Style
|
| FDDI (MCM)---Encapsulation Style
|
| Frame Relay---Encapsulation Style
|
| Serial (MCM)---Encapsulation Style
|
| Token Ring (MCM)---Encapsulation Style
|
src 0000.0c00.6fa4 | MAC address of the node generating the packet. |
dst.ffff.ffff.ffff | MAC address of the destination node for the packet. |
type 0x0a0 | Packet type. |
data... | First 12 bytes of the datagram following the MAC header. |
len 60 | Length of the message, in bytes, that the interface received from the wire. |
size 64 | Length of the message, in bytes, that the interface received from the wire. Equivalent to the len field. |
flags 0x0F00 | HDLC or PP flags field. |
DLCI 7a | The DLCI number on Frame Relay. |
compressed TCP/IP packet dropped | TCP header compression is enabled on an interface and the packet is not HDLC or X25. |
Syntax Description
driver Displays driver debug information. csm Displays CSM debug information. 1 (Optional) Displays information for telephone port 1 only. 2 (Optional) Displays information for telephone port 2 only.
Usage Guidelines
The debug pots command displays driver and CSM debug information for telephone ports 1 and 2.
Examples
The following is a sample display from the debug pots driver 1 command. This sample display indicates that the telephone port driver is not receiving caller ID information from the ISDN line. Therefore, the analog caller ID device attached to the telephone port does not display caller ID information.
router# debug pots driver 1 00:01:51:POTS DRIVER port=1 activate ringer: cadence=0 callerId=Unknown 00:01:51:POTS DRIVER port=1 state=Idle drv_event=RING_EVENT 00:01:51:POTS DRIVER port=1 enter_ringing 00:01:51:POTS DRIVER port=1 cmd=19 00:01:51:POTS DRIVER port=1 activate disconnect 00:01:51:POTS DRIVER port=1 state=Ringing drv_event=DISCONNECT_EVENT 00:01:51:POTS DRIVER port=1 cmd=1A 00:01:51:POTS DRIVER port=1 enter_idle 00:01:51:POTS DRIVER port=1 ts connect: 0 0 00:01:51:POTS DRIVER port=1 cmd=D 00:01:51:POTS DRIVER port=1 report onhook 00:01:51:POTS DRIVER port=1 activate tone=SILENCE_TONE 00:01:51:POTS DRIVER port=1 state=Idle drv_event=TONE_EVENT 00:01:51:POTS DRIVER port=1 activate tone=SILENCE_TONE 00:01:51:POTS DRIVER port=1 state=Idle drv_event=TONE_EVENT 00:01:53:POTS DRIVER port=1 activate ringer: cadence=0 callerId=Unknown 00:01:53:POTS DRIVER port=1 state=Idle drv_event=RING_EVENT 00:01:53:POTS DRIVER port=1 enter_ringing 00:01:53:POTS DRIVER port=1 cmd=19 00:01:55:POTS DRIVER port=1 cmd=1A 00:02:49:POTS DRIVER port=1 state=Ringing drv_event=OFFHOOK_EVENT 00:02:49:POTS DRIVER port=1 cmd=1A 00:02:49:POTS DRIVER port=1 enter_suspend 00:02:49:POTS DRIVER port=1 cmd=A 00:02:49:POTS DRIVER port=1 report offhook 00:02:49:POTS DRIVER port=1 activate connect: endpt=1 calltype=TWO_PARTY_CALL 00:02:49:POTS DRIVER port=1 state=Suspend drv_event=CONNECT_EVENT 00:02:49:POTS DRIVER port=1 enter_connect: endpt=1 calltype=0 00:02:49:POTS DRIVER port=1 cmd=A 00:02:49:POTS DRIVER port=1 ts connect: 1 0 00:02:49:POTS DRIVER port=1 activate connect: endpt=1 calltype=TWO_PARTY_CALL 00:02:49:POTS DRIVER port=1 state=Connect drv_event=CONNECT_EVENT 00:02:49:POTS DRIVER port=1 enter_connect: endpt=1 calltype=0 00:02:49:POTS DRIVER port=1 cmd=A 00:02:49:POTS DRIVER port=1 ts connect: 1 0 00:02:55:POTS DRIVER port=1 state=Connect drv_event=ONHOOK_EVENT 00:02:55:POTS DRIVER port=1 enter_idle 00:02:55:POTS DRIVER port=1 ts connect: 0 0 00:02:55:POTS DRIVER port=1 cmd=D 00:02:55:POTS DRIVER port=1 report onhook 00:02:55:POTS DRIVER port=1 activate tone=SILENCE_TONE 00:02:55:POTS DRIVER port=1 state=Idle drv_event=TONE_EVENT 00:02:55:POTS DRIVER port=1 activate tone=SILENCE_TONE 00:02:55:POTS DRIVER port=1 state=Idle drv_event=TONE_EVENT
The following is sample display from the debug pots csm 1 command. This sample display indicates that a dial peer contains an invalid destination pattern (555-1111).
