Brocade Communications Systems FastIron SX 800 Diagnostic Manual

Brocade Communications Systems FastIron SX 800 Diagnostic Manual

Fastiron x series; fcx series; icx series; turboiron series;
Hide thumbs Also See for FastIron SX 800:
Table of Contents

Advertisement

53-1002965-01
®
30 September 2013
Brocade FastIron, FCX, ICX,
and TurboIron
Diagnostic Reference
Supporting FastIron Software Release 08.0.01

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FastIron SX 800 and is the answer not in the manual?

Questions and answers

Summary of Contents for Brocade Communications Systems FastIron SX 800

  • Page 1 53-1002965-01 ® 30 September 2013 Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference Supporting FastIron Software Release 08.0.01...
  • Page 2 Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that accompany it.
  • Page 3: Table Of Contents

    Contents About This Guide Introduction ..........vii Supported Hardware .
  • Page 4 MAC address debug commands ......26 MCT debug commands........26 MCT show commands.
  • Page 5 MLD snooping debug commands ......167 Chapter 7 Security Diagnostics ACL debug commands ........171 802.1x debug commands .
  • Page 6 Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 7: About This Guide

    This guide describes many common diagnostic processes for the Brocade FastIron devices. Each chapter contains diagnostic information about a specific segment of your network configuration. Supported Hardware • FastIron X Series devices (chassis models): • Brocade FastIron SX 800 • FastIron SX 1600 • Brocade FCX Series (Brocade FCX) Stackable Switch •...
  • Page 8: Unsupported Features

    NOTE The Brocade ICX 6450-C12-PD switch supports the same feature set as the Brocade ICX 6450 switch unless otherwise noted. NOTE Some debug commands report information about internal hardware settings and registers that is relevant primarily to the Brocade engineering staff. Consequently, this information is not described in this document.
  • Page 9: Document Conventions

    Document conventions This section describes text formatting conventions and important notice formats used in this document. Text formatting The narrative-text formatting conventions that are used are as follows: bold text Identifies command names Identifies the names of user-manipulated GUI elements Identifies keywords Identifies text to enter at the GUI or CLI italic text...
  • Page 10: Related Publications

    CAUTION A Caution statement alerts you to situations that can be potentially hazardous to you or cause damage to hardware, firmware, software, or data. Related publications The following Brocade documents supplement the information in this guide and can be located at http://www.brocade.com/ethernetproducts.
  • Page 11: Document Feedback

    Document feedback Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and completeness of this document. However, if you find an error or an omission, or you think that a topic needs further development, we want to hear from you. Forward your feedback to: documentation@brocade.com Provide the title and version number of the document and as much detail as possible about your comment, including the topic heading and page number and your suggestions for improvement.
  • Page 12 Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 13: Using Diagnostic Commands

    Chapter Using Diagnostic Commands This chapter contains the following sections: • Using debug commands ......... . 1 •...
  • Page 14 Generic debug commands debug ? Syntax: debug ? This command generates a list of available debug variables. ATTENTION Many first-level variables have their own variable subsets. When you enter a debug command, the system indicates that there are additional variables available and you have entered an incomplete command.
  • Page 15 Generic debug commands • console—Directs output to the system console. • logging—Directs output to the syslog buffer and to the syslog server (default). • telnet num—Directs output to a specified Telnet session (ranges from 1 through 5). • ssh num—Directs output to a specified Secure Shell (SSH) session (ranges from 1 through 5). This command allows you to specify a destination for debugging output.
  • Page 16: Disabling Debug Commands

    Generic debug commands Disabling debug commands When activated, most debug commands instruct the system to collect specific information about router configurations and activity. In all cases, adding no in front of the command disables the debug function. Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 17: System Level And Layer 1 Diagnostics

    Chapter System Level and Layer 1 Diagnostics This chapter contains the following sections: • Layer 1 debug commands ........5 •...
  • Page 18: Port Debug Commands

    Layer 1 debug commands Brocade(config-if-e1000-1/1/25)# loop-detection When there is loop detection activity in the switch, the debug information regarding loop detection is displayed on the console. The following example shows the output for the debug loop-detect command when the port goes into a disabled state because of loop detection (strict mode). insert_disable primary 1/1/25, vlan=4096 Loop-detection: port 1/1/25 (vlan=1), put into errdisable state Execute the following command to configure loop detection in a VLAN in loose mode.
  • Page 19 Layer 1 debug commands If port 1/1/31 is disabled, an output similar to the following is displayed. Brocade(config)# interface ethernet 1/1/31 Brocade(config-if-e1000-1/1/31)# disable ( when port is disabled) Change port 1/1/31 hw_state from PORT_READY(7) to DISABLED(0) stack: 4040 2050A970 2050AA44 2060D498 20608BF8 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 Brocade(config-if-e1000-1/1/31)# change port 1/1/32 hw_state from PORT_READY(7)
  • Page 20 Layer 1 debug commands stack: 00acb98c 00ad1e14 00aebd74 0071dddc 0071ebbc 00af0e8c 00af18e8 00ad0e20 00acccf4 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 Change port 1/1/2 hw_state from PORT_READY(7) to DISABLED(0) stack: 00ad5d4c 00accd2c 00acd6ac 00ad21f4 0136c614 0136c850 0136cf00 012b842c 0084b3b0 0084e0a0 00847608 00966c0c 0086c110 0086c154 00243f98 000f0524 00246f54 0159f920 017713c4 Change 1/1/2 state from Disable to Blocked...
  • Page 21 Layer 1 debug commands stack: 4040 2050A970 2050AA44 206082E0 20608330 206084C4 20608C00 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 Change 1/1/32 state from Blocked to Disable stack: 4040 2050A970 2050AA44 206082E0 20608330 20608C0C 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C If port 1/1/32 is enabled, an output similar to the following is displayed.
  • Page 22 Layer 1 debug commands debug port up-down Syntax: [no] debug port up-down decimal This command monitors the status of the ports. The port status up, down, and up/down are indicated by 1, 2, and 3 respectively. The decimal variable refers to the status of the port. Brocade# debug port up-down 1 Monitor port up Topology:...
  • Page 23: System Debug Commands

    System debug commands If port 1/1/31 is disabled, an output similar to the following is displayed. Brocade(config-if-e1000-1/1/31)# disable port_down_indication. port=1/1/31, TAG, vlan-idx=4096 stack: 4040 2050A970 2050AA44 2060A8FC 20608BEC 2060B5A4 20576A90 20576C74 2057707C 202A50A8 20491E9C 20492DC0 204906D8 2050BF48 204A03C8 204A0418 2011BBC8 20047698 2011CF7C 5008 Brocade(config-if-e1000-1/1/31)# port_down_indication.
  • Page 24: Software Licensing Debug Command

    Software licensing debug command Software licensing debug command This section describes the debug command that generates software licensing information. debug license Syntax: [no] debug license This command is used to display the package information on which the license has been loaded. The license information is encoded as Hexa decimal values and can be displayed only when the show license command is used with the license index;...
  • Page 25: Layer 2 Diagnostics

    Chapter Layer 2 Diagnostics This chapter contains the following sections: • STP debug commands ......... . 13 •...
  • Page 26 STP debug commands Brocade# STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 05 0100 1400 0200 0f00 STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/6 0000 00 00 00 80000012f2dbfd80 00000004 8000002438154580 08 06 0100 1400 0200 0f00 STP: Transmitting Config BPDU - VLAN 2 - Port 1/1/5 0000 00 00 00 80000012f2dbfd80 00000004...
  • Page 27: Rstp Debug Commands

    RSTP debug commands If the configuration of VLAN 2 on the Brocade FCX is disabled, the output similar to the following is displayed. Brocade# no debug span config vlan 2 STP : Disabling Packets Debugging for VLAN 2 debug span timers Syntax: [no] debug span timers vlan decimal This command displays information about the specific STP timer events.
  • Page 28 RSTP debug commands Brocade# RSTP[daa69]: Timer Alert - helloWhen timer_expired On port 1/1/2(1) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/2(1) VLAN 2 RSTP: PTX =>ROLE is ALTERNATE or BACKUP , port 1/1/2(1), VLAN 2 RSTP[daa69]: Timer Alert - helloWhen timer_expired On port 1/1/9(8) , VLAN 2 RSTP: PTX entering the Periodic state , port 1/1/9(8) VLAN 2 RSTP[daa69]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2...
  • Page 29 RSTP debug commands RSTP[db06d]: Tx RST Config BPDU Port 1/1/9(8) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00004e20 8000002438154580 08 09 0100 1400 0200 0f00 RSTP: Rcvd RST Config BPDU: Port 1/1/1(0) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000 80000012f2dbfd80 08 01 0000 0000 0000 0000 RSTP: Rcvd RST Config BPDU: Port 1/1/2(1) VLAN 2 0000 02 02 7e 80000012f2dbfd80 00000000...
  • Page 30: Mstp Debug Commands

    MSTP debug commands debug 802.1w transitions Syntax: [no] debug 802.1w transitions vlan decimal This command debugs the RSTP state machine transitions. The decimal variable refers to the number of the VLAN. If the 802.1w transtitions are enabled, an output similar to the following is displayed. Brocade# debug 802.1w transitions vlan 2 RSTP Enabling Events Debugging for VLAN 2...
  • Page 31 MSTP debug commands MST 0, Port 1/1/1 - received BPDU (802.1s) 0000 03 02 7c 80000012f2dbfd80 00000000 80000012f2dbfd80 00000000 8001 0000 0014 0002 000f 80000012f2dbfd80 14 {0xac36177f50283cd4b83821d8ab26de62} MSTP[0xeb217]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1 MSTP[0xeb217]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0xeb217]: PRX RECEIVE->RECEIVE - Port 1/1/2 MST 0, Port 1/1/2 - received BPDU...
  • Page 32 MSTP debug commands debug mstp events Syntax: [no] debug mstp events This command displays MSTP state machine events. It monitors any MSTP events that take place. Brocade# debug mstp events MSTP Event debugging ON If MSTP events are enabled, an output similar to the following is displayed. Brocade# debug mstp enable Brocade# MSTP[0xeda7f]: PRX RECEIVE->RECEIVE - Port 1/1/1 MSTP[0xeda7f]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/1...
  • Page 33 MSTP debug commands If the MSTP level 3 is enabled, an output similar to the following is displayed. Brocade# debug mstp level 3 Brocade# [ebf4d] MSTP_RX[pid=#0] cist_Rx[ebf4d] CIST, Port(#0) [ebf4d] MSTP_RX[pid=#0] done (region) *** [ebf4d] MSTP_RX[pid=#1] cist_Rx[ebf4d] CIST, Port(#1) [ebf4d] MSTP_RX[pid=#1] done (region) *** [ebf61] MSTP_RX[pid=#0] cist_Rx[ebf61] CIST, Port(#0) [ebf61] MSTP_RX[pid=#0] done (region) ***...
  • Page 34 MSTP debug commands MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileCist mst=0, Port 1/1/1, rcvdInfoWhile 5->7 MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 2, Port 1/1/1 MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 2, Port 1/1/1 MSTP: mstp_updtRcvdInfoWhileMsti mst=2, Port 1/1/1, rcvdInfoWhile 4->7 MSTP[0x175f35]: PRX RECEIVE->RECEIVE - Port 1/1/2 MSTP[0x175f35]: PIM CURRENT->RECEIVE - MST 0, Port 1/1/2 MSTP[0x175f35]: PIM RECEIVE->REPEATED_DESIGNATED - MST 0, Port 1/1/2...
  • Page 35: Dhcp Debug Commands

    DHCP debug commands debug mstp verbose Syntax: [no] debug mstp verbose This command displays the MSTP debug information in the verbose mode. Brocade# debug mstp verbose MSTP debugging set to VERBOSE mode debug mstp show Syntax: debug mstp show This command displays the current MSTP debug parameters that are enabled. Brocade# debug mstp show mstp debug is on because of enabled, level or port-level level 4...
  • Page 36 DHCP debug commands debug dhcp-client events Syntax: [no] debug dhcp-client events This command displays information about DHCP client events related to configuration. Brocade# debug dhcp-client events "DHCPC: failed to delete static ip-address to ip-address" "DHCPC: failed to set the port ip-address to ip-address; subnet mask ip-address" "DHCPC: changing port port-id state from REQUEST to BOUND"...
  • Page 37: Gvrp Debug Commands

