Table Of Contents
debug vpdn
debug vpdn pppoe-data
debug vpdn pppoe-error
debug vpdn pppoe-events
debug vpdn pppoe-packet
debug vpm all
debug vpm dsp
debug vpm error
debug vpm port
debug vpm signal
debug vpm signaling
debug vpm spi
debug vpm trunk_sc
debug vpm voaal2 all
debug vpm voaal2 type1
debug vpm voaal2 type3
debug vsi api
debug vsi errors
debug vsi events
debug vsi packets
debug vsi param-groups
debug vtemplate
debug vtsp all
debug vtsp dsp
debug vtsp error
debug vtsp port
debug vtsp send-nse
debug vtsp session
debug vtsp stats
debug vtsp vofr subframe
debug vtsp tone
debug x25
debug x25 annexg
debug x28
debug xcctsp all
debug xcctsp error
debug xcctsp session
debug xns packet
debug xns routing
debug vpdn
To troubleshoot Layer 2 Forwarding (L2F) or Layer 2 Tunnel Protocol (L2TP) virtual private dialup network (VPDN) tunneling events and infrastructure, use the debug vpdn command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug vpdn {error | event [disconnect] | l2tp-sequencing | l2x-data | l2x-errors | l2x-events |
l2x-packets | packet [errors]}
no debug vpdn {error | event [disconnect] | l2tp-sequencing | l2x-data | l2x-errors | l2x-events |
l2x-packets | packet [errors]}
Syntax Description
error
|
Displays VPDN errors.
|
event
|
Displays VPDN events.
|
disconnect
|
(Optional) Displays VPDN disconnect events.
|
l2tp-sequencing
|
Displays significant events related to L2TP sequence numbers such as mismatches, resend queue flushes, and drops.
|
l2x-data
|
Displays errors that occur in data packets.
|
l2x-errors
|
Displays errors that occur in protocol-specific conditions.
|
l2x-events
|
Displays events resulting from protocol-specific conditions.
|
l2x-packets
|
Displays detailed information about control packets in protocol-specific conditions.
|
packet
|
Displays information about VPDN packets.
|
errors
|
(Optional) Displays errors that occur in packet processing.
|
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
11.2
|
This command was introduced.
|
12.0(5)T
|
Support was added for L2TP debugging messages. The l2tp-sequencing and errors keywords were added. The l2f-errors, l2f-events, and l2f-packets keywords were changed to l2x-errors, l2x-events, and l2x-packets.
|
Usage Guidelines
Note that the debug vpdn packet and debug vpdn packet detail commands generate several debug operations per packet. Depending on the L2TP traffic pattern, these commands may cause the CPU load to increase to a high level that impacts performance.
Examples
This section contains the following examples:
•
Debugging VPDN Events on a NAS—Normal L2F Operations
•
Debugging VPDN Events on the Tunnel Server—Normal L2F Operations
•
Debugging VPDN Events on the NAS—Normal L2TP Operations
•
Debugging VPDN Events on the Tunnel Server—Normal L2TP Operations
•
Debugging Protocol-Specific Events on the NAS—Normal L2F Operations
•
Debugging Protocol-Specific Events on the Tunnel Server—Normal L2F Operations
•
Debugging Errors on the NAS—L2F Error Conditions
•
Debugging L2F Control Packets for Complete Information
Debugging VPDN Events on a NAS—Normal L2F Operations
The network access server (NAS) has the following VPDN configuration:
initiate-to ip 172.17.33.125
username nas1 password nas1
The following is sample output from the debug vpdn event command on a NAS when an L2F tunnel is brought up and Challenge Handshake Authentication Protocol (CHAP) authentication of the tunnel succeeds:
%LINK-3-UPDOWN: Interface Async6, changed state to up
*Mar 2 00:26:05.537: looking for tunnel -- cisco.com --
*Mar 2 00:26:05.545: Async6 VPN Forwarding...
*Mar 2 00:26:05.545: Async6 VPN Bind interface direction=1
*Mar 2 00:26:05.553: Async6 VPN vpn_forward_user user6@cisco.com is forwarded
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up
*Mar 2 00:26:06.289: L2F: Chap authentication succeeded for nas1.
The following is sample output from the debug vpdn event command on a NAS when the L2F tunnel is brought down normally:
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down
%LINK-5-CHANGED: Interface Async6, changed state to reset
*Mar 2 00:27:18.865: Async6 VPN cleanup
*Mar 2 00:27:18.869: Async6 VPN reset
*Mar 2 00:27:18.873: Async6 VPN Unbind interface
%LINK-3-UPDOWN: Interface Async6, changed state to down
Table 220 describes the significant fields shown in the two previous displays. The output describes normal operations when an L2F tunnel is brought up or down on a NAS.
Table 220 debug vpdn event Field Descriptions for the NAS
Field
|
Description
|
Asynchronous interface coming up
|
%LINK-3-UPDOWN: Interface Async6, changed state to up
|
Asynchronous interface 6 came up.
|
looking for tunnel -- cisco.com --
Async6 VPN Forwarding...
|
Domain name is identified.
|
Async6 VPN Bind interface direction=1
|
Tunnel is bound to the interface. These are the direction values:
• 1—From the NAS to the tunnel server
• 2—From the tunnel server to the NAS
|
Async6 VPN vpn_forward_user user6@cisco.com is forwarded
|
Tunnel for the specified user and domain name is forwarded.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up
|
Line protocol is up.
|
L2F: Chap authentication succeeded for nas1.
|
Tunnel was authenticated with the tunnel password nas1.
|
Virtual access interface coming down
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down
|
Normal operation when the virtual access interface is taken down.
|
Async6 VPN cleanup
Async6 VPN reset
Async6 VPN Unbind interface
|
Normal cleanup operations performed when the line or virtual access interface goes down.
|
Debugging VPDN Events on the Tunnel Server—Normal L2F Operations
The tunnel server has the following VPDN configuration, which uses nas1 as the tunnel name and the tunnel authentication name. The tunnel authentication name might be entered in a users file on an authentication, authorization, and accounting (AAA) server and used to define authentication requirements for the tunnel.
terminate-from hostname nas1
The following is sample output from the debug vpdn event command on the tunnel server when an L2F tunnel is brought up successfully:
L2F: Chap authentication succeeded for nas1.
Virtual-Access3 VPN Virtual interface created for user6@cisco.com
Virtual-Access3 VPN Set to Async interface
Virtual-Access3 VPN Clone from Vtemplate 1 block=1 filterPPP=0
%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up
Virtual-Access3 VPN Bind interface direction=2
Virtual-Access3 VPN PPP LCP accepted sent & rcv CONFACK
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up
The following is sample output from the debug vpdn event command on a tunnel server when an L2F tunnel is brought down normally:
%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down
Virtual-Access3 VPN cleanup
Virtual-Access3 VPN reset
Virtual-Access3 VPN Unbind interface
Virtual-Access3 VPN reset
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
Table 221 describes the fields shown in two previous outputs. The output describes normal operations when an L2F tunnel is brought up or down on a tunnel server.
Table 221 debug vpdn event Field Descriptions for the Tunnel Server
Field
|
Description
|
Tunnel coming up
|
L2F: Chap authentication succeeded for nas1.
|
PPP CHAP authentication status for the tunnel named nas1.
|
Virtual-Access3 VPN Virtual interface created for user6@cisco.com
|
Virtual access interface was set up on the tunnel server for the user user6@cisco.com.
|
Virtual-Access3 VPN Set to Async interface
|
Virtual access interface 3 was set to asynchronous for character-by-character transmission.
|
Virtual-Access3 VPN Clone from Vtemplate 1 block=1 filterPPP=0
|
Virtual template 1 was applied to virtual access interface 3.
|
%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up
|
Link status is set to up.
|
Virtual-Access3 VPN Bind interface direction=2
|
Tunnel is bound to the interface. These are the direction values:
• 1—From the NAS to the tunnel server
• 2—From the tunnel server to the NAS
|
Virtual-Access3 VPN PPP LCP accepted sent & rcv CONFACK
|
PPP link control protocol (LCP) configuration settings (negotiated between the remote client and the NAS) were copied to the tunnel server and acknowledged.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up
|
Line protocol is up; the line can be used.
|
Tunnel coming down
|
%LINK-3-UPDOWN: Interface Virtual-Access3, changed state to down
|
Virtual access interface is coming down.
|
Virtual-Access3 VPN cleanup
Virtual-Access3 VPN reset
Virtual-Access3 VPN Unbind interface
Virtual-Access3 VPN reset
|
Router is performing normal cleanup operations when a virtual access interface used for an L2F tunnel comes down.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to down
|
Line protocol is down for virtual access interface 3; the line cannot be used.
|
Debugging VPDN Events on the NAS—Normal L2TP Operations
The following is sample output from the debug vpdn event command on the NAS when an L2TP tunnel is brought up successfully:
20:19:17: L2TP: I SCCRQ from ts1 tnl 8
20:19:17: L2X: Never heard of ts1
20:19:17: Tnl 7 L2TP: New tunnel created for remote ts1, address 172.21.9.4
20:19:17: Tnl 7 L2TP: Got a challenge in SCCRQ, ts1
20:19:17: Tnl 7 L2TP: Tunnel state change from idle to wait-ctl-reply
20:19:17: Tnl 7 L2TP: Got a Challenge Response in SCCCN from ts1
20:19:17: Tnl 7 L2TP: Tunnel Authentication success
20:19:17: Tnl 7 L2TP: Tunnel state change from wait-ctl-reply to established
20:19:17: Tnl 7 L2TP: SM State established
20:19:17: Tnl/Cl 7/1 L2TP: Session FS enabled
20:19:17: Tnl/Cl 7/1 L2TP: Session state change from idle to wait-for-tunnel
20:19:17: Tnl/Cl 7/1 L2TP: New session created
20:19:17: Tnl/Cl 7/1 L2TP: O ICRP to ts1 8/1
20:19:17: Tnl/Cl 7/1 L2TP: Session state change from wait-for-tunnel to wait-connect
20:19:17: Tnl/Cl 7/1 L2TP: Session state change from wait-connect to established
20:19:17: Vi1 VPDN: Virtual interface created for bum1@cisco.com
20:19:17: Vi1 VPDN: Set to Async interface
20:19:17: Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking
20:19:18: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
20:19:18: Vi1 VPDN: Bind interface direction=2
20:19:18: Vi1 VPDN: PPP LCP accepting rcv CONFACK
20:19:19: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
Debugging VPDN Events on the Tunnel Server—Normal L2TP Operations
The following is sample output from the debug vpdn event command on the tunnel server when an L2TP tunnel is brought up successfully:
20:47:33: %LINK-3-UPDOWN: Interface Async7, changed state to up
20:47:35: As7 VPDN: Looking for tunnel -- cisco.com --
20:47:35: As7 VPDN: Get tunnel info for cisco.com with NAS nas1, IP 172.21.9.13
20:47:35: As7 VPDN: Forward to address 172.21.9.13
20:47:35: As7 VPDN: Forwarding...
20:47:35: As7 VPDN: Bind interface direction=1
20:47:35: Tnl/Cl 8/1 L2TP: Session FS enabled
20:47:35: Tnl/Cl 8/1 L2TP: Session state change from idle to wait-for-tunnel
20:47:35: As7 8/1 L2TP: Create session
20:47:35: Tnl 8 L2TP: SM State idle
20:47:35: Tnl 8 L2TP: Tunnel state change from idle to wait-ctl-reply
20:47:35: Tnl 8 L2TP: SM State wait-ctl-reply
20:47:35: As7 VPDN: bum1@cisco.com is forwarded
20:47:35: Tnl 8 L2TP: Got a challenge from remote peer, nas1
20:47:35: Tnl 8 L2TP: Got a response from remote peer, nas1
20:47:35: Tnl 8 L2TP: Tunnel Authentication success
20:47:35: Tnl 8 L2TP: Tunnel state change from wait-ctl-reply to established
20:47:35: Tnl 8 L2TP: SM State established
20:47:35: As7 8/1 L2TP: Session state change from wait-for-tunnel to wait-reply
20:47:35: As7 8/1 L2TP: Session state change from wait-reply to established
20:47:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async7, changed state to up
Debugging Protocol-Specific Events on the NAS—Normal L2F Operations
The following is sample output from the debug vpdn l2x-events command on the NAS when an L2F tunnel is brought up successfully:
Router# debug vpdn l2x-events
%LINK-3-UPDOWN: Interface Async6, changed state to up
*Mar 2 00:41:17.365: L2F Open UDP socket to 172.21.9.26
*Mar 2 00:41:17.385: L2F_CONF received
*Mar 2 00:41:17.389: L2F Removing resend packet (type 1)
*Mar 2 00:41:17.477: L2F_OPEN received
*Mar 2 00:41:17.489: L2F Removing resend packet (type 2)
*Mar 2 00:41:17.493: L2F building nas2gw_mid0
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up
*Mar 2 00:41:18.613: L2F_OPEN received
*Mar 2 00:41:18.625: L2F Got a MID management packet
*Mar 2 00:41:18.625: L2F Removing resend packet (type 2)
*Mar 2 00:41:18.629: L2F MID synced NAS/HG Clid=7/15 Mid=1 on Async6
The following is sample output from the debug vpdn l2x-events command on a NAS when an L2F tunnel is brought down normally:
Router# debug vpdn l2x-events
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down
%LINK-5-CHANGED: Interface Async6, changed state to reset
*Mar 2 00:42:29.213: L2F_CLOSE received
*Mar 2 00:42:29.217: L2F Destroying mid
*Mar 2 00:42:29.217: L2F Removing resend packet (type 3)
*Mar 2 00:42:29.221: L2F Tunnel is going down!
*Mar 2 00:42:29.221: L2F Initiating tunnel shutdown.
*Mar 2 00:42:29.225: L2F_CLOSE received
*Mar 2 00:42:29.229: L2F_CLOSE received
*Mar 2 00:42:29.229: L2F Got closing for tunnel
*Mar 2 00:42:29.233: L2F Removing resend packet
*Mar 2 00:42:29.233: L2F Closed tunnel structure
%LINK-3-UPDOWN: Interface Async6, changed state to down
*Mar 2 00:42:31.793: L2F Closed tunnel structure
*Mar 2 00:42:31.793: L2F Deleted inactive tunnel
Table 222 describes the fields shown in the displays.
Table 222 debug vpdn l2x-events Field Descriptions—NAS
Field
|
Descriptions
|
Tunnel coming up
|
%LINK-3-UPDOWN: Interface Async6, changed state to up
|
Asynchronous interface came up normally.
|
L2F Open UDP socket to 172.21.9.26
|
L2F opened a User Datagram Protocol (UDP) socket to the tunnel server IP address.
|
L2F_CONF received
|
L2F_CONF signal was received. When sent from the tunnel server to the NAS, an L2F_CONF indicates the tunnel server's recognition of the tunnel creation request.
|
L2F Removing resend packet (type ...)
|
Removing the resend packet for the L2F management packet.
There are two resend packets that have different meanings in different states of the tunnel.
|
L2F_OPEN received
|
L2F_OPEN management message was received, indicating that the tunnel server accepted the NAS configuration of an L2F tunnel.
|
L2F building nas2gw_mid0
|
L2F is building a tunnel between the NAS and the tunnel server, using the Multiplex ID (MID) MID0.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to up
|
Line protocol came up. Indicates whether the software processes that handle the line protocol regard the interface as usable.
|
L2F_OPEN received
|
L2F_OPEN management message was received, indicating that the tunnel server accepted the NAS configuration of an L2F tunnel.
|
L2F Got a MID management packet
|
MID management packets are used to communicate between the NAS and the tunnel server.
|
L2F MID synced NAS/HG Clid=7/15 Mid=1 on Async6
|
L2F synchronized the Client IDs on the NAS and the tunnel server, respectively. A multiplex ID is assigned to identify this connection in the tunnel.
|
Tunnel coming down
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async6, changed state to down
|
Line protocol came down. Indicates whether the software processes that handle the line protocol regard the interface as usable.
|
%LINK-5-CHANGED: Interface Async6, changed state to reset
|
Interface was marked as reset.
|
L2F_CLOSE received
|
NAS received a request to close the tunnel.
|
L2F Destroying mid
|
Connection identified by the MID is being taken down.
|
L2F Tunnel is going down!
|
Advisory message about impending tunnel shutdown.
|
L2F Initiating tunnel shutdown.
|
Tunnel shutdown has started.
|
L2F_CLOSE received
|
NAS received a request to close the tunnel.
|
L2F Got closing for tunnel
|
NAS began tunnel closing operations.
|
%LINK-3-UPDOWN: Interface Async6, changed state to down
|
Asynchronous interface was taken down.
|
L2F Closed tunnel structure
|
NAS closed the tunnel.
|
L2F Deleted inactive tunnel
|
Now-inactivated tunnel was deleted.
|
Debugging Protocol-Specific Events on the Tunnel Server—Normal L2F Operations
The following is sample output from the debug vpdn l2x-events command on a tunnel server when an L2F tunnel is created:
Router# debug vpdn l2x-events
L2F Creating new tunnel for nas1
L2F Got a tunnel named nas1, responding
L2F Open UDP socket to 172.21.9.25
L2F Removing resend packet (type 1)
L2F Got a MID management packet
%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
The following is sample output from the debug vpdn l2x-events command on a tunnel server when the L2F tunnel is brought down normally:
Router# debug vpdn l2x-events
L2F Removing resend packet (type 3)
L2F Tunnel is going down!
L2F Initiating tunnel shutdown.
%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down
L2F Got closing for tunnel
L2F Removing resend packet
L2F Removing resend packet
L2F Closed tunnel structure
L2F Closed tunnel structure
L2F Deleted inactive tunnel
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to down
Table 223 describes the significant fields shown in the displays.
Table 223 debug vpdn l2x-events Field Descriptions—Tunnel Server
Field
|
Description
|
Tunnel coming up
|
L2F_CONF received
|
L2F configuration is received from the NAS. When sent from a NAS to a tunnel server, the L2F_CONF is the initial packet in the conversation.
|
L2F Creating new tunnel for nas1
|
Tunnel named nas1 is being created.
|
L2F Got a tunnel named nas1, responding
|
Tunnel server is responding.
|
L2F Open UDP socket to 172.21.9.25
|
Opening a socket to the NAS IP address.
|
L2F_OPEN received
|
L2F_OPEN management message was received, indicating the NAS is opening an L2F tunnel.
|
L2F Removing resend packet (type ...)
|
Removing the resend packet for the L2F management packet.
The two resend packet types have different meanings in different states of the tunnel.
|
L2F Got a MID management packet
|
L2F MID management packets are used to communicate between the NAS and the tunnel server.
|
%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
|
Tunnel server is bringing up virtual access interface 1 for the L2F tunnel.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up
|
Line protocol is up. The line can be used.
|
Tunnel coming down
|
L2F_CLOSE received
|
NAS or tunnel server received a request to close the tunnel.
|
L2F Destroying mid
|
Connection identified by the MID is being taken down.
|
L2F Removing resend packet (type ...)
|
Removing the resend packet for the L2F management packet.
There are two resend packets that have different meanings in different states of the tunnel.
|
L2F Tunnel is going down!
L2F Initiating tunnel shutdown.
|
Router is performing normal operations when a tunnel is coming down.
|
%LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down
|
The virtual access interface is coming down.
|
L2F_CLOSE received
L2F Got closing for tunnel
L2F Removing resend packet
L2F Removing resend packet
L2F Closed tunnel structure
L2F Closed tunnel structure
L2F Deleted inactive tunnel
|
Router is performing normal cleanup operations when the tunnel is being brought down.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to down
|
Line protocol is down; virtual access interface 1 cannot be used.
|
Debugging Errors on the NAS—L2F Error Conditions
The following is sample output from the debug vpdn errors command on a NAS when the L2F tunnel is not set up:
Router# debug vpdn errors
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to down
%LINK-5-CHANGED: Interface Async1, changed state to reset
%LINK-3-UPDOWN: Interface Async1, changed state to down
%LINK-3-UPDOWN: Interface Async1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to up
VPDN tunnel management packet failed to authenticate
VPDN tunnel management packet failed to authenticate
Table 224 describes the significant fields shown in the display.
Table 224 debug vpdn error Field Descriptions for the NAS
Field
|
Description
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to down
|
Line protocol on the asynchronous interface went down.
|
%LINK-5-CHANGED: Interface Async1, changed state to reset
|
Asynchronous interface 1 was reset.
|
%LINK-3-UPDOWN: Interface Async1, changed state to down
%LINK-3-UPDOWN: Interface Async1, changed state to up
|
Link from asynchronous interface 1 link went down and then came back up.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Async1, changed state to up
|
Line protocol on the asynchronous interface came back up.
|
VPDN tunnel management packet failed to authenticate
|
Tunnel authentication failed. This is the most common VPDN error.
Note Verify the password for the NAS and the tunnel server name.
If you store the password on an AAA server, you can use the debug aaa authentication command.
|
The following is sample output from the debug vpdn l2x-errors command:
Router# debug vpdn l2x-errors
%LINK-3-UPDOWN: Interface Async1, changed state to up
L2F Out of sequence packet 0 (expecting 0)
L2F Tunnel authentication succeeded for cisco.com
L2F Received a close request for a non-existent mid
L2F Out of sequence packet 0 (expecting 0)
L2F packet has bogus1 key 1020868 D248BA0F
L2F packet has bogus1 key 1020868 D248BA0F
Table 225 describes the significant fields shown in the display.
Table 225 debug vpdn l2x-errors Field Descriptions
Field
|
Description
|
%LINK-3-UPDOWN: Interface Async1, changed state to up
|
The line protocol on the asynchronous interface came up.
|
L2F Out of sequence packet 0 (expecting 0)
|
Packet was expected to be the first in a sequence starting at 0, but an invalid sequence number was received.
|
L2F Tunnel authentication succeeded for cisco.com
|
Tunnel was established from the NAS to the tunnel server, cisco.com.
|
L2F Received a close request for a non-existent mid
|
Multiplex ID was not used previously; cannot close the tunnel.
|
L2F Out of sequence packet 0 (expecting 0)
|
Packet was expected to be the first in a sequence starting at 0, but an invalid sequence number was received.
|
L2F packet has bogus1 key 1020868 D248BA0F
|
Value based on the authentication response given to the peer during tunnel creation. This packet, in which the key does not match the expected value, must be discarded.
|
L2F packet has bogus1 key 1020868 D248BA0F
|
Another packet was received with an invalid key value. The packet must be discarded.
|
Debugging L2F Control Packets for Complete Information
The following is sample output from the debug vpdn l2x-packets command on a NAS. This example displays a trace for a ping command:
Router# debug vpdn l2x-packets
L2F SENDING (17): D0 1 1 10 0 0 0 4 0 11 0 0 81 94 E1 A0 4
L2F header flags: 53249 version 53249 protocol 1 sequence 16 mid 0 cid 4
length 17 offset 0 key 1701976070
L2F RECEIVED (17): D0 1 1 10 0 0 0 4 0 11 0 0 65 72 18 6 5
L2F SENDING (17): D0 1 1 11 0 0 0 4 0 11 0 0 81 94 E1 A0 4
L2F header flags: 53249 version 53249 protocol 1 sequence 17 mid 0 cid 4
length 17 offset 0 key 1701976070
L2F RECEIVED (17): D0 1 1 11 0 0 0 4 0 11 0 0 65 72 18 6 5
L2F header flags: 57345 version 57345 protocol 2 sequence 0 mid 1 cid 4
length 32 offset 0 key 1701976070
L2F-IN Output to Async1 (16): FF 3 C0 21 9 F 0 C 0 1D 41 AD FF 11 46 87
L2F-OUT (16): FF 3 C0 21 A F 0 C 0 1A C9 BD FF 11 46 87
L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4
length 32 offset 0 key -2120949344
L2F-OUT (101): 21 45 0 0 64 0 10 0 0 FF 1 B9 85 1 0 0 3 1 0 0 1 8 0 62 B1
0 0 C A8 0 0 0 0 0 11 E E0 AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD
AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB
CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD
L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4
length 120 offset 3 key -2120949344
L2F header flags: 49153 version 49153 protocol 2 sequence 0 mid 1 cid 4
length 120 offset 3 key 1701976070
L2F-IN Output to Async1 (101): 21 45 0 0 64 0 10 0 0 FF 1 B9 85 1 0 0 1 1 0
0 3 0 0 6A B1 0 0 C A8 0 0 0 0 0 11 E E0 AB CD AB CD AB CD AB CD AB CD AB CD
AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB
CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD AB CD
Table 226 describes the significant fields shown in the display.
Table 226 debug vpdn l2x-packets Field Descriptions
Field
|
Description
|
L2F SENDING (17)
|
Number of bytes being sent. The first set of "SENDING"..."RECEIVED" lines displays L2F keepalive traffic. The second set displays L2F management data.
|
L2F header flags:
|
Version and flags, in decimal.
|
version 53249
|
Version.
|
protocol 1
|
Protocol for negotiation of the point-to-point link between the NAS and the tunnel server is always 1, indicating L2F management.
|
sequence 16
|
Sequence numbers start at 0. Each subsequent packet is sent with the next increment of the sequence number. The sequence number is thus a free running counter represented modulo 256. There is a distinct sequence counter for each distinct MID value.
|
mid 0
|
Multiplex ID, which identifies a particular connection within the tunnel. Each new connection is assigned a MID currently unused within the tunnel.
|
cid 4
|
Client ID used to assist endpoints in demultiplexing tunnels.
|
length 17
|
Size in octets of the entire packet, including header, all fields pre-sent, and payload. Length does not reflect the addition of the checksum, if pre-sent.
|
offset 0
|
Number of bytes past the L2F header at which the payload data is expected to start. If it is 0, the first byte following the last byte of the L2F header is the first byte of payload data.
|
key 1701976070
|
Value based on the authentication response given to the peer during tunnel creation. During the life of a session, the key value serves to resist attacks based on spoofing. If a packet is received in which the key does not match the expected value, the packet must be silently discarded.
|
L2F RECEIVED (17)
|
Number of bytes received.
|
L2F-IN Otput to Async1 (16)
|
Payload datagram. The data came in to the VPDN code.
|
L2F-OUT (16):
|
Payload datagram sent out from the VPDN code to the tunnel.
|
L2F-OUT (101)
|
Ping payload datagram. The value 62 in this line is the ping packet size in hexadecimal (98 in decimal). The three lines that follow this line show ping packet data.
|
Related Commands
Command
|
Description
|
debug aaa authentication
|
Displays information on AAA/TACACS+ authentication.
|
debug acircuit
|
Displays events and failures related to attachment circuits.
|
debug pppoe
|
Display debugging information for PPPoE sessions.
|
debug vpdn pppoe-data
|
Displays data packets of PPPoE sessions.
|
debug vpdn pppoe-error
|
Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established sessions to be closed.
|
debug vpdn pppoe-events
|
Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown.
|
debug vpdn pppoe-packet
|
Displays each PPPoE protocol packet exchanged.
|
debug vpdn pppoe-data
To display data packets of PPPoE sessions, use the debug vpdn pppoe-data command in EXEC mode. To disable the debugging output, use the no form of this command.
debug vpdn pppoe-data
no debug vpdn pppoe-data
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.1(1)T
|
This command was introduced.
|
Usage Guidelines
The debug vpdn pppoe-data command displays a large number of debug messages and should generally be used only on a debug chassis with a single active session.
Examples
The following is an example of output from the debug vpdn pppoe-data command:
6d20h:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up
FF 03 C0 21 01 01 00 0F 03 05 C2 23 05 05 06 D3
C0 21 01 01 00 0A 05 06 39 53 A5 17 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
FF 03 C0 21 02 01 00 0A 05 06 39 53 A5 17
FF 03 C0 21 01 02 00 0F 03 05 C2 23 05 05 06 D3
C0 21 02 02 00 0F 03 05 C2 23 05 05 06 D3 FF 2B
DA 00 80 C2 00 07 00 00 00 10 7B 01 2C D9 00 B0
FF 03 C2 23 01 06 00 1A 10 99 1E 6E 8F 8C F2 C6
EE 91 0A B0 01 CB 89 68 13 47 61 6E 67 61
C2 23 02 06 00 24 10 E6 84 FF 3A A4 49 19 CE D7
AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73
FF 03 80 21 01 01 00 0A 03 06 65 65 00 66
80 21 01 01 00 0A 03 06 00 00 00 00 49 19 CE D7
AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73
FF 03 80 21 03 01 00 0A 03 06 65 65 00 67
80 21 02 01 00 0A 03 06 65 65 00 66 00 04 AA AA
03 00 80 C2 00 07 00 00 00 10 7B 01 2C D9 00 B0
80 21 01 02 00 0A 03 06 65 65 00 67 49 19 CE D7
AC D7 D5 96 CC 23 B3 41 6B 61 73 68 40 63 69 73
FF 03 80 21 02 02 00 0A 03 06 65 65 00 67
6d20h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1,
FF 03 C0 21 09 01 00 0C D3 FF 2B DA 4C 4D 49 A4
C0 21 0A 01 00 0C 39 53 A5 17 4C 4D 49 A4 AA AA
03 00 80 C2 00 07 00 00 00 10 7B 01 2C D9 00 B0
C0 21 09 01 00 0C 39 53 A5 17 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Table 227 describes the fields shown in the displays.
Table 227 debug vpdn pppoe-data Field Descriptions
Field
|
Descriptions
|
6d20h:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up
|
Virtual access interface 1 came up.
|
6d20h:PPPoE:OUT
|
The host delivered a PPPoE session packet to the access concentrator.
|
6d20h:PPPoE:IN
|
The access concentrator received a PPPoE session packet.
|
6d20h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1, changed state to up
|
Line protocol is up; the line can be used.
|
contiguous pak, size 19
|
Size 19 contiguous packet.
|
particle pak, size 1240
|
Size 1240 particle packet.
|
Related Commands
Command
|
Description
|
debug vpdn pppoe-error
|
Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established session to be closed.
|
debug vpdn pppoe-events
|
Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown.
|
debug vpdn pppoe-packet
|
Displays each PPPoE protocol packet exchanged.
|
protocol (VPDN)
|
Specifies the L2TP that the VPDN subgroup will use.
|
show vpdn
|
Displays information about active L2F protocol tunnel and message identifiers in a VPDN.
|
vpdn enable
|
Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is pre-sent.
|
debug vpdn pppoe-error
To display PPPoE protocol errors that prevent a session from being established or errors that cause an established sessions to be closed, use the debug vpdn pppoe-error command in EXEC mode. To disable the debugging output, use the no form of this command.
debug vpdn pppoe-error
no debug vpdn pppoe-error
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.1(1)T
|
This command was introduced.
|
Examples
The following is a full list of error messages displayed by the debug vpdn pppoe-error command:
PPPOE:pppoe_acsys_err cannot grow packet
PPPoE:Cannot find PPPoE info
PPPoE:Bad MAC address:00b0c2eb1038
PPPOE:PADI has no service name tag
PPPoE:pppoe_handle_padi cannot add AC name/Cookie.
PPPoE:pppoe_handle_padi cannot grow packet
PPPoE:pppoe_handle_padi encap failed
PPPoE cannot create virtual access.
PPPoE cannot allocate session structure.
PPPoE cannot store session element in tunnel.
PPPoE cannot allocate tunnel structure.
PPPoE cannot store tunnel
PPPoE:VA221:No Session, Packet Discarded
PPPOE:Tried to shutdown a null session
PPPoE:Session already open, closing
PPPoE:Bad cookie:src_addr=00b0c2eb1038
PPPoE:Max session count on mac elem exceeded:mac=00b0c2eb1038
PPPoE:Max session count on vc exceeded:vc=3/77
PPPoE:Bad MAC address - dropping packet
PPPoE:Bad version or type - dropping packet
Table 228 describes the fields shown in the displays.
