Brocade Communications Systems FastIron SX 800 Diagnostic Manual page 187

Fastiron x series; fcx series; icx series; turboiron series;
Hide thumbs Also See for FastIron SX 800:
Table of Contents

Advertisement

Debug: Jan
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Debug: Jan
payloadlength =64
Debug: Jan
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Debug: Jan
payloadlength =64
Debug: Jan
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Debug: Jan
payloadlength =64
Debug: Jan
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Debug: Jan
payloadlength =64
Debug: Jan
'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP
debug ipsec out
Syntax: [no] debug ipsec out
This command enables the display of debugging information related to outbound OSPFv3 packets
with IPsec.
Brocade# debug ipsec out
IPSec:
Brocade(config-ospf6-router)# Debug: Jan 1 02:04:55 IPSEC,OUT:
output use 'prot=OSPF src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Debug: Jan
Debug: Jan
Debug: Jan
Debug: Jan
src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Debug: Jan
Debug: Jan
Debug: Jan
Debug: Jan
src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Debug: Jan
Debug: Jan
Debug: Jan
debug ipsec policy
Syntax: [no] debug ipsec policy
This command enables the display of debugging information for IPsec policy.
Brocade# debug ipsec policy
IPSec:
Brocade(config-ospf6-router)#no area 0 auth ipsec spi 400 esp sha1
abcef12345678901234fedcba098765432109876
Debug: Jan
src=FE80::/10:0 dst=::/0:0' -> SA: ESP
Brocade(config-ospf6-router)#area 0 auth ipsec spi 400 esp sha1
abcef12345678901234fedcba098765432109876
Brocade FastIron, FCX, ICX, and TurboIron Diagnostic Reference
53-1002965-01
1 02:04:15 IPSEC,IN: Incoming packet matches Policy :
1 02:04:26 IPSEC,IN:
1 02:04:26 IPSEC,IN: Incoming packet matches Policy :
1 02:04:26 IPSEC,IN:
1 02:04:26 IPSEC,IN: Incoming packet matches Policy :
1 02:04:36 IPSEC,IN:
1 02:04:36 IPSEC,IN: Incoming packet matches Policy :
1 02:04:36 IPSEC,IN:
1 02:04:36 IPSEC,IN: Incoming packet matches Policy :
out debugging is on
1 02:04:55 IPSEC,OUT: SA ESP
1 02:04:56 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
1 02:04:56 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
1 02:05:06 IPSEC,OUT:
1 02:05:06 IPSEC,OUT: SA ESP
1 02:05:07 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
1 02:05:07 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
1 02:05:15 IPSEC,OUT:
1 02:05:15 IPSEC,OUT: SA ESP
1 02:05:16 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
1 02:05:16 IPSEC,OUT: OSPF FE80:: -> FE80::, payloadlength =40
policy debugging is on
1 01:57:05 IPSEC,Policy: Removing flow [input use 'prot=OSPF
IP security debug commands
in spi=0x190 dst=FE80::
ESP
spi=400 (pkt 'ESP
in spi=0x190 dst=FE80::
ESP
spi=400 (pkt 'ESP
in spi=0x190 dst=FE80::
ESP
spi=400 (pkt 'ESP
in spi=0x190 dst=FE80::
ESP
spi=400 (pkt 'ESP
in spi=0x190 dst=FE80::
out spi=0x190 dst=:: payloadlength =64
Matching Flow:
output use 'prot=OSPF
out spi=0x190 dst=::
out spi=0x190 dst=:: payloadlength =64
Matching Flow:
output use 'prot=OSPF
out spi=0x190 dst=::
out spi=0x190 dst=:: payloadlength =64
in spi=0x190 dst=FE80::] : ok
7
input use
FE80:: -> FE80::')
input use
FE80:: -> FE80::')
input use
FE80:: -> FE80::')
input use
FE80:: -> FE80::')
input use
Matching Flow:
out spi=0x190 dst=::
175

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents