Debug command and RIP
Â
Cisco IOS Show commands can tell you many things about what is going on with your router or switch, but they can’t tell you everything. For example, Show commands cannot tell you when routes drop in or out of the routing table, why an ISDN line failed to connect, whether a packet really went out the router, or what ICMP error code was received. On the other hand, Cisco IOS Debug commands can tell you all these things, and more.
Besides providing more detailed information than what Show commands can provide, Debug commands have the benefit of providing information in “real time†(or dynamically). This is contrary to Show commands that just take a snapshot in time and display the results on your console (somewhat static results). This real-time difference can be very helpful in diagnosing problems.
Let’s take a look at a simple example. We are going to view RIP (Routing Information Protocol) in Debug mode.
Router# debug ip RIP
RIP protocol debugging is on
To verify what debugging is enabled, use this command:
Router# show debug
RIP protocol debugging is on
The output from whatever type of debug is enabled will be sent to wherever the Cisco IOS logging system tells that output to go. Either you will receive the output on your screen, it will go to the buffered log on the router, or it will go to a syslog server across the network (or all of these).
To see what level the various outputs are set to and where the output will go, type:
Router# show logging
Syslog logging: enabled (1 messages dropped, 3 messages rate-limited,
0 flushes, 0 overruns, xml disabled, filtering disabled)
Console logging: level debugging, 8 messages logged, xml disabled,
filtering disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level warnings, 2 messages logged, xml disabled,
filtering disabled
Logging Exception size (4096 bytes)
Count and timestamp logging messages: disabled
Trap logging: level informational, 12 message lines logged
Log Buffer (51200 bytes):
*Jun 9 20:56:49.195: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
*Jun 9 20:56:49.231: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
Router#
The console should display RIP updates that are sent and received through the RIP protocol. Here is an example of what you might see for RIP debugging:
*Jun 9 21:13:56.471: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (1.1.1.1)
*Jun 9 21:13:56.471: RIP: build update entries - suppressing null update
*Jun 9 21:14:22.519: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (1.1.1.1)
*Jun 9 21:14:22.519: RIP: build update entries - suppressing null update
Remember that you should use Debug only for a short time to get a snippet of information, and then turn Debug off as it can be a serious performance hit on your router.
Â
DEBUG COmmands
Â
debug ip drp
Â
Use the debug ip drp EXEC command to display Director Response Protocol (DRP) information. The no form of this command disables debugging output.
Â
[no] debug ip drp
Â
Usage Guidelines
Â
The debug ip drp command is used to debug the director response agent used by the Distributed Director product. The Distributed Director can be used to dynamically respond to Domain Name System (DNS) queries with the IP address of the "best" host based on various criteria.
Â
Sample Display
Â
shows sample debug ip drp output. This example shows the packet origination, the IP address that information is routed to, and the route metrics that were returned.
Â
Figure 2-92 Sample Debug IP DRP Output
Â
Router# debug ip drp
Â
DRP: received v1 packet from 172.31.232.8, via Ethernet0
Â
DRP: RTQUERY for 172.31.58.94 returned internal=0, external=0
Â
describes the fields shown in .
Â
Â
Table 2-49 Debug IP DRP Field DescriptionsÂ
Field
|
Description
|
---|---|
DRP: received v1 packet from 172.31.232.8, via Ethernet0 |
The router received a version 1 DRP packet from the IP address shown, via the interface shown. |
DRP: RTQUERY for 172.31.58.94 |
The DRP packet contained two Route Query requests. The first request was for the distance to the IP address 171.69.113.50. |
internal |
If nonzero, the metric for the internal distance of the route that the router uses to send packets in the direction of the client. The internal distance is the distance within the router's autonomous system. |
external |
If nonzero, the metric for the Border Gateway Protocol (BGP) or external distance used to send packets to the client. The external distance is the distance outside the router's autonomous system. |
Â
Â
debug ip dvmrp
Â
Use the debug ip dvmrp EXEC command to display information on Distance Vector Multiprotocol Routing Protocol (DVMRP) packets received and transmitted. The no form of this command disables debugging output.