router# debug pots csm 1 01:57:28:EVENT_FROM_ISDN:dchanidb=0x66CB38, call_id=0x11, ces=0x2 bchan=0x0, event=0x1, cause=0x0 01:57:28:Dial peer not found, route call to port 1 01:57:28:CSM_PROC_IDLE:CSM_EVENT_ISDN_CALL, call_id=0x11, port=1 01:57:28:Calling number `5551111' 01:57:40:CSM_PROC_RINGING:CSM_EVENT_VDEV_OFFHOOK, call_id=0x11, port=1 01:57:40:EVENT_FROM_ISDN:dchan_idb=0x66CB38, call_id=0x11, ces=0x2 bchan=0x0, event=0x4, cause=0x0 01:57:40:CSM_PROC_CONNECTING:CSM_EVENT_ISDN_CONNECTED, call_id=0x11, port=1 01:57:47:CSM_PROC_CONNECTING:CSM_EVENT_VDEV_ONHOOK, call_id=0x11, port=1 01:57:201863503872: %ISDN-6-DISCONNECT:Interface BRI0:1 disconnected from unknown, call lasted 5485 seconds 01:57:47: %ISDN-6-DISCONNECT:Interface BRI0:1 disconnected from unknown, call lasted 5485 seconds 01:57:47:EVENT_FROM_ISDN:dchan _idb=0x66CB38, call_id=0x11, ces=0x2 bchan=0xFFFFFFFF, event=0x0, cause=0x1 01:57:47:CSM_PROC_NEAR_END_DISCONNECT:CSM_
Use the debug ppp privileged EXEC command to display information on traffic and exchanges in an internetwork implementing the Point-to-Point Protocol (PPP). The no form of this command disables debugging output.
debug ppp {packet | negotiation | error | authentication | compression | cbcp}
Syntax Description
packet Displays PPP packets being sent and received. (This command displays low-level packet dumps.) negotiation Displays PPP packets transmitted during PPP startup, where PPP options are negotiated. error Displays protocol errors and error statistics associated with PPP connection negotiation and operation. authentication Displays authentication protocol messages, including Challenge Authentication Protocol (CHAP) packet exchanges and Password Authentication Protocol (PAP) exchanges. compression Displays information specific to the exchange of PPP connections using MPPC. This command is useful for obtaining incorrect packet sequence number information where MPPC compression is enabled. cbcp Displays protocol errors and statistics associated with PPP connection negotiations using MSCB.
Usage Guidelines
Use the debug ppp command when trying to find the following:
Refer to Internet RFCs 1331, 1332, and 1333 for details concerning PPP-related nomenclature and protocol information.
![]() |
Caution The debug ppp compression command is CPU-intensive and should be used with caution. This command should be disabled immediately after debugging. |
Examples
The following is sample output from the debug ppp packet command as seen from the Link Quality Monitor (LQM) side of the connection. This display example depicts packet exchanges under normal PPP operation.
Router# debug ppp packet PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48 PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 3 (C) magic D3454 PPP Serial4: input(C021) state = OPEN code = ECHOREQ(9) id = 3 len = 12 PPP Serial4: O LCP ECHOREP(A) id 3 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48 PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 4 (C) magic D3454 PPP Serial4: input(C021) state = OPEN code = ECHOREQ(9) id = 4 len = 12 PPP Serial4: O LCP ECHOREP(A) id 4 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48 PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 5 (C) magic D3454 PPP Serial4: input(C021) state = OPEN code = ECHOREQ(9) id = 5 len = 12 PPP Serial4: O LCP ECHOREP(A) id 5 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48 PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 6 (C) magic D3454 PPP Serial4: input(C021) state = OPEN code = ECHOREQ(9) id = 6 len = 12 PPP Serial4: O LCP ECHOREP(A) id 6 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48 PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 7 (C) magic D3454 PPP Serial4: input(C021) state = OPEN code = ECHOREQ(9) id = 7 len = 12 PPP Serial4: O LCP ECHOREP(A) id 7 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
Table 114 describes significant fields in the output.
