Ruckus Brocade FastIron Debug Command Reference, 08.0.61 Fast Iron Reference Guide 08061 Debugcommandref

FastIron 08.0.61 Debug Command Reference Guide fastiron-08061-debugcommandref

2017-12-12

User Manual: Ruckus FastIron 08.0.61 Debug Command Reference Guide

Open the PDF directly: View PDF PDF.
Page Count: 411

DownloadRuckus Brocade FastIron Debug Command Reference, 08.0.61 Fast Iron Reference Guide Fastiron-08061-debugcommandref
Open PDF In BrowserView PDF
DIAGNOSTIC GUIDE

Brocade FastIron Debug
Command Reference, 08.0.61

Supporting FastIron Software Release 08.0.61

Part Number: 53-1005198-01
Publication Date: 30 June 2017

© 2017, Brocade Communications Systems, Inc. All Rights Reserved.

Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other
countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/
brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment,
equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without
notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade
sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the
United States government.
The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this
document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it.
The product described by this document may contain open source software covered by the GNU General Public License or other open source license
agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and
obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.

2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Contents
Preface................................................................................................................................................................................................................................ 11
Document conventions.........................................................................................................................................................................................................................11
Notes, cautions, and warnings..................................................................................................................................................................................................11
Text formatting conventions...................................................................................................................................................................................................... 11
Command syntax conventions.................................................................................................................................................................................................12
Brocade resources..................................................................................................................................................................................................................................12
Document feedback.............................................................................................................................................................................................................................. 12
Contacting Brocade Technical Support......................................................................................................................................................................................... 13
Brocade customers.......................................................................................................................................................................................................................13
Brocade OEM customers.......................................................................................................................................................................................................... 13
About This Document..................................................................................................................................................................................................... 15
What's new in this document............................................................................................................................................................................................................. 15
New and modified commands.................................................................................................................................................................................................15
New commands............................................................................................................................................................................................................................. 15
Modified commands.................................................................................................................................................................................................................... 15
Supported hardware...............................................................................................................................................................................................................................15
Using diagnostic commands......................................................................................................................................................................................... 17
Using debug commands..................................................................................................................................................................................................................... 17
Generic debug commands................................................................................................................................................................................................................. 17
Brief and detail debug options................................................................................................................................................................................................. 18
Disabling debug commands.....................................................................................................................................................................................................18
Debug Commands A - G................................................................................................................................................................................................ 19
debug 802.1w all_802_1w_events...............................................................................................................................................................................................19
debug 802.1w messages...................................................................................................................................................................................................................21
debug 802.1w timer............................................................................................................................................................................................................................. 23
debug 802.1w transitions................................................................................................................................................................................................................... 24
debug acl log.............................................................................................................................................................................................................................................25
debug all......................................................................................................................................................................................................................................................26
debug cluster all.......................................................................................................................................................................................................................................27
debug cluster ccp....................................................................................................................................................................................................................................30
debug cluster client-auto-detect...................................................................................................................................................................................................... 32
debug cluster config.............................................................................................................................................................................................................................. 33
debug cluster fsm................................................................................................................................................................................................................................... 34
debug cluster intf-mac..........................................................................................................................................................................................................................37
debug cluster mdup...............................................................................................................................................................................................................................38
debug cluster show................................................................................................................................................................................................................................ 41
debug cluster stp.....................................................................................................................................................................................................................................42
debug destination....................................................................................................................................................................................................................................43
debug dhcp-client alarms....................................................................................................................................................................................................................44
debug dhcp-client events.................................................................................................................................................................................................................... 45
debug dot1x hitless................................................................................................................................................................................................................................48
debug dot1x-events.............................................................................................................................................................................................................................. 49
debug dot1x-filter................................................................................................................................................................................................................................... 50
debug dot1x-misc.................................................................................................................................................................................................................................. 51
debug dot1x-mka ..................................................................................................................................................................................................................................52

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

3

debug dot1x-packets............................................................................................................................................................................................................................ 53
debug dot1x-timers............................................................................................................................................................................................................................... 54
debug gvrp packets................................................................................................................................................................................................................................55
Debug Commands H - P................................................................................................................................................................................................ 57
debug hw.................................................................................................................................................................................................................................................... 57
debug igmp-snoop add-del-oif all..................................................................................................................................................................................................58
debug igmp-snoop clear..................................................................................................................................................................................................................... 59
debug igmp-snoop error..................................................................................................................................................................................................................... 60
debug igmp-snoop group...................................................................................................................................................................................................................61
debug igmp-snoop level......................................................................................................................................................................................................................62
debug igmp-snoop packet................................................................................................................................................................................................................. 63
debug igmp-snoop port ethernet.................................................................................................................................................................................................... 64
debug igmp-snoop show.................................................................................................................................................................................................................... 65
debug igmp-snoop source................................................................................................................................................................................................................. 66
debug igmp-snoop timer.................................................................................................................................................................................................................... 67
debug igmp-snoop vlan.......................................................................................................................................................................................................................68
debug ikev2...............................................................................................................................................................................................................................................69
debug ip arp.............................................................................................................................................................................................................................................. 82
debug ip arp inspection........................................................................................................................................................................................................................ 83
debug ip arp inspection........................................................................................................................................................................................................................ 84
debug ip arp inspection........................................................................................................................................................................................................................ 85
debug ip bgp.............................................................................................................................................................................................................................................86
debug ip bgp dampening.................................................................................................................................................................................................................... 87
debug ip bgp events.............................................................................................................................................................................................................................. 88
debug ip bgp graceful-restart............................................................................................................................................................................................................ 89
debug ip bgp keepalives...................................................................................................................................................................................................................... 90
debug ip bgp updates........................................................................................................................................................................................................................... 91
debug ip dhcp-snooping .................................................................................................................................................................................................................... 92
debug ip gre keepalive.......................................................................................................................................................................................................................... 93
debug ip gre log.......................................................................................................................................................................................................................................94
debug ip gre packet................................................................................................................................................................................................................................96
debug ip icmp events............................................................................................................................................................................................................................ 97
debug ip icmp events............................................................................................................................................................................................................................ 98
debug ip icmp events............................................................................................................................................................................................................................ 99
debug ip icmp packets.......................................................................................................................................................................................................................100
debug ip igmp add-del-oif...............................................................................................................................................................................................................101
debug ip igmp add-del-oif...............................................................................................................................................................................................................105
debug ip igmp add-del-oif all.........................................................................................................................................................................................................109
debug ip igmp add-del-oif all.........................................................................................................................................................................................................112
debug ip igmp add-del-oif stack...................................................................................................................................................................................................115
debug ip igmp clear............................................................................................................................................................................................................................ 118
debug ip igmp down-port................................................................................................................................................................................................................ 119
debug ip igmp enable........................................................................................................................................................................................................................ 122
debug ip igmp error............................................................................................................................................................................................................................ 123
debug ip igmp group..........................................................................................................................................................................................................................124
debug ip igmp level.............................................................................................................................................................................................................................125
debug ip igmp packet.........................................................................................................................................................................................................................129
debug ip igmp physical-port ethernet.........................................................................................................................................................................................132
debug ip igmp prime-port ethernet............................................................................................................................................................................................. 133
debug ip igmp protocol..................................................................................................................................................................................................................... 134

4

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp proxy clear................................................................................................................................................................................................................136
debug ip igmp proxy error................................................................................................................................................................................................................137
debug ip igmp proxy event.............................................................................................................................................................................................................. 138
debug ip igmp proxy packet............................................................................................................................................................................................................ 139
debug ip igmp proxy rx......................................................................................................................................................................................................................140
debug ip igmp proxy show...............................................................................................................................................................................................................141
debug ip igmp proxy tx......................................................................................................................................................................................................................142
debug ip igmp proxy vrf.................................................................................................................................................................................................................... 143
debug ip igmp rx.................................................................................................................................................................................................................................. 144
debug ip igmp show........................................................................................................................................................................................................................... 145
debug ip igmp source........................................................................................................................................................................................................................ 146
debug ip igmp timer........................................................................................................................................................................................................................... 147
debug ip igmp tx.................................................................................................................................................................................................................................. 148
debug ip igmp vrf.................................................................................................................................................................................................................................149
debug ip msdp...................................................................................................................................................................................................................................... 150
debug ip ntp........................................................................................................................................................................................................................................... 152
debug ip ospf.........................................................................................................................................................................................................................................155
debug ip ospf adj..................................................................................................................................................................................................................................156
debug ip ospf all-vrfs route..............................................................................................................................................................................................................157
debug ip ospf error..............................................................................................................................................................................................................................158
debug ip ospf event............................................................................................................................................................................................................................ 159
debug ip ospf flood............................................................................................................................................................................................................................. 160
debug ip ospf graceful-restart........................................................................................................................................................................................................ 161
debug ip ospf log-empty-lsa.......................................................................................................................................................................................................... 163
debug ip ospf log-empty-lsa.......................................................................................................................................................................................................... 165
debug ip ospf lsa-generation..........................................................................................................................................................................................................167
debug ip ospf lsa-id............................................................................................................................................................................................................................ 168
debug ip ospf max-metric................................................................................................................................................................................................................169
debug ip ospf packet.......................................................................................................................................................................................................................... 170
debug ip ospf retransmission..........................................................................................................................................................................................................174
debug ip ospf route............................................................................................................................................................................................................................. 175
debug ip ospf spf................................................................................................................................................................................................................................. 176
debug ip ospf vrf.................................................................................................................................................................................................................................. 177
debug ip pim.......................................................................................................................................................................................................................................... 178
debug ip pim add-del-oif................................................................................................................................................................................................................. 179
debug ip pim bootstrap..................................................................................................................................................................................................................... 180
debug ip pim clear............................................................................................................................................................................................................................... 181
debug ip pim control-source...........................................................................................................................................................................................................182
debug ip pim event..............................................................................................................................................................................................................................183
debug ip pim group.............................................................................................................................................................................................................................184
debug ip pim join-prune................................................................................................................................................................................................................... 186
debug ip pim level................................................................................................................................................................................................................................187
debug ip pim nbr-change.................................................................................................................................................................................................................190
debug ip pim packet........................................................................................................................................................................................................................... 191
debug ip pim physical-port ethernet .......................................................................................................................................................................................... 192
debug ip pim regproc ........................................................................................................................................................................................................................193
debug ip pim rp ................................................................................................................................................................................................................................... 194
debug ip pim show .............................................................................................................................................................................................................................195
debug ip pim source ..........................................................................................................................................................................................................................196
debug ip pim vrf .................................................................................................................................................................................................................................. 199

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

5

debug ip pimsm-snoop.................................................................................................................................................................................................................... 200
debug ip source guard....................................................................................................................................................................................................................... 202
debug ip vrrp packet v6.................................................................................................................................................................................................................... 203
debug ip vrrp vrid.................................................................................................................................................................................................................................204
debug ip web......................................................................................................................................................................................................................................... 205
debug ip web-ssl..................................................................................................................................................................................................................................206
debug ipsec all...................................................................................................................................................................................................................................... 207
debug ipsec esp................................................................................................................................................................................................................................... 208
debug ipsec in....................................................................................................................................................................................................................................... 209
debug ipsec out.................................................................................................................................................................................................................................... 210
debug ipsec policy...............................................................................................................................................................................................................................211
debug ipv6..............................................................................................................................................................................................................................................212
debug ipv6 dhcp relay....................................................................................................................................................................................................................... 213
debug ipv6 dhcp snooping..............................................................................................................................................................................................................214
debug ipv6 mld.....................................................................................................................................................................................................................................215
debug ipv6 mld add-del-oif............................................................................................................................................................................................................216
debug ipv6 mld add-del-oif all...................................................................................................................................................................................................... 219
debug ipv6 mld add-del-oif stack................................................................................................................................................................................................220
debug ipv6 mld clear..........................................................................................................................................................................................................................222
debug ipv6 mld detail........................................................................................................................................................................................................................ 223
debug ipv6 mld enable......................................................................................................................................................................................................................224
debug ipv6 mld error..........................................................................................................................................................................................................................225
debug ipv6 mld group....................................................................................................................................................................................................................... 226
debug ipv6 mld level.......................................................................................................................................................................................................................... 227
debug ipv6 mld mcache-group.....................................................................................................................................................................................................230
debug ipv6 mld phy-port ethernet............................................................................................................................................................................................... 232
debug ipv6 mld prime-port ethernet...........................................................................................................................................................................................233
debug ipv6 mld protocol...................................................................................................................................................................................................................235
debug ipv6 mld rx................................................................................................................................................................................................................................237
debug ipv6 mld show.........................................................................................................................................................................................................................238
debug ipv6 mld source......................................................................................................................................................................................................................239
debug ipv6 mld timer.........................................................................................................................................................................................................................240
debug ipv6 mld tx................................................................................................................................................................................................................................241
debug ipv6 mld vlan........................................................................................................................................................................................................................... 242
debug ipv6 mld vrf..............................................................................................................................................................................................................................243
debug ipv6 nd....................................................................................................................................................................................................................................... 244
debug ipv6 ospf ipsec....................................................................................................................................................................................................................... 245
debug ipv6 ospf ism...........................................................................................................................................................................................................................246
debug ipv6 ospf ism-events........................................................................................................................................................................................................... 247
debug ipv6 ospf ism-status............................................................................................................................................................................................................ 248
debug ipv6 ospf lsa.............................................................................................................................................................................................................................249
debug ipv6 ospf lsa-flooding..........................................................................................................................................................................................................252
debug ipv6 ospf lsa-generation.....................................................................................................................................................................................................253
debug ipv6 ospf lsa-install...............................................................................................................................................................................................................255
debug ipv6 ospf lsa-inter-area.......................................................................................................................................................................................................256
debug ipv6 ospf lsa-refresh............................................................................................................................................................................................................ 257
debug ipv6 ospf nsm......................................................................................................................................................................................................................... 259
debug ipv6 ospf nsm-events..........................................................................................................................................................................................................260
debug ipv6 ospf nsm-status...........................................................................................................................................................................................................261
debug ipv6 ospf packet.....................................................................................................................................................................................................................262

6

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf packet-dd............................................................................................................................................................................................................. 264
debug ipv6 ospf packet-hello.........................................................................................................................................................................................................265
debug ipv6 ospf packet-lsa-ack....................................................................................................................................................................................................266
debug ipv6 ospf packet-lsa-req.................................................................................................................................................................................................... 267
debug ipv6 ospf packet-lsa-update.............................................................................................................................................................................................268
debug ipv6 ospf route........................................................................................................................................................................................................................269
debug ipv6 ospf route-calc-external........................................................................................................................................................................................... 270
debug ipv6 ospf route-calc-inter-area........................................................................................................................................................................................271
debug ipv6 ospf route-calc-intra-area........................................................................................................................................................................................272
debug ipv6 ospf route-calc-spf..................................................................................................................................................................................................... 273
debug ipv6 ospf route-install..........................................................................................................................................................................................................274
debug ipv6 pim bootstrap................................................................................................................................................................................................................275
debug ipv6 pim clear..........................................................................................................................................................................................................................276
debug ipv6 pim event........................................................................................................................................................................................................................ 277
debug ipv6 pim group....................................................................................................................................................................................................................... 278
debug ipv6 pim join-prune.............................................................................................................................................................................................................. 279
debug ipv6 pim nbr-change........................................................................................................................................................................................................... 280
debug ipv6 pim packet......................................................................................................................................................................................................................281
debug ipv6 pim regproc....................................................................................................................................................................................................................282
debug ipv6 pim rp............................................................................................................................................................................................................................... 283
debug ipv6 pim show.........................................................................................................................................................................................................................284
debug ipv6 pim source......................................................................................................................................................................................................................285
debug ipv6 pimsm-snoop...............................................................................................................................................................................................................286
debug ipv6 raguard.............................................................................................................................................................................................................................288
debug ipv6 rip events.........................................................................................................................................................................................................................289
debug ipv6 rip receive........................................................................................................................................................................................................................290
debug license.........................................................................................................................................................................................................................................291
debug loop-detect...............................................................................................................................................................................................................................292
debug loop-detect level.................................................................................................................................................................................................................... 293
debug mac..............................................................................................................................................................................................................................................294
debug mac-authentication............................................................................................................................................................................................................... 295
debug mecid.......................................................................................................................................................................................................................................... 297
debug mld-snoop add-del-oif all................................................................................................................................................................................................. 299
debug mld-snoop clear.....................................................................................................................................................................................................................300
debug mld-snoop error.....................................................................................................................................................................................................................301
debug mld-snoop group.................................................................................................................................................................................................................. 302
debug ip ssh...........................................................................................................................................................................................................................................303
debug ip sync........................................................................................................................................................................................................................................ 304
debug ip tcp............................................................................................................................................................................................................................................305
debug ip tcp driver...............................................................................................................................................................................................................................308
debug ip tcp memory.........................................................................................................................................................................................................................309
debug ip tcp packet.............................................................................................................................................................................................................................310
debug ip tcp sack................................................................................................................................................................................................................................. 311
debug ip tcp transactions..................................................................................................................................................................................................................312
debug ip udp..........................................................................................................................................................................................................................................313
debug ip vrrp events........................................................................................................................................................................................................................... 314
debug ip vrrp packet........................................................................................................................................................................................................................... 315
debug ip vrrp packet v4.................................................................................................................................................................................................................... 316
debug mld-snoop mcache-group................................................................................................................................................................................................317
debug mld-snoop packet................................................................................................................................................................................................................. 318

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

7

debug mld-snoop show....................................................................................................................................................................................................................319
debug mld-snoop timer....................................................................................................................................................................................................................320
debug mstp bpdu................................................................................................................................................................................................................................ 321
debug mstp events..............................................................................................................................................................................................................................323
debug mstp level..................................................................................................................................................................................................................................324
debug mstp msti.................................................................................................................................................................................................................................. 326
debug mstp port-level....................................................................................................................................................................................................................... 328
debug mstp show................................................................................................................................................................................................................................ 329
debug mstp state................................................................................................................................................................................................................................. 330
debug mstp verbose...........................................................................................................................................................................................................................331
debug packet-capture........................................................................................................................................................................................................................332
debug packet-capture filter..............................................................................................................................................................................................................333
debug packet-capture filter none.................................................................................................................................................................................................. 335
debug packet-capture filter show..................................................................................................................................................................................................336
debug packet-capture mode...........................................................................................................................................................................................................337
debug port hw-state........................................................................................................................................................................................................................... 338
debug port port.....................................................................................................................................................................................................................................339
debug port ten-gig.............................................................................................................................................................................................................................. 342
debug port up-down.......................................................................................................................................................................................................................... 343
debug port vlan.....................................................................................................................................................................................................................................345
debug pp-bum-trunk-hash............................................................................................................................................................................................................. 347
debug pp-trunk-hash......................................................................................................................................................................................................................... 349
Debug Commands Q - Z............................................................................................................................................................................................. 351
debug rip database..............................................................................................................................................................................................................................351
debug rip events................................................................................................................................................................................................................................... 352
debug sflow problems....................................................................................................................................................................................................................... 353
debug span all_802_1d_events...................................................................................................................................................................................................354
debug span config...............................................................................................................................................................................................................................355
debug span timers...............................................................................................................................................................................................................................356
debug stack pe control...................................................................................................................................................................................................................... 357
debug stack pe mac............................................................................................................................................................................................................................358
debug stack pe topo........................................................................................................................................................................................................................... 359
debug system campram................................................................................................................................................................................................................... 360
debug system optics.......................................................................................................................................................................................................................... 361
debug system poll............................................................................................................................................................................................................................... 362
debug web events................................................................................................................................................................................................................................363
debug webauth timers....................................................................................................................................................................................................................... 364
debug webauth events.......................................................................................................................................................................................................................365
show debug............................................................................................................................................................................................................................................ 366
show tech-support.............................................................................................................................................................................................................................. 367
show tech-support acl....................................................................................................................................................................................................................... 373
show tech-support cluster............................................................................................................................................................................................................... 375
show tech-support cpu..................................................................................................................................................................................................................... 377
show tech-support l2.........................................................................................................................................................................................................................380
show tech-support l3 ipv4-uc........................................................................................................................................................................................................383
show tech-support l3 ipv6-uc........................................................................................................................................................................................................386
show tech-support license...............................................................................................................................................................................................................390
show tech-support memory........................................................................................................................................................................................................... 391
show tech-support multicast...........................................................................................................................................................................................................392
show tech-support packet-loss..................................................................................................................................................................................................... 395

8

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave............................................................................................................................................................................................................................................396
supportsave (SCP)...............................................................................................................................................................................................................................399
supportsave add_cust_cmd index................................................................................................................................................................................................403
supportsave del_cust_cmd all........................................................................................................................................................................................................404
supportsave del_cust_cmd index................................................................................................................................................................................................. 405
supportsave info disable................................................................................................................................................................................................................... 406
supportsave info enable.................................................................................................................................................................................................................... 407
supportsave list_cust_cmd.............................................................................................................................................................................................................. 410
supportsave show................................................................................................................................................................................................................................411

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

9

10

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Preface
•
•
•
•

Document conventions................................................................................................................................................................................... 11
Brocade resources............................................................................................................................................................................................ 12
Document feedback......................................................................................................................................................................................... 12
Contacting Brocade Technical Support....................................................................................................................................................13

Document conventions
The document conventions describe text formatting conventions, command syntax conventions, and important notice formats used in
Brocade technical documentation.

Notes, cautions, and warnings
Notes, cautions, and warning statements may be used in this document. They are listed in the order of increasing severity of potential
hazards.
NOTE
A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference to related information.
ATTENTION
An Attention statement indicates a stronger note, for example, to alert you when traffic might be interrupted or the device might
reboot.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause damage to hardware,
firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or extremely hazardous to you. Safety
labels are also attached directly to products to warn of these conditions or situations.

Text formatting conventions
Text formatting conventions such as boldface, italic, or Courier font may be used to highlight specific words or phrases.
Format

Description

bold text

Identifies command names.
Identifies keywords and operands.
Identifies the names of GUI elements.
Identifies text to enter in the GUI.

italic text

Identifies emphasis.
Identifies variables.
Identifies document titles.

Courier font

Identifies CLI output.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

11

Brocade resources

Format

Description
Identifies command syntax examples.

Command syntax conventions
Bold and italic text identify command syntax components. Delimiters and operators define groupings of parameters and their logical
relationships.
Convention

Description

bold text

Identifies command names, keywords, and command options.

italic text

Identifies a variable.

value

In Fibre Channel products, a fixed value provided as input to a command option is printed in plain text, for
example, --show WWN.

[]

Syntax components displayed within square brackets are optional.
Default responses to system prompts are enclosed in square brackets.

{x|y|z}

A choice of required parameters is enclosed in curly brackets separated by vertical bars. You must select
one of the options.
In Fibre Channel products, square brackets may be used instead for this purpose.

x|y

A vertical bar separates mutually exclusive elements.

<>

Nonprinting characters, for example, passwords, are enclosed in angle brackets.

...

Repeat the previous element, for example, member[member...].

\

Indicates a “soft” line break in command examples. If a backslash separates two lines of a command
input, enter the entire command at the prompt without the backslash.

Brocade resources
Visit the Brocade website to locate related documentation for your product and additional Brocade resources.
White papers, data sheets, and the most recent versions of Brocade software and hardware manuals are available at www.brocade.com.
Product documentation for all supported releases is available to registered users at MyBrocade.
Click the Support tab and select Document Library to access product documentation on MyBrocade or www.brocade.com. You can
locate documentation by product or by operating system.
Release notes are bundled with software downloads on MyBrocade. Links to software downloads are available on the MyBrocade landing
page and in the Document Library.

Document feedback
Quality is our first concern at Brocade, and we have made every effort to ensure the accuracy and completeness of this document.
However, if you find an error or an omission, or you think that a topic needs further development, we want to hear from you. You can
provide feedback in two ways:
•

Through the online feedback form in the HTML documents posted on www.brocade.com

•

By sending your feedback to documentation@brocade.com

Provide the publication title, part number, and as much detail as possible, including the topic heading and page number if applicable, as
well as your suggestions for improvement.

12

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Contacting Brocade Technical Support

Contacting Brocade Technical Support
As a Brocade customer, you can contact Brocade Technical Support 24x7 online or by telephone. Brocade OEM customers should
contact their OEM/solution provider.

Brocade customers
For product support information and the latest information on contacting the Technical Assistance Center, go to www.brocade.com and
select Support.
If you have purchased Brocade product support directly from Brocade, use one of the following methods to contact the Brocade
Technical Assistance Center 24x7.
Online

Telephone

Preferred method of contact for non-urgent issues:

Required for Sev 1-Critical and Sev 2-High issues:

•

Case management through the MyBrocade portal.

•

Continental US: 1-800-752-8061

•

Quick Access links to Knowledge Base, Community, Document
Library, Software Downloads and Licensing tools

•

Europe, Middle East, Africa, and Asia Pacific: +800-AT FIBREE
(+800 28 34 27 33)

•

Toll-free numbers are available in many countries.

•

For areas unable to access a toll-free number:
+1-408-333-6061

Brocade OEM customers
If you have purchased Brocade product support from a Brocade OEM/solution provider, contact your OEM/solution provider for all of
your product support needs.
•

OEM/solution providers are trained and certified by Brocade to support Brocade® products.

•

Brocade provides backline support for issues that cannot be resolved by the OEM/solution provider.

•

Brocade Supplemental Support augments your existing OEM support contract, providing direct access to Brocade expertise.
For more information, contact Brocade or your OEM.

•

For questions regarding service levels and response times, contact your OEM/solution provider.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

13

14

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

About This Document
•
•

What's new in this document........................................................................................................................................................................ 15
Supported hardware......................................................................................................................................................................................... 15

What's new in this document
Information has been added or updated to reflect new or modified debug commands for FastIron features or enhancements.
In this release of the Brocade FastIron debug command reference, not all debug commands supported on the FastIron devices are
represented.
For legacy commands the history table is not shown unless an update has been added in recent releases.
NOTE
In addition to debug commands that are new or modified for this release, numerous debug commands for existing FastIron
features have been added that were previously described only in FastIron configuration guides.

New and modified commands
The following new and modified commands have been added in the FastIron 08.0.61 release.

New commands
•

supportsave (SCP)

Modified commands
No debug commands have been modified in this release.

Supported hardware
This guide supports the following Brocade products:
•

Brocade ICX 7750 Series

•

Brocade ICX 7450 Series

•

Brocade ICX 7250 Series

•

Ruckus ICX 7150 Series

For information about what models and modules these devices support, see the hardware installation guide for the specific product
family.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

15

16

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Using diagnostic commands
•
•

Using debug commands................................................................................................................................................................................17
Generic debug commands............................................................................................................................................................................17

Using debug commands
This chapter describes how to use debug commands to monitor and troubleshoot the device configurations. The debug commands are
accessible from the Privileged EXEC mode in the Brocade command line interface (CLI). Most debug commands can be configured to
send output to a specified destination.
When enabled, the debug commands can noticeably affect system performance. Many debug commands are specifically designed to be
used in conjunction with calls to Brocade Technical Support. If you report a problem, the support engineer may ask you to execute one or
more of the debug commands described in this guide.
ATTENTION
Some debug commands report information about internal hardware settings and registers, which is relevant primarily to the
Brocade engineering staff. These commands are not described in this document.

Generic debug commands
The following generic debug commands perform functions related to all debugging actions:
•

debug ? - Generates a list of debug options.

•

show debug - Shows all enabled debug settings.

•

debug destination - Allows you to select an output destination: Telnet, SSH, console, or logging (default).

debug ?
Syntax: debug ?
The debug ? command generates a list of available debug variables.
ATTENTION
Many first-level variables have their own variable subsets. When you enter a debug command, the system indicates that there
are additional variables available and you have entered an incomplete command. Add a space and a question mark to your
original command to view the additional variables.
device# debug vlan?
vlan Enable/Disable VLAN debug

show debug
Syntax: show debug
This command displays all the enabled debug functions. The output resembles the following example, which shows that VLAN
debugging is enabled, with the console as the output destination.
device# show debug
Debug message destination: Console
VLAN
VLAN: debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

17

Generic debug commands

debug destination
Syntax: no debug destination [ console | logging | telnet num | ssh num ]
This command displays all the enabled debug functions. The output resembles the following example, which shows that VLAN
debugging is enabled, with the console as the output destination.
•

console - Directs output to the system console.

•

logging - Directs output to the syslog buffer and to the syslog server (default).

•

telnet num - Directs debugging output to a specified Telnet session (a number from 1 through 5).

•

ssh num - Directs debugging output to a specified SSH session (a number from 1 through 5).

This command allows you to specify a destination for debugging output. The default destination is the system console, but you can
redirect output to a syslog buffer, Telnet session, or SSH session.
To send debug output to a Telnet session, first determine your session number using the show who command.
device# show who
Console connections (by unit number):
1 established
4 minutes 29 seconds in idle
Telnet connections (inbound):
1 established, client ip address 172.31.0.1
you are connecting to this session
2 seconds in idle
2 closed
3 closed
4 closed
5 closed
Telnet connection (outbound):
6 closed
SSH connections:
1 closed
2 closed
3 closed
4 closed

This example indicates that you are connected through active Telnet session 1. To redirect the debug output to your Telnet session, enter
the following command.
device# debug destination telnet 1

Brief and detail debug options
When enabled, many debug commands can significantly impact system performance. Many debug commands provide options for brief
or detailed reporting. Generating detailed output places an additional burden on system performance, and in many cases the results may
be more difficult to interpret than output generated using the brief option. To conserve performance and prevent system disruption, use
the brief option whenever possible.

Disabling debug commands
When activated, most debug commands instruct the system to collect specific information about router configurations and activity. In all
cases, adding no in front of the command disables the debug function.

18

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Debug Commands A - G
debug 802.1w all_802_1w_events
Debugs all the RSTP transactions, timers, and packets on a specific VLAN.

Syntax
debug 802.1w all_802_1w_events decimal

Parameters
decimal
Refers to the number of the VLAN.

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

19

debug 802.1w all_802_1w_events

Examples
If the events are enabled, output similar to the following is displayed.
device# debug 802.1w all_802_1w_events vlan 2
RSTP Enabling All events Debugging for VLAN 2
device# RSTP[daa69]: Timer Alert - helloWhen timer_expired On port 1/1/2(1) ,
VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2
RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2
RSTP[daa69]: Timer Alert - helloWhen timer_expired On port 1/1/9(8) , VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2
RSTP[daa69]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00004e20
8000002438154580 08 09 0100 1400 0200 0f00
RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 01 0000 0000 0000 0000
RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2
RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 02 0000 0000 0000 0000
RSTP[daa7d]: Timer Alert - helloWhen timer_expired On port 1/1/2(1) , VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2
RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2
RSTP[daa7d]: Timer Alert - helloWhen timer_expired On port 1/1/9(8) , VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2
RSTP[daa7d]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00004e20
8000002438154580 08 09 0100 1400 0200 0f00
RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 01 0000 0000 0000 0000
RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2
RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 02 0000 0000 0000 0000
RSTP[daa91]: Timer Alert - helloWhen timer_expired On port 1/1/2(1) , VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2
RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2
RSTP[daa91]: Timer Alert - helloWhen timer_expired On port 1/1/9(8) , VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2
RSTP[daa91]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2

If the events are disabled, output similar to the following is displayed.
device# no debug 802.1w all_802_1w_events vlan 2
RSTP Disabling All 802.1w Debugging for VLAN 2

20

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug 802.1w messages

debug 802.1w messages
Displays BPDU information on a VLAN.

Syntax
debug 802.1w messages vlan decimal
no debug 802.1w messages vlan decimal

Parameters
decimal
Refers to the number of the VLAN.

Modes
Privileged EXEC mode

Examples
If the 802.1w messages are enabled, output similar to the following is displayed.
device# debug 802.1w messages vlan 2
RSTP Enabling packets Debugging for VLAN 2
Brocade# RSTP: Rcvd RST Config BPDU: Port 1/1/1(0)
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 01 0000 0000 0000 0000
RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 02 0000 0000 0000 0000
RSTP[db06d]: Tx RST Config BPDU Port 1/1/9(8) VLAN
0000 02 02 7e 80000012f2dbfd80 00004e20
8000002438154580 08 09 0100 1400 0200 0f00
RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 01 0000 0000 0000 0000
RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 02 0000 0000 0000 0000
RSTP[db081]: Tx RST Config BPDU Port 1/1/9(8) VLAN
0000 02 02 7e 80000012f2dbfd80 00004e20
8000002438154580 08 09 0100 1400 0200 0f00
RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 01 0000 0000 0000 0000
RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 02 0000 0000 0000 0000
RSTP[db095]: Tx RST Config BPDU Port 1/1/9(8) VLAN
0000 02 02 7e 80000012f2dbfd80 00004e20
8000002438154580 08 09 0100 1400 0200 0f00
Brocade# RSTP: Rcvd RST Config BPDU: Port 1/1/1(0)
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 01 0000 0000 0000 0000
RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2
0000 02 02 7e 80000012f2dbfd80 00000000
80000012f2dbfd80 08 02 0000 0000 0000 0000

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

VLAN 2

2

2

2
VLAN 2

21

debug 802.1w messages

If the 802.1w messages are disabled, output similar to the following is displayed.
device# no debug 802.1w messages valn 2
RSTP Disabling Packets Debugging for VLAN 2

22

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug 802.1w timer

debug 802.1w timer
Debugs the RSTP (802.1w) timer expiration.

Syntax
debug 802.1w timer vlan decimal
no debug 802.1w timer vlan decimal

Parameters
decimal
Refers to the number of the VLAN.

Modes
Privileged EXEC mode

Examples
If the timer is enabled, output similar to the following is displayed.
device# debug 802.1w timer
device# RSTP[db6fd]: Timer
VLAN 2
RSTP[db6fd]: Timer Alert RSTP[db711]: Timer Alert RSTP[db711]: Timer Alert RSTP[db725]: Timer Alert RSTP[db725]: Timer Alert RSTP[db739]: Timer Alert -

vlan 2
Alert - helloWhen timer_expired On port 1/1/2(1) ,
helloWhen
helloWhen
helloWhen
helloWhen
helloWhen
helloWhen

timer_expired
timer_expired
timer_expired
timer_expired
timer_expired
timer_expired

On
On
On
On
On
On

port
port
port
port
port
port

1/1/9(8)
1/1/2(1)
1/1/9(8)
1/1/2(1)
1/1/9(8)
1/1/2(1)

,
,
,
,
,
,

VLAN
VLAN
VLAN
VLAN
VLAN
VLAN

2
2
2
2
2
2

If the timer is disabled, output similar to the following is displayed.
device# no debug 802.1w timer vlan 2
RSTP Disabling Timer Debugging for VLAN 2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

23

debug 802.1w transitions

debug 802.1w transitions
Debugs the RSTP state machine transitions.

Syntax
debug 802.1w transitions vlan decimal
no debug 802.1w transitions vlan decimal

Parameters
decimal
Refers to the number of the VLAN.

Modes
Privileged EXEC mode

Examples
If the 802.1w transtitions are enabled, output similar to the following is displayed.
device# debug 802.1w transitions vlan 2
RSTP Enabling Events Debugging for VLAN 2
Brocade# RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2
RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2
RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2
RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2
RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2
RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2
RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2

If the 802.1w transtitions are disabled, output similar to the following is displayed.
device# no debug 802.1w transitions vlan 2
RSTP Disabling Events Debugging for VLAN 2

24

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug acl log

debug acl log
Sends the ACL log to the CPU for all the packets.

Syntax
debug acl log
no debug acl log

Modes
Privileged EXEC mode

Examples
device# debug acl log
Enabling ACL log

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

25

debug all

debug all
Enables all the debug functions and should be used only during a troubleshooting session with a Brocade technician.

Syntax
debug all
no debug all

Modes
Privileged EXEC mode

Usage Guidelines
The no form disables all debugging.
CAUTION
The debug all command generates extensive output and can significantly slow device operation. Use this
command with caution. Never use this command during periods of peak network activity. Enter no debug all to
stop the output.

Examples
The following example enables all debugging functions. A warning about potential network impact is displayed.
device# debug all
Warning! This may severely impact network performance!
All possible debuggings have been turned on

Enter the no form of the command to stop all debugging.
device# no debug all
Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Disabling ACL log
Don't monitor port

26

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster all

debug cluster all
Enables the Multi-Chassis Trunking (MCT) debugging information log.

Syntax
debug cluster all
no debug cluster all

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

27

debug cluster all

Usage Guidelines
Examples
If the debug cluster all command is enabled, output similar to the following is displayed.
device#debug cluster all
MCT:: Enabling all debugs
CLUSTER ALL debugging is now ON
device#clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=120
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=122
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=350
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1007
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1009
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=0, vlanid=116
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=45, vlanid=123
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
CLUSTER_FSM: received image version info msg from peer
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=509
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23
CLUSTER FSM: cluster id 2, client id 121, old state: Master Peer Reachable, event: Local Down
mct_fsm_set_local_cceps_by_fsm(T=7960) enable 0 ,fsm_peer_switchover=0 ,fsm_switchover=0,
client_isolation=0
CLUSTER FSM: new state: Slave, master: FALSE
CLUSTER_FSM: received image version info msg from peer
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1001
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1201
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=117
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=46, vlanid=117
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=45, vlanid=118
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1003
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=502
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=84, vlanid=114
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/2/6
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=42, vlanid=117
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/43
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=119
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=200
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1006
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=45, vlanid=1009
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=505
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=68, vlanid=741

28

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster all

clusterlib_get_exclude_ccep_portmask_for_sw_fwd: vlan_id 741 is not MCT member vlan
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=120
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=122
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=120
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=122
fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=21, vlanid=1201
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/22
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=21, vlanid=1201
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/22
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=506
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=507
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1008
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_cclusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9,
vlanid=1001
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10
clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1201
clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

29

debug cluster ccp

debug cluster ccp
Enables debugging of all CCP FSM messages, CCP client registrations, CCP packet exchanges from clients, keepalive
messages and notifications, data buffer usage, and specific peer-related message exchanges.

Syntax
debug cluster ccp [ fsm | tcp | packets | itc | client | events | memory ]

Parameters
fsm
Enables CCP FSM debugging for a given peer IP or all peers.
tcp
Enables CCP TCP debugging for a given peer IP or all peers.
packets
Enables CCP packet debugging for a given peer IP or all peers.
itc
Enables CCP ITC debugging.
client
Enables CCP client-related registration debugging.
events
Enables CCP events debugging.
memory
Enables CCP memory debugging.

Modes
Privileged EXEC mode

30

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster ccp

Usage Guidelines
Examples
device# debug cluster ccp
CLUSTER CCP debugging is on for all
device#config ter
device(config)#cluster 2
device(config-cluster-SWIND)#no dep
device#CLUSTER CCP_FSM(T=517439): Fsm12 2.1.1.1 sending keepalive
CLUSTER CCP PEER(T=517439): Make keep alive message ->
CCP_PKT(T=517439): Sending Keep Alive message to peer
CCP_PKT(T=517439): Packet Info:0100000c000000080003000400001422
Debug: Jan 1 06:22:42 CLUSTER CCP:free data buf
allocated packet count
1
buffer 621585f8
Debug: Jan 1 06:22:42 CLUSTER CCP:internal free data buf
allocated packet count 0 bufer 621585f8
Debug: Jan 1 06:22:42 CLUSTER CCP:internal alloc data buf allocated packet count 1 buffer 621585f8
Debug: Jan 1 06:22:42 CLUSTER CCP:alloc data buf
allocated packet count 1 buffer 621585f8
CCP_PKT(T=517445): Receiving Packet from peer 2.1.1.1
CCP_PKT(T=517445): Packet Info:0100000c0000000800030004000013f1
CCP_PKT(T=517445): Receiving Packet from peer 2.1.1.1, appId=0
(CCP_APPLICATION_CCP=0;CCP_APPLICATION_CLUSTER_MGR=1)
CCP_PKT(T=517445): Packet Info:0100000c0000000800030004000013f1
CCP_PKT(T=517445):Processing ccp packet
CCP_PKT(T=517445): Packet Info:00030004000013f1
CCP_PKT(T=517445): Handling received keep alive message
CCP_PKT(T=517445): Packet Info:00030004000013f1
CLUSTER CCP_FSM(T=517445): Fsm7 got keepalive from 2.1.1.1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

31

debug cluster client-auto-detect

debug cluster client-auto-detect
Displays debugging information related to cluster client auto-detect functionality.

Syntax
debug cluster client-auto-detect
no debug cluster client-auto-detect

Modes
Privileged EXEC mode

Examples
device# debug cluster client-auto-detect
CLUSTER AUTOCONFIG INFO - New Client: A-device-000000137b0 with rbridge id: 3318
discovered on LACP port 4/17
CLUSTER AUTOCONFIG INFO - New Client: A-device-000000c74d40 with rbridge id: 2668
discovered on Static port 3/13
CLUSTER AUTOCONFIG INFO - Port 3/14 added as Static interface to
Client:A-device-000000c74d40
LAG MCT-CCAC-LAG_1 deployed successfully!
Spanning tree is disabled on CCEP port 4/17 of MCT Client: A-device-000000137b0.
CLUSTER AUTOCONFIG INFO - Port 4/17 is successfully programmed as client
interface. Removing from autoconfig port list.
debug clLAG MCT-CCAC-LAG_2 deployed successfully!
Spanning tree is disabled on CCEP port 3/13 of MCT Client: A-device-000000c74d40.
CLUSTER AUTOCONFIG INFO - Port 3/13 is successfully programmed as client
interface. Removing from autoconfig port list.
CLUSTER AUTOCONFIG INFO - Port 3/14 is successfully programmed as client
interface. Removing from autoconfig port list.
CLUSTER AUTOCONFIG INFO - Cluster 1 client auto-config process stopped

32

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster config

debug cluster config
Enables debugging for any addition or deletion of the clusters, addition or deletion of the clients, or exchange of cluster finite
state machine (FSM) messages between the peer and the client isolation mode.

Syntax
debug cluster config
no debug cluster config

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
Examples
If the debug cluster config command is enabled, output similar to the following is displayed.
device#debug cluster config
CLUSTER Config debugging is now ON
device#configure terminal
device(config)#cluster 2
device(config-cluster-SWIND)#no deploy
clustercu_generic_config()(console) - opcode = 8, msg_type 0x460008 (blocking)
CLUSTER CONFIG: CLUSTER_CONFIG_CLUSTER_DEPLOY ITC message received
CLUSTER CCP:ccp_internal_delete_cluster::Cluster 2 Deleted successfully.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

33

debug cluster fsm

debug cluster fsm
Enables debugging of the MCT cluster FSM for a particular client.

Syntax
debug cluster fsm clientclient_id
no debug cluster fsm clientclient_id

Parameters
client_id
The port number of the client.

Modes
Privileged EXEC mode
Global configuration mode

34

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster fsm

Usage Guidelines
Examples
If the debug cluster fsm client command is enabled, output similar to the following is displayed.
device#debug cluster fsm
CLUSTER fsm debugging is now ON
device#con tDebug: Jan 1 06:30:20 CLUSTER_FSM: received image version info msg from peer
device(config)# Debug: Jan

1 06:30:21 CLUSTER_FSM: received image version info msg from peer

device(config)#Debug: Jan 1 06:30:23 CLUSTER_FSM: received image version info msg from peer
Debug: Jan 1 06:30:23 CLUSTER FSM: Two Masters are present. Becoming Slave 2
CLUSTER FSM (PEER): cluster id 2, peer rbridge id 3, old state: CCP Down, event: Reachable
CLUSTER FSM (PEER): new state: Reachable
CLUSTER FSM: cluster id 2, client id 116, old state: Master, event: Peer Reachable
CLUSTER FSM: Cluster SWIND (Id: 2), client CCEP-116-Reaper (RBridge Id: 116) Remote client CCEP state when CCP is down: down
mct_set_client_port_fwd_state, Prev_state=2 , Curr state = 3
Info - cluster_client_set_port_fwd_state() - fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)
,client port 1/1/15 (#14), icl_port_id 1/1/1(#)0
cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1,
fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 1, current state
G_FWD
cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1,
fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 2, current state
G_FWD
cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1,
fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 3, current state
G_BLK
cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1,
fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 4, current state
G_BLK
cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1,
fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 5, current state
G_BLK
state G_FWD
cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1,
fSM_state=ICL_AND_CEP_TO_CCEP(fwd frombc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78
10bd0934 10bc8c9c 10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904
10c1b8b4 11f7087c 11fb69a0
Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00
1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c
10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c
11fb69a0
Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00
1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c
10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c
11fb69a0
Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00
1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c
10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c
11fb69a0
Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00
1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c
10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c
11fb69a0
cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1,
fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 1 with state G_BLK
cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1,
fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 2 with state G_FWD
cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1,
fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 3 with state G_BLK
cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1,
fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 4 with state G_BLK
cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,iCL/CEP to CCEP)(3))
Restore STP state for 1/2/6 in STG 12 with state G_BLK

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

35

debug cluster fsm

cluster_client_set_port_fwd_state(T=522145,client_port=1/2/6,icl_port=1/1/1,
fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) Restore STP state for 1/2/6 in STG 13 with
state G_BLK
CLUSTER FSM: new state: Master Peer Reachable, master: TRUE
>> mct_fsm_process_local_ccep_event(port=1/2/6,up=UP) &
>> mct_fsm_process_local_ccep_event(port=1/2/6,up=UP) & SAME STATE
>> mct_fsm_process_localDebug: Jan 1 06:30:37 CLUSTER_FSMCLUSTER FSM: clust^C
device(config)#Debug: Jan

1 06:30:38 CLUSTER_FSM: received image version info msg from peer

device(config)#Debug: Jan 1 06:30:38 CLUSTER_FSM: received image version info msg from peer
nDebug: Jan 1 06:30:39 CLUSTER_FSM: received image version info msg from peer
o dDebug: Jan 1 06:30:39 CLUSTER_FSM: received image version info msg from peer
eDebug: Jan 1 06:30:40 stack: 1045f384 10bd1610 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40
1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614
10a98904 10c1b8b4 11f7087c 11fb69a0
Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40
1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614
10a98904 10c1b8b4 11f7087c 11fb69a0
Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40
1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614
10a98904 10c1b8b4 11f7087c 11fb69a0
Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40
1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614
10a98904 10c1b8b4 11f7087c 11fb69a0
Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40
1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614
10a98904 10c1b8b4 11f7087c 11fb69a0
10d7d66c 10d8937c 10a9a9e8 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0

36

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster intf-mac

debug cluster intf-mac
Displays interface MAC debug information for the cluster.

Syntax
debug cluster intf-mac
no debug cluster intf-mac

Modes
Privileged EXEC mode

Examples
device# debug cluster intf-mac
device#configure terminal
device(config)#cluster 2
device (config-cluster-SWD)#no deploy
device#CLUSTER ROUTER MAC(T=6459): sent to peer rbridge id 4, base mac address cc4e.2438.7c80, number
of mac addresses 1
CLUSTER ROUTER MAC(T=6459): received from peer rbridge id 4, router mac address 748e.f8f9.7900, number
of mac addresses 1
CLUSTER MDUP: Send UPDATE message num_entries: 100 (0 intf mac)
CLUSTER MDUP: Tx MDUP_TYPE_UPDATE_MESSAGE message num_entries: 36 (0 intf mac)
CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 58 (0 intf mac)}
CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 100 (0 intf mac)}
CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 50 (0 intf mac)}
CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 1 (0 intf mac)}
CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 1 (0 intf mac)}
CLUSTER MDUP: Tx MDUP_TYPE_UPDATE_MESSAGE message num_entries: 1 (0 intf mac)
CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 1 (0 intf mac)}

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

37

debug cluster mdup

debug cluster mdup
Displays MDUP debug information for the cluster.

Syntax
debug cluster mdup
no debug cluster mdup

Modes
Privileged EXEC mode

38

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster mdup

Examples
device#debug cluster mdup
CLUSTER mdup debugging is now ON
device#configure terminal
device(config)#cluster 2
device(config-cluster-SWIND)#no deploy
mdupmgr_proc_cluster_client_undeploy(T=518074) - Undeployed the client, port 1/1/15 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518143) - Undeployed the client, port 1/1/17 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518214) - Undeployed the client, port 1/1/10 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518283) - Undeployed the client, port 1/1/43 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518284) - Undeployed the client, port 1/2/6 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518286) - Undeployed the client, port 1/1/19 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518286) - Undeployed the client, port 1/1/33 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518357) - Undeployed the client, port 1/1/21 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518392) - Undeployed the client, port 1/1/23 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_client_undeploy(T=518426) - Undeployed the client, port 1/3/6 in cluster 2, flush
client ports 0123456789ABCDEF
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a007,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a007,1010) mmac_idx=1,
mmac_VIDX=1024
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a007,1010) mmac_idx=1,
mmac_VIDX=1024
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a006,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a006,1010) mmac_idx=2,
mmac_VIDX=1023
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a006,1010) mmac_idx=2,
mmac_VIDX=1023
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a001,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a001,1010) mmac_idx=3,
mmac_VIDX=1022
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a001,1010) mmac_idx=3,
mmac_VIDX=1022
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a003,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a003,1010) mmac_idx=4,
mmac_VIDX=1021
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a003,1010) mmac_idx=4,
mmac_VIDX=1021
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a002,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a002,1010) mmac_idx=5,
mmac_VIDX=1020
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a002,1010) mmac_idx=5,
mmac_VIDX=1020
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00d,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00d,1010) mmac_idx=6,
mmac_VIDX=1019
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00d,1010) mmac_idx=6,
mmac_VIDX=1019
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00c,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00c,1010) mmac_idx=7,
mmac_VIDX=1018
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00c,1010) mmac_idx=7,
mmac_VIDX=1018
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00f,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00f,1010) mmac_idx=8,
mmac_VIDX=1017
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00f,1010) mmac_idx=8,
mmac_VIDX=1017
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00e,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00e,1010) mmac_idx=9,
mmac_VIDX=1016
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00e,1010) mmac_idx=9,

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

39

debug cluster mdup

mmac_VIDX=1016
mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a009,1010)
macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a009,1010) mmac_idx=10,
mmac_VIDX=1015
macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a009,1010) mmac_idx=10,
mmac_VID^C

40

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug cluster show

debug cluster show
Displays debug flags for the cluster.

Syntax
debug cluster show
no debug cluster show

Modes
Privileged EXEC mode

Examples
device# debug cluster show
CLUSTER debugging is

:DISABLED

CLUSTER
CLUSTER
CLUSTER
CLUSTER
CLUSTER
CLUSTER
CLUSTER
CLUSTER
CLUSTER
CLUSTER
CLUSTER

:OFF
:OFF
:OFF
:OFF
:OFF
:OFF
:OFF
:OFF
:OFF
:OFF
:OFF

ALL debugging is
IPC debugging is
Hardware debugging is
Config debugging is
FSM debugging is
MDUP debugging is
interface mac debugging is
Forwarding debugging is
STP debugging is
BPDU forwarding debugging is
CCP debugging is

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

41

debug cluster stp

debug cluster stp
Enables debugging of STP and RSTP modules.

Syntax
debug cluster stp
no debug cluster stp

Modes
Privileged EXEC mode

Usage Guidelines
The output details how the STP registers the ICL or CCEP ports. Changes occur while supporting MCT on STP, such as ICL
guard, CCEP state sync, STP and CCP messages, and topology change messages are tracked.

Examples
device# debug cluster stp
CLUSTER STP debugging is now ON
MCT-250-SX1600#rstputil_mct_handle_incoming_BPDU(T=12448759, VLAN=1301,port=2/9) port-stpstate=FORWARDING
rstputil_mct_handle_incoming_BPDU(T=12448779, VLAN=1301,port=2/9) port-stp-state=FORWARDING
rstputil_mct_handle_incoming_BPDU(T=12448799, VLAN=1301,port=2/9) port-stp-state=FORWARDING
rstputil_mct_handle_incoming_BPDU(T=12448819, VLAN=1301,port=2/9) port-stp-state=FORWARDING
rstputil_mct_handle_incoming_BPDU(T=12448840, VLAN=1301,port=2/9) port-stp-state=FORWARDING
rstputil_mct_handle_incoming_BPDU(T=12448859, VLAN=1301,port=2/9) port-stp-state=FORWARDING

42

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug destination

debug destination
Specifies a destination for debugging output. The default destination is the system console, but you can redirect output to a
syslog buffer, Telnet session, or SSH session.

Syntax
debug destination [ console |logging|telnetnum| sshnum]
no debug destination [ console |logging|telnetnum| sshnum]

Parameters
console
Directs output to the system console.
logging
Directs output to the syslog buffer and to the syslog server (default).
telnetnum
Directs output to a specified Telnet session (ranges from 1 through 5).
sshnum
Directs output to a specified Secure Shell (SSH) session (ranges from 1 through 5).

Examples
To send debug output to a Telnet session, first determine your session number using the show who command.
device# show who
Console connections (by unit number):
1 established
4 minutes 29 seconds in idle
Telnet connections (inbound):
1 established, client ip address 172.31.0.1
you are connecting to this session
2 seconds in idle
2 closed
3 closed
4 closed
5 closed
Telnet connection (outbound):
6 closed
SSH connections:
1 closed
2 closed
3 closed
4 closed

This example indicates that you are connected through active Telnet session 1. To redirect the debug output to your Telnet
session, enter the following command.
device# debug destination telnet 1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

43

debug dhcp-client alarms

debug dhcp-client alarms
Displays the debugging of the DHCP client on a particular port ID.

Syntax
debug dhcp-client alarms
no debug dhcp-client alarms

Modes
Privileged EXEC mode

Examples
device#
"DHCPC:
"DHCPC:
"DHCPC:
file”
"DHCPC:
"DHCPC:
“DHCPC:
“DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:

44

debug dhcp-client alarms
failed to initialize port; dhcpc unable to continue”
failed to initialize protocol timer"
no tftp server address or name found. unable to download configuration
unable to construct dns request”
dns failed to resolve tftp server name”
dns aborted”
No DHCP Servers found on any ports”
No DHCP Servers found on any ports"
setting 0 seconds lease time"
setting 0 seconds lease time on port port-id"
No DHCP Servers found on any ports"
failed to allocate a dhcpc packet on port port-id"
failed to send message on port port-id"
failed to allocate a dhcpc packet on port port-id"
failed to send message on port port-id "
get_an_ip_send_packet () failed on port port-id"

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug dhcp-client events

debug dhcp-client events
Displays information about DHCP client events related to configuration.

Syntax
debug dhcp-client events
no debug dhcp-client events

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

45

debug dhcp-client events

Examples
device#
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
“DHCPC:
“DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:

46

debug dhcp-client events
failed to delete static ip-address to ip-address"
failed to set the port ip-address to ip-address; subnet mask ip-address"
changing port port-id state from REQUEST to BOUND"
exceeds maximum some-number DNS servers"
added ip-address dns-server address"
failed to set the port ip-address to ip-address; subnet mask ip-address"
TFTP timeout error for bootfile name %s"
TFTP client busy"
TFTP error wrong file type"
TFTP long file name error"
TFTP vlan-id invalid"
TFTP flash write errors"
TFTP error out of buffer space"
TFTP flash read error"
TFTP flash preparation for read failed"
TFTP flash preparation for write failed"
%s failed to save running-configuration"
changing protocol from running to stopped"
changing protocol from stopped to running"
Auto update in progress, cannot change DHCP client state on port port-id "
invalid parameter for "
dhcp_get_next_port() bad port number port-id"
sent DHCP-REQUEST message on port port-id \”
sent DHCP-RENEWING message on port port-id”
sent DHCP-REBINDING message on port port-id "
sent DHCP-RELEASE message on port port-id "
received packet port port-id"
received bad packet port port-id, no DHCP END OPT found"
received offer message on port port-id"
recieved non matching 'xid' (0x%X) in offer message"
changing port port-id state from INIT-SELECTING to INIT-SELECTING"
changing port port-id state from INIT-SELECTING to REQUEST"
received DHCPCACK message on port port-id"
recieved non matching 'xid'(0x%X) in DHCPCACK message"
changing timer-event to SEEKING_CONFIGURATION_AND_WAITING_FOR_OFFERS"
recieved non matching 'xid'(0x%X) in DHCPNAK message"
deleting existing ip address configuration on port port-id"
received DHCPNAK packet on port port-id”
changing port port-id state from REQUEST to INIT-SELECTING”
received DHCPCOFFER packet on port port-id> while in bound state”
received DHCPCREQUEST packet on port port-id while in bound state"
received DHCPCDECLINE packet on port port-id while in bound state"
received DHCPCACK packet on port port-id while in bound state"
received DHCPCNAK packet on port port-id while in bound state"
received DHCPCRELEASE packet on port port-id while in bound state"
received DHCPCINFORM packet on port port-id while in bound state"
received DHCPCINFORM packet on port port-id while in bound state"
received unknown packet on port port-id while in bound state"
received DHCPACK packet in renewal-state on port port-id"
received non matching 'xid'(0x%X) in RENEWAL message"
TFTP flash read error"
changing port port-id state from RENEWING to BOUND"
received non matching 'xid'(0x%X) in DHCPNAK message"
received DHCPNAK packet in renewal-state on port port-id"
changing port port-id state from RENEWING to INIT-SELECTING"
received DHCPACK packet in rebind-state on port port-id"
received non matching 'xid'(0x%X) in REBIND message"
changing port port-id state from REBINDING to BOUND"
received non matching 'xid'(0x%X) in DHCPNAK message"
received DHCPNAK packet in renewal-state on port port-id"
changing port port-id state from REBIND to INIT-SELECTING"
sending packet port port-id"
send completion called on port: port-id"
Freeing packet"
unable to get some-number option from dhcp message from port port-id"
received server id address opton: ip-address from port port-id"
received lease-time option: some-number from port port-id"
received domain-name option: %s from port port-id"

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug dhcp-client events

"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:
"DHCPC:

received dns-server address option: ip-address from port port-id"
received default-router address option: ip-address from port port-id"
received TFTP server name option: %s from port port-id"
received TFTP server address opton: ip-address from port port-id"
received Bootfile name option: %s from port port-id"
received 'hostname' option: %s from port port-id"
received maximum message size option: some-number from port port-id"
lease timer events called with invalid port"
changing port port-id state from BOUND to REBINDING"
changing port port-id state from BOUND to RENEWING"
deleting existing ip address configuration on port port-id"
changing port port-id state from REQUESTING to INIT-SELECTING"
failed to renew ip address with dhcp server; continuing with lease period"
changing port port-id state from REBINDING to INIT_SELECTING"
changing port port-id state from REBINDING to REQUESTING"

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

47

debug dot1x hitless

debug dot1x hitless
Enables the 802.1x hitless debugging.

Syntax
debug dot1x hitless
no debug dot1x hitless

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug dot1x hitless
dot1x: Hitless debugging is on

48

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug dot1x-events

debug dot1x-events
Displays the authentications failed or succeeded and the application of VLANs or ACLs requested by the Remote
Authentication Dial In User Service (RADIUS) server.

Syntax
debug dot1x-events
no debug dot1x-events

Modes
Privileged EXEC mode

Usage Guidelines
This command works globally across all the ports.

Examples
device#debug dot1x-events
dot1x: Events debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

49

debug dot1x-filter

debug dot1x-filter
Enables the 802.1x filter debugging.

Syntax
debug dot1x-filter
no debug dot1x-filter

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug dot1x-filter
dot1x: Filter debugging is on

50

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug dot1x-misc

debug dot1x-misc
Enables the 802.1x miscellaneous debugging.

Syntax
debug cluster all
no debug cluster all

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug dot1x-misc
dot1x: Misc debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

51

debug dot1x-mka

debug dot1x-mka
Enables debugging for the MACsec Key Agreement (MKA) protocol.

Syntax
debug dot1x-mka { event | packets | state | timers | port device/slot/port }
no debug dot1x-mka { event | packets | state| timers | port device/slot/port }

Parameters
event
Monitors 802.1X-MKA events.
packets
Monitors 802.1X-MKA packets.
state
Monitors 802.1X-MKA protocol state changes.
timers
Monitors 802.1X-MKA timers.
port device/slot/port
Monitors specified physical port.

Modes
Privileged EXEC mode.

Usage Guidelines
The no form of the command disables MKA debugging in progress. As an alternative, the command no debug all can be used
to disable all debugging in progress.
Using the debug dot1x-mka command may have impact on system performance.
When the debug dot1x-mka packets command or the debug dot1x-mka timers command is input, the console is likely to be
overwhelmed with packets because MKA packets are sent at a very high rate. Consequently, it is recommended that you first
establish another telnet session for CLI input.
If the debug dot1x-mka port port command is input, only the debug messages related to that port are displayed.

History

52

Release version

Command history

08.0.11

This command was introduced.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug dot1x-packets

debug dot1x-packets
Displays information about 802.1x packets.

Syntax
debug dot1x-packets
no debug dot1x-packets

Modes
Privileged EXEC mode

Examples
device# debug dot1x-packets
dot1x: Packets debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

53

debug dot1x-timers

debug dot1x-timers
Displays information about 802.1x timers.

