Ruckus Brocade FastIron Debug Command Reference, 08.0.61 Fast Iron Reference Guide 08061 Debugcommandref
FastIron 08.0.61 Debug Command Reference Guide fastiron-08061-debugcommandref
2017-12-12
User Manual: Ruckus FastIron 08.0.61 Debug Command Reference Guide
Open the PDF directly: View PDF .
Page Count: 411
Download | |
Open PDF In Browser | View PDF |
DIAGNOSTIC GUIDE Brocade FastIron Debug Command Reference, 08.0.61 Supporting FastIron Software Release 08.0.61 Part Number: 53-1005198-01 Publication Date: 30 June 2017 © 2017, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/ brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd. 2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Contents Preface................................................................................................................................................................................................................................ 11 Document conventions.........................................................................................................................................................................................................................11 Notes, cautions, and warnings..................................................................................................................................................................................................11 Text formatting conventions...................................................................................................................................................................................................... 11 Command syntax conventions.................................................................................................................................................................................................12 Brocade resources..................................................................................................................................................................................................................................12 Document feedback.............................................................................................................................................................................................................................. 12 Contacting Brocade Technical Support......................................................................................................................................................................................... 13 Brocade customers.......................................................................................................................................................................................................................13 Brocade OEM customers.......................................................................................................................................................................................................... 13 About This Document..................................................................................................................................................................................................... 15 What's new in this document............................................................................................................................................................................................................. 15 New and modified commands.................................................................................................................................................................................................15 New commands............................................................................................................................................................................................................................. 15 Modified commands.................................................................................................................................................................................................................... 15 Supported hardware...............................................................................................................................................................................................................................15 Using diagnostic commands......................................................................................................................................................................................... 17 Using debug commands..................................................................................................................................................................................................................... 17 Generic debug commands................................................................................................................................................................................................................. 17 Brief and detail debug options................................................................................................................................................................................................. 18 Disabling debug commands.....................................................................................................................................................................................................18 Debug Commands A - G................................................................................................................................................................................................ 19 debug 802.1w all_802_1w_events...............................................................................................................................................................................................19 debug 802.1w messages...................................................................................................................................................................................................................21 debug 802.1w timer............................................................................................................................................................................................................................. 23 debug 802.1w transitions................................................................................................................................................................................................................... 24 debug acl log.............................................................................................................................................................................................................................................25 debug all......................................................................................................................................................................................................................................................26 debug cluster all.......................................................................................................................................................................................................................................27 debug cluster ccp....................................................................................................................................................................................................................................30 debug cluster client-auto-detect...................................................................................................................................................................................................... 32 debug cluster config.............................................................................................................................................................................................................................. 33 debug cluster fsm................................................................................................................................................................................................................................... 34 debug cluster intf-mac..........................................................................................................................................................................................................................37 debug cluster mdup...............................................................................................................................................................................................................................38 debug cluster show................................................................................................................................................................................................................................ 41 debug cluster stp.....................................................................................................................................................................................................................................42 debug destination....................................................................................................................................................................................................................................43 debug dhcp-client alarms....................................................................................................................................................................................................................44 debug dhcp-client events.................................................................................................................................................................................................................... 45 debug dot1x hitless................................................................................................................................................................................................................................48 debug dot1x-events.............................................................................................................................................................................................................................. 49 debug dot1x-filter................................................................................................................................................................................................................................... 50 debug dot1x-misc.................................................................................................................................................................................................................................. 51 debug dot1x-mka ..................................................................................................................................................................................................................................52 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 3 debug dot1x-packets............................................................................................................................................................................................................................ 53 debug dot1x-timers............................................................................................................................................................................................................................... 54 debug gvrp packets................................................................................................................................................................................................................................55 Debug Commands H - P................................................................................................................................................................................................ 57 debug hw.................................................................................................................................................................................................................................................... 57 debug igmp-snoop add-del-oif all..................................................................................................................................................................................................58 debug igmp-snoop clear..................................................................................................................................................................................................................... 59 debug igmp-snoop error..................................................................................................................................................................................................................... 60 debug igmp-snoop group...................................................................................................................................................................................................................61 debug igmp-snoop level......................................................................................................................................................................................................................62 debug igmp-snoop packet................................................................................................................................................................................................................. 63 debug igmp-snoop port ethernet.................................................................................................................................................................................................... 64 debug igmp-snoop show.................................................................................................................................................................................................................... 65 debug igmp-snoop source................................................................................................................................................................................................................. 66 debug igmp-snoop timer.................................................................................................................................................................................................................... 67 debug igmp-snoop vlan.......................................................................................................................................................................................................................68 debug ikev2...............................................................................................................................................................................................................................................69 debug ip arp.............................................................................................................................................................................................................................................. 82 debug ip arp inspection........................................................................................................................................................................................................................ 83 debug ip arp inspection........................................................................................................................................................................................................................ 84 debug ip arp inspection........................................................................................................................................................................................................................ 85 debug ip bgp.............................................................................................................................................................................................................................................86 debug ip bgp dampening.................................................................................................................................................................................................................... 87 debug ip bgp events.............................................................................................................................................................................................................................. 88 debug ip bgp graceful-restart............................................................................................................................................................................................................ 89 debug ip bgp keepalives...................................................................................................................................................................................................................... 90 debug ip bgp updates........................................................................................................................................................................................................................... 91 debug ip dhcp-snooping .................................................................................................................................................................................................................... 92 debug ip gre keepalive.......................................................................................................................................................................................................................... 93 debug ip gre log.......................................................................................................................................................................................................................................94 debug ip gre packet................................................................................................................................................................................................................................96 debug ip icmp events............................................................................................................................................................................................................................ 97 debug ip icmp events............................................................................................................................................................................................................................ 98 debug ip icmp events............................................................................................................................................................................................................................ 99 debug ip icmp packets.......................................................................................................................................................................................................................100 debug ip igmp add-del-oif...............................................................................................................................................................................................................101 debug ip igmp add-del-oif...............................................................................................................................................................................................................105 debug ip igmp add-del-oif all.........................................................................................................................................................................................................109 debug ip igmp add-del-oif all.........................................................................................................................................................................................................112 debug ip igmp add-del-oif stack...................................................................................................................................................................................................115 debug ip igmp clear............................................................................................................................................................................................................................ 118 debug ip igmp down-port................................................................................................................................................................................................................ 119 debug ip igmp enable........................................................................................................................................................................................................................ 122 debug ip igmp error............................................................................................................................................................................................................................ 123 debug ip igmp group..........................................................................................................................................................................................................................124 debug ip igmp level.............................................................................................................................................................................................................................125 debug ip igmp packet.........................................................................................................................................................................................................................129 debug ip igmp physical-port ethernet.........................................................................................................................................................................................132 debug ip igmp prime-port ethernet............................................................................................................................................................................................. 133 debug ip igmp protocol..................................................................................................................................................................................................................... 134 4 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp proxy clear................................................................................................................................................................................................................136 debug ip igmp proxy error................................................................................................................................................................................................................137 debug ip igmp proxy event.............................................................................................................................................................................................................. 138 debug ip igmp proxy packet............................................................................................................................................................................................................ 139 debug ip igmp proxy rx......................................................................................................................................................................................................................140 debug ip igmp proxy show...............................................................................................................................................................................................................141 debug ip igmp proxy tx......................................................................................................................................................................................................................142 debug ip igmp proxy vrf.................................................................................................................................................................................................................... 143 debug ip igmp rx.................................................................................................................................................................................................................................. 144 debug ip igmp show........................................................................................................................................................................................................................... 145 debug ip igmp source........................................................................................................................................................................................................................ 146 debug ip igmp timer........................................................................................................................................................................................................................... 147 debug ip igmp tx.................................................................................................................................................................................................................................. 148 debug ip igmp vrf.................................................................................................................................................................................................................................149 debug ip msdp...................................................................................................................................................................................................................................... 150 debug ip ntp........................................................................................................................................................................................................................................... 152 debug ip ospf.........................................................................................................................................................................................................................................155 debug ip ospf adj..................................................................................................................................................................................................................................156 debug ip ospf all-vrfs route..............................................................................................................................................................................................................157 debug ip ospf error..............................................................................................................................................................................................................................158 debug ip ospf event............................................................................................................................................................................................................................ 159 debug ip ospf flood............................................................................................................................................................................................................................. 160 debug ip ospf graceful-restart........................................................................................................................................................................................................ 161 debug ip ospf log-empty-lsa.......................................................................................................................................................................................................... 163 debug ip ospf log-empty-lsa.......................................................................................................................................................................................................... 165 debug ip ospf lsa-generation..........................................................................................................................................................................................................167 debug ip ospf lsa-id............................................................................................................................................................................................................................ 168 debug ip ospf max-metric................................................................................................................................................................................................................169 debug ip ospf packet.......................................................................................................................................................................................................................... 170 debug ip ospf retransmission..........................................................................................................................................................................................................174 debug ip ospf route............................................................................................................................................................................................................................. 175 debug ip ospf spf................................................................................................................................................................................................................................. 176 debug ip ospf vrf.................................................................................................................................................................................................................................. 177 debug ip pim.......................................................................................................................................................................................................................................... 178 debug ip pim add-del-oif................................................................................................................................................................................................................. 179 debug ip pim bootstrap..................................................................................................................................................................................................................... 180 debug ip pim clear............................................................................................................................................................................................................................... 181 debug ip pim control-source...........................................................................................................................................................................................................182 debug ip pim event..............................................................................................................................................................................................................................183 debug ip pim group.............................................................................................................................................................................................................................184 debug ip pim join-prune................................................................................................................................................................................................................... 186 debug ip pim level................................................................................................................................................................................................................................187 debug ip pim nbr-change.................................................................................................................................................................................................................190 debug ip pim packet........................................................................................................................................................................................................................... 191 debug ip pim physical-port ethernet .......................................................................................................................................................................................... 192 debug ip pim regproc ........................................................................................................................................................................................................................193 debug ip pim rp ................................................................................................................................................................................................................................... 194 debug ip pim show .............................................................................................................................................................................................................................195 debug ip pim source ..........................................................................................................................................................................................................................196 debug ip pim vrf .................................................................................................................................................................................................................................. 199 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 5 debug ip pimsm-snoop.................................................................................................................................................................................................................... 200 debug ip source guard....................................................................................................................................................................................................................... 202 debug ip vrrp packet v6.................................................................................................................................................................................................................... 203 debug ip vrrp vrid.................................................................................................................................................................................................................................204 debug ip web......................................................................................................................................................................................................................................... 205 debug ip web-ssl..................................................................................................................................................................................................................................206 debug ipsec all...................................................................................................................................................................................................................................... 207 debug ipsec esp................................................................................................................................................................................................................................... 208 debug ipsec in....................................................................................................................................................................................................................................... 209 debug ipsec out.................................................................................................................................................................................................................................... 210 debug ipsec policy...............................................................................................................................................................................................................................211 debug ipv6..............................................................................................................................................................................................................................................212 debug ipv6 dhcp relay....................................................................................................................................................................................................................... 213 debug ipv6 dhcp snooping..............................................................................................................................................................................................................214 debug ipv6 mld.....................................................................................................................................................................................................................................215 debug ipv6 mld add-del-oif............................................................................................................................................................................................................216 debug ipv6 mld add-del-oif all...................................................................................................................................................................................................... 219 debug ipv6 mld add-del-oif stack................................................................................................................................................................................................220 debug ipv6 mld clear..........................................................................................................................................................................................................................222 debug ipv6 mld detail........................................................................................................................................................................................................................ 223 debug ipv6 mld enable......................................................................................................................................................................................................................224 debug ipv6 mld error..........................................................................................................................................................................................................................225 debug ipv6 mld group....................................................................................................................................................................................................................... 226 debug ipv6 mld level.......................................................................................................................................................................................................................... 227 debug ipv6 mld mcache-group.....................................................................................................................................................................................................230 debug ipv6 mld phy-port ethernet............................................................................................................................................................................................... 232 debug ipv6 mld prime-port ethernet...........................................................................................................................................................................................233 debug ipv6 mld protocol...................................................................................................................................................................................................................235 debug ipv6 mld rx................................................................................................................................................................................................................................237 debug ipv6 mld show.........................................................................................................................................................................................................................238 debug ipv6 mld source......................................................................................................................................................................................................................239 debug ipv6 mld timer.........................................................................................................................................................................................................................240 debug ipv6 mld tx................................................................................................................................................................................................................................241 debug ipv6 mld vlan........................................................................................................................................................................................................................... 242 debug ipv6 mld vrf..............................................................................................................................................................................................................................243 debug ipv6 nd....................................................................................................................................................................................................................................... 244 debug ipv6 ospf ipsec....................................................................................................................................................................................................................... 245 debug ipv6 ospf ism...........................................................................................................................................................................................................................246 debug ipv6 ospf ism-events........................................................................................................................................................................................................... 247 debug ipv6 ospf ism-status............................................................................................................................................................................................................ 248 debug ipv6 ospf lsa.............................................................................................................................................................................................................................249 debug ipv6 ospf lsa-flooding..........................................................................................................................................................................................................252 debug ipv6 ospf lsa-generation.....................................................................................................................................................................................................253 debug ipv6 ospf lsa-install...............................................................................................................................................................................................................255 debug ipv6 ospf lsa-inter-area.......................................................................................................................................................................................................256 debug ipv6 ospf lsa-refresh............................................................................................................................................................................................................ 257 debug ipv6 ospf nsm......................................................................................................................................................................................................................... 259 debug ipv6 ospf nsm-events..........................................................................................................................................................................................................260 debug ipv6 ospf nsm-status...........................................................................................................................................................................................................261 debug ipv6 ospf packet.....................................................................................................................................................................................................................262 6 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf packet-dd............................................................................................................................................................................................................. 264 debug ipv6 ospf packet-hello.........................................................................................................................................................................................................265 debug ipv6 ospf packet-lsa-ack....................................................................................................................................................................................................266 debug ipv6 ospf packet-lsa-req.................................................................................................................................................................................................... 267 debug ipv6 ospf packet-lsa-update.............................................................................................................................................................................................268 debug ipv6 ospf route........................................................................................................................................................................................................................269 debug ipv6 ospf route-calc-external........................................................................................................................................................................................... 270 debug ipv6 ospf route-calc-inter-area........................................................................................................................................................................................271 debug ipv6 ospf route-calc-intra-area........................................................................................................................................................................................272 debug ipv6 ospf route-calc-spf..................................................................................................................................................................................................... 273 debug ipv6 ospf route-install..........................................................................................................................................................................................................274 debug ipv6 pim bootstrap................................................................................................................................................................................................................275 debug ipv6 pim clear..........................................................................................................................................................................................................................276 debug ipv6 pim event........................................................................................................................................................................................................................ 277 debug ipv6 pim group....................................................................................................................................................................................................................... 278 debug ipv6 pim join-prune.............................................................................................................................................................................................................. 279 debug ipv6 pim nbr-change........................................................................................................................................................................................................... 280 debug ipv6 pim packet......................................................................................................................................................................................................................281 debug ipv6 pim regproc....................................................................................................................................................................................................................282 debug ipv6 pim rp............................................................................................................................................................................................................................... 283 debug ipv6 pim show.........................................................................................................................................................................................................................284 debug ipv6 pim source......................................................................................................................................................................................................................285 debug ipv6 pimsm-snoop...............................................................................................................................................................................................................286 debug ipv6 raguard.............................................................................................................................................................................................................................288 debug ipv6 rip events.........................................................................................................................................................................................................................289 debug ipv6 rip receive........................................................................................................................................................................................................................290 debug license.........................................................................................................................................................................................................................................291 debug loop-detect...............................................................................................................................................................................................................................292 debug loop-detect level.................................................................................................................................................................................................................... 293 debug mac..............................................................................................................................................................................................................................................294 debug mac-authentication............................................................................................................................................................................................................... 295 debug mecid.......................................................................................................................................................................................................................................... 297 debug mld-snoop add-del-oif all................................................................................................................................................................................................. 299 debug mld-snoop clear.....................................................................................................................................................................................................................300 debug mld-snoop error.....................................................................................................................................................................................................................301 debug mld-snoop group.................................................................................................................................................................................................................. 302 debug ip ssh...........................................................................................................................................................................................................................................303 debug ip sync........................................................................................................................................................................................................................................ 304 debug ip tcp............................................................................................................................................................................................................................................305 debug ip tcp driver...............................................................................................................................................................................................................................308 debug ip tcp memory.........................................................................................................................................................................................................................309 debug ip tcp packet.............................................................................................................................................................................................................................310 debug ip tcp sack................................................................................................................................................................................................................................. 311 debug ip tcp transactions..................................................................................................................................................................................................................312 debug ip udp..........................................................................................................................................................................................................................................313 debug ip vrrp events........................................................................................................................................................................................................................... 314 debug ip vrrp packet........................................................................................................................................................................................................................... 315 debug ip vrrp packet v4.................................................................................................................................................................................................................... 316 debug mld-snoop mcache-group................................................................................................................................................................................................317 debug mld-snoop packet................................................................................................................................................................................................................. 318 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 7 debug mld-snoop show....................................................................................................................................................................................................................319 debug mld-snoop timer....................................................................................................................................................................................................................320 debug mstp bpdu................................................................................................................................................................................................................................ 321 debug mstp events..............................................................................................................................................................................................................................323 debug mstp level..................................................................................................................................................................................................................................324 debug mstp msti.................................................................................................................................................................................................................................. 326 debug mstp port-level....................................................................................................................................................................................................................... 328 debug mstp show................................................................................................................................................................................................................................ 329 debug mstp state................................................................................................................................................................................................................................. 330 debug mstp verbose...........................................................................................................................................................................................................................331 debug packet-capture........................................................................................................................................................................................................................332 debug packet-capture filter..............................................................................................................................................................................................................333 debug packet-capture filter none.................................................................................................................................................................................................. 335 debug packet-capture filter show..................................................................................................................................................................................................336 debug packet-capture mode...........................................................................................................................................................................................................337 debug port hw-state........................................................................................................................................................................................................................... 338 debug port port.....................................................................................................................................................................................................................................339 debug port ten-gig.............................................................................................................................................................................................................................. 342 debug port up-down.......................................................................................................................................................................................................................... 343 debug port vlan.....................................................................................................................................................................................................................................345 debug pp-bum-trunk-hash............................................................................................................................................................................................................. 347 debug pp-trunk-hash......................................................................................................................................................................................................................... 349 Debug Commands Q - Z............................................................................................................................................................................................. 351 debug rip database..............................................................................................................................................................................................................................351 debug rip events................................................................................................................................................................................................................................... 352 debug sflow problems....................................................................................................................................................................................................................... 353 debug span all_802_1d_events...................................................................................................................................................................................................354 debug span config...............................................................................................................................................................................................................................355 debug span timers...............................................................................................................................................................................................................................356 debug stack pe control...................................................................................................................................................................................................................... 357 debug stack pe mac............................................................................................................................................................................................................................358 debug stack pe topo........................................................................................................................................................................................................................... 359 debug system campram................................................................................................................................................................................................................... 360 debug system optics.......................................................................................................................................................................................................................... 361 debug system poll............................................................................................................................................................................................................................... 362 debug web events................................................................................................................................................................................................................................363 debug webauth timers....................................................................................................................................................................................................................... 364 debug webauth events.......................................................................................................................................................................................................................365 show debug............................................................................................................................................................................................................................................ 366 show tech-support.............................................................................................................................................................................................................................. 367 show tech-support acl....................................................................................................................................................................................................................... 373 show tech-support cluster............................................................................................................................................................................................................... 375 show tech-support cpu..................................................................................................................................................................................................................... 377 show tech-support l2.........................................................................................................................................................................................................................380 show tech-support l3 ipv4-uc........................................................................................................................................................................................................383 show tech-support l3 ipv6-uc........................................................................................................................................................................................................386 show tech-support license...............................................................................................................................................................................................................390 show tech-support memory........................................................................................................................................................................................................... 391 show tech-support multicast...........................................................................................................................................................................................................392 show tech-support packet-loss..................................................................................................................................................................................................... 395 8 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave............................................................................................................................................................................................................................................396 supportsave (SCP)...............................................................................................................................................................................................................................399 supportsave add_cust_cmd index................................................................................................................................................................................................403 supportsave del_cust_cmd all........................................................................................................................................................................................................404 supportsave del_cust_cmd index................................................................................................................................................................................................. 405 supportsave info disable................................................................................................................................................................................................................... 406 supportsave info enable.................................................................................................................................................................................................................... 407 supportsave list_cust_cmd.............................................................................................................................................................................................................. 410 supportsave show................................................................................................................................................................................................................................411 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 9 10 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Preface • • • • Document conventions................................................................................................................................................................................... 11 Brocade resources............................................................................................................................................................................................ 12 Document feedback......................................................................................................................................................................................... 12 Contacting Brocade Technical Support....................................................................................................................................................13 Document conventions The document conventions describe text formatting conventions, command syntax conventions, and important notice formats used in Brocade technical documentation. Notes, cautions, and warnings Notes, cautions, and warning statements may be used in this document. They are listed in the order of increasing severity of potential hazards. NOTE A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference to related information. ATTENTION An Attention statement indicates a stronger note, for example, to alert you when traffic might be interrupted or the device might reboot. CAUTION A Caution statement alerts you to situations that can be potentially hazardous to you or cause damage to hardware, firmware, software, or data. DANGER A Danger statement indicates conditions or situations that can be potentially lethal or extremely hazardous to you. Safety labels are also attached directly to products to warn of these conditions or situations. Text formatting conventions Text formatting conventions such as boldface, italic, or Courier font may be used to highlight specific words or phrases. Format Description bold text Identifies command names. Identifies keywords and operands. Identifies the names of GUI elements. Identifies text to enter in the GUI. italic text Identifies emphasis. Identifies variables. Identifies document titles. Courier font Identifies CLI output. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 11 Brocade resources Format Description Identifies command syntax examples. Command syntax conventions Bold and italic text identify command syntax components. Delimiters and operators define groupings of parameters and their logical relationships. Convention Description bold text Identifies command names, keywords, and command options. italic text Identifies a variable. value In Fibre Channel products, a fixed value provided as input to a command option is printed in plain text, for example, --show WWN. [] Syntax components displayed within square brackets are optional. Default responses to system prompts are enclosed in square brackets. {x|y|z} A choice of required parameters is enclosed in curly brackets separated by vertical bars. You must select one of the options. In Fibre Channel products, square brackets may be used instead for this purpose. x|y A vertical bar separates mutually exclusive elements. <> Nonprinting characters, for example, passwords, are enclosed in angle brackets. ... Repeat the previous element, for example, member[member...]. \ Indicates a “soft” line break in command examples. If a backslash separates two lines of a command input, enter the entire command at the prompt without the backslash. Brocade resources Visit the Brocade website to locate related documentation for your product and additional Brocade resources. White papers, data sheets, and the most recent versions of Brocade software and hardware manuals are available at www.brocade.com. Product documentation for all supported releases is available to registered users at MyBrocade. Click the Support tab and select Document Library to access product documentation on MyBrocade or www.brocade.com. You can locate documentation by product or by operating system. Release notes are bundled with software downloads on MyBrocade. Links to software downloads are available on the MyBrocade landing page and in the Document Library. Document feedback Quality is our first concern at Brocade, and we have made every effort to ensure the accuracy and completeness of this document. However, if you find an error or an omission, or you think that a topic needs further development, we want to hear from you. You can provide feedback in two ways: • Through the online feedback form in the HTML documents posted on www.brocade.com • By sending your feedback to documentation@brocade.com Provide the publication title, part number, and as much detail as possible, including the topic heading and page number if applicable, as well as your suggestions for improvement. 12 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Contacting Brocade Technical Support Contacting Brocade Technical Support As a Brocade customer, you can contact Brocade Technical Support 24x7 online or by telephone. Brocade OEM customers should contact their OEM/solution provider. Brocade customers For product support information and the latest information on contacting the Technical Assistance Center, go to www.brocade.com and select Support. If you have purchased Brocade product support directly from Brocade, use one of the following methods to contact the Brocade Technical Assistance Center 24x7. Online Telephone Preferred method of contact for non-urgent issues: Required for Sev 1-Critical and Sev 2-High issues: • Case management through the MyBrocade portal. • Continental US: 1-800-752-8061 • Quick Access links to Knowledge Base, Community, Document Library, Software Downloads and Licensing tools • Europe, Middle East, Africa, and Asia Pacific: +800-AT FIBREE (+800 28 34 27 33) • Toll-free numbers are available in many countries. • For areas unable to access a toll-free number: +1-408-333-6061 Brocade OEM customers If you have purchased Brocade product support from a Brocade OEM/solution provider, contact your OEM/solution provider for all of your product support needs. • OEM/solution providers are trained and certified by Brocade to support Brocade® products. • Brocade provides backline support for issues that cannot be resolved by the OEM/solution provider. • Brocade Supplemental Support augments your existing OEM support contract, providing direct access to Brocade expertise. For more information, contact Brocade or your OEM. • For questions regarding service levels and response times, contact your OEM/solution provider. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 13 14 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 About This Document • • What's new in this document........................................................................................................................................................................ 15 Supported hardware......................................................................................................................................................................................... 15 What's new in this document Information has been added or updated to reflect new or modified debug commands for FastIron features or enhancements. In this release of the Brocade FastIron debug command reference, not all debug commands supported on the FastIron devices are represented. For legacy commands the history table is not shown unless an update has been added in recent releases. NOTE In addition to debug commands that are new or modified for this release, numerous debug commands for existing FastIron features have been added that were previously described only in FastIron configuration guides. New and modified commands The following new and modified commands have been added in the FastIron 08.0.61 release. New commands • supportsave (SCP) Modified commands No debug commands have been modified in this release. Supported hardware This guide supports the following Brocade products: • Brocade ICX 7750 Series • Brocade ICX 7450 Series • Brocade ICX 7250 Series • Ruckus ICX 7150 Series For information about what models and modules these devices support, see the hardware installation guide for the specific product family. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 15 16 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Using diagnostic commands • • Using debug commands................................................................................................................................................................................17 Generic debug commands............................................................................................................................................................................17 Using debug commands This chapter describes how to use debug commands to monitor and troubleshoot the device configurations. The debug commands are accessible from the Privileged EXEC mode in the Brocade command line interface (CLI). Most debug commands can be configured to send output to a specified destination. When enabled, the debug commands can noticeably affect system performance. Many debug commands are specifically designed to be used in conjunction with calls to Brocade Technical Support. If you report a problem, the support engineer may ask you to execute one or more of the debug commands described in this guide. ATTENTION Some debug commands report information about internal hardware settings and registers, which is relevant primarily to the Brocade engineering staff. These commands are not described in this document. Generic debug commands The following generic debug commands perform functions related to all debugging actions: • debug ? - Generates a list of debug options. • show debug - Shows all enabled debug settings. • debug destination - Allows you to select an output destination: Telnet, SSH, console, or logging (default). debug ? Syntax: debug ? The debug ? command generates a list of available debug variables. ATTENTION Many first-level variables have their own variable subsets. When you enter a debug command, the system indicates that there are additional variables available and you have entered an incomplete command. Add a space and a question mark to your original command to view the additional variables. device# debug vlan? vlan Enable/Disable VLAN debug show debug Syntax: show debug This command displays all the enabled debug functions. The output resembles the following example, which shows that VLAN debugging is enabled, with the console as the output destination. device# show debug Debug message destination: Console VLAN VLAN: debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 17 Generic debug commands debug destination Syntax: no debug destination [ console | logging | telnet num | ssh num ] This command displays all the enabled debug functions. The output resembles the following example, which shows that VLAN debugging is enabled, with the console as the output destination. • console - Directs output to the system console. • logging - Directs output to the syslog buffer and to the syslog server (default). • telnet num - Directs debugging output to a specified Telnet session (a number from 1 through 5). • ssh num - Directs debugging output to a specified SSH session (a number from 1 through 5). This command allows you to specify a destination for debugging output. The default destination is the system console, but you can redirect output to a syslog buffer, Telnet session, or SSH session. To send debug output to a Telnet session, first determine your session number using the show who command. device# show who Console connections (by unit number): 1 established 4 minutes 29 seconds in idle Telnet connections (inbound): 1 established, client ip address 172.31.0.1 you are connecting to this session 2 seconds in idle 2 closed 3 closed 4 closed 5 closed Telnet connection (outbound): 6 closed SSH connections: 1 closed 2 closed 3 closed 4 closed This example indicates that you are connected through active Telnet session 1. To redirect the debug output to your Telnet session, enter the following command. device# debug destination telnet 1 Brief and detail debug options When enabled, many debug commands can significantly impact system performance. Many debug commands provide options for brief or detailed reporting. Generating detailed output places an additional burden on system performance, and in many cases the results may be more difficult to interpret than output generated using the brief option. To conserve performance and prevent system disruption, use the brief option whenever possible. Disabling debug commands When activated, most debug commands instruct the system to collect specific information about router configurations and activity. In all cases, adding no in front of the command disables the debug function. 18 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Debug Commands A - G debug 802.1w all_802_1w_events Debugs all the RSTP transactions, timers, and packets on a specific VLAN. Syntax debug 802.1w all_802_1w_events decimal Parameters decimal Refers to the number of the VLAN. Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 19 debug 802.1w all_802_1w_events Examples If the events are enabled, output similar to the following is displayed. device# debug 802.1w all_802_1w_events vlan 2 RSTP Enabling All events Debugging for VLAN 2 device# RSTP[daa69]: Timer Alert - helloWhen timer_expired On port 1/1/2(1) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2 RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2 RSTP[daa69]: Timer Alert - helloWhen timer_expired On port 1/1/9(8) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2 RSTP[daa69]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00004e20 8000002438154580 08 09 0100 1400 0200 0f00 RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 01 0000 0000 0000 0000 RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2 RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 02 0000 0000 0000 0000 RSTP[daa7d]: Timer Alert - helloWhen timer_expired On port 1/1/2(1) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2 RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2 RSTP[daa7d]: Timer Alert - helloWhen timer_expired On port 1/1/9(8) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2 RSTP[daa7d]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00004e20 8000002438154580 08 09 0100 1400 0200 0f00 RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 01 0000 0000 0000 0000 RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2 RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 02 0000 0000 0000 0000 RSTP[daa91]: Timer Alert - helloWhen timer_expired On port 1/1/2(1) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2 RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2 RSTP[daa91]: Timer Alert - helloWhen timer_expired On port 1/1/9(8) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2 RSTP[daa91]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2 If the events are disabled, output similar to the following is displayed. device# no debug 802.1w all_802_1w_events vlan 2 RSTP Disabling All 802.1w Debugging for VLAN 2 20 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug 802.1w messages debug 802.1w messages Displays BPDU information on a VLAN. Syntax debug 802.1w messages vlan decimal no debug 802.1w messages vlan decimal Parameters decimal Refers to the number of the VLAN. Modes Privileged EXEC mode Examples If the 802.1w messages are enabled, output similar to the following is displayed. device# debug 802.1w messages vlan 2 RSTP Enabling packets Debugging for VLAN 2 Brocade# RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 01 0000 0000 0000 0000 RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 02 0000 0000 0000 0000 RSTP[db06d]: Tx RST Config BPDU Port 1/1/9(8) VLAN 0000 02 02 7e 80000012f2dbfd80 00004e20 8000002438154580 08 09 0100 1400 0200 0f00 RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 01 0000 0000 0000 0000 RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 02 0000 0000 0000 0000 RSTP[db081]: Tx RST Config BPDU Port 1/1/9(8) VLAN 0000 02 02 7e 80000012f2dbfd80 00004e20 8000002438154580 08 09 0100 1400 0200 0f00 RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 01 0000 0000 0000 0000 RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 02 0000 0000 0000 0000 RSTP[db095]: Tx RST Config BPDU Port 1/1/9(8) VLAN 0000 02 02 7e 80000012f2dbfd80 00004e20 8000002438154580 08 09 0100 1400 0200 0f00 Brocade# RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 01 0000 0000 0000 0000 RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 02 0000 0000 0000 0000 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 VLAN 2 2 2 2 VLAN 2 21 debug 802.1w messages If the 802.1w messages are disabled, output similar to the following is displayed. device# no debug 802.1w messages valn 2 RSTP Disabling Packets Debugging for VLAN 2 22 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug 802.1w timer debug 802.1w timer Debugs the RSTP (802.1w) timer expiration. Syntax debug 802.1w timer vlan decimal no debug 802.1w timer vlan decimal Parameters decimal Refers to the number of the VLAN. Modes Privileged EXEC mode Examples If the timer is enabled, output similar to the following is displayed. device# debug 802.1w timer device# RSTP[db6fd]: Timer VLAN 2 RSTP[db6fd]: Timer Alert RSTP[db711]: Timer Alert RSTP[db711]: Timer Alert RSTP[db725]: Timer Alert RSTP[db725]: Timer Alert RSTP[db739]: Timer Alert - vlan 2 Alert - helloWhen timer_expired On port 1/1/2(1) , helloWhen helloWhen helloWhen helloWhen helloWhen helloWhen timer_expired timer_expired timer_expired timer_expired timer_expired timer_expired On On On On On On port port port port port port 1/1/9(8) 1/1/2(1) 1/1/9(8) 1/1/2(1) 1/1/9(8) 1/1/2(1) , , , , , , VLAN VLAN VLAN VLAN VLAN VLAN 2 2 2 2 2 2 If the timer is disabled, output similar to the following is displayed. device# no debug 802.1w timer vlan 2 RSTP Disabling Timer Debugging for VLAN 2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 23 debug 802.1w transitions debug 802.1w transitions Debugs the RSTP state machine transitions. Syntax debug 802.1w transitions vlan decimal no debug 802.1w transitions vlan decimal Parameters decimal Refers to the number of the VLAN. Modes Privileged EXEC mode Examples If the 802.1w transtitions are enabled, output similar to the following is displayed. device# debug 802.1w transitions vlan 2 RSTP Enabling Events Debugging for VLAN 2 Brocade# RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2 RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2 RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2 RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2 RSTP: PRT =>no valid transition found ,no error, port 1/1/1(0) VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2 RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2 If the 802.1w transtitions are disabled, output similar to the following is displayed. device# no debug 802.1w transitions vlan 2 RSTP Disabling Events Debugging for VLAN 2 24 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug acl log debug acl log Sends the ACL log to the CPU for all the packets. Syntax debug acl log no debug acl log Modes Privileged EXEC mode Examples device# debug acl log Enabling ACL log Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 25 debug all debug all Enables all the debug functions and should be used only during a troubleshooting session with a Brocade technician. Syntax debug all no debug all Modes Privileged EXEC mode Usage Guidelines The no form disables all debugging. CAUTION The debug all command generates extensive output and can significantly slow device operation. Use this command with caution. Never use this command during periods of peak network activity. Enter no debug all to stop the output. Examples The following example enables all debugging functions. A warning about potential network impact is displayed. device# debug all Warning! This may severely impact network performance! All possible debuggings have been turned on Enter the no form of the command to stop all debugging. device# no debug all Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Disabling ACL log Don't monitor port 26 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster all debug cluster all Enables the Multi-Chassis Trunking (MCT) debugging information log. Syntax debug cluster all no debug cluster all Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 27 debug cluster all Usage Guidelines Examples If the debug cluster all command is enabled, output similar to the following is displayed. device#debug cluster all MCT:: Enabling all debugs CLUSTER ALL debugging is now ON device#clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=120 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=122 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=350 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1007 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1009 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=0, vlanid=116 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=45, vlanid=123 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE CLUSTER_FSM: received image version info msg from peer clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=509 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23 CLUSTER FSM: cluster id 2, client id 121, old state: Master Peer Reachable, event: Local Down mct_fsm_set_local_cceps_by_fsm(T=7960) enable 0 ,fsm_peer_switchover=0 ,fsm_switchover=0, client_isolation=0 CLUSTER FSM: new state: Slave, master: FALSE CLUSTER_FSM: received image version info msg from peer clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1001 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1201 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=117 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=46, vlanid=117 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=45, vlanid=118 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1003 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=502 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=84, vlanid=114 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/2/6 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=42, vlanid=117 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/43 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=119 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=200 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1006 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=45, vlanid=1009 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=505 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=68, vlanid=741 28 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster all clusterlib_get_exclude_ccep_portmask_for_sw_fwd: vlan_id 741 is not MCT member vlan clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=120 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=122 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=6, vlanid=120 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=2, vlanid=122 fsm_state_cd is 3, Remote CCEP=0, Remote_master=0. Return FALSE clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=21, vlanid=1201 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/22 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=21, vlanid=1201 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/22 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=22, vlanid=506 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/23 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=507 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1008 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_cclusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1001 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 clusterlib_get_exclude_ccep_portmask_for_sw_fwd: clusterid=2, icl port=9, vlanid=1201 clusterlib_get_exclude_ccep_portmask_for_sw_fwd:ICL entry is NULL ,input port=1/1/10 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 29 debug cluster ccp debug cluster ccp Enables debugging of all CCP FSM messages, CCP client registrations, CCP packet exchanges from clients, keepalive messages and notifications, data buffer usage, and specific peer-related message exchanges. Syntax debug cluster ccp [ fsm | tcp | packets | itc | client | events | memory ] Parameters fsm Enables CCP FSM debugging for a given peer IP or all peers. tcp Enables CCP TCP debugging for a given peer IP or all peers. packets Enables CCP packet debugging for a given peer IP or all peers. itc Enables CCP ITC debugging. client Enables CCP client-related registration debugging. events Enables CCP events debugging. memory Enables CCP memory debugging. Modes Privileged EXEC mode 30 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster ccp Usage Guidelines Examples device# debug cluster ccp CLUSTER CCP debugging is on for all device#config ter device(config)#cluster 2 device(config-cluster-SWIND)#no dep device#CLUSTER CCP_FSM(T=517439): Fsm12 2.1.1.1 sending keepalive CLUSTER CCP PEER(T=517439): Make keep alive message -> CCP_PKT(T=517439): Sending Keep Alive message to peer CCP_PKT(T=517439): Packet Info:0100000c000000080003000400001422 Debug: Jan 1 06:22:42 CLUSTER CCP:free data buf allocated packet count 1 buffer 621585f8 Debug: Jan 1 06:22:42 CLUSTER CCP:internal free data buf allocated packet count 0 bufer 621585f8 Debug: Jan 1 06:22:42 CLUSTER CCP:internal alloc data buf allocated packet count 1 buffer 621585f8 Debug: Jan 1 06:22:42 CLUSTER CCP:alloc data buf allocated packet count 1 buffer 621585f8 CCP_PKT(T=517445): Receiving Packet from peer 2.1.1.1 CCP_PKT(T=517445): Packet Info:0100000c0000000800030004000013f1 CCP_PKT(T=517445): Receiving Packet from peer 2.1.1.1, appId=0 (CCP_APPLICATION_CCP=0;CCP_APPLICATION_CLUSTER_MGR=1) CCP_PKT(T=517445): Packet Info:0100000c0000000800030004000013f1 CCP_PKT(T=517445):Processing ccp packet CCP_PKT(T=517445): Packet Info:00030004000013f1 CCP_PKT(T=517445): Handling received keep alive message CCP_PKT(T=517445): Packet Info:00030004000013f1 CLUSTER CCP_FSM(T=517445): Fsm7 got keepalive from 2.1.1.1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 31 debug cluster client-auto-detect debug cluster client-auto-detect Displays debugging information related to cluster client auto-detect functionality. Syntax debug cluster client-auto-detect no debug cluster client-auto-detect Modes Privileged EXEC mode Examples device# debug cluster client-auto-detect CLUSTER AUTOCONFIG INFO - New Client: A-device-000000137b0 with rbridge id: 3318 discovered on LACP port 4/17 CLUSTER AUTOCONFIG INFO - New Client: A-device-000000c74d40 with rbridge id: 2668 discovered on Static port 3/13 CLUSTER AUTOCONFIG INFO - Port 3/14 added as Static interface to Client:A-device-000000c74d40 LAG MCT-CCAC-LAG_1 deployed successfully! Spanning tree is disabled on CCEP port 4/17 of MCT Client: A-device-000000137b0. CLUSTER AUTOCONFIG INFO - Port 4/17 is successfully programmed as client interface. Removing from autoconfig port list. debug clLAG MCT-CCAC-LAG_2 deployed successfully! Spanning tree is disabled on CCEP port 3/13 of MCT Client: A-device-000000c74d40. CLUSTER AUTOCONFIG INFO - Port 3/13 is successfully programmed as client interface. Removing from autoconfig port list. CLUSTER AUTOCONFIG INFO - Port 3/14 is successfully programmed as client interface. Removing from autoconfig port list. CLUSTER AUTOCONFIG INFO - Cluster 1 client auto-config process stopped 32 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster config debug cluster config Enables debugging for any addition or deletion of the clusters, addition or deletion of the clients, or exchange of cluster finite state machine (FSM) messages between the peer and the client isolation mode. Syntax debug cluster config no debug cluster config Modes Privileged EXEC mode Global configuration mode Usage Guidelines Examples If the debug cluster config command is enabled, output similar to the following is displayed. device#debug cluster config CLUSTER Config debugging is now ON device#configure terminal device(config)#cluster 2 device(config-cluster-SWIND)#no deploy clustercu_generic_config()(console) - opcode = 8, msg_type 0x460008 (blocking) CLUSTER CONFIG: CLUSTER_CONFIG_CLUSTER_DEPLOY ITC message received CLUSTER CCP:ccp_internal_delete_cluster::Cluster 2 Deleted successfully. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 33 debug cluster fsm debug cluster fsm Enables debugging of the MCT cluster FSM for a particular client. Syntax debug cluster fsm clientclient_id no debug cluster fsm clientclient_id Parameters client_id The port number of the client. Modes Privileged EXEC mode Global configuration mode 34 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster fsm Usage Guidelines Examples If the debug cluster fsm client command is enabled, output similar to the following is displayed. device#debug cluster fsm CLUSTER fsm debugging is now ON device#con tDebug: Jan 1 06:30:20 CLUSTER_FSM: received image version info msg from peer device(config)# Debug: Jan 1 06:30:21 CLUSTER_FSM: received image version info msg from peer device(config)#Debug: Jan 1 06:30:23 CLUSTER_FSM: received image version info msg from peer Debug: Jan 1 06:30:23 CLUSTER FSM: Two Masters are present. Becoming Slave 2 CLUSTER FSM (PEER): cluster id 2, peer rbridge id 3, old state: CCP Down, event: Reachable CLUSTER FSM (PEER): new state: Reachable CLUSTER FSM: cluster id 2, client id 116, old state: Master, event: Peer Reachable CLUSTER FSM: Cluster SWIND (Id: 2), client CCEP-116-Reaper (RBridge Id: 116) Remote client CCEP state when CCP is down: down mct_set_client_port_fwd_state, Prev_state=2 , Curr state = 3 Info - cluster_client_set_port_fwd_state() - fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3) ,client port 1/1/15 (#14), icl_port_id 1/1/1(#)0 cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1, fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 1, current state G_FWD cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1, fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 2, current state G_FWD cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1, fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 3, current state G_BLK cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1, fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 4, current state G_BLK cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1, fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) BLOCKING 1/1/15 in STG 5, current state G_BLK state G_FWD cluster_client_set_port_fwd_state(T=522055,client_port=1/1/15,icl_port=1/1/1, fSM_state=ICL_AND_CEP_TO_CCEP(fwd frombc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c 10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00 1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c 10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00 1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c 10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00 1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c 10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:26 stack: 1045f384 10bd179c 107ba744 103385f8 103413e8 10319084 1031c7c8 1031ec00 1031ee78 10bd0934 10bc914c 10bc748c 10bd1ed4 107ba22c 105dfe6c 1031eb1c 1031ee78 10bd0934 10bc8c9c 10bc748c 10bce3cc 10636df4 10987f2c 109886c8 1071ab18 10a9a978 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1, fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 1 with state G_BLK cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1, fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 2 with state G_FWD cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1, fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 3 with state G_BLK cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,icl_port=1/1/1, fSM_state=NONE_TO_CCEP(NOT fwd to CCEP)(1)) Restore STP state for 1/1/27 in STG 4 with state G_BLK cluster_client_set_port_fwd_state(T=522098,client_port=1/1/19,iCL/CEP to CCEP)(3)) Restore STP state for 1/2/6 in STG 12 with state G_BLK Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 35 debug cluster fsm cluster_client_set_port_fwd_state(T=522145,client_port=1/2/6,icl_port=1/1/1, fSM_state=ICL_AND_CEP_TO_CCEP(fwd from ICL/CEP to CCEP)(3)) Restore STP state for 1/2/6 in STG 13 with state G_BLK CLUSTER FSM: new state: Master Peer Reachable, master: TRUE >> mct_fsm_process_local_ccep_event(port=1/2/6,up=UP) & >> mct_fsm_process_local_ccep_event(port=1/2/6,up=UP) & SAME STATE >> mct_fsm_process_localDebug: Jan 1 06:30:37 CLUSTER_FSMCLUSTER FSM: clust^C device(config)#Debug: Jan 1 06:30:38 CLUSTER_FSM: received image version info msg from peer device(config)#Debug: Jan 1 06:30:38 CLUSTER_FSM: received image version info msg from peer nDebug: Jan 1 06:30:39 CLUSTER_FSM: received image version info msg from peer o dDebug: Jan 1 06:30:39 CLUSTER_FSM: received image version info msg from peer eDebug: Jan 1 06:30:40 stack: 1045f384 10bd1610 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40 1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40 1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40 1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40 1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 Debug: Jan 1 06:30:40 stack: 1045f384 10bd179c 107ba744 1033c05c 103413e8 10319d10 104654b4 105d8d40 1031ba38 1031db28 1031e3c8 10553a84 102c55e8 10460774 10d7d158 10d7d66c 10d8937c 10a9a9e8 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 10d7d66c 10d8937c 10a9a9e8 103bf614 10a98904 10c1b8b4 11f7087c 11fb69a0 36 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster intf-mac debug cluster intf-mac Displays interface MAC debug information for the cluster. Syntax debug cluster intf-mac no debug cluster intf-mac Modes Privileged EXEC mode Examples device# debug cluster intf-mac device#configure terminal device(config)#cluster 2 device (config-cluster-SWD)#no deploy device#CLUSTER ROUTER MAC(T=6459): sent to peer rbridge id 4, base mac address cc4e.2438.7c80, number of mac addresses 1 CLUSTER ROUTER MAC(T=6459): received from peer rbridge id 4, router mac address 748e.f8f9.7900, number of mac addresses 1 CLUSTER MDUP: Send UPDATE message num_entries: 100 (0 intf mac) CLUSTER MDUP: Tx MDUP_TYPE_UPDATE_MESSAGE message num_entries: 36 (0 intf mac) CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 58 (0 intf mac)} CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 100 (0 intf mac)} CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 50 (0 intf mac)} CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 1 (0 intf mac)} CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 1 (0 intf mac)} CLUSTER MDUP: Tx MDUP_TYPE_UPDATE_MESSAGE message num_entries: 1 (0 intf mac) CLUSTER MDUP: Rx MAC UPDATE message {cluster_id: 2, Peer Rbridge: 4, num_entries: 1 (0 intf mac)} Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 37 debug cluster mdup debug cluster mdup Displays MDUP debug information for the cluster. Syntax debug cluster mdup no debug cluster mdup Modes Privileged EXEC mode 38 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster mdup Examples device#debug cluster mdup CLUSTER mdup debugging is now ON device#configure terminal device(config)#cluster 2 device(config-cluster-SWIND)#no deploy mdupmgr_proc_cluster_client_undeploy(T=518074) - Undeployed the client, port 1/1/15 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518143) - Undeployed the client, port 1/1/17 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518214) - Undeployed the client, port 1/1/10 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518283) - Undeployed the client, port 1/1/43 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518284) - Undeployed the client, port 1/2/6 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518286) - Undeployed the client, port 1/1/19 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518286) - Undeployed the client, port 1/1/33 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518357) - Undeployed the client, port 1/1/21 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518392) - Undeployed the client, port 1/1/23 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_client_undeploy(T=518426) - Undeployed the client, port 1/3/6 in cluster 2, flush client ports 0123456789ABCDEF mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a007,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a007,1010) mmac_idx=1, mmac_VIDX=1024 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a007,1010) mmac_idx=1, mmac_VIDX=1024 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a006,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a006,1010) mmac_idx=2, mmac_VIDX=1023 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a006,1010) mmac_idx=2, mmac_VIDX=1023 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a001,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a001,1010) mmac_idx=3, mmac_VIDX=1022 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a001,1010) mmac_idx=3, mmac_VIDX=1022 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a003,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a003,1010) mmac_idx=4, mmac_VIDX=1021 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a003,1010) mmac_idx=4, mmac_VIDX=1021 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a002,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a002,1010) mmac_idx=5, mmac_VIDX=1020 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a002,1010) mmac_idx=5, mmac_VIDX=1020 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00d,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00d,1010) mmac_idx=6, mmac_VIDX=1019 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00d,1010) mmac_idx=6, mmac_VIDX=1019 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00c,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00c,1010) mmac_idx=7, mmac_VIDX=1018 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00c,1010) mmac_idx=7, mmac_VIDX=1018 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00f,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00f,1010) mmac_idx=8, mmac_VIDX=1017 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00f,1010) mmac_idx=8, mmac_VIDX=1017 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a00e,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a00e,1010) mmac_idx=9, mmac_VIDX=1016 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a00e,1010) mmac_idx=9, Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 39 debug cluster mdup mmac_VIDX=1016 mdupmgr_proc_cluster_undeploy(T=518426,fsm_switchover=no) convert CMR entry (0010.1000.a009,1010) macmgr_convert_mct_static_mac_to_regular_static_mac: CMR entry (0010.1000.a009,1010) mmac_idx=10, mmac_VIDX=1015 macmgr_convert_mct_static_mac_to_regular_static_mac: free CMR entry (0010.1000.a009,1010) mmac_idx=10, mmac_VID^C 40 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug cluster show debug cluster show Displays debug flags for the cluster. Syntax debug cluster show no debug cluster show Modes Privileged EXEC mode Examples device# debug cluster show CLUSTER debugging is :DISABLED CLUSTER CLUSTER CLUSTER CLUSTER CLUSTER CLUSTER CLUSTER CLUSTER CLUSTER CLUSTER CLUSTER :OFF :OFF :OFF :OFF :OFF :OFF :OFF :OFF :OFF :OFF :OFF ALL debugging is IPC debugging is Hardware debugging is Config debugging is FSM debugging is MDUP debugging is interface mac debugging is Forwarding debugging is STP debugging is BPDU forwarding debugging is CCP debugging is Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 41 debug cluster stp debug cluster stp Enables debugging of STP and RSTP modules. Syntax debug cluster stp no debug cluster stp Modes Privileged EXEC mode Usage Guidelines The output details how the STP registers the ICL or CCEP ports. Changes occur while supporting MCT on STP, such as ICL guard, CCEP state sync, STP and CCP messages, and topology change messages are tracked. Examples device# debug cluster stp CLUSTER STP debugging is now ON MCT-250-SX1600#rstputil_mct_handle_incoming_BPDU(T=12448759, VLAN=1301,port=2/9) port-stpstate=FORWARDING rstputil_mct_handle_incoming_BPDU(T=12448779, VLAN=1301,port=2/9) port-stp-state=FORWARDING rstputil_mct_handle_incoming_BPDU(T=12448799, VLAN=1301,port=2/9) port-stp-state=FORWARDING rstputil_mct_handle_incoming_BPDU(T=12448819, VLAN=1301,port=2/9) port-stp-state=FORWARDING rstputil_mct_handle_incoming_BPDU(T=12448840, VLAN=1301,port=2/9) port-stp-state=FORWARDING rstputil_mct_handle_incoming_BPDU(T=12448859, VLAN=1301,port=2/9) port-stp-state=FORWARDING 42 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug destination debug destination Specifies a destination for debugging output. The default destination is the system console, but you can redirect output to a syslog buffer, Telnet session, or SSH session. Syntax debug destination [ console |logging|telnetnum| sshnum] no debug destination [ console |logging|telnetnum| sshnum] Parameters console Directs output to the system console. logging Directs output to the syslog buffer and to the syslog server (default). telnetnum Directs output to a specified Telnet session (ranges from 1 through 5). sshnum Directs output to a specified Secure Shell (SSH) session (ranges from 1 through 5). Examples To send debug output to a Telnet session, first determine your session number using the show who command. device# show who Console connections (by unit number): 1 established 4 minutes 29 seconds in idle Telnet connections (inbound): 1 established, client ip address 172.31.0.1 you are connecting to this session 2 seconds in idle 2 closed 3 closed 4 closed 5 closed Telnet connection (outbound): 6 closed SSH connections: 1 closed 2 closed 3 closed 4 closed This example indicates that you are connected through active Telnet session 1. To redirect the debug output to your Telnet session, enter the following command. device# debug destination telnet 1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 43 debug dhcp-client alarms debug dhcp-client alarms Displays the debugging of the DHCP client on a particular port ID. Syntax debug dhcp-client alarms no debug dhcp-client alarms Modes Privileged EXEC mode Examples device# "DHCPC: "DHCPC: "DHCPC: file” "DHCPC: "DHCPC: “DHCPC: “DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: 44 debug dhcp-client alarms failed to initialize port; dhcpc unable to continue” failed to initialize protocol timer" no tftp server address or name found. unable to download configuration unable to construct dns request” dns failed to resolve tftp server name” dns aborted” No DHCP Servers found on any ports” No DHCP Servers found on any ports" setting 0 seconds lease time" setting 0 seconds lease time on port port-id" No DHCP Servers found on any ports" failed to allocate a dhcpc packet on port port-id" failed to send message on port port-id" failed to allocate a dhcpc packet on port port-id" failed to send message on port port-id " get_an_ip_send_packet () failed on port port-id" Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug dhcp-client events debug dhcp-client events Displays information about DHCP client events related to configuration. Syntax debug dhcp-client events no debug dhcp-client events Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 45 debug dhcp-client events Examples device# "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: “DHCPC: “DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: 46 debug dhcp-client events failed to delete static ip-address to ip-address" failed to set the port ip-address to ip-address; subnet mask ip-address" changing port port-id state from REQUEST to BOUND" exceeds maximum some-number DNS servers" added ip-address dns-server address" failed to set the port ip-address to ip-address; subnet mask ip-address" TFTP timeout error for bootfile name %s" TFTP client busy" TFTP error wrong file type" TFTP long file name error" TFTP vlan-id invalid" TFTP flash write errors" TFTP error out of buffer space" TFTP flash read error" TFTP flash preparation for read failed" TFTP flash preparation for write failed" %s failed to save running-configuration" changing protocol from running to stopped" changing protocol from stopped to running" Auto update in progress, cannot change DHCP client state on port port-id " invalid parameter for " dhcp_get_next_port() bad port number port-id" sent DHCP-REQUEST message on port port-id \” sent DHCP-RENEWING message on port port-id” sent DHCP-REBINDING message on port port-id " sent DHCP-RELEASE message on port port-id " received packet port port-id" received bad packet port port-id, no DHCP END OPT found" received offer message on port port-id" recieved non matching 'xid' (0x%X) in offer message" changing port port-id state from INIT-SELECTING to INIT-SELECTING" changing port port-id state from INIT-SELECTING to REQUEST" received DHCPCACK message on port port-id" recieved non matching 'xid'(0x%X) in DHCPCACK message" changing timer-event to SEEKING_CONFIGURATION_AND_WAITING_FOR_OFFERS" recieved non matching 'xid'(0x%X) in DHCPNAK message" deleting existing ip address configuration on port port-id" received DHCPNAK packet on port port-id” changing port port-id state from REQUEST to INIT-SELECTING” received DHCPCOFFER packet on port port-id> while in bound state” received DHCPCREQUEST packet on port port-id while in bound state" received DHCPCDECLINE packet on port port-id while in bound state" received DHCPCACK packet on port port-id while in bound state" received DHCPCNAK packet on port port-id while in bound state" received DHCPCRELEASE packet on port port-id while in bound state" received DHCPCINFORM packet on port port-id while in bound state" received DHCPCINFORM packet on port port-id while in bound state" received unknown packet on port port-id while in bound state" received DHCPACK packet in renewal-state on port port-id" received non matching 'xid'(0x%X) in RENEWAL message" TFTP flash read error" changing port port-id state from RENEWING to BOUND" received non matching 'xid'(0x%X) in DHCPNAK message" received DHCPNAK packet in renewal-state on port port-id" changing port port-id state from RENEWING to INIT-SELECTING" received DHCPACK packet in rebind-state on port port-id" received non matching 'xid'(0x%X) in REBIND message" changing port port-id state from REBINDING to BOUND" received non matching 'xid'(0x%X) in DHCPNAK message" received DHCPNAK packet in renewal-state on port port-id" changing port port-id state from REBIND to INIT-SELECTING" sending packet port port-id" send completion called on port: port-id" Freeing packet" unable to get some-number option from dhcp message from port port-id" received server id address opton: ip-address from port port-id" received lease-time option: some-number from port port-id" received domain-name option: %s from port port-id" Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug dhcp-client events "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: "DHCPC: received dns-server address option: ip-address from port port-id" received default-router address option: ip-address from port port-id" received TFTP server name option: %s from port port-id" received TFTP server address opton: ip-address from port port-id" received Bootfile name option: %s from port port-id" received 'hostname' option: %s from port port-id" received maximum message size option: some-number from port port-id" lease timer events called with invalid port" changing port port-id state from BOUND to REBINDING" changing port port-id state from BOUND to RENEWING" deleting existing ip address configuration on port port-id" changing port port-id state from REQUESTING to INIT-SELECTING" failed to renew ip address with dhcp server; continuing with lease period" changing port port-id state from REBINDING to INIT_SELECTING" changing port port-id state from REBINDING to REQUESTING" Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 47 debug dot1x hitless debug dot1x hitless Enables the 802.1x hitless debugging. Syntax debug dot1x hitless no debug dot1x hitless Modes Privileged EXEC mode Usage Guidelines Examples device# debug dot1x hitless dot1x: Hitless debugging is on 48 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug dot1x-events debug dot1x-events Displays the authentications failed or succeeded and the application of VLANs or ACLs requested by the Remote Authentication Dial In User Service (RADIUS) server. Syntax debug dot1x-events no debug dot1x-events Modes Privileged EXEC mode Usage Guidelines This command works globally across all the ports. Examples device#debug dot1x-events dot1x: Events debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 49 debug dot1x-filter debug dot1x-filter Enables the 802.1x filter debugging. Syntax debug dot1x-filter no debug dot1x-filter Modes Privileged EXEC mode Usage Guidelines Examples device# debug dot1x-filter dot1x: Filter debugging is on 50 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug dot1x-misc debug dot1x-misc Enables the 802.1x miscellaneous debugging. Syntax debug cluster all no debug cluster all Modes Privileged EXEC mode Usage Guidelines Examples device# debug dot1x-misc dot1x: Misc debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 51 debug dot1x-mka debug dot1x-mka Enables debugging for the MACsec Key Agreement (MKA) protocol. Syntax debug dot1x-mka { event | packets | state | timers | port device/slot/port } no debug dot1x-mka { event | packets | state| timers | port device/slot/port } Parameters event Monitors 802.1X-MKA events. packets Monitors 802.1X-MKA packets. state Monitors 802.1X-MKA protocol state changes. timers Monitors 802.1X-MKA timers. port device/slot/port Monitors specified physical port. Modes Privileged EXEC mode. Usage Guidelines The no form of the command disables MKA debugging in progress. As an alternative, the command no debug all can be used to disable all debugging in progress. Using the debug dot1x-mka command may have impact on system performance. When the debug dot1x-mka packets command or the debug dot1x-mka timers command is input, the console is likely to be overwhelmed with packets because MKA packets are sent at a very high rate. Consequently, it is recommended that you first establish another telnet session for CLI input. If the debug dot1x-mka port port command is input, only the debug messages related to that port are displayed. History 52 Release version Command history 08.0.11 This command was introduced. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug dot1x-packets debug dot1x-packets Displays information about 802.1x packets. Syntax debug dot1x-packets no debug dot1x-packets Modes Privileged EXEC mode Examples device# debug dot1x-packets dot1x: Packets debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 53 debug dot1x-timers debug dot1x-timers Displays information about 802.1x timers. Syntax debug dot1x-timers no debug dot1x-timers Modes Privileged EXEC mode Examples device# debug dot1x-timers dot1x: Timers debugging is on 54 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug gvrp packets debug gvrp packets Enables the debugging of GARP VLAN Registration Protocol (GVRP) packets. Syntax debug gvrp packets no debug gvrp packets Modes Privileged EXEC mode Usage Guidelines Examples device# debug gvrp packets GVRP: Packets debugging is GVRP: 0x2095ced4: 01 80 c2 GVRP: 0x2095cee4: 03 00 01 GVRP: 0x2095cef4: 00 09 04 GVRP: 0x2095cf04: 03 ec 04 GVRP: 0x2095cf14: 09 cb 04 GVRP: Port 2/1 RCV GVRP: 0x2095ced4: 01 80 c2 GVRP: 0x2095cee4: 03 00 01 GVRP: 0x2095cef4: 04 01 03 GVRP: 0x2095cf04: 04 01 0f GVRP: Port 2/1 TX GVRP: 0x207651b8: 01 80 c2 GVRP: 0x207651c8: 03 00 01 GVRP: 0x207651d8: 03 ec 04 GVRP: 0x207651e8: 09 cb 04 GVRP: 0x207651f8: 00 09 04 GVRP: Port 2/1 TX GVRP: 0x207651b8: 01 80 c2 GVRP: 0x207651c8: 03 00 01 GVRP: 0x207651d8: 04 01 00 on 00 01 05 01 01 00 02 00 03 0f 21 00 0b ef a1 00 01 ef a1 00 04 04 00 21 00 e0 52 ab 87 40 00 28 42 42 02 03 e9 04 01 03 eb 04 01 03 ec 01 03 f1 04 01 05 dd 04 01 09 cb 00 00 01 05 05 01 00 02 03 0f 00 21 00 ef a1 0b 00 04 04 04 00 00 04 04 04 00 e0 05 02 01 00 04 05 05 02 00 52 00 03 03 80 03 03 00 ab 02 e9 f1 2c e9 f1 02 87 04 04 04 0e 04 04 04 40 05 01 01 20 05 05 01 00 00 03 05 00 03 05 00 3a 07 eb dd 3a eb dd 07 42 04 04 04 42 04 04 04 42 05 01 01 42 05 05 01 00 00 21 00 04 80 2c 0e 20 00 18 42 42 01 04 02 00 02 04 01 00 07 04 01 00 09 0b 00 00 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 55 56 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Debug Commands H - P debug hw Enables the hardware backplane debugging feature in a device. Syntax debug hw no debug hw Examples device# debug hw HW BP: backplane debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 57 debug igmp-snoop add-del-oif all debug igmp-snoop add-del-oif all Displays information about the addition or deletion of all outgoing interfaces (OIFs). Syntax debug igmp-snoop add-del-oif all no debug igmp-snoop add-del-oif all Modes Privileged EXEC mode Examples device# debug igmp-snoop add-del-oif all Del e1/1/23 from (0.0.0.0, 228.1.1.10) vlan 130 Del e1/1/23 from (0.0.0.0, 228.1.1.9) vlan 130 Del e1/1/23 from (0.0.0.0, 228.1.1.8) vlan 130 Add e1/1/23 to (0.0.0.0, 228.1.1.8) vlan 130 Add e1/1/23 to (0.0.0.0, 228.1.1.9) vlan 130 Add e1/1/23 to (0.0.0.0, 228.1.1.10) vlan 130 58 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug igmp-snoop clear debug igmp-snoop clear Clears all the IGMP snooping debug settings. Syntax debug igmp-snoop clear no debug igmp-snoop clear Modes Privileged EXEC mode Examples device# debug igmp-snoop clear Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 59 debug igmp-snoop error debug igmp-snoop error Displays the IGMP snooping multicast error messages. Syntax debug igmp-snoop error no debug igmp-snoop error Modes Privileged EXEC mode Examples device# debug igmp-snoop error IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16 IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16 IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16 60 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug igmp-snoop group debug igmp-snoop group Displays the IGMP snooping multicast group information. Syntax debug igmp-snoop group group_address no debug igmp-snoop group group_address Parameters group_address Specifies the address of the IGMP snoop multicast group. Modes Privileged EXEC mode Examples device# debug igmp-snoop group 230.1.1.1 IGMP: rcvd Report-V2(t=22) g=230.1.1.1 resp=0, pkt S=10.85.1.3 to 230.1.1.1, on VL100 (phy e1/1/48), igmp_size=8 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 61 debug igmp-snoop level debug igmp-snoop level Sets the debugging level of IGMP snooping activity. Syntax debug igmp-snoop level decimal no debug igmp-snoop level decimal Parameters decimal Specifies the debugging level of IGMP snooping activity and it can take values from 1 through 3. Modes Privileged EXEC mode Usage Guidelines Level 3 displays more information than level 2, and level 0 displays no information. Examples device# debug igmp-snoop level 1 igmpsnoop debug level = 1 IGMP: rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.1.15.1 to 224.0.0.1, on VL100 (phy e3/1/6), igmp_size=8 device# debug igmp-snoop level 3 igmpsnoop debug level = 3 device# Add e1/1/2 to (0.0.0.0, 228.228.0.1) vlan 275 Add e1/1/2 to (0.0.0.0, 228.228.0.2) vlan 275 Add e1/1/2 to (0.0.0.0, 228.228.0.3) vlan 275 device# Del e1/1/2 from (0.0.0.0, 228.228.0.3) vlan 275 Del e1/1/2 from (0.0.0.0, 228.228.0.2) vlan 275 Del e1/1/2 from (0.0.0.0, 228.228.0.1) vlan 275 Del e1/1/12 from (0.0.0.0, 228.228.0.3) vlan 275 Del e1/1/2 from (0.0.0.0, 228.228.0.1) vlan 275 62 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug igmp-snoop packet debug igmp-snoop packet Displays debugging information related to the IGMP snoop packets. Syntax debug igmp-snoop packet source_address group_address no debug igmp-snoop packet source_address group_address Parameters source_address Specifies the source address of the IGMP snoop packet. group_address Specifies the address of the IGMP snoop multicast group. Modes Privileged EXEC mode Examples device# debug igmp-snoop packet 10.13.13.3 228.1.1.2 debug ip igmpsnoop packet S=10.13.13.3 G=228.1.1.2 rtr_l2mcast_fwd_data (pkts:1), (10.13.13.3 228.1.1.2), from e1/1/1 vlan 130, has fwd_entry rtr_l2mcast_fwd_data (pkts:1), (10.13.13.3 228.1.1.2), from e1/1/1 vlan 130, clear hw_aging flag Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 63 debug igmp-snoop port ethernet debug igmp-snoop port ethernet Displays the IGMP snooping related debug information for the specified Ethernet interface. Syntax debug igmp-snoop port ethernet num no debug igmp-snoop port ethernet num Parameters num Specifies the stack ID, slot number, and port number of a specific Ethernet port. Modes Privileged EXEC mode Examples device# debug igmp-snoop port ethernet 1/1/2 IGMP: rcvd Report-V2(t=22) g=228.1.1.6 resp=0, pkt S=10.13.13.2 to 228.1.1.6, on VL130 (phy e1/1/2), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=228.1.1.8 resp=0, pkt S=10.13.13.2 to 228.1.1.8, on VL130 (phy e1/1/2), igmp_size=8 64 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug igmp-snoop show debug igmp-snoop show Displays all the IGMP snooping debug settings. Syntax debug igmp-snoop show no debug igmp-snoop show Modes Privileged EXEC mode Examples device# debug igmp-snoop show igmp debug-enable-any = 1 debug igmpsnoop is enabled IGMP: rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.1.15.1 to 224.0.0.1, on VL100 (phy e3/1/6), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.1.12 resp=0, pkt S=10.85.1.3 to 230.1.1.12, on VL100 (phy e1/1/48), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.4.148 resp=0, pkt S=10.85.1.3 to 230.1.4.148, on VL100 (phy e1/1/48), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.2.22 resp=0, pkt S=10.85.1.3 to 230.1.2.22, on VL100 (phy e1/1/48), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.1.92 resp=0, pkt S=10.85.1.3 to 230.1.1.92, on VL100 (phy e1/1/48), igmp_size=8 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 65 debug igmp-snoop source debug igmp-snoop source Displays the IGMP snooping related debug information for the specified source address Syntax debug igmp-snoop source source_address no debug igmp-snoop source source_address Parameters source_address Specifies the source address. Modes Privileged EXEC mode Examples device# debug igmp-snoop source 10.13.13.2 IGMP: rcvd Report-V2(t=22) g=228.1.1.6 resp=0, pkt S=10.13.13.2 to 228.1.1.6, on VL130 (phy e1/1/2), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=228.1.1.8 resp=0, pkt S=10.13.13.2 to 228.1.1.8, on VL130 (phy e1/1/2), igmp_size=8 66 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug igmp-snoop timer debug igmp-snoop timer Displays information about the IGMP snooping related timer events. Syntax debug igmp-snoop timer no debug igmp-snoop timer Modes Privileged EXEC mode Examples device# debug igmp-snoop timer device# debug igmp-snoop prime-port eth 1/1/2 igmp timer, VL130(e1/1/2) change V1 client age igmp timer, E401010A VL130(e1/1/2) switch back igmp timer, E4010109 VL130(e1/1/2) switch back igmp timer, E4010108 VL130(e1/1/2) switch back Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 out to include mode to include mode to include mode 67 debug igmp-snoop vlan debug igmp-snoop vlan Displays the IGMP snooping related debug information for the specified VLAN ID. Syntax debug igmp-snoop vlan vlan_id no debug igmp-snoop vlan vlan_id Parameters vlan_id Specifies the VLAN ID. Modes Privileged EXEC mode Examples device# debug igmp-snoop vlan 100 igmpsnoop monitor vlan 100 IGMP: rcvd Report-V2(t=22) g=230.1.1.110 resp=0, pkt S=10.85.1.3 to 230.1.1.110, on VL100 (phy e1/1/48), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.2.52 resp=0, pkt S=10.85.1.3 to 230.1.2.52, on VL100 (phy e1/1/48), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.3.133 resp=0, pkt S=10.85.1.3 to 230.1.3.133, on VL100 (phy e1/1/48), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.2.203 resp=0, pkt S=10.85.1.3 to 230.1.2.203, on VL100 (phy e1/1/48), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=230.1.1.151 resp=0, pkt S=10.85.1.3 to 230.1.1.151, on VL100 (phy e1/1/48), igmp_size=8 68 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ikev2 debug ikev2 Enables IKEv2 debugging. Syntax debug ikev2 { all | error | event | packet [ detail | receive | send ] | peer ip-address | trace [ info ] } no debug ikev2 { all | error | event | packet [ detail | receive | send ] | peer ip-address | trace [ info ] } Parameters all Enables debugging of all IKEv2 instances. error Enables IKEv2 error debugging. event Enables IKEv2 event debugging. packet Enables IKEv2 packet debugging. detail Enables detailed IKEv2 packet debugging. receive Enables IKEv2 receive packet debugging. send Enables IKEv2 send packet debugging. peer ip-address Enables IKEv2 peer debugging to filter messages for a specific peer. trace Enables IKEv2 trace debugging. info Enables IKEv2 trace debugging information. Modes Privileged EXEC mode Examples The following command debugs IKEv2 event during tunnel down and rekeying. device# debug ikev2 event Debug: Mar 13 20:14:08 IKE: ipike_isakmp_resend_tmo_cb() :: for tunnel 44 Debug: Mar 13 20:14:39 IKE: ipike_ipsec_sadb_sa_rekey() :: rekey timeout for IPsec SA 0x1224 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 69 debug ikev2 The following command debugs IKEv2 error during mismatch in algorithms. device# debug ikev2 error IKEV2: ike error is enabled Debug: Mar 13 20:14:08 IKE: ipike_isakmp_resend_tmo_cb() :: for tunnel 44 Debug: Mar 13 20:14:39 IKE: ipike_ipsec_sadb_sa_rekey() :: rekey timeout for IPsec SA 0x1224Debug: Mar 13 20:14:08 IKE: ipike_isakmp_resend_tmo_cb() :: for tunnel 44 Debug: Mar 13 20:14:39 IKE: ipike_ipsec_sadb_sa_rekey() :: rekey timeout for IPsec SA 0x1224 Debug: Mar 13 20:21:39 IKE: ipike_payload_notify_process_error() :: exchange rejected with NO_PROPOSAL_CHOSEN for tunnel 31 Debug: Mar 13 20:21:39 IKE: ipike_exchange_sa_init_on_delete() :: the exchange was not finished, removing (incomplete) IKE SA for tunnel 31 Debug: Mar 13 20:21:44 IKE: ipike_policy_select_sa_param: no proposal was accepted Debug: Mar 13 20:21:44 IKE: ipike_exchange_sa_init_on_delete() :: the exchange was not finished, removing (incomplete) IKE SA for tunnel 31 Debug: Mar 13 20:21:49 IKE: ipike_payload_notify_process_error() :: exchange rejected with NO_PROPOSAL_CHOSEN for tunnel 31 Debug: Mar 13 20:21:49 IKE: ipike_exchange_sa_init_on_delete() :: the exchange was not finished, removing (incomplete) IKE SA for tunnel 31 Debug: Mar 13 20:21:54 IKE: ike_wr_policy_accept_id return 1 The following command debugs IKEv2 trace. device# debug ikev2 trace Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar = 816f120f Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar 816f120f Debug: Mar Debug: Mar Debug: Mar 70 13 13 13 13 13 13 13 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 IKE: Locking IKE SA (ref count 1) IKE: initiator cookie: 0xe6e53f1404a54b7c IKE: responder cookie: 0xf81e5e7816388386 IKE: Locking IKE SA (ref count 2) IKE: initiator cookie: 0xe6e53f1404a54b7c IKE: responder cookie: 0xf81e5e7816388386 IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=721, type=37, init=1 -> val 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 20:28:40 IKE: ipike_isakmp_hash_add() :: hash: id=721, type=37, init=1, phase1=0 IKE: Sending request to 103.1.1.2 [500] IKE: Message encrypted 88 bytes IKE: Send 88 octets from 106.1.1.1:500 to 103.1.1.2:500 IKE: Releasing IKE SA (ref count 1), for tunnel 2 IKE: initiator cookie: 0xe6e53f1404a54b7c IKE: responder cookie: 0xf81e5e7816388386 IKE: Locking IKE SA (ref count 1) IKE: initiator cookie: 0xb23c157874ab5638 IKE: responder cookie: 0x599cb6a1a4d3d0fb IKE: Releasing IKE SA (ref count 0), for tunnel 17 IKE: initiator cookie: 0xb23c157874ab5638 IKE: responder cookie: 0x599cb6a1a4d3d0fb ike ipv4 packet received with src 103.1.1.2 and dest 106.1.1.1 vrf 0 length 88 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=721, type=37, init=1 IKE: Message decrypted 88 bytes IKE: ipike_check_payloads() :: no payloads exist according to the ISAKMP header IKE: ipike_isakmp_process_message_response() :: destroying completed exchange IKE: ipike_isakmp_free_exchange() :: exchange 193/1/9 type - INFORMATIONAL IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=0, type=0, init=0 -> val = 13 20:28:40 IKE: Releasing IKE SA (ref count 0), for tunnel 2 13 20:28:40 IKE: initiator cookie: 