Â
[no] debug ip dvmrp [detail [access-list] [in | out]]
Â
Syntax Description
detail |
(Optional) Enables a more detailed level of output and displays packet contents. |
access-list |
(Optional) Causes the debug ip dvmrp command to restrict output to one access list. |
in |
(Optional) Causes the debug ip dvmrp command to output packets received in DVMRP reports. |
out |
(Optional) Causes the debug ip dvmrp command to output packets transmitted in DVMRP reports. |
Â
Â
Usage Guidelines
Â
Use the debug ip dvmrp detail command with care. This command generates a great deal of output and can interrupt other activity on the router when it is invoked.
Â
Sample Displays
Â
shows sample debug ip dvmrp output.
Â
Figure 2-93 Sample Debug IP DVMRP Output
Â
Router# debug ip dvmrp
Â
DVMRP: Received Report on Ethernet0 from 172.19.244.10
Â
DVMRP: Received Report on Ethernet0 from 172.19.244.11
Â
DVMRP: Building Report for Ethernet0 224.0.0.4
Â
DVMRP: Send Report on Ethernet0 to 224.0.0.4
Â
DVMRP: Sending IGMP Reports for known groups on Ethernet0
Â
DVMRP: Received Report on Ethernet0 from 172.19.244.10
Â
DVMRP: Received Report on Tunnel0 from 192.168.199.254
Â
DVMRP: Received Report on Tunnel0 from 192.168.199.254
Â
DVMRP: Received Report on Tunnel0 from 192.168.199.254
Â
DVMRP: Received Report on Tunnel0 from 192.168.199.254
Â
DVMRP: Received Report on Tunnel0 from 192.168.199.254
Â
DVMRP: Received Report on Tunnel0 from 192.168.199.254
Â
DVMRP: Building Report for Tunnel0 224.0.0.4
Â
DVMRP: Send Report on Tunnel0 to 192.168.199.254
Â
DVMRP: Send Report on Tunnel0 to 192.168.199.254
Â
DVMRP: Send Report on Tunnel0 to 192.168.199.254
Â
DVMRP: Send Report on Tunnel0 to 192.168.199.254
Â
DVMRP: Radix tree walk suspension
Â
DVMRP: Send Report on Tunnel0 to 192.168.199.254
Â
Explanations for individual lines of output from follow.
Â
The following lines show that the router received DVMRP routing information and placed it in the mroute table:
Â
DVMRP: Received Report on Ethernet0 from 172.19.244.10
Â
DVMRP: Received Report on Ethernet0 from 172.19.244.11
Â
The following lines show that the router is creating a report to send to another DVMRP router:
Â
DVMRP: Building Report for Ethernet0 224.0.0.4
Â
DVMRP: Send Report on Ethernet0 to 224.0.0.4
Â
provides a list of internet multicast addresses supported for host IP implementations.
Â
Â
Table 2-50 Internet Multicast AddressesÂ
Address
|
Description
|
RFC
|
---|---|---|
224.0.0.0 |
Base address (Reserved) |
RFC 1112 |
224.0.0.1 |
All systems on this subnet |
RFC 1112 |
224.0.0.2 |
All routers on this subnet |
 |
224.0.0.3 |
Unassigned |
 |
224.0.0.4 |
DVMRP routers |
RFC 1075 |
224.0.0.5 |
OSPFIGP all routers |
RFC 1583 |
Â
Â
The following lines show that a protocol update report has been sent to all known multicast groups. Hosts use IGMP reports to communicate with routers and to request to join a multicast group. In this case, the router is sending an IGMP report for every known group to the host, which is running mrouted. The host the responds as though the router was a host on the LAN segment that wants to receive multicast packets for the group.
Â
DVMRP: Sending IGMP Reports for known groups on Ethernet0
Â
shows sample debug ip dvmrp detail output.