Table 228 debug vpdn pppoe-error Field Descriptions
Field
|
Descriptions
|
PPPOE:pppoe_acsys_err cannot grow packet
|
Asynchronous PPPoE packet initialization error.
|
PPPoE:Cannot find PPPoE info
|
The access concentrator sends a PADO to the host.
|
PPPoE:Bad MAC address:00b0c2eb1038
|
The host was unable to identify the Ethernet MAC address.
|
PPPOE:PADI has no service name tag
|
PADI requires a service name tag.
|
PPPoE:pppoe_handle_padi cannot add AC name/Cookie.
|
pppoe_handle_padi could not append AC name.
|
PPPoE:pppoe_handle_padi cannot grow packet
|
pppoe_handle_padi could not append packet.
|
PPPoE:pppoe_handle_padi encap failed
|
pppoe_handle_padi could not specify PPPoE on ATM encapsulation.
|
PPPoE cannot create virtual access.
|
PPPoE session unable to verify virtual access interface.
|
PPPoE cannot allocate session structure.
|
PPPoE session unable to allocate Stage Protocol.
|
PPPoE cannot store session element in tunnel.
|
PPPoE tunnel cannot allocate session element.
|
PPPoE cannot allocate tunnel structure.
|
PPPoE tunnel unable to allocate Stage Protocol.
|
PPPoE cannot store tunnel
|
PPPoE configuration settings unable to initialize a tunnel.
|
PPPoE:VA221:No Session, Packet Discarded
|
No sessions created. All packets dropped.
|
PPPOE:Tried to shutdown a null session
|
Null session shutdown.
|
PPPoE:Session already open, closing
|
PPPoE session already open.
|
PPPoE:Bad cookie:src_addr=00b0c2eb1038
|
PPPoE session unable to append new cookie.
|
PPPoE:Max session count on mac elem exceeded:mac=00b0c2eb1038
|
The maximum number of sessions exceeded the Ethernet MAC address.
|
PPPoE:Max session count on vc exceeded:vc=3/77
|
The maximum number of sessions exceeded the PVC connection.
|
PPPoE:Bad MAC address - dropping packet
|
The host was unable to identify the MAC address. Packet dropped.
|
PPPoE:Bad version or type - dropping packet
|
The host was unable to identify the encapsulation type.
|
Related Commands
Command
|
Description
|
debug vpdn pppoe-data
|
Displays data packets of PPPoE sessions.
|
debug vpdn pppoe-events
|
Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown.
|
debug vpdn pppoe-packet
|
Displays each PPPoE protocol packet exchanged.
|
protocol (VPDN)
|
Specifies the L2TP that the VPDN subgroup will use.
|
show vpdn
|
Displays information about active L2F protocol tunnel and message identifiers in a VPDN.
|
vpdn enable
|
Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is pre-sent.
|
debug vpdn pppoe-events
To display PPPoE protocol messages about events that are part of normal session establishment or shutdown, use the debug vpdn pppoe-events command in EXEC mode. To disable the debugging output, use the no form of this command.
debug vpdn pppoe-events
no debug vpdn pppoe-events
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.1(1)T
|
This command was introduced.
|
Examples
The following is an example of output from the debug vpdn pppoe-events command:
1w5d:IN PADI from PPPoE tunnel
1w5d:OUT PADO from PPPoE tunnel
1w5d:IN PADR from PPPoE tunnel
1w5d:PPPoE:VPN session created.
1w5d:%LINK-3-UPDOWN:Interface Virtual-Access2, changed state to up
1w5d:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2, changed state to up
Table 229 describes the significant fields shown in the display.
Table 229 debug vpdn pppoe-events Field Descriptions
Field
|
Descriptions
|
1w5d:IN PADI from PPPoE tunnel
|
The access concentrator receives a PADI packet from the PPPoE Tunnel.
|
1w5d:OUT PADO from PPPoE tunnel
|
The access concentrator sends a PADO to the host.
|
1w5d:IN PADR from PPPoE tunnel
|
The host sends a single PADR to the access concentrator that it has chosen.
|
1w5d:PPPoE:VPN session created.
|
The access concentrator receives the PADR packet and creates a VPN session.
|
1w5d:%LINK-3-UPDOWN:Interface Virtual-Access2, changed state to up
|
Virtual access interface 2 came up.
|
1w5d:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2, changed state to up
|
Line protocol is up. The line can be used.
|
Related Commands
Command
|
Description
|
debug vpdn pppoe-data
|
Displays data packets of PPPoE sessions.
|
debug vpdn pppoe-error
|
Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established session to be closed.
|
debug vpdn pppoe-packet
|
Displays each PPPoE protocol packet exchanged.
|
protocol (VPDN)
|
Specifies the L2TP that the VPDN subgroup will use.
|
show vpdn
|
Displays information about active L2F protocol tunnel and message identifiers in a VPDN.
|
vpdn enable
|
Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is pre-sent.
|
debug vpdn pppoe-packet
To display each PPPoE protocol packet exchanged, use the debug vpdn pppoe-packet command in EXEC mode.To disable the debugging output, use the no form of this command.
debug vpdn pppoe-packet
no debug vpdn pppoe-packet
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.1(1)T
|
This command was introduced.
|
Usage Guidelines
The debug vpdn pppoe-packet command displays a large number of debug messages and should generally only be used on a debug chassis with a single active session.
Examples
The following is an example of output from the debug vpdn pppoe-packet command:
PPPoE control packets debugging is on
1w5d:PPPoE:discovery packet
FF FF FF FF FF FF 00 10 7B 01 2C D9 88 63 11 09
00 00 00 04 01 01 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...
1w5d:OUT PADO from PPPoE tunnel
00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 10
7B 01 2C D9 00 90 AB 13 BC A8 88 63 11 07 00 00
00 20 01 01 00 00 01 02 00 04 41 67 6E 69 01 ...
1w5d:PPPoE:discovery packet
00 90 AB 13 BC A8 00 10 7B 01 2C D9 88 63 11 19
00 00 00 20 01 01 00 00 01 02 00 04 41 67 6E 69
01 04 00 10 B7 4B 86 5B 90 A5 EF 11 64 A9 BA ...
Table 230 describes the significant fields shown in the displays.
Table 230 debug vpdn pppoe-packet Field Descriptions
Field
|
Descriptions
|
PPPoE control packets debugging is on
|
PPPoE debugging of packets is enabled.
|
1w5d:PPPoE:discovery packet
|
The host performs a discovery to initiate a PPPoE session.
|
1w5d:OUT PADO from PPPoE tunnel
|
The access concentrator sends a PADO to the host.
|
1w5d:PPPoE:discovery packet
|
The host performs a discovery to initiate a PPPoE session.
|
contiguous pak, size 74
|
Size 74 contiguous packet.
|
Related Commands
Command
|
Description
|
debug vpdn pppoe-data
|
Displays data packets of PPPoE sessions.
|
debug vpdn pppoe-error
|
Displays PPPoE protocol errors that prevent a session from being established or errors that cause an established session to be closed.
|
debug vpdn pppoe-events
|
Displays PPPoE protocol messages about events that are part of normal session establishment or shutdown.
|
protocol (VPDN)
|
Specifies the L2TP that the VPDN subgroup will use.
|
show vpdn
|
Displays information about active L2F protocol tunnel and message identifiers in a VPDN.
|
vpdn enable
|
Enables virtual private dialup networking on the router and informs the router to look for tunnel definitions in a local database and on a remote authorization server (home gateway), if one is pre-sent.
|
debug vpm all
To enable all voice port module (VPM) debugging, use the debug vpm all command. Use the no form of this command to disable all VPM debugging.
debug vpm all
no debug vpm all
Syntax Description
This command has no arguments or keywords.
Defaults
VPM debugging is not enabled.
Command History
Release
|
Modification
|
11.3(1)T
|
This command was introduced for the Cisco 3600 series.
|
12.0(7)XK
|
This command was updated for the Cisco 2600, 3600, and MC3810 series devices.
|
12.1(2)T
|
This command was integrated into Cisco IOS release 12.1(2)T.
|
Usage Guidelines
Use the debug vpm all command to enable the complete set of VPM debugging commands: debug vpm dsp, debug vpm error, debug vpm port, debug vpm spi, and debug vpm trunk_sc.
Execution of no debug all will turn off all port level debugging. It is usually a good idea to turn off all debugging and then enter the debug commands you are interested in one by one. This will help to avoid confusion about which ports you are actually debugging.
Examples
For sample outputs, refer to the individual commands in this chapter.
Related Commands
Command
|
Description
|
debug vpm port
|
Limits the debug vpm all command to a specified port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vpm error
|
Enables DSP error tracing.
|
debug vpm voaal2 all
|
Enables the display of trunk conditioning supervisory component trace information.
|
debug vpm dsp
To show messages from the DSP on the VPM to the router, use the debug vpm dsp privileged EXEC command. The no form of this command disables debugging output.
debug vpm dsp
no debug vpm dsp
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
The debug vpm dsp command shows messages from the DSP on the VPM to the router; this command can be useful if you suspect that the VPM is not functional. It is a simple way to check if the VPM is responding to off-hook indications and to evaluate timing for signaling messages from the interface.
Examples
The following example shows the DSP time stamp and the router time stamp for each event. For SIG_STATUS, the state value shows the state of the ABCD bits in the signaling message. This sample shows a call coming in on an FXO interface.
The router waits for ringing to terminate before accepting the call. State=0x0 indicates ringing; state 0x4 indicates not ringing.
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x0 timestamp=58172 systime=40024
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x4 timestamp=59472 systime=40154
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0x4 timestamp=59589 systime=40166
The following output shows the digits collected:
vcsm_dsp_message: MSG_TX_DTMF_DIGIT: digit=4
vcsm_dsp_message: MSG_TX_DTMF_DIGIT: digit=1
vcsm_dsp_message: MSG_TX_DTMF_DIGIT: digit=0
vcsm_dsp_message: MSG_TX_DTMF_DIGIT: digit=0
vcsm_dsp_message: MSG_TX_DTMF_DIGIT: digit=0
This shows the disconnect indication and the final call statistics reported by the DSP (which are then populated in the call history table):
ssm_dsp_message: SEND/RESP_SIG_STATUS: state=0xC timestamp=21214 systime=42882
vcsm_dsp_message: MSG_TX_GET_TX_STAT: num_tx_pkts=1019 num_signaling_pkts=0
num_comfort_noise_pkts=0 transmit_durtation=24150 voice_transmit_duration=20380
fax_transmit_duration=0
debug vpm error
To enable DSP error tracing in voice port modules (VPMs), use the debug vpm error command. Use the no form of this command to disable DSP error tracing.
debug vpm error
no debug vpm error
Syntax Description
This command has no arguments or keywords.
Defaults
VPM debugging is not enabled.
Command History
Release
|
Modification
|
12.0(7)XK
|
This command was introduced on the Cisco 2600, 3600, and MC3810 series devices.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
Execution of no debug all will turn off all port level debugging. You should turn off all debugging and then enter the debug commands you are interested in one by one. This will help avoid confusion about which ports you are actually debugging.
Examples
The following example shows debug vpm error messages for Cisco 2600 or 3600 series router or a Cisco MC3810 series concentrator:
00:18:37:[1:0.1, FXSLS_NULL, E_DSP_SIG_0100] -> ERROR:INVALID INPUT
The following example turns off debug vpm error debugging messages:
Router# no debug vpm error
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging.
|
debug vpm port
|
Limits the debug vpm error command to a specified port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vpm port
To observe the behavior of the Holst state machine, use the debug vpm port privileged EXEC command. Use the no form of this command to turn off the debug function.
debug vpm port [slot-number| subunit-number | port]
no debug vpm [slot-number | subunit-number | port]
Syntax Description
slot-number
|
(Optional) Specifies the slot number in the Cisco router where the voice interface card is installed. Valid entries are from 0 to 3, depending on the router being used and the slot where the voice interface card has been installed.
|
subunit-number
|
(Optional) Specifies the subunit on the voice interface card where the voice port is located. Valid entries are 0 or 1.
|
port
|
(Optional) Specifies the voice port. Valid entries are 0 or 1.
|
Command History
Release
|
Modification
|
11.3(1)
|
This command was introduced.
|
Usage Guidelines
This command is not supported on Cisco 7200 series routers or on the Cisco MC3810.
Use this command to limit the debug output to a particular port. The debug output can be quite voluminous for a single channel. A 12-port box might create problems. Use this debug command with any or all of the other debug modes.
Execution of no debug vpm all will turn off all port level debugging. Cisco recommends that you turn off all debugging and then enter the debug commands you are interested in one by one. This process helps to avoid confusion about which ports you are actually debugging.
Examples
The following example shows sample output from the debug vpm port 1/1/0 command during trunk establishment after the no shutdown command has been executed on the voice port:
Router# debug vpm port 1/1/0
*Mar 1 03:21:39.799: htsp_process_event: [1/1/0, 0.1 , 2]act_down_inserve
*Mar 1 03:21:39.807: htsp_process_event: [1/1/0, 0.0 , 14]
act_go_trunkhtsp_trunk_createhtsp_trunk_sig_linkfxols_trunk
*Mar 1 03:21:39.807: htsp_process_event: [1/1/0, 1.0 , 1]trunk_offhookfxols_trunk_down
*Mar 1 03:21:39.807: dsp_sig_encap_config: [1/1/0] packet_len=28 channel_id=128
packet_id=42 transport_protocol=1 playout_delay=100 signaling_mode=0
t_ssrc=0 r_ssrc=0 t_vpxcc=0 r_vpxcc=0
*Mar 1 03:21:39.811: dsp_set_sig_state: [1/1/0] packet_len=12
channel_id=128 packet_id=39 state=0xC timestamp=0x0
*Mar 1 03:21:39.811: trunk_offhook: Trunk Retry Timer Enabled
*Mar 1 03:22:13.095: htsp_process_event: [1/1/0, 1.1, 39]act_trunk_setuphtsp_setup_ind
*Mar 1 03:22:13.095: htsp_process_event: [1/1/0, 1.2 , 8]
*Mar 1 03:22:13.099: hdsprm_vtsp_codec_loaded_ok: G726 firmware needs download
*Mar 1 03:22:13.103: dsp_download: p=0x60E73844 size=34182 (t=1213310):39 FA 6D
*Mar 1 03:22:13.103: htsp_process_event: [1/1/0, 1.2 , 6]act_trunk_proc_connect
*Mar 1 03:22:13.191: dsp_receive_packet: MSG_TX_RESTART_INDICATION: code=0 t=1213319
*Mar 1 03:22:13.191: dsp_download: p=0x60EA8924 size=6224 (t=1213319): 8 55 AE
*Mar 1 03:22:13.207: dsp_receive_packet: MSG_TX_RESTART_INDICATION: code=0 t=1213320
*Mar 1 03:22:13.207: htsp_process_event: [1/1/0, 1.3 , 11] trunk_upfxols_trunk_up
*Mar 1 03:22:13.207: dsp_set_sig_state: [1/1/0] packet_len=12
channel_id=128 packet_id=39 state=0x4 timestamp=0x0
*Mar 1 03:22:13.207: dsp_sig_encap_config: [1/1/0] packet_len=28 channel_id=128
packet_id=42 transport_protocol=3 playout_delay=100 headerbytes = 0xA0
Note in the above display that "transport_protocol = 3" indicates Voice-over-Frame Relay. Also note that the second line of the display indicates that a shutdown/no shutdown command sequence was executed on the voice port.
Related Commands
Command
|
Description
|
debug vpdn pppoe-data
|
Enables debugging of all VPM areas.
|
debug vpm dsp
|
Shows messages from the DSP on the VPM to the router.
|
debug vpm signal
|
Collects debug information only for signalling events.
|
debug vpm spi
|
Displays information about how each network indication and application request is handled.
|
debug vpm signal
To collect debug information only for signalling events, use the debug vpm signal privileged EXEC command. The no form of this command disables debugging output.
debug vpm signal
no debug vpm signal
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
The debug vpm signal command collects debug information only for signalling events. This command can also be useful in resolving problems with signalling to a PBX.
Examples
The following output shows that a ring is detected, and that the router waits for the ringing to stop before accepting the call:
ssm_process_event: [1/0/1, 0.2, 15] fxols_onhook_ringing
ssm_process_event: [1/0/1, 0.7, 19] fxols_ringing_not
ssm_process_event: [1/0/1, 0.3, 6]
ssm_process_event: [1/0/1, 0.3, 19] fxols_offhook_clear
The following output shows that the call is connected:
ssm_process_event: [1/0/1, 0.3, 4] fxols_offhook_proc
ssm_process_event: [1/0/1, 0.3, 8] fxols_proc_voice
ssm_process_event: [1/0/1, 0.3, 5] fxols_offhook_connect
The following output confirms a disconnect from the switch and release with higher layer code:
ssm_process_event: [1/0/1, 0.4, 27] fxols_offhook_disc
ssm_process_event: [1/0/1, 0.4, 33] fxols_disc_confirm
ssm_process_event: [1/0/1, 0.4, 3] fxols_offhook_release
debug vpm signaling
To see information about the voice port module signalling, use the debug vpm signaling command. Use the no form of this command to disable debugging output.
debug vpm signaling
no debug vpm signaling
Syntax Description
This command has no arguments or keywords
Defaults
Disabled
Command Modes
EXEC
Command History
Release
|
Modification
|
12.0(7)XK
|
This command was introduced.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Examples
The following example shows output from the command:
Router# debug vpm signaling
01:52:55: [1:1.1, S_TRUNK_BUSYOUT, E_HTSP_OUT_BUSYOUT]
01:52:55: htsp_timer - 0 msec
01:52:55: [1:1.1, S_TRUNK_PEND, E_HTSP_EVENT_TIMER]
01:52:55: htsp_timer_stop htsp_setup_ind
01:52:55: htsp_timer - 2000 msec
01:52:55: [1:1.1, S_TRUNK_PROC, E_HTSP_SETUP_ACK]
01:52:55: htsp_timer_stop
01:52:55: htsp_timer - 20000 msec
01:52:55: [1:6.6, S_TRUNK_PROC, E_HTSP_SETUP_ACK]
01:52:55: htsp_timer_stop
01:52:55: htsp_timer - 20000 msec
01:52:55: [1:1.1, S_TRUNK_PROC, E_HTSP_VOICE_CUT_THROUGH]
01:52:55: %HTSP-5-UPDOWN: Trunk port(channel) [1:1.1] is up
debug vpm spi
To trace how the voice port module SPI interfaces with the call control API, use the debug vpm spi privileged EXEC command. The no form of this command disables debugging output.
debug vpm spi
no debug vpm spi
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
The debug vpm spi command traces how the voice port module SPI interfaces with the call control API. This debug command displays information about how each network indication and application request is handled.