0xe6e53f1404a54b7c 13 20:28:40 IKE: responder cookie: 0xf81e5e7816388386 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ikev2 The following command debugs IKEv2 trace info. device# debug ikev2 trace info IKEV2: trace info is enabled DUT1#Debug: Mar 13 20:27:18 IKE: Received response 18.18.18.2[500], INFORMATIONAL, #2(2), ID 2da Debug: Mar 13 20:27:18 IKE: informational exchange done Debug: Mar 13 20:27:18 IKE: Received response 13.13.13.2[500], INFORMATIONAL, #2(2), ID 2 Debug: Mar 13 20:27:18 IKE: informational exchange done Debug: Mar 13 20:27:18 IKE: Received response 4.4.4.2[500], INFORMATIONAL, #2(2), ID 2bc Debug: Mar 13 20:27:18 IKE: informational exchange done Debug: Mar 13 20:27:28 IKE: Received response 22.22.22.2[500], INFORMATIONAL, #2(2), ID 2de Debug: Mar 13 20:27:28 IKE: informational exchange done Debug: Mar 13 20:27:28 IKE: Received response 2.2.2.2[500], INFORMATIONAL, #2(2), ID 2c7 Debug: Mar 13 20:27:28 IKE: informational exchange done The following command debugs IKEv2 packet. device# debug ikev2 packet IKEV2: Debug: Debug: 88 Debug: Debug: Debug: 88 Debug: Debug: length Debug: Debug: Debug: Debug: Debug: length Debug: Debug: Debug: Debug: length Debug: Debug: Debug: Debug: length Debug: packet debugging is on Mar 13 20:29:26 ike ipv4 packet received with src 122.1.1.2 and dest 120.1.1.1 vrf 3 length 88 Mar 13 20:29:26 ike_transmit_packet send packet to 122.1.1.2:500 from 120.1.1.1:500 vrf:3 length Mar 13 20:29:26 IKE sub task: packet transmitted to 122.1.1.2 Mar 13 20:29:37 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 88 Mar 13 20:29:37 ike_transmit_packet send packet to 102.1.1.2:500 from 100.1.1.1:500 vrf:0 length Mar Mar 88 Mar Mar Mar Mar Mar 248 Mar Mar Mar Mar 88 Mar Mar Mar Mar 88 Mar 13 20:29:37 IKE sub task: packet transmitted to 102.1.1.2 13 20:29:41 ike_transmit_packet send packet to 12.12.12.2:500 from 12.12.12.1:500 vrf:0 13 13 13 13 13 20:29:41 20:29:41 20:29:58 20:29:58 20:29:58 IKE sub task: packet transmitted to 12.12.12.2 ike ipv4 packet received with src 12.12.12.2 and dest 12.12.12.1 vrf 0 length 88 IKE: Create notify payload with message type 16393 IKE: Create notify payload with message type 16394 ike_transmit_packet send packet to 20.20.20.2:500 from 20.20.20.1:500 vrf:0 13 13 13 13 20:29:58 20:29:58 20:29:58 20:29:58 IKE sub task: packet transmitted to 20.20.20.2 ike ipv4 packet received with src 20.20.20.2 and dest 20.20.20.1 vrf 0 length 248 IKE: Process initial contact notify payload for tunnel 20 ike_transmit_packet send packet to 20.20.20.2:500 from 20.20.20.1:500 vrf:0 13 13 13 13 20:29:58 20:29:58 20:29:58 20:29:58 IKE sub task: packet transmitted to 20.20.20.2 ike ipv4 packet received with src 20.20.20.2 and dest 20.20.20.1 vrf 0 length 88 ike ipv4 packet received with src 20.20.20.2 and dest 20.20.20.1 vrf 0 length 88 ike_transmit_packet send packet to 20.20.20.2:500 from 20.20.20.1:500 vrf:0 13 20:29:58 IKE sub task: packet transmitted to 20.20.20.2 The following command debugs IKEv2 send packet. device# debug ikev2 packet send Debug: Mar 13 20:30:53 ike_transmit_packet send packet to 19.19.19.2:500 from 19.19.19.1:500 vrf:0 length 88 The following command debugs IKEv2 receive packet. device# debug ikev2 packet receive Debug: length Debug: Debug: Debug: Debug: Debug: 80 Mar 13 Mar 13 Mar 13 Mar 13 Mar 13 20:31:32 ike ipv4 packet received with src 13.13.13.2 and dest 13.13.13.1 vrf 0 20:32:10 20:32:11 20:32:26 20:32:26 ike ike ike ike ipv4 ipv4 ipv4 ipv4 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 packet packet packet packet received received received received with with with with src src src src 122.1.1.2 and dest 120.1.1.1 vrf 3 length 88 122.1.1.2 and dest 120.1.1.1 vrf 3 length 88 18.18.18.2 and dest 18.18.18.1 vrf 0 length 88 4.4.4.2 and dest 4.4.4.1 vrf 0 length 88 71 debug ikev2 The following command debugs IKEv2 packets in detail. device# debug ikev2 packet detail Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: 72 Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:17 20:33:23 20:33:23 20:33:23 20:33:23 20:33:23 20:33:23 20:33:23 20:33:23 20:33:23 20:33:23 +++ ISAKMP package start (message # 1) +++ < IKE Header > IKE_SA Initiator's SPI: 0x333aa6c1ea301ed5 IKE_SA Responder's SPI: 0xb311338eb36cd7de Next Payload: none (0) Version: 2.0 Exchange Type: INFORMATIONAL Flags: [ INITIATOR ] Message ID: 684 Length: 28 (#x) --- ISAKMP package end (message # 1) --+++ ISAKMP package start (message # 2) +++ < IKE Header > IKE_SA Initiator's SPI: 0x333aa6c1ea301ed5 IKE_SA Responder's SPI: 0xb311338eb36cd7de Next Payload: none (0) Version: 2.0 Exchange Type: INFORMATIONAL Flags: [ RESPONSE ] Message ID: 684 Length: 28 (#x) --- ISAKMP package end (message # 2) --+++ ISAKMP package start (message # 1) +++ < IKE Header > IKE_SA Initiator's SPI: 0x506e28a9b3870d90 IKE_SA Responder's SPI: 0xb860b97a5b1995b8 Next Payload: none (0) Version: 2.0 Exchange Type: INFORMATIONAL Flags: [ ] Message ID: 2 Length: 28 (#x) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ikev2 The following command debugs all IKEv2 instances. device# debug ikev2 all Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar looking up Debug: Mar Debug: Mar Debug: Mar Debug: Mar entry Debug: Mar Debug: Mar Debug: Mar Debug: Mar looking up Debug: Mar Debug: Mar Debug: Mar Debug: Mar entry Debug: Mar Debug: Mar Debug: Mar Debug: Mar f2d6968f Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar 13 13 13 13 13 13 13 13 in 13 13 13 13 20:38:39 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 88 20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=6, type=37, init=0 20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=6, type=37, init=0 20:38:39 IKE: New exchange started (INFORMATIONAL with Message ID: 6) 20:38:39 IKE: Locking IKE SA (ref count 1) 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44, config database 20:38:39 IKE: Releasing IKE SA (ref count 0), for tunnel 44 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB 13 13 13 13 in 13 13 13 13 20:38:39 IKE: Locking IKE SA (ref count 1) 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44, config database 20:38:39 IKE: Releasing IKE SA (ref count 0), for tunnel 44 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB 13 13 13 13 20:38:39 20:38:39 20:38:39 20:38:39 IKE: Locking IKE SA (ref count 1) IKE: initiator cookie: 0xd762b2a1b460a8da IKE: responder cookie: 0x22e7083e0ef7753a IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=6, type=37, init=0 -> val = 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 IKE: ipike_isakmp_hash_add() :: hash: id=6, type=37, init=0, phase1=0 IKE: Received request 102.1.1.2[500], INFORMATIONAL, #1(2), ID 6 IKE: Message decrypted 88 bytes +++ ISAKMP package start (message # 1) +++ < IKE Header > IKE_SA Initiator's SPI: 0xd762b2a1b460a8da IKE_SA Responder's SPI: 0x22e7083e0ef7753a Next Payload: delete (42) Version: 2.0 Exchange Type: INFORMATIONAL Flags: [ INITIATOR ] Message ID: 6 Length: 40 (#x) IKE: < delete > IKE: Next Payload: none (0) IKE: Payload Length: 12 (#x) IKE: protocol ID: IPSEC_ESP IKE: SPI 1: 00001748 --- ISAKMP package end (message # 1) --IKE: Deleting IPsec SA IKE: Deleting IPsec SA IKE: Sending response to 102.1.1.2 [500] +++ ISAKMP package start (message # 2) +++ < IKE Header > IKE_SA Initiator's SPI: 0xd762b2a1b460a8da IKE_SA Responder's SPI: 0x22e7083e0ef7753a Next Payload: delete (42) Version: 2.0 Exchange Type: INFORMATIONAL Flags: [ RESPONSE ] Message ID: 6 Length: 40 (#x) IKE: < delete > IKE: Next Payload: none (0) IKE: Payload Length: 12 (#x) IKE: protocol ID: IPSEC_ESP IKE: SPI 1: 00000b81 --- ISAKMP package end (message # 2) --- Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 73 debug ikev2 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 'tunnel44' Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 responder for Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 Debug: Mar 13 (tunnel44_0) 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 IKE: IKE: IKE: IKE: IKE: 20:38:39 IKE: 20:38:39 IKE: 20:38:39 IKE: 20:38:39 IKE: 20:38:39 IKE: 20:38:39 IKE: 20:38:39 IKE: tunnel 44 20:38:39 IKE: 20:38:39 IKE: 20:38:39 IKE: 20:38:39 IKE: Sending message 102.1.1.2[500]: INFORMATIONAL, #2(2), ID 6 Message encrypted 88 bytes Send 88 octets from 100.1.1.1:500 to 102.1.1.2:500 informational exchange done ipike_isakmp_add_ipsec_negotiation() :: Adding IPsec negotiation for ipike_isakmp_add_ipsec_negotiation() :: looking up IKE SA based on addresses local address: 100.1.1.1 remote address: 102.1.1.2 Locking IKE SA (ref count 2) initiator cookie: 0xd762b2a1b460a8da responder cookie: 0x22e7083e0ef7753a ipike_isakmp_add_ipsec_negotiation() :: ipsec sa will not be started by Releasing IKE SA (ref count 1), for tunnel 44 initiator cookie: 0xd762b2a1b460a8da responder cookie: 0x22e7083e0ef7753a ipike_dispatch_start_sa_negotiation() :: failed to start IPSec negotiation SYSLOG: <14> Mar 13 20:38:39 DUT1 IPsec: IPSec session down Source 102.1.1.2 Destination 100.1.1.1 VRF 0 SPI 0xb81 Direction Ingress SYSLOG: <14> Mar 13 20:38:39 DUT1 IPsec: IPSec session down Source 100.1.1.1 Destination 102.1.1.2 VRF 0 SPI 0x1748 Direction Egress Debug: Mar 13 20:38:39 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 88 Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=7, type=37, init=0 Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=7, type=37, init=0 Debug: Mar 13 20:38:39 IKE: New exchange started (INFORMATIONAL with Message ID: 7) Debug: Mar 13 20:38:39 IKE: Locking IKE SA (ref count 2) Debug: Mar 13 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da Debug: Mar 13 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44, looking up in config database Debug: Mar 13 20:38:39 IKE: Releasing IKE SA (ref count 1), for tunnel 44 Debug: Mar 13 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da Debug: Mar 13 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB entry Debug: Mar 13 20:38:39 IKE: Locking IKE SA (ref count 2) Debug: Mar 13 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da Debug: Mar 13 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA in SADB database, id=tunnel44, looking up in config database Debug: Mar 13 20:38:39 IKE: Releasing IKE SA (ref count 1), for tunnel 44 Debug: Mar 13 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da Debug: Mar 13 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a Debug: Mar 13 20:38:39 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on SADB entry Debug: Mar 13 20:38:39 IKE: Locking IKE SA (ref count 2) Debug: Mar 13 20:38:39 IKE: initiator cookie: 0xd762b2a1b460a8da Debug: Mar 13 20:38:39 IKE: responder cookie: 0x22e7083e0ef7753a Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=7, type=37, init=0 -> val = bec1679 Debug: Mar 13 20:38:39 IKE: ipike_isakmp_hash_add() :: hash: id=7, type=37, init=0, phase1=0 Debug: Mar 13 20:38:39 IKE: Received request 102.1.1.2[500], INFORMATIONAL, #1(2), ID 7 Debug: Mar 13 20:38:39 IKE: Message decrypted 88 bytes Debug: Mar 13 20:38:39 +++ ISAKMP package start (message # 1) +++ Debug: Mar 13 20:38:39 < IKE Header > Debug: Mar 13 20:38:39 IKE_SA Initiator's SPI: 0xd762b2a1b460a8da Debug: Mar 13 20:38:39 IKE_SA Responder's SPI: 0x22e7083e0ef7753a Debug: Mar 13 20:38:39 Next Payload: delete (42) Debug: Mar 13 20:38:39 Version: 2.0 Debug: Mar 13 20:38:39 Exchange Type: INFORMATIONAL Debug: Mar 13 20:38:39 Flags: [ INITIATOR ] Debug: Mar 13 20:38:39 Message ID: 7 Debug: Mar 13 20:38:39 Length: 36 (#x) Debug: Mar 13 20:38:39 IKE: < delete > Debug: Mar 13 20:38:39 IKE: Next Payload: none (0) Debug: Mar 13 20:38:39 IKE: Payload Length: 8 (#x) Debug: Mar 13 20:38:39 IKE: protocol ID: ISAKMP Debug: Mar 13 20:38:39 --- ISAKMP package end (message # 1) --- 74 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ikev2 Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 IKE: Setting IKE SA (ref count 2) state to dying IKE: initiator cookie: 0xd762b2a1b460a8da IKE: responder cookie: 0x22e7083e0ef7753a IKE: Sending response to 102.1.1.2 [500] +++ ISAKMP package start (message # 2) +++ < IKE Header > IKE_SA Initiator's SPI: 0xd762b2a1b460a8da IKE_SA Responder's SPI: 0x22e7083e0ef7753a Next Payload: none (0) Version: 2.0 Exchange Type: INFORMATIONAL Flags: [ RESPONSE ] Message ID: 7 Length: 32 (#x) --- ISAKMP package end (message # 2) --IKE: Sending message 102.1.1.2[500]: INFORMATIONAL, #2(2), ID 7 IKE: Message encrypted 88 bytes IKE: Send 88 octets from 100.1.1.1:500 to 102.1.1.2:500 IKE: informational exchange done IKE sub task: packet transmitted to 102.1.1.2 SYSLOG: <14> Mar 13 20:38:39 DUT1 IKEv2: IKEv2 session down Source 100.1.1.1 Destination 102.1.1.2 VRF 0 SPI 0xd762b2a1b460a8da SYSLOG: <14> Mar 13 20:38:39 DUT1 PORT: tn44 down due to - IKE session down SYSLOG: <14> Mar 13 20:38:39 DUT1 System: Interface ipsec_tnnl Debug: Mar 13 20:38:39 IKE: local public DH value 2520515a f7536f69 27413bc7 0efc4262 0f501aa6 0deeed19 6ad81b3e cbc09936 34d4fe3d a60c2239 254a28f5 74225709 0bb186e0 95ee7777 b6c021f4 39894aba 4c3dc91a e1f8c018 089b1570 57179b21 2ddcfd10 Debug: Mar 78a81769 Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar 44, state down - IKE session down 192ca278 134fdc4c 284cb2a8 13 20:38:39 IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=0, type=0, init=1 -> val = 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 IKE: ipike_isakmp_hash_add() :: hash: id=0, type=34, init=1, phase1=1 Add Payload 33 Add Payload 47 Add Payload 41 Add Payload 34 Add Payload 40 IKE: Sending request to 102.1.1.2 [500] +++ ISAKMP package start (message # 1) +++ < IKE Header > IKE_SA Initiator's SPI: 0x4731b3c6a38c0641 IKE_SA Responder's SPI: 0x0000000000000000 Next Payload: security association (33) Version: 2.0 Exchange Type: IKE_SA_INIT Flags: [ INITIATOR ] Message ID: 0 Length: 248 (#x) IKE: < security association > IKE: Next Payload: key exchange (34) IKE: Payload Length: 48 (#x) << proposal >> Proposal #: 1 Protocol ID: ISAKMP SPI Size: 0 IKE: # of Transforms: 4 <<< transform >>> Type: dh ID: ecp384 <<< transform >>> Type: prf ID: sha384 <<< transform >>> Type: encr ID: aes Attr: 800e0100 <<< transform >>> Type: integ ID: sha384 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 75 debug ikev2 Debug: Mar 13 20:38:39 IKE: < key exchange > Debug: Mar 13 20:38:39 IKE: Next Payload: nonce (40) Debug: Mar 13 20:38:39 IKE: Payload Length: 104 (#x) Debug: Mar 13 20:38:39 IKE: dh group: 'ecp384' Debug: Mar 13 20:38:39 IKE: data: 2520515a f7536f69 27413bc7 0efc4262 0f501aa6 0deeed19 6ad81b3e 192ca278 cbc09936 34d4fe3d a60c2239 254a28f5 74225709 0bb186e0 95ee7777 134fdc4c b6c021f4 39894aba 4c3dc91a e1f8c018 089b1570 57179b21 2ddcfd10 284cb2a8 Debug: Mar 13 20:38:39 IKE: < nonce > Debug: Mar 13 20:38:39 IKE: Next Payload: none (0) Debug: Mar 13 20:38:39 IKE: Payload Length: 68 (#x) Debug: Mar 13 20:38:39 IKE: data: 434bf3f8 3efe8553 e8c81844 2e3eed96 00380268 1908602d cd1437c2 624f4190 d00d7fe2 4e7fc709 20bdcc44 7373f178 0dfdd62c 370a97dc c01d7f35 3a0f6a3e Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar 248 Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar addresses Debug: Mar addresses Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar 9b36fb21 Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar Debug: Mar 76 13 13 13 13 13 13 13 13 13 13 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 20:38:39 --- ISAKMP package end (message # 1) --IKE: Sending message 102.1.1.2[500]: IKE_SA_INIT, #1(4), ID 0 IKE: Send 248 octets from 100.1.1.1:500 to 102.1.1.2:500 IKE: Locking IKE SA (ref count 2) IKE: initiator cookie: 0x4731b3c6a38c0641 IKE: responder cookie: 0x0000000000000000 IKE: Releasing IKE SA (ref count 1), for tunnel 44 IKE: initiator cookie: 0x4731b3c6a38c0641 IKE: responder cookie: 0x0000000000000000 ike_transmit_packet send packet to 102.1.1.2:500 from 100.1.1.1:500 vrf:0 length 13 13 13 13 13 13 20:38:39 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 IKE sub task: packet transmitted to 102.1.1.2 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 248 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=0, type=0, init=0 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=0, type=0, init=0 IKE: New exchange started (IKE_SA_INIT with Message ID: 0) IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on 13 20:38:42 IKE: ipike_isakmp_lookup_config() :: Found IKE SA configuration based on 13 13 13 13 13 13 13 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 IKE: Setting IKE SA (ref count 0) state to constructing IKE: initiator cookie: 0x20beacbe38bcb465 IKE: responder cookie: 0x7f672fffc23b040d IKE: Locking IKE SA (ref count 1) IKE: initiator cookie: 0x20beacbe38bcb465 IKE: responder cookie: 0x7f672fffc23b040d IKE: ipike_isakmp_hash_obj_cookie() :: hash key: id=0, type=0, init=0 -> val = 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 IKE: ipike_isakmp_hash_add() :: hash: id=0, type=34, init=0, phase1=1 IKE: Received request 102.1.1.2[500], IKE_SA_INIT, #1(4), ID 0 +++ ISAKMP package start (message # 1) +++ < IKE Header > IKE_SA Initiator's SPI: 0x20beacbe38bcb465 IKE_SA Responder's SPI: 0x0000000000000000 Next Payload: security association (33) Version: 2.0 Exchange Type: IKE_SA_INIT Flags: [ INITIATOR ] Message ID: 0 Length: 248 (#x) IKE: < security association > IKE: Next Payload: key exchange (34) IKE: Payload Length: 48 (#x) << proposal >> Proposal #: 1 Protocol ID: ISAKMP SPI Size: 0 IKE: # of Transforms: 4 <<< transform >>> Type: dh ID: ecp384 <<< transform >>> Type: prf ID: sha384 <<< transform >>> Type: encr Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ikev2 Debug: Mar 13 20:38:42 ID: aes Debug: Mar 13 20:38:42 Attr: 800e0100 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: integ Debug: Mar 13 20:38:42 ID: sha384 Debug: Mar 13 20:38:42 IKE: < key exchange > Debug: Mar 13 20:38:42 IKE: Next Payload: nonce (40) Debug: Mar 13 20:38:42 IKE: Payload Length: 104 (#x) Debug: Mar 13 20:38:42 IKE: dh group: 'ecp384' Debug: Mar 13 20:38:42 IKE: data: d4d789d3 2d30c979 d856295d 5b740be8 32a7b1ff 6626d3d1 0d51f79c 9573fa48 4d158059 89d81198 1b525537 1c96102b e97e073d 8fe4b757 ebbbc40c 6ef76a3a f5ac68f4 b24c094c 9af9c60d c8a02faa 9506dad8 5be9fe78 cf979743 22856a11 Debug: Mar 13 20:38:42 IKE: < nonce > Debug: Mar 13 20:38:42 IKE: Next Payload: none (0) Debug: Mar 13 20:38:42 IKE: Payload Length: 68 (#x) Debug: Mar 13 20:38:42 IKE: data: 2d9db0d5 6453b7f2 0accc5d2 6117d17c 77518abf 1ff952d6 540658e0 98f4019d c65b6824 ac19716d 25a398cd 16717c6d dc870989 149cff89 9ca77cf8 bbccb6f9 Debug: Mar 13 20:38:42 --- ISAKMP package end (message # 1) --Debug: Mar 13 20:38:42 IKE: selected 'aes' as encryption algorithm Debug: Mar 13 20:38:42 IKE: selected '256' as key length Debug: Mar 13 20:38:42 IKE: selected 'sha384' as hash algorithm Debug: Mar 13 20:38:42 IKE: selected 'sha384' as integrity algorithm Debug: Mar 13 20:38:42 IKE: selected 'ecp384' as DH group description Debug: Mar 13 20:38:42 IKE: local public DH value f20a76e2 a5f4ffd3 f1e602db 175e27a5 de6ee0bb 5398912b e42aa726 3707bffa af06f3ab 07bd6d5e 91977b7d 71c29893 c6319ef9 5a8d8dbf 7d2f177c c6dd270b 01f81f5d 8fb8c352 6da36969 1c8252aa 4c251cda 68c6d48e 4dff1b3b 93644bbd Debug: Mar 13 20:38:42 IKE: remote public DH d4d789d3 2d30c979 d856295d 5b740be8 32a7b1ff 4d158059 89d81198 1b525537 1c96102b e97e073d f5ac68f4 b24c094c 9af9c60d c8a02faa 9506dad8 value 6626d3d1 0d51f79c 9573fa48 8fe4b757 ebbbc40c 6ef76a3a 5be9fe78 cf979743 22856a11 Debug: Mar 13 20:38:42 IKE: g^xy 23eb98ce 75f9e6b9 db74f391 943d6e62 99c1a70e 99661d30 5f2115b4 006abec2 d8c75633 dbac2fed 34812aea a6b37510 Debug: Mar 13 20:38:42 IKE: SKEYSEED: 6460e276 5e8521ee 2c660e02 672a1b40 1f9360af a9fa2d6a 3f2d7d7b f063f98f 9c10967d 06c5267b ab3fd497 28ce695e Debug: Mar 13 20:38:42 IKE: Key d: d7c69fef 8f72fc49 0e059883 0a2809ce ea4a0920 e64914b7 da218b46 2b8b72fe 1f9e9c1c 5beda8da d4d4de43 3ba53661 Debug: Mar 13 20:38:42 IKE: Key ai: 4489ba21 e8a914c5 3a13694f f647c46b fbf0cef7 0ceb4c5d bdb623a5 5f4b01c5 62558333 0da07993 c6d187e0 1e638cb7 Debug: Mar 13 20:38:42 IKE: Key ar: 377095ad 1251bd49 265d66ef 3aaa090d d353bfff e98f651b 96a0ecfb cd7c68d4 5058e99d 7e332161 8169a04e 8bae393f Debug: Mar 13 20:38:42 IKE: Key ei: 8c31e91d f8011cdd c1674ea5 73b0ad12 6e60cc70 74cbf967 dbd35a49 99f0a679 Debug: Mar 13 20:38:42 IKE: Key er: 8e7881ff bf853fe2 a7b43864 67f9a587 827740e9 7f63125b 34526ac1 510b23fe Debug: Mar 13 20:38:42 IKE: Key pi: f2646dde d9f565c4 72c1382e 94febb13 49762791 1152c357 64e7613f 00c538bb ec2f5d4b 8c63b249 405769e9 35d8936c Debug: Mar 13 20:38:42 IKE: Key pr: a917acb3 b370f56e 7501c8bc 50209201 375c7d6e 48820e68 f442c1a0 011d5f49 3773a2e1 23e8e867 6c288dcc f8d59a13 Debug: Mar 13 20:38:42 Add Payload 33 Debug: Mar 13 20:38:42 Add Payload 47 Debug: Mar 13 20:38:42 Add Payload 41 Debug: Mar 13 20:38:42 Add Payload 34 Debug: Mar 13 20:38:42 Add Payload 40 Debug: Mar 13 20:38:42 Add Payload 38 Debug: Mar 13 20:38:42 IKE: Sending response to 102.1.1.2 [500] Debug: Mar 13 20:38:42 +++ ISAKMP package start (message # 2) +++ Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 77 debug ikev2 Debug: Mar 13 20:38:42 < IKE Header > Debug: Mar 13 20:38:42 IKE_SA Initiator's SPI: 0x20beacbe38bcb465 Debug: Mar 13 20:38:42 IKE_SA Responder's SPI: 0x7f672fffc23b040d Debug: Mar 13 20:38:42 Next Payload: security association (33) Debug: Mar 13 20:38:42 Version: 2.0 Debug: Mar 13 20:38:42 Exchange Type: IKE_SA_INIT Debug: Mar 13 20:38:42 Flags: [ RESPONSE ] Debug: Mar 13 20:38:42 Message ID: 0 Debug: Mar 13 20:38:42 Length: 248 (#x) Debug: Mar 13 20:38:42 IKE: < security association > Debug: Mar 13 20:38:42 IKE: Next Payload: key exchange (34) Debug: Mar 13 20:38:42 IKE: Payload Length: 48 (#x) Debug: Mar 13 20:38:42 << proposal >> Debug: Mar 13 20:38:42 Proposal #: 1 Debug: Mar 13 20:38:42 Protocol ID: ISAKMP Debug: Mar 13 20:38:42 SPI Size: 0 Debug: Mar 13 20:38:42 IKE: # of Transforms: 4 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: encr Debug: Mar 13 20:38:42 ID: aes Debug: Mar 13 20:38:42 Attr: 800e0100 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: integ Debug: Mar 13 20:38:42 ID: sha384 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: prf Debug: Mar 13 20:38:42 ID: sha384 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: dh Debug: Mar 13 20:38:42 ID: ecp384 Debug: Mar 13 20:38:42 IKE: < key exchange > Debug: Mar 13 20:38:42 IKE: Next Payload: nonce (40) Debug: Mar 13 20:38:42 IKE: Payload Length: 104 (#x) Debug: Mar 13 20:38:42 IKE: dh group: 'ecp384' Debug: Mar 13 20:38:42 IKE: data: f20a76e2 a5f4ffd3 f1e602db 175e27a5 de6ee0bb 5398912b e42aa726 3707bffa af06f3ab 07bd6d5e 91977b7d 71c29893 c6319ef9 5a8d8dbf 7d2f177c c6dd270b 01f81f5d 8fb8c352 6da36969 1c8252aa 4c251cda 68c6d48e 4dff1b3b 93644bbd Debug: Mar 13 20:38:42 IKE: < nonce > Debug: Mar 13 20:38:42 IKE: Next Payload: none (0) Debug: Mar 13 20:38:42 IKE: Payload Length: 68 (#x) Debug: Mar 13 20:38:42 IKE: data: 1d49d2fa 0b2c88d1 c01bcd5e 70dedfcd ef78d6dc e71584f0 df6beb24 38ff4e28 a431ba8f 892328dd e00f6029 9df67ff7 0d68de7a 143ca305 c42bbe53 78493a7f Debug: Debug: Debug: Debug: 248 Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: 78 Mar Mar Mar Mar 13 13 13 13 20:38:42 20:38:42 20:38:42 20:38:42 --- ISAKMP package end (message # 2) --IKE: Sending message 102.1.1.2[500]: IKE_SA_INIT, #2(4), ID 0 IKE: Send 248 octets from 100.1.1.1:500 to 102.1.1.2:500 ike_transmit_packet send packet to 102.1.1.2:500 from 100.1.1.1:500 vrf:0 length Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 20:38:42 IKE sub task: packet transmitted to 102.1.1.2 ike ipv4 packet received with src 102.1.1.2 and dest 100.1.1.1 vrf 0 length 248 IKE: ipike_isakmp_hash_get_from_cookie() :: hash key: id=0, type=0, init=0 IKE: Received request 102.1.1.2[500], IKE_AUTH, #3(4), ID 1 IKE: Message decrypted 248 bytes +++ ISAKMP package start (message # 3) +++ < IKE Header > IKE_SA Initiator's SPI: 0x20beacbe38bcb465 IKE_SA Responder's SPI: 0x7f672fffc23b040d Next Payload: notify (41) Version: 2.0 Exchange Type: IKE_AUTH Flags: [ INITIATOR ] Message ID: 1 Length: 188 (#x) IKE: < notify > IKE: Next Payload: identification initiator (35) IKE: Payload Length: 8 (#x) IKE: message type: ESP_TFC_PADDING_NOT_SUPPORTED (16394) IKE: < identification initiator > IKE: Next Payload: authentication (39) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ikev2 Debug: Mar 13 20:38:42 IKE: Payload Length: 12 (#x) Debug: Mar 13 20:38:42 IKE: id type: address Debug: Mar 13 20:38:42 IKE: id data: 00000000 Debug: Mar 13 20:38:42 IKE: < authentication > Debug: Mar 13 20:38:42 IKE: Next Payload: security association (33) Debug: Mar 13 20:38:42 IKE: Payload Length: 56 (#x) Debug: Mar 13 20:38:42 IKE: method: 'pre_shared_key' Debug: Mar 13 20:38:42 IKE: data: bf993791 8f2d42f5 3bc3ccad 59b8f2a5 761d9a83 d195d5d2 0f70de64 a5d0e677 25c2613a 47e72571 446cb83c 578f7b89 Debug: Mar 13 20:38:42 IKE: < security association > Debug: Mar 13 20:38:42 IKE: Next Payload: traffic selector initiator (44) Debug: Mar 13 20:38:42 IKE: Payload Length: 36 (#x) Debug: Mar 13 20:38:42 << proposal >> Debug: Mar 13 20:38:42 Proposal #: 1 Debug: Mar 13 20:38:42 Protocol ID: IPSEC_ESP Debug: Mar 13 20:38:42 SPI Size: 4 Debug: Mar 13 20:38:42 IKE: spi data: 0000230e Debug: Mar 13 20:38:42 IKE: # of Transforms: 2 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: encr Debug: Mar 13 20:38:42 ID: aes256gcm Debug: Mar 13 20:38:42 Attr: 800e0100 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: esn Debug: Mar 13 20:38:42 ID: off Debug: Mar 13 20:38:42 IKE: < traffic selector initiator > Debug: Mar 13 20:38:42 IKE: Next Payload: traffic selector responder (45) Debug: Mar 13 20:38:42 IKE: Payload Length: 24 (#x) Debug: Mar 13 20:38:42 IKE: Protocol: any Debug: Mar 13 20:38:42 IKE: Address start: 0.0.0.0 Debug: Mar 13 20:38:42 IKE: Address end: 255.255.255.255 Debug: Mar 13 20:38:42 IKE: Port start: 0 Debug: Mar 13 20:38:42 IKE: Port end: 65535 Debug: Mar 13 20:38:42 IKE: < traffic selector responder > Debug: Mar 13 20:38:42 IKE: Next Payload: none (0) Debug: Mar 13 20:38:42 IKE: Payload Length: 24 (#x) Debug: Mar 13 20:38:42 IKE: Protocol: any Debug: Mar 13 20:38:42 IKE: Address start: 0.0.0.0 Debug: Mar 13 20:38:42 IKE: Address end: 255.255.255.255 Debug: Mar 13 20:38:42 IKE: Port start: 0 Debug: Mar 13 20:38:42 IKE: Port end: 65535 Debug: Mar 13 20:38:42 --- ISAKMP package end (message # 3) --Debug: Mar 13 20:38:42 IKE: Process initial contact notify payload for tunnel 44 Debug: Mar 13 20:38:42 IKE: ipike_crypto_read_cert: could not open tunnel_44 Debug: Mar 13 20:38:42 IKE: Message: 20beacbe 38bcb465 00000000 00000000 21202208 00000000 000000f8 22000030 0000002c 01010004 03000008 04000014 03000008 02000006 0300000c 0100000c 800e0100 00000008 0300000d 28000068 00140000 d4d789d3 2d30c979 d856295d 5b740be8 32a7b1ff 6626d3d1 0d51f79c 9573fa48 4d158059 89d81198 1b525537 1c96102b e97e073d 8fe4b757 ebbbc40c 6ef76a3a f5ac68f4 b24c094c 9af9c60d c8a02faa 9506dad8 5be9fe78 cf979743 22856a11 00000044 2d9db0d5 6453b7f2 0accc5d2 6117d17c 77518abf 1ff952d6 540658e0 98f4019d c65b6824 ac19. Debug: Mar 13 20:38:42 IKE: Authentication key: 7f602adf 7481a350 d4904150 ed0804b5 0a176fc3 46559ff4 19986e5f 5547be73 695b66ab 24eeabf4 1e9eabfa a0b0c75c Debug: Mar 13 20:38:42 IKE: Authentication data: bf993791 8f2d42f5 3bc3ccad 59b8f2a5 761d9a83 d195d5d2 0f70de64 a5d0e677 25c2613a 47e72571 446cb83c 578f7b89 Debug: Mar 13 20:38:42 IKE: Message: 20beacbe 38bcb465 7f672fff c23b040d 21202220 00000000 000000f8 22000030 0000002c 01010004 0300000c 0100000c 800e0100 03000008 0300000d 03000008 02000006 00000008 04000014 28000068 00140000 f20a76e2 a5f4ffd3 f1e602db 175e27a5 de6ee0bb 5398912b e42aa726 3707bffa af06f3ab 07bd6d5e 91977b7d 71c29893 c6319ef9 5a8d8dbf 7d2f177c c6dd270b 01f81f5d 8fb8c352 6da36969 1c8252aa 4c251cda 68c6d48e 4dff1b3b 93644bbd 00000044 1d49d2fa 0b2c88d1 c01bcd5e 70dedfcd ef78d6dc e71584f0 df6beb24 38ff4e28 a431ba8f 8923. Debug: Mar 13 20:38:42 IKE: Authentication key: 7f602adf 7481a350 d4904150 ed0804b5 0a176fc3 46559ff4 19986e5f 5547be73 695b66ab 24eeabf4 1e9eabfa a0b0c75c Debug: Mar 13 20:38:42 IKE: Authentication data: 3d9760af 143f7e57 7cd521b6 8034ddab e23e101c 54a584de d7ab54e9 0ce3365b Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 79 debug ikev2 ab6d5db3 69d288eb 294c2aed f7f19a2c Debug: Mar 13 20:38:42 IKE: use_esn from config: off Debug: Mar 13 20:38:42 IKE: selected 'aes256gcm' as encryption algorithm Debug: Mar 13 20:38:42 IKE: selected '256' as key length Debug: Mar 13 20:38:42 IKE: selected 'off' for ESN Debug: Mar 13 20:38:42 Add Payload 47 Debug: Mar 13 20:38:42 Add Payload 41 Debug: Mar 13 20:38:42 IKE: Create notify payload with message type 16394 Debug: Mar 13 20:38:42 Add Payload 36 Debug: Mar 13 20:38:42 Add Payload 37 Debug: Mar 13 20:38:42 Add Payload 39 Debug: Mar 13 20:38:42 Add Payload 33 Debug: Mar 13 20:38:42 Add Payload 44 Debug: Mar 13 20:38:42 Add Payload 45 Debug: Mar 13 20:38:42 Add Payload 48 Debug: Mar 13 20:38:42 IKE: Sending response to 102.1.1.2 [500] Debug: Mar 13 20:38:42 +++ ISAKMP package start (message # 4) +++ Debug: Mar 13 20:38:42 < IKE Header > Debug: Mar 13 20:38:42 IKE_SA Initiator's SPI: 0x20beacbe38bcb465 Debug: Mar 13 20:38:42 IKE_SA Responder's SPI: 0x7f672fffc23b040d Debug: Mar 13 20:38:42 Next Payload: notify (41) Debug: Mar 13 20:38:42 Version: 2.0 Debug: Mar 13 20:38:42 Exchange Type: IKE_AUTH Debug: Mar 13 20:38:42 Flags: [ RESPONSE ] Debug: Mar 13 20:38:42 Message ID: 1 Debug: Mar 13 20:38:42 Length: 188 (#x) Debug: Mar 13 20:38:42 IKE: < notify > Debug: Mar 13 20:38:42 IKE: Next Payload: identification responder (36) Debug: Mar 13 20:38:42 IKE: Payload Length: 8 (#x) Debug: Mar 13 20:38:42 IKE: message type: ESP_TFC_PADDING_NOT_SUPPORTED (16394) Debug: Mar 13 20:38:42 IKE: < identification responder > Debug: Mar 13 20:38:42 IKE: Next Payload: authentication (39) Debug: Mar 13 20:38:42 IKE: Payload Length: 12 (#x) Debug: Mar 13 20:38:42 IKE: id type: address Debug: Mar 13 20:38:42 IKE: id data: 00000000 Debug: Mar 13 20:38:42 IKE: < authentication > Debug: Mar 13 20:38:42 IKE: Next Payload: security association (33) Debug: Mar 13 20:38:42 IKE: Payload Length: 56 (#x) Debug: Mar 13 20:38:42 IKE: method: 'pre_shared_key' Debug: Mar 13 20:38:42 IKE: data: 3d9760af 143f7e57 7cd521b6 8034ddab e23e101c 54a584de d7ab54e9 0ce3365b ab6d5db3 69d288eb 294c2aed f7f19a2c Debug: Mar 13 20:38:42 IKE: < security association > Debug: Mar 13 20:38:42 IKE: Next Payload: traffic selector initiator (44) Debug: Mar 13 20:38:42 IKE: Payload Length: 36 (#x) Debug: Mar 13 20:38:42 << proposal >> Debug: Mar 13 20:38:42 Proposal #: 1 Debug: Mar 13 20:38:42 Protocol ID: IPSEC_ESP Debug: Mar 13 20:38:42 SPI Size: 4 Debug: Mar 13 20:38:42 IKE: spi data: 000007fe Debug: Mar 13 20:38:42 IKE: # of Transforms: 2 Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: esn Debug: Mar 13 20:38:42 ID: off Debug: Mar 13 20:38:42 <<< transform >>> Debug: Mar 13 20:38:42 Type: encr Debug: Mar 13 20:38:42 ID: aes256gcm Debug: Mar 13 20:38:42 Attr: 800e0100 Debug: Mar 13 20:38:42 IKE: < traffic selector initiator > Debug: Mar 13 20:38:42 IKE: Next Payload: traffic selector responder (45) Debug: Mar 13 20:38:42 IKE: Payload Length: 24 (#x) Debug: Mar 13 20:38:42 IKE: Protocol: any Debug: Mar 13 20:38:42 IKE: Address start: 0.0.0.0 Debug: Mar 13 20:38:42 IKE: Address end: 255.255.255.255 Debug: Mar 13 20:38:42 IKE: Port start: 0 Debug: Mar 13 20:38:42 IKE: Port end: 65535 Debug: Mar 13 20:38:42 IKE: < traffic selector responder > Debug: Mar 13 20:38:42 IKE: Next Payload: none (0) Debug: Mar 13 20:38:42 IKE: Payload Length: 24 (#x) Debug: Mar 13 20:38:42 IKE: Protocol: any Debug: Mar 13 20:38:42 IKE: Address start: 0.0.0.0 80 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ikev2 Debug: Mar 13 20:38:42 Debug: Mar 13 20:38:42 Debug: Mar 13 20:38:42 Debug: Mar 13 20:38:42 Debug: Mar 13 20:38:42 Debug: Mar 13 20:38:42 Debug: Mar 13 20:38:42 Debug: Mar 13 20:38:42 'tunnel44' Debug: Mar 13 20:38:42 2703818e ff5aad8f 2720eb1c Debug: Mar 13 20:38:42 dbab15f4 19fb8280 3e30fe3d IKE: Address end: 255.255.255.255 IKE: Port start: 0 IKE: Port end: 65535 --- ISAKMP package end (message # 4) --IKE: Sending message 102.1.1.2[500]: IKE_AUTH, #4(4), ID 1 IKE: Message encrypted 248 bytes IKE: Send 248 octets from 100.1.1.1:500 to 102.1.1.2:500 IKE: ipike_sadb_get_from_ike_config() :: no IKE SA for peer 102.1.1.2, config id IKE: Enc key inbound: 2d551d4a f27a5382 d6139507 9cd7ba09 b801f9f8 585ecd81 IKE: Enc key outbound: c1984de9 10338d76 7d7c1d7a d47b84ee e9d7ba33 a116b639 History Release version Command history 8.0.41 This command was introduced. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 81 debug ip arp debug ip arp Activates the debugging of ARP packets. Syntax debug ip arp ip-addr no debug ip arp ip-addr Parameters ip-addr Specifies a particular route. Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip arp 10.29.29.53 ARP: packets debugging is on Brocade# show arp Total No. 1 2 3 number of ARP entries: 3, maximum capacity: 4000 IP Address MAC Address Type Age Port Status 10.29.29.53 0000.0034.1b60 Dynamic 0 2/1/15-2/1/16 Valid 10.200.200.45 0000.00cf.c400 Dynamic 0 1/1/13-1/1/14 Valid 10.30.30.31 0000.0023.0f00 Dynamic 0 2/1/9-2/1/10 Valid device# clear arp next hop router 10.29.29.53 ARP mapping deleted Brocade# ARP: sent packet oper=request, src 10.29.29.111 0000.0076.2c80: dst 10.29.29.53 0000.0000.0000: Port v29 ARP: sent packet oper=request, src 10.200.200.111 0000.0076.2c80: dst 10.200.200.45 0000.0000.0000: Port v2000 ARP: sent packet oper=request, src 10.30.30.111 0000.0076.2c80: dst 10.30.30.31 0000.0000.0000: Port v300 ARP: sent packet oper=request, src 10.20.67.111 0000.0076.2c80: dst 10.20.10.11 0000.0000.0000: Port mgmt1 82 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip arp inspection debug ip arp inspection Enables ARP inspection debugging. Syntax debug ip arp inspection no debug ip arp inspection Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip arp inspection ARP: inspection debugging is on RX: rcvd ARP packet, brd 1, us 0, vlan 14 port 5/1/2 ARP: rcvd packet oper=request, src 10.3.3.13 0000.009d.8c69: dst 10.3.3.1 0000.0000.0000: Port e5/1/2 ARP: REQ inspection pass, 10.3.3.13->10.3.3.1, port 5/1/2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 83 debug ip arp inspection debug ip arp inspection Enables ARP inspection debugging. Syntax debug ip arp inspection no debug ip arp inspection Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip arp inspection ARP: inspection debugging is on RX: rcvd ARP packet, brd 1, us 0, vlan 14 port 5/1/2 ARP: rcvd packet oper=request, src 10.3.3.13 0000.009d.8c69: dst 10.3.3.1 0000.0000.0000: Port e5/1/2 ARP: REQ inspection pass, 10.3.3.13->10.3.3.1, port 5/1/2 84 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip arp inspection debug ip arp inspection Enables ARP inspection debugging. Syntax debug ip arp inspection no debug ip arp inspection Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip arp inspection ARP: inspection debugging is on RX: rcvd ARP packet, brd 1, us 0, vlan 14 port 5/1/2 ARP: rcvd packet oper=request, src 10.3.3.13 0000.009d.8c69: dst 10.3.3.1 0000.0000.0000: Port e5/1/2 ARP: REQ inspection pass, 10.3.3.13->10.3.3.1, port 5/1/2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 85 debug ip bgp debug ip bgp Enables common BGP debugging information to be displayed for all virtual routing and forwarding events (VRFs) or for a specific VRF. Syntax debug ip bgp neighbor_ip_address no debug ip bgp neighbor_ip_address Parameters neighbor_ip_address The neighbor_ip_address variable refers to the IP address of the immediate neighbor. Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip bgp 10.1.34.10 BGP: neighbor 10.1.34.10 debugging is on device# BGP: 10.1.34.10 rcv UPDATE w/attr: Origin=IGP AS_PATH=AS_CONFED_SEQUENCE(3) 64519 NextHop=10.1.34.10 MED=0 LOCAL_PREF=100 BGP: 10.1.34.10 rcv UPDATE 10.1.22.0/24 BGP: 10.1.34.10 rcv UPDATE w/attr: Origin=IGP AS_PATH=AS_CONFED_SEQUENCE(3) 64519 NextHop 10.1.34.10 MED=0 LOCAL_PREF=100 BGP: 10.1.34.10 rcv UPDATE 10.1.23.0/24 86 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip bgp dampening debug ip bgp dampening Displays information about dampening process configurations, route penalties, durations, restraint, and release. Syntax debug ip bgp dampening no debug ip bgp dampening Modes Privileged EXEC mode Usage Guidelines Examples device# debug BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 BGP: 10.1.1.2 ip bgp dampening Decay 10.1.1.32/32, ostate, oPnlty=6805, nPnlty=840, time=2712 reuse_list_index=258, curr_offset=45 10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61, Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712 reuse_list_index=258, curr_offset=45 10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61, Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712 reuse_list_index=258, curr_offset=45 10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61, Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712 reuse_list_index=258, curr_offset=45 10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61, Decay 10.1.1.32/32, ostate , oPnlty=6805, nPnlty=840, time=2712 reuse_list_index=258, curr_offset=45 10.1.1.32/32 not ready, state , reuse_threshold=750, new_index=61, Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 offset=45 offset=45 offset=45 offset=45 offset=45 87 debug ip bgp events debug ip bgp events Generates information about BGP events, such as connection attempts and keepalive timer activity. Syntax debug ip bgp events no debug ip bgp events Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip bgp events BGP: events debugging is on device# BGP: 10.1.34.10 rcv notification: CEASE Message BGP: 10.1.34.10 Peer went to IDLE state (Rcv Notification) BGP: 10.1.35.10 rcv notification: CEASE Message BGP: 10.1.35.10 Peer went to IDLE state (Rcv Notification) BGP: 10.1.34.10 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6 BGP: 10.1.35.10 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6 BGP: 10.1.34.10 rcv GR capability afi/safi=1/1 fbit 0 BGP: 10.1.34.10 Peer went to ESTABLISHED state BGP: 10.1.35.10 rcv GR capability afi/safi=1/1 fbit 0 BGP: 10.1.35.10 Peer went to ESTABLISHED state BGP: 10.1.34.10 rcv UPDATE EOR (0), waiting EOR 0 BGP: 10.1.35.10 rcv UPDATE EOR (0), waiting EOR 0 BGP: 10.1.34.10 sending EOR (safi 0)... BGP: 10.1.35.10 sending EOR (safi 0)... 88 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip bgp graceful-restart debug ip bgp graceful-restart Displays information about BGP graceful restarts. The graceful restart feature minimizes disruptions in forwarding and route flapping when a router restarts. Syntax debug ip bgp graceful-restart no debug ip bgp graceful-restart Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip bgp graceful-restart BGP: graceful-restart debugging is on BGP: 10.1.251.6 save graceful restart parameters, #RIB_out 2 (safi 0) 10.1.251.6 RIB_out peer reset #RIB_out 2 (safi 0) BGP: 10.1.251.6 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6 BGP: 10.1.251.6 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6 BGP: 10.1.251.6 sending Graceful Restart cap, rbit 0, fbit 0, time 120, length 6 BGP: 10.1.251.6 rcv GR capability afi/safi=1/1 fbit 1 BGP: 10.1.251.6 sending EOR (safi 0)... Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 89 debug ip bgp keepalives debug ip bgp keepalives Displays information about the status of a resource such as BGP. Syntax debug ip bgp keepalives no debug ip bgp keepalives Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip bgp keepalives BGP: 10.1.1.2 sending KEEPALIVE BGP: 10.1.1.2 KEEPALIVE received 90 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip bgp updates debug ip bgp updates Displays BGP receive, transmit, or receive and transmit update messages about debug processing. Syntax debug ip bgp updates no debug ip bgp updates Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip bgp updates BGP: safi(0): 10.1.1.2 sending UPDATE w/attr: Origin=IGP AS_PATH=65538 NEXT_HOP=10.1.1.1 MED=1 BGP: (0): 10.1.1.2 sending UPDATE Label=0 2001:DB8:83:e8:00:04:78:64:10.1.1.1/32 BGP: 10.1.1.2 rcv bad UPDATE (saif 0) due to AS loop, take as implicit withdraw! BGP: BGP: 10.1.1.2 rcv UPDATE w/attr: Origin=INCOMP AS_PATH= AS_SEQ(2) 3 NextHop=10.1.1.2 MED=30 BGP: (0): 10.1.1.2 rcv UPDATE 10.1.1.2/32 BGP: 10.1.1.2 rcv bad UPDATE (saif 0) due to AS loop, take as implicit withdraw! BGP: BGP: 10.1.1.2 rcv UPDATE w/attr: Origin=IGP AS_PATH= AS_SEQ(2) 3 NextHop=10.1.1.2 MED=5 BGP: (0): 10.1.1.2 rcv UPDATE 10.10.10.10/32 BGP: (0): 10.1.1.2 rcv UPDATE 10.213.0.0/16 BGP: (0): 10.1.1.2 rcv UPDATE 10.200.200.200/32 BGP: (0): 10.1.1.2 rcv UPDATE 10.18.18.0/24 BGP: (0): 10.1.1.2 rcv UPDATE 10.1.1.32/32 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 91 debug ip dhcp-snooping debug ip dhcp-snooping Enables debugging of the DHCP snooping activity. Syntax debug ip dhcp-snooping no debug ip dhcp-snooping Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip dhcp-snooping device(config-vif-11)# DHCP: snooping on for vlan 14, port 5/1/2 DHCP: rcv on port 5/1/2, intercept DHCP pkt, Discovr DHCP: snooping on port 5/1/2, smac 0000.00ce.ac79, type 1, VRF 1 0.0.0.0->0000.00ce.ac79 DHCP Option82: Adding option 82 DHCP Option82: 20 bytes added. DHCP Option82: Adding option 82 DHCP: snooping on for vlan 14, port 3/1/23 DHCP: rcv on port 3/1/23, intercept DHCP pkt, Offer DHCP Option82: Removing option 82 DHCP Option82: 19 bytes removed. DHCP Option82: Removing option 82 DHCP: snooping on for vlan 14, port 5/1/2 DHCP: rcv on port 5/1/2, intercept DHCP pkt, Request DHCP: snooping on port 5/1/2, smac 0000.00ce.ac79, type 3, VRF 1 0.0.0.0->0000.00ce.ac79 DHCP Option82: Adding option 82 DHCP Option82: 20 bytes added. DHCP Option82: Adding option 82 92 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip gre keepalive debug ip gre keepalive Activates Generic Routing Encapsulation (GRE) keepalive debugging. Syntax debug ip gre keepalive no debug ip gre keepalive Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip gre keepalive GRE_MP: Keepalive Bring DOWN GRE Tunnel 11 GRE_MP: Keepalive Bring UP GRE on Tunnel 11 - port is 2/1/2 GRE_MP: RX Keepalive packet on tnnl 11 src 10.22.33.254, dst 10.22.33.252 GRE_MP: TX Keepalive packet on tnnl 11 we need to find outgoing port GRE_MP: TX Keepalive packet on tnnl 11 - outgoing_port is 2/1/2 with mac 0000.00bb.ef40 vlan 2 GRE_MP_KEEPALIVE: NO FREE BUFFER AVAILABLE GRE_MP: For Tunnel 11, Keepalive timeout after 3 seconds GRE_MP: For Tunnel 11, stop keep-alive GRE_MP: For Tunnel 11, start keep-alive GRE_MP: enqueue Keepalive packet on tunnel 11 at index 23 GRE_MP: dequeue Keepalive packet on tunnel 11 at index 23 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 93 debug ip gre log debug ip gre log Activates the tunnel events debugging. Syntax debug ip gre log no debug ip gre log Modes Privileged EXEC mode Usage Guidelines The no form disables tunnel events debugging 94 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip gre log Examples device# debug ip gre log Apply mtu 1400 failed for tunnel 11 as all mtu profiles are used Clearing PMTU for tunnel 11 due to ip mtu 1400 configuration Tunnel Create Sync-Receive event for tunnel: 11 Tunnel Create Sync-Successful for tunnel: 11 Tunnel Update TS Sync-Receive event for tunnel: 11 Tunnel Update TS Sync-Successful for tunnel: 11 Tunnel Update Nhop Sync-Receive event for tunnel: 11 Tunnel Update Nhop Sync-Successful for tunnel: 11 Tunnel Update TTI Sync-Receive event for tunnel: 11 Tunnel Port Up Sync-Receive event for tunnel: 11 Tunnel Port Up Sync-Successful for tunnel: 11 Tunnel Port Down Sync-Receive event for tunnel: 11 Tunnel Port Down Sync-Successful for tunnel: 11 Tunnel Update MTU Sync-Receive event for tunnel: 11 Tunnel Update MTU Sync-Successful for tunnel: 11 Tunnel Delete Sync-Receive event for tunnel: 11 Tunnel Delete Sync-Successful for tunnel: 11 Tunnel Delete Nhop Sync-Receive event for tunnel: 11 Tunnel Delete Nhop Sync-Successful for tunnel: 11 Tunnel Delete TTI Sync-Receive event for tunnel: 11 Tunnel Delete Origination entry Sync-Receive event for tunnel: 11 Tunnel Delete Origination entry Sync-Successful for tunnel: 11 process_one_l3_unicast_update: entryType 6 Fill Sync Tunnel Entry-Bad parameters. Failed for tunnel: 11 Fill Sync Tunnel Entry-Bad TS entry. Failed for tunnel: 11 pack_tunnel_entry_change called with tunnel_index: 11 operation: TUNNEL_SYNC_UPDATE_NHOP pack_tunnel_entry_list called with tunnel_index: 11 operation: TUNNEL_SYNC_CREATE_ALL, from_beginning: 1 Sync-ing tunnel entry 11 [pp_puma_tunnel_hotswap_insert] No tunnel start info for tunnel 11 DEBUG 0x8: Tunnel 11 already deleted DEBUG 0x8: Tunnel 11 pp_delete_tunnel_entry DEBUG 0x8: Can not find route for tunnel id 11, hw index 23, src 10.22.33.254, dest 10.22.33.252 DEBUG 0x8: create GRE tunnel origination because find route for tunnel id 11, hw index 23, src 10.22.33.254, dest 10.22.33.252 DEBUG 0x8: Route for tunnel id 11 is via another tunnel or management port 22 DEBUG 0x8: Direct route for tunnel id 11 dest 10.22.33.252 has unresolved ARP DEBUG 0x8: indirect route for tunnel id 11 dest 10.22.33.252 next hop 10.11.25.5 has unresolved ARP DEBUG 0x8: indirect route for tunnel id 11 destination 10.22.33.252 next hop 10.11.25.5 has resolved ARP - CMD => route DEBUG 0x8: Set next hop to Drop for tunnel id 11, hw index 23, src 10.22.33.254, dest 10.22.33.252 DEBUG 0x8: Tunnel 11 - next hop 10.11.25.5 has no link-layer DEBUG 0x8: bring tunnel id 11 up with drop DEBUG 0x8: Create tunnel id 11 with next hop 185276677 - old next hop is 125276633 DEBUG 0x8: bring tunnel id 11 up Update_hw_routes for Tunnel 11 Path MTU: Tunnel 11 - reset path mtu timer 456 (3344) Path MTU: Tunnel 11 - failed to reset path mtu timer 456 (3344) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 95 debug ip gre packet debug ip gre packet Activates the debugging of GRE packet processing. Syntax debug ip gre packet no debug ip gre packet Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip gre packet GRE: Error - IP GRE packet with invalid Ptype 0x1A4 GRE: Error - IP GRE packet with invalid first word 0x2C GRE: Error - IP GRE packet with invalid first word 0x2C GRE fragment : Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64 id 324 GRE Packet too big - need extra processing: Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64 GRE Reassembly: Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64 GRE : Rx IP GRE Pkt: src 10.22.33.254, dst 224.0.0.5, len 64 GRE: Error - Rx IP Pkt with invalid Inner IPv4 header GRE: Error - Rx IP Pkt with 2 GRE headers: Inner src 10.22.33.254, Inner dst 224.0.0.5, len 64 GRE: Dropping the packet as GRE tnnl 11 is not UP GRE_LP: Error - LP TX GRE packet is in LOOP GRE : FORWARD IP to GRE tunnel 11 - Pkt: src 10.22.33.254, dst 224.0.0.5, len 64 GRE : Failed to FORWARD IP to GRE tunnel 11 - Pkt: src 10.22.33.254, dst 224.0.0.5, No route 96 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip icmp events debug ip icmp events Activates ICMP events debugging. Syntax debug ip icmp events no debug ip icmp events Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip icmp events ICMP: events debugging is on device# ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 97 debug ip icmp events debug ip icmp events Activates ICMP events debugging. Syntax debug ip icmp events no debug ip icmp events Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip icmp events ICMP: events debugging is on device# ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 98 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip icmp events debug ip icmp events Activates ICMP events debugging. Syntax debug ip icmp events no debug ip icmp events Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip icmp events ICMP: events debugging is on device# ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 ICMP: rcvd echo request packet of length 40 from 10.44.22.11 ICMP: send echo reply packet of length 60 to 10.44.22.11 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 99 debug ip icmp packets debug ip icmp packets Activates ICMP packets debugging. Syntax debug ip icmp packets no debug ip icmp packets Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip icmp packets ICMP: packets debugging is on device# !SR_SWITCH_ROUTER!ICMP_DEBUG_RX ICMP: Received message from 10.44.22.11 !SR_SWITCH_ROUTER!ICMP_DEBUG_RX ICMP: Received message from 10.44.22.11 !SR_SWITCH_ROUTER!ICMP_DEBUG_RX ICMP: Received message from 10.44.22.11 !SR_SWITCH_ROUTER!ICMP_DEBUG_RX ICMP: Received message from 10.44.22.11 100 to 10.44.22.36 port 1/1/1 size 40 to 10.44.22.36 port 1/1/1 size 40 to 10.44.22.36 port 1/1/1 size 40 to 10.44.22.36 port 1/1/1 size 40 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif debug ip igmp add-del-oif Displays information about the addition or deletion of the outgoing interfaces (OIFs). Syntax debug ip igmp add-del-oif no debug ip igmp add-del-oif Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 101 debug ip igmp add-del-oif Usage Guidelines Examples device# debug ip igmp add-del-oif add-del-oif enabled device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp add-del-oif is enabled device# debug ip igmp device# IGMP: rcvd Report-V2(t=22) g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.158 resp=100, pkt S=10.17.17.222 to 239.0.0.158, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.159 resp=100, pkt S=10.17.17.222 to 239.0.0.159, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.160 resp=100, pkt S=10.17.17.222 to 239.0.0.160, on v17 (phy 2/1/17), igmp_size=8 device# IGMP: rcvd Report-V2(t=22) g=239.0.0.161 resp=100, pkt S=10.17.17.222 to 239.0.0.161, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.162 resp=100, pkt S=10.17.17.222 to 239.0.0.162, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.163 resp=100, pkt S=10.17.17.222 to 239.0.0.163, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.164 resp=100, pkt S=10.17.17.222 to 239.0.0.164, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.165 resp=100, pkt S=10.17.17.222 to 239.0.0.165, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.166 resp=100, pkt S=10.17.17.222 to 239.0.0.166, on v17 (phy 2/1/17), igmp_size=8 nIGMP: rcvd Report-V2(t=22) g=239.0.0.167 resp=100, pkt S=10.17.17.222 to 239.0.0.167, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.168 resp=100, pkt S=10.17.17.222 to 239.0.0.168, on v17 (phy 2/1/17), igmp_size=8 o IGMP: rcvd Report-V2(t=22) g=239.0.0.169 resp=100, pkt S=10.17.17.222 to 239.0.0.169, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.170 resp=100, pkt S=10.17.17.222 to 239.0.0.170, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.171 resp=100, pkt S=10.17.17.222 to 239.0.0.171, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.172 resp=100, pkt S=10.17.17.222 to 239.0.0.172, on v17 (phy 2/1/17), igmp_size=8 dIGMP: rcvd Report-V2(t=22) g=239.0.0.173 resp=100, pkt S=10.17.17.222 to 239.0.0.173, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.174 resp=100, pkt S=10.17.17.222 to 239.0.0.174, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.175 resp=100, pkt S=10.17.17.222 to 239.0.0.175, on v17 (phy 102 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 eIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 bIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) g=239.0.0.176 resp=100, pkt S=10.17.17.222 to 239.0.0.176, on v17 (phy g=239.0.0.177 resp=100, pkt S=10.17.17.222 to 239.0.0.177, on v17 (phy g=239.0.0.178 resp=100, pkt S=10.17.17.222 to 239.0.0.178, on v17 (phy g=239.0.0.179 resp=100, pkt S=10.17.17.222 to 239.0.0.179, on v17 (phy g=239.0.0.180 resp=100, pkt S=10.17.17.222 to 239.0.0.180, on v17 (phy g=239.0.0.181 resp=100, pkt S=10.17.17.222 to 239.0.0.181, on v17 (phy g=239.0.0.182 resp=100, pkt S=10.17.17.222 to 239.0.0.182, on v17 (phy g=239.0.0.183 resp=100, pkt S=10.17.17.222 to 239.0.0.183, on v17 (phy g=239.0.0.184 resp=100, pkt S=10.17.17.222 to 239.0.0.184, on v17 (phy g=239.0.0.185 resp=100, pkt S=10.17.17.222 to 239.0.0.185, on v17 (phy g=239.0.0.186 resp=100, pkt S=10.17.17.222 to 239.0.0.186, on v17 (phy g=239.0.0.187 resp=100, pkt S=10.17.17.222 to 239.0.0.187, on v17 (phy g=239.0.0.188 resp=100, pkt S=10.17.17.222 to 239.0.0.188, on v17 (phy g=239.0.0.189 resp=100, pkt S=10.17.17.222 to 239.0.0.189, on v17 (phy g=239.0.0.190 resp=100, pkt S=10.17.17.222 to 239.0.0.190, on v17 (phy g=239.0.0.191 resp=100, pkt S=10.17.17.222 to 239.0.0.191, on v17 (phy g=239.0.0.192 resp=100, pkt S=10.17.17.222 to 239.0.0.192, on v17 (phy g=239.0.0.193 resp=100, pkt S=10.17.17.222 to 239.0.0.193, on v17 (phy g=239.0.0.194 resp=100, pkt S=10.17.17.222 to 239.0.0.194, on v17 (phy g=239.0.0.195 resp=100, pkt S=10.17.17.222 to 239.0.0.195, on v17 (phy g=239.0.0.196 resp=100, pkt S=10.17.17.222 to 239.0.0.196, on v17 (phy g=239.0.0.197 resp=100, pkt S=10.17.17.222 to 239.0.0.197, on v17 (phy g=239.0.0.198 resp=100, pkt S=10.17.17.222 to 239.0.0.198, on v17 (phy g=239.0.0.199 resp=100, pkt S=10.17.17.222 to 239.0.0.199, on v17 (phy g=239.0.0.200 resp=100, pkt S=10.17.17.222 to 239.0.0.200, on v17 (phy g=239.0.0.201 resp=100, pkt S=10.17.17.222 to 239.0.0.201, on v17 (phy g=239.0.0.202 resp=100, pkt S=10.17.17.222 to 239.0.0.202, on v17 (phy g=239.0.0.203 resp=100, pkt S=10.17.17.222 to 239.0.0.203, on v17 (phy g=239.0.0.204 resp=100, pkt S=10.17.17.222 to 239.0.0.204, on v17 (phy g=239.0.0.205 resp=100, pkt S=10.17.17.222 to 239.0.0.205, on v17 (phy g=239.0.0.206 resp=100, pkt S=10.17.17.222 to 239.0.0.206, on v17 (phy g=239.0.0.207 resp=100, pkt S=10.17.17.222 to 239.0.0.207, on v17 (phy g=239.0.0.208 resp=100, pkt S=10.17.17.222 to 239.0.0.208, on v17 (phy g=239.0.0.209 resp=100, pkt S=10.17.17.222 to 239.0.0.209, on v17 (phy g=239.0.0.210 resp=100, pkt S=10.17.17.222 to 239.0.0.210, on v17 (phy Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 g=239.0.0.211 resp=100, pkt S=10.17.17.222 to 239.0.0.211, on v17 (phy 103 debug ip igmp add-del-oif 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 aIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 g=239.0.0.212 resp=100, pkt S=10.17.17.222 to 239.0.0.212, on v17 (phy g=239.0.0.213 resp=100, pkt S=10.17.17.222 to 239.0.0.213, on v17 (phy g=239.0.0.214 resp=100, pkt S=10.17.17.222 to 239.0.0.214, on v17 (phy g=239.0.0.215 resp=100, pkt S=10.17.17.222 to 239.0.0.215, on v17 (phy g=239.0.0.216 resp=100, pkt S=10.17.17.222 to 239.0.0.216, on v17 (phy g=239.0.0.217 resp=100, pkt S=10.17.17.222 to 239.0.0.217, on v17 (phy g=239.0.0.218 resp=100, pkt S=10.17.17.222 to 239.0.0.218, on v17 (phy g=239.0.0.219 resp=100, pkt S=10.17.17.222 to 239.0.0.219, on v17 (phy g=239.0.0.220 resp=100, pkt S=10.17.17.222 to 239.0.0.220, on v17 (phy g=239.0.0.221 resp=100, pkt S=10.17.17.222 to 239.0.0.221, on v17 (phy g=239.0.0.222 resp=100, pkt S=10.17.17.222 to 239.0.0.222, on v17 (phy g=239.0.0.223 resp=100, pkt S=10.17.17.222 to 239.0.0.223, on v17 (phy g=239.0.0.224 resp=100, pkt S=10.17.17.222 to 239.0.0.224, on v17 (phy g=239.0.0.225 resp=100, pkt S=10.17.17.222 to 239.0.0.225, on v17 (phy g=239.0.0.226 resp=100, pkt S=10.17.17.222 to 239.0.0.226, on v17 (phy g=239.0.0.227 resp=100, pkt S=10.17.17.222 to 239.0.0.227, on v17 (phy g=239.0.0.228 resp=100, pkt S=10.17.17.222 to 239.0.0.228, on v17 (phy g=239.0.0.229 resp=100, pkt S=10.17.17.222 to 239.0.0.229, on v17 (phy g=239.0.0.230 resp=100, pkt S=10.17.17.222 to 239.0.0.230, on v17 (phy Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware 104 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif debug ip igmp add-del-oif Displays information about the addition or deletion of the outgoing interfaces (OIFs). Syntax debug ip igmp add-del-oif no debug ip igmp add-del-oif Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 105 debug ip igmp add-del-oif Usage Guidelines Examples device# debug ip igmp add-del-oif add-del-oif enabled device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp add-del-oif is enabled device# debug ip igmp device# IGMP: rcvd Report-V2(t=22) g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.158 resp=100, pkt S=10.17.17.222 to 239.0.0.158, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.159 resp=100, pkt S=10.17.17.222 to 239.0.0.159, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.160 resp=100, pkt S=10.17.17.222 to 239.0.0.160, on v17 (phy 2/1/17), igmp_size=8 device# IGMP: rcvd Report-V2(t=22) g=239.0.0.161 resp=100, pkt S=10.17.17.222 to 239.0.0.161, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.162 resp=100, pkt S=10.17.17.222 to 239.0.0.162, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.163 resp=100, pkt S=10.17.17.222 to 239.0.0.163, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.164 resp=100, pkt S=10.17.17.222 to 239.0.0.164, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.165 resp=100, pkt S=10.17.17.222 to 239.0.0.165, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.166 resp=100, pkt S=10.17.17.222 to 239.0.0.166, on v17 (phy 2/1/17), igmp_size=8 nIGMP: rcvd Report-V2(t=22) g=239.0.0.167 resp=100, pkt S=10.17.17.222 to 239.0.0.167, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.168 resp=100, pkt S=10.17.17.222 to 239.0.0.168, on v17 (phy 2/1/17), igmp_size=8 o IGMP: rcvd Report-V2(t=22) g=239.0.0.169 resp=100, pkt S=10.17.17.222 to 239.0.0.169, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.170 resp=100, pkt S=10.17.17.222 to 239.0.0.170, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.171 resp=100, pkt S=10.17.17.222 to 239.0.0.171, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.172 resp=100, pkt S=10.17.17.222 to 239.0.0.172, on v17 (phy 2/1/17), igmp_size=8 dIGMP: rcvd Report-V2(t=22) g=239.0.0.173 resp=100, pkt S=10.17.17.222 to 239.0.0.173, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.174 resp=100, pkt S=10.17.17.222 to 239.0.0.174, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.175 resp=100, pkt S=10.17.17.222 to 239.0.0.175, on v17 (phy 106 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 eIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 bIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) g=239.0.0.176 resp=100, pkt S=10.17.17.222 to 239.0.0.176, on v17 (phy g=239.0.0.177 resp=100, pkt S=10.17.17.222 to 239.0.0.177, on v17 (phy g=239.0.0.178 resp=100, pkt S=10.17.17.222 to 239.0.0.178, on v17 (phy g=239.0.0.179 resp=100, pkt S=10.17.17.222 to 239.0.0.179, on v17 (phy g=239.0.0.180 resp=100, pkt S=10.17.17.222 to 239.0.0.180, on v17 (phy g=239.0.0.181 resp=100, pkt S=10.17.17.222 to 239.0.0.181, on v17 (phy g=239.0.0.182 resp=100, pkt S=10.17.17.222 to 239.0.0.182, on v17 (phy g=239.0.0.183 resp=100, pkt S=10.17.17.222 to 239.0.0.183, on v17 (phy g=239.0.0.184 resp=100, pkt S=10.17.17.222 to 239.0.0.184, on v17 (phy g=239.0.0.185 resp=100, pkt S=10.17.17.222 to 239.0.0.185, on v17 (phy g=239.0.0.186 resp=100, pkt S=10.17.17.222 to 239.0.0.186, on v17 (phy g=239.0.0.187 resp=100, pkt S=10.17.17.222 to 239.0.0.187, on v17 (phy g=239.0.0.188 resp=100, pkt S=10.17.17.222 to 239.0.0.188, on v17 (phy g=239.0.0.189 resp=100, pkt S=10.17.17.222 to 239.0.0.189, on v17 (phy g=239.0.0.190 resp=100, pkt S=10.17.17.222 to 239.0.0.190, on v17 (phy g=239.0.0.191 resp=100, pkt S=10.17.17.222 to 239.0.0.191, on v17 (phy g=239.0.0.192 resp=100, pkt S=10.17.17.222 to 239.0.0.192, on v17 (phy g=239.0.0.193 resp=100, pkt S=10.17.17.222 to 239.0.0.193, on v17 (phy g=239.0.0.194 resp=100, pkt S=10.17.17.222 to 239.0.0.194, on v17 (phy g=239.0.0.195 resp=100, pkt S=10.17.17.222 to 239.0.0.195, on v17 (phy g=239.0.0.196 resp=100, pkt S=10.17.17.222 to 239.0.0.196, on v17 (phy g=239.0.0.197 resp=100, pkt S=10.17.17.222 to 239.0.0.197, on v17 (phy g=239.0.0.198 resp=100, pkt S=10.17.17.222 to 239.0.0.198, on v17 (phy g=239.0.0.199 resp=100, pkt S=10.17.17.222 to 239.0.0.199, on v17 (phy g=239.0.0.200 resp=100, pkt S=10.17.17.222 to 239.0.0.200, on v17 (phy g=239.0.0.201 resp=100, pkt S=10.17.17.222 to 239.0.0.201, on v17 (phy g=239.0.0.202 resp=100, pkt S=10.17.17.222 to 239.0.0.202, on v17 (phy g=239.0.0.203 resp=100, pkt S=10.17.17.222 to 239.0.0.203, on v17 (phy g=239.0.0.204 resp=100, pkt S=10.17.17.222 to 239.0.0.204, on v17 (phy g=239.0.0.205 resp=100, pkt S=10.17.17.222 to 239.0.0.205, on v17 (phy g=239.0.0.206 resp=100, pkt S=10.17.17.222 to 239.0.0.206, on v17 (phy g=239.0.0.207 resp=100, pkt S=10.17.17.222 to 239.0.0.207, on v17 (phy g=239.0.0.208 resp=100, pkt S=10.17.17.222 to 239.0.0.208, on v17 (phy g=239.0.0.209 resp=100, pkt S=10.17.17.222 to 239.0.0.209, on v17 (phy g=239.0.0.210 resp=100, pkt S=10.17.17.222 to 239.0.0.210, on v17 (phy Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 g=239.0.0.211 resp=100, pkt S=10.17.17.222 to 239.0.0.211, on v17 (phy 107 debug ip igmp add-del-oif 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 aIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 g=239.0.0.212 resp=100, pkt S=10.17.17.222 to 239.0.0.212, on v17 (phy g=239.0.0.213 resp=100, pkt S=10.17.17.222 to 239.0.0.213, on v17 (phy g=239.0.0.214 resp=100, pkt S=10.17.17.222 to 239.0.0.214, on v17 (phy g=239.0.0.215 resp=100, pkt S=10.17.17.222 to 239.0.0.215, on v17 (phy g=239.0.0.216 resp=100, pkt S=10.17.17.222 to 239.0.0.216, on v17 (phy g=239.0.0.217 resp=100, pkt S=10.17.17.222 to 239.0.0.217, on v17 (phy g=239.0.0.218 resp=100, pkt S=10.17.17.222 to 239.0.0.218, on v17 (phy g=239.0.0.219 resp=100, pkt S=10.17.17.222 to 239.0.0.219, on v17 (phy g=239.0.0.220 resp=100, pkt S=10.17.17.222 to 239.0.0.220, on v17 (phy g=239.0.0.221 resp=100, pkt S=10.17.17.222 to 239.0.0.221, on v17 (phy g=239.0.0.222 resp=100, pkt S=10.17.17.222 to 239.0.0.222, on v17 (phy g=239.0.0.223 resp=100, pkt S=10.17.17.222 to 239.0.0.223, on v17 (phy g=239.0.0.224 resp=100, pkt S=10.17.17.222 to 239.0.0.224, on v17 (phy g=239.0.0.225 resp=100, pkt S=10.17.17.222 to 239.0.0.225, on v17 (phy g=239.0.0.226 resp=100, pkt S=10.17.17.222 to 239.0.0.226, on v17 (phy g=239.0.0.227 resp=100, pkt S=10.17.17.222 to 239.0.0.227, on v17 (phy g=239.0.0.228 resp=100, pkt S=10.17.17.222 to 239.0.0.228, on v17 (phy g=239.0.0.229 resp=100, pkt S=10.17.17.222 to 239.0.0.229, on v17 (phy g=239.0.0.230 resp=100, pkt S=10.17.17.222 to 239.0.0.230, on v17 (phy Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware 108 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif all debug ip igmp add-del-oif all Displays information about the addition or deletion of all the OIFs that are IGMP-enabled. Syntax debug ip igmp add-del-oif all no debug ip igmp add-del-oif all Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 109 debug ip igmp add-del-oif all Usage Guidelines Examples device# debug ip igmp add-del-oif all add-del-oif all enabled device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp add-del-oif all is enabled device# debug ip igmp device# IGMP: rcvd Report-V2(t=22) g=239.0.0.99 resp=100, pkt S=10.17.17.222 to 239.0.0.99, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.100 resp=100, pkt S=10.17.17.222 to 239.0.0.100, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.101 resp=100, pkt S=10.17.17.222 to 239.0.0.101, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.102 resp=100, pkt S=10.17.17.222 to 239.0.0.102, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.103 resp=100, pkt S=10.17.17.222 to 239.0.0.103, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.104 resp=100, pkt S=10.17.17.222 to 239.0.0.104, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.105 resp=100, pkt S=10.17.17.222 to 239.0.0.105, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.106 resp=100, pkt S=10.17.17.222 to 239.0.0.106, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.107 resp=100, pkt S=10.17.17.222 to 239.0.0.107, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.108 resp=100, pkt S=10.17.17.222 to 239.0.0.108, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.109 resp=100, pkt S=10.17.17.222 to 239.0.0.109, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.110 resp=100, pkt S=10.17.17.222 to 239.0.0.110, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.111 resp=100, pkt S=10.17.17.222 to 239.0.0.111, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.112 resp=100, pkt S=10.17.17.222 to 239.0.0.112, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.113 resp=100, pkt S=10.17.17.222 to 239.0.0.113, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.114 resp=100, pkt S=10.17.17.222 to 239.0.0.114, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.115 resp=100, pkt S=10.17.17.222 to 239.0.0.115, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.116 resp=100, pkt S=10.17.17.222 to 239.0.0.116, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.117 resp=100, pkt S=10.17.17.222 to 239.0.0.117, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.118 resp=100, pkt S=10.17.17.222 to 239.0.0.118, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.119 resp=100, pkt S=10.17.17.222 to 239.0.0.119, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.120 resp=100, pkt S=10.17.17.222 to 239.0.0.120, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.121 resp=100, pkt S=10.17.17.222 to 239.0.0.121, on v17 (phy 2/1/17), igmp_size=8 device# IGMP: rcvd Report-V2(t=22) g=239.0.0.122 resp=100, pkt S=10.17.17.222 to 239.0.0.122, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.123 resp=100, pkt S=10.17.17.222 to 239.0.0.123, on v17 (phy 2/1/17), igmp_size=8 device# IGMP: rcvd Report-V2(t=22) g=239.0.0.124 resp=100, pkt S=10.17.17.222 to 239.0.0.124, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.125 resp=100, pkt S=10.17.17.222 to 239.0.0.125, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.126 resp=100, pkt S=10.17.17.222 to 239.0.0.126, on v17 (phy 2/1/17), igmp_size=8 110 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif all IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 nIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 oIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 dIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 eIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 bIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 aIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 g=239.0.0.127 resp=100, pkt S=10.17.17.222 to 239.0.0.127, on v17 (phy g=239.0.0.128 resp=100, pkt S=10.17.17.222 to 239.0.0.128, on v17 (phy g=239.0.0.129 resp=100, pkt S=10.17.17.222 to 239.0.0.129, on v17 (phy g=239.0.0.130 resp=100, pkt S=10.17.17.222 to 239.0.0.130, on v17 (phy g=239.0.0.131 resp=100, pkt S=10.17.17.222 to 239.0.0.131, on v17 (phy g=239.0.0.132 resp=100, pkt S=10.17.17.222 to 239.0.0.132, on v17 (phy g=239.0.0.133 resp=100, pkt S=10.17.17.222 to 239.0.0.133, on v17 (phy g=239.0.0.134 resp=100, pkt S=10.17.17.222 to 239.0.0.134, on v17 (phy g=239.0.0.135 resp=100, pkt S=10.17.17.222 to 239.0.0.135, on v17 (phy g=239.0.0.136 resp=100, pkt S=10.17.17.222 to 239.0.0.136, on v17 (phy g=239.0.0.137 resp=100, pkt S=10.17.17.222 to 239.0.0.137, on v17 (phy g=239.0.0.138 resp=100, pkt S=10.17.17.222 to 239.0.0.138, on v17 (phy g=239.0.0.139 resp=100, pkt S=10.17.17.222 to 239.0.0.139, on v17 (phy g=239.0.0.140 resp=100, pkt S=10.17.17.222 to 239.0.0.140, on v17 (phy g=239.0.0.141 resp=100, pkt S=10.17.17.222 to 239.0.0.141, on v17 (phy g=239.0.0.142 resp=100, pkt S=10.17.17.222 to 239.0.0.142, on v17 (phy g=239.0.0.143 resp=100, pkt S=10.17.17.222 to 239.0.0.143, on v17 (phy g=239.0.0.144 resp=100, pkt S=10.17.17.222 to 239.0.0.144, on v17 (phy g=239.0.0.145 resp=100, pkt S=10.17.17.222 to 239.0.0.145, on v17 (phy g=239.0.0.146 resp=100, pkt S=10.17.17.222 to 239.0.0.146, on v17 (phy g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17 (phy g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 111 debug ip igmp add-del-oif all debug ip igmp add-del-oif all Displays information about the addition or deletion of all the OIFs that are IGMP-enabled. Syntax debug ip igmp add-del-oif all no debug ip igmp add-del-oif all Modes Privileged EXEC mode 112 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif all Usage Guidelines Examples device# debug ip igmp add-del-oif all add-del-oif all enabled device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp add-del-oif all is enabled device# debug ip igmp device# IGMP: rcvd Report-V2(t=22) g=239.0.0.99 resp=100, pkt S=10.17.17.222 to 239.0.0.99, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.100 resp=100, pkt S=10.17.17.222 to 239.0.0.100, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.101 resp=100, pkt S=10.17.17.222 to 239.0.0.101, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.102 resp=100, pkt S=10.17.17.222 to 239.0.0.102, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.103 resp=100, pkt S=10.17.17.222 to 239.0.0.103, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.104 resp=100, pkt S=10.17.17.222 to 239.0.0.104, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.105 resp=100, pkt S=10.17.17.222 to 239.0.0.105, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.106 resp=100, pkt S=10.17.17.222 to 239.0.0.106, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.107 resp=100, pkt S=10.17.17.222 to 239.0.0.107, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.108 