    GVRP debug commands "DHCPC: received DHCPNAK packet in renewal-state on port port-id" "DHCPC: changing port port-id state from RENEWING to INIT-SELECTING" "DHCPC: received DHCPACK packet in rebind-state on port port-id" "DHCPC: received non matching 'xid'(0x%X) in REBIND message" "DHCPC: changing port port-id state from REBINDING to BOUND" "DHCPC: received non matching 'xid'(0x%X) in DHCPNAK message"...
  • Page 38: Mac Address Debug Commands

    MAC address debug commands GVRP: 0x207651e8: 09 cb 04 05 0f a1 04 02 00 02 04 01 00 07 04 01 GVRP: 0x207651f8: 00 09 04 01 00 0b 00 00 GVRP: Port 2/1 TX GVRP: 0x207651b8: 01 80 c2 00 00 21 00 04 80 2c 0e 20 00 18 42 42 GVRP: 0x207651c8: 03 00 01 01 04 02 00 02 04 01 00 07 04 01 00 09 GVRP: 0x207651d8: 04 01 00 0b 00 00 MAC address debug commands...
  • Page 39 MCT debug commands rstp_txRSTP(T=25364)(vlan=20,port=1/15) Tx on CCEP while MCT peer is superior and UP, abandom& rstputil_mct_handle_incoming_BPDU(T=25365, VLAN=20,port=1/7) port-stp-state=FORWARDING rstp_txRSTP(T=25384)(vlan=20,port=1/15) Tx on CCEP, MCT peer is superior rstp_txRSTP(T=25384)(vlan=20,port=1/15) Tx on CCEP while MCT peer is superior and UP, abandom& rstputil_mct_handle_incoming_BPDU(T=25385, VLAN=20,port=1/7) port-stp-state=FORWARDING CCP_PKT(T=25394): Receiving Packet from peer 10.1.1.2 CCP_PKT(T=25394): Packet Info:0100000c000000080003000400000056...
  • Page 40 MCT debug commands rstp_txRSTP(T=25524)(vlan=20,port=1/15) Tx on CCEP while MCT peer is superior and UP, abandom& rstputil_mct_handle_incoming_BPDU(T=25525, VLAN=20,port=1/7) port-stp-state=FORWARDING rstp_txRSTP(T=25544)(vlan=20,port=1/15) Tx on CCEP, MCT peer is superior rstp_txRSTP(T=25544)(vlan=20,port=1/15) Tx on CCEP while MCT peer is superior and UP, abandom& rstputil_mct_handle_incoming_BPDU(T=25545, VLAN=20,port=1/7) port-stp-state=FORWARDING rstp_txRSTP(T=25564)(vlan=20,port=1/15) Tx on CCEP, MCT peer is superior rstp_txRSTP(T=25564)(vlan=20,port=1/15) Tx on CCEP while MCT peer is superior and...
  • Page 41 MCT debug commands Brocade# rstp_txRSTP(T=25704)(vlan=20,port=1/15) Tx on CCEP, MCT peer is superior rstp_txRSTP(T=25704)(vlan=20,port=1/15) Tx on CCEP while MCT peer is superior and UP, abandom& Brocade# rstputil_mct_handle_incoming_BPDU(T=25705, VLAN=20,port=1/7) port-stp-state=FORWARDING no CLUSTER CCP_FSM(T=25713): Fsm12 10.1.1.2 sending keepalive CLUSTER CCP PEER(T=25713): Make keep alive message -> CCP_PKT(T=25713): Sending Keep Alive message to peer CCP_PKT(T=25713): Packet Info:0100000c000000080003000400000057 debug crstp_txRSTP(T=25724)(vlan=20,port=1/15) Tx on CCEP, MCT peer is superior...
  • Page 42 MCT debug commands CCP_PKT(T=105001): Receiving Packet from peer 10.10.10.2 CCP_PKT(T=105001): Packet Info:0100001c000400180009001400010065012c0300000000008000002438 CCP_PKT(T=105001): Receiving Packet from peer 10.10.10.2, appId=4 (CCP_APPLICATION_CCP=0;CCP_APPLICATION_CLUSTER_MGR=1) CCP_PKT(T=105001): Packet Info:0100001c000400180009001400010065012c0300000000008000002438 CCP_PKT(T=105001): Passing packet to app 4 (cluster=1,mac=2,stp=4) CCP_PKT(T=105001): Packet Info:000400180009001400010065012c0300000000008000002438221b1a ccp_pass_pkt_to_client()(T=105001): cluster id 1, peer ip=168430082, STP msg CLUSTER CCP: free data buf allocated packet count buffer 21a215e8...
  • Page 43 MCT debug commands CCP_PKT(T=105059): Sending Notify message to peer CCP_PKT(T=105059): Packet Info:01000016000000120001000e0000015f00000031000000000000 CLUSTER CCP:internal alloc data buf allocated packet count buffer 21a215e8 CLUSTER CCP:alloc data buf allocated packet count buffer 21a215e8 =============== CCP State machine ============== CLUSTER CCP_FSM(T=105060): Fsm12 10.10.10.2 sending keepalive CLUSTER CCP PEER(T=105060): Make keep alive message ->...
  • Page 44 MCT debug commands Brocade(config-cluster-ABC)# peer 10.10.10.1 rbridge-id 100 icl icl1 Brocade(config-cluster-ABC)# deploy ============= cluster create =============== CLUSTER CCP:ccp_internal_create_cluster::Cluster 1 Configured. Brocade(config-cluster-ABC)# client c1uster Brocade(config-cluster-ABC-client-c1)# rbridge-id 300 Brocade(config-cluster-ABC-client-c1)# client-interface ethernet 4/13 =========== Client add ====================== clustercu_add_client_interface(cluseter=1,client_name=c1,client_port=4/13) clustermgr_add_cluster_client_port(cluseter=1,client_name=c1,client_port=4/13,add Brocade(config-cluster-ABC-client-c1)# deploy ===================== FSM Message ==================== clustermgr_send_loading_info_to_peer(cluster=1)(T=121842) >>>>...
  • Page 45 MCT debug commands =================== Remote CCEP UP =================== CLUSTER FSM: Received CCRR message from peer when CCP is up CLUSTER FSM: cluster id 1, client id 300, old state: Local Up, event: Remote Up CLUSTER FSM: Cluster ABC (Id: 1), client c1 (RBridge Id: 300) - Remote client CCEP CLUSTER FSM: new state: Up, master: FALSE ===================== CCP Down ============================ CLUSTER FSM: cluster id 1, peer rbridge id 100, old state: CCP Down, event: CCP...
  • Page 46 MCT debug commands Brocade# debug cluster mdup CLUSTER MDUP: Send Vlan mask message to peer CLUSTER MDUP: Received vlan mask from peer for cluster 1 mdupmgr_proc_port_oper_status_change(port_id=3/13, oper_status=up, vlan=100 ) -> mdupmgr_proc_port_oper_status_change(port_id=3/13, oper_status=up, vlan=100 ), port is CCEP mdupmgr_proc_port_oper_status_change(port_id=3/13, oper_status=up, vlan=100 ), port is CCEP ->...
  • Page 47 MCT debug commands CLUSTER Config debugging is :OFF CLUSTER FSM debugging is :OFF CLUSTER MDUP debugging is CLUSTER interface mac debugging is :OFF CLUSTER Forwarding debugging is :OFF CLUSTER STP debugging is :OFF CLUSTER BPDU forwarding debugging is :OFF CLUSTER CCP debugging is :OFF debug cluster stp Syntax: [no] debug cluster stp...
  • Page 48 MCT debug commands rstputil_mct_enable_port:: port is trunk rstputil_mct_enable_port. Per VLAN STP. VLAN 101 Port 4/3 mct_icl_port = TRUE rstp_enable_port:: VLAN 101 port 4/3. skip_Initialize_RSTP_state_machines = 0. rstp_enable_port:: PIM state 0. PRT state 0. PTX state 0. TCM state 0. PPM state 0.
  • Page 49 MCT debug commands rstp_compute_port_role_infols_Mine:: vlan 101 port 4/10 rstp_selectedRole = RSTP_DESIGNATED_PORT.rstp_updtInfo = FALSE rstp_port_Role_Transition_State_Machine:: port 4/10 vlan 101 role = 0 selected role = 3. old PRT state 529 new state 529. Designated_Port_transitions. rstp_disable_learning(T=173641) VLAN101, port 4/10 BLOCKING rstp_Port_State_Transition_State_Machine_Action: VLAN 101 Port 4/10 set to BLOCKING.
  • Page 50: Mct Show Commands

    MCT show commands rstp_port_Role_Transition_State_Machine:: port 4/13 vlan 101 role = 0 selected role = 3. old PRT state 529 new state 529. Designated_Port_transitions. rstputil_mct_handle_port_role_transition:: old state = 529, new = 3 (RSTP_DESIGNATED_PORT/RSTP_ROOT_PORT). Send ccep_state_to_peer. VLAN 101 port 4/13 rstputil_mct_send_ccep_state_to_peer(T=173641,vlan=101,port=4/13,role=3) primary_port 4/13 --> rstputil_mct_send_ccep_state_to_peer(T=173641,vlan=101,port=4/13,role=3) primary_port 4/13 done rstp_disable_learning(T=173641) VLAN101, port 4/13 BLOCKING...
  • Page 51 MCT show commands Name Rbridge-id Config Port Trunk FSM-State A-satya-000000147d80 3318 Deployed 4/17 Admin Up A-satya-000000c74d40 2668 Deployed 3/13 show cluster ccp client Syntax: show cluster cluster_name | cluster_id ccp client client_ID • cluster_name—Specifies the cluster name. • cluster_id—Specifies the cluster port number. •...
  • Page 52 MCT show commands Peer IP: All Peers Registered Events: PACKET_RECEIVED Client Node Info: ----------------- Name: stp ID: 4 Cluster ID: 3000 Number of Peers: 1 Peer Node Info: Peer IP: All Peers Registered Events: All Events Client Node Info: ----------------- Name: mcast ID: 8 Cluster ID: 3000...
  • Page 53 MCT show commands Brocade# show cluster ccp peer detail **************Peer Session Details********************* IP address of the peer 10.1.1.1 Rbridge ID of the peer Session state of the peer OPERATIONAL Next message ID to be send 3369 Keep Alive interval in seconds Hold Time Out in seconds Fast Failover is enable for the session UP Time...
  • Page 54 MCT show commands Deployed 1/15 Preforwarding Remote The command output resembles the following example for the speciifed client.. Brocade# show cluster 1 client c1 Cluster abc 1 ============= Rbridge Id: 101, Session Vlan: 3999, Keep-Alive Vlan: 4001 Cluster State: Deploy Client Isolation Mode: Loose Configured Member Vlan Range: 100 to 105 Active Member Vlan Range: 100 to 105...
  • Page 55 MCT show commands • client - Displays cluster client MAC entries for all clients or for a specified client. • vlan - Displays cluster MAC entries for the specified VLAN. The following command output displays all MAC entries for the specified cluster. Brocade# show mac cluster 3000 Total Cluster Enabled(CL+CR+CCL+CCR) MACs: 4 Total Cluster Local(CL) MACs: 1...
  • Page 56 MCT show commands show mac mdb Syntax: show mac mdb source-rbridge Rbridge_id client-rbridge Rbridge_id • source-rbridge Rbridge_id - Specifies the source Rbridge ID. • client-rbridge Rbridge_id - Specifies the client Rbridge ID. This command displays the MDB information of the cluster MAC entries. Command output resembles the following example.
  • Page 57: Packet-Capture Debug Commands