| Field | Description |
|---|---|
PPP | PPP debugging output. |
Serial4 | Interface number associated with this debugging information. |
(o), O | Packet was detected as an output packet. |
(i), I | Packet was detected as an input packet. |
lcp_slqr() | Procedure name; running LQM, send a Link Quality Report (LQR). |
lcp_rlqr() | Procedure name; running LQM, received an LQR. |
input (C021) | Router received a packet of the specified packet type (in hexadecimal). A value of C025 indicates packet of type LQM. |
state = OPEN | PPP state; normal state is OPEN. |
magic = D21B4 | Magic Number for indicated node; when output is indicated, this is the Magic Number of the node on which debugging is enabled. The actual Magic Number depends on whether the packet detected is indicated as I or O. |
datagramsize = 52 | Packet length including header. |
code = ECHOREQ(9) | Identifies the type of packet received. Both forms of the packet, string and hexadecimal, are presented. |
len = 48 | Packet length without header. |
id = 3 | ID number per Link Control Protocol (LCP) packet format. |
pkt type 0xC025 | Packet type in hexadecimal; typical packet types are C025 for LQM and C021 for LCP. |
LCP ECHOREQ (9) | Echo Request; value in parentheses is the hexadecimal representation of the LCP type. |
LCP ECHOREP (A) | Echo Reply; value in parentheses is the hexadecimal representation of the LCP type. |
To elaborate on the displayed output, consider the partial exchange. This sequence shows that one side is using ECHO for its keepalives and the other side is using LQRs.
Router# debug ppp packet PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48 PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48 PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 3 (C) magic D3454 PPP Serial4: input(C021) state = OPEN code = ECHOREQ(9) id = 3 len = 12 PPP Serial4: O LCP ECHOREP(A) id 3 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
The first line states that the router with debugging enabled has sent an LQR to the other side of the PPP connection:
PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
The next two lines indicate that the router has received a packet of type C025 (LQM) and provides details about the packet:
PPP Serial4(i): pkt type 0xC025, datagramsize 52 PPP Serial4(i): lcp_rlqr() state = OPEN magic = D3454, len = 48
The next two lines indicate that the router received an ECHOREQ of type C021 (LCP). The other side is sending ECHOs. The router on which debugging is configured for LQM but also responds to ECHOs.
PPP Serial4(i): pkt type 0xC021, datagramsize 16 PPP Serial4: I LCP ECHOREQ(9) id 3 (C) magic D3454
Next, the router is detected to have responded to the ECHOREQ with an ECHOREP and is preparing to send out an LQR:
PPP Serial4: O LCP ECHOREP(A) id 3 (C) magic D21B4 PPP Serial4(o): lcp_slqr() state = OPEN magic = D21B4, len = 48
The following is sample output from the debug ppp negotiation command. This is a normal negotiation, where both sides agree on network control program (NCP) parameters. In this case, protocol type IP is proposed and acknowledged.
Router# debug ppp negotiation ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 3D56CAC ppp: received config for type = 4 (QUALITYTYPE) acked ppp: received config for type = 5 (MAGICNUMBER) value = 3D567F8 acked (ok) PPP Serial4: state = ACKSENT fsm_rconfack(C021): rcvd id 5 ppp: config ACK received, type = 4 (CI_QUALITYTYPE), value = C025 ppp: config ACK received, type = 5 (CI_MAGICNUMBER), value = 3D56CAC ppp: ipcp_reqci: returning CONFACK. (ok) PPP Serial4: state = ACKSENT fsm_rconfack(8021): rcvd id 4
Table 115 describes significant fields in the output.
| Field | Description |
|---|---|
ppp | PPP debugging output. |
sending CONFREQ | Router sent a configuration request. |
type = 4 (CI_QUALITYTYPE) | Type of LCP configuration option that is being negotiated and a descriptor. A type value of 4 indicates Quality Protocol negotiation; a type value of 5 indicates Magic Number negotiation. |
value = C025/3E8 | For Quality Protocol negotiation, indicates NCP type and reporting period. In the example, C025 indicates LQM; 3E8 is a hexadecimal value translating to about 10 seconds (in hundredths of a second). |
value = 3D56CAC | For Magic Number negotiation, indicates the Magic Number being negotiated. |
received config | Receiving node has received the proposed option negotiation for the indicated option type. |
acked | Acknowledgment and acceptance of options. |
state = ACKSENT | Specific PPP state in the negotiation process. |
ipcp_reqci | IPCP notification message; sending CONFACK. |
fsm_rconfack (8021) | Procedure fsm_rconfack processes received CONFACKs, and the protocol (8021) is IP. |
The first two lines indicate that the router is trying to bring up LCP and will use the indicated negotiation options (Quality Protocol and Magic Number). The value fields are the values of the options themselves. C025/3E8 translates to Quality Protocol LQM. 3E8 is the reporting period (in hundredths of a second). 3D56CAC is the value of the Magic Number for the router.
ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 3D56CAC
The next two lines indicate that the other side negotiated for options 4 and 5 as requested and acknowledged both. If the responding end does not support the options, a CONFREJ is sent by the responding node. If the responding end does not accept the value of the option, a CONFNAK is sent with the value field modified.
ppp: received config for type = 4 (QUALITYTYPE) acked ppp: received config for type = 5 (MAGICNUMBER) value = 3D567F8 acked (ok)
The next three lines indicate that the router received a CONFACK from the responding side and displays accepted option values. Use the rcvd id field to verify that the CONFREQ and CONFACK have the same id field.
PPP Serial4: state = ACKSENT fsm_rconfack(C021): rcvd id 5 ppp: config ACK received, type = 4 (CI_QUALITYTYPE), value = C025 ppp: config ACK received, type = 5 (CI_MAGICNUMBER), value = 3D56CAC
The next line indicates that the router has IP routing enabled on this interface and that the IPCP NCP negotiated successfully:
ppp: ipcp_reqci: returning CONFACK.
In the last line, the router's state is listed as ACKSENT.
PPP Serial4: state = ACKSENT fsm_rconfack(C021): rcvd id 5\
The following is sample output from when the debug ppp packet and debug ppp negotiation commands are enabled at the same time.

The following is sample output from the debug ppp negotiation command when the remote side of the connection is unable to respond to LQM requests:
Router# debug ppp negotiation ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44B7010 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44C1488
The following is sample output when no response is detected for configuration requests (with both the debug ppp negotiation and debug ppp packet command enabled):
Router# debug ppp negotiation Router# debug ppp packet ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44DFDC8 PPP Serial4: O LCP CONFREQ(1) id 14 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E0980 State= 3 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44DFDC8 PPP Serial4: O LCP CONFREQ(1) id 15 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E1828 State= 3 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44DFDC8 PPP Serial4: O LCP CONFREQ(1) id 16 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E27C8 State= 3 ppp: sending CONFREQ, type = 4 (CI_QUALITYTYPE), value = C025/3E8 ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 44DFDC8 PPP Serial4: O LCP CONFREQ(1) id 17 (12) QUALITYTYPE (8) 192 37 0 0 3 232 MAGICNUMBER (6) 4 77 253 200 ppp: TIMEout: Time= 44E3768 State= 3
The following is sample output from the debug ppp error command. These messages might appear when the Quality Protocol option is enabled on an interface that is already running PPP.
Router# debug ppp error PPP Serial3(i): rlqr receive failure. successes = 15 PPP: myrcvdiffp = 159 peerxmitdiffp = 41091 PPP: myrcvdiffo = 2183 peerxmitdiffo = 1714439 PPP: threshold = 25 PPP Serial4(i): rlqr transmit failure. successes = 15 PPP: myxmitdiffp = 41091 peerrcvdiffp = 159 PPP: myxmitdiffo = 1714439 peerrcvdiffo = 2183 PPP: l->OutLQRs = 1 LastOutLQRs = 1 PPP: threshold = 25 PPP Serial3(i): lqr_protrej() Stop sending LQRs. PPP Serial3(i): The link appears to be looped back.
Table 116 describes significant fields in the output.
| Field | Description |
|---|---|
PPP | PPP debugging output. |
Serial3(i) | Interface number associated with this debugging information; indicates that this is an input packet. |
rlqr receive failure | Request to negotiate the Quality Protocol option is not accepted. |
myrcvdiffp = 159 | Number of packets received over the time period. |
peerxmitdiffp = 41091 | Number of packets sent by the remote node over this period. |
myrcvdiffo = 2183 | Number of octets received over this period. |
peerxmitdiffo = 1714439 | Number of octets sent by the remote node over this period. |
threshold = 25 | Maximum error percentage acceptable on this interface. This percentage is calculated by the threshold value entered in the ppp quality number interface configuration command. A value of 100 - number (100 minus number) is the maximum error percentage. In this case, a number of 75 was entered. This means that the local router must maintain a minimum 75 percent non-error percentage, or the PPP link will be considered down. |
OutLQRs = 1 | Local router's current send LQR sequence number. |
LastOutLQRs = 1 | The last sequence number that the remote node side has seen from the local node. |
The following is sample output from the debug ppp authentication command. Use this debug command to determine why an authentication fails.
Router# debug ppp authentication Serial0: Unable to authenticate. No name received from peer Serial0: Unable to validate CHAP response. USERNAME pioneer not found. Serial0: Unable to validate CHAP response. No password defined for USERNAME pioneer Serial0: Failed CHAP authentication with remote. Remote message is Unknown name Serial0: remote passed CHAP authentication. Serial0: Passed CHAP authentication with remote. Serial0: CHAP input code = 4 id = 3 len = 48
In general, these messages are self-explanatory. Fields that can show optional output are outlined in Table 117.
| Field | Description |
|---|---|
Serial0 | Interface number associated with this debugging information and CHAP access session in question. |
USERNAME pioneer not found. | The name pioneer in this example is the name received in the CHAP response. The router looks up this name in the list of usernames that are configured for the router. |
Remote message is Unknown name | The following messages can appear:
|
code = 4 | Specific CHAP type packet detected. Possible values are as follows:
|
id = 3 | ID number per Link Control Protocol (LCP) packet format. |
len = 48 | Packet length without header. |
The following shows sample output from the debug ppp command using the cbcp keyword. This output depicts packet exchanges under normal PPP operation where the Cisco access server is waiting for the remote PC to respond to the MSCB request. The router also has debug ppp negotiation and service timestamps msec commands enabled.
Router# debug ppp cbcp Dec 17 00:48:11.302: As8 MCB: User mscb Callback Number - Client ANY Dec 17 00:48:11.306: Async8 PPP: O MCB Request(1) id 1 len 9 Dec 17 00:48:11.310: Async8 MCB: O 1 1 0 9 2 5 0 1 0 Dec 17 00:48:11.314: As8 MCB: O Request Id 1 Callback Type Client-Num delay 0 Dec 17 00:48:13.342: As8 MCB: Timeout in state WAIT_RESPONSE Dec 17 00:48:13.346: Async8 PPP: O MCB Request(1) id 2 len 9 Dec 17 00:48:13.346: Async8 MCB: O 1 2 0 9 2 5 0 1 0 Dec 17 00:48:13.350: As8 MCB: O Request Id 2 Callback Type Client-Num delay 0 Dec 17 00:48:15.370: As8 MCB: Timeout in state