Syntax
debug dot1x-timers
no debug dot1x-timers

Modes
Privileged EXEC mode

Examples
device# debug dot1x-timers
dot1x: Timers debugging is on

54

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug gvrp packets

debug gvrp packets
Enables the debugging of GARP VLAN Registration Protocol (GVRP) packets.

Syntax
debug gvrp packets
no debug gvrp packets

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug gvrp packets
GVRP: Packets debugging is
GVRP: 0x2095ced4: 01 80 c2
GVRP: 0x2095cee4: 03 00 01
GVRP: 0x2095cef4: 00 09 04
GVRP: 0x2095cf04: 03 ec 04
GVRP: 0x2095cf14: 09 cb 04
GVRP: Port 2/1 RCV
GVRP: 0x2095ced4: 01 80 c2
GVRP: 0x2095cee4: 03 00 01
GVRP: 0x2095cef4: 04 01 03
GVRP: 0x2095cf04: 04 01 0f
GVRP: Port 2/1 TX
GVRP: 0x207651b8: 01 80 c2
GVRP: 0x207651c8: 03 00 01
GVRP: 0x207651d8: 03 ec 04
GVRP: 0x207651e8: 09 cb 04
GVRP: 0x207651f8: 00 09 04
GVRP: Port 2/1 TX
GVRP: 0x207651b8: 01 80 c2
GVRP: 0x207651c8: 03 00 01
GVRP: 0x207651d8: 04 01 00

on
00
01
05
01
01

00
02
00
03
0f

21
00
0b
ef
a1

00
01
ef
a1

00
04
04
00

21 00 e0 52 ab 87 40 00 28 42 42
02 03 e9 04 01 03 eb 04 01 03 ec
01 03 f1 04 01 05 dd 04 01 09 cb
00

00
01
05
05
01

00
02
03
0f
00

21
00
ef
a1
0b

00
04
04
04
00

00
04
04
04
00

e0
05
02
01
00

04
05
05
02
00

52
00
03
03

80
03
03
00

ab
02
e9
f1

2c
e9
f1
02

87
04
04
04

0e
04
04
04

40
05
01
01

20
05
05
01

00
00
03
05

00
03
05
00

3a
07
eb
dd

3a
eb
dd
07

42
04
04
04

42
04
04
04

42
05
01
01

42
05
05
01

00 00 21 00 04 80 2c 0e 20 00 18 42 42
01 04 02 00 02 04 01 00 07 04 01 00 09
0b 00 00

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

55

56

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Debug Commands H - P
debug hw
Enables the hardware backplane debugging feature in a device.

Syntax
debug hw
no debug hw

Examples
device# debug hw
HW BP: backplane debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

57

debug igmp-snoop add-del-oif all

debug igmp-snoop add-del-oif all
Displays information about the addition or deletion of all outgoing interfaces (OIFs).

Syntax
debug igmp-snoop add-del-oif all
no debug igmp-snoop add-del-oif all

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop add-del-oif all
Del e1/1/23 from (0.0.0.0, 228.1.1.10) vlan 130
Del e1/1/23 from (0.0.0.0, 228.1.1.9) vlan 130
Del e1/1/23 from (0.0.0.0, 228.1.1.8) vlan 130
Add e1/1/23 to (0.0.0.0, 228.1.1.8) vlan 130
Add e1/1/23 to (0.0.0.0, 228.1.1.9) vlan 130
Add e1/1/23 to (0.0.0.0, 228.1.1.10) vlan 130

58

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug igmp-snoop clear

debug igmp-snoop clear
Clears all the IGMP snooping debug settings.

Syntax
debug igmp-snoop clear
no debug igmp-snoop clear

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop clear

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

59

debug igmp-snoop error

debug igmp-snoop error
Displays the IGMP snooping multicast error messages.

Syntax
debug igmp-snoop error
no debug igmp-snoop error

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop error
IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt
S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16
IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt
S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16
IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt
S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16

60

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug igmp-snoop group

debug igmp-snoop group
Displays the IGMP snooping multicast group information.

Syntax
debug igmp-snoop group group_address
no debug igmp-snoop group group_address

Parameters
group_address
Specifies the address of the IGMP snoop multicast group.

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop group 230.1.1.1
IGMP: rcvd Report-V2(t=22) g=230.1.1.1 resp=0, pkt S=10.85.1.3 to 230.1.1.1, on
VL100 (phy e1/1/48), igmp_size=8

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

61

debug igmp-snoop level

debug igmp-snoop level
Sets the debugging level of IGMP snooping activity.

Syntax
debug igmp-snoop level decimal
no debug igmp-snoop level decimal

Parameters
decimal
Specifies the debugging level of IGMP snooping activity and it can take values from 1 through 3.

Modes
Privileged EXEC mode

Usage Guidelines
Level 3 displays more information than level 2, and level 0 displays no information.

Examples
device# debug igmp-snoop level 1
igmpsnoop debug level = 1
IGMP: rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.1.15.1 to 224.0.0.1, on
VL100 (phy e3/1/6), igmp_size=8
device# debug igmp-snoop level 3
igmpsnoop debug level = 3
device# Add e1/1/2 to (0.0.0.0, 228.228.0.1) vlan 275
Add e1/1/2 to (0.0.0.0, 228.228.0.2) vlan 275
Add e1/1/2 to (0.0.0.0, 228.228.0.3) vlan 275
device# Del e1/1/2 from (0.0.0.0, 228.228.0.3) vlan 275
Del e1/1/2 from (0.0.0.0, 228.228.0.2) vlan 275
Del e1/1/2 from (0.0.0.0, 228.228.0.1) vlan 275
Del e1/1/12 from (0.0.0.0, 228.228.0.3) vlan 275
Del e1/1/2 from (0.0.0.0, 228.228.0.1) vlan 275

62

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug igmp-snoop packet

debug igmp-snoop packet
Displays debugging information related to the IGMP snoop packets.

Syntax
debug igmp-snoop packet source_address group_address
no debug igmp-snoop packet source_address group_address

Parameters
source_address
Specifies the source address of the IGMP snoop packet.
group_address
Specifies the address of the IGMP snoop multicast group.

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop packet 10.13.13.3 228.1.1.2
debug ip igmpsnoop packet S=10.13.13.3 G=228.1.1.2
rtr_l2mcast_fwd_data (pkts:1), (10.13.13.3 228.1.1.2), from e1/1/1 vlan 130, has
fwd_entry
rtr_l2mcast_fwd_data (pkts:1), (10.13.13.3 228.1.1.2), from e1/1/1 vlan 130,
clear hw_aging flag

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

63

debug igmp-snoop port ethernet

debug igmp-snoop port ethernet
Displays the IGMP snooping related debug information for the specified Ethernet interface.

Syntax
debug igmp-snoop port ethernet num
no debug igmp-snoop port ethernet num

Parameters
num
Specifies the stack ID, slot number, and port number of a specific Ethernet port.

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop port ethernet 1/1/2
IGMP: rcvd Report-V2(t=22) g=228.1.1.6 resp=0, pkt S=10.13.13.2 to 228.1.1.6, on
VL130 (phy e1/1/2), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=228.1.1.8 resp=0, pkt S=10.13.13.2 to 228.1.1.8, on
VL130 (phy e1/1/2), igmp_size=8

64

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug igmp-snoop show

debug igmp-snoop show
Displays all the IGMP snooping debug settings.

Syntax
debug igmp-snoop show
no debug igmp-snoop show

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop show
igmp debug-enable-any = 1
debug igmpsnoop is enabled
IGMP: rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.1.15.1 to 224.0.0.1, on
VL100 (phy e3/1/6), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.1.12 resp=0, pkt S=10.85.1.3 to 230.1.1.12, on
VL100 (phy e1/1/48), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.4.148 resp=0, pkt S=10.85.1.3 to 230.1.4.148,
on VL100 (phy e1/1/48), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.2.22 resp=0, pkt S=10.85.1.3 to 230.1.2.22, on
VL100 (phy e1/1/48), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.1.92 resp=0, pkt S=10.85.1.3 to 230.1.1.92, on
VL100 (phy e1/1/48), igmp_size=8

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

65

debug igmp-snoop source

debug igmp-snoop source
Displays the IGMP snooping related debug information for the specified source address

Syntax
debug igmp-snoop source source_address
no debug igmp-snoop source source_address

Parameters
source_address
Specifies the source address.

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop source 10.13.13.2
IGMP: rcvd Report-V2(t=22) g=228.1.1.6 resp=0, pkt S=10.13.13.2 to 228.1.1.6, on
VL130 (phy e1/1/2), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=228.1.1.8 resp=0, pkt S=10.13.13.2 to 228.1.1.8, on
VL130 (phy e1/1/2), igmp_size=8

66

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug igmp-snoop timer

debug igmp-snoop timer
Displays information about the IGMP snooping related timer events.

Syntax
debug igmp-snoop timer
no debug igmp-snoop timer

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop timer
device# debug igmp-snoop prime-port eth 1/1/2
igmp timer, VL130(e1/1/2) change V1 client age
igmp timer, E401010A VL130(e1/1/2) switch back
igmp timer, E4010109 VL130(e1/1/2) switch back
igmp timer, E4010108 VL130(e1/1/2) switch back

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

out
to include mode
to include mode
to include mode

67

debug igmp-snoop vlan

debug igmp-snoop vlan
Displays the IGMP snooping related debug information for the specified VLAN ID.

Syntax
debug igmp-snoop vlan vlan_id
no debug igmp-snoop vlan vlan_id

Parameters
vlan_id
Specifies the VLAN ID.

Modes
Privileged EXEC mode

Examples
device# debug igmp-snoop vlan 100
igmpsnoop monitor vlan 100
IGMP: rcvd Report-V2(t=22) g=230.1.1.110 resp=0, pkt S=10.85.1.3 to 230.1.1.110,
on VL100 (phy e1/1/48), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.2.52 resp=0, pkt S=10.85.1.3 to 230.1.2.52, on
VL100 (phy e1/1/48), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.3.133 resp=0, pkt S=10.85.1.3 to 230.1.3.133,
on VL100 (phy e1/1/48), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.2.203 resp=0, pkt S=10.85.1.3 to 230.1.2.203,
on VL100 (phy e1/1/48), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=230.1.1.151 resp=0, pkt S=10.85.1.3 to 230.1.1.151,
on VL100 (phy e1/1/48), igmp_size=8

68

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ikev2

debug ikev2
Enables IKEv2 debugging.

Syntax
debug ikev2 { all | error | event | packet [ detail | receive | send ] | peer ip-address | trace [ info ] }
no debug ikev2 { all | error | event | packet [ detail | receive | send ] | peer ip-address | trace [ info ] }

Parameters
all
Enables debugging of all IKEv2 instances.
error
Enables IKEv2 error debugging.
event
Enables IKEv2 event debugging.
packet
Enables IKEv2 packet debugging.
detail
Enables detailed IKEv2 packet debugging.
receive
Enables IKEv2 receive packet debugging.
send
Enables IKEv2 send packet debugging.
peer ip-address
Enables IKEv2 peer debugging to filter messages for a specific peer.
trace
Enables IKEv2 trace debugging.
info
Enables IKEv2 trace debugging information.

Modes
Privileged EXEC mode

Examples
The following command debugs IKEv2 event during tunnel down and rekeying.
device# debug ikev2 event
Debug: Mar 13 20:14:08 IKE: ipike_isakmp_resend_tmo_cb() :: for tunnel 44
Debug: Mar 13 20:14:39 IKE: ipike_ipsec_sadb_sa_rekey() :: rekey timeout for IPsec SA 0x1224

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

69

debug ikev2

The following command debugs IKEv2 error during mismatch in algorithms.
device# debug ikev2 error
IKEV2: ike error is enabled
Debug: Mar 13 20:14:08 IKE: ipike_isakmp_resend_tmo_cb() :: for tunnel 44
Debug: Mar 13 20:14:39 IKE: ipike_ipsec_sadb_sa_rekey() :: rekey timeout for IPsec SA 0x1224Debug: Mar
13 20:14:08
IKE: ipike_isakmp_resend_tmo_cb() :: for tunnel 44
Debug: Mar 13 20:14:39 IKE: ipike_ipsec_sadb_sa_rekey() :: rekey timeout for IPsec SA 0x1224
Debug: Mar 13 20:21:39 IKE: ipike_payload_notify_process_error() :: exchange rejected with
NO_PROPOSAL_CHOSEN for tunnel 31
Debug: Mar 13 20:21:39 IKE: ipike_exchange_sa_init_on_delete() :: the exchange was not finished,
removing (incomplete)
IKE SA for tunnel 31
Debug: Mar 13 20:21:44 IKE: ipike_policy_select_sa_param: no proposal was accepted
Debug: Mar 13 20:21:44 IKE: ipike_exchange_sa_init_on_delete() :: the exchange was not finished,
removing (incomplete)
IKE SA for tunnel 31
Debug: Mar 13 20:21:49 IKE: ipike_payload_notify_process_error() :: exchange rejected with
NO_PROPOSAL_CHOSEN for tunnel 31
Debug: Mar 13 20:21:49 IKE: ipike_exchange_sa_init_on_delete() :: the exchange was not finished,
removing (incomplete)
IKE SA for tunnel 31
Debug: Mar 13 20:21:54 IKE: ike_wr_policy_accept_id return 1

The following command debugs IKEv2 trace.
device# debug ikev2 trace
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
= 816f120f
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
816f120f
Debug: Mar
Debug: Mar
Debug: Mar

70

13
13
13
13
13
13
13

20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40

IKE: Locking IKE SA (ref count 1)
IKE:
initiator cookie: 0xe6e53f1404a54b7c
IKE:
responder cookie: 0xf81e5e7816388386
IKE: Locking IKE SA (ref count 2)
IKE:
initiator cookie: 0xe6e53f1404a54b7c
IKE:
responder cookie: 0xf81e5e7816388386
IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=721, type=37, init=1 -> val

13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13

20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40
20:28:40

IKE: ipike_isakmp_hash_add() :: hash: id=721, type=37, init=1, phase1=0
IKE: Sending request to 103.1.1.2 [500]
IKE: Message encrypted 88 bytes
IKE: Send 88 octets from 106.1.1.1:500 to 103.1.1.2:500
IKE: Releasing IKE SA (ref count 1), for tunnel 2
IKE:
initiator cookie: 0xe6e53f1404a54b7c
IKE:
responder cookie: 0xf81e5e7816388386
IKE: Locking IKE SA (ref count 1)
IKE:
initiator cookie: 0xb23c157874ab5638
IKE:
responder cookie: 0x599cb6a1a4d3d0fb
IKE: Releasing IKE SA (ref count 0), for tunnel 17
IKE:
initiator cookie: 0xb23c157874ab5638
IKE:
responder cookie: 0x599cb6a1a4d3d0fb
ike ipv4 packet received with src 103.1.1.2 and dest 106.1.1.1 vrf 0 length 88
IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=721, type=37, init=1
IKE: Message decrypted 88 bytes
IKE: ipike_check_payloads() :: no payloads exist according to the ISAKMP header
IKE: ipike_isakmp_process_message_response() :: destroying completed exchange
IKE: ipike_isakmp_free_exchange() :: exchange 193/1/9 type - INFORMATIONAL
IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=0, type=0, init=0 -> val =

13 20:28:40 IKE: Releasing IKE SA (ref count 0), for tunnel 2
13 20:28:40 IKE:
initiator cookie: 0xe6e53f1404a54b7c
13 20:28:40 IKE:
responder cookie: 0xf81e5e7816388386

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ikev2

The following command debugs IKEv2 trace info.
device# debug ikev2 trace info
IKEV2: trace info is enabled
DUT1#Debug: Mar 13 20:27:18 IKE: Received response 18.18.18.2[500], INFORMATIONAL, #2(2), ID 2da
Debug: Mar 13 20:27:18 IKE: informational exchange done
Debug: Mar 13 20:27:18 IKE: Received response 13.13.13.2[500], INFORMATIONAL, #2(2), ID 2
Debug: Mar 13 20:27:18 IKE: informational exchange done
Debug: Mar 13 20:27:18 IKE: Received response 4.4.4.2[500], INFORMATIONAL, #2(2), ID 2bc
Debug: Mar 13 20:27:18 IKE: informational exchange done
Debug: Mar 13 20:27:28 IKE: Received response 22.22.22.2[500], INFORMATIONAL, #2(2), ID 2de
Debug: Mar 13 20:27:28 IKE: informational exchange done
Debug: Mar 13 20:27:28 IKE: Received response 2.2.2.2[500], INFORMATIONAL, #2(2), ID 2c7
Debug: Mar 13 20:27:28 IKE: informational exchange done

The following command debugs IKEv2 packet.
device# debug ikev2 packet
IKEV2:
Debug:
Debug:
88
Debug:
Debug:
Debug:
88
Debug:
Debug:
length
Debug:
Debug:
Debug:
Debug:
Debug:
length
Debug:
Debug:
Debug:
Debug:
length
Debug:
Debug:
Debug:
Debug:
length
Debug:

packet debugging is on
Mar 13 20:29:26 ike ipv4 packet received with src 122.1.1.2 and dest 120.1.1.1 vrf 3 length 88
Mar 13 20:29:26 ike_transmit_packet send packet to 122.1.1.2:500 from 120.1.1.1:500 vrf:3 length
Mar 13 20:29:26 IKE sub task: packet transmitted to 122.1.1.2
Mar 13 20:29:37 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 88
Mar 13 20:29:37 ike_transmit_packet send packet to 102.1.1.2:500 from 100.1.1.1:500 vrf:0 length
Mar
Mar
88
Mar
Mar
Mar
Mar
Mar
248
Mar
Mar
Mar
Mar
88
Mar
Mar
Mar
Mar
88
Mar

13 20:29:37 IKE sub task: packet transmitted to 102.1.1.2
13 20:29:41 ike_transmit_packet send packet to 12.12.12.2:500 from 12.12.12.1:500 vrf:0
13
13
13
13
13

20:29:41
20:29:41
20:29:58
20:29:58
20:29:58

IKE sub task: packet transmitted to 12.12.12.2
ike ipv4 packet received with src 12.12.12.2 and dest 12.12.12.1 vrf 0 length 88
IKE: Create notify payload with message type 16393
IKE: Create notify payload with message type 16394
ike_transmit_packet send packet to 20.20.20.2:500 from 20.20.20.1:500 vrf:0

13
13
13
13

20:29:58
20:29:58
20:29:58
20:29:58

IKE sub task: packet transmitted to 20.20.20.2
ike ipv4 packet received with src 20.20.20.2 and dest 20.20.20.1 vrf 0 length 248
IKE: Process initial contact notify payload for tunnel 20
ike_transmit_packet send packet to 20.20.20.2:500 from 20.20.20.1:500 vrf:0

13
13
13
13

20:29:58
20:29:58
20:29:58
20:29:58

IKE sub task: packet transmitted to 20.20.20.2
ike ipv4 packet received with src 20.20.20.2 and dest 20.20.20.1 vrf 0 length 88
ike ipv4 packet received with src 20.20.20.2 and dest 20.20.20.1 vrf 0 length 88
ike_transmit_packet send packet to 20.20.20.2:500 from 20.20.20.1:500 vrf:0

13 20:29:58 IKE sub task: packet transmitted to 20.20.20.2

The following command debugs IKEv2 send packet.
device# debug ikev2 packet send
Debug: Mar 13 20:30:53 ike_transmit_packet send packet to 19.19.19.2:500 from 19.19.19.1:500 vrf:0
length 88

The following command debugs IKEv2 receive packet.
device# debug ikev2 packet receive
Debug:
length
Debug:
Debug:
Debug:
Debug:

Debug:
80
Mar 13
Mar 13
Mar 13
Mar 13

Mar 13 20:31:32 ike ipv4 packet received with src 13.13.13.2 and dest 13.13.13.1 vrf 0
20:32:10
20:32:11
20:32:26
20:32:26

ike
ike
ike
ike

ipv4
ipv4
ipv4
ipv4

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

packet
packet
packet
packet

received
received
received
received

with
with
with
with

src
src
src
src

122.1.1.2 and dest 120.1.1.1 vrf 3 length 88
122.1.1.2 and dest 120.1.1.1 vrf 3 length 88
18.18.18.2 and dest 18.18.18.1 vrf 0 length 88
4.4.4.2 and dest 4.4.4.1 vrf 0 length 88

71

debug ikev2

The following command debugs IKEv2 packets in detail.
device# debug ikev2 packet detail
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:

72

Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar

13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13

20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:17
20:33:23
20:33:23
20:33:23
20:33:23
20:33:23
20:33:23
20:33:23
20:33:23
20:33:23
20:33:23

+++ ISAKMP package start (message # 1) +++
< IKE Header >
IKE_SA Initiator's SPI: 0x333aa6c1ea301ed5
IKE_SA Responder's SPI: 0xb311338eb36cd7de
Next Payload:
none (0)
Version:
2.0
Exchange Type:
INFORMATIONAL
Flags:
[ INITIATOR ]
Message ID:
684
Length:
28 (#x)
--- ISAKMP package end (message # 1) --+++ ISAKMP package start (message # 2) +++
< IKE Header >
IKE_SA Initiator's SPI: 0x333aa6c1ea301ed5
IKE_SA Responder's SPI: 0xb311338eb36cd7de
Next Payload:
none (0)
Version:
2.0
Exchange Type:
INFORMATIONAL
Flags:
[ RESPONSE ]
Message ID:
684
Length:
28 (#x)
--- ISAKMP package end (message # 2) --+++ ISAKMP package start (message # 1) +++
< IKE Header >
IKE_SA Initiator's SPI: 0x506e28a9b3870d90
IKE_SA Responder's SPI: 0xb860b97a5b1995b8
Next Payload:
none (0)
Version:
2.0
Exchange Type:
INFORMATIONAL
Flags:
[ ]
Message ID:
2
Length:
28 (#x)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ikev2

The following command debugs all IKEv2 instances.
device# debug ikev2 all
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
looking up
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
entry
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
looking up
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
entry
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
f2d6968f
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar

13
13
13
13
13
13
13
13
in
13
13
13
13

20:38:39 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 88
20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=6, type=37, init=0
20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=6, type=37, init=0
20:38:39 IKE: New exchange started (INFORMATIONAL with Message ID: 6)
20:38:39 IKE: Locking IKE SA (ref count 1)
20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44,
config database
20:38:39 IKE: Releasing IKE SA (ref count 0), for tunnel 44
20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB

13
13
13
13
in
13
13
13
13

20:38:39 IKE: Locking IKE SA (ref count 1)
20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44,
config database
20:38:39 IKE: Releasing IKE SA (ref count 0), for tunnel 44
20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB

13
13
13
13

20:38:39
20:38:39
20:38:39
20:38:39

IKE: Locking IKE SA (ref count 1)
IKE:
initiator cookie: 0xd762b2a1b460a8da
IKE:
responder cookie: 0x22e7083e0ef7753a
IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=6, type=37, init=0 -> val =

13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13

20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39

IKE: ipike_isakmp_hash_add() :: hash: id=6, type=37, init=0, phase1=0
IKE: Received request 102.1.1.2[500], INFORMATIONAL, #1(2), ID 6
IKE: Message decrypted 88 bytes
+++ ISAKMP package start (message # 1) +++
< IKE Header >
IKE_SA Initiator's SPI: 0xd762b2a1b460a8da
IKE_SA Responder's SPI: 0x22e7083e0ef7753a
Next Payload:
delete (42)
Version:
2.0
Exchange Type:
INFORMATIONAL
Flags:
[ INITIATOR ]
Message ID:
6
Length:
40 (#x)
IKE:
< delete >
IKE:
Next Payload: none (0)
IKE:
Payload Length: 12 (#x)
IKE:
protocol ID: IPSEC_ESP
IKE:
SPI 1: 00001748
--- ISAKMP package end (message # 1) --IKE: Deleting IPsec SA
IKE: Deleting IPsec SA
IKE: Sending response to 102.1.1.2 [500]
+++ ISAKMP package start (message # 2) +++
< IKE Header >
IKE_SA Initiator's SPI: 0xd762b2a1b460a8da
IKE_SA Responder's SPI: 0x22e7083e0ef7753a
Next Payload:
delete (42)
Version:
2.0
Exchange Type:
INFORMATIONAL
Flags:
[ RESPONSE ]
Message ID:
6
Length:
40 (#x)
IKE:
< delete >
IKE:
Next Payload: none (0)
IKE:
Payload Length: 12 (#x)
IKE:
protocol ID: IPSEC_ESP
IKE:
SPI 1: 00000b81
--- ISAKMP package end (message # 2) ---

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

73

debug ikev2

Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
'tunnel44'
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
responder for
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
Debug: Mar 13
(tunnel44_0)

20:38:39
20:38:39
20:38:39
20:38:39
20:38:39

IKE:
IKE:
IKE:
IKE:
IKE:

20:38:39 IKE:
20:38:39 IKE:
20:38:39 IKE:
20:38:39 IKE:
20:38:39 IKE:
20:38:39 IKE:
20:38:39 IKE:
tunnel 44
20:38:39 IKE:
20:38:39 IKE:
20:38:39 IKE:
20:38:39 IKE:

Sending message 102.1.1.2[500]: INFORMATIONAL, #2(2), ID 6
Message encrypted 88 bytes
Send 88 octets from 100.1.1.1:500 to 102.1.1.2:500
informational exchange done
ipike_isakmp_add_ipsec_negotiation() :: Adding IPsec negotiation for
ipike_isakmp_add_ipsec_negotiation() :: looking up IKE SA based on addresses
local address: 100.1.1.1
remote address: 102.1.1.2
Locking IKE SA (ref count 2)
initiator cookie: 0xd762b2a1b460a8da
responder cookie: 0x22e7083e0ef7753a
ipike_isakmp_add_ipsec_negotiation() :: ipsec sa will not be started by
Releasing IKE SA (ref count 1), for tunnel 44
initiator cookie: 0xd762b2a1b460a8da
responder cookie: 0x22e7083e0ef7753a
ipike_dispatch_start_sa_negotiation() :: failed to start IPSec negotiation

SYSLOG: <14> Mar 13 20:38:39 DUT1 IPsec: IPSec session down Source 102.1.1.2 Destination 100.1.1.1 VRF
0 SPI 0xb81 Direction Ingress
SYSLOG: <14> Mar 13 20:38:39 DUT1 IPsec: IPSec session down Source 100.1.1.1 Destination 102.1.1.2 VRF
0 SPI 0x1748 Direction Egress
Debug: Mar 13 20:38:39 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 88
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=7, type=37, init=0
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=7, type=37, init=0
Debug: Mar 13 20:38:39 IKE: New exchange started (INFORMATIONAL with Message ID: 7)
Debug: Mar 13 20:38:39 IKE: Locking IKE SA (ref count 2)
Debug: Mar 13 20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
Debug: Mar 13 20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44,
looking up in config database
Debug: Mar 13 20:38:39 IKE: Releasing IKE SA (ref count 1), for tunnel 44
Debug: Mar 13 20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
Debug: Mar 13 20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB
entry
Debug: Mar 13 20:38:39 IKE: Locking IKE SA (ref count 2)
Debug: Mar 13 20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
Debug: Mar 13 20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44,
looking up in config database
Debug: Mar 13 20:38:39 IKE: Releasing IKE SA (ref count 1), for tunnel 44
Debug: Mar 13 20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
Debug: Mar 13 20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB
entry
Debug: Mar 13 20:38:39 IKE: Locking IKE SA (ref count 2)
Debug: Mar 13 20:38:39 IKE:
initiator cookie: 0xd762b2a1b460a8da
Debug: Mar 13 20:38:39 IKE:
responder cookie: 0x22e7083e0ef7753a
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=7, type=37, init=0 -> val =
bec1679
Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_add() :: hash: id=7, type=37, init=0, phase1=0
Debug: Mar 13 20:38:39 IKE: Received request 102.1.1.2[500], INFORMATIONAL, #1(2), ID 7
Debug: Mar 13 20:38:39 IKE: Message decrypted 88 bytes
Debug: Mar 13 20:38:39 +++ ISAKMP package start (message # 1) +++
Debug: Mar 13 20:38:39
< IKE Header >
Debug: Mar 13 20:38:39
IKE_SA Initiator's SPI: 0xd762b2a1b460a8da
Debug: Mar 13 20:38:39
IKE_SA Responder's SPI: 0x22e7083e0ef7753a
Debug: Mar 13 20:38:39
Next Payload:
delete (42)
Debug: Mar 13 20:38:39
Version:
2.0
Debug: Mar 13 20:38:39
Exchange Type:
INFORMATIONAL
Debug: Mar 13 20:38:39
Flags:
[ INITIATOR ]
Debug: Mar 13 20:38:39
Message ID:
7
Debug: Mar 13 20:38:39
Length:
36 (#x)
Debug: Mar 13 20:38:39 IKE:
< delete >
Debug: Mar 13 20:38:39 IKE:
Next Payload: none (0)
Debug: Mar 13 20:38:39 IKE:
Payload Length: 8 (#x)
Debug: Mar 13 20:38:39 IKE:
protocol ID: ISAKMP
Debug: Mar 13 20:38:39 --- ISAKMP package end (message # 1) ---

74

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ikev2

Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:

Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar

13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13

20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39

IKE: Setting IKE SA (ref count 2) state to dying
IKE:
initiator cookie: 0xd762b2a1b460a8da
IKE:
responder cookie: 0x22e7083e0ef7753a
IKE: Sending response to 102.1.1.2 [500]
+++ ISAKMP package start (message # 2) +++
< IKE Header >
IKE_SA Initiator's SPI: 0xd762b2a1b460a8da
IKE_SA Responder's SPI: 0x22e7083e0ef7753a
Next Payload:
none (0)
Version:
2.0
Exchange Type:
INFORMATIONAL
Flags:
[ RESPONSE ]
Message ID:
7
Length:
32 (#x)
--- ISAKMP package end (message # 2) --IKE: Sending message 102.1.1.2[500]: INFORMATIONAL, #2(2), ID 7
IKE: Message encrypted 88 bytes
IKE: Send 88 octets from 100.1.1.1:500 to 102.1.1.2:500
IKE: informational exchange done
IKE sub task: packet transmitted to 102.1.1.2

SYSLOG: <14> Mar 13 20:38:39 DUT1 IKEv2: IKEv2 session down Source 100.1.1.1 Destination 102.1.1.2 VRF
0 SPI 0xd762b2a1b460a8da
SYSLOG: <14> Mar 13 20:38:39 DUT1 PORT: tn44 down due to

- IKE session down

SYSLOG: <14> Mar 13 20:38:39 DUT1 System: Interface ipsec_tnnl
Debug: Mar 13 20:38:39 IKE: local public DH value
2520515a f7536f69 27413bc7 0efc4262 0f501aa6 0deeed19 6ad81b3e
cbc09936 34d4fe3d a60c2239 254a28f5 74225709 0bb186e0 95ee7777
b6c021f4 39894aba 4c3dc91a e1f8c018 089b1570 57179b21 2ddcfd10
Debug: Mar
78a81769
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar

44, state down

- IKE session down

192ca278
134fdc4c
284cb2a8

13 20:38:39 IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=0, type=0, init=1 -> val =
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13

20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39

IKE: ipike_isakmp_hash_add() :: hash: id=0, type=34, init=1, phase1=1
Add Payload 33
Add Payload 47
Add Payload 41
Add Payload 34
Add Payload 40
IKE: Sending request to 102.1.1.2 [500]
+++ ISAKMP package start (message # 1) +++
< IKE Header >
IKE_SA Initiator's SPI: 0x4731b3c6a38c0641
IKE_SA Responder's SPI: 0x0000000000000000
Next Payload:
security association (33)
Version:
2.0
Exchange Type:
IKE_SA_INIT
Flags:
[ INITIATOR ]
Message ID:
0
Length:
248 (#x)
IKE:
< security association >
IKE:
Next Payload: key exchange (34)
IKE:
Payload Length: 48 (#x)
<< proposal >>
Proposal #: 1
Protocol ID: ISAKMP
SPI Size:
0
IKE:
# of Transforms: 4
<<< transform >>>
Type: dh
ID:
ecp384
<<< transform >>>
Type: prf
ID:
sha384
<<< transform >>>
Type: encr
ID:
aes
Attr: 800e0100
<<< transform >>>
Type: integ
ID:
sha384

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

75

debug ikev2

Debug: Mar 13 20:38:39 IKE:
< key exchange >
Debug: Mar 13 20:38:39 IKE:
Next Payload: nonce (40)
Debug: Mar 13 20:38:39 IKE:
Payload Length: 104 (#x)
Debug: Mar 13 20:38:39 IKE:
dh group: 'ecp384'
Debug: Mar 13 20:38:39 IKE:
data:
2520515a f7536f69 27413bc7 0efc4262 0f501aa6 0deeed19 6ad81b3e 192ca278
cbc09936 34d4fe3d a60c2239 254a28f5 74225709 0bb186e0 95ee7777 134fdc4c
b6c021f4 39894aba 4c3dc91a e1f8c018 089b1570 57179b21 2ddcfd10 284cb2a8
Debug: Mar 13 20:38:39 IKE:
< nonce >
Debug: Mar 13 20:38:39 IKE:
Next Payload: none (0)
Debug: Mar 13 20:38:39 IKE:
Payload Length: 68 (#x)
Debug: Mar 13 20:38:39 IKE:
data:
434bf3f8 3efe8553 e8c81844 2e3eed96 00380268 1908602d cd1437c2 624f4190
d00d7fe2 4e7fc709 20bdcc44 7373f178 0dfdd62c 370a97dc c01d7f35 3a0f6a3e
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
248
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
addresses
Debug: Mar
addresses
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
9b36fb21
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar
Debug: Mar

76

13
13
13
13
13
13
13
13
13
13

20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39
20:38:39

--- ISAKMP package end (message # 1) --IKE: Sending message 102.1.1.2[500]: IKE_SA_INIT, #1(4), ID 0
IKE: Send 248 octets from 100.1.1.1:500 to 102.1.1.2:500
IKE: Locking IKE SA (ref count 2)
IKE:
initiator cookie: 0x4731b3c6a38c0641
IKE:
responder cookie: 0x0000000000000000
IKE: Releasing IKE SA (ref count 1), for tunnel 44
IKE:
initiator cookie: 0x4731b3c6a38c0641
IKE:
responder cookie: 0x0000000000000000
ike_transmit_packet send packet to 102.1.1.2:500 from 100.1.1.1:500 vrf:0 length

13
13
13
13
13
13

20:38:39
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42

IKE sub task: packet transmitted to 102.1.1.2
ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 248
IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=0, type=0, init=0
IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=0, type=0, init=0
IKE: New exchange started (IKE_SA_INIT with Message ID: 0)
IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on

13 20:38:42 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on
13
13
13
13
13
13
13

20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42

IKE: Setting IKE SA (ref count 0) state to constructing
IKE:
initiator cookie: 0x20beacbe38bcb465
IKE:
responder cookie: 0x7f672fffc23b040d
IKE: Locking IKE SA (ref count 1)
IKE:
initiator cookie: 0x20beacbe38bcb465
IKE:
responder cookie: 0x7f672fffc23b040d
IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=0, type=0, init=0 -> val =

13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13

20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42

IKE: ipike_isakmp_hash_add() :: hash: id=0, type=34, init=0, phase1=1
IKE: Received request 102.1.1.2[500], IKE_SA_INIT, #1(4), ID 0
+++ ISAKMP package start (message # 1) +++
< IKE Header >
IKE_SA Initiator's SPI: 0x20beacbe38bcb465
IKE_SA Responder's SPI: 0x0000000000000000
Next Payload:
security association (33)
Version:
2.0
Exchange Type:
IKE_SA_INIT
Flags:
[ INITIATOR ]
Message ID:
0
Length:
248 (#x)
IKE:
< security association >
IKE:
Next Payload: key exchange (34)
IKE:
Payload Length: 48 (#x)
<< proposal >>
Proposal #: 1
Protocol ID: ISAKMP
SPI Size:
0
IKE:
# of Transforms: 4
<<< transform >>>
Type: dh
ID:
ecp384
<<< transform >>>
Type: prf
ID:
sha384
<<< transform >>>
Type: encr
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ikev2

Debug: Mar 13 20:38:42
ID:
aes
Debug: Mar 13 20:38:42
Attr: 800e0100
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: integ
Debug: Mar 13 20:38:42
ID:
sha384
Debug: Mar 13 20:38:42 IKE:
< key exchange >
Debug: Mar 13 20:38:42 IKE:
Next Payload: nonce (40)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 104 (#x)
Debug: Mar 13 20:38:42 IKE:
dh group: 'ecp384'
Debug: Mar 13 20:38:42 IKE:
data:
d4d789d3 2d30c979 d856295d 5b740be8 32a7b1ff 6626d3d1 0d51f79c 9573fa48
4d158059 89d81198 1b525537 1c96102b e97e073d 8fe4b757 ebbbc40c 6ef76a3a
f5ac68f4 b24c094c 9af9c60d c8a02faa 9506dad8 5be9fe78 cf979743 22856a11
Debug: Mar 13 20:38:42 IKE:
< nonce >
Debug: Mar 13 20:38:42 IKE:
Next Payload: none (0)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 68 (#x)
Debug: Mar 13 20:38:42 IKE:
data:
2d9db0d5 6453b7f2 0accc5d2 6117d17c 77518abf 1ff952d6 540658e0 98f4019d
c65b6824 ac19716d 25a398cd 16717c6d dc870989 149cff89 9ca77cf8 bbccb6f9
Debug: Mar 13 20:38:42 --- ISAKMP package end (message # 1) --Debug: Mar 13 20:38:42 IKE: selected 'aes' as encryption algorithm
Debug: Mar 13 20:38:42 IKE: selected '256' as key length
Debug: Mar 13 20:38:42 IKE: selected 'sha384' as hash algorithm
Debug: Mar 13 20:38:42 IKE: selected 'sha384' as integrity algorithm
Debug: Mar 13 20:38:42 IKE: selected 'ecp384' as DH group description
Debug: Mar 13 20:38:42 IKE: local public DH value
f20a76e2 a5f4ffd3 f1e602db 175e27a5 de6ee0bb 5398912b e42aa726 3707bffa
af06f3ab 07bd6d5e 91977b7d 71c29893 c6319ef9 5a8d8dbf 7d2f177c c6dd270b
01f81f5d 8fb8c352 6da36969 1c8252aa 4c251cda 68c6d48e 4dff1b3b 93644bbd
Debug: Mar 13 20:38:42 IKE: remote public DH
d4d789d3 2d30c979 d856295d 5b740be8 32a7b1ff
4d158059 89d81198 1b525537 1c96102b e97e073d
f5ac68f4 b24c094c 9af9c60d c8a02faa 9506dad8

value
6626d3d1 0d51f79c 9573fa48
8fe4b757 ebbbc40c 6ef76a3a
5be9fe78 cf979743 22856a11

Debug: Mar 13 20:38:42 IKE: g^xy
23eb98ce 75f9e6b9 db74f391 943d6e62 99c1a70e 99661d30 5f2115b4 006abec2
d8c75633 dbac2fed 34812aea a6b37510
Debug: Mar 13 20:38:42 IKE: SKEYSEED: 6460e276 5e8521ee 2c660e02 672a1b40 1f9360af a9fa2d6a 3f2d7d7b
f063f98f
9c10967d 06c5267b ab3fd497 28ce695e
Debug: Mar 13 20:38:42 IKE: Key d: d7c69fef 8f72fc49 0e059883 0a2809ce ea4a0920 e64914b7 da218b46
2b8b72fe
1f9e9c1c 5beda8da d4d4de43 3ba53661
Debug: Mar 13 20:38:42 IKE: Key ai: 4489ba21 e8a914c5 3a13694f f647c46b fbf0cef7 0ceb4c5d bdb623a5
5f4b01c5
62558333 0da07993 c6d187e0 1e638cb7
Debug: Mar 13 20:38:42 IKE: Key ar: 377095ad 1251bd49 265d66ef 3aaa090d d353bfff e98f651b 96a0ecfb
cd7c68d4
5058e99d 7e332161 8169a04e 8bae393f
Debug: Mar 13 20:38:42 IKE: Key ei: 8c31e91d f8011cdd c1674ea5 73b0ad12 6e60cc70 74cbf967 dbd35a49
99f0a679
Debug: Mar 13 20:38:42 IKE: Key er: 8e7881ff bf853fe2 a7b43864 67f9a587 827740e9 7f63125b 34526ac1
510b23fe
Debug: Mar 13 20:38:42 IKE: Key pi: f2646dde d9f565c4 72c1382e 94febb13 49762791 1152c357 64e7613f
00c538bb
ec2f5d4b 8c63b249 405769e9 35d8936c
Debug: Mar 13 20:38:42 IKE: Key pr: a917acb3 b370f56e 7501c8bc 50209201 375c7d6e 48820e68 f442c1a0
011d5f49
3773a2e1 23e8e867 6c288dcc f8d59a13
Debug: Mar 13 20:38:42 Add Payload 33
Debug: Mar 13 20:38:42 Add Payload 47
Debug: Mar 13 20:38:42 Add Payload 41
Debug: Mar 13 20:38:42 Add Payload 34
Debug: Mar 13 20:38:42 Add Payload 40
Debug: Mar 13 20:38:42 Add Payload 38
Debug: Mar 13 20:38:42 IKE: Sending response to 102.1.1.2 [500]
Debug: Mar 13 20:38:42 +++ ISAKMP package start (message # 2) +++
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

77

debug ikev2

Debug: Mar 13 20:38:42
< IKE Header >
Debug: Mar 13 20:38:42
IKE_SA Initiator's SPI: 0x20beacbe38bcb465
Debug: Mar 13 20:38:42
IKE_SA Responder's SPI: 0x7f672fffc23b040d
Debug: Mar 13 20:38:42
Next Payload:
security association (33)
Debug: Mar 13 20:38:42
Version:
2.0
Debug: Mar 13 20:38:42
Exchange Type:
IKE_SA_INIT
Debug: Mar 13 20:38:42
Flags:
[ RESPONSE ]
Debug: Mar 13 20:38:42
Message ID:
0
Debug: Mar 13 20:38:42
Length:
248 (#x)
Debug: Mar 13 20:38:42 IKE:
< security association >
Debug: Mar 13 20:38:42 IKE:
Next Payload: key exchange (34)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 48 (#x)
Debug: Mar 13 20:38:42
<< proposal >>
Debug: Mar 13 20:38:42
Proposal #: 1
Debug: Mar 13 20:38:42
Protocol ID: ISAKMP
Debug: Mar 13 20:38:42
SPI Size:
0
Debug: Mar 13 20:38:42 IKE:
# of Transforms: 4
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: encr
Debug: Mar 13 20:38:42
ID:
aes
Debug: Mar 13 20:38:42
Attr: 800e0100
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: integ
Debug: Mar 13 20:38:42
ID:
sha384
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: prf
Debug: Mar 13 20:38:42
ID:
sha384
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: dh
Debug: Mar 13 20:38:42
ID:
ecp384
Debug: Mar 13 20:38:42 IKE:
< key exchange >
Debug: Mar 13 20:38:42 IKE:
Next Payload: nonce (40)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 104 (#x)
Debug: Mar 13 20:38:42 IKE:
dh group: 'ecp384'
Debug: Mar 13 20:38:42 IKE:
data:
f20a76e2 a5f4ffd3 f1e602db 175e27a5 de6ee0bb 5398912b e42aa726 3707bffa
af06f3ab 07bd6d5e 91977b7d 71c29893 c6319ef9 5a8d8dbf 7d2f177c c6dd270b
01f81f5d 8fb8c352 6da36969 1c8252aa 4c251cda 68c6d48e 4dff1b3b 93644bbd
Debug: Mar 13 20:38:42 IKE:
< nonce >
Debug: Mar 13 20:38:42 IKE:
Next Payload: none (0)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 68 (#x)
Debug: Mar 13 20:38:42 IKE:
data:
1d49d2fa 0b2c88d1 c01bcd5e 70dedfcd ef78d6dc e71584f0 df6beb24 38ff4e28
a431ba8f 892328dd e00f6029 9df67ff7 0d68de7a 143ca305 c42bbe53 78493a7f
Debug:
Debug:
Debug:
Debug:
248
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:

78

Mar
Mar
Mar
Mar

13
13
13
13

20:38:42
20:38:42
20:38:42
20:38:42

--- ISAKMP package end (message # 2) --IKE: Sending message 102.1.1.2[500]: IKE_SA_INIT, #2(4), ID 0
IKE: Send 248 octets from 100.1.1.1:500 to 102.1.1.2:500
ike_transmit_packet send packet to 102.1.1.2:500 from 100.1.1.1:500 vrf:0 length

Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar
Mar

13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13

20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42
20:38:42

IKE sub task: packet transmitted to 102.1.1.2
ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 248
IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=0, type=0, init=0
IKE: Received request 102.1.1.2[500], IKE_AUTH, #3(4), ID 1
IKE: Message decrypted 248 bytes
+++ ISAKMP package start (message # 3) +++
< IKE Header >
IKE_SA Initiator's SPI: 0x20beacbe38bcb465
IKE_SA Responder's SPI: 0x7f672fffc23b040d
Next Payload:
notify (41)
Version:
2.0
Exchange Type:
IKE_AUTH
Flags:
[ INITIATOR ]
Message ID:
1
Length:
188 (#x)
IKE:
< notify >
IKE:
Next Payload: identification initiator (35)
IKE:
Payload Length: 8 (#x)
IKE:
message type: ESP_TFC_PADDING_NOT_SUPPORTED (16394)
IKE:
< identification initiator >
IKE:
Next Payload: authentication (39)
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ikev2

Debug: Mar 13 20:38:42 IKE:
Payload Length: 12 (#x)
Debug: Mar 13 20:38:42 IKE:
id type: address
Debug: Mar 13 20:38:42 IKE:
id data: 00000000
Debug: Mar 13 20:38:42 IKE:
< authentication >
Debug: Mar 13 20:38:42 IKE:
Next Payload: security association (33)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 56 (#x)
Debug: Mar 13 20:38:42 IKE:
method: 'pre_shared_key'
Debug: Mar 13 20:38:42 IKE:
data:
bf993791 8f2d42f5 3bc3ccad 59b8f2a5 761d9a83 d195d5d2 0f70de64 a5d0e677
25c2613a 47e72571 446cb83c 578f7b89
Debug: Mar 13 20:38:42 IKE:
< security association >
Debug: Mar 13 20:38:42 IKE:
Next Payload: traffic selector initiator (44)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 36 (#x)
Debug: Mar 13 20:38:42
<< proposal >>
Debug: Mar 13 20:38:42
Proposal #: 1
Debug: Mar 13 20:38:42
Protocol ID: IPSEC_ESP
Debug: Mar 13 20:38:42
SPI Size:
4
Debug: Mar 13 20:38:42 IKE:
spi data:
0000230e
Debug: Mar 13 20:38:42 IKE:
# of Transforms: 2
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: encr
Debug: Mar 13 20:38:42
ID:
aes256gcm
Debug: Mar 13 20:38:42
Attr: 800e0100
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: esn
Debug: Mar 13 20:38:42
ID:
off
Debug: Mar 13 20:38:42 IKE:
< traffic selector initiator >
Debug: Mar 13 20:38:42 IKE:
Next Payload: traffic selector responder (45)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 24 (#x)
Debug: Mar 13 20:38:42 IKE:
Protocol:
any
Debug: Mar 13 20:38:42 IKE:
Address start: 0.0.0.0
Debug: Mar 13 20:38:42 IKE:
Address end:
255.255.255.255
Debug: Mar 13 20:38:42 IKE:
Port start:
0
Debug: Mar 13 20:38:42 IKE:
Port end:
65535
Debug: Mar 13 20:38:42 IKE:
< traffic selector responder >
Debug: Mar 13 20:38:42 IKE:
Next Payload: none (0)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 24 (#x)
Debug: Mar 13 20:38:42 IKE:
Protocol:
any
Debug: Mar 13 20:38:42 IKE:
Address start: 0.0.0.0
Debug: Mar 13 20:38:42 IKE:
Address end:
255.255.255.255
Debug: Mar 13 20:38:42 IKE:
Port start:
0
Debug: Mar 13 20:38:42 IKE:
Port end:
65535
Debug: Mar 13 20:38:42 --- ISAKMP package end (message # 3) --Debug: Mar 13 20:38:42 IKE: Process initial contact notify payload for tunnel 44
Debug: Mar 13 20:38:42 IKE: ipike_crypto_read_cert: could not open tunnel_44
Debug: Mar 13 20:38:42 IKE: Message:
20beacbe 38bcb465 00000000 00000000 21202208 00000000 000000f8 22000030
0000002c 01010004 03000008 04000014 03000008 02000006 0300000c 0100000c
800e0100 00000008 0300000d 28000068 00140000 d4d789d3 2d30c979 d856295d
5b740be8 32a7b1ff 6626d3d1 0d51f79c 9573fa48 4d158059 89d81198 1b525537
1c96102b e97e073d 8fe4b757 ebbbc40c 6ef76a3a f5ac68f4 b24c094c 9af9c60d
c8a02faa 9506dad8 5be9fe78 cf979743 22856a11 00000044 2d9db0d5 6453b7f2
0accc5d2 6117d17c 77518abf 1ff952d6 540658e0 98f4019d c65b6824 ac19.
Debug: Mar 13 20:38:42 IKE: Authentication key:
7f602adf 7481a350 d4904150 ed0804b5 0a176fc3 46559ff4 19986e5f 5547be73
695b66ab 24eeabf4 1e9eabfa a0b0c75c
Debug: Mar 13 20:38:42 IKE: Authentication data:
bf993791 8f2d42f5 3bc3ccad 59b8f2a5 761d9a83 d195d5d2 0f70de64 a5d0e677
25c2613a 47e72571 446cb83c 578f7b89
Debug: Mar 13 20:38:42 IKE: Message:
20beacbe 38bcb465 7f672fff c23b040d 21202220 00000000 000000f8 22000030
0000002c 01010004 0300000c 0100000c 800e0100 03000008 0300000d 03000008
02000006 00000008 04000014 28000068 00140000 f20a76e2 a5f4ffd3 f1e602db
175e27a5 de6ee0bb 5398912b e42aa726 3707bffa af06f3ab 07bd6d5e 91977b7d
71c29893 c6319ef9 5a8d8dbf 7d2f177c c6dd270b 01f81f5d 8fb8c352 6da36969
1c8252aa 4c251cda 68c6d48e 4dff1b3b 93644bbd 00000044 1d49d2fa 0b2c88d1
c01bcd5e 70dedfcd ef78d6dc e71584f0 df6beb24 38ff4e28 a431ba8f 8923.
Debug: Mar 13 20:38:42 IKE: Authentication key:
7f602adf 7481a350 d4904150 ed0804b5 0a176fc3 46559ff4 19986e5f 5547be73
695b66ab 24eeabf4 1e9eabfa a0b0c75c
Debug: Mar 13 20:38:42 IKE: Authentication data:
3d9760af 143f7e57 7cd521b6 8034ddab e23e101c 54a584de d7ab54e9 0ce3365b
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

79

debug ikev2

ab6d5db3 69d288eb 294c2aed f7f19a2c
Debug: Mar 13 20:38:42 IKE: use_esn from config: off
Debug: Mar 13 20:38:42 IKE: selected 'aes256gcm' as encryption algorithm
Debug: Mar 13 20:38:42 IKE: selected '256' as key length
Debug: Mar 13 20:38:42 IKE: selected 'off' for ESN
Debug: Mar 13 20:38:42 Add Payload 47
Debug: Mar 13 20:38:42 Add Payload 41
Debug: Mar 13 20:38:42 IKE: Create notify payload with message type 16394
Debug: Mar 13 20:38:42 Add Payload 36
Debug: Mar 13 20:38:42 Add Payload 37
Debug: Mar 13 20:38:42 Add Payload 39
Debug: Mar 13 20:38:42 Add Payload 33
Debug: Mar 13 20:38:42 Add Payload 44
Debug: Mar 13 20:38:42 Add Payload 45
Debug: Mar 13 20:38:42 Add Payload 48
Debug: Mar 13 20:38:42 IKE: Sending response to 102.1.1.2 [500]
Debug: Mar 13 20:38:42 +++ ISAKMP package start (message # 4) +++
Debug: Mar 13 20:38:42
< IKE Header >
Debug: Mar 13 20:38:42
IKE_SA Initiator's SPI: 0x20beacbe38bcb465
Debug: Mar 13 20:38:42
IKE_SA Responder's SPI: 0x7f672fffc23b040d
Debug: Mar 13 20:38:42
Next Payload:
notify (41)
Debug: Mar 13 20:38:42
Version:
2.0
Debug: Mar 13 20:38:42
Exchange Type:
IKE_AUTH
Debug: Mar 13 20:38:42
Flags:
[ RESPONSE ]
Debug: Mar 13 20:38:42
Message ID:
1
Debug: Mar 13 20:38:42
Length:
188 (#x)
Debug: Mar 13 20:38:42 IKE:
< notify >
Debug: Mar 13 20:38:42 IKE:
Next Payload: identification responder (36)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 8 (#x)
Debug: Mar 13 20:38:42 IKE:
message type: ESP_TFC_PADDING_NOT_SUPPORTED (16394)
Debug: Mar 13 20:38:42 IKE:
< identification responder >
Debug: Mar 13 20:38:42 IKE:
Next Payload: authentication (39)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 12 (#x)
Debug: Mar 13 20:38:42 IKE:
id type: address
Debug: Mar 13 20:38:42 IKE:
id data: 00000000
Debug: Mar 13 20:38:42 IKE:
< authentication >
Debug: Mar 13 20:38:42 IKE:
Next Payload: security association (33)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 56 (#x)
Debug: Mar 13 20:38:42 IKE:
method: 'pre_shared_key'
Debug: Mar 13 20:38:42 IKE:
data:
3d9760af 143f7e57 7cd521b6 8034ddab e23e101c 54a584de d7ab54e9 0ce3365b
ab6d5db3 69d288eb 294c2aed f7f19a2c
Debug: Mar 13 20:38:42 IKE:
< security association >
Debug: Mar 13 20:38:42 IKE:
Next Payload: traffic selector initiator (44)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 36 (#x)
Debug: Mar 13 20:38:42
<< proposal >>
Debug: Mar 13 20:38:42
Proposal #: 1
Debug: Mar 13 20:38:42
Protocol ID: IPSEC_ESP
Debug: Mar 13 20:38:42
SPI Size:
4
Debug: Mar 13 20:38:42 IKE:
spi data:
000007fe
Debug: Mar 13 20:38:42 IKE:
# of Transforms: 2
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: esn
Debug: Mar 13 20:38:42
ID:
off
Debug: Mar 13 20:38:42
<<< transform >>>
Debug: Mar 13 20:38:42
Type: encr
Debug: Mar 13 20:38:42
ID:
aes256gcm
Debug: Mar 13 20:38:42
Attr: 800e0100
Debug: Mar 13 20:38:42 IKE:
< traffic selector initiator >
Debug: Mar 13 20:38:42 IKE:
Next Payload: traffic selector responder (45)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 24 (#x)
Debug: Mar 13 20:38:42 IKE:
Protocol:
any
Debug: Mar 13 20:38:42 IKE:
Address start: 0.0.0.0
Debug: Mar 13 20:38:42 IKE:
Address end:
255.255.255.255
Debug: Mar 13 20:38:42 IKE:
Port start:
0
Debug: Mar 13 20:38:42 IKE:
Port end:
65535
Debug: Mar 13 20:38:42 IKE:
< traffic selector responder >
Debug: Mar 13 20:38:42 IKE:
Next Payload: none (0)
Debug: Mar 13 20:38:42 IKE:
Payload Length: 24 (#x)
Debug: Mar 13 20:38:42 IKE:
Protocol:
any
Debug: Mar 13 20:38:42 IKE:
Address start: 0.0.0.0

80

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ikev2

Debug: Mar 13 20:38:42
Debug: Mar 13 20:38:42
Debug: Mar 13 20:38:42
Debug: Mar 13 20:38:42
Debug: Mar 13 20:38:42
Debug: Mar 13 20:38:42
Debug: Mar 13 20:38:42
Debug: Mar 13 20:38:42
'tunnel44'
Debug: Mar 13 20:38:42
2703818e ff5aad8f
2720eb1c
Debug: Mar 13 20:38:42
dbab15f4 19fb8280
3e30fe3d

IKE:
Address end:
255.255.255.255
IKE:
Port start:
0
IKE:
Port end:
65535
--- ISAKMP package end (message # 4) --IKE: Sending message 102.1.1.2[500]: IKE_AUTH, #4(4), ID 1
IKE: Message encrypted 248 bytes
IKE: Send 248 octets from 100.1.1.1:500 to 102.1.1.2:500
IKE: ipike_sadb_get_from_ike_config() :: no IKE SA for peer 102.1.1.2, config id
IKE: Enc key inbound:

2d551d4a f27a5382 d6139507 9cd7ba09 b801f9f8 585ecd81

IKE: Enc key outbound: c1984de9 10338d76 7d7c1d7a d47b84ee e9d7ba33 a116b639

History
Release version

Command history

8.0.41

This command was introduced.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

81

debug ip arp

debug ip arp
Activates the debugging of ARP packets.

Syntax
debug ip arp ip-addr
no debug ip arp ip-addr

Parameters
ip-addr
Specifies a particular route.

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip arp 10.29.29.53
ARP: packets debugging is on
Brocade# show arp
Total
No.
1
2
3

number of ARP entries: 3, maximum capacity: 4000
IP Address
MAC Address
Type
Age Port
Status
10.29.29.53
0000.0034.1b60 Dynamic 0
2/1/15-2/1/16 Valid
10.200.200.45
0000.00cf.c400 Dynamic 0
1/1/13-1/1/14 Valid
10.30.30.31
0000.0023.0f00 Dynamic 0
2/1/9-2/1/10 Valid

device# clear arp
next hop router 10.29.29.53 ARP mapping deleted
Brocade# ARP: sent packet oper=request, src 10.29.29.111 0000.0076.2c80: dst 10.29.29.53
0000.0000.0000: Port v29
ARP: sent packet oper=request, src 10.200.200.111 0000.0076.2c80: dst 10.200.200.45 0000.0000.0000:
Port v2000
ARP: sent packet oper=request, src 10.30.30.111 0000.0076.2c80: dst 10.30.30.31 0000.0000.0000: Port
v300
ARP: sent packet oper=request, src 10.20.67.111 0000.0076.2c80: dst 10.20.10.11 0000.0000.0000: Port
mgmt1

82

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip arp inspection

debug ip arp inspection
Enables ARP inspection debugging.

Syntax
debug ip arp inspection
no debug ip arp inspection

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip arp inspection
ARP: inspection debugging is on
RX: rcvd ARP packet, brd 1, us 0, vlan 14 port 5/1/2
ARP: rcvd packet oper=request, src 10.3.3.13 0000.009d.8c69: dst 10.3.3.1 0000.0000.0000: Port e5/1/2
ARP: REQ inspection pass, 10.3.3.13->10.3.3.1, port 5/1/2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

83

debug ip arp inspection

debug ip arp inspection
Enables ARP inspection debugging.

Syntax
debug ip arp inspection
no debug ip arp inspection

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip arp inspection
ARP: inspection debugging is on
RX: rcvd ARP packet, brd 1, us 0, vlan 14 port 5/1/2
ARP: rcvd packet oper=request, src 10.3.3.13 0000.009d.8c69: dst 10.3.3.1 0000.0000.0000: Port e5/1/2
ARP: REQ inspection pass, 10.3.3.13->10.3.3.1, port 5/1/2

84

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip arp inspection

debug ip arp inspection
Enables ARP inspection debugging.

Syntax
debug ip arp inspection
no debug ip arp inspection

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip arp inspection
ARP: inspection debugging is on
RX: rcvd ARP packet, brd 1, us 0, vlan 14 port 5/1/2
ARP: rcvd packet oper=request, src 10.3.3.13 0000.009d.8c69: dst 10.3.3.1 0000.0000.0000: Port e5/1/2
ARP: REQ inspection pass, 10.3.3.13->10.3.3.1, port 5/1/2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

85

debug ip bgp

debug ip bgp
Enables common BGP debugging information to be displayed for all virtual routing and forwarding events (VRFs) or for a
specific VRF.

Syntax
debug ip bgp neighbor_ip_address
no debug ip bgp neighbor_ip_address

Parameters
neighbor_ip_address
The neighbor_ip_address variable refers to the IP address of the immediate neighbor.

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip bgp 10.1.34.10
BGP: neighbor 10.1.34.10 debugging is on
device# BGP: 10.1.34.10 rcv UPDATE w/attr: Origin=IGP AS_PATH=AS_CONFED_SEQUENCE(3) 64519
NextHop=10.1.34.10 MED=0 LOCAL_PREF=100
BGP: 10.1.34.10 rcv UPDATE 10.1.22.0/24
BGP: 10.1.34.10 rcv UPDATE w/attr: Origin=IGP AS_PATH=AS_CONFED_SEQUENCE(3) 64519 NextHop 10.1.34.10
MED=0 LOCAL_PREF=100
BGP: 10.1.34.10 rcv UPDATE 10.1.23.0/24

86

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip bgp dampening

debug ip bgp dampening
Displays information about dampening process configurations, route penalties, durations, restraint, and release.