This debug level shows the internal workings of the voice telephony call state machine.
Examples
The following output shows that the call is accepted and pre-sented to a higher layer code:
dsp_set_sig_state: [1/0/1] packet_len=14 channel_id=129 packet_id=39 state=0xC
timestamp=0x0
vcsm_process_event: [1/0/1, 0.5, 1] act_up_setup_ind
The following output shows that the higher layer code accepts the call, requests addressing information, and starts DTMF and dial-pulse collection. It also shows that the digit timer is started.
vcsm_process_event: [1/0/1, 0.6, 11] act_setup_ind_ack
dsp_voice_mode: [1/0/1] packet_len=22 channel_id=1 packet_id=73 coding_type=1
voice_field_size=160 VAD_flag=0 echo_length=128 comfort_noise=1 fax_detect=1
dsp_dtmf_mode: [1/0/1] packet_len=12 channel_id=1 packet_id=65 dtmf_or_mf=0
dsp_CP_tone_on: [1/0/1] packet_len=32 channel_id=1 packet_id=72 tone_id=3 n_freq=2
freq_of_first=350 freq_of_second=440 amp_of_first=4000 amp_of_second=4000 direction=1
on_time_first=65535 off_time_first=0 on_time_second=65535 off_time_second=0
dsp_digit_collect_on: [1/0/1] packet_len=22 channel_id=129 packet_id=35
min_inter_delay=550 max_inter_delay=3200 mim_make_time=18 max_make_time=75
min_brake_time=18 max_brake_time=75
The following output shows the collection of digits one by one until the higher level code indicates it has enough. The input timer is restarted with each digit and the device waits in idle mode for connection to proceed.
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_process_event: [1/0/1, 0.7, 25] act_dcollect_digit
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_process_event: [1/0/1, 0.7, 13] act_dcollect_proc
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
dsp_digit_collect_off: [1/0/1] packet_len=10 channel_id=129 packet_id=36
dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68
The following output shows that the network voice path cuts through:
vcsm_process_event: [1/0/1, 0.8, 15] act_bridge
vcsm_process_event: [1/0/1, 0.8, 20] act_caps_ind
vcsm_process_event: [1/0/1, 0.8, 21] act_caps_ack
dsp_voice_mode: [1/0/1] packet_len=22 channel_id=1 packet_id=73 coding_type=6
voice_field_size=20 VAD_flag=1 echo_length=128 comfort_noise=1 fax_detect=1
The following output shows that the called-party end of the connection is connected:
vcsm_process_event: [1/0/1, 0.8, 8] act_connect
The following output shows the voice quality statistics collected periodically:
vcsm_process_event: [1/0/1, 0.13, 17]
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0
vcsm_process_event: [1/0/1, 0.13, 28]
vcsm_process_event: [1/0/1, 0.13, 29]
vcsm_process_event: [1/0/1, 0.13, 32]
vcsm_process_event: [1/0/1, 0.13, 17]
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0
vcsm_process_event: [1/0/1, 0.13, 28]
vcsm_process_event: [1/0/1, 0.13, 29]
vcsm_process_event: [1/0/1, 0.13, 32]
vcsm_process_event: [1/0/1, 0.13, 17]
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=0
vcsm_process_event: [1/0/1, 0.13, 28]
vcsm_process_event: [1/0/1, 0.13, 29]
vcsm_process_event: [1/0/1, 0.13, 32]
The following output shows that the disconnection indication is passed to higher level code. The call connection is torn down, and final call statistics are collected:
vcsm_process_event: [1/0/1, 0.13, 4] act_generate_disc
vcsm_process_event: [1/0/1, 0.13, 16] act_bdrop
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
vcsm_process_event: [1/0/1, 0.13, 18] act_disconnect
dsp_get_levels: [1/0/1] packet_len=10 channel_id=1 packet_id=89
vcsm_process_event: [1/0/1, 0.15, 34] act_get_levels
dsp_get_tx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=86 reset_flag=1
vcsm_process_event: [1/0/1, 0.15, 31] act_stats_complete
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
dsp_digit_collect_off: [1/0/1] packet_len=10 channel_id=129 packet_id=36
dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68
dsp_set_sig_state: [1/0/1] packet_len=14 channel_id=129 packet_id=39 state=0x4
timestamp=0x0
vcsm_process_event: [1/0/1, 0.16, 5] act_wrelease_release
dsp_CP_tone_off: [1/0/1] packet_len=10 channel_id=1 packet_id=71
dsp_idle_mode: [1/0/1] packet_len=10 channel_id=1 packet_id=68
dsp_get_rx_stats: [1/0/1] packet_len=12 channel_id=1 packet_id=87 reset_flag=1
debug vpm trunk_sc
To enable the display of trunk conditioning supervisory component trace information, use the debug vpm trunk_sc privileged EXEC command. The no form of this command disables the display of this information.
debug vpm trunk_sc
no debug vpm trunk_sc
Syntax Description
This command has no arguments or keywords.
Defaults
Trunk conditioning supervisory component trace information is not displayed.
Command History
Release
|
Modification
|
12.0(7)XK
|
This command was introduced on the Cisco 2600, 3600, and MC3810 series devices.
|
12.1(2)T
|
This command was integrated into the 12.1(2)T release.
|
Usage Guidelines
Use the debug vpm port command with the slot-number/subunit-number/port argument to limit the debug vpm trunk_sc debug output to a particular port. If you do not use the debug vpm port command, the debug vpm trunk_sc displays output for all ports.
Execution of the no debug all command will turn off all port level debugging. It is usually a good idea to turn off all debugging and then enter the debug commands you are interested in one by one. This process helps avoid confusion about which ports you are actually debugging.
Examples
The following example shows debug vpm trunk_sc messages for port 1/0/0 on a Cisco 2600 or 3600 series router:
Router# debug vpm trunk_sc
Router# debug vpm port 1/0/0
The following example shows debug vpm trunk_sc messages for port 1/1 on a Cisco MC3810 device:
Router# debug vpm trunk_sc
Router# debug vpm port 1/1
The following example turns off debug vpm trunk_sc debugging messages:
Router# no debug vpm trunk_sc
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging
|
debug vpm port
|
Limits the debug vpm trunk_sc command to a specified port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vpm voaal2 all
To display type 1 (voice) and type 3 (control) AAL2 packets sent to and received from the DSP, use the debug vpm voaal2 all privileged EXEC command. Use the no form of this command to turn off the debug function.
debug vpm voaal2 all {all_dsp | from_dsp | to_dsp}
no debug vpm voaal2 all
Syntax Description
all_dsp
|
Displays messages to and from the DSP.
|
from_dsp
|
Displays messages from the DSP.
|
to_dsp
|
Displays messages to the DSP.
|
Defaults
Debugging for display of AAL2 packets is not enabled.
Command History
Release
|
Modification
|
12.1(1)XA
|
This command was introduced on the Cisco MC3810 series.
|
12.1(2)T
|
This command was integrated into the 12.1(2)T release.
|
Usage Guidelines
Do not enter this debug command on a system carrying live traffic. Continuous display of AAL2 type 1 (voice) packets results in high CPU utilization and loss of console access to the system. Calls will be dropped and trunks may go down. For AAL2 debugging, use the debug vpm voaal2 type3 debug command and identify a specific type 3 (control) packet type.
Examples
The following example shows a sample output from the debug vpm voaal2 all command, where the example selection is to display CAS packets sent to and from the DSP:
Router# debug vpm voaal2 all all_dsp
TYPE 1, len = 43, cid = 25, uui = 14- 19 9D C5 FE FF FF FF FF FF 7E FF 7F
FE FF 7E FF FE FF FF FF FE FE FF 7F FE FF FF 7E FF FE FF FF FF 7F FF FF FF
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
TYPE 1, len = 43, cid = 25, uui = 4- 19 9C 82 FD FF 7E FF FF FE FD FF 7E
FF FF FF FF FF FF FE FF FF FF FF FF FE FF FF FE FF 7E FE FF FF FF FF FE FF
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
TYPE 1, len = 43, cid = 25, uui = 12- 19 9D 8F FF FF 7E FF FE 7E FF FF FF
FF FE FF FF FF FE FE FF FF FF FF FF FE FF FF FF 7E FF FF FF FF FF FD FF FF
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
TYPE 1, len = 43, cid = 25, uui = 4- 19 9C 82 FF FF FF FF FF FF FE FF FF
FF FF FF FF 7E FF FF FF FE 7E FF FE FF FF FF FF 7E FE FC FE 7E 7E FF FF FF
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
TYPE 1, len = 43, cid = 25, uui = 10- 19 9D 51 FE FF 7E FF FF FF FE 7E FF
FE FF FF FF FF 7E FF 7E 7E FF FF FF FF FF FF FF FF FF 7E FD FF FF FE FF FE
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
TYPE 1, len = 43, cid = 25, uui = 2- 19 9C 5C FF FF FE FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF 7E FF FD FF 7E FF FF FE FE FF FE FF FF
Related Commands
Command
|
Description
|
debug vpm voaal2 type1
|
Displays type 1 (voice) AAL2 packets sent to and received from the DSP.
|
debug vpm voaal2 type3
|
Displays type 3 (control) AAL2 packets sent to and received from the DSP.
|
show debug
|
Displays which debug commands are enabled.
|
debug vpm voaal2 type1
To display type 1 (voice) AAL2 packets sent to and received from the DSP, use the debug vpm voaal2 type1 privileged EXEC command. Use the no form of this command to turn off the debug function.
debug vpm voaal2 type1 {all_dsp | from_dsp | to_dsp}
no debug vpm voaal2 type1
Syntax Description
all_dsp
|
Displays messages to and from the DSP.
|
from_dsp
|
Displays messages from the DSP.
|
to_dsp
|
Displays messages to the DSP.
|
Defaults
Debugging for display of AAL2 packets is not enabled.
Command History
Release
|
Modification
|
12.1(1)XA
|
This command was introduced on the Cisco MC3810 series.
|
12.1(2)T
|
This command was integrated into the 12.1(2)T release.
|
Usage Guidelines
Do not enter this debug command on a system carrying live traffic. Continuous display of AAL2 type 1 (voice) packets results in high CPU utilization and loss of console access to the system. Calls will be dropped and trunks may go down. For AAL2 debugging, use the debug vpm voaal2 type3 debug command and identify a specific type 3 (control) packet type.
Examples
The following example shows sample output from the debug vpm voaal2 type1 command:
Note
The display of voice packets on a live system will continue indefinitely. The debugging output cannot be interrupted, because console access will be lost.
Router# debug vpm voaal2 type1 to_dsp
TYPE 1, len = 43, cid = 25, uui = 14- 19 9D C5 FE FF FF FF FF FF 7E FF 7F
FE FF 7E FF FE FF FF FF FE FE FF 7F FE FF FF 7E FF FE FF FF FF 7F FF FF FF
TYPE 1, len = 43, cid = 25, uui = 4- 19 9C 82 FD FF 7E FF FF FE FD FF 7E
FF FF FF FF FF FF FE FF FF FF FF FF FE FF FF FE FF 7E FE FF FF FF FF FE FF
TYPE 1, len = 43, cid = 25, uui = 12- 19 9D 8F FF FF 7E FF FE 7E FF FF FF
FF FE FF FF FF FE FE FF FF FF FF FF FE FF FF FF 7E FF FF FF FF FF FD FF FF
TYPE 1, len = 43, cid = 25, uui = 4- 19 9C 82 FF FF FF FF FF FF FE FF FF
FF FF FF FF 7E FF FF FF FE 7E FF FE FF FF FF FF 7E FE FC FE 7E 7E FF FF FF
TYPE 1, len = 43, cid = 25, uui = 10- 19 9D 51 FE FF 7E FF FF FF FE 7E FF
FE FF FF FF FF 7E FF 7E 7E FF FF FF FF FF FF FF FF FF 7E FD FF FF FE FF FE
TYPE 1, len = 43, cid = 25, uui = 2- 19 9C 5C FF FF FE FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF 7E FF FD FF 7E FF FF FE FE FF FE FF FF
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all vpm debugging.
|
debug vpm voaal2 all
|
Displays type 1 (voice) and type 3 (control) AAL2 packets sent to and received from the DSP.
|
debug vpm voaal2 type3
|
Displays type 3 (control) AAL2 packets sent to and received from the DSP.
|
show debug
|
Displays which debug commands are enabled.
|
debug vpm voaal2 type3
To display type 3 (control) AAL2 packets sent to and received from the DSP, use the debug vpm voaal2 type3 privileged EXEC command. Use the no form of this command to turn off the debug function.
debug vpm voaal2 type3 {alarms | alltype3 | cas | dialed | faxrelay | state} {all_dsp | from_dsp
| to_dsp}
no debug vpm voaal2 type3
Syntax Description
alarms
|
Displays type 3 alarm packets.
|
alltype3
|
Displays all type 3 packets.
|
cas
|
Displays type 3 CAS signaling packets.
|
dialed
|
Displays type 3 dialed digit packets.
|
faxrelay
|
(Not supported) Displays type 3 fax relay packets.
|
state
|
Displays type 3 user state packets.
|
all_dsp
|
Displays messages to and from the DSP.
|
from_dsp
|
Displays messages from the DSP.
|
to_dsp
|
Displays messages to the DSP.
|
Defaults
Debugging for display of AAL2 packets is not enabled.
Command History
Release
|
Modification
|
12.1(1)XA
|
This command was introduced on the Cisco MC3810 series device.
|
12.1(2)T
|
This command was integrated into the 12.1(2)T release.
|
Usage Guidelines
This is the preferred debug command for displaying specific types of control packets. It is usually preferable to specify a particular type of control packet rather than the alltype3 keyword, to avoid excessive output display and CPU utilization.
Examples
The following example shows sample output from the debug vpm voaal2 type3 command, where the example selection is to display type 3 CAS packets sent from the DSP:
Router# debug vpm voaal2 type3 cas from_dsp
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
3d21h:TYPE 3, len = 8, cid = 25, uui = 24
redundancy = 3, timestamp = 4, signal = 5
Related Commands
Command
|
Description
|
debug vpm voaal2 type1
|
Displays type 1 (voice) AAL2 packets sent to and received from the DSP.
|
debug vpm voaal2 type3
|
Displays type 3 (control) AAL2 packets sent to and received from the DSP.
|
show debug
|
Displays which debug commands are enabled.
|
debug vsi api
To display information on events associated with the external ATM API interface to the VSI master, use the debug vsi api command. The no form of this command disables debugging output.
debug vsi api
no debug vsi api
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
Usage Guidelines
Use the debug vsi api command to monitor the communication between the VSI master and the XTagATM component regarding interface changes and cross-connect requests.
Examples
The following is sample output from the debug vsi api command:
VSI_M: vsi_exatm_conn_req: 0x000C0200/1/35 -> 0x000C0100/1/50
desired state up, status OK
VSI_M: vsi_exatm_conn_resp: 0x000C0200/1/33 -> 0x000C0100/1/49
Table 231 describes the significant fields shown in the sample command output shown above.
Table 231 debug vsi api Field Descriptions
Field
|
Description
|
vsi_exatm_conn_req
|
Indicates that a connect or disconnect request was submitted to the VSI master.
|
0x000C0200
|
The logical interface identifier of the primary endpoint, in hexadecimal form.
|
1/35
|
VPI and VCI of the primary endpoint.
|
->
|
Indicates that the expected traffic flow is unidirectional (from the primary endpoint to the secondary endpoint). The other value for this field is <->, which indicates bidirectional traffic flow.
|
0x000C0100
|
Logical interface identifier of the secondary endpoint.
|
1/50
|
VPI and VCI of the secondary endpoint.
|
|
Up indicates a connect request; Down indicates a disconnect request.
|
status (in
vsi_exatm_conn_req
output)
|
A mnemonic indicating the success or failure of the initial processing of the request. One of following status indications appears:
• OK
• INVALID_ARGS
• NONEXIST_INTF
• TIMEOUT
• NO_RESOURCES
• FAIL
OK means only that the request is successfully queued for transmission to the switch; it does not indicate completion of the request.
|
debug vsi errors
To display information about errors encountered by the VSI master, use the debug vsi errors command. The no form of this command disables debugging output.
debug vsi errors [interface interface [slave number]]
no debug vsi errors [interface interface [slave number]]
Syntax Description
interface interface
|
(Optional) Specifies the interface number.
|
slave number
|
(Optional) Specifies the slave number (beginning with 0).
|
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
Usage Guidelines
Use the debug vsi errors command to display information about errors encountered by the VSI master when parsing received messages, and information about unexpected conditions encountered by the VSI master.