resp=100, pkt S=10.17.17.222 to 239.0.0.108, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.109 resp=100, pkt S=10.17.17.222 to 239.0.0.109, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.110 resp=100, pkt S=10.17.17.222 to 239.0.0.110, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.111 resp=100, pkt S=10.17.17.222 to 239.0.0.111, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.112 resp=100, pkt S=10.17.17.222 to 239.0.0.112, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.113 resp=100, pkt S=10.17.17.222 to 239.0.0.113, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.114 resp=100, pkt S=10.17.17.222 to 239.0.0.114, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.115 resp=100, pkt S=10.17.17.222 to 239.0.0.115, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.116 resp=100, pkt S=10.17.17.222 to 239.0.0.116, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.117 resp=100, pkt S=10.17.17.222 to 239.0.0.117, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.118 resp=100, pkt S=10.17.17.222 to 239.0.0.118, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.119 resp=100, pkt S=10.17.17.222 to 239.0.0.119, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.120 resp=100, pkt S=10.17.17.222 to 239.0.0.120, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.121 resp=100, pkt S=10.17.17.222 to 239.0.0.121, on v17 (phy 2/1/17), igmp_size=8 device# IGMP: rcvd Report-V2(t=22) g=239.0.0.122 resp=100, pkt S=10.17.17.222 to 239.0.0.122, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.123 resp=100, pkt S=10.17.17.222 to 239.0.0.123, on v17 (phy 2/1/17), igmp_size=8 device# IGMP: rcvd Report-V2(t=22) g=239.0.0.124 resp=100, pkt S=10.17.17.222 to 239.0.0.124, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.125 resp=100, pkt S=10.17.17.222 to 239.0.0.125, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.126 resp=100, pkt S=10.17.17.222 to 239.0.0.126, on v17 (phy 2/1/17), igmp_size=8 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 113 debug ip igmp add-del-oif all IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 nIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 oIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 dIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 eIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 bIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 aIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 g=239.0.0.127 resp=100, pkt S=10.17.17.222 to 239.0.0.127, on v17 (phy g=239.0.0.128 resp=100, pkt S=10.17.17.222 to 239.0.0.128, on v17 (phy g=239.0.0.129 resp=100, pkt S=10.17.17.222 to 239.0.0.129, on v17 (phy g=239.0.0.130 resp=100, pkt S=10.17.17.222 to 239.0.0.130, on v17 (phy g=239.0.0.131 resp=100, pkt S=10.17.17.222 to 239.0.0.131, on v17 (phy g=239.0.0.132 resp=100, pkt S=10.17.17.222 to 239.0.0.132, on v17 (phy g=239.0.0.133 resp=100, pkt S=10.17.17.222 to 239.0.0.133, on v17 (phy g=239.0.0.134 resp=100, pkt S=10.17.17.222 to 239.0.0.134, on v17 (phy g=239.0.0.135 resp=100, pkt S=10.17.17.222 to 239.0.0.135, on v17 (phy g=239.0.0.136 resp=100, pkt S=10.17.17.222 to 239.0.0.136, on v17 (phy g=239.0.0.137 resp=100, pkt S=10.17.17.222 to 239.0.0.137, on v17 (phy g=239.0.0.138 resp=100, pkt S=10.17.17.222 to 239.0.0.138, on v17 (phy g=239.0.0.139 resp=100, pkt S=10.17.17.222 to 239.0.0.139, on v17 (phy g=239.0.0.140 resp=100, pkt S=10.17.17.222 to 239.0.0.140, on v17 (phy g=239.0.0.141 resp=100, pkt S=10.17.17.222 to 239.0.0.141, on v17 (phy g=239.0.0.142 resp=100, pkt S=10.17.17.222 to 239.0.0.142, on v17 (phy g=239.0.0.143 resp=100, pkt S=10.17.17.222 to 239.0.0.143, on v17 (phy g=239.0.0.144 resp=100, pkt S=10.17.17.222 to 239.0.0.144, on v17 (phy g=239.0.0.145 resp=100, pkt S=10.17.17.222 to 239.0.0.145, on v17 (phy g=239.0.0.146 resp=100, pkt S=10.17.17.222 to 239.0.0.146, on v17 (phy g=239.0.0.147 resp=100, pkt S=10.17.17.222 to 239.0.0.147, on v17 (phy g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy g=239.0.0.152 resp=100, pkt S=10.17.17.222 to 239.0.0.152, on v17 (phy g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy g=239.0.0.157 resp=100, pkt S=10.17.17.222 to 239.0.0.157, on v17 (phy Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware 114 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif stack debug ip igmp add-del-oif stack Monitors and displays instances of multicast cache activity, such as OIF additions or deletions, and generates a stack trace of the add or delete event. Syntax debug ip igmp add-del-oif stack no debug ip igmp add-del-oif stack Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 115 debug ip igmp add-del-oif stack Usage Guidelines Examples device# debug ip igmp add-del-oif stack add-del-oif stack enabled device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp add-del-oif stack is enabled device# debug ip ig device# IGMP: rcvd Report-V2(t=22) g=239.0.1.8 resp=100, pkt S=10.17.17.222 to 239.0.1.8, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.9 resp=100, pkt S=10.17.17.222 to 239.0.1.9, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.10 resp=100, pkt S=10.17.17.222 to 239.0.1.10, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.11 resp=100, pkt S=10.17.17.222 to 239.0.1.11, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.12 resp=100, pkt S=10.17.17.222 to 239.0.1.12, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.13 resp=100, pkt S=10.17.17.222 to 239.0.1.13, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.14 resp=100, pkt S=10.17.17.222 to 239.0.1.14, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.15 resp=100, pkt S=10.17.17.222 to 239.0.1.15, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.16 resp=100, pkt S=10.17.17.222 to 239.0.1.16, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.17 resp=100, pkt S=10.17.17.222 to 239.0.1.17, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.18 resp=100, pkt S=10.17.17.222 to 239.0.1.18, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.19 resp=100, pkt S=10.17.17.222 to 239.0.1.19, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.20 resp=100, pkt S=10.17.17.222 to 239.0.1.20, on v17 (phy 2/1/17), igmp_size=8 nIGMP: rcvd Report-V2(t=22) g=239.0.1.21 resp=100, pkt S=10.17.17.222 to 239.0.1.21, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.22 resp=100, pkt S=10.17.17.222 to 239.0.1.22, on v17 (phy 2/1/17), igmp_size=8 oIGMP: rcvd Report-V2(t=22) g=239.0.1.23 resp=100, pkt S=10.17.17.222 to 239.0.1.23, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.24 resp=100, pkt S=10.17.17.222 to 239.0.1.24, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.25 resp=100, pkt S=10.17.17.222 to 239.0.1.25, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.26 resp=100, pkt S=10.17.17.222 to 239.0.1.26, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.27 resp=100, pkt S=10.17.17.222 to 239.0.1.27, on v17 (phy 2/1/17), igmp_size=8 dIGMP: rcvd Report-V2(t=22) g=239.0.1.28 resp=100, pkt S=10.17.17.222 to 239.0.1.28, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.29 resp=100, pkt S=10.17.17.222 to 239.0.1.29, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.30 resp=100, pkt S=10.17.17.222 to 239.0.1.30, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.31 resp=100, pkt S=10.17.17.222 to 239.0.1.31, on v17 (phy 2/1/17), igmp_size=8 eIGMP: rcvd Report-V2(t=22) g=239.0.1.32 resp=100, pkt S=10.17.17.222 to 239.0.1.32, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.33 resp=100, pkt S=10.17.17.222 to 239.0.1.33, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.34 resp=100, pkt S=10.17.17.222 to 239.0.1.34, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.35 resp=100, pkt S=10.17.17.222 to 239.0.1.35, on v17 (phy 2/1/17), igmp_size=8 bIGMP: rcvd Report-V2(t=22) g=239.0.1.36 resp=100, pkt S=10.17.17.222 to 239.0.1.36, on v17 (phy 2/1/17), igmp_size=8 116 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp add-del-oif stack IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 aIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) 2/1/17), igmp_size=8 g=239.0.1.37 resp=100, pkt S=10.17.17.222 to 239.0.1.37, on v17 (phy g=239.0.1.38 resp=100, pkt S=10.17.17.222 to 239.0.1.38, on v17 (phy g=239.0.1.39 resp=100, pkt S=10.17.17.222 to 239.0.1.39, on v17 (phy g=239.0.1.40 resp=100, pkt S=10.17.17.222 to 239.0.1.40, on v17 (phy g=239.0.1.41 resp=100, pkt S=10.17.17.222 to 239.0.1.41, on v17 (phy g=239.0.1.42 resp=100, pkt S=10.17.17.222 to 239.0.1.42, on v17 (phy g=239.0.1.43 resp=100, pkt S=10.17.17.222 to 239.0.1.43, on v17 (phy g=239.0.1.44 resp=100, pkt S=10.17.17.222 to 239.0.1.44, on v17 (phy g=239.0.1.45 resp=100, pkt S=10.17.17.222 to 239.0.1.45, on v17 (phy g=239.0.1.46 resp=100, pkt S=10.17.17.222 to 239.0.1.46, on v17 (phy g=239.0.1.47 resp=100, pkt S=10.17.17.222 to 239.0.1.47, on v17 (phy g=239.0.1.48 resp=100, pkt S=10.17.17.222 to 239.0.1.48, on v17 (phy g=239.0.1.49 resp=100, pkt S=10.17.17.222 to 239.0.1.49, on v17 (phy g=239.0.1.50 resp=100, pkt S=10.17.17.222 to 239.0.1.50, on v17 (phy g=239.0.1.51 resp=100, pkt S=10.17.17.222 to 239.0.1.51, on v17 (phy g=239.0.1.52 resp=100, pkt S=10.17.17.222 to 239.0.1.52, on v17 (phy g=239.0.1.53 resp=100, pkt S=10.17.17.222 to 239.0.1.53, on v17 (phy g=239.0.1.54 resp=100, pkt S=10.17.17.222 to 239.0.1.54, on v17 (phy g=239.0.1.55 resp=100, pkt S=10.17.17.222 to 239.0.1.55, on v17 (phy g=239.0.1.56 resp=100, pkt S=10.17.17.222 to 239.0.1.56, on v17 (phy g=239.0.1.57 resp=100, pkt S=10.17.17.222 to 239.0.1.57, on v17 (phy g=239.0.1.58 resp=100, pkt S=10.17.17.222 to 239.0.1.58, on v17 (phy g=239.0.1.59 resp=100, pkt S=10.17.17.222 to 239.0.1.59, on v17 (phy g=239.0.1.60 resp=100, pkt S=10.17.17.222 to 239.0.1.60, on v17 (phy g=239.0.1.61 resp=100, pkt S=10.17.17.222 to 239.0.1.61, on v17 (phy g=239.0.1.62 resp=100, pkt S=10.17.17.222 to 239.0.1.62, on v17 (phy g=239.0.1.63 resp=100, pkt S=10.17.17.222 to 239.0.1.63, on v17 (phy g=239.0.1.64 resp=100, pkt S=10.17.17.222 to 239.0.1.64, on v17 (phy g=239.0.1.65 resp=100, pkt S=10.17.17.222 to 239.0.1.65, on v17 (phy g=239.0.1.66 resp=100, pkt S=10.17.17.222 to 239.0.1.66, on v17 (phy Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 117 debug ip igmp clear debug ip igmp clear Clears all the IGMP debug settings. Syntax debug ip igmp clear no debug ip igmp clear Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip igmp clear no debug ip igmp is enabled 118 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp down-port debug ip igmp down-port Monitors the port that is down. Syntax debug ip igmp down-port no debug ip igmp down-port Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 119 debug ip igmp down-port Usage Guidelines Examples device# debug ip igmp down-port device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp port-down is enabled device# debug ip igmp device# IGMP: rcvd Report-V2(t=22) g=239.0.0.84 resp=100, pkt S=10.17.17.222 to 239.0.0.84, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.85 resp=100, pkt S=10.17.17.222 to 239.0.0.85, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.86 resp=100, pkt S=10.17.17.222 to 239.0.0.86, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.87 resp=100, pkt S=10.17.17.222 to 239.0.0.87, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.88 resp=100, pkt S=10.17.17.222 to 239.0.0.88, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.89 resp=100, pkt S=10.17.17.222 to 239.0.0.89, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.90 resp=100, pkt S=10.17.17.222 to 239.0.0.90, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.91 resp=100, pkt S=10.17.17.222 to 239.0.0.91, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.92 resp=100, pkt S=10.17.17.222 to 239.0.0.92, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.93 resp=100, pkt S=10.17.17.222 to 239.0.0.93, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.94 resp=100, pkt S=10.17.17.222 to 239.0.0.94, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.95 resp=100, pkt S=10.17.17.222 to 239.0.0.95, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.96 resp=100, pkt S=10.17.17.222 to 239.0.0.96, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.97 resp=100, pkt S=10.17.17.222 to 239.0.0.97, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.98 resp=100, pkt S=10.17.17.222 to 239.0.0.98, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.99 resp=100, pkt S=10.17.17.222 to 239.0.0.99, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.100 resp=100, pkt S=10.17.17.222 to 239.0.0.100, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.101 resp=100, pkt S=10.17.17.222 to 239.0.0.101, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.102 resp=100, pkt S=10.17.17.222 to 239.0.0.102, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.103 resp=100, pkt S=10.17.17.222 to 239.0.0.103, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.104 resp=100, pkt S=10.17.17.222 to 239.0.0.104, on v17 (phy 2/1/17), igmp_size=8 nIGMP: rcvd Report-V2(t=22) g=239.0.0.105 resp=100, pkt S=10.17.17.222 to 239.0.0.105, on v17 (phy 2/1/17), igmp_size=8 oIGMP: rcvd Report-V2(t=22) g=239.0.0.106 resp=100, pkt S=10.17.17.222 to 239.0.0.106, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.107 resp=100, pkt S=10.17.17.222 to 239.0.0.107, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.108 resp=100, pkt S=10.17.17.222 to 239.0.0.108, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.109 resp=100, pkt S=10.17.17.222 to 239.0.0.109, on v17 (phy 2/1/17), igmp_size=8 dIGMP: rcvd Report-V2(t=22) g=239.0.0.110 resp=100, pkt S=10.17.17.222 to 239.0.0.110, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.111 resp=100, pkt S=10.17.17.222 to 239.0.0.111, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.112 resp=100, pkt S=10.17.17.222 to 239.0.0.112, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.113 resp=100, pkt S=10.17.17.222 to 239.0.0.113, on v17 (phy 120 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp down-port 2/1/17), igmp_size=8 eIGMP: rcvd Report-V2(t=22) g=239.0.0.114 resp=100, pkt S=10.17.17.222 to 239.0.0.114, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.115 resp=100, pkt S=10.17.17.222 to 239.0.0.115, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.116 resp=100, pkt S=10.17.17.222 to 239.0.0.116, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.117 resp=100, pkt S=10.17.17.222 to 239.0.0.117, on v17 (phy 2/1/17), igmp_size=8 bIGMP: rcvd Report-V2(t=22) g=239.0.0.118 resp=100, pkt S=10.17.17.222 to 239.0.0.118, on v17 (phy 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) g=239.0.0.119 resp=100, pkt S=10.17.17.222 to 239.0.0.119, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.120 resp=100, pkt S=10.17.17.222 to 239.0.0.120, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.121 resp=100, pkt S=10.17.17.222 to 239.0.0.121, on v17 (phy 2/1/17), igmp_size=8 g IGMP: rcvd Report-V2(t=22) g=239.0.0.122 resp=100, pkt S=10.17.17.222 to 239.0.0.122, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.123 resp=100, pkt S=10.17.17.222 to 239.0.0.123, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.124 resp=100, pkt S=10.17.17.222 to 239.0.0.124, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.125 resp=100, pkt S=10.17.17.222 to 239.0.0.125, on v17 (phy 2/1/17), igmp_size=8 aIGMP: rcvd Report-V2(t=22) g=239.0.0.126 resp=100, pkt S=10.17.17.222 to 239.0.0.126, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.127 resp=100, pkt S=10.17.17.222 to 239.0.0.127, on v17 (phy 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) g=239.0.0.128 resp=100, pkt S=10.17.17.222 to 239.0.0.128, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.129 resp=100, pkt S=10.17.17.222 to 239.0.0.129, on v17 (phy 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) g=239.0.0.130 resp=100, pkt S=10.17.17.222 to 239.0.0.130, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.131 resp=100, pkt S=10.17.17.222 to 239.0.0.131, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.132 resp=100, pkt S=10.17.17.222 to 239.0.0.132, on v17 (phy 2/1/17), igmp_size=8 Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 121 debug ip igmp enable debug ip igmp enable Enables IGMP debugging. Syntax debug ip igmp enable no debug ip igmp enable Modes Privileged EXEC mode Usage Guidelines Examples device# debug ip igmp enable debug ip igmp is enabled 122 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp error debug ip igmp error Displays the IGMP multicast error messages. Syntax debug ip igmp error no debug ip igmp error Modes Privileged EXEC mode Usage Guidelines Examples Device# debug ip igmp error IGMP.VRF3.ERR: Rx packet ttl 255 not 1. Dropping packet IGMP.VRF3.ERR: Rx packet ttl 255 not 1. Dropping packet IGMP.VRF3.ERR: Rx packet ttl 255 not 1. Dropping packet Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 123 debug ip igmp group debug ip igmp group Matches the IGMP-enabled group based on the IP address. Syntax debug ip igmp group ipaddr no debug ip igmp group ipaddr Parameters ipaddr Refers to the IP address of the IGMP group. Modes Privileged EXEC mode Examples device# debug ip igmp group 10.11.66.62 IGMP: No L3 mcast, pkt S=10.11.66.62 to 225.1.1.167, on v8 (phy 1/2/4), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=225.1.1.167 resp=0, pkt S=10.11.66.62 to 225.1.1.167, on VL8 (phy 1/2/4), igmp_size=8 124 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp level debug ip igmp level Sets the debug level of the IGMP. Syntax debug ip igmp level decimal no debug ip igmp level decimal Parameters decimal Specifies the level of the IGMP. The valid values are from 1 through 3. Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 125 debug ip igmp level Examples device# debug ip igmp level 1 debug level = 1 device# debug ip ig show igmp debug-enable-any = 1 debug ip igmp level 1 is enabled device# debug ip igmp device# IGMP: rcvd Report-V2(t=22) g=239.0.1.240 resp=100, pkt S=10.17.17.222 to 239.0.1.240, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.241 resp=100, pkt S=10.17.17.222 to 239.0.1.241, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.242 resp=100, pkt S=10.17.17.222 to 239.0.1.242, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.243 resp=100, pkt S=10.17.17.222 to 239.0.1.243, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.244 resp=100, pkt S=10.17.17.222 to 239.0.1.244, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.245 resp=100, pkt S=10.17.17.222 to 239.0.1.245, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.246 resp=100, pkt S=10.17.17.222 to 239.0.1.246, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.247 resp=100, pkt S=10.17.17.222 to 239.0.1.247, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.1.248 resp=100, pkt S=10.17.17.222 to 239.0.1.248, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=10.17.17.222 to 239.0.0.5, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.6 resp=100, pkt S=10.17.17.222 to 239.0.0.6, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.7 resp=100, pkt S=10.17.17.222 to 239.0.0.7, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.8 resp=100, pkt S=10.17.17.222 to 239.0.0.8, on v17 (phy 2/1/17), igmp_size=8 consume pkt nIGMP: rcvd Report-V2(t=22) g=239.0.0.9 resp=100, pkt S=10.17.17.222 to 239.0.0.9, on v17 (phy 2/1/17), igmp_size=8 consume pkt oIGMP: rcvd Report-V2(t=22) g=239.0.0.10 resp=100, pkt S=10.17.17.222 to 239.0.0.10, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.11 resp=100, pkt S=10.17.17.222 to 239.0.0.11, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.12 resp=100, pkt S=10.17.17.222 to 239.0.0.12, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.13 resp=100, pkt S=10.17.17.222 to 239.0.0.13, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.14 resp=100, pkt S=10.17.17.222 to 239.0.0.14, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.15 resp=100, pkt S=10.17.17.222 to 239.0.0.15, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.16 resp=100, pkt S=10.17.17.222 to 239.0.0.16, on v17 (phy 2/1/17), igmp_size=8 consume pkt 126 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp level IGMP: rcvd Report-V2(t=22) g=239.0.0.17 resp=100, pkt S=10.17.17.222 to 239.0.0.17, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.18 resp=100, pkt S=10.17.17.222 to 239.0.0.18, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.19 resp=100, pkt S=10.17.17.222 to 239.0.0.19, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.20 resp=100, pkt S=10.17.17.222 to 239.0.0.20, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.21 resp=100, pkt S=10.17.17.222 to 239.0.0.21, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.22 resp=100, pkt S=10.17.17.222 to 239.0.0.22, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.23 resp=100, pkt S=10.17.17.222 to 239.0.0.23, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.24 resp=100, pkt S=10.17.17.222 to 239.0.0.24, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.25 resp=100, pkt S=10.17.17.222 to 239.0.0.25, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.26 resp=100, pkt S=10.17.17.222 to 239.0.0.26, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.27 resp=100, pkt S=10.17.17.222 to 239.0.0.27, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.28 resp=100, pkt S=10.17.17.222 to 239.0.0.28, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.29 resp=100, pkt S=10.17.17.222 to 239.0.0.29, on v17 (phy 2/1/17), igmp_size=8 consume pkt dIGMP: rcvd Report-V2(t=22) g=239.0.0.30 resp=100, pkt S=10.17.17.222 to 239.0.0.30, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.31 resp=100, pkt S=10.17.17.222 to 239.0.0.31, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.32 resp=100, pkt S=10.17.17.222 to 239.0.0.32, on v17 (phy 2/1/17), igmp_size=8 consume pkt eIGMP: rcvd Report-V2(t=22) g=239.0.0.33 resp=100, pkt S=10.17.17.222 to 239.0.0.33, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.34 resp=100, pkt S=10.17.17.222 to 239.0.0.34, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.35 resp=100, pkt S=10.17.17.222 to 239.0.0.35, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.36 resp=100, pkt S=10.17.17.222 to 239.0.0.36, on v17 (phy 2/1/17), igmp_size=8 consume pkt bIGMP: rcvd Report-V2(t=22) g=239.0.0.37 resp=100, pkt S=10.17.17.222 to 239.0.0.37, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.38 resp=100, pkt S=10.17.17.222 to 239.0.0.38, on v17 (phy 2/1/17), igmp_size=8 consume pkt uIGMP: rcvd Report-V2(t=22) g=239.0.0.39 resp=100, pkt S=10.17.17.222 to 239.0.0.39, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.40 resp=100, pkt S=10.17.17.222 to 239.0.0.40, on v17 (phy 2/1/17), igmp_size=8 consume pkt Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 127 debug ip igmp level gIGMP: rcvd Report-V2(t=22) g=239.0.0.41 resp=100, pkt S=10.17.17.222 to 239.0.0.41, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.42 resp=100, pkt S=10.17.17.222 to 239.0.0.42, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.43 resp=100, pkt S=10.17.17.222 to 239.0.0.43, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.44 resp=100, pkt S=10.17.17.222 to 239.0.0.44, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.45 resp=100, pkt S=10.17.17.222 to 239.0.0.45, on v17 (phy 2/1/17), igmp_size=8 consume pkt aIGMP: rcvd Report-V2(t=22) g=239.0.0.46 resp=100, pkt S=10.17.17.222 to 239.0.0.46, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.47 resp=100, pkt S=10.17.17.222 to 239.0.0.47, on v17 (phy 2/1/17), igmp_size=8 consume pkt lIGMP: rcvd Report-V2(t=22) g=239.0.0.48 resp=100, pkt S=10.17.17.222 to 239.0.0.48, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.49 resp=100, pkt S=10.17.17.222 to 239.0.0.49, on v17 (phy 2/1/17), igmp_size=8 consume pkt lIGMP send Query(t=17) V2, s=10.17.17.52 0.0.0.0 to v17(all) rsp=100 igmp=8B, pkt=46B IGMP send Query(t=17) V2, s=19.19.19.52 0.0.0.0 to v19(all) rsp=100 igmp=8B, pkt=46B IGMP: rcvd Report-V2(t=22) g=239.0.0.50 resp=100, pkt S=10.17.17.222 to 239.0.0.50, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.51 resp=100, pkt S=10.17.17.222 to 239.0.0.51, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.52 resp=100, pkt S=10.17.17.222 to 239.0.0.52, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.53 resp=100, pkt S=10.17.17.222 to 239.0.0.53, on v17 (phy 2/1/17), igmp_size=8 consume pkt Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware 128 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp packet debug ip igmp packet Traces the IGMP packets. Syntax debug ip igmp packet ipaddr no debug ip igmp packet ipaddr Parameters ipaddr Specifies the IP address of the IGMP packet. Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 129 debug ip igmp packet Examples device# debug ip igmp packet 10.17.17.222 239.0.0.155 debug ip igmp packet S=10.17.17.222 G=239.0.0.155 device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp packet 10.17.17.222 239.0.0.155 is enabled device# debug ip igmp device#IGMP: rcvd Report-V2(t=22) g=239.0.1.160 resp=100, pkt S=10.17.17.222 to 239.0.1.160, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.161 resp=100, pkt S=10.17.17.222 to 239.0.1.161, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.162 resp=100, pkt S=10.17.17.222 to 239.0.1.162, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.163 resp=100, pkt S=10.17.17.222 to 239.0.1.163, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.164 resp=100, pkt S=10.17.17.222 to 239.0.1.164, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.165 resp=100, pkt S=10.17.17.222 to 239.0.1.165, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.166 resp=100, pkt S=10.17.17.222 to 239.0.1.166, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.167 resp=100, pkt S=10.17.17.222 to 239.0.1.167, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.168 resp=100, pkt S=10.17.17.222 to 239.0.1.168, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.169 resp=100, pkt S=10.17.17.222 to 239.0.1.169, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.170 resp=100, pkt S=10.17.17.222 to 239.0.1.170, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.171 resp=100, pkt S=10.17.17.222 to 239.0.1.171, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.172 resp=100, pkt S=10.17.17.222 to 239.0.1.172, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.173 resp=100, pkt S=10.17.17.222 to 239.0.1.173, on v17 (phy 2/1/17), igmp_size=8 device#IGMP: rcvd Report-V2(t=22) g=239.0.1.174 resp=100, pkt S=10.17.17.222 to 239.0.1.174, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.175 resp=100, pkt S=10.17.17.222 to 239.0.1.175, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.176 resp=100, pkt S=10.17.17.222 to 239.0.1.176, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.177 resp=100, pkt S=10.17.17.222 to 239.0.1.177, on v17 (phy 2/1/17), igmp_size=8 device#IGMP: rcvd Report-V2(t=22) g=239.0.1.178 resp=100, pkt S=10.17.17.222 to 239.0.1.178, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.179 resp=100, pkt S=10.17.17.222 to 239.0.1.179, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.180 resp=100, pkt S=10.17.17.222 to 239.0.1.180, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.181 resp=100, pkt S=10.17.17.222 to 239.0.1.181, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.182 resp=100, pkt S=10.17.17.222 to 239.0.1.182, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.183 resp=100, pkt S=10.17.17.222 to 239.0.1.183, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.184 resp=100, pkt S=10.17.17.222 to 239.0.1.184, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.185 resp=100, pkt S=10.17.17.222 to 239.0.1.185, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.186 resp=100, pkt S=10.17.17.222 to 239.0.1.186, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.187 resp=100, pkt S=10.17.17.222 to 239.0.1.187, on v17 (phy 2/1/17), igmp_size=8 nIGMP: rcvd Report-V2(t=22) g=239.0.1.188 resp=100, pkt S=10.17.17.222 to 239.0.1.188, on v17 (phy 2/1/17), igmp_size=8 oIGMP: rcvd Report-V2(t=22) g=239.0.1.189 resp=100, pkt S=10.17.17.222 to 239.0.1.189, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.190 resp=100, pkt S=10.17.17.222 to 239.0.1.190, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.191 resp=100, pkt S=10.17.17.222 to 130 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp packet 239.0.1.191, on v17 (phy 2/1/17), igmp_size=8 dIGMP: rcvd Report-V2(t=22) g=239.0.1.192 resp=100, pkt S=10.17.17.222 to 239.0.1.192, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.193 resp=100, pkt S=10.17.17.222 to 239.0.1.193, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.194 resp=100, pkt S=10.17.17.222 to 239.0.1.194, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.195 resp=100, pkt S=10.17.17.222 to 239.0.1.195, on v17 (phy 2/1/17), igmp_size=8 eIGMP: rcvd Report-V2(t=22) g=239.0.1.196 resp=100, pkt S=10.17.17.222 to 239.0.1.196, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.197 resp=100, pkt S=10.17.17.222 to 239.0.1.197, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.198 resp=100, pkt S=10.17.17.222 to 239.0.1.198, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.199 resp=100, pkt S=10.17.17.222 to 239.0.1.199, on v17 (phy 2/1/17), igmp_size=8 buIGMP: rcvd Report-V2(t=22) g=239.0.1.200 resp=100, pkt S=10.17.17.222 to 239.0.1.200, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.201 resp=100, pkt S=10.17.17.222 to 239.0.1.201, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.202 resp=100, pkt S=10.17.17.222 to 239.0.1.202, on v17 (phy 2/1/17), igmp_size=8 gIGMP: rcvd Report-V2(t=22) g=239.0.1.203 resp=100, pkt S=10.17.17.222 to 239.0.1.203, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.204 resp=100, pkt S=10.17.17.222 to 239.0.1.204, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.205 resp=100, pkt S=10.17.17.222 to 239.0.1.205, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.206 resp=100, pkt S=10.17.17.222 to 239.0.1.206, on v17 (phy 2/1/17), igmp_size=8 aIGMP: rcvd Report-V2(t=22) g=239.0.1.207 resp=100, pkt S=10.17.17.222 to 239.0.1.207, on v17 (phy 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) g=239.0.1.208 resp=100, pkt S=10.17.17.222 to 239.0.1.208, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.209 resp=100, pkt S=10.17.17.222 to 239.0.1.209, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.210 resp=100, pkt S=10.17.17.222 to 239.0.1.210, on v17 (phy 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) g=239.0.1.211 resp=100, pkt S=10.17.17.222 to 239.0.1.211, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.212 resp=100, pkt S=10.17.17.222 to 239.0.1.212, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.213 resp=100, pkt S=10.17.17.222 to 239.0.1.213, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.214 resp=100, pkt S=10.17.17.222 to 239.0.1.214, on v17 (phy 2/1/17), igmp_size=8 Debug message destination: default (console) All possible debuggings have been turned off tracking is off and all results are cleared Turn off stack trace of write table Disable shadow register write will disable all writes from shadow to hardware Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 131 debug ip igmp physical-port ethernet debug ip igmp physical-port ethernet Matches the physical port that is connected. Syntax debug ip igmp physical-port ethernetstackid | slot | port no debug ip igmp physical-port ethernet stackid | slot | port Parameters stackid | slot | port Refers to the stack ID, slot number, and port number of a specific Ethernet port. Modes Privileged EXEC mode Examples device# debug ip igmp physical-port ethernet 1/2/4 IGMP: rcvd Leave(t=23) g=225.1.1.31 resp=0, pkt S=10.11.66.62 VL8 (phy 1/2/4), igmp_size=8 IGMP: No L3 mcast, pkt S=10.11.66.62 to 224.0.0.2, on v8 (phy IGMP: rcvd Leave(t=23) g=225.1.1.32 resp=0, pkt S=10.11.66.62 VL8 (phy 1/2/4), igmp_size=8 IGMP: No L3 mcast, pkt S=10.11.66.62 to 224.0.0.2, on v8 (phy IGMP: rcvd Leave(t=23) g=225.1.1.33 resp=0, pkt S=10.11.66.62 VL8 (phy 1/2/4), igmp_size=8 132 to 224.0.0.2, on 1/2/4), igmp_size=8 to 224.0.0.2, on 1/2/4), igmp_size=8 to 224.0.0.2, on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp prime-port ethernet debug ip igmp prime-port ethernet Monitors the activity of the physical port if the trunking is carried out on the primary port. Syntax debug ip igmp prime-port ethernetstackid | slot | port no debug ip igmp prime-port ethernet stackid | slot | port Parameters stackid | slot | port Refers to the stack ID, slot number, and port number of a specific Ethernet port. Modes Privileged EXEC mode Examples device# debug ip igmp prime-port ethernet 1/1/8 Brocade# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp prime-port 1/1/8 is enabled Brocade# Brocade# debug ip igmp Brocade# IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=10.16.16.222 to 239.0.0.5, on v16 (phy 1/1/8), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=10.16.16.222 to 239.0.0.5, on v16 (phy 1/1/8), igmp_size=8 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 133 debug ip igmp protocol debug ip igmp protocol Displays debugging information about the IGMP queries and reports transmitted and received. Syntax debug ip igmp protocol [ query | report ] no debug ip igmp protocol [ query | report ] Parameters query Displays debugging information about the IGMP queries transmitted and received. report Displays debugging information about the IGMP reports transmitted and received. Modes Privileged EXEC mode Examples The following is the sample output from the debug ip igmp protocol query command. device# debug ip igmp protocol query device# IGMP.VRF0: [ Port 1/1/15,v74. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 1/1/15,v74 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 2/1/15,v75. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 2/1/15,v75 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 3/1/39,v76. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 3/1/39,v76 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 6/1/22,v77. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 6/1/22,v77 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 4/1/22,v78. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 4/1/22,v78 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 5/1/22,v79. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 5/1/22,v79 ] Sent General Query version 3 using src 10.0.0.18 134 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp protocol The following is the truncated sample output from the debug ip igmp protocol report command. device# debug ip igmp protocol report device# IGMP.VRF0: [ Port 1/1/15,v74. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 1/1/15,v74 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 2/1/15,v75. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 2/1/15,v75 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 3/1/39,v76. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 3/1/39,v76 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 6/1/22,v77. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 6/1/22,v77 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 4/1/22,v78. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 4/1/22,v78 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 5/1/22,v79. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 5/1/22,v79 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.52 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.43 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.22 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.16 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.34 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.54 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.4 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.90 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.33 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.15 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.61 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.37 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.59 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.8 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.1 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.46 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.7 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.1 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.94 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.99 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.98 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.96 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.35 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.91 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.64 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.5 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.92 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.20 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.41 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.80 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.76 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.36 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.39 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.93 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.31 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.38 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.33 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.72 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.57 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.79 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.2 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.99 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.73 IGMP.VRF0: Type V2 Report Port 6/1/22,v77 Grp 228.0.0.59 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.40 IGMP.VRF0: Type V2 Report Port 5/1/22,v79 Grp 228.0.0.84 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 135 debug ip igmp proxy clear debug ip igmp proxy clear Clears all the IGMP proxy debug settings. Syntax debug ip igmp proxy clear no debug ip igmp proxy clear Modes Privileged EXEC mode 136 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp proxy error debug ip igmp proxy error Displays the IGMP proxy error messages. Syntax debug ip igmp proxy error no debug ip igmp proxy error Modes Privileged EXEC mode Examples device# debug ip igmp Debug: Jan 2 03:26:25 235.5.4.145 Debug: Jan 2 03:46:35 Debug: Jan 2 03:48:55 proxy error 1d 3:26:43 - MCPROXY_ERROR: ref count 1 for group entry - MCPROXY_ERROR: ref count 1 for group entry 235.5.4.241 - MCPROXY_ERROR: ref count 1 for group entry 235.5.4.49 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 137 debug ip igmp proxy event debug ip igmp proxy event Enables debugging of IGMP proxy events. Syntax debug ip igmp proxy event no debug ip igmp proxy event Modes Privileged EXEC mode Examples device# debug ip igmp proxy event Debug: Jan 1 20:53:56 20:54:14 - MCPROXY_EVENT: 229.2.1.1 state change Debug: Jan 1 20:54:11 20:54:29 - MCPROXY_EVENT: 229.2.1.1 state change Debug: Jan 1 20:54:33 20:54:51 - MCPROXY_EVENT: 229.2.1.1 state change Debug: Jan 1 20:54:40 20:54:58 - MCPROXY_EVENT: 229.2.1.1 state change 138 [IPv4:default-vrf] receive group [IPv4:default-vrf] receive group [IPv4:default-vrf] receive group [IPv4:default-vrf] receive group Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp proxy packet debug ip igmp proxy packet Displays debugging information related to the IGMP proxy packets. Syntax debug ip igmp proxy packet no debug ip igmp proxy packet Modes Privileged EXEC mode Examples device# debug ip igmp proxy packet device# debug ip igmp enable device# Debug: Jan 2 00:42:25 1d 0:42:34 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt to vir port v10 phy port 4/1/33 device# Debug: Jan 2 00:42:35 1d 0:42:43 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt to vir port v10 phy port 4/1/33 Debug: Jan 2 00:42:36 1d 0:42:44 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt to vir port v10 phy port 4/1/33 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 139 debug ip igmp proxy rx debug ip igmp proxy rx Displays the IGMP proxy packets received. Syntax debug ip igmp proxy rx no debug ip igmp proxy rx Modes Privileged EXEC mode Examples device# debug ip igmp proxy rx device# 0:29:31 - MCPROXY_RX: [IPv4:default-vrf] receive general query on port e2/1/3 max resp code 100 140 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp proxy show debug ip igmp proxy show Displays the IGMP proxy debug settings. Syntax debug ip igmp proxy show no debug ip igmp proxy show Modes Privileged EXEC mode Examples device# debug ip igmp proxy show Mcast Proxy debug for IPv4: Receive debug is enable Transmit debug is enable Error debug is enable Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 141 debug ip igmp proxy tx debug ip igmp proxy tx Displays the IGMP proxy packets transmitted. Syntax debug ip igmp proxy tx no debug ip igmp proxy tx Modes Privileged EXEC mode Examples device# debug ip igmp proxy tx device# debug ip igmp enable device# Debug: Jan 2 00:43:20 1d 0:43:29 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt to vir port v10 phy port 4/1/33 device# Debug: Jan 2 00:43:27 1d 0:43:36 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt to vir port v10 phy port 4/1/33 Debug: Jan 2 00:43:28 1d 0:43:37 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 225.1.1.1 rprt to vir port v10 phy port 4/1/33 142 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp proxy vrf debug ip igmp proxy vrf Displays IGMP proxy related debug information for the specified VRF. Syntax debug ip igmp proxy vrf vrf_name no debug ip igmp proxy vrf vrf_name Parameters vrf_name Specifies the VRF name. Modes Privileged EXEC mode Examples device# debug ip igmp proxy vrf vrf1 Debug: Jan 1 21:43:08 21:43:26 - MCPROXY_TX: rprt to vir port v85 phy port 2/13 Debug: Jan 1 21:43:08 21:43:26 - MCPROXY_TX: 229.2.1.1 on port e2/13 max resp code 10 Debug: Jan 1 21:43:09 21:43:27 - MCPROXY_TX: 229.2.1.1 on port e2/13 max resp code 10 Debug: Jan 1 21:43:22 21:43:39 - MCPROXY_TX: rprt to vir port v85 phy port 2/13 Debug: Jan 1 21:43:23 21:43:41 - MCPROXY_TX: rprt to vir port v85 phy port 2/13 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 [IPv4:1] sending v1v2 grp 229.2.1.1 [IPv4:1] receive group query [IPv4:1] receive group query [IPv4:1] sending v1v2 grp 229.2.1.1 [IPv4:1] sending v1v2 grp 229.2.1.1 143 debug ip igmp rx debug ip igmp rx Displays the IGMP packets received. Syntax debug ip igmp rx no debug ip igmp rx Modes Privileged EXEC mode Examples device# debug ip igmp rx device# debug ip igmp protocol query IGMP.VRF1: Query Port 1/1/3*1/1/14,v25 Grp 0.0.0.0 IGMP.QRY: [ Port 1/1/3*1/1/14,v25. Grp 0.0.0.0 ]. Processing version 2 query IGMP.VRF1: Query Port 1/1/3*1/1/14,v25 Grp 0.0.0.0 IGMP.QRY: [ Port 1/1/3*1/1/14,v25. Grp 0.0.0.0 ]. Processing version 2 query und allIGMP.VRF3: Query Port 1/1/3*1/1/14,v26 Grp 0.0.0.0 IGMP.QRY: [ Port 1/1/3*1/1/14,v26. Grp 0.0.0.0 ]. Processing version 2 query 144 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp show debug ip igmp show Displays the IGMP debug settings. Syntax debug ip igmp show decimal no debug ip igmp show decimal Parameters decimal Specifies the level of the IGMP. The valid values are from 1 through 3. Modes Privileged EXEC mode Usage Guidelines Do not use the show debug command for this purpose. The show debug command displays general debug information. Examples device# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp port-down is enabled debug ip igmp detail is enabled debug ip igmp level 2 is enabled Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 145 debug ip igmp source debug ip igmp source Matches the source of the control packet or IGMP V3 source packets. Syntax debug ip igmp source ipaddr no debug ip igmp source ipaddr Parameters ipaddr Specifies the IP address of the IGMP source. Modes Privileged EXEC mode Examples device# debug ip igmp source 16.16.16.222 device# IGMP: rcvd Report-V2(t=22) g=239.0.0.5 resp=100, pkt S=16.16.16.222 to 239.0.0.5, on v16 (phy 1/1/8), igmp_size=8 146 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp timer debug ip igmp timer Monitors the IGMP timer activity. Syntax debug ip igmp timer no debug ip igmp timer Modes Privileged EXEC mode Examples device# debug ip igmp timer monitor timer activity Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 147 debug ip igmp tx debug ip igmp tx Displays the IGMP packets transmitted. Syntax debug ip igmp tx no debug ip igmp tx Modes Privileged EXEC mode Examples device# debug ip igmp tx Brocade# debug ip igmp protocol query IGMP.VRF2: [ Port 1/1/3*1/1/14,v21. Grp 0.0.0.0 ] Sent version 2 Query. size 8. Src 21.0.0.6 IGMP.VRF2: [ Port 1/1/3*1/1/14,v21 ] Sent General Query version 2 using src 21.0.0.6 IGMP.VRF0: [ Port 1/1/7-1/1/8,tn11. Grp 0.0.0.0 ] Sent version 2 Query. size 8. Src 61.0.0.6 IGMP.VRF0: [ Port 1/1/7-1/1/8,tn11 ] Sent General Query version 2 using src 61.0.0.6 IGMP.VRF0: [ Port 1/1/1-1/1/2,v91. Grp 0.0.0.0 ] Sent version 2 Query. size 8. Src 91.0.0.6 IGMP.VRF0: [ Port 1/1/1-1/1/2,v91 ] Sent General Query version 2 using src 91.0.0.6 148 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip igmp vrf debug ip igmp vrf Displays IGMP-related debug information for the specified VRF. Syntax debug ip igmp vrf vrf_name no debug ip igmp vrf vrf_name Modes Privileged EXEC mode Examples device# device# device# device# device# debug ip igmp debug ip igmp debug ip igmp debug ip igmp Debug: Jan 2 group 225.1.1.1 protocol report enable vrf br_vrf_1 00:24:23 IGMP.VRF1: Type V2 Report Port 2/1/21,v1 Grp 225.1.1.1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 149 debug ip msdp debug ip msdp Generates information about Multicast Source Discovery Protocol (MSDP) alarms, events, and messages. Syntax debug ip msdp [ alarms | events | message ] Parameters alarms Displays information about the MSDP alarms. events Displays information about the MSDP events. message Displays information about the MSDP messages. Modes Privileged EXEC mode Examples The following example displays information about the MSDP processing alarms. device# debug ip msdp alarms : MSDP: S=xxxxxxx P=0 Initiate Transport Connection to MSDP peer : MSDP: S=xxxxxxx P=0 Initiate Transport Connection to MSDP peer The following example displays information about originating SA-advertisements, major peer events, and peer-keepalive timer events. device# : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: : MSDP: 150 debug ip msdp events 10.120.120.45: Process START event, local = 10.120.120.31 S=xxxxxxx P=0 Initiate Transport Connection to MSDP peer 10.120.120.45: TCP Connection to Remote Peer is Open 10.120.120.45: MSDP-TCP Connection opened 10.120.120.45: TCP_OPEN DONE, State 4 Remote Peer closed TCP connection 10.120.120.45 Remote Peer closed TCP connection Originating SA Originating SA Originating SA Originating SA Originating SA Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip msdp The following example displays information about MSDP messages received, transmitted and forwarded, and flag errors in the MSDP messages. device# debug ip msdp message : MSDP: 10.0.0.32: Xmt KA : MSDP: 10.0.0.32: State=4, Rcv SA 20 bytes RP: 10.0.0.32, Num SA: 1 10.17.17.1,237.14.18.3 : MSDP: 10.0.0.32: State=4, Rcv KA : MSDP: 10.0.0.32: State=4, Rcv SA 20 bytes RP: 10.0.0.32, Num SA: 1 10.17.17.1,237.14.18.3 : MSDP: 10.0.0.32: State=4, Rcv KA : MSDP: 10.0.0.32: Xmt SA 32 bytes RP: 10.0.0.45, Num SA: 2 10.14.14.14,237.14.18.3 10.17.17.1,237.14.18.3 : MSDP: 10.0.0.32: Xmt KA : MSDP: 10.0.0.32: State=4, Rcv SA 20 bytes RP: 10.0.0.32, Num SA: 1 10.17.17.1,237.14.18.3 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 151 debug ip ntp debug ip ntp Displays NTP system information. Syntax debug ip ntp [ algorithms | association | broadcast | clockadjust | errors | packet | server ] Parameters algorithms Displays information about the NTP system algorithms. association Displays information about the NTP server and peer association. broadcast Displays information about the NTP broadcast server and client. clockadjust Displays information about the NTP clock-adjust process. errors Displays information about the NTP error events. packet Displays information about the NTP input and output packets. server Displays information about the NTP server. Modes Privileged EXEC mode 152 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ntp Examples The following example displays information about the NTP system algorithms. device# debug ip ntp algorithms NTP: ntp_peer_unfit: dist exceeded - root dist 16.00527999 of peer 10.25.96.13 has exceeded max dist 1.50096000 NTP: ntp_peer_unfit: unreachable - peer 10.25.96.13 is not reachable [peer->reach 0] Brocade(config-ntp)# NTP: ntp_clock_filter: Adding offset 0, delay 0, disp 16 to filter[0] for peer 10.25.96.13 NTP: ntp_clock_filter: No acceptable samples available NTP: ntp_clock_filter: Adding offset 0.01133625, delay 0.27379156, disp 0.00001936 to filter[1] for peer 10.25.96.13 NTP: ntp_clock_filter: mitigated sample stats: n 1 offset 0.01133625 del 0.27379156 dsp 7.93750968 jit 0.00001525 NTP: ntp_peer_unfit: dist exceeded - root dist 8.07442072 of peer 10.25.96.13 has exceeded max dist 1.50096000 NTP: ntp_clock_select: number of final survivors 0 and leap vote 0 NTP: ntp_clock_select: No survivors found. sys_peer is set to NULL NTP: ntp_clock_filter: Adding offset 0.02724471, delay 0.30800050, disp 0.00001988 to filter[2] for peer 10.25.96.13 NTP: ntp_clock_filter: mitigated sample stats: n 2 offset 0.02724471 del 0.30800050 dsp 3.93752228 jit 0.00001525 NTP: ntp_peer_unfit: dist exceeded - root dist 4.09153779 of peer 10.25.96.13 has exceeded max dist 1.50096000 NTP: ntp_clock_update: at 430 sample 430 associd 2 NTP: ntp_rstclock: mu 67 new state 5 old state 5 offset -0.00001326 The following example displays information about the NTP server and peer association. device# debug ip ntp association NTP: peer_clear: peer 10.25.96.13 next 646 refid INIT NTP: newpeer: 10.25.96.13 mode client vers 4 poll 6 10 key 00000000 Flags Flags -> iBURST SYSLOG: <14>Mar 21 17:44:33 Murali NTP: client association is mobilized for 10.25.96.13. SYSLOG: <14>Mar 21 17:44:33 Murali NTP: The system clock is not synchronized to any time source. SYSLOG: <14>Mar 21 17:44:40 Murali NTP: Stratum is changed to 2. SYSLOG: <14>Mar 21 17:44:40 Murali NTP: System clock is synchronized to 10.25.96.13. The following example displays information about the NTP clock-adjust process. device# debug ip ntp clockadjust NTP: ntp_clock_update: at 327 sample 327 associd 3 NTP: ntp_local_clock: hufbuf - ptr 1 mindly 0.23329046 huffpuff correction -0.00067095 NTP: ntp_local_clock: clk offset 0.00917431 clk jit 0 clk stab 0 sys_poll 6 NTP: ntp_set_freq: drift 0.00000010, old freq 50000000 NTP: ntp_set_freq: new freq 49999995 NTP: ntp_adj_host_clock: new offset 0.00917431, freq 49999995 NTP: Adjusting the clock. offset 0.00917431, calib used 251687 NTP: After adjusting the clock. offset 0.00817431, calib used 252687 NTP: Adjusting the clock. offset 0.00817431, calib used 252687 NTP: After adjusting the clock. offset 0.00717431, calib used 253687 NTP: Adjusting the clock. offset 0.00717431, calib used 253687 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 153 debug ip ntp The following example displays information about the NTP input and output packets. device# debug ip ntp packet NTP: Sending the NTP client packet to 10.25.96.13 port 123 via port id INVALID Leap 3, Version 4, Mode client, Stratum 16, Poll 6, Precision 2**-16, Root delay 0, Root disp 167, Ref Id INIT, Ref time 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0) Org 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0) Rec 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0) Xmt 230.745068249 (00:03:50.745068249 GMT+00 Mon Jan 01 0) pkt len = 48 key 0 NTP: Received NTP server packet from 10.25.96.13 on port 123 via port id mgmt1 at 00:03:50.1959316492 GMT+00 Mon Jan 01 0 Leap 0, Version 4, Mode server, Stratum 1, Poll 6, Precision 2**-29, Root delay 0, Root disp 0, Ref Id 10.67.84.83, Ref time 3572876227.2200200252 (17:37:07.2200200252 GMT+00 Thu Mar 21 2013) Org 230.745068249 (00:03:50.745068249 GMT+00 Mon Jan 01 0) Rec 3572876241.37257170 (17:37:21.37257170 GMT+00 Thu Mar 21 2013) Xmt 3572876241.37302765 (17:37:21.37302765 GMT+00 Thu Mar 21 2013) pkt len = 48 key 0 NTP: Sending the NTP client packet to 10.25.96.13 port 123 via port id INVALID Leap 3, Version 4, Mode client, Stratum 16, Poll 6, Precision 2**-16, Root delay 0, Root disp 169, Ref Id INIT, Ref time 0.0 (00:00:00.0 GMT+00 Mon Jan 01 0) Org 3572876241.37302765 (17:37:21.37302765 GMT+00 Thu Mar 21 2013) Rec 230.1959316492 (00:03:50.1959316492 GMT+00 Mon Jan 01 0) Xmt 232.784360585 (00:03:52.784360585 GMT+00 Mon Jan 01 0) pkt len = 48 key 0 NTP: Received NTP server packet from 10.25.96.13 on port 123 via port id mgmt1 at 00:03:52.1904063455 GMT+00 Mon Jan 01 0 Leap 0, Version 4, Mode server, Stratum 1, Poll 6, Precision 2**-29, Root delay 0, Root disp 0, Ref Id 10.67.84.83, Ref time 3572876227.2200200252 (17:37:07.2200200252 GMT+00 Thu Mar 21 2013) Org 232.784360585 (00:03:52.784360585 GMT+00 Mon Jan 01 0) Rec 3572876243.75963892 (17:37:23.75963892 GMT+00 Thu Mar 21 2013) Xmt 3572876243.76010686 (17:37:23.76010686 GMT+00 Thu Mar 21 2013) pkt len = 48 key 0 The following example displays information about the NTP server. device# debug ip ntp server NTP: Received NTP client packet from 172.26.67.52 on port 123 via port id mgmt1 at 18:02:44.1139927355 GMT+00 Thu Mar 21 2013 Leap 0, Version 4, Mode client, Stratum 3, Poll 6, Precision 2**-16, Root delay 16102, Root disp 90471, Ref Id 172.26.67.65, Ref time 3572877762.1183164018 (18:02:42.1183164018 GMT+00 Thu Mar 21 2013) Org 3572877762.1141785444 (18:02:42.1141785444 GMT+00 Thu Mar 21 2013) Rec 3572877762.1183164018 (18:02:42.1183164018 GMT+00 Thu Mar 21 2013) Xmt 3572877764.1137502159 (18:02:44.1137502159 GMT+00 Thu Mar 21 2013) pkt len = 48 key 0 Brocade(config-ntp)# NTP: poll_update: for peer 10.250.229.100 hpoll 6 burst 0 retry 0 throttle 62 next poll 64 NTP: Received NTP server packet from 10.250.229.100 on port 123 via port id mgmt1 at 18:03:09.1891314446 GMT+00 Thu Mar 21 2013 Leap 0, Version 4, Mode server, Stratum 1, Poll 6, Precision 2**-29, Root delay 0, Root disp 0, Ref Id 10.67.84.83, Ref time 3572877762.155297680 (18:02:42.155297680 GMT+00 Thu Mar 21 2013) Org 3572877789.878229501 (18:03:09.878229501 GMT+00 Thu Mar 21 2013) Rec 3572877789.1401109720 (18:03:09.1401109720 GMT+00 Thu Mar 21 2013) Xmt 3572877789.1401162509 (18:03:09.1401162509 GMT+00 Thu Mar 21 2013) pkt len = 48 key 0 NTP: poll_update: for peer 10.250.229.100 hpoll 6 burst 0 retry 0 throttle 62 next poll 67 154 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf debug ip ospf Generates OSPF debugging information for the specified IP address. Output indicates state transitions, hello packets received, LSA acknowledgements received, LSA processing, flooding information, and database descriptions. Syntax debug ip ospf no debug ip ospf Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip ospf 10.1.1.2 OSPF: debug ospf neighbor 10.1.1.2 Brocade(config)# OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR 10.1.1.1, BDR 10.1.1.2 OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR 10.1.1.1, BDR 10.1.1.2 OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR 10.1.1.1, BDR 10.1.1.2 OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 155 debug ip ospf adj debug ip ospf adj Displays information about OSPF adjacencies and authentication, including designated router (DR) and backup designated router (BDR) elections, sent and received hello packets, neighbor state transitions, and database description information. Syntax debug ip ospf adj decimal nodebug ip ospf adjdecimal Parameters decimal Refers to a specific adjacency event. Modes Privileged EXEC mode Examples device# debug ip ospf adj OSPF: adjacency events debugging is on Brocade# debug ip ospf adj OSPF: send hello on area 0 interface 10.1.1.1 OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR 10.1.1.1, BDR 10.1.1.2 OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED OSPF: send hello on area 0 interface 10.1.1.1 OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR 10.1.1.1, BDR 10.1.1.2 OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED OSPF: send hello on area 0 interface 10.1.1.1 OSPF: rcvd hello from 10.1.1.2 area 0 on interface 10.1.1.1, state DR, DR 10.1.1.1, BDR 10.1.1.2 OSPF: Neighbor 10.1.1.2, int v115, state FULL processing event HELLO_RECEIVED 156 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf all-vrfs route debug ip ospf all-vrfs route Displays OSPF debugging information for all VPN routing and forwarding activity. Syntax debug ip ospf all-vrfs route no debug ip ospf all-vrfs route Modes Privileged EXEC mode Examples device# debug ip ospf all-vrfs route SPF: redistribute into ospf 10.3.13.0 with ffffff00 forwarding address 10.4.4.3 OSPF: originate external lsa 10.3.13.0 with ffffff00 OSPF: Originate external advs ext fwding address 10.4.4.3 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 157 debug ip ospf error debug ip ospf error Reports the receipt of OSPF packets with errors, or mismatches between hello packet options. Syntax debug ip ospf error no debug ip ospf error Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip ospf error OSPF: errors debugging is on Brocade(config-vif-9)# Debug: Jan 1 03:37:11 OSPF: invalid header or unable to find neighbor, drop Debug: Jan 1 03:37:11 OSPF: recv from:10.9.9.2 Intf:ve 9 Hello L:48 A:1 Rid:10.2.2.2 DR:10.9.9.2 BDR:0.0.0.0 Debug: Jan 1 03:37:23 OSPF: invalid header or unable to find neighbor, drop Debug: Jan 1 03:37:23 OSPF: recv from:10.9.9.2 Intf:ve 9 Hello L:48 A:1 Rid:10.2.2.2 DR:10.9.9.2 BDR:0.0.0.0 Debug: Jan 1 03:37:34 OSPF: invalid header or unable to find neighbor, drop Debug: Jan 1 03:37:34 OSPF: recv from:10.9.9.2 Intf:ve 9 Hello L:48 A:1 Rid:10.2.2.2 DR:10.9.9.2 BDR:0.0.0.0 158 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf event debug ip ospf event Displays information about internal OSPF events related to configuration or interaction with the standby management processor and interface state transitions. Syntax debug ip ospf event no debug ip ospf event Modes Privileged EXEC mode Examples device# debug ip ospf event OSPF: events debugging is on Brocade# OSPF: Interface ve 18 (10.1.18.1) state Waiting processing event Wait Timer OSPF: DR/BDR election for 10.1.18.1 on ve 18 OSPF: Neighbor 10.213.213.213 int v18, state 2_WAY processing event ADJACENCY_OK OSPF: send DBD to 10.213.213.213 on ve 18 flag 0x7 seq 0x18a3b9 len 32 OSPF: elect BDR(backup designated router): Router ID 10.213.213.213 IP interface 10.1.18.2 OSPF: elect DR(designated router): Router ID 10.10.10.77, IP interface 10.1.18.1 OSPF: Neighbor 10.116.116.1 int 2/1/21, state FULL processing event HELLO_RECEIVED OSPF: Neighbor 10.116.116.1 int v511, state FULL processing event HELLO_RECEIVED OSPF: Neighbor 10.116.116.1 int v911, state FULL processing event HELLO_RECEIVED OSPF: Neighbor 41.41.41.41 int v35, state FULL processing event HELLO_RECEIVED OSPF: Neighbor 10.213.213.213 int 2/1/14, state 2_WAY processing event HELLO_RECEIVED OSPF: Neighbor 10.116.116.1 int v511, state FULL processing event HELLO_RECEIVED OSPF: send DBD to 10.213.213.213 on ve 18 flag 0x7 seq 0x18a3b9 len 32 OSPF: Neighbor 49.2.3.4 int v34, state FULL processing event HELLO_RECEIVED OSPF: Neighbor 10.213.213.213 int v18, state EXCHANGE_START processing event HELLO_RECEIVED OSPF: Neighbor 10.213.213.213 int 4/1/12, state FULL processing event HELLO_RECEIVED Brocade# OSPF: Interface ethernet 4/1/12 (10.1.51.2) state Down processing event Interface Up virtual interface 10.1.51.2 up, state changed to Other from Point To Point no deOSPF: Neighbor 10.213.213.213 int 4/1/12, state DOWN processing event HELLO_RECEIVED OSPF: Neighbor 10.213.213.213 int 4/1/12, state INITIALIZING processing event ONE_WAY bug ip OSPF: Neighbor 10.213.213.213 int 4/1/12, state INITIALIZING processing event HELLO_RECEIVED Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 159 debug ip ospf flood debug ip ospf flood Displays information about LSA flooding activity Syntax debug ip ospf flood no debug ip ospf flood Modes Privileged EXEC mode Examples device# debug ip ospf flood OSPF: flooding debugging is on Brocade(config-if-e1000-1/1/15)#OSPF: flood LSA Type:1 AdvRtr:10.2.1.1 Age:0 LsId:10.2.1.1 OSPF: flood advertisement 10.2.1.1 throughout a specific area = 0 OSPF: flood LSA Type:1 AdvRtr:10.2.1.1 Age:0 LsId:10.2.1.1 OSPF: flood advertisement 10.2.1.1 throughout a specific area = 0 OSPF: flooding type 1 advertisement out interface 10.1.1.1 OSPF: attempting to flood rcvd LSA area = 0 interface type = 1 OSPF: flood LSA Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 OSPF: flood advertisement 10.3.1.1 throughout a specific area = 0 OSPF: attempting to flood rcvd LSA area = 0 interface type = 1 OSPF: flood LSA Type:2 AdvRtr:10.3.1.1 Age:3600 LsId:10.1.1.2 OSPF: flood advertisement 10.1.1.2 throughout a specific area = 0 OSPF: flood LSA Type:1 AdvRtr:10.2.1.1 Age:0 LsId:10.2.1.1 OSPF: flood advertisement 10.2.1.1 throughout a specific area = 0 OSPF: flooding type 1 advertisement out interface 10.1.1.1 OSPF: attempting to flood rcvd LSA area = 0 interface type = 1 OSPF: flood LSA Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 OSPF: flood advertisement 10.3.1.1 throughout a specific area = 0 OSPF: attempting to flood rcvd LSA area = 0 interface type = 1 OSPF: flood LSA Type:2 AdvRtr:10.3.1.1 Age:1 LsId:10.1.1.2 OSPF: flood advertisement 10.1.1.2 throughout a specific area = 0 160 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf graceful-restart debug ip ospf graceful-restart Enable this command to receive information about OSPF graceful restart events, including restart phases, graceful Link-State Advertisement (LSA) transmit and receive activity, and syslog messages. Syntax debug ip ospf graceful-restart no debug ip ospf graceful-restart Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 161 debug ip ospf graceful-restart Examples device# debug ip ospf graceful-restart OSPF: graceful-restart debugging is on Brocade# LSA flush rcvd Type:4 AdvRtr:83.83.10.11 LsId:10.213.213.213 LSA flush rcvd Type:4 AdvRtr:83.83.10.11 LsId:10.213.213.213 LSA flush rcvd Type:4 AdvRtr:10.116.116.1 LsId:10.205.205.205 LSA flush rcvd Type:4 AdvRtr:10.116.116.1 LsId:10.205.205.205 rcv GRACE LSA from 10.1.14.1, age 0, Adv 10.213.213.213 install new GraceLSA, int 269, neighbor 10.1.14.1, age 0 rcv Grace_LSA from 10.1.14.1, area 0.0.0.10 Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0 neighbor 10.1.14.1 entering graceful restart state, timer 120, lsa age 0, max 120, helping 0 flood grace LSA, AdvRtr:10.213.213.213, Age:0 rcv GRACE LSA from 10.1.51.1, age 0, Adv 10.213.213.213 install new GraceLSA, int 779, neighbor 10.1.51.1, age 0 rcv Grace_LSA from 10.1.51.1, area 0.0.0.10 Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0 neighbor 10.1.51.1 entering graceful restart state, timer 120, lsa age 0, max 120, helping 0 flood grace LSA, AdvRtr:10.213.213.213, Age:0 rcv GRACE LSA from 10.1.18.2, age 0, Adv 10.213.213.213 install new GraceLSA, int 2050, neighbor 10.1.18.2, age 0 rcv Grace_LSA from 10.1.18.2, area 0.0.0.10 Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0 neighbor 10.1.18.2 entering graceful restart state, timer 120, lsa age 0, max 120, helping 0 flood grace LSA, AdvRtr:10.213.213.213, Age:0 rcv GRACE LSA from 10.1.14.1, age 0, Adv 10.213.213.213 Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.14.1 restart timer to 120 rcv GRACE LSA from 10.1.51.1, age 0, Adv 10.213.213.213 Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.51.1 restart timer to 120 rcv GRACE LSA from 10.1.18.2, age 0, Adv 10.213.213.213 Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.18.2 restart timer to 120 rcv GRACE LSA from 10.1.14.1, age 0, Adv 10.213.213.213 Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.14.1 restart timer to 120 rcv GRACE LSA from 10.1.51.1, age 0, Adv 10.213.213.213 Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.51.1 restart timer to 120 rcv GRACE LSA from 10.1.18.2, age 0, Adv 10.213.213.213 Update same instance GRACE LSA age to 0 in database, refresh neighbor 10.1.18.2 restart timer to 120 Brocade# no debug ip ospf graceful-restart OSPF: graceful-restart debugging is off 162 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf log-empty-lsa debug ip ospf log-empty-lsa Displays information about empty link state advertisements (LSAs). Syntax debug ip ospf log-empty-lsa no debug ip ospf log-empty-lsa Modes Privileged EXEC mode Global Configuration mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 163 debug ip ospf log-empty-lsa Examples device# debug ip ospf log-empty-lsa device(config-if-e1000-1/1/15)# debug ip ospf log-empty-lsa OSPF: empty-LSA logging debugging is on device(config-if-e1000-1/1/15)# debug ip ospf flOSPF: originate router LSA, area 0 OSPF: No difference found, restart 0 OSPF: send ls request to neighbor 10.1.1.2, retran 0 OSPF: sending ls request last size 36, count 1 OSPF: LSA rcvd Type:1 AdvRtr:10.2.1.1 Age:297 LsId:10.2.1.1 Seq-Num 8000000e from Neighbor 10.1.1.2 OSPF: Received self originated LSA type 1 with id = 10.2.1.1 Seq-Num 8000000e OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 8000000f area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 8000000f OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 962478204, retran 0 OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1 OSPF: originate router LSA, area 0 OSPF: originate_router_links_advertisement gen new instance set 10.2.1.1 (not sent - wait for MinLSInterval) OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 8000000f from Neighbor 10.1.1.2 OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 8000000f area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 8000000f OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:3600 LsId:115.1.1.2 Seq-Num 80000005 from Neighbor 10.1.1.2 OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 3600, seq 80000005 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 105.1.1.2 type 2 ToBesyncedState 2 OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 3600, seq 80000005 oOSPF: trying age out LSA, id 10.1.1.2, len 32, type 2, from 10.3.1.1, age 3600 genNewLsa 0 area 0 OSPF: age out and remove lsa data base 10.1.1.2 odsOSPF: OSPF TIMER: Minlsa: sptr_database_entry generate_new_instance == TRUE for 1.2.1.1 OSPF: originate_delayed LSA, type 1, parm1: 0x0 OSPF: originate router LSA, area 0 OSPF: difference found, restart 0 OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 80000010 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 80000010 OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 1.2.1.1, seq 0x8000000f, adv 10.2.1.1, age 1 OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 1017253324, retran 0 OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1 OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 80000010 from Neighbor 10.1.1.2 OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 80000010 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 80000010 OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:1 LsId:10.1.1.2 Seq-Num 80000006 from Neighbor 10.1.1.2 OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 1, seq 80000006 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.1.1.2 type 2 ToBesyncedState 2 OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 1, seq 80000006 OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 10.2.1.1, seq 0x80000010, adv 10.2.1.1, age 1 OSPF: originate router LSA, area 0 OSPF: No difference found, restart 0 164 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf log-empty-lsa debug ip ospf log-empty-lsa Displays information about empty link state advertisements (LSAs). Syntax debug ip ospf log-empty-lsa no debug ip ospf log-empty-lsa Modes Privileged EXEC mode Global Configuration mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 165 debug ip ospf log-empty-lsa Examples device# debug ip ospf log-empty-lsa device(config-if-e1000-1/1/15)# debug ip ospf log-empty-lsa OSPF: empty-LSA logging debugging is on device(config-if-e1000-1/1/15)# debug ip ospf flOSPF: originate router LSA, area 0 OSPF: No difference found, restart 0 OSPF: send ls request to neighbor 10.1.1.2, retran 0 OSPF: sending ls request last size 36, count 1 OSPF: LSA rcvd Type:1 AdvRtr:10.2.1.1 Age:297 LsId:10.2.1.1 Seq-Num 8000000e from Neighbor 10.1.1.2 OSPF: Received self originated LSA type 1 with id = 10.2.1.1 Seq-Num 8000000e OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 8000000f area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 8000000f OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 962478204, retran 0 OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1 OSPF: originate router LSA, area 0 OSPF: originate_router_links_advertisement gen new instance set 10.2.1.1 (not sent - wait for MinLSInterval) OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 8000000f from Neighbor 10.1.1.2 OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 8000000f area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 8000000f OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:3600 LsId:115.1.1.2 Seq-Num 80000005 from Neighbor 10.1.1.2 OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 3600, seq 80000005 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 105.1.1.2 type 2 ToBesyncedState 2 OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 3600, seq 80000005 oOSPF: trying age out LSA, id 10.1.1.2, len 32, type 2, from 10.3.1.1, age 3600 genNewLsa 0 area 0 OSPF: age out and remove lsa data base 10.1.1.2 odsOSPF: OSPF TIMER: Minlsa: sptr_database_entry generate_new_instance == TRUE for 1.2.1.1 OSPF: originate_delayed LSA, type 1, parm1: 0x0 OSPF: originate router LSA, area 0 OSPF: difference found, restart 0 OSPF: install a new lsa, type 1, ls_id 10.2.1.1, age 0, seq 80000010 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.2.