Â
Figure 2-94 Sample Debug IP DVMRP Detail Output
Â
Router# debug ip dvmrp detail
Â
DVMRP: Sending IGMP Reports for known groups on Ethernet0
Â
DVMRP: Advertise group 224.2.224.2 on Ethernet0
Â
DVMRP: Advertise group 224.2.193.34 on Ethernet0
Â
DVMRP: Advertise group 224.2.231.6 on Ethernet0
Â
DVMRP: Received Report on Tunnel0 from 192.168.199.254
Â
DVMRP: Origin 150.166.53.0/24, metric 13, distance 0
Â
DVMRP: Origin 150.166.54.0/24, metric 13, distance 0
Â
DVMRP: Origin 150.166.55.0/24, metric 13, distance 0
Â
DVMRP: Origin 150.166.56.0/24, metric 13, distance 0
Â
DVMRP: Origin 150.166.92.0/24, metric 12, distance 0
Â
DVMRP: Origin 150.166.100.0/24, metric 12, distance 0
Â
DVMRP: Origin 150.166.101.0/24, metric 12, distance 0
Â
DVMRP: Origin 150.166.142.0/24, metric 8, distance 0
Â
DVMRP: Origin 150.166.200.0/24, metric 12, distance 0
Â
DVMRP: Origin 150.166.237.0/24, metric 12, distance 0
Â
DVMRP: Origin 150.203.5.0/24, metric 8, distance 0
Â
Explanations for individual lines of output from follow.
Â
The following lines show that this group is available to the DVMRP router. The mrouted process on the host will forward the source and multicast information for this group through the DVMRP cloud to other members.
Â
DVMRP: Advertise group 224.2.224.2 on Ethernet0
Â
The following lines show the DVMRP route information:
Â
DVMRP: Origin 150.166.53.0/24, metric 13, distance 0
Â
DVMRP: Origin 150.166.54.0/24, metric 13, distance 0
Â
The metric is the number of hops the route has covered, and the distance is the administrative distance.
Â
debug ip eigrp
Â
Use the debug ip eigrp EXEC command to display information on Enhanced IGRP protocol packets. The no form of this command disables debugging output.
Â
[no] debug ip eigrp
Â
Usage Guidelines
Â
This command helps you analyze the packets that are sent and received on an interface. Because the debug ip eigrp command generates large amounts of output, only use it when traffic on the network is light.
Â
Sample Display
Â
shows sample debug ip eigrp output.
Â
Figure 2-95 Sample Debug IP EIGRP Output
Â
Router# debug ip eigrp
Â
IP-EIGRP: Processing incoming UPDATE packet
Â
IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960
Â
IP-EIGRP: Ext 192.168.0.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960
Â
IP-EIGRP: Ext 192.168.3.0 255.255.255.0 M 386560 - 256000 130560 SM 360960 - 256000 104960
Â
IP-EIGRP: 172.24.43.0 255.255.255.0, - do advertise out Ethernet0/1
Â
IP-EIGRP: Ext 172.24.43.0 255.255.255.0 metric 371200 - 256000 115200
Â
IP-EIGRP: 192.135.246.0 255.255.255.0, - do advertise out Ethernet0/1
Â
IP-EIGRP: Ext 192.135.246.0 255.255.255.0 metric 46310656 - 45714176 596480
Â
IP-EIGRP: 172.24.40.0 255.255.255.0, - do advertise out Ethernet0/1
Â
IP-EIGRP: Ext 172.24.40.0 255.255.255.0 metric 2272256 - 1657856 614400
Â
IP-EIGRP: 192.135.245.0 255.255.255.0, - do advertise out Ethernet0/1
Â
IP-EIGRP: Ext 192.135.245.0 255.255.255.0 metric 40622080 - 40000000 622080
Â
IP-EIGRP: 192.135.244.0 255.255.255.0, - do advertise out Ethernet0/1
Â
describes significant fields in the debug messages shown in .