Syntax
debug ip bgp dampening
no debug ip bgp dampening

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2
BGP: 10.1.1.2

ip bgp dampening
Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712
reuse_list_index=258, curr_offset=45
10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61,
Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712
reuse_list_index=258, curr_offset=45
10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61,
Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712
reuse_list_index=258, curr_offset=45
10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61,
Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712
reuse_list_index=258, curr_offset=45
10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61,
Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712
reuse_list_index=258, curr_offset=45
10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61,

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

offset=45
offset=45
offset=45
offset=45
offset=45

87

debug ip bgp events

debug ip bgp events
Generates information about BGP events, such as connection attempts and keepalive timer activity.

Syntax
debug ip bgp events
no debug ip bgp events

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip bgp events
BGP: events debugging is on
device# BGP: 10.1.34.10 rcv notification: CEASE Message
BGP: 10.1.34.10 Peer went to IDLE state (Rcv Notification)
BGP: 10.1.35.10 rcv notification: CEASE Message
BGP: 10.1.35.10 Peer went to IDLE state (Rcv Notification)
BGP: 10.1.34.10 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6
BGP: 10.1.35.10 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6
BGP: 10.1.34.10 rcv GR capability afi/safi=1/1 fbit 0
BGP: 10.1.34.10 Peer went to ESTABLISHED state
BGP: 10.1.35.10 rcv GR capability afi/safi=1/1 fbit 0
BGP: 10.1.35.10 Peer went to ESTABLISHED state
BGP: 10.1.34.10 rcv UPDATE EOR (0), waiting EOR 0
BGP: 10.1.35.10 rcv UPDATE EOR (0), waiting EOR 0
BGP: 10.1.34.10 sending EOR (safi 0)...
BGP: 10.1.35.10 sending EOR (safi 0)...

88

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip bgp graceful-restart

debug ip bgp graceful-restart
Displays information about BGP graceful restarts. The graceful restart feature minimizes disruptions in forwarding and route
flapping when a router restarts.

Syntax
debug ip bgp graceful-restart
no debug ip bgp graceful-restart

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip bgp graceful-restart
BGP: graceful-restart debugging is on
BGP: 10.1.251.6 save graceful restart parameters, #RIB_out 2 (safi 0)
10.1.251.6 RIB_out peer reset #RIB_out 2 (safi 0)
BGP: 10.1.251.6 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6
BGP: 10.1.251.6 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6
BGP: 10.1.251.6 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6
BGP: 10.1.251.6 rcv GR capability afi/safi=1/1 fbit 1
BGP: 10.1.251.6 sending EOR (safi 0)...

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

89

debug ip bgp keepalives

debug ip bgp keepalives
Displays information about the status of a resource such as BGP.

Syntax
debug ip bgp keepalives
no debug ip bgp keepalives

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip bgp keepalives
BGP: 10.1.1.2 sending KEEPALIVE
BGP: 10.1.1.2 KEEPALIVE received

90

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip bgp updates

debug ip bgp updates
Displays BGP receive, transmit, or receive and transmit update messages about debug processing.

Syntax
debug ip bgp updates
no debug ip bgp updates

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip bgp updates
BGP: safi(0): 10.1.1.2 sending UPDATE w/attr: Origin=IGP AS_PATH=65538 NEXT_HOP=10.1.1.1 MED=1
BGP: (0): 10.1.1.2 sending UPDATE Label=0 2001:DB8:83:e8:00:04:78:64:10.1.1.1/32
BGP: 10.1.1.2 rcv bad UPDATE (saif 0) due to AS loop, take as implicit withdraw!
BGP: BGP: 10.1.1.2 rcv UPDATE w/attr: Origin=INCOMP AS_PATH= AS_SEQ(2) 3 NextHop=10.1.1.2 MED=30
BGP: (0): 10.1.1.2 rcv UPDATE 10.1.1.2/32
BGP: 10.1.1.2 rcv bad UPDATE (saif 0) due to AS loop, take as implicit withdraw!
BGP: BGP: 10.1.1.2 rcv UPDATE w/attr: Origin=IGP AS_PATH= AS_SEQ(2) 3 NextHop=10.1.1.2 MED=5
BGP: (0): 10.1.1.2 rcv UPDATE 10.10.10.10/32
BGP: (0): 10.1.1.2 rcv UPDATE 10.213.0.0/16
BGP: (0): 10.1.1.2 rcv UPDATE 10.200.200.200/32
BGP: (0): 10.1.1.2 rcv UPDATE 10.18.18.0/24
BGP: (0): 10.1.1.2 rcv UPDATE 10.1.1.32/32

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

91

debug ip dhcp-snooping

debug ip dhcp-snooping
Enables debugging of the DHCP snooping activity.

Syntax
debug ip dhcp-snooping
no debug ip dhcp-snooping

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip dhcp-snooping
device(config-vif-11)# DHCP: snooping on for vlan 14, port 5/1/2
DHCP: rcv on port 5/1/2, intercept DHCP pkt, Discovr
DHCP: snooping on port 5/1/2, smac 0000.00ce.ac79, type 1, VRF 1 0.0.0.0->0000.00ce.ac79
DHCP Option82: Adding option 82
DHCP Option82: 20 bytes added.
DHCP Option82: Adding option 82
DHCP: snooping on for vlan 14, port 3/1/23
DHCP: rcv on port 3/1/23, intercept DHCP pkt, Offer
DHCP Option82: Removing option 82
DHCP Option82: 19 bytes removed.
DHCP Option82: Removing option 82
DHCP: snooping on for vlan 14, port 5/1/2
DHCP: rcv on port 5/1/2, intercept DHCP pkt, Request
DHCP: snooping on port 5/1/2, smac 0000.00ce.ac79, type 3, VRF 1 0.0.0.0->0000.00ce.ac79
DHCP Option82: Adding option 82
DHCP Option82: 20 bytes added.
DHCP Option82: Adding option 82

92

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip gre keepalive

debug ip gre keepalive
Activates Generic Routing Encapsulation (GRE) keepalive debugging.

Syntax
debug ip gre keepalive
no debug ip gre keepalive

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip gre keepalive
GRE_MP: Keepalive Bring DOWN GRE Tunnel 11
GRE_MP: Keepalive Bring UP GRE on Tunnel 11 - port is 2/1/2
GRE_MP: RX Keepalive packet on tnnl 11 src 10.22.33.254, dst 10.22.33.252
GRE_MP: TX Keepalive packet on tnnl 11 we need to find outgoing port
GRE_MP: TX Keepalive packet on tnnl 11 - outgoing_port is 2/1/2 with mac 0000.00bb.ef40 vlan 2
GRE_MP_KEEPALIVE: NO FREE BUFFER AVAILABLE
GRE_MP: For Tunnel 11, Keepalive timeout after 3 seconds
GRE_MP: For Tunnel 11, stop keep-alive
GRE_MP: For Tunnel 11, start keep-alive
GRE_MP: enqueue Keepalive packet on tunnel 11 at index 23
GRE_MP: dequeue Keepalive packet on tunnel 11 at index 23

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

93

debug ip gre log

debug ip gre log
Activates the tunnel events debugging.

Syntax
debug ip gre log
no debug ip gre log

Modes
Privileged EXEC mode

Usage Guidelines
The no form disables tunnel events debugging

94

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip gre log

Examples
device# debug ip gre log
Apply mtu 1400 failed for tunnel 11 as all mtu profiles are used
Clearing PMTU for tunnel 11 due to ip mtu 1400 configuration
Tunnel Create Sync-Receive event for tunnel: 11
Tunnel Create Sync-Successful for tunnel: 11
Tunnel Update TS Sync-Receive event for tunnel: 11
Tunnel Update TS Sync-Successful for tunnel: 11
Tunnel Update Nhop Sync-Receive event for tunnel: 11
Tunnel Update Nhop Sync-Successful for tunnel: 11
Tunnel Update TTI Sync-Receive event for tunnel: 11
Tunnel Port Up Sync-Receive event for tunnel: 11
Tunnel Port Up Sync-Successful for tunnel: 11
Tunnel Port Down Sync-Receive event for tunnel: 11
Tunnel Port Down Sync-Successful for tunnel: 11
Tunnel Update MTU Sync-Receive event for tunnel: 11
Tunnel Update MTU Sync-Successful for tunnel: 11
Tunnel Delete Sync-Receive event for tunnel: 11
Tunnel Delete Sync-Successful for tunnel: 11
Tunnel Delete Nhop Sync-Receive event for tunnel: 11
Tunnel Delete Nhop Sync-Successful for tunnel: 11
Tunnel Delete TTI Sync-Receive event for tunnel: 11
Tunnel Delete Origination entry Sync-Receive event for tunnel: 11
Tunnel Delete Origination entry Sync-Successful for tunnel: 11
process_one_l3_unicast_update: entryType 6
Fill Sync Tunnel Entry-Bad parameters. Failed for tunnel: 11
Fill Sync Tunnel Entry-Bad TS entry. Failed for tunnel: 11
pack_tunnel_entry_change called with tunnel_index: 11 operation: TUNNEL_SYNC_UPDATE_NHOP
pack_tunnel_entry_list called with tunnel_index: 11 operation: TUNNEL_SYNC_CREATE_ALL, from_beginning: 1
Sync-ing tunnel entry 11
[pp_puma_tunnel_hotswap_insert] No tunnel start info for tunnel 11
DEBUG 0x8: Tunnel 11 already deleted
DEBUG 0x8: Tunnel 11 pp_delete_tunnel_entry
DEBUG 0x8: Can not find route for tunnel id 11, hw index 23, src 10.22.33.254, dest 10.22.33.252
DEBUG 0x8: create GRE tunnel origination because find route for tunnel id 11, hw index 23, src
10.22.33.254, dest 10.22.33.252
DEBUG 0x8: Route for tunnel id 11 is via another tunnel or management port 22
DEBUG 0x8: Direct route for tunnel id 11 dest 10.22.33.252 has unresolved ARP
DEBUG 0x8: indirect route for tunnel id 11 dest 10.22.33.252 next hop 10.11.25.5 has unresolved ARP
DEBUG 0x8: indirect route for tunnel id 11 destination 10.22.33.252 next hop 10.11.25.5 has resolved
ARP - CMD => route
DEBUG 0x8: Set next hop to Drop for tunnel id 11, hw index 23, src 10.22.33.254, dest 10.22.33.252
DEBUG 0x8: Tunnel 11 - next hop 10.11.25.5 has no link-layer
DEBUG 0x8: bring tunnel id 11 up with drop
DEBUG 0x8: Create tunnel id 11 with next hop 185276677 - old next hop is 125276633
DEBUG 0x8: bring tunnel id 11 up
Update_hw_routes for Tunnel 11
Path MTU: Tunnel 11 - reset path mtu timer 456 (3344)
Path MTU: Tunnel 11 - failed to reset path mtu timer 456 (3344)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

95

debug ip gre packet

debug ip gre packet
Activates the debugging of GRE packet processing.

Syntax
debug ip gre packet
no debug ip gre packet

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip gre packet
GRE: Error - IP GRE packet with invalid Ptype 0x1A4
GRE: Error - IP GRE packet with invalid first word 0x2C
GRE: Error - IP GRE packet with invalid first word 0x2C
GRE fragment : Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64 id 324
GRE Packet too big - need extra processing: Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64
GRE Reassembly: Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64
GRE : Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64
GRE: Error - Rx IP Pkt with invalid Inner IPv4 header
GRE: Error - Rx IP Pkt with 2 GRE headers: Inner src 10.22.33.254, Inner dst 224.0.0.5, len 64
GRE: Dropping the packet as GRE tnnl 11 is not UP
GRE_LP: Error - LP TX GRE packet is in LOOP
GRE : FORWARD IP to GRE tunnel 11 - Pkt: src 10.22.33.254, dst 224.0.0.5, len 64
GRE : Failed to FORWARD IP to GRE tunnel 11 - Pkt: src 10.22.33.254, dst 224.0.0.5, No route

96

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip icmp events

debug ip icmp events
Activates ICMP events debugging.

Syntax
debug ip icmp events
no debug ip icmp events

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip icmp events
ICMP: events debugging is on
device# ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

97

debug ip icmp events

debug ip icmp events
Activates ICMP events debugging.

Syntax
debug ip icmp events
no debug ip icmp events

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip icmp events
ICMP: events debugging is on
device# ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11

98

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip icmp events

debug ip icmp events
Activates ICMP events debugging.

Syntax
debug ip icmp events
no debug ip icmp events

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip icmp events
ICMP: events debugging is on
device# ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11
ICMP: rcvd echo request packet of length 40 from 10.44.22.11
ICMP: send echo reply packet of length 60 to 10.44.22.11

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

99

debug ip icmp packets

debug ip icmp packets
Activates ICMP packets debugging.

Syntax
debug ip icmp packets
no debug ip icmp packets

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip icmp packets
ICMP: packets debugging is on
device# !SR_SWITCH_ROUTER!ICMP_DEBUG_RX
ICMP: Received message from 10.44.22.11
!SR_SWITCH_ROUTER!ICMP_DEBUG_RX
ICMP: Received message from 10.44.22.11
!SR_SWITCH_ROUTER!ICMP_DEBUG_RX
ICMP: Received message from 10.44.22.11
!SR_SWITCH_ROUTER!ICMP_DEBUG_RX
ICMP: Received message from 10.44.22.11

100

to 10.44.22.36 port 1/1/1 size 40
to 10.44.22.36 port 1/1/1 size 40
to 10.44.22.36 port 1/1/1 size 40
to 10.44.22.36 port 1/1/1 size 40

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif

debug ip igmp add-del-oif
Displays information about the addition or deletion of the outgoing interfaces (OIFs).

Syntax
debug ip igmp add-del-oif
no debug ip igmp add-del-oif

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

101

debug ip igmp add-del-oif

Usage Guidelines
Examples
device# debug ip igmp add-del-oif
add-del-oif enabled
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp add-del-oif is enabled
device# debug ip igmp
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.158 resp=100, pkt S=10.17.17.222 to 239.0.0.158, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.159 resp=100, pkt S=10.17.17.222 to 239.0.0.159, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.160 resp=100, pkt S=10.17.17.222 to 239.0.0.160, on v17 (phy
2/1/17), igmp_size=8
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.161 resp=100, pkt S=10.17.17.222 to 239.0.0.161, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.162 resp=100, pkt S=10.17.17.222 to 239.0.0.162, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.163 resp=100, pkt S=10.17.17.222 to 239.0.0.163, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.164 resp=100, pkt S=10.17.17.222 to 239.0.0.164, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.165 resp=100, pkt S=10.17.17.222 to 239.0.0.165, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.166 resp=100, pkt S=10.17.17.222 to 239.0.0.166, on v17 (phy
2/1/17), igmp_size=8
nIGMP: rcvd Report-V2(t=22) g=239.0.0.167 resp=100, pkt S=10.17.17.222 to 239.0.0.167, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.168 resp=100, pkt S=10.17.17.222 to 239.0.0.168, on v17 (phy
2/1/17), igmp_size=8
o IGMP: rcvd Report-V2(t=22) g=239.0.0.169 resp=100, pkt S=10.17.17.222 to 239.0.0.169, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.170 resp=100, pkt S=10.17.17.222 to 239.0.0.170, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.171 resp=100, pkt S=10.17.17.222 to 239.0.0.171, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.172 resp=100, pkt S=10.17.17.222 to 239.0.0.172, on v17 (phy
2/1/17), igmp_size=8
dIGMP: rcvd Report-V2(t=22) g=239.0.0.173 resp=100, pkt S=10.17.17.222 to 239.0.0.173, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.174 resp=100, pkt S=10.17.17.222 to 239.0.0.174, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.175 resp=100, pkt S=10.17.17.222 to 239.0.0.175, on v17 (phy

102

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif

2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
eIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
bIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
uIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22)

g=239.0.0.176 resp=100, pkt S=10.17.17.222 to 239.0.0.176, on v17 (phy
g=239.0.0.177 resp=100, pkt S=10.17.17.222 to 239.0.0.177, on v17 (phy
g=239.0.0.178 resp=100, pkt S=10.17.17.222 to 239.0.0.178, on v17 (phy
g=239.0.0.179 resp=100, pkt S=10.17.17.222 to 239.0.0.179, on v17 (phy
g=239.0.0.180 resp=100, pkt S=10.17.17.222 to 239.0.0.180, on v17 (phy
g=239.0.0.181 resp=100, pkt S=10.17.17.222 to 239.0.0.181, on v17 (phy
g=239.0.0.182 resp=100, pkt S=10.17.17.222 to 239.0.0.182, on v17 (phy
g=239.0.0.183 resp=100, pkt S=10.17.17.222 to 239.0.0.183, on v17 (phy
g=239.0.0.184 resp=100, pkt S=10.17.17.222 to 239.0.0.184, on v17 (phy
g=239.0.0.185 resp=100, pkt S=10.17.17.222 to 239.0.0.185, on v17 (phy
g=239.0.0.186 resp=100, pkt S=10.17.17.222 to 239.0.0.186, on v17 (phy
g=239.0.0.187 resp=100, pkt S=10.17.17.222 to 239.0.0.187, on v17 (phy
g=239.0.0.188 resp=100, pkt S=10.17.17.222 to 239.0.0.188, on v17 (phy
g=239.0.0.189 resp=100, pkt S=10.17.17.222 to 239.0.0.189, on v17 (phy
g=239.0.0.190 resp=100, pkt S=10.17.17.222 to 239.0.0.190, on v17 (phy
g=239.0.0.191 resp=100, pkt S=10.17.17.222 to 239.0.0.191, on v17 (phy
g=239.0.0.192 resp=100, pkt S=10.17.17.222 to 239.0.0.192, on v17 (phy
g=239.0.0.193 resp=100, pkt S=10.17.17.222 to 239.0.0.193, on v17 (phy
g=239.0.0.194 resp=100, pkt S=10.17.17.222 to 239.0.0.194, on v17 (phy
g=239.0.0.195 resp=100, pkt S=10.17.17.222 to 239.0.0.195, on v17 (phy
g=239.0.0.196 resp=100, pkt S=10.17.17.222 to 239.0.0.196, on v17 (phy
g=239.0.0.197 resp=100, pkt S=10.17.17.222 to 239.0.0.197, on v17 (phy
g=239.0.0.198 resp=100, pkt S=10.17.17.222 to 239.0.0.198, on v17 (phy
g=239.0.0.199 resp=100, pkt S=10.17.17.222 to 239.0.0.199, on v17 (phy
g=239.0.0.200 resp=100, pkt S=10.17.17.222 to 239.0.0.200, on v17 (phy
g=239.0.0.201 resp=100, pkt S=10.17.17.222 to 239.0.0.201, on v17 (phy
g=239.0.0.202 resp=100, pkt S=10.17.17.222 to 239.0.0.202, on v17 (phy
g=239.0.0.203 resp=100, pkt S=10.17.17.222 to 239.0.0.203, on v17 (phy
g=239.0.0.204 resp=100, pkt S=10.17.17.222 to 239.0.0.204, on v17 (phy
g=239.0.0.205 resp=100, pkt S=10.17.17.222 to 239.0.0.205, on v17 (phy
g=239.0.0.206 resp=100, pkt S=10.17.17.222 to 239.0.0.206, on v17 (phy
g=239.0.0.207 resp=100, pkt S=10.17.17.222 to 239.0.0.207, on v17 (phy
g=239.0.0.208 resp=100, pkt S=10.17.17.222 to 239.0.0.208, on v17 (phy
g=239.0.0.209 resp=100, pkt S=10.17.17.222 to 239.0.0.209, on v17 (phy
g=239.0.0.210 resp=100, pkt S=10.17.17.222 to 239.0.0.210, on v17 (phy

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

g=239.0.0.211 resp=100, pkt S=10.17.17.222 to 239.0.0.211, on v17 (phy

103

debug ip igmp add-del-oif

2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
aIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8

g=239.0.0.212 resp=100, pkt S=10.17.17.222 to 239.0.0.212, on v17 (phy
g=239.0.0.213 resp=100, pkt S=10.17.17.222 to 239.0.0.213, on v17 (phy
g=239.0.0.214 resp=100, pkt S=10.17.17.222 to 239.0.0.214, on v17 (phy
g=239.0.0.215 resp=100, pkt S=10.17.17.222 to 239.0.0.215, on v17 (phy
g=239.0.0.216 resp=100, pkt S=10.17.17.222 to 239.0.0.216, on v17 (phy
g=239.0.0.217 resp=100, pkt S=10.17.17.222 to 239.0.0.217, on v17 (phy
g=239.0.0.218 resp=100, pkt S=10.17.17.222 to 239.0.0.218, on v17 (phy
g=239.0.0.219 resp=100, pkt S=10.17.17.222 to 239.0.0.219, on v17 (phy
g=239.0.0.220 resp=100, pkt S=10.17.17.222 to 239.0.0.220, on v17 (phy
g=239.0.0.221 resp=100, pkt S=10.17.17.222 to 239.0.0.221, on v17 (phy
g=239.0.0.222 resp=100, pkt S=10.17.17.222 to 239.0.0.222, on v17 (phy
g=239.0.0.223 resp=100, pkt S=10.17.17.222 to 239.0.0.223, on v17 (phy
g=239.0.0.224 resp=100, pkt S=10.17.17.222 to 239.0.0.224, on v17 (phy
g=239.0.0.225 resp=100, pkt S=10.17.17.222 to 239.0.0.225, on v17 (phy
g=239.0.0.226 resp=100, pkt S=10.17.17.222 to 239.0.0.226, on v17 (phy
g=239.0.0.227 resp=100, pkt S=10.17.17.222 to 239.0.0.227, on v17 (phy
g=239.0.0.228 resp=100, pkt S=10.17.17.222 to 239.0.0.228, on v17 (phy
g=239.0.0.229 resp=100, pkt S=10.17.17.222 to 239.0.0.229, on v17 (phy
g=239.0.0.230 resp=100, pkt S=10.17.17.222 to 239.0.0.230, on v17 (phy

Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

104

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif

debug ip igmp add-del-oif
Displays information about the addition or deletion of the outgoing interfaces (OIFs).

Syntax
debug ip igmp add-del-oif
no debug ip igmp add-del-oif

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

105

debug ip igmp add-del-oif

Usage Guidelines
Examples
device# debug ip igmp add-del-oif
add-del-oif enabled
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp add-del-oif is enabled
device# debug ip igmp
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.158 resp=100, pkt S=10.17.17.222 to 239.0.0.158, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.159 resp=100, pkt S=10.17.17.222 to 239.0.0.159, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.160 resp=100, pkt S=10.17.17.222 to 239.0.0.160, on v17 (phy
2/1/17), igmp_size=8
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.161 resp=100, pkt S=10.17.17.222 to 239.0.0.161, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.162 resp=100, pkt S=10.17.17.222 to 239.0.0.162, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.163 resp=100, pkt S=10.17.17.222 to 239.0.0.163, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.164 resp=100, pkt S=10.17.17.222 to 239.0.0.164, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.165 resp=100, pkt S=10.17.17.222 to 239.0.0.165, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.166 resp=100, pkt S=10.17.17.222 to 239.0.0.166, on v17 (phy
2/1/17), igmp_size=8
nIGMP: rcvd Report-V2(t=22) g=239.0.0.167 resp=100, pkt S=10.17.17.222 to 239.0.0.167, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.168 resp=100, pkt S=10.17.17.222 to 239.0.0.168, on v17 (phy
2/1/17), igmp_size=8
o IGMP: rcvd Report-V2(t=22) g=239.0.0.169 resp=100, pkt S=10.17.17.222 to 239.0.0.169, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.170 resp=100, pkt S=10.17.17.222 to 239.0.0.170, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.171 resp=100, pkt S=10.17.17.222 to 239.0.0.171, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.172 resp=100, pkt S=10.17.17.222 to 239.0.0.172, on v17 (phy
2/1/17), igmp_size=8
dIGMP: rcvd Report-V2(t=22) g=239.0.0.173 resp=100, pkt S=10.17.17.222 to 239.0.0.173, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.174 resp=100, pkt S=10.17.17.222 to 239.0.0.174, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.175 resp=100, pkt S=10.17.17.222 to 239.0.0.175, on v17 (phy

106

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif

2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
eIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
bIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
uIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22)

g=239.0.0.176 resp=100, pkt S=10.17.17.222 to 239.0.0.176, on v17 (phy
g=239.0.0.177 resp=100, pkt S=10.17.17.222 to 239.0.0.177, on v17 (phy
g=239.0.0.178 resp=100, pkt S=10.17.17.222 to 239.0.0.178, on v17 (phy
g=239.0.0.179 resp=100, pkt S=10.17.17.222 to 239.0.0.179, on v17 (phy
g=239.0.0.180 resp=100, pkt S=10.17.17.222 to 239.0.0.180, on v17 (phy
g=239.0.0.181 resp=100, pkt S=10.17.17.222 to 239.0.0.181, on v17 (phy
g=239.0.0.182 resp=100, pkt S=10.17.17.222 to 239.0.0.182, on v17 (phy
g=239.0.0.183 resp=100, pkt S=10.17.17.222 to 239.0.0.183, on v17 (phy
g=239.0.0.184 resp=100, pkt S=10.17.17.222 to 239.0.0.184, on v17 (phy
g=239.0.0.185 resp=100, pkt S=10.17.17.222 to 239.0.0.185, on v17 (phy
g=239.0.0.186 resp=100, pkt S=10.17.17.222 to 239.0.0.186, on v17 (phy
g=239.0.0.187 resp=100, pkt S=10.17.17.222 to 239.0.0.187, on v17 (phy
g=239.0.0.188 resp=100, pkt S=10.17.17.222 to 239.0.0.188, on v17 (phy
g=239.0.0.189 resp=100, pkt S=10.17.17.222 to 239.0.0.189, on v17 (phy
g=239.0.0.190 resp=100, pkt S=10.17.17.222 to 239.0.0.190, on v17 (phy
g=239.0.0.191 resp=100, pkt S=10.17.17.222 to 239.0.0.191, on v17 (phy
g=239.0.0.192 resp=100, pkt S=10.17.17.222 to 239.0.0.192, on v17 (phy
g=239.0.0.193 resp=100, pkt S=10.17.17.222 to 239.0.0.193, on v17 (phy
g=239.0.0.194 resp=100, pkt S=10.17.17.222 to 239.0.0.194, on v17 (phy
g=239.0.0.195 resp=100, pkt S=10.17.17.222 to 239.0.0.195, on v17 (phy
g=239.0.0.196 resp=100, pkt S=10.17.17.222 to 239.0.0.196, on v17 (phy
g=239.0.0.197 resp=100, pkt S=10.17.17.222 to 239.0.0.197, on v17 (phy
g=239.0.0.198 resp=100, pkt S=10.17.17.222 to 239.0.0.198, on v17 (phy
g=239.0.0.199 resp=100, pkt S=10.17.17.222 to 239.0.0.199, on v17 (phy
g=239.0.0.200 resp=100, pkt S=10.17.17.222 to 239.0.0.200, on v17 (phy
g=239.0.0.201 resp=100, pkt S=10.17.17.222 to 239.0.0.201, on v17 (phy
g=239.0.0.202 resp=100, pkt S=10.17.17.222 to 239.0.0.202, on v17 (phy
g=239.0.0.203 resp=100, pkt S=10.17.17.222 to 239.0.0.203, on v17 (phy
g=239.0.0.204 resp=100, pkt S=10.17.17.222 to 239.0.0.204, on v17 (phy
g=239.0.0.205 resp=100, pkt S=10.17.17.222 to 239.0.0.205, on v17 (phy
g=239.0.0.206 resp=100, pkt S=10.17.17.222 to 239.0.0.206, on v17 (phy
g=239.0.0.207 resp=100, pkt S=10.17.17.222 to 239.0.0.207, on v17 (phy
g=239.0.0.208 resp=100, pkt S=10.17.17.222 to 239.0.0.208, on v17 (phy
g=239.0.0.209 resp=100, pkt S=10.17.17.222 to 239.0.0.209, on v17 (phy
g=239.0.0.210 resp=100, pkt S=10.17.17.222 to 239.0.0.210, on v17 (phy

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

g=239.0.0.211 resp=100, pkt S=10.17.17.222 to 239.0.0.211, on v17 (phy

107

debug ip igmp add-del-oif

2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
aIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8

g=239.0.0.212 resp=100, pkt S=10.17.17.222 to 239.0.0.212, on v17 (phy
g=239.0.0.213 resp=100, pkt S=10.17.17.222 to 239.0.0.213, on v17 (phy
g=239.0.0.214 resp=100, pkt S=10.17.17.222 to 239.0.0.214, on v17 (phy
g=239.0.0.215 resp=100, pkt S=10.17.17.222 to 239.0.0.215, on v17 (phy
g=239.0.0.216 resp=100, pkt S=10.17.17.222 to 239.0.0.216, on v17 (phy
g=239.0.0.217 resp=100, pkt S=10.17.17.222 to 239.0.0.217, on v17 (phy
g=239.0.0.218 resp=100, pkt S=10.17.17.222 to 239.0.0.218, on v17 (phy
g=239.0.0.219 resp=100, pkt S=10.17.17.222 to 239.0.0.219, on v17 (phy
g=239.0.0.220 resp=100, pkt S=10.17.17.222 to 239.0.0.220, on v17 (phy
g=239.0.0.221 resp=100, pkt S=10.17.17.222 to 239.0.0.221, on v17 (phy
g=239.0.0.222 resp=100, pkt S=10.17.17.222 to 239.0.0.222, on v17 (phy
g=239.0.0.223 resp=100, pkt S=10.17.17.222 to 239.0.0.223, on v17 (phy
g=239.0.0.224 resp=100, pkt S=10.17.17.222 to 239.0.0.224, on v17 (phy
g=239.0.0.225 resp=100, pkt S=10.17.17.222 to 239.0.0.225, on v17 (phy
g=239.0.0.226 resp=100, pkt S=10.17.17.222 to 239.0.0.226, on v17 (phy
g=239.0.0.227 resp=100, pkt S=10.17.17.222 to 239.0.0.227, on v17 (phy
g=239.0.0.228 resp=100, pkt S=10.17.17.222 to 239.0.0.228, on v17 (phy
g=239.0.0.229 resp=100, pkt S=10.17.17.222 to 239.0.0.229, on v17 (phy
g=239.0.0.230 resp=100, pkt S=10.17.17.222 to 239.0.0.230, on v17 (phy

Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

108

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif all

debug ip igmp add-del-oif all
Displays information about the addition or deletion of all the OIFs that are IGMP-enabled.

Syntax
debug ip igmp add-del-oif all
no debug ip igmp add-del-oif all

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

109

debug ip igmp add-del-oif all

Usage Guidelines
Examples
device# debug ip igmp add-del-oif all
add-del-oif all enabled
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp add-del-oif all is enabled
device# debug ip igmp
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.99 resp=100, pkt S=10.17.17.222 to 239.0.0.99, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.100 resp=100, pkt S=10.17.17.222 to 239.0.0.100, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.101 resp=100, pkt S=10.17.17.222 to 239.0.0.101, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.102 resp=100, pkt S=10.17.17.222 to 239.0.0.102, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.103 resp=100, pkt S=10.17.17.222 to 239.0.0.103, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.104 resp=100, pkt S=10.17.17.222 to 239.0.0.104, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.105 resp=100, pkt S=10.17.17.222 to 239.0.0.105, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.106 resp=100, pkt S=10.17.17.222 to 239.0.0.106, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.107 resp=100, pkt S=10.17.17.222 to 239.0.0.107, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.108 resp=100, pkt S=10.17.17.222 to 239.0.0.108, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.109 resp=100, pkt S=10.17.17.222 to 239.0.0.109, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.110 resp=100, pkt S=10.17.17.222 to 239.0.0.110, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.111 resp=100, pkt S=10.17.17.222 to 239.0.0.111, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.112 resp=100, pkt S=10.17.17.222 to 239.0.0.112, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.113 resp=100, pkt S=10.17.17.222 to 239.0.0.113, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.114 resp=100, pkt S=10.17.17.222 to 239.0.0.114, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.115 resp=100, pkt S=10.17.17.222 to 239.0.0.115, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.116 resp=100, pkt S=10.17.17.222 to 239.0.0.116, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.117 resp=100, pkt S=10.17.17.222 to 239.0.0.117, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.118 resp=100, pkt S=10.17.17.222 to 239.0.0.118, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.119 resp=100, pkt S=10.17.17.222 to 239.0.0.119, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.120 resp=100, pkt S=10.17.17.222 to 239.0.0.120, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.121 resp=100, pkt S=10.17.17.222 to 239.0.0.121, on v17 (phy
2/1/17), igmp_size=8
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.122 resp=100, pkt S=10.17.17.222 to 239.0.0.122, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.123 resp=100, pkt S=10.17.17.222 to 239.0.0.123, on v17 (phy
2/1/17), igmp_size=8
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.124 resp=100, pkt S=10.17.17.222 to 239.0.0.124, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.125 resp=100, pkt S=10.17.17.222 to 239.0.0.125, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.126 resp=100, pkt S=10.17.17.222 to 239.0.0.126, on v17 (phy
2/1/17), igmp_size=8

110

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif all

IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
nIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
oIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
dIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
eIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
bIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
uIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
aIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8

g=239.0.0.127 resp=100, pkt S=10.17.17.222 to 239.0.0.127, on v17 (phy
g=239.0.0.128 resp=100, pkt S=10.17.17.222 to 239.0.0.128, on v17 (phy
g=239.0.0.129 resp=100, pkt S=10.17.17.222 to 239.0.0.129, on v17 (phy
g=239.0.0.130 resp=100, pkt S=10.17.17.222 to 239.0.0.130, on v17 (phy
g=239.0.0.131 resp=100, pkt S=10.17.17.222 to 239.0.0.131, on v17 (phy
g=239.0.0.132 resp=100, pkt S=10.17.17.222 to 239.0.0.132, on v17 (phy
g=239.0.0.133 resp=100, pkt S=10.17.17.222 to 239.0.0.133, on v17 (phy
g=239.0.0.134 resp=100, pkt S=10.17.17.222 to 239.0.0.134, on v17 (phy
g=239.0.0.135 resp=100, pkt S=10.17.17.222 to 239.0.0.135, on v17 (phy
g=239.0.0.136 resp=100, pkt S=10.17.17.222 to 239.0.0.136, on v17 (phy
g=239.0.0.137 resp=100, pkt S=10.17.17.222 to 239.0.0.137, on v17 (phy
g=239.0.0.138 resp=100, pkt S=10.17.17.222 to 239.0.0.138, on v17 (phy
g=239.0.0.139 resp=100, pkt S=10.17.17.222 to 239.0.0.139, on v17 (phy
g=239.0.0.140 resp=100, pkt S=10.17.17.222 to 239.0.0.140, on v17 (phy
g=239.0.0.141 resp=100, pkt S=10.17.17.222 to 239.0.0.141, on v17 (phy
g=239.0.0.142 resp=100, pkt S=10.17.17.222 to 239.0.0.142, on v17 (phy
g=239.0.0.143 resp=100, pkt S=10.17.17.222 to 239.0.0.143, on v17 (phy
g=239.0.0.144 resp=100, pkt S=10.17.17.222 to 239.0.0.144, on v17 (phy
g=239.0.0.145 resp=100, pkt S=10.17.17.222 to 239.0.0.145, on v17 (phy
g=239.0.0.146 resp=100, pkt S=10.17.17.222 to 239.0.0.146, on v17 (phy
g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17 (phy
g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy
g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy
g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy
g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy
g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy
g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy
g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy
g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy
g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy
g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy

Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

111

debug ip igmp add-del-oif all

debug ip igmp add-del-oif all
Displays information about the addition or deletion of all the OIFs that are IGMP-enabled.

Syntax
debug ip igmp add-del-oif all
no debug ip igmp add-del-oif all

Modes
Privileged EXEC mode

112

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif all

Usage Guidelines
Examples
device# debug ip igmp add-del-oif all
add-del-oif all enabled
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp add-del-oif all is enabled
device# debug ip igmp
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.99 resp=100, pkt S=10.17.17.222 to 239.0.0.99, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.100 resp=100, pkt S=10.17.17.222 to 239.0.0.100, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.101 resp=100, pkt S=10.17.17.222 to 239.0.0.101, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.102 resp=100, pkt S=10.17.17.222 to 239.0.0.102, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.103 resp=100, pkt S=10.17.17.222 to 239.0.0.103, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.104 resp=100, pkt S=10.17.17.222 to 239.0.0.104, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.105 resp=100, pkt S=10.17.17.222 to 239.0.0.105, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.106 resp=100, pkt S=10.17.17.222 to 239.0.0.106, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.107 resp=100, pkt S=10.17.17.222 to 239.0.0.107, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.108 resp=100, pkt S=10.17.17.222 to 239.0.0.108, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.109 resp=100, pkt S=10.17.17.222 to 239.0.0.109, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.110 resp=100, pkt S=10.17.17.222 to 239.0.0.110, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.111 resp=100, pkt S=10.17.17.222 to 239.0.0.111, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.112 resp=100, pkt S=10.17.17.222 to 239.0.0.112, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.113 resp=100, pkt S=10.17.17.222 to 239.0.0.113, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.114 resp=100, pkt S=10.17.17.222 to 239.0.0.114, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.115 resp=100, pkt S=10.17.17.222 to 239.0.0.115, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.116 resp=100, pkt S=10.17.17.222 to 239.0.0.116, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.117 resp=100, pkt S=10.17.17.222 to 239.0.0.117, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.118 resp=100, pkt S=10.17.17.222 to 239.0.0.118, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.119 resp=100, pkt S=10.17.17.222 to 239.0.0.119, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.120 resp=100, pkt S=10.17.17.222 to 239.0.0.120, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.121 resp=100, pkt S=10.17.17.222 to 239.0.0.121, on v17 (phy
2/1/17), igmp_size=8
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.122 resp=100, pkt S=10.17.17.222 to 239.0.0.122, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.123 resp=100, pkt S=10.17.17.222 to 239.0.0.123, on v17 (phy
2/1/17), igmp_size=8
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.124 resp=100, pkt S=10.17.17.222 to 239.0.0.124, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.125 resp=100, pkt S=10.17.17.222 to 239.0.0.125, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.126 resp=100, pkt S=10.17.17.222 to 239.0.0.126, on v17 (phy
2/1/17), igmp_size=8

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

113

debug ip igmp add-del-oif all

IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
nIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
oIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
dIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
eIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
bIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
uIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
aIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8

g=239.0.0.127 resp=100, pkt S=10.17.17.222 to 239.0.0.127, on v17 (phy
g=239.0.0.128 resp=100, pkt S=10.17.17.222 to 239.0.0.128, on v17 (phy
g=239.0.0.129 resp=100, pkt S=10.17.17.222 to 239.0.0.129, on v17 (phy
g=239.0.0.130 resp=100, pkt S=10.17.17.222 to 239.0.0.130, on v17 (phy
g=239.0.0.131 resp=100, pkt S=10.17.17.222 to 239.0.0.131, on v17 (phy
g=239.0.0.132 resp=100, pkt S=10.17.17.222 to 239.0.0.132, on v17 (phy
g=239.0.0.133 resp=100, pkt S=10.17.17.222 to 239.0.0.133, on v17 (phy
g=239.0.0.134 resp=100, pkt S=10.17.17.222 to 239.0.0.134, on v17 (phy
g=239.0.0.135 resp=100, pkt S=10.17.17.222 to 239.0.0.135, on v17 (phy
g=239.0.0.136 resp=100, pkt S=10.17.17.222 to 239.0.0.136, on v17 (phy
g=239.0.0.137 resp=100, pkt S=10.17.17.222 to 239.0.0.137, on v17 (phy
g=239.0.0.138 resp=100, pkt S=10.17.17.222 to 239.0.0.138, on v17 (phy
g=239.0.0.139 resp=100, pkt S=10.17.17.222 to 239.0.0.139, on v17 (phy
g=239.0.0.140 resp=100, pkt S=10.17.17.222 to 239.0.0.140, on v17 (phy
g=239.0.0.141 resp=100, pkt S=10.17.17.222 to 239.0.0.141, on v17 (phy
g=239.0.0.142 resp=100, pkt S=10.17.17.222 to 239.0.0.142, on v17 (phy
g=239.0.0.143 resp=100, pkt S=10.17.17.222 to 239.0.0.143, on v17 (phy
g=239.0.0.144 resp=100, pkt S=10.17.17.222 to 239.0.0.144, on v17 (phy
g=239.0.0.145 resp=100, pkt S=10.17.17.222 to 239.0.0.145, on v17 (phy
g=239.0.0.146 resp=100, pkt S=10.17.17.222 to 239.0.0.146, on v17 (phy
g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17 (phy
g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy
g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy
g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy
g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy
g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy
g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy
g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy
g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy
g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy
g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy

Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

114

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif stack

debug ip igmp add-del-oif stack
Monitors and displays instances of multicast cache activity, such as OIF additions or deletions, and generates a stack trace of
the add or delete event.

Syntax
debug ip igmp add-del-oif stack
no debug ip igmp add-del-oif stack

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

115

debug ip igmp add-del-oif stack

Usage Guidelines
Examples
device# debug ip igmp add-del-oif stack
add-del-oif stack enabled
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp add-del-oif stack is enabled
device# debug ip ig
device# IGMP: rcvd Report-V2(t=22) g=239.0.1.8 resp=100, pkt S=10.17.17.222 to 239.0.1.8, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.9 resp=100, pkt S=10.17.17.222 to 239.0.1.9, on v17 (phy 2/1/17),
igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.10 resp=100, pkt S=10.17.17.222 to 239.0.1.10, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.11 resp=100, pkt S=10.17.17.222 to 239.0.1.11, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.12 resp=100, pkt S=10.17.17.222 to 239.0.1.12, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.13 resp=100, pkt S=10.17.17.222 to 239.0.1.13, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.14 resp=100, pkt S=10.17.17.222 to 239.0.1.14, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.15 resp=100, pkt S=10.17.17.222 to 239.0.1.15, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.16 resp=100, pkt S=10.17.17.222 to 239.0.1.16, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.17 resp=100, pkt S=10.17.17.222 to 239.0.1.17, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.18 resp=100, pkt S=10.17.17.222 to 239.0.1.18, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.19 resp=100, pkt S=10.17.17.222 to 239.0.1.19, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.20 resp=100, pkt S=10.17.17.222 to 239.0.1.20, on v17 (phy
2/1/17), igmp_size=8
nIGMP: rcvd Report-V2(t=22) g=239.0.1.21 resp=100, pkt S=10.17.17.222 to 239.0.1.21, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.22 resp=100, pkt S=10.17.17.222 to 239.0.1.22, on v17 (phy
2/1/17), igmp_size=8
oIGMP: rcvd Report-V2(t=22) g=239.0.1.23 resp=100, pkt S=10.17.17.222 to 239.0.1.23, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.24 resp=100, pkt S=10.17.17.222 to 239.0.1.24, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.25 resp=100, pkt S=10.17.17.222 to 239.0.1.25, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.26 resp=100, pkt S=10.17.17.222 to 239.0.1.26, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.27 resp=100, pkt S=10.17.17.222 to 239.0.1.27, on v17 (phy
2/1/17), igmp_size=8
dIGMP: rcvd Report-V2(t=22) g=239.0.1.28 resp=100, pkt S=10.17.17.222 to 239.0.1.28, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.29 resp=100, pkt S=10.17.17.222 to 239.0.1.29, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.30 resp=100, pkt S=10.17.17.222 to 239.0.1.30, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.31 resp=100, pkt S=10.17.17.222 to 239.0.1.31, on v17 (phy
2/1/17), igmp_size=8
eIGMP: rcvd Report-V2(t=22) g=239.0.1.32 resp=100, pkt S=10.17.17.222 to 239.0.1.32, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.33 resp=100, pkt S=10.17.17.222 to 239.0.1.33, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.34 resp=100, pkt S=10.17.17.222 to 239.0.1.34, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.35 resp=100, pkt S=10.17.17.222 to 239.0.1.35, on v17 (phy
2/1/17), igmp_size=8
bIGMP: rcvd Report-V2(t=22) g=239.0.1.36 resp=100, pkt S=10.17.17.222 to 239.0.1.36, on v17 (phy
2/1/17), igmp_size=8

116

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp add-del-oif stack

IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
uIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
aIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22)
2/1/17), igmp_size=8

g=239.0.1.37 resp=100, pkt S=10.17.17.222 to 239.0.1.37, on v17 (phy
g=239.0.1.38 resp=100, pkt S=10.17.17.222 to 239.0.1.38, on v17 (phy
g=239.0.1.39 resp=100, pkt S=10.17.17.222 to 239.0.1.39, on v17 (phy
g=239.0.1.40 resp=100, pkt S=10.17.17.222 to 239.0.1.40, on v17 (phy
g=239.0.1.41 resp=100, pkt S=10.17.17.222 to 239.0.1.41, on v17 (phy
g=239.0.1.42 resp=100, pkt S=10.17.17.222 to 239.0.1.42, on v17 (phy
g=239.0.1.43 resp=100, pkt S=10.17.17.222 to 239.0.1.43, on v17 (phy
g=239.0.1.44 resp=100, pkt S=10.17.17.222 to 239.0.1.44, on v17 (phy
g=239.0.1.45 resp=100, pkt S=10.17.17.222 to 239.0.1.45, on v17 (phy
g=239.0.1.46 resp=100, pkt S=10.17.17.222 to 239.0.1.46, on v17 (phy
g=239.0.1.47 resp=100, pkt S=10.17.17.222 to 239.0.1.47, on v17 (phy
g=239.0.1.48 resp=100, pkt S=10.17.17.222 to 239.0.1.48, on v17 (phy
g=239.0.1.49 resp=100, pkt S=10.17.17.222 to 239.0.1.49, on v17 (phy
g=239.0.1.50 resp=100, pkt S=10.17.17.222 to 239.0.1.50, on v17 (phy
g=239.0.1.51 resp=100, pkt S=10.17.17.222 to 239.0.1.51, on v17 (phy
g=239.0.1.52 resp=100, pkt S=10.17.17.222 to 239.0.1.52, on v17 (phy
g=239.0.1.53 resp=100, pkt S=10.17.17.222 to 239.0.1.53, on v17 (phy
g=239.0.1.54 resp=100, pkt S=10.17.17.222 to 239.0.1.54, on v17 (phy
g=239.0.1.55 resp=100, pkt S=10.17.17.222 to 239.0.1.55, on v17 (phy
g=239.0.1.56 resp=100, pkt S=10.17.17.222 to 239.0.1.56, on v17 (phy
g=239.0.1.57 resp=100, pkt S=10.17.17.222 to 239.0.1.57, on v17 (phy
g=239.0.1.58 resp=100, pkt S=10.17.17.222 to 239.0.1.58, on v17 (phy
g=239.0.1.59 resp=100, pkt S=10.17.17.222 to 239.0.1.59, on v17 (phy
g=239.0.1.60 resp=100, pkt S=10.17.17.222 to 239.0.1.60, on v17 (phy
g=239.0.1.61 resp=100, pkt S=10.17.17.222 to 239.0.1.61, on v17 (phy
g=239.0.1.62 resp=100, pkt S=10.17.17.222 to 239.0.1.62, on v17 (phy
g=239.0.1.63 resp=100, pkt S=10.17.17.222 to 239.0.1.63, on v17 (phy
g=239.0.1.64 resp=100, pkt S=10.17.17.222 to 239.0.1.64, on v17 (phy
g=239.0.1.65 resp=100, pkt S=10.17.17.222 to 239.0.1.65, on v17 (phy
g=239.0.1.66 resp=100, pkt S=10.17.17.222 to 239.0.1.66, on v17 (phy

Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

117

debug ip igmp clear

debug ip igmp clear
Clears all the IGMP debug settings.

Syntax
debug ip igmp clear
no debug ip igmp clear

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip igmp clear
no debug ip igmp is enabled

118

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp down-port

debug ip igmp down-port
Monitors the port that is down.

Syntax
debug ip igmp down-port
no debug ip igmp down-port

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

119

debug ip igmp down-port

Usage Guidelines
Examples
device# debug ip igmp down-port
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp port-down is enabled
device# debug ip igmp
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.84 resp=100, pkt S=10.17.17.222 to 239.0.0.84, on v17
(phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.85 resp=100, pkt S=10.17.17.222 to 239.0.0.85, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.86 resp=100, pkt S=10.17.17.222 to 239.0.0.86, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.87 resp=100, pkt S=10.17.17.222 to 239.0.0.87, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.88 resp=100, pkt S=10.17.17.222 to 239.0.0.88, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.89 resp=100, pkt S=10.17.17.222 to 239.0.0.89, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.90 resp=100, pkt S=10.17.17.222 to 239.0.0.90, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.91 resp=100, pkt S=10.17.17.222 to 239.0.0.91, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.92 resp=100, pkt S=10.17.17.222 to 239.0.0.92, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.93 resp=100, pkt S=10.17.17.222 to 239.0.0.93, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.94 resp=100, pkt S=10.17.17.222 to 239.0.0.94, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.95 resp=100, pkt S=10.17.17.222 to 239.0.0.95, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.96 resp=100, pkt S=10.17.17.222 to 239.0.0.96, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.97 resp=100, pkt S=10.17.17.222 to 239.0.0.97, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.98 resp=100, pkt S=10.17.17.222 to 239.0.0.98, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.99 resp=100, pkt S=10.17.17.222 to 239.0.0.99, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.100 resp=100, pkt S=10.17.17.222 to 239.0.0.100, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.101 resp=100, pkt S=10.17.17.222 to 239.0.0.101, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.102 resp=100, pkt S=10.17.17.222 to 239.0.0.102, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.103 resp=100, pkt S=10.17.17.222 to 239.0.0.103, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.104 resp=100, pkt S=10.17.17.222 to 239.0.0.104, on v17 (phy
2/1/17), igmp_size=8
nIGMP: rcvd Report-V2(t=22) g=239.0.0.105 resp=100, pkt S=10.17.17.222 to 239.0.0.105, on v17 (phy
2/1/17), igmp_size=8
oIGMP: rcvd Report-V2(t=22) g=239.0.0.106 resp=100, pkt S=10.17.17.222 to 239.0.0.106, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.107 resp=100, pkt S=10.17.17.222 to 239.0.0.107, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.108 resp=100, pkt S=10.17.17.222 to 239.0.0.108, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.109 resp=100, pkt S=10.17.17.222 to 239.0.0.109, on v17 (phy
2/1/17), igmp_size=8
dIGMP: rcvd Report-V2(t=22) g=239.0.0.110 resp=100, pkt S=10.17.17.222 to 239.0.0.110, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.111 resp=100, pkt S=10.17.17.222 to 239.0.0.111, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.112 resp=100, pkt S=10.17.17.222 to 239.0.0.112, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.113 resp=100, pkt S=10.17.17.222 to 239.0.0.113, on v17 (phy

120

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp down-port

2/1/17), igmp_size=8
eIGMP: rcvd Report-V2(t=22) g=239.0.0.114 resp=100, pkt S=10.17.17.222 to 239.0.0.114, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.115 resp=100, pkt S=10.17.17.222 to 239.0.0.115, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.116 resp=100, pkt S=10.17.17.222 to 239.0.0.116, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.117 resp=100, pkt S=10.17.17.222 to 239.0.0.117, on v17 (phy
2/1/17), igmp_size=8
bIGMP: rcvd Report-V2(t=22) g=239.0.0.118 resp=100, pkt S=10.17.17.222 to 239.0.0.118, on v17 (phy
2/1/17), igmp_size=8
uIGMP: rcvd Report-V2(t=22) g=239.0.0.119 resp=100, pkt S=10.17.17.222 to 239.0.0.119, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.120 resp=100, pkt S=10.17.17.222 to 239.0.0.120, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.121 resp=100, pkt S=10.17.17.222 to 239.0.0.121, on v17 (phy
2/1/17), igmp_size=8
g IGMP: rcvd Report-V2(t=22) g=239.0.0.122 resp=100, pkt S=10.17.17.222 to 239.0.0.122, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.123 resp=100, pkt S=10.17.17.222 to 239.0.0.123, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.124 resp=100, pkt S=10.17.17.222 to 239.0.0.124, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.125 resp=100, pkt S=10.17.17.222 to 239.0.0.125, on v17 (phy
2/1/17), igmp_size=8
aIGMP: rcvd Report-V2(t=22) g=239.0.0.126 resp=100, pkt S=10.17.17.222 to 239.0.0.126, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.127 resp=100, pkt S=10.17.17.222 to 239.0.0.127, on v17 (phy
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22) g=239.0.0.128 resp=100, pkt S=10.17.17.222 to 239.0.0.128, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.129 resp=100, pkt S=10.17.17.222 to 239.0.0.129, on v17 (phy
2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22) g=239.0.0.130 resp=100, pkt S=10.17.17.222 to 239.0.0.130, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.131 resp=100, pkt S=10.17.17.222 to 239.0.0.131, on v17 (phy
2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.132 resp=100, pkt S=10.17.17.222 to 239.0.0.132, on v17 (phy
2/1/17), igmp_size=8
Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

121

debug ip igmp enable

debug ip igmp enable
Enables IGMP debugging.

Syntax
debug ip igmp enable
no debug ip igmp enable

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug ip igmp enable
debug ip igmp is enabled

122

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp error

debug ip igmp error
Displays the IGMP multicast error messages.

Syntax
debug ip igmp error
no debug ip igmp error

Modes
Privileged EXEC mode

Usage Guidelines
Examples
Device# debug ip igmp error
IGMP.VRF3.ERR: Rx packet ttl 255 not 1. Dropping packet
IGMP.VRF3.ERR: Rx packet ttl 255 not 1. Dropping packet
IGMP.VRF3.ERR: Rx packet ttl 255 not 1. Dropping packet

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

123

debug ip igmp group

debug ip igmp group
Matches the IGMP-enabled group based on the IP address.

Syntax
debug ip igmp group ipaddr
no debug ip igmp group ipaddr

Parameters
ipaddr
Refers to the IP address of the IGMP group.

Modes
Privileged EXEC mode

Examples
device# debug ip igmp group 10.11.66.62
IGMP: No L3 mcast, pkt S=10.11.66.62 to 225.1.1.167, on v8 (phy 1/2/4),
igmp_size=8
IGMP: rcvd Report-V2(t=22) g=225.1.1.167 resp=0, pkt S=10.11.66.62 to
225.1.1.167, on VL8 (phy 1/2/4), igmp_size=8

124

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp level

debug ip igmp level
Sets the debug level of the IGMP.

Syntax
debug ip igmp level decimal
no debug ip igmp level decimal

Parameters
decimal
Specifies the level of the IGMP. The valid values are from 1 through 3.

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

125

debug ip igmp level

Examples
device# debug ip igmp level 1
debug level = 1
device# debug ip ig show
igmp debug-enable-any = 1
debug ip igmp level 1 is enabled
device# debug ip igmp
device# IGMP: rcvd Report-V2(t=22) g=239.0.1.240 resp=100, pkt S=10.17.17.222 to
239.0.1.240, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.241 resp=100, pkt S=10.17.17.222 to
239.0.1.241, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.242 resp=100, pkt S=10.17.17.222 to
239.0.1.242, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.243 resp=100, pkt S=10.17.17.222 to
239.0.1.243, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.244 resp=100, pkt S=10.17.17.222 to
239.0.1.244, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.245 resp=100, pkt S=10.17.17.222 to
239.0.1.245, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.246 resp=100, pkt S=10.17.17.222 to
239.0.1.246, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.247 resp=100, pkt S=10.17.17.222 to
239.0.1.247, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.1.248 resp=100, pkt S=10.17.17.222 to
239.0.1.248, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=10.17.17.222 to 239.0.0.5,
on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.6 resp=100, pkt S=10.17.17.222 to 239.0.0.6,
on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.7 resp=100, pkt S=10.17.17.222 to 239.0.0.7,
on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.8 resp=100, pkt S=10.17.17.222 to 239.0.0.8,
on v17 (phy 2/1/17), igmp_size=8
consume pkt
nIGMP: rcvd Report-V2(t=22) g=239.0.0.9 resp=100, pkt S=10.17.17.222 to
239.0.0.9, on v17 (phy 2/1/17), igmp_size=8
consume pkt
oIGMP: rcvd Report-V2(t=22) g=239.0.0.10 resp=100, pkt S=10.17.17.222 to
239.0.0.10, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.11 resp=100, pkt S=10.17.17.222 to
239.0.0.11, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.12 resp=100, pkt S=10.17.17.222 to
239.0.0.12, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.13 resp=100, pkt S=10.17.17.222 to
239.0.0.13, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.14 resp=100, pkt S=10.17.17.222 to
239.0.0.14, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.15 resp=100, pkt S=10.17.17.222 to
239.0.0.15, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.16 resp=100, pkt S=10.17.17.222 to
239.0.0.16, on v17 (phy 2/1/17), igmp_size=8
consume pkt

126

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp level

IGMP: rcvd Report-V2(t=22) g=239.0.0.17 resp=100, pkt S=10.17.17.222 to
239.0.0.17, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.18 resp=100, pkt S=10.17.17.222 to
239.0.0.18, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.19 resp=100, pkt S=10.17.17.222 to
239.0.0.19, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.20 resp=100, pkt S=10.17.17.222 to
239.0.0.20, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.21 resp=100, pkt S=10.17.17.222 to
239.0.0.21, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.22 resp=100, pkt S=10.17.17.222 to
239.0.0.22, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.23 resp=100, pkt S=10.17.17.222 to
239.0.0.23, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.24 resp=100, pkt S=10.17.17.222 to
239.0.0.24, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.25 resp=100, pkt S=10.17.17.222 to
239.0.0.25, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.26 resp=100, pkt S=10.17.17.222 to
239.0.0.26, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.27 resp=100, pkt S=10.17.17.222 to
239.0.0.27, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.28 resp=100, pkt S=10.17.17.222 to
239.0.0.28, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.29 resp=100, pkt S=10.17.17.222 to
239.0.0.29, on v17 (phy 2/1/17), igmp_size=8
consume pkt
dIGMP: rcvd Report-V2(t=22) g=239.0.0.30 resp=100, pkt S=10.17.17.222 to
239.0.0.30, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.31 resp=100, pkt S=10.17.17.222 to
239.0.0.31, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.32 resp=100, pkt S=10.17.17.222 to
239.0.0.32, on v17 (phy 2/1/17), igmp_size=8
consume pkt
eIGMP: rcvd Report-V2(t=22) g=239.0.0.33 resp=100, pkt S=10.17.17.222 to
239.0.0.33, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.34 resp=100, pkt S=10.17.17.222 to
239.0.0.34, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.35 resp=100, pkt S=10.17.17.222 to
239.0.0.35, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.36 resp=100, pkt S=10.17.17.222 to
239.0.0.36, on v17 (phy 2/1/17), igmp_size=8
consume pkt
bIGMP: rcvd Report-V2(t=22) g=239.0.0.37 resp=100, pkt S=10.17.17.222 to
239.0.0.37, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.38 resp=100, pkt S=10.17.17.222 to
239.0.0.38, on v17 (phy 2/1/17), igmp_size=8
consume pkt
uIGMP: rcvd Report-V2(t=22) g=239.0.0.39 resp=100, pkt S=10.17.17.222 to
239.0.0.39, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.40 resp=100, pkt S=10.17.17.222 to
239.0.0.40, on v17 (phy 2/1/17), igmp_size=8
consume pkt
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

127

debug ip igmp level

gIGMP: rcvd Report-V2(t=22) g=239.0.0.41 resp=100, pkt S=10.17.17.222 to
239.0.0.41, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.42 resp=100, pkt S=10.17.17.222 to
239.0.0.42, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.43 resp=100, pkt S=10.17.17.222 to
239.0.0.43, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.44 resp=100, pkt S=10.17.17.222 to
239.0.0.44, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.45 resp=100, pkt S=10.17.17.222 to
239.0.0.45, on v17 (phy 2/1/17), igmp_size=8
consume pkt
aIGMP: rcvd Report-V2(t=22) g=239.0.0.46 resp=100, pkt S=10.17.17.222 to
239.0.0.46, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.47 resp=100, pkt S=10.17.17.222 to
239.0.0.47, on v17 (phy 2/1/17), igmp_size=8
consume pkt
lIGMP: rcvd Report-V2(t=22) g=239.0.0.48 resp=100, pkt S=10.17.17.222 to
239.0.0.48, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.49 resp=100, pkt S=10.17.17.222 to
239.0.0.49, on v17 (phy 2/1/17), igmp_size=8
consume pkt
lIGMP send Query(t=17) V2, s=10.17.17.52 0.0.0.0 to v17(all) rsp=100 igmp=8B,
pkt=46B
IGMP send Query(t=17) V2, s=19.19.19.52 0.0.0.0 to v19(all) rsp=100 igmp=8B,
pkt=46B
IGMP: rcvd Report-V2(t=22) g=239.0.0.50 resp=100, pkt S=10.17.17.222 to
239.0.0.50, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.51 resp=100, pkt S=10.17.17.222 to
239.0.0.51, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.52 resp=100, pkt S=10.17.17.222 to
239.0.0.52, on v17 (phy 2/1/17), igmp_size=8
consume pkt
IGMP: rcvd Report-V2(t=22) g=239.0.0.53 resp=100, pkt S=10.17.17.222 to
239.0.0.53, on v17 (phy 2/1/17), igmp_size=8
consume pkt
Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

128

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp packet

debug ip igmp packet
Traces the IGMP packets.

Syntax
debug ip igmp packet ipaddr
no debug ip igmp packet ipaddr

Parameters
ipaddr
Specifies the IP address of the IGMP packet.

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

129

debug ip igmp packet

Examples
device# debug ip igmp packet 10.17.17.222 239.0.0.155
debug ip igmp packet S=10.17.17.222 G=239.0.0.155
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp packet 10.17.17.222 239.0.0.155 is enabled
device# debug ip igmp
device#IGMP: rcvd Report-V2(t=22) g=239.0.1.160 resp=100, pkt S=10.17.17.222 to
239.0.1.160, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.161 resp=100, pkt S=10.17.17.222 to
239.0.1.161, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.162 resp=100, pkt S=10.17.17.222 to
239.0.1.162, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.163 resp=100, pkt S=10.17.17.222 to
239.0.1.163, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.164 resp=100, pkt S=10.17.17.222 to
239.0.1.164, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.165 resp=100, pkt S=10.17.17.222 to
239.0.1.165, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.166 resp=100, pkt S=10.17.17.222 to
239.0.1.166, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.167 resp=100, pkt S=10.17.17.222 to
239.0.1.167, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.168 resp=100, pkt S=10.17.17.222 to
239.0.1.168, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.169 resp=100, pkt S=10.17.17.222 to
239.0.1.169, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.170 resp=100, pkt S=10.17.17.222 to
239.0.1.170, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.171 resp=100, pkt S=10.17.17.222 to
239.0.1.171, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.172 resp=100, pkt S=10.17.17.222 to
239.0.1.172, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.173 resp=100, pkt S=10.17.17.222 to
239.0.1.173, on v17 (phy 2/1/17), igmp_size=8
device#IGMP: rcvd Report-V2(t=22) g=239.0.1.174 resp=100, pkt S=10.17.17.222 to
239.0.1.174, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.175 resp=100, pkt S=10.17.17.222 to
239.0.1.175, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.176 resp=100, pkt S=10.17.17.222 to
239.0.1.176, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.177 resp=100, pkt S=10.17.17.222 to
239.0.1.177, on v17 (phy 2/1/17), igmp_size=8
device#IGMP: rcvd Report-V2(t=22) g=239.0.1.178 resp=100, pkt S=10.17.17.222 to
239.0.1.178, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.179 resp=100, pkt S=10.17.17.222 to
239.0.1.179, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.180 resp=100, pkt S=10.17.17.222 to
239.0.1.180, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.181 resp=100, pkt S=10.17.17.222 to
239.0.1.181, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.182 resp=100, pkt S=10.17.17.222 to
239.0.1.182, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.183 resp=100, pkt S=10.17.17.222 to
239.0.1.183, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.184 resp=100, pkt S=10.17.17.222 to
239.0.1.184, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.185 resp=100, pkt S=10.17.17.222 to
239.0.1.185, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.186 resp=100, pkt S=10.17.17.222 to
239.0.1.186, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.187 resp=100, pkt S=10.17.17.222 to
239.0.1.187, on v17 (phy 2/1/17), igmp_size=8
nIGMP: rcvd Report-V2(t=22) g=239.0.1.188 resp=100, pkt S=10.17.17.222 to
239.0.1.188, on v17 (phy 2/1/17), igmp_size=8
oIGMP: rcvd Report-V2(t=22) g=239.0.1.189 resp=100, pkt S=10.17.17.222 to
239.0.1.189, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.190 resp=100, pkt S=10.17.17.222 to
239.0.1.190, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.191 resp=100, pkt S=10.17.17.222 to

130

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp packet

239.0.1.191, on v17 (phy 2/1/17), igmp_size=8
dIGMP: rcvd Report-V2(t=22) g=239.0.1.192 resp=100, pkt S=10.17.17.222 to
239.0.1.192, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.193 resp=100, pkt S=10.17.17.222 to
239.0.1.193, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.194 resp=100, pkt S=10.17.17.222 to
239.0.1.194, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.195 resp=100, pkt S=10.17.17.222 to
239.0.1.195, on v17 (phy 2/1/17), igmp_size=8
eIGMP: rcvd Report-V2(t=22) g=239.0.1.196 resp=100, pkt S=10.17.17.222 to
239.0.1.196, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.197 resp=100, pkt S=10.17.17.222 to
239.0.1.197, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.198 resp=100, pkt S=10.17.17.222 to
239.0.1.198, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.199 resp=100, pkt S=10.17.17.222 to
239.0.1.199, on v17 (phy 2/1/17), igmp_size=8
buIGMP: rcvd Report-V2(t=22) g=239.0.1.200 resp=100, pkt S=10.17.17.222 to
239.0.1.200, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.201 resp=100, pkt S=10.17.17.222 to
239.0.1.201, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.202 resp=100, pkt S=10.17.17.222 to
239.0.1.202, on v17 (phy 2/1/17), igmp_size=8
gIGMP: rcvd Report-V2(t=22) g=239.0.1.203 resp=100, pkt S=10.17.17.222 to
239.0.1.203, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.204 resp=100, pkt S=10.17.17.222 to
239.0.1.204, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.205 resp=100, pkt S=10.17.17.222 to
239.0.1.205, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.206 resp=100, pkt S=10.17.17.222 to
239.0.1.206, on v17 (phy 2/1/17), igmp_size=8
aIGMP: rcvd Report-V2(t=22) g=239.0.1.207 resp=100, pkt S=10.17.17.222 to
239.0.1.207, on v17 (phy 2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22) g=239.0.1.208 resp=100, pkt S=10.17.17.222 to
239.0.1.208, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.209 resp=100, pkt S=10.17.17.222 to
239.0.1.209, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.210 resp=100, pkt S=10.17.17.222 to
239.0.1.210, on v17 (phy 2/1/17), igmp_size=8
lIGMP: rcvd Report-V2(t=22) g=239.0.1.211 resp=100, pkt S=10.17.17.222 to
239.0.1.211, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.212 resp=100, pkt S=10.17.17.222 to
239.0.1.212, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.213 resp=100, pkt S=10.17.17.222 to
239.0.1.213, on v17 (phy 2/1/17), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.1.214 resp=100, pkt S=10.17.17.222 to
239.0.1.214, on v17 (phy 2/1/17), igmp_size=8
Debug message destination: default (console)
All possible debuggings have been turned off
tracking is off and all results are cleared
Turn off stack trace of write table
Disable shadow register write will disable all writes from shadow to hardware

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

131

debug ip igmp physical-port ethernet

debug ip igmp physical-port ethernet
Matches the physical port that is connected.

Syntax
debug ip igmp physical-port ethernetstackid | slot | port
no debug ip igmp physical-port ethernet stackid | slot | port

Parameters
stackid | slot | port
Refers to the stack ID, slot number, and port number of a specific Ethernet port.

Modes
Privileged EXEC mode

Examples
device# debug ip igmp physical-port ethernet 1/2/4
IGMP: rcvd Leave(t=23) g=225.1.1.31 resp=0, pkt S=10.11.66.62
VL8 (phy 1/2/4), igmp_size=8
IGMP: No L3 mcast, pkt S=10.11.66.62 to 224.0.0.2, on v8 (phy
IGMP: rcvd Leave(t=23) g=225.1.1.32 resp=0, pkt S=10.11.66.62
VL8 (phy 1/2/4), igmp_size=8
IGMP: No L3 mcast, pkt S=10.11.66.62 to 224.0.0.2, on v8 (phy
IGMP: rcvd Leave(t=23) g=225.1.1.33 resp=0, pkt S=10.11.66.62
VL8 (phy 1/2/4), igmp_size=8

132

to 224.0.0.2, on
1/2/4), igmp_size=8
to 224.0.0.2, on
1/2/4), igmp_size=8
to 224.0.0.2, on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp prime-port ethernet

debug ip igmp prime-port ethernet
Monitors the activity of the physical port if the trunking is carried out on the primary port.

Syntax
debug ip igmp prime-port ethernetstackid | slot | port
no debug ip igmp prime-port ethernet stackid | slot | port

Parameters
stackid | slot | port
Refers to the stack ID, slot number, and port number of a specific Ethernet port.

Modes
Privileged EXEC mode

Examples
device# debug ip igmp prime-port ethernet 1/1/8
Brocade# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp prime-port 1/1/8 is enabled
Brocade#
Brocade# debug ip igmp
Brocade# IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=10.16.16.222 to
239.0.0.5, on v16 (phy 1/1/8), igmp_size=8
IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=10.16.16.222 to 239.0.0.5,
on v16 (phy 1/1/8), igmp_size=8

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

133

debug ip igmp protocol

debug ip igmp protocol
Displays debugging information about the IGMP queries and reports transmitted and received.

Syntax
debug ip igmp protocol [ query | report ]
no debug ip igmp protocol [ query | report ]

Parameters
query
Displays debugging information about the IGMP queries transmitted and received.
report
Displays debugging information about the IGMP reports transmitted and received.

Modes
Privileged EXEC mode

Examples
The following is the sample output from the debug ip igmp protocol query command.
device# debug ip igmp protocol query
device# IGMP.VRF0: [ Port 1/1/15,v74. Grp 0.0.0.0 ] Sent version 3 Query. size
12. Src 10.0.0.18
IGMP.VRF0: [ Port 1/1/15,v74 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 2/1/15,v75. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 2/1/15,v75 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 3/1/39,v76. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 3/1/39,v76 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 6/1/22,v77. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 6/1/22,v77 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 4/1/22,v78. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 4/1/22,v78 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 5/1/22,v79. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 5/1/22,v79 ] Sent General Query version 3 using src 10.0.0.18

134

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp protocol

The following is the truncated sample output from the debug ip igmp protocol report command.
device# debug ip igmp protocol report
device# IGMP.VRF0: [ Port 1/1/15,v74. Grp 0.0.0.0 ] Sent version 3 Query. size
12. Src 10.0.0.18
IGMP.VRF0: [ Port 1/1/15,v74 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 2/1/15,v75. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 2/1/15,v75 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 3/1/39,v76. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 3/1/39,v76 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 6/1/22,v77. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 6/1/22,v77 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 4/1/22,v78. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 4/1/22,v78 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: [ Port 5/1/22,v79. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src
10.0.0.18
IGMP.VRF0: [ Port 5/1/22,v79 ] Sent General Query version 3 using src 10.0.0.18
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.52
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.43
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.22
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.16
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.34
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.54
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.4
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.90
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.33
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.15
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.61
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.37
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.59
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.8
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.1
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.46
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.7
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.1
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.94
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.99
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.98
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.96
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.35
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.91
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.64
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.5
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.92
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.20
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.41
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.80
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.76
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.36
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.39
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.93
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.31
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.38
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.33
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.72
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.57
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.79
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.2
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.99
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.73
IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.59
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.40
IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.84

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

135

debug ip igmp proxy clear

debug ip igmp proxy clear
Clears all the IGMP proxy debug settings.

Syntax
debug ip igmp proxy clear
no debug ip igmp proxy clear

Modes
Privileged EXEC mode

136

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp proxy error

debug ip igmp proxy error
Displays the IGMP proxy error messages.

Syntax
debug ip igmp proxy error
no debug ip igmp proxy error

Modes
Privileged EXEC mode

Examples
device# debug ip igmp
Debug: Jan 2 03:26:25
235.5.4.145
Debug: Jan 2 03:46:35
Debug: Jan 2 03:48:55

proxy error
1d 3:26:43 - MCPROXY_ERROR: ref count 1 for group entry
- MCPROXY_ERROR: ref count 1 for group entry 235.5.4.241
- MCPROXY_ERROR: ref count 1 for group entry 235.5.4.49

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

137

debug ip igmp proxy event

debug ip igmp proxy event
Enables debugging of IGMP proxy events.

Syntax
debug ip igmp proxy event
no debug ip igmp proxy event

Modes
Privileged EXEC mode

Examples
device# debug ip igmp proxy event
Debug: Jan 1 20:53:56 20:54:14 - MCPROXY_EVENT:
229.2.1.1 state change
Debug: Jan 1 20:54:11 20:54:29 - MCPROXY_EVENT:
229.2.1.1 state change
Debug: Jan 1 20:54:33 20:54:51 - MCPROXY_EVENT:
229.2.1.1 state change
Debug: Jan 1 20:54:40 20:54:58 - MCPROXY_EVENT:
229.2.1.1 state change

138

[IPv4:default-vrf] receive group
[IPv4:default-vrf] receive group
[IPv4:default-vrf] receive group
[IPv4:default-vrf] receive group

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp proxy packet

debug ip igmp proxy packet
Displays debugging information related to the IGMP proxy packets.

Syntax
debug ip igmp proxy packet
no debug ip igmp proxy packet

Modes
Privileged EXEC mode

Examples
device# debug ip igmp proxy packet
device# debug ip igmp enable
device# Debug: Jan 2 00:42:25 1d 0:42:34 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1
rprt
to vir port v10 phy port 4/1/33
device# Debug: Jan 2 00:42:35 1d 0:42:43 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1
rprt
to vir port v10 phy port 4/1/33
Debug: Jan 2 00:42:36 1d 0:42:44 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt
to vir port v10 phy port 4/1/33

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

139

debug ip igmp proxy rx

debug ip igmp proxy rx
Displays the IGMP proxy packets received.

Syntax
debug ip igmp proxy rx
no debug ip igmp proxy rx

Modes
Privileged EXEC mode

Examples
device# debug ip igmp proxy rx
device# 0:29:31 - MCPROXY_RX: [IPv4:default-vrf] receive general query on port e2/1/3 max resp code 100

140

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp proxy show

debug ip igmp proxy show
Displays the IGMP proxy debug settings.

Syntax
debug ip igmp proxy show
no debug ip igmp proxy show

Modes
Privileged EXEC mode

Examples
device# debug ip igmp proxy show
Mcast Proxy debug for IPv4:
Receive debug is enable
Transmit debug is enable
Error debug is enable

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

141

debug ip igmp proxy tx

debug ip igmp proxy tx
Displays the IGMP proxy packets transmitted.

Syntax
debug ip igmp proxy tx
no debug ip igmp proxy tx

Modes
Privileged EXEC mode

Examples
device# debug ip igmp proxy tx
device# debug ip igmp enable
device# Debug: Jan 2 00:43:20 1d 0:43:29 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1
rprt
to vir port v10 phy port 4/1/33
device# Debug: Jan 2 00:43:27 1d 0:43:36 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1
rprt
to vir port v10 phy port 4/1/33
Debug: Jan 2 00:43:28 1d 0:43:37 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt
to vir port v10 phy port 4/1/33

142

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp proxy vrf

debug ip igmp proxy vrf
Displays IGMP proxy related debug information for the specified VRF.

Syntax
debug ip igmp proxy vrf vrf_name
no debug ip igmp proxy vrf vrf_name

Parameters
vrf_name
Specifies the VRF name.

Modes
Privileged EXEC mode

Examples
device# debug ip igmp proxy vrf vrf1
Debug: Jan 1 21:43:08 21:43:26 - MCPROXY_TX:
rprt to vir port v85 phy port 2/13
Debug: Jan 1 21:43:08 21:43:26 - MCPROXY_TX:
229.2.1.1 on port e2/13 max resp code 10
Debug: Jan 1 21:43:09 21:43:27 - MCPROXY_TX:
229.2.1.1 on port e2/13 max resp code 10
Debug: Jan 1 21:43:22 21:43:39 - MCPROXY_TX:
rprt to vir port v85 phy port 2/13
Debug: Jan 1 21:43:23 21:43:41 - MCPROXY_TX:
rprt to vir port v85 phy port 2/13

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

[IPv4:1] sending v1v2 grp 229.2.1.1
[IPv4:1] receive group query
[IPv4:1] receive group query
[IPv4:1] sending v1v2 grp 229.2.1.1
[IPv4:1] sending v1v2 grp 229.2.1.1

143

debug ip igmp rx

debug ip igmp rx
Displays the IGMP packets received.

Syntax
debug ip igmp rx
no debug ip igmp rx

Modes
Privileged EXEC mode

Examples
device# debug ip igmp rx
device# debug ip igmp protocol query
IGMP.VRF1: Query Port 1/1/3*1/1/14,v25 Grp 0.0.0.0
IGMP.QRY: [ Port 1/1/3*1/1/14,v25. Grp 0.0.0.0 ]. Processing version 2 query
IGMP.VRF1: Query Port 1/1/3*1/1/14,v25 Grp 0.0.0.0
IGMP.QRY: [ Port 1/1/3*1/1/14,v25. Grp 0.0.0.0 ]. Processing version 2 query
und allIGMP.VRF3: Query Port 1/1/3*1/1/14,v26 Grp 0.0.0.0
IGMP.QRY: [ Port 1/1/3*1/1/14,v26. Grp 0.0.0.0 ]. Processing version 2 query

144

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp show

debug ip igmp show
Displays the IGMP debug settings.

Syntax
debug ip igmp show decimal
no debug ip igmp show decimal

Parameters
decimal
Specifies the level of the IGMP. The valid values are from 1 through 3.

Modes
Privileged EXEC mode

Usage Guidelines
Do not use the show debug command for this purpose. The show debug command displays general debug information.

Examples
device# debug ip igmp show
igmp debug-enable-any = 1
debug ip igmp port-down is enabled
debug ip igmp detail is enabled
debug ip igmp level 2 is enabled

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

145

debug ip igmp source

debug ip igmp source
Matches the source of the control packet or IGMP V3 source packets.

Syntax
debug ip igmp source ipaddr
no debug ip igmp source ipaddr

Parameters
ipaddr
Specifies the IP address of the IGMP source.

Modes
Privileged EXEC mode

Examples
device# debug ip igmp source 16.16.16.222
device# IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=16.16.16.222 to
239.0.0.5, on v16 (phy 1/1/8), igmp_size=8

146

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp timer

debug ip igmp timer
Monitors the IGMP timer activity.

Syntax
debug ip igmp timer
no debug ip igmp timer

Modes
Privileged EXEC mode

Examples
device# debug ip igmp timer
monitor timer activity

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

147

debug ip igmp tx

debug ip igmp tx
Displays the IGMP packets transmitted.

Syntax
debug ip igmp tx
no debug ip igmp tx

Modes
Privileged EXEC mode

Examples
device# debug ip igmp tx
Brocade# debug ip igmp protocol query
IGMP.VRF2: [ Port 1/1/3*1/1/14,v21. Grp 0.0.0.0 ] Sent version 2 Query. size 8.
Src 21.0.0.6
IGMP.VRF2: [ Port 1/1/3*1/1/14,v21 ] Sent General Query version 2 using src
21.0.0.6
IGMP.VRF0: [ Port 1/1/7-1/1/8,tn11. Grp 0.0.0.0 ] Sent version 2 Query. size 8.
Src 61.0.0.6
IGMP.VRF0: [ Port 1/1/7-1/1/8,tn11 ] Sent General Query version 2 using src
61.0.0.6
IGMP.VRF0: [ Port 1/1/1-1/1/2,v91. Grp 0.0.0.0 ] Sent version 2 Query. size 8. Src
91.0.0.6
IGMP.VRF0: [ Port 1/1/1-1/1/2,v91 ] Sent General Query version 2 using src
91.0.0.6

148

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip igmp vrf

debug ip igmp vrf
Displays IGMP-related debug information for the specified VRF.

Syntax
debug ip igmp vrf vrf_name
no debug ip igmp vrf vrf_name

Modes
Privileged EXEC mode

Examples
device#
device#
device#
device#
device#

debug ip igmp
debug ip igmp
debug ip igmp
debug ip igmp
Debug: Jan 2

group 225.1.1.1
protocol report
enable
vrf br_vrf_1
00:24:23 IGMP.VRF1: Type V2 Report Port 2/1/21,v1 Grp 225.1.1.1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

149

debug ip msdp

debug ip msdp
Generates information about Multicast Source Discovery Protocol (MSDP) alarms, events, and messages.

Syntax
debug ip msdp [ alarms | events | message ]

Parameters
alarms
Displays information about the MSDP alarms.
events
Displays information about the MSDP events.
message
Displays information about the MSDP messages.

Modes
Privileged EXEC mode

Examples
The following example displays information about the MSDP processing alarms.
device# debug ip msdp alarms
: MSDP: S=xxxxxxx P=0 Initiate Transport Connection to MSDP peer
: MSDP: S=xxxxxxx P=0 Initiate Transport Connection to MSDP peer

The following example displays information about originating SA-advertisements, major peer events, and peer-keepalive timer
events.
device#
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:
: MSDP:

150

debug ip msdp events
10.120.120.45: Process START event, local = 10.120.120.31
S=xxxxxxx P=0 Initiate Transport Connection to MSDP peer
10.120.120.45: TCP Connection to Remote Peer is Open
10.120.120.45: MSDP-TCP Connection opened
10.120.120.45: TCP_OPEN DONE, State 4
Remote Peer closed TCP connection
10.120.120.45 Remote Peer closed TCP connection
Originating SA
Originating SA
Originating SA
Originating SA
Originating SA

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip msdp

The following example displays information about MSDP messages received, transmitted and forwarded, and flag errors in the
MSDP messages.
device# debug ip msdp message
: MSDP: 10.0.0.32: Xmt KA
: MSDP: 10.0.0.32: State=4, Rcv SA 20 bytes
RP: 10.0.0.32, Num SA: 1 10.17.17.1,237.14.18.3
: MSDP: 10.0.0.32: State=4, Rcv KA
: MSDP: 10.0.0.32: State=4, Rcv SA 20 bytes
RP: 10.0.0.32, Num SA: 1 10.17.17.1,237.14.18.3
: MSDP: 10.0.0.32: State=4, Rcv KA
: MSDP: 10.0.0.32: Xmt SA 32 bytes
RP: 10.0.0.45, Num SA: 2 10.14.14.14,237.14.18.3 10.17.17.1,237.14.18.3
: MSDP: 10.0.0.32: Xmt KA
: MSDP: 10.0.0.32: State=4, Rcv SA 20 bytes
RP: 10.0.0.32, Num SA: 1 10.17.17.1,237.14.18.3

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

151

debug ip ntp

debug ip ntp
Displays NTP system information.

Syntax
debug ip ntp [ algorithms | association | broadcast | clockadjust | errors | packet | server ]

Parameters
algorithms
Displays information about the NTP system algorithms.
association
Displays information about the NTP server and peer association.
broadcast
Displays information about the NTP broadcast server and client.
clockadjust
Displays information about the NTP clock-adjust process.
errors
Displays information about the NTP error events.
packet
Displays information about the NTP input and output packets.
server
Displays information about the NTP server.

Modes
Privileged EXEC mode

152

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ntp

Examples
The following example displays information about the NTP system algorithms.
device# debug ip ntp algorithms
NTP: ntp_peer_unfit: dist exceeded - root dist 16.00527999 of peer 10.25.96.13 has
exceeded max dist 1.50096000
NTP: ntp_peer_unfit: unreachable - peer 10.25.96.13 is not reachable [peer->reach
0]
Brocade(config-ntp)# NTP: ntp_clock_filter: Adding offset 0, delay 0, disp 16 to
filter[0] for peer 10.25.96.13
NTP: ntp_clock_filter: No acceptable samples available
NTP: ntp_clock_filter: Adding offset 0.01133625, delay 0.27379156, disp
0.00001936 to filter[1] for peer 10.25.96.13
NTP: ntp_clock_filter: mitigated sample stats: n 1 offset 0.01133625 del
0.27379156 dsp 7.93750968 jit 0.00001525
NTP: ntp_peer_unfit: dist exceeded - root dist 8.07442072 of peer 10.25.96.13 has
exceeded max dist 1.50096000
NTP: ntp_clock_select: number of final survivors 0 and leap vote 0
NTP: ntp_clock_select: No survivors found. sys_peer is set to NULL
NTP: ntp_clock_filter: Adding offset 0.02724471, delay 0.30800050, disp
0.00001988 to filter[2] for peer 10.25.96.13
NTP: ntp_clock_filter: mitigated sample stats: n 2 offset 0.02724471 del
0.30800050 dsp 3.93752228 jit 0.00001525
NTP: ntp_peer_unfit: dist exceeded - root dist 4.09153779 of peer 10.25.96.13 has
exceeded max dist 1.50096000
NTP: ntp_clock_update: at 430 sample 430 associd 2
NTP: ntp_rstclock: mu 67 new state 5 old state 5 offset -0.00001326

The following example displays information about the NTP server and peer association.
device# debug ip ntp association
NTP: peer_clear: peer 10.25.96.13 next 646 refid INIT
NTP: newpeer: 10.25.96.13 mode client vers 4 poll 6 10 key 00000000
Flags Flags -> iBURST
SYSLOG: <14>Mar 21 17:44:33 Murali NTP: client association is mobilized for
10.25.96.13.
SYSLOG: <14>Mar 21 17:44:33 Murali NTP: The system clock is not synchronized to
any time source.
SYSLOG: <14>Mar 21 17:44:40 Murali NTP: Stratum is changed to 2.
SYSLOG: <14>Mar 21 17:44:40 Murali NTP: System clock is synchronized to
10.25.96.13.

The following example displays information about the NTP clock-adjust process.
device# debug ip ntp clockadjust
NTP: ntp_clock_update: at 327 sample 327 associd 3
NTP: ntp_local_clock: hufbuf - ptr 1 mindly 0.23329046 huffpuff correction
-0.00067095
NTP: ntp_local_clock: clk offset 0.00917431 clk jit 0 clk stab 0 sys_poll 6
NTP: ntp_set_freq: drift 0.00000010, old freq 50000000
NTP: ntp_set_freq: new freq 49999995
NTP: ntp_adj_host_clock: new offset 0.00917431, freq 49999995
NTP: Adjusting the clock. offset 0.00917431, calib used 251687
NTP: After adjusting the clock. offset 0.00817431, calib used 252687
NTP: Adjusting the clock. offset 0.00817431, calib used 252687
NTP: After adjusting the clock. offset 0.00717431, calib used 253687
NTP: Adjusting the clock. offset 0.00717431, calib used 253687

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

153

debug ip ntp

The following example displays information about the NTP input and output packets.
device# debug ip ntp packet
NTP: Sending the NTP client packet to 10.25.96.13 port 123 via port id INVALID
Leap 3, Version 4, Mode client, Stratum 16, Poll 6,
Precision 2**-16, Root delay 0, Root disp 167, Ref Id INIT,
Ref time 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0)
Org 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0)
Rec 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0)
Xmt 230.745068249 (00:03:50.745068249 GMT+00 Mon Jan 01 0) pkt len = 48 key 0
NTP: Received NTP server packet from 10.25.96.13 on port 123 via port id mgmt1 at
00:03:50.1959316492 GMT+00 Mon Jan 01 0
Leap 0, Version 4, Mode server, Stratum 1, Poll 6,
Precision 2**-29, Root delay 0, Root disp 0, Ref Id 10.67.84.83,
Ref time 3572876227.2200200252 (17:37:07.2200200252 GMT+00 Thu Mar 21 2013)
Org 230.745068249 (00:03:50.745068249 GMT+00 Mon Jan 01 0)
Rec 3572876241.37257170 (17:37:21.37257170 GMT+00 Thu Mar 21 2013)
Xmt 3572876241.37302765 (17:37:21.37302765 GMT+00 Thu Mar 21 2013) pkt len =
48 key 0
NTP: Sending the NTP client packet to 10.25.96.13 port 123 via port id INVALID
Leap 3, Version 4, Mode client, Stratum 16, Poll 6,
Precision 2**-16, Root delay 0, Root disp 169, Ref Id INIT,
Ref time 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0)
Org 3572876241.37302765 (17:37:21.37302765 GMT+00 Thu Mar 21 2013)
Rec 230.1959316492 (00:03:50.1959316492 GMT+00 Mon Jan 01 0)
Xmt 232.784360585 (00:03:52.784360585 GMT+00 Mon Jan 01 0) pkt len = 48 key 0
NTP: Received NTP server packet from 10.25.96.13 on port 123 via port id mgmt1 at
00:03:52.1904063455 GMT+00 Mon Jan 01 0
Leap 0, Version 4, Mode server, Stratum 1, Poll 6,
Precision 2**-29, Root delay 0, Root disp 0, Ref Id 10.67.84.83,
Ref time 3572876227.2200200252 (17:37:07.2200200252 GMT+00 Thu Mar 21 2013)
Org 232.784360585 (00:03:52.784360585 GMT+00 Mon Jan 01 0)
Rec 3572876243.75963892 (17:37:23.75963892 GMT+00 Thu Mar 21 2013)
Xmt 3572876243.76010686 (17:37:23.76010686 GMT+00 Thu Mar 21 2013) pkt len =
48 key 0

The following example displays information about the NTP server.
device# debug ip ntp server
NTP: Received NTP client packet from 172.26.67.52 on port 123 via port id mgmt1 at
18:02:44.1139927355 GMT+00 Thu Mar 21 2013
Leap 0, Version 4, Mode client, Stratum 3, Poll 6,
Precision 2**-16, Root delay 16102, Root disp 90471, Ref Id 172.26.67.65,
Ref time 3572877762.1183164018 (18:02:42.1183164018 GMT+00 Thu Mar 21 2013)
Org 3572877762.1141785444 (18:02:42.1141785444 GMT+00 Thu Mar 21 2013)
Rec 3572877762.1183164018 (18:02:42.1183164018 GMT+00 Thu Mar 21 2013)
Xmt 3572877764.1137502159 (18:02:44.1137502159 GMT+00 Thu Mar 21 2013) pkt len
= 48 key 0
Brocade(config-ntp)# NTP: poll_update: for peer 10.250.229.100 hpoll 6 burst 0
retry 0 throttle 62 next poll 64
NTP: Received NTP server packet from 10.250.229.100 on port 123 via port id mgmt1
at 18:03:09.1891314446 GMT+00 Thu Mar 21 2013
Leap 0, Version 4, Mode server, Stratum 1, Poll 6,
Precision 2**-29, Root delay 0, Root disp 0, Ref Id 10.67.84.83,
Ref time 3572877762.155297680 (18:02:42.155297680 GMT+00 Thu Mar 21 2013)
Org 3572877789.878229501 (18:03:09.878229501 GMT+00 Thu Mar 21 2013)
Rec 3572877789.1401109720 (18:03:09.1401109720 GMT+00 Thu Mar 21 2013)
Xmt 3572877789.1401162509 (18:03:09.1401162509 GMT+00 Thu Mar 21 2013) pkt len
= 48 key 0
NTP: poll_update: for peer 10.250.229.100 hpoll 6 burst 0 retry 0 throttle 62 next
poll 67

154

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf

debug ip ospf
Generates OSPF debugging information for the specified IP address. Output indicates state transitions, hello packets received,
LSA acknowledgements received, LSA processing, flooding information, and database descriptions.

Syntax
debug ip ospf
no debug ip ospf

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip ospf 10.1.1.2
OSPF: debug ospf neighbor 10.1.1.2
Brocade(config)# OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1,
state DR, DR 10.1.1.1, BDR 10.1.1.2
OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED
OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR
10.1.1.1, BDR 10.1.1.2
OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED
OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR
10.1.1.1, BDR 10.1.1.2
OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

155

debug ip ospf adj

debug ip ospf adj
Displays information about OSPF adjacencies and authentication, including designated router (DR) and backup designated
router (BDR) elections, sent and received hello packets, neighbor state transitions, and database description information.

Syntax
debug ip ospf adj decimal
nodebug ip ospf adjdecimal

Parameters
decimal
Refers to a specific adjacency event.

Modes
Privileged EXEC mode

Examples
device# debug ip ospf adj
OSPF: adjacency events debugging is on
Brocade# debug ip ospf adj OSPF: send hello on area 0 interface 10.1.1.1
OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR
10.1.1.1, BDR 10.1.1.2
OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED
OSPF: send hello on area 0 interface 10.1.1.1
OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR
10.1.1.1, BDR 10.1.1.2
OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED
OSPF: send hello on area 0 interface 10.1.1.1
OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR
10.1.1.1, BDR 10.1.1.2
OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED

156

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf all-vrfs route

debug ip ospf all-vrfs route
Displays OSPF debugging information for all VPN routing and forwarding activity.

Syntax
debug ip ospf all-vrfs route
no debug ip ospf all-vrfs route

Modes
Privileged EXEC mode

Examples
device# debug ip ospf all-vrfs route
SPF: redistribute into ospf 10.3.13.0 with ffffff00 forwarding address 10.4.4.3
OSPF: originate external lsa 10.3.13.0 with ffffff00
OSPF: Originate external advs ext fwding address 10.4.4.3

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

157

debug ip ospf error

debug ip ospf error
Reports the receipt of OSPF packets with errors, or mismatches between hello packet options.

Syntax
debug ip ospf error
no debug ip ospf error

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip ospf error
OSPF: errors debugging is on
Brocade(config-vif-9)# Debug: Jan 1 03:37:11 OSPF: invalid header or unable to
find neighbor, drop
Debug: Jan 1 03:37:11 OSPF: recv from:10.9.9.2 Intf:ve 9 Hello L:48 A:1
Rid:10.2.2.2 DR:10.9.9.2 BDR:0.0.0.0
Debug: Jan 1 03:37:23 OSPF: invalid header or unable to find neighbor, drop
Debug: Jan 1 03:37:23 OSPF: recv from:10.9.9.2 Intf:ve 9 Hello L:48 A:1
Rid:10.2.2.2 DR:10.9.9.2 BDR:0.0.0.0
Debug: Jan 1 03:37:34 OSPF: invalid header or unable to find neighbor, drop
Debug: Jan 1 03:37:34 OSPF: recv from:10.9.9.2 Intf:ve 9 Hello L:48 A:1
Rid:10.2.2.2 DR:10.9.9.2 BDR:0.0.0.0

158

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf event

debug ip ospf event
Displays information about internal OSPF events related to configuration or interaction with the standby management processor
and interface state transitions.

Syntax
debug ip ospf event
no debug ip ospf event

Modes
Privileged EXEC mode

Examples
device# debug ip ospf event
OSPF: events debugging is on
Brocade# OSPF: Interface ve 18 (10.1.18.1) state Waiting processing event Wait
Timer
OSPF: DR/BDR election for 10.1.18.1 on ve 18
OSPF: Neighbor 10.213.213.213 int v18, state 2_WAY processing event ADJACENCY_OK
OSPF: send DBD to 10.213.213.213 on ve 18 flag 0x7 seq 0x18a3b9 len 32
OSPF: elect BDR(backup designated router): Router ID 10.213.213.213 IP interface
10.1.18.2
OSPF: elect DR(designated router): Router ID 10.10.10.77, IP interface 10.1.18.1
OSPF: Neighbor 10.116.116.1 int 2/1/21, state FULL processing event HELLO_RECEIVED
OSPF: Neighbor 10.116.116.1 int v511, state FULL processing event HELLO_RECEIVED
OSPF: Neighbor 10.116.116.1 int v911, state FULL processing event HELLO_RECEIVED
OSPF: Neighbor 41.41.41.41 int v35, state FULL processing event HELLO_RECEIVED
OSPF: Neighbor 10.213.213.213 int 2/1/14, state 2_WAY processing event
HELLO_RECEIVED
OSPF: Neighbor 10.116.116.1 int v511, state FULL processing event HELLO_RECEIVED
OSPF: send DBD to 10.213.213.213 on ve 18 flag 0x7 seq 0x18a3b9 len 32
OSPF: Neighbor 49.2.3.4 int v34, state FULL processing event HELLO_RECEIVED
OSPF: Neighbor 10.213.213.213 int v18, state EXCHANGE_START processing event
HELLO_RECEIVED
OSPF: Neighbor 10.213.213.213 int 4/1/12, state FULL processing event
HELLO_RECEIVED
Brocade# OSPF: Interface ethernet 4/1/12 (10.1.51.2) state Down processing event
Interface Up
virtual interface 10.1.51.2 up, state changed to Other from Point To Point
no deOSPF: Neighbor 10.213.213.213 int 4/1/12, state DOWN processing event
HELLO_RECEIVED
OSPF: Neighbor 10.213.213.213 int 4/1/12, state INITIALIZING processing event
ONE_WAY
bug ip OSPF: Neighbor 10.213.213.213 int 4/1/12, state INITIALIZING processing
event HELLO_RECEIVED

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

159

debug ip ospf flood

debug ip ospf flood
Displays information about LSA flooding activity

Syntax
debug ip ospf flood
no debug ip ospf flood

Modes
Privileged EXEC mode

Examples
device# debug ip ospf flood
OSPF: flooding debugging is on
Brocade(config-if-e1000-1/1/15)#OSPF: flood LSA Type:1 AdvRtr:10.2.1.1 Age:0
LsId:10.2.1.1
OSPF: flood advertisement 10.2.1.1 throughout a specific area = 0
OSPF: flood LSA Type:1 AdvRtr:10.2.1.1 Age:0 LsId:10.2.1.1
OSPF: flood advertisement 10.2.1.1 throughout a specific area = 0
OSPF: flooding type 1 advertisement out interface 10.1.1.1
OSPF: attempting to flood rcvd LSA area = 0 interface type = 1
OSPF: flood LSA Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1
OSPF: flood advertisement 10.3.1.1 throughout a specific area = 0
OSPF: attempting to flood rcvd LSA area = 0 interface type = 1
OSPF: flood LSA Type:2 AdvRtr:10.3.1.1 Age:3600 LsId:10.1.1.2
OSPF: flood advertisement 10.1.1.2 throughout a specific area = 0
OSPF: flood LSA Type:1 AdvRtr:10.2.1.1 Age:0 LsId:10.2.1.1
OSPF: flood advertisement 10.2.1.1 throughout a specific area = 0
OSPF: flooding type 1 advertisement out interface 10.1.1.1
OSPF: attempting to flood rcvd LSA area = 0 interface type = 1
OSPF: flood LSA Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1
OSPF: flood advertisement 10.3.1.1 throughout a specific area = 0
OSPF: attempting to flood rcvd LSA area = 0 interface type = 1
OSPF: flood LSA Type:2 AdvRtr:10.3.1.1 Age:1 LsId:10.1.1.2
OSPF: flood advertisement 10.1.1.2 throughout a specific area = 0

160

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf graceful-restart

debug ip ospf graceful-restart
Enable this command to receive information about OSPF graceful restart events, including restart phases, graceful Link-State
Advertisement (LSA) transmit and receive activity, and syslog messages.

Syntax
debug ip ospf graceful-restart
no debug ip ospf graceful-restart

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

161

debug ip ospf graceful-restart

Examples
device# debug ip ospf graceful-restart
OSPF: graceful-restart debugging is on
Brocade# LSA flush rcvd Type:4 AdvRtr:83.83.10.11 LsId:10.213.213.213
LSA flush rcvd Type:4 AdvRtr:83.83.10.11 LsId:10.213.213.213
LSA flush rcvd Type:4 AdvRtr:10.116.116.1 LsId:10.205.205.205
LSA flush rcvd Type:4 AdvRtr:10.116.116.1 LsId:10.205.205.205
rcv GRACE LSA from 10.1.14.1, age 0, Adv 10.213.213.213
install new GraceLSA, int 269, neighbor 10.1.14.1, age 0
rcv Grace_LSA from 10.1.14.1, area 0.0.0.10
Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0
neighbor 10.1.14.1 entering graceful restart state, timer 120, lsa age 0, max
120, helping 0
flood grace LSA, AdvRtr:10.213.213.213, Age:0
rcv GRACE LSA from 10.1.51.1, age 0, Adv 10.213.213.213
install new GraceLSA, int 779, neighbor 10.1.51.1, age 0
rcv Grace_LSA from 10.1.51.1, area 0.0.0.10
Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0
neighbor 10.1.51.1 entering graceful restart state, timer 120, lsa age 0, max
120, helping 0
flood grace LSA, AdvRtr:10.213.213.213, Age:0
rcv GRACE LSA from 10.1.18.2, age 0, Adv 10.213.213.213
install new GraceLSA, int 2050, neighbor 10.1.18.2, age 0
rcv Grace_LSA from 10.1.18.2, area 0.0.0.10
Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0
neighbor 10.1.18.2 entering graceful restart state, timer 120, lsa age 0, max
120, helping 0
flood grace LSA, AdvRtr:10.213.213.213, Age:0
rcv GRACE LSA from 10.1.14.1, age 0, Adv 10.213.213.213
Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.14.1
restart timer to 120
rcv GRACE LSA from 10.1.51.1, age 0, Adv 10.213.213.213
Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.51.1
restart timer to 120
rcv GRACE LSA from 10.1.18.2, age 0, Adv 10.213.213.213
Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.18.2
restart timer to 120
rcv GRACE LSA from 10.1.14.1, age 0, Adv 10.213.213.213
Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.14.1
restart timer to 120
rcv GRACE LSA from 10.1.51.1, age 0, Adv 10.213.213.213
Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.51.1
restart timer to 120
rcv GRACE LSA from 10.1.18.2, age 0, Adv 10.213.213.213
Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.18.2
restart timer to 120
Brocade# no debug ip ospf graceful-restart
OSPF: graceful-restart debugging is off

162

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf log-empty-lsa

debug ip ospf log-empty-lsa
Displays information about empty link state advertisements (LSAs).

Syntax
debug ip ospf log-empty-lsa
no debug ip ospf log-empty-lsa

Modes
Privileged EXEC mode
Global Configuration mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

163

debug ip ospf log-empty-lsa

Examples
device# debug ip ospf log-empty-lsa
device(config-if-e1000-1/1/15)# debug ip ospf log-empty-lsa
OSPF: empty-LSA logging debugging is on
device(config-if-e1000-1/1/15)# debug ip ospf flOSPF: originate router LSA, area
0
OSPF: No difference found, restart 0
OSPF: send ls request to neighbor 10.1.1.2, retran 0
OSPF: sending ls request last size 36, count 1
OSPF: LSA rcvd Type:1 AdvRtr:10.2.1.1 Age:297 LsId:10.2.1.1 Seq-Num 8000000e from
Neighbor 10.1.1.2
OSPF: Received self originated LSA type 1 with id = 10.2.1.1 Seq-Num 8000000e
OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 8000000f area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 8000000f
OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 962478204, retran 0
OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1
OSPF: originate router LSA, area 0
OSPF: originate_router_links_advertisement gen new instance set 10.2.1.1 (not
sent - wait for MinLSInterval)
OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 8000000f from
Neighbor 10.1.1.2
OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 8000000f area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 8000000f
OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:3600 LsId:115.1.1.2 Seq-Num 80000005
from Neighbor 10.1.1.2
OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 3600, seq 80000005 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 105.1.1.2 type 2 ToBesyncedState 2
OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 3600, seq 80000005
oOSPF: trying age out LSA, id 10.1.1.2, len 32, type 2, from 10.3.1.1, age 3600
genNewLsa 0 area 0
OSPF: age out and remove lsa data base 10.1.1.2
odsOSPF: OSPF TIMER: Minlsa: sptr_database_entry generate_new_instance == TRUE
for 1.2.1.1
OSPF: originate_delayed LSA, type 1, parm1: 0x0
OSPF: originate router LSA, area 0
OSPF: difference found, restart 0
OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 80000010 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 80000010
OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 1.2.1.1, seq 0x8000000f, adv
10.2.1.1, age 1
OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 1017253324, retran 0
OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1
OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 80000010 from
Neighbor 10.1.1.2
OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 80000010 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 80000010
OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:1 LsId:10.1.1.2 Seq-Num 80000006 from
Neighbor 10.1.1.2
OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 1, seq 80000006 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.1.1.2 type 2 ToBesyncedState 2
OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 1, seq 80000006
OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 10.2.1.1, seq 0x80000010, adv
10.2.1.1, age 1
OSPF: originate router LSA, area 0
OSPF: No difference found, restart 0

164

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf log-empty-lsa

debug ip ospf log-empty-lsa
Displays information about empty link state advertisements (LSAs).

Syntax
debug ip ospf log-empty-lsa
no debug ip ospf log-empty-lsa

Modes
Privileged EXEC mode
Global Configuration mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

165

debug ip ospf log-empty-lsa

Examples
device# debug ip ospf log-empty-lsa
device(config-if-e1000-1/1/15)# debug ip ospf log-empty-lsa
OSPF: empty-LSA logging debugging is on
device(config-if-e1000-1/1/15)# debug ip ospf flOSPF: originate router LSA, area
0
OSPF: No difference found, restart 0
OSPF: send ls request to neighbor 10.1.1.2, retran 0
OSPF: sending ls request last size 36, count 1
OSPF: LSA rcvd Type:1 AdvRtr:10.2.1.1 Age:297 LsId:10.2.1.1 Seq-Num 8000000e from
Neighbor 10.1.1.2
OSPF: Received self originated LSA type 1 with id = 10.2.1.1 Seq-Num 8000000e
OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 8000000f area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 8000000f
OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 962478204, retran 0
OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1
OSPF: originate router LSA, area 0
OSPF: originate_router_links_advertisement gen new instance set 10.2.1.1 (not
sent - wait for MinLSInterval)
OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 8000000f from
Neighbor 10.1.1.2
OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 8000000f area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 8000000f
OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:3600 LsId:115.1.1.2 Seq-Num 80000005
from Neighbor 10.1.1.2
OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 3600, seq 80000005 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 105.1.1.2 type 2 ToBesyncedState 2
OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 3600, seq 80000005
oOSPF: trying age out LSA, id 10.1.1.2, len 32, type 2, from 10.3.1.1, age 3600
genNewLsa 0 area 0
OSPF: age out and remove lsa data base 10.1.1.2
odsOSPF: OSPF TIMER: Minlsa: sptr_database_entry generate_new_instance == TRUE
for 1.2.1.1
OSPF: originate_delayed LSA, type 1, parm1: 0x0
OSPF: originate router LSA, area 0
OSPF: difference found, restart 0
OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 80000010 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 80000010
OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 1.2.1.1, seq 0x8000000f, adv
10.2.1.1, age 1
OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 1017253324, retran 0
OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1
OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 80000010 from
Neighbor 10.1.1.2
OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 80000010 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2
OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 80000010
OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:1 LsId:10.1.1.2 Seq-Num 80000006 from
Neighbor 10.1.1.2
OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 1, seq 80000006 area-id 0
OSPF: NSR Sync ACK received for LSA
OSPF: ls_header.id 10.1.1.2 type 2 ToBesyncedState 2
OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 1, seq 80000006
OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 10.2.1.1, seq 0x80000010, adv
10.2.1.1, age 1
OSPF: originate router LSA, area 0
OSPF: No difference found, restart 0

166

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf lsa-generation

debug ip ospf lsa-generation
Displays information about link state advertisements (LSAs).

Syntax
debug ip ospf lsa-generation
no debug ip ospf lsa-generation

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip ospf lsa-generation
OSPF: lsa generation debugging is on
device(config-if-e1000-1/1/15)#OSPF: originate router LSA, area 0
OSPF: trying age out LSA, id 10.2.1.1, len 36, type 1, from 10.2.1.1, age 3600
genNewLsa 0 area 0
OSPF: age out and remove lsa data base 10.2.1.1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

167

debug ip ospf lsa-id

debug ip ospf lsa-id
Generates information about OSPF Link-State Advertisement (LSA) IDs.

Syntax
debug ip ospf lsa-id
no debug ip ospf lsa-id

Modes
Privileged EXEC mode
Global Configuration mode

Usage Guidelines
The debug ip ospf lsa-id command must be enabled with the debug ip ospf flood or the debug ip ospf lsa-generation
command.

Examples
device# debug ip ospf lsa-id
Debug message destination: Console
IP Routing:
OSPF: flooding debugging is on
OSPF: lsa generation debugging is on
OSPF: ls-id 10.2.2.2 debugging is on
device(config-ospf-router)# Debug: Jan 1 04:12:50 OSPF: LSA rcvd Type:1
AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2 Seq-Num 8000000e from Neighbor 10.9.9.2
Debug: Jan 1 04:12:50 OSPF: install a new lsa, type 1, ls_id 10.2.2.2, age 1, seq
8000000e area-id 0
Debug: Jan 1 04:12:50 OSPF: NSR Sync ACK received for LSA
Debug: Jan 1 04:12:50 OSPF: ls_header.id 10.2.2.2 type 1 ToBesyncedState 2
Debug: Jan 1 04:12:50 OSPF: NSR : Sync node add, type 1, ls_id 10.2.2.2, age 1,
seq 8000000e
Debug: Jan 1 04:12:50 OSPF: attempting to flood rcvd LSA area = 0 interface type
= 1
Debug: Jan 1 04:12:50 OSPF: flood LSA Type:1 AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2
Debug: Jan 1 04:12:50 OSPF: flood advertisement 10.2.2.2 throughout a specific
area = 0
Debug: Jan 1 04:12:51 OSPF: LSA rcvd Type:1 AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2
Seq-Num 8000000f from Neighbor 10.9.9.2
Debug: Jan 1 04:12:51 OSPF: install a new lsa, type 1, ls_id 10.2.2.2, age 1, seq
8000000f area-id 0
Debug: Jan 1 04:12:51 OSPF: NSR Sync ACK received for LSA
Debug: Jan 1 04:12:51 OSPF: ls_header.id 10.2.2.2 type 1 ToBesyncedState 2
Debug: Jan 1 04:12:51 OSPF: NSR : Sync node add, type 1, ls_id 10.2.2.2, age 1,
seq 8000000f
Debug: Jan 1 04:12:51 OSPF: attempting to flood rcvd LSA area = 0 interface type
= 1
Debug: Jan 1 04:12:51 OSPF: flood LSA Type:1 AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2
Debug: Jan 1 04:12:51 OSPF: flood advertisement 10.2.2.2 throughout a specific
area = 0

168

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf max-metric

debug ip ospf max-metric
Displays debugging information about the max-metric configuration.

Syntax
debug ip ospf max-metric
no debug ip ospf max-metric

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip ospf max-metric
OSPF: max-metric debugging is on
device(config-ospf-router)# max-metric router-lsa all-lsas
Debug: Jan 1 04:20:05 OSPF: Max-metric advertisement started due to configuration
change for vrf 0

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

169

debug ip ospf packet

debug ip ospf packet
Generates debugging information about the Open Shortest Path First (OSPF) packets.

Syntax
debug ip ospf packet [detail decimal | in | out | peer ip-addr | port [ethernet stackid/slot/port | ve decimal] src-ip ip-addr | type
{ack | dd | hello | request | update}]
no debug ip ospf packet

Parameters
detail decimal
Refers to the level by bit 0 and 1 and stack trace send by bit 2.
in
Refers only to the input packets.
out
Refers only to the output packets.
peer ip-addr
Matches with the peer (advertisement router).
port
Matches with the I/O port.
ethernet stackid/slot/port
Refers to the stack ID, slot, or Ethernet port.
ve decimal
Refers to the ID of the virtual Ethernet interface.
src-ip ip-addr
Matches with the source IP address.
type
Matches with the packet type.
ack
Indicates the acknowledgement packet type.
dd
Indicates the Database Description (DD) packet type.
hello
Indicates the hello packet type.
request
Indicates the request packets sent from a client to a server.
update
Indicates the update packets sent from a server to a client.

170

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf packet

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

171

debug ip ospf packet

Examples
device# debug ip ospf packet
device# OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Ack L:104 Auth:0
ID:10.213.213.213
OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Ack L:104 Auth:0
ID:10.213.213.213
OSPF: send to:224.0.0.5 Intf:ve 36 Hello L:44 Auth:0 ID:10.10.10.77 DR:10.36.2.1
BDR:0.0.0.0
OSPF: send to:224.0.0.5 Intf:ve 36 Hello L:44 Auth:0 ID:10.10.10.77
DR:10.36.100.1 BDR:0.0.0.0
OSPF: send to:224.0.0.5 Intf:ve 511 Hello L:48 Auth:0 ID:10.10.10.77
DR:10.1.251.7 BDR:10.1.251.6
OSPF: send to:224.0.0.5 Intf:e 2/1/14 Hello L:48 Auth:0 ID:10.10.10.77
DR:10.1.14.2 BDR:10.1.14.1
OSPF: send to:224.0.0.5 Intf:e 2/1/21 LS-Ack L:104 Auth:0 ID:10.10.10.77
OSPF: send to:224.0.0.5 Intf:e 2/1/21 Hello L:48 Auth:0 ID:10.10.10.77 DR:0.0.0.0
BDR:0.0.0.0
OSPF: send to:224.0.0.5 Intf:ve 35 Hello L:48 Auth:0 ID:10.10.10.77
DR:10.1.35.16 BDR:10.1.35.15
OSPF: send to:10.1.251.6 Intf:ve 511 Hello L:48 Auth:0 ID:10.10.10.77 DR:0.0.0.0
BDR:0.0.0.0
OSPF: send to:10.1.18.2 Intf:e 4/1/12 Hello L:48 Auth:0 ID:10.10.10.77 DR:0.0.0.0
BDR:0.0.0.0
OSPF: recv from:10.1.35.15 to 224.0.0.5 Intf:ve 35 LS-Ack L:104 Auth:0
ID:41.41.41.41
OSPF: recv from:10.1.251.18 to 10.1.251.17 Intf:e 2/1/21 Hello L:48 Auth:0
ID:10.116.116.1 DR:0.0.0.0 BDR:0.0.0.0
OSPF: recv from:10.1.34.10 to 224.0.0.5 Intf:ve 34 LS-Ack L:104 Auth:0
ID:49.2.3.4
OSPF: recv from:10.1.34.10 to 224.0.0.5 Intf:ve 34 Hello L:48 Auth:0 ID:49.2.3.4
DR:10.1.34.16 BDR:10.1.34.10
OSPF: recv from:10.1.251.18 to 224.0.0.5 Intf:e 2/1/21 LS-Upd L:136 Auth:0
ID:10.116.116.1 Cnt:3
OSPF: send to:224.0.0.5 Intf:ve 18 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3
OSPF: send to:224.0.0.5 Intf:e 2/1/14 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3
OSPF: send to:224.0.0.5 Intf:e 4/1/12 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3
OSPF: send to:224.0.0.5 Intf:ve 34 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3
OSPF: send to:224.0.0.5 Intf:ve 35 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3
OSPF: recv from:10.1.251.6 to 224.0.0.5 Intf:ve 511 LS-Upd L:136 Auth:0
ID:10.116.116.1 Cnt:3
OSPF: send to:10.1.251.6 Intf:ve 511 LS-Ack L:84 Auth:0 ID:10.10.10.77
OSPF: recv from:10.1.91.18 to 224.0.0.5 Intf:ve 911 LS-Upd L:136 Auth:0
ID:10.116.116.1 Cnt:3
OSPF: send to:10.1.91.18 Intf:ve 911 LS-Ack L:84 Auth:0 ID:10.10.10.77
OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Upd L:136 Auth:0
ID:10.213.213.213 Cnt:3
OSPF: recv from:10.1.51.1 to 224.0.0.5 Intf:e 4/1/12 LS-Upd L:136 Auth:0
ID:10.213.213.213 Cnt:3
OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Upd L:136 Auth:0
ID:10.213.213.213 Cnt:3
OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Ack L:84 Auth:0
ID:10.213.213.213
OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Ack L:84 Auth:0
ID:10.213.213.213
OSPF: send to:224.0.0.5 Intf:ve 911 Hello L:48 Auth:0 ID:10.10.10.77
DR:10.1.91.16 BDR:10.1.91.18
OSPF: send to:224.0.0.5 Intf:loopback 1 Hello L:44 Auth:0 ID:10.10.10.77
DR:10.10.10.77 BDR:0.0.0.0
OSPF: send to:224.0.0.5 Intf:loopback 2 Hello L:44 Auth:0 ID:10.10.10.77
DR:10.10.62.10 BDR:0.0.0.0
OSPF: send to:224.0.0.5 Intf:loopback 3 Hello L:44 Auth:0 ID:10.10.10.77
DR:10.10.63.10 BDR:0.0.0.0
OSPF: send to:224.0.0.5 Intf:loopback 4 Hello L:44 Auth:0 ID:10.10.10.77
DR:10.10.64.10 BDR:0.0.0.0
OSPF: send to:224.0.0.5 Intf:e 2/1/21 LS-Ack L:84 Auth:0 ID:10.10.10.77
OSPF: recv from:10.1.35.15 to 224.0.0.5 Intf:ve 35 LS-Ack L:84 Auth:0
ID:41.41.41.41
OSPF: recv from:10.1.34.10 to 224.0.0.5 Intf:ve 34 LS-Ack L:84 Auth:0 ID:49.2.3.4
OSPF: recv from:10.1.251.18 to 224.0.0.5 Intf:e 2/1/21 LS-Upd L:100 Auth:0
ID:10.116.116.1 Cnt:2

172

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf packet

OSPF: send to:224.0.0.5 Intf:ve 18 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2
OSPF: send to:224.0.0.5 Intf:e 2/1/14 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2
OSPF: send to:224.0.0.5 Intf:e 4/1/12 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2
OSPF: send to:224.0.0.5 Intf:ve 34 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2
OSPF: send to:224.0.0.5 Intf:ve 35 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2
OSPF: recv from:10.1.251.6 to 224.0.0.5 Intf:ve 511 LS-Upd L:100 Auth:0
ID:10.116.116.1 Cnt:2
OSPF: send to:10.1.251.6 Intf:ve 511 LS-Ack L:64 Auth:0 ID:10.10.10.77
OSPF: recv from:10.1.91.18 to 224.0.0.5 Intf:ve 911 LS-Upd L:100 Auth:0
ID:10.116.116.1 Cnt:2
OSPF: send to:10.1.91.18 Intf:ve 911 LS-Ack L:64 Auth:0 ID:10.10.10.77
OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Upd L:100 Auth:0
ID:10.213.213.213 Cnt:2
OSPF: recv from:10.1.51.1 to 224.0.0.5 Intf:e 4/1/12 LS-Upd L:100 Auth:0
ID:10.213.213.213 Cnt:2
OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Upd L:100 Auth:0
ID:10.213.213.213 Cnt:2
OSPF: recv from:10.1.251.6 to 224.0.0.5 Intf:ve 511 LS-Upd L:748 Auth:0
ID:10.116.116.1 Cnt:20
OSPF: send to:224.0.0.5 Intf:ve 18 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20
OSPF: send to:224.0.0.5 Intf:e 2/1/14 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20
OSPF: send to:224.0.0.5 Intf:e 4/1/12 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20
OSPF: send to:224.0.0.5 Intf:ve 34 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20
OSPF: send to:224.0.0.5 Intf:ve 35 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

173

debug ip ospf retransmission

debug ip ospf retransmission
Generates internal information about Open Shortest Path First (OSPF) retransmission of link state advertisements (LSAs).

Syntax
debug ip ospf retransmission
no debug ip ospf retransmission

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip ospf retransmission
device(config)# clear ip routeOSPF: examine each neighbor and add advertisement
ls-id 10.3.13.0 to the retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the
retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the
retransmission list if necessary
device(config)# OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0
to the retransmission list if necessary
OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0 to the
retransmission list if necessary

174

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf route

debug ip ospf route
Generates information about Open Shortest Path First (OSPF) routes.

Syntax
debug ip ospf route ip_address
no debug ip ospf route ip_address

Parameters
ip_address
Specifies the IP address of the OSPF route.

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip ospf route 10.3.3.0
OSPF: debug ospf route 10.3.3.0
device(config-if-e1000-1/1/15)# debug ip ospf route 192.168.30.0
OSPF: debug ospf route 192.168.30.0
device(config-if-e1000-1/1/15)#OSPF: invalidate whole table - entry
192.168.30.0, state 0, path type 3
OSPF: calc ext route 192.168.30.0
OSPF: delete route 192.168.30.0 from rtm 0x367e7270, not_in_main 0
OSPF: calc ext route 192.168.30.0
OSPF: calc ext route 192.168.30.0
OSPF: calc ext route 192.168.30.0
OSPF: calc ext route 192.168.30.0
OSPF: ext route, net = 192.168.30.0, mask = 10.255.255.0 advrtr = 10.3.1.1, fwd =
0.0.0.0
OSPF: ext route changed 192.168.30.0, state 0
OSPF: ext route new 192.168.30.0, state 2, path type 3
OSPF: add route 192.168.30.0 to rtm, next hop 115.1.1.2, type 3, state 3,
not_in_main 1
OSPF: add to ospf route table, to valid 192.168.30.0, state 3, path type 3
OSPF: Modify route 192.168.30.0, type 3, state 3, not_in_main 0, next hop 10.1.1.2
OSPF: modify/modify route 192.168.30.0 (fwd 367e7333), type 3, state 3,
not_in_main 0, nhp 381c51c0
OSPF: validate route, new->valid 192.168.30.0, state 3, path type 3

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

175

debug ip ospf spf

debug ip ospf spf
Generates information about Open Shortest Path First (OSPF) activity including SPF runs and calculations.

Syntax
debug ip ospf spf
no debug ip ospf spf

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip ospf spf
OSPF: spf-short debugging is on
Disable neighbor
device(config-ospf-router)# Debug: Jan 1 02:38:55 OSPF: Schedule SPF(8001), in
prog 0, ospf build_routing_table 0 phase 1
Debug: Jan 1 02:38:55 OSPF: schedule spf, init spf delay 0, next hold 0 (ticks)
Debug: Jan 1 02:38:55 OSPF: Add to spf pending list, current time 96788,
scheduled 96788, next run 96788
Debug: Jan 1 02:38:55 OSPF: Schedule SPF(7001), in prog 0, ospf
build_routing_table 0 phase 1
Debug: Jan 1 02:38:55 OSPF: Schedule SPF(6002), in prog 0, ospf
build_routing_table 0 phase 1
Debug: Jan 1 02:38:55 OSPF: timer: give semaphore, start spf phase 1, time 96789,
scheduled 96788, run time 96788
Debug: Jan 1 02:38:55 OSPF: begin intra SPF run, chunk-id 0/-1 just_become_abr 0,
is_abr 0
Debug: Jan 1 02:38:55 OSPF: invalidate whole routing table, recal_just_become_abr
0, just_become_abr 0
Debug: Jan 1 02:38:55 OSPF: running SPF for area 0 area-18ce7068 nextarea 0
next-area-id -1
Debug: Jan 1 02:38:55 OSPF: completed SPF for all areas
Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_INTRA end at 96789, is_abr 0
Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TRANSIT end at 96789
Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TYPE5 end at 96789
Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TYPE7 end at 96789
Debug: Jan 1 02:38:55 OSPF: summary phase, is_abr 0
Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_SUMMARY end at 96789
Debug: Jan 1 02:38:55 OSPF: translation phase, is_abr 0
Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TRANSLATION end at 96789
Debug: Jan 1 02:38:55 OSPF: SPF_cleanup: current 96789, set next run time 96788,
current hold 0, next hold 0
Debug: Jan 1 02:38:55 OSPF: ROUTE CALC end at 96789, pending 0

176

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ospf vrf

debug ip ospf vrf
Generates debugging information about the Open Shortest Path First (OSPF) Virtual Routing and Forwarding (VRF) instance.

Syntax
debug ip ospf vrf
no debug ip ospf vrf

Modes
Privileged EXEC mode

Examples
device# debug ip ospf vrf
OSPF(one): send hello on area 0 interface 10.3.4.1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

177

debug ip pim

debug ip pim
Enables the Protocol Independent Multicast (PIM) debugging.

Syntax
debug ip pim
no debug ip pim

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables PIM debugging.

Examples
device# debug ip pim
PIM: pim debugging is on

178

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim add-del-oif

debug ip pim add-del-oif
Displays information about the mcache activity.

Syntax
debug ip pim add-del-oif
no debug ip pim add-del-oif

Modes
Privileged EXEC mode

Usage Guidelines
The command will work with the debug ip pim group or debug ip pim source commands.

Examples
device# debug ip pim add-del-oif
PIM: add-del-oif debugging is on
device# Debug: Jan 2 00:18:27 PIMSM.VRF1: OIF FSM 1 for (*, 225.1.1.1) entry Reason(IgmpGrpJoin),
Action(Update), flagAction(1) CurrentState(0x4) NewState(0x4)
Debug: Jan 2 00:18:27 PIM.VRF1: OIF Add v1,2/1/21 to (102.1.1.20 225.1.1.1) entry receivers mbrship type 1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

179

debug ip pim bootstrap

debug ip pim bootstrap
Enables bootstrap debugging.

Syntax
debug ip pim bootstrap
no debug ip pim bootstrap

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables bootstrap debugging.

Examples
device# debug ip pim bootstrap
PIM: bootstrap debugging is on
device# PIM-BSR.VRF0: Prefer BSR 10.0.0.43(Pr 43) over current BSR 10.0.0.43(Pr
43)
PIM-BSR.VRF0: Intf tn4 - accept BSM from BSR 10.0.0.43(Pr 43), local state
CandBSR, curr BSR 10.0.0.43 (Pr 43)

180

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim clear

debug ip pim clear
Clears all the Protocol Independent Multicast (PIM) debug settings.

Syntax
debug ip pim clear
no debug ip pim clear

Modes
Privileged EXEC mode

Examples
device# debug ip pim clear
no debug ip pim is enabled

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

181

debug ip pim control-source

debug ip pim control-source
Monitors the control packet sent by the given router and displays debugging information.

Syntax
debug ip pim control-source ip_address
no debug ip pim control-source ip_address

Parameters
ip_address
Specifies the IP address of the control source.

Modes
Privileged EXEC mode

Examples
device# debug
device# IGMP:
224.0.0.1, on
device# IGMP:
224.0.0.1, on

182

ip pim control-source 10.10.10.129
rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.10.10.129 to
v100 (phy 8/1/22), igmp_size=8
rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.10.10.129 to
v100 (phy 8/1/22), igmp_size=8

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim event

debug ip pim event
Enables debugging of Protocol Independent Multicast (PIM) events.

Syntax
debug ip pim event
no debug ip pim event

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables PIM events debugging.

Examples
device# debug ip pim event
PIM: event debugging is on
device(config)# int ethernet 1/1/11
device(config-if-e1000-1/1/11)# disable
device(config-if-e1000-1/1/11)# Mcastv4 receive event 16
Mcastv4 receive event 16
Mcastv4 receive event 16
Mcastv4 receive event 16
Mcastv4 receive event 13
MC-EVT: Port tn4 state changed to DOWN
PIM-EVT.VRF0: Receive intf tn4 Dn state_notify
Mcastv4 receive event 6
device(config-if-e1000-1/1/11)# enable
Mcastv4 receive event 15
Mcastv4 receive event 15
Mcastv4 receive event 15
Mcastv4 receive event 15

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

183

debug ip pim group

debug ip pim group
Displays the Protocol Independent Multicast (PIM) related activities for the specified IP address of the PIM group.

Syntax
debug ip pim group ip_address
no debug ip pim group ip_address

Parameters
ip_address
Specifies the IP address of the PIM group.

Modes
Privileged EXEC mode

184

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim group

Examples
device# debug ip pim group 227.1.1.1
device# Proc IGMP join g=227.1.1.1 from v300(2/1/17) 10.11.55.55
PIM: send prune v100, source 10.11.99.99 group 227.1.1.1 nbr 10.10.10.129
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 227.1.1.1
Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=34 to v100
PIM: send prune v100, source 0.0.0.0 group 227.1.1.1 nbr 10.10.10.129
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 227.1.1.1
Prune list: (0.0.0.0 227.1.1.1) wc=0 rpt=0 sparse=1
Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=42 to v100
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 227.1.1.1
Prune list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=34 to v100
join_prune_timer, (10.11.99.99 227.1.1.1) num=0, RPT=0, group_on_dr_and_sg=0, PR
UNE
join_prune_timer, (10.11.99.99 227.1.1.1) ->num=0, rpt=0, spt=1, SRC=v100, RP=v1
00
join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond.
join_prune_timer, (0.0.0.0 227.1.1.1) rp not local, send join or prune, wc=1, rp
t=1
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 227.1.1.1
Prune list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1
Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100
device# show ip pim group | i 227.1.1.1
device# join_prune_timer, (10.11.99.99 227.1.1.1) num=0, RPT=0, group_on_
dr_and_sg=0, PRUNE
join_prune_timer, (10.11.99.99 227.1.1.1) ->num=0, rpt=0, spt=1, SRC=v100, RP=v1
00
join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond.
join_prune_timer, (0.0.0.0 227.1.1.1) rp not local, send join or prune, wc=1, rp
t=1
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 227.1.1.1
Prune list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1
Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100
device# Proc IGMP join g=227.1.1.1 from v300(2/1/17) 10.11.55.55
join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0, JOI
N
join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v1
00
join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond.
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 227.1.1.1
Join list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1
Join list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=42 to v100
device# Proc IGMP join g=227.1.1.1 from v300(2/1/17) 10.11.55.55
device# join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0,
am_rp_and_proxy=0, JOIN
join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v1
00
join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond.
join_prune_timer, (0.0.0.0 227.1.1.1) rp not local, send join or prune, wc=1, rp
t=1
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 227.1.1.1
Join list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1
Join list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100
reset age (10.11.99.99, 227.1.1.1)
device# show ip pim group | i 227.1.1.1
Index 7 Group 227.1.1.1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

185

debug ip pim join-prune

debug ip pim join-prune
Controls join prune processing and displays debugging information related to the join prune messages.

Syntax
debug ip pim join-prune
no debug ip pim join-prune

Modes
Privileged EXEC mode

Examples
device# debug ip pim join-prune
PIM: join-prune debugging is on
device# PIM.VRF0: (10.0.0.178 232.0.0.6) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.6) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.7) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.7) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.8) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.8) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.9) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.9) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.10) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.10) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.11) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.11) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.12) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.12) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.13) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.13) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.14) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.14) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.15) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.15) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.16) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.16) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.17) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.17) RPFIf v76. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.178 232.0.0.18) RPFIf v75. RPFNbr -. Send Join/Prune
PIM.VRF0: (10.0.0.168 232.0.0.18) RPFIf v76. RPFNbr -. Send Join/Prune

186

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim level

debug ip pim level
Sets the Protocol Independent Multicast (PIM) level.

Syntax
debug ip pim level decimal
no debug ip pim level

Parameters
decimal
Specifies the number of the PIM level. The valid values are from 1 through 3.

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

187

debug ip pim level

Examples
device# debug ip pim level
DECIMAL 1-3 (most detailed)
device# debug ip pim level 1
debug level = 1
device# rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v10
0 (8/1/22)
rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v100 (8/1/22)
device# debug ip pim level 2
debug level = 2
device# 00:21:13 Send PIM_V2 Hello Src 10.10.10.119 Dst 224.0.0.13 Len 3
4 on v100
00:21:13 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200
00:21:13 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300
rcvd PIM_V2 Bootstrap, from 10.10.10.129 to 224.0.0.13 Len 36 on v100 (8/1/22)
00:21:16 Send PIM_V2 Hello Src 10.10.10.119 Dst 224.0.0.13 Len 34 on v100
00:21:16 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200
00:21:16 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300
PIMSM: BEGIN Periodic join-prune msgs
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129,
group address: 225.1.1.10
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=42 to v100
group address: 225.1.1.9
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=70 to v100
group address: 225.1.1.8
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=98 to v100
group address: 225.1.1.7
send_J/P_msg(), lcl_adr=00.10.10.119 dest=224.0.0.13 pkt_size=126 to v100
group address: 225.1.1.6
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=154 to v100
group address: 225.1.1.5
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=182 to v100
group address: 225.1.1.4
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=210 to v100
group address: 226.1.1.1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=238 to v100
group address: 225.1.1.3
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=266 to v100
group address: 225.1.1.2
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=294 to v100
group address: 225.1.1.1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=322 to v100
group address: 226.1.1.2
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=350 to v100
group address: 227.1.1.2
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=378 to v100
group address: 227.1.1.1
send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100
00:21:16 Send PIM_V2 Join/Prune Src 10.10.10.119 Dst 224.0.0.13 Len 406 on v100
PIMSM: END Periodic join-prune msgs
device# debug ip pim level 3
debug level = 3
device# rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v10
0 (8/1/22)
Hello msg v100, source 10.10.10.129 group 224.0.0.13
rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v100 (8/1/22)
Hello msg v100, source 10.10.10.129 group 224.0.0.13
Proc IGMP join g=226.1.1.2 from v200(5/1/13) 10.11.66.66
Proc IGMP join g=225.1.1.1 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=225.1.1.2 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=225.1.1.3 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=226.1.1.1 from v200(8/1/17)10.11.22.22
Proc IGMP join g=225.1.1.4 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=225.1.1.5 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=225.1.1.6 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=225.1.1.7 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=225.1.1.8 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=227.1.1.1 from v300(2/1/17)10.11.55.55
Proc IGMP join g=225.1.1.9 from v200(5/1/9) 10.11.10.77

188

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim level

Proc IGMP join g=225.1.1.10 from v200(5/1/9) 10.11.10.77
Proc IGMP join g=227.1.1.2 from v300(2/1/17) 10.11.55.55
00:22:13 Send PIM_V2 Hello Src 10.10.119 Dst 224.0.0.13 Len 34 on v100
00:22:13 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200
00:22:13 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300
rcvd PIM_V2 Bootstrap, from 10.10.129 to 224.0.0.13 Len 36 on v100 (8/1/22)
00:22:16 Send PIM_V2 Hello Src 10.10.119 Dst 224.0.0.13 Len 34 on v100
00:22:16 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200
00:22:16 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300
PIMSM: BEGIN Periodic join-prune msgs
Begin sending Join/Prune msg to v100, rpf_nbr=10.10.129,
group address: 225.1.1.10
Join list: (10.10.129 225.1.1.10) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.10) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=42 to v100
group address: 225.1.1.9
Join list: (10.10.129 225.1.1.9) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.9) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=70 to v100
group address: 225.1.1.8
Join list: (10.10.129 225.1.1.8) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.8) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=98 to v100
group address: 225.1.1.7
Join list: (10.10.129 225.1.1.7) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.7) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=126 to v100
group address: 225.1.1.6
Join list: (10.10.129 225.1.1.6) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.6) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=154 to v100
group address: 225.1.1.5
Join list: (10.10.129 225.1.1.5) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.5) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=182 to v100
group address: 225.1.1.4
Join list: (10.10.129 225.1.1.4) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.4) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=210 to v100
group address: 226.1.1.1
Join list: (10.10.129 226.1.1.1) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 226.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=238 to v100
group address: 225.1.1.3
Join list: (10.10.129 225.1.1.3) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.3) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=266 to v100
group address: 225.1.1.2
Join list: (10.10.129 225.1.1.2) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.2) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=294 to v100
group address: 225.1.1.1
Join list: (10.10.129 225.1.1.1) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 225.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=322 to v100
group address: 226.1.1.2
Join list: (10.10.129 226.1.1.2) wc=1 rpt=1 sparse=1
Join list: (10.11.10.101 226.1.1.2) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=350 to v100
group address: 227.1.1.2
Join list: (10.10.129 227.1.1.2) wc=1 rpt=1 sparse=1
Join list: (10.11.99.99 227.1.1.2) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=378 to v100
group address: 227.1.1.1
Join list: (10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1
Join list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1
send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=406 to v100
00:22:16 Send PIM_V2 Join/Prune Src

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

189

debug ip pim nbr-change

debug ip pim nbr-change
Controls the Protocol Independent Multicast (PIM) IPv4 neighbor changes.

Syntax
debug ip pim nbr-change nbr_address
no debug ip pim nbr-change nbr_address

Parameters
nbr_address
Specifies the IP address of the neighbor.

Modes
Privileged EXEC mode

Examples
device# debug ip pim nbr-change 10.144.144.12
PIM: nbr-change debugging is on
device(config-if-e1000-1/1/11)# PIM-NBR.VRF0: Neighbor 10.144.144.12 on
interface tn4, 1/1/11 deleted on port-down
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.11) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.12) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.13) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.14) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.15) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.16) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.17) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.18) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.19) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.20) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.21) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.22) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.23) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.24) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.25) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.26) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.27) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.28) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.29) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.30) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.31) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.32) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.33) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.34) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.35) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.36) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.37) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.38) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.39) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.40) HW bits: 0 0

190

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim packet

debug ip pim packet
Displays debugging information about the Protocol Independent Multicast (PIM) packets.

Syntax
debug ip pim packet source_address group_address [rate]

Parameters
source_address
Specifies the source address of the PIM packet.
group_address
Specifies the group address of the PIM packet.
rate
Specifies the hardware rate.

Modes
Privileged EXEC mode

Examples
device# debug ip pim packet 10.0.0.178 232.0.0.25
debug packet S=10.0.0.178 G=232.0.0.25
device# VRF0 Flow Entry Delete (10.0.0.178 232.0.0.25) HW bits: 1 1
device# debug ip pim packet 10.0.0.178 232.0.0.25 10
debug packet S=10.0.0.178 G=232.0.0.25 rate 10
device# VRF0 Flow Entry Delete (10.0.0.178 232.0.0.25) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.178 232.0.0.25) HW bits: 0 0

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

191

debug ip pim physical-port ethernet

debug ip pim physical-port ethernet
Displays information of the PIM physical ports that are connected.

Syntax
debug ip pim physical-port ethernet stackid/slot/port
no debug ip pim physical-port ethernet stackid/slot/port

Parameters
stackid/slot/port
Refers to the stack ID, slot number, and port number.

Modes
Privileged EXEC mode

Examples
device# debug ip pim physical-port ethernet 2/1/5
device# IGMP: IGMP: rcvd Report-V3(t=34) #rec=1, pkt S=10.2.1.6 to 224.0.0.22, on v800 (phy 2/1/5),
igmp_size=16
IGMP: IGMP: rcvd Report-V3(t=34) #rec=1, pkt S=10.2.1.6 to 224.0.0.22, on v800 (phy 2/1/5), igmp_size=16

192

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim regproc

debug ip pim regproc
Controls register processing.

Syntax
debug ip pim regproc
no debug ip pim regproc

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip pim regproc
device(config-if-e1000-1/1/11)# debug ip pim regproc
PIM: regproc debugging is on
device(config-if-e1000-1/1/11)# enable
device(config-if-e1000-1/1/11)# PIMSM-REG.VRF0: (10.0.0.168 228.0.0.1) Sending
L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.2) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.3) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.4) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.5) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.6) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.7) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.8) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.9) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.10) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.11) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.12) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.13) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.14) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.15) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.16) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.17) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.18) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.19) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.20) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.21) Sending L2-Null Reg on iface v78
PIMSM-REG.VRF0: (10.0.0.168 228.0.0.22) Sending L2-Null Reg on iface v78

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

193

debug ip pim rp

debug ip pim rp
Controls the Rendezvouz Point (RP) processing.

Syntax
debug ip pim rp
no debug ip pim rp

Modes
Privileged EXEC mode
Global Configuration mode

Examples
device# debug ip pim rp
PIM: rp debugging is on
Brocade(config-if-e1000-1/1/11)# enable
Brocade(config-if-e1000-1/1/11)# PIMv4-CRP.VRF0: Sending Candidate RP Msg (size
22)
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.11) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.12) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.13) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.14) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.15) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.16) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.17) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.18) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.19) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.20) HW bits: 0 0
VRF0 Flow Entry Delete (10.0.0.168 232.0.0.21) HW bits: 0 0

194

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim show

debug ip pim show
Displays the PIM debug settings. Do not use the show debug command for this purpose. The show debug command displays
general debug information.

Syntax
debug ip pim show
no debug ip pim show

Modes
Privileged EXEC mode

Examples
device# debug ip pim show
pim debug-enable-any = 1
debug ip pim level 2 is enabled

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

195

debug ip pim source

debug ip pim source
Monitors the content related to a specific PIM server. The ipaddr variable refers to the IP address of the PIM server source.

Syntax
debug ip pim sourceipaddress
no debug ip pim sourceipaddress

Modes
Privileged EXEC mode

196

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim source

Examples
device# ddebug ip pim source 10.11.10.101
Brocade# join_prune_timer, (10.11.10.101 225.1.1.10) ->num=1, rpt=0,
am_rp_and_proxy=0, JOIN
join_prune_timer, (10.11.10.101 225.1.1.10) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.10) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.9) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.9) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.9) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.8) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.8) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.8) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.7) ->num=1, rpt=0, am_rp_and_proxy=0, J
OIN
join_prune_timer, (10.11.10.101 225.1.1.7) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.7) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.6) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.6) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.6) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.5) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.5) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.5) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.4) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.4) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.4) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 226.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 226.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 226.1.1.1) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.3) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.3) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.3) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.2) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.2) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.2) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 225.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 225.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 225.1.1.1) fail RPT PRUNE cond.
join_prune_timer, (10.11.10.101 226.1.1.2) ->num=1, rpt=0, am_rp_and_proxy=0,
JOIN
join_prune_timer, (10.11.10.101 226.1.1.2) ->num=1, rpt=0, spt=1, SRC=v100,
RP=v100
join_prune_timer, (10.11.10.101 226.1.1.2) fail RPT PRUNE cond.
Join list: (10.11.10.101 225.1.1.10) wc=0 rpt=0 sparse=1
Join list: (10.11.10.101 225.1.1.9) wc=0 rpt=0 sparse=1
Join list: (10.11.10.101 225.1.1.8) wc=0 rpt=0 sparse=1
Join list: (10.11.10.101 225.1.1.7) wc=0 rpt=0 sparse=1
Join list: (10.11.10.101 225.1.1.6) wc=0 rpt=0 sparse=1
Join list: (10.11.10.101 225.1.1.5) wc=0 rpt=0 sparse=1
Join list: (10.11.10.101 225.1.1.4) wc=0 rpt=0 sparse=1
Join list: (10.11.10.101 226.1.1.1) wc=0 rpt=0 sparse=1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

197

debug ip pim source

Join
Join
Join
Join

198

list:
list:
list:
list:

(10.11.10.101
(10.11.10.101
(10.11.10.101
(10.11.10.101

225.1.1.3)
225.1.1.2)
225.1.1.1)
226.1.1.2)

wc=0
wc=0
wc=0
wc=0

rpt=0
rpt=0
rpt=0
rpt=0

sparse=1
sparse=1
sparse=1
sparse=1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pim vrf

debug ip pim vrf
Displays the PIM related debugging information for the specified VRF.

Syntax
debug ip pim vrfvrf_name
no debug ip pim vrfvrf_name

Modes
Privileged EXEC mode

Examples
device# debug ip pim vrf vrf1
Debug: Jan 1 21:46:55 PIM_CFG.VRF1:
Debug: Jan 1 21:46:59 PIM_CFG.VRF1:
Debug: Jan 1 21:48:14 PIM_CFG.VRF1:
Debug: Jan 1 21:48:17 PIM_CFG.VRF1:

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

port
port
port
port

v85,
v85,
v85,
v85,

ena_mode
ena_mode
ena_mode
ena_mode

Dis
Ena
Dis
Ena

199

debug ip pimsm-snoop

debug ip pimsm-snoop
describes the debug commands used for troubleshooting issues related to the IPv4 Protocol Independent Multicast Sparse
mode (PIM-SM) snoop configurations.

Syntax
debug ip pimsm-snoop [ add-del-oif | all | clear | control-source | error | fsm | group| join-prune| physical-port | show| source
| stacktrace|timer|vlan]

Parameters
add-del-oif
Displays debugs related to the addition and deletion of outbound interfaces (OIFs) in Mcache.
all
Enables all PIM-SM snoop related debugs.
clear
Clears all PIM-SM snoop related debug settings.
control-source
Displays PIM-SM snooping related debug information for the specified control source address
error
Monitors error messages related to PIM-SM snoopng.
fsm
Enables debugging of Finite State Machine (FSM) transactions.
group
Displays PIM-SM snooping information for a specific group.
join-prune
Monitors PIM-SM snoop join and prune messages.
physical-port
Displays information of PIM-SM physical ports that are connected.
show
Displays all PIM-SM snoop related debug settings..
source
Displays PIM-SM snooping related debug information for the specified server source address.
stacktrace
Displays debug messages accompanied by call stack dump.
timer
Enables PIM-SM snoop timer debugging.
vlan
Enables PIM-SM snoop debugging for a particular VLAN.

200

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip pimsm-snoop

Modes
Privileged EXEC mode

Examples
device(debug ip pimsm-snoop source 10.27.27.5
Brocade# pim_snoop join (10.27.27.5 228.228.0.1), from e1/1/12
pim_snoop join (10.27.27.5 228.228.0.2), from e1/1/12
pim_snoop join (10.27.27.5 228.228.0.3), from e1/1/12
PIM from 10.27.27.2, vlan 275, port 1/1/12: Src=10.27.27.5 with 0 JOIN with 0
PRUNE
pim_snoop prune 1/1/12 from (10.27.27.5, 228.228.0.1), pim_snoop prune
1/1/12 from (10.27.27.5, 228.228.0.2), pim_snoop prune 1/1/12 from
(10.27.27.5, 228.228.0.3), PIM from 10.27.27.2, vlan 275, port 1/1/12:
Src=10.27.27.5 with 0 JOIN with 3 PRUNE, 1st Grp=228.228.0.1
pim_snoop join (10.27.27.5 228.228.0.1), from e1/1/12
pim_snoop join (10.27.27.5 228.228.0.2), from e1/1/12
pim_snoop join (10.27.27.5 228.228.0.3), from e1/1/12
PIM from 10.27.27.2, vlan 275, port 1/1/12: Src=10.27.27.5 with 0 JOIN with 0
PRUNE

History
Release version

Command history
This command was introduced.
This command was modified to...

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

201

debug ip source guard

debug ip source guard
Activates the IP source guard debugging.

Syntax
debug ip source guard
no debug ip source guard

Modes
Privileged EXEC mode

Examples
device# debug ip source guard
SOURCE GUARD: debugging is on
Brocade(config-vif-11)# IPSrcSec: Add ip addr 10.3.3.12 on port 5/1/2 vlan 14

202

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip vrrp packet v6

debug ip vrrp packet v6
Displays debugging information of VRRP or VRRP-E packets specific to IPv6 within the device.

Syntax
debug ip vrrp packet v6
no debug ip vrrp packet v6

Modes
Privileged EXEC mode

Examples
device# debug ip vrrp packet v6
VRRP (IPv6): packet debugging is on
VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:100
chk:53518
Num of ip addr 1
fe80::7:2 from sender 2000::7:2
VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:11 pri:255 #ip:1 aut:0 adv:200
chk:53417
Num of ip addr 1
fe80::8:2 from sender ::
VRRP (IPv6): send advertise! ver:3 type:1 vrid:100 pri:255 num of ip:1 adv:100
chk:44853
Num of ip addr 1
2000::7:1
VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:100
chk:53518
Num of ip addr 1
fe80::7:2 from sender 2000::7:2
10.10.10.2 from sender 10.10.10.2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

203

debug ip vrrp vrid

debug ip vrrp vrid
Filters VRRP or VRRP-E debugging using a virtual router identifier (VRID).

Syntax
debug ip vrrp vrid decimal
no debug ip vrrp vrid

Parameters
decimal
Specifies the VRID.

Modes
Privileged EXEC mode

Examples
device# debug ip vrrp vrid 100
Debug VRID: 100 for both IPv4 and IPv6 instances

204

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip web

debug ip web
Activates the web debugging.

Syntax
debug ip web
no debug ip web

Modes
Privileged EXEC mode

Examples
device# debug ip web
WEB: debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

205

debug ip web-ssl

debug ip web-ssl
Activates web Secured Socket Layer (SSL) debugging.

Syntax
debug ip web-ssl
no debug ip web-ssl

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command deactivates web SSL debugging.

Examples
device# debug ip web-ssl
WEB SSL: debugging is on

206

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipsec all

debug ipsec all
Displays all debugging information related to IPsec operation.

Syntax
debug ipsec all
no debug ipsec all

Modes
Privileged EXEC mode

Examples
device# debug ipsec all
IPSec: all debugging is on
Brocade(config-ospf6-router)# no area 0 auth ipsec spi 400 esp sha1
abcef12345678901234fedcba098765432109876IPSEC,SA: ipipsec_pfkeyv2_input() ::
receiving 'DELETE' command
IPSEC,SA: Removing SA: ESP in spi=0x190 dst=FE80::
IPSEC,Policy: Removing flow [input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' ->
SA: ESP in spi=0x190 dst=FE80::] : ok
IPSEC,SA: ipipsec_pfkeyv2_input() :: succeeded

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

207

debug ipsec esp

debug ipsec esp
Enables debugging of Encapsulating Security Payload (ESP)

Syntax
debug ipsec esp
no debug ipsec esp

Modes
Privileged EXEC mode

Examples
device# debug ipsec esp
IPSec: esp debugging is on
Brocade(config-ospf6-router)# Debug: Jan
(SA: ESP in spi=0x190 dst=FE80::)
Debug: Jan 1 02:03:27 IPSEC,ESP: decrypt
dst=FE80::)
Debug: Jan 1 02:03:36 IPSEC,ESP: decrypt
dst=FE80::)
Debug: Jan 1 02:03:36 IPSEC,ESP: decrypt
dst=FE80::)
Debug: Jan 1 02:03:45 IPSEC,ESP: decrypt
dst=FE80::)
Debug: Jan 1 02:03:45 IPSEC,ESP: decrypt
dst=FE80::)

208

1 02:03:27 IPSEC,ESP: decrypt ok, seq=0
ok, seq=0 (SA: ESP in spi=0x190
ok, seq=0 (SA: ESP in spi=0x190
ok, seq=0 (SA: ESP in spi=0x190
ok, seq=0 (SA: ESP in spi=0x190
ok, seq=0 (SA: ESP in spi=0x190

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipsec in

debug ipsec in
Enables the display of debugging information related to inbound OSPFv3 packets with IPsec.

Syntax
debug ipsec in
no debug ipsec in

Modes
Privileged EXEC mode

Examples
device# debug ipsec in
IPSec: in debugging is on
Brocade(config-ospf6-router)# Debug: Jan 1 02:04:15 IPSEC,IN: ESP spi=400 (pkt
'ESP FE80:: -> FE80::') payloadlength =64
Debug: Jan 1 02:04:15 IPSEC,IN: Incoming packet matches Policy : input use
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::
Debug: Jan 1 02:04:15 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::')
payloadlength =64
Debug: Jan 1 02:04:15 IPSEC,IN: Incoming packet matches Policy : input use
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::
Debug: Jan 1 02:04:26 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::')
payloadlength =64
Debug: Jan 1 02:04:26 IPSEC,IN: Incoming packet matches Policy : input use
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::
Debug: Jan 1 02:04:26 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::')
payloadlength =64
Debug: Jan 1 02:04:26 IPSEC,IN: Incoming packet matches Policy : input use
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::
Debug: Jan 1 02:04:36 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::')
payloadlength =64
Debug: Jan 1 02:04:36 IPSEC,IN: Incoming packet matches Policy : input use
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::
Debug: Jan 1 02:04:36 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::')
payloadlength =64
Debug: Jan 1 02:04:36 IPSEC,IN: Incoming packet matches Policy : input use
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

209

debug ipsec out

debug ipsec out
Enables the display of debugging information related to outbound OSPFv3 packets with IPsec.

Syntax
debug ipsec out
no debug ipsec out

Modes
Privileged EXEC mode

Examples
device# debug ipsec out
IPSec: out debugging is on
Brocade(config-ospf6-router)# Debug: Jan 1 02:04:55 IPSEC,OUT: Matching Flow:
output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=::
Debug: Jan 1 02:04:55 IPSEC,OUT: SA ESP out spi=0x190 dst=:: payloadlength =64
Debug: Jan 1 02:04:56 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
Debug: Jan 1 02:04:56 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
Debug: Jan 1 02:05:06 IPSEC,OUT: Matching Flow: output use 'prot=OSPF
src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=::
Debug: Jan 1 02:05:06 IPSEC,OUT: SA ESP out spi=0x190 dst=:: payloadlength =64
Debug: Jan 1 02:05:07 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
Debug: Jan 1 02:05:07 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
Debug: Jan 1 02:05:15 IPSEC,OUT: Matching Flow: output use 'prot=OSPF
src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=::
Debug: Jan 1 02:05:15 IPSEC,OUT: SA ESP out spi=0x190 dst=:: payloadlength =64
Debug: Jan 1 02:05:16 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
Debug: Jan 1 02:05:16 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40

210

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipsec policy

debug ipsec policy
Enables the display of debugging information for IPsec policy.

Syntax
debug ipsec policy
no debug ipsec policy

Modes
Privileged EXEC mode

Examples
device# debug ipsec policy
IPSec: policy debugging is on
Brocade(config-ospf6-router)#no area 0 auth ipsec spi 400 esp sha1
abcef12345678901234fedcba098765432109876
Debug: Jan 1 01:57:05 IPSEC,Policy: Removing flow [input use 'prot=OSPF
src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::] : ok
Brocade(config-ospf6-router)#area 0 auth ipsec spi 400 esp sha1
abcef12345678901234fedcba098765432109876
Debug: Jan 1 01:57:26 IPSEC,Policy: Creating flow [input use 'prot=OSPF
src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::] : ok
Brocade(config-ospf6-router)#Debug: Jan 1 02:02:21 IPSEC,Policy: Creating flow
[output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190
dst=::] : ok

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

211

debug ipv6

debug ipv6
Enables the collection of information about IPv6 configurations for troubleshooting.

Syntax
debug ipv6address cache icmp mld nd packet ra

Parameters
address
The IPv6 address.
cache
The IPv6 cache entry.
icmp
The Internet Control Message Protocol version 6 (ICMPv6) address.
mld
The Multicast Listener Discovery (MLD) protocol activity.
nd
The neighbor discovery.
packet
The IPv6 packet.
ra
The router address.

Modes
Privileged EXEC mode

212

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 dhcp relay

debug ipv6 dhcp relay
Displays debug information related to Dynamic Host Configuration Protocol for IPv6 (DHCPv6) relay agent.

Syntax
debug ipv6 dhcp relay
no debug ipv6 dhcp relay

Modes
Privileged EXEC mode

Examples
The following output will be displayed when you enable the DHCPv6 relay agent on the Ethernet interface 8/2.
device# debug ipv6 dhcp relay
DHCP6: relay debugging is on
device# Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward
>fc00:b000:cade::2]
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message
Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

message sent [fc00:b000:cade::asent
sent
sent
sent
sent
sent
sent
sent
sent
sent
sent
sent
sent
sent
sent

[fc00:b000:cade::a->fc00:b000:cade::a1]
[fc00:b000:cade::a->fc00:b000:cade::a2]
[fc00:b000:cade::a->fc00:b000:cade::a3]
[fc00:b000:cade::a->fc00:b000:cade::a4]
[fc00:b000:cade::a->fc00:b000:cade::a5]
[fc00:b000:cade::a->fc00:b000:cade::a6]
[fc00:b000:cade::a->fc00:b000:cade::a7]
[fc00:b000:cade::a->fc00:b000:cade::a8]
[fc00:b000:cade::a->fc00:b000:cade::a9]
[fc00:b000:cade::a->fc00:b000:cade::aa]
[fc00:b000:cade::a->fc00:b000:cade::ab]
[fc00:b000:cade::a->fc00:b000:cade::ac]
[fc00:b000:cade::a->fc00:b000:cade::ad]
[fc00:b000:cade::a->fc00:b000:cade::ae]
[fc00:b000:cade::a->fc00:b000:cade::af]

213

debug ipv6 dhcp snooping

debug ipv6 dhcp snooping
Enables debugging of the DHCPv6 snooping activity.

Syntax
debug ipv6 dhcp snooping
no debug ipv6 dhcp snooping

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
The no form of the command disables debugging of the DHCPv6 snooping activity.

Examples
device# debug ipv6 dhcp snooping
device(config-vif-11)# DHCPv6: snooping mapped to outgoing port 2/1/24 vlan 14 VRF 1
DHCPv6: snooping on trusted port 3/1/23, VRF 1, 2001:DB8::b->0000.007d.7a3e

214

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld

debug ipv6 mld
Displays the debugging information about the received and sent packets of the Multicast Listening Discovery (MLD).

Syntax
debug ipv6 mld
no debug ipv6 mld

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld
device# MLD: rcvd Report-V1(ty=131) g=ff03::26:2641 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2642 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2643 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2644 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2645 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2646 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2647 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2648 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:2649 resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24
MLD: rcvd Report-V1(ty=131) g=ff03::26:264a resp=0, pkt
S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

215

debug ipv6 mld add-del-oif

debug ipv6 mld add-del-oif
Enabled with the MLD debug ipv6 mcache-source or debug ipv6 mcache-group commands at the same time.

Syntax
debug ipv6 mld add-del-oif
no debug ipv6 mld add-del-oif

Modes
Privileged EXEC mode

216

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld add-del-oif

Examples
device# debug ipv6 mld show
debug ip6 mld mcache-source 50F5 is enabled
debug ip6 mld add-del-oif is enabled
device# show ipv6 mld mcache
Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt: SW proc. count
OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output
vlan 400, 0 cache
vlan 601, 0 cache
vlan 602, 0 cache
vlan 701, 0 cache
vlan 888, 0 cache
vlan 1000, 5 caches. use 1 VIDX
1 (* 24:2402) cnt=85
OIF: tag TR(3/1/12) 7/1/17
age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0)
2 (* 24:2403) cnt=87
OIF: tag TR(3/1/12) 7/1/17
age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0)
3 (* 24:2404) cnt=249
OIF: tag TR(3/1/12) 7/1/17
age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0)
4 (* 24:2400) cnt=88
OIF: tag TR(3/1/12) 7/1/17
age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0)
5 (* 24:2401) cnt=254
OIF: tag TR(3/1/12) 7/1/17
age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0)
device# Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242404) vlan 1000
Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242403) vlan 1000
Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242402) vlan 1000
Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242401) vlan 1000
Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242400) vlan 1000
device# show ipv6 mld mcache
Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt: SW proc. count
OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output
vlan 400, 0 cache
vlan 601, 0 cache
vlan 602, 0 cache
vlan 701, 0 cache
vlan 888, 0 cache
vlan 1000, 5 caches. use 1 VIDX
1 (* 24:2402) cnt=85
OIF: tag TR(3/1/12)
age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE
2 (* 24:2403) cnt=87
OIF: tag TR(3/1/12)
age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE
3 (* 24:2404) cnt=249
OIF: tag TR(3/1/12)
age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE
4 (* 24:2400) cnt=88
OIF: tag TR(3/1/12)
age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE
5 (* 24:2401) cnt=254
OIF: tag TR(3/1/12)
age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE
device# Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242400) vlan 1000
Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242401) vlan 1000
Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242402) vlan 1000
Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242403) vlan 1000
Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242404) vlan 1000
device# show ipv6 mld mc
Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt: SW proc. count
OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output
vlan 400, 0 cache
vlan 601, 0 cache
vlan 602, 0 cache
vlan 701, 0 cache
vlan 888, 0 cache

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

217

debug ipv6 mld add-del-oif

vlan 1000, 5 caches. use 1 VIDX
1 (* 24:2402) cnt=88
OIF: 7/1/17 tag TR(3/1/12)
age=0m up-time=25m, change=25m vidx=4130
2 (* 24:2403) cnt=88
OIF: 7/1/17 tag TR(3/1/12)
age=0m up-time=25m, change=25m vidx=4130
3 (* 24:2404) cnt=416
OIF: 7/1/17 tag TR(3/1/12)
age=0m up-time=25m, change=25m vidx=4130
4 (* 24:2400) cnt=90
OIF: 7/1/17 tag TR(3/1/12)
age=0m up-time=25m, change=25m vidx=4130
5 (* 24:2401) cnt=421
OIF: 7/1/17 tag TR(3/1/12)
age=0m up-time=25m, change=25m vidx=4130

218

(ref-cnt=0)
(ref-cnt=0)
(ref-cnt=0)
(ref-cnt=0)
(ref-cnt=0)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld add-del-oif all

debug ipv6 mld add-del-oif all
Monitors outgoing interfaces (OIFs) that are added or deleted for all the MLD groups.

Syntax
debug ipv6 mld add-del-oif all
no debug ipv6 mld add-del-oif all

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld add-del-oif all
device# debug ipv6 mld show
debug ip6 mld mcache-source 681D is enabled
debug ip6 mld add-del-oif all is enabled
device# Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252504) vlan 1000
Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252503) vlan 1000
Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252502) vlan 1000
Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252501) vlan 1000
Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252500) vlan 1000
device# Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252500) vlan 1000
Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252501) vlan 1000
Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252502) vlan 1000
Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252503) vlan 1000
Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252504) vlan 1000

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

219

debug ipv6 mld add-del-oif stack

debug ipv6 mld add-del-oif stack
Displays the MLD stack trace.

Syntax
debug ipv6 mld add-del-oif stack
no debug ipv6 mld add-del-oif stack

Modes
Privileged EXEC mode

220

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld add-del-oif stack

Examples
device# debug ipv6 mld add-del-oif stack
device# debug ipv6 mld show
debug ip6 mld mcache-source 681D is enabled
debug ip6 mld add-del-oif stack is enabled
device# Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252502) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252502) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68
2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0
205F0474 2056E85C 205F23E8 5010 15B58 1AAF4
Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252502) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252503) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252503) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68
2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0
205F0474 2056E85C 205F23E8 5010 15B58 1AAF4
Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252503) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252504) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252504) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68
2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0
205F0474 2056E85C 205F23E8 5010 15B58 1AAF4
Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252504) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252500) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252500) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68
2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0
205F0474 2056E85C 205F23E8 5010 15B58 1AAF4
Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252500) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252501) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4
Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252501) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68
2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0
205F0474 2056E85C 205F23E8 5010 15B58 1AAF4
Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252501) vlan 1000
Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4
204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58
1AAF4

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

221

debug ipv6 mld clear

debug ipv6 mld clear
Clears all the MLD debug settings..

Syntax
debug ipv6 mld clear
no debug ipv6 mld clear

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld clear
no debug ipv6 mld is enabled

222

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld detail

debug ipv6 mld detail
Displays the details of the MLD messages.

Syntax
debug ipv6 mld detail
no debug ipv6 mld detail

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld detail
device# debug ipv6 mld show
debug ip6 mld is enabled
debug ip6 mld detail is enabled
device# Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2400
resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2400 to VL1000(ethe 7/1/21 ) rsp=10000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2401 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2401 to VL1000(ethe 7/1/22 ) rsp=10000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2402 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2402 to VL1000(ethe 7/1/23 ) rsp=10000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2403 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2403 to VL1000(ethe 7/1/21 ) rsp=10000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2404 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2404 to VL1000(ethe 7/1/22 ) rsp=10000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2404 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2403 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2402 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2401 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2400 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2404 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2403 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2402 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2401 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B
Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0
2001:DB8::24:2400 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

223

debug ipv6 mld enable

debug ipv6 mld enable
Enables debugging of MLD configurations.

Syntax
debug ipv6 mld enable
no debug ipv6 mld enable

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables debugging of MLD configurations.

Examples
device# debug ipv6 mld enable
debug ipv6 mld is enabled

224

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld error

debug ipv6 mld error
Displays error information related to MLD.

Syntax
debug ipv6 mld error
no debug ipv6 mld error

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld error
ERR: Dropped because group address not valid 2001:DB8::1:ff00:2.
MLD.VRF0.ERR: Rx packet is invalid. Dropping packet
ERR: Dropped because group address not valid 2001:DB8::1:ff00:2.
MLD.VRF0.ERR: Rx packet is invalid. Dropping packet
error 0x1 0x0 : failed to add prefix 2001:DB8::/64 to hw
ERR: Dropped because group address not valid 2001:DB8::1:ff00:2.
MLD.VRF0.ERR: Rx packet is invalid. Dropping packet
ERR: Dropped because group address not valid 2001:DB8::1:ff00:2.
MLD.VRF0.ERR: Rx packet is invalid. Dropping packet
ERR: Dropped because group address not valid 2001:DB8::1:ff00:2.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

.
.
.
.
.

225

debug ipv6 mld group

debug ipv6 mld group
Debugs the MLD group matching.

Syntax
debug ipv6 mld group ipv6addr
no debug ipv6 mld group ipv6addr

Parameters
ipv6addr
Specifies the address of the IPv6 route.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld group .ff1e::4:5:1
device# debug ipv6 mld vrf br_vrf_1
device# debug ipv6 mld protocol report
device# debug ipv6 mld enable
device# Debug: Jan 2 00:22:01 MLD.VRF1.RCV:
Debug: Jan 2 00:22:06 MLD.VRF1.RCV: Type V1
Debug: Jan 2 00:22:08 MLD.VRF1.RCV: Type V1
device# Debug: Jan 2 00:22:16 MLD.VRF1.RCV:

226

Type V1 Report Port 2/1/21,v1 Grp ff1e::4:5:1
Report Port 2/1/21,v1 Grp ff1e::4:5:1
Report Port 2/1/21,v1 Grp ff1e::4:5:1
Type V1 Report Port 2/1/21,v1 Grp ff1e::4:5:1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld level

debug ipv6 mld level
Displays the different levels of debugging output.

Syntax
debug ipv6 mld leveldecimal
no debug ipv6 mld leveldecimal

Parameters
decimal
Specifies the number of the MLD level from 1 through 3.

Modes
Privileged EXEC mode

Usage Guidelines
The output must be enabled in combination with the other MLD debug commands.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

227

debug ipv6 mld level

Examples
device# debug ipv6 mld level 1
MLD Debug level = 1
device# Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400
resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:44:07 no routr fid, consume pkt
Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:44:07 no routr fid, consume pkt
Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:44:07 no routr fid, consume pkt
Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:44:07 no routr fid, consume pkt
Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:44:07 no routr fid, consume pkt
device# Debug: Sep 19 16:45:03 MLD send Query(t=130) V1,
s=fe80::224:38ff:fec6:d0c0 :: to VL1000(all) rsp=10000 mld=24B, pkt=86B
Debug: Sep 19 16:45:06 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff84:55ae resp=0,
pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24
Debug: Sep 19 16:45:06 no routr fid, consume pkt
Debug: Sep 19 16:45:07 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff82:50f5 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:45:07 no routr fid, consume pkt
Debug: Sep 19 16:45:08 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:84 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:45:08 no routr fid, consume pkt
Brocade# Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:70
resp=0, pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24
Debug: Sep 19 16:45:10 no routr fid, consume pkt
Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:45:10 no routr fid, consume pkt
Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:45:10 no routr fid, consume pkt
Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:45:10 no routr fid, consume pkt
Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:45:10 no routr fid, consume pkt
Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:45:10 no routr fid, consume pkt
Brocade# debug ipv6 mld level 3
MLD Debug level = 3
Brocade# Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400
resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:45:58 group: ff04::24:2400, life = 260
Debug: Sep 19 16:45:58 no routr fid, consume pkt
Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:45:58 group: ff04::24:2401, life = 260
Debug: Sep 19 16:45:58 no routr fid, consume pkt
Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:45:58 group: ff04::24:2402, life = 260
Debug: Sep 19 16:45:58 no routr fid, consume pkt
Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:45:58 group: ff04::24:2403, life = 260
Debug: Sep 19 16:45:58 no routr fid, consume pkt
Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:45:58 group: ff04::24:2404, life = 260
Debug: Sep 19 16:45:58 no routr fid, consume pkt
Debug: Sep 19 16:47:08 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 :: to

228

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld level

VL1000(all) rsp=10000 mld=24B, pkt=86B
Debug: Sep 19 16:47:10 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:84 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:47:10 group: ff02::1:ff20:84, life = 260
Debug: Sep 19 16:47:10 no routr fid, consume pkt
Debug: Sep 19 16:47:12 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:70 resp=0, pkt
S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24
Debug: Sep 19 16:47:12 group: ff02::1:ff20:70, life = 260
Debug: Sep 19 16:47:12 no routr fid, consume pkt
Debug: Sep 19 16:47:15 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff84:55ae resp=0,
pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24
Debug: Sep 19 16:47:15 group: ff02::1:ff84:55ae, life = 260
Debug: Sep 19 16:47:15 no routr fid, consume pkt
Debug: Sep 19 16:47:16 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff82:50f5 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:47:16 group: ff02::1:ff82:50f5, life = 260
Debug: Sep 19 16:47:16 no routr fid, consume pkt
Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:47:18 group: ff04::24:2400, life = 260
Debug: Sep 19 16:47:18 no routr fid, consume pkt
Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:47:18 group: ff04::24:2401, life = 260
Debug: Sep 19 16:47:18 no routr fid, consume pkt
Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24
Debug: Sep 19 16:47:18 group: ff04::24:2402, life = 260
Debug: Sep 19 16:47:18 no routr fid, consume pkt
Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24
Debug: Sep 19 16:47:18 group: ff04::24:2403, life = 260
Debug: Sep 19 16:47:18 no routr fid, consume pkt
Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24
Debug: Sep 19 16:47:18 group: ff04::24:2404, life = 260
Debug: Sep 19 16:47:18 no routr fid, consume pkt

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

229

debug ipv6 mld mcache-group

debug ipv6 mld mcache-group
Displays a filter of only desired mcache group debugging output.

Syntax
debug ipv6 mld mcache-grouphex
no debug ipv6 mld mcache-grouphex

Parameters
hex
Specifies the hexadecimal value of the MLD mcache group.

Modes
Privileged EXEC mode

Usage Guidelines
The output must be enabled in combination with the other MLD debug commands.

230

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld mcache-group

Examples
device# debug ipv6 mld is enabled
debug ip6 mld mcache-group 2403 is enabled
debug ip6 mld level 3 is enabled
device# Debug: Sep 28 00:09:51 MLD: rcvd Report-V1(ty=131)
g=2001:DB8::1:ff67:eb8b resp=0, pkt S=fe80::200:36ff:fe67:eb8b, on VL510 (phy
1/1/5), mld_size=24
Debug: Sep 28 00:09:51 group: 2001:DB8::1:ff67:eb8b, life = 260
Debug: Sep 28 00:09:51 forward to router fid 814
Debug: Sep 28 00:09:52 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff82:50f5
resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:09:52 group: 2001:DB8::1:ff82:50f5, life = 260
Debug: Sep 28 00:09:52 forward to router fid 814
Debug: Sep 28 00:09:54 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff53:f9c5
resp=0, pkt S=fe80::200:36ff:fe53:f9c5, on VL510 (phy 1/1/1), mld_size=24
Debug: Sep 28 00:09:54 group: 2001:DB8::1:ff53:f9c5, life = 260
Debug: Sep 28 00:09:54 forward to router fid 814
Debug: Sep 28 00:09:56 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff20:73 resp=0,
pkt S=fe80::200:36ff:fe53:f9c5, on VL510 (phy 1/1/1), mld_size=24
Debug: Sep 28 00:09:56 group: 2001:DB8::1:ff20:73, life = 260
Debug: Sep 28 00:09:56 forward to router fid 814
Debug: Sep 28 00:09:56 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff20:77 resp=0,
pkt S=fe80::200:36ff:fe67:eb8b, on VL510 (phy 1/1/5), mld_size=24
Debug: Sep 28 00:09:56 group: 2001:DB8::1:ff20:77, life = 260
Debug: Sep 28 00:09:56 forward to router fid 814
Debug: Sep 28 00:09:56 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff20:84 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:09:56 group: 2001:DB8::1:ff20:84, life = 260
Debug: Sep 28 00:09:56 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2400 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::24:2400, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2401 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::24:2401, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2402 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::24:2402, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2403 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::24:2403, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2404 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::24:2404, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2500 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::25:2500, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2501 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::25:2501, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2502 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::25:2502, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2503 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::25:2503, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814
Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2504 resp=0,
pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24
Debug: Sep 28 00:10:28 group: 2001:DB8::25:2504, life = 260
Debug: Sep 28 00:10:28 forward to router fid 814

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

231

debug ipv6 mld phy-port ethernet

debug ipv6 mld phy-port ethernet
Matches the input of the physical port.

Syntax
debug ipv6 mld phy-port ethernetstackid / slot / port
no debug ipv6 mld phy-port ethernetstackid / slot / port

Parameters
stackid / slot / port
Specifies the stack ID, slot number, and port number of a specific Ethernet port.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld phy-port ethernet 1/1/22
device# debug ipv6 mld show
debug ip6 mld physical_port 1/1/22 is enabled
device# MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2400 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2402 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2404 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2501 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2503 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24

232

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld prime-port ethernet

debug ipv6 mld prime-port ethernet
Enables the activity of the physical port and primary port if trunking happened.

Syntax
debug ipv6 mld prime-port ethernetstackid / slot / port
no debug ipv6 mld prime-port ethernetstackid / slot / port

Parameters
stackid / slot / port
Specifies the stack ID, slot number, and port number of a specific Ethernet port.

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables the activity of the physical port and primary port.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

233

debug ipv6 mld prime-port ethernet

Examples
device# debug ipv6 mld prime-port ethernet 1/1/21
device# debug ipv6 mld show
debug ip6 mld prime-port 1/1/21 is enabled
device# MLD: rcvd Leave(ty=132) g=2001:DB8::24:2400 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2400
VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::24:2401 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2401
VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::24:2402 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2402
VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::24:2403 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2403
VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::24:2404 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2404
VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::25:2500 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2500
VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::25:2501 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2501
VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::25:2502 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2502
VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::25:2503 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24
MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2503
VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::25:2504 resp=0, pkt
S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24

234

to

to

to

to

to

to

to

to

to

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld protocol

debug ipv6 mld protocol
Displays debugging information about the IPv6 MLD queries and reports transmitted and received.

Syntax
debug ipv6 mld protocol [ query | report ]
no debug ipv6 mld protocol[ query | report ]

Parameters
query
Displays the IPv6 MLD query.
report
Displays the IPv6 MLD report.

Modes
Privileged EXEC mode

Examples
The following is the sample output from the debug ipv6 mld protocol query command.
device# debug ipv6 mld protocol query
device# debug ipv6 mld enable
device# MLD.VRF0: [ Port 6/1/17,v170 ] Sent General Query version 2 using src
fe80::768e:f8ff:fe34:3c80
MLD.VRF0: [ Port 4/1/22,v78 ] Sent General Query version 2 using src
fe80::768e:f8ff:fe34:3c80
MLD.VRF0: [ Port 6/1/22,v77 ] Sent General Query version 2 using src
fe80::768e:f8ff:fe34:3c80
MLD.VRF0: [ Port 1/1/15,v74 ] Sent General Query version 2 using src
fe80::768e:f8ff:fe34:3c80

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

235

debug ipv6 mld protocol

The following is the truncated sample output from the debug ipv6 mld protocol report command.
device# debug ipv6 mld protocol report
device# debug ipv6 mld enable
device# MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::14
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::6
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::22
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::11
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2f
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::9
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::25
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::24
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::1c
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2c
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::28
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::26
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::31
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::5
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::1f
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::18
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2d
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::1
MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2a

236

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld rx

debug ipv6 mld rx
Displays the IPv6 MLD packets received.

Syntax
debug ipv6 mld rx
no debug ipv6 mld rx

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld rx
MLD.VRF1.RCV: Received Query on Port 1/1/3*1/1/14,v25 Grp *
MLD.QRY: [ Port 1/1/3*1/1/14,v25. Grp :: Src fe80::207:11ff:fe11:1111].
Processing version 2 query
MLD.VRF3.RCV: Received Query on Port 1/1/3*1/1/14,v26 Grp *
MLD.QRY: [ Port 1/1/3*1/1/14,v26. Grp :: Src fe80::207:11ff:fe11:1111].
Processing version 2 query

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

237

debug ipv6 mld show

debug ipv6 mld show
Displays the IPv6 MLD debug settings.

Syntax
debug ipv6 mld show

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld show
debug ipv6 mld error
debug ipv6 mld vrf 3

238

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld source

debug ipv6 mld source
Displays the MLD related debug information for the specified source address.

Syntax
debug ipv6 mld sourceipaddr
no debug ipv6 mld sourceipaddr

Parameters
ipaddr
Specifies the IP address.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld rx
device# debug ipv6 mld protocol report
device# debug ipv6 mld source 2001:DB8::15
======================
MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0
MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action BLK_OLD. #Srcs
MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0
MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action BLK_OLD. #Srcs
MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0
MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action ALW_NEW. #Srcs
MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0
MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action ALW_NEW. #Srcs
MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

1
1
1
1

239

debug ipv6 mld timer

debug ipv6 mld timer
Monitors the MLD timer activity.

Syntax
debug ipv6 mld timer
no debug ipv6 mld timer

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld timer
Monitor MLD timers activity

240

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld tx

debug ipv6 mld tx
Displays the IPv6 MLD packets transmitted..

Syntax
debug ipv6 mld tx
no debug ipv6 mld tx

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld tx
device# debug ipv6 mld protocol query
MLD.VRF1: [ Port 1/1/12,v105 ] Sent General Query version 2 using src
fe80::768e:f8ff:fe0e:68c0
MLD.VRF3: [ Port 1/1/12,v103 ] Sent General Query version 2 using src
fe80::768e:f8ff:fe0e:68c0
MLD.VRF4: [ Port 1/1/12,v107 ] Sent General Query version 2 using src
fe80::768e:f8ff:fe0e:68c0

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

241

debug ipv6 mld vlan

debug ipv6 mld vlan
Monitors the MLD VLAN activity.

Syntax
debug ipv6 mld vlandecimal
no debug ipv6 mld vlandecimal

Parameters
decimal
Specifies the VLAN number.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld vlan 2
monitor vlan 2

242

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 mld vrf

debug ipv6 mld vrf
Displays MLD related debug information for the specified VRF.

Syntax
debug ipv6 mld vrf vrf_name
no debug ipv6 mld vrf vrf_name

Parameters
vrf_name
Specifies the VRF name.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 mld vrf vrf1
MLD.VRF1.EVT: - Started FSM timer for 16 seconds
MLD.VRF1.EVT: Rx packet is valid. Processing packet
MLD.VRF1.EVT: - Started FSM timer for 16 seconds
MLD.VRF1: [ Port 3/1/11,3/1/11 ] General Query Timer expired. Sending Query
version 2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

243

debug ipv6 nd

debug ipv6 nd
Enables Neighbor Discovery (ND) debug logs and displays the debugging information about dropped Neighbor Solicitation
(NS) and Neighbor Advertisement (NA) packets.

Syntax
debug ipv6 nd
no debug ipv6 nd

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
Examples
device(config)#debug ipv6 nd
ipv6: nd debugging is on
device(config)#ND Inspect: src-ip, src-mac mismatch, packet dropped rx-sip
2001:DB8::1 rx-smac 0000.0000.0066 inspect-ip 2001:DB8::1 inspect-mac
0000.0000.0088 vlan_id 2 vrf_id 0
device(config)#show ipv6 neighbor inspection statistics
Total number of ND Solicit received 4
Total number of ND Adevert received 4
Total number of ND dropped 6

244

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf ipsec

debug ipv6 ospf ipsec
Displays information about IPsec events. This command can show if IPsec is actually providing its services to IPv6 OSPFv3.
The following output shows success in the attempts to provide various IPsec services to OSPFv3.

Syntax
debug ipv6 ospf ipsec
no debug ipv6 ospf ipsec

Modes
Privileged EXEC mode

Examples
device# debug ipv6 ospf ipsec
OSPFv3: ipsec debugging is on
Brocade(config-ospf6-router)# no area 0 auth ipsec spi 400 esp sha1
abcef12345678901234fedcba098765432109876Debug: Jan 1 02:22:09 OSPFv3:
ITC_AUTHENTICATION_CONFIG message received
Debug: Jan 1 02:22:09 OSPFv3: Auth timer started
Debug: Jan 1 02:22:09 OSPFv3: Key Rollover, for area 0.0.0.0, state change
NOT_ACTIVE->STARTED
Debug: Jan 1 02:22:09 OSPFv3: Key Rollover, for v9, state change
NOT_ACTIVE->STARTED

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

245

debug ipv6 ospf ism

debug ipv6 ospf ism
Displays debug information about the interface state machine (ISM).

Syntax
debug ipv6 ospf ism
no debug ipv6 ospf ism

Modes
Privileged EXEC mode

Examples
device# debug ipv6 ospf ism
OSPFv3: ism debugging is on
Debug: Dec 9 10:47:25 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:25 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:25 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:40 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:40 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:40 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]:
Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]:

246

InterfaceDown
Status change BDR -> Down (Configured)
{dr:7.0.0.3,bdr:1.0.0.1} -> {dr:0.0.0.0,bdr:0.0.0.0}
InterfaceUp
Status change Down -> Waiting (Priority > 0)
Start Wait_Timer at 639966, 619070
BackupSeen
Status change Waiting -> DROther (BackupSeen:DR Election)
{dr:0.0.0.0,bdr:0.0.0.0} -> {dr:7.0.0.3,bdr:1.0.0.11}
NeighborChange
Status change DROther -> DROther (NeighborChange:DR Election)
NeighborChange
Status change DROther -> DROther (NeighborChange:DR Election)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf ism-events

debug ipv6 ospf ism-events
Displays debug information about ISM events.

Syntax
debug ipv6 ospf ism-events
no debug ipv6 ospf ism-events

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf ism-events
OSPFv3: ism-events debugging is on
Debug: Dec 9 10:53:04 OSPFv3: ISM[14368]: InterfaceDown
Debug: Dec 9 10:53:15 OSPFv3: interface (14367) cost change to 9 due to speed change
Debug: Dec 9 10:53:15 OSPFv3: ISM[14368]: InterfaceUp
Debug: Dec 9 10:53:15 OSPFv3: ISM[14368]: Start Wait_Timer at 643319, 622306
Debug: Dec 9 10:53:22 OSPFv3: ISM[14368]: BackupSeen

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

247

debug ipv6 ospf ism-status

debug ipv6 ospf ism-status
Displays debug information about the status of ISM.