WAIT_RESPONSE Dec 17 00:48:15.374: Async8 PPP: O MCB Request(1) id 3 len 9 Dec 17 00:48:15.374: Async8 MCB: O 1 3 0 9 2 5 0 1 0 Dec 17 00:48:15.378: As8 MCB: O Request Id 3 Callback Type Client-Num delay 0 Dec 17 00:48:17.398: As8 MCB: Timeout in state WAIT_RESPONSE Dec 17 00:48:17.402: Async8 PPP: O MCB Request(1) id 4 len 9 Dec 17 00:48:17.406: Async8 MCB: O 1 4 0 9 2 5 0 1 0 Dec 17 00:48:17.406: As8 MCB: O Request Id 4 Callback Type Client-Num delay 0 Dec 17 00:48:19.426: As8 MCB: Timeout in state WAIT_RESPONSE Dec 17 00:48:19.430: Async8 PPP: O MCB Request(1) id 5 len 9 Dec 17 00:48:19.430: Async8 MCB: O 1 5 0 9 2 5 0 1 0 Dec 17 00:48:19.434: As8 MCB: O Request Id 5 Callback Type Client-Num delay 0 Dec 17 00:48:21.454: As8 MCB: Timeout in state WAIT_RESPONSE Dec 17 00:48:21.458: Async8 PPP: O MCB Request(1) id 6 len 9 Dec 17 00:48:21.462: Async8 MCB: O 1 6 0 9 2 5 0 1 0 Dec 17 00:48:21.462: As8 MCB: O Request Id 6 Callback Type Client-Num delay 0 Dec 17 00:48:23.482: As8 MCB: Timeout in state WAIT_RESPONSE Dec 17 00:48:23.486: Async8 PPP: O MCB Request(1) id 7 len 9 Dec 17 00:48:23.490: Async8 MCB: O 1 7 0 9 2 5 0 1 0 Dec 17 00:48:23.490: As8 MCB: O Request Id 7 Callback Type Client-Num delay 0 Dec 17 00:48:25.510: As8 MCB: Timeout in state WAIT_RESPONSE Dec 17 00:48:25.514: Async8 PPP: O MCB Request(1) id 8 len 9 Dec 17 00:48:25.514: Async8 MCB: O 1 8 0 9 2 5 0 1 0 Dec 17 00:48:25.518: As8 MCB: O Request Id 8 Callback Type Client-Num delay 0 Dec 17 00:48:26.242: As8 PPP: I pkt type 0xC029, datagramsize 18 Dec 17 00:48:26.246: Async8 PPP: I MCB Response(2) id 8 len 16 Dec 17 00:48:26.250: Async8 MCB: I 2 8 0 10 2 C C 1 32 34 39 32 36 31 33 0 Dec 17 00:48:26.254: As8 MCB: Received response Dec 17 00:48:26.258: As8 MCB: Response CBK-Client-Num 2 12 12, addr 1-2492613 Dec 17 00:48:26.262: Async8 PPP: O MCB Ack(3) id 9 len 16 Dec 17 00:48:26.266: Async8 MCB: O 3 9 0 10 2 C C 1 32 34 39 32 36 31 33 0 Dec 17 00:48:26.270: As8 MCB: O Ack Id 9 Callback Type Client-Num delay 12 Dec 17 00:48:26.270: As8 MCB: Negotiated MCB with peer Dec 17 00:48:26.390: As8 LCP: I TERMREQ [Open] id 4 len 8 (0x00000000) Dec 17 00:48:26.390: As8 LCP: O TERMACK [Open] id 4 len 4 Dec 17 00:48:26.394: As8 MCB: Peer terminating the link Dec 17 00:48:26.402: As8 MCB: Initiate Callback for mscb at 2492613 using Async
The following is sample output from the debug ppp compression command with service timestamps enabled and shows a typical PPP packet exchange between the router and Microsoft client where the MPPC header sequence numbers increment correctly:
Router# debug ppp compression 00:04:14: BR0:1 MPPC: Decomp - hdr/exp_cc# 0x2003/0x0003 00:04:14: BR0:1 MPPC: Decomp - hdr/exp_cc# 0x2004/0x0004 00:04:14: BR0:1 MPPC: Decomp - hdr/exp_cc# 0x2005/0x0005 00:04:14: BR0:1 MPPC: Decomp - hdr/exp_cc# 0x2006/0x0006 00:04:14: BR0:1 MPPC: Decomp - hdr/exp_cc# 0x2007/0x0007
Table 118 describes the fields for the debug ppp compression output.
| Field | Description |
|---|---|
Interface | Interface enabled with MPPC. |
Decomp - hdr/ | Decompression header and bit settings. |
exp_cc# | Expected coherency count. |
0x2003 | Received sequence number. |
0x0003 | Expected sequence number. |
The following shows sample output from debug ppp negotiation and debug ppp error commands, which can be used to troubleshoot initial ppp negotiation and setup errors. This example shows a virtual interface (virtual interface 1) during normal PPP operation and CCP negotiation.
Router# debug ppp nego error Vt1 PPP: Unsupported or un-negotiated protocol. Link arp VPDN: Chap authentication succeeded for p5200 Vi1 PPP: Phase is DOWN, Setup Vi1 VPDN: Virtual interface created for dinesh@cisco.com Vi1 VPDN: Set to Async interface Vi1 PPP: Phase is DOWN, Setup Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking Vi1 CCP: Re-Syncing history using legacy method %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up Vi1 PPP: Treating connection as a dedicated line Vi1 PPP: Phase is ESTABLISHING, Active Open Vi1 LCP: O CONFREQ [Closed] id 1 len 25 Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000) Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x000FB69F (0x0506000FB69F) Vi1 LCP: PFC (0x0702) Vi1 LCP: ACFC (0x0802) Vi1 VPDN: Bind interface direction=2 Vi1 PPP: Treating connection as a dedicated line Vi1 LCP: I FORCED CONFREQ len 21 Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000) Vi1 LCP: AuthProto CHAP (0x0305C22305) Vi1 LCP: MagicNumber 0x12A5E4B5 (0x050612A5E4B5) Vi1 LCP: PFC (0x0702) Vi1 LCP: ACFC (0x0802) Vi1 VPDN: PPP LCP accepted sent & rcv CONFACK Vi1 PPP: Phase is AUTHENTICATING, by this end Vi1 CHAP: O CHALLENGE id 1 len 27 from "l_4000" Vi1 CHAP: I RESPONSE id 20 len 37 from "dinesh@cisco.com" Vi1 CHAP: O SUCCESS id 20 len 4 Vi1 PPP: Phase is UP Vi1 IPCP: O CONFREQ [Closed] id 1 len 10 Vi1 IPCP: Address 15.2.2.3 (0x03060F020203) Vi1 CCP: O CONFREQ [Not negotiated] id 1 len 10 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 IPCP: I CONFREQ [REQsent] id 1 len 34 Vi1 IPCP: Address 0.0.0.0 (0x030600000000) Vi1 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000) Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000) Vi1 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000) Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000) Vi1 IPCP: Using the default pool Vi1 IPCP: Pool returned 11.2.2.5 Vi1 IPCP: O CONFREJ [REQsent] id 1 len 16 Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000) Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000) Vi1 CCP: I CONFREQ [REQsent] id 1 len 15 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 CCP: Stacker history 1 check mode EXTENDED (0x1105000104) Vi1 CCP: Already accepted another CCP option, rejecting this STACKER Vi1 CCP: O CONFREJ [REQsent] id 1 len 9 Vi1 CCP: Stacker history 1 check mode EXTENDED (0x1105000104) Vi1 IPCP: I CONFACK [REQsent] id 1 len 10 Vi1 IPCP: Address 15.2.2.3 (0x03060F020203) Vi1 CCP: I CONFACK [REQsent] id 1 len 10 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 CCP: I CONFREQ [ACKrcvd] id 2 len 10 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 CCP: O CONFACK [ACKrcvd] id 2 len 10 Vi1 CCP: MS-PPC supported bits 0x00000001 (0x120600000001) Vi1 CCP: State is Open Vi1 IPCP: I CONFREQ [ACKrcvd] id 2 len 22 Vi1 IPCP: Address 0.0.0.0 (0x030600000000) Vi1 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000) Vi1 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000) Vi1 IPCP: O CONFNAK [ACKrcvd] id 2 len 22 Vi1 IPCP: Address 11.2.2.5 (0x03060B020205) Vi1 IPCP: PrimaryDNS 171.69.1.148 (0x8106AB450194) Vi1 IPCP: SecondaryDNS 171.69.2.132 (0x8306AB450284) Vi1 IPCP: I CONFREQ [ACKrcvd] id 3 len 22 Vi1 IPCP: Address 11.2.2.5 (0x03060B020205) Vi1 IPCP: PrimaryDNS 171.69.1.148 (0x8106AB450194) Vi1 IPCP: SecondaryDNS 171.69.2.132 (0x8306AB450284) Vi1 IPCP: O CONFACK [ACKrcvd] id 3 len 22 Vi1 IPCP: Address 11.2.2.5 (0x03060B020205) Vi1 IPCP: PrimaryDNS 171.69.1.148 (0x8106AB450194) Vi1 IPCP: SecondaryDNS 171.69.2.132 (0x8306AB450284) Vi1 IPCP: State is Open Vi1 IPCP: Install route to 11.2.2.5
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Apr 27 08:00:28 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.