Â
Â
Table 2-51 Debug IP EIGRP Field DescriptionsÂ
Field
|
Description
|
---|---|
IP-EIGRP: |
Indicates that this is an IP Enhanced IGRP packet. |
Ext |
Indicates the following address is an external destination rather than an internal destination, which would be labeled as Int. |
M |
Shows the computed metric, which includes SM and the cost between this router and the neighbor. The first number is the composite metric. The next two numbers are the inverse bandwidth and the delay, respectively. |
SM |
Shows the metric as reported by the neighbor. |
Â
Â
debug ip ftp
Â
To activate the debugging option to track the transactions submitted during an FTP session, use the debug ip ftp privileged EXEC command. To disable debugging output, use the no form of this command.
Â
[no] debug ip ftp
Â
Usage Guidelines
Â
The debug ip ftp command is useful for debugging problems associated with File Transfer Protocol (FTP).
Â
Sample Display
Â
The following is an example of the debug ip ftp command:
Â
Router# debug ip ftp
Â
FTP transactions debugging is on
Â
The following is sample output from the debug ip ftp command:
Â
FTP: 220 ProFTPD 1.2.0pre8 Server (DFW Nostrum FTP Server) [defiant.dfw.nostrum.com]
Â
Dec 27 22:12:09.133: FTP: ---> USER router
Â
Dec 27 22:12:09.133: FTP: 331 Password required for router.
Â
Dec 27 22:12:09.137: FTP: ---> PASS WQHK5JY2
Â
Dec 27 22:12:09.153: FTP: 230 Anonymous access granted, restrictions apply.
Â
Dec 27 22:12:09.153: FTP: ---> TYPE I
Â
Dec 27 22:12:09.157: FTP: 200 Type set to I.
Â
Dec 27 22:12:09.157: FTP: ---> PASV
Â
.......
Â
.......
Â
Dec 27 22:12:09.173: FTP: ---> QUIT
Â
Dec 27 22:12:09.181: FTP: 221 Goodbye.
Â
DRP: RTQUERY for 172.31.58.94 returned internal=0, external=0
Â
debug ip https authentication
Â
Use the debug ip https authentication privileged EXEC command to troubleshoot HTTP authentication problems. This command displays the authentication method the router attempted and authentication-specific status messages. The no form of this command disables debugging output.
Â
[no] debug ip https authentication
Â
Sample Display
Â
shows sample debug ip https authentication output.
Â
Figure 2-96 Sample Debug IP HTTP Authentication Output
Â
Router# debug ip https authentication
Â
Authentication for url `/' `/' level 15 privless `/'
Â
Authentication username = `local15' priv-level = 15 auth-type = local
Â
describes the output fields created by the debug ip https authentication command.
Â
Table 2-52 Debug IP HTTP Authentication Descriptions
Field
|
Description
|
Authentication for url |
Provides information about the URL in different forms. |
Authentication username |
Identifies the user. |
priv-level |
Indicates the user privilege level. |
auth-type |
Indicates the authentication method. |
Â
Â
debug ip https ezsetup
Â
Use the debug ip https ezsetup EXEC command to display the configuration changes that occur during the EZ Setup process. The no form of this command disables debugging output.
Â
[no] debug ip https ezsetup
Â
Usage Guidelines
Â
Use the debug ip https ezsetup command to verify the EZ Setup actions without changing the router's configuration.
Â
EZ Setup is a form you fill out to perform basic router configuration from most Hypertext Markup Language (HTML) browsers.
Â
Sample Display
Â
shows sample debug ip https ezsetup output. This example shows the configuration changes for the router when the EZ Setup form has been submitted.
Â
Figure 2-97 Sample Debug IP HTTP EZ Setup Output
Â
Router# debug ip https ezsetup
Â
service timestamps debug
Â
service timestamps log
Â
service password-encryption
Â
!
Â
hostname router-name
Â
!
Â
enable secret router-pw
Â
line vty 0 4
Â
password router-pw
Â
!