If the interface parameter is specified, output is restricted to errors associated with the indicated VSI control interface. If the slave number is specified, output is further restricted to errors associated with the session with the indicated slave.
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session EXEC command.
Multiple commands that specify slave numbers allow multiple slaves to be debugged immediately. For example, the following commands display errors associated with sessions 0 and 1 on control interface atm2/0, but for no other sessions.
Router# debug vsi errors interface atm2/0 slave 0
Router# debug vsi errors interface atm2/0 slave 1
Some errors are not associated with any particular control interface or session. Messages associated with these errors are printed, regardless of the interface or slave options currently in effect.
Examples
The following is sample output from the debug vsi errors command:
VSI Master: parse error (unexpected param-group contents) in GEN ERROR RSP rcvd on
ATM2/0:0/51 (slave 0)
errored section is at offset 16, for 2 bytes:
01.01.00.a0 00.00.00.00 00.12.00.38 00.10.00.34
*00.01*00.69 00.2c.00.00 01.01.00.80 00.00.00.08
00.00.00.00 00.00.00.00 00.00.00.00 0f.a2.00.0a
00.01.00.00 00.00.00.00 00.00.00.00 00.00.00.00
Table 232 describes the significant fields shown in the sample command output shown above.
Table 232 debug vsi Errors Field Descriptions
Field
|
Description
|
parse error
|
Indicates that an error was encountered during the parsing of a message received by the VSI master.
|
unexpected param-group contents
|
Indicates the type of parsing error. In this case, a parameter group within the message contained invalid data.
|
GEN ERROR RSP
|
A mnemonic for the function code in the header of the error message.
|
ATM2/0
|
The control interface on which the error message was received.
|
0/51
|
VPI or VCI of the VC (on the control interface) on which the error message is received.
|
slave
|
Number of the session on which the error message is received.
|
offset <n>
|
Indicates the number of bytes between the start of the VSI header and the start of that portion of the message in error.
|
<n> bytes
|
Length of the error section.
|
00.01.00.a0 [...]
|
The entire error message, as a series of hexadecimal bytes. Note that the error section is between asterisks (*).
|
debug vsi events
To display information on events that affect entire sessions, and events that affect only individual connections, use the following debug vsi events command. The no form of this command disables debugging output.
debug vsi events [interface interface [slave number]]
no debug vsi events [interface interface [slave number]]
Syntax Description
interface interface
|
(Optional) Specifies the interface number.
|
slave number
|
(Optional) Specifies the slave number (beginning with zero).
|
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
Usage Guidelines
Use the debug vsi events command to display information about events associated with the per-session state machines of the VSI master, and the per-connection state machines. If the interface parameter is specified, output is restricted to events associated with the indicated VSI control interface. If the slave number is specified, output is further restricted to events associated with the session with the indicated slave.
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session command.
Multiple commands that specify slave numbers allow multiple slaves to be debugged at once. For example, the following commands restrict output to events associated with sessions 0 and 1 on control interface atm2/0, but for no other sessions. Output associated with all per-connection events are displayed, regardless of the interface or slave options currently in effect.
Router# debug vsi events interface atm2/0 slave 0
Router# debug vsi events interface atm2/0 slave 1
Examples
The following is sample output from the debug vsi events command:
VSI Master: conn 0xC0200/1/37->0xC0100/1/51:
VSI Master(session 0 on ATM2/0):
event CONN_CMT_RSP, state ESTABLISHED -> ESTABLISHED
VSI Master(session 0 on ATM2/0):
event KEEPALIVE_TIMEOUT, state ESTABLISHED -> ESTABLISHED
VSI Master(session 0 on ATM2/0):
event SW_GET_CNFG_RSP, state ESTABLISHED -> ESTABLISHED
Table 233 describes the significant fields shown in the sample command output shown above.
Table 233 Debug VSI Events Field Descriptions
Field
|
Description
|
conn
|
Indicates that the event applies to a particular connection.
|
0xC0200
|
Logical interface identifier of the primary endpoint, in hexadecimal form.
|
1/37
|
VPI or VCI of the primary endpoint.
|
->
|
Indicates that the expected traffic flow is unidirectional (from the primary endpoint to the secondary endpoint). The other value for this field is <->, indicating bidirectional traffic flow.
|
0xC0100
|
Logical interface identifier of the secondary endpoint.
|
1/51
|
VPI or VCI of the secondary endpoint.
|
<state1> -> <state2>
|
<state1> is a mnemonic for the state of the connection before the event occurred.
<state2> repre-sents the state of the connection after the event occurred.
|
session
|
Indicates the number of the session with which the event is associated.
|
ATM2/0
|
Indicates the control interface associated with the session.
|
event
|
A mnemonic for the event that has occurred. This includes mnemonics for the function codes of received messages (for example, CONN_CMT_RSP), and mnemonics for other events (for example, KEEPALIVE_TIMEOUT).
|
state <state1> -> <state2>
|
Mnemonics for the session states associated with the transition triggered by the event. <state1> is a mnemonic for the state of the session before the event occurred; <state2> is a mnemonic for the state of the session after the event occurred.
|
debug vsi packets
To display a one-line summary of each VSI message sent and received by the LSC, use the following debug vsi packets command. The no form of this command disables debugging output.
debug vsi packets [interface interface [slave number]]
no debug vsi packets [interface interface [slave number]]
Syntax Description
interface interface
|
(Optional) Specifies the interface number.
|
slave number
|
(Optional) Specifies the slave number (beginning with zero).
|
Defaults
No default behavior or values
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
Usage Guidelines
If the interface parameter is specified, output is restricted to messages sent and received on the indicated VSI control interface. If the slave number is specified, output is further restricted to messages sent and received on the session with the indicated slave.
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session EXEC command.
Multiple commands that specify slave numbers allow multiple slaves to be debugged immediate. For example, the following commands restrict output to messages received on atm2/0 for sessions 0 and 1, but for no other sessions.
Router# debug vsi packets interface atm2/0 slave 0
Router# debug vsi packets interface atm2/0 slave 1
Examples
The following is sample output from the debug vsi packets command:
Router# debug vsi packets
VSI master(session 0 on ATM2/0): sent msg SW GET CNFG CMD on 0/51
VSI master(session 0 on ATM2/0): rcvd msg SW GET CNFG RSP on 0/51
VSI master(session 0 on ATM2/0): sent msg SW GET CNFG CMD on 0/51
VSI master(session 0 on ATM2/0): rcvd msg SW GET CNFG RSP on 0/51
Table 234 describes the significant fields shown in the sample command output shown above.
Table 234 debug vsi packets Field Descriptions
Field
|
Description
|
session
|
Session number identifying a particular VSI slave. Numbers begin with zero. Refer to the show controllers vsi session command.
|
ATM2/0
|
Identifier for the control interface on which the message is sent or received.
|
sent
|
Indicates that message is sent by the VSI master.
|
rcvd
|
Indicates that message is received by the VSI master.
|
msg
|
A mnemonic for the function code from the message header.
|
0/51
|
VPI or VCI of the VC (on the control interface) on which the message is sent or received.
|
debug vsi param-groups
To display the first 128 bytes of each VSI message sent and received by the MPLS LSC (in hexadecimal form), use the following debug vsi param-groups command. The no form of this command disables debugging output.
debug vsi param-groups [interface interface [slave number]]
no debug vsi param-groups [interface interface [slave number]]
Syntax Description
interface interface
|
Specifies the interface number.
|
slave number
|
Specifies the slave number (beginning with zero).
|
Defaults
No default behavior or values.
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
Usage Guidelines
This command is most commonly used with the debug vsi packets command to monitor incoming and outgoing VSI messages.
If the interface parameter is specified, output is restricted to messages sent and received on the indicated VSI control interface.
Note
If the slave parameter is specified, output is further restricted to messages sent and received on the session with the indicated slave.param-groups stands for parameter groups. A parameter group is a component of a VSI message.
Note
Slave numbers are the same as the session numbers discussed under the show controllers vsi session command.
Multiple commands that specify a slave numbers allows multiple slaves to be debugged at once. For example, the following commands restrict output for messages received on atm2/0 for sessions 0 and 1, but for no other sessions.
Router# debug vsi param-groups interface atm2/0 slave 0
Router# debug vsi param-groups interface atm2/0 slave 1
Examples
The following is sample output from the debug vsi param-groups command:
Router# debug vsi param-groups
Outgoing VSI msg of 12 bytes (not including encap):
01.02.00.80 00.00.95.c2 00.00.00.00
Incoming VSI msg of 72 bytes (not including encap):
01.02.00.81 00.00.95.c2 00.0f.00.3c 00.10.00.08
00.01.00.00 00.00.00.00 01.00.00.08 00.00.00.09
00.00.00.09 01.10.00.20 01.01.01.00 0c.08.80.00
00.01.0f.a0 00.13.00.15 00.0c.01.00 00.00.00.00
Outgoing VSI msg of 12 bytes (not including encap):
01.02.00.80 00.00.95.c3 00.00.00.00
Incoming VSI msg of 72 bytes (not including encap):
01.02.00.81 00.00.95.c3 00.0f.00.3c 00.10.00.08
00.01.00.00 00.00.00.00 01.00.00.08 00.00.00.09
00.00.00.09 01.10.00.20 01.01.01.00 0c.08.80.00
00.01.0f.a0 00.13.00.15 00.0c.01.00 00.00.00.00
Table 235 describes the significant fields shown in the sample command output shown above.
Table 235 debug vsi param-groups Field Descriptions
Field
|
Description
|
Outgoing
|
Indicates that the message is sent by the VSI master.
|
Incoming
|
Indicates that the message is received by the VSI master.
|
bytes
|
Number of bytes in the message, starting at the VSI header, and excluding the link layer encapsulation.
|
01.02...
|
Identifies up to the first 128 bytes of the message, in hexadecimal form.
|
debug vtemplate
To display cloning information for a virtual access interface from the time it is cloned from a virtual template to the time the virtual access interface comes down when the call ends, use the debug vtemplate privileged EXEC command. The no form of this command disables debugging output.
debug vtemplate
no debug vtemplate
Syntax Description
This command has no arguments or keywords.
Examples
The following is sample output from the debug vtemplate command when a virtual access interface comes up. The virtual access interface is cloned from virtual template 1.
VTEMPLATE Reuse vaccess8, New Recycle queue size:50
VTEMPLATE set default vaccess8 with no ip address
Virtual-Access8 VTEMPLATE hardware address 0000.0c09.ddfd
VTEMPLATE vaccess8 has a new cloneblk vtemplate, now it has vtemplate
VTEMPLATE undo default settings vaccess8
VTEMPLATE ************* CLONE VACCESS8 *****************
VTEMPLATE Clone from vtemplate1 to vaccess8
interface Virtual-Access8
%LINK-3-UPDOWN: Interface Virtual-Access8, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access8, changed state to up
The following is sample output from the debug vtemplate command when a virtual access interface goes down. The virtual interface is uncloned and returns to the recycle queue.
%LINK-3-UPDOWN: Interface Virtual-Access8, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access8, changed state to down
VTEMPLATE clean up dirty vaccess queue, size:1
VTEMPLATE Found a dirty vaccess8 clone with vtemplate
VTEMPLATE ************ UNCLONE VACCESS8 **************
VTEMPLATE Unclone to-be-freed vaccess8 command#7
interface Virtual-Access8
default ppp authentication chap
default fair-queue 64 256 0
default ip unnumbered Ethernet0
VTEMPLATE set default vaccess8 with no ip address
VTEMPLATE remove cloneblk vtemplate from vaccess8 with vtemplate
VTEMPLATE Add vaccess8 to recycle queue, size=51
Table 236 describes the significant fields shown in the display.
Table 236 debug vtemplate Field Descriptions
Field
|
Description
|
VTEMPLATE Reuse vaccess8, New Recycle queue size:50 VTEMPLATE set default vaccess8 with no ip address
|
Virtual access interface 8 is reused; the current queue size is 50.
|
Virtual-Access8 VTEMPLATE hardware address 0000.0c09.ddfd
|
MAC address of virtual interface 8.
|
VTEMPLATE vaccess8 has a new cloneblk vtemplate, now it has vtemplate
|
Recording that virtual access interface 8 is cloned from the virtual interface template.
|
VTEMPLATE undo default settings vaccess8
|
Removing the default settings.
|
VTEMPLATE ************* CLONE VACCESS8 ********** *******
|
Banner: Cloning is in progress on virtual access interface 8.
|
VTEMPLATE Clone from vtemplate1 to vaccess8
interface Virtual-Access8 no ip address encap ppp ip unnumbered Ethernet0 no ip mroute-cache fair-queue 64 256 0 no cdp enable ppp authentication chap end
|
Specific configuration commands in virtual interface template 1 that are being applied to the virtual access interface 8.
|
%LINK-3-UPDOWN: Interface Virtual-Access8, changed state to up
|
Link status: The link is up.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access8, changed state to up
|
Line protocol status: The line protocol is up.
|
%LINK-3-UPDOWN: Interface Virtual-Access8, changed state to down
|
Link status: The link is down.
|
VTEMPLATE Free vaccess8
|
Freeing virtual access interface 8.
|
%LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access8, changed state to down
|
Line protocol status: The line protocol is down.
|
VTEMPLATE clean up dirty vaccess queue, size:1
VTEMPLATE Found a dirty vaccess8 clone with vtemplate
VTEMPLATE ************ UNCLONE VACCESS8 **************
|
Access queue cleanup is proceeding and the template is being uncloned.
|
VTEMPLATE Unclone to-be-freed vaccess8 command#7
interface Virtual-Access8 default ppp authentication chap default cdp enable default fair-queue 64 256 0 default ip mroute-cache default ip unnumbered Ethernet0 default encap ppp default ip address end
|
Specific configuration commands to be removed from the virtual access interface 8.
|
VTEMPLATE set default vaccess8 with no ip address
|
Default is set again.
|
VTEMPLATE remove cloneblk vtemplate from vaccess8 with vtemplate
|
Removing the record of cloning from a virtual interface template.
|
VTEMPLATE Add vaccess8 to recycle queue, size=51
|
Virtual access interface is added to the recycle queue.
|
debug vtsp all
To show debugging information for all of the debug vtsp commands, use the debug vtsp all command. Use the no form of this command to disable debugging output.
debug vtsp all
no debug vtsp all
Syntax Description
This command has no arguments or keywords.
Defaults
Debugging for vtsp is not enabled.
Command History
Release
|
Modification
|
12.0(3)T
|
This command was introduced on the Cisco AS5300 series access servers.
|
12.0(7)XK
|
This command was first supported on the Cisco 2600, 3600 and MC3810 series devices.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
The debug vtsp all command enables the following debug vtsp commands: debug vtsp session, debug vtsp error, and debug vtsp dsp. For more information or sample output, see the individual commands.
Execution of the no debug vtsp all command will turn off all VTSP-level debugging. You should turn off all debugging and then enter the debug commands you are interested in one by one. This process helps avoid confusion about which ports you are actually debugging.
Warning
Using debug vtsp all may severely impact network performance and prevent any faxes from succeeding.
Related Commands
Command
|
Description
|
show debug
|
Displays which debug commands are enabled.
|
debug vtsp port
|
Limits vtsp debug output to a specific voice port.
|
debug vtsp dsp
To show messages from the DSP to the access server, use the debug vtsp dsp EXEC command. Use the no form of this command to disable debugging output.
debug vtsp dsp
no debug vtsp dsp
Syntax Description
This command has no arguments or keywords.
Defaults
Debugging for vtsp dsp is not enabled.
Command History
Release
|
Modification
|
12.0(3)T
|
This command was introduced on the Cisco AS5300 series access servers.
|
12.0(7)XK
|
This command was first supported on the Cisco 2600, 3600, and MC3810 series devices.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
On Cisco AS5300 series access servers
The debug vtsp dsp command shows messages from the DSP on the VFC to the router; this command can be useful if you suspect that the VFC is not functional. It is a simple way to check if the VFC is responding to off-hook indications.
On Cisco 2600, 3600, MC3810 series
The debug vtsp dsp command shows messages from the DSP to the router.