Syntax
debug ipv6 ospf ism-status
no debug ipv6 ospf ism-status

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf ism-status
OSPFv3: ism-status debugging is on
Debug: Dec 9 10:55:38 OSPFv3: ISM[14368]: Status change DROther -> Down (Configured)
Debug: Dec 9 10:55:58 OSPFv3: ISM[14368]: Status change Down -> Waiting (Priority > 0)
Debug: Dec 9 10:56:01 OSPFv3: ISM[14368]: Status change Waiting -> DROther (BackupSeen:DR Election)
Debug: Dec 9 10:56:01 OSPFv3: ISM[14368]: {dr:0.0.0.0,bdr:0.0.0.0} -> {dr:1.0.0.11,bdr:1.0.0.11}
Debug: Dec 9 10:56:02 OSPFv3: ISM[14368]: Status change DROther -> DROther (NeighborChange:DR Election)
Debug: Dec 9 10:56:02 OSPFv3: ISM[14368]: {dr:1.0.0.11,bdr:1.0.0.11} -> {dr:7.0.0.3,bdr:1.0.0.11}
Debug: Dec 9 10:56:07 OSPFv3: ISM[14368]: Status change DROther -> DROther (NeighborChange:DR Election)

248

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf lsa

debug ipv6 ospf lsa
Displays LSAs.

Syntax
debug ipv6 ospf lsa
no debug ipv6 ospf lsa

Modes
Privileged EXEC mode
Global configuration mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

249

debug ipv6 ospf lsa

Examples
device# debug ipv6 ospf lsa
OSPFv3: lsa debugging is on
device(config-vif-9)#Debug: Jan 1 17:05:01 OSPFv3: LSA: Update Router-LSA for
area 0.0.0.0
Debug: Jan 1 17:05:01 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter:
10.4.4.8
Debug: Jan 1 17:05:01 OSPFv3: LSA: Type: 8193 ID: 0 AdvRouter: 10.4.4.8, Supress
Updating
Debug: Jan 1 17:05:01 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter:
10.4.4.8
Debug: Jan 1 17:05:01 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking
Interface 644
Debug: Jan 1 17:05:01 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include
5001::/64
Debug: Jan 1 17:05:01 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter:
10.4.4.8
Debug: Jan 1 17:05:01 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress
Updating
Debug: Jan 1 17:05:01 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0
Advrouter: 10.4.4.8
Debug: Jan 1 17:05:01 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Header Type :Router Id: 0
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: request Type =8193 ADvRtr =10.2.2.2
ID=0
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Header Type :IntraPrefix Id: 0
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: request Type =8201 ADvRtr =10.2.2.2
ID=0
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Header Type :Link Id: 2052
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: request Type =8 ADvRtr =10.2.2.2
ID=2052
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA HEADER Type :Router Id: 0.0.0.0
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA HEADER Type :IntraPrefix Id:
0.0.0.0 Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Link Id: 2052 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA HEADER Type :Link Id: 10.0.8.4
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Interface 644
is Stub
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking
Interface 644
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include
5001::/64
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter:
10.4.4.8
Debug: Jan 1 17:05:02 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress
Updating
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0
Advrouter: 10.4.4.8
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0
Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Turnover type:Router Lsa Id:0.0.0.0
AdvRouter:10.2.2.2: Debug: Jan 1 17:05:02 OSPFv3: contents changed
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter:

250

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf lsa

10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Turnover type:IntraPrefix Lsa Id:0.0.0.0
AdvRouter:10.2.2.2: Debug: Jan 1 17:05:02 OSPFv3: contents changed
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter:
10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0
Advrouter: 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter:
10.4.4.8
Debug: Jan 1 17:05:02 OSPFv3: LSA: Turnover type:Router Lsa Id:0.0.0.0
AdvRouter:10.4.4.8: Debug: Jan 1 17:05:02 OSPFv3: contents changed
Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter:
10.4.4.8
Debug: Jan 1 17:05:02 OSPFv3: LSA: schedule flooding 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Network: Interface 644
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Network Id: 644 Advrouter:
10.4.4.8
Debug: Jan 1 17:05:02 OSPFv3: LSA: schedule flooding 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): Interface
644
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Checking Type
:Link Id 10.0.2.132: Adv Routr : 10.4.4.8
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 1
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): Prefix
5001::
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): including
5001::
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Checking Type
:Link Id 10.0.8.4: Adv Routr : 10.2.2.2
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 1
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): Prefix
5001::
Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 5001:: is
Duplicate
Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 19320
Advrouter: 10.4.4.8
Debug: Jan 1 17:05:02 OSPFv3: LSA: schedule flooding 10.2.2.2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

251

debug ipv6 ospf lsa-flooding

debug ipv6 ospf lsa-flooding
Displays debug information about LSA flooding activity.

Syntax
debug ipv6 ospf lsa-flooding
no debug ipv6 ospf lsa-flooding

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf lsa-flooding
OSPFv3: lsa-flooding debugging is on
device(config)# ipv6 router ospf
device(config-ospf6-router)# redistribute connected
device(config-ospf6-router)# redistribute connected Debug: Jan 1 17:17:49
OSPFv3: LSA: schedule flooding 10.2.2.2
Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2
Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2
Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2
Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2
Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2

252

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf lsa-generation

debug ipv6 ospf lsa-generation
Displays debug information about LSA generation.

Syntax
debug ipv6 ospf lsa-generation
no debug ipv6 ospf lsa-generation

Modes
Privileged EXEC mode
Global configuration mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

253

debug ipv6 ospf lsa-generation

Examples
device# debug ipv6 ospf lsa-generation
OSPFv3: lsa-generation debugging is on
Brocade(config-ospf6-router)# Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type
:Router Id: 0 Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 1 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.1
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 2 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.2
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 3 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.3
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 4 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.4
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 5 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.5
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 1 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.1
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 2 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.2
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 3 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.3
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 4 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.4
Advrouter: 10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 5 Advrouter:
10.4.4.8
Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.5 Advrouter: 10.4.4.8

254

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf lsa-install

debug ipv6 ospf lsa-install
Displays debug information about installed LSAs.

Syntax
debug ipv6 ospf lsa-install
no debug ipv6 ospf lsa-install

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf lsa-install
OSPFv3: lsa-install debugging is on
device(config-ospf6-router)# Debug: Jan 1 19:03:16 OSPFv3: LSA: Turnover
type:Router Lsa Id:0.0.0.0 AdvRouter:10.4.4.8: Debug: Jan 1 19:03:16 OSPFv3:
contents changed
Debug: Jan 1 19:03:59 OSPFv3: LSA: Turnover type:Router Lsa Id:0.0.0.0
AdvRouter:10.4.4.8: Debug: Jan 1 19:03:59 OSPFv3: contents changed

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

255

debug ipv6 ospf lsa-inter-area

debug ipv6 ospf lsa-inter-area
Displays debug information about inter-area LSAs.

Syntax
debug ipv6 ospf lsa-inter-area
no debug ipv6 ospf lsa-inter-area

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf lsa-inter-area
OSPFv3: lsa-inter-area debugging is on
device(config-vif-7)# disable
device(config-vif-7)# enable
device(config-vif-7)# OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Installing in LSDB Inter Area Prefix LSA for area 0.0.0.0 and prefix
2001:DB8::/64
OSPFv3: Inter Area LSA not generated, route is in same area.
OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Inter Area LSA not generated, route is in same area.
OSPFv3: Installing in LSDB Inter Area Prefix LSA for area 10.0.0.1 and prefix
2001:DB8::/64
OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Inter Area LSA not generated, path type = External
OSPFv3: Inter Area LSA not generated, route is in same area.
shOSPFv3: Inter Area LSA not generated, route is in same area.

256

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf lsa-refresh

debug ipv6 ospf lsa-refresh
Displays LSA refresh information.

Syntax
debug ipv6 ospf lsa-refresh
no debug ipv6 ospf lsa-refresh

Modes
Privileged EXEC mode
Global configuration mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

257

debug ipv6 ospf lsa-refresh

Examples
device# debug ipv6 ospf lsa-refresh
OSPFv3: lsa-refresh debugging is on
device(config-ospf6-router)# Debug: Jan 1 19:01:39 OSPFv3: LSA: Update
Router-LSA for area 0.0.0.0
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking
Interface 644
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Interface 644
is down
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): No prefix to
advertise for Area 0.0.0.0
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Network: Interface 644 is not DR
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Interface 644
is not DR
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking
Interface 644
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Interface 644
is down
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): No prefix to
advertise for Area 0.0.0.0
Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0
Debug: Jan 1 19:01:44 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0
Debug: Jan 1 19:02:42 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0
Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.6
Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.7debug ip
Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.8
Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.9
Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.10
Debug: Jan 1 19:02:42 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking
Interface 644
Debug: Jan 1 19:02:42 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include
2001:DB8::/64
Debug: Jan 1 19:02:42 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0
Debug: Jan 1 19:02:42 OSPFv3: LSA Update Link: Interface 644
Debug: Jan 1 19:02:46 OSPFv3: LSA Update Link: Interface 644
Debug: Jan 1 19:02:46 OSPFv3: LSA: Type: 8 ID: 644 AdvRouter: 10.4.4.8, Supress
Updating
Debug: Jan 1 19:02:46 OSPFv3: LSA Update Link: Interface 644
Debug: Jan 1 19:02:46 OSPFv3: LSA: Type: 8 ID: 644 AdvRouter: 10.4.4.8, Supress
Updating
Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking
Interface 644
Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include
2001:DB8::/64
Debug: Jan 1 19:02:47 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress
Updating
Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0
Debug: Jan 1 19:02:47 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0
Debug: Jan 1 19:02:47 OSPFv3: LSA: Type: 8193 ID: 0 AdvRouter: 10.4.4.8, Supress

258

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf nsm

debug ipv6 ospf nsm
Displays debug information about the neighbor state machine (NSM).

Syntax
debug ipv6 ospf nsm
no debug ipv6 ospf nsm

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf nsm
OSPFv3: nsm debugging is on
Debug: Dec 9 11:08:20 OSPFv3: NSM[14689]: SendHello at 652364
Debug: Dec 9 11:08:21 OSPFv3: NSM[2.0.0.1, 14341]: HelloReceived at 652379, 631072
Debug: Dec 9 11:08:22 OSPFv3: NSM[14366]: SendHello at 652386
Debug: Dec 9 11:08:24 OSPFv3: NSM[14364]: SendHello at 652403
Debug: Dec 9 11:08:25 OSPFv3: NSM[14688]: SendHello at 652415
Debug: Dec 9 11:08:25 OSPFv3: NSM[14337]: SendHello at 652416
Debug: Dec 9 11:08:26 OSPFv3: NSM[14369]: SendHello at 652430
Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.13, 14364]: HelloReceived at 652434, 631127
Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11, 14368]: HelloReceived at 652437, 631130
Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: Status change [Down]->[Init](HelloReceived)
Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: 2Way-Received
Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: Status change [Init]->[2-way](No Need Adjacency)
Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: AdjOK?
Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: Status change [2-way]->[ExStart](Need Adjacency)
Debug: Dec 9 11:08:28 OSPFv3: NSM[1.0.0.14, 14366]: HelloReceived at 652446, 631139
Debug: Dec 9 11:08:28 OSPFv3: NSM[1.0.0.11, 14369]: HelloReceived at 652447, 631140
Debug: Dec 9 11:08:29 OSPFv3: NSM[14341]: SendHello at 652453
Debug: Dec 9 11:08:29 OSPFv3: NSM[14371]: SendHello at 652457
Debug: Dec 9 11:08:30 OSPFv3: NSM[1.0.0.12, 14371]: HelloReceived at 652461, 631153
Debug: Dec 9 11:08:30 OSPFv3: NSM[14689]: SendHello at 652464
Debug: Dec 9 11:08:30 OSPFv3: NSM[14368]: SendHello at 652468
Debug: Dec 9 11:08:30 OSPFv3: NSM[1.0.0.11]: NegotiationDone

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

259

debug ipv6 ospf nsm-events

debug ipv6 ospf nsm-events
Displays debug information about NSM events.

Syntax
debug ipv6 ospf nsm-events
no debug ipv6 ospf nsm-events

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf nsm-events
OSPFv3: nsm-events debugging is on
Debug: Dec 9 11:10:59 OSPFv3: NSM[1.0.0.12, 14368]: HelloReceived at 653956, 632600
Debug: Dec 9 11:10:59 OSPFv3: NSM[1.0.0.11, 14368]: HelloReceived at 653956, 632600
Debug: Dec 9 11:11:00 OSPFv3: NSM[7.0.0.3, 14368]: HelloReceived at 653968, 632612
Debug: Dec 9 11:11:01 OSPFv3: NSM[2.0.0.1, 14341]: HelloReceived at 653971, 632615
Debug: Dec 9 11:11:01 OSPFv3: NSM[14364]: SendHello at 653974
Debug: Dec 9 11:11:01 OSPFv3: NSM[14368]: SendHello at 653980
Debug: Dec 9 11:11:02 OSPFv3: NSM[1.0.0.13, 14364]: HelloReceived at 653981, 632625
Debug: Dec 9 11:11:02 OSPFv3: NSM[14337]: SendHello at 653983
Debug: Dec 9 11:11:02 OSPFv3: NSM[1.0.0.11, 14369]: HelloReceived at 653984, 632628
Debug: Dec 9 11:11:02 OSPFv3: NSM[1.0.0.12, 14371]: HelloReceived at 653985, 632628
Debug: Dec 9 11:11:02 OSPFv3: NSM[14688]: SendHello at 653985
Debug: Dec 9 11:11:03 OSPFv3: NSM[14341]: SendHello at 653993
Debug: Dec 9 11:11:03 OSPFv3: NSM[14369]: SendHello at 653993
Debug: Dec 9 11:11:03 OSPFv3: NSM[1.0.0.14, 14366]: HelloReceived at 653996, 632640
Debug: Dec 9 11:11:05 OSPFv3: NSM[14689]: SendHello at 654011
Debug: Dec 9 11:11:06 OSPFv3: NSM[14371]: SendHello at 654025
Debug: Dec 9 11:11:07 OSPFv3: NSM[14366]: SendHello at 654038

260

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf nsm-status

debug ipv6 ospf nsm-status
Displays information about the status of NSM.

Syntax
debug ipv6 ospf nsm-status
no debug ipv6 ospf nsm-status

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf nsm-status
OSPFv3: nsm-status debugging is on
Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.12]: Status change [Down]->[Init](HelloReceived)
Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.12]: Status change [Init]->[2-way](No Need Adjacency)
Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [Down]->[Init](HelloReceived)
Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [Init]->[2-way](No Need Adjacency)
Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [2-way]->[ExStart](Need Adjacency)
Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [ExStart]->[ExChange](NegotiationDone)
Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [ExChange]->[Loading](Requestlist Not Empty)
Debug: Dec 9 11:12:20 OSPFv3: NSM[1.0.0.11]: Status change [Loading]->[Full](LoadingDone)
Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [Down]->[Init](HelloReceived)
Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [Init]->[2-way](No Need Adjacency)
Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [2-way]->[ExStart](Need Adjacency)
Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [ExStart]->[ExChange](NegotiationDone)
Debug: Dec 9 11:12:21 OSPFv3: NSM[7.0.0.3]: Status change [ExChange]->[Full](Requestlist Empty)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

261

debug ipv6 ospf packet

debug ipv6 ospf packet
Displays all OSPFv3 packets in rx or tx mode.

Syntax
debug ipv6 ospf packet
no debug ipv6 ospf packet

Modes
Privileged EXEC mode
Global configuration mode

262

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf packet

Examples
device# device# debug ipv6 ospf packet
OSPFv3: packet debugging is on
device(config-ospf6-router)# Debug: Jan 1 17:20:18 OSPFv3: Rcv Hello on ve 9
OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:18 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:23 OSPFv3: Snd Hello on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:29 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:29 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:32 OSPFv3: Snd Hello on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:38 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:38 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:43 OSPFv3: Snd Hello on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:49 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:49 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:54 OSPFv3: Snd Hello on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:58 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:20:58 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:21:04 OSPFv3: Snd Hello on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:21:09 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:21:09 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 17:21:14 OSPFv3: Snd Hello on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

263

debug ipv6 ospf packet-dd

debug ipv6 ospf packet-dd
Displays all OSPFv3 data description packets in rx or tx mode.

Syntax
debug ipv6 ospf packet-dd
no debug ipv6 ospf packet-dd

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf packet-dd
OSPFv3: packet-dd debugging is on
device(config-ospf6-router)# Debug: Jan 1 19:06:18 OSPFv3: Rcv DbDesc on ve 9
OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400)
Debug: Jan 1 19:06:18 Option:00-00-13, Bits:07 SEQ:19b40
Debug: Jan 1 19:06:18 OSPFv3: DbDesc from 10.2.2.2 Ignored: state less than Init
Debug: Jan 1 19:06:19 OSPFv3: set dbdesc seqnum 000aa922 for 10.2.2.2
Debug: Jan 1 19:06:19 OSPFv3: Snd DbDesc on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: fe80::224:38ff:fed6:7800)
Debug: Jan 1 19:06:19 Option:00-00-13, Bits:07 SEQ:aa922
Debug: Jan 1 19:06:19 OSPFv3: Rcv DbDesc on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400)
Debug: Jan 1 19:06:19 Option:00-00-13, Bits:00 SEQ:aa922
Debug: Jan 1 19:06:19 OSPFv3: Snd DbDesc on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: fe80::224:38ff:fed6:7800)
Debug: Jan 1 19:06:19 Option:00-00-13, Bits:01 SEQ:aa923
Debug: Jan 1 19:06:19 OSPFv3: Rcv DbDesc on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400)
Debug: Jan 1 19:06:19 Option:00-00-13, Bits:00 SEQ:aa923

264

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf packet-hello

debug ipv6 ospf packet-hello
Displays all OSPFv3 hello packets in rx or tx mode.

Syntax
debug ipv6 ospf packet-hello
no debug ipv6 ospf packet-hello

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf packet-hello
OSPFv3: packet-hello debugging is on
device(config-ospf6-router)# Debug: Jan 1 18:52:05 OSPFv3: Snd Hello on ve 9
OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 18:52:07 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 18:52:07 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 18:52:16 OSPFv3: Snd Hello on ve 9 OSPFv3:
(fe80::224:38ff:fe21:6400->OSPFv3: ff02::5)
RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 18:52:16 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2
Debug: Jan 1 18:52:16 OSPFv3: Rcv Hello on ve 9 OSPFv3:
(fe80::224:38ff:fed6:7800->OSPFv3: ff02::5)
RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

265

debug ipv6 ospf packet-lsa-ack

debug ipv6 ospf packet-lsa-ack
Displays all OSPFv3 LSA acknowledgment packets in rx or tx mode.

Syntax
debug ipv6 ospf packet-lsa-ack
no debug ipv6 ospf packet-lsa-ack

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf packet-lsa-ack
OSPFv3: packet-lsa-ack debugging is on
Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 2150 OSPFv3: (fe80::768e:f8ff:fe46:bf60->OSPFv3:
ff02::5)
Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1
Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 2250 OSPFv3: (fe80::224:38ff:fe76:2a40->OSPFv3: ff02::5)
Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1
Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 2122 OSPFv3: (fe80::277:77ff:fe77:1111->OSPFv3: ff02::5)
Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:2
Debug: Dec 9 11:15:08 OSPFv3: neighbor 7.0.0.3 not found, reject received LS ACK
Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 120 OSPFv3: (fe80::204:80ff:fe11:1111->OSPFv3: ff02::5)
Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1
Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 1737 OSPFv3: (fe80::768e:f8ff:fef9:b8dc->OSPFv3:
ff02::5)
Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1
Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 1837 OSPFv3: (fe80::768e:f8ff:fe34:b570->OSPFv3:
ff02::5)
Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1
Debug: Dec 9 11:15:12 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3:
fe80::224:38ff:fe76:2a40)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000035 AGE:2
Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2150 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3:
fe80::768e:f8ff:fe46:bf60)
Type:2001, LSID:0 Adv:7.0.0.3 SEQ:800008cc AGE:1
Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3:
fe80::224:38ff:fe76:2a40)
Type:2001, LSID:0 Adv:7.0.0.3 SEQ:800008cc AGE:1
Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3:
fe80::224:38ff:fe76:2a40)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000036 AGE:1
Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2150 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3:
fe80::768e:f8ff:fe46:bf60)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000036 AGE:1
Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3:
fe80::224:38ff:fe76:2a40)
Type:2009, LSID:92550 Adv:7.0.0.3 SEQ:8000002d AGE:1
Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2150 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3:
fe80::768e:f8ff:fe46:bf60)
Type:2009, LSID:92550 Adv:7.0.0.3 SEQ:8000002d AGE:1
Debug: Dec 9 11:15:13 OSPFv3: Rcv LSAck on ve 2122 OSPFv3: (fe80::768e:f8ff:fe46:bf60->OSPFv3:
ff02::5)
Type:2001, LSID:0 Adv:7.0.0.3 SEQ:800008cc AGE:1
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000036 AGE:1
Type:2009, LSID:92550 Adv:7.0.0.3 SEQ:8000002d AGE:1

266

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf packet-lsa-req

debug ipv6 ospf packet-lsa-req
Displays all OSPFv3 LSA request packets in rx or tx mode.

Syntax
debug ipv6 ospf packet-lsa-req
no debug ipv6 ospf packet-lsa-req

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf packet-lsa-req
OSPFv3: packet-lsa-req debugging is on
Debug: Dec 9 11:18:25 OSPFv3: Snd LSReq on ve 2122 OSPFv3: (fe80::207:50ff:fe75:750->OSPFv3:
fe80::768e:f8ff:fe46:bf60)
Type:0008, LSID:2049 Adv-Router:1.0.0.11
Type:0008, LSID:2049 Adv-Router:1.0.0.12
Type:0008, LSID:14368 Adv-Router:1.0.0.1
Type:0008, LSID:3085 Adv-Router:7.0.0.3
Debug: Dec 9 11:18:25 OSPFv3: Snd LSReq on ve 2122 OSPFv3: (fe80::207:50ff:fe75:750->OSPFv3:
fe80::768e:f8ff:fe46:bf60)
Type:0008, LSID:2049 Adv-Router:1.0.0.11
Type:0008, LSID:2049 Adv-Router:1.0.0.12
Type:0008, LSID:14368 Adv-Router:1.0.0.1
Type:0008, LSID:3085 Adv-Router:7.0.0.3
Debug: Dec 9 11:18:26 OSPFv3: Rcv LSReq on ve 2122 OSPFv3: (fe80::277:77ff:fe77:1111->OSPFv3:
fe80::207:50ff:fe75:750)
Type:2001, LSID:0 Adv-Router:1.0.0.1
Type:2009, LSID:0 Adv-Router:1.0.0.1
Type:0008, LSID:14368 Adv-Router:1.0.0.1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

267

debug ipv6 ospf packet-lsa-update

debug ipv6 ospf packet-lsa-update
Displays all OSPFv3 LSA update packets in rx or tx mode.

Syntax
debug ipv6 ospf packet-lsa-update
no debug ipv6 ospf packet-lsa-update

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf packet-lsa-update
OSPFv3: packet-lsa-update debugging is on
Debug: Dec 9 11:20:18 OSPFv3: Rcv LSUpdate on ve 2150
>OSPFv3:ff02::5)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:2
Debug: Dec 9 11:20:18 OSPFv3: Rcv LSUpdate on ve 2250
ff02::5)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:2
Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 120
ff02::5)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3
Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 1737
ff02::5)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3
Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 1837
ff02::5)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3
Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 2250
ff02::5)
Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3

268

OSPFv3:(fe80::768e:f8ff:fe46:bf60OSPFv3:(fe80::224:38ff:fe76:2a40->OSPFv3:
OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3:
OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3:
OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3:
OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3:

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf route

debug ipv6 ospf route
Displays all OSPFv3 routes.

Syntax
debug ipv6 ospf route
no debug ipv6 ospf route

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug
OSPFv3: route
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9
Debug: Dec 9

ipv6 ospf route
debugging is on
11:24:18 OSPFv3: add to spf list Inst vrf id 0, flag 0
11:24:24 OSPFv3: delete from spf list Inst vrf id 0, flag 1
11:24:24 OSPFv3 ROUTE: release semaphore 1
11:24:24 OSPFv3: SPF: Calculation for area 0.0.0.0
11:24:24 OSPFv3: SPF: installing vertex 1.0.0.1
11:24:24 OSPFv3: SPF: 2.0.0.1:14337 is the first hop
11:24:24 OSPFv3: SPF : 2.0.0.1:14337 nexthop :: ifindex 14341
11:24:24 OSPFv3: SPF: Examining Vertex: 2.0.0.1:14337
11:24:24 OSPFv3: SPF: new node added to candidate list: 2.0.0.1:14337
11:24:24 OSPFv3: SPF: 1.0.0.13:2050 is the first hop
11:24:24 OSPFv3: SPF : 1.0.0.13:2050 nexthop :: ifindex 14364
11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.13:2050
11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.13:2050
11:24:24 OSPFv3: SPF: 1.0.0.14:2050 is the first hop
11:24:24 OSPFv3: SPF : 1.0.0.14:2050 nexthop :: ifindex 14366
11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.14:2050
11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.14:2050
11:24:24 OSPFv3: SPF: 1.0.0.11:2050 is the first hop
11:24:24 OSPFv3: SPF : 1.0.0.11:2050 nexthop :: ifindex 14369
11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.11:2050
11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.11:2050
11:24:24 OSPFv3: SPF: 1.0.0.12:2050 is the first hop
11:24:24 OSPFv3: SPF : 1.0.0.12:2050 nexthop :: ifindex 14371
11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.12:2050
11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.12:2050
11:24:24 OSPFv3: SPF: installing vertex 2.0.0.1:14337
11:24:24 OSPFv3: ROUTE: Creating route: 2.0.0.1:14337

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

269

debug ipv6 ospf route-calc-external

debug ipv6 ospf route-calc-external
Displays external route calculations.

Syntax
debug ipv6 ospf route-calc-external
no debug ipv6 ospf route-calc-external

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf route-calc-external
OSPFv3: route-calc-external debugging is on
device(config-if-e1000-8/9)# Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE:
External LSA(ID= 37) is Self-originated:
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 39) is
Self-originated:
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 36) is
Self-originated:
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 38) is
Self-originated:
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 40) is
Self-originated:
Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified

270

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf route-calc-inter-area

debug ipv6 ospf route-calc-inter-area
Displays inter-area route calculations.

Syntax
debug ipv6 ospf route-calc-inter-area
no debug ipv6 ospf route-calc-inter-area

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf route-calc-inter-area
OSPFv3: route-calc-inter-area debugging is on
device(config-vif-7)# ipv6 ospf area 1
device(config-vif-7)# sOSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 2,
prefix 2001:DB8::/64) is Self-originated. Area id 0.0.0.0
OSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 2, prefix 2001:DB8::/64) is
Self-originated. Area id 0.0.0.0
device(config-vif-7)# disable
device(config-vif-7)# OSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 2,
prefix 2001:DB8::/64) is Self-originated. Area id 0.0.0.0
device(config-vif-7)# enable
device(config-vif-7)# OSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 11,
prefix 2001:DB8::/64) is Self-originated. Area id 0.0.0.0
device(config)# Debug: Jan 1 00:32:22 OSPFv3: INTER AREA ROUTE: Inter Area route
for prefix 2001:DB8::/64 created

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

271

debug ipv6 ospf route-calc-intra-area

debug ipv6 ospf route-calc-intra-area
Displays intra-area route calculations.

Syntax
debug ipv6 ospf route-calc-intra-area
no ddebug ipv6 ospf route-calc-intra-area

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf route-calc-intra-area
OSPFv3: route-calc-intra-area debugging is on
Debug: Dec 9 11:26:41 OSPFv3: Calculating Intra
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
Advrouter 1.0.0.1
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
Advrouter 1.0.0.11
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
Advrouter 1.0.0.12
Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE:
area 0.0.0.0

272

Area routes for area 0.0.0.0
Calculating Intra Area Stub Routes
found Prefix LSA type : IntraPrefix : for Id 0.0.0.0
Intra Area route install 1001:1:1:1::/64 cost 1,
Intra Area route install 1001:101:1:1::/64 cost 100,
Intra Area route install 1001:200:1:1::/64 cost 100,
Intra Area route install 1001:205:1:1::/64 cost 100,
Intra Area route install 1001:210:1:1::/64 cost 100,
Intra Area route install 1001:220:1:1::/64 cost 100,
Intra Area route install 1001:593:1:1::/64 cost 17,
Intra Area route install 1001:2122:1:1::/64 cost 9,
found Prefix LSA type : IntraPrefix : for Id 0.0.0.0
Intra Area route install 1001:1011::1/128 cost 100,
found Prefix LSA type : IntraPrefix : for Id 0.0.0.0
Intra Area route install 1001:1012::1/128 cost 100,

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 ospf route-calc-spf

debug ipv6 ospf route-calc-spf
Displays SPF route calculations.

Syntax
debug ipv6 ospf route-calc-spf
no debug ipv6 ospf route-calc-spf

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf route-calc-spf
OSPFv3: route-calc-spf debugging is on
Debug: Dec 9 11:29:11 OSPFv3: Schedule routing table build
Debug: Dec 9 11:29:11 OSPFv3: add to spf list Inst vrf id 0, flag 0
Debug: Dec 9 11:29:17 OSPFv3: delete from spf list Inst vrf id 0, flag 1
Debug: Dec 9 11:29:17 OSPFv3: SPF: Calculation for area 0.0.0.0
Debug: Dec 9 11:29:17 OSPFv3: SPF: installing vertex 1.0.0.1
Debug: Dec 9 11:29:17 OSPFv3: SPF: 2.0.0.1:14337 is the first hop
Debug: Dec 9 11:29:17 OSPFv3: SPF : 2.0.0.1:14337 nexthop :: ifindex 14341
Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 2.0.0.1:14337
Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 2.0.0.1:14337
Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.13:2050 is the first hop
Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.13:2050 nexthop :: ifindex 14364
Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.13:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.13:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.14:2050 is the first hop
Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.14:2050 nexthop :: ifindex 14366
Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.14:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.14:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.11:2050 is the first hop
Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.11:2050 nexthop :: ifindex 14369
Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.11:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.11:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.12:2050 is the first hop
Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.12:2050 nexthop :: ifindex 14371
Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.12:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.12:2050
Debug: Dec 9 11:29:17 OSPFv3: SPF: installing vertex 2.0.0.1:14337
Debug: Dec 9 11:29:17 OSPFv3: SPF : 2.0.0.1:0 nexthop fe80::204:80ff:fe11:1111 ifindex 14341

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

273

debug ipv6 ospf route-install

debug ipv6 ospf route-install
Displays all OSPFv3 installed routes.

Syntax
debug ipv6 ospf route-install
no debug ipv6 ospf route-install

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 ospf route-install
OSPFv3: route-install debugging is on
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 2.0.0.1:14337
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 2.0.0.1:0
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.13:2050
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.14:2050
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.11:2050
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.12:2050
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.12:0
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.11:0
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.14:0
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.13:0
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 7.0.0.3:3085
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 7.0.0.3:0
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:101:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:200:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:205:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:210:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:220:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:593:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:2122:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: route changed, new route preferred: 1001:2122:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1011::1/128
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1012::1/128
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1002:201:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:21:5:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:22:5:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:17:37:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:18:37:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:2122:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:120:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1392:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1382:1:1::/64
Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Validate routing table
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:1:1:1::/64, nexthop cnt 1, route_info->flag 0x2
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:17:37:1::/64, nexthop cnt 1, route_info->flag 0x2
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:18:37:1::/64, nexthop cnt 1, route_info->flag 0x2
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:21:5:1::/64, nexthop cnt 1, route_info->flag 0x2
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:22:5:1::/64, nexthop cnt 1, route_info->flag 0x2
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:101:1:1::/64, nexthop cnt 1, route_info->flag 0x2
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:120:1:1::/64, nexthop cnt 1, route_info->flag 0x2
Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:200:1:1::/64, nexthop cnt 1, route_info->flag 0x2

274

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 pim bootstrap

debug ipv6 pim bootstrap
Enables IPv6 Protocol Independent Multicast (PIM) bootstrap debugging.

Syntax
debug ipv6 pim bootstrap
no debug ipv6 pim bootstrap

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables IPv6 PIM bootstrap debugging.

Examples
device# debug ipv6 pim bootstrap
PIM6: bootstrap debugging is on
device# PIM-BSR.VRF0: Prefer BSR 2001:DB8::12(Pr 120) over current BSR
2001:DB8::12(Pr 120)
PIM-BSR.VRF0: Intf v1844 - accept BSM from BSR 2001:DB8::12(Pr 120), local state
CandBSR, curr BSR 2001:DB8::12 (Pr 120)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

275

debug ipv6 pim clear

debug ipv6 pim clear
Clears all the IPv6 PIM debug settings.

Syntax
debug ipv6 pim clear
no debug ipv6 pim clear

Modes
Privileged EXEC mode

Examples
If no settings are enabled, output similar to the following will be displayed.
device# debug ip pim clear
no debug ip pim is enabled

276

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 pim event

debug ipv6 pim event
Enables debugging of IPv6 PIM events.

Syntax
debug ipv6 pim event
no debug ipv6 pim event

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables debugging of IPv6 PIM events.

Examples
device# debug ipv6 pim event
PIM6: event debugging is on
PIM-EVT.VRF0: Receive intf v1844 Dn state_notify
Mcast6v6 receive event 16
PIM6-EVT: Received vport v1844/1/1/11 Dn state notify
Mcast6v6 receive event 16
PIM6-EVT: Received vport v1844/1/1/12 Dn state notify
Mcast6v6 receive event 16
PIM6-EVT: Received vport v1844/1/1/13 Dn state notify
Mcast6v6 receive event 16
Mcast6v6 receive event 13
PIM6-EVT: Received vport v1844/1/1/14 Dn state notify
MC-EVT: Port v1844 state changed to DOWN
PIM-EVT.VRF0: Receive intf v1844 Dn state_notify
PIM6-EVT: Received vport v1844/1/1/14 Dn state notify

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

277

debug ipv6 pim group

debug ipv6 pim group
Displays the IPv6 PIM related debugging information for the specified PIM group.

Syntax
debug ipv6 pim groupgroup_addr
no debug ipv6 pim group group_addr

Parameters
group_addr
Specifies the group address of the PIM.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 pim group ff0::8
PIM6: group ff0::8 debugging is on
device# PIM.VRF0: Deallocated hw resources for (7400::200 ff0::8), parent:
NIL,Nil. olist not empty
VRF0 Flow Entry Delete (2001:DB8::200 ff0::1) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::2) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::3) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::4) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::5) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::6) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::7) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::8) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::9) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::a) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::b) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::c) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::d) HW bits: 1 1
VRF0 Flow Entry Delete (2001:DB8::200 ff0::e) HW bits: 1 1

278

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 pim join-prune

debug ipv6 pim join-prune
Controls join prune processing and displays debugging information related to the IPv6 join prune messages.

Syntax
debug ipv6 pim join-prune
no debug ipv6 pim join-prune

Modes
Privileged EXEC mode

Examples
device# debug ipv6 pim join-prune
PIM6: join-prune debugging is on
device# PIMSM.0: BEGIN J/P proc: rpf_nbr fe80::768e:f8ff:fe34:3c80, to_me=1 from
fe80::768e:f8ff:fe3e:9600, intf v1844 ---Group=ff0::1. Join list: 1 srcs
J-Src=2001:DB8::200, wc=0, rpt=0, SM=1
PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::1) from
fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11
Group=ff0::1. Prune list: 0 srcs
Group=ff0::2. Join list: 1 srcs
J-Src=2001:DB8::200, wc=0, rpt=0, SM=1
PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::2) from
fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11
Group=ff0::2. Prune list: 0 srcs
Group=ff0::3. Join list: 1 srcs
J-Src=2001:DB8::200, wc=0, rpt=0, SM=1
PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::3) from
fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11
Group=ff0::3. Prune list: 0 srcs
Group=ff0::4. Join list: 1 srcs
J-Src=2001:DB8::200, wc=0, rpt=0, SM=1
PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::4) from
fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11
Group=ff0::4. Prune list: 0 srcs
Group=ff0::5. Join list: 1 srcs
J-Src=2001:DB8::200, wc=0, rpt=0, SM=1
PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::5) from
fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11
Group=ff0::5. Prune list: 0 srcs
Group=ff0::6. Join list: 1 srcs
J-Src=2001:DB8::200, wc=0, rpt=0, SM=1
PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::6) from
fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

279

debug ipv6 pim nbr-change

debug ipv6 pim nbr-change
Controls the IPv6 PIM neighbor changes.

Syntax
debug ipv6 pim nbr-change[ nbr_address ]
no debug ipv6 pim nbr-change[ nbr_address ]

Parameters
nbr_address
Specifies the neighbor address.

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 pim nbr-change
PIM6: nbr-change debugging is on
device# PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe3e:9600 on intf v1844,
1/1/11-1/1/14
device(config-if-e1000-1/1/11)# disable
device(config-if-e1000-1/1/11)# PIM-NBR.VRF0: Neighbor fe80::768e:f8ff:fe3e:9600
on interface v1844, 1/1/11 deleted on port-down
PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17
PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17
device(config-if-e1000-1/1/11)# enable
device(config-if-e1000-1/1/11)# PIM.VRF0: Rx Hello msg from
fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17
PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17
PIMV2 rcvd from fe80::768e:f8ff:fe3e:9600 on v1844 (phy e1/1/11), not pim
neighbour
PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe3e:9600 on intf v1844, 1/1/11-1/1/14
PIM-NBR.VRF0: Neighbor fe80::768e:f8ff:fe3e:9600 on interface v1844, 1/1/11 genid
changed from 4294953471 to 13824
PIM-NBR.VRF0: GenId changed for Neighbor fe80::768e:f8ff:fe3e:9600 on interface
v1844, 1/1/11 ; new GenId 13824
PIM-NBR.VRF0: Neighbor fe80::768e:f8ff:fe3e:9600 on interface v1844, 1/1/11 added
PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17
PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17
PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe3e:9600 on intf v1844, 1/1/11-1/1/14

280

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 pim packet

debug ipv6 pim packet
Displays debugging information about the IPv6 PIM packets.

Syntax
debug ipv6 pim packet source_address group_address [ rate ]
no debug ipv6 pim packet source_address group_address [ rate ]

Parameters
source_address
Specifies the IPv6 source address of the PIM packet.
group_address
Specifies the IPv6 group address of the PIM packet.
rate
Specifies the hardware rate.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 pim packet
device# debug ipv6 pim packet 102:1:1::16 ff1e::4:5:1
debug packet S=102:1:1::16 G=ff1e::4:5:1
device# Debug: Jan 2 01:37:27 Rx Pkt (102:1:1::16, ff1e::4:5:1) on v102(4/4/1).
Debug: Jan 2 01:37:27
src local, create (S,G) and send MCAST_CREATE_NOTIFICATION
Debug: Jan 2 01:37:27
send MCAST_FIRST_DATA: entry phy port: 4/4/1, pkt input port: 4/4/1. SPT-T,
FAST-F
Debug: Jan 2 01:37:27
(102:1:1::16,ff1e::4:5:1), pkt incoming at v102, REG: OFF, FWD_FAST: OFF,
hw_drop: ON
Debug: Jan 2 01:37:27 Rx Pkt (102:1:1::16, ff1e::4:5:2) on v102(4/4/1).
Debug: Jan 2 01:37:27
src local, create (S,G) and send MCAST_CREATE_NOTIFICATION
Debug: Jan 2 01:37:27
send MCAST_FIRST_DATA: entry phy port: 4/4/1, pkt input port: 4/4/1.
SPT-T, FAST-F

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

281

debug ipv6 pim regproc

debug ipv6 pim regproc
Controls IPv6 PIM register processing.

Syntax
debug ipv6 pim regproc
no debug ipv6 pim regproc

Modes
Privileged EXEC mode

Examples
device# debug ipv6 pim regproc
PIM6: regproc debugging is on
device# PIMSM-REG.VRF0: (2001:DB8::200
PIMSM-REG.VRF0: (2001:DB8::200 ff0::2)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::3)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::4)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::5)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::6)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::7)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::8)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::9)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::a)
PIMSM-REG.VRF0: (2001:DB8::200 ff0::b)

282

ff0::1)
Sending
Sending
Sending
Sending
Sending
Sending
Sending
Sending
Sending
Sending

Sending
L2-Null
L2-Null
L2-Null
L2-Null
L2-Null
L2-Null
L2-Null
L2-Null
L2-Null
L2-Null

L2-Null Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74
Reg on iface v74

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 pim rp

debug ipv6 pim rp
Controls the Rendezvouz Point (RP) processing for IPv6 PIM events.

Syntax
debug ipv6 pim rp
no debug ipv6 pim rp

Modes
Privileged EXEC mode

Examples
device# debug ipv6 pim rp
PIM6: rp debugging is on
device# PIMv6-CRP.VRF0: Sending Candidate RP Msg (size 46)
PIMv6-CRP.VRF0: Sending Candidate RP Msg (size 46)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

283

debug ipv6 pim show

debug ipv6 pim show
Displays the IPv6 PIM debug settings.

Syntax
debug ipv6 pim show
no debug ipv6 pim show

Modes
Privileged EXEC mode

Examples
device# debug ipv6 pim show
pim6 debug-enable-any = 1

284

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 pim source

debug ipv6 pim source
Displays the IPv6 PIM related debugging information for the specified source address.

Syntax
debug ipv6 pim source ipaddr
no debug ipv6 pim source ipaddr

Parameters
ipaddr
Specifies the source IP address.

Modes
Privileged EXEC mode

Examples
device# debug ipv6 pim source 2001:DB8::200
PIM6: source 2001:DB8::200 debugging is on
device# PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::1), parent:
NIL,Nil. olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::2), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::3), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::4), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::5), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::6), parent: NIL,Nil.
olist not empt
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::7), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::8), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::9), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::a), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::b), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::c), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::d), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::e), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::f), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::10), parent: NIL,Nil.
olist not empty
PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::11), parent: NIL,Nil.
olist not empty

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

285

debug ipv6 pimsm-snoop

debug ipv6 pimsm-snoop
Troubleshoots issues related to IPv6 PIM-SM snoop configurations.

Syntax
debug ipv6 pimsm-snoop [ add-del-oif | all | clear | control-source | error | fsm | group | join-prune | physical-port | show |
source | stacktrace | timer | vlan ]
no debug ipv6 pimsm-snoop [ add-del-oif | all | clear | control-source | error | fsm | group | join-prune | physical-port | show |
source | stacktrace | timer | vlan ]

Parameters
add-del-oif
Displays debugs related to the addition and deletion of outbound interfaces (OIFs) in Mcache.
all
Enables all PIM-SM snoop related debugs.
clear
Clears all PIM-SM snoop related debug settings.
control-source
Displays PIM-SM snooping related debug information for the specified control source address.
error
Monitors error messages related to PIM-SM snoopng.
fsm
Enables debugging of Finite State Machine (FSM) transactions.
group
Displays PIM-SM snooping information for a specific group.
join-prune
Monitors PIM-SM snoop join and prune messages.
physical-port
Displays information of PIM-SM physical ports that are connected.
show
Displays all PIM-SM snoop related debug settings.
source
Displays PIM-SM snooping related debug information for the specified server source address.
stacktrace
Displays debug messages accompanied by call stack dump.
timer
Enables PIM-SM snoop timer debugging.
vlan
Enables PIM-SM snoop debugging for a particular VLAN.

286

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 pimsm-snoop

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
Examples
The following is sample output from the debug ipv6 pimsm-snoop timer command.
device# debug ipv6 pimsm-snoop timer
14d 6:29:33 - v6PSNOOP_SRC: PIMv2 Join/Prune from fe80::224:38ff:fe76:5180 to
upstream Neig-Addr fe80::224:38ff:fe77:7440 port 1/1/9 on vlan 503, holdtime 210,
payload length 70
14d 6:29:33 - v6PSNOOP_JP: Rcv Join-Prune Group : ff7e::1:2:3, #join src 1,
#prune src 0
14d 6:29:33 - v6PSNOOP_JP: join source 2222::22 flags: S WC RPT
14d 6:29:33 - v6PSNOOP_JP: Rcv Join: (* ff7e::1:2:3) -> 1/1/4
14d 6:29:33 - v6PSNOOP_FSM: (* G) Join for SG_RPT(3000::10, ff7e::1:2:3, 503),
oif(1/1/4): NI -> NI
14d 6:29:33 - v6PSNOOP_TIMER: timer restart: 217 ticks, timer type: old SG -> new
SG, fsm state: J
14d 6:29:33 - v6PSNOOP_FSM: RCV_SG(*, ff7e::1:2:3, 503), oif(1/1/4): J -> J

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

287

debug ipv6 raguard

debug ipv6 raguard
Enables RA guard debug messages.

Syntax
debug ipv6 raguard
no debug ipv6 raguard

Modes
Privileged EXEC mode

Examples
device# debug ipv6 raguard
00 days 00h40m49s:I:RAGuard: prefix in router advertisement rejected by
prefix-list
00 days 00h40m49s:I:RAGuard: prefix in router advertisement passed prefix-list
00 days 00h40m49s:I:RAGuard: Packet received on Host port 1/1/5. Dropped.
00 days 00h40m49s:I:RAGuard: Packet received on a Trusted port 1/1/5. Forward.
00 days 00h40m49s:I:RAGuard: Packet preference is greater than policy configured
maximum on port 1/1/5, vlan 10
00 days 00h40m49s:I:RAGuard: IPv6 address of packet matches Whitelist
fe80:100::100:1 on port 1/1/5, vlan 10
00 days 00h40m49s:I:RAGuard: IPv6 address of the packet does not match the
whitelist fe80:100::100:1 on port 1/1/5, vlan 10
00 days 00h40m49s:I:RAGuard: packet passes prefix-list examplelist1 on port 1/1/5,
vlan 10
00 days 00h40m49s:I:RAGuard: packet does not pass prefix-list examplelist1 on port
1/1/5, vlan 10
00 days 00h40m49s:I:RAGuard: prefix-list examplelist1 on policy examplepolicy1
not found
00 days 00h40m49s:I:RAGuard: Not enabled for vlan 10, port 1/1/5
00 days 00h40m49s:I:RAGuard: Feature ON for vlan 10, port 1/1/5

288

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ipv6 rip events

debug ipv6 rip events
Displays debugging information about the IPv6 Routing Information Protocol (RIP) events.

Syntax
debug ipv6 rip events
no debug ipv6 rip events

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 rip events
device(config-vif-11)# RIPng: update timer expired
clear ipv routeRIPng: triggered update
RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0
from :: on interface NULL
RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0
from :: on interface NULL
RIPng: Adding local connected route 2001:DB8::1/64 on interface v11
RIPng: Adding local connected route 2001:DB8::1/64 on interface v12
RIPng: update timer expired
RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0)
RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

289

debug ipv6 rip receive

debug ipv6 rip receive
Displays debugging information about the IPv6 RIP packets received.

Syntax
debug ipv6 rip receive
no debug ipv6 rip receive

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug ipv6 rip receive
device(config-vif-11)# RIPng: received packet from fe80::224:38ff:fe9f:7500 port
521 on interface v11
command response version 1 packet size 64
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v12
command response version 1 packet size 64
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11
command response version 1 packet size 64
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11
command response version 1 packet size 64
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11
command response version 1 packet size 64
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11
command response version 1 packet size 64
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0
prefix 2001:DB8::/64 metric 1 tag 0

290

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug license

debug license
Displays the package information on which the license has been loaded.

Syntax
debug license
no debug license

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
show license

Examples
After enabling debugging:
device# debug license
License all debugging ON
device# license delete unit
unit id
device# license delete unit 1
all
delete all software licenses
index
software license index
device# license delet unit 1 index 2 Can't delete the license specified by index(2) 141(LICENSE_IN_USE)
device# license delet unit 1 index 2
SYSLOG: <44> Dec 9 11:18:38 device Stack 1: The 'ICX7450-PREM-LIC-SW' license has been deleted
on this unit and is available for redeployment on another unit in accordance with the terms and
conditions of use. All features associated to this license must be disabled.
SYSLOG: <46> Dec 9 11:18:38 device License: Normal license package ICX7450-PREM-LIC-SW
with LID ENG08D21100 is removed on unit 1
device# show license
Index
Lic Mode
Lic Name
Lid/Serial No Lic Type StatusLic Period
Lic
Capacity
Stack unit 1:
2
Non-Node Lock
ICX7450-PREM-LIC-SW
EN09429C1D8
Normal
Active
Unlimited
Stack unit 12:
1
Non-Node Lock
ICX7450-PREM-LIC-SW
ENG08D21100
Normal
Active
Unlimited

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

1
1

291

debug loop-detect

debug loop-detect
Allows the Brocade devices to detect loops using the Brocade Port Loop Detection (PLD) protocol and disable a port that is on
the receiving end of a loop. The loop is detected by sending Bridge Packet Data Unit (BPDU) test packets.

Syntax
debug loop-detect
no debug loop-detect

Usage Guidelines
Examples
NOTE
Execute the command prior to configuring the
modes.
The following example shows how to configure loop detection of a single port in strict mode.
device# debug loop-detect
Configure loop-detection strict mode on port 1/1/25 :
device(config-if-e1000-1/1/25)# loop-detection

When there is loop detection activity in the device, the debug information regarding loop detection is displayed on the console.
The following example shows the output when the port goes into a disabled state because of loop detection (strict mode).
insert_disable primary 1/1/25, vlan=4096
Loop-detection: port 1/1/25 (vlan=1), put into errdisable state

The following example shows how to configure loop detection in a VLAN in loose mode.
Configure loop-detection loose mode on port vlan 2 :
device(config-vlan-2)# loop-detection
device(config-vlan-2)# insert_disable primary 1/1/31, vlan=2

The following output is displayed after the configuration.
Loop-detection: port 1/1/31 (vlan=2), put into errdisable state
insert_disable primary 1/1/32, vlan=2
Loop-detection: port 1/1/32 (vlan=2), put into errdisable state

292

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug loop-detect level

debug loop-detect level
Debugs loop detection in a particular level.

Syntax
debug loop-detect level decimal
no debug loop-detect level decimal

Parameters
decimal
Specifies the level.

Examples
device# debug loop-detect level 1

Strict mode:
Topology: port 1/1/25 is single port.
device# debug loop-detect level 3
Configure loop-detection on port 1/1/25 :
device(config-if-e1000-1/1/25)# loop-detection
device(config-if-e1000-1/1/25)# Loop-detection: port 1/1/25 (vlan=1), put into
errdisable state

Loose mode:
Topology: port 1/1/31 is connected to 1/1/32 in same vlan.
Configure loop-detection on port vlan 2 :
device(config-vlan-2)# loop-detection
device(config-vlan-2)# Loop-detection: port 1/1/31 (vlan=2), put into errdisable
state
Loop-detection: port 1/1/32 (vlan=2), put into errdisable state

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

293

debug mac

debug mac
Enables the Media Access Control (MAC) address debugging action.

Syntax
debug mac
no debug mac

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug mac
MAC DB: Action debugging is on
mac_action_request: done->
MA Normal,
ALL_SYST,
FLUSH
Ports: All Ports
Vlans: All Vlans
stack: 20B89ED4 2028D708 2028D8A0 201AB040 20C2D58C 20C2EA48 20C2D6DC 20C2EDA4
20C2B2B8 20B8B3A8 2076C3EC 2076C448 20590734 205146FC 20592568 5010 15B4C 1AAD8
Brocade# aging_timer. call mac_action_handler()
MA Normal,
ALL_SYST,
FLUSH
Ports: All Ports
Vlans: All Vlans
stack: 20B89ED4 2028D708 20C6FAB0 20B894BC 20514924 20590738 205146FC 20592568
5010 15B4C 1AAD8
mac_clear_request(). NO_ACTION, SPECIFIC
stack: 20B89ED4 2028CD28 2028D1F0 20C6FAB4 20B894BC 20514924 20590738 205146FC
20592568 5010 15B4C 1AAD8

294

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mac-authentication

debug mac-authentication
Enables the MAC authentication debugging for a single port.

Syntax
debug mac-authenticationhex
no debug mac-authentication hex

Parameters
hex
Specifies the hexadecimal number of the port.

Modes
Privileged EXEC mode

Usage Guidelines
The no form of the command disables the MAC authentication debugging for a single port.
This debug command displays output that is useful for the technical support personnel. Use the ptrace aaa command instead
of the mac authentication command to display information about the authentication of packets between the device and the
RADIUS server.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

295

debug mac-authentication

Examples
device(config)# debug mac-authentication
device(config)# Debug: Dec 9 10:59:56 Search for dot1x session with portid=1/2/4 and
sessionid=[104433,ffc0002] in queue.. entry not found.
Debug: Dec 9 10:59:56 Extracted username=0010.4433.0002 from EAP buffer.
Debug: Dec
Debug: Dec
entries=1.
Debug: Dec

9 10:59:56 AAA-DOT1X (MACAUTH) - Created a new session for MAC Authentication
9 10:59:56 Append a dot1x session: portid=1/2/4, sessionid=[104433,ffc0002], Total

Debug: Dec
Debug: Dec
Debug: Dec

9 10:59:56 PortId=67, SessionId=[104433,ffc0002] Username=0010.4433.0002, RadiusClient=255
9 10:59:56 PortId=67, SessionId=[104433,ffc0002] Username=0010.4433.0002, RadiusClient=255
9 10:59:56 AAA Queue Display End.

Debug: Dec
Debug: Dec

9 10:59:56 Reseting RADIUS Client structure
9 10:59:56 RADIUS: Reset client 0, Session type 2, Total number of active clients=1

Debug: Dec

9 10:59:56 AAA: Open RADIUS UDP port

Debug: Dec
Debug: Dec
port=1812
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec
Debug: Dec

9 10:59:56 Tracing the outgoing Radius Authentication packet..
9 10:59:56 UDP packet source IP=10.37.171.160, port=1058, destination IP=10.20.67.118,
9
9
9
9
9
9
9
9
9
9
9
9

10:59:56 Radius Header (hex): Code=01 Identifier=09 Length=0073
10:59:56 Authenticator (hex):6f9196ca14bad62531e7d8fe265b57f2
10:59:56 Attribute Type(hex)=01 Len(hex)=10 Value (ASCII)=0010.4433.0002
10:59:56 Attribute Type(hex)=02 Len(hex)=12 Value (hex)=bce0,ddq%/a9fdc0903X1el1a
10:59:56 Attribute Type(hex)=06 Len(hex)=06 Value (hex)=00000002
10:59:56 Attribute Type(hex)=0c Len(hex)=06 Value (hex)=000005dc
10:59:56 Attribute Type(hex)=04 Len(hex)=06 Value (hex)=0a%aba0
10:59:56 Attribute Type(hex)=3d Len(hex)=06 Value (hex)=0000000f
10:59:56 Attribute Type(hex)=05 Len(hex)=06 Value (hex)=000000D
10:59:56 Attribute Type(hex)=20 Len(hex)=0c Value (hex)=Pavan_Sica
10:59:56 Attribute Type(hex)=1f Len(hex)=13 Value (ASCII)=00-10-44-33-00-02
10:59:56

Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:
Debug:

9
9
9
9
9
9
9
9
9

10:59:56
10:59:57
10:59:57
10:59:57
10:59:57
10:59:57
10:59:57
10:59:57
10:59:57

Dec
Dec
Dec
Dec
Dec
Dec
Dec
Dec
Dec

9 10:59:56 AAA Queue Display Start...Total Entries: 1

Search for dot1x session returned by RADIUS in AAA queue.. found entry.
RADIUS message received from server of len 39.
Tracing the received Radius packet..
Radius Header (hex): Code=02 Identifier=09 Length=0027
Authenticator (hex):da222c4bee99aa71e4991208a72fcff2
Attribute Type(hex)=40 Len(hex)=06 Value (hex)=0000000d
Attribute Type(hex)=41 Len(hex)=06 Value (hex)=00000006
Attribute Type(hex)=51 Len(hex)=07 Value (hex)=U:100

Debug: Dec 9 10:59:57 RADIUS Timer cancelled for client 0.
Debug: Dec 9 10:59:57 RADIUS server ACCEPTed request
Debug: Dec 9 10:59:57 Search for dot1x session returned by RADIUS in AAA queue.. found entry.
Debug: Dec 9 10:59:57 AAA-DOT1X (MACAUTH): Authentication successful for port 1/2/4
session [104433,ffc0002]. RADIUS 0/9
Debug: Dec

9 10:59:57 AAA send response to dot1x port 67 sessId [104433,ffc0002]

Debug: Dec
Debug: Dec

9 10:59:57 One entry in the dot1x list.
9 10:59:57 Delete a dot1x session: portid=1/2/4, sessionid=[104433,ffc0002], Entries left=0.

Debug: Dec

9 10:59:57 Closing RADIUS UDP port

Debug: Dec 9 10:59:57 RADIUS: radius_authenticate_stop for client Idx 0. Actv Clients left 0
Debug: Dec 9 10:59:57 Reseting RADIUS Client structure
Debug: Dec 9 10:59:57 [T:1020671] [VLAN] [MGMT-POR] :
802.1X: vlan_name (String): 100 is now converted to vlan id (Decimal): 100

296

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mecid

debug mecid
Displays debugging information for ME-CID Manager.

Syntax
debug mecid [ all | cascade-port | error | event | flow | fsm | mecid | rx | show | tx ]
no debug mecid [ all | cascade-port | error | event | flow | fsm | mecid | rx | show | tx ]

Parameters
all
Generates all debugging information related to ME-CID.
cascade-port
Enables debugging for a specific cascade port.
error
Displays ME-CID errors.
event
Displays ME-CID events.
flow
Displays ME-CID control flow.
fsm
Displays ME-CID FSM events.
mecid
Enables debugging for a specific ME-CID manager.
rx
Displays the ME-CID packets received from a Port Extender (PE).
show
Displays debugging information enabled for ME-CID.
tx
Displays the ME-CID packets sent to a Port Extender (PE).

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

297

debug mecid

Examples
device# debug mecid all
9:9:28 - MECID_FSM: mecid 16360, FSM: DELETE_AW - > delete
9:9:28 - MECID_RX: Received E-Channel Register Response from
waiting for response : 24
9:9:28 - MECID_RX: Received E-Channel Register Response from
waiting for response : 23
9:9:28 - MECID_RX: Received E-Channel Register Response from
waiting for response : 22
9:9:28 - MECID_FSM: mecid 16346, FSM: DELETE_AW - > delete
9:9:28 - MECID_RX: Received E-Channel Register Response from
waiting for response : 21
9:9:28 - MECID_FSM: mecid 16358, FSM: DELETE_AW - > delete
9:9:28 - MECID_FSM: mecid 16360, FSM: DELETE_AW - > delete
9:9:27 - MECID_RX: Received E-Channel Register Response from
waiting for response : 0
9:9:28 - MECID_TX: PE 18 tx timer scheduled
stack: 1044264c 10a48824 10cf1120 10a48d60 10cf3f20 10cf4434
11f2b490
Tx Count: 1
Sending port array TLV to unit 18 (MsgId: 436)
ECID: 16360, Number of Ports: 1
1. Port: e18/1/3, Action: DELETE
.
.
.
(output truncated)

298

PE 18 for ECID: 16360(Msg Id: 436), ECIDs
PE 18 for ECID: 16331(Msg Id: 437), ECIDs
PE 18 for ECID: 16324(Msg Id: 438), ECIDs
PE 18 for ECID: 16346(Msg Id: 439), ECIDs

PE 18 for ECID: 16347(Msg Id: 435), ECIDs
10d000fc 10a48ca0 10b94550 11ee536c

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mld-snoop add-del-oif all

debug mld-snoop add-del-oif all
Displays information about the addition or deletion of all the OIFs that are Multicast Listener Discovery (MLD) snoopingenabled.

Syntax
debug mld-snoop add-del-oif all
no debug mld-snoop add-del-oif all

Modes
Privileged EXEC mode

Examples
device# debug mld-snoop add-del-oif all
mldsnoop add-del-oif all enabled
device# Del e1/1/23 from (0x0 0x230005) vlan 130
Del e1/1/23 from (0x0 0x230004) vlan 130
Del e1/1/23 from (0x0 0x230003) vlan 130
Del e1/1/23 from (0x0 0x230002) vlan 130
Del e1/1/23 from (0x0 0x230001) vlan 130
Add e1/1/23 to (0x0 0x230001) vlan 130
Add e1/1/23 to (0x0 0x230002) vlan 130
Add e1/1/23 to (0x0 0x230003) vlan 130
Add e1/1/23 to (0x0 0x230004) vlan 130
Add e1/1/23 to (0x0 0x230005) vlan 130

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

299

debug mld-snoop clear

debug mld-snoop clear
Clears all the MLD snooping debug settings.

Syntax
debug mld-snoop clear
no debug mld-snoop clear

Modes
Privileged EXEC mode

Examples
device# debug mld-snoop clear

300

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mld-snoop error

debug mld-snoop error
Displays the MLD snooping multicast error messages.

Syntax
debug mld-snoop error
no debug mld-snoop error

Modes
Privileged EXEC mode

Examples
device# debug mld-snoop error
monitor mldsnoop error
device# MLD: Error : Ignoring MLD version 2 Report
pkt S=fe80::1, on VL130 (phy e1/1/2), mld_size=28
MLD: Error : Ignoring MLD version 2 Report pkt due
S=fe80::1, on VL130 (phy e1/1/2), mld_size=28
MLD: Error : Ignoring MLD version 2 Report pkt due
S=fe80::1, on VL130 (phy e1/1/2), mld_size=28
MLD: Error : Ignoring MLD version 2 Report pkt due
S=fe80::1, on VL130 (phy e1/1/2), mld_size=28
MLD: Error : Ignoring MLD version 2 Report pkt due
S=fe80::1, on VL130 (phy e1/1/2), mld_size=28
MLD: Error : Ignoring MLD version 2 Report pkt due
S=fe80::1, on VL130 (phy e1/1/2), mld_size=28

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

pkt due to version mismatch ,
to version mismatch , pkt
to version mismatch , pkt
to version mismatch , pkt
to version mismatch , pkt
to version mismatch , pkt

301

debug mld-snoop group

debug mld-snoop group
Displays the MLD snooping multicast group information.

Syntax
debug mld-snoop groupgroup_address
no debug mld-snoop groupgroup_address

Parameters
group_address
Specifies the address of the MLD snoop multicast group.

Modes
Privileged EXEC mode

Examples
device# debug mld-snoop group 2001:DB8::23:1
source fe80::1
phy-port eth 1/1/23
vlan 130
MLD send Query(t=130) V1, s=fe80::224:38ff:fe76:4bc0
mld=24B, pkt=86B
MLD: rcvd Leave(ty=132) g=2001:DB8::23:1 resp=0, pkt
e1/1/23), mld_size=24
MLD: rcvd Leave(ty=132) g=2001:DB8::23:2 resp=0, pkt
e1/1/23), mld_size=24
MLD: rcvd Leave(ty=132) g=2001:DB8::23:3 resp=0, pkt
e1/1/23), mld_size=24
MLD: rcvd Leave(ty=132) g=2001:DB8::23:4 resp=0, pkt
e1/1/23), mld_size=24
MLD: rcvd Leave(ty=132) g=2001:DB8::23:5 resp=0, pkt
e1/1/23), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:2 resp=0,
e1/1/23), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:3 resp=0,
e1/1/23), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:4 resp=0,
e1/1/23), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:5 resp=0,
e1/1/23), mld_size=24
MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:5 resp=0,
e1/1/23), mld_size=2

302

:: to VL130(all) rsp=10000
S=fe80::1, on VL130 (phy
S=fe80::1, on VL130 (phy
S=fe80::1, on VL130 (phy
S=fe80::1, on VL130 (phy
S=fe80::1, on VL130 (phy
pkt S=fe80::1, on VL130 (phy
pkt S=fe80::1, on VL130 (phy
pkt S=fe80::1, on VL130 (phy
pkt S=fe80::1, on VL130 (phy
pkt S=fe80::1, on VL130 (phy

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip ssh

debug ip ssh
activates the SSH debugging.

Syntax
debug ip ssh
no debug ip ssh

Modes
Privileged EXEC mode

Examples
device# debug ip ssh
SSH: debugging is on
Brocade(config)#SSH: Incoming connection request received
SSH: ssh_get_free_session_id: ssh.client[0].in_use is 0
SSH: Client session (0) established
SSH: Outgoing connection is ready
ShtcpConnectionStatus[0]: connection established
SSH:ShtcpSend[0]: eSendComplete: the string length [24] !
ShtcpSendStatus[0]: eSendComplete
SSH: Outgoing connection is ready
SSH: Data is ready to receive
ShtcpReceiveStatus[0]: the string length [47]
SSH:ShtcpSend[0]: eSendComplete: the string length [216] !
ShtcpSendStatus[0]: eSendComplete
SSH: Outgoing connection is ready
SSH: Data is ready to receive
ShtcpReceiveStatus[0]: the string length [464]

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

303

debug ip sync

debug ip sync
Displays debugging information about IP synchronization and faults in synchronization.

Syntax
debug ip sync
no debug ip sync

Modes
Privileged EXEC mode

Examples
device# debug ip sync
Brocade(config-vif-11)# ND6 add sync: sent ip:2001:DB8::10 mac:none state:INCOMP
port:ve 12 vlan:12 isR:0 to all other units
ND6 add sync: sent ip:2001:DB8::10 mac:0000.0062.9f2d state:REACH port:e 3/3/1
vlan:12 isR:0 to all other units
ND6 add sync: sent ip:2001:DB8::10 mac:0000.0062.9f2d state:STALE port:e 3/3/1
vlan:12 isR:0 to all other units

304

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip tcp

debug ip tcp
Display debugging information about the Transmission Control Protocol (TCP) transactions.

Syntax
debug ip tcp
no debug ip tcp

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

305

debug ip tcp

Examples
device# debug ip tcp 2001:DB8::192:111:101:25
TCP: ipv6 address 2001:DB8::192:111:101:25 debugging is on
Debug: Feb 11 10:46:57 TCP: sent packet (len=41) 2001:DB8::192:111:101:111:8197 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:18c2,seqn:11211247,ackn:835929143
Debug: Feb 11 10:46:57 TCP: sent packet (len=41) 2001:DB8::192:111:101:111:8197 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:1,hlen:5,chksum:14ac,seqn:11211268,ackn:835929143
Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8197
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:3bfa,seqn:835929143,ackn:11211268
Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8197
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:3bf9,seqn:835929143,ackn:11211290
Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8197
packet:
syn:0,ack:1,rst:0,fin:1,hlen:5,chksum:3bce,seqn:835929143,ackn:11211290
Debug: Feb 11 10:46:57 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8197 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:1bce,seqn:11211290,ackn:835929144
Debug: Feb 11 10:47:05 TCP: sent packet (len=24) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet: syn:1,ack:0,rst:0,fin:0,hlen:6,chksum:26f,seqn:4002716695,ackn:0
Debug: Feb 11 10:47:05 TCP: rcvd packet (len=24) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:1,ack:1,rst:0,fin:0,hlen:6,chksum:17a4,seqn:2607451983,ackn:4002716696
Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:ef48,seqn:4002716696,ackn:2607451984
Debug: Feb 11 10:47:05 TCP: sent packet (len=75) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:17de,seqn:4002716696,ackn:2607451984
Debug: Feb 11 10:47:05 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2f49,seqn:2607451984,ackn:4002716751
Debug: Feb 11 10:47:05 TCP: rcvd packet (len=57) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:fc84,seqn:2607451984,ackn:4002716751
Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:ef11,seqn:4002716751,ackn:2607452021
Debug: Feb 11 10:47:05 TCP: rcvd packet (len=39) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2af6,seqn:2607452021,ackn:4002716751
Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:ef11,seqn:4002716751,ackn:2607452040
Debug: Feb 11 10:47:05 TCP: sent packet (len=39) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eabe,seqn:4002716751,ackn:2607452040
Debug: Feb 11 10:47:05 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2f11,seqn:2607452040,ackn:4002716770

306

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip tcp

Debug: Feb 11 10:47:05 TCP: rcvd packet (len=108) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:aa71,seqn:2607452040,ackn:4002716770
Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eec6,seqn:4002716770,ackn:2607452128
Debug: Feb 11 10:47:05 TCP: rcvd packet (len=39) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2a8b,seqn:2607452128,ackn:4002716770
Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eec6,seqn:4002716770,ackn:2607452147
Debug: Feb 11 10:47:05 TCP: rcvd packet (len=108) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:80c6,seqn:2607452147,ackn:4002716770
Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eec6,seqn:4002716770,ackn:2607452235
Debug: Feb 11 10:47:06 TCP: rcvd packet (len=108) 2001:DB8::192:111:101:25:179 ->
2001:DB8::192:111:101:111:8178
packet:
syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:cd4a,seqn:2607452235,ackn:4002716770
Debug: Feb 11 10:47:06 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:17

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

307

debug ip tcp driver

debug ip tcp driver
Activates the TCP driver events debugging.

Syntax
debug ip tcp driver
no debug ip tcp driver

Modes
Privileged EXEC mode

Examples
device# debug ip tcp driver
TCP: driver debugging is on

308

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip tcp memory

debug ip tcp memory
Activates the TCP memory debugging.

Syntax
debug ip tcp memory
no debug ip tcp memory

Modes
Privileged EXEC mode

Examples
device# debug ip tcp memory
TCP: memory debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

309

debug ip tcp packet

debug ip tcp packet
Activates the TCP packets debugging.

Syntax
debug ip tcp packet
no debug ip tcp packet

Modes
Privileged EXEC mode

Examples
device# debug ip tcp packet
TCP: packet debugging is on

310

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip tcp sack

debug ip tcp sack
Activates the TCP Selective Acknowledgment (SACK) debugging.

Syntax
debug ip tcp sack
no debug ip tcp sack

Modes
Privileged EXEC mode

Examples
device# debug ip tcp sack
TCP: sack debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

311

debug ip tcp transactions

debug ip tcp transactions
Activates the TCP transactions debugging.

Syntax
debug ip tcp transactions
no debug ip tcp transactions

Modes
Privileged EXEC mode

Examples
device# debug ip tcp transactions
TCP: transactions debugging is on
TCP: transactions debugging is on
Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179: state change ESTABLISHED -> FIN-WAIT-1
Debug: Feb 11 10:47:39 TCP: sending FIN to 2001:DB8::192:111:101:25 port 179
Debug: Feb 11 10:47:39 TCP: FIN to 2001:DB8::192:111:101:111 port 8178 acked
Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179: state change FIN-WAIT-1 -> FIN-WAIT-2
Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179: state change FIN-WAIT-2 -> TIME-WAIT
Debug: Feb 11 10:47:39 TCP: FIN processed
Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 ->
2001:DB8::192:111:101:25:179: state change TIME-WAIT -> CLOSED
Debug: Feb 11 10:47:39 TCP: TCB 14440934 destroyed
Debug: Feb 11 10:47:58 TCP: 2001:DB8::192:111:101:111:8064 ->
2001:DB8::192:111:101:25:179: state change CLOSED -> SYN-SENT
Debug: Feb 11 10:47:58 TCP: connected to 2001:DB8::192:111:101:111 port 8064
advertising MSS 1436
Debug: Feb 11 10:47:58 TCP: connection to 10.146.1.17 port 179 received MSS 1436
MSS is 1436
Debug: Feb 11 10:47:58 TCP: 2001:DB8::192:111:101:111:8064 ->
2001:DB8::192:111:101:25:179: state change SYN-SENT -> ESTABLISHED

312

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip udp

debug ip udp
Activates the UDP debugging.

Syntax
debug ip udp
no debug ip udp

Modes
Privileged EXEC mode

Examples
device# debug ip udp
UDP: debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

313

debug ip vrrp events

debug ip vrrp events
Displays debugging information of VRRP events only within the device.

Syntax
debug ip vrrp events
no debug ip vrrp events

Modes
Privileged EXEC mode

Examples
device# debug ip vrrp events
VRRP: events debugging is on
[44fd]VRRP (IPv4): 10.10.10.1 transit to master! IP addr 10.10.10.2 vrid 10, pri
100
[44fd]VRRP (IPv6): fe80::7:1 transit to master! IP addr fe80::7:1 vrid 10, pri 100
[4511]VRRP (IPv6): fe80::8:1 transit to master! IP addr fe80::8:1 vrid 11, pri 255

314

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug ip vrrp packet

debug ip vrrp packet
displays debugging information of any VRRP or VRRP-E packets within the device.

Syntax
debug ip vrrp packet
no debug ip vrrp packet

Modes
Privileged EXEC mode

Examples
device# debug ip vrrp packet
VRRP: packet debugging is on
VRRP (IPv6): send advertise! ver:3 type:1 vrid:100 pri:255 num of ip:1 adv:100
chk:44853
Num of ip addr 1
2000::7:1
VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1
chk:52198
Num of ip addr 1 10.10.10.2 from sender 10.10.10.2
VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:100
chk:53518
Num of ip addr 1
fe80::7:2 from sender 2000::7:2
VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:11 pri:255 #ip:1 aut:0 adv:200
chk:53417
Num of ip addr 1
fe80::8:2 from sender ::

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

315

debug ip vrrp packet v4

debug ip vrrp packet v4
displays debugging information of VRRP or VRRP-E packets specific to IPv4 within the device.

Syntax
debug ip vrrp packet v4
no debug ip vrrp packet v4

Modes
Privileged EXEC mode

Examples
device# debug ip vrrp packet v4
VRRP (IPv4): packet debugging is on
VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1 chk:52198
Num of ip addr 1
10.10.10.2 from sender 10.10.10.2
VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1 chk:52198
Num of ip addr 1
10.10.10.2 from sender 10.10.10.2
VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1 chk:52198
Num of ip addr 1
10.10.10.2 from sender 10.10.10.2

316

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mld-snoop mcache-group

debug mld-snoop mcache-group
Displays MLD snoop debugging information related to mcache activity for the specified group address.

Syntax
debug mld-snoop mcache-groupgroup_address
no debug mld-snoop mcache-group group_address

Parameters
group_address
Specifies the 32-bit address of the MLD snoop multicast group.

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug mld-snoop mcache-group 230001
device(config)# Del e1/1/23 from (0x0 0x230001) vlan 130
device(config)# Add e1/1/23 to (0x0 0x230001) vlan 130

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

317

debug mld-snoop packet

debug mld-snoop packet
Displays debugging information related to the MLD snoop packets.

Syntax
debug mld-snoop packetsource_address group_address
no debug mld-snoop packet source_address group_address

Parameters
source_address
Specifies the 32-bit source address of the MLD snoop packet.
group_address
Specifies the address of the MLD snoop multicast group.

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug mld-snoop packet 3 230001
debug mldsnoop packet (0x3 0x230001)
// dm raw: RX [a0a]2322::3 ->ff1e::23:1
port: 1/1/1
rtr_l2mcast_fwd_data (pkts:2), (0x3 0x230001), from e1/1/1 vlan 130, has fwd_entry
rtr_l2mcast_fwd_data (pkts:1), (0x3 0x230001), from e1/1/1 vlan 130, clear
hw_aging flag

318

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mld-snoop show

debug mld-snoop show
Displays all the MLD snooping debug settings.

Syntax
debug mld-snoop show
no debug mld-snoop show

Modes
Privileged EXEC mode

Examples
device# debug mld-snoop show
debug mldsnoop vlan 100 is enabled

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

319

debug mld-snoop timer

debug mld-snoop timer
Displays the MLD snooping related timer events.

Syntax
debug mld-snoop timer
no debug mld-snoop timer

Modes
Privileged EXEC mode

Examples
device# debug mld-snoop timer
device# mld timer, VL130(e1/1/2) change V3 client age out

320

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mstp bpdu

debug mstp bpdu
Monitors Multiple Spanning Tree Protocol (MSTP) Bridge Packet Data Units (BPDUs).

Syntax
debug mstp bpdu
no debug mstp bpdu

Modes
Privileged EXEC mode

Usage Guidelines
Use this command to record and display information in conjunction with the debug mstp enable and debug mstp events
commands.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

321

debug mstp bpdu

Examples
If this command is enabled, output similar to the following is displayed.
device# debug mstp bpdu
MSTP Bpdu debugging ON
device# debug mstp enable
device# MSTP[0xeb217]: PRX RECEIVE->RECEIVE - Port 1/1/1
MST 0, Port 1/1/1 - received BPDU
(802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000
80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14
{0xac36177f50283cd4b83821d8ab26de62}
MSTP[0xeb217]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0xeb217]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7
MSTP[0xeb217]: PRX RECEIVE->RECEIVE - Port 1/1/2
MST 0, Port 1/1/2 - received BPDU
[0xeb217] (802.1s) 0000 03 02 3c 80000012f2dbfd80 00000000
80000012f2dbfd80 00000000 8002 0000 0014 0002 000f 80000012f2dbfd80 14
{0xac36177f50283cd4b83821d8ab26de62}
MSTP[0xeb217]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2
MSTP[0xeb217]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7
MSTP[0xeb21b]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0xeb21b]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
MSTP[0xeb22b]: PRX RECEIVE->RECEIVE - Port 1/1/1
MST 0, Port 1/1/1 - received BPDU
[0xeb22b] (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000
80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14
{0xac36177f50283cd4b83821d8ab26de62}
MSTP[0xeb22b]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0xeb22b]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7
MSTP[0xeb22b]: PRX RECEIVE->RECEIVE - Port 1/1/2
MST 0, Port 1/1/2 - received BPDU
[0xeb22b] (802.1s) 0000 03 02 3c 80000012f2dbfd80 00000000
80000012f2dbfd80 00000000 8002 0000 0014 0002 000f 80000012f2dbfd80 14
{0xac36177f50283cd4b83821d8ab26de62}
MSTP[0xeb22b]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2
MSTP[0xeb22b]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7
MSTP[0xeb22f]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0xeb22f]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
MSTP[0xeb23f]: PRX RECEIVE->RECEIVE - Port 1/1/1
MST 0, Port 1/1/1 - received BPDU
[0xeb23f] (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000
80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14
{0xac36177f50283cd4b83821d8ab26de62}
MSTP[0xeb23f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0xeb23f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7
MSTP[0xeb23f]: PRX RECEIVE->RECEIVE - Port 1/1/2
MST 0, Port 1/1/2 - received BPDU
[0xeb23f] (802.1s) 0000 03 02 3c 80000012f2dbfd80 00000000
80000012f2dbfd80 00000000 8002 0000 0014 0002 000f 80000012f2dbfd80 14
{0xac36177f50283cd4b83821d8ab26de62}
MSTP[0xeb23f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2
MSTP[0xeb23f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7
MSTP[0xeb243]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0xeb243]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
MSTP[0xeb253]: PRX RECEIVE->RECEIVE - Port 1/1/1
MST 0, Port 1/1/1 - received BPDU
[0xeb253] (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000
80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14
{0xac36177f50283cd4b83821d8ab26de62}

322

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mstp events

debug mstp events
Displays MSTP state machine events.

Syntax
debug mstp events
no debug mstp events

Modes
Privileged EXEC mode

Usage Guidelines
Use this command to monitor any MSTP event that takes place.

Examples
If MSTP events are enabled, output similar to the following is displayed.
device# debug mstp events
MSTP Event debugging ON
device# debug mstp enable
device# MSTP[0xeda7f]: PRX RECEIVE->RECEIVE - Port 1/1/1
MSTP[0xeda7f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0xeda7f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7
MSTP[0xeda7f]: PRX RECEIVE->RECEIVE - Port 1/1/2
MSTP[0xeda7f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2
MSTP[0xeda7f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7
MSTP[0xeda89]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0xeda89]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
MSTP[0xeda93]: PRX RECEIVE->RECEIVE - Port 1/1/1
MSTP[0xeda93]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0xeda93]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1

If MSTP events are disabled, output similar to the following is displayed.
device# no debug mstp events
MSTP Event debugging OFF

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

323

debug mstp level

debug mstp level
Monitors MSTP level.

Syntax
debug mstp level decimal
no debug mstp level decimal

Parameters
decimal
Specifies the level of MSTP.

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug mstp level 2
Configuration :
device# [ebd95] MSTP_RX[pid=#0] ***
[ebd95] MSTP_RX[pid=#0] done (region)
[ebd95] MSTP_RX[pid=#1] ***
[ebd95] MSTP_RX[pid=#1] done (region)
[ebda9] MSTP_RX[pid=#0] ***
[ebda9] MSTP_RX[pid=#0] done (region)
[ebda9] MSTP_RX[pid=#1] ***
[ebda9] MSTP_RX[pid=#1] done (region)
[ebdbd] MSTP_RX[pid=#0] ***
[ebdbd] MSTP_RX[pid=#0] done (region)
[ebdbd] MSTP_RX[pid=#1] ***
[ebdbd] MSTP_RX[pid=#1] done (region)
[ebdd1] MSTP_RX[pid=#0] ***
[ebdd1] MSTP_RX[pid=#0] done (region)
[ebdd1] MSTP_RX[pid=#1] ***
[ebdd1] MSTP_RX[pid=#1] done (region)
[ebde5] MSTP_RX[pid=#0] ***
[ebde5] MSTP_RX[pid=#0] done (region)
[ebde5] MSTP_RX[pid=#1] ***

324

***
***
***
***
***
***
***
***
***

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mstp level

If the MSTP level 3 is enabled, output similar to the following is displayed.
device# debug mstp level 3
device# [ebf4d] MSTP_RX[pid=#0] ***
cist_Rx[ebf4d] CIST, Port(#0)
[ebf4d] MSTP_RX[pid=#0] done (region)
[ebf4d] MSTP_RX[pid=#1] ***
cist_Rx[ebf4d] CIST, Port(#1)
[ebf4d] MSTP_RX[pid=#1] done (region)
[ebf61] MSTP_RX[pid=#0] ***
cist_Rx[ebf61] CIST, Port(#0)
[ebf61] MSTP_RX[pid=#0] done (region)
[ebf61] MSTP_RX[pid=#1] ***
cist_Rx[ebf61] CIST, Port(#1)
[ebf61] MSTP_RX[pid=#1] done (region)
n[ebf75] MSTP_RX[pid=#0] ***
cist_Rx[ebf75] CIST, Port(#0)
[ebf75] MSTP_RX[pid=#0] done (region)
[ebf75] MSTP_RX[pid=#1] ***
cist_Rx[ebf75] CIST, Port(#1)
[ebf75] MSTP_RX[pid=#1] done (region)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

***
***
***
***
***
***

325

debug mstp msti

debug mstp msti
Displays information for a specific MSTP instance.

Syntax
debug mstp msti decimal
no debug mstp msti decimal

Parameters
decimal
Specifies the following values:
Value 0 for the Common and Internal Spanning Tree (CIST)
Value from 1 through 4094 for the Multiple Spanning Tree Instance (MSTI).

Modes
Privileged EXEC mode

Examples
device#debug mstp msti 0
MSTP debugging turned on for instances 0

326

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mstp msti

If this command is enabled, output similar to the following is displayed.
device#debug mstp msti 2
MSTP debugging turned on for instances 2 ,0
device# debug mstp enable
device# debug mstp events
MSTP Event debugging ON
Brocade# MSTP[0x175f15]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0x175f15]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
MSTP[0x175f21]: PRX RECEIVE->RECEIVE - Port 1/1/1
MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7
MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/1
MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/1, rcvdInfoWhile 4->7
MSTP[0x175f21]: PRX RECEIVE->RECEIVE - Port 1/1/2
MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2
MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7
MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/2
MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/2, rcvdInfoWhile 4->7
MSTP[0x175f29]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0x175f29]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
noMSTP[0x175f35]: PRX RECEIVE->RECEIVE - Port 1/1/1
MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7
MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/1
MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/1, rcvdInfoWhile 4->7
MSTP[0x175f35]: PRX RECEIVE->RECEIVE - Port 1/1/2
MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2
MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7
MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/2
MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/2, rcvdInfoWhile 4->7
deMSTP[0x175f3d]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0x175f3d]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
bug msMSTP[0x175f49]: PRX RECEIVE->RECEIVE - Port 1/1/1
MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1
MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7
MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/1
MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/1
MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/1, rcvdInfoWhile 4->7
MSTP[0x175f49]: PRX RECEIVE->RECEIVE - Port 1/1/2
MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2
MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7
MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/2
MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/2
MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/2, rcvdInfoWhile 4->7
tpMSTP[0x175f51]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1
MSTP[0x175f51]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2
eventMSTP[0x175f5d]: PRX RECEIVE->RECEIVE - Port 1/1/1

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

327

debug mstp port-level

debug mstp port-level
Displays the hardware level of the port on which the MSTP is running.

Syntax
debug mstp port-level decimal
no debug mstp port-level decimal

Parameters
decimal
Specifies the following values:
Value 0 for the Common and Internal Spanning Tree (CIST)
Value from 1 through 4094 for the Multiple Spanning Tree Instance (MSTI).

Modes
Privileged EXEC mode

Usage Guidelines
Use this command to determine the port-level information.

Examples
device# debug mstp port-level 1
Configuration for port-level 1 :
Brocade# debug mstp port-level
DECIMAL 0 -- print nothing
Brocade# debug mstp port-level 1
Brocade# configure terminal
Brocade(config)# interface ethernet 1/1/1
Brocade(config-if-e1000-1/1/1)# disable
Brocade(config-if-e1000-1/1/1)# enable
Brocade(config-if-e1000-1/1/1)# ^Z

328

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mstp show

debug mstp show
Displays the currently enabled MSTP debug parameters.

Syntax
debug mstp show
no debug mstp show

Modes
Privileged EXEC mode

Examples
device#debug mstp show
mstp debug is on because of enabled, level or port-level level 4
parameters: Brief, StateMachineEvents BpduEvents are being tracked
Ports: All
MSTP instances: 0

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

329

debug mstp state

debug mstp state
Displays information about the MSTP port state events.

Syntax
debug mstp state
no debug mstp state

Modes
Privileged EXEC mode

Examples
device#debug mstp state
MSTP Port State debugging ON

330

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug mstp verbose

debug mstp verbose
Displays the MSTP debug information in the verbose mode.

Syntax
debug mstp verbose
no debug mstp verbose

Modes
Privileged EXEC mode

Examples
device#debug mstp verbose
MSTP debugging set to VERBOSE mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

331

debug packet-capture

debug packet-capture
Displays information about packet-capture activity.

Syntax
debug packet-capture [ all | count-reset | count-show | exclude-mgmt-port | filter | max | mode | no-limit | no-mgmt-port |
receive | send ]

Parameters
all
Displays the debugging information of the packets transmitted and received.
count-reset
Clears the total packet count of the packets captured.
count-show
Displays the total packet count of the packets captured for debugging.
exclude-mgmt-port
Enables debugging of the packets that are excluded for the management
filter
Enables the raw packet filter for debugging.
max
Displays the maximum number of packets.
mode
Displays the various packet modes.
no-limit
Displays the debugging information of an unlimited number of packets.
no-mgmt-port
Toggles the display of packets from the management port.
receive
Debugs only the packets that are received.
send
Debugs only the packets that are transmitted.

Modes
Privileged EXEC mode

332

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug packet-capture filter

debug packet-capture filter
Enables the filter option for the raw packets.

Syntax
debug packet-capture filter filter_index filter_options

Parameters
filter_index
Specifies the filter number. The decimal value ranges from 1 through 20.
filter_options
Specifies the filter option.

Modes
Privileged EXEC mode

Usage Guidelines
There are 36 filter options that can be configured within a single filter.
•

all—Matches all packets

•

arp—Matches an ARP request or response

•

broadcast-mac—Matches the destination broadcast MAC address (0000.00FF.FFFF)

•

cdp—Matches with the CDP

•

clear—Clears the filter entry

•

clear-counter—Clears the counter

•

cpu-code—Matches the CPU code

•

da—Matches the destination MAC address

•

dhcp—Matches with the DHCP

•

dot1x—Matches the dot1x protocol

•

dpa—Matches the destination IP address

•

dport—Matches the destination protocol port

•

ether-type—Matches the Ethernet type packets

•

fdp—Matches with the FDP

•

in-port—Matches the input port

•

l2-802.1w—Matches the 802.1w BPDU

•

l2-lacp—Matches the LACP PDU

•

l2-mstp—Matches the MSTP BPD

•

l2-stp—Matches the spanning tree BPDU

•

l3-bgp—Matches with the BGP

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

333

debug packet-capture filter

•

l3-ospf—Matches the OSPF protocol

•

l3-vrrp—Matches the VRRP

•

l3-vrrpe—Matches the VRRP-E

•

lldp—Matches the LLDP

•

mrp—Matches the MRP

•

out-port—Matches the output port

•

priority—Matches the priority

•

protocol—Matches the IP

•

pvst—Matches the PVST protocol

•

sa—Matches the source MAC address

•

snmp—Matches the SNMP

•

spa—Matches the source IP address

•

sport—Matches the source protocol port

•

udld—Matches the UDLD protocol

•

vlan-id—Matches the VLAN ID

•

vsrp—Matches the VSRP

Examples
device# debug packet-capture filter 2 protocol

334

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug packet-capture filter none

debug packet-capture filter none
Removes all the filters that are configured.

Syntax
debug packet-capture filter none

Modes
Privileged EXEC mode

Examples
device# debug packet-capture filter none

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

335

debug packet-capture filter show

debug packet-capture filter show
Displays the filter information for the particular filter index..

Syntax
debug packet-capture filter show [ all | decimal ]

Parameters
decimal
Specifies the number of the packet captured for filter.

Modes
Privileged EXEC mode

Examples
Execute the following command to display the complete filter information.
device# debug packet-capture filter show all
Filter 1:
Match STP
Filter 2:
Match 802.1W

Execute the following command to display filter information for a particular filter number.
device# debug packet-capture filter show 2
Filter 2:
Match 802.1W

336

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug packet-capture mode

debug packet-capture mode
Displays the format of the packets to be captured for debugging information.

Syntax
debug packet-capture mode [ brief | no-display | normal | pcap-fmt { default | decimal } ]

Parameters
brief
Specifies the increment counters and displays the packet summary.
no-display
Specifies the increment counters alone.
normal
Specifies the increment counters and displays the packet header and the first 48 raw bytes.
pcap-fmt
Specifies the increment counters and dumps the packet in pcap (packet capture) hexadecimal format.
default
Specifies the normal mode.
decimal
Specifies the first 48 bytes of the packets received.

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

337

debug port hw-state

debug port hw-state
Monitors the hardware status of a port.

Syntax
debug port hw-state
no debug port hw-state

Modes
Privileged EXEC mode

Usage Guidelines
Use this command to enable or disable port debugging in the hardware state.

Examples
device# debug port hw-state
Topology: Port 1/1/31 is connected to port 1/1/32.

If port 1/1/31 is disabled, an output similar to the following is displayed.
device(config)# interface ethernet 1/1/31
device(config-if-e1000-1/1/31)# disable ( when port is disabled)
Change port 1/1/31 hw_state from PORT_READY(7) to DISABLED(0)
stack: 4040 2050A970 2050AA44 2060D498 20608BF8 2060B5A4 20576A90 20576C74
2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8
20047698 2011CF7C 5008
device(config-if-e1000-1/1/31)# change port 1/1/32 hw_state from PORT_READY(7)
to SEEQ_INIT(1)
stack: 4040 2050A970 2050AA44 2060D498 20608E18 20609344 20609AFC 2055FA50
2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524

If port 1/1/31 is enabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/32)# interface ethernet 1/1/31
device(config-if-e1000-1/1/31)# enable
Change port 1/1/31 hw_state from DISABLED(0) to SEEQ_INIT(1)
stack: 4040 2050A970 2050AA44 2060D498 20608A34 2060B598 20576BC4 20576C74
2057707C 202A4F84 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8
20047698 2011CF7C 5008
device(config-if-e1000-1/1/31)# change port 1/1/31 hw_state from SEEQ_INIT(1) to
PORT_READY(7)
stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524
Change port 1/1/32 hw_state from SEEQ_INIT(1) to PORT_READY(7)
stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524

338

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug port port

debug port port
Monitors a specific physical port.

Syntax
debug port port stackid/slot/port

Parameters
stackid/slot/port
Identifies the specific interface (port), by device, slot, and port number in the format shown.

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
debug port up-downdebug port hw-state

Examples
device# debug port port 1/1/2
Topology: Port 1/1/31 is connected to port 1/1/2.

When the debug port hw-state command is enabled after the debug port port command, the output similar to the following
example is displayed.
device# debug port port 1/1/2
monitor port 1/1/2
device# debug port hw-state

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

339

debug port port

If port 1/1/2 is disabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/2)# disable
port_disable_cmd: for port 0x1 1/1/2
U1, hal_pp_link_port_enable(1/1/2, 0), is_stby=0, to_shadow=0, parsed = 3,
stack=1
stack: 0116c83c 000de8f0 00accc3c 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00
012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524
00246f54 0159f920 017713c4
pp_link_port_en_dis(port=1/1/2, 0), return 0
stack: 0116ca20 000de8f0 00accc3c 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00
012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524
00246f54 0159f920 017713c4
Change 1/1/2 state from Forward to Disable
stack: 00acb98c 00ad1e14 00aebd74 0071dddc 0071ebbc 00af0e8c 00af18e8 00ad0e20
00acccf4 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0
00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4
Change port 1/1/2 hw_state from PORT_READY(7) to DISABLED(0)
stack: 00ad5d4c 00accd2c 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c
0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54
0159f920 017713c4
Change 1/1/2 state from Disable to Blocked
stack: 00acb98c 00acba3c 00acbce4 00accd38 00acd6ac 00ad21f4 0136c614 0136c850
0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98
000f0524 00246f54 0159f920 017713c4
Change 1/1/2 state from Blocked to Disable
stack: 00acb98c 00acba3c 00accd48 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00
012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524
00246f54 0159f920 017713c4

If port 1/1/2 is enabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/2)# enable
device(config-if-e1000-1/1/2)# change port 1/1/2 hw_state from SEEQ_INIT(1) to
PORT_READY(7)
stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524
Change 1/1/2 state from Disable to Blocked
stack: 4040 2050A970 2050AA44 206082E0 2060B354 206215F8 203F9F10 203FB4D8
203FA2B4 2062268C 20623404 2060A624 20609520 20609AFC 2055FA50 2050A214 200478DC
2011BBCC 20047698 2011CF7C
Change 1/1/2 state from Blocked to Listen
stack: 4040 2050A970 2050AA44 206082E0 2060B354 20621734 203F9F10 203FD490
203FD1C4 203FA2BC 2062268C 20623404 2060A624 20609520 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698
Change 1/1/2 state from Listen to Learn
stack: 4040 2050A970 2050AA44 206082E0 2060B354 2062178C 203F9F10 20400F38
20400C84 20400A1C 203F9980 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8
18524
Change 1/1/2 state from Learn to Blocked
stack: 4040 2050A970 2050AA44 206082E0 2060B354 206215F8 203F9F10 203FD70C
203FD248 203FDFD8 204F3C8C 20616AB8 20612D30 200DC33C 200DC600 200DC6C0 200DC780
200444C4 2011BC28 20047698

The debug port up-down command disables or enables a port to get output information of the specified port. When the debug
port up-down command is enabled after the debug port port command, output similar to the following example is displayed.
device# debug port port 1/1/32
monitor port 1/1/32
device# debug port up-down

340

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug port port

If port 1/1/32 is disabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/32)# disable
port_down_indication. port=1/1/32, UNTAG, vlan-idx=1
stack: 4040 2050A970 2050AA44 2060A8FC 20608BEC 2060B5A4 20576A90 20576C74
2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8
20047698 2011CF7C 5008
Change 1/1/32 state from Blocked to Disable
stack: 4040 2050A970 2050AA44 206082E0 2060B354 206214F0 203F9F10 203FA3A0
20622F60 20623404 2060AA38 20608BEC 2060B5A4 20576A90 20576C74 2057707C 202A50A8
20491E9C 20492DC0 204906D8
Change 1/1/32 state from Disable to Blocked
stack: 4040 2050A970 2050AA44 206082E0 20608330 206084C4 20608C00 2060B5A4
20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8
204A0418 2011BBC8 20047698
Change 1/1/32 state from Blocked to Disable
stack: 4040 2050A970 2050AA44 206082E0 20608330 20608C0C 2060B5A4 20576A90
20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418
2011BBC8 20047698 2011CF7C

If port 1/1/32 is enabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/32)# enable
Change 1/1/32 state from Disable to Blocked
stack: 4040 2050A970 2050AA44 206082E0 206089A0 2060B598 20576BC4 20576C74
2057707C 202A4F84 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8
20047698 2011CF7C 5008
device(config-if-e1000-1/1/32)# pp_link_change_final. port=1/1/32, up=1
port_up_indication. port=1/1/32, UNTAG, vlan-idx=1
stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524
Change 1/1/32 state from Blocked to Listen
stack: 4040 2050A970 2050AA44 206082E0 2060B354 20621734 203F9F10 203FD490
203FD1C4 203FA2BC 2062268C 20623404 2060A624 20609520 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698
Change 1/1/32 state from Listen to Blocked
stack: 4040 2050A970 2050AA44 206082E0 2060B354 206215F8 203F9F10 203FD70C
203FD248 203FDFD8 204F3C8C 20616AB8 20612D30 200DC33C 200DC600 200DC6C0 200DC780
200444C4 2011BC28 20047698

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

341

debug port ten-gig

debug port ten-gig
Monitors all 10 Gigabit ports in the Brocade FastIron devices.

Syntax
debug port ten-gig

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
Use this command in conjunction with the debug port hw-state command.

Examples
device# debug port ten-gig
Topology: Port 2/3/1 is the 10 gig port which is Up and forwarding on stack.
device# debug port ten-gig
device# debug port hw-state
hw-state monitor hw_state change
device# debug port hw-state

If port 2/3/1 is disabled, an output similar to the following is displayed.
device(config-if-e10000-2/3/1)# disable
Change port 2/3/1 hw_state from PORT_READY(7) to DISABLED(0)
stack: 4040 2050A970 2050AA44 2060D498 20608BF8 2060B5A4 20576A90 20576C74
2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 2027FD8C 20280888 202809F0
2015FCDC 2015FF44 20160B80

If port 2/3/1 is enabled, an output similar to the following is displayed.
device(config-if-e10000-2/3/1)# enable
Change port 2/3/1 hw_state from DISABLED(0) to SEEQ_INIT(1)
stack: 4040 2050A970 2050AA44 2060D498 20608A34 2060B598 20576BC4 20576C74
2057707C 202A4F84 20491E9C 20492DC0 204906D8 2050BF48 2027FD8C 20280888 202809F0
2015FCDC 2015FF44 20160B80
device(config-if-e10000-2/3/1)# change port 2/3/1 hw_state from SEEQ_INIT(1) to
PORT_READY(7)
stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524

342

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug port up-down

debug port up-down
Monitors the status of the ports.

Syntax
debug port up-down decimal
no debug port up-down decimal

Parameters
decimal
Specifies the status of the port.

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
This command disables or enables a port to get output information of the specified port. The port status up, down, and up/
down are indicated by 1, 2, and 3 respectively.

Examples
device# debug port up-down 1
Monitor port up
Topology: Port 1/1/31 is connected to port 1/1/32.

If port 1/1/31 is disabled, an output similar to the following is displayed.
device(config)# interface ethernet 1/1/31
device(config-if-e1000-1/1/31)# disable
port_down_indication. port=1/1/31, UNTAG, vlan-idx=1
stack: 4040 2050A970 2050AA44 2060A8FC 20608BEC 2060B5A4 20576A90 20576C74
2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8
20047698 2011CF7C 5008
device(config-if-e1000-1/1/31)# port_down_indication. port=1/1/32, UNTAG,
vlan-idx=3
stack: 4040 2050A970 2050AA44 2060A8FC 20608DA0 20609344 20609AFC 2055FA50
2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524
pp_link_change_final. port=1/1/32, up=0

If port 1/1/31 is enabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/31)# enable
device(config-if-e1000-1/1/31)# pp_link_change_final. port=1/1/31, up=1
port_up_indication. port=1/1/31, UNTAG, vlan-idx=1
stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524
pp_link_change_final. port=1/1/32, up=1
port_up_indication. port=1/1/32, UNTAG, vlan-idx=3
stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

343

debug port up-down

History
Release version

Command history
This command was introduced.
This command was modified to...

344

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug port vlan

debug port vlan
Monitors a specific VLAN.

Syntax
debug port vlan decimal
no debug port vlan decimal

Parameters
decimal
Specifies the number of the VLAN.

Modes
Privileged EXEC mode
Global configuration mode

Usage Guidelines
debug port up-downdebug port port

Examples
device# debug port vlan 1
monitor vlan 1
Topology: Port 1/1/31 is connected to port 1/1/32.
device# debug port vlan 2
monitor vlan 2
device# debug port up-down
up-down monitor port up/down event. 1: up, 2: down, 3: up/down
device# debug port up-down 3
Monitor both port up and down

If port 1/1/31 is disabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/31)# disable
port_down_indication. port=1/1/31, TAG, vlan-idx=4096
stack: 4040 2050A970 2050AA44 2060A8FC 20608BEC 2060B5A4 20576A90 20576C74
2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8
20047698 2011CF7C 5008
device(config-if-e1000-1/1/31)# port_down_indication. port=1/1/32, TAG,
vlan-idx=4096
stack: 4040 2050A970 2050AA44 2060A8FC 20608DA0 20609344 20609AFC 2055FA50
2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524
pp_link_change_final. port=1/1/32, up=0

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

345

debug port vlan

If port 1/1/31 is enabled, an output similar to the following is displayed.
device(config-if-e1000-1/1/31)# enable
device(config-if-e1000-1/1/31)# pp_link_change_final. port=1/1/31, up=1
port_up_indication. port=1/1/31, TAG, vlan-idx=4096
stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524
pp_link_change_final. port=1/1/32, up=1
port_up_indication. port=1/1/32, TAG, vlan-idx=4096
stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214
200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524

346

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug pp-bum-trunk-hash

debug pp-bum-trunk-hash
Traces and displays the output port through which a given packet can be sent out in a trunk for a broadcast, unknown-unicast,
and multicast (BUM) flow.

Syntax
debug pp-bum-trunk-hash ingress_port sw_trunk_id dmac smac
ipv4 dst_ipv4 src_ipv4 [ dst_tcp | udp_port ] [ src_tcp | udp_port ] vlan vidx
ipv6 flow_label dst_ipv6 src_ipv6 [ dst_tcp | udp_port ] [ src_tcp | udp_port ] vlan vidx
no debug pp-bum-trunk-hash

Parameters
ingress_port
Specifies the ingress port number.
sw_trunk_id
Specifies the software trunk ID.
dmac
Specifies the destination MAC address.
smac
Specifies the source MAC address.
ipv4
Generates debugging information related to IPv4 distribution for a BUM flow.
ipv6
Generates debugging information related to IPv6 distribution for a BUM flow.
The following variables are supported with the ipv4 and ipv6 options.
dst_ipv4
Specifies the destination IPv4 address.
src_ipv4
Specifies the source IPv4 address.
dst_tcp | udp_port
Specifies the destination TCP or UDP port number.
src_tcp | udp_port
Specifies the source TCP or UDP port number.
vlan
Specifies the VLAN ID.
vidx
Specifies the multicast ID.
flow_label
Specifies the flow label in the IPv6 header.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

347

debug pp-bum-trunk-hash

dst_ipv6
Specifies the destination IPv6 address.
src_ipv6
Specifies the source IPv6 address.

Modes
Privileged EXEC mode

Examples
For the IPv4 BUM flow, the command output resembles the following example.
device# debug pp-bum-trunk-hash 1/1/1 3 0000.00aa.aaaa 0000.00bb.1111 ipv4
10.1.1.1 10.1.1.2 10 10 1 100
Designated Trunk Port = 1/1/5

For the IPv6 BUM flow, the command output resembles the following example.
device# debug pp-bum-trunk-hash 1/1/11 3 0000.00aa.aaaa 0000.00bb.1111 ipv6 128
2001:DB8::1:1 2001:DB8::1:1 10 10 1 100
Designated Trunk Port = 1/1/4

For the non-IP BUM flow, the command output resembles the following example.
device# debug pp-bum-trunk-hash 1/1/1 3 0000.00aa.aaaa 0000.00bb.1111 non-ip
Designated Trunk Port = 1/1/5

348

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug pp-trunk-hash

debug pp-trunk-hash
Traces and displays the output port through which a given packet can be sent out in a trunk.

Syntax
debug pp-trunk-hash trunk_port
unicast-distribution ip dmac smac [ dst_ipv4 src_ipv4 dst_tcp | udp_port src_tcp | udp_port | dst_ipv6 src_ipv6 dst_tcp |
udp_port src_tcp | udp_port ]
unicast-distribution non-ipdmac smac
no debug pp-trunk-hash

Parameters
trunk_port
Specifies the trunk member port number.
unicast-distribution
Generates debugging information related to unicast distribution.
ip dmac smac
Generates debugging information related to unicast IPv4 and IPv6 distribution for the specified destination
MAC address and source MAC address. The following variables are supported with this option.
dst_ipv4
Specifies the destination IPv4 address.
src_ipv4
Specifies the source IPv4 address.
dst_tcp | udp_port
Specifies the destination TCP or UDP port number.
src_tcp | udp_port
Specifies the source TCP or UDP port number.
dst_ipv6
Specifies the destination IPv6 address.
src_ipv6
Specifies the source IPv6 address.
non-ip dmac smac
Generates debugging information related to unicast non-IP distribution for the specified destination MAC
address and source MAC address.

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

349

debug pp-trunk-hash

Usage Guidelines
The debug pp-trunk-hash trunk_port command is supported only on Brocade ICX devices.

Examples
For the unicast IPv4 distribution, the command output resembles the following example.
device# debug pp-trunk-hash 1/1/3 unicast-distribution ip 0000.0082.ba04
0000.00c9.5680 10.10.10.2 10.10.10.1 10 10
trunk hashed port: 1/1/2

For the unicast IPv6 distribution, the command output resembles the following example.
device# debug pp-trunk-hash 1/1/3 unicast-distribution ip 0000.0082.ba04
0000.00c9.5680 2001:DB8::100:10 2001:DB8::10:19 10 17
trunk hashed port: 1/1/1

For the unicast non-IP distribution, the command output resembles the following example.
device# debug pp-trunk-hash 1/1/3 unicast-distribution non-ip 0000.0082.ba04
0000.00c9.5680
trunk hashed port: 1/1/9

350

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Debug Commands Q - Z
debug rip database
Displays Routing Information Protocol (RIP) database events.

Syntax
debug rip database
no debug rip database

Modes
Privileged EXEC mode

Examples
device# debug rip database
device(config-vif-11)# RIP(default-vrf): (v2) process response packet
header: type:RESPONSE PACKET, version:2
RIP(default-vrf): refresh 10.1.2.0/24 metric 3 from 10.5.5.2 ve 11
RIP(default-vrf): existing route metric 2 from 10.4.4.1 ve 12
RIP(default-vrf): refresh 10.24.2.0/24 metric 4 from 10.5.5.2 ve 11
RIP(default-vrf): existing route metric 4 from 10.5.5.2 ve 11
RIP(default-vrf): (v2) process response packet
header: type:RESPONSE PACKET, version:2
RIP(default-vrf): refresh 10.24.2.0/24 metric 4 from 10.4.4.2 ve 12
RIP(default-vrf): existing route metric 4 from 10.5.5.2 ve 11

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

351

debug rip events

debug rip events
Displays RIP events.

Syntax
debug rip events
no debug rip events

Modes
Privileged EXEC mode
Global configuration mode

Examples
device# debug rip events
device(config-vif-11)# RIPng: update timer expired
clear ipv routeRIPng: triggered update
RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0
from :: on interface NULL
RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0
from :: on interface NULL
RIPng: Adding local connected route 2001:DB8::1/64 on interface v11
RIPng: Adding local connected route 2001:DB8::1/64 on interface v12
RIPng: update timer expired
RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0)
RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0)

352

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug sflow problems

debug sflow problems
Enables debugging of the internal sFlow.

Syntax
debug sflow problems
no debug sflow problems

Modes
Privileged EXEC mode

Usage Guidelines
sFlow is a system for observing traffic flow patterns and quantities within and among a set of Brocade devices.
The no form of the command disables debugging of the internal sFlow.

Examples
device# debug sflow problems
sflow: problem debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

353

debug span all_802_1d_events

debug span all_802_1d_events
Monitors information about all the events, timers, and packets on a specific VLAN.

Syntax
debug span all_802_1d_events decimal
no debug span all_802_1d_events decimal

Parameters
variable
Specifies the number of the VLAN.

Modes
Privileged EXEC mode

Examples
device# debug span all_802_1d_events vlan 201
STP Enabling All events Debugging for VLAN 201
7750Stk-Seth#STP[898211]: Received Config BPDU - VLAN 201 -port 54/1/21
port_state_selection(T=898211,vlan=201) -->
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 1/1/1(0) VLAN 201
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 2/1/1(256) VLAN 201
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 3/1/1(512) VLAN 201
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 51/1/1(12800) VLAN 201
STP:port_state_selection PORT 51/1/21 vlan 201 transitions to BLOCKING
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 52/1/1(13056) VLAN 201
STP:port_state_selection PORT 52/1/21 vlan 201 transitions to BLOCKING
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 53/1/1(13312) VLAN 201
STP:port_state_selection PORT 53/1/21 vlan 201 transitions to BLOCKING
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 54/1/1(13568) VLAN 201
port_state_selection root port 54/1/21
STP[898211]: Received Config BPDU - VLAN 201 -port 51/1/21 port_state_selection(T=898211,vlan=201) -->
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 1/1/1(0) VLAN 201
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 2/1/1(256) VLAN 201
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 3/1/1(512) VLAN 201
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 51/1/1(12800) VLAN 201
STP:port_state_selection PORT 51/1/21 vlan 201 transitions to BLOCKING
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 52/1/1(13056) VLAN 201
STP:port_state_selection PORT 52/1/21 vlan 201 transitions to BLOCKING
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 53/1/1(13312) VLAN 201
STP:port_state_selection PORT 53/1/21 vlan 201 transitions to BLOCKING
STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 54/1/1(13568) VLAN 201
port_state_selection root port 54/1/21

354

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug span config

debug span config
Monitors information about STP Bridge Protocol Data Unit (BPDU) configuration on a specific VLAN.

Syntax
debug span config vlan decimal ]
no debug span config vlan decimal ]

Parameters
decimal
Specifies the number of the VLAN.

Modes
Privileged EXEC mode

Examples
If the configuration of VLAN 2 on the Brocade ICX is enabled, output similar to the following is displayed.
device# debug span config vlan 2
STP Enabling packets Debugging for VLAN 2
device# STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5
0000 00 00 00 80000012f2dbfd80 00000004
8000002438154580 08 05 0100 1400 0200 0f00
STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/6
0000 00 00 00 80000012f2dbfd80 00000004
8000002438154580 08 06 0100 1400 0200 0f00
STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5
0000 00 00 00 80000012f2dbfd80 00000004
8000002438154580 08 05 0100 1400 0200 0f00
STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/6
0000 00 00 00 80000012f2dbfd80 00000004
8000002438154580 08 06 0100 1400 0200 0f00
STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5
0000 00 00 00 80000012f2dbfd80 00000004
8000002438154580 08 05 0100 1400 0200 0f00
STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/6
0000 00 00 00 80000012f2dbfd80 00000004
8000002438154580 08 06 0100 1400 0200 0f00

If the configuration of VLAN 2 on the Brocade ICX is disabled, output similar to the following is displayed.
device# no debug span config vlan 2
STP : Disabling Packets Debugging for VLAN 2

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

355

debug span timers

debug span timers
Displays information about the specific STP timer events.

Syntax
debug span timers vlan decimal
no debug span timers vlan decimal

Parameters
decimal
Specifies the number of the VLAN.

Modes
Privileged EXEC mode

Examples
If the STP timer event on VLAN 2 of the Brocade FastIron device is enabled, output similar to the following is displayed.
device# debug span
STP Enabling Timer
Sample output:
STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert -

timers vlan 2
Debugging for VLAN 2
Forward
Forward
Forward
Message
Message
Forward
Forward

Delay Timer expired On port 1/1/6(5)
Delay Timer expired On port 1/1/1(0)
Delay Timer expired On port 1/1/6(5)
Age Timer expired On port 1/1/1(0) ,
Age Timer expired On port 1/1/2(1) ,
Delay Timer expired On port 1/1/2(1)
Delay Timer expired On port 1/1/2(1)

, VLAN
, VLAN
, VLAN
VLAN 2
VLAN 2
, VLAN
, VLAN

2
2
2
2
2

If the STP timer event on VLAN 2 of the Brocade FastIron device is disabled, output similar to the following is displayed.
device# no debug span timers vlan 2
STP Disabling Timer Debugging for VLAN 2

356

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug stack pe control

debug stack pe control
Displays important SPX events in real time. This command is available on Control Bridge (CB) and Port Extender (PE).

Syntax
debug stack pe control
no debug stack pe control

Modes
Privileged EXEC mode

Examples
device# debug stack pe control 2
!!! Temperature is over warning level on stack unit 2 !!!
Debug: Jan 1 08:56:41 T=8h56m23.6: spx-port 2/1/5 goes down
Debug: Jan 1 08:56:41 T=8h56m23.6: p_notify: 2/1/5 down, UP=1, ary(1) timer,
Debug: Jan 1 08:56:41 T=8h56m23.7: p_notify: 2/1/5 down, UP=1, same = curr_up, abort
Debug: Jan 1 08:56:42 T=8h56m24.6: cb_pe_port_state_notify_cb, ind=1, from_timer=1
Debug: Jan 1 08:56:42 T=8h56m24.6: CB marks dirty bit 2 to S u3 st=5 stack: 10dd1f64 10dd39ec 10dd4144
10dd4308 10dd46f8 10dd7ba8 10dd7f1c 10dd848c 104bf3e8 1078071c 11680b54 11680eec 116823a0 116913d4
116922f4 11198bdc 106654d0
Debug: Jan 1 08:56:42 T=8h56m24.9: rem_st[18] Ready -> None:0
Debug: Jan 1 08:56:42 T=8h56m24.9: Active unit 2 deletes u18 but keeps its static config.
Debug: Jan 1 08:56:42 delete reason: Port 2/1/5 is down.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

357

debug stack pe mac

debug stack pe mac
Optional command to select the printing of "debug stack pe topo" of a particular Port Extender (PE) with this MAC.

Syntax
debug stack pe mac
no debug stack pe mac

Modes
Privileged EXEC mode

Examples
The user can key in the lowest 4 digits of the PE MAC address to limit the debug stack pe topo. The debug stack pe mac
command is effective only on CB. When this command is specified, the Control Bridge (CB) only displays the joining LLDP
packets of this specific PE. debug stack pe topo must be enabled before using this command.
device# debug stack pe mac 77b0
monitor pe topo with lowest mac=77b0
ICX7750-20Q Router#Debug: Jan 2 01:40:36 T=1d1h40m19.0: LLDP join: fr u18 40 to 41, nbr=0, p_cb=2/1/5,
V21 1, 224B, M=51444D A0A0A0A, me=cc4e.248b.77b0 CB-m=748e.f8f9.6300 0, tp=24 22 b, id=19 0 0 sug=0,
op=1 cl=0, D0=2/1 2/2 D1=2/3 , cb-mac=cb pe_me id=19, has p_me u19 i=1 D=0, has pe_up u18 i_up=1 dir=1,
T_fr 1, T_to 1, age=0, , add link 1140 - 1241
Debug: Jan 2 01:40:36 res 2, cc4e.248b.77b0 new_id 0 pe_id 19

358

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug stack pe topo

debug stack pe topo
Indicates Port Extender (PE) join requests are being sent to and received on Control Bridge (CB).

Syntax
debug stack pe topo
no debug stack pe topo

Modes
Privileged EXEC mode

Examples
device# debug stack pe topo 3
Debug: Jan 2 01:39:34 T=1d1h39m16.9: LLDP join: fr u2 4 to c0, nbr=0, p_cb=2/1/5, V21 1, 224B, M=53F450
A0A000A, me=cc4e.246c.f190 CB-m=748e.f8f9.6300 0, tp=27 25 b, id=18 0 18 sug=0, op=1 cl=0, D0=2/1 2/2
D1=4/1 , cb-mac=cb pe_me id=18, has p_me u18 i=0 D=0, has pe_cb u2 i_cb=0, pe_up=cb, T_fr 1, T_to 1,
age=0, , add link 104 - 11c0
Debug: Jan 2 01:39:34 res 2, cc4e.246c.f190 new_id 0 pe_id 18
Debug: Jan 2 01:39:36 T=1d1h39m19.0: LLDP join: fr u18 40 to 41, nbr=0, p_cb=2/1/5, V21 1, 224B,
M=51444D A0A0A0A, me=cc4e.248b.77b0 CB-m=748e.f8f9.6300 0, tp=24 22 b, id=19 0 0 sug=0, op=1 cl=0,
D0=2/1 2/2 D1=2/3 , cb-mac=cb pe_me id=19, has p_me u19 i=1 D=0, has pe_up u18 i_up=1 dir=1, T_fr 1,
T_to 1, age=0, , add link 1140 - 1241
Debug: Jan 2 01:39:36 res 2, cc4e.248b.77b0 new_id 0 pe_id 19

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

359

debug system campram

debug system campram
Traces Content Addressable Memory (CAM) or Parallel Random Access Machine (PRAM) operations.

Syntax
debug system campram
no debug system campram

Modes
Privileged EXEC mode

Examples
device# debug system campram
cam/pram: Trace debugging is on

360

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug system optics

debug system optics
Activates optical monitor debugging.

Syntax
debug system optics
no debug system optics

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug system optics
optics: Trace debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

361

debug system poll

debug system poll
Enables backplane polling.

Syntax
debug system poll
no debug system poll

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug system poll
backplane-poll: Trace debugging is on

362

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug web events

debug web events
Enables web events debugging.

Syntax
debug web events
no debug web events

Modes
Privileged EXEC mode

Examples
device# debug web events
web: Events debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

363

debug webauth timers

debug webauth timers
Enables debugging of web authentication timers.

Syntax
debug webauth timers
no debug webauth timers

Modes
Privileged EXEC mode

Examples
device# debug webauth timers
webauth: Timers debugging is on

364

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

debug webauth events

debug webauth events
Enables debugging of web authentication events.

Syntax
debug webauth events
no debug webauth events

Modes
Privileged EXEC mode

Usage Guidelines
Examples
device# debug webauth events
webauth: Events debugging is on

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

365

show debug

show debug
Displays all the enabled debug functions.

Syntax
show debug

Modes
User EXEC mode

Examples
The following example shows that ACL log and IPv6 debugging are enabled, with the console as the output destination.
device# show debug
Debug message destination: Console
Enabling ACL log
IPv6 Routing:
ipv6: icmp debugging is on

366

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support

show tech-support
Displays the output of several show commands at once. The output from this command varies depending on the router
configuration.

Syntax
show tech-support [ acl | cluster | cpu | license | l2 | l3 | memory | multicast | packet-loss | stack ]
no show tech-support [ acl | cluster | cpu | license | l2 | l3 | memory | multicast | packet-loss | stack ]

Parameters
acl
Generates system and debugging information specific to ACL configurations and counters.
cluster
Generates system and debugging information specific to cluster configurations.
cpu
Generates CPU-related information.
license
Generates license-related information.
l2
Generates system and debugging information specific to Layer 2 configurations.
l3
Generates system and debugging information specific to Layer 3 configurations.
memory
Generates memory-related information of the device.
multicast
Generates system and debugging information specific to Layer 2 and Layer 3 multicast configurations.
packet-loss
Generates packet statistics-related debugging information.
stack
Generates system and debugging information specific to stacking configurations.

Modes
Privileged EXEC mode

Usage Guidelines
The show tech-support command is useful when collecting a large amount of information about the Brocade FastIron devices
for troubleshooting purposes. The output of this command can be used by technical support representatives when a problem is
reported.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

367

show tech-support

The default output of the show tech-support command includes the following information:
•

Header for all the show commands

•

Running configuration

•

Image version

•

Port status

•

Port counters

•

Static and dynamic log buffers

•

dm statistics

•

Boot, monitor, and system

•

Registers information

•

Possible stack trace

•

Active stack (if applicable)

•

Last packet (Application Data)

•

Possible data structure

•

MCT cluster details

•

License details

•

Stacking information

•

Dot1x

•

DHCP snooping

•

SSH

•

System Health

The format of the show tech-support command output is modified to include a header and a footer by default for each of the
show tech-support commands which gets called from the CLI to automatically parse the output for easier lookup.
The header contains the following information:
•

BEGIN - Indicates a sub-command that will begin execution next.

•

CONTEXT - Indicates in which context and session the sub-commands are executed.
If more than one telnet session and console session for a device is accessed, then show tech-support command
displays CONTEXT as Console#0 for console session and telnet#1 and telnet#2 and so on for telnet sessions.

•

TIME STAMP - A time stamp, with millisecond granularity, helps to determine the time difference between separate
runs of the same command.
If NTP or local clock is not set in a device, then header displays Epoch time in the TIMESTAMP field. Epoch time is a
universal time which starts from Jan 1, 1970. Therefore, for Linux platforms, the Epoch time format is 00:00:00.000
GMT+00 Thu Jan 01 1970. For non-Linux platforms, the Epoch time format is Jan 01 00:00:00.000.

•

HW/SW INFO - Indicates the hardware and software version information of the device.

The footer contains the following information:
•

TIME STAMP - A time stamp, with millisecond granularity, helps to determine the time difference between separate
runs of the same command.
If NTP or local clock is not set in a device, then header displays Epoch time in the TIMESTAMP field. Epoch time is a
universal time which starts from Jan 1, 1970. Therefore, for Linux platforms, the Epoch time format is 00:00:00.000
GMT+00 Thu Jan 01 1970. For non-Linux platforms, the Epoch time format is Jan 01 00:00:00.000.