Â
interface ethernet 0
Â
ip address 172.21.52.9 255.255.255.0
Â
no shutdown
Â
ip helper-address 172.31.2.132
Â
ip name-server 172.31.2.132
Â
isdn switch-type basic-5ess
Â
username Remote-name password Remote-chap
Â
interface bri 0
Â
ip unnumbered ethernet 0
Â
encapsulation ppp
Â
no shutdown
Â
dialer map ip 192.168.254.254 speed 56 name Remote-name Remote-number
Â
isdn spid1 spid1
Â
isdn spid2 spid2
Â
ppp authentication chap callin
Â
dialer-group 1
Â
!
Â
ip classless
Â
access-list 101 deny udp any any eq snmp
Â
access-list 101 deny udp any any eq ntp
Â
access-list 101 permit ip any any
Â
dialer-list 1 list 101
Â
ip route 0.0.0.0 0.0.0.0 192.168.254.254
Â
ip route 192.168.254.254 255.255.255.255 bri 0
Â
logging buffered
Â
snmp-server community public RO
Â
ip https server
Â
ip classless
Â
ip subnet-zero
Â
!
Â
end
Â
Related Commands
Â
debug ip https token
debug ip https transaction
debug ip https url
Â
debug ip https ssi
Â
Use the debug ip https ssi EXEC command to display information about the HTML SSIÂ EXECÂ command or HTML SSIÂ ECHOÂ command. The no form of this command disables debugging output.
Â
[no] debug ip https ssi
Â
Sample Display
Â
shows sample debug ip https ssi command output.
Â
Figure 2-98 Sample Debug IP HTTP SSI Output
Â
Router# debug ip https ssi
Â
HTML: filtered command `exec cmd="show users"'
Â
HTML: SSI command `exec'
Â
HTML: SSI tag `cmd' = "show users"
Â
HTML: Executing CLI `show users' in mode `exec' done
Â
Explanations for individual lines of output from follow.
Â
The following line shows the contents of the Server Side Include (SSI) EXEC command:
Â
HTML: filtered command `exec cmd="show users"'
Â
The following line indicates the type of SSI command that was requested:
Â
HTML: SSI command `exec'
Â
The following line shows the argument "show users" assigned to the tag `cmd':
Â
HTML: SSI tag 'cmd' = "show users"
Â
The following line indicates that the Cisco IOS show users command is being executed in EXEC mode:
Â
HTML: Executing CLI `show users' in mode `exec' done
Â
debug ip https token
Â
Use the debug ip https token EXEC command to display individual tokens parsed by the Hypertext Transfer Protocol (HTTP) server. The no form of this command disables debugging output.
Â
[no] debug ip https token
Â
Usage Guidelines
Â
Use the debug ip https token command to display what the HTTP server is parsing at a low level. To display what the HTTP server is parsing at a high level, use the debug ip https transaction command.
Â
Sample Display
Â
shows a partial sample of debug ip https token output. In this example, the browser accessed the router's home page https://router-name/. The output gives the token parsed by the HTTP server and its length.
Â
Figure 2-99 Sample Debug IP HTTP Token Output
Â
Router# debug ip https token
Â
HTTP: token len 3:Â 'GET'
Â
HTTP: token len 1:Â 'Â '
Â
HTTP: token len 1:Â '/'
Â
HTTP: token len 1:Â 'Â '
Â
HTTP: token len 4:Â 'HTTP'
Â
HTTP: token len 1:Â '/'
Â
HTTP: token len 1:Â '1'
Â
HTTP: token len 1:Â '.'
Â
HTTP: token len 1:Â '0'
Â
HTTP: token len 2:Â '\15\12'
Â
HTTP: token len 7:Â 'Referer'
Â
HTTP: token len 1:Â ':'
Â
HTTP: token len 1:Â 'Â '
Â
HTTP: token len 4:Â 'https'
Â
HTTP: token len 1:Â ':'
Â
HTTP: token len 1:Â '/'
Â
HTTP: token len 1:Â '/'
Â
HTTP: token len 3:Â 'www'
Â
HTTP: token len 1:Â '.'
Â
HTTP: token len 3:Â 'foo'
Â
HTTP: token len 1:Â '.'
Â
HTTP: token len 3:Â 'com'
Â
HTTP: token len 1:Â '/'
Â
HTTP: token len 2:Â '\15\12'
Â
HTTP: token len 10:Â 'Connection'
Â
HTTP: token len 1:Â ':'
Â
HTTP: token len 1:Â 'Â '
Â
HTTP: token len 4:Â 'Keep'
Â
HTTP: token len 1:Â '-'
Â
HTTP: token len 5:Â 'Alive'
Â
HTTP: token len 2:Â '\15\12'
Â
HTTP: token len 4:Â 'User'
Â
HTTP: token len 1:Â '-'
Â
HTTP: token len 5:Â 'Agent'
Â
HTTP: token len 1:Â ':'
Â
HTTP: token len 1:Â 'Â '
Â
HTTP: token len 7:Â 'Mozilla'
Â
HTTP: token len 1:Â '/'
Â
HTTP: token len 1:Â '2'
Â
HTTP: token len 1:Â '.'
Â
...
Â
Related Commands
Â
debug ip https ezsetup
debug ip https transaction
debug ip https url
Â
debug ip https transaction
Â
Use the debug ip https transaction EXEC command to display Hypertext Transfer Protocol (HTTP) server transaction processing. The no form of this command disables debugging output.
Â
[no] debug ip https transaction
Â
Usage Guidelines
Â
Use the debug ip https transaction command to display what the HTTP server is parsing at a high level. To display what the HTTP server is parsing at a low level, use the debug ip https token command.
Â
Sample Display
Â
shows sample debug ip https transaction output. In this example, the browser accessed the router's home page https://router-name/.
Â
Figure 2-100 Sample Debug IP HTTP Transaction Output
Â
Router# debug ip https transaction
Â
HTTP: parsed uri '/'
Â
HTTP: client version 1.0
Â
HTTP: parsed extension Referer
Â
HTTP: parsed line https://www.foo.com/
Â
HTTP: parsed extension Connection
Â
HTTP: parsed line Keep-Alive
Â
HTTP: parsed extension User-Agent
Â
HTTP: parsed line Mozilla/2.01 (X11; I; FreeBSD 2.1.0-RELEASE i386)
Â
HTTP: parsed extension Host
Â
HTTP: parsed line router-name
Â
HTTP: parsed extension Accept
Â
HTTP: parsed line image/gif, image/x-xbitmap, image/jpeg, image/
Â
HTTP: parsed extension Authorization
Â
HTTP: parsed authorization type Basic
Â
HTTP: received GETÂ ''
Â
lists describes some of the fields in .
Â
Â
Table 2-53 Debut IP HTTP Transaction Field DescriptionsÂ
Field
|
Description
|
---|---|
HTTP: parsed uri '/' |
Uniform resource identifier that is requested. |
HTTP: client version 1.0 |
Client HTTP version. |
HTTP: parsed extension Referer |
HTTP extension. |
HTTP: parsed line https://www.foo.com/ |
Value of HTTP extension. |
HTTP: received GETÂ '' |
HTTP request method. |
Â
Â
Related Commands
Â
debug ip https ezsetup
debug ip https token
debug ip https url
Â
debug ip https url
Â
Use the debug ip https url EXEC command to show the uniform resource locators (URLs) accessed from the router. The no form of this command disables debugging output.
Â
[no] debug ip https url
Â
Usage Guidelines
Â
Use the debug ip https url command to keep track of the URLs that are accessed and to determine from which hosts the URLs are accessed.
Â
Sample Display
Â
shows a partial sample of debug ip https url output. In this example, the HTTP server accessed the URLs / and /exec. The output shows the URL being requested and the IP address of the host requesting the URL.
Â
Figure 2-101 Sample Debug IP HTTP URL Output
Â
Router# debug ip https url
Â
HTTP: processing URLÂ '/' from host 172.31.2.141
Â
HTTP: processing URLÂ '/exec' from host 172.31.2.141
Â
Related Commands
Â
debug ip https ezsetup
debug ip https token
debug ip https transaction
Â
debug ip icmp
Â
Use the debug ip icmp EXEC command to display information on Internal Control Message Protocol (ICMP) transactions. The no form of this command disables debugging output.
Â
[no] debug ip icmp
Â
Usage Guidelines
Â
This command helps you determine whether the router is sending or receiving ICMP messages. Use it, for example, when you are troubleshooting an end-to-end connection problem.
Â
Sample Display
Â
shows sample debug ip icmp output.
Â
Figure 2-102 Sample Debug IP ICMP Output
Â
Router# debug ip icmp
Â
ICMP: rcvd type 3, code 1, from 10.95.192.4
Â
ICMP: src 10.56.0.202, dst 172.16.16.1, echo reply
Â
ICMP: dst (10.120.1.0) port unreachable rcv from 10.120.1.15
Â
ICMP: src 172.16.12.35, dst 172.16.20.7, echo reply
Â
ICMP: dst (255.255.255.255) protocol unreachable rcv from 10.31.7.21
Â
ICMP: dst (10.120.1.0) port unreachable rcv from 10.120.1.15
Â
ICMP: dst (255.255.255.255) protocol unreachable rcv from 10.31.7.21
Â
ICMP: dst (10.120.1.0) port unreachable rcv from 10.120.1.15
Â
ICMP: src 10.56.0.202, dst 172.16.16.1, echo reply
Â
ICMP: dst (10.120.1.0) port unreachable rcv from 10.120.1.15
Â
ICMP: dst (255.255.255.255) protocol unreachable rcv from 10.31.7.21
Â
ICMP: dst (10.120.1.0) port unreachable rcv from 10.120.1.15
Â
describes significant fields in the first line of debug ip icmp output shown in .
Â
Â
Table 2-54 Debug IP ICMP Field Descriptions—Part 1Â
Field
|
Description
|
---|---|
ICMP: |
Indication that this message describes an ICMP packet. |
rcvd type 3 |
The type field can be one of the following: •0—Echo Reply •3—Destination Unreachable •4—Source Quench •5—Redirect •8—Echo •9—Router Discovery Protocol Advertisement •10—Router Discovery Protocol Solicitations •11—Time Exceeded •12—Parameter Problem •13—Timestamp •14—Timestamp Reply •15—Information Request •16—Information Reply •17—Mask Request •18—Mask Reply |
code 1 |
This field is a code. The meaning of the code depends upon the type field value: •Echo and Echo Reply—The code field is always zero. •Destination Unreachable—The code field can have the following values: –0—Network unreachable –1—Host unreachable –2—Protocol unreachable –3—Port unreachable –4—Fragmentation needed and DF bit set –5—Source route failed •Source Quench—The code field is always 0. •Redirect—The code field can have the following values: –0—Redirect datagrams for the network –1—Redirect datagrams for the host –2—Redirect datagrams for the command mode of service and network –3—Redirect datagrams for the command mode of service and host •Router Discovery Protocol Advertisements and Solicitations—The code field is always zero. |
code 1 (continued) |
•Time Exceeded—The code field can have the following values: –0—Time to live exceeded in transit –1—Fragment reassembly time exceeded •Parameter Problem—The code field can have the following values: –0—General problem –1—Option is missing –2—Option missing, no room to add •Timestamp and Timestamp Reply—The code field is always zero. •Information Request and Information Reply—The code field is always zero. •Mask Request and Mask Reply—The code field is always zero. |
from 10.95.192.4 |
Source address of the ICMP packet. |
Â
Â
describes significant fields in the second line of debug ip icmp output in .
Â
Â
Table 2-55 Debug IP ICMP Field Descriptions—Part 2Â
Field
|
Description
|
---|---|
ICMP: |
Indication that this message describes an ICMP packet |
src 10.5610.120.0.202 |
The address of the sender of the echo |
dst 172.16.16.1 |
The address of the receiving router |
echo reply |
Indication the router received an echo reply |
Â
Â
Other messages that the debug ip icmp command can generate follow.