Examples
The following example shows the collection of DTMF digits from the DSP on a Cisco AS5300 series access server:
*Nov 30 00:44:34.491: vtsp_process_dsp_message: MSG_TX_DTMF_DIGIT: digit=3
*Nov 30 00:44:36.267: vtsp_process_dsp_message: MSG_TX_DTMF_DIGIT: digit=1
*Nov 30 00:44:36.571: vtsp_process_dsp_message: MSG_TX_DTMF_DIGIT: digit=0
*Nov 30 00:44:36.711: vtsp_process_dsp_message: MSG_TX_DTMF_DIGIT: digit=0
*Nov 30 00:44:37.147: vtsp_process_dsp_message: MSG_TX_DTMF_DIGIT: digit=2
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging.
|
debug vtsp port
|
Limits vtsp debug output to a specific voice port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vtsp error
To display processing errors in the voice telephony service provider, use the debug vtsp error EXEC command. Use the no form of this command to disable VTSP error debugging.
debug vtsp error
no debug vtsp error
Syntax Description
This command has no arguments or keywords.
Defaults
Debugging for VTSP errors is not enabled.
Command HistoryCommand History
Release
|
Modification
|
12.0(7)XK
|
This command was first supported on the Cisco 2600, 3600 and MC3810 series.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
The debug vtsp error command can be used to check for mismatches in interface capabilities.
Examples
The following example shows sample output from the debug vtsp error command, in which a dialed number is not reachable because it is not configured.
Voice telephony call control error debugging is on
*Mar 1 00:21:48.698:cc_api_call_setup_ind (vdbPtr=0x1575AB0,
callInfo={called=,called_oct3=0x81,calling=9999,calling_oct3=0x0,called_oct3a=0x0,
fdest=0 peer_tag=1},callID=0x15896A4)
*Mar 1 00:21:48.698:cc_api_call_setup_ind type 3 , prot 0
*Mar 1 00:21:48.706:cc_process_call_setup_ind (event=0x16AD0E0) handed call to app
"SESSION"
*Mar 1 00:21:48.706:sess_appl:ev(23=CC_EV_CALL_SETUP_IND), cid(15), disp(0)
*Mar 1 00:21:48.706:sess_appl:ev(SSA_EV_CALL_SETUP_IND), cid(15), disp(0)
*Mar 1 00:21:48.706:ccCallSetContext (callID=0xF, context=0x1632898)
*Mar 1 00:21:48.706:ccCallSetupAck (callID=0xF)
*Mar 1 00:21:48.706:ccGenerateTone (callID=0xF tone=8)
*Mar 1 00:21:49.710:cc_api_call_digit_begin (vdbPtr=0x1575AB0, callID=0xF, digit=5,
flags=0x1, timestamp=0xB1AE6BC4, expiration=0x0)
*Mar 1 00:21:49.710:sess_appl:ev(10=CC_EV_CALL_DIGIT_BEGIN), cid(15), disp(0)
*Mar 1 00:21:49.710:cid(15)st(SSA_CS_MAPPING)ev(SSA_EV_DIGIT_BEGIN)
oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(1)fDest(0)
*Mar 1 00:21:49.714:ssaIgnore cid(15), st(SSA_CS_MAPPING),oldst(0), ev(10)
*Mar 1 00:21:49.778:cc_api_call_digit (vdbPtr=0x1575AB0, callID=0xF, digit=5,
duration=4165,tag 0, callparty 0 )
*Mar 1 00:21:49.778:sess_appl:ev(9=CC_EV_CALL_DIGIT), cid(15), disp(0)
*Mar 1 00:21:49.778:cid(15)st(SSA_CS_MAPPING)ev(SSA_EV_CALL_DIGIT)
oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(1)fDest(0)
*Mar 1 00:21:49.782:ssaDigit
*Mar 1 00:21:49.782:ssaDigit, callinfo , digit 5, tag 0,callparty 0
*Mar 1 00:21:49.782:ssaDigit, calling 9999,result 1
*Mar 1 00:21:49.915:cc_api_call_digit_begin (vdbPtr=0x1575AB0, callID=0xF, digit=5,
flags=0x1, timestamp=0xB1AF6B6C, expiration=0x0)
*Mar 1 00:21:49.915:sess_appl:ev(10=CC_EV_CALL_DIGIT_BEGIN), cid(15), disp(0)
*Mar 1 00:21:49.915:cid(15)st(SSA_CS_MAPPING)ev(SSA_EV_DIGIT_BEGIN)
oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(1)fDest(0)
*Mar 1 00:21:49.915:ssaIgnore cid(15), st(SSA_CS_MAPPING),oldst(0), ev(10)
*Mar 1 00:21:49.999:cc_api_call_digit (vdbPtr=0x1575AB0, callID=0xF, digit=5,
duration=95,tag 0, callparty 0 )
*Mar 1 00:21:49.999:sess_appl:ev(9=CC_EV_CALL_DIGIT), cid(15), disp(0)
*Mar 1 00:21:50.003:cid(15)st(SSA_CS_MAPPING)ev(SSA_EV_CALL_DIGIT)
oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(1)fDest(0)
*Mar 1 00:21:50.003:ssaDigit
*Mar 1 00:21:50.003:ssaDigit, callinfo , digit 55, tag 0,callparty 0
*Mar 1 00:21:50.003:ssaDigit, calling 9999,result -1
*Mar 1 00:21:50.003:ccCallDisconnect (callID=0xF, cause=0x1C tag=0x0)
*Mar 1 00:21:50.003:ccCallDisconnect (callID=0xF, cause=0x1C tag=0x0)
*Mar 1 00:21:50.007:vtsp_process_event():prev_state = 0.4 ,
state = S_WAIT_RELEASE_NC, event = E_CC_DISCONNECT
Invalid FSM Input on channel 1/1:15
*Mar 1 00:21:52.927:vtsp_process_event():prev_state = 0.7 ,
state = S_WAIT_RELEASE_RESP, event = E_TSP_CALL_FEATURE_IND
Invalid FSM Input on channel 1/1:15
*Mar 1 00:21:52.931:cc_api_call_disconnect_done(vdbPtr=0x1575AB0, callID=0xF, disp=0,
tag=0x0)
*Mar 1 00:21:52.931:sess_appl:ev(13=CC_EV_CALL_DISCONNECT_DONE), cid(15), disp(0)
*Mar 1 00:21:52.931:cid(15)st(SSA_CS_DISCONNECTING)ev(SSA_EV_CALL_DISCONNECT_DONE)
oldst(SSA_CS_MAPPING)cfid(-1)csize(0)in(1)fDest(0)
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging.
|
debug vtsp port
|
Limits vtsp debug output to a specific voice port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vtsp port
To observe the behavior of the VTSP state machine on a specific voice port, use the debug vtsp port command. Use the no form of the command to turn off the debug function.
For Cisco 2600 and 3600 Series with Analog Voice Ports
debug vtsp port slot/subunit/port
no debug vtsp port slot/subunit/port
For Cisco 2600 and 3600 series with digital voice ports (with T1 packet voice trunk network modules):
debug vtsp port slot/port:ds0-group
no debug vtsp port slot/port:ds0-group
For Cisco MC3810 Series with Analog Voice Ports
debug vtsp port slot/port
no debug vtsp port slot/port
For Cisco MC3810 series with digital voice ports:
debug vtsp port slot/port
no debug vtsp port slot/ds0-group
Syntax Description
slot/subunit/port
|
• slot specifies a router slot in which a voice network module (NM) is installed. Valid entries are router slot numbers for the particular platform.
• subunit specifies a voice interface card (VIC) where the voice port is located. Valid entries are 0 and 1. (The VIC fits into the voice network module.)
• port specifies an analog voice port number. Valid entries are 0 and 1.
|
For the Cisco 2600 and 3600 series with digital voice ports:
slot/port:ds0-group
|
Debugs the digital voice port you specify with the slot/port:ds0-group designation.
slot specifies a router slot in which the packet voice trunk network module (NM) is installed. Valid entries are router slot numbers for the particular platform.
port specifies a T1 or E1 physical port in the voice WAN interface card (VWIC). Valid entries are 0 and 1. (One VWIC fits in an NM.)
ds0-group specifies a T1 or E1 logical port number. Valid entries are 0 to 23 for T1 and 0 to 30 for E1.
|
For the Cisco MC3810 Series with Analog Voice Ports
slot/port
|
Debugs the analog voice port you specify with the slot/port designation.
slot is the physical slot in which the analog voice module (AVM) is installed. The slot is always 1 for analog voice ports in the Cisco MC3810 series.
port specifies an analog voice port number. Valid entries are 1 to 6.
|
For the Cisco MC3810 series with digital voice ports:
slot:ds0-group
|
Debugs the digital voice port you specify with the slot:ds0-group designation.
slot specifies the module (and controller). Valid entries are 0 for the MFT (controller 0) and 1 for the DVM (controller 1).
ds0-group specifies a T1 or E1 logical voice port number. Valid entries are 0 to 23 for T1 and 0 to 30 for E1.
|
Defaults
Debug vtsp commands are not limited to a specific port.
Command History
Release
|
Modification
|
12.0(3)XG
|
This command was introduced on Cisco 2600 and 3600 series routers.
|
12.0(3)T
|
This command was introduced on the Cisco AS5300 series access servers.
|
12.0(7)XK
|
This command was first supported on the Cisco MC3810 series.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
Use the debug vtsp port command to limit the debug output to a particular voice port. The debug output can be quite voluminous for a single channel. The entire vtsp debug output form a platform with 12 voice ports might create problems. Use this debug with any or all of the other debug modes.
Execution of no debug vtsp all will turn off all VTSP-level debugging. It is usually a good idea to turn off all debugging and then enter the debug commands you are interested in one by one. This will help to avoid confusion about which ports you are actually debugging.
Examples
The following example shows sample output from the debug vtsp port 1/1/0 command:
Router# debug vtsp port 1/1/0
*Mar 1 03:17:33.691: vtsp_tsp_call_setup_ind (sdb=0x613FD514, tdm_info=0x0,
tsp_info=0x613FD438, calling_number= called_number= redirect_number=): peer_tag=1110
*Mar 1 03:17:33.691: vtsp_do_call_setup_ind
*Mar 1 03:17:33.691: dsp_close_voice_channel: [] packet_len=8 channel_id=1
*Mar 1 03:17:33.691: dsp_open_voice_channel: [] packet_len=12
channel_id=1 packet_id=74 alaw_ulaw_select=0 transport_protocol=2
*Mar 1 03:17:33.695: dsp_set_playout_delay: [] packet_len=18
channel_id=1 packet_id=76 mode=1 initial=60 min=4 max=200 fax_nom=300
*Mar 1 03:17:33.695: dsp_echo_canceller_control: [] packet_len=10 channel_id=1
*Mar 1 03:17:33.695: dsp_set_gains: [] packet_len=12 channel_id=1 packet_id=91
*Mar 1 03:17:33.695: dsp_vad_enable: [] packet_len=10 channel_id=1 packet_id=78
*Mar 1 03:17:33.695: vtsp_process_event(): [, 0.S_SETUP_INDICATED, E_CC_PROCEEDING]
*Mar 1 03:17:33.699: vtsp_process_event(): [, 0.S_SETUP_INDICATED,
*Mar 1 03:17:33.699: vtsp_ring_noan_timer_start: 1185370
*Mar 1 03:17:33.699: vtsp_process_event(): [, 0.S_SETUP_INDICATED,
E_CC_CAPS_IND]act_caps_ind
*Mar 1 03:17:33.699: act_caps_ind: Encap 2, Vad 2, Codec 0x1000, CodecBytes 60,
Sub-channel 10, Bitmask 0x0 SignalType 2
*Mar 1 03:17:33.703: vtsp_process_event(): [, 0.S_SETUP_INDICATED,
E_CC_CAPS_ACK]act_caps_ack
*Mar 1 03:17:33.703: dsp_idle_mode: [] packet_len=8 channel_id=1 packet_id=68
*Mar 1 03:17:33.703: vtsp_process_event(): [, 0.S_SETUP_INDICATED,
*Mar 1 03:17:33.703: vtsp_ring_noan_timer_stop: 1185370
*Mar 1 03:17:33.911: vtsp_process_event(): [, 0.S_CONNECT, E_DSPRM_PEND_SUCCESS]
*Mar 1 03:17:33.911: dsp_close_voice_channel: [] packet_len=8 channel_id=1
*Mar 1 03:17:33.911: dsp_open_voice_channel: [] packet_len=12 channel_id=1
packet_id=74 alaw_ulaw_select=0 transport_protocol=2
*Mar 1 03:17:33.911: dsp_set_playout_delay: [] packet_len=18 channel_id=1 packet_id=76
mode=1 initial=60 min=4 max=200 fax_nom=300
*Mar 1 03:17:33.911: dsp_echo_canceller_control: [] packet_len=10 channel_id=1
*Mar 1 03:17:33.911: dsp_set_gains: [] packet_len=12 channel_id=1 packet_id=91
*Mar 1 03:17:33.911: dsp_vad_enable: [] packet_len=10 channel_id=1 packet_id=78
*Mar 1 03:17:33.911: dsp_encap_config: [] packet_len=24 channel_id=1 packet_id=
92 TransportProtocol 3 SID_support=0 sequence_number=0 rotate_flag=0 header_bytes 0xA0
*Mar 1 03:17:33.915: dsp_voice_mode: [] packet_len=22 channel_id=1 packet_id=73
coding_type=14 voice_field_size=60 VAD_flag=1 echo_length=128
comfort_noise=1 fax_detect=1 digit_relay=0
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging.
|
show debug
|
Displays which debug commands are enabled.
|
debug vtsp send-nse
To trigger the VTSP software module to send a triple redundant NSE, use the debug vtsp send-nse EXEC command. Use the no debug vtsp send-nse to disable this action.
debug vtsp send-nse
no debug vtsp send-nse
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Command History
Release
|
Modification
|
12.0(7)XK
|
This command was introduced on the Cisco MC3810 and the Cisco 3600 series routers (except the Cisco 3620) in a private release that was not generally available.
|
Examples
The following example shows the VTSP software module set to send a triple redundant NSE:
Router# debug vtsp send-nse
Related Commands
Command
|
Description
|
debug rtpspi all
|
Debugs all RTP SPI errors, sessions, and in/out functions.
|
debug rtpspi errors
|
Debugs RTP SPI errors.
|
debug rtpspi inout
|
Debugs RTP SPI in/out functions.
|
debug rtpspi send-nse
|
Triggers the RTP SPI to send a triple redundant NSE.
|
debug sgcp errors
|
Debugs SGCP errors.
|
debug sgcp events
|
Debugs SGCP events.
|
debug sgcp packet
|
Debugs SGCP packets.
|
debug vtsp session
To trace how the router interacts with the DSP based on the signaling indications from the signaling stack and requests from the application, use the debug vtsp session command. Use the no form of this command to turn off the debug function.
debug vtsp session
no debug vtsp session
Syntax Description
This command has no arguments or keywords.
Defaults
Debugging for vtsp session is not enabled.
Command History
Release
|
Modification
|
12.0(3)T
|
This command was introduced on the Cisco AS5300 series access servers.
|
12.0(7)XK
|
This command was first supported on the Cisco 2600, 3600 and MC3810 series.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
The debug vtsp session command traces how the router interacts with the DSP based on the signaling indications from the signaling stack and requests from the application. This debug command displays information about how each network indication and application request is handled, signaling indications, and DSP control messages.
This debug level shows the internal workings of the voice telephony call state machine.
Examples
The following example shows sample output from the debug vtsp session command, in which the call has been accepted and the system is checking for incoming dial-peer matches:
*Nov 30 00:46:19.535: vtsp_tsp_call_accept_check (sdb=0x60CD4C58,
calling_number=408 called_number=1): peer_tag=0
*Nov 30 00:46:19.535: vtsp_tsp_call_setup_ind (sdb=0x60CD4C58,
tdm_info=0x60B80044, tsp_info=0x60B09EB0, calling_number=408 called_number=1):
The following example shows sample output from the debug vtsp session command, in which a DSP has been allocated to handle the call and has indicated the call to the higher layer code:
*Nov 30 00:46:19.535: vtsp_do_call_setup_ind:
*Nov 30 00:46:19.535: dsp_open_voice_channel: [0:D:12] packet_len=12
channel_id=8737 packet_id=74 alaw_ulaw_select=0 transport_protocol=2
*Nov 30 00:46:19.535: dsp_set_playout_delay: [0:D:12] packet_len=18
channel_id=8737 packet_id=76 mode=1 initial=60 min=4 max=200 fax_nom=300
*Nov 30 00:46:19.535: dsp_echo_canceller_control: [0:D:12] packet_len=10
channel_id=8737 packet_id=66 flags=0x0
*Nov 30 00:46:19.539: dsp_set_gains: [0:D:12] packet_len=12 channel_id=8737
packet_id=91 in_gain=0 out_gain=0
*Nov 30 00:46:19.539: dsp_vad_enable: [0:D:12] packet_len=10 channel_id=8737
*Nov 30 00:46:19.559: vtsp_process_event: [0:D:12, 0.3, 13] act_setup_ind_ack
The following example shows sample output from the debug vtsp session command, in which the higher layer code has accepted the call, placed the DSP in DTMF mode, and collected digits:
*Nov 30 00:46:19.559: dsp_voice_mode: [0:D:12] packet_len=20 channel_id=8737
packet_id=73 coding_type=1 voice_field_size=160 VAD_flag=0 echo_length=64
comfort_noise=1 fax_detect=1
*Nov 30 00:46:19.559: dsp_dtmf_mode: [0:D:12] packet_len=10 channel_id=8737
packet_id=65 dtmf_or_mf=0
*Nov 30 00:46:19.559: dsp_cp_tone_on: [0:D:12] packet_len=30 channel_id=8737
packet_id=72 tone_id=3 n_freq=2 freq_of_first=350 freq_of_second=440
amp_of_first=4000 amp_of_second=4000 direction=1 on_time_first=65535
off_time_first=0 on_time_second=65535 off_time_second=0
*Nov 30 00:46:19.559: vtsp_timer: 278792
*Nov 30 00:46:22.059: vtsp_process_event: [0:D:12, 0.4, 25] act_dcollect_digit
*Nov 30 00:46:22.059: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:22.059: vtsp_timer: 279042
*Nov 30 00:46:22.363: vtsp_process_event: [0:D:12, 0.4, 25] act_dcollect_digit
*Nov 30 00:46:22.363: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:22.363: vtsp_timer: 279072
*Nov 30 00:46:22.639: vtsp_process_event: [0:D:12, 0.4, 25] act_dcollect_digit
*Nov 30 00:46:22.639: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:22.639: vtsp_timer: 279100
*Nov 30 00:46:22.843: vtsp_process_event: [0:D:12, 0.4, 25] act_dcollect_digit
*Nov 30 00:46:22.843: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:22.843: vtsp_timer: 279120
*Nov 30 00:46:23.663: vtsp_process_event: [0:D:12, 0.4, 25] act_dcollect_digit
*Nov 30 00:46:23.663: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:23.663: vtsp_timer: 279202
The following example shows sample output from the debug vtsp session command, in which the call proceeded and DTMF was disabled:
*Nov 30 00:46:23.663: vtsp_process_event: [0:D:12, 0.4, 15] act_dcollect_proc
*Nov 30 00:46:23.663: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:23.663: dsp_idle_mode: [0:D:12] packet_len=8 channel_id=8737
The following example shows sample output from the debug vtsp session command, in which the telephony call leg was conferenced with the packet network call leg, and the telephony call leg has performed capabilities exchange with the network-side call leg:
*Nov 30 00:46:23.699: vtsp_process_event: [0:D:12, 0.5, 17] act_bridge
*Nov 30 00:46:23.699: vtsp_process_event: [0:D:12, 0.5, 22] act_caps_ind
*Nov 30 00:46:23.699: vtsp_process_event: [0:D:12, 0.5, 23] act_caps_ack
Go into voice mode with codec indicated in caps exchange.
*Nov 30 00:46:23.699: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:23.699: dsp_idle_mode: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:23.699: dsp_voice_mode: [0:D:12] packet_len=20 channel_id=8737
packet_id=73 coding_type=6 voice_field_size=20 VAD_flag=1 echo_length=64
comfort_noise=1 fax_detect=1
The following example shows sample output from the debug vtsp session command in which the call has been connected at remote end:
*Nov 30 00:46:23.779: vtsp_process_event: [0:D:12, 0.5, 10] act_connect
The following example shows sample output from the debug vtsp session command in which disconnect was indicated and passed to upper layer:
*Nov 30 00:46:30.267: vtsp_process_event: [0:D:12, 0.11, 5] act_generate_disc
The following example shows sample output from the debug vtsp session command, in which the conference was torn down and the disconnect handshake was completed:
*Nov 30 00:46:30.267: vtsp_process_event: [0:D:12, 0.11, 18] act_bdrop
*Nov 30 00:46:30.267: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:30.267: vtsp_process_event: [0:D:12, 0.11, 20] act_disconnect
*Nov 30 00:46:30.267: dsp_get_error_stat: [0:D:12] packet_len=10 channel_id=0
*Nov 30 00:46:30.267: vtsp_timer: 279862
The following example shows sample output from the debug vtsp session command, in which the final DSP statistics were retrieved:
*Nov 30 00:46:30.275: vtsp_process_event: [0:D:12, 0.17, 30] act_get_error
*Nov 30 00:46:30.275: 0:D:12: rx_dropped=0 tx_dropped=0 rx_control=353
tx_control=338 tx_control_dropped=0 dsp_mode_channel_1=2 dsp_mode_channel_2=0
c[0]=71 c[1]=71 c[2]=71 c[3]=71 c[4]=68 c[5]=71 c[6]=68 c[7]=73 c[8]=83 c[9]=84
c[10]=87 c[11]=83 c[12]=84 c[13]=87 c[14]=71 c[15]=6
*Nov 30 00:46:30.275: dsp_get_levels: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:30.279: vtsp_process_event: [0:D:12, 0.17, 34] act_get_levels
*Nov 30 00:46:30.279: dsp_get_tx_stats: [0:D:12] packet_len=10 channel_id=8737
packet_id=86 reset_flag=1
*Nov 30 00:46:30.287: vtsp_process_event: [0:D:12, 0.17, 31] act_stats_complete
*Nov 30 00:46:30.287: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:30.287: dsp_idle_mode: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:30.287: vtsp_timer: 279864
The following example shows sample output from the debug vtsp session command, in which the DSP channel was closed and released:
*Nov 30 00:46:30.287: vtsp_process_event: [0:D:12, 0.18, 6] act_wrelease_release
*Nov 30 00:46:30.287: dsp_cp_tone_off: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:30.287: dsp_idle_mode: [0:D:12] packet_len=8 channel_id=8737
*Nov 30 00:46:30.287: dsp_close_voice_channel: [0:D:12] packet_len=8
channel_id=8737 packet_id=75
*Nov 30 00:46:30.287: vtsp_process_event: [0:D:12, 0.16, 42] act_terminate
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging.
|
debug vtsp port
|
Limits vtsp debug output to a specific voice port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vtsp stats
To debug periodic statistical-information-request messages sent and received from the DSP during a call, use the debug vtsp stats command. Use the no form of this command to turn off the debug function.
debug vtsp stats
no debug vtsp stats
Syntax Description
This command has no arguments or keywords.
Defaults
Debugging for vtsp stats is not enabled.
Command History
Release
|
Modification
|
12.0(3)T
|
This command was introduced on the Cisco AS5300 series access servers.
|
12.0(7)XK
|
This command was first supported on the Cisco 2600, 3600 and MC3810 series.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
The debug vtsp stats command generates a collection of DSP statistics for generating RTCP packets and a collection of other statistical information.
Examples
The following example shows sample debug vtsp stats output:
*Nov 30 00:53:26.499: vtsp_process_event: [0:D:14, 0.11, 19] act_packet_stats
*Nov 30 00:53:26.499: dsp_get_voice_playout_delay_stats: [0:D:14] packet_len=10
channel_id=8753 packet_id=83 reset_flag=0
*Nov 30 00:53:26.499: dsp_get_voice_playout_error_stats: [0:D:14] packet_len=10
channel_id=8753 packet_id=84 reset_flag=0
*Nov 30 00:53:26.499: dsp_get_rx_stats: [0:D:14] packet_len=10 channel_id=8753
packet_id=87 reset_flag=0
*Nov 30 00:53:26.503: vtsp_process_dsp_message: MSG_TX_GET_VOICE_PLAYOUT_DELAY:
clock_offset=-1664482334 curr_rx_delay_estimate=69 low_water_mark_rx_delay=69
high_water_mark_rx_delay=70
*Nov 30 00:53:26.503: vtsp_process_event: [0:D:14, 0.11, 28]
*Nov 30 00:53:26.503: vtsp_process_dsp_message: MSG_TX_GET_VOICE_PLAYOUT_ERROR:
predective_concelement_duration=0 interpolative_concelement_duration=0
silence_concelement_duration=0 retroactive_mem_update=0
buf_overflow_discard_duration=10 num_talkspurt_detection_errors=0
*Nov 30 00:53:26.503: vtsp_process_event: [0:D:14, 0.11, 29]
*Nov 30 00:53:26.503: vtsp_process_dsp_message: MSG_TX_GET_RX_STAT:
num_rx_pkts=152 num_early_pkts=-2074277660 num_late_pkts=327892
num_signalling_pkts=0 num_comfort_noise_pkts=0 receive_durtation=3130
voice_receive_duration=2970 fax_receive_duration=0 num_pack_ooseq=0
*Nov 30 00:53:26.503: vtsp_process_event: [0:D:14, 0.11, 32]
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging.
|
debug vtsp port
|
Limits vtsp debug output to a specific voice port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vtsp vofr subframe
To display the first 10 bytes (including header) of selected VoFR subframes for the interface, use the debug vtsp vofr subframe command. Use the no form of the command to turn off the debug function.
debug vtsp vofr subframe payload [from-dsp] [to-dsp]
no debug vtsp vofr subframe
Syntax Description
payload
|
Number used to selectively display subframes of a specific payload. Payload types are:
0: Primary Payload - WARNING! This option may cause network instability 1: Annex-A 2: Annex-B 3: Annex-D 4: All other payloads 5: All payloads - WARNING! This option may cause network instability
|
from-dsp
|
Displays only the subframes received from the DSP.
|
to-dsp
|
Displays only the subframes going to the DSP.
|
Defaults
Debugging for vtsp vofr subframe is not enabled.
Command History
Release
|
Modification
|
12.0(3)XG, 12.0(4)T
|
This command was introduced on the Cisco 2600 and 3600 series.
|
12.0(4)T
|
This command was integrated into 12.0(4)T release.
|
12.0(7)XK
|
This command was first supported on the Cisco MC3810 series.
|
12.1(2)T
|
This command was integrated into 12.1(2)T release.
|
Usage Guidelines
Each debug output displays the first 10 bytes of the FRF.11 subframe, including header bytes. The from-dsp and to-dsp options can be used to limit the debugs to a single direction. If not specified, debugs are displayed for subframes when they are received from the DSP and before they are sent to the DSP.
Use extreme caution in selecting payload options 0 and 6. These options may cause network instability.
Examples
The following example shows sample output from the debug vtsp vofr subframe command:
Router# debug vtsp vofr subframe 2
vtsp VoFR subframe debugging is enabled for payload 2 to and from DSP 3620_vofr#
*Mar 6 18:21:17.413:VoFR frame received from Network (24 bytes):9E 02 19 AA AA AA AA
*Mar 6 18:21:17.449:VoFR frame received from DSP (18 bytes):9E 02 19 AA AA AA AA AA AA
*Mar 6 18:21:23.969:VoFR frame received from Network (24 bytes):9E 02 19 AA AA AA AA
*Mar 6 18:21:24.005:VoFR frame received from DSP (18 bytes):9E 02 19 AA AA AA AA AA AA
Related Commands
Command
|
Description
|
debug vpm all
|
Enables all VPM debugging.
|
debug vtsp port
|
Limits vtsp debug output to a specific voice port.
|
show debug
|
Displays which debug commands are enabled.
|
debug vtsp tone
To display debug messages showing the types of tones generated by the VoIP gateway, use the debug vtsp tone command. To disable the debug messages, use the no form of this command.
debug vtsp tone
no debug vtsp tone
Syntax Description
This command has no keywords or arguments.
Defaults
Tone generation messages are not enabled.
Command History
Release
|
Modification
|
12.1(3)XI
|
This command was introduced.
|
12.1(5)T
|
This command was integrated into Cisco IOS Release 12.1(5)T.
|
Examples
The following example shows that a ringback tone was generated by the VoIP gateway:
*Jan 1 16:33:52.395:act_alert:Tone Ring Back generated in direction Network
*Jan 1 16:33:52.399:ISDN Se0:23:TX -> ALERTING pd = 8 callref = 0x9816
Related Commands
Command
|
Description
|
debug vtsp dsp
|
Shows messages from the Digital Signal Processor (DSP) on the modem to the router.
|
debug vtsp session
|
Traces how the router interacts with the Digital Signal Processor (DSP), based on the signaling indications from the signaling stack and requests from the application.
|
debug x25
To display information about X.25 traffic, use one of the following debug x25 privileged EXEC commands. The commands allow you to display all information or an increasingly restrictive part of the information.
Caution 
This command is processor intensive and can render the router useless. Use this command only when the aggregate of all reportable X.25 traffic is fewer than five packets per second (pps). The generic forms of this command should be restricted to low-speed, low-usage links running at less than 19.2 kbps. Because the
debug x25 vc command and the
debug x25 vc events command display traffic for only a small subset of virtual circuits, they are safer to use under heavy traffic conditions, as long as events for that virtual circuit are fewer than 25 pps.
To display information about all X.25 traffic, including traffic for X.25, Connection Mode Network Service (CMNS), and X.25 over TCP (XOT) services, use the debug x25 command (default all). Use the no form of this command to disable debugging output.
debug x25
no debug x25
To display information about all X.25 traffic except data and resource record packets, use the debug x25 events command. Use the no form of this command to disable debugging output.
debug x25 events
no debug x25 events
To display information about a specific X.25 service class, use the following form of the debug x25 command. Use the no form of this command to disable debugging output.
debug x25 [only | cmns | xot] [events | all]
no debug x25 [only | cmns | xot] [events | all]
To display information about a specific X.25 or CMNS context, use the following form of the debug x25 command. Use the no form of this command to disable debugging output.
debug x25 interface {serial-interface | cmns-interface mac mac-address} [events | all]
no debug x25 interface {serial-interface | cmns-interface mac mac-address} [events | all]
To display information about a specific X.25 or CMNS virtual circuit, use the following form of the debug x25 command. Use the no form of this command to disable debugging output.
debug x25 interface {serial-interface | cmns-interface mac mac-address} vc number
[events | all]
no debug x25 interface {serial-interface | cmns-interface mac mac-address} vc number
[events | all]
To display information about traffic for all virtual circuits using a given number, use the following form of the debug x25 command. The no form of this command removes the filter for a particular virtual circuit from the debug x25 all or debug x25 events output. Use the no form of this command to disable debugging output.
debug x25 vc number [events | all]
no debug x25 vc number [events | all]
To display information about traffic to or from a specific XOT host, use the following form of the debug x25 xot command. Use the no form of this command to disable debugging output.
debug x25 xot [remote ip-address [port number]] [local ip-address [port number]]
[events | all]
no debug x25 xot [remote ip-address [port number]] [local ip-address [port number]]
[events | all]
Use the debug x25 command with the aodi keyword to display information about an interface running PPP over an X.25 session. The no form of this command disables debugging output. Use the no form of this command to disable debugging output.
debug x25 aodi
no debug x25 aodi
Syntax Description
events
|
(Optional) Displays all traffic except Data and Receiver Ready (RR) packets.
|
only | cmns | xot
|
(Optional) Displays information about the specified services: X.25 only, CMNS, or XOT.
|
all
|
(Optional) Displays all traffic.
|
serial-interface
|
X.25 serial interface.
|
cmns-interface mac mac-address
|
MAC address of the CMNS interface and remote host. The interface type can be Ethernet, Token Ring, or FDDI.
|
vc number
|
Virtual circuit number, in the range 1 to 4095.
|
remote ip-address [port number]
|
(Optional) Remote IP address and, optionally, a port number in the range 1 to 65535.
|
local ip-address [port number]
|
(Optional) Local host IP address and, optionally, a port number in the range 1 to 65535.
|
aodi
|
Causes the debug x25 command to display Always On/Dynamic ISDN (AO/DI) events and processing information.
|
Defaults
The default is that all traffic is displayed.
Command History
Release
|
Modification
|
10.0
|
This command was introduced.
|
12.0(5)T
|
For DNS-based X.25 routing, additional functionality was added to the debug x25 events command to describe the events occurring while resolving the X.25 address to an IP address using a DNS server. The debug domain command can be used along with debug x25 events to observe the whole DNS-based X.25 routing data flow. (For more details, see "debug x25 events for DNS-Based X.25 Routing" in the "Examples" section.)
|
12.0(7)T
|
For the X.25 CUGs feature, functionality was added to the debug x25 events command to describe events occurring during CUG activity. (For more details, see "debug x25 events for X.25 CUGs" in the "Examples" section.)
|
Usage Guidelines
This command is particularly useful for diagnosing problems encountered when placing calls. The debug x25 all output includes data, control messages, and flow control packets for all virtual circuits of the router.
All debug x25 command forms can take either the events or all keyword. The keyword all is the default and causes all packets meeting the other debug criteria to be reported. The keyword events omits reports of any Data or Receiver Ready (RR) flow control packets; the normal flow of data and RR packets is commonly large and less interesting to the user, so event reporting can significantly decrease the processor load induced by debug reporting.
The debug x25 interface command is useful for diagnosing problems encountered with a single X.25 or CMNS host or virtual circuit.
Because no interface is specified by the debug x25 vc command, traffic on any virtual circuit that has the specified number is reported.
Virtual circuit zero (vc 0) cannot be specified. It is used for X.25 service messages, such as RESTART packets, not virtual circuit traffic. Service messages can be monitored only when no virtual circuit filter is used.
The debug x25 xot output allows you to restrict the debug output reporting to XOT traffic for one or both hosts or host/port combinations. Because each XOT virtual circuit uses a unique TCP connection, an XOT debug request that specifies both host addresses and ports will report traffic only for that virtual circuit. Also, you can restrict reporting to sessions initiated by the local or remote router by specifying 1998 for the remote or local port. (XOT connections are received on port 1998.)
Use the debug x25 aodi command to display interface PPP events running over an X.25 session and to debug X.25 connections between a client and server configured for AO/DI.
Examples
The following is sample output from the debug x25 command, displaying output concerning the functions X.25 restart, call setup, data exchange, and clear:
Serial0: X.25 I R/Inactive Restart (5) 8 lci 0
Cause 7, Diag 0 (Network operational/No additional information)
Serial0: X.25 O R3 Restart Confirm (3) 8 lci 0
Serial0: X.25 I P1 Call (15) 8 lci 1
From(6): 170091 To(6): 170090
Call User Data (4): 0xCC000000 (ip)
Serial0: X.25 O P3 Call Confirm (3) 8 lci 1
Serial0: X.25 I D1 Data (103) 8 lci 1 PS 0 PR 0
Serial0: X.25 O D1 Data (103) 8 lci 1 PS 0 PR 1
Serial0: X.25 I P4 Clear (5) 8 lci 1
Cause 9, Diag 122 (Out of order/Maintenance action)
Serial0: X.25 O P7 Clear Confirm (3) 8 lci 1
Table 237 describes the fields shown in the display.
Table 237 debug x25 Field Descriptions
Field
|
Description
|
Serial0
|
Interface on which the X.25 event occurred.
|
X.25
|
Type of event this message describes.
|
I
|
Letter indicating whether the X.25 packet was input (I) or output (O) through the interface.
|
R3
|
State of the service or virtual circuit (VC). Possible values follow:
• R/Inactive—Packet layer awaiting link layer service
• R1—Packet layer ready
• R2—Data terminal equipment (DTE) restart request
• R3—Data circuit-terminating equipment (DCE) restart indication
• P/Inactive—VC awaiting packet layer service
• P1—Idle
• P2—DTE waiting for DCE to connect CALL
• P3—DCE waiting for DTE to accept CALL
• P4—Data transfer
• P5—CALL collision
• P6—DTE clear request
• P7—DCE clear indication
• D/Inactive—VC awaiting setup
• D1—Flow control ready
• D2—DTE reset request
• D3—DCE reset indication
See Annex B of the ITU-T Recommendation X.25 for more information on these states.
|
Restart
|
The type of X.25 packet. Possible values follow:
• R Events
—Restart
—Restart Confirm
—Diagnostic
• P Events
—Call
—Call Confirm
—Clear
—Clear Confirm
• D Events
—Reset
—Reset Confirm
• D1 Events
—Data
—RNR (Receiver Not Ready)
—RR (Receiver Ready)
—Interrupt
—Interrupt Confirm
• XOT Overhead
—PVC Setup
|
(5)
|
Number of bytes in the packet.
|
8
|
Modulo of the virtual circuit. Possible values are 8 or 128.
|
lci 0
|
VC number. See Annex A of the ITU-T Recommendation X.25 for information on VC assignment.
|
Cause 7
|
Code indicating the event that triggered the packet. The Cause field can only appear in entries for Clear, Reset, and Restart packets. Possible values for the Cause field can vary, depending on the type of packet. Refer to the "X.25 Cause and Diagnostic Codes" appendix for an explanation of these codes.
|
Diag 0
|
Code providing an additional hint as to what, if anything, went wrong. The Diag field can only appear in entries for Clear, Diagnostic (as "error 0"), Reset, and Restart packets. Refer to the "X.25 Cause and Diagnostic Codes" appendix for an explanation of these codes.
|
(Network operational/ No additional information)
|
The standard explanations of the Cause and Diagnostic codes (cause/diag).
|
The following example shows a sequence of increasingly restrictive debug x25 commands:
X.25 packet debugging is on
X.25 special event debugging is on
Router# debug x25 interface serial 0
X.25 packet debugging is on
X.25 debug output restricted to interface Serial0
Router# debug x25 vc 1024
X.25 packet debugging is on
X.25 debug output restricted to VC number 1024
Router# debug x25 interface serial 0 vc 1024
X.25 packet debugging is on
X.25 debug output restricted to interface Serial0
X.25 debug output restricted to VC number 1024
Router# debug x25 interface serial 0 vc 1024 events
X.25 special event debugging is on
X.25 debug output restricted to interface serial 0
X.25 debug output restricted to VC number 1024
The following examples show the normal sequence of events for both the AO/DI client and server sides:
Client Side
PPP-X25: Virtual-Access1: Initiating AODI call request
PPP-X25: Bringing UP X.25 AODI VC
PPP-X25: AODI Client Call Confirm Event Received
PPP-X25: Cloning interface for AODI is Di1
PPP-X25: Queuing AODI Client Map Event
PPP-X25: Event:AODI Client Map
PPP-X25: Created interface Vi2 for AODI service
PPP-X25: Attaching primary link Vi2 to Di1
PPP-X25: Cloning Vi2 for AODI service using Di1
PPP-X25: Vi2: Setting the PPP call direction as OUT
PPP-X25: Vi2: Setting vectors for RFC1598 operation on BRI3/0:0 VC 0
PPP-X25: Vi2: Setting the interface default bandwidth to 10 Kbps
PPP-X25: Virtual-Access2: Initiating AODI call request
PPP-X25: Bringing UP X.25 AODI VC
PPP-X25: AODI Client Call Confirm Event Received
Server Side
PPP-X25: AODI Call Request Event Received
PPP-X25: Event:AODI Incoming Call Request
PPP-X25: Created interface Vi1 for AODI service
PPP-X25: Attaching primary link Vi1 to Di1
PPP-X25: Cloning Vi1 for AODI service using Di1
PPP-X25: Vi1: Setting vectors for RFC1598 operation on BRI3/0:0 VC 1
PPP-X25: Vi1: Setting the interface default bandwidth to 10 Kbps
PPP-X25: Binding X.25 VC 1 on BRI3/0:0 to Vi1
debug x25 events for X.25 CUGs
The following example of the debug x25 events command shows output related to the X.25 CUGs feature. It shows messages concerning a DCE rejecting a call because the selected network CUG had not been subscribed to by the caller.
00:48:33:Serial1:X.25 I R1 Call (14) 8 lci 1024
00:48:33: From (3):111 To (3):444
00:48:33: Closed User Group (basic):40
00:48:33: Call User Data (4):0x01000000 (pad)
00:48:33:X.25 Incoming Call packet, Closed User Group (CUG) protection, selected network
CUG not subscribed
00:48:33:Serial1:X.25 O R1 Clear (5) 8 lci 1024
00:48:33: Cause 11, Diag 65 (Access barred/Facility code not allowed)
debug x25 events for DNS-Based X.25 Routing
The following example of the debug x25 events command shows output related to the DNS-Based X.25 Routing feature. It shows messages concerning access of the DNS server. In the following example, nine alternate addresses for one XOT path are entered in the DNS server database. All nine addresses are returned to the host cache of the router by the DNS server. However, only six addresses will be used during the XOT switch attempt, because this is the limit that XOT allows.
00:18:25:Serial1:X.25 I R1 Call (11) 8 lci 1024
00:18:25: From (0): To (4):444
00:18:25: Call User Data (4):0x01000000 (pad)
00:18:25:X.25 host name sent for DNS lookup is "444"
00:18:26:%3-TRUNCATE_ALT_XOT_DNS_DEST:Truncating excess XOT addresses (3)
00:18:26:DNS got X.25 host mapping for "444" via network
00:18:32:[10.1.1.8 (pending)]:XOT open failed (Connection timed out; remote host not
responding)
00:18:38:[10.1.1.7 (pending)]:XOT open failed (Connection timed out; remote host not
responding)
00:18:44:[10.1.1.6 (pending)]:XOT open failed (Connection timed out; remote host not
responding)
00:18:50:[10.1.1.5 (pending)]:XOT open failed (Connection timed out; remote host not
responding)
00:18:56:[10.1.1.4 (pending)]:XOT open failed (Connection timed out; remote host not
responding)
00:20:04:[10.1.1.3,1998/10.1.1.3,11007]:XOT O P2 Call (17) 8 lci 1
00:20:04: From (0): To (4):444
00:20:04: Packet sizes:128 128
00:20:04: Window sizes:2 2
00:20:04: Call User Data (4):0x01000000 (pad)
00:20:04:[10.1.1.3,1998/10.1.1.3,11007]:XOT I P2 Call Confirm (11) 8 lci 1
00:20:04: From (0): To (0):
00:20:04: Packet sizes:128 128
00:20:04: Window sizes:2 2
00:20:04:Serial1:X.25 O R1 Call Confirm (5) 8 lci 1024
00:20:04: From (0): To (0):
Related Commands
Command
|
Description
|
debug ppp bap
|
Displays general BACP transactions.
|
debug ppp bap negotiation
|
Displays general BACP transactions, and successive steps in negotiations between peers.
|
debug ppp multilink
|
Displays information about important multilink events.
|
debug ppp multilink negotiation
|
Displays information about important multilink events and events affecting multilink groups controlled by BACP.
|
debug x25 annexg
To display information about Annex G (X.25 over Frame Relay) events, use the debug x25 annexg command. To disable debugging output, use the no form of this command.
debug x25 annexg
no debug x25 annexg
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.0 T
|
This command was introduced.
|
Usage Guidelines
It is generally recommended that the debug x25 annexg command be used only when specifically requested by Cisco TAC to obtain information about a problem with an Annex G configuration. The messages displayed by the debug x25 annexg command are meant to aid in the diagnosing of internal errors.
Caution 
The X.25 debug commands can generate large amounts of debugging output. If logging of debug output to the router console is enabled (the default condition), this output may fill the console buffer, preventing the router from processing packets until the contents of the console buffer have been printed.
Examples
The following example shows sample output for the debug x25 annexg command for a Frame Relay data-link connection identifier (DLCI) configured for Annex G operation:
Jul 31 05:23:20.316:annexg_process_events:DLCI 18 attached to interface Serial2/0:0 is
ACTIVE
Jul 31 05:23:20.316:annexg_ctxt_create:Creating X.25 context over Serial2/0:0 (DLCI:18
using X.25 profile:OMC), type 10, len 2, addr 00 12
Jul 31 05:23:20.316:annexg_create_lower_layer:Se2/0:0 DLCI 18, payload 1606, overhead 2
Jul 31 05:23:20.320:annexg_restart_tx:sending pak to Serial2/0:0
Jul 31 05:23:23.320:annexg_restart_tx:sending pak to Serial2/0:0
Table 238 describes significant fields shown in the display.
Table 238 debug x25 annexg Field Descriptions
Field
|
Description
|
payload
|
Amount of buffer space available per message before adding Frame Relay and device-specific headers.
|
overhead
|
The length of the Frame Relay header and any device-specific header that may be needed.
|
Related Commands
Command
|
Description
|
debug x25
|
Displays information about X.25 traffic.
|
debug x28
To monitor error information and X.28 connection activity, use the debug x28 privileged privileged EXEC command. The no form of this command disables debugging output.
debug x28
no debug x28
Syntax Description
This command has no arguments or keywords.
Examples
The following is sample output while the PAD initiates an X.28 outgoing call:
03:30:43: X.28 mode session started
03:30:43: X28 escape is exit
03:30:43: Speed for console & vty lines :9600
03:39:04: address ="123456", cud="[none]" 03:39:04: Setting X.3 Parameters for this
call...1:1 2:1 3:126 4:0 5:1 6:2 7:2 8:0 9:0 10:0 11:14 12:1 13:0 14:0 15:0 16:127 17:24
18:18 19:2 20:0 21:0 22:0
*03:40:51: Exiting X.28 mode
debug xcctsp all
To debug External Call Control TSP information, use the debug xcctsp all privileged EXEC command. To turn off debugging, use the no form of this command.
debug xcctsp all
no debug xcctsp all
Syntax Description
This command has no arguments or keywords.
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
12.0(7)T
|
Support for this command was extended to the Cisco uBR924 cable modem.
|
Examples
See the following examples to turn on and off external call control debugging:
AS5300-TGW# debug xcctsp all
External call control all debugging is on
AS5300-TGW# no debug xcct all
External call control all debugging is off
Related Commands
debug xcctsp error
To debug External Call Control TSP error information, use the debug xcctsp error privileged EXEC command. To turn off error debugging, use the no form of this command.
debug xcctsp error
no debug xcctsp error
Syntax Description
This command has no arguments or keywords.
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
12.0(7)T
|
Support for this command was extended to the Cisco uBR924 cable modem.
|
Examples
See the following examples to turn on and off error-level debugging:
AS5300-TGW# debug xcctsp error
External call control error debugging is on
AS5300-TGW# no debug xcctsp error
External call control error debugging is off
Related Commands
debug xcctsp session
To debug External Call Control TSP session information, use the debug xcctsp session privileged EXEC command. To turn off debugging, use the no form of this command.
debug xcctsp session
no debug xcctsp session
Syntax Description
This command has no arguments or keywords.
Command History
Release
|
Modification
|
12.0(5)T
|
This command was introduced.
|
12.0(7)T
|
Support for this command was extended to the Cisco uBR924 cable modem.
|
Examples
See the following examples to turn on and off session-level debugging:
AS5300-TGW# debug xcct session
External call control session debugging is on
AS5300-TGW# no debug xcct session
External call control session debugging is off
Related Commands
debug xns packet
To display information on XNS packet traffic, including the addresses for source, destination, and next hop router of each packet, use the debug xns packet privileged EXEC command. The no form of this command disables debugging output.
debug xns packet
no debug xns packet
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
To gain the fullest understanding of XNS routing activity, you should enable debug xns routing and debug xns packet together.
Examples
The following is sample output from the debug xns packet command:
XNS: src=5.0000.0c02.6d04, dst=5.ffff.ffff.ffff, packet sent
XNS: src=1.0000.0c00.440f, dst=1.ffff.ffff.ffff, rcvd. on Ethernet0
XNS: src=1.0000.0c00.440f, dst=1.ffff.ffff.ffff, local processing
Table 239 describes significant fields shown in the display.
Table 239 debug xns packet Field Descriptions
Field
|
Description
|
XNS:
|
Indicates that this is an XNS packet.
|
src = 5.0000.0c02.6d04
|
Indicates that the source address for this message is 0000.0c02.6d04 on network 5.
|
dst = 5.ffff.ffff.ffff
|
Indicates that the destination address for this message is the broadcast address ffff.ffff.ffff on network 5.
|
packet sent
|
Indicates that the packet to destination address 5.ffff.ffff.ffff has displayed using the debug xns packet command, was queued on the output interface.
|
rcvd. on Ethernet0
|
Indicates that the router just received this packet through the Ethernet0 interface.
|
local processing
|
Indicates that the router has examined the packet and determined that it must process it, rather than forwarding it.
|
debug xns routing
To display information on XNS routing transactions, use the debug xns routing privileged EXEC command. The no form of this command disables debugging output.
debug xns routing
no debug xns routing
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
To gain the fullest understanding of XNS routing activity, enable debug xns routing and debug xns packet together.
Examples
The following is sample output from the debug xns routing command:
Router# debug xns routing
XNSRIP: sending standard periodic update to 5.ffff.ffff.ffff via Ethernet2
XNSRIP: got standard update from 1.0000.0c00.440f socket 1 via Ethernet0
Table 240 describes significant fields shown in the display.
Table 240 debug xns routing Field Descriptions
Field
|
Description
|
XNSRIP:
|
This is an XNS routing packet.
|
sending standard periodic update
|
Router indicates that this is a periodic XNS routing information update.
|
to 5.ffff.ffff.ffff
|
Destination address is ffff.ffff.ffff on network 5.
|
via Ethernet2
|
Name of the output interface.
|
network 1, hop count 1
|
Network 1 is one hop away from this router.
|
got standard update from 1.0000.0c00.440f
|
Router indicates that it has received an XNS routing information update from address 0000.0c00.440f on network 1.
|
socket 1
|
The socket number is a well-known port for XNS. Possible values include
• 1—routing information
• 2—echo
• 3—router error
|