cc/td/doc/solution/vobbsols/vob1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Monitoring and Troubleshooting

Network Time Protocol (NTP)

Syslog

Global Syslog Configuration

Interface Syslog Configuration

Useful Syslog Commands

Quality of Service (QoS)

show class-map

show policy-map

show qos maps

show mls qos maps dscp-cos

show qos interface

show queueing interface

Multicast

show ip mroute

show ip mroute ssm

show ip mroute active

show ip pim neighbor

show ip igmp snooping

show ip igmp groups

show ip igmp ssm-mapping

show ip igmp membership

debug ip igmp

debug ip pim

debug domain

UDLR and Unidirectional Links

show interface tunnel

show interface

debug tunnel

References


Monitoring and Troubleshooting


This chapter provides an introduction to monitoring and troubleshooting the Cisco Ethernet switches in the Cisco Gibabit-Ethernet Optimized IPTV/Video over Broadband (GOVoBB) Solution, Release 1.0.

The following major topics are presented:

Network Time Protocol (NTP)

Syslog

Quality of Service (QoS)

Multicast

UDLR and Unidirectional Links

References

Network Time Protocol (NTP)

It is important to ensure that all devices in the network are accurately synchronized to the same time source. This allows network events to be correlated (for example, for accounting, event logging, fault analysis, security incident response, and network management). The Network Time Protocol (NTP), RFC 1305, synchronizes timekeeping among a set of distributed time servers and clients.


Note There are a number of ways to configure NTP, and describing NTP completely is beyond the scope of this document. A number of resources are available on Cisco.com and the Internet regarding NTP configuration.


At a minimum, the Cisco switches should be configured as NTP clients for a reliable time source, by means of the following commands:

clock timezone PST -8
clock summer-time PDT recurring 1 Sun Apr 3:00 last Sun Oct 3:00

clock calendar-valid
ntp server <NTP server IP address>
ntp update-calendar

Syslog

Cisco IOS Software has the capability to do UNIX system logging (syslog) to a UNIX syslog server. The Cisco UNIX syslog format is compatible with 4.3 Berkeley Standard Distribution (BSD) UNIX. System logging is useful for monitoring interface status, security alerts, environmental conditions, CPU processes, and many other events on the router can be captured and analyzed by means of UNIX syslog. Management platforms such as Cisco Resource Manager Essentials (RME) and Network Analysis Toolkit (NATKit) make powerful use of syslog information to collect inventory and configuration changes.

The following is a summary and description of the recommended IOS configuration for syslog.

Global Syslog Configuration

Configure the following in global configuration mode:

no logging console
no logging monitor
logging buffered 16384
logging trap notifications
logging facility local7
logging host-ip
logging source-interface loopback 0
service timestamps debug datetime localtime show-timezone msec
service timestamps log datetime localtime show-timezone msec

Interface Syslog Configuration

Configure the following in interface configuration mode on interfaces of interest:

logging event link-status
logging event bundle-status

Useful Syslog Commands

The following syslog commands are particularly useful:

no logging console

no logging monitor

logging buffered 16384

logging trap notifications

logging facility local7

logging host

logging source-interface loopback 0

service timestamps debug datetime localtime show-timezone msec

logging event

no logging console

By default, all system messages are sent to the system console. Console logging is a high-priority task in Cisco IOS Software. This function was primarily designed to generate error messages to the system operator prior to a system failure. It is recommended that console logging be disabled in all device configurations to avoid a situation where the router/switch might hang while waiting for a response from a terminal. Console messages can, however, be useful during trouble isolation. In these instances, console logging should be enabled by means of the logging console level command, to obtain the desired level of message logging. Logging levels range from 0 to 7.

no logging monitor

This command disables logging for terminal lines other than the system console. If monitor logging is required (by means of logging monitor debugging or another command option), it should be enabled at the specific logging level required for the activity (see above).

logging buffered 16384

The logging buffered command should be added to log system messages in the internal log buffer. The logging buffer is circular. Once the logging buffer is filled, older entries are overwritten by newer entries. The size of the logging buffer is user-configurable and is specified in bytes. The size of the system buffer varies by platform. 16384 is a good default and should provide adequate logging in most cases.