Â
When an IP router or host sends out an ICMP mask request, the following message is generated when the router sends a mask reply:
Â
ICMP: sending mask reply (255.255.255.0) to 172.21.80.23 via Ethernet0
Â
The following two lines are examples of the two forms of this message. The first form is generated when a mask reply comes in after the router sends out a mask request. The second form occurs when the router receives a mask reply with a nonmatching sequence and ID. See Appendix I of RFC 950, "Internet Standard Subnetting Procedures," for details.
Â
ICMP: mask reply 255.255.255.0 from 172.21.80.31
Â
ICMP: unexpected mask reply 255.255.255.0 from 172.21.80.32
Â
The following output indicates that the router sent a redirect packet to the host at address 172.21.80.31, instructing that host to use the gateway at address 172.21.80.23 in order to reach the host at destination address 172.16.1.111:
Â
ICMP: redirect sent to 172.21.80.31 for dest 172.16.1.111 use gw 172.21.80.23
Â
The following message indicates that the router received a redirect packet from the host at address 172.21.80.23, instructing the router to use the gateway at address 172.21.80.28 in order to reach the host at destination address 172.21.81.34:
Â
ICMP: redirect rcvd from 172.21.80.23 -- for 172.21.81.34 use gw 172.21.80.28
Â
The following message is displayed when the router sends an ICMP packet to the source address (172.21.94.31 in this case), indicating that the destination address (172.16.13.33 in this case) is unreachable:
Â
ICMP: dst (172.16.13.33) host unreachable sent to 172.21.94.31
Â
The following message is displayed when the router receives an ICMP packet from an intermediate address (172.21.98.32 in this case), indicating that the destination address (172.16.13.33 in this case) is unreachable:
Â
ICMP: dst (172.16.13.33) host unreachable rcv from 172.21.98.32
Â
Depending on the code received (as describes), any of the unreachable messages can have any of the following "strings" instead of the "host" string in the message:
Â
net
Â
protocol
Â
port
Â
frag. needed and DF set
Â
source route failed
Â
prohibited
Â
The following message is displayed when the TTL in the IP header reaches zero and a time exceed ICMP message is sent. The fields are self-explanatory.
Â
ICMP: time exceeded (time to live) send to 10.95.1.4 (dest was 172.16.1.111)
Â
The following message is generated when parameters in the IP header are corrupted in some way and the parameter problem ICMP message is sent. The fields are self-explanatory.
Â
ICMP: parameter problem sent to 128.121.1.50 (dest was 172.16.1.111)
Â
Based on the preceding information, the remaining output can be easily understood.
Â
ICMP: parameter problem rcvd 172.21.80.32
Â
ICMP: source quench rcvd 172.21.80.32
Â
ICMP: source quench sent to 128.121.1.50 (dest was 172.16.1.111)
Â
ICMP: sending time stamp reply to 172.21.80.45
Â
ICMP: sending info reply to 172.21.80.12
Â
ICMP: rdp advert rcvd type 9, code 0, from 172.21.80.23
Â
ICMP: rdp solicit rcvd type 10, code 0, from 172.21.80.43
Â
debug ip igmp
Â
Use the debug ip igmp EXEC command to display Internet Group Management Protocol (IGMP) packets received and transmitted, as well as IGMP-host related events. The no form of this command disables debugging output.
Â
[no] debug ip igmp
Â
Usage Guidelines
Â
This command helps discover whether the IGMP processes are functioning. In general, if IGMP is not working, the router process never discovers that there is another host on the network that is configured to receive multicast packets. In dense mode this means the packets will be delivered intermittently (a few every 3 minutes). In sparse mode they will never be delivered.
Â
Use this command in conjunction with debug ip pim and debug ip mrouting to observe additional multicast activity and to see what is happening to the multicast routing process, or why packets are forwarded out of particular interfaces.
Â
Sample Display
Â
shows sample debug ip igmp output.
Â
Figure 2-103 Sample Debug IP IGMP Output
Â
Router# debug ip igmp
Â