    Packet-capture debug commands Packet-capture debug commands The following debug packet-capture command helps to debug packet flows and capture packets designated for the management module for debugging. This command has additional filter and mode option parameters for refining the traffic sources and the format of the saved data. debug packet-capture Syntax: [no] debug packet-capture [ all | count-reset | count-show | exclude-mgmt-port | filter | max | mode | no-limit | no-mgmt-port | receive | send ]...
  • Page 58 Packet-capture debug commands • ether-type—Matches the Ethernet type packets • fdp—Matches wit h the FDP • in-port—Matches the input port • l2-802.1w—Matches the 802.1w BPDU • l2-lacp—Matches the LACP PDU • l2-mstp—Matches the MSTP BPDU • l2-stp—Matches the spanning tree BPDU •...
  • Page 59: Link Aggregation Debug Commands

    Link aggregation debug commands debug packet-capture filter show Syntax: debug packet-capture filter show [ all | decimal ] none This command displays the filter information for the particular filter index. The decimal variable refers to the number of the packet captured for filter. Execute the following command to display the complete filter information.
  • Page 60 debug pp-trunk-hash debug pp-trunk-hash Traces and displays the output port through which a given packet can be sent out in a trunk. Syntax debug pp-trunk-hash [trunk_port | ingress_port] debug pp-trunk-hash trunk_port unicast-distribution ip dmac smac [dst_ipv4 src_ipv4 dst_tcp/udp_port src_tcp/udp_port | dst_ipv6 src_ipv6 dst_tcp/udp_port src_tcp/udp_port] unicast-distribution non-ip dmac smac debug pp-trunk-hash ingress_ port...
  • Page 61 debug pp-trunk-hash registered-multicast Generates debugging information related to registered multicast distribution. The following variables must be specified with this option. vlan Specifies the VLAN ID. vidx Specifies the multicast ID. routed-flow Generates debugging information related to routed flow distribution. The following variables must be specified with this option.
  • Page 62 debug pp-trunk-hash Examples For the unicast IPv4 distribution, the command output resembles the following example. Brocade# debug pp-trunk-hash 1/1/3 unicast-distribution ip 0000.0082.ba04 0000.00c9.5680 10.10.10.2 10.10.10.1 10 10 trunk hashed port: 1/1/2 For the unicast IPv6 distribution, the command output resembles the following example. Brocade# debug pp-trunk-hash 1/1/3 unicast-distribution ip 0000.0082.ba04 0000.00c9.5680 2001:DB8::100:10 2001:DB8::10:19 10 17 trunk hashed port: 1/1/1...
  • Page 63 debug pp-bum-trunk-hash debug pp-bum-trunk-hash Traces and displays the output port through which a given packet can be sent out in a trunk for a broadcast, unknown-unicast, and multicast (BUM) flow. Syntax debug pp-bum-trunk-hash ingress_port sw_trunk_id dmac smac ipv4 dst_ipv4 src_ipv4 [dst_tcp | udp_port] [src_tcp | udp_port] vlan vidx ipv6 flow_label dst_ipv6 src_ipv6 [dst_tcp | udp_port] [src_tcp | udp_port] vlan vidx non-ip no debug pp-bum-trunk-hash...
  • Page 64 debug pp-bum-trunk-hash Brocade# debug pp-bum-trunk-hash 1/1/11 3 0000.00aa.aaaa 0000.00bb.1111 ipv6 128 2001:DB8::1:1 2001:DB8::1:1 10 10 1 100 Designated Trunk Port = 1/1/4 For the non-IP BUM flow, the command output resembles the following example. Brocade# debug pp-bum-trunk-hash 1/1/1 3 0000.00aa.aaaa 0000.00bb.1111 non-ip Designated Trunk Port = 1/1/5 History Release...
  • Page 65: Ip Diagnostics

    Chapter IP Diagnostics This chapter contains the following sections: • ARP debug commands ......... . 53 •...
  • Page 66: Bgp Debug Commands

    BGP debug commands Brocade# clear arp next hop router 10.29.29.53 ARP mapping deleted Brocade# ARP: sent packet oper=request, src 10.29.29.111 0000.0076.2c80: dst 10.29.29.53 0000.0000.0000: Port v29 ARP: sent packet oper=request, src 10.200.200.111 0000.0076.2c80: dst 10.200.200.45 0000.0000.0000: Port v2000 ARP: sent packet oper=request, src 10.30.30.111 0000.0076.2c80: dst 10.30.30.31 0000.0000.0000: Port v300 ARP: sent packet oper=request, src 10.20.67.111 0000.0076.2c80: dst 10.20.10.11 0000.0000.0000: Port mgmt1...
  • Page 67 BGP debug commands BGP: 10.1.1.2 Decay 10.1.1.32/32, ostate <d>, oPnlty=6805, nPnlty=840, time=2712 BGP: 10.1.1.2 reuse_list_index=258, curr_offset=45 BGP: 10.1.1.2 10.1.1.32/32 not ready, state <d>, reuse_threshold=750, new_index=61, offset=45 BGP: 10.1.1.2 Decay 10.1.1.32/32, ostate <d>, oPnlty=6805, nPnlty=840, time=2712 BGP: 10.1.1.2 reuse_list_index=258, curr_offset=45 BGP: 10.1.1.2 10.1.1.32/32 not ready, state <d>, reuse_threshold=750, new_index=61, offset=45 BGP: 10.1.1.2 Decay 10.1.1.32/32, ostate <d>, oPnlty=6805, nPnlty=840, time=2712 BGP: 10.1.1.2 reuse_list_index=258, curr_offset=45...
  • Page 68: Dhcp Snooping Debug Commands

    DHCP snooping debug commands debug ip bgp keepalives Syntax: [no] debug ip bgp keepalives Brocade devices use keepalives to collect information about applications and services. For example, you can configure a keepalive to continually monitor and report on the online status of a resource, such as BGP.
  • Page 69: Gre Debug Commands

    GRE debug commands DHCP Option82: 20 bytes added. DHCP Option82: Adding option 82 DHCP: snooping on for vlan 14, port 3/1/23 DHCP: rcv on port 3/1/23, intercept DHCP pkt, Offer DHCP Option82: Removing option 82 DHCP Option82: 19 bytes removed. DHCP Option82: Removing option 82 DHCP: snooping on for vlan 14, port 5/1/2 DHCP: rcv on port 5/1/2, intercept DHCP pkt, Request...
  • Page 70 GRE debug commands DEBUG 0x8: Can not find route for tunnel id 11, hw index 23, src 10.22.33.254, dest 10.22.33.252 DEBUG 0x8: create GRE tunnel origination because find route for tunnel id 11, hw index 23, src 10.22.33.254, dest 10.22.33.252 DEBUG 0x8: Route for tunnel id 11 is via another tunnel or management port 22 DEBUG 0x8: Direct route for tunnel id 11 dest 10.22.33.252 has unresolved ARP DEBUG 0x8: indirect route for tunnel id 11 dest 10.22.33.252 next hop 10.11.25.5...
  • Page 71: Icmp Debug Commands

    ICMP debug commands GRE : FORWARD IP to GRE tunnel 11 - Pkt: src 10.22.33.254, dst 224.0.0.5, len 64 GRE : Failed to FORWARD IP to GRE tunnel 11 - Pkt: src 10.22.33.254, dst 224.0.0.5, No route ICMP debug commands The following debug ip icmp commands display information about Internal Control Message Protocol (ICMP) transactions.
  • Page 72: Ospf Debug Commands

    OSPF debug commands OSPF debug commands The following debug commands display information about Open Shortest Path First (OSPF) transactions. debug ip ospf Syntax: [no] debug ip ospf A.B.C.D This command generates OSPF debugging information for the specified IP address. Output indicates state transitions, hello packets received, LSA acknowledgements received, LSA processing, flooding information, and database descriptions, as shown in the following example.
  • Page 73 OSPF debug commands debug ip ospf error Syntax: [no] debug ip ospf error This command reports the receipt of OSPF packets with errors, or mismatches between hello packet options. Brocade# debug ip ospf error OSPF: errors debugging is on Brocade(config-vif-9)# Debug: Jan 1 03:37:11 OSPF: invalid header or unable to find neighbor, drop Debug: Jan...
  • Page 74 OSPF debug commands OSPF: Neighbor 10.213.213.213 int 4/1/12, state INITIALIZING processing event ONE_WAY ospOSPF: send DBD to 10.213.213.213 on ve 18 flag 0x7 seq 0x18a3b9 len 32 f event Brocade# no debug ip ospf event OSPF: events debugging is off debug ip ospf flood Syntax: [no] debug ip ospf flood This command displays information about LSA flooding activity as shown in the following example.
  • Page 75 OSPF debug commands rcv Grace_LSA from 10.1.51.1, area 0.0.0.10 Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0 neighbor 10.1.51.1 entering graceful restart state, timer 120, lsa age 0, max 120, helping 0 flood grace LSA, AdvRtr:10.213.213.213, Age:0 rcv GRACE LSA from 10.1.18.2, age 0, Adv 10.213.213.213 install new GraceLSA, int 2050, neighbor 10.1.18.2, age 0 rcv Grace_LSA from 10.1.18.2, area 0.0.0.10 Recvd grace lsa id=50331648 state=8 0x2dd5d5d5 0x2dd5d5d5 age=0 gr-state=0...
  • Page 76 OSPF debug commands OSPF: originate_router_links_advertisement gen new instance set 10.2.1.1 (not sent - wait for MinLSInterval) OSPF: LSA rcvd Type:1 AdvRtr:10.3.1.1 Age:1 LsId:10.3.1.1 Seq-Num 8000000f from Neighbor 10.1.1.2 OSPF: install a new lsa, type 1, ls_id 10.3.1.1, age 1, seq 8000000f area-id 0 OSPF: NSR Sync ACK received for LSA OSPF:...
  • Page 77 OSPF debug commands debug ip ospf lsa-id Syntax: [no] debug ip ospf lsa-id This command generates information about OSPF LSA IDs as shown in the following example. Brocade# debug ip ospf lsa-id Debug message destination: Console IP Routing: OSPF: flooding debugging is on OSPF: lsa generation debugging is on OSPF:...
  • Page 78 OSPF debug commands debug ip ospf packet Syntax: [no] debug ip ospf packet [ detail decimal | in | out | peer ip-addr | port [ethernet stackid/slot/port | ve decimal] src-ip ip-addr | type [ack | dd | hello | request | update]] •...
  • Page 79 OSPF debug commands OSPF: recv from:10.1.34.10 to 224.0.0.5 Intf:ve 34 Hello L:48 Auth:0 ID:49.2.3.4 DR:10.1.34.16 BDR:10.1.34.10 OSPF: recv from:10.1.251.18 to 224.0.0.5 Intf:e 2/1/21 LS-Upd L:136 Auth:0 ID:10.116.116.1 Cnt:3 OSPF: send to:224.0.0.5 Intf:ve 18 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: send to:224.0.0.5 Intf:e 2/1/14 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: send to:224.0.0.5 Intf:e 4/1/12 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3 OSPF: send to:224.0.0.5 Intf:ve 34 LS-Upd L:136 Auth:0 ID:10.10.10.77 Cnt:3...
  • Page 80 OSPF debug commands OSPF: send to:224.0.0.5 Intf:ve 35 LS-Upd L:100 Auth:0 ID:10.10.10.77 Cnt:2 OSPF: recv from:10.1.251.6 to 224.0.0.5 Intf:ve 511 LS-Upd L:100 Auth:0 ID:10.116.116.1 Cnt:2 OSPF: send to:10.1.251.6 Intf:ve 511 LS-Ack L:64 Auth:0 ID:10.10.10.77 OSPF: recv from:10.1.91.18 to 224.0.0.5 Intf:ve 911 LS-Upd L:100 Auth:0 ID:10.116.116.1 Cnt:2 OSPF: send to:10.1.91.18 Intf:ve 911...
  • Page 81 OSPF debug commands OSPF: validate route, new->valid 192.168.30.0, state 3, path type 3 debug ip ospf retransmission Syntax: [no] debug ip ospf retransmission This command generates internal information about OSPF retransmission of LSAs. Brocade# debug ip ospf retransmission Brocade(config)# clear ip routeOSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the retransmission list if necessary OSPF: examine each neighbor and add advertisement ls-id 10.3.13.0 to the retransmission list if necessary...
  • Page 82: Rip Debug Commands

    RIP debug commands Debug: Jan 1 02:38:55 OSPF: Schedule SPF(6002), in prog 0, ospf build_routing_table 0 phase 1 Debug: Jan 1 02:38:55 OSPF: timer: give semaphore, start spf phase 1, time 96789, scheduled 96788, run time 96788 Debug: Jan 1 02:38:55 OSPF: begin intra SPF run, chunk-id 0/-1 just_become_abr 0, is_abr 0 Debug: Jan 1 02:38:55 OSPF: invalidate whole routing table, recal_just_become_abr just_become_abr 0...
  • Page 83: Ntp Debug Commands

    NTP debug commands debug rip events Syntax: [no] debug rip events This command displays RIP events. Brocade# debug rip events Brocade(config-vif-11)# RIPng: update timer expired clear ipv routeRIPng: triggered update RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0 from :: on interface NULL RIPng: garbage prefix 2001:DB8::/64 timer 1, metric 0, tag 0 from :: on interface NULL...
  • Page 84 NTP debug commands NTP: ntp_clock_filter: mitigated sample stats: n 1 offset 0.01133625 del 0.27379156 dsp 7.93750968 jit 0.00001525 NTP: ntp_peer_unfit: dist exceeded - root dist 8.07442072 of peer 10.25.96.13 has exceeded max dist 1.50096000 NTP: ntp_clock_select: number of final survivors 0 and leap vote 0 NTP: ntp_clock_select: No survivors found.
  • Page 85 NTP debug commands NTP: ntp_local_clock: hufbuf - ptr 1 mindly 0.23329046 huffpuff correction -0.00067095 NTP: ntp_local_clock: clk offset 0.00917431 clk jit 0 clk stab 0 sys_poll 6 NTP: ntp_set_freq: drift 0.00000010, old freq 50000000 NTP: ntp_set_freq: new freq 49999995 NTP: ntp_adj_host_clock: new offset 0.00917431, freq 49999995 NTP: Adjusting the clock.
  • Page 86: Source Guard Debug Commands

    Source Guard debug commands debug ip ntp server Syntax: [no] debug ip ntp server This command displays information about the NTP server. Command output resembles the following example. Brocade# debug ip ntp server NTP: Received NTP client packet from 172.26.67.52 on port 123 via port id mgmt1 at 18:02:44.1139927355 GMT+00 Thu Mar 21 2013 Leap 0, Version 4, Mode client, Stratum 3, Poll 6, Precision 2**-16, Root delay 16102, Root disp 90471, Ref Id 172.26.67.65,...
  • Page 87 SSH debug commands This command activates the SSH debugging. Brocade# debug ip ssh SSH: debugging is on Brocade(config)#SSH: Incoming connection request received SSH: ssh_get_free_session_id: ssh.client[0].in_use is 0 SSH: Client session (0) established SSH: Outgoing connection is ready ShtcpConnectionStatus[0]: connection established SSH:ShtcpSend[0]: eSendComplete: the string length [24] ! ShtcpSendStatus[0]: eSendComplete SSH: Outgoing connection is ready...
  • Page 88 SSH debug commands SSH:ShtcpSend[0]: eSendComplete: the string length [640] ! SSH: Outgoing connection is ready SSH: Data is ready to receive ShtcpReceiveStatus[0]: the string length [16] ShtcpSendStatus[0]: eSendComplete SSH:ShtcpSend[0]: eSendComplete: the string length [16] ! ShtcpSendStatus[0]: eSendComplete SSH: Outgoing connection is ready SSH: Data is ready to receive ShtcpReceiveStatus[0]: the string length [52] SSH:ShtcpSend[0]: eSendComplete: the string length [104] !
  • Page 89: Synchronization Debug Commands

    Synchronization debug commands ShtcpSendStatus[0]: eSendComplete SSH:ShtcpSend[0]: eSendComplete: the string length [68] ! ShtcpSendStatus[0]: eSendComplete SSH:ssh_event_handler: Freeing tx_buf 18, QAddress: 256cd7e0 SSH: Outgoing connection is ready SSH: Outgoing connection is ready Brocade# no debug ip ssh SSH: debugging is off Synchronization debug commands You can use the debug ip sync command to debug IP synchronization and faults in synchronization.
  • Page 90 TCP debug commands Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8197 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:3bfa,seqn:835929143,ackn:11211268 Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8197 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:3bf9,seqn:835929143,ackn:11211290 Debug: Feb 11 10:46:57 TCP: rcvd packet (len=20) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8197 packet: syn:0,ack:1,rst:0,fin:1,hlen:5,chksum:3bce,seqn:835929143,ackn:11211290 Debug: Feb 11 10:46:57 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8197 ->...
  • Page 91 TCP debug commands Debug: Feb 11 10:47:05 TCP: rcvd packet (len=108) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:aa71,seqn:2607452040,ackn:4002716770 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 -> 2001:DB8::192:111:101:25:179 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:eec6,seqn:4002716770,ackn:2607452128 Debug: Feb 11 10:47:05 TCP: rcvd packet (len=39) 2001:DB8::192:111:101:25:179 -> 2001:DB8::192:111:101:111:8178 packet: syn:0,ack:1,rst:0,fin:0,hlen:5,chksum:2a8b,seqn:2607452128,ackn:4002716770 Debug: Feb 11 10:47:05 TCP: sent packet (len=20) 2001:DB8::192:111:101:111:8178 ->...
  • Page 92: Udp Debug Commands

    UDP debug commands debug ip tcp sack Syntax: [no] debug ip tcp sack This command activates the TCP Selective Acknowledgment (SACK) debugging. Brocade# debug ip tcp sack TCP: sack debugging is on debug ip tcp transactions Syntax: [no] debug ip tcp transactions This command activates the TCP transactions debugging.
  • Page 93: Vrrp And Vrrp-E Debug Commands

    VRRP and VRRP-E debug commands VRRP and VRRP-E debug commands Use the following commands to filter the Virtual Router Redundancy Protocol (VRRP) and Virtual Router Redundancy Protocol - Extended (VRRP-E) messages for IPv4 or IPv6, and to debug specific IPv4 or IPv6 packets within the router. debug ip vrrp packet Syntax: [no] debug ip vrrp packet This command displays debugging information of any VRRP or VRRP-E packets within the device.
  • Page 94: Web Debug Commands

    Web debug commands Brocade# debug ip vrrp packet v6 VRRP (IPv6): packet debugging is on VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:10 pri:255 #ip:1 aut:0 adv:100 chk:53518 Num of ip addr 1 fe80::7:2 from sender 2000::7:2 VRRP (IPv6): rcvd packet! ver:3 type:1 vrid:11 pri:255 #ip:1 aut:0 adv:200 chk:53417 Num of ip addr 1 fe80::8:2 from sender ::...
  • Page 95 Web debug commands debug ip web-ssl Syntax: [no] debug ip web-ssl This commands activates web Secured Socket Layer (SSL) debugging. Brocade# debug ip web-ssl WEB SSL: debugging is on Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 96 Web debug commands Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 97: Ipv6 Diagnostics

    Chapter IPv6 Diagnostics This chapter contains the following sections: • General IPv6 debug commands ........85 •...
  • Page 98 IPv6 MLD debug commands Brocade# debug ipv6 mld Brocade# MLD: rcvd Report-V1(ty=131) g=ff03::26:2641 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2642 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2643 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24 MLD: rcvd Report-V1(ty=131) g=ff03::26:2644 resp=0, pkt S=fe80::200:3aff:fe01:3a86, on VL611 (phy 1/3/8), mld_size=24...
  • Page 99 IPv6 MLD debug commands Debug: Sep 19 17:39:49 Del 7/1/17 from (0x0 0x242400) vlan 1000 Brocade# show ipv6 mld mcache Example: (S G) cnt=: (S G) are the lowest 32 bits, cnt: SW proc. count OIF: 1/1/22 TR(1/1/32,1/1/33), TR is trunk, 1/1/32 primary, 1/1/33 output vlan 400, 0 cache vlan 601, 0 cache vlan 602, 0 cache...
  • Page 100 IPv6 MLD debug commands This command monitors outgoing interfaces (OIFs) that are added or deleted for all the MLD groups. Brocade# debug ipv6 mld add-del-oif all Brocade# debug ipv6 mld show debug ip6 mld mcache-source 681D is enabled debug ip6 mld add-del-oif all is enabled Brocade# Debug: Sep 16 00:06:37 Del 7/1/17 from (0x0 0x252504) vlan 1000 Debug: Sep 16 00:06:37 Del 7/1/17...
  • Page 101 IPv6 MLD debug commands Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20640EB4 20642100 208C0D68 2064217C 20641554 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4 Debug: Sep 16 00:33:08 Add 3/1/12 to (0x0 0x252504) vlan 1000 Debug: Sep 16 00:33:08 stack: 20C3DA54 20640AB8 20641588 20732A14 202884C4 204C1EEC 204C2288 204C235C 204C2420 20569EF0 205F0474 2056E85C 205F23E8 5010 15B58 1AAF4...
  • Page 102: Ipv6 Mld Debug Commands

    IPv6 MLD debug commands Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2402 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0 2001:DB8::24:2402 to VL1000(ethe 7/1/23 ) rsp=10000 mld=24B, pkt=86B Debug: Sep 19 16:25:34 MLD: rcvd Leave(ty=132) g=2001:DB8::24:2403 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/21), mld_size=24 Debug: Sep 19 16:25:34 MLD send Query(t=130) V1, s=fe80::224:38ff:fec6:d0c0...
  • Page 103 IPv6 MLD debug commands debug ipv6 mld group Syntax: [no] debug ipv6 mld group ipv6addr This command debugs the MLD group matching. The ipv6addr variable specifies the address of the IPv6 route. Brocade# debug ipv6 mld group ff03::26:2641 Brocade# debug ipv6 mld show debug ip6 mld group ff03::26:2641 is enabled Brocade# MLD send Query(t=130) V1, s=fe80::224:38ff:fe26:d900 0000::0000 to VL888(all) rsp=10000 mld=24B, pkt=86B...
  • Page 104 IPv6 MLD debug commands Debug: Sep 19 16:45:08 no routr fid, consume pkt Brocade# Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff02::1:ff20:70 resp=0, pkt S=fe80::200:bff:fe84:55ae, on VL1000 (phy 2/1/1), mld_size=24 Debug: Sep 19 16:45:10 no routr fid, consume pkt Debug: Sep 19 16:45:10 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/23), mld_size=24 Debug: Sep 19 16:45:10...
  • Page 105 IPv6 MLD debug commands Debug: Sep 19 16:47:16 no routr fid, consume pkt Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL1000 (phy 7/1/22), mld_size=24 Debug: Sep 19 16:47:18 group: ff04::24:2400, life = 260 Debug: Sep 19 16:47:18 no routr fid, consume pkt Debug: Sep 19 16:47:18 MLD: rcvd Report-V1(ty=131) g=ff04::24:2401 resp=0, pkt...
  • Page 106 IPv6 MLD debug commands Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2400 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28 group: 2001:DB8::24:2400, life = 260 Debug: Sep 28 00:10:28 forward to router fid 814 Debug: Sep 28 00:10:28 MLD: rcvd Report-V1(ty=131) g=2001:DB8::24:2401 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/3), mld_size=24 Debug: Sep 28 00:10:28...
  • Page 107 IPv6 MLD debug commands MLD: rcvd Report-V1(ty=131) g=2001:DB8::25:2503 resp=0, pkt S=fe80::200:bff:fe82:50f5, on VL510 (phy 1/1/22), mld_size=24 debug ipv6 mld prime-port ethernet Syntax: [no] debug ipv6 mld prime-port ethernet stackid/slot/port This command enables the activity of the physical port and primary port if trunking happened. The stackid/slot/port variable refers to the stack ID, slot number, and port number of a specific Ethernet port.
  • Page 108 IPv6 MLD debug commands The following is the sample output from the debug ipv6 mld protocol query command. Brocade# debug ipv6 mld protocol query Brocade# debug ipv6 mld enable Brocade# MLD.VRF0: [ Port 6/1/17,v170 ] Sent General Query version 2 using src fe80::768e:f8ff:fe34:3c80 MLD.VRF0: [ Port 4/1/22,v78 ] Sent General Query version 2 using src fe80::768e:f8ff:fe34:3c80...
  • Page 109 IPv6 MLD debug commands debug ipv6 mld error debug ipv6 mld vrf 3 debug ipv6 mld source Syntax: [no] debug ipv6 mld source ipaddr This command displays the MLD related debug information for the specified source address. Brocade# debug ipv6 mld rx Brocade# debug ipv6 mld protocol report Brocade# debug ipv6 mld source 2001:DB8::15 ======================...
  • Page 110: Ipv6 Ospf Debug Commands

    IPv6 OSPF debug commands This command displays MLD related debug information for the specified VRF. Brocade# debug ipv6 mld vrf vrf1 MLD.VRF1.EVT: - Started FSM timer for 16 seconds MLD.VRF1.EVT: Rx packet is valid. Processing packet MLD.VRF1.EVT: - Started FSM timer for 16 seconds MLD.VRF1: [ Port 3/1/11,3/1/11 ] General Query Timer expired.
  • Page 111 IPv6 OSPF debug commands Debug: Jan 1 20:02:00 OSPFv3: ISM[644]: {dr:10.4.4.8,bdr:10.2.2.2} -> {dr:0.0.0.0,bdr:0.0.0.0} debug ipv6 ospf lsa Syntax: [no] debug ipv6 ospf lsa This command displays LSAs as shown in the following example. Brocade# debug ipv6 ospf lsa OSPFv3: lsa debugging is on Brocade(config-vif-9)#Debug: Jan 1 17:05:01 OSPFv3: LSA: Update Router-LSA for area 0.0.0.0...
  • Page 112 IPv6 OSPF debug commands Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include 5001::/64 Debug: Jan 1 17:05:02 OSPFv3: LSA: Create LSA Type :IntraPrefix Id: 0 Advrouter: 10.4.4.8 Debug: Jan 1 17:05:02 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 17:05:02 OSPFv3: LSA: Delete LSA Type :IntraPrefix Id: 0.0.0.0...
  • Page 113 IPv6 OSPF debug commands Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 1 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): Prefix 5001:: Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): including 5001:: Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit):Checking Type :Link Id 10.0.8.4: Adv Routr : 10.2.2.2 Debug: Jan 1 17:05:02 OSPFv3: LSA Update Intra-Area-Prefix(Transit): 1...
  • Page 114 IPv6 OSPF debug commands Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 4 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Delete LSA Type :ASExternal Id: 10.0.0.4 Advrouter: 10.4.4.8 Debug: Jan 1 18:53:55 OSPFv3: LSA: Create LSA Type :ASExternal Id: 5 Advrouter: 10.4.4.8 Debug: Jan...
  • Page 115 IPv6 OSPF debug commands OSPFv3: Installing in LSDB Inter Area Prefix LSA for area 0.0.0.0 and prefix 2001:DB8::/64 OSPFv3: Inter Area LSA not generated, route is in same area. OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, path type = External OSPFv3: Inter Area LSA not generated, route is in same area.
  • Page 116 IPv6 OSPF debug commands Debug: Jan 1 19:02:46 OSPFv3: LSA: Type: 8 ID: 644 AdvRouter: 10.4.4.8, Supress Updating Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): Checking Interface 644 Debug: Jan 1 19:02:47 OSPFv3: LSA Update Intra-Area-Prefix(Stub): include 2001:DB8::/64 Debug: Jan 1 19:02:47 OSPFv3: LSA: Type: 8201 ID: 0 AdvRouter: 10.4.4.8, Supress Updating...
  • Page 117 IPv6 OSPF debug commands This command displays debug information about NSM events as shown in the following example. Brocade# debug ipv6 ospf nsm-events OSPFv3: nsm-events debugging is on Brocade(config-if-e1000-8/9)# Debug: Jan 1 20:04:10 OSPFv3: NSM[10.2.2.2, 644]: HelloReceived at 733918, 1465981 Debug: Jan 1 20:04:10 OSPFv3: NSM[10.2.2.2, 644]: HelloReceived at 733918, 1465981...
  • Page 118 IPv6 OSPF debug commands Debug: Jan 1 17:20:29 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:32 OSPFv3: Snd Hello on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) RtrID:10.4.4.8 DR:10.4.4.8 BDR:10.2.2.2 Debug: Jan 1 17:20:38 OSPFv3: Rcv Hello on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: ff02::5) RtrID:10.2.2.2 DR:10.4.4.8 BDR:10.2.2.2...
  • Page 119 IPv6 OSPF debug commands Debug: Jan 1 19:06:19 OSPFv3: Rcv DbDesc on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400) Debug: Jan 1 19:06:19 Option:00-00-13, Bits:00 SEQ:aa922 Debug: Jan 1 19:06:19 OSPFv3: Snd DbDesc on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: fe80::224:38ff:fed6:7800) Debug: Jan 1 19:06:19 Option:00-00-13, Bits:01 SEQ:aa923 Debug: Jan 1 19:06:19 OSPFv3: Rcv DbDesc on ve 9...
  • Page 120 IPv6 OSPF debug commands Debug: Jan 1 20:14:33 OSPFv3: Snd LSAck on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: fe80::224:38ff:fed6:7800) Type:2009, LSID:0 Adv:10.2.2.2 SEQ:80000001 AGE:3600 Debug: Jan 1 20:14:33 OSPFv3: Rcv LSAck on ve 9 OSPFv3: (fe80::224:38ff:fed6:7800->OSPFv3: fe80::224:38ff:fe21:6400) Type:2009, LSID:0 Adv:10.4.4.8 SEQ:80000001 AGE:3600 Debug: Jan 1 20:14:33 OSPFv3: Rcv LSAck on ve 9 OSPFv3:...
  • Page 121 IPv6 OSPF debug commands Debug: Jan 1 20:14:33 OSPFv3: LS 9 4b78 4040408 ACKed by Neighbor 10.2.2.2 is not in retranslist Debug: Jan 1 20:14:33 OSPFv3: LS 9 0 4040408 ACKed by Neighbor 10.2.2.2 is not in retranslist Debug: Jan 1 20:14:33 OSPFv3: Snd LSAck on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) Type:0008, LSID:2052 Adv:10.2.2.2 SEQ:80000001 AGE:45...
  • Page 122 IPv6 OSPF debug commands Type:2001, LSID:0 Adv-Router:10.2.2.2 Type:2009, LSID:0 Adv-Router:10.2.2.2 Type:0008, LSID:2052 Adv-Router:10.2.2.2 Type:4005, LSID:91 Adv-Router:10.2.2.2 Type:4005, LSID:92 Adv-Router:10.2.2.2 Type:4005, LSID:93 Adv-Router:10.2.2.2 Type:4005, LSID:94 Adv-Router:10.2.2.2 Type:4005, LSID:95 Adv-Router:10.2.2.2 Type:4005, LSID:96 Adv-Router:10.2.2.2 Type:4005, LSID:97 Adv-Router:10.2.2.2 Type:4005, LSID:98 Adv-Router:10.2.2.2 Type:4005, LSID:99 Adv-Router:10.2.2.2 Type:4005, LSID:100 Adv-Router:10.2.2.2 Type:4005, LSID:101 Adv-Router:10.2.2.2 Type:4005, LSID:102 Adv-Router:10.2.2.2...
  • Page 123 IPv6 OSPF debug commands Type:4005, LSID:121 Adv:10.2.2.2 SEQ:80000001 AGE:41 Type:4005, LSID:122 Adv:10.2.2.2 SEQ:80000001 AGE:41 Type:4005, LSID:123 Adv:10.2.2.2 SEQ:80000001 AGE:41 Type:4005, LSID:124 Adv:10.2.2.2 SEQ:80000001 AGE:41 Type:4005, LSID:125 Adv:10.2.2.2 SEQ:80000001 AGE:41 Type:4005, LSID:126 Adv:10.2.2.2 SEQ:80000001 AGE:41 Type:2002, LSID:644 Adv:10.4.4.8 SEQ:80000007 AGE:168 Debug: Jan 1 19:14:43 OSPFv3: Snd LSUpdate on ve 9 OSPFv3: (fe80::224:38ff:fe21:6400->OSPFv3: ff02::5) Type:2009, LSID:19320 Adv:10.4.4.8 SEQ:80000007 AGE:3600...
  • Page 124 IPv6 OSPF debug commands Brocade(config-if-e1000-8/9)# Debug: Jan 1 19:19:50 OSPFv3: add to spf list Inst vrf id 0, flag 0 Debug: Jan 1 19:19:50 OSPFv3: Redistribute:remove prefix 2001:DB8::/64 Debug: Jan 1 19:19:50 OSPFv3: Redistribute:remove prefix 2001:DB8::/64 Debug: Jan 1 19:19:50 OSPFv3: Redistribute:remove prefix 2001:DB8::/64 Debug: Jan 1 19:19:50 OSPFv3: Redistribute:remove prefix 2001:DB8::/64 Debug: Jan...
  • Page 125 IPv6 OSPF debug commands Debug: Jan 1 19:19:51 OSPFv3: Validating route 2001:DB8::/64, nexthop cnt 1, route_info->flag 0x1 Debug: Jan 1 19:19:51 OSPFv3: Route 2001:DB8::/64 removed from RIB Debug: Jan 1 19:19:51 OSPFv3: Route 2001:DB8::/64 deleted from OSPF Table Debug: Jan 1 19:19:51 OSPFv3: Validating route 2001:DB8::/64, nexthop cnt 1, route_info->flag 0x1 Debug: Jan...
  • Page 126 IPv6 OSPF debug commands Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 36) is Self-originated: Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: Forwarding flag specified Debug: Jan 1 19:21:07 OSPFv3: EXTERNAL ROUTE: External LSA(ID= 38) is Self-originated:...
  • Page 127 IPv6 OSPF debug commands This command displays SPF route calculations as shown in the following example. Brocade# debug ipv6 ospf route-calc-spf OSPFv3: route-calc-spf debugging is on Brocade(config-if-e1000-8/9)# Debug: Jan 1 19:26:13 OSPFv3: Schedule routing table build Debug: Jan 1 19:26:13 OSPFv3: add to spf list Inst vrf id 0, flag 0 Debug: Jan 1 19:26:19 OSPFv3: delete from spf list Inst vrf id 0, flag 1 Debug: Jan...
  • Page 128 IPv6 OSPF debug commands Debug: Jan 1 19:48:12 OSPFv3: Validating route 2001:DB8::/64, nexthop cnt 1, route_info->flag 0x1 Debug: Jan 1 19:48:12 OSPFv3: Route 2001:DB8::/64 removed from RIB Debug: Jan 1 19:48:12 OSPFv3: Route 2001:DB8::/64 deleted from OSPF Table Debug: Jan 1 19:48:12 OSPFv3: Validating route 2001:DB8::/64, nexthop cnt 1, route_info->flag 0x1 Debug: Jan...
  • Page 129: Dhcpv6 Debug Commands

    DHCPv6 debug commands Debug: Jan 1 19:48:12 OSPFv3: Validating route 2001:DB8::/64, nexthop cnt 1, route_info->flag 0x1 DHCPv6 debug commands This section describes the debug commands used for troubleshooting issues related to Dynamic Host Configuration Protocol for IPv6 (DHCPv6) relay agent and snooping activity. debug ipv6 dhcp relay Syntax: [no] debug ipv6 dhcp relay This command displays debug information related to DCHPv6 relay agent.
  • Page 130: Ipv6 Pim Debug Commands

    IPv6 PIM debug commands IPv6 PIM debug commands This section describes the debug commands used for troubleshooting issues related to IPv6 Protocol Independent Multicast (PIM). debug ipv6 pim bootstrap Syntax: [no] debug ipv6 pim bootstrap This command enables IPv6 PIM bootstrap debugging and the output resembles the following example.
  • Page 131 IPv6 PIM debug commands Brocade# debug ipv6 pim group ff0::8 PIM6: group ff0::8 debugging is on Brocade# PIM.VRF0: Deallocated hw resources for (7400::200 ff0::8), parent: NIL,Nil. olist not empty VRF0 Flow Entry Delete (2001:DB8::200 ff0::1) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::2) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::3) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::4) HW bits: 1 1 VRF0 Flow Entry Delete (2001:DB8::200 ff0::5) HW bits: 1 1...
  • Page 132 IPv6 PIM debug commands Group=ff0::5. Prune list: 0 srcs Group=ff0::6. Join list: 1 srcs J-Src=2001:DB8::200, wc=0, rpt=0, SM=1 PIM.VRF0: Processing (S,G) Join (2001:DB8::200 ff84::6) from fe80::768e:f8ff:fe3e:9600, intf v1844,1/1/11 debug ipv6 pim nbr-change Syntax: [no] debug ipv6 pim nbr-change [nbr_address] The nbr_address variable specifies the neighbor address. This command controls the IPv6 PIM neighbor changes and the command output resembles the following example.
  • Page 133 IPv6 PIM debug commands switch_to_spt: No. Thrshld: 1, Cnt: 1. RPT=0, Local-Rcvr=0 Rx Pkt (2001:DB8::200, ff0::19) on v1244(1/12). Rx flow on intf/port diff than entry's intf v1244 or port INVALID send MCAST_FIRST_DATA: entry phy port: INVALID, pkt input port: 1/11-1/14. SPT-F, FAST-F * *: 0 pkt,from v1244(e1/12), dup.
  • Page 134 IPv6 PIM debug commands switch_to_spt: No. Thrshld: 1, Cnt: 106. RPT=0, Local-Rcvr=0 Rx Pkt (2001:DB8::200, ff0::17) on v1244(1/14). * *: 0 pkt,from v1244(e1/14), dup. pkt to v55 phy e1/1, l2=0 SW forwarded pkt to 1 oif(s) switch_to_spt: No. Thrshld: 1, Cnt: 106. RPT=0, Local-Rcvr=0 Rx Pkt (2001:DB8::200, ff0::14) on v1244(1/11).
  • Page 135 IPv6 PIM debug commands Brocade# PIMv6-CRP.VRF0: Sending Candidate RP Msg (size 46) PIMv6-CRP.VRF0: Sending Candidate RP Msg (size 46) debug ipv6 pim source Syntax: [no] debug ipv6 pim source ipaddr This command displays the IPv6 PIM related debugging information for the specified source address.
  • Page 136: Ipv6 Rip Debug Commands

    IPv6 RIP debug commands IPv6 RIP debug commands The following debug commands display debugging information for the IPv6 Routing Information Protocol (RIP). debug ipv6 rip events Syntax: [no] debug ipv6 rip events This command displays debugging information about the IPv6 RIP events. Brocade# debug ipv6 rip events Brocade(config-vif-11)# RIPng: update timer expired clear ipv routeRIPng: triggered update...
  • Page 137 IPv6 RIP debug commands prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 prefix 2001:DB8::/64 metric 1 tag 0 Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 138 IPv6 RIP debug commands Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 139: Multicast Diagnostics

    Chapter Multicast Diagnostics This chapter contains the following sections: • MSDP debug commands ........127 •...
  • Page 140: Igmp Debug Commands

    IGMP debug commands Brocade# debug ip msdp events : MSDP: 10.120.120.45: Process START event, local = 10.120.120.31 : MSDP: S=xxxxxxx P=0 Initiate Transport Connection to MSDP peer : MSDP: 10.120.120.45: TCP Connection to Remote Peer is Open : MSDP: 10.120.120.45: MSDP-TCP Connection opened : MSDP: 10.120.120.45: TCP_OPEN DONE, State 4 : MSDP: Remote Peer closed TCP connection : MSDP: 10.120.120.45 Remote Peer closed TCP connection...
  • Page 141 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.148 resp=100, pkt S=10.17.17.222 to 239.0.0.148, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.149 resp=100, pkt S=10.17.17.222 to 239.0.0.149, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.150 resp=100, pkt S=10.17.17.222 to 239.0.0.150, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.151 resp=100, pkt S=10.17.17.222 to 239.0.0.151, on v17 (phy 2/1/17), igmp_size=8...
  • Page 142 IGMP debug commands eIGMP: rcvd Report-V2(t=22) g=239.0.0.177 resp=100, pkt S=10.17.17.222 to 239.0.0.177, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.178 resp=100, pkt S=10.17.17.222 to 239.0.0.178, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.179 resp=100, pkt S=10.17.17.222 to 239.0.0.179, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.180 resp=100, pkt S=10.17.17.222 to 239.0.0.180, on v17 (phy 2/1/17), igmp_size=8...
  • Page 143 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.207 resp=100, pkt S=10.17.17.222 to 239.0.0.207, on v17 (phy 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) g=239.0.0.208 resp=100, pkt S=10.17.17.222 to 239.0.0.208, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.209 resp=100, pkt S=10.17.17.222 to 239.0.0.209, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.210 resp=100, pkt S=10.17.17.222 to 239.0.0.210, on v17 (phy 2/1/17), igmp_size=8...
  • Page 144 IGMP debug commands This command displays information about the addition or deletion of all the OIFs that are IGMP-enabled. Brocade# debug ip igmp add-del-oif all add-del-oif all enabled Brocade# debug ip igmp show igmp debug-enable-any = 1 debug ip igmp add-del-oif all is enabled Brocade# debug ip igmp Brocade# IGMP: rcvd Report-V2(t=22) g=239.0.0.99 resp=100, pkt S=10.17.17.222 to...
  • Page 145 IGMP debug commands Brocade# IGMP: rcvd Report-V2(t=22) g=239.0.0.124 resp=100, pkt S=10.17.17.222 to 239.0.0.124, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.125 resp=100, pkt S=10.17.17.222 to 239.0.0.125, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.126 resp=100, pkt S=10.17.17.222 to 239.0.0.126, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.127 resp=100, pkt S=10.17.17.222 to...
  • Page 146 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.153 resp=100, pkt S=10.17.17.222 to 239.0.0.153, on v17 (phy 2/1/17), igmp_size=8 lIGMP: rcvd Report-V2(t=22) g=239.0.0.154 resp=100, pkt S=10.17.17.222 to 239.0.0.154, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.155 resp=100, pkt S=10.17.17.222 to 239.0.0.155, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.156 resp=100, pkt S=10.17.17.222 to 239.0.0.156, on v17 (phy 2/1/17), igmp_size=8...
  • Page 147 IGMP debug commands oIGMP: rcvd Report-V2(t=22) g=239.0.1.23 resp=100, pkt S=10.17.17.222 to 239.0.1.23, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.24 resp=100, pkt S=10.17.17.222 to 239.0.1.24, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.25 resp=100, pkt S=10.17.17.222 to 239.0.1.25, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.26 resp=100, pkt S=10.17.17.222 to 239.0.1.26, on v17 (phy 2/1/17), igmp_size=8...
  • Page 148 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.1.53 resp=100, pkt S=10.17.17.222 to 239.0.1.53, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.54 resp=100, pkt S=10.17.17.222 to 239.0.1.54, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.55 resp=100, pkt S=10.17.17.222 to 239.0.1.55, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.56 resp=100, pkt S=10.17.17.222 to 239.0.1.56, on v17 (phy 2/1/17), igmp_size=8...
  • Page 149 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.87 resp=100, pkt S=10.17.17.222 to 239.0.0.87, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.88 resp=100, pkt S=10.17.17.222 to 239.0.0.88, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.89 resp=100, pkt S=10.17.17.222 to 239.0.0.89, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.90 resp=100, pkt S=10.17.17.222 to 239.0.0.90, on v17 (phy 2/1/17), igmp_size=8...
  • Page 150 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.117 resp=100, pkt S=10.17.17.222 to 239.0.0.117, on v17 (phy 2/1/17), igmp_size=8 bIGMP: rcvd Report-V2(t=22) g=239.0.0.118 resp=100, pkt S=10.17.17.222 to 239.0.0.118, on v17 (phy 2/1/17), igmp_size=8 uIGMP: rcvd Report-V2(t=22) g=239.0.0.119 resp=100, pkt S=10.17.17.222 to 239.0.0.119, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.0.120 resp=100, pkt S=10.17.17.222 to 239.0.0.120, on v17 (phy 2/1/17), igmp_size=8...
  • Page 151 IGMP debug commands debug ip igmp group Syntax: [no] debug ip igmp group ipaddr This command matches the IGMP-enabled group based on the IP address. The ipaddr variable refers to the IP address of the IGMP group. Brocade# debug ip igmp group 10.11.66.62 IGMP: No L3 mcast, pkt S=10.11.66.62 to 225.1.1.167, on v8 (phy 1/2/4), igmp_size=8 IGMP: rcvd Report-V2(t=22)
  • Page 152 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.7 resp=100, pkt S=10.17.17.222 to 239.0.0.7, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.8 resp=100, pkt S=10.17.17.222 to 239.0.0.8, on v17 (phy 2/1/17), igmp_size=8 consume pkt nIGMP: rcvd Report-V2(t=22) g=239.0.0.9 resp=100, pkt S=10.17.17.222 to 239.0.0.9, on v17 (phy 2/1/17), igmp_size=8 consume pkt oIGMP: rcvd Report-V2(t=22)
  • Page 153 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.27 resp=100, pkt S=10.17.17.222 to 239.0.0.27, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.28 resp=100, pkt S=10.17.17.222 to 239.0.0.28, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.29 resp=100, pkt S=10.17.17.222 to 239.0.0.29, on v17 (phy 2/1/17), igmp_size=8 consume pkt dIGMP: rcvd Report-V2(t=22)
  • Page 154 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.0.47 resp=100, pkt S=10.17.17.222 to 239.0.0.47, on v17 (phy 2/1/17), igmp_size=8 consume pkt lIGMP: rcvd Report-V2(t=22) g=239.0.0.48 resp=100, pkt S=10.17.17.222 to 239.0.0.48, on v17 (phy 2/1/17), igmp_size=8 consume pkt IGMP: rcvd Report-V2(t=22) g=239.0.0.49 resp=100, pkt S=10.17.17.222 to 239.0.0.49, on v17 (phy 2/1/17), igmp_size=8 consume pkt lIGMP send Query(t=17) V2, s=10.17.17.52 0.0.0.0 to v17(all) rsp=100 igmp=8B,...
  • Page 155 IGMP debug commands IGMP: rcvd Report-V2(t=22) g=239.0.1.167 resp=100, pkt S=10.17.17.222 to 239.0.1.167, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.168 resp=100, pkt S=10.17.17.222 to 239.0.1.168, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.169 resp=100, pkt S=10.17.17.222 to 239.0.1.169, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.170 resp=100, pkt S=10.17.17.222 to 239.0.1.170, on v17 (phy 2/1/17), igmp_size=8...
  • Page 156 IGMP debug commands eIGMP: rcvd Report-V2(t=22) g=239.0.1.196 resp=100, pkt S=10.17.17.222 to 239.0.1.196, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.197 resp=100, pkt S=10.17.17.222 to 239.0.1.197, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.198 resp=100, pkt S=10.17.17.222 to 239.0.1.198, on v17 (phy 2/1/17), igmp_size=8 IGMP: rcvd Report-V2(t=22) g=239.0.1.199 resp=100, pkt S=10.17.17.222 to 239.0.1.199, on v17 (phy 2/1/17), igmp_size=8...
  • Page 157 IGMP debug commands IGMP: rcvd Leave(t=23) g=225.1.1.33 resp=0, pkt S=10.11.66.62 to 224.0.0.2, on VL8 (phy 1/2/4), igmp_size=8 debug ip igmp prime-port ethernet Syntax: [no] debug ip igmp prime-port ethernet stackid/slot/port This command monitors the activity of the physical port if the trunking is carried out on the primary port.
  • Page 158 IGMP debug commands IGMP.VRF0: [ Port 3/1/39,v76. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 3/1/39,v76 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 6/1/22,v77. Grp 0.0.0.0 ] Sent version 3 Query. size 12. Src 10.0.0.18 IGMP.VRF0: [ Port 6/1/22,v77 ] Sent General Query version 3 using src 10.0.0.18 IGMP.VRF0: [ Port 4/1/22,v78.
  • Page 159 IGMP debug commands debug ip igmp rx Syntax: [no] debug ip igmp rx This command displays the IGMP packets received. Brocade# debug ip igmp rx Brocade# debug ip igmp protocol query IGMP.VRF1: Query Port 1/1/3*1/1/14,v25 Grp 0.0.0.0 IGMP.QRY: [ Port 1/1/3*1/1/14,v25. Grp 0.0.0.0 ]. Processing version 2 query IGMP.VRF1: Query Port 1/1/3*1/1/14,v25 Grp 0.0.0.0 IGMP.QRY: [ Port 1/1/3*1/1/14,v25.
  • Page 160 IGMP debug commands IGMP.VRF2: [ Port 1/1/3*1/1/14,v21 ] Sent General Query version 2 using src 21.0.0.6 IGMP.VRF0: [ Port 1/1/7-1/1/8,tn11. Grp 0.0.0.0 ] Sent version 2 Query. size 8. Src 61.0.0.6 IGMP.VRF0: [ Port 1/1/7-1/1/8,tn11 ] Sent General Query version 2 using src 61.0.0.6 IGMP.VRF0: [ Port 1/1/1-1/1/2,v91.
  • Page 161 IGMP debug commands debug ip igmp proxy packet Syntax: [no] debug ip igmp proxy packet This command displays debugging information related to the IGMP proxy packets as shown in the following example. Brocade# debug ip igmp proxy packet Debug: Jan 1 20:55:28 20:55:46 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 229.2.1.1 rprt to vir port v85 phy port 2/13 Debug: Jan...
  • Page 162: Igmp Snooping Debug Commands