368

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support

•

END - Indicates the sub-command which has completed execution.

•

TIME TAKEN - Indicates the total time taken in nanoseconds for the command execution.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

369

show tech-support

Examples
The following example shows the truncated output of the show tech-support command.
device# show tech-support
==========================================================================
BEGIN : show tech-support
CONTEXT : TELNET#1 : show tech-support
TIME STAMP : 01:47:54.763 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
==========================================================================
BEGIN : show running-config
CONTEXT : TELNET#1 : CONFIG
TIME STAMP : 01:47:54.763 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Current configuration:
!
ver 08.0.40b1T213
!
stack unit 1
module 1 icx7250-24-port-management-module
module 2 icx7250-sfp-plus-8port-80g-module
priority 200
default-ports 1/2/5 1/2/7
stack-trunk 1/2/5 to 1/2/6
stack-trunk 1/2/7 to 1/2/8
stack-port 1/2/5 1/2/7
...
==========================================================================
TIME STAMP : 01:47:55.061 Pacific Wed Dec 09 2015
END : show running-config
TIME TAKEN : 148914220 ticks (148914220 nsec)
==========================================================================
==========================================================================
BEGIN : show version
CONTEXT : TELNET#1 : HW INFO
TIME STAMP : 01:47:55.061 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Copyright (c) 1996-2015 Brocade Communications Systems, Inc. All rights reserved.
UNIT 1: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1
(22418510 bytes) from Primary spr08040b1.bin
SW: Version 08.0.40b1T213
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002)
Compiled on Thu Sep 10 06:30:24 2015
UNIT 2: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1
(22418510 bytes) from Primary spr08040b1.bin
SW: Version 08.0.40b1T213
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002)
HW: Stackable ICX7250-24
==========================================================================
UNIT 1: SL 1: ICX7250-24 24-port Management Module
Serial #:DUN3245K00N
License: ICX7250_L3_SOFT_PACKAGE
(LID: fwpIHJKmFFp)
License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant
P-ASIC 0: type B344, rev 01 Chip BCM56344_A0
==========================================================================
UNIT 1: SL 2: ICX7250-SFP-Plus 8-port 80G Module
==========================================================================
UNIT 2: SL 1: ICX7250-24 24-port Management Module
Serial #:DUN3245K01W
License: ICX7250_L3_SOFT_PACKAGE
(LID: fwpIHJKmFGy)
License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant
==========================================================================
UNIT 2: SL 2: ICX7250-SFP-Plus 8-port 80G Module
==========================================================================
1000 MHz ARM processor ARMv7 88 MHz bus
8192 KB boot flash memory

370

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support

2048 MB code flash memory
2048 MB DRAM
STACKID 1 system uptime is 1 day(s) 10 hour(s) 41 minute(s) 57 second(s)
STACKID 2 system uptime is 1 day(s) 10 hour(s) 41 minute(s) 53 second(s)
The system started at 15:14:06 Pacific Mon Dec 07 2015
The system : started=warm start
reloaded=by "reload"
My stack unit ID = 1, bootup role = active
*** NOT FOR PRODUCTION ***
==========================================================================
TIME STAMP : 01:47:55.065 Pacific Wed Dec 09 2015
END : show version
TIME TAKEN : 2038801 ticks (2038801 nsec)
==========================================================================
==========================================================================
BEGIN : show interfaces brief
CONTEXT : TELNET#1 : PORT STATUS
TIME STAMP : 01:47:55.938 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Interface Information for all the ports :
Port
Link
State
Dupl Speed Trunk Tag Pvid Pri MAC
Name
1/1/1
Down
None
None None None No 4010 0
cc4e.24b4.88b0
1/1/2
Disable None
None None None No 4010 0
cc4e.24b4.88b1
1/1/3
Up
Forward Full 1G
None Yes N/A 0
cc4e.24b4.88b2
1/1/4
Disable None
None None None No 4010 0
cc4e.24b4.88b3
1/1/5
Disable None
None None None No 4010 0
cc4e.24b4.88b4
==========================================================================
TIME STAMP : 01:47:55.962 Pacific Wed Dec 09 2015
END : show interfaces brief
TIME TAKEN : 12071127 ticks (12071127 nsec)
==========================================================================
==========================================================================
BEGIN : show statistics ethernet
CONTEXT : TELNET#1 : PACKET COUNTERS
TIME STAMP : 01:47:55.986 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Statistics Information for each port :
Port
Link
State
Dupl Speed Trunk Tag Pvid Pri MAC
Name
1/1/3
Up
Forward Full 1G
None Yes N/A 0
cc4e.24b4.88b2
Port 1/1/3 Counters:
InOctets
52710812588
OutOctets
31386393616
InPkts
623806726
OutPkts
365249013
InBroadcastPkts
0
OutBroadcastPkts
0
InMulticastPkts
623211850
OutMulticastPkts
365249013
InUnicastPkts
0
OutUnicastPkts
0
InBadPkts
0
InFragments
0
InDiscards
0
OutErrors
0
CRC
0
Collisions
0
InErrors
0
LateCollisions
0
InGiantPkts
0
InShortPkts
0
InJabber
0
OutDiscards
3242924084
InFlowCtrlPkts
0
OutFlowCtrlPkts
0
InBitsPerSec
2872
OutBitsPerSec
160
InPktsPerSec
5
OutPktsPerSec
0
InUtilization
0.00%
OutUtilization
0.00%
==========================================================================
TIME STAMP : 01:47:56.413 Pacific Wed Dec 09 2015
END : show statistics ethernet
TIME TAKEN : 213778306 ticks (213778306 nsec)
==========================================================================
==========================================================================
BEGIN : show logging
CONTEXT : TELNET#1 : STATIC/DYNAMIC LOG
TIME STAMP : 01:47:55.089 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

371

show tech-support

==========================================================================
Syslog logging: enabled ( 0 messages dropped, 1 flushes, 540 overruns)
Buffer logging: level ACDMEINW, 1000 messages logged
level code: A=alert C=critical D=debugging M=emergency E=error
I=informational N=notification W=warning
Static
Dec 7
Dec 2
Dec 7
Dec 7

Log Buffer:
23:06:21:I:System:
18:27:47:A:System:
15:06:44:I:System:
15:06:44:A:System:

Stack
Stack
Stack
Stack

unit
unit
unit
unit

1
1
2
2

PS
PS
PS
PS

1,
2,
1,
2,

Internal Power supply is up
Standby Power supply is down
Internal Power supply is up
Standby Power supply is down

Dynamic Log Buffer (1000 lines):
Dec 9 01:46:02:W:IGMP: [ Port 1/2/4 ] v1570. Query version mismatch. Received query version 2 from
157.0.0.151; Port version 3.
Dec 9 01:43:55:W:IGMP: [ Port 1/2/4 ] v1570. Query version mismatch. Received query version 2 from
157.0.0.151; Port version 3.
...
(output truncated)

You can disable the display of the header and footer for show tech-support commands by using the supportsave info disable
command. If disabled, you can enable the display of the header and footer for show tech-support commands by using the
supportsave info enable command.
The following sample output of the show tech-support license command shows the header and footer displayed.
device# supportsave info enable
device# show tech-support license
==========================================================================
BEGIN : show license
CONTEXT : CONSOLE#0 : LICENSE
TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7750-48C/SWR08040q078
==========================================================================
License Information
===================
License record empty
==========================================================================
TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015
END : show license
TIME TAKEN : 1459 ticks (61278 nsec)
==========================================================================

372

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support acl

show tech-support acl
Displays debugging information related to ACL configuration and counters.

Syntax
show tech-support acl

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

373

show tech-support acl

Examples
device# show tech-support acl
==========================================================================
BEGIN : show access-list all
CONTEXT : CONSOLE#0 : ACL CONFIG
TIME STAMP : 01:30:57.002 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7750-48C/SWR08040q078
==========================================================================
ACL Config Information.
ipv6 access-list Pimv6-anycast-rp-set-vrf-DC-NMCT: 6 entries
permit ipv6 host 121::121 any
permit ipv6 host 50::50 any
permit ipv6 host 51::51 any
permit ipv6 host 122::122 any
permit ipv6 host 150::150 any
permit ipv6 host 151::151 any
Standard IP access list Pim-anycast-rp-set-vrf-DC-NMCT : 6 entry
permit host 50.50.50.50
permit host 51.51.51.51
permit host 122.122.122.122
permit host 150.150.150.150
permit host 151.151.151.151
permit host 121.121.121.121
==========================================================================
TIME STAMP : 01:30:57.003 Pacific Wed Dec 09 2015
END : show access-list all
TIME TAKEN : 4561 ticks (191562 nsec)
==========================================================================
==========================================================================
BEGIN : show acl-on-arp
CONTEXT : CONSOLE#0 : ARP ACL FILTERING
TIME STAMP : 01:30:57.003 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7750-48C/SWR08040q078
==========================================================================
ACL-ON-ARP list information
Port
ACL ID Filter Count
==========================================================================
TIME STAMP : 01:30:57.003 Pacific Wed Dec 09 2015
END : show acl-on-arp
TIME TAKEN : 1920 ticks (80640 nsec)
==========================================================================
==========================================================================
BEGIN : show access-list accounting
CONTEXT : CONSOLE#0 : ACL ACCOUNTING INFO
TIME STAMP : 01:30:57.107 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7750-48C/SWR08040q078
==========================================================================
ACL Accounting Information
==========================================================================
TIME STAMP : 01:30:57.108 Pacific Wed Dec 09 2015
END : show access-list accounting
TIME TAKEN : 1464 ticks (61488 nsec)
==========================================================================

374

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support cluster

show tech-support cluster
Collects and displays complete debugging information related to Multi-Chassis Trunking (MCT) cluster configuration.

Syntax
show tech-support packet-loss

Modes
Privileged EXEC mode

Usage Guidelines
The show tech-support cluster command output includes the output of the show cluster and the show cluster ccp peer detail
commands. The show tech-support cluster command output displays the following information:
•

Cluster configuration

•

Spanning Tree Protocol (STP), if configured

•

Rapid Spanning Tree Protocol (RSTP), if configured

•

Peer details

•

Cluster Communication Protocol (CCP)

•

Last reason for CCP down

•

Inter-Chassis Link (ICL)

•

MCT client

•

Transmission Control Protocol (TCP) connection

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

375

show tech-support cluster

Examples
The following example displays sample output from the show tech-support cluster command.
device# show tech-support cluster
==========================================================================
BEGIN : show running config cluster
CONTEXT : CONSOLE#0 : CLUSTER CONFIG
TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002
HW/SW INFO : ICX7750-26Q/SWR08050b468
==========================================================================
Cluster Information :
cluster s3 3
!
==========================================================================
TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002
END : show running config cluster
TIME TAKEN : 7813 ticks (328146 nsec)
==========================================================================
==========================================================================
BEGIN : show cluster  
CONTEXT : CONSOLE#0 : CLUSTER,STP,RSTP
TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002
HW/SW INFO : ICX7750-26Q/SWR08050b468
==========================================================================
Cluster s3 3
============
Rbridge Id: 0, Session Vlan: 0
Cluster State: Undeploy
Client Isolation Mode: Loose
Member Vlan Range:
L2 VLAN 5

are members of single spanning tree.

L2 VLAN 5 are members of single spanning tree.
==========================================================================
TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002
END : show cluster  
TIME TAKEN : 3052 ticks (128184 nsec)
==========================================================================
==========================================================================
BEGIN : show ccp peer detail
CONTEXT : CONSOLE#0 : CLUSTER CCP PEER DETAILS
TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002
HW/SW INFO : ICX7750-26Q/SWR08050b468
==========================================================================
No Cluster Configured
==========================================================================
TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002
END : show ccp peer detail
TIME TAKEN : 367 ticks (15414 nsec)
==========================================================================

History

376

Release version

Command history

Release 08.0.00a

The show tech-support command was enhanced to display MCT cluster configuration
information.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support cpu

show tech-support cpu
Displays debugging information related to CPU usage and utilization.

Syntax
show tech-support cpu

Modes
Privileged EXEC mode

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

377

show tech-support cpu

Examples
device# show tech-support cpu
==========================================================================
BEGIN : show cpu tasks
CONTEXT : CONSOLE#0 : CPU/TASK
TIME STAMP : 01:32:44.334 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7750-48F/SWR08040q078
==========================================================================
CPU Usage Information
... Usage average for all tasks in the last 1 second ...
==========================================================
Name
%
SigHdlrTsk
OsTsk
TimerTsk
FlashTsk
MainTsk
MportPollTsk
IntrTsk
stkKeepAlive
keygen
itc
bcmDPC
bcmINTR
socdmadesc.0
bcmCNTR.0
bcmRX
bcmL2MOD.0
scp
appl
snms
rtm
rtm6
rip
bgp
bgp_io
ospf
ospf_r_calc
openflow_ofm
openflow_opm
mcast_fwd
mcast
msdp
ripng
ospf6
ospf6_rt
mcast6
ipsec
dhcp6
mecid
snmp
rmon
web
acl
spx
flexauth
adm_tm
ntp
rconsole
console
ospf_msg_task
auxTsk
exUSBHotpluggerTsk
bcmLINK.0

0
0
0
0
0
0
0
0
0
0
0
4
0
0
2
0
0
80
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
5

CPU Utilization information.
appl-task pid 1054 tid 0x55363330 cpu usage 80%
console-task pid 1084 tid 0x55b5d330 cpu usage 0%
flash-task pid 1039 tid 0x48da1330 cpu usage 0%

378

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support cpu

sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0%
itc-task pid 1045 tid 0x48f41330 cpu usage 0%
loop cnt: 1658124015 1658223655 -> 99640
read cnt: 59419971 59420144 -> 173
loop rate = 99640/10 = 9964
rcode_old = 100 - (100*9964/11250) = 12
rcode_log2= 100-(100*log2(9964)/log2(11250))=1
1/100 busy, from 35127 sec ago
appl-task pid 1054 tid 0x55363330 cpu usage 80%
console-task pid 1084 tid 0x55b5d330 cpu usage 0%
flash-task pid 1039 tid 0x48da1330 cpu usage 0%
sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0%
itc-task pid 1045 tid 0x48f41330 cpu usage 0%
loop cnt: 1658124015 1658223655 -> 99640
read cnt: 59419971 59420144 -> 173
loop rate = 99640/10 = 9964
rcode_old = 100 - (100*9964/11250) = 12
rcode_log2= 100-(100*log2(9964)/log2(11250))=1
1/100 busy, from 0 sec ago
appl-task pid 1054 tid 0x55363330 cpu usage 80%
console-task pid 1084 tid 0x55b5d330 cpu usage 0%
flash-task pid 1039 tid 0x48da1330 cpu usage 0%
sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0%
itc-task pid 1045 tid 0x48f41330 cpu usage 0%
loop cnt: 1658124015 1658223655 -> 99640
read cnt: 59419971 59420144 -> 173
loop rate = 99640/10 = 9964
rcode_old = 100 - (100*9964/11250) = 12
rcode_log2= 100-(100*log2(9964)/log2(11250))=1
1/100 busy, from 0 sec ago
appl-task pid 1054 tid 0x55363330 cpu usage 80%
console-task pid 1084 tid 0x55b5d330 cpu usage 0%
flash-task pid 1039 tid 0x48da1330 cpu usage 0%
sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0%
itc-task pid 1045 tid 0x48f41330 cpu usage 0%
loop cnt: 1658124015 1658223655 -> 99640
read cnt: 59419971 59420144 -> 173
loop rate = 99640/10 = 9964
rcode_old = 100 - (100*9964/11250) = 12
rcode_log2= 100-(100*log2(9964)/log2(11250))=1
1/100 busy, from 0 sec ago
appl-task pid 1054 tid 0x55363330 cpu usage 80%
console-task pid 1084 tid 0x55b5d330 cpu usage 0%
flash-task pid 1039 tid 0x48da1330 cpu usage 0%
sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0%
itc-task pid 1045 tid 0x48f41330 cpu usage 0%
loop cnt: 1658124015 1658223655 -> 99640
read cnt: 59419971 59420144 -> 173
loop rate = 99640/10 = 9964
rcode_old = 100 - (100*9964/11250) = 12
rcode_log2= 100-(100*log2(9964)/log2(11250))=1
1/100 busy, from 0 sec ago
==========================================================================
TIME STAMP : 01:32:44.335 Pacific Wed Dec 09 2015
END : show cpu tasks
TIME TAKEN : 9270 ticks (389340 nsec)
==========================================================================

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

379

show tech-support l2

show tech-support l2
Displays debugging information related to Layer 2 configurations.

Syntax
show tech-support l2

Modes
Privileged EXEC mode

Usage Guidelines
This command displays the following debugging information related to Layer 2 configurations:

380

•

Interface status

•

Virtual Local Area Network (VLAN) configuration

•

Private VLAN

•

Spanning tree and 802.1W spanning tree

•

Per VLAN Spanning Tree Plus (PVST+)

•

Bridge Protocol Data Unit (BPDU) Guard and STP root protection

•

VLAN topology group

•

Link aggregation configuration

•

Media Access Control (MAC) table

•

Dot1x port security

•

MAC security

•

Metro Ring Protocol (MRP)

•

Virtual Switch Redundancy Protocol (VSRP)

•

Interface statistics

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support l2

Examples
The following example shows the truncated output of the show tech-support l2 command.
device# show tech-support l2
==========================================================================
BEGIN : show version
CONTEXT : TELNET#1 : HW INFO
TIME STAMP : 01:37:44.217 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Copyright (c) 1996-2015 Brocade Communications Systems, Inc. All rights reserved.
UNIT 1: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1
(22418510 bytes) from Primary spr08040b1.bin
SW: Version 08.0.40b1T213
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002)
Compiled on Thu Sep 10 06:30:24 2015
UNIT 2: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1
(22418510 bytes) from Primary spr08040b1.bin
SW: Version 08.0.40b1T213
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002)
HW: Stackable ICX7250-24
==========================================================================
UNIT 1: SL 1: ICX7250-24 24-port Management Module
Serial #:DUN3245K00N
License: ICX7250_L3_SOFT_PACKAGE
(LID: fwpIHJKmFFp)
License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant
P-ASIC 0: type B344, rev 01 Chip BCM56344_A0
==========================================================================
UNIT 1: SL 2: ICX7250-SFP-Plus 8-port 80G Module
==========================================================================
UNIT 2: SL 1: ICX7250-24 24-port Management Module
Serial #:DUN3245K01W
License: ICX7250_L3_SOFT_PACKAGE
(LID: fwpIHJKmFGy)
License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant
==========================================================================
UNIT 2: SL 2: ICX7250-SFP-Plus 8-port 80G Module
==========================================================================
1000 MHz ARM processor ARMv7 88 MHz bus
8192 KB boot flash memory
2048 MB code flash memory
2048 MB DRAM
STACKID 1 system uptime is 1 day(s) 10 hour(s) 31 minute(s) 46 second(s)
STACKID 2 system uptime is 1 day(s) 10 hour(s) 31 minute(s) 42 second(s)
The system started at 15:14:06 Pacific Mon Dec 07 2015
The system : started=warm start
reloaded=by "reload"
My stack unit ID = 1, bootup role = active
*** NOT FOR PRODUCTION ***
==========================================================================
TIME STAMP : 01:37:44.222 Pacific Wed Dec 09 2015
END : show version
TIME TAKEN : 2477201 ticks (2477201 nsec)
==========================================================================
...
==========================================================================
BEGIN : show vlan
CONTEXT : TELNET#1 : VLAN INFO
TIME STAMP : 01:37:45.486 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
VLAN Brief Summary Information :
System-max vlan Params: Max(4095) Default(64) Current(4000)
Default vlan Id :4010
Total Number of Vlan Configured :118
VLANs Configured :500 to 503 520 to 552 581 to 590 601 to 604 620 to 652 701 to 703 751 to 752 1001 to
1025 1560 1570 3680 4010
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

381

show tech-support l2

==========================================================================
TIME STAMP : 01:37:45.486 Pacific Wed Dec 09 2015
END : show vlan
TIME TAKEN : 256660 ticks (256660 nsec)
==========================================================================
==========================================================================
BEGIN : show pvlan
CONTEXT : TELNET#1 : PVLAN INFO
TIME STAMP : 01:37:45.487 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Private VLAN Information :
==========================================================================
TIME STAMP : 01:37:45.487 Pacific Wed Dec 09 2015
END : show pvlan
TIME TAKEN : 89856 ticks (89856 nsec)
==========================================================================
==========================================================================
BEGIN : show span detail
CONTEXT : TELNET#1 : STP INFO
TIME STAMP : 01:37:45.516 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Spanning Tree Information :
Spanning-tree is not configured on port-vlan 4010
STP instance owned by VLAN 500
Global STP (IEEE 802.1D) Parameters:
VLAN Root
ID
ID

Root Root
Cost Port

500 8000001bedb5bb40 6

Prio
rity
Hex
8000

1/2/1

Max
Age
sec
20

Hello
sec
2

Hold
sec
1

Fwd
dly
sec
15

Last
Chang
sec
29533

Chg Bridge
cnt Address
175 cc4e24b488b0

Port STP Parameters:
Port
Num
1/1/3
1/1/7
1/1/9
1/1/11
1/1/13
1/1/15
1/1/17
1/1/21
1/2/1
1/2/4
2/1/3
2/1/7
2/1/9
2/1/11
2/1/13
2/1/15
2/1/17
2/1/21
2/2/1
2/2/4

Prio
rity
Hex
80
80
80
80
80
80
80
80
80
80
80
80
80
80
80
80
80
80
80
80

Path
Cost

State

Fwd
Trans

Design
Cost

Designated
Root

Designated
Bridge

4
4
0
4
0
4
0
0
2
2
0
0
0
0
0
0
0
0
2
2

BLOCKING
BLOCKING
DISABLED
BLOCKING
DISABLED
BLOCKING
DISABLED
DISABLED
FORWARDING
BLOCKING
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
FORWARDING
BLOCKING

9
14
0
9
0
15
0
0
10
14
0
0
0
0
0
0
0
0
10
14

4
4
0
4
0
4
0
0
4
4
0
0
0
0
0
0
0
0
4
4

8000001bedb5bb40
8000001bedb5bb40
0000000000000000
8000001bedb5bb40
0000000000000000
8000001bedb5bb40
0000000000000000
0000000000000000
8000001bedb5bb40
8000001bedb5bb40
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
8000001bedb5bb40
8000001bedb5bb40

8000cc4e246dbc80
8000cc4e24705580
0000000000000000
8000cc4e246dbc80
0000000000000000
8000cc4e24705580
0000000000000000
0000000000000000
8000cc4e246dbc80
8000cc4e24705580
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
8000cc4e246dbc80
8000cc4e24705580

STP instance owned by VLAN 501
..
(output truncated)

382

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support l3 ipv4-uc

show tech-support l3 ipv4-uc
Displays debugging information related to Layer 3 IPv4 unicast configurations.

Syntax
show tech-support l3 ipv4-uc

Modes
Privileged EXEC mode

Usage Guidelines
This command displays the following debugging information related to Layer 3 IPv4 unicast configurations:
•

IPv4 routing table

•

IPv4 interface

•

Routing Information Protocol (RIP) routes and neighbors

•

Border Gateway Protocol (BGP) routes and neighbors

•

Open Shortest Path First Version 2 (OSPFv2) routes and neighbors

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

383

show tech-support l3 ipv4-uc

Examples
The following example shows the truncated output of the show tech-support l3 ipv4-uc command.
device# show tech-support l3 ipv4-uc
==========================================================================
BEGIN : show running-config
CONTEXT : TELNET#1 : CONFIG
TIME STAMP : 01:39:18.254 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Current configuration:
!
ver 08.0.40b1T213
!
stack unit 1
module 1 icx7250-24-port-management-module
module 2 icx7250-sfp-plus-8port-80g-module
priority 200
default-ports 1/2/5 1/2/7
stack-trunk 1/2/5 to 1/2/6
stack-trunk 1/2/7 to 1/2/8
stack-port 1/2/5 1/2/7
stack unit 2
module 1 icx7250-24-port-management-module
module 2 icx7250-sfp-plus-8port-80g-module
priority 128
default-ports 2/2/5 2/2/7
stack-trunk 2/2/5 to 2/2/6
stack-trunk 2/2/7 to 2/2/8
stack-port 2/2/5 2/2/7
stack enable
stack rconsole-off
stack mac cc4e.24b4.88b0
!
!
global-stp
!
lag CB-BR1-150 dynamic id 10
ports ethernet 1/2/1 ethernet 2/2/1
primary-port 1/2/1
deploy
monitor ethe-port-monitored 1/2/1 ethe 1/2/3 output
monitor ethe-port-monitored 2/2/1 ethe 1/2/3 output
!
lag CB-BR2-151 dynamic id 11
ports ethernet 1/2/4 ethernet 2/2/4
primary-port 1/2/4
deploy
!
!
!
vlan 500 name all-access-aggregate-STP by port
tagged ethe 1/1/3 ethe 1/1/7 ethe 1/1/9 ethe 1/1/11 ethe 1/1/13 ethe 1/1/15 ethe 1/1/17 ethe 1/1/21
ethe 1/2/1 ethe 1/2/4 ethe 2/1/3 ethe 2/1/7 ethe 2/1/9 ethe 2/1/11 ethe 2/1/13 ethe 2/1/15 ethe 2/1/17
ethe 2/1/21 ethe 2/2/1 ethe 2/2/4
spanning-tree
multicast passive
multicast6 passive
!
==========================================================================
BEGIN : ospf summary
CONTEXT : TELNET#1 : OSPF
TIME STAMP : 01:39:19.520 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
OSPF summary
-----------Total number of OSPF instances: 1
Seq Instance

384

Intfs

Nbrs

Nbrs-Full LSAs

Routes
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support l3 ipv4-uc

1

default-vrf

3

3

3

2813

2519

OSPF Information for VRF default-vrf
--------------------------------Number of Areas is 2
Indx Area
1
300
2
0

Type
Cost
normal 0
normal 0

SPFR
1356
1356

ABR
2
0

ASBR
22
0

LSA
519
0

Chksum(Hex)
0102f3e9
0

Link States
Index Area ID
Type LS ID
Adv Rtr
Seq(Hex) Age Cksum
1
300
Rtr 0.0.0.170
0.0.0.170
80000039 691 0x06ce
2
300
Rtr 36.61.0.10
36.61.0.10
800001ec 1024 0xf62c
3
300
Rtr 0.0.0.162
0.0.0.162
8000394d 1820 0x7f44
4
300
Rtr 0.0.0.167
0.0.0.167
8000c532 624 0xe0c6
...
==========================================================================
BEGIN : rip summary
CONTEXT : TELNET#1 : RIP
TIME STAMP : 01:39:23.264 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================

SyncState
Done
Done
Done
Done

RIP Information for Default VRF
------------------------------==========================================================================
TIME STAMP : 01:39:23.264 Pacific Wed Dec 09 2015
END : rip summary
TIME TAKEN : 129728 ticks (129728 nsec)
==========================================================================
..
(output truncated)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

385

show tech-support l3 ipv6-uc

show tech-support l3 ipv6-uc
Displays debugging information related to Layer 3 IPv6 unicast configurations.

Syntax
show tech-support l3 ipv6-uc

Modes
Privileged EXEC mode

Usage Guidelines
This command displays the following debugging information related to Layer 3 IPv6 unicast configurations:

386

•

IPv6 routing table

•

IPv6 interface

•

IPv6 neighbor

•

OSPF Version 3 (OSPFv3) neighbors

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support l3 ipv6-uc

Examples
The following example shows the truncated output of the show tech-support l3 ipv6-uc command.
device# show tech-support l3 ipv6-uc
==========================================================================
BEGIN : show running-config
CONTEXT : TELNET#1 : CONFIG
TIME STAMP : 01:40:52.018 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Current configuration:
!
ver 08.0.40b1T213
!
stack unit 1
module 1 icx7250-24-port-management-module
module 2 icx7250-sfp-plus-8port-80g-module
priority 200
default-ports 1/2/5 1/2/7
stack-trunk 1/2/5 to 1/2/6
stack-trunk 1/2/7 to 1/2/8
stack-port 1/2/5 1/2/7
stack unit 2
module 1 icx7250-24-port-management-module
module 2 icx7250-sfp-plus-8port-80g-module
priority 128
default-ports 2/2/5 2/2/7
stack-trunk 2/2/5 to 2/2/6
stack-trunk 2/2/7 to 2/2/8
stack-port 2/2/5 2/2/7
stack enable
stack rconsole-off
stack mac cc4e.24b4.88b0
!
!
global-stp
!
...
==========================================================================
BEGIN : unicast ip summary
CONTEXT : TELNET#1 : UCAST IPv6 INFO
TIME STAMP : 01:40:53.519 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
IPV6 Interfaces:
---------------Routing Protocols : R - RIP O - OSPF
Interface
Status
Routing Global Unicast Address
Ve 1560
up/up
O
156::171/64
Ve 1570
up/up
O
157::171/64
Ve 3680
up/up
O
36:80::171/64
Loopback 1
up/up
112:112:112::171/128

VRF
default-vrf
default-vrf
default-vrf
default-vrf

IPV6 Routing Summary:
--------------------IPv6 Routing Table - 476 entries:
4 connected, 0 static, 0 RIP, 472 OSPF, 0 BGP
Number of prefixes:
/64:423 /80:50 /128:3
IPV6 Routing Table:
------------------IPv6 Routing Table - 476 entries:
Type Codes - B:BGP C:Connected L:Local O:OSPF R:RIP S:Static
BGP Codes - i:iBGP e:eBGP
OSPF Codes - i:Inter Area 1:External Type 1 2:External Type 2
STATIC Codes - d:DHCPv6
Type IPv6 Prefix
Next Hop Router
Interface
Dis/Metric
O
26:66::/64
fe80::ce4e:24ff:fe70:5580
ve 1570
110/2
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

Uptime
8h14m

387

show tech-support l3 ipv6-uc

O2

35:81::/64

fe80::ce4e:24ff:fe6d:bc80
ve 1560
110/0
8h14m
fe80::ce4e:24ff:fe70:5580
ve 1570
Oi
36:1::/64
fe80::ce4e:24ff:fe6d:bc80
ve 1560
110/3
7h42m
fe80::ce4e:24ff:fe70:5580
ve 1570
==========================================================================
BEGIN : ospfv3 summary
CONTEXT : TELNET#1 : OSPFv3
TIME STAMP : 01:40:53.524 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
OSPFV3 summary
-------------Total number of IPv6 OSPF instances: 1
Seq Instance
Intfs
Nbrs
Nbrs-Full LSAs
Routes
1
default-vrf
3
3
3
566
475
IPV6 OSPF Memory:
---------------Total Dynamic Memory Allocated for this instance : 4368351
Memory Type
Size
Allocated Max-alloc
MTYPE_OSPF6_AREA
471191
2
4
MTYPE_OSPF6_AREA_RANGE
29
0
16
MTYPE_OSPF6_SUMMARY_ADDRE 25
0
16
MTYPE_OSPF6_IF
280
3
64
MTYPE_OSPF6_NEIGHBOR
12502
3
32
MTYPE_OSPF6_ROUTE_NODE
21
496
4096
MTYPE_OSPF6_ROUTE_INFO
35
496
4096
MTYPE_OSPF6_PREFIX
20
0
16
MTYPE_OSPF6_LSA
129
566
4096
MTYPE_OSPF6_VERTEX
166
21
64
MTYPE_OSPF6_SPFTREE
44
2
2
MTYPE_OSPF6_NEXTHOP
28
7
256
MTYPE_OSPF6_EXTERNAL_INFO 40
0
4096
MTYPE_THREAD
32
35
1024
MTYPE_OSPF6_LINK_LIST
20
12617
20480
MTYPE_OSPF6_LINK_NODE
12
1827
20480
MTYPE_OSPF6_LSA_RETRANSMI 6
0
8192
global memory pool for all instances
Memory Type
Size
Allocated Max-alloc
MTYPE_OSPF6_TOP
61475
1
1
MTYPE_OSPF6_LSA_HDR
120
566
970
MTYPE_OSPF6_RMAP_COMPILED 0
0
0
MTYPE_OSPF6_OTHER
0
0
0
MTYPE_THREAD_MASTER
84
1
1
OSPFV3 Information for VRF default-vrf
------------------------------------Area 300:
Authentication: Not Configured
Active interface(s)attached to this area: ve 1560
Inactive interface(s)attached to this area: None
Number of Area scoped LSAs is 108
Sum of Area LSAs Checksum is 39f394
Statistics of Area 300:
SPF algorithm executed 452 times
SPF last updated: 27731 sec ago
Current SPF node count: 21
Router: 10 Network: 11
Maximum of Hop count to nodes: 5

ve 1570

bytes
Alloc-Fails
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Alloc-Fails
0
0
0
0
0

ve 3680

LSA Key - Rtr:Router Net:Network Inap:InterPrefix Inar:InterRouter
Extn:ASExternal Grp:GroupMembership Typ7:Type7 Link:Link
Iap:IntraPrefix Grc:Grace
Area ID
300
300
300

388

Type
Link
Link
Link

LSID
3073
14374
14374

Adv Rtr
0.0.0.171
0.0.0.150
0.0.0.151

Seq(Hex)
80000036
8000002a
8000000f

Age
1412
1407
1584

Cksum
9065
60a8
7115

Len
56
56
56

Sync
Yes
Yes
Yes

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support l3 ipv6-uc

300
Link 3074
0.0.0.171
80000010 935 f227 56
Yes
300
Link 1
61.163.0.1
800001b7 1263 0668 44
Yes
300
Link 3075
0.0.0.171
80000041 696 5435 56
Yes
300
Rtr 0
0.0.0.170
800035e6 1076 afdc 40
Yes
300
Rtr 0
61.163.0.1
80000293 1089 23be 40
Yes
300
Rtr 0
0.0.0.162
80001dfd 1753 b01f 72
Yes
==========================================================================
BEGIN : ripng summary
CONTEXT : TELNET#1 : RIPng
TIME STAMP : 01:40:55.560 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
IPV6 RIP Route:
--------------IPv6 RIP Routing Table is empty!
==========================================================================
TIME STAMP : 01:40:55.560 Pacific Wed Dec 09 2015
END : ripng summary
TIME TAKEN : 49491 ticks (49491 nsec)
==========================================================================
..
(output truncated)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

389

show tech-support license

show tech-support license
Displays information about the license installed on the device.

Syntax
show tech-support license

Modes
Privileged EXEC mode

Usage Guidelines
The show tech-support license command output includes the following information:
•

License name

•

License ID

•

License type

•

Status of license

•

License period

•

License capacity

Examples
The following example displays sample output from the show tech-support license command.
device# show tech-support license
==========================================================================
BEGIN : show license
CONTEXT : CONSOLE#0 : LICENSE
TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7750-48C/SWR08040q078
==========================================================================
License Information
===================
License record empty
==========================================================================
TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015
END : show license
TIME TAKEN : 1459 ticks (61278 nsec)
==========================================================================

History

390

Release version

Command history

Release 08.0.00a

This command was enhanced to display license information.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support memory

show tech-support memory
Displays debugging information related to memory usage and tracking.

Syntax
show tech-support memory

Modes
Privileged EXEC mode

Examples
device# show tech-support memory
==========================================================================
BEGIN : show memory
CONTEXT : TELNET#1 : DRAM
TIME STAMP : 01:44:00.571 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
MEMORY Related Information :
Stack unit 1:
Total DRAM: 2147483648 bytes
Dynamic memory: 2095140864 bytes total, 1533177856 bytes free, 26% used
Stack unit 2:
Total DRAM: 2147483648 bytes
Dynamic memory: 2095140864 bytes total, 1547497472 bytes free, 26% used
FLASH Related Information :
Stack unit 1:
Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin)
Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin)
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215
Code Flash Free Space = 1825419264
Stack unit 2:
Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin)
Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin)
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215
Code Flash Free Space = 1766633472
==========================================================================
TIME STAMP : 01:44:00.595 Pacific Wed Dec 09 2015
END : show memory
TIME TAKEN : 12207868 ticks (12207868 nsec)
==========================================================================

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

391

show tech-support multicast

show tech-support multicast
Displays debugging information specific to Layer 2 and Layer 3 multicast configurations.

Syntax
show tech-support multicast

Modes
Privileged EXEC mode

Usage Guidelines
This command displays the following debugging information specific to Layer 2 and Layer 3 multicast configurations:

392

•

Multicast VLAN

•

Multicast table

•

Multicast counters

•

Internet Group Management Protocol (IGMP) group

•

Protocol Independent Multicast (PIM) neighbor

•

IP Multicast routing table

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support multicast

Examples
The show tech-support multicast command output resembles the following example.
device# show tech-support multicast
==========================================================================
BEGIN : show running-config
CONTEXT : TELNET#1 : CONFIG
TIME STAMP : 01:44:36.149 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
...
==========================================================================
BEGIN : show ip multicast vlan
CONTEXT : TELNET#1 : MCAST VLAN INFO
TIME STAMP : 01:44:37.536 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Multicast VLAN information
-------------------------Summary of all vlans. Please use "sh ip mu vlan " for details
Version=2, Intervals: Query=125, Group Age=260, Max Resp=10, Other Qr=255
Replication resource sharing: Enabled.
VL500: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports,
router ports: e1/2/1(240) 102.102.102.102,
VL501: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports,
router ports: e2/2/4(200) 100.100.100.100,
VL502: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports,
router ports: e2/2/4(200) 100.100.100.100,
VL503: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports,
router ports: e2/2/4(200) 100.100.100.100,
VL520 no snoop: no global or local config
VL521 no snoop: no global or local config
VL522 no snoop: no global or local config
VL523 no snoop: no global or local config
VL524 no snoop: no global or local config
==========================================================================
TIME STAMP : 01:44:37.638 Pacific Wed Dec 09 2015
END : show ip multicast vlan
TIME TAKEN : 50747990 ticks (50747990 nsec)
==========================================================================
==========================================================================
BEGIN : show ip multicast group
CONTEXT : TELNET#1 : MCAST GROUP
TIME STAMP : 01:44:37.638 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Multicast Group Table information
--------------------------------VL603 : 100 groups, 100 group-port
group
p-port
ST
QR
life mode
source
1
229.20.10.100
e2/1/14
no
no
220
EX
0
2
229.20.10.99
e2/1/14
no
no
220
EX
0
3
229.20.10.98
e2/1/14
no
no
220
EX
0
4
229.20.10.97
e2/1/14
no
no
220
EX
0
5
229.20.10.96
e2/1/14
no
no
220
EX
0
6
229.20.10.95
e2/1/14
no
no
220
EX
0
7
229.20.10.94
e2/1/14
no
no
220
EX
0
8
229.20.10.93
e2/1/14
no
no
220
EX
0
9
229.20.10.92
e2/1/14
no
no
220
EX
0
10
229.20.10.91
e2/1/14
no
no
220
EX
0
11
229.20.10.90
e2/1/14
no
no
220
EX
0
==========================================================================
TIME STAMP : 01:44:38.592 Pacific Wed Dec 09 2015
END : show ip multicast group
TIME TAKEN : 477008236 ticks (477008236 nsec)
==========================================================================
==========================================================================
BEGIN : show ip multicast mcache
CONTEXT : TELNET#1 : MCAST FORWADING CACHE
Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

393

show tech-support multicast

TIME STAMP : 01:44:38.592 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Multicast Cache information
--------------------------Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt is number of SW processed packets
OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output
vlan 500, 0 cache
vlan 501, 0 cache
vlan 502, 0 cache
vlan 503, 0 cache
vlan 551, 0 cache
vlan 552, 0 cache
vlan 601, 0 cache
vlan 602, 0 cache
vlan 603, 500 caches.
1
(* 229.44.14.87) cnt=0
OIF: tag TR(e1/2/1)
age=158s up-time=339s, change=75s ipmc=178 (ref-cnt=1)
2
(* 229.43.13.11) cnt=0
OIF: tag TR(e1/2/1)
...
==========================================================================
BEGIN : sh ip multicast pimsm-snooping
CONTEXT : TELNET#1 : MCAST PIM SM
TIME STAMP : 01:44:40.967 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Multicast PIM-SM Snooping
--------------------------------OIF Info:
TR - OIF Belongs to Trunk/LAG, Primary port is displayed
SG - (s,g) downstream fsm state:
G - (*,g) downstream fsm state:
NI : No Info, J : Join, PP : Prune Pending, CLEAN : cleanup in progress
RPT - (s,g,rpt) downstream fsm state:
NI : No Info, P : Pruned, PP : Prune Pending, Px : Temp step in (*,G)
join processing, PPx : Temp State in (*,G) processing, CLEAN : cleanup
in progress.
==========================================================================
TIME STAMP : 01:44:40.967 Pacific Wed Dec 09 2015
END : sh ip multicast pimsm-snooping
TIME TAKEN : 211008 ticks (211008 nsec)
==========================================================================
(output truncated)

394

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

show tech-support packet-loss

show tech-support packet-loss
Displays packet statistics information that helps in debugging packet loss scenarios.

Syntax
show tech-support packet-loss

Modes
Privileged EXEC mode

Examples
device# show tech-support packet-loss
==========================================================================
BEGIN : show tech-support packet-loss
CONTEXT : TELNET#1 : PP total Tx stats
TIME STAMP : 01:45:57.598 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
PP total stats :
Packet drop count due to congestion per egress port
Port 1/1/3:
Tx packets 365249007
Dropped packets 3242924084
Port 1/1/7:
Tx packets 371914450
Dropped packets 3187749769
Port 1/1/11:
Tx packets 336059517
Dropped packets 3252545377
Port 1/1/15:
Tx packets 418982528
Dropped packets 3301331461
Port 1/2/1*2/2/1:
Tx packets 14885841964
Dropped packets 243005328
Port 1/2/3:
Tx packets 65260351371
Dropped packets 1634560898
Port 1/2/4*2/2/4:
Tx packets 25506560000
Dropped packets 1207903341
Port 1/2/5:
Tx packets 18113571571
Dropped packets 4206342598
Port 1/2/6:
Tx packets 6101236013
Dropped packets 57932094
Port 1/2/7:
Tx packets 11122355161
Dropped packets 4149078862
Port 1/2/8:
Tx packets 2464658796
Dropped packets 54877456
Port 2/1/14:
Tx packets 13591655185
Dropped packets 42664609120
Port 1/2/1*2/2/1:
Tx packets 25329400802
Dropped packets 22875188
Port 1/2/4*2/2/4:
Tx packets 8416112242
Dropped packets 956319407
Port 2/2/5:
Tx packets 3066065916
Dropped packets 57225285
Port 2/2/6:
Tx packets 38759968148
Dropped packets 2714421561
Port 2/2/7:
Tx packets 17976224763
Dropped packets 347143512
Port 2/2/8:
Tx packets 62674173283
Dropped packets 4287682891
==========================================================================
TIME STAMP : 01:45:57.606 Pacific Wed Dec 09 2015
END : show tech-support packet-loss
TIME TAKEN : 4092082 ticks (4092082 nsec)
==========================================================================

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

395

supportsave

supportsave
Use the supportsave utility for collecting logs from the driver, internal libraries, and firmware. The collected logs are shared with
the technical support personnel for investigating issues seen on the device.

Syntax
supportsave { all | custom | infra | l2 | l3 | os | platform | spx | system } { tftp_server_ IP tftp_ server's_ relative_ path_name
[ user_tag ] | display | unit-id unit-number }
supportsave core { tftp_server_ IP tftp_ server's_ relative_ path_name [ user_tag ] | unit-id unit-number }
supportsave cancel

Parameters
all
Collects all supportsave related log files.
core
Collects core logs from all devices.
custom
Executes all commands present in the default and custom commands list and sends the output to the specified TFTP
server address.
infra
Collects stacking related information.
l2
Collects Layer 2 related information.
l3
Collects Layer 3 related information.
os
Collects operating system (OS) related information.
platform
Collects platform related information.
spx
Collects SPX related information.
system
Collects all general commands information.
tftp_server_ IP
Specifies the IP address of the TFTP server.
tftp_ server's_ relative_ path_name
Specifies the file path name of TFTP server relative to TFTP server's default directory to dump supportsave logs. To
specify the default directory itself, use '/'.
user_tag
Specifies the user tag to be added in the supportsave collected file name. Maximum of 10 characters are allowed.

396

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave

display
Displays the supportsave information (except the non-textual output like core files) in the console window.
unit-id unit-number
Collects data from a specific stack or PE unit and the active unit and sends to the TFTP server. If the specified unit-id
and the active unit are same, only the active unit data is collected.
cancel
Cancels supportsave.

Modes
Privileged EXEC mode

Usage Guidelines
The supportsave command has the following advantages over the show tech-support command:
•

Allows you to add additional commands to collect more data.

•

Allows to transfer the collected data to an external server such as Trivial File Transfer Protocol (TFTP) server.

TFTP is disabled by default, if FIPS is enabled. Enable TFTP manually for uploading supportsave data. It is a prerequisite to
have the TFTP server with a write permission and the server must be accessible from the device.
Use the fips policy allow tftp-access command in configuration mode to enable TFTP access while the FIPS is enabled.
Limitations and prerequisites
The following are the limitations and pre-requisites of the supportsave utility:
•

Parallel execution of the supportsave command from two different sessions is not allowed.

•

Parallel execution of the supportsave command and the copy tftp/scp commands is not allowed.

•

It is recommended that you do not run any CLIs when supportsave operation is in progress.

•

Only IPv4 address is supported for the TFTP destination.

•

Only up to 32 commands can be added to the custom command list.

•

Commands are not expanded while adding a command to the custom commands list.

•

Commands added to the custom command list must be privileged EXEC mode MP commands.

•

It is recommended that you do not add any filters with the commands.

•

The supportsave command cannot be added to the custom commands list. Also, the commands which change the
CLI mode (exit, quit, end) and commands which restart the router (switchover, reload, reload-yes) must not be added.

•

Modifying the custom commands list using the supportsave add-cmd or supportsave del-cmd commands is not
allowed while the supportsave data collection is in progress.

•

Time taken by the supportsave command depends on the commands present in the list.

•

The supportsave command does not support collecting crash logs from standby units in a mixed stack.

•

The filename length including tag string must be less than 32 characters.

•

The supportsave custom command denies commands other than show commands, dm commands, and fips show
command.

•

Few show output commands are restricted to display only the first page in the console. This restriction is not applicable
for sending the supportsave command output through file transfer.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

397

supportsave

•

Display option is available for modules like l2, l3, platform, system, infra, custom and all. Non-textual output like core
files are not displayed in the console.

Examples
When the display option is enabled, some of the show commands are restricted to display only the first page. However, the
tftp_server_IP option, transfers the complete command output to the TFTP server.
NOTE
Brocade recommends to use all option to collect complete logs.
To collect all supportsave related logs, enter the supportsave all command as shown in the following example.
device# supportsave all 10.37.2.40 fi/prince/supportsave
Supportsave started. This operation may take several minutes.
Press "A" to abort supportsave operation.
ICX7750-48C
Brocade#.***********************.................................................
.................................................................................
Supportsave completed in 10 seconds

398

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave (SCP)

supportsave (SCP)
Collects logs from different modules and uploads the logs into a remote SCP server.

Syntax
supportsave [ all | cancel | core | custom | info | infra | l2 | l3 | os | platform | spx | system | tag | [ unit-id number | tag ] ]
supportsave [ ipv4address ] [ show ]
supportsave [ add_cust_cmd_index { decimal_value "string" } ]
supportsave [ del_cust_cmd_index { all integer } ]
supportsave [ info disable | info enable | list_cust_cmd | show ]

Command Default
The supportsave functionality is not active.

Parameters
all
Sends all information to the remote SCP server.
cancel
Cancels the supportsave command operation.
core
Sends core information to the remote SCP server.
custom
Sends custom list of information to the remote SCP server.
info
Displays information about the supportsave command. If info is enabled, then the collected commands contain
additional information like BEGIN, CONTEXT, TIME STAMP, HW/SW INFO, and so on.
infra
Sends infrastructure information to the remote SCP server.
l2
Sends Layer 2 information to the remote SCP server.
l3
Sends Layer 3 information to the remote SCP server.
os
Sends Operating System information to the remote SCP server.
platform
Sends platform information to the remote SCP server.
spx
Sends Sequenced Packet Exchange (SPX) information to the remote SCP server.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

399

supportsave (SCP)

system
Sends system information to the remote SCP server.
tag
Appends a text string to the collected file name on the remote SCP server.
unit-id number
The unit number can be any ID present in the stack. The unit ID accepts only one integer. The logs are collected from
the corresponding unit ID and send it to remote server.
show
Displays the amount of percentage executed in the currently executing command process.
ipv4address
Designates the IP address for the remote server.
add_cust_cmd index integer
Adds the given command at the given index in the custom commands list. If there is already a command present at
the index passed, then add operation will fail.
string
The CLI command which is to be added. There is no default value.
integer
Index where the command will be added. Valid range 1 to 32. This is a mandatory parameter, with no default
value.
del_cust_cmd index
Deletes the given command at the given index in the custom commands list. If there is already a command present at
the index passed, then add operation will fail.
all
Removes all configured custom commands from the supportsave list.
integer
Index where the command will be deleted. Valid range 1 to 32. This is a mandatory parameter, with no default
value.
info disable
Disables the header to be displayed for all show commands being executed.
info enable
Enable the header to be displayed for all show commands being executed.
list_cust_cmd
Displays the custom command list.

Modes
Privileged EXEC mode

Usage Guidelines
The collected logs are shared with the technical support personnel for investigating issues seen on the device. Once the
supportsave command is executed, logs are collected and uploaded into the remote SCP server.

400

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave (SCP)

Parallel execution of supportsave command from two different sessions is not allowed. Parallel execution of supportsave
command and the copy tftp or copy scp commands is not allowed.
The supportsave command supports IPv4.
A maximum of 32 commands can be added to the custom command list. Commands are not expanded while adding a
command to the custom commands list. It is recommended not to add any filters with the commands.
Modifying the custom commands list using supportsave add_cust_cmd or supportsave del_cust_cmd is not allowed while
supportsave data collection is in progress.
Time taken by the supportsave commands depends on the commands present in the list and the distance of SCP server.
In order to avoid looping, the supportsave command cannot be added to the custom command list. Also, the commands which
changes the CLI mode (exit, quit) and commands which restart the router (switchover, reload) are not accepted.
The tag string should be less than 11 characters.
The supportsave command uses the outbound SSH session
SCP operations are not allowed while supportsave is in progress.
Cancelling the supportsave command during the file transfer does not cancel the current file transfer. While cancelling the
supportsave command, you must wait for the current file transfer to complete before executing the supportsave command
again.
Supportsave is not High Availability (HA) aware.
The supportsave command aborts when the remote server is terminated. Additionally, when the data is collected from the
remote unit, and if the corresponding unit is powered off, the supportsave command is terminated.
Use the supportsave cancel command to stop supportsave opertations.

Examples
Example of supportsave command collecting Layer 3 information.
device# supportsave l3 scp 10.xx.xx.104
User name:root
Password:Supportsave started. This operation may take several minutes.
Press "Shift-A" to abort supportsave operation.
asethura####################################################################
Connecting to remote host......
Sending data (8192 bytes per dot)
.
SCP transfer from device completed
Connection Closed
Supportsave completed in 1 seconds

Example of supportsave command adding a custom command to the fifth position in the index.
device# supportsave add_cust_cmd index 5 "host-max-num 512"

Example of supportsave command deleting a custom command from the fifth position in the index.
device# supportsave del_cust_cmd index 5

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

401

supportsave (SCP)

History

402

Release version

Command history

08.0.61

This command was introduced.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave add_cust_cmd index

supportsave add_cust_cmd index
Adds a run-time executable command into the custom module at a particular index of 32 characters long (maximum of 32
characters are allowed) during the run time.

Syntax
supportsave add_cust_cmd index index_number “cli string”

Parameters
index_number
Specifies the index in the custom commands list where an additional command need to be added. The valid range is
from 1 through 32.
cli string
Specifies the commands to be added to the custom commands list.

Modes
Privileged EXEC mode

Examples
device# supportsave add_cust_cmd index 1 "show chassis"

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

403

supportsave del_cust_cmd all

supportsave del_cust_cmd all
Deletes all the custom module commands.

Syntax
supportsave del_cust_cmd all

Modes
Privileged EXEC mode

404

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave del_cust_cmd index

supportsave del_cust_cmd index
Deletes a command from the custom module at a particular index during the run time.

Syntax
supportsave del_cust_cmd index index_number

Parameters
index_number
Specifies the index in the custom commands list where an additional command need to be removed. The valid range
is from 1 through 32.

Modes
Privileged EXEC mode

Examples
device# supportsave add_cust_cmd index 1 "show chassis"

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

405

supportsave info disable

supportsave info disable
Disables the header to be displayed for all supportsave and show tech-support commands being executed on CLI.

Syntax
supportsave info disable

Modes
Privileged EXEC mode

406

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave info enable

supportsave info enable
display BEGIN headers.

Syntax
supportsave info enable

Modes
Privileged EXEC mode

Usage Guidelines
By default, the supportsave command outputs display BEGIN headers. and show tech-support command outputs display
both BEGIN and END headers. The commands under show tech command, which is a part of supportsave output, will have
both BEGIN and END headers.
You can disable the header display by using the supportsave info disable command. You can use the supportsave info enable
command to re-enable the header display. Even if supportsave info enable command is issued, other show commands do not
display the headers.
The header format is modified to include the following information:
•

BEGIN - Indicates the command that will begin execution next.

•

CONTEXT - Indicates in which session the command is executed.
If Supportsave command is issued in more than one terminal, the respective terminal information is displayed in the
CONTEXT field.

•

TIME STAMP - A time stamp, with millisecond granularity, helps to determine time difference between separate runs
of the same command. If NTP or local clock is not set in a device, then header displays Epoch time in the
TIMESTAMP field. Epoch time is a universal time which starts from Jan 1, 1970. Therefore, for Linux platforms, the
Epoch time format is 00:00:00.000 GMT+00 Thu Jan 01 1970. For non-Linux platforms, the Epoch time format is
Jan 01 00:00:00.000.

•

HW/SW INFO - Indicates the hardware and software version information of the device.

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

407

supportsave info enable

Examples
The following sample output of supportsave all display command shows the modified header format.
device# supportsave info enable
device# supportsave all display
Supportsave started. This operation may take several minutes.
Press "A" to abort supportsave operation.
==========================================================================
BEGIN : show flash
CONTEXT : TELNET#1 : show flash
TIME STAMP : 01:47:24.377 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Stack unit 1:
Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin)
Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin)
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215
Code Flash Free Space = 1825419264
Stack unit 2:
Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin)
Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin)
Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215
Code Flash Free Space = 1766633472
telnet@ACC-SICA-171#
===========END OF A COMMAND===========
104126_000100
===========show module===========
==========================================================================
BEGIN : show module
CONTEXT : TELNET#1 : show module
TIME STAMP : 01:47:24.382 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Module
Status Ports Starting MAC
U1:M1 ICX7250-24 24-port Management Module
OK
24
cc4e.24b4.88b0
U1:M2 ICX7250-SFP-Plus 8-port 80G Module
OK
8
cc4e.24b4.88b0
U2:M1 ICX7250-24 24-port Management Module
OK
24
cc4e.24b4.81f0
U2:M2 ICX7250-SFP-Plus 8-port 80G Module
OK
8
cc4e.24b4.88b0
telnet@ACC-SICA-171#
===========END OF A COMMAND===========
104126_000100
===========show chassis===========
==========================================================================
BEGIN : show chassis
CONTEXT : TELNET#1 : show chassis
TIME STAMP : 01:47:24.384 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
The stack unit 1 chassis info:
Power supply 1 (AC - Regular) present, status ok
Power supply 2 not present
Fan ok, speed (auto): [[1]]<->2
Fan controlled temperature: 84.5 deg-C
Fan speed switching temperature thresholds:
Speed 1: NM<----->98
deg-C
Speed 2:
67<----->105 deg-C (shutdown)
Fan 1 Air Flow Direction: Front to Back
Slot 1 Current Temperature: 84.5 deg-C (Sensor 1)
Slot 2 Current Temperature: NA
Warning level.......: 100.0 deg-C
Shutdown level......: 105.0 deg-C
Boot Prom MAC : cc4e.24b4.88b0
Management MAC: cc4e.24b4.88b0
The stack unit 2 chassis info:

408

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave info enable

Power supply 1 (AC - Regular) present, status ok
Power supply 2 not present
Fan ok, speed (auto): [[1]]<->2
Fan controlled temperature: 81.8 deg-C
Fan speed switching temperature thresholds:
Speed 1: NM<----->98
deg-C
Speed 2:
67<----->105 deg-C (shutdown)
Fan 1 Air Flow Direction:Front to Back
Slot 1 Current Temperature: 82.4 deg-C (Sensor 1)
Slot 2 Current Temperature: NA
Warning level.......: 100.0 deg-C
Shutdown level......: 105.0 deg-C
Boot Prom MAC : cc4e.24b4.81f0
===========END OF A COMMAND===========
104126_000100
===========show files===========
==========================================================================
BEGIN : show files
CONTEXT : TELNET#1 : show files
TIME STAMP : 01:47:24.429 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Type
Size
Name
---------------------F
22418510 primary
F
24128807 secondary
F
256 primary.sig
F
7138 script.log_000347_000000_SPR08040q017_cc4e.24b4.88b0.txt
F
13805 startup-config.backup
F
256 bootrom.sig
F
393 stacking.boot
F
13297 startup-config.old
F
13297 startup-config.txt
F
94 dhcpsnoop_data
F
1576 $$ssh8rsahost.key
F
256 secondary.sig
46597685 bytes 12 File(s) in FI root
1825419264 bytes free in FI root
telnet@ACC-SICA-171#
===========END OF A COMMAND===========
104126_000100
===========show memory===========
==========================================================================
BEGIN : show memory
CONTEXT : TELNET#1 : show memory
TIME STAMP : 01:47:24.444 Pacific Wed Dec 09 2015
HW/SW INFO : ICX7250-24/SPR08040b1
==========================================================================
Stack unit 1:
Total DRAM: 2147483648 bytes
Dynamic memory: 2095140864 bytes total, 1530638336 bytes free, 26% used
Stack unit 2:
Total DRAM: 2147483648 bytes
Dynamic memory: 2095140864 bytes total, 1547481088 bytes free, 26% used
telnet@ACC-SICA-171#
===========END OF A COMMAND===========
104126_000100
===========show media===========
..
(output truncated)

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

409

supportsave list_cust_cmd

supportsave list_cust_cmd
Displays all commands present in the custom commands list.

Syntax
supportsave list_cust_cmd

Modes
Privileged EXEC mode

410

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

supportsave show

supportsave show
Collects and displays debugging information related to stacking configurations.

Syntax
supportsave show [ show | cancel ]

Parameters
show
Displays the progress of the log collection that has been executed on a terminal other than the one on which the
supportsave command is executed.
cancel
Cancels the current log collection that has been executed on a terminal other than the one on which the supportsave
command is executed.

Modes
Privileged EXEC mode

Examples
The following is the sample output from the supportsave show command.
device# supportsave show
Supportsave is executing commands: 19% completed
device# supportsave show
Supportsave is executing commands: 34% completed
device# supportsave show
Supportsave is executing commands: 60% completed
device# supportsave show.
Supportsave is executing commands: 100% completed
Supportsave is transporting files...

Brocade FastIron Debug Command Reference, 08.0.61
Part Number: 53-1005198-01

411



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : Yes
Author                          : Brocade Communications Systems, Inc.
Create Date                     : 2017:06:26 03:45:31-08:00
Modify Date                     : 2017:06:26 11:48:48+01:00
Subject                         : Alphabetical listing of debug CLI syntax with descriptions, command modes, and examples for FastIron 8.0.61. Includes debug, show tech-support, and supportsave commands.
Language                        : EN-US
XMP Toolkit                     : Adobe XMP Core 5.4-c006 80.159825, 2016/09/16-03:31:08
Format                          : application/pdf
Creator                         : Brocade Communications Systems, Inc.
Description                     : Alphabetical listing of debug CLI syntax with descriptions, command modes, and examples for FastIron 8.0.61. Includes debug, show tech-support, and supportsave commands.
Title                           : Brocade FastIron Debug Command Reference, 08.0.61
Creator Tool                    : AH XSL Formatter V6.2 MR12 for Windows (x64) : 6.2.14.22278 (2015/10/30 10:00JST)
Metadata Date                   : 2017:06:26 11:48:48+01:00
Producer                        : Antenna House PDF Output Library 6.2.726 (Windows (x64))
Trapped                         : False
Document ID                     : uuid:f266ed37-919f-4b91-a3a5-7fff657f1572
Instance ID                     : uuid:b7351af0-428f-44ab-a42a-cc7749b85472
Page Mode                       : UseOutlines
Page Count                      : 411
EXIF Metadata provided by EXIF.tools

Navigation menu