logging trap notifications

This command provides notification (level 5) messaging to the specified syslog server. The default logging level for all devices (console, monitor, buffer, and traps) is debugging (level 7). Leaving the trap logging level at 7 produces many extraneous messages that are of little or no concern to the health of the network. It is recommended that the default logging level for traps be set to 5.

logging facility local7

This command sets the default logging facility/level for UNIX system logging. The syslog server receiving these messages should be configured for the same facility/level.

logging host

This command sets the IP address of the UNIX syslog server.

logging source-interface loopback 0

This command sets the default IP source address for the syslog messages. Hard coding the logging source address makes it easier to identify the host that sent the message.

service timestamps debug datetime localtime show-timezone msec

By default, log messages are not time stamped. Use this command to enable the time stamping of log messages and configure the time stamping of system debug messages. Time stamping enhances real-time debugging by providing the relative timing of logged events. This information is especially useful when customers send debugging output to technical support personnel for assistance. To enable the time stamping of system debug messages, use the above command in global configuration mode. This only has an affect when debugging is enabled.

logging event

The logging event link-status command enables logging related to link status. The logging event bundle-status command enables logging related to bundle status.

Quality of Service (QoS)

The following commands are useful in troubleshooting QoS:

show class-map

show policy-map

show qos maps

show mls qos maps dscp-cos

show qos interface

show queueing interface

show class-map

To verify the class map for QoS classification, use the show class-map command.

DER# show class-map

Class Map match-all class_VoIP (id 1)
Match access-group name acl_VoIP

Class Map match-any class-default (id 0)
Match any

Class Map match-all class_video_VoD_high (id 2)
Match access-group name acl_video_VoD_high

Class Map match-all class_video_VoD_low (id 3)
Match access-group name acl_video_VoD_low

Class Map match-all class_video_broadcast (id 4)
Match access-group name acl_video_broadcast

Class Map match-all class_VoD_signaling (id 5)
Match access-group name acl_VoD_signaling

Class Map match-all class_HSD (id 6)
Match access-group name acl_HSD

show policy-map

To verify the policy map for QoS marking, use the show policy-map command.

DER# show policy-map

Policy Map setDSCP
Description: Mark DSCP values for ingress traffic
Class class_VoIP
set dscp ef
Class class_HSD
set dscp default
Class class_VoD_signaling
set dscp cs3
Class class_video_broadcast
set dscp af41
Class class_video_VoD_high
set dscp af42
Class class_video_VoD_low
set dscp af43

show qos maps

On Cisco Catalyst 4500 and Cisco Catalyst 4948-10GE switches, use the show qos maps command to verify the DSCP-to-TxQueue and DSCP-to-CoS mappings.

AR2# show qos maps

DSCP-TxQueue Mapping Table (dscp = d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
-------------------------------------
0 : 01 01 01 01 01 01 01 01 01 01
1 : 01 01 01 01 01 01 02 02 02 02
2 : 02 02 02 02 02 02 02 02 02 02
3 : 02 02 03 03 03 03 03 03 03 03
4 : 03 03 03 03 03 03 03 03 04 04
5 : 04 04 04 04 04 04 04 04 04 04
6 : 04 04 04 04

<omitted DSCP policing table>

DSCP-CoS Mapping Table (dscp = d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
-------------------------------------
0 : 00 00 00 00 00 00 00 00 01 01
1 : 01 01 01 01 01 01 02 02 02 02
2 : 02 02 02 02 03 03 03 03 03 03
3 : 03 03 04 04 04 04 02 04 01 04
4 : 05 05 05 05 05 05 05 05 06 06
5 : 06 06 06 06 06 06 07 07 07 07
6 : 07 07 07 07

<omitted CoS to DSCP mapping table>

show mls qos maps dscp-cos

On the Cisco Catalyst 6500 and Cisco 7600 switches, use the show mls qos maps dscp-cos command to verify the DSCP-to-CoS mappings.