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.2.1.1, age 0, seq 80000010 OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 1.2.1.1, seq 0x8000000f, adv 10.2.1.1, age 1 OSPF: send_ls_update to interface 10.1.1.1 (224.0.0.6) tb 1017253324, retran 0 OSPF: tx LSA Type:1 AdvRtr:10.2.1.1 Age:1 LsId:10.2.1.1 OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 80000010 from Neighbor 10.1.1.2 OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 80000010 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.3.1.1 type 1 ToBesyncedState 2 OSPF: NSR : Sync node add, type 1, ls_id 10.3.1.1, age 1, seq 80000010 OSPF: LSA rcvd Type:2 AdvRtr:10.3.1.1 Age:1 LsId:10.1.1.2 Seq-Num 80000006 from Neighbor 10.1.1.2 OSPF: install a new lsa, type 2, ls_id 10.1.1.2, age 1, seq 80000006 area-id 0 OSPF: NSR Sync ACK received for LSA OSPF: ls_header.id 10.1.1.2 type 2 ToBesyncedState 2 OSPF: NSR : Sync node add, type 2, ls_id 10.1.1.2, age 1, seq 80000006 OSPF: OSPF: rcv LSA ack from 10.1.1.2, type 1, id 10.2.1.1, seq 0x80000010, adv 10.2.1.1, age 1 OSPF: originate router LSA, area 0 OSPF: No difference found, restart 0 166 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf lsa-generation debug ip ospf lsa-generation Displays information about link state advertisements (LSAs). Syntax debug ip ospf lsa-generation no debug ip ospf lsa-generation Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip ospf lsa-generation OSPF: lsa generation debugging is on device(config-if-e1000-1/1/15)#OSPF: originate router LSA, area 0 OSPF: trying age out LSA, id 10.2.1.1, len 36, type 1, from 10.2.1.1, age 3600 genNewLsa 0 area 0 OSPF: age out and remove lsa data base 10.2.1.1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 167 debug ip ospf lsa-id debug ip ospf lsa-id Generates information about OSPF Link-State Advertisement (LSA) IDs. Syntax debug ip ospf lsa-id no debug ip ospf lsa-id Modes Privileged EXEC mode Global Configuration mode Usage Guidelines The debug ip ospf lsa-id command must be enabled with the debug ip ospf flood or the debug ip ospf lsa-generation command. Examples device# debug ip ospf lsa-id Debug message destination: Console IP Routing: OSPF: flooding debugging is on OSPF: lsa generation debugging is on OSPF: ls-id 10.2.2.2 debugging is on device(config-ospf-router)# Debug: Jan 1 04:12:50 OSPF: LSA rcvd Type:1 AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2 Seq-Num 8000000e from Neighbor 10.9.9.2 Debug: Jan 1 04:12:50 OSPF: install a new lsa, type 1, ls_id 10.2.2.2, age 1, seq 8000000e area-id 0 Debug: Jan 1 04:12:50 OSPF: NSR Sync ACK received for LSA Debug: Jan 1 04:12:50 OSPF: ls_header.id 10.2.2.2 type 1 ToBesyncedState 2 Debug: Jan 1 04:12:50 OSPF: NSR : Sync node add, type 1, ls_id 10.2.2.2, age 1, seq 8000000e Debug: Jan 1 04:12:50 OSPF: attempting to flood rcvd LSA area = 0 interface type = 1 Debug: Jan 1 04:12:50 OSPF: flood LSA Type:1 AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2 Debug: Jan 1 04:12:50 OSPF: flood advertisement 10.2.2.2 throughout a specific area = 0 Debug: Jan 1 04:12:51 OSPF: LSA rcvd Type:1 AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2 Seq-Num 8000000f from Neighbor 10.9.9.2 Debug: Jan 1 04:12:51 OSPF: install a new lsa, type 1, ls_id 10.2.2.2, age 1, seq 8000000f area-id 0 Debug: Jan 1 04:12:51 OSPF: NSR Sync ACK received for LSA Debug: Jan 1 04:12:51 OSPF: ls_header.id 10.2.2.2 type 1 ToBesyncedState 2 Debug: Jan 1 04:12:51 OSPF: NSR : Sync node add, type 1, ls_id 10.2.2.2, age 1, seq 8000000f Debug: Jan 1 04:12:51 OSPF: attempting to flood rcvd LSA area = 0 interface type = 1 Debug: Jan 1 04:12:51 OSPF: flood LSA Type:1 AdvRtr:10.2.2.2 Age:1 LsId:10.2.2.2 Debug: Jan 1 04:12:51 OSPF: flood advertisement 10.2.2.2 throughout a specific area = 0 168 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf max-metric debug ip ospf max-metric Displays debugging information about the max-metric configuration. Syntax debug ip ospf max-metric no debug ip ospf max-metric Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip ospf max-metric OSPF: max-metric debugging is on device(config-ospf-router)# max-metric router-lsa all-lsas Debug: Jan 1 04:20:05 OSPF: Max-metric advertisement started due to configuration change for vrf 0 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 169 debug ip ospf packet debug ip ospf packet Generates debugging information about the Open Shortest Path First (OSPF) packets. Syntax debug ip ospf packet [detail decimal | in | out | peer ip-addr | port [ethernet stackid/slot/port | ve decimal] src-ip ip-addr | type {ack | dd | hello | request | update}] no debug ip ospf packet Parameters detail decimal Refers to the level by bit 0 and 1 and stack trace send by bit 2. in Refers only to the input packets. out Refers only to the output packets. peer ip-addr Matches with the peer (advertisement router). port Matches with the I/O port. ethernet stackid/slot/port Refers to the stack ID, slot, or Ethernet port. ve decimal Refers to the ID of the virtual Ethernet interface. src-ip ip-addr Matches with the source IP address. type Matches with the packet type. ack Indicates the acknowledgement packet type. dd Indicates the Database Description (DD) packet type. hello Indicates the hello packet type. request Indicates the request packets sent from a client to a server. update Indicates the update packets sent from a server to a client. 170 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf packet Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 171 debug ip ospf packet Examples device# debug ip ospf packet device# OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Ack L:104 Auth:0 ID:10.213.213.213 OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Ack L:104 Auth:0 ID:10.213.213.213 OSPF: send to:224.0.0.5 Intf:ve 36 Hello L:44 Auth:0 ID:10.10.10.77 DR:10.36.2.1 BDR:0.0.0.0 OSPF: send to:224.0.0.5 Intf:ve 36 Hello L:44 Auth:0 ID:10.10.10.77 DR:10.36.100.1 BDR:0.0.0.0 OSPF: send to:224.0.0.5 Intf:ve 511 Hello L:48 Auth:0 ID:10.10.10.77 DR:10.1.251.7 BDR:10.1.251.6 OSPF: send to:224.0.0.5 Intf:e 2/1/14 Hello L:48 Auth:0 ID:10.10.10.77 DR:10.1.14.2 BDR:10.1.14.1 OSPF: send to:224.0.0.5 Intf:e 2/1/21 LS-Ack L:104 Auth:0 ID:10.10.10.77 OSPF: send to:224.0.0.5 Intf:e 2/1/21 Hello L:48 Auth:0 ID:10.10.10.77 DR:0.0.0.0 BDR:0.0.0.0 OSPF: send to:224.0.0.5 Intf:ve 35 Hello L:48 Auth:0 ID:10.10.10.77 DR:10.1.35.16 BDR:10.1.35.15 OSPF: send to:10.1.251.6 Intf:ve 511 Hello L:48 Auth:0 ID:10.10.10.77 DR:0.0.0.0 BDR:0.0.0.0 OSPF: send to:10.1.18.2 Intf:e 4/1/12 Hello L:48 Auth:0 ID:10.10.10.77 DR:0.0.0.0 BDR:0.0.0.0 OSPF: recv from:10.1.35.15 to 224.0.0.5 Intf:ve 35 LS-Ack L:104 Auth:0 ID:41.41.41.41 OSPF: recv from:10.1.251.18 to 10.1.251.17 Intf:e 2/1/21 Hello L:48 Auth:0 ID:10.116.116.1 DR:0.0.0.0 BDR:0.0.0.0 OSPF: recv from:10.1.34.10 to 224.0.0.5 Intf:ve 34 LS-Ack L:104 Auth:0 ID:49.2.3.4 OSPF: recv from:10.1.34.10 to 224.0.0.5 Intf:ve 34 Hello L:48 Auth:0 ID:49.2.3.4 DR:10.1.34.16 BDR:10.1.34.10 OSPF: recv from:10.1.251.18 to 224.0.0.5 Intf:e 2/1/21 LS-Upd L:136 Auth:0 ID:10.116.116.1 Cnt:3 OSPF: send to:224.0.0.5 Intf:ve 18 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: send to:224.0.0.5 Intf:e 2/1/14 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: send to:224.0.0.5 Intf:e 4/1/12 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: send to:224.0.0.5 Intf:ve 34 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: send to:224.0.0.5 Intf:ve 35 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: recv from:10.1.251.6 to 224.0.0.5 Intf:ve 511 LS-Upd L:136 Auth:0 ID:10.116.116.1 Cnt:3 OSPF: send to:10.1.251.6 Intf:ve 511 LS-Ack L:84 Auth:0 ID:10.10.10.77 OSPF: recv from:10.1.91.18 to 224.0.0.5 Intf:ve 911 LS-Upd L:136 Auth:0 ID:10.116.116.1 Cnt:3 OSPF: send to:10.1.91.18 Intf:ve 911 LS-Ack L:84 Auth:0 ID:10.10.10.77 OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Upd L:136 Auth:0 ID:10.213.213.213 Cnt:3 OSPF: recv from:10.1.51.1 to 224.0.0.5 Intf:e 4/1/12 LS-Upd L:136 Auth:0 ID:10.213.213.213 Cnt:3 OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Upd L:136 Auth:0 ID:10.213.213.213 Cnt:3 OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Ack L:84 Auth:0 ID:10.213.213.213 OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Ack L:84 Auth:0 ID:10.213.213.213 OSPF: send to:224.0.0.5 Intf:ve 911 Hello L:48 Auth:0 ID:10.10.10.77 DR:10.1.91.16 BDR:10.1.91.18 OSPF: send to:224.0.0.5 Intf:loopback 1 Hello L:44 Auth:0 ID:10.10.10.77 DR:10.10.10.77 BDR:0.0.0.0 OSPF: send to:224.0.0.5 Intf:loopback 2 Hello L:44 Auth:0 ID:10.10.10.77 DR:10.10.62.10 BDR:0.0.0.0 OSPF: send to:224.0.0.5 Intf:loopback 3 Hello L:44 Auth:0 ID:10.10.10.77 DR:10.10.63.10 BDR:0.0.0.0 OSPF: send to:224.0.0.5 Intf:loopback 4 Hello L:44 Auth:0 ID:10.10.10.77 DR:10.10.64.10 BDR:0.0.0.0 OSPF: send to:224.0.0.5 Intf:e 2/1/21 LS-Ack L:84 Auth:0 ID:10.10.10.77 OSPF: recv from:10.1.35.15 to 224.0.0.5 Intf:ve 35 LS-Ack L:84 Auth:0 ID:41.41.41.41 OSPF: recv from:10.1.34.10 to 224.0.0.5 Intf:ve 34 LS-Ack L:84 Auth:0 ID:49.2.3.4 OSPF: recv from:10.1.251.18 to 224.0.0.5 Intf:e 2/1/21 LS-Upd L:100 Auth:0 ID:10.116.116.1 Cnt:2 172 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf packet OSPF: send to:224.0.0.5 Intf:ve 18 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2 OSPF: send to:224.0.0.5 Intf:e 2/1/14 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2 OSPF: send to:224.0.0.5 Intf:e 4/1/12 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2 OSPF: send to:224.0.0.5 Intf:ve 34 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2 OSPF: send to:224.0.0.5 Intf:ve 35 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2 OSPF: recv from:10.1.251.6 to 224.0.0.5 Intf:ve 511 LS-Upd L:100 Auth:0 ID:10.116.116.1 Cnt:2 OSPF: send to:10.1.251.6 Intf:ve 511 LS-Ack L:64 Auth:0 ID:10.10.10.77 OSPF: recv from:10.1.91.18 to 224.0.0.5 Intf:ve 911 LS-Upd L:100 Auth:0 ID:10.116.116.1 Cnt:2 OSPF: send to:10.1.91.18 Intf:ve 911 LS-Ack L:64 Auth:0 ID:10.10.10.77 OSPF: recv from:10.1.14.1 to 224.0.0.5 Intf:e 2/1/14 LS-Upd L:100 Auth:0 ID:10.213.213.213 Cnt:2 OSPF: recv from:10.1.51.1 to 224.0.0.5 Intf:e 4/1/12 LS-Upd L:100 Auth:0 ID:10.213.213.213 Cnt:2 OSPF: recv from:10.1.18.2 to 224.0.0.5 Intf:ve 18 LS-Upd L:100 Auth:0 ID:10.213.213.213 Cnt:2 OSPF: recv from:10.1.251.6 to 224.0.0.5 Intf:ve 511 LS-Upd L:748 Auth:0 ID:10.116.116.1 Cnt:20 OSPF: send to:224.0.0.5 Intf:ve 18 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20 OSPF: send to:224.0.0.5 Intf:e 2/1/14 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20 OSPF: send to:224.0.0.5 Intf:e 4/1/12 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20 OSPF: send to:224.0.0.5 Intf:ve 34 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20 OSPF: send to:224.0.0.5 Intf:ve 35 LS-Upd L:748 Auth:0 ID:10.10.10.77 Cnt:20 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 173 debug ip ospf retransmission debug ip ospf retransmission Generates internal information about Open Shortest Path First (OSPF) retransmission of link state advertisements (LSAs). Syntax debug ip ospf retransmission no debug ip ospf retransmission Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip ospf retransmission device(config)# clear ip routeOSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.1.2.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.3.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the retransmission list if necessary device(config)# OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.24.2.0 to the retransmission list if necessary 174 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf route debug ip ospf route Generates information about Open Shortest Path First (OSPF) routes. Syntax debug ip ospf route ip_address no debug ip ospf route ip_address Parameters ip_address Specifies the IP address of the OSPF route. Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip ospf route 10.3.3.0 OSPF: debug ospf route 10.3.3.0 device(config-if-e1000-1/1/15)# debug ip ospf route 192.168.30.0 OSPF: debug ospf route 192.168.30.0 device(config-if-e1000-1/1/15)#OSPF: invalidate whole table - entry 192.168.30.0, state 0, path type 3 OSPF: calc ext route 192.168.30.0 OSPF: delete route 192.168.30.0 from rtm 0x367e7270, not_in_main 0 OSPF: calc ext route 192.168.30.0 OSPF: calc ext route 192.168.30.0 OSPF: calc ext route 192.168.30.0 OSPF: calc ext route 192.168.30.0 OSPF: ext route, net = 192.168.30.0, mask = 10.255.255.0 advrtr = 10.3.1.1, fwd = 0.0.0.0 OSPF: ext route changed 192.168.30.0, state 0 OSPF: ext route new 192.168.30.0, state 2, path type 3 OSPF: add route 192.168.30.0 to rtm, next hop 115.1.1.2, type 3, state 3, not_in_main 1 OSPF: add to ospf route table, to valid 192.168.30.0, state 3, path type 3 OSPF: Modify route 192.168.30.0, type 3, state 3, not_in_main 0, next hop 10.1.1.2 OSPF: modify/modify route 192.168.30.0 (fwd 367e7333), type 3, state 3, not_in_main 0, nhp 381c51c0 OSPF: validate route, new->valid 192.168.30.0, state 3, path type 3 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 175 debug ip ospf spf debug ip ospf spf Generates information about Open Shortest Path First (OSPF) activity including SPF runs and calculations. Syntax debug ip ospf spf no debug ip ospf spf Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip ospf spf OSPF: spf-short debugging is on Disable neighbor device(config-ospf-router)# Debug: Jan 1 02:38:55 OSPF: Schedule SPF(8001), in prog 0, ospf build_routing_table 0 phase 1 Debug: Jan 1 02:38:55 OSPF: schedule spf, init spf delay 0, next hold 0 (ticks) Debug: Jan 1 02:38:55 OSPF: Add to spf pending list, current time 96788, scheduled 96788, next run 96788 Debug: Jan 1 02:38:55 OSPF: Schedule SPF(7001), in prog 0, ospf build_routing_table 0 phase 1 Debug: Jan 1 02:38:55 OSPF: Schedule SPF(6002), in prog 0, ospf build_routing_table 0 phase 1 Debug: Jan 1 02:38:55 OSPF: timer: give semaphore, start spf phase 1, time 96789, scheduled 96788, run time 96788 Debug: Jan 1 02:38:55 OSPF: begin intra SPF run, chunk-id 0/-1 just_become_abr 0, is_abr 0 Debug: Jan 1 02:38:55 OSPF: invalidate whole routing table, recal_just_become_abr 0, just_become_abr 0 Debug: Jan 1 02:38:55 OSPF: running SPF for area 0 area-18ce7068 nextarea 0 next-area-id -1 Debug: Jan 1 02:38:55 OSPF: completed SPF for all areas Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_INTRA end at 96789, is_abr 0 Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TRANSIT end at 96789 Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TYPE5 end at 96789 Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TYPE7 end at 96789 Debug: Jan 1 02:38:55 OSPF: summary phase, is_abr 0 Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_SUMMARY end at 96789 Debug: Jan 1 02:38:55 OSPF: translation phase, is_abr 0 Debug: Jan 1 02:38:55 OSPF: ROUTE CALC PHASE_TRANSLATION end at 96789 Debug: Jan 1 02:38:55 OSPF: SPF_cleanup: current 96789, set next run time 96788, current hold 0, next hold 0 Debug: Jan 1 02:38:55 OSPF: ROUTE CALC end at 96789, pending 0 176 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ospf vrf debug ip ospf vrf Generates debugging information about the Open Shortest Path First (OSPF) Virtual Routing and Forwarding (VRF) instance. Syntax debug ip ospf vrf no debug ip ospf vrf Modes Privileged EXEC mode Examples device# debug ip ospf vrf OSPF(one): send hello on area 0 interface 10.3.4.1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 177 debug ip pim debug ip pim Enables the Protocol Independent Multicast (PIM) debugging. Syntax debug ip pim no debug ip pim Modes Privileged EXEC mode Usage Guidelines The no form of the command disables PIM debugging. Examples device# debug ip pim PIM: pim debugging is on 178 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim add-del-oif debug ip pim add-del-oif Displays information about the mcache activity. Syntax debug ip pim add-del-oif no debug ip pim add-del-oif Modes Privileged EXEC mode Usage Guidelines The command will work with the debug ip pim group or debug ip pim source commands. Examples device# debug ip pim add-del-oif PIM: add-del-oif debugging is on device# Debug: Jan 2 00:18:27 PIMSM.VRF1: OIF FSM 1 for (*, 225.1.1.1) entry Reason(IgmpGrpJoin), Action(Update), flagAction(1) CurrentState(0x4) NewState(0x4) Debug: Jan 2 00:18:27 PIM.VRF1: OIF Add v1,2/1/21 to (102.1.1.20 225.1.1.1) entry receivers mbrship type 1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 179 debug ip pim bootstrap debug ip pim bootstrap Enables bootstrap debugging. Syntax debug ip pim bootstrap no debug ip pim bootstrap Modes Privileged EXEC mode Usage Guidelines The no form of the command disables bootstrap debugging. Examples device# debug ip pim bootstrap PIM: bootstrap debugging is on device# PIM-BSR.VRF0: Prefer BSR 10.0.0.43(Pr 43) over current BSR 10.0.0.43(Pr 43) PIM-BSR.VRF0: Intf tn4 - accept BSM from BSR 10.0.0.43(Pr 43), local state CandBSR, curr BSR 10.0.0.43 (Pr 43) 180 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim clear debug ip pim clear Clears all the Protocol Independent Multicast (PIM) debug settings. Syntax debug ip pim clear no debug ip pim clear Modes Privileged EXEC mode Examples device# debug ip pim clear no debug ip pim is enabled Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 181 debug ip pim control-source debug ip pim control-source Monitors the control packet sent by the given router and displays debugging information. Syntax debug ip pim control-source ip_address no debug ip pim control-source ip_address Parameters ip_address Specifies the IP address of the control source. Modes Privileged EXEC mode Examples device# debug device# IGMP: 224.0.0.1, on device# IGMP: 224.0.0.1, on 182 ip pim control-source 10.10.10.129 rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.10.10.129 to v100 (phy 8/1/22), igmp_size=8 rcvd Query(t=17) V2 g=0.0.0.0 resp=100, pkt S=10.10.10.129 to v100 (phy 8/1/22), igmp_size=8 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim event debug ip pim event Enables debugging of Protocol Independent Multicast (PIM) events. Syntax debug ip pim event no debug ip pim event Modes Privileged EXEC mode Usage Guidelines The no form of the command disables PIM events debugging. Examples device# debug ip pim event PIM: event debugging is on device(config)# int ethernet 1/1/11 device(config-if-e1000-1/1/11)# disable device(config-if-e1000-1/1/11)# Mcastv4 receive event 16 Mcastv4 receive event 16 Mcastv4 receive event 16 Mcastv4 receive event 16 Mcastv4 receive event 13 MC-EVT: Port tn4 state changed to DOWN PIM-EVT.VRF0: Receive intf tn4 Dn state_notify Mcastv4 receive event 6 device(config-if-e1000-1/1/11)# enable Mcastv4 receive event 15 Mcastv4 receive event 15 Mcastv4 receive event 15 Mcastv4 receive event 15 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 183 debug ip pim group debug ip pim group Displays the Protocol Independent Multicast (PIM) related activities for the specified IP address of the PIM group. Syntax debug ip pim group ip_address no debug ip pim group ip_address Parameters ip_address Specifies the IP address of the PIM group. Modes Privileged EXEC mode 184 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim group Examples device# debug ip pim group 227.1.1.1 device# Proc IGMP join g=227.1.1.1 from v300(2/1/17) 10.11.55.55 PIM: send prune v100, source 10.11.99.99 group 227.1.1.1 nbr 10.10.10.129 Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=34 to v100 PIM: send prune v100, source 0.0.0.0 group 227.1.1.1 nbr 10.10.10.129 Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Prune list: (0.0.0.0 227.1.1.1) wc=0 rpt=0 sparse=1 Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=42 to v100 Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Prune list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=34 to v100 join_prune_timer, (10.11.99.99 227.1.1.1) num=0, RPT=0, group_on_dr_and_sg=0, PR UNE join_prune_timer, (10.11.99.99 227.1.1.1) ->num=0, rpt=0, spt=1, SRC=v100, RP=v1 00 join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond. join_prune_timer, (0.0.0.0 227.1.1.1) rp not local, send join or prune, wc=1, rp t=1 Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Prune list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1 Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100 device# show ip pim group | i 227.1.1.1 device# join_prune_timer, (10.11.99.99 227.1.1.1) num=0, RPT=0, group_on_ dr_and_sg=0, PRUNE join_prune_timer, (10.11.99.99 227.1.1.1) ->num=0, rpt=0, spt=1, SRC=v100, RP=v1 00 join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond. join_prune_timer, (0.0.0.0 227.1.1.1) rp not local, send join or prune, wc=1, rp t=1 Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Prune list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1 Prune list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100 device# Proc IGMP join g=227.1.1.1 from v300(2/1/17) 10.11.55.55 join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0, JOI N join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v1 00 join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond. Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Join list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 Join list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=42 to v100 device# Proc IGMP join g=227.1.1.1 from v300(2/1/17) 10.11.55.55 device# join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v1 00 join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond. join_prune_timer, (0.0.0.0 227.1.1.1) rp not local, send join or prune, wc=1, rp t=1 Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Join list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1 Join list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100 reset age (10.11.99.99, 227.1.1.1) device# show ip pim group | i 227.1.1.1 Index 7 Group 227.1.1.1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 185 debug ip pim join-prune debug ip pim join-prune Controls join prune processing and displays debugging information related to the join prune messages. Syntax debug ip pim join-prune no debug ip pim join-prune Modes Privileged EXEC mode Examples device# debug ip pim join-prune PIM: join-prune debugging is on device# PIM.VRF0: (10.0.0.178 232.0.0.6) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.6) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.7) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.7) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.8) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.8) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.9) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.9) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.10) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.10) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.11) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.11) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.12) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.12) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.13) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.13) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.14) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.14) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.15) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.15) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.16) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.16) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.17) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.17) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.18) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.18) RPFIf v76. RPFNbr -. Send Join/Prune 186 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim level debug ip pim level Sets the Protocol Independent Multicast (PIM) level. Syntax debug ip pim level decimal no debug ip pim level Parameters decimal Specifies the number of the PIM level. The valid values are from 1 through 3. Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 187 debug ip pim level Examples device# debug ip pim level DECIMAL 1-3 (most detailed) device# debug ip pim level 1 debug level = 1 device# rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v10 0 (8/1/22) rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v100 (8/1/22) device# debug ip pim level 2 debug level = 2 device# 00:21:13 Send PIM_V2 Hello Src 10.10.10.119 Dst 224.0.0.13 Len 3 4 on v100 00:21:13 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200 00:21:13 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300 rcvd PIM_V2 Bootstrap, from 10.10.10.129 to 224.0.0.13 Len 36 on v100 (8/1/22) 00:21:16 Send PIM_V2 Hello Src 10.10.10.119 Dst 224.0.0.13 Len 34 on v100 00:21:16 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200 00:21:16 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300 PIMSM: BEGIN Periodic join-prune msgs Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 225.1.1.10 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=42 to v100 group address: 225.1.1.9 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=70 to v100 group address: 225.1.1.8 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=98 to v100 group address: 225.1.1.7 send_J/P_msg(), lcl_adr=00.10.10.119 dest=224.0.0.13 pkt_size=126 to v100 group address: 225.1.1.6 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=154 to v100 group address: 225.1.1.5 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=182 to v100 group address: 225.1.1.4 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=210 to v100 group address: 226.1.1.1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=238 to v100 group address: 225.1.1.3 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=266 to v100 group address: 225.1.1.2 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=294 to v100 group address: 225.1.1.1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=322 to v100 group address: 226.1.1.2 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=350 to v100 group address: 227.1.1.2 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=378 to v100 group address: 227.1.1.1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100 00:21:16 Send PIM_V2 Join/Prune Src 10.10.10.119 Dst 224.0.0.13 Len 406 on v100 PIMSM: END Periodic join-prune msgs device# debug ip pim level 3 debug level = 3 device# rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v10 0 (8/1/22) Hello msg v100, source 10.10.10.129 group 224.0.0.13 rcvd PIM_V2 Hello, from 10.10.10.129 to 224.0.0.13 Len 34 on v100 (8/1/22) Hello msg v100, source 10.10.10.129 group 224.0.0.13 Proc IGMP join g=226.1.1.2 from v200(5/1/13) 10.11.66.66 Proc IGMP join g=225.1.1.1 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=225.1.1.2 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=225.1.1.3 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=226.1.1.1 from v200(8/1/17)10.11.22.22 Proc IGMP join g=225.1.1.4 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=225.1.1.5 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=225.1.1.6 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=225.1.1.7 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=225.1.1.8 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=227.1.1.1 from v300(2/1/17)10.11.55.55 Proc IGMP join g=225.1.1.9 from v200(5/1/9) 10.11.10.77 188 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim level Proc IGMP join g=225.1.1.10 from v200(5/1/9) 10.11.10.77 Proc IGMP join g=227.1.1.2 from v300(2/1/17) 10.11.55.55 00:22:13 Send PIM_V2 Hello Src 10.10.119 Dst 224.0.0.13 Len 34 on v100 00:22:13 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200 00:22:13 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300 rcvd PIM_V2 Bootstrap, from 10.10.129 to 224.0.0.13 Len 36 on v100 (8/1/22) 00:22:16 Send PIM_V2 Hello Src 10.10.119 Dst 224.0.0.13 Len 34 on v100 00:22:16 Send PIM_V2 Hello Src 10.1.20.22 Dst 224.0.0.13 Len 34 on v200 00:22:16 Send PIM_V2 Hello Src 10.1.30.22 Dst 224.0.0.13 Len 34 on v300 PIMSM: BEGIN Periodic join-prune msgs Begin sending Join/Prune msg to v100, rpf_nbr=10.10.129, group address: 225.1.1.10 Join list: (10.10.129 225.1.1.10) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.10) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=42 to v100 group address: 225.1.1.9 Join list: (10.10.129 225.1.1.9) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.9) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=70 to v100 group address: 225.1.1.8 Join list: (10.10.129 225.1.1.8) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.8) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=98 to v100 group address: 225.1.1.7 Join list: (10.10.129 225.1.1.7) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.7) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=126 to v100 group address: 225.1.1.6 Join list: (10.10.129 225.1.1.6) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.6) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=154 to v100 group address: 225.1.1.5 Join list: (10.10.129 225.1.1.5) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.5) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=182 to v100 group address: 225.1.1.4 Join list: (10.10.129 225.1.1.4) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.4) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=210 to v100 group address: 226.1.1.1 Join list: (10.10.129 226.1.1.1) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 226.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=238 to v100 group address: 225.1.1.3 Join list: (10.10.129 225.1.1.3) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.3) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=266 to v100 group address: 225.1.1.2 Join list: (10.10.129 225.1.1.2) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.2) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=294 to v100 group address: 225.1.1.1 Join list: (10.10.129 225.1.1.1) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=322 to v100 group address: 226.1.1.2 Join list: (10.10.129 226.1.1.2) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 226.1.1.2) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=350 to v100 group address: 227.1.1.2 Join list: (10.10.129 227.1.1.2) wc=1 rpt=1 sparse=1 Join list: (10.11.99.99 227.1.1.2) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=378 to v100 group address: 227.1.1.1 Join list: (10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1 Join list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=406 to v100 00:22:16 Send PIM_V2 Join/Prune Src Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 189 debug ip pim nbr-change debug ip pim nbr-change Controls the Protocol Independent Multicast (PIM) IPv4 neighbor changes. Syntax debug ip pim nbr-change nbr_address no debug ip pim nbr-change nbr_address Parameters nbr_address Specifies the IP address of the neighbor. Modes Privileged EXEC mode Examples device# debug ip pim nbr-change 10.144.144.12 PIM: nbr-change debugging is on device(config-if-e1000-1/1/11)# PIM-NBR.VRF0: Neighbor 10.144.144.12 on interface tn4, 1/1/11 deleted on port-down VRF0 Flow Entry Delete (10.0.0.168 232.0.0.11) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.12) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.13) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.14) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.15) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.16) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.17) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.18) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.19) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.20) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.21) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.22) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.23) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.24) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.25) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.26) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.27) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.28) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.29) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.30) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.31) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.32) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.33) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.34) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.35) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.36) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.37) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.38) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.39) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.40) HW bits: 0 0 190 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim packet debug ip pim packet Displays debugging information about the Protocol Independent Multicast (PIM) packets. Syntax debug ip pim packet source_address group_address [rate] Parameters source_address Specifies the source address of the PIM packet. group_address Specifies the group address of the PIM packet. rate Specifies the hardware rate. Modes Privileged EXEC mode Examples device# debug ip pim packet 10.0.0.178 232.0.0.25 debug packet S=10.0.0.178 G=232.0.0.25 device# VRF0 Flow Entry Delete (10.0.0.178 232.0.0.25) HW bits: 1 1 device# debug ip pim packet 10.0.0.178 232.0.0.25 10 debug packet S=10.0.0.178 G=232.0.0.25 rate 10 device# VRF0 Flow Entry Delete (10.0.0.178 232.0.0.25) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.178 232.0.0.25) HW bits: 0 0 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 191 debug ip pim physical-port ethernet debug ip pim physical-port ethernet Displays information of the PIM physical ports that are connected. Syntax debug ip pim physical-port ethernet stackid/slot/port no debug ip pim physical-port ethernet stackid/slot/port Parameters stackid/slot/port Refers to the stack ID, slot number, and port number. Modes Privileged EXEC mode Examples device# debug ip pim physical-port ethernet 2/1/5 device# IGMP: IGMP: rcvd Report-V3(t=34) #rec=1, pkt S=10.2.1.6 to 224.0.0.22, on v800 (phy 2/1/5), igmp_size=16 IGMP: IGMP: rcvd Report-V3(t=34) #rec=1, pkt S=10.2.1.6 to 224.0.0.22, on v800 (phy 2/1/5), igmp_size=16 192 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim regproc debug ip pim regproc Controls register processing. Syntax debug ip pim regproc no debug ip pim regproc Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip pim regproc device(config-if-e1000-1/1/11)# debug ip pim regproc PIM: regproc debugging is on device(config-if-e1000-1/1/11)# enable device(config-if-e1000-1/1/11)# PIMSM-REG.VRF0: (10.0.0.168 228.0.0.1) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.2) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.3) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.4) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.5) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.6) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.7) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.8) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.9) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.10) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.11) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.12) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.13) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.14) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.15) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.16) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.17) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.18) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.19) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.20) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.21) Sending L2-Null Reg on iface v78 PIMSM-REG.VRF0: (10.0.0.168 228.0.0.22) Sending L2-Null Reg on iface v78 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 193 debug ip pim rp debug ip pim rp Controls the Rendezvouz Point (RP) processing. Syntax debug ip pim rp no debug ip pim rp Modes Privileged EXEC mode Global Configuration mode Examples device# debug ip pim rp PIM: rp debugging is on Brocade(config-if-e1000-1/1/11)# enable Brocade(config-if-e1000-1/1/11)# PIMv4-CRP.VRF0: Sending Candidate RP Msg (size 22) VRF0 Flow Entry Delete (10.0.0.168 232.0.0.11) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.12) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.13) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.14) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.15) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.16) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.17) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.18) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.19) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.20) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.21) HW bits: 0 0 194 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim show debug ip pim show Displays the PIM debug settings. Do not use the show debug command for this purpose. The show debug command displays general debug information. Syntax debug ip pim show no debug ip pim show Modes Privileged EXEC mode Examples device# debug ip pim show pim debug-enable-any = 1 debug ip pim level 2 is enabled Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 195 debug ip pim source debug ip pim source Monitors the content related to a specific PIM server. The ipaddr variable refers to the IP address of the PIM server source. Syntax debug ip pim sourceipaddress no debug ip pim sourceipaddress Modes Privileged EXEC mode 196 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim source Examples device# ddebug ip pim source 10.11.10.101 Brocade# join_prune_timer, (10.11.10.101 225.1.1.10) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.10) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.10) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.9) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.9) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.9) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.8) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.8) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.8) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.7) ->num=1, rpt=0, am_rp_and_proxy=0, J OIN join_prune_timer, (10.11.10.101 225.1.1.7) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.7) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.6) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.6) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.6) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.5) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.5) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.5) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.4) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.4) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.4) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 226.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 226.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 226.1.1.1) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.3) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.3) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.3) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.2) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.2) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.2) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 225.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.1) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 226.1.1.2) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 226.1.1.2) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 226.1.1.2) fail RPT PRUNE cond. Join list: (10.11.10.101 225.1.1.10) wc=0 rpt=0 sparse=1 Join list: (10.11.10.101 225.1.1.9) wc=0 rpt=0 sparse=1 Join list: (10.11.10.101 225.1.1.8) wc=0 rpt=0 sparse=1 Join list: (10.11.10.101 225.1.1.7) wc=0 rpt=0 sparse=1 Join list: (10.11.10.101 225.1.1.6) wc=0 rpt=0 sparse=1 Join list: (10.11.10.101 225.1.1.5) wc=0 rpt=0 sparse=1 Join list: (10.11.10.101 225.1.1.4) wc=0 rpt=0 sparse=1 Join list: (10.11.10.101 226.1.1.1) wc=0 rpt=0 sparse=1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 197 debug ip pim source Join Join Join Join 198 list: list: list: list: (10.11.10.101 (10.11.10.101 (10.11.10.101 (10.11.10.101 225.1.1.3) 225.1.1.2) 225.1.1.1) 226.1.1.2) wc=0 wc=0 wc=0 wc=0 rpt=0 rpt=0 rpt=0 rpt=0 sparse=1 sparse=1 sparse=1 sparse=1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pim vrf debug ip pim vrf Displays the PIM related debugging information for the specified VRF. Syntax debug ip pim vrfvrf_name no debug ip pim vrfvrf_name Modes Privileged EXEC mode Examples device# debug ip pim vrf vrf1 Debug: Jan 1 21:46:55 PIM_CFG.VRF1: Debug: Jan 1 21:46:59 PIM_CFG.VRF1: Debug: Jan 1 21:48:14 PIM_CFG.VRF1: Debug: Jan 1 21:48:17 PIM_CFG.VRF1: Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 port port port port v85, v85, v85, v85, ena_mode ena_mode ena_mode ena_mode Dis Ena Dis Ena 199 debug ip pimsm-snoop debug ip pimsm-snoop describes the debug commands used for troubleshooting issues related to the IPv4 Protocol Independent Multicast Sparse mode (PIM-SM) snoop configurations. Syntax debug ip pimsm-snoop [ add-del-oif | all | clear | control-source | error | fsm | group| join-prune| physical-port | show| source | stacktrace|timer|vlan] Parameters add-del-oif Displays debugs related to the addition and deletion of outbound interfaces (OIFs) in Mcache. all Enables all PIM-SM snoop related debugs. clear Clears all PIM-SM snoop related debug settings. control-source Displays PIM-SM snooping related debug information for the specified control source address error Monitors error messages related to PIM-SM snoopng. fsm Enables debugging of Finite State Machine (FSM) transactions. group Displays PIM-SM snooping information for a specific group. join-prune Monitors PIM-SM snoop join and prune messages. physical-port Displays information of PIM-SM physical ports that are connected. show Displays all PIM-SM snoop related debug settings.. source Displays PIM-SM snooping related debug information for the specified server source address. stacktrace Displays debug messages accompanied by call stack dump. timer Enables PIM-SM snoop timer debugging. vlan Enables PIM-SM snoop debugging for a particular VLAN. 200 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip pimsm-snoop Modes Privileged EXEC mode Examples device(debug ip pimsm-snoop source 10.27.27.5 Brocade# pim_snoop join (10.27.27.5 228.228.0.1), from e1/1/12 pim_snoop join (10.27.27.5 228.228.0.2), from e1/1/12 pim_snoop join (10.27.27.5 228.228.0.3), from e1/1/12 PIM from 10.27.27.2, vlan 275, port 1/1/12: Src=10.27.27.5 with 0 JOIN with 0 PRUNE pim_snoop prune 1/1/12 from (10.27.27.5, 228.228.0.1), pim_snoop prune 1/1/12 from (10.27.27.5, 228.228.0.2), pim_snoop prune 1/1/12 from (10.27.27.5, 228.228.0.3), PIM from 10.27.27.2, vlan 275, port 1/1/12: Src=10.27.27.5 with 0 JOIN with 3 PRUNE, 1st Grp=228.228.0.1 pim_snoop join (10.27.27.5 228.228.0.1), from e1/1/12 pim_snoop join (10.27.27.5 228.228.0.2), from e1/1/12 pim_snoop join (10.27.27.5 228.228.0.3), from e1/1/12 PIM from 10.27.27.2, vlan 275, port 1/1/12: Src=10.27.27.5 with 0 JOIN with 0 PRUNE History Release version Command history This command was introduced. This command was modified to... Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 201 debug ip source guard debug ip source guard Activates the IP source guard debugging. Syntax debug ip source guard no debug ip source guard Modes Privileged EXEC mode Examples device# debug ip source guard SOURCE GUARD: debugging is on Brocade(config-vif-11)# IPSrcSec: Add ip addr 10.3.3.12 on port 5/1/2 vlan 14 202 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip vrrp packet v6 debug ip vrrp packet v6 Displays debugging information of VRRP or VRRP-E packets specific to IPv6 within the device. Syntax debug ip vrrp packet v6 no debug ip vrrp packet v6 Modes Privileged EXEC mode Examples device# debug ip vrrp packet v6 VRRP (IPv6): packet debugging is on VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:100 chk:53518 Num of ip addr 1 fe80::7:2 from sender 2000::7:2 VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:11 pri:255 #ip:1 aut:0 adv:200 chk:53417 Num of ip addr 1 fe80::8:2 from sender :: VRRP (IPv6): send advertise! ver:3 type:1 vrid:100 pri:255 num of ip:1 adv:100 chk:44853 Num of ip addr 1 2000::7:1 VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:100 chk:53518 Num of ip addr 1 fe80::7:2 from sender 2000::7:2 10.10.10.2 from sender 10.10.10.2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 203 debug ip vrrp vrid debug ip vrrp vrid Filters VRRP or VRRP-E debugging using a virtual router identifier (VRID). Syntax debug ip vrrp vrid decimal no debug ip vrrp vrid Parameters decimal Specifies the VRID. Modes Privileged EXEC mode Examples device# debug ip vrrp vrid 100 Debug VRID: 100 for both IPv4 and IPv6 instances 204 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip web debug ip web Activates the web debugging. Syntax debug ip web no debug ip web Modes Privileged EXEC mode Examples device# debug ip web WEB: debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 205 debug ip web-ssl debug ip web-ssl Activates web Secured Socket Layer (SSL) debugging. Syntax debug ip web-ssl no debug ip web-ssl Modes Privileged EXEC mode Usage Guidelines The no form of the command deactivates web SSL debugging. Examples device# debug ip web-ssl WEB SSL: debugging is on 206 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipsec all debug ipsec all Displays all debugging information related to IPsec operation. Syntax debug ipsec all no debug ipsec all Modes Privileged EXEC mode Examples device# debug ipsec all IPSec: all debugging is on Brocade(config-ospf6-router)# no area 0 auth ipsec spi 400 esp sha1 abcef12345678901234fedcba098765432109876IPSEC,SA: ipipsec_pfkeyv2_input() :: receiving 'DELETE' command IPSEC,SA: Removing SA: ESP in spi=0x190 dst=FE80:: IPSEC,Policy: Removing flow [input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::] : ok IPSEC,SA: ipipsec_pfkeyv2_input() :: succeeded Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 207 debug ipsec esp debug ipsec esp Enables debugging of Encapsulating Security Payload (ESP) Syntax debug ipsec esp no debug ipsec esp Modes Privileged EXEC mode Examples device# debug ipsec esp IPSec: esp debugging is on Brocade(config-ospf6-router)# Debug: Jan (SA: ESP in spi=0x190 dst=FE80::) Debug: Jan 1 02:03:27 IPSEC,ESP: decrypt dst=FE80::) Debug: Jan 1 02:03:36 IPSEC,ESP: decrypt dst=FE80::) Debug: Jan 1 02:03:36 IPSEC,ESP: decrypt dst=FE80::) Debug: Jan 1 02:03:45 IPSEC,ESP: decrypt dst=FE80::) Debug: Jan 1 02:03:45 IPSEC,ESP: decrypt dst=FE80::) 208 1 02:03:27 IPSEC,ESP: decrypt ok, seq=0 ok, seq=0 (SA: ESP in spi=0x190 ok, seq=0 (SA: ESP in spi=0x190 ok, seq=0 (SA: ESP in spi=0x190 ok, seq=0 (SA: ESP in spi=0x190 ok, seq=0 (SA: ESP in spi=0x190 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipsec in debug ipsec in Enables the display of debugging information related to inbound OSPFv3 packets with IPsec. Syntax debug ipsec in no debug ipsec in Modes Privileged EXEC mode Examples device# debug ipsec in IPSec: in debugging is on Brocade(config-ospf6-router)# Debug: Jan 1 02:04:15 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::') payloadlength =64 Debug: Jan 1 02:04:15 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80:: Debug: Jan 1 02:04:15 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::') payloadlength =64 Debug: Jan 1 02:04:15 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80:: Debug: Jan 1 02:04:26 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::') payloadlength =64 Debug: Jan 1 02:04:26 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80:: Debug: Jan 1 02:04:26 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::') payloadlength =64 Debug: Jan 1 02:04:26 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80:: Debug: Jan 1 02:04:36 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::') payloadlength =64 Debug: Jan 1 02:04:36 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80:: Debug: Jan 1 02:04:36 IPSEC,IN: ESP spi=400 (pkt 'ESP FE80:: -> FE80::') payloadlength =64 Debug: Jan 1 02:04:36 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80:: Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 209 debug ipsec out debug ipsec out Enables the display of debugging information related to outbound OSPFv3 packets with IPsec. Syntax debug ipsec out no debug ipsec out Modes Privileged EXEC mode Examples device# debug ipsec out IPSec: out debugging is on Brocade(config-ospf6-router)# Debug: Jan 1 02:04:55 IPSEC,OUT: Matching Flow: output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=:: Debug: Jan 1 02:04:55 IPSEC,OUT: SA ESP out spi=0x190 dst=:: payloadlength =64 Debug: Jan 1 02:04:56 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40 Debug: Jan 1 02:04:56 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40 Debug: Jan 1 02:05:06 IPSEC,OUT: Matching Flow: output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=:: Debug: Jan 1 02:05:06 IPSEC,OUT: SA ESP out spi=0x190 dst=:: payloadlength =64 Debug: Jan 1 02:05:07 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40 Debug: Jan 1 02:05:07 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40 Debug: Jan 1 02:05:15 IPSEC,OUT: Matching Flow: output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=:: Debug: Jan 1 02:05:15 IPSEC,OUT: SA ESP out spi=0x190 dst=:: payloadlength =64 Debug: Jan 1 02:05:16 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40 Debug: Jan 1 02:05:16 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40 210 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipsec policy debug ipsec policy Enables the display of debugging information for IPsec policy. Syntax debug ipsec policy no debug ipsec policy Modes Privileged EXEC mode Examples device# debug ipsec policy IPSec: policy debugging is on Brocade(config-ospf6-router)#no area 0 auth ipsec spi 400 esp sha1 abcef12345678901234fedcba098765432109876 Debug: Jan 1 01:57:05 IPSEC,Policy: Removing flow [input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::] : ok Brocade(config-ospf6-router)#area 0 auth ipsec spi 400 esp sha1 abcef12345678901234fedcba098765432109876 Debug: Jan 1 01:57:26 IPSEC,Policy: Creating flow [input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::] : ok Brocade(config-ospf6-router)#Debug: Jan 1 02:02:21 IPSEC,Policy: Creating flow [output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=::] : ok Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 211 debug ipv6 debug ipv6 Enables the collection of information about IPv6 configurations for troubleshooting. Syntax debug ipv6address cache icmp mld nd packet ra Parameters address The IPv6 address. cache The IPv6 cache entry. icmp The Internet Control Message Protocol version 6 (ICMPv6) address. mld The Multicast Listener Discovery (MLD) protocol activity. nd The neighbor discovery. packet The IPv6 packet. ra The router address. Modes Privileged EXEC mode 212 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 dhcp relay debug ipv6 dhcp relay Displays debug information related to Dynamic Host Configuration Protocol for IPv6 (DHCPv6) relay agent. Syntax debug ipv6 dhcp relay no debug ipv6 dhcp relay Modes Privileged EXEC mode Examples The following output will be displayed when you enable the DHCPv6 relay agent on the Ethernet interface 8/2. device# debug ipv6 dhcp relay DHCP6: relay debugging is on device# Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward >fc00:b000:cade::2] Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Debug: Dec 9 11:15:20 DHCP6: DHCP6 relay-forward message Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 message sent [fc00:b000:cade::asent sent sent sent sent sent sent sent sent sent sent sent sent sent sent [fc00:b000:cade::a->fc00:b000:cade::a1] [fc00:b000:cade::a->fc00:b000:cade::a2] [fc00:b000:cade::a->fc00:b000:cade::a3] [fc00:b000:cade::a->fc00:b000:cade::a4] [fc00:b000:cade::a->fc00:b000:cade::a5] [fc00:b000:cade::a->fc00:b000:cade::a6] [fc00:b000:cade::a->fc00:b000:cade::a7] [fc00:b000:cade::a->fc00:b000:cade::a8] [fc00:b000:cade::a->fc00:b000:cade::a9] [fc00:b000:cade::a->fc00:b000:cade::aa] [fc00:b000:cade::a->fc00:b000:cade::ab] [fc00:b000:cade::a->fc00:b000:cade::ac] [fc00:b000:cade::a->fc00:b000:cade::ad] [fc00:b000:cade::a->fc00:b000:cade::ae] [fc00:b000:cade::a->fc00:b000:cade::af] 213 debug ipv6 dhcp snooping debug ipv6 dhcp snooping Enables debugging of the DHCPv6 snooping activity. Syntax debug ipv6 dhcp snooping no debug ipv6 dhcp snooping Modes Privileged EXEC mode Global configuration mode Usage Guidelines The no form of the command disables debugging of the DHCPv6 snooping activity. Examples device# debug ipv6 dhcp snooping device(config-vif-11)# DHCPv6: snooping mapped to outgoing port 2/1/24 vlan 14 VRF 1 DHCPv6: snooping on trusted port 3/1/23, VRF 1, 2001:DB8::b->0000.007d.7a3e 214 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld debug ipv6 mld Displays the debugging information about the received and sent packets of the Multicast Listening Discovery (MLD). Syntax debug ipv6 mld no debug ipv6 mld Modes Privileged EXEC mode Examples device# debug ipv6 mld device# MLD: rcvd Report-V1(ty=131) g=ff03::26:2641 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2642 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2643 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2644 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2645 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2646 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2647 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2648 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2649 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:264a resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 215 debug ipv6 mld add-del-oif debug ipv6 mld add-del-oif Enabled with the MLD debug ipv6 mcache-source or debug ipv6 mcache-group commands at the same time. Syntax debug ipv6 mld add-del-oif no debug ipv6 mld add-del-oif Modes Privileged EXEC mode 216 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld add-del-oif Examples device# debug ipv6 mld show debug ip6 mld mcache-source 50F5 is enabled debug ip6 mld add-del-oif is enabled device# show ipv6 mld mcache Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt: SW proc. count OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output vlan 400, 0 cache vlan 601, 0 cache vlan 602, 0 cache vlan 701, 0 cache vlan 888, 0 cache vlan 1000, 5 caches. use 1 VIDX 1 (* 24:2402) cnt=85 OIF: tag TR(3/1/12) 7/1/17 age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0) 2 (* 24:2403) cnt=87 OIF: tag TR(3/1/12) 7/1/17 age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0) 3 (* 24:2404) cnt=249 OIF: tag TR(3/1/12) 7/1/17 age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0) 4 (* 24:2400) cnt=88 OIF: tag TR(3/1/12) 7/1/17 age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0) 5 (* 24:2401) cnt=254 OIF: tag TR(3/1/12) 7/1/17 age=0m up-time=24m, change=24m vidx=4130 (ref-cnt=0) device# Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242404) vlan 1000 Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242403) vlan 1000 Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242402) vlan 1000 Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242401) vlan 1000 Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242400) vlan 1000 device# show ipv6 mld mcache Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt: SW proc. count OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output vlan 400, 0 cache vlan 601, 0 cache vlan 602, 0 cache vlan 701, 0 cache vlan 888, 0 cache vlan 1000, 5 caches. use 1 VIDX 1 (* 24:2402) cnt=85 OIF: tag TR(3/1/12) age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE 2 (* 24:2403) cnt=87 OIF: tag TR(3/1/12) age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE 3 (* 24:2404) cnt=249 OIF: tag TR(3/1/12) age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE 4 (* 24:2400) cnt=88 OIF: tag TR(3/1/12) age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE 5 (* 24:2401) cnt=254 OIF: tag TR(3/1/12) age=1m up-time=25m, change=25m vidx=4131 (ref-cnt=0) HW-AGE device# Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242400) vlan 1000 Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242401) vlan 1000 Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242402) vlan 1000 Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242403) vlan 1000 Debug: Sep 19 17:40:45 Add 7/1/17 to (0x0 0x242404) vlan 1000 device# show ipv6 mld mc Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt: SW proc. count OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output vlan 400, 0 cache vlan 601, 0 cache vlan 602, 0 cache vlan 701, 0 cache vlan 888, 0 cache Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 217 debug ipv6 mld add-del-oif vlan 1000, 5 caches. use 1 VIDX 1 (* 24:2402) cnt=88 OIF: 7/1/17 tag TR(3/1/12) age=0m up-time=25m, change=25m vidx=4130 2 (* 24:2403) cnt=88 OIF: 7/1/17 tag TR(3/1/12) age=0m up-time=25m, change=25m vidx=4130 3 (* 24:2404) cnt=416 OIF: 7/1/17 tag TR(3/1/12) age=0m up-time=25m, change=25m vidx=4130 4 (* 24:2400) cnt=90 OIF: 7/1/17 tag TR(3/1/12) age=0m up-time=25m, change=25m vidx=4130 5 (* 24:2401) cnt=421 OIF: 7/1/17 tag TR(3/1/12) age=0m up-time=25m, change=25m vidx=4130 218 (ref-cnt=0) (ref-cnt=0) (ref-cnt=0) (ref-cnt=0) (ref-cnt=0) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld add-del-oif all debug ipv6 mld add-del-oif all Monitors outgoing interfaces (OIFs) that are added or deleted for all the MLD groups. Syntax debug ipv6 mld add-del-oif all no debug ipv6 mld add-del-oif all Modes Privileged EXEC mode Examples device# debug ipv6 mld add-del-oif all device# debug ipv6 mld show debug ip6 mld mcache-source 681D is enabled debug ip6 mld add-del-oif all is enabled device# Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252504) vlan 1000 Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252503) vlan 1000 Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252502) vlan 1000 Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252501) vlan 1000 Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252500) vlan 1000 device# Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252500) vlan 1000 Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252501) vlan 1000 Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252502) vlan 1000 Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252503) vlan 1000 Debug: Sep 16 00:07:09 Add 7/1/17 to (0x0 0x252504) vlan 1000 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 219 debug ipv6 mld add-del-oif stack debug ipv6 mld add-del-oif stack Displays the MLD stack trace. Syntax debug ipv6 mld add-del-oif stack no debug ipv6 mld add-del-oif stack Modes Privileged EXEC mode 220 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld add-del-oif stack Examples device# debug ipv6 mld add-del-oif stack device# debug ipv6 mld show debug ip6 mld mcache-source 681D is enabled debug ip6 mld add-del-oif stack is enabled device# Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252502) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252502) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68 2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252502) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252503) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252503) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68 2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252503) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252504) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252504) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68 2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252504) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252500) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252500) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68 2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252500) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 MLD Snoop: Create (0x0 0x252501) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 2064096C 206414A8 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 7/1/17 to (0x0 0x252501) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68 2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252501) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 221 debug ipv6 mld clear debug ipv6 mld clear Clears all the MLD debug settings.. Syntax debug ipv6 mld clear no debug ipv6 mld clear Modes Privileged EXEC mode Examples device# debug ipv6 mld clear no debug ipv6 mld is enabled 222 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld detail debug ipv6 mld detail Displays the details of the MLD messages. Syntax debug ipv6 mld detail no debug ipv6 mld detail Modes Privileged EXEC mode Examples device# debug ipv6 mld detail device# debug ipv6 mld show debug ip6 mld is enabled debug ip6 mld detail is enabled device# Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2400 to VL1000(ethe 7/1/21 ) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2401 to VL1000(ethe 7/1/22 ) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2402 to VL1000(ethe 7/1/23 ) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2403 to VL1000(ethe 7/1/21 ) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2404 to VL1000(ethe 7/1/22 ) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2404 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2403 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2402 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2401 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2400 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2404 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2403 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2402 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2401 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Debug: Sep 19 16:25:35 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2400 to VL1000(ethe 7/1/21 ) rsp=1000 mld=24B, pkt=86B Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 223 debug ipv6 mld enable debug ipv6 mld enable Enables debugging of MLD configurations. Syntax debug ipv6 mld enable no debug ipv6 mld enable Modes Privileged EXEC mode Usage Guidelines The no form of the command disables debugging of MLD configurations. Examples device# debug ipv6 mld enable debug ipv6 mld is enabled 224 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld error debug ipv6 mld error Displays error information related to MLD. Syntax debug ipv6 mld error no debug ipv6 mld error Modes Privileged EXEC mode Examples device# debug ipv6 mld error ERR: Dropped because group address not valid 2001:DB8::1:ff00:2. MLD.VRF0.ERR: Rx packet is invalid. Dropping packet ERR: Dropped because group address not valid 2001:DB8::1:ff00:2. MLD.VRF0.ERR: Rx packet is invalid. Dropping packet error 0x1 0x0 : failed to add prefix 2001:DB8::/64 to hw ERR: Dropped because group address not valid 2001:DB8::1:ff00:2. MLD.VRF0.ERR: Rx packet is invalid. Dropping packet ERR: Dropped because group address not valid 2001:DB8::1:ff00:2. MLD.VRF0.ERR: Rx packet is invalid. Dropping packet ERR: Dropped because group address not valid 2001:DB8::1:ff00:2. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 . . . . . 225 debug ipv6 mld group debug ipv6 mld group Debugs the MLD group matching. Syntax debug ipv6 mld group ipv6addr no debug ipv6 mld group ipv6addr Parameters ipv6addr Specifies the address of the IPv6 route. Modes Privileged EXEC mode Examples device# debug ipv6 mld group .ff1e::4:5:1 device# debug ipv6 mld vrf br_vrf_1 device# debug ipv6 mld protocol report device# debug ipv6 mld enable device# Debug: Jan 2 00:22:01 MLD.VRF1.RCV: Debug: Jan 2 00:22:06 MLD.VRF1.RCV: Type V1 Debug: Jan 2 00:22:08 MLD.VRF1.RCV: Type V1 device# Debug: Jan 2 00:22:16 MLD.VRF1.RCV: 226 Type V1 Report Port 2/1/21,v1 Grp ff1e::4:5:1 Report Port 2/1/21,v1 Grp ff1e::4:5:1 Report Port 2/1/21,v1 Grp ff1e::4:5:1 Type V1 Report Port 2/1/21,v1 Grp ff1e::4:5:1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld level debug ipv6 mld level Displays the different levels of debugging output. Syntax debug ipv6 mld leveldecimal no debug ipv6 mld leveldecimal Parameters decimal Specifies the number of the MLD level from 1 through 3. Modes Privileged EXEC mode Usage Guidelines The output must be enabled in combination with the other MLD debug commands. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 227 debug ipv6 mld level Examples device# debug ipv6 mld level 1 MLD Debug level = 1 device# Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:44:07 no routr fid, consume pkt Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:44:07 no routr fid, consume pkt Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:44:07 no routr fid, consume pkt Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:44:07 no routr fid, consume pkt Debug: Sep 19 16:44:07 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:44:07 no routr fid, consume pkt device# Debug: Sep 19 16:45:03 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 :: to VL1000(all) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:45:06 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff84:55ae resp=0, pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24 Debug: Sep 19 16:45:06 no routr fid, consume pkt Debug: Sep 19 16:45:07 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff82:50f5 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:45:07 no routr fid, consume pkt Debug: Sep 19 16:45:08 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:84 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:45:08 no routr fid, consume pkt Brocade# Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:70 resp=0, pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24 Debug: Sep 19 16:45:10 no routr fid, consume pkt Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:45:10 no routr fid, consume pkt Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:45:10 no routr fid, consume pkt Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:45:10 no routr fid, consume pkt Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:45:10 no routr fid, consume pkt Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:45:10 no routr fid, consume pkt Brocade# debug ipv6 mld level 3 MLD Debug level = 3 Brocade# Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:45:58 group: ff04::24:2400, life = 260 Debug: Sep 19 16:45:58 no routr fid, consume pkt Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:45:58 group: ff04::24:2401, life = 260 Debug: Sep 19 16:45:58 no routr fid, consume pkt Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:45:58 group: ff04::24:2402, life = 260 Debug: Sep 19 16:45:58 no routr fid, consume pkt Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:45:58 group: ff04::24:2403, life = 260 Debug: Sep 19 16:45:58 no routr fid, consume pkt Debug: Sep 19 16:45:58 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:45:58 group: ff04::24:2404, life = 260 Debug: Sep 19 16:45:58 no routr fid, consume pkt Debug: Sep 19 16:47:08 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 :: to 228 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld level VL1000(all) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:47:10 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:84 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:47:10 group: ff02::1:ff20:84, life = 260 Debug: Sep 19 16:47:10 no routr fid, consume pkt Debug: Sep 19 16:47:12 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:70 resp=0, pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24 Debug: Sep 19 16:47:12 group: ff02::1:ff20:70, life = 260 Debug: Sep 19 16:47:12 no routr fid, consume pkt Debug: Sep 19 16:47:15 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff84:55ae resp=0, pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24 Debug: Sep 19 16:47:15 group: ff02::1:ff84:55ae, life = 260 Debug: Sep 19 16:47:15 no routr fid, consume pkt Debug: Sep 19 16:47:16 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff82:50f5 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:47:16 group: ff02::1:ff82:50f5, life = 260 Debug: Sep 19 16:47:16 no routr fid, consume pkt Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:47:18 group: ff04::24:2400, life = 260 Debug: Sep 19 16:47:18 no routr fid, consume pkt Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:47:18 group: ff04::24:2401, life = 260 Debug: Sep 19 16:47:18 no routr fid, consume pkt Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:47:18 group: ff04::24:2402, life = 260 Debug: Sep 19 16:47:18 no routr fid, consume pkt Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:47:18 group: ff04::24:2403, life = 260 Debug: Sep 19 16:47:18 no routr fid, consume pkt Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:47:18 group: ff04::24:2404, life = 260 Debug: Sep 19 16:47:18 no routr fid, consume pkt Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 229 debug ipv6 mld mcache-group debug ipv6 mld mcache-group Displays a filter of only desired mcache group debugging output. Syntax debug ipv6 mld mcache-grouphex no debug ipv6 mld mcache-grouphex Parameters hex Specifies the hexadecimal value of the MLD mcache group. Modes Privileged EXEC mode Usage Guidelines The output must be enabled in combination with the other MLD debug commands. 230 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld mcache-group Examples device# debug ipv6 mld is enabled debug ip6 mld mcache-group 2403 is enabled debug ip6 mld level 3 is enabled device# Debug: Sep 28 00:09:51 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff67:eb8b resp=0, pkt S=fe80::200:36ff:fe67:eb8b, on VL510 (phy 1/1/5), mld_size=24 Debug: Sep 28 00:09:51 group: 2001:DB8::1:ff67:eb8b, life = 260 Debug: Sep 28 00:09:51 forward to router fid 814 Debug: Sep 28 00:09:52 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff82:50f5 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:09:52 group: 2001:DB8::1:ff82:50f5, life = 260 Debug: Sep 28 00:09:52 forward to router fid 814 Debug: Sep 28 00:09:54 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff53:f9c5 resp=0, pkt S=fe80::200:36ff:fe53:f9c5, on VL510 (phy 1/1/1), mld_size=24 Debug: Sep 28 00:09:54 group: 2001:DB8::1:ff53:f9c5, life = 260 Debug: Sep 28 00:09:54 forward to router fid 814 Debug: Sep 28 00:09:56 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff20:73 resp=0, pkt S=fe80::200:36ff:fe53:f9c5, on VL510 (phy 1/1/1), mld_size=24 Debug: Sep 28 00:09:56 group: 2001:DB8::1:ff20:73, life = 260 Debug: Sep 28 00:09:56 forward to router fid 814 Debug: Sep 28 00:09:56 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff20:77 resp=0, pkt S=fe80::200:36ff:fe67:eb8b, on VL510 (phy 1/1/5), mld_size=24 Debug: Sep 28 00:09:56 group: 2001:DB8::1:ff20:77, life = 260 Debug: Sep 28 00:09:56 forward to router fid 814 Debug: Sep 28 00:09:56 MLD: rcvd Report-V1(ty=131) g=2001:DB8::1:ff20:84 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:09:56 group: 2001:DB8::1:ff20:84, life = 260 Debug: Sep 28 00:09:56 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::24:2400, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::24:2401, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::24:2402, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::24:2403, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::24:2404, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2500 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::25:2500, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2501 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::25:2501, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2502 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::25:2502, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2503 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::25:2503, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2504 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::25:2504, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 231 debug ipv6 mld phy-port ethernet debug ipv6 mld phy-port ethernet Matches the input of the physical port. Syntax debug ipv6 mld phy-port ethernetstackid / slot / port no debug ipv6 mld phy-port ethernetstackid / slot / port Parameters stackid / slot / port Specifies the stack ID, slot number, and port number of a specific Ethernet port. Modes Privileged EXEC mode Examples device# debug ipv6 mld phy-port ethernet 1/1/22 device# debug ipv6 mld show debug ip6 mld physical_port 1/1/22 is enabled device# MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2501 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2503 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 232 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld prime-port ethernet debug ipv6 mld prime-port ethernet Enables the activity of the physical port and primary port if trunking happened. Syntax debug ipv6 mld prime-port ethernetstackid / slot / port no debug ipv6 mld prime-port ethernetstackid / slot / port Parameters stackid / slot / port Specifies the stack ID, slot number, and port number of a specific Ethernet port. Modes Privileged EXEC mode Usage Guidelines The no form of the command disables the activity of the physical port and primary port. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 233 debug ipv6 mld prime-port ethernet Examples device# debug ipv6 mld prime-port ethernet 1/1/21 device# debug ipv6 mld show debug ip6 mld prime-port 1/1/21 is enabled device# MLD: rcvd Leave(ty=132) g=2001:DB8::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2400 VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2401 VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2402 VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2403 VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::24:2404 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::24:2404 VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::25:2500 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2500 VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::25:2501 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2501 VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::25:2502 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2502 VL510(ethe 1/1/21 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::25:2503 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 MLD send Query(t=130) V1, s=fe80::21b:f3ff:fe84:124 2001:DB8::25:2503 VL510(ethe 1/1/22 ) rsp=10000 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::25:2504 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/21), mld_size=24 234 to to to to to to to to to Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld protocol debug ipv6 mld protocol Displays debugging information about the IPv6 MLD queries and reports transmitted and received. Syntax debug ipv6 mld protocol [ query | report ] no debug ipv6 mld protocol[ query | report ] Parameters query Displays the IPv6 MLD query. report Displays the IPv6 MLD report. Modes Privileged EXEC mode Examples The following is the sample output from the debug ipv6 mld protocol query command. device# debug ipv6 mld protocol query device# debug ipv6 mld enable device# MLD.VRF0: [ Port 6/1/17,v170 ] Sent General Query version 2 using src fe80::768e:f8ff:fe34:3c80 MLD.VRF0: [ Port 4/1/22,v78 ] Sent General Query version 2 using src fe80::768e:f8ff:fe34:3c80 MLD.VRF0: [ Port 6/1/22,v77 ] Sent General Query version 2 using src fe80::768e:f8ff:fe34:3c80 MLD.VRF0: [ Port 1/1/15,v74 ] Sent General Query version 2 using src fe80::768e:f8ff:fe34:3c80 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 235 debug ipv6 mld protocol The following is the truncated sample output from the debug ipv6 mld protocol report command. device# debug ipv6 mld protocol report device# debug ipv6 mld enable device# MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::14 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::6 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::22 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::11 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2f MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::9 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::25 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::24 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::1c MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2c MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::28 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::26 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::31 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::5 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::1f MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::18 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2d MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::1 MLD.VRF0.RCV: Type V1 Report Port 3/1/12,v73 Grp ff84::2a 236 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld rx debug ipv6 mld rx Displays the IPv6 MLD packets received. Syntax debug ipv6 mld rx no debug ipv6 mld rx Modes Privileged EXEC mode Examples device# debug ipv6 mld rx MLD.VRF1.RCV: Received Query on Port 1/1/3*1/1/14,v25 Grp * MLD.QRY: [ Port 1/1/3*1/1/14,v25. Grp :: Src fe80::207:11ff:fe11:1111]. Processing version 2 query MLD.VRF3.RCV: Received Query on Port 1/1/3*1/1/14,v26 Grp * MLD.QRY: [ Port 1/1/3*1/1/14,v26. Grp :: Src fe80::207:11ff:fe11:1111]. Processing version 2 query Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 237 debug ipv6 mld show debug ipv6 mld show Displays the IPv6 MLD debug settings. Syntax debug ipv6 mld show Modes Privileged EXEC mode Examples device# debug ipv6 mld show debug ipv6 mld error debug ipv6 mld vrf 3 238 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld source debug ipv6 mld source Displays the MLD related debug information for the specified source address. Syntax debug ipv6 mld sourceipaddr no debug ipv6 mld sourceipaddr Parameters ipaddr Specifies the IP address. Modes Privileged EXEC mode Examples device# debug ipv6 mld rx device# debug ipv6 mld protocol report device# debug ipv6 mld source 2001:DB8::15 ====================== MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0 MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action BLK_OLD. #Srcs MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0 MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action BLK_OLD. #Srcs MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0 MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action ALW_NEW. #Srcs MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0 MLD.RCV: Type V2 Rept Port 1/1/12,v107 #Grps 1, action ALW_NEW. #Srcs MLD.VRF4.RCV: Type V2 Report Port 1/1/12,v107 Grp 2001:DB8:ff3c::7:0 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 1 1 1 1 239 debug ipv6 mld timer debug ipv6 mld timer Monitors the MLD timer activity. Syntax debug ipv6 mld timer no debug ipv6 mld timer Modes Privileged EXEC mode Examples device# debug ipv6 mld timer Monitor MLD timers activity 240 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld tx debug ipv6 mld tx Displays the IPv6 MLD packets transmitted.. Syntax debug ipv6 mld tx no debug ipv6 mld tx Modes Privileged EXEC mode Examples device# debug ipv6 mld tx device# debug ipv6 mld protocol query MLD.VRF1: [ Port 1/1/12,v105 ] Sent General Query version 2 using src fe80::768e:f8ff:fe0e:68c0 MLD.VRF3: [ Port 1/1/12,v103 ] Sent General Query version 2 using src fe80::768e:f8ff:fe0e:68c0 MLD.VRF4: [ Port 1/1/12,v107 ] Sent General Query version 2 using src fe80::768e:f8ff:fe0e:68c0 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 241 debug ipv6 mld vlan debug ipv6 mld vlan Monitors the MLD VLAN activity. Syntax debug ipv6 mld vlandecimal no debug ipv6 mld vlandecimal Parameters decimal Specifies the VLAN number. Modes Privileged EXEC mode Examples device# debug ipv6 mld vlan 2 monitor vlan 2 242 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 mld vrf debug ipv6 mld vrf Displays MLD related debug information for the specified VRF. Syntax debug ipv6 mld vrf vrf_name no debug ipv6 mld vrf vrf_name Parameters vrf_name Specifies the VRF name. Modes Privileged EXEC mode Examples device# debug ipv6 mld vrf vrf1 MLD.VRF1.EVT: - Started FSM timer for 16 seconds MLD.VRF1.EVT: Rx packet is valid. Processing packet MLD.VRF1.EVT: - Started FSM timer for 16 seconds MLD.VRF1: [ Port 3/1/11,3/1/11 ] General Query Timer expired. Sending Query version 2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 243 debug ipv6 nd debug ipv6 nd Enables Neighbor Discovery (ND) debug logs and displays the debugging information about dropped Neighbor Solicitation (NS) and Neighbor Advertisement (NA) packets. Syntax debug ipv6 nd no debug ipv6 nd Modes Privileged EXEC mode Global configuration mode Usage Guidelines Examples device(config)#debug ipv6 nd ipv6: nd debugging is on device(config)#ND Inspect: src-ip, src-mac mismatch, packet dropped rx-sip 2001:DB8::1 rx-smac 0000.0000.0066 inspect-ip 2001:DB8::1 inspect-mac 0000.0000.0088 vlan_id 2 vrf_id 0 device(config)#show ipv6 neighbor inspection statistics Total number of ND Solicit received 4 Total number of ND Adevert received 4 Total number of ND dropped 6 244 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf ipsec debug ipv6 ospf ipsec Displays information about IPsec events. This command can show if IPsec is actually providing its services to IPv6 OSPFv3. The following output shows success in the attempts to provide various IPsec services to OSPFv3. Syntax debug ipv6 ospf ipsec no debug ipv6 ospf ipsec Modes Privileged EXEC mode Examples device# debug ipv6 ospf ipsec OSPFv3: ipsec debugging is on Brocade(config-ospf6-router)# no area 0 auth ipsec spi 400 esp sha1 abcef12345678901234fedcba098765432109876Debug: Jan 1 02:22:09 OSPFv3: ITC_AUTHENTICATION_CONFIG message received Debug: Jan 1 02:22:09 OSPFv3: Auth timer started Debug: Jan 1 02:22:09 OSPFv3: Key Rollover, for area 0.0.0.0, state change NOT_ACTIVE->STARTED Debug: Jan 1 02:22:09 OSPFv3: Key Rollover, for v9, state change NOT_ACTIVE->STARTED Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 245 debug ipv6 ospf ism debug ipv6 ospf ism Displays debug information about the interface state machine (ISM). Syntax debug ipv6 ospf ism no debug ipv6 ospf ism Modes Privileged EXEC mode Examples device# debug ipv6 ospf ism OSPFv3: ism debugging is on Debug: Dec 9 10:47:25 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:25 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:25 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:40 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:40 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:40 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]: Debug: Dec 9 10:47:44 OSPFv3: ISM[14368]: 246 InterfaceDown Status change BDR -> Down (Configured) {dr:7.0.0.3,bdr:1.0.0.1} -> {dr:0.0.0.0,bdr:0.0.0.0} InterfaceUp Status change Down -> Waiting (Priority > 0) Start Wait_Timer at 639966, 619070 BackupSeen Status change Waiting -> DROther (BackupSeen:DR Election) {dr:0.0.0.0,bdr:0.0.0.0} -> {dr:7.0.0.3,bdr:1.0.0.11} NeighborChange Status change DROther -> DROther (NeighborChange:DR Election) NeighborChange Status change DROther -> DROther (NeighborChange:DR Election) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf ism-events debug ipv6 ospf ism-events Displays debug information about ISM events. Syntax debug ipv6 ospf ism-events no debug ipv6 ospf ism-events Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf ism-events OSPFv3: ism-events debugging is on Debug: Dec 9 10:53:04 OSPFv3: ISM[14368]: InterfaceDown Debug: Dec 9 10:53:15 OSPFv3: interface (14367) cost change to 9 due to speed change Debug: Dec 9 10:53:15 OSPFv3: ISM[14368]: InterfaceUp Debug: Dec 9 10:53:15 OSPFv3: ISM[14368]: Start Wait_Timer at 643319, 622306 Debug: Dec 9 10:53:22 OSPFv3: ISM[14368]: BackupSeen Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 247 debug ipv6 ospf ism-status debug ipv6 ospf ism-status Displays debug information about the status of ISM. Syntax debug ipv6 ospf ism-status no debug ipv6 ospf ism-status Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf ism-status OSPFv3: ism-status debugging is on Debug: Dec 9 10:55:38 OSPFv3: ISM[14368]: Status change DROther -> Down (Configured) Debug: Dec 9 10:55:58 OSPFv3: ISM[14368]: Status change Down -> Waiting (Priority > 0) Debug: Dec 9 10:56:01 OSPFv3: ISM[14368]: Status change Waiting -> DROther (BackupSeen:DR Election) Debug: Dec 9 10:56:01 OSPFv3: ISM[14368]: {dr:0.0.0.0,bdr:0.0.0.0} -> {dr:1.0.0.11,bdr:1.0.0.11} Debug: Dec 9 10:56:02 OSPFv3: ISM[14368]: Status change DROther -> DROther (NeighborChange:DR Election) Debug: Dec 9 10:56:02 OSPFv3: ISM[14368]: {dr:1.0.0.11,bdr:1.0.0.11} -> {dr:7.0.0.3,bdr:1.0.0.11} Debug: Dec 9 10:56:07 OSPFv3: ISM[14368]: Status change DROther -> DROther (NeighborChange:DR Election) 248 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf lsa debug ipv6 ospf lsa Displays LSAs. Syntax debug ipv6 ospf lsa no debug ipv6 ospf lsa Modes Privileged EXEC mode Global configuration mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 249 debug ipv6 ospf lsa Examples device# debug ipv6 ospf lsa OSPFv3: lsa debugging is on device(config-vif-9)#Debug: Jan 1 17:05:01 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0 Debug: Jan 1 17:05:01 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:01 OSPFv3: LSA: Type: 8193 ID: 0 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 17:05:01 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:01 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking Interface 644 Debug: Jan 1 17:05:01 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include 5001::/64 Debug: Jan 1 17:05:01 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:01 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 17:05:01 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:01 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Header Type :Router Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: request Type =8193 ADvRtr =10.2.2.2 ID=0 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Header Type :IntraPrefix Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: request Type =8201 ADvRtr =10.2.2.2 ID=0 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Header Type :Link Id: 2052 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: request Type =8 ADvRtr =10.2.2.2 ID=2052 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA HEADER Type :Router Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA HEADER Type :IntraPrefix Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Link Id: 2052 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA HEADER Type :Link Id: 10.0.8.4 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Interface 644 is Stub Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking Interface 644 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include 5001::/64 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0 Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Turnover type:Router Lsa Id:0.0.0.0 AdvRouter:10.2.2.2: Debug: Jan 1 17:05:02 OSPFv3: contents changed Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter: 250 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf lsa 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Turnover type:IntraPrefix Lsa Id:0.0.0.0 AdvRouter:10.2.2.2: Debug: Jan 1 17:05:02 OSPFv3: contents changed Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[418103392]: delayed ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA[10.2.2.2]: direct ack Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0 Advrouter: 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA: Turnover type:Router Lsa Id:0.0.0.0 AdvRouter:10.4.4.8: Debug: Jan 1 17:05:02 OSPFv3: contents changed Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA: schedule flooding 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Network: Interface 644 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :Network Id: 644 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA: schedule flooding 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): Interface 644 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Checking Type :Link Id 10.0.2.132: Adv Routr : 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 1 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): Prefix 5001:: Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): including 5001:: Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Checking Type :Link Id 10.0.8.4: Adv Routr : 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 1 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): Prefix 5001:: Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 5001:: is Duplicate Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 19320 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA: schedule flooding 10.2.2.2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 251 debug ipv6 ospf lsa-flooding debug ipv6 ospf lsa-flooding Displays debug information about LSA flooding activity. Syntax debug ipv6 ospf lsa-flooding no debug ipv6 ospf lsa-flooding Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf lsa-flooding OSPFv3: lsa-flooding debugging is on device(config)# ipv6 router ospf device(config-ospf6-router)# redistribute connected device(config-ospf6-router)# redistribute connected Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2 Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2 Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2 Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2 Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2 Debug: Jan 1 17:17:49 OSPFv3: LSA: schedule flooding 10.2.2.2 252 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf lsa-generation debug ipv6 ospf lsa-generation Displays debug information about LSA generation. Syntax debug ipv6 ospf lsa-generation no debug ipv6 ospf lsa-generation Modes Privileged EXEC mode Global configuration mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 253 debug ipv6 ospf lsa-generation Examples device# debug ipv6 ospf lsa-generation OSPFv3: lsa-generation debugging is on Brocade(config-ospf6-router)# Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 1 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.1 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 2 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.2 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 3 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.3 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 4 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.4 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 5 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.5 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :Router Id: 0 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :Router Id: 0.0.0.0 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 1 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.1 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 2 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.2 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 3 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.3 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 4 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.4 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 5 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.5 Advrouter: 10.4.4.8 254 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf lsa-install debug ipv6 ospf lsa-install Displays debug information about installed LSAs. Syntax debug ipv6 ospf lsa-install no debug ipv6 ospf lsa-install Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf lsa-install OSPFv3: lsa-install debugging is on device(config-ospf6-router)# Debug: Jan 1 19:03:16 OSPFv3: LSA: Turnover type:Router Lsa Id:0.0.0.0 AdvRouter:10.4.4.8: Debug: Jan 1 19:03:16 OSPFv3: contents changed Debug: Jan 1 19:03:59 OSPFv3: LSA: Turnover type:Router Lsa Id:0.0.0.0 AdvRouter:10.4.4.8: Debug: Jan 1 19:03:59 OSPFv3: contents changed Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 255 debug ipv6 ospf lsa-inter-area debug ipv6 ospf lsa-inter-area Displays debug information about inter-area LSAs. Syntax debug ipv6 ospf lsa-inter-area no debug ipv6 ospf lsa-inter-area Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf lsa-inter-area OSPFv3: lsa-inter-area debugging is on device(config-vif-7)# disable device(config-vif-7)# enable device(config-vif-7)# OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Installing in LSDB Inter Area Prefix LSA for area 0.0.0.0 and prefix 2001:DB8::/64 OSPFv3: Inter Area LSA not generated, route is in same area. OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, route is in same area. OSPFv3: Installing in LSDB Inter Area Prefix LSA for area 10.0.0.1 and prefix 2001:DB8::/64 OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, route is in same area. shOSPFv3: Inter Area LSA not generated, route is in same area. 256 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf lsa-refresh debug ipv6 ospf lsa-refresh Displays LSA refresh information. Syntax debug ipv6 ospf lsa-refresh no debug ipv6 ospf lsa-refresh Modes Privileged EXEC mode Global configuration mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 257 debug ipv6 ospf lsa-refresh Examples device# debug ipv6 ospf lsa-refresh OSPFv3: lsa-refresh debugging is on device(config-ospf6-router)# Debug: Jan 1 19:01:39 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0 Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking Interface 644 Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Interface 644 is down Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): No prefix to advertise for Area 0.0.0.0 Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0 Debug: Jan 1 19:01:39 OSPFv3: LSA Update Network: Interface 644 is not DR Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Interface 644 is not DR Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking Interface 644 Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Interface 644 is down Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): No prefix to advertise for Area 0.0.0.0 Debug: Jan 1 19:01:39 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0 Debug: Jan 1 19:01:44 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0 Debug: Jan 1 19:02:42 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0 Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.6 Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.7debug ip Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.8 Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.9 Debug: Jan 1 19:02:42 OSPFv3: LSA: LSA Update AS-External: ID 10.0.0.10 Debug: Jan 1 19:02:42 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking Interface 644 Debug: Jan 1 19:02:42 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include 2001:DB8::/64 Debug: Jan 1 19:02:42 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0 Debug: Jan 1 19:02:42 OSPFv3: LSA Update Link: Interface 644 Debug: Jan 1 19:02:46 OSPFv3: LSA Update Link: Interface 644 Debug: Jan 1 19:02:46 OSPFv3: LSA: Type: 8 ID: 644 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 19:02:46 OSPFv3: LSA Update Link: Interface 644 Debug: Jan 1 19:02:46 OSPFv3: LSA: Type: 8 ID: 644 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking Interface 644 Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include 2001:DB8::/64 Debug: Jan 1 19:02:47 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Area 0.0.0.0 Debug: Jan 1 19:02:47 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0 Debug: Jan 1 19:02:47 OSPFv3: LSA: Type: 8193 ID: 0 AdvRouter: 10.4.4.8, Supress 258 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf nsm debug ipv6 ospf nsm Displays debug information about the neighbor state machine (NSM). Syntax debug ipv6 ospf nsm no debug ipv6 ospf nsm Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf nsm OSPFv3: nsm debugging is on Debug: Dec 9 11:08:20 OSPFv3: NSM[14689]: SendHello at 652364 Debug: Dec 9 11:08:21 OSPFv3: NSM[2.0.0.1, 14341]: HelloReceived at 652379, 631072 Debug: Dec 9 11:08:22 OSPFv3: NSM[14366]: SendHello at 652386 Debug: Dec 9 11:08:24 OSPFv3: NSM[14364]: SendHello at 652403 Debug: Dec 9 11:08:25 OSPFv3: NSM[14688]: SendHello at 652415 Debug: Dec 9 11:08:25 OSPFv3: NSM[14337]: SendHello at 652416 Debug: Dec 9 11:08:26 OSPFv3: NSM[14369]: SendHello at 652430 Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.13, 14364]: HelloReceived at 652434, 631127 Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11, 14368]: HelloReceived at 652437, 631130 Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: Status change [Down]->[Init](HelloReceived) Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: 2Way-Received Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: Status change [Init]->[2-way](No Need Adjacency) Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: AdjOK? Debug: Dec 9 11:08:27 OSPFv3: NSM[1.0.0.11]: Status change [2-way]->[ExStart](Need Adjacency) Debug: Dec 9 11:08:28 OSPFv3: NSM[1.0.0.14, 14366]: HelloReceived at 652446, 631139 Debug: Dec 9 11:08:28 OSPFv3: NSM[1.0.0.11, 14369]: HelloReceived at 652447, 631140 Debug: Dec 9 11:08:29 OSPFv3: NSM[14341]: SendHello at 652453 Debug: Dec 9 11:08:29 OSPFv3: NSM[14371]: SendHello at 652457 Debug: Dec 9 11:08:30 OSPFv3: NSM[1.0.0.12, 14371]: HelloReceived at 652461, 631153 Debug: Dec 9 11:08:30 OSPFv3: NSM[14689]: SendHello at 652464 Debug: Dec 9 11:08:30 OSPFv3: NSM[14368]: SendHello at 652468 Debug: Dec 9 11:08:30 OSPFv3: NSM[1.0.0.11]: NegotiationDone Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 259 debug ipv6 ospf nsm-events debug ipv6 ospf nsm-events Displays debug information about NSM events. Syntax debug ipv6 ospf nsm-events no debug ipv6 ospf nsm-events Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf nsm-events OSPFv3: nsm-events debugging is on Debug: Dec 9 11:10:59 OSPFv3: NSM[1.0.0.12, 14368]: HelloReceived at 653956, 632600 Debug: Dec 9 11:10:59 OSPFv3: NSM[1.0.0.11, 14368]: HelloReceived at 653956, 632600 Debug: Dec 9 11:11:00 OSPFv3: NSM[7.0.0.3, 14368]: HelloReceived at 653968, 632612 Debug: Dec 9 11:11:01 OSPFv3: NSM[2.0.0.1, 14341]: HelloReceived at 653971, 632615 Debug: Dec 9 11:11:01 OSPFv3: NSM[14364]: SendHello at 653974 Debug: Dec 9 11:11:01 OSPFv3: NSM[14368]: SendHello at 653980 Debug: Dec 9 11:11:02 OSPFv3: NSM[1.0.0.13, 14364]: HelloReceived at 653981, 632625 Debug: Dec 9 11:11:02 OSPFv3: NSM[14337]: SendHello at 653983 Debug: Dec 9 11:11:02 OSPFv3: NSM[1.0.0.11, 14369]: HelloReceived at 653984, 632628 Debug: Dec 9 11:11:02 OSPFv3: NSM[1.0.0.12, 14371]: HelloReceived at 653985, 632628 Debug: Dec 9 11:11:02 OSPFv3: NSM[14688]: SendHello at 653985 Debug: Dec 9 11:11:03 OSPFv3: NSM[14341]: SendHello at 653993 Debug: Dec 9 11:11:03 OSPFv3: NSM[14369]: SendHello at 653993 Debug: Dec 9 11:11:03 OSPFv3: NSM[1.0.0.14, 14366]: HelloReceived at 653996, 632640 Debug: Dec 9 11:11:05 OSPFv3: NSM[14689]: SendHello at 654011 Debug: Dec 9 11:11:06 OSPFv3: NSM[14371]: SendHello at 654025 Debug: Dec 9 11:11:07 OSPFv3: NSM[14366]: SendHello at 654038 260 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf nsm-status debug ipv6 ospf nsm-status Displays information about the status of NSM. Syntax debug ipv6 ospf nsm-status no debug ipv6 ospf nsm-status Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf nsm-status OSPFv3: nsm-status debugging is on Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.12]: Status change [Down]->[Init](HelloReceived) Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.12]: Status change [Init]->[2-way](No Need Adjacency) Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [Down]->[Init](HelloReceived) Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [Init]->[2-way](No Need Adjacency) Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [2-way]->[ExStart](Need Adjacency) Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [ExStart]->[ExChange](NegotiationDone) Debug: Dec 9 11:12:19 OSPFv3: NSM[1.0.0.11]: Status change [ExChange]->[Loading](Requestlist Not Empty) Debug: Dec 9 11:12:20 OSPFv3: NSM[1.0.0.11]: Status change [Loading]->[Full](LoadingDone) Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [Down]->[Init](HelloReceived) Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [Init]->[2-way](No Need Adjacency) Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [2-way]->[ExStart](Need Adjacency) Debug: Dec 9 11:12:20 OSPFv3: NSM[7.0.0.3]: Status change [ExStart]->[ExChange](NegotiationDone) Debug: Dec 9 11:12:21 OSPFv3: NSM[7.0.0.3]: Status change [ExChange]->[Full](Requestlist Empty) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 261 debug ipv6 ospf packet debug ipv6 ospf packet Displays all OSPFv3 packets in rx or tx mode. Syntax debug ipv6 ospf packet no debug ipv6 ospf packet Modes Privileged EXEC mode Global configuration mode 262 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf packet Examples device# device# debug ipv6 ospf packet OSPFv3: packet debugging is on device(config-ospf6-router)# Debug: Jan 1 17:20:18 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:18 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:23 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:29 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:29 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:32 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:38 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:38 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:43 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:49 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:49 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:54 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:58 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:58 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:21:04 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:21:09 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:21:09 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:21:14 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 263 debug ipv6 ospf packet-dd debug ipv6 ospf packet-dd Displays all OSPFv3 data description packets in rx or tx mode. Syntax debug ipv6 ospf packet-dd no debug ipv6 ospf packet-dd Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf packet-dd OSPFv3: packet-dd debugging is on device(config-ospf6-router)# Debug: Jan 1 19:06:18 OSPFv3: Rcv DbDesc on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400) Debug: Jan 1 19:06:18 Option:00-00-13, Bits:07 SEQ:19b40 Debug: Jan 1 19:06:18 OSPFv3: DbDesc from 10.2.2.2 Ignored: state less than Init Debug: Jan 1 19:06:19 OSPFv3: set dbdesc seqnum 000aa922 for 10.2.2.2 Debug: Jan 1 19:06:19 OSPFv3: Snd DbDesc on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: fe80::224:38ff:fed6:7800) Debug: Jan 1 19:06:19 Option:00-00-13, Bits:07 SEQ:aa922 Debug: Jan 1 19:06:19 OSPFv3: Rcv DbDesc on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400) Debug: Jan 1 19:06:19 Option:00-00-13, Bits:00 SEQ:aa922 Debug: Jan 1 19:06:19 OSPFv3: Snd DbDesc on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: fe80::224:38ff:fed6:7800) Debug: Jan 1 19:06:19 Option:00-00-13, Bits:01 SEQ:aa923 Debug: Jan 1 19:06:19 OSPFv3: Rcv DbDesc on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400) Debug: Jan 1 19:06:19 Option:00-00-13, Bits:00 SEQ:aa923 264 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf packet-hello debug ipv6 ospf packet-hello Displays all OSPFv3 hello packets in rx or tx mode. Syntax debug ipv6 ospf packet-hello no debug ipv6 ospf packet-hello Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf packet-hello OSPFv3: packet-hello debugging is on device(config-ospf6-router)# Debug: Jan 1 18:52:05 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 18:52:07 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 18:52:07 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 18:52:16 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 18:52:16 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 18:52:16 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 265 debug ipv6 ospf packet-lsa-ack debug ipv6 ospf packet-lsa-ack Displays all OSPFv3 LSA acknowledgment packets in rx or tx mode. Syntax debug ipv6 ospf packet-lsa-ack no debug ipv6 ospf packet-lsa-ack Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf packet-lsa-ack OSPFv3: packet-lsa-ack debugging is on Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 2150 OSPFv3: (fe80::768e:f8ff:fe46:bf60->OSPFv3: ff02::5) Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1 Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 2250 OSPFv3: (fe80::224:38ff:fe76:2a40->OSPFv3: ff02::5) Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1 Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 2122 OSPFv3: (fe80::277:77ff:fe77:1111->OSPFv3: ff02::5) Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:2 Debug: Dec 9 11:15:08 OSPFv3: neighbor 7.0.0.3 not found, reject received LS ACK Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 120 OSPFv3: (fe80::204:80ff:fe11:1111->OSPFv3: ff02::5) Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1 Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 1737 OSPFv3: (fe80::768e:f8ff:fef9:b8dc->OSPFv3: ff02::5) Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1 Debug: Dec 9 11:15:08 OSPFv3: Rcv LSAck on ve 1837 OSPFv3: (fe80::768e:f8ff:fe34:b570->OSPFv3: ff02::5) Type:2009, LSID:0 Adv:1.0.0.1 SEQ:80000b5e AGE:1 Debug: Dec 9 11:15:12 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3: fe80::224:38ff:fe76:2a40) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000035 AGE:2 Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2150 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3: fe80::768e:f8ff:fe46:bf60) Type:2001, LSID:0 Adv:7.0.0.3 SEQ:800008cc AGE:1 Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3: fe80::224:38ff:fe76:2a40) Type:2001, LSID:0 Adv:7.0.0.3 SEQ:800008cc AGE:1 Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3: fe80::224:38ff:fe76:2a40) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000036 AGE:1 Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2150 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3: fe80::768e:f8ff:fe46:bf60) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000036 AGE:1 Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2250 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3: fe80::224:38ff:fe76:2a40) Type:2009, LSID:92550 Adv:7.0.0.3 SEQ:8000002d AGE:1 Debug: Dec 9 11:15:13 OSPFv3: Snd LSAck on ve 2150 OSPFv3: (fe80::ce4e:24ff:fe39:4480->OSPFv3: fe80::768e:f8ff:fe46:bf60) Type:2009, LSID:92550 Adv:7.0.0.3 SEQ:8000002d AGE:1 Debug: Dec 9 11:15:13 OSPFv3: Rcv LSAck on ve 2122 OSPFv3: (fe80::768e:f8ff:fe46:bf60->OSPFv3: ff02::5) Type:2001, LSID:0 Adv:7.0.0.3 SEQ:800008cc AGE:1 Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000036 AGE:1 Type:2009, LSID:92550 Adv:7.0.0.3 SEQ:8000002d AGE:1 266 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf packet-lsa-req debug ipv6 ospf packet-lsa-req Displays all OSPFv3 LSA request packets in rx or tx mode. Syntax debug ipv6 ospf packet-lsa-req no debug ipv6 ospf packet-lsa-req Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf packet-lsa-req OSPFv3: packet-lsa-req debugging is on Debug: Dec 9 11:18:25 OSPFv3: Snd LSReq on ve 2122 OSPFv3: (fe80::207:50ff:fe75:750->OSPFv3: fe80::768e:f8ff:fe46:bf60) Type:0008, LSID:2049 Adv-Router:1.0.0.11 Type:0008, LSID:2049 Adv-Router:1.0.0.12 Type:0008, LSID:14368 Adv-Router:1.0.0.1 Type:0008, LSID:3085 Adv-Router:7.0.0.3 Debug: Dec 9 11:18:25 OSPFv3: Snd LSReq on ve 2122 OSPFv3: (fe80::207:50ff:fe75:750->OSPFv3: fe80::768e:f8ff:fe46:bf60) Type:0008, LSID:2049 Adv-Router:1.0.0.11 Type:0008, LSID:2049 Adv-Router:1.0.0.12 Type:0008, LSID:14368 Adv-Router:1.0.0.1 Type:0008, LSID:3085 Adv-Router:7.0.0.3 Debug: Dec 9 11:18:26 OSPFv3: Rcv LSReq on ve 2122 OSPFv3: (fe80::277:77ff:fe77:1111->OSPFv3: fe80::207:50ff:fe75:750) Type:2001, LSID:0 Adv-Router:1.0.0.1 Type:2009, LSID:0 Adv-Router:1.0.0.1 Type:0008, LSID:14368 Adv-Router:1.0.0.1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 267 debug ipv6 ospf packet-lsa-update debug ipv6 ospf packet-lsa-update Displays all OSPFv3 LSA update packets in rx or tx mode. Syntax debug ipv6 ospf packet-lsa-update no debug ipv6 ospf packet-lsa-update Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf packet-lsa-update OSPFv3: packet-lsa-update debugging is on Debug: Dec 9 11:20:18 OSPFv3: Rcv LSUpdate on ve 2150 >OSPFv3:ff02::5) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:2 Debug: Dec 9 11:20:18 OSPFv3: Rcv LSUpdate on ve 2250 ff02::5) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:2 Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 120 ff02::5) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3 Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 1737 ff02::5) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3 Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 1837 ff02::5) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3 Debug: Dec 9 11:20:18 OSPFv3: Snd LSUpdate on ve 2250 ff02::5) Type:2002, LSID:3085 Adv:7.0.0.3 SEQ:80000039 AGE:3 268 OSPFv3:(fe80::768e:f8ff:fe46:bf60OSPFv3:(fe80::224:38ff:fe76:2a40->OSPFv3: OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3: OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3: OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3: OSPFv3:(fe80::ce4e:24ff:fe39:4480->OSPFv3: Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf route debug ipv6 ospf route Displays all OSPFv3 routes. Syntax debug ipv6 ospf route no debug ipv6 ospf route Modes Privileged EXEC mode Global configuration mode Examples device# debug OSPFv3: route Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 Debug: Dec 9 ipv6 ospf route debugging is on 11:24:18 OSPFv3: add to spf list Inst vrf id 0, flag 0 11:24:24 OSPFv3: delete from spf list Inst vrf id 0, flag 1 11:24:24 OSPFv3 ROUTE: release semaphore 1 11:24:24 OSPFv3: SPF: Calculation for area 0.0.0.0 11:24:24 OSPFv3: SPF: installing vertex 1.0.0.1 11:24:24 OSPFv3: SPF: 2.0.0.1:14337 is the first hop 11:24:24 OSPFv3: SPF : 2.0.0.1:14337 nexthop :: ifindex 14341 11:24:24 OSPFv3: SPF: Examining Vertex: 2.0.0.1:14337 11:24:24 OSPFv3: SPF: new node added to candidate list: 2.0.0.1:14337 11:24:24 OSPFv3: SPF: 1.0.0.13:2050 is the first hop 11:24:24 OSPFv3: SPF : 1.0.0.13:2050 nexthop :: ifindex 14364 11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.13:2050 11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.13:2050 11:24:24 OSPFv3: SPF: 1.0.0.14:2050 is the first hop 11:24:24 OSPFv3: SPF : 1.0.0.14:2050 nexthop :: ifindex 14366 11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.14:2050 11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.14:2050 11:24:24 OSPFv3: SPF: 1.0.0.11:2050 is the first hop 11:24:24 OSPFv3: SPF : 1.0.0.11:2050 nexthop :: ifindex 14369 11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.11:2050 11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.11:2050 11:24:24 OSPFv3: SPF: 1.0.0.12:2050 is the first hop 11:24:24 OSPFv3: SPF : 1.0.0.12:2050 nexthop :: ifindex 14371 11:24:24 OSPFv3: SPF: Examining Vertex: 1.0.0.12:2050 11:24:24 OSPFv3: SPF: new node added to candidate list: 1.0.0.12:2050 11:24:24 OSPFv3: SPF: installing vertex 2.0.0.1:14337 11:24:24 OSPFv3: ROUTE: Creating route: 2.0.0.1:14337 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 269 debug ipv6 ospf route-calc-external debug ipv6 ospf route-calc-external Displays external route calculations. Syntax debug ipv6 ospf route-calc-external no debug ipv6 ospf route-calc-external Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf route-calc-external OSPFv3: route-calc-external debugging is on device(config-if-e1000-8/9)# Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 37) is Self-originated: Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 39) is Self-originated: Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 36) is Self-originated: Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 38) is Self-originated: Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 40) is Self-originated: Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified 270 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf route-calc-inter-area debug ipv6 ospf route-calc-inter-area Displays inter-area route calculations. Syntax debug ipv6 ospf route-calc-inter-area no debug ipv6 ospf route-calc-inter-area Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf route-calc-inter-area OSPFv3: route-calc-inter-area debugging is on device(config-vif-7)# ipv6 ospf area 1 device(config-vif-7)# sOSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 2, prefix 2001:DB8::/64) is Self-originated. Area id 0.0.0.0 OSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 2, prefix 2001:DB8::/64) is Self-originated. Area id 0.0.0.0 device(config-vif-7)# disable device(config-vif-7)# OSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 2, prefix 2001:DB8::/64) is Self-originated. Area id 0.0.0.0 device(config-vif-7)# enable device(config-vif-7)# OSPFv3: INTER AREA ROUTE: Inter Area Prefix LSA(ID= 11, prefix 2001:DB8::/64) is Self-originated. Area id 0.0.0.0 device(config)# Debug: Jan 1 00:32:22 OSPFv3: INTER AREA ROUTE: Inter Area route for prefix 2001:DB8::/64 created Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 271 debug ipv6 ospf route-calc-intra-area debug ipv6 ospf route-calc-intra-area Displays intra-area route calculations. Syntax debug ipv6 ospf route-calc-intra-area no ddebug ipv6 ospf route-calc-intra-area Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf route-calc-intra-area OSPFv3: route-calc-intra-area debugging is on Debug: Dec 9 11:26:41 OSPFv3: Calculating Intra Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: Advrouter 1.0.0.1 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: Advrouter 1.0.0.11 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: Advrouter 1.0.0.12 Debug: Dec 9 11:26:41 OSPFv3: INTRA AREA ROUTE: area 0.0.0.0 272 Area routes for area 0.0.0.0 Calculating Intra Area Stub Routes found Prefix LSA type : IntraPrefix : for Id 0.0.0.0 Intra Area route install 1001:1:1:1::/64 cost 1, Intra Area route install 1001:101:1:1::/64 cost 100, Intra Area route install 1001:200:1:1::/64 cost 100, Intra Area route install 1001:205:1:1::/64 cost 100, Intra Area route install 1001:210:1:1::/64 cost 100, Intra Area route install 1001:220:1:1::/64 cost 100, Intra Area route install 1001:593:1:1::/64 cost 17, Intra Area route install 1001:2122:1:1::/64 cost 9, found Prefix LSA type : IntraPrefix : for Id 0.0.0.0 Intra Area route install 1001:1011::1/128 cost 100, found Prefix LSA type : IntraPrefix : for Id 0.0.0.0 Intra Area route install 1001:1012::1/128 cost 100, Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 ospf route-calc-spf debug ipv6 ospf route-calc-spf Displays SPF route calculations. Syntax debug ipv6 ospf route-calc-spf no debug ipv6 ospf route-calc-spf Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf route-calc-spf OSPFv3: route-calc-spf debugging is on Debug: Dec 9 11:29:11 OSPFv3: Schedule routing table build Debug: Dec 9 11:29:11 OSPFv3: add to spf list Inst vrf id 0, flag 0 Debug: Dec 9 11:29:17 OSPFv3: delete from spf list Inst vrf id 0, flag 1 Debug: Dec 9 11:29:17 OSPFv3: SPF: Calculation for area 0.0.0.0 Debug: Dec 9 11:29:17 OSPFv3: SPF: installing vertex 1.0.0.1 Debug: Dec 9 11:29:17 OSPFv3: SPF: 2.0.0.1:14337 is the first hop Debug: Dec 9 11:29:17 OSPFv3: SPF : 2.0.0.1:14337 nexthop :: ifindex 14341 Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 2.0.0.1:14337 Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 2.0.0.1:14337 Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.13:2050 is the first hop Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.13:2050 nexthop :: ifindex 14364 Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.13:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.13:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.14:2050 is the first hop Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.14:2050 nexthop :: ifindex 14366 Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.14:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.14:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.11:2050 is the first hop Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.11:2050 nexthop :: ifindex 14369 Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.11:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.11:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: 1.0.0.12:2050 is the first hop Debug: Dec 9 11:29:17 OSPFv3: SPF : 1.0.0.12:2050 nexthop :: ifindex 14371 Debug: Dec 9 11:29:17 OSPFv3: SPF: Examining Vertex: 1.0.0.12:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: new node added to candidate list: 1.0.0.12:2050 Debug: Dec 9 11:29:17 OSPFv3: SPF: installing vertex 2.0.0.1:14337 Debug: Dec 9 11:29:17 OSPFv3: SPF : 2.0.0.1:0 nexthop fe80::204:80ff:fe11:1111 ifindex 14341 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 273 debug ipv6 ospf route-install debug ipv6 ospf route-install Displays all OSPFv3 installed routes. Syntax debug ipv6 ospf route-install no debug ipv6 ospf route-install Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 ospf route-install OSPFv3: route-install debugging is on Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 2.0.0.1:14337 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 2.0.0.1:0 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.13:2050 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.14:2050 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.11:2050 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.12:2050 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.12:0 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.11:0 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.14:0 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1.0.0.13:0 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 7.0.0.3:3085 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 7.0.0.3:0 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:101:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:200:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:205:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:210:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:220:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:593:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:2122:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: route changed, new route preferred: 1001:2122:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1011::1/128 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1012::1/128 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1002:201:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:21:5:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:22:5:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:17:37:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:18:37:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:2122:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:120:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1392:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Creating route: 1001:1382:1:1::/64 Debug: Dec 9 11:33:52 OSPFv3: ROUTE: Validate routing table Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:1:1:1::/64, nexthop cnt 1, route_info->flag 0x2 Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:17:37:1::/64, nexthop cnt 1, route_info->flag 0x2 Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:18:37:1::/64, nexthop cnt 1, route_info->flag 0x2 Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:21:5:1::/64, nexthop cnt 1, route_info->flag 0x2 Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:22:5:1::/64, nexthop cnt 1, route_info->flag 0x2 Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:101:1:1::/64, nexthop cnt 1, route_info->flag 0x2 Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:120:1:1::/64, nexthop cnt 1, route_info->flag 0x2 Debug: Dec 9 11:33:52 OSPFv3: Validating route 1001:200:1:1::/64, nexthop cnt 1, route_info->flag 0x2 274 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 pim bootstrap debug ipv6 pim bootstrap Enables IPv6 Protocol Independent Multicast (PIM) bootstrap debugging. Syntax debug ipv6 pim bootstrap no debug ipv6 pim bootstrap Modes Privileged EXEC mode Usage Guidelines The no form of the command disables IPv6 PIM bootstrap debugging. Examples device# debug ipv6 pim bootstrap PIM6: bootstrap debugging is on device# PIM-BSR.VRF0: Prefer BSR 2001:DB8::12(Pr 120) over current BSR 2001:DB8::12(Pr 120) PIM-BSR.VRF0: Intf v1844 - accept BSM from BSR 2001:DB8::12(Pr 120), local state CandBSR, curr BSR 2001:DB8::12 (Pr 120) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 275 debug ipv6 pim clear debug ipv6 pim clear Clears all the IPv6 PIM debug settings. Syntax debug ipv6 pim clear no debug ipv6 pim clear Modes Privileged EXEC mode Examples If no settings are enabled, output similar to the following will be displayed. device# debug ip pim clear no debug ip pim is enabled 276 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 pim event debug ipv6 pim event Enables debugging of IPv6 PIM events. Syntax debug ipv6 pim event no debug ipv6 pim event Modes Privileged EXEC mode Usage Guidelines The no form of the command disables debugging of IPv6 PIM events. Examples device# debug ipv6 pim event PIM6: event debugging is on PIM-EVT.VRF0: Receive intf v1844 Dn state_notify Mcast6v6 receive event 16 PIM6-EVT: Received vport v1844/1/1/11 Dn state notify Mcast6v6 receive event 16 PIM6-EVT: Received vport v1844/1/1/12 Dn state notify Mcast6v6 receive event 16 PIM6-EVT: Received vport v1844/1/1/13 Dn state notify Mcast6v6 receive event 16 Mcast6v6 receive event 13 PIM6-EVT: Received vport v1844/1/1/14 Dn state notify MC-EVT: Port v1844 state changed to DOWN PIM-EVT.VRF0: Receive intf v1844 Dn state_notify PIM6-EVT: Received vport v1844/1/1/14 Dn state notify Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 277 debug ipv6 pim group debug ipv6 pim group Displays the IPv6 PIM related debugging information for the specified PIM group. Syntax debug ipv6 pim groupgroup_addr no debug ipv6 pim group group_addr Parameters group_addr Specifies the group address of the PIM. Modes Privileged EXEC mode Examples device# debug ipv6 pim group ff0::8 PIM6: group ff0::8 debugging is on device# PIM.VRF0: Deallocated hw resources for (7400::200 ff0::8), parent: NIL,Nil. olist not empty VRF0 Flow Entry Delete (2001:DB8::200 ff0::1) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::2) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::3) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::4) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::5) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::6) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::7) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::8) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::9) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::a) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::b) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::c) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::d) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::e) HW bits: 1 1 278 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 pim join-prune debug ipv6 pim join-prune Controls join prune processing and displays debugging information related to the IPv6 join prune messages. Syntax debug ipv6 pim join-prune no debug ipv6 pim join-prune Modes Privileged EXEC mode Examples device# debug ipv6 pim join-prune PIM6: join-prune debugging is on device# PIMSM.0: BEGIN J/P proc: rpf_nbr fe80::768e:f8ff:fe34:3c80, to_me=1 from fe80::768e:f8ff:fe3e:9600, intf v1844 ---Group=ff0::1. Join list: 1 srcs J-Src=2001:DB8::200, wc=0, rpt=0, SM=1 PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::1) from fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11 Group=ff0::1. Prune list: 0 srcs Group=ff0::2. Join list: 1 srcs J-Src=2001:DB8::200, wc=0, rpt=0, SM=1 PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::2) from fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11 Group=ff0::2. Prune list: 0 srcs Group=ff0::3. Join list: 1 srcs J-Src=2001:DB8::200, wc=0, rpt=0, SM=1 PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::3) from fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11 Group=ff0::3. Prune list: 0 srcs Group=ff0::4. Join list: 1 srcs J-Src=2001:DB8::200, wc=0, rpt=0, SM=1 PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::4) from fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11 Group=ff0::4. Prune list: 0 srcs Group=ff0::5. Join list: 1 srcs J-Src=2001:DB8::200, wc=0, rpt=0, SM=1 PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::5) from fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11 Group=ff0::5. Prune list: 0 srcs Group=ff0::6. Join list: 1 srcs J-Src=2001:DB8::200, wc=0, rpt=0, SM=1 PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::6) from fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 279 debug ipv6 pim nbr-change debug ipv6 pim nbr-change Controls the IPv6 PIM neighbor changes. Syntax debug ipv6 pim nbr-change[ nbr_address ] no debug ipv6 pim nbr-change[ nbr_address ] Parameters nbr_address Specifies the neighbor address. Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 pim nbr-change PIM6: nbr-change debugging is on device# PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe3e:9600 on intf v1844, 1/1/11-1/1/14 device(config-if-e1000-1/1/11)# disable device(config-if-e1000-1/1/11)# PIM-NBR.VRF0: Neighbor fe80::768e:f8ff:fe3e:9600 on interface v1844, 1/1/11 deleted on port-down PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17 PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17 device(config-if-e1000-1/1/11)# enable device(config-if-e1000-1/1/11)# PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17 PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17 PIMV2 rcvd from fe80::768e:f8ff:fe3e:9600 on v1844 (phy e1/1/11), not pim neighbour PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe3e:9600 on intf v1844, 1/1/11-1/1/14 PIM-NBR.VRF0: Neighbor fe80::768e:f8ff:fe3e:9600 on interface v1844, 1/1/11 genid changed from 4294953471 to 13824 PIM-NBR.VRF0: GenId changed for Neighbor fe80::768e:f8ff:fe3e:9600 on interface v1844, 1/1/11 ; new GenId 13824 PIM-NBR.VRF0: Neighbor fe80::768e:f8ff:fe3e:9600 on interface v1844, 1/1/11 added PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17 PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe46:5580 on intf v170, 6/1/17 PIM.VRF0: Rx Hello msg from fe80::768e:f8ff:fe3e:9600 on intf v1844, 1/1/11-1/1/14 280 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 pim packet debug ipv6 pim packet Displays debugging information about the IPv6 PIM packets. Syntax debug ipv6 pim packet source_address group_address [ rate ] no debug ipv6 pim packet source_address group_address [ rate ] Parameters source_address Specifies the IPv6 source address of the PIM packet. group_address Specifies the IPv6 group address of the PIM packet. rate Specifies the hardware rate. Modes Privileged EXEC mode Examples device# debug ipv6 pim packet device# debug ipv6 pim packet 102:1:1::16 ff1e::4:5:1 debug packet S=102:1:1::16 G=ff1e::4:5:1 device# Debug: Jan 2 01:37:27 Rx Pkt (102:1:1::16, ff1e::4:5:1) on v102(4/4/1). Debug: Jan 2 01:37:27 src local, create (S,G) and send MCAST_CREATE_NOTIFICATION Debug: Jan 2 01:37:27 send MCAST_FIRST_DATA: entry phy port: 4/4/1, pkt input port: 4/4/1. SPT-T, FAST-F Debug: Jan 2 01:37:27 (102:1:1::16,ff1e::4:5:1), pkt incoming at v102, REG: OFF, FWD_FAST: OFF, hw_drop: ON Debug: Jan 2 01:37:27 Rx Pkt (102:1:1::16, ff1e::4:5:2) on v102(4/4/1). Debug: Jan 2 01:37:27 src local, create (S,G) and send MCAST_CREATE_NOTIFICATION Debug: Jan 2 01:37:27 send MCAST_FIRST_DATA: entry phy port: 4/4/1, pkt input port: 4/4/1. SPT-T, FAST-F Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 281 debug ipv6 pim regproc debug ipv6 pim regproc Controls IPv6 PIM register processing. Syntax debug ipv6 pim regproc no debug ipv6 pim regproc Modes Privileged EXEC mode Examples device# debug ipv6 pim regproc PIM6: regproc debugging is on device# PIMSM-REG.VRF0: (2001:DB8::200 PIMSM-REG.VRF0: (2001:DB8::200 ff0::2) PIMSM-REG.VRF0: (2001:DB8::200 ff0::3) PIMSM-REG.VRF0: (2001:DB8::200 ff0::4) PIMSM-REG.VRF0: (2001:DB8::200 ff0::5) PIMSM-REG.VRF0: (2001:DB8::200 ff0::6) PIMSM-REG.VRF0: (2001:DB8::200 ff0::7) PIMSM-REG.VRF0: (2001:DB8::200 ff0::8) PIMSM-REG.VRF0: (2001:DB8::200 ff0::9) PIMSM-REG.VRF0: (2001:DB8::200 ff0::a) PIMSM-REG.VRF0: (2001:DB8::200 ff0::b) 282 ff0::1) Sending Sending Sending Sending Sending Sending Sending Sending Sending Sending Sending L2-Null L2-Null L2-Null L2-Null L2-Null L2-Null L2-Null L2-Null L2-Null L2-Null L2-Null Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Reg on iface v74 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 pim rp debug ipv6 pim rp Controls the Rendezvouz Point (RP) processing for IPv6 PIM events. Syntax debug ipv6 pim rp no debug ipv6 pim rp Modes Privileged EXEC mode Examples device# debug ipv6 pim rp PIM6: rp debugging is on device# PIMv6-CRP.VRF0: Sending Candidate RP Msg (size 46) PIMv6-CRP.VRF0: Sending Candidate RP Msg (size 46) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 283 debug ipv6 pim show debug ipv6 pim show Displays the IPv6 PIM debug settings. Syntax debug ipv6 pim show no debug ipv6 pim show Modes Privileged EXEC mode Examples device# debug ipv6 pim show pim6 debug-enable-any = 1 284 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 pim source debug ipv6 pim source Displays the IPv6 PIM related debugging information for the specified source address. Syntax debug ipv6 pim source ipaddr no debug ipv6 pim source ipaddr Parameters ipaddr Specifies the source IP address. Modes Privileged EXEC mode Examples device# debug ipv6 pim source 2001:DB8::200 PIM6: source 2001:DB8::200 debugging is on device# PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::1), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::2), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::3), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::4), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::5), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::6), parent: NIL,Nil. olist not empt PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::7), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::8), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::9), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::a), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::b), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::c), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::d), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::e), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::f), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::10), parent: NIL,Nil. olist not empty PIM.VRF0: Deallocated hw resources for (2001:DB8::200 ff0::11), parent: NIL,Nil. olist not empty Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 285 debug ipv6 pimsm-snoop debug ipv6 pimsm-snoop Troubleshoots issues related to IPv6 PIM-SM snoop configurations. Syntax debug ipv6 pimsm-snoop [ add-del-oif | all | clear | control-source | error | fsm | group | join-prune | physical-port | show | source | stacktrace | timer | vlan ] no debug ipv6 pimsm-snoop [ add-del-oif | all | clear | control-source | error | fsm | group | join-prune | physical-port | show | source | stacktrace | timer | vlan ] Parameters add-del-oif Displays debugs related to the addition and deletion of outbound interfaces (OIFs) in Mcache. all Enables all PIM-SM snoop related debugs. clear Clears all PIM-SM snoop related debug settings. control-source Displays PIM-SM snooping related debug information for the specified control source address. error Monitors error messages related to PIM-SM snoopng. fsm Enables debugging of Finite State Machine (FSM) transactions. group Displays PIM-SM snooping information for a specific group. join-prune Monitors PIM-SM snoop join and prune messages. physical-port Displays information of PIM-SM physical ports that are connected. show Displays all PIM-SM snoop related debug settings. source Displays PIM-SM snooping related debug information for the specified server source address. stacktrace Displays debug messages accompanied by call stack dump. timer Enables PIM-SM snoop timer debugging. vlan Enables PIM-SM snoop debugging for a particular VLAN. 286 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 pimsm-snoop Modes Privileged EXEC mode Global configuration mode Usage Guidelines Examples The following is sample output from the debug ipv6 pimsm-snoop timer command. device# debug ipv6 pimsm-snoop timer 14d 6:29:33 - v6PSNOOP_SRC: PIMv2 Join/Prune from fe80::224:38ff:fe76:5180 to upstream Neig-Addr fe80::224:38ff:fe77:7440 port 1/1/9 on vlan 503, holdtime 210, payload length 70 14d 6:29:33 - v6PSNOOP_JP: Rcv Join-Prune Group : ff7e::1:2:3, #join src 1, #prune src 0 14d 6:29:33 - v6PSNOOP_JP: join source 2222::22 flags: S WC RPT 14d 6:29:33 - v6PSNOOP_JP: Rcv Join: (* ff7e::1:2:3) -> 1/1/4 14d 6:29:33 - v6PSNOOP_FSM: (* G) Join for SG_RPT(3000::10, ff7e::1:2:3, 503), oif(1/1/4): NI -> NI 14d 6:29:33 - v6PSNOOP_TIMER: timer restart: 217 ticks, timer type: old SG -> new SG, fsm state: J 14d 6:29:33 - v6PSNOOP_FSM: RCV_SG(*, ff7e::1:2:3, 503), oif(1/1/4): J -> J Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 287 debug ipv6 raguard debug ipv6 raguard Enables RA guard debug messages. Syntax debug ipv6 raguard no debug ipv6 raguard Modes Privileged EXEC mode Examples device# debug ipv6 raguard 00 days 00h40m49s:I:RAGuard: prefix in router advertisement rejected by prefix-list 00 days 00h40m49s:I:RAGuard: prefix in router advertisement passed prefix-list 00 days 00h40m49s:I:RAGuard: Packet received on Host port 1/1/5. Dropped. 00 days 00h40m49s:I:RAGuard: Packet received on a Trusted port 1/1/5. Forward. 00 days 00h40m49s:I:RAGuard: Packet preference is greater than policy configured maximum on port 1/1/5, vlan 10 00 days 00h40m49s:I:RAGuard: IPv6 address of packet matches Whitelist fe80:100::100:1 on port 1/1/5, vlan 10 00 days 00h40m49s:I:RAGuard: IPv6 address of the packet does not match the whitelist fe80:100::100:1 on port 1/1/5, vlan 10 00 days 00h40m49s:I:RAGuard: packet passes prefix-list examplelist1 on port 1/1/5, vlan 10 00 days 00h40m49s:I:RAGuard: packet does not pass prefix-list examplelist1 on port 1/1/5, vlan 10 00 days 00h40m49s:I:RAGuard: prefix-list examplelist1 on policy examplepolicy1 not found 00 days 00h40m49s:I:RAGuard: Not enabled for vlan 10, port 1/1/5 00 days 00h40m49s:I:RAGuard: Feature ON for vlan 10, port 1/1/5 288 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ipv6 rip events debug ipv6 rip events Displays debugging information about the IPv6 Routing Information Protocol (RIP) events. Syntax debug ipv6 rip events no debug ipv6 rip events Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 rip events device(config-vif-11)# RIPng: update timer expired clear ipv routeRIPng: triggered update RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0 from :: on interface NULL RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0 from :: on interface NULL RIPng: Adding local connected route 2001:DB8::1/64 on interface v11 RIPng: Adding local connected route 2001:DB8::1/64 on interface v12 RIPng: update timer expired RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0) RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 289 debug ipv6 rip receive debug ipv6 rip receive Displays debugging information about the IPv6 RIP packets received. Syntax debug ipv6 rip receive no debug ipv6 rip receive Modes Privileged EXEC mode Global configuration mode Examples device# debug ipv6 rip receive device(config-vif-11)# RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11 command response version 1 packet size 64 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v12 command response version 1 packet size 64 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11 command response version 1 packet size 64 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11 command response version 1 packet size 64 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11 command response version 1 packet size 64 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 RIPng: received packet from fe80::224:38ff:fe9f:7500 port 521 on interface v11 command response version 1 packet size 64 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 290 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug license debug license Displays the package information on which the license has been loaded. Syntax debug license no debug license Modes Privileged EXEC mode Global configuration mode Usage Guidelines show license Examples After enabling debugging: device# debug license License all debugging ON device# license delete unit unit id device# license delete unit 1 all delete all software licenses index software license index device# license delet unit 1 index 2 Can't delete the license specified by index(2) 141(LICENSE_IN_USE) device# license delet unit 1 index 2 SYSLOG: <44> Dec 9 11:18:38 device Stack 1: The 'ICX7450-PREM-LIC-SW' license has been deleted on this unit and is available for redeployment on another unit in accordance with the terms and conditions of use. All features associated to this license must be disabled. SYSLOG: <46> Dec 9 11:18:38 device License: Normal license package ICX7450-PREM-LIC-SW with LID ENG08D21100 is removed on unit 1 device# show license Index Lic Mode Lic Name Lid/Serial No Lic Type StatusLic Period Lic Capacity Stack unit 1: 2 Non-Node Lock ICX7450-PREM-LIC-SW EN09429C1D8 Normal Active Unlimited Stack unit 12: 1 Non-Node Lock ICX7450-PREM-LIC-SW ENG08D21100 Normal Active Unlimited Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 1 1 291 debug loop-detect debug loop-detect Allows the Brocade devices to detect loops using the Brocade Port Loop Detection (PLD) protocol and disable a port that is on the receiving end of a loop. The loop is detected by sending Bridge Packet Data Unit (BPDU) test packets. Syntax debug loop-detect no debug loop-detect Usage Guidelines Examples NOTE Execute the command prior to configuring the modes. The following example shows how to configure loop detection of a single port in strict mode. device# debug loop-detect Configure loop-detection strict mode on port 1/1/25 : device(config-if-e1000-1/1/25)# loop-detection When there is loop detection activity in the device, the debug information regarding loop detection is displayed on the console. The following example shows the output when the port goes into a disabled state because of loop detection (strict mode). insert_disable primary 1/1/25, vlan=4096 Loop-detection: port 1/1/25 (vlan=1), put into errdisable state The following example shows how to configure loop detection in a VLAN in loose mode. Configure loop-detection loose mode on port vlan 2 : device(config-vlan-2)# loop-detection device(config-vlan-2)# insert_disable primary 1/1/31, vlan=2 The following output is displayed after the configuration. Loop-detection: port 1/1/31 (vlan=2), put into errdisable state insert_disable primary 1/1/32, vlan=2 Loop-detection: port 1/1/32 (vlan=2), put into errdisable state 292 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug loop-detect level debug loop-detect level Debugs loop detection in a particular level. Syntax debug loop-detect level decimal no debug loop-detect level decimal Parameters decimal Specifies the level. Examples device# debug loop-detect level 1 Strict mode: Topology: port 1/1/25 is single port. device# debug loop-detect level 3 Configure loop-detection on port 1/1/25 : device(config-if-e1000-1/1/25)# loop-detection device(config-if-e1000-1/1/25)# Loop-detection: port 1/1/25 (vlan=1), put into errdisable state Loose mode: Topology: port 1/1/31 is connected to 1/1/32 in same vlan. Configure loop-detection on port vlan 2 : device(config-vlan-2)# loop-detection device(config-vlan-2)# Loop-detection: port 1/1/31 (vlan=2), put into errdisable state Loop-detection: port 1/1/32 (vlan=2), put into errdisable state Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 293 debug mac debug mac Enables the Media Access Control (MAC) address debugging action. Syntax debug mac no debug mac Modes Privileged EXEC mode Usage Guidelines Examples device# debug mac MAC DB: Action debugging is on mac_action_request: done-> MA Normal, ALL_SYST, FLUSH Ports: All Ports Vlans: All Vlans stack: 20B89ED4 2028D708 2028D8A0 201AB040 20C2D58C 20C2EA48 20C2D6DC 20C2EDA4 20C2B2B8 20B8B3A8 2076C3EC 2076C448 20590734 205146FC 20592568 5010 15B4C 1AAD8 Brocade# aging_timer. call mac_action_handler() MA Normal, ALL_SYST, FLUSH Ports: All Ports Vlans: All Vlans stack: 20B89ED4 2028D708 20C6FAB0 20B894BC 20514924 20590738 205146FC 20592568 5010 15B4C 1AAD8 mac_clear_request(). NO_ACTION, SPECIFIC stack: 20B89ED4 2028CD28 2028D1F0 20C6FAB4 20B894BC 20514924 20590738 205146FC 20592568 5010 15B4C 1AAD8 294 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mac-authentication debug mac-authentication Enables the MAC authentication debugging for a single port. Syntax debug mac-authenticationhex no debug mac-authentication hex Parameters hex Specifies the hexadecimal number of the port. Modes Privileged EXEC mode Usage Guidelines The no form of the command disables the MAC authentication debugging for a single port. This debug command displays output that is useful for the technical support personnel. Use the ptrace aaa command instead of the mac authentication command to display information about the authentication of packets between the device and the RADIUS server. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 295 debug mac-authentication Examples device(config)# debug mac-authentication device(config)# Debug: Dec 9 10:59:56 Search for dot1x session with portid=1/2/4 and sessionid=[104433,ffc0002] in queue.. entry not found. Debug: Dec 9 10:59:56 Extracted username=0010.4433.0002 from EAP buffer. Debug: Dec Debug: Dec entries=1. Debug: Dec 9 10:59:56 AAA-DOT1X (MACAUTH) - Created a new session for MAC Authentication 9 10:59:56 Append a dot1x session: portid=1/2/4, sessionid=[104433,ffc0002], Total Debug: Dec Debug: Dec Debug: Dec 9 10:59:56 PortId=67, SessionId=[104433,ffc0002] Username=0010.4433.0002, RadiusClient=255 9 10:59:56 PortId=67, SessionId=[104433,ffc0002] Username=0010.4433.0002, RadiusClient=255 9 10:59:56 AAA Queue Display End. Debug: Dec Debug: Dec 9 10:59:56 Reseting RADIUS Client structure 9 10:59:56 RADIUS: Reset client 0, Session type 2, Total number of active clients=1 Debug: Dec 9 10:59:56 AAA: Open RADIUS UDP port Debug: Dec Debug: Dec port=1812 Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec Debug: Dec 9 10:59:56 Tracing the outgoing Radius Authentication packet.. 9 10:59:56 UDP packet source IP=10.37.171.160, port=1058, destination IP=10.20.67.118, 9 9 9 9 9 9 9 9 9 9 9 9 10:59:56 Radius Header (hex): Code=01 Identifier=09 Length=0073 10:59:56 Authenticator (hex):6f9196ca14bad62531e7d8fe265b57f2 10:59:56 Attribute Type(hex)=01 Len(hex)=10 Value (ASCII)=0010.4433.0002 10:59:56 Attribute Type(hex)=02 Len(hex)=12 Value (hex)=bce0,ddq%/a9fdc0903X1el1a 10:59:56 Attribute Type(hex)=06 Len(hex)=06 Value (hex)=00000002 10:59:56 Attribute Type(hex)=0c Len(hex)=06 Value (hex)=000005dc 10:59:56 Attribute Type(hex)=04 Len(hex)=06 Value (hex)=0a%aba0 10:59:56 Attribute Type(hex)=3d Len(hex)=06 Value (hex)=0000000f 10:59:56 Attribute Type(hex)=05 Len(hex)=06 Value (hex)=000000D 10:59:56 Attribute Type(hex)=20 Len(hex)=0c Value (hex)=Pavan_Sica 10:59:56 Attribute Type(hex)=1f Len(hex)=13 Value (ASCII)=00-10-44-33-00-02 10:59:56 Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: Debug: 9 9 9 9 9 9 9 9 9 10:59:56 10:59:57 10:59:57 10:59:57 10:59:57 10:59:57 10:59:57 10:59:57 10:59:57 Dec Dec Dec Dec Dec Dec Dec Dec Dec 9 10:59:56 AAA Queue Display Start...Total Entries: 1 Search for dot1x session returned by RADIUS in AAA queue.. found entry. RADIUS message received from server of len 39. Tracing the received Radius packet.. Radius Header (hex): Code=02 Identifier=09 Length=0027 Authenticator (hex):da222c4bee99aa71e4991208a72fcff2 Attribute Type(hex)=40 Len(hex)=06 Value (hex)=0000000d Attribute Type(hex)=41 Len(hex)=06 Value (hex)=00000006 Attribute Type(hex)=51 Len(hex)=07 Value (hex)=U:100 Debug: Dec 9 10:59:57 RADIUS Timer cancelled for client 0. Debug: Dec 9 10:59:57 RADIUS server ACCEPTed request Debug: Dec 9 10:59:57 Search for dot1x session returned by RADIUS in AAA queue.. found entry. Debug: Dec 9 10:59:57 AAA-DOT1X (MACAUTH): Authentication successful for port 1/2/4 session [104433,ffc0002]. RADIUS 0/9 Debug: Dec 9 10:59:57 AAA send response to dot1x port 67 sessId [104433,ffc0002] Debug: Dec Debug: Dec 9 10:59:57 One entry in the dot1x list. 9 10:59:57 Delete a dot1x session: portid=1/2/4, sessionid=[104433,ffc0002], Entries left=0. Debug: Dec 9 10:59:57 Closing RADIUS UDP port Debug: Dec 9 10:59:57 RADIUS: radius_authenticate_stop for client Idx 0. Actv Clients left 0 Debug: Dec 9 10:59:57 Reseting RADIUS Client structure Debug: Dec 9 10:59:57 [T:1020671] [VLAN] [MGMT-POR] : 802.1X: vlan_name (String): 100 is now converted to vlan id (Decimal): 100 296 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mecid debug mecid Displays debugging information for ME-CID Manager. Syntax debug mecid [ all | cascade-port | error | event | flow | fsm | mecid | rx | show | tx ] no debug mecid [ all | cascade-port | error | event | flow | fsm | mecid | rx | show | tx ] Parameters all Generates all debugging information related to ME-CID. cascade-port Enables debugging for a specific cascade port. error Displays ME-CID errors. event Displays ME-CID events. flow Displays ME-CID control flow. fsm Displays ME-CID FSM events. mecid Enables debugging for a specific ME-CID manager. rx Displays the ME-CID packets received from a Port Extender (PE). show Displays debugging information enabled for ME-CID. tx Displays the ME-CID packets sent to a Port Extender (PE). Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 297 debug mecid Examples device# debug mecid all 9:9:28 - MECID_FSM: mecid 16360, FSM: DELETE_AW - > delete 9:9:28 - MECID_RX: Received E-Channel Register Response from waiting for response : 24 9:9:28 - MECID_RX: Received E-Channel Register Response from waiting for response : 23 9:9:28 - MECID_RX: Received E-Channel Register Response from waiting for response : 22 9:9:28 - MECID_FSM: mecid 16346, FSM: DELETE_AW - > delete 9:9:28 - MECID_RX: Received E-Channel Register Response from waiting for response : 21 9:9:28 - MECID_FSM: mecid 16358, FSM: DELETE_AW - > delete 9:9:28 - MECID_FSM: mecid 16360, FSM: DELETE_AW - > delete 9:9:27 - MECID_RX: Received E-Channel Register Response from waiting for response : 0 9:9:28 - MECID_TX: PE 18 tx timer scheduled stack: 1044264c 10a48824 10cf1120 10a48d60 10cf3f20 10cf4434 11f2b490 Tx Count: 1 Sending port array TLV to unit 18 (MsgId: 436) ECID: 16360, Number of Ports: 1 1. Port: e18/1/3, Action: DELETE . . . (output truncated) 298 PE 18 for ECID: 16360(Msg Id: 436), ECIDs PE 18 for ECID: 16331(Msg Id: 437), ECIDs PE 18 for ECID: 16324(Msg Id: 438), ECIDs PE 18 for ECID: 16346(Msg Id: 439), ECIDs PE 18 for ECID: 16347(Msg Id: 435), ECIDs 10d000fc 10a48ca0 10b94550 11ee536c Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mld-snoop add-del-oif all debug mld-snoop add-del-oif all Displays information about the addition or deletion of all the OIFs that are Multicast Listener Discovery (MLD) snoopingenabled. Syntax debug mld-snoop add-del-oif all no debug mld-snoop add-del-oif all Modes Privileged EXEC mode Examples device# debug mld-snoop add-del-oif all mldsnoop add-del-oif all enabled device# Del e1/1/23 from (0x0 0x230005) vlan 130 Del e1/1/23 from (0x0 0x230004) vlan 130 Del e1/1/23 from (0x0 0x230003) vlan 130 Del e1/1/23 from (0x0 0x230002) vlan 130 Del e1/1/23 from (0x0 0x230001) vlan 130 Add e1/1/23 to (0x0 0x230001) vlan 130 Add e1/1/23 to (0x0 0x230002) vlan 130 Add e1/1/23 to (0x0 0x230003) vlan 130 Add e1/1/23 to (0x0 0x230004) vlan 130 Add e1/1/23 to (0x0 0x230005) vlan 130 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 299 debug mld-snoop clear debug mld-snoop clear Clears all the MLD snooping debug settings. Syntax debug mld-snoop clear no debug mld-snoop clear Modes Privileged EXEC mode Examples device# debug mld-snoop clear 300 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mld-snoop error debug mld-snoop error Displays the MLD snooping multicast error messages. Syntax debug mld-snoop error no debug mld-snoop error Modes Privileged EXEC mode Examples device# debug mld-snoop error monitor mldsnoop error device# MLD: Error : Ignoring MLD version 2 Report pkt S=fe80::1, on VL130 (phy e1/1/2), mld_size=28 MLD: Error : Ignoring MLD version 2 Report pkt due S=fe80::1, on VL130 (phy e1/1/2), mld_size=28 MLD: Error : Ignoring MLD version 2 Report pkt due S=fe80::1, on VL130 (phy e1/1/2), mld_size=28 MLD: Error : Ignoring MLD version 2 Report pkt due S=fe80::1, on VL130 (phy e1/1/2), mld_size=28 MLD: Error : Ignoring MLD version 2 Report pkt due S=fe80::1, on VL130 (phy e1/1/2), mld_size=28 MLD: Error : Ignoring MLD version 2 Report pkt due S=fe80::1, on VL130 (phy e1/1/2), mld_size=28 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 pkt due to version mismatch , to version mismatch , pkt to version mismatch , pkt to version mismatch , pkt to version mismatch , pkt to version mismatch , pkt 301 debug mld-snoop group debug mld-snoop group Displays the MLD snooping multicast group information. Syntax debug mld-snoop groupgroup_address no debug mld-snoop groupgroup_address Parameters group_address Specifies the address of the MLD snoop multicast group. Modes Privileged EXEC mode Examples device# debug mld-snoop group 2001:DB8::23:1 source fe80::1 phy-port eth 1/1/23 vlan 130 MLD send Query(t=130) V1, s=fe80::224:38ff:fe76:4bc0 mld=24B, pkt=86B MLD: rcvd Leave(ty=132) g=2001:DB8::23:1 resp=0, pkt e1/1/23), mld_size=24 MLD: rcvd Leave(ty=132) g=2001:DB8::23:2 resp=0, pkt e1/1/23), mld_size=24 MLD: rcvd Leave(ty=132) g=2001:DB8::23:3 resp=0, pkt e1/1/23), mld_size=24 MLD: rcvd Leave(ty=132) g=2001:DB8::23:4 resp=0, pkt e1/1/23), mld_size=24 MLD: rcvd Leave(ty=132) g=2001:DB8::23:5 resp=0, pkt e1/1/23), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:2 resp=0, e1/1/23), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:3 resp=0, e1/1/23), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:4 resp=0, e1/1/23), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:5 resp=0, e1/1/23), mld_size=24 MLD: rcvd Report-V1(ty=131) g=2001:DB8::23:5 resp=0, e1/1/23), mld_size=2 302 :: to VL130(all) rsp=10000 S=fe80::1, on VL130 (phy S=fe80::1, on VL130 (phy S=fe80::1, on VL130 (phy S=fe80::1, on VL130 (phy S=fe80::1, on VL130 (phy pkt S=fe80::1, on VL130 (phy pkt S=fe80::1, on VL130 (phy pkt S=fe80::1, on VL130 (phy pkt S=fe80::1, on VL130 (phy pkt S=fe80::1, on VL130 (phy Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip ssh debug ip ssh activates the SSH debugging. Syntax debug ip ssh no debug ip ssh Modes Privileged EXEC mode Examples device# debug ip ssh SSH: debugging is on Brocade(config)#SSH: Incoming connection request received SSH: ssh_get_free_session_id: ssh.client[0].in_use is 0 SSH: Client session (0) established SSH: Outgoing connection is ready ShtcpConnectionStatus[0]: connection established SSH:ShtcpSend[0]: eSendComplete: the string length [24] ! ShtcpSendStatus[0]: eSendComplete SSH: Outgoing connection is ready SSH: Data is ready to receive ShtcpReceiveStatus[0]: the string length [47] SSH:ShtcpSend[0]: eSendComplete: the string length [216] ! ShtcpSendStatus[0]: eSendComplete SSH: Outgoing connection is ready SSH: Data is ready to receive ShtcpReceiveStatus[0]: the string length [464] Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 303 debug ip sync debug ip sync Displays debugging information about IP synchronization and faults in synchronization. Syntax debug ip sync no debug ip sync Modes Privileged EXEC mode Examples device# debug ip sync Brocade(config-vif-11)# ND6 add sync: sent ip:2001:DB8::10 mac:none state:INCOMP port:ve 12 vlan:12 isR:0 to all other units ND6 add sync: sent ip:2001:DB8::10 mac:0000.0062.9f2d state:REACH port:e 3/3/1 vlan:12 isR:0 to all other units ND6 add sync: sent ip:2001:DB8::10 mac:0000.0062.9f2d state:STALE port:e 3/3/1 vlan:12 isR:0 to all other units 304 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip tcp debug ip tcp Display debugging information about the Transmission Control Protocol (TCP) transactions. Syntax debug ip tcp no debug ip tcp Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 305 debug ip tcp Examples device# debug ip tcp 2001:DB8::192:111:101:25 TCP: ipv6 address 2001:DB8::192:111:101:25 debugging is on Debug: Feb 11 10:46:57 TCP: sent packet (len=41) 2001:DB8::192:111:101:111:8197 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:18c2,seqn:11211247,ackn:835929143 Debug: Feb 11 10:46:57 TCP: sent packet (len=41) 2001:DB8::192:111:101:111:8197 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:1,hlen:5,chksum:14ac,seqn:11211268,ackn:835929143 Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8197 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:3bfa,seqn:835929143,ackn:11211268 Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8197 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:3bf9,seqn:835929143,ackn:11211290 Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8197 packet: syn:0,ack:1,rst:0,fin:1,hlen:5,chksum:3bce,seqn:835929143,ackn:11211290 Debug: Feb 11 10:46:57 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8197 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:1bce,seqn:11211290,ackn:835929144 Debug: Feb 11 10:47:05 TCP: sent packet (len=24) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:1,ack:0,rst:0,fin:0,hlen:6,chksum:26f,seqn:4002716695,ackn:0 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=24) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:1,ack:1,rst:0,fin:0,hlen:6,chksum:17a4,seqn:2607451983,ackn:4002716696 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:ef48,seqn:4002716696,ackn:2607451984 Debug: Feb 11 10:47:05 TCP: sent packet (len=75) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:17de,seqn:4002716696,ackn:2607451984 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2f49,seqn:2607451984,ackn:4002716751 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=57) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:fc84,seqn:2607451984,ackn:4002716751 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:ef11,seqn:4002716751,ackn:2607452021 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=39) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2af6,seqn:2607452021,ackn:4002716751 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:ef11,seqn:4002716751,ackn:2607452040 Debug: Feb 11 10:47:05 TCP: sent packet (len=39) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eabe,seqn:4002716751,ackn:2607452040 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2f11,seqn:2607452040,ackn:4002716770 306 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip tcp Debug: Feb 11 10:47:05 TCP: rcvd packet (len=108) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:aa71,seqn:2607452040,ackn:4002716770 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eec6,seqn:4002716770,ackn:2607452128 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=39) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2a8b,seqn:2607452128,ackn:4002716770 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eec6,seqn:4002716770,ackn:2607452147 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=108) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:80c6,seqn:2607452147,ackn:4002716770 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eec6,seqn:4002716770,ackn:2607452235 Debug: Feb 11 10:47:06 TCP: rcvd packet (len=108) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:cd4a,seqn:2607452235,ackn:4002716770 Debug: Feb 11 10:47:06 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:17 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 307 debug ip tcp driver debug ip tcp driver Activates the TCP driver events debugging. Syntax debug ip tcp driver no debug ip tcp driver Modes Privileged EXEC mode Examples device# debug ip tcp driver TCP: driver debugging is on 308 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip tcp memory debug ip tcp memory Activates the TCP memory debugging. Syntax debug ip tcp memory no debug ip tcp memory Modes Privileged EXEC mode Examples device# debug ip tcp memory TCP: memory debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 309 debug ip tcp packet debug ip tcp packet Activates the TCP packets debugging. Syntax debug ip tcp packet no debug ip tcp packet Modes Privileged EXEC mode Examples device# debug ip tcp packet TCP: packet debugging is on 310 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip tcp sack debug ip tcp sack Activates the TCP Selective Acknowledgment (SACK) debugging. Syntax debug ip tcp sack no debug ip tcp sack Modes Privileged EXEC mode Examples device# debug ip tcp sack TCP: sack debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 311 debug ip tcp transactions debug ip tcp transactions Activates the TCP transactions debugging. Syntax debug ip tcp transactions no debug ip tcp transactions Modes Privileged EXEC mode Examples device# debug ip tcp transactions TCP: transactions debugging is on TCP: transactions debugging is on Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179: state change ESTABLISHED -> FIN-WAIT-1 Debug: Feb 11 10:47:39 TCP: sending FIN to 2001:DB8::192:111:101:25 port 179 Debug: Feb 11 10:47:39 TCP: FIN to 2001:DB8::192:111:101:111 port 8178 acked Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179: state change FIN-WAIT-1 -> FIN-WAIT-2 Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179: state change FIN-WAIT-2 -> TIME-WAIT Debug: Feb 11 10:47:39 TCP: FIN processed Debug: Feb 11 10:47:39 TCP: 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179: state change TIME-WAIT -> CLOSED Debug: Feb 11 10:47:39 TCP: TCB 14440934 destroyed Debug: Feb 11 10:47:58 TCP: 2001:DB8::192:111:101:111:8064 -> 2001:DB8::192:111:101:25:179: state change CLOSED -> SYN-SENT Debug: Feb 11 10:47:58 TCP: connected to 2001:DB8::192:111:101:111 port 8064 advertising MSS 1436 Debug: Feb 11 10:47:58 TCP: connection to 10.146.1.17 port 179 received MSS 1436 MSS is 1436 Debug: Feb 11 10:47:58 TCP: 2001:DB8::192:111:101:111:8064 -> 2001:DB8::192:111:101:25:179: state change SYN-SENT -> ESTABLISHED 312 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip udp debug ip udp Activates the UDP debugging. Syntax debug ip udp no debug ip udp Modes Privileged EXEC mode Examples device# debug ip udp UDP: debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 313 debug ip vrrp events debug ip vrrp events Displays debugging information of VRRP events only within the device. Syntax debug ip vrrp events no debug ip vrrp events Modes Privileged EXEC mode Examples device# debug ip vrrp events VRRP: events debugging is on [44fd]VRRP (IPv4): 10.10.10.1 transit to master! IP addr 10.10.10.2 vrid 10, pri 100 [44fd]VRRP (IPv6): fe80::7:1 transit to master! IP addr fe80::7:1 vrid 10, pri 100 [4511]VRRP (IPv6): fe80::8:1 transit to master! IP addr fe80::8:1 vrid 11, pri 255 314 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug ip vrrp packet debug ip vrrp packet displays debugging information of any VRRP or VRRP-E packets within the device. Syntax debug ip vrrp packet no debug ip vrrp packet Modes Privileged EXEC mode Examples device# debug ip vrrp packet VRRP: packet debugging is on VRRP (IPv6): send advertise! ver:3 type:1 vrid:100 pri:255 num of ip:1 adv:100 chk:44853 Num of ip addr 1 2000::7:1 VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1 chk:52198 Num of ip addr 1 10.10.10.2 from sender 10.10.10.2 VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:100 chk:53518 Num of ip addr 1 fe80::7:2 from sender 2000::7:2 VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:11 pri:255 #ip:1 aut:0 adv:200 chk:53417 Num of ip addr 1 fe80::8:2 from sender :: Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 315 debug ip vrrp packet v4 debug ip vrrp packet v4 displays debugging information of VRRP or VRRP-E packets specific to IPv4 within the device. Syntax debug ip vrrp packet v4 no debug ip vrrp packet v4 Modes Privileged EXEC mode Examples device# debug ip vrrp packet v4 VRRP (IPv4): packet debugging is on VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1 chk:52198 Num of ip addr 1 10.10.10.2 from sender 10.10.10.2 VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1 chk:52198 Num of ip addr 1 10.10.10.2 from sender 10.10.10.2 VRRP (IPv4): rcvd packet! ver:2 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:1 chk:52198 Num of ip addr 1 10.10.10.2 from sender 10.10.10.2 316 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mld-snoop mcache-group debug mld-snoop mcache-group Displays MLD snoop debugging information related to mcache activity for the specified group address. Syntax debug mld-snoop mcache-groupgroup_address no debug mld-snoop mcache-group group_address Parameters group_address Specifies the 32-bit address of the MLD snoop multicast group. Modes Privileged EXEC mode Global configuration mode Examples device# debug mld-snoop mcache-group 230001 device(config)# Del e1/1/23 from (0x0 0x230001) vlan 130 device(config)# Add e1/1/23 to (0x0 0x230001) vlan 130 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 317 debug mld-snoop packet debug mld-snoop packet Displays debugging information related to the MLD snoop packets. Syntax debug mld-snoop packetsource_address group_address no debug mld-snoop packet source_address group_address Parameters source_address Specifies the 32-bit source address of the MLD snoop packet. group_address Specifies the address of the MLD snoop multicast group. Modes Privileged EXEC mode Global configuration mode Examples device# debug mld-snoop packet 3 230001 debug mldsnoop packet (0x3 0x230001) // dm raw: RX [a0a]2322::3 ->ff1e::23:1 port: 1/1/1 rtr_l2mcast_fwd_data (pkts:2), (0x3 0x230001), from e1/1/1 vlan 130, has fwd_entry rtr_l2mcast_fwd_data (pkts:1), (0x3 0x230001), from e1/1/1 vlan 130, clear hw_aging flag 318 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mld-snoop show debug mld-snoop show Displays all the MLD snooping debug settings. Syntax debug mld-snoop show no debug mld-snoop show Modes Privileged EXEC mode Examples device# debug mld-snoop show debug mldsnoop vlan 100 is enabled Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 319 debug mld-snoop timer debug mld-snoop timer Displays the MLD snooping related timer events. Syntax debug mld-snoop timer no debug mld-snoop timer Modes Privileged EXEC mode Examples device# debug mld-snoop timer device# mld timer, VL130(e1/1/2) change V3 client age out 320 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mstp bpdu debug mstp bpdu Monitors Multiple Spanning Tree Protocol (MSTP) Bridge Packet Data Units (BPDUs). Syntax debug mstp bpdu no debug mstp bpdu Modes Privileged EXEC mode Usage Guidelines Use this command to record and display information in conjunction with the debug mstp enable and debug mstp events commands. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 321 debug mstp bpdu Examples If this command is enabled, output similar to the following is displayed. device# debug mstp bpdu MSTP Bpdu debugging ON device# debug mstp enable device# MSTP[0xeb217]: PRX RECEIVE->RECEIVE - Port 1/1/1 MST 0, Port 1/1/1 - received BPDU (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} MSTP[0xeb217]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0xeb217]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0xeb217]: PRX RECEIVE->RECEIVE - Port 1/1/2 MST 0, Port 1/1/2 - received BPDU [0xeb217] (802.1s) 0000 03 02 3c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8002 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} MSTP[0xeb217]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0xeb217]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7 MSTP[0xeb21b]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0xeb21b]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 MSTP[0xeb22b]: PRX RECEIVE->RECEIVE - Port 1/1/1 MST 0, Port 1/1/1 - received BPDU [0xeb22b] (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} MSTP[0xeb22b]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0xeb22b]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0xeb22b]: PRX RECEIVE->RECEIVE - Port 1/1/2 MST 0, Port 1/1/2 - received BPDU [0xeb22b] (802.1s) 0000 03 02 3c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8002 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} MSTP[0xeb22b]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0xeb22b]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7 MSTP[0xeb22f]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0xeb22f]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 MSTP[0xeb23f]: PRX RECEIVE->RECEIVE - Port 1/1/1 MST 0, Port 1/1/1 - received BPDU [0xeb23f] (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} MSTP[0xeb23f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0xeb23f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0xeb23f]: PRX RECEIVE->RECEIVE - Port 1/1/2 MST 0, Port 1/1/2 - received BPDU [0xeb23f] (802.1s) 0000 03 02 3c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8002 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} MSTP[0xeb23f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0xeb23f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7 MSTP[0xeb243]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0xeb243]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 MSTP[0xeb253]: PRX RECEIVE->RECEIVE - Port 1/1/1 MST 0, Port 1/1/1 - received BPDU [0xeb253] (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} 322 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mstp events debug mstp events Displays MSTP state machine events. Syntax debug mstp events no debug mstp events Modes Privileged EXEC mode Usage Guidelines Use this command to monitor any MSTP event that takes place. Examples If MSTP events are enabled, output similar to the following is displayed. device# debug mstp events MSTP Event debugging ON device# debug mstp enable device# MSTP[0xeda7f]: PRX RECEIVE->RECEIVE - Port 1/1/1 MSTP[0xeda7f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0xeda7f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0xeda7f]: PRX RECEIVE->RECEIVE - Port 1/1/2 MSTP[0xeda7f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0xeda7f]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7 MSTP[0xeda89]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0xeda89]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 MSTP[0xeda93]: PRX RECEIVE->RECEIVE - Port 1/1/1 MSTP[0xeda93]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0xeda93]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 If MSTP events are disabled, output similar to the following is displayed. device# no debug mstp events MSTP Event debugging OFF Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 323 debug mstp level debug mstp level Monitors MSTP level. Syntax debug mstp level decimal no debug mstp level decimal Parameters decimal Specifies the level of MSTP. Modes Privileged EXEC mode Usage Guidelines Examples device# debug mstp level 2 Configuration : device# [ebd95] MSTP_RX[pid=#0] *** [ebd95] MSTP_RX[pid=#0] done (region) [ebd95] MSTP_RX[pid=#1] *** [ebd95] MSTP_RX[pid=#1] done (region) [ebda9] MSTP_RX[pid=#0] *** [ebda9] MSTP_RX[pid=#0] done (region) [ebda9] MSTP_RX[pid=#1] *** [ebda9] MSTP_RX[pid=#1] done (region) [ebdbd] MSTP_RX[pid=#0] *** [ebdbd] MSTP_RX[pid=#0] done (region) [ebdbd] MSTP_RX[pid=#1] *** [ebdbd] MSTP_RX[pid=#1] done (region) [ebdd1] MSTP_RX[pid=#0] *** [ebdd1] MSTP_RX[pid=#0] done (region) [ebdd1] MSTP_RX[pid=#1] *** [ebdd1] MSTP_RX[pid=#1] done (region) [ebde5] MSTP_RX[pid=#0] *** [ebde5] MSTP_RX[pid=#0] done (region) [ebde5] MSTP_RX[pid=#1] *** 324 *** *** *** *** *** *** *** *** *** Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mstp level If the MSTP level 3 is enabled, output similar to the following is displayed. device# debug mstp level 3 device# [ebf4d] MSTP_RX[pid=#0] *** cist_Rx[ebf4d] CIST, Port(#0) [ebf4d] MSTP_RX[pid=#0] done (region) [ebf4d] MSTP_RX[pid=#1] *** cist_Rx[ebf4d] CIST, Port(#1) [ebf4d] MSTP_RX[pid=#1] done (region) [ebf61] MSTP_RX[pid=#0] *** cist_Rx[ebf61] CIST, Port(#0) [ebf61] MSTP_RX[pid=#0] done (region) [ebf61] MSTP_RX[pid=#1] *** cist_Rx[ebf61] CIST, Port(#1) [ebf61] MSTP_RX[pid=#1] done (region) n[ebf75] MSTP_RX[pid=#0] *** cist_Rx[ebf75] CIST, Port(#0) [ebf75] MSTP_RX[pid=#0] done (region) [ebf75] MSTP_RX[pid=#1] *** cist_Rx[ebf75] CIST, Port(#1) [ebf75] MSTP_RX[pid=#1] done (region) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 *** *** *** *** *** *** 325 debug mstp msti debug mstp msti Displays information for a specific MSTP instance. Syntax debug mstp msti decimal no debug mstp msti decimal Parameters decimal Specifies the following values: Value 0 for the Common and Internal Spanning Tree (CIST) Value from 1 through 4094 for the Multiple Spanning Tree Instance (MSTI). Modes Privileged EXEC mode Examples device#debug mstp msti 0 MSTP debugging turned on for instances 0 326 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mstp msti If this command is enabled, output similar to the following is displayed. device#debug mstp msti 2 MSTP debugging turned on for instances 2 ,0 device# debug mstp enable device# debug mstp events MSTP Event debugging ON Brocade# MSTP[0x175f15]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0x175f15]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 MSTP[0x175f21]: PRX RECEIVE->RECEIVE - Port 1/1/1 MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/1 MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/1, rcvdInfoWhile 4->7 MSTP[0x175f21]: PRX RECEIVE->RECEIVE - Port 1/1/2 MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7 MSTP[0x175f21]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/2 MSTP[0x175f21]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/2, rcvdInfoWhile 4->7 MSTP[0x175f29]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0x175f29]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 noMSTP[0x175f35]: PRX RECEIVE->RECEIVE - Port 1/1/1 MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/1 MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/1, rcvdInfoWhile 4->7 MSTP[0x175f35]: PRX RECEIVE->RECEIVE - Port 1/1/2 MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7 MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/2 MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/2, rcvdInfoWhile 4->7 deMSTP[0x175f3d]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0x175f3d]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 bug msMSTP[0x175f49]: PRX RECEIVE->RECEIVE - Port 1/1/1 MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/1 MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/1, rcvdInfoWhile 4->7 MSTP[0x175f49]: PRX RECEIVE->RECEIVE - Port 1/1/2 MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/2, rcvdInfoWhile 5->7 MSTP[0x175f49]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/2 MSTP[0x175f49]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/2 MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/2, rcvdInfoWhile 4->7 tpMSTP[0x175f51]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/1 MSTP[0x175f51]: PTX IDLE->TRANSMIT_PERIODIC - Port 1/1/2 eventMSTP[0x175f5d]: PRX RECEIVE->RECEIVE - Port 1/1/1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 327 debug mstp port-level debug mstp port-level Displays the hardware level of the port on which the MSTP is running. Syntax debug mstp port-level decimal no debug mstp port-level decimal Parameters decimal Specifies the following values: Value 0 for the Common and Internal Spanning Tree (CIST) Value from 1 through 4094 for the Multiple Spanning Tree Instance (MSTI). Modes Privileged EXEC mode Usage Guidelines Use this command to determine the port-level information. Examples device# debug mstp port-level 1 Configuration for port-level 1 : Brocade# debug mstp port-level DECIMAL 0 -- print nothing Brocade# debug mstp port-level 1 Brocade# configure terminal Brocade(config)# interface ethernet 1/1/1 Brocade(config-if-e1000-1/1/1)# disable Brocade(config-if-e1000-1/1/1)# enable Brocade(config-if-e1000-1/1/1)# ^Z 328 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mstp show debug mstp show Displays the currently enabled MSTP debug parameters. Syntax debug mstp show no debug mstp show Modes Privileged EXEC mode Examples device#debug mstp show mstp debug is on because of enabled, level or port-level level 4 parameters: Brief, StateMachineEvents BpduEvents are being tracked Ports: All MSTP instances: 0 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 329 debug mstp state debug mstp state Displays information about the MSTP port state events. Syntax debug mstp state no debug mstp state Modes Privileged EXEC mode Examples device#debug mstp state MSTP Port State debugging ON 330 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug mstp verbose debug mstp verbose Displays the MSTP debug information in the verbose mode. Syntax debug mstp verbose no debug mstp verbose Modes Privileged EXEC mode Examples device#debug mstp verbose MSTP debugging set to VERBOSE mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 331 debug packet-capture debug packet-capture Displays information about packet-capture activity. Syntax debug packet-capture [ all | count-reset | count-show | exclude-mgmt-port | filter | max | mode | no-limit | no-mgmt-port | receive | send ] Parameters all Displays the debugging information of the packets transmitted and received. count-reset Clears the total packet count of the packets captured. count-show Displays the total packet count of the packets captured for debugging. exclude-mgmt-port Enables debugging of the packets that are excluded for the management filter Enables the raw packet filter for debugging. max Displays the maximum number of packets. mode Displays the various packet modes. no-limit Displays the debugging information of an unlimited number of packets. no-mgmt-port Toggles the display of packets from the management port. receive Debugs only the packets that are received. send Debugs only the packets that are transmitted. Modes Privileged EXEC mode 332 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug packet-capture filter debug packet-capture filter Enables the filter option for the raw packets. Syntax debug packet-capture filter filter_index filter_options Parameters filter_index Specifies the filter number. The decimal value ranges from 1 through 20. filter_options Specifies the filter option. Modes Privileged EXEC mode Usage Guidelines There are 36 filter options that can be configured within a single filter. • all—Matches all packets • arp—Matches an ARP request or response • broadcast-mac—Matches the destination broadcast MAC address (0000.00FF.FFFF) • cdp—Matches with the CDP • clear—Clears the filter entry • clear-counter—Clears the counter • cpu-code—Matches the CPU code • da—Matches the destination MAC address • dhcp—Matches with the DHCP • dot1x—Matches the dot1x protocol • dpa—Matches the destination IP address • dport—Matches the destination protocol port • ether-type—Matches the Ethernet type packets • fdp—Matches with the FDP • in-port—Matches the input port • l2-802.1w—Matches the 802.1w BPDU • l2-lacp—Matches the LACP PDU • l2-mstp—Matches the MSTP BPD • l2-stp—Matches the spanning tree BPDU • l3-bgp—Matches with the BGP Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 333 debug packet-capture filter • l3-ospf—Matches the OSPF protocol • l3-vrrp—Matches the VRRP • l3-vrrpe—Matches the VRRP-E • lldp—Matches the LLDP • mrp—Matches the MRP • out-port—Matches the output port • priority—Matches the priority • protocol—Matches the IP • pvst—Matches the PVST protocol • sa—Matches the source MAC address • snmp—Matches the SNMP • spa—Matches the source IP address • sport—Matches the source protocol port • udld—Matches the UDLD protocol • vlan-id—Matches the VLAN ID • vsrp—Matches the VSRP Examples device# debug packet-capture filter 2 protocol 334 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug packet-capture filter none debug packet-capture filter none Removes all the filters that are configured. Syntax debug packet-capture filter none Modes Privileged EXEC mode Examples device# debug packet-capture filter none Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 335 debug packet-capture filter show debug packet-capture filter show Displays the filter information for the particular filter index.. Syntax debug packet-capture filter show [ all | decimal ] Parameters decimal Specifies the number of the packet captured for filter. Modes Privileged EXEC mode Examples Execute the following command to display the complete filter information. device# debug packet-capture filter show all Filter 1: Match STP Filter 2: Match 802.1W Execute the following command to display filter information for a particular filter number. device# debug packet-capture filter show 2 Filter 2: Match 802.1W 336 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug packet-capture mode debug packet-capture mode Displays the format of the packets to be captured for debugging information. Syntax debug packet-capture mode [ brief | no-display | normal | pcap-fmt { default | decimal } ] Parameters brief Specifies the increment counters and displays the packet summary. no-display Specifies the increment counters alone. normal Specifies the increment counters and displays the packet header and the first 48 raw bytes. pcap-fmt Specifies the increment counters and dumps the packet in pcap (packet capture) hexadecimal format. default Specifies the normal mode. decimal Specifies the first 48 bytes of the packets received. Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 337 debug port hw-state debug port hw-state Monitors the hardware status of a port. Syntax debug port hw-state no debug port hw-state Modes Privileged EXEC mode Usage Guidelines Use this command to enable or disable port debugging in the hardware state. Examples device# debug port hw-state Topology: Port 1/1/31 is connected to port 1/1/32. If port 1/1/31 is disabled, an output similar to the following is displayed. device(config)# interface ethernet 1/1/31 device(config-if-e1000-1/1/31)# disable ( when port is disabled) Change port 1/1/31 hw_state from PORT_READY(7) to DISABLED(0) stack: 4040 2050A970 2050AA44 2060D498 20608BF8 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 device(config-if-e1000-1/1/31)# change port 1/1/32 hw_state from PORT_READY(7) to SEEQ_INIT(1) stack: 4040 2050A970 2050AA44 2060D498 20608E18 20609344 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 If port 1/1/31 is enabled, an output similar to the following is displayed. device(config-if-e1000-1/1/32)# interface ethernet 1/1/31 device(config-if-e1000-1/1/31)# enable Change port 1/1/31 hw_state from DISABLED(0) to SEEQ_INIT(1) stack: 4040 2050A970 2050AA44 2060D498 20608A34 2060B598 20576BC4 20576C74 2057707C 202A4F84 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 device(config-if-e1000-1/1/31)# change port 1/1/31 hw_state from SEEQ_INIT(1) to PORT_READY(7) stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 Change port 1/1/32 hw_state from SEEQ_INIT(1) to PORT_READY(7) stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 338 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug port port debug port port Monitors a specific physical port. Syntax debug port port stackid/slot/port Parameters stackid/slot/port Identifies the specific interface (port), by device, slot, and port number in the format shown. Modes Privileged EXEC mode Global configuration mode Usage Guidelines debug port up-downdebug port hw-state Examples device# debug port port 1/1/2 Topology: Port 1/1/31 is connected to port 1/1/2. When the debug port hw-state command is enabled after the debug port port command, the output similar to the following example is displayed. device# debug port port 1/1/2 monitor port 1/1/2 device# debug port hw-state Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 339 debug port port If port 1/1/2 is disabled, an output similar to the following is displayed. device(config-if-e1000-1/1/2)# disable port_disable_cmd: for port 0x1 1/1/2 U1, hal_pp_link_port_enable(1/1/2, 0), is_stby=0, to_shadow=0, parsed = 3, stack=1 stack: 0116c83c 000de8f0 00accc3c 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 pp_link_port_en_dis(port=1/1/2, 0), return 0 stack: 0116ca20 000de8f0 00accc3c 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 Change 1/1/2 state from Forward to Disable stack: 00acb98c 00ad1e14 00aebd74 0071dddc 0071ebbc 00af0e8c 00af18e8 00ad0e20 00acccf4 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 Change port 1/1/2 hw_state from PORT_READY(7) to DISABLED(0) stack: 00ad5d4c 00accd2c 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 Change 1/1/2 state from Disable to Blocked stack: 00acb98c 00acba3c 00acbce4 00accd38 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 Change 1/1/2 state from Blocked to Disable stack: 00acb98c 00acba3c 00accd48 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 If port 1/1/2 is enabled, an output similar to the following is displayed. device(config-if-e1000-1/1/2)# enable device(config-if-e1000-1/1/2)# change port 1/1/2 hw_state from SEEQ_INIT(1) to PORT_READY(7) stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 Change 1/1/2 state from Disable to Blocked stack: 4040 2050A970 2050AA44 206082E0 2060B354 206215F8 203F9F10 203FB4D8 203FA2B4 2062268C 20623404 2060A624 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C Change 1/1/2 state from Blocked to Listen stack: 4040 2050A970 2050AA44 206082E0 2060B354 20621734 203F9F10 203FD490 203FD1C4 203FA2BC 2062268C 20623404 2060A624 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 Change 1/1/2 state from Listen to Learn stack: 4040 2050A970 2050AA44 206082E0 2060B354 2062178C 203F9F10 20400F38 20400C84 20400A1C 203F9980 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 Change 1/1/2 state from Learn to Blocked stack: 4040 2050A970 2050AA44 206082E0 2060B354 206215F8 203F9F10 203FD70C 203FD248 203FDFD8 204F3C8C 20616AB8 20612D30 200DC33C 200DC600 200DC6C0 200DC780 200444C4 2011BC28 20047698 The debug port up-down command disables or enables a port to get output information of the specified port. When the debug port up-down command is enabled after the debug port port command, output similar to the following example is displayed. device# debug port port 1/1/32 monitor port 1/1/32 device# debug port up-down 340 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug port port If port 1/1/32 is disabled, an output similar to the following is displayed. device(config-if-e1000-1/1/32)# disable port_down_indication. port=1/1/32, UNTAG, vlan-idx=1 stack: 4040 2050A970 2050AA44 2060A8FC 20608BEC 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 Change 1/1/32 state from Blocked to Disable stack: 4040 2050A970 2050AA44 206082E0 2060B354 206214F0 203F9F10 203FA3A0 20622F60 20623404 2060AA38 20608BEC 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 Change 1/1/32 state from Disable to Blocked stack: 4040 2050A970 2050AA44 206082E0 20608330 206084C4 20608C00 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 Change 1/1/32 state from Blocked to Disable stack: 4040 2050A970 2050AA44 206082E0 20608330 20608C0C 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C If port 1/1/32 is enabled, an output similar to the following is displayed. device(config-if-e1000-1/1/32)# enable Change 1/1/32 state from Disable to Blocked stack: 4040 2050A970 2050AA44 206082E0 206089A0 2060B598 20576BC4 20576C74 2057707C 202A4F84 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 device(config-if-e1000-1/1/32)# pp_link_change_final. port=1/1/32, up=1 port_up_indication. port=1/1/32, UNTAG, vlan-idx=1 stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 Change 1/1/32 state from Blocked to Listen stack: 4040 2050A970 2050AA44 206082E0 2060B354 20621734 203F9F10 203FD490 203FD1C4 203FA2BC 2062268C 20623404 2060A624 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 Change 1/1/32 state from Listen to Blocked stack: 4040 2050A970 2050AA44 206082E0 2060B354 206215F8 203F9F10 203FD70C 203FD248 203FDFD8 204F3C8C 20616AB8 20612D30 200DC33C 200DC600 200DC6C0 200DC780 200444C4 2011BC28 20047698 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 341 debug port ten-gig debug port ten-gig Monitors all 10 Gigabit ports in the Brocade FastIron devices. Syntax debug port ten-gig Modes Privileged EXEC mode Global configuration mode Usage Guidelines Use this command in conjunction with the debug port hw-state command. Examples device# debug port ten-gig Topology: Port 2/3/1 is the 10 gig port which is Up and forwarding on stack. device# debug port ten-gig device# debug port hw-state hw-state monitor hw_state change device# debug port hw-state If port 2/3/1 is disabled, an output similar to the following is displayed. device(config-if-e10000-2/3/1)# disable Change port 2/3/1 hw_state from PORT_READY(7) to DISABLED(0) stack: 4040 2050A970 2050AA44 2060D498 20608BF8 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 2027FD8C 20280888 202809F0 2015FCDC 2015FF44 20160B80 If port 2/3/1 is enabled, an output similar to the following is displayed. device(config-if-e10000-2/3/1)# enable Change port 2/3/1 hw_state from DISABLED(0) to SEEQ_INIT(1) stack: 4040 2050A970 2050AA44 2060D498 20608A34 2060B598 20576BC4 20576C74 2057707C 202A4F84 20491E9C 20492DC0 204906D8 2050BF48 2027FD8C 20280888 202809F0 2015FCDC 2015FF44 20160B80 device(config-if-e10000-2/3/1)# change port 2/3/1 hw_state from SEEQ_INIT(1) to PORT_READY(7) stack: 4040 2050A970 2050AA44 2060D498 206093D0 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 342 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug port up-down debug port up-down Monitors the status of the ports. Syntax debug port up-down decimal no debug port up-down decimal Parameters decimal Specifies the status of the port. Modes Privileged EXEC mode Global configuration mode Usage Guidelines This command disables or enables a port to get output information of the specified port. The port status up, down, and up/ down are indicated by 1, 2, and 3 respectively. Examples device# debug port up-down 1 Monitor port up Topology: Port 1/1/31 is connected to port 1/1/32. If port 1/1/31 is disabled, an output similar to the following is displayed. device(config)# interface ethernet 1/1/31 device(config-if-e1000-1/1/31)# disable port_down_indication. port=1/1/31, UNTAG, vlan-idx=1 stack: 4040 2050A970 2050AA44 2060A8FC 20608BEC 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 device(config-if-e1000-1/1/31)# port_down_indication. port=1/1/32, UNTAG, vlan-idx=3 stack: 4040 2050A970 2050AA44 2060A8FC 20608DA0 20609344 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 pp_link_change_final. port=1/1/32, up=0 If port 1/1/31 is enabled, an output similar to the following is displayed. device(config-if-e1000-1/1/31)# enable device(config-if-e1000-1/1/31)# pp_link_change_final. port=1/1/31, up=1 port_up_indication. port=1/1/31, UNTAG, vlan-idx=1 stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 pp_link_change_final. port=1/1/32, up=1 port_up_indication. port=1/1/32, UNTAG, vlan-idx=3 stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 343 debug port up-down History Release version Command history This command was introduced. This command was modified to... 344 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug port vlan debug port vlan Monitors a specific VLAN. Syntax debug port vlan decimal no debug port vlan decimal Parameters decimal Specifies the number of the VLAN. Modes Privileged EXEC mode Global configuration mode Usage Guidelines debug port up-downdebug port port Examples device# debug port vlan 1 monitor vlan 1 Topology: Port 1/1/31 is connected to port 1/1/32. device# debug port vlan 2 monitor vlan 2 device# debug port up-down up-down monitor port up/down event. 1: up, 2: down, 3: up/down device# debug port up-down 3 Monitor both port up and down If port 1/1/31 is disabled, an output similar to the following is displayed. device(config-if-e1000-1/1/31)# disable port_down_indication. port=1/1/31, TAG, vlan-idx=4096 stack: 4040 2050A970 2050AA44 2060A8FC 20608BEC 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 device(config-if-e1000-1/1/31)# port_down_indication. port=1/1/32, TAG, vlan-idx=4096 stack: 4040 2050A970 2050AA44 2060A8FC 20608DA0 20609344 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 pp_link_change_final. port=1/1/32, up=0 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 345 debug port vlan If port 1/1/31 is enabled, an output similar to the following is displayed. device(config-if-e1000-1/1/31)# enable device(config-if-e1000-1/1/31)# pp_link_change_final. port=1/1/31, up=1 port_up_indication. port=1/1/31, TAG, vlan-idx=4096 stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 pp_link_change_final. port=1/1/32, up=1 port_up_indication. port=1/1/32, TAG, vlan-idx=4096 stack: 4040 2050A970 2050AA44 2060A2C8 20609520 20609AFC 2055FA50 2050A214 200478DC 2011BBCC 20047698 2011CF7C 5008 135C8 18524 346 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug pp-bum-trunk-hash debug pp-bum-trunk-hash Traces and displays the output port through which a given packet can be sent out in a trunk for a broadcast, unknown-unicast, and multicast (BUM) flow. Syntax debug pp-bum-trunk-hash ingress_port sw_trunk_id dmac smac ipv4 dst_ipv4 src_ipv4 [ dst_tcp | udp_port ] [ src_tcp | udp_port ] vlan vidx ipv6 flow_label dst_ipv6 src_ipv6 [ dst_tcp | udp_port ] [ src_tcp | udp_port ] vlan vidx no debug pp-bum-trunk-hash Parameters ingress_port Specifies the ingress port number. sw_trunk_id Specifies the software trunk ID. dmac Specifies the destination MAC address. smac Specifies the source MAC address. ipv4 Generates debugging information related to IPv4 distribution for a BUM flow. ipv6 Generates debugging information related to IPv6 distribution for a BUM flow. The following variables are supported with the ipv4 and ipv6 options. dst_ipv4 Specifies the destination IPv4 address. src_ipv4 Specifies the source IPv4 address. dst_tcp | udp_port Specifies the destination TCP or UDP port number. src_tcp | udp_port Specifies the source TCP or UDP port number. vlan Specifies the VLAN ID. vidx Specifies the multicast ID. flow_label Specifies the flow label in the IPv6 header. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 347 debug pp-bum-trunk-hash dst_ipv6 Specifies the destination IPv6 address. src_ipv6 Specifies the source IPv6 address. Modes Privileged EXEC mode Examples For the IPv4 BUM flow, the command output resembles the following example. device# debug pp-bum-trunk-hash 1/1/1 3 0000.00aa.aaaa 0000.00bb.1111 ipv4 10.1.1.1 10.1.1.2 10 10 1 100 Designated Trunk Port = 1/1/5 For the IPv6 BUM flow, the command output resembles the following example. device# debug pp-bum-trunk-hash 1/1/11 3 0000.00aa.aaaa 0000.00bb.1111 ipv6 128 2001:DB8::1:1 2001:DB8::1:1 10 10 1 100 Designated Trunk Port = 1/1/4 For the non-IP BUM flow, the command output resembles the following example. device# debug pp-bum-trunk-hash 1/1/1 3 0000.00aa.aaaa 0000.00bb.1111 non-ip Designated Trunk Port = 1/1/5 348 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug pp-trunk-hash debug pp-trunk-hash Traces and displays the output port through which a given packet can be sent out in a trunk. Syntax debug pp-trunk-hash trunk_port unicast-distribution ip dmac smac [ dst_ipv4 src_ipv4 dst_tcp | udp_port src_tcp | udp_port | dst_ipv6 src_ipv6 dst_tcp | udp_port src_tcp | udp_port ] unicast-distribution non-ipdmac smac no debug pp-trunk-hash Parameters trunk_port Specifies the trunk member port number. unicast-distribution Generates debugging information related to unicast distribution. ip dmac smac Generates debugging information related to unicast IPv4 and IPv6 distribution for the specified destination MAC address and source MAC address. The following variables are supported with this option. dst_ipv4 Specifies the destination IPv4 address. src_ipv4 Specifies the source IPv4 address. dst_tcp | udp_port Specifies the destination TCP or UDP port number. src_tcp | udp_port Specifies the source TCP or UDP port number. dst_ipv6 Specifies the destination IPv6 address. src_ipv6 Specifies the source IPv6 address. non-ip dmac smac Generates debugging information related to unicast non-IP distribution for the specified destination MAC address and source MAC address. Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 349 debug pp-trunk-hash Usage Guidelines The debug pp-trunk-hash trunk_port command is supported only on Brocade ICX devices. Examples For the unicast IPv4 distribution, the command output resembles the following example. device# debug pp-trunk-hash 1/1/3 unicast-distribution ip 0000.0082.ba04 0000.00c9.5680 10.10.10.2 10.10.10.1 10 10 trunk hashed port: 1/1/2 For the unicast IPv6 distribution, the command output resembles the following example. device# debug pp-trunk-hash 1/1/3 unicast-distribution ip 0000.0082.ba04 0000.00c9.5680 2001:DB8::100:10 2001:DB8::10:19 10 17 trunk hashed port: 1/1/1 For the unicast non-IP distribution, the command output resembles the following example. device# debug pp-trunk-hash 1/1/3 unicast-distribution non-ip 0000.0082.ba04 0000.00c9.5680 trunk hashed port: 1/1/9 350 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Debug Commands Q - Z debug rip database Displays Routing Information Protocol (RIP) database events. Syntax debug rip database no debug rip database Modes Privileged EXEC mode Examples device# debug rip database device(config-vif-11)# RIP(default-vrf): (v2) process response packet header: type:RESPONSE PACKET, version:2 RIP(default-vrf): refresh 10.1.2.0/24 metric 3 from 10.5.5.2 ve 11 RIP(default-vrf): existing route metric 2 from 10.4.4.1 ve 12 RIP(default-vrf): refresh 10.24.2.0/24 metric 4 from 10.5.5.2 ve 11 RIP(default-vrf): existing route metric 4 from 10.5.5.2 ve 11 RIP(default-vrf): (v2) process response packet header: type:RESPONSE PACKET, version:2 RIP(default-vrf): refresh 10.24.2.0/24 metric 4 from 10.4.4.2 ve 12 RIP(default-vrf): existing route metric 4 from 10.5.5.2 ve 11 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 351 debug rip events debug rip events Displays RIP events. Syntax debug rip events no debug rip events Modes Privileged EXEC mode Global configuration mode Examples device# debug rip events device(config-vif-11)# RIPng: update timer expired clear ipv routeRIPng: triggered update RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0 from :: on interface NULL RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0 from :: on interface NULL RIPng: Adding local connected route 2001:DB8::1/64 on interface v11 RIPng: Adding local connected route 2001:DB8::1/64 on interface v12 RIPng: update timer expired RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0) RIPng: Redistribute add route 2001:DB8::/64, type CONNECTED (1/0) 352 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug sflow problems debug sflow problems Enables debugging of the internal sFlow. Syntax debug sflow problems no debug sflow problems Modes Privileged EXEC mode Usage Guidelines sFlow is a system for observing traffic flow patterns and quantities within and among a set of Brocade devices. The no form of the command disables debugging of the internal sFlow. Examples device# debug sflow problems sflow: problem debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 353 debug span all_802_1d_events debug span all_802_1d_events Monitors information about all the events, timers, and packets on a specific VLAN. Syntax debug span all_802_1d_events decimal no debug span all_802_1d_events decimal Parameters variable Specifies the number of the VLAN. Modes Privileged EXEC mode Examples device# debug span all_802_1d_events vlan 201 STP Enabling All events Debugging for VLAN 201 7750Stk-Seth#STP[898211]: Received Config BPDU - VLAN 201 -port 54/1/21 port_state_selection(T=898211,vlan=201) --> STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 1/1/1(0) VLAN 201 STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 2/1/1(256) VLAN 201 STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 3/1/1(512) VLAN 201 STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 51/1/1(12800) VLAN 201 STP:port_state_selection PORT 51/1/21 vlan 201 transitions to BLOCKING STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 52/1/1(13056) VLAN 201 STP:port_state_selection PORT 52/1/21 vlan 201 transitions to BLOCKING STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 53/1/1(13312) VLAN 201 STP:port_state_selection PORT 53/1/21 vlan 201 transitions to BLOCKING STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 54/1/1(13568) VLAN 201 port_state_selection root port 54/1/21 STP[898211]: Received Config BPDU - VLAN 201 -port 51/1/21 port_state_selection(T=898211,vlan=201) --> STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 1/1/1(0) VLAN 201 STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 2/1/1(256) VLAN 201 STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 3/1/1(512) VLAN 201 STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 51/1/1(12800) VLAN 201 STP:port_state_selection PORT 51/1/21 vlan 201 transitions to BLOCKING STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 52/1/1(13056) VLAN 201 STP:port_state_selection PORT 52/1/21 vlan 201 transitions to BLOCKING STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 53/1/1(13312) VLAN 201 STP:port_state_selection PORT 53/1/21 vlan 201 transitions to BLOCKING STP:port_state_selection PORT transitions to DESIGNATED_FORWARD state , port 54/1/1(13568) VLAN 201 port_state_selection root port 54/1/21 354 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug span config debug span config Monitors information about STP Bridge Protocol Data Unit (BPDU) configuration on a specific VLAN. Syntax debug span config vlan decimal ] no debug span config vlan decimal ] Parameters decimal Specifies the number of the VLAN. Modes Privileged EXEC mode Examples If the configuration of VLAN 2 on the Brocade ICX is enabled, output similar to the following is displayed. device# debug span config vlan 2 STP Enabling packets Debugging for VLAN 2 device# STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 05 0100 1400 0200 0f00 STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/6 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 06 0100 1400 0200 0f00 STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 05 0100 1400 0200 0f00 STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/6 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 06 0100 1400 0200 0f00 STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 05 0100 1400 0200 0f00 STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/6 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 06 0100 1400 0200 0f00 If the configuration of VLAN 2 on the Brocade ICX is disabled, output similar to the following is displayed. device# no debug span config vlan 2 STP : Disabling Packets Debugging for VLAN 2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 355 debug span timers debug span timers Displays information about the specific STP timer events. Syntax debug span timers vlan decimal no debug span timers vlan decimal Parameters decimal Specifies the number of the VLAN. Modes Privileged EXEC mode Examples If the STP timer event on VLAN 2 of the Brocade FastIron device is enabled, output similar to the following is displayed. device# debug span STP Enabling Timer Sample output: STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert STP: Timer Alert - timers vlan 2 Debugging for VLAN 2 Forward Forward Forward Message Message Forward Forward Delay Timer expired On port 1/1/6(5) Delay Timer expired On port 1/1/1(0) Delay Timer expired On port 1/1/6(5) Age Timer expired On port 1/1/1(0) , Age Timer expired On port 1/1/2(1) , Delay Timer expired On port 1/1/2(1) Delay Timer expired On port 1/1/2(1) , VLAN , VLAN , VLAN VLAN 2 VLAN 2 , VLAN , VLAN 2 2 2 2 2 If the STP timer event on VLAN 2 of the Brocade FastIron device is disabled, output similar to the following is displayed. device# no debug span timers vlan 2 STP Disabling Timer Debugging for VLAN 2 356 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug stack pe control debug stack pe control Displays important SPX events in real time. This command is available on Control Bridge (CB) and Port Extender (PE). Syntax debug stack pe control no debug stack pe control Modes Privileged EXEC mode Examples device# debug stack pe control 2 !!! Temperature is over warning level on stack unit 2 !!! Debug: Jan 1 08:56:41 T=8h56m23.6: spx-port 2/1/5 goes down Debug: Jan 1 08:56:41 T=8h56m23.6: p_notify: 2/1/5 down, UP=1, ary(1) timer, Debug: Jan 1 08:56:41 T=8h56m23.7: p_notify: 2/1/5 down, UP=1, same = curr_up, abort Debug: Jan 1 08:56:42 T=8h56m24.6: cb_pe_port_state_notify_cb, ind=1, from_timer=1 Debug: Jan 1 08:56:42 T=8h56m24.6: CB marks dirty bit 2 to S u3 st=5 stack: 10dd1f64 10dd39ec 10dd4144 10dd4308 10dd46f8 10dd7ba8 10dd7f1c 10dd848c 104bf3e8 1078071c 11680b54 11680eec 116823a0 116913d4 116922f4 11198bdc 106654d0 Debug: Jan 1 08:56:42 T=8h56m24.9: rem_st[18] Ready -> None:0 Debug: Jan 1 08:56:42 T=8h56m24.9: Active unit 2 deletes u18 but keeps its static config. Debug: Jan 1 08:56:42 delete reason: Port 2/1/5 is down. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 357 debug stack pe mac debug stack pe mac Optional command to select the printing of "debug stack pe topo" of a particular Port Extender (PE) with this MAC. Syntax debug stack pe mac no debug stack pe mac Modes Privileged EXEC mode Examples The user can key in the lowest 4 digits of the PE MAC address to limit the debug stack pe topo. The debug stack pe mac command is effective only on CB. When this command is specified, the Control Bridge (CB) only displays the joining LLDP packets of this specific PE. debug stack pe topo must be enabled before using this command. device# debug stack pe mac 77b0 monitor pe topo with lowest mac=77b0 ICX7750-20Q Router#Debug: Jan 2 01:40:36 T=1d1h40m19.0: LLDP join: fr u18 40 to 41, nbr=0, p_cb=2/1/5, V21 1, 224B, M=51444D A0A0A0A, me=cc4e.248b.77b0 CB-m=748e.f8f9.6300 0, tp=24 22 b, id=19 0 0 sug=0, op=1 cl=0, D0=2/1 2/2 D1=2/3 , cb-mac=cb pe_me id=19, has p_me u19 i=1 D=0, has pe_up u18 i_up=1 dir=1, T_fr 1, T_to 1, age=0, , add link 1140 - 1241 Debug: Jan 2 01:40:36 res 2, cc4e.248b.77b0 new_id 0 pe_id 19 358 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug stack pe topo debug stack pe topo Indicates Port Extender (PE) join requests are being sent to and received on Control Bridge (CB). Syntax debug stack pe topo no debug stack pe topo Modes Privileged EXEC mode Examples device# debug stack pe topo 3 Debug: Jan 2 01:39:34 T=1d1h39m16.9: LLDP join: fr u2 4 to c0, nbr=0, p_cb=2/1/5, V21 1, 224B, M=53F450 A0A000A, me=cc4e.246c.f190 CB-m=748e.f8f9.6300 0, tp=27 25 b, id=18 0 18 sug=0, op=1 cl=0, D0=2/1 2/2 D1=4/1 , cb-mac=cb pe_me id=18, has p_me u18 i=0 D=0, has pe_cb u2 i_cb=0, pe_up=cb, T_fr 1, T_to 1, age=0, , add link 104 - 11c0 Debug: Jan 2 01:39:34 res 2, cc4e.246c.f190 new_id 0 pe_id 18 Debug: Jan 2 01:39:36 T=1d1h39m19.0: LLDP join: fr u18 40 to 41, nbr=0, p_cb=2/1/5, V21 1, 224B, M=51444D A0A0A0A, me=cc4e.248b.77b0 CB-m=748e.f8f9.6300 0, tp=24 22 b, id=19 0 0 sug=0, op=1 cl=0, D0=2/1 2/2 D1=2/3 , cb-mac=cb pe_me id=19, has p_me u19 i=1 D=0, has pe_up u18 i_up=1 dir=1, T_fr 1, T_to 1, age=0, , add link 1140 - 1241 Debug: Jan 2 01:39:36 res 2, cc4e.248b.77b0 new_id 0 pe_id 19 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 359 debug system campram debug system campram Traces Content Addressable Memory (CAM) or Parallel Random Access Machine (PRAM) operations. Syntax debug system campram no debug system campram Modes Privileged EXEC mode Examples device# debug system campram cam/pram: Trace debugging is on 360 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug system optics debug system optics Activates optical monitor debugging. Syntax debug system optics no debug system optics Modes Privileged EXEC mode Usage Guidelines Examples device# debug system optics optics: Trace debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 361 debug system poll debug system poll Enables backplane polling. Syntax debug system poll no debug system poll Modes Privileged EXEC mode Usage Guidelines Examples device# debug system poll backplane-poll: Trace debugging is on 362 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug web events debug web events Enables web events debugging. Syntax debug web events no debug web events Modes Privileged EXEC mode Examples device# debug web events web: Events debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 363 debug webauth timers debug webauth timers Enables debugging of web authentication timers. Syntax debug webauth timers no debug webauth timers Modes Privileged EXEC mode Examples device# debug webauth timers webauth: Timers debugging is on 364 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 debug webauth events debug webauth events Enables debugging of web authentication events. Syntax debug webauth events no debug webauth events Modes Privileged EXEC mode Usage Guidelines Examples device# debug webauth events webauth: Events debugging is on Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 365 show debug show debug Displays all the enabled debug functions. Syntax show debug Modes User EXEC mode Examples The following example shows that ACL log and IPv6 debugging are enabled, with the console as the output destination. device# show debug Debug message destination: Console Enabling ACL log IPv6 Routing: ipv6: icmp debugging is on 366 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support show tech-support Displays the output of several show commands at once. The output from this command varies depending on the router configuration. Syntax show tech-support [ acl | cluster | cpu | license | l2 | l3 | memory | multicast | packet-loss | stack ] no show tech-support [ acl | cluster | cpu | license | l2 | l3 | memory | multicast | packet-loss | stack ] Parameters acl Generates system and debugging information specific to ACL configurations and counters. cluster Generates system and debugging information specific to cluster configurations. cpu Generates CPU-related information. license Generates license-related information. l2 Generates system and debugging information specific to Layer 2 configurations. l3 Generates system and debugging information specific to Layer 3 configurations. memory Generates memory-related information of the device. multicast Generates system and debugging information specific to Layer 2 and Layer 3 multicast configurations. packet-loss Generates packet statistics-related debugging information. stack Generates system and debugging information specific to stacking configurations. Modes Privileged EXEC mode Usage Guidelines The show tech-support command is useful when collecting a large amount of information about the Brocade FastIron devices for troubleshooting purposes. The output of this command can be used by technical support representatives when a problem is reported. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 367 show tech-support The default output of the show tech-support command includes the following information: • Header for all the show commands • Running configuration • Image version • Port status • Port counters • Static and dynamic log buffers • dm statistics • Boot, monitor, and system • Registers information • Possible stack trace • Active stack (if applicable) • Last packet (Application Data) • Possible data structure • MCT cluster details • License details • Stacking information • Dot1x • DHCP snooping • SSH • System Health The format of the show tech-support command output is modified to include a header and a footer by default for each of the show tech-support commands which gets called from the CLI to automatically parse the output for easier lookup. The header contains the following information: • BEGIN - Indicates a sub-command that will begin execution next. • CONTEXT - Indicates in which context and session the sub-commands are executed. If more than one telnet session and console session for a device is accessed, then show tech-support command displays CONTEXT as Console#0 for console session and telnet#1 and telnet#2 and so on for telnet sessions. • TIME STAMP - A time stamp, with millisecond granularity, helps to determine the time difference between separate runs of the same command. If NTP or local clock is not set in a device, then header displays Epoch time in the TIMESTAMP field. Epoch time is a universal time which starts from Jan 1, 1970. Therefore, for Linux platforms, the Epoch time format is 00:00:00.000 GMT+00 Thu Jan 01 1970. For non-Linux platforms, the Epoch time format is Jan 01 00:00:00.000. • HW/SW INFO - Indicates the hardware and software version information of the device. The footer contains the following information: • TIME STAMP - A time stamp, with millisecond granularity, helps to determine the time difference between separate runs of the same command. If NTP or local clock is not set in a device, then header displays Epoch time in the TIMESTAMP field. Epoch time is a universal time which starts from Jan 1, 1970. Therefore, for Linux platforms, the Epoch time format is 00:00:00.000 GMT+00 Thu Jan 01 1970. For non-Linux platforms, the Epoch time format is Jan 01 00:00:00.000. 368 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support • END - Indicates the sub-command which has completed execution. • TIME TAKEN - Indicates the total time taken in nanoseconds for the command execution. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 369 show tech-support Examples The following example shows the truncated output of the show tech-support command. device# show tech-support ========================================================================== BEGIN : show tech-support CONTEXT : TELNET#1 : show tech-support TIME STAMP : 01:47:54.763 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== ========================================================================== BEGIN : show running-config CONTEXT : TELNET#1 : CONFIG TIME STAMP : 01:47:54.763 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Current configuration: ! ver 08.0.40b1T213 ! stack unit 1 module 1 icx7250-24-port-management-module module 2 icx7250-sfp-plus-8port-80g-module priority 200 default-ports 1/2/5 1/2/7 stack-trunk 1/2/5 to 1/2/6 stack-trunk 1/2/7 to 1/2/8 stack-port 1/2/5 1/2/7 ... ========================================================================== TIME STAMP : 01:47:55.061 Pacific Wed Dec 09 2015 END : show running-config TIME TAKEN : 148914220 ticks (148914220 nsec) ========================================================================== ========================================================================== BEGIN : show version CONTEXT : TELNET#1 : HW INFO TIME STAMP : 01:47:55.061 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Copyright (c) 1996-2015 Brocade Communications Systems, Inc. All rights reserved. UNIT 1: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1 (22418510 bytes) from Primary spr08040b1.bin SW: Version 08.0.40b1T213 Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002) Compiled on Thu Sep 10 06:30:24 2015 UNIT 2: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1 (22418510 bytes) from Primary spr08040b1.bin SW: Version 08.0.40b1T213 Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002) HW: Stackable ICX7250-24 ========================================================================== UNIT 1: SL 1: ICX7250-24 24-port Management Module Serial #:DUN3245K00N License: ICX7250_L3_SOFT_PACKAGE (LID: fwpIHJKmFFp) License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant P-ASIC 0: type B344, rev 01 Chip BCM56344_A0 ========================================================================== UNIT 1: SL 2: ICX7250-SFP-Plus 8-port 80G Module ========================================================================== UNIT 2: SL 1: ICX7250-24 24-port Management Module Serial #:DUN3245K01W License: ICX7250_L3_SOFT_PACKAGE (LID: fwpIHJKmFGy) License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant ========================================================================== UNIT 2: SL 2: ICX7250-SFP-Plus 8-port 80G Module ========================================================================== 1000 MHz ARM processor ARMv7 88 MHz bus 8192 KB boot flash memory 370 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support 2048 MB code flash memory 2048 MB DRAM STACKID 1 system uptime is 1 day(s) 10 hour(s) 41 minute(s) 57 second(s) STACKID 2 system uptime is 1 day(s) 10 hour(s) 41 minute(s) 53 second(s) The system started at 15:14:06 Pacific Mon Dec 07 2015 The system : started=warm start reloaded=by "reload" My stack unit ID = 1, bootup role = active *** NOT FOR PRODUCTION *** ========================================================================== TIME STAMP : 01:47:55.065 Pacific Wed Dec 09 2015 END : show version TIME TAKEN : 2038801 ticks (2038801 nsec) ========================================================================== ========================================================================== BEGIN : show interfaces brief CONTEXT : TELNET#1 : PORT STATUS TIME STAMP : 01:47:55.938 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Interface Information for all the ports : Port Link State Dupl Speed Trunk Tag Pvid Pri MAC Name 1/1/1 Down None None None None No 4010 0 cc4e.24b4.88b0 1/1/2 Disable None None None None No 4010 0 cc4e.24b4.88b1 1/1/3 Up Forward Full 1G None Yes N/A 0 cc4e.24b4.88b2 1/1/4 Disable None None None None No 4010 0 cc4e.24b4.88b3 1/1/5 Disable None None None None No 4010 0 cc4e.24b4.88b4 ========================================================================== TIME STAMP : 01:47:55.962 Pacific Wed Dec 09 2015 END : show interfaces brief TIME TAKEN : 12071127 ticks (12071127 nsec) ========================================================================== ========================================================================== BEGIN : show statistics ethernet CONTEXT : TELNET#1 : PACKET COUNTERS TIME STAMP : 01:47:55.986 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Statistics Information for each port : Port Link State Dupl Speed Trunk Tag Pvid Pri MAC Name 1/1/3 Up Forward Full 1G None Yes N/A 0 cc4e.24b4.88b2 Port 1/1/3 Counters: InOctets 52710812588 OutOctets 31386393616 InPkts 623806726 OutPkts 365249013 InBroadcastPkts 0 OutBroadcastPkts 0 InMulticastPkts 623211850 OutMulticastPkts 365249013 InUnicastPkts 0 OutUnicastPkts 0 InBadPkts 0 InFragments 0 InDiscards 0 OutErrors 0 CRC 0 Collisions 0 InErrors 0 LateCollisions 0 InGiantPkts 0 InShortPkts 0 InJabber 0 OutDiscards 3242924084 InFlowCtrlPkts 0 OutFlowCtrlPkts 0 InBitsPerSec 2872 OutBitsPerSec 160 InPktsPerSec 5 OutPktsPerSec 0 InUtilization 0.00% OutUtilization 0.00% ========================================================================== TIME STAMP : 01:47:56.413 Pacific Wed Dec 09 2015 END : show statistics ethernet TIME TAKEN : 213778306 ticks (213778306 nsec) ========================================================================== ========================================================================== BEGIN : show logging CONTEXT : TELNET#1 : STATIC/DYNAMIC LOG TIME STAMP : 01:47:55.089 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 371 show tech-support ========================================================================== Syslog logging: enabled ( 0 messages dropped, 1 flushes, 540 overruns) Buffer logging: level ACDMEINW, 1000 messages logged level code: A=alert C=critical D=debugging M=emergency E=error I=informational N=notification W=warning Static Dec 7 Dec 2 Dec 7 Dec 7 Log Buffer: 23:06:21:I:System: 18:27:47:A:System: 15:06:44:I:System: 15:06:44:A:System: Stack Stack Stack Stack unit unit unit unit 1 1 2 2 PS PS PS PS 1, 2, 1, 2, Internal Power supply is up Standby Power supply is down Internal Power supply is up Standby Power supply is down Dynamic Log Buffer (1000 lines): Dec 9 01:46:02:W:IGMP: [ Port 1/2/4 ] v1570. Query version mismatch. Received query version 2 from 157.0.0.151; Port version 3. Dec 9 01:43:55:W:IGMP: [ Port 1/2/4 ] v1570. Query version mismatch. Received query version 2 from 157.0.0.151; Port version 3. ... (output truncated) You can disable the display of the header and footer for show tech-support commands by using the supportsave info disable command. If disabled, you can enable the display of the header and footer for show tech-support commands by using the supportsave info enable command. The following sample output of the show tech-support license command shows the header and footer displayed. device# supportsave info enable device# show tech-support license ========================================================================== BEGIN : show license CONTEXT : CONSOLE#0 : LICENSE TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7750-48C/SWR08040q078 ========================================================================== License Information =================== License record empty ========================================================================== TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015 END : show license TIME TAKEN : 1459 ticks (61278 nsec) ========================================================================== 372 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support acl show tech-support acl Displays debugging information related to ACL configuration and counters. Syntax show tech-support acl Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 373 show tech-support acl Examples device# show tech-support acl ========================================================================== BEGIN : show access-list all CONTEXT : CONSOLE#0 : ACL CONFIG TIME STAMP : 01:30:57.002 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7750-48C/SWR08040q078 ========================================================================== ACL Config Information. ipv6 access-list Pimv6-anycast-rp-set-vrf-DC-NMCT: 6 entries permit ipv6 host 121::121 any permit ipv6 host 50::50 any permit ipv6 host 51::51 any permit ipv6 host 122::122 any permit ipv6 host 150::150 any permit ipv6 host 151::151 any Standard IP access list Pim-anycast-rp-set-vrf-DC-NMCT : 6 entry permit host 50.50.50.50 permit host 51.51.51.51 permit host 122.122.122.122 permit host 150.150.150.150 permit host 151.151.151.151 permit host 121.121.121.121 ========================================================================== TIME STAMP : 01:30:57.003 Pacific Wed Dec 09 2015 END : show access-list all TIME TAKEN : 4561 ticks (191562 nsec) ========================================================================== ========================================================================== BEGIN : show acl-on-arp CONTEXT : CONSOLE#0 : ARP ACL FILTERING TIME STAMP : 01:30:57.003 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7750-48C/SWR08040q078 ========================================================================== ACL-ON-ARP list information Port ACL ID Filter Count ========================================================================== TIME STAMP : 01:30:57.003 Pacific Wed Dec 09 2015 END : show acl-on-arp TIME TAKEN : 1920 ticks (80640 nsec) ========================================================================== ========================================================================== BEGIN : show access-list accounting CONTEXT : CONSOLE#0 : ACL ACCOUNTING INFO TIME STAMP : 01:30:57.107 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7750-48C/SWR08040q078 ========================================================================== ACL Accounting Information ========================================================================== TIME STAMP : 01:30:57.108 Pacific Wed Dec 09 2015 END : show access-list accounting TIME TAKEN : 1464 ticks (61488 nsec) ========================================================================== 374 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support cluster show tech-support cluster Collects and displays complete debugging information related to Multi-Chassis Trunking (MCT) cluster configuration. Syntax show tech-support packet-loss Modes Privileged EXEC mode Usage Guidelines The show tech-support cluster command output includes the output of the show cluster and the show cluster ccp peer detail commands. The show tech-support cluster command output displays the following information: • Cluster configuration • Spanning Tree Protocol (STP), if configured • Rapid Spanning Tree Protocol (RSTP), if configured • Peer details • Cluster Communication Protocol (CCP) • Last reason for CCP down • Inter-Chassis Link (ICL) • MCT client • Transmission Control Protocol (TCP) connection Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 375 show tech-support cluster Examples The following example displays sample output from the show tech-support cluster command. device# show tech-support cluster ========================================================================== BEGIN : show running config cluster CONTEXT : CONSOLE#0 : CLUSTER CONFIG TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002 HW/SW INFO : ICX7750-26Q/SWR08050b468 ========================================================================== Cluster Information : cluster s3 3 ! ========================================================================== TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002 END : show running config cluster TIME TAKEN : 7813 ticks (328146 nsec) ========================================================================== ========================================================================== BEGIN : show cluster CONTEXT : CONSOLE#0 : CLUSTER,STP,RSTP TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002 HW/SW INFO : ICX7750-26Q/SWR08050b468 ========================================================================== Cluster s3 3 ============ Rbridge Id: 0, Session Vlan: 0 Cluster State: Undeploy Client Isolation Mode: Loose Member Vlan Range: L2 VLAN 5 are members of single spanning tree. L2 VLAN 5 are members of single spanning tree. ========================================================================== TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002 END : show cluster TIME TAKEN : 3052 ticks (128184 nsec) ========================================================================== ========================================================================== BEGIN : show ccp peer detail CONTEXT : CONSOLE#0 : CLUSTER CCP PEER DETAILS TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002 HW/SW INFO : ICX7750-26Q/SWR08050b468 ========================================================================== No Cluster Configured ========================================================================== TIME STAMP : 20:21:18.142 GMT+00 Wed Apr 17 2002 END : show ccp peer detail TIME TAKEN : 367 ticks (15414 nsec) ========================================================================== History 376 Release version Command history Release 08.0.00a The show tech-support command was enhanced to display MCT cluster configuration information. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support cpu show tech-support cpu Displays debugging information related to CPU usage and utilization. Syntax show tech-support cpu Modes Privileged EXEC mode Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 377 show tech-support cpu Examples device# show tech-support cpu ========================================================================== BEGIN : show cpu tasks CONTEXT : CONSOLE#0 : CPU/TASK TIME STAMP : 01:32:44.334 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7750-48F/SWR08040q078 ========================================================================== CPU Usage Information ... Usage average for all tasks in the last 1 second ... ========================================================== Name % SigHdlrTsk OsTsk TimerTsk FlashTsk MainTsk MportPollTsk IntrTsk stkKeepAlive keygen itc bcmDPC bcmINTR socdmadesc.0 bcmCNTR.0 bcmRX bcmL2MOD.0 scp appl snms rtm rtm6 rip bgp bgp_io ospf ospf_r_calc openflow_ofm openflow_opm mcast_fwd mcast msdp ripng ospf6 ospf6_rt mcast6 ipsec dhcp6 mecid snmp rmon web acl spx flexauth adm_tm ntp rconsole console ospf_msg_task auxTsk exUSBHotpluggerTsk bcmLINK.0 0 0 0 0 0 0 0 0 0 0 0 4 0 0 2 0 0 80 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 5 CPU Utilization information. appl-task pid 1054 tid 0x55363330 cpu usage 80% console-task pid 1084 tid 0x55b5d330 cpu usage 0% flash-task pid 1039 tid 0x48da1330 cpu usage 0% 378 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support cpu sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0% itc-task pid 1045 tid 0x48f41330 cpu usage 0% loop cnt: 1658124015 1658223655 -> 99640 read cnt: 59419971 59420144 -> 173 loop rate = 99640/10 = 9964 rcode_old = 100 - (100*9964/11250) = 12 rcode_log2= 100-(100*log2(9964)/log2(11250))=1 1/100 busy, from 35127 sec ago appl-task pid 1054 tid 0x55363330 cpu usage 80% console-task pid 1084 tid 0x55b5d330 cpu usage 0% flash-task pid 1039 tid 0x48da1330 cpu usage 0% sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0% itc-task pid 1045 tid 0x48f41330 cpu usage 0% loop cnt: 1658124015 1658223655 -> 99640 read cnt: 59419971 59420144 -> 173 loop rate = 99640/10 = 9964 rcode_old = 100 - (100*9964/11250) = 12 rcode_log2= 100-(100*log2(9964)/log2(11250))=1 1/100 busy, from 0 sec ago appl-task pid 1054 tid 0x55363330 cpu usage 80% console-task pid 1084 tid 0x55b5d330 cpu usage 0% flash-task pid 1039 tid 0x48da1330 cpu usage 0% sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0% itc-task pid 1045 tid 0x48f41330 cpu usage 0% loop cnt: 1658124015 1658223655 -> 99640 read cnt: 59419971 59420144 -> 173 loop rate = 99640/10 = 9964 rcode_old = 100 - (100*9964/11250) = 12 rcode_log2= 100-(100*log2(9964)/log2(11250))=1 1/100 busy, from 0 sec ago appl-task pid 1054 tid 0x55363330 cpu usage 80% console-task pid 1084 tid 0x55b5d330 cpu usage 0% flash-task pid 1039 tid 0x48da1330 cpu usage 0% sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0% itc-task pid 1045 tid 0x48f41330 cpu usage 0% loop cnt: 1658124015 1658223655 -> 99640 read cnt: 59419971 59420144 -> 173 loop rate = 99640/10 = 9964 rcode_old = 100 - (100*9964/11250) = 12 rcode_log2= 100-(100*log2(9964)/log2(11250))=1 1/100 busy, from 0 sec ago appl-task pid 1054 tid 0x55363330 cpu usage 80% console-task pid 1084 tid 0x55b5d330 cpu usage 0% flash-task pid 1039 tid 0x48da1330 cpu usage 0% sys-tmr-task pid 1038 tid 0x48d81330 cpu usage 0% itc-task pid 1045 tid 0x48f41330 cpu usage 0% loop cnt: 1658124015 1658223655 -> 99640 read cnt: 59419971 59420144 -> 173 loop rate = 99640/10 = 9964 rcode_old = 100 - (100*9964/11250) = 12 rcode_log2= 100-(100*log2(9964)/log2(11250))=1 1/100 busy, from 0 sec ago ========================================================================== TIME STAMP : 01:32:44.335 Pacific Wed Dec 09 2015 END : show cpu tasks TIME TAKEN : 9270 ticks (389340 nsec) ========================================================================== Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 379 show tech-support l2 show tech-support l2 Displays debugging information related to Layer 2 configurations. Syntax show tech-support l2 Modes Privileged EXEC mode Usage Guidelines This command displays the following debugging information related to Layer 2 configurations: 380 • Interface status • Virtual Local Area Network (VLAN) configuration • Private VLAN • Spanning tree and 802.1W spanning tree • Per VLAN Spanning Tree Plus (PVST+) • Bridge Protocol Data Unit (BPDU) Guard and STP root protection • VLAN topology group • Link aggregation configuration • Media Access Control (MAC) table • Dot1x port security • MAC security • Metro Ring Protocol (MRP) • Virtual Switch Redundancy Protocol (VSRP) • Interface statistics Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support l2 Examples The following example shows the truncated output of the show tech-support l2 command. device# show tech-support l2 ========================================================================== BEGIN : show version CONTEXT : TELNET#1 : HW INFO TIME STAMP : 01:37:44.217 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Copyright (c) 1996-2015 Brocade Communications Systems, Inc. All rights reserved. UNIT 1: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1 (22418510 bytes) from Primary spr08040b1.bin SW: Version 08.0.40b1T213 Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002) Compiled on Thu Sep 10 06:30:24 2015 UNIT 2: compiled on Dec 3 2015 at 16:12:49 labeled as SPR08040b1 (22418510 bytes) from Primary spr08040b1.bin SW: Version 08.0.40b1T213 Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 (spz10106b002) HW: Stackable ICX7250-24 ========================================================================== UNIT 1: SL 1: ICX7250-24 24-port Management Module Serial #:DUN3245K00N License: ICX7250_L3_SOFT_PACKAGE (LID: fwpIHJKmFFp) License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant P-ASIC 0: type B344, rev 01 Chip BCM56344_A0 ========================================================================== UNIT 1: SL 2: ICX7250-SFP-Plus 8-port 80G Module ========================================================================== UNIT 2: SL 1: ICX7250-24 24-port Management Module Serial #:DUN3245K01W License: ICX7250_L3_SOFT_PACKAGE (LID: fwpIHJKmFGy) License Compliance: ICX7250-PREM-LIC-SW is Non-Compliant ========================================================================== UNIT 2: SL 2: ICX7250-SFP-Plus 8-port 80G Module ========================================================================== 1000 MHz ARM processor ARMv7 88 MHz bus 8192 KB boot flash memory 2048 MB code flash memory 2048 MB DRAM STACKID 1 system uptime is 1 day(s) 10 hour(s) 31 minute(s) 46 second(s) STACKID 2 system uptime is 1 day(s) 10 hour(s) 31 minute(s) 42 second(s) The system started at 15:14:06 Pacific Mon Dec 07 2015 The system : started=warm start reloaded=by "reload" My stack unit ID = 1, bootup role = active *** NOT FOR PRODUCTION *** ========================================================================== TIME STAMP : 01:37:44.222 Pacific Wed Dec 09 2015 END : show version TIME TAKEN : 2477201 ticks (2477201 nsec) ========================================================================== ... ========================================================================== BEGIN : show vlan CONTEXT : TELNET#1 : VLAN INFO TIME STAMP : 01:37:45.486 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== VLAN Brief Summary Information : System-max vlan Params: Max(4095) Default(64) Current(4000) Default vlan Id :4010 Total Number of Vlan Configured :118 VLANs Configured :500 to 503 520 to 552 581 to 590 601 to 604 620 to 652 701 to 703 751 to 752 1001 to 1025 1560 1570 3680 4010 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 381 show tech-support l2 ========================================================================== TIME STAMP : 01:37:45.486 Pacific Wed Dec 09 2015 END : show vlan TIME TAKEN : 256660 ticks (256660 nsec) ========================================================================== ========================================================================== BEGIN : show pvlan CONTEXT : TELNET#1 : PVLAN INFO TIME STAMP : 01:37:45.487 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Private VLAN Information : ========================================================================== TIME STAMP : 01:37:45.487 Pacific Wed Dec 09 2015 END : show pvlan TIME TAKEN : 89856 ticks (89856 nsec) ========================================================================== ========================================================================== BEGIN : show span detail CONTEXT : TELNET#1 : STP INFO TIME STAMP : 01:37:45.516 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Spanning Tree Information : Spanning-tree is not configured on port-vlan 4010 STP instance owned by VLAN 500 Global STP (IEEE 802.1D) Parameters: VLAN Root ID ID Root Root Cost Port 500 8000001bedb5bb40 6 Prio rity Hex 8000 1/2/1 Max Age sec 20 Hello sec 2 Hold sec 1 Fwd dly sec 15 Last Chang sec 29533 Chg Bridge cnt Address 175 cc4e24b488b0 Port STP Parameters: Port Num 1/1/3 1/1/7 1/1/9 1/1/11 1/1/13 1/1/15 1/1/17 1/1/21 1/2/1 1/2/4 2/1/3 2/1/7 2/1/9 2/1/11 2/1/13 2/1/15 2/1/17 2/1/21 2/2/1 2/2/4 Prio rity Hex 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 80 Path Cost State Fwd Trans Design Cost Designated Root Designated Bridge 4 4 0 4 0 4 0 0 2 2 0 0 0 0 0 0 0 0 2 2 BLOCKING BLOCKING DISABLED BLOCKING DISABLED BLOCKING DISABLED DISABLED FORWARDING BLOCKING DISABLED DISABLED DISABLED DISABLED DISABLED DISABLED DISABLED DISABLED FORWARDING BLOCKING 9 14 0 9 0 15 0 0 10 14 0 0 0 0 0 0 0 0 10 14 4 4 0 4 0 4 0 0 4 4 0 0 0 0 0 0 0 0 4 4 8000001bedb5bb40 8000001bedb5bb40 0000000000000000 8000001bedb5bb40 0000000000000000 8000001bedb5bb40 0000000000000000 0000000000000000 8000001bedb5bb40 8000001bedb5bb40 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 8000001bedb5bb40 8000001bedb5bb40 8000cc4e246dbc80 8000cc4e24705580 0000000000000000 8000cc4e246dbc80 0000000000000000 8000cc4e24705580 0000000000000000 0000000000000000 8000cc4e246dbc80 8000cc4e24705580 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 8000cc4e246dbc80 8000cc4e24705580 STP instance owned by VLAN 501 .. (output truncated) 382 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support l3 ipv4-uc show tech-support l3 ipv4-uc Displays debugging information related to Layer 3 IPv4 unicast configurations. Syntax show tech-support l3 ipv4-uc Modes Privileged EXEC mode Usage Guidelines This command displays the following debugging information related to Layer 3 IPv4 unicast configurations: • IPv4 routing table • IPv4 interface • Routing Information Protocol (RIP) routes and neighbors • Border Gateway Protocol (BGP) routes and neighbors • Open Shortest Path First Version 2 (OSPFv2) routes and neighbors Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 383 show tech-support l3 ipv4-uc Examples The following example shows the truncated output of the show tech-support l3 ipv4-uc command. device# show tech-support l3 ipv4-uc ========================================================================== BEGIN : show running-config CONTEXT : TELNET#1 : CONFIG TIME STAMP : 01:39:18.254 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Current configuration: ! ver 08.0.40b1T213 ! stack unit 1 module 1 icx7250-24-port-management-module module 2 icx7250-sfp-plus-8port-80g-module priority 200 default-ports 1/2/5 1/2/7 stack-trunk 1/2/5 to 1/2/6 stack-trunk 1/2/7 to 1/2/8 stack-port 1/2/5 1/2/7 stack unit 2 module 1 icx7250-24-port-management-module module 2 icx7250-sfp-plus-8port-80g-module priority 128 default-ports 2/2/5 2/2/7 stack-trunk 2/2/5 to 2/2/6 stack-trunk 2/2/7 to 2/2/8 stack-port 2/2/5 2/2/7 stack enable stack rconsole-off stack mac cc4e.24b4.88b0 ! ! global-stp ! lag CB-BR1-150 dynamic id 10 ports ethernet 1/2/1 ethernet 2/2/1 primary-port 1/2/1 deploy monitor ethe-port-monitored 1/2/1 ethe 1/2/3 output monitor ethe-port-monitored 2/2/1 ethe 1/2/3 output ! lag CB-BR2-151 dynamic id 11 ports ethernet 1/2/4 ethernet 2/2/4 primary-port 1/2/4 deploy ! ! ! vlan 500 name all-access-aggregate-STP by port tagged ethe 1/1/3 ethe 1/1/7 ethe 1/1/9 ethe 1/1/11 ethe 1/1/13 ethe 1/1/15 ethe 1/1/17 ethe 1/1/21 ethe 1/2/1 ethe 1/2/4 ethe 2/1/3 ethe 2/1/7 ethe 2/1/9 ethe 2/1/11 ethe 2/1/13 ethe 2/1/15 ethe 2/1/17 ethe 2/1/21 ethe 2/2/1 ethe 2/2/4 spanning-tree multicast passive multicast6 passive ! ========================================================================== BEGIN : ospf summary CONTEXT : TELNET#1 : OSPF TIME STAMP : 01:39:19.520 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== OSPF summary -----------Total number of OSPF instances: 1 Seq Instance 384 Intfs Nbrs Nbrs-Full LSAs Routes Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support l3 ipv4-uc 1 default-vrf 3 3 3 2813 2519 OSPF Information for VRF default-vrf --------------------------------Number of Areas is 2 Indx Area 1 300 2 0 Type Cost normal 0 normal 0 SPFR 1356 1356 ABR 2 0 ASBR 22 0 LSA 519 0 Chksum(Hex) 0102f3e9 0 Link States Index Area ID Type LS ID Adv Rtr Seq(Hex) Age Cksum 1 300 Rtr 0.0.0.170 0.0.0.170 80000039 691 0x06ce 2 300 Rtr 36.61.0.10 36.61.0.10 800001ec 1024 0xf62c 3 300 Rtr 0.0.0.162 0.0.0.162 8000394d 1820 0x7f44 4 300 Rtr 0.0.0.167 0.0.0.167 8000c532 624 0xe0c6 ... ========================================================================== BEGIN : rip summary CONTEXT : TELNET#1 : RIP TIME STAMP : 01:39:23.264 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== SyncState Done Done Done Done RIP Information for Default VRF ------------------------------========================================================================== TIME STAMP : 01:39:23.264 Pacific Wed Dec 09 2015 END : rip summary TIME TAKEN : 129728 ticks (129728 nsec) ========================================================================== .. (output truncated) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 385 show tech-support l3 ipv6-uc show tech-support l3 ipv6-uc Displays debugging information related to Layer 3 IPv6 unicast configurations. Syntax show tech-support l3 ipv6-uc Modes Privileged EXEC mode Usage Guidelines This command displays the following debugging information related to Layer 3 IPv6 unicast configurations: 386 • IPv6 routing table • IPv6 interface • IPv6 neighbor • OSPF Version 3 (OSPFv3) neighbors Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support l3 ipv6-uc Examples The following example shows the truncated output of the show tech-support l3 ipv6-uc command. device# show tech-support l3 ipv6-uc ========================================================================== BEGIN : show running-config CONTEXT : TELNET#1 : CONFIG TIME STAMP : 01:40:52.018 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Current configuration: ! ver 08.0.40b1T213 ! stack unit 1 module 1 icx7250-24-port-management-module module 2 icx7250-sfp-plus-8port-80g-module priority 200 default-ports 1/2/5 1/2/7 stack-trunk 1/2/5 to 1/2/6 stack-trunk 1/2/7 to 1/2/8 stack-port 1/2/5 1/2/7 stack unit 2 module 1 icx7250-24-port-management-module module 2 icx7250-sfp-plus-8port-80g-module priority 128 default-ports 2/2/5 2/2/7 stack-trunk 2/2/5 to 2/2/6 stack-trunk 2/2/7 to 2/2/8 stack-port 2/2/5 2/2/7 stack enable stack rconsole-off stack mac cc4e.24b4.88b0 ! ! global-stp ! ... ========================================================================== BEGIN : unicast ip summary CONTEXT : TELNET#1 : UCAST IPv6 INFO TIME STAMP : 01:40:53.519 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== IPV6 Interfaces: ---------------Routing Protocols : R - RIP O - OSPF Interface Status Routing Global Unicast Address Ve 1560 up/up O 156::171/64 Ve 1570 up/up O 157::171/64 Ve 3680 up/up O 36:80::171/64 Loopback 1 up/up 112:112:112::171/128 VRF default-vrf default-vrf default-vrf default-vrf IPV6 Routing Summary: --------------------IPv6 Routing Table - 476 entries: 4 connected, 0 static, 0 RIP, 472 OSPF, 0 BGP Number of prefixes: /64:423 /80:50 /128:3 IPV6 Routing Table: ------------------IPv6 Routing Table - 476 entries: Type Codes - B:BGP C:Connected L:Local O:OSPF R:RIP S:Static BGP Codes - i:iBGP e:eBGP OSPF Codes - i:Inter Area 1:External Type 1 2:External Type 2 STATIC Codes - d:DHCPv6 Type IPv6 Prefix Next Hop Router Interface Dis/Metric O 26:66::/64 fe80::ce4e:24ff:fe70:5580 ve 1570 110/2 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 Uptime 8h14m 387 show tech-support l3 ipv6-uc O2 35:81::/64 fe80::ce4e:24ff:fe6d:bc80 ve 1560 110/0 8h14m fe80::ce4e:24ff:fe70:5580 ve 1570 Oi 36:1::/64 fe80::ce4e:24ff:fe6d:bc80 ve 1560 110/3 7h42m fe80::ce4e:24ff:fe70:5580 ve 1570 ========================================================================== BEGIN : ospfv3 summary CONTEXT : TELNET#1 : OSPFv3 TIME STAMP : 01:40:53.524 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== OSPFV3 summary -------------Total number of IPv6 OSPF instances: 1 Seq Instance Intfs Nbrs Nbrs-Full LSAs Routes 1 default-vrf 3 3 3 566 475 IPV6 OSPF Memory: ---------------Total Dynamic Memory Allocated for this instance : 4368351 Memory Type Size Allocated Max-alloc MTYPE_OSPF6_AREA 471191 2 4 MTYPE_OSPF6_AREA_RANGE 29 0 16 MTYPE_OSPF6_SUMMARY_ADDRE 25 0 16 MTYPE_OSPF6_IF 280 3 64 MTYPE_OSPF6_NEIGHBOR 12502 3 32 MTYPE_OSPF6_ROUTE_NODE 21 496 4096 MTYPE_OSPF6_ROUTE_INFO 35 496 4096 MTYPE_OSPF6_PREFIX 20 0 16 MTYPE_OSPF6_LSA 129 566 4096 MTYPE_OSPF6_VERTEX 166 21 64 MTYPE_OSPF6_SPFTREE 44 2 2 MTYPE_OSPF6_NEXTHOP 28 7 256 MTYPE_OSPF6_EXTERNAL_INFO 40 0 4096 MTYPE_THREAD 32 35 1024 MTYPE_OSPF6_LINK_LIST 20 12617 20480 MTYPE_OSPF6_LINK_NODE 12 1827 20480 MTYPE_OSPF6_LSA_RETRANSMI 6 0 8192 global memory pool for all instances Memory Type Size Allocated Max-alloc MTYPE_OSPF6_TOP 61475 1 1 MTYPE_OSPF6_LSA_HDR 120 566 970 MTYPE_OSPF6_RMAP_COMPILED 0 0 0 MTYPE_OSPF6_OTHER 0 0 0 MTYPE_THREAD_MASTER 84 1 1 OSPFV3 Information for VRF default-vrf ------------------------------------Area 300: Authentication: Not Configured Active interface(s)attached to this area: ve 1560 Inactive interface(s)attached to this area: None Number of Area scoped LSAs is 108 Sum of Area LSAs Checksum is 39f394 Statistics of Area 300: SPF algorithm executed 452 times SPF last updated: 27731 sec ago Current SPF node count: 21 Router: 10 Network: 11 Maximum of Hop count to nodes: 5 ve 1570 bytes Alloc-Fails 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Alloc-Fails 0 0 0 0 0 ve 3680 LSA Key - Rtr:Router Net:Network Inap:InterPrefix Inar:InterRouter Extn:ASExternal Grp:GroupMembership Typ7:Type7 Link:Link Iap:IntraPrefix Grc:Grace Area ID 300 300 300 388 Type Link Link Link LSID 3073 14374 14374 Adv Rtr 0.0.0.171 0.0.0.150 0.0.0.151 Seq(Hex) 80000036 8000002a 8000000f Age 1412 1407 1584 Cksum 9065 60a8 7115 Len 56 56 56 Sync Yes Yes Yes Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support l3 ipv6-uc 300 Link 3074 0.0.0.171 80000010 935 f227 56 Yes 300 Link 1 61.163.0.1 800001b7 1263 0668 44 Yes 300 Link 3075 0.0.0.171 80000041 696 5435 56 Yes 300 Rtr 0 0.0.0.170 800035e6 1076 afdc 40 Yes 300 Rtr 0 61.163.0.1 80000293 1089 23be 40 Yes 300 Rtr 0 0.0.0.162 80001dfd 1753 b01f 72 Yes ========================================================================== BEGIN : ripng summary CONTEXT : TELNET#1 : RIPng TIME STAMP : 01:40:55.560 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== IPV6 RIP Route: --------------IPv6 RIP Routing Table is empty! ========================================================================== TIME STAMP : 01:40:55.560 Pacific Wed Dec 09 2015 END : ripng summary TIME TAKEN : 49491 ticks (49491 nsec) ========================================================================== .. (output truncated) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 389 show tech-support license show tech-support license Displays information about the license installed on the device. Syntax show tech-support license Modes Privileged EXEC mode Usage Guidelines The show tech-support license command output includes the following information: • License name • License ID • License type • Status of license • License period • License capacity Examples The following example displays sample output from the show tech-support license command. device# show tech-support license ========================================================================== BEGIN : show license CONTEXT : CONSOLE#0 : LICENSE TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7750-48C/SWR08040q078 ========================================================================== License Information =================== License record empty ========================================================================== TIME STAMP : 01:30:20.093 Pacific Wed Dec 09 2015 END : show license TIME TAKEN : 1459 ticks (61278 nsec) ========================================================================== History 390 Release version Command history Release 08.0.00a This command was enhanced to display license information. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support memory show tech-support memory Displays debugging information related to memory usage and tracking. Syntax show tech-support memory Modes Privileged EXEC mode Examples device# show tech-support memory ========================================================================== BEGIN : show memory CONTEXT : TELNET#1 : DRAM TIME STAMP : 01:44:00.571 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== MEMORY Related Information : Stack unit 1: Total DRAM: 2147483648 bytes Dynamic memory: 2095140864 bytes total, 1533177856 bytes free, 26% used Stack unit 2: Total DRAM: 2147483648 bytes Dynamic memory: 2095140864 bytes total, 1547497472 bytes free, 26% used FLASH Related Information : Stack unit 1: Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin) Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin) Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 Code Flash Free Space = 1825419264 Stack unit 2: Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin) Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin) Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 Code Flash Free Space = 1766633472 ========================================================================== TIME STAMP : 01:44:00.595 Pacific Wed Dec 09 2015 END : show memory TIME TAKEN : 12207868 ticks (12207868 nsec) ========================================================================== Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 391 show tech-support multicast show tech-support multicast Displays debugging information specific to Layer 2 and Layer 3 multicast configurations. Syntax show tech-support multicast Modes Privileged EXEC mode Usage Guidelines This command displays the following debugging information specific to Layer 2 and Layer 3 multicast configurations: 392 • Multicast VLAN • Multicast table • Multicast counters • Internet Group Management Protocol (IGMP) group • Protocol Independent Multicast (PIM) neighbor • IP Multicast routing table Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support multicast Examples The show tech-support multicast command output resembles the following example. device# show tech-support multicast ========================================================================== BEGIN : show running-config CONTEXT : TELNET#1 : CONFIG TIME STAMP : 01:44:36.149 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== ... ========================================================================== BEGIN : show ip multicast vlan CONTEXT : TELNET#1 : MCAST VLAN INFO TIME STAMP : 01:44:37.536 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Multicast VLAN information -------------------------Summary of all vlans. Please use "sh ip mu vlan " for details Version=2, Intervals: Query=125, Group Age=260, Max Resp=10, Other Qr=255 Replication resource sharing: Enabled. VL500: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports, router ports: e1/2/1(240) 102.102.102.102, VL501: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports, router ports: e2/2/4(200) 100.100.100.100, VL502: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports, router ports: e2/2/4(200) 100.100.100.100, VL503: dft V2, vlan cfg passive, 0 grp, 0 (*G) cache, rtr ports, router ports: e2/2/4(200) 100.100.100.100, VL520 no snoop: no global or local config VL521 no snoop: no global or local config VL522 no snoop: no global or local config VL523 no snoop: no global or local config VL524 no snoop: no global or local config ========================================================================== TIME STAMP : 01:44:37.638 Pacific Wed Dec 09 2015 END : show ip multicast vlan TIME TAKEN : 50747990 ticks (50747990 nsec) ========================================================================== ========================================================================== BEGIN : show ip multicast group CONTEXT : TELNET#1 : MCAST GROUP TIME STAMP : 01:44:37.638 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Multicast Group Table information --------------------------------VL603 : 100 groups, 100 group-port group p-port ST QR life mode source 1 229.20.10.100 e2/1/14 no no 220 EX 0 2 229.20.10.99 e2/1/14 no no 220 EX 0 3 229.20.10.98 e2/1/14 no no 220 EX 0 4 229.20.10.97 e2/1/14 no no 220 EX 0 5 229.20.10.96 e2/1/14 no no 220 EX 0 6 229.20.10.95 e2/1/14 no no 220 EX 0 7 229.20.10.94 e2/1/14 no no 220 EX 0 8 229.20.10.93 e2/1/14 no no 220 EX 0 9 229.20.10.92 e2/1/14 no no 220 EX 0 10 229.20.10.91 e2/1/14 no no 220 EX 0 11 229.20.10.90 e2/1/14 no no 220 EX 0 ========================================================================== TIME STAMP : 01:44:38.592 Pacific Wed Dec 09 2015 END : show ip multicast group TIME TAKEN : 477008236 ticks (477008236 nsec) ========================================================================== ========================================================================== BEGIN : show ip multicast mcache CONTEXT : TELNET#1 : MCAST FORWADING CACHE Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 393 show tech-support multicast TIME STAMP : 01:44:38.592 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Multicast Cache information --------------------------Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt is number of SW processed packets OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output vlan 500, 0 cache vlan 501, 0 cache vlan 502, 0 cache vlan 503, 0 cache vlan 551, 0 cache vlan 552, 0 cache vlan 601, 0 cache vlan 602, 0 cache vlan 603, 500 caches. 1 (* 229.44.14.87) cnt=0 OIF: tag TR(e1/2/1) age=158s up-time=339s, change=75s ipmc=178 (ref-cnt=1) 2 (* 229.43.13.11) cnt=0 OIF: tag TR(e1/2/1) ... ========================================================================== BEGIN : sh ip multicast pimsm-snooping CONTEXT : TELNET#1 : MCAST PIM SM TIME STAMP : 01:44:40.967 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Multicast PIM-SM Snooping --------------------------------OIF Info: TR - OIF Belongs to Trunk/LAG, Primary port is displayed SG - (s,g) downstream fsm state: G - (*,g) downstream fsm state: NI : No Info, J : Join, PP : Prune Pending, CLEAN : cleanup in progress RPT - (s,g,rpt) downstream fsm state: NI : No Info, P : Pruned, PP : Prune Pending, Px : Temp step in (*,G) join processing, PPx : Temp State in (*,G) processing, CLEAN : cleanup in progress. ========================================================================== TIME STAMP : 01:44:40.967 Pacific Wed Dec 09 2015 END : sh ip multicast pimsm-snooping TIME TAKEN : 211008 ticks (211008 nsec) ========================================================================== (output truncated) 394 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 show tech-support packet-loss show tech-support packet-loss Displays packet statistics information that helps in debugging packet loss scenarios. Syntax show tech-support packet-loss Modes Privileged EXEC mode Examples device# show tech-support packet-loss ========================================================================== BEGIN : show tech-support packet-loss CONTEXT : TELNET#1 : PP total Tx stats TIME STAMP : 01:45:57.598 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== PP total stats : Packet drop count due to congestion per egress port Port 1/1/3: Tx packets 365249007 Dropped packets 3242924084 Port 1/1/7: Tx packets 371914450 Dropped packets 3187749769 Port 1/1/11: Tx packets 336059517 Dropped packets 3252545377 Port 1/1/15: Tx packets 418982528 Dropped packets 3301331461 Port 1/2/1*2/2/1: Tx packets 14885841964 Dropped packets 243005328 Port 1/2/3: Tx packets 65260351371 Dropped packets 1634560898 Port 1/2/4*2/2/4: Tx packets 25506560000 Dropped packets 1207903341 Port 1/2/5: Tx packets 18113571571 Dropped packets 4206342598 Port 1/2/6: Tx packets 6101236013 Dropped packets 57932094 Port 1/2/7: Tx packets 11122355161 Dropped packets 4149078862 Port 1/2/8: Tx packets 2464658796 Dropped packets 54877456 Port 2/1/14: Tx packets 13591655185 Dropped packets 42664609120 Port 1/2/1*2/2/1: Tx packets 25329400802 Dropped packets 22875188 Port 1/2/4*2/2/4: Tx packets 8416112242 Dropped packets 956319407 Port 2/2/5: Tx packets 3066065916 Dropped packets 57225285 Port 2/2/6: Tx packets 38759968148 Dropped packets 2714421561 Port 2/2/7: Tx packets 17976224763 Dropped packets 347143512 Port 2/2/8: Tx packets 62674173283 Dropped packets 4287682891 ========================================================================== TIME STAMP : 01:45:57.606 Pacific Wed Dec 09 2015 END : show tech-support packet-loss TIME TAKEN : 4092082 ticks (4092082 nsec) ========================================================================== Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 395 supportsave supportsave Use the supportsave utility for collecting logs from the driver, internal libraries, and firmware. The collected logs are shared with the technical support personnel for investigating issues seen on the device. Syntax supportsave { all | custom | infra | l2 | l3 | os | platform | spx | system } { tftp_server_ IP tftp_ server's_ relative_ path_name [ user_tag ] | display | unit-id unit-number } supportsave core { tftp_server_ IP tftp_ server's_ relative_ path_name [ user_tag ] | unit-id unit-number } supportsave cancel Parameters all Collects all supportsave related log files. core Collects core logs from all devices. custom Executes all commands present in the default and custom commands list and sends the output to the specified TFTP server address. infra Collects stacking related information. l2 Collects Layer 2 related information. l3 Collects Layer 3 related information. os Collects operating system (OS) related information. platform Collects platform related information. spx Collects SPX related information. system Collects all general commands information. tftp_server_ IP Specifies the IP address of the TFTP server. tftp_ server's_ relative_ path_name Specifies the file path name of TFTP server relative to TFTP server's default directory to dump supportsave logs. To specify the default directory itself, use '/'. user_tag Specifies the user tag to be added in the supportsave collected file name. Maximum of 10 characters are allowed. 396 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave display Displays the supportsave information (except the non-textual output like core files) in the console window. unit-id unit-number Collects data from a specific stack or PE unit and the active unit and sends to the TFTP server. If the specified unit-id and the active unit are same, only the active unit data is collected. cancel Cancels supportsave. Modes Privileged EXEC mode Usage Guidelines The supportsave command has the following advantages over the show tech-support command: • Allows you to add additional commands to collect more data. • Allows to transfer the collected data to an external server such as Trivial File Transfer Protocol (TFTP) server. TFTP is disabled by default, if FIPS is enabled. Enable TFTP manually for uploading supportsave data. It is a prerequisite to have the TFTP server with a write permission and the server must be accessible from the device. Use the fips policy allow tftp-access command in configuration mode to enable TFTP access while the FIPS is enabled. Limitations and prerequisites The following are the limitations and pre-requisites of the supportsave utility: • Parallel execution of the supportsave command from two different sessions is not allowed. • Parallel execution of the supportsave command and the copy tftp/scp commands is not allowed. • It is recommended that you do not run any CLIs when supportsave operation is in progress. • Only IPv4 address is supported for the TFTP destination. • Only up to 32 commands can be added to the custom command list. • Commands are not expanded while adding a command to the custom commands list. • Commands added to the custom command list must be privileged EXEC mode MP commands. • It is recommended that you do not add any filters with the commands. • The supportsave command cannot be added to the custom commands list. Also, the commands which change the CLI mode (exit, quit, end) and commands which restart the router (switchover, reload, reload-yes) must not be added. • Modifying the custom commands list using the supportsave add-cmd or supportsave del-cmd commands is not allowed while the supportsave data collection is in progress. • Time taken by the supportsave command depends on the commands present in the list. • The supportsave command does not support collecting crash logs from standby units in a mixed stack. • The filename length including tag string must be less than 32 characters. • The supportsave custom command denies commands other than show commands, dm commands, and fips show command. • Few show output commands are restricted to display only the first page in the console. This restriction is not applicable for sending the supportsave command output through file transfer. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 397 supportsave • Display option is available for modules like l2, l3, platform, system, infra, custom and all. Non-textual output like core files are not displayed in the console. Examples When the display option is enabled, some of the show commands are restricted to display only the first page. However, the tftp_server_IP option, transfers the complete command output to the TFTP server. NOTE Brocade recommends to use all option to collect complete logs. To collect all supportsave related logs, enter the supportsave all command as shown in the following example. device# supportsave all 10.37.2.40 fi/prince/supportsave Supportsave started. This operation may take several minutes. Press "A" to abort supportsave operation. ICX7750-48C Brocade#.***********************................................................. ................................................................................. Supportsave completed in 10 seconds 398 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave (SCP) supportsave (SCP) Collects logs from different modules and uploads the logs into a remote SCP server. Syntax supportsave [ all | cancel | core | custom | info | infra | l2 | l3 | os | platform | spx | system | tag | [ unit-id number | tag ] ] supportsave [ ipv4address ] [ show ] supportsave [ add_cust_cmd_index { decimal_value "string" } ] supportsave [ del_cust_cmd_index { all integer } ] supportsave [ info disable | info enable | list_cust_cmd | show ] Command Default The supportsave functionality is not active. Parameters all Sends all information to the remote SCP server. cancel Cancels the supportsave command operation. core Sends core information to the remote SCP server. custom Sends custom list of information to the remote SCP server. info Displays information about the supportsave command. If info is enabled, then the collected commands contain additional information like BEGIN, CONTEXT, TIME STAMP, HW/SW INFO, and so on. infra Sends infrastructure information to the remote SCP server. l2 Sends Layer 2 information to the remote SCP server. l3 Sends Layer 3 information to the remote SCP server. os Sends Operating System information to the remote SCP server. platform Sends platform information to the remote SCP server. spx Sends Sequenced Packet Exchange (SPX) information to the remote SCP server. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 399 supportsave (SCP) system Sends system information to the remote SCP server. tag Appends a text string to the collected file name on the remote SCP server. unit-id number The unit number can be any ID present in the stack. The unit ID accepts only one integer. The logs are collected from the corresponding unit ID and send it to remote server. show Displays the amount of percentage executed in the currently executing command process. ipv4address Designates the IP address for the remote server. add_cust_cmd index integer Adds the given command at the given index in the custom commands list. If there is already a command present at the index passed, then add operation will fail. string The CLI command which is to be added. There is no default value. integer Index where the command will be added. Valid range 1 to 32. This is a mandatory parameter, with no default value. del_cust_cmd index Deletes the given command at the given index in the custom commands list. If there is already a command present at the index passed, then add operation will fail. all Removes all configured custom commands from the supportsave list. integer Index where the command will be deleted. Valid range 1 to 32. This is a mandatory parameter, with no default value. info disable Disables the header to be displayed for all show commands being executed. info enable Enable the header to be displayed for all show commands being executed. list_cust_cmd Displays the custom command list. Modes Privileged EXEC mode Usage Guidelines The collected logs are shared with the technical support personnel for investigating issues seen on the device. Once the supportsave command is executed, logs are collected and uploaded into the remote SCP server. 400 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave (SCP) Parallel execution of supportsave command from two different sessions is not allowed. Parallel execution of supportsave command and the copy tftp or copy scp commands is not allowed. The supportsave command supports IPv4. A maximum of 32 commands can be added to the custom command list. Commands are not expanded while adding a command to the custom commands list. It is recommended not to add any filters with the commands. Modifying the custom commands list using supportsave add_cust_cmd or supportsave del_cust_cmd is not allowed while supportsave data collection is in progress. Time taken by the supportsave commands depends on the commands present in the list and the distance of SCP server. In order to avoid looping, the supportsave command cannot be added to the custom command list. Also, the commands which changes the CLI mode (exit, quit) and commands which restart the router (switchover, reload) are not accepted. The tag string should be less than 11 characters. The supportsave command uses the outbound SSH session SCP operations are not allowed while supportsave is in progress. Cancelling the supportsave command during the file transfer does not cancel the current file transfer. While cancelling the supportsave command, you must wait for the current file transfer to complete before executing the supportsave command again. Supportsave is not High Availability (HA) aware. The supportsave command aborts when the remote server is terminated. Additionally, when the data is collected from the remote unit, and if the corresponding unit is powered off, the supportsave command is terminated. Use the supportsave cancel command to stop supportsave opertations. Examples Example of supportsave command collecting Layer 3 information. device# supportsave l3 scp 10.xx.xx.104 User name:root Password:Supportsave started. This operation may take several minutes. Press "Shift-A" to abort supportsave operation. asethura#################################################################### Connecting to remote host...... Sending data (8192 bytes per dot) . SCP transfer from device completed Connection Closed Supportsave completed in 1 seconds Example of supportsave command adding a custom command to the fifth position in the index. device# supportsave add_cust_cmd index 5 "host-max-num 512" Example of supportsave command deleting a custom command from the fifth position in the index. device# supportsave del_cust_cmd index 5 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 401 supportsave (SCP) History 402 Release version Command history 08.0.61 This command was introduced. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave add_cust_cmd index supportsave add_cust_cmd index Adds a run-time executable command into the custom module at a particular index of 32 characters long (maximum of 32 characters are allowed) during the run time. Syntax supportsave add_cust_cmd index index_number “cli string” Parameters index_number Specifies the index in the custom commands list where an additional command need to be added. The valid range is from 1 through 32. cli string Specifies the commands to be added to the custom commands list. Modes Privileged EXEC mode Examples device# supportsave add_cust_cmd index 1 "show chassis" Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 403 supportsave del_cust_cmd all supportsave del_cust_cmd all Deletes all the custom module commands. Syntax supportsave del_cust_cmd all Modes Privileged EXEC mode 404 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave del_cust_cmd index supportsave del_cust_cmd index Deletes a command from the custom module at a particular index during the run time. Syntax supportsave del_cust_cmd index index_number Parameters index_number Specifies the index in the custom commands list where an additional command need to be removed. The valid range is from 1 through 32. Modes Privileged EXEC mode Examples device# supportsave add_cust_cmd index 1 "show chassis" Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 405 supportsave info disable supportsave info disable Disables the header to be displayed for all supportsave and show tech-support commands being executed on CLI. Syntax supportsave info disable Modes Privileged EXEC mode 406 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave info enable supportsave info enable display BEGIN headers. Syntax supportsave info enable Modes Privileged EXEC mode Usage Guidelines By default, the supportsave command outputs display BEGIN headers. and show tech-support command outputs display both BEGIN and END headers. The commands under show tech command, which is a part of supportsave output, will have both BEGIN and END headers. You can disable the header display by using the supportsave info disable command. You can use the supportsave info enable command to re-enable the header display. Even if supportsave info enable command is issued, other show commands do not display the headers. The header format is modified to include the following information: • BEGIN - Indicates the command that will begin execution next. • CONTEXT - Indicates in which session the command is executed. If Supportsave command is issued in more than one terminal, the respective terminal information is displayed in the CONTEXT field. • TIME STAMP - A time stamp, with millisecond granularity, helps to determine time difference between separate runs of the same command. If NTP or local clock is not set in a device, then header displays Epoch time in the TIMESTAMP field. Epoch time is a universal time which starts from Jan 1, 1970. Therefore, for Linux platforms, the Epoch time format is 00:00:00.000 GMT+00 Thu Jan 01 1970. For non-Linux platforms, the Epoch time format is Jan 01 00:00:00.000. • HW/SW INFO - Indicates the hardware and software version information of the device. Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 407 supportsave info enable Examples The following sample output of supportsave all display command shows the modified header format. device# supportsave info enable device# supportsave all display Supportsave started. This operation may take several minutes. Press "A" to abort supportsave operation. ========================================================================== BEGIN : show flash CONTEXT : TELNET#1 : show flash TIME STAMP : 01:47:24.377 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Stack unit 1: Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin) Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin) Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 Code Flash Free Space = 1825419264 Stack unit 2: Compressed Pri Code size = 22418510, Version:08.0.40T213 (spr08040b1.bin) Compressed Sec Code size = 24128807, Version:08.0.40qT213 (SPR08040q081.bin) Compressed Boot-Monitor Image size = 786944, Version:10.1.06T215 Code Flash Free Space = 1766633472 telnet@ACC-SICA-171# ===========END OF A COMMAND=========== 104126_000100 ===========show module=========== ========================================================================== BEGIN : show module CONTEXT : TELNET#1 : show module TIME STAMP : 01:47:24.382 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Module Status Ports Starting MAC U1:M1 ICX7250-24 24-port Management Module OK 24 cc4e.24b4.88b0 U1:M2 ICX7250-SFP-Plus 8-port 80G Module OK 8 cc4e.24b4.88b0 U2:M1 ICX7250-24 24-port Management Module OK 24 cc4e.24b4.81f0 U2:M2 ICX7250-SFP-Plus 8-port 80G Module OK 8 cc4e.24b4.88b0 telnet@ACC-SICA-171# ===========END OF A COMMAND=========== 104126_000100 ===========show chassis=========== ========================================================================== BEGIN : show chassis CONTEXT : TELNET#1 : show chassis TIME STAMP : 01:47:24.384 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== The stack unit 1 chassis info: Power supply 1 (AC - Regular) present, status ok Power supply 2 not present Fan ok, speed (auto): [[1]]<->2 Fan controlled temperature: 84.5 deg-C Fan speed switching temperature thresholds: Speed 1: NM<----->98 deg-C Speed 2: 67<----->105 deg-C (shutdown) Fan 1 Air Flow Direction: Front to Back Slot 1 Current Temperature: 84.5 deg-C (Sensor 1) Slot 2 Current Temperature: NA Warning level.......: 100.0 deg-C Shutdown level......: 105.0 deg-C Boot Prom MAC : cc4e.24b4.88b0 Management MAC: cc4e.24b4.88b0 The stack unit 2 chassis info: 408 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave info enable Power supply 1 (AC - Regular) present, status ok Power supply 2 not present Fan ok, speed (auto): [[1]]<->2 Fan controlled temperature: 81.8 deg-C Fan speed switching temperature thresholds: Speed 1: NM<----->98 deg-C Speed 2: 67<----->105 deg-C (shutdown) Fan 1 Air Flow Direction:Front to Back Slot 1 Current Temperature: 82.4 deg-C (Sensor 1) Slot 2 Current Temperature: NA Warning level.......: 100.0 deg-C Shutdown level......: 105.0 deg-C Boot Prom MAC : cc4e.24b4.81f0 ===========END OF A COMMAND=========== 104126_000100 ===========show files=========== ========================================================================== BEGIN : show files CONTEXT : TELNET#1 : show files TIME STAMP : 01:47:24.429 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Type Size Name ---------------------F 22418510 primary F 24128807 secondary F 256 primary.sig F 7138 script.log_000347_000000_SPR08040q017_cc4e.24b4.88b0.txt F 13805 startup-config.backup F 256 bootrom.sig F 393 stacking.boot F 13297 startup-config.old F 13297 startup-config.txt F 94 dhcpsnoop_data F 1576 $$ssh8rsahost.key F 256 secondary.sig 46597685 bytes 12 File(s) in FI root 1825419264 bytes free in FI root telnet@ACC-SICA-171# ===========END OF A COMMAND=========== 104126_000100 ===========show memory=========== ========================================================================== BEGIN : show memory CONTEXT : TELNET#1 : show memory TIME STAMP : 01:47:24.444 Pacific Wed Dec 09 2015 HW/SW INFO : ICX7250-24/SPR08040b1 ========================================================================== Stack unit 1: Total DRAM: 2147483648 bytes Dynamic memory: 2095140864 bytes total, 1530638336 bytes free, 26% used Stack unit 2: Total DRAM: 2147483648 bytes Dynamic memory: 2095140864 bytes total, 1547481088 bytes free, 26% used telnet@ACC-SICA-171# ===========END OF A COMMAND=========== 104126_000100 ===========show media=========== .. (output truncated) Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 409 supportsave list_cust_cmd supportsave list_cust_cmd Displays all commands present in the custom commands list. Syntax supportsave list_cust_cmd Modes Privileged EXEC mode 410 Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 supportsave show supportsave show Collects and displays debugging information related to stacking configurations. Syntax supportsave show [ show | cancel ] Parameters show Displays the progress of the log collection that has been executed on a terminal other than the one on which the supportsave command is executed. cancel Cancels the current log collection that has been executed on a terminal other than the one on which the supportsave command is executed. Modes Privileged EXEC mode Examples The following is the sample output from the supportsave show command. device# supportsave show Supportsave is executing commands: 19% completed device# supportsave show Supportsave is executing commands: 34% completed device# supportsave show Supportsave is executing commands: 60% completed device# supportsave show. Supportsave is executing commands: 100% completed Supportsave is transporting files... Brocade FastIron Debug Command Reference, 08.0.61 Part Number: 53-1005198-01 411
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : Yes Author : Brocade Communications Systems, Inc. Create Date : 2017:06:26 03:45:31-08:00 Modify Date : 2017:06:26 11:48:48+01:00 Subject : Alphabetical listing of debug CLI syntax with descriptions, command modes, and examples for FastIron 8.0.61. Includes debug, show tech-support, and supportsave commands. Language : EN-US XMP Toolkit : Adobe XMP Core 5.4-c006 80.159825, 2016/09/16-03:31:08 Format : application/pdf Creator : Brocade Communications Systems, Inc. Description : Alphabetical listing of debug CLI syntax with descriptions, command modes, and examples for FastIron 8.0.61. Includes debug, show tech-support, and supportsave commands. Title : Brocade FastIron Debug Command Reference, 08.0.61 Creator Tool : AH XSL Formatter V6.2 MR12 for Windows (x64) : 6.2.14.22278 (2015/10/30 10:00JST) Metadata Date : 2017:06:26 11:48:48+01:00 Producer : Antenna House PDF Output Library 6.2.726 (Windows (x64)) Trapped : False Document ID : uuid:f266ed37-919f-4b91-a3a5-7fff657f1572 Instance ID : uuid:b7351af0-428f-44ab-a42a-cc7749b85472 Page Mode : UseOutlines Page Count : 411EXIF Metadata provided by EXIF.tools