    IGMP snooping debug commands Debug: Jan 1 20:55:28 20:55:46 - MCPROXY_TX: [IPv4:default-vrf] receive group query 229.2.1.1 on port e2/13 max resp code 10 Debug: Jan 1 20:55:29 20:55:47 - MCPROXY_TX: [IPv4:default-vrf] receive group query 229.2.1.1 on port e2/13 max resp code 10 Debug: Jan 1 20:55:40 20:55:58 - MCPROXY_TX: [IPv4:default-vrf] sending v1v2 grp 229.2.1.1 rprt to vir port v85 phy port 2/13...
  • Page 163 IGMP snooping debug commands This command displays the IGMP snooping multicast error messages. Command output resembles the following example. Brocade# debug igmp-snoop error IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16 IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt S=10.13.13.2 to 224.0.0.22, on VL130 (phy e1/1/2), igmp_size=16 IGMP: Error : Ignoring IGMP version 3 Report pkt due to version mismatch , pkt...
  • Page 164 IGMP snooping debug commands Brocade# debug igmp-snoop packet 10.13.13.3 228.1.1.2 debug ip igmpsnoop packet S=10.13.13.3 G=228.1.1.2 rtr_l2mcast_fwd_data (pkts:1), (10.13.13.3 228.1.1.2), from e1/1/1 vlan 130, has fwd_entry rtr_l2mcast_fwd_data (pkts:1), (10.13.13.3 228.1.1.2), from e1/1/1 vlan 130, clear hw_aging flag debug igmp-snoop port ethernet Syntax: [no] debug igmp-snoop port ethernet num The num variable refers to the stack ID, slot number, and port number of a specific Ethernet port.
  • Page 165: Pim Debug Commands

    PIM debug commands This command displays information about the IGMP snooping related timer events. Command output resembles the following example. Brocade# debug igmp-snoop timer Brocade# debug igmp-snoop prime-port eth 1/1/2 igmp timer, VL130(e1/1/2) change V1 client age out igmp timer, E401010A VL130(e1/1/2) switch back to include mode igmp timer, E4010109 VL130(e1/1/2) switch back to include mode igmp timer, E4010108 VL130(e1/1/2) switch back to include mode debug igmp-snoop vlan...
  • Page 166 PIM debug commands e16/27 10.220.220.21 10556 0x28C97FB3 Port Phy_p Neighbor Holdtime Age UpTime GenID e7/7 10.139.139.32 0x50B77D32 Port Phy_p Neighbor Holdtime Age UpTime GenID tn24 e7/1 10.120.120.31 0x15EB0B50 Brocade# debug ip pim add-del-oif add-del-oif enabled Brocade# debug ip pim show pim debug-enable-any = 1 debug ip pim add-del-oif is enabled Brocade# debug ip pim...
  • Page 167 PIM debug commands pim_process_port_up (ve port) v19, send query vport_state_notify v19 (phy e7/3) up=1 debug ip pim bootstrap Syntax: [no] debug ip pim bootstrap This command enables bootstrap debugging and the output resembles the following example. Brocade# debug ip pim bootstrap PIM: bootstrap debugging is on Brocade# PIM-BSR.VRF0: Prefer BSR 10.0.0.43(Pr 43) over current BSR 10.0.0.43(Pr...
  • Page 168 PIM debug commands Mcastv4 receive event 15 Mcastv4 receive event 15 Mcastv4 receive event 15 debug ip pim group Syntax: [no] debug ip pim group ipaddr This command displays the PIM related activities related to the particular IP address of the PIM group.
  • Page 169 PIM debug commands join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0, JOI join_prune_timer, (10.11.99.99 227.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v1 join_prune_timer, (10.11.99.99 227.1.1.1) fail RPT PRUNE cond. Begin sending Join/Prune msg to v100, rpf_nbr=10.10.10.129, group address: 227.1.1.1 Join list: (10.11.99.99 227.1.1.1) wc=0 rpt=0 sparse=1 Join list: (10.10.10.129 227.1.1.1) wc=1 rpt=1 sparse=1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=42 to v100 Brocade# Proc IGMP join g=227.1.1.1 from v300(2/1/17) 10.11.55.55...
  • Page 170 PIM debug commands PIM.VRF0: (10.0.0.168 232.0.0.14) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.15) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.15) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.16) RPFIf v75. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.168 232.0.0.16) RPFIf v76. RPFNbr -. Send Join/Prune PIM.VRF0: (10.0.0.178 232.0.0.17) RPFIf v75.
  • Page 171 PIM debug commands group address: 225.1.1.2 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=294 to v100 group address: 225.1.1.1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=322 to v100 group address: 226.1.1.2 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=350 to v100 group address: 227.1.1.2 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=378 to v100 group address: 227.1.1.1 send_J/P_msg(), lcl_adr=10.10.10.119 dest=224.0.0.13 pkt_size=406 to v100 00:21:16 Send PIM_V2 Join/Prune Src 10.10.10.119 Dst 224.0.0.13 Len 406 on v100 PIMSM: END Periodic join-prune msgs...
  • Page 172 PIM debug commands send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=126 to v100 group address: 225.1.1.6 Join list: (10.10.129 225.1.1.6) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.6) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=154 to v100 group address: 225.1.1.5 Join list: (10.10.129 225.1.1.5) wc=1 rpt=1 sparse=1 Join list: (10.11.10.101 225.1.1.5) wc=0 rpt=0 sparse=1 send_J/P_msg(), lcl_adr=10.10.119 dest=224.0.0.13 pkt_size=182 to v100 group address: 225.1.1.4...
  • Page 173 PIM debug commands VRF0 Flow Entry Delete (10.0.0.168 232.0.0.14) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.15) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.16) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.17) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.18) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.19) HW bits: 0 0 VRF0 Flow Entry Delete (10.0.0.168 232.0.0.20) HW bits: 0 0...
  • Page 174 PIM debug commands IGMP: IGMP: rcvd Report-V3(t=34) #rec=1, pkt S=10.2.1.6 to 224.0.0.22, on v800 (phy 2/1/5), igmp_size=16 debug ip pim regproc Syntax: [no] debug ip pim regproc This command controls register processing and the command output resembles the following example. Brocade# debug ip pim regproc Brocade(config-if-e1000-1/1/11)# debug ip pim regproc PIM:...
  • Page 175 PIM debug commands VRF0 Flow Entry Delete (10.0.0.168 232.0.0.21) HW bits: 0 0 debug ip pim source Syntax: [no] debug ip pim source ipaddr This command monitors the content related to a specific PIM server. The ipaddr variable refers to the IP address of the PIM server source.
  • Page 176: Pim-Sm Snooping Debug Commands

    PIM-SM snooping debug commands join_prune_timer, (10.11.10.101 225.1.1.1) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 225.1.1.1) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 225.1.1.1) fail RPT PRUNE cond. join_prune_timer, (10.11.10.101 226.1.1.2) ->num=1, rpt=0, am_rp_and_proxy=0, JOIN join_prune_timer, (10.11.10.101 226.1.1.2) ->num=1, rpt=0, spt=1, SRC=v100, RP=v100 join_prune_timer, (10.11.10.101 226.1.1.2) fail RPT PRUNE cond.
  • Page 177 PIM-SM snooping debug commands debug pimsm-snoop control-source Syntax: [no] debug pimsm-snoop control-source source_address This command displays the PIM-SM snooping related debug information for the specified control source address. Command output resembles the following example. Brocade# debug pimsm-snoop control-source 10.27.27.2 Brocade# PIMv2 Hello from 10.27.27.2 port 1/1/12 on vlan 275 PIMv2 Join/Prune from 10.27.27.2 port 1/1/12 on vlan 275 PIMv2 Hello from 10.27.27.2 port 1/1/12 on vlan 275 PIMv2 Hello from 10.27.27.2 port 1/1/12 on vlan 275...
  • Page 178 PIM-SM snooping debug commands debug pimsm-snoop physical-port ethernet Syntax: [no] debug pimsm-snoop physical-port ethernet num The num variable refers to the stack ID, slot number, and port number of a specific Ethernet port. This command displays the PIM-SM snooping related debug information for the specified Ethernet interface.
  • Page 179: Mld Snooping Debug Commands

    MLD snooping debug commands MLD snooping debug commands Multicast Listener Discovery (MLD) discovers multicast listeners, or nodes that want to receive multicast packets on directly attached links. MLDv2 supports source filtering, the ability of a node to send reports on traffic that is from a specific address source or from all multicast addresses except the specified address sources.
  • Page 180 MLD snooping debug commands debug mld-snoop group Syntax: [no] debug mld-snoop group group_address The group_address is the address of the MLD snoop multicast group. This command displays the MLD snooping multicast group information. Command output resembles the following example. Brocade# debug mld-snoop group 2001:DB8::23:1 source fe80::1 phy-port eth 1/1/23 vlan 130...
  • Page 181 MLD snooping debug commands This command displays debugging information related to the MLD snoop packets. Command output resembles the following example. Brocade# debug mld-snoop packet 3 230001 debug mldsnoop packet (0x3 0x230001) // dm raw: RX [a0a]2322::3 ->ff1e::23:1 port: 1/1/1 rtr_l2mcast_fwd_data (pkts:2), (0x3 0x230001), from e1/1/1 vlan 130, has fwd_entry rtr_l2mcast_fwd_data (pkts:1), (0x3 0x230001), from e1/1/1 vlan 130, clear hw_aging flag...
  • Page 182 MLD snooping debug commands Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 183: Acl Debug Commands

    Chapter Security Diagnostics This chapter contains the following sections: • ACL debug commands ......... 171 •...
  • Page 184: Mac Authentication Debug Commands

    MAC authentication debug commands debug dot1x filter Syntax: [no] debug dot1x filter This command enables the 802.1x filter debugging. Brocade# debug dot1x filter dot1x: Filter debugging is on debug dot1x misc Syntax: [no] debug dot1x misc This command enables the 802.1x miscellaneous debugging. Brocade# debug dot1x misc dot1x: Misc debugging is on...
  • Page 185: Sflow Debug Commands

    sFlow debug commands Tracing the outgoing Radius Authentication packet.. UDP packet source IP=198.19.9.1, port=1645, destination IP=64.12.12.5, port=1745 Radius Header (hex): Code=0x01 Identifier=0x11 Length=0x0065 Authenticator (hex):000078d6000028c00000699d00004bf3 Attribute Type(hex)=0x01 Len(hex)=0x0e Value (ASCII)=0 0 3 0 4 8 7 4 3 1 8 1 Attribute Type(hex)=0x02 Len(hex)=0x12 Value (hex)=414084e32550daec45ef8129b7c6 aed9 Attribute Type(hex)=0x06 Len(hex)=0x06 Value (hex)=00000002...
  • Page 186: Ip Security Debug Commands

    IP security debug commands IP security debug commands The following command displays debug information related to Internet Protocol security (IPsec) operation for OSPFv3. debug ipsec all Syntax: [no] debug ipsec all This command displays all debuggging information related to IPsec operation as shown in the following example.
  • Page 187 IP security debug commands Debug: Jan 1 02:04:15 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80:: Debug: Jan 1 02:04:26 IPSEC,IN: spi=400 (pkt 'ESP FE80:: -> FE80::') payloadlength =64 Debug: Jan 1 02:04:26 IPSEC,IN: Incoming packet matches Policy : input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' ->...
  • Page 188: Web Events Debug Commands

    Web events debug commands Debug: Jan 1 01:57:26 IPSEC,Policy: Creating flow [input use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP in spi=0x190 dst=FE80::] : ok Brocade(config-ospf6-router)#Debug: Jan 1 02:02:21 IPSEC,Policy: Creating flow [output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP out spi=0x190 dst=::] : ok debug ipv6 ospf ipsec Syntax: [no] debug ipv6 ospf ipsec...
  • Page 189: Ra Guard Debug Commands

    RA guard debug commands This command enables debugging of web authentication timers. Brocade# debug webauth timers webauth: Timers debugging is on RA guard debug commands The Router Advertisement (RA) guard feature controls the propagation of router advertisements through the local IPv6 networks and thereby improves the security of IPv6 networks. The following debug command enables RA guard debugging.
  • Page 190 debug ipv6 raguard Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 191: Supportsave Diagnostics

    Chapter supportsave Diagnostics This chapter contains the following sections: • supportsave overview ......... . 179 •...
  • Page 192 supportsave commands • The supportsave command cannot be added to the custom commands list. Also, the commands which change the CLI mode (exit, quit, end) and commands which restart the router (switchover, reload, reload-yes) must not be added. • Modifying the custom commands list using the supportsave add-cmd or supportsave del-cmd commands is not allowed while the supportsave data collection is in progress.
  • Page 193 supportsave commands The following supportsave commands are used to collect all relevant support information to a remote TFTP server location. supportsave Syntax: supportsave [all | os | platform | l2 | l3 | custom | core] tftp_server_ IP tftp_ server's_ relative_ path_name [user_tag] •...
  • Page 194 supportsave commands • show - Displays the progress of the log collection that has been executed on a terminal other than the one on which the supportsave command is executed. • cancel - Cancels the current log collection that has been executed on a terminal other than the one on which the supportsave command is executed.
  • Page 195: Recovery During Continuous Reload

    supportsave commands The following is the sample output from the supportsave info enable command. Brocade# supportsave info enable Brocade# show flash ===========show flash=========== HW:FCX624S-HPOE-PREM, Label:FCXR08000b1, Started at 11:33:06.458 GMT+00 Fri Dec 07 2012 Stack unit 1: Compressed Pri Code size = 7199468, Version:07.4.00T7f3 (FCXR07400C005.bin) Compressed Sec Code size = 8637789, Version:08.0.00T7f3 (FCXR08000b1.bin) Compressed Boot-Monitor Image size = 370611, Version:07.3.00T7f5 Code Flash Free Space = 48103424...
  • Page 196 supportsave commands Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 197: Technical Support Diagnostics

    Chapter Technical Support Diagnostics This chapter contains the following sections: • show tech-support ..........185 •...
  • Page 198 ..rw snmp-server community ..rw interface management 1 ip address 172.26.67.52 255.255.240.0 Copyright (c) 1996-2011 Brocade Communications Systems, Inc. UNIT 1: compiled on Dec 20 2011 at 08:58:01 labeled as FCXR07400b1 (7155950 bytes) from Secondary FCXR07400b1.bin SW: Version 07.4.00b1T7f3 Boot-Monitor Image size = 369369, Version:07.3.00T7f5 (grz07300b1)
  • Page 199 show tech-support ========================================================================== 800 MHz Power PC processor 8544E (version 0021/0022) 400 MHz bus 65536 KB flash memory 256 MB DRAM Monitor Option is on STACKID 1 system uptime is 31 minutes 41 seconds The system : started=warm start reloaded=by "reload" *** NOT FOR PRODUCTION *** Port Link...
  • Page 200 show tech-support 0d00h00m11s:I:System: Stack unit 1 POE Power supply 1 with 410000 mwatts capacity is up Dynamic Log Buffer (50 lines): 0d00h31m23s:W:System:Stack unit 1 Fan speed changed automatically to 2 0d00h28m33s:W:System:Stack unit 1 Fan speed changed automatically to 1 0d00h22m33s:W:System:Stack unit 1 Fan speed changed automatically to 2 (output truncated) show tech-support acl Syntax: show tech-support acl...
  • Page 201 show tech-support show tech-support cpu Syntax: show tech-support cpu This command displays debugging information related to CPU usage and utilization. Command output resembles the following example. Brocade# show tech-support cpu CPU Usage Information. 4 percent busy, from 1931 sec ago sec avg: 1 percent busy sec avg:...
  • Page 202 show tech-support • Link aggregation configuration • Media Access Control (MAC) table • Dot1x port security • MAC security • Metro Ring Protocol (MRP) • Virtual Switch Redundancy Protocol (VSRP) • Interface statistics The following example shows the truncated output of the show tech-support l2 command. Brocade# show tech-support l2 VLAN Brief Summary Information : System-max vlan Params: Max(4095) Default(64) Current(64)
  • Page 203 show tech-support STP instance owned by VLAN 10 Global STP (IEEE 802.1D) Parameters: ----------------------------------- VLAN Root Root Root Prio Max He- Ho- Fwd Last Chg Bridge Cost Port rity Age llo ld dly Chang cnt Address sec sec sec sec sec 10 8000002438c94fc0 0 Root 8000 20...
  • Page 204 show tech-support show tech-support l3 ipv4-uc Syntax: show tech-support l3 ipv4-uc This command displays the following debugging information related to the Layer 3 IPv4 unicast configurations: • IPv4 routing table • IPv4 interface • Routing Information Protocol (RIP) routes and neighbors •...
  • Page 205 show tech-support Interface Configuration Error Trap: Enabled Virtual Interface Configuration Error Trap: Enabled Interface Authentication Failure Trap: Enabled Virtual Interface Authentication Failure Trap: Enabled Interface Receive Bad Packet Trap: Enabled Virtual Interface Receive Bad Packet Trap: Enabled Interface Retransmit Packet Trap: Enabled Virtual Interface Retransmit Packet Trap: Enabled...
  • Page 206 show tech-support Update time interval : 30 Last broadcast time : 29 (output truncated) show tech-support l3 ipv6-uc Syntax: show tech-support l3 ipv6-uc This command displays the following debugging information related to the Layer 3 IPv6 unicast configurations: • IPv6 routing table •...
  • Page 207 show tech-support Number of neighbors in state Full RouterID Pri State Interface[State] 172.26.67.67 1 Full 172.26.67.65 172.26.67.67 e 1/1/8 [DR] IPV6 OSPF Memory : ---------------- Total Static Memory Allocated : 19508 bytes Total Dynamic Memory Allocated : 2750268 bytes Memory Type Size Allocated Max-alloc...
  • Page 208 show tech-support Compressed Pri Code size = 7091393, Compressed Sec Code size = 7063608, Compressed Boot-Monitor Image size = 369292, Version:07.1.00T7f5 Code Flash Free Space = 50462720 DM-Memory Related Information memory tracking has run 00:00:00 malloc 0 times, 0 B, free: #0 , 0 B, not in: 0 alloc in-use avail get-fail limit...
  • Page 209 show tech-support tn5:TR(e1/1): e1/1 is primary-port of tunnel out-trunk FLAGS: fast/slow: could be HW switched or not pru: pruned from upstream frag: packet fragmented, SW forwarded unless multicast-perf configured tag/tnnl: OIF has tagged/tunnel ports swL2/hwL2: SW or HW L2 forwarding age: send 1 pkt to cpu from HW switch to reset age 0L2C:...
  • Page 210: Commands

    Commands 1/1/13 1/1/14 1/1/15 1/1/16 1/1/17 1/1/18 1/1/19 1/1/20 1/1/21 1/1/22 1/1/23 1/1/24 1/1/25 1/1/26 1/1/27 1/1/28 1/1/29 1/1/30 Commands The following commands support the features described in this chapter: • show tech-support cluster • show tech-support license • show tech-support stack Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference 53-1002965-01...
  • Page 211 show tech-support cluster show tech-support cluster Collects and displays complete debugging information related to Multi-Chassis Trunking (MCT) cluster configuration. Syntax show tech-support cluster Parameters None Modes Privileged EXEC mode Command The show tech-support cluster command output includes the output of the show cluster and the Output show cluster ccp peer detail commands.
  • Page 212 show tech-support cluster Client Info: ------------ Number of Clients configured: 2 Name Rbridge-id Config LACP Port Trunk FSM-State client-1 Deployed client-2 Deployed **************Peer Session Details********************* IP address of the peer 10.20.152.21 Rbridge ID of the peer Session state of the peer OPERATIONAL Next message ID to be send 2426...
  • Page 213 show tech-support license show tech-support license Displays information about the license installed on the device. Syntax show tech-support license Parameters None Modes Privileged EXEC mode Command The show tech-support license command output includes the following information: Output • License name •...
  • Page 214 show tech-support stack show tech-support stack Collects and displays debugging information related to stacking configurations. Syntax show tech-support stack Parameters None Modes Privileged EXEC mode Command The show tech-support stack command output displays the following information related to Output stacking configurations: •...
  • Page 215 show tech-support stack ( 1 )1/1--1/1| 6 |2/3 +---+ peri-ports w/o link: 1/3/1 Standby u5 - No hitless failover. Reason: hitless-failover not configured Current stack management MAC is 0000.0001.0100 Note: no "stack mac" config. My MAC will change after failover. Image-Auto-Copy is Disabled.
  • Page 216 show tech-support stack Other: 1897, ACK: 18332, WND: 568, ACK+WND: 8 DAT: 27452, DAT+ACK: 158, DAT+WND: 2, DAT+ACK+WND: 0 Data retransmits done: 5681, Zero-window probes sent: 0 Dup ACK pkts rcvd: 3010, Pkts rcvd w/dup data: 1 History Release Command History Release 08.0.00a The show tech-support stack command was enhanced to display additional stacking...
  • Page 217 Diagnostic Command Index debug ip arp inspection 54 debug ip bgp 54 debug ip bgp dampening 54 debug 97, 167 debug ip bgp events 55 debug ? 2 debug ip bgp graceful-restart 55 debug 802.1w all_802_1w_events 15 debug ip dhcp-snooping 56 debug 802.1w messages 16 debug ip gre keepalive 58 debug 802.1w timer 17...
  • Page 218 debug ip msdp message 128 debug ip tcp sack 80 debug ip ntp 71 debug ip tcp transactions 80 debug ip ntp algorithms 71 debug ip udp 80 debug ip ntp association 72 debug ip vrrp events 82 debug ip ntp broadcast 72 debug ip vrrp packet 81 debug ip ntp clockadjust 72 debug ip vrrp packet v4 81...
  • Page 219 debug ipv6 ospf lsa-refresh 103 debug mstp show 23 debug ipv6 ospf nsm 104 debug mstp state 22 debug ipv6 ospf nsm-events 104 debug mstp verbose 23 debug ipv6 ospf nsm-status 105 debug packet-capture 45 debug ipv6 ospf packet 105 debug packet-capture filter 45 debug ipv6 ospf packet-dd 106 debug packet-capture filter show 47...
  • Page 220 show mac mdb 44 show mac mdup-stats 44 show tech-support 185 show tech-support acl 188 show tech-support cluster 199 show tech-support cpu 189 show tech-support l2 189 show tech-support l3 ipv4-uc 192 show tech-support l3 ipv6-uc 194 show tech-support license 201 show tech-support memory 195 show tech-support multicast 196 show tech-support packet-loss 197...

Table of Contents