DER# show mls qos maps dscp-cos

Dscp-cos map: (dscp= d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
-------------------------------------
0 : 00 00 00 00 00 00 00 00 01 01
1 : 01 01 01 01 01 01 02 02 02 02
2 : 02 02 02 02 03 03 03 03 03 03
3 : 03 03 04 04 04 04 02 04 01 04
4 : 05 05 05 05 05 05 05 05 06 06
5 : 06 06 06 06 06 06 07 07 07 07
6 : 07 07 07 07

show qos interface

On the Cisco Catalyst 4500 and Cisco Catalyst 4948-10GE switches, use the show qos interface type slot/module to verify the QoS state, port trust state, queue bandwidth, priority queue, and queue size.

AR2# show qos interface tenGigabitEthernet 1/1

QoS is enabled globally
Port QoS is enabled
Administrative Port Trust State: 'dscp'
Operational Port Trust State: 'dscp'
Trust device: none
Default DSCP: 0 Default CoS: 0
Appliance trust: none
Tx-Queue Bandwidth ShapeRate Priority QueueSize
(bps) (bps) (packets)
1 1900000000 disabled N/A 2080
2 8000000000 disabled N/A 2080
3 2500000000 disabled high 2080
4 100000000 disabled N/A 2080

show queueing interface

On the Cisco Catalyst 6500 and Cisco 7600 switches, use the show queueing interface type slot/module command to verify the queueing strategy, priority queue, WRR bandwidths, queue sizes, thresholds, CoS-to-queue mappings, and queue drops.

DER# show queueing interface tenGigabitEthernet 7/1

Interface TenGigabitEthernet7/1 queueing strategy: Weighted Round-Robin
Port QoS is enabled
Trust state: trust DSCP
Extend trust state: not trusted [COS = 0]
Default COS is 0
Queueing Mode In Tx direction: mode-cos
Transmit queues [type = 1p7q8t]:
Queue Id Scheduling Num of thresholds
-----------------------------------------
01 WRR 08
02 WRR 08
03 WRR 08
04 WRR 08
05 WRR 08
06 WRR 08
07 WRR 08
08 Priority 01

WRR bandwidth ratios: 64[queue 1] 255[queue 2] 0[queue 3] 0[queue 4] 0[queue 5] 0[queu
e 6] 0[queue 7]
queue-limit ratios: 40[queue 1] 50[queue 2] 0[queue 3] 0[queue 4] 0[queue 5] 0[queu
e 6] 0[queue 7]

queue tail-drop-thresholds
--------------------------
1 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
2 45[1] 85[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
3 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
4 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
5 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
6 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
7 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]

queue random-detect-min-thresholds
----------------------------------
1 75[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
2 40[1] 70[2] 70[3] 70[4] 70[5] 70[6] 70[7] 70[8]
3 70[1] 70[2] 70[3] 70[4] 70[5] 70[6] 70[7] 70[8]
4 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
5 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
6 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
7 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]

queue random-detect-max-thresholds
----------------------------------
1 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
2 70[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
3 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
4 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
5 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
6 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
7 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]

WRED disabled queues: 2 4 5 6 7

queue thresh cos-map
---------------------------------------
1 1 0
1 2
1 3
1 4
1 5
1 6
1 7
1 8
2 1 1
2 2 2
2 3 3 4 6 7
2 4
2 5
2 6
2 7
2 8
3 1
3 2
3 3
3 4
3 5
3 6
3 7
3 8
4 1
4 2
4 3
4 4
4 5
4 6
4 7
4 8
5 1
5 2
5 3
5 4
5 5
5 6
5 7
5 8
6 1
6 2
6 3
6 4
6 5
6 6
6 7
6 8
7 1
7 2
7 3
7 4
7 5
7 6
7 7
7 8
8 1 5

Queueing Mode In Rx direction: mode-cos
Receive queues [type = 8q8t]:
Queue Id Scheduling Num of thresholds
-----------------------------------------
01 WRR 08
02 WRR 08
03 WRR 08
04 WRR 08
05 WRR 08
06 WRR 08
07 WRR 08
08 WRR 08

WRR bandwidth ratios: 100[queue 1] 0[queue 2] 0[queue 3] 0[queue 4] 0[queue 5] 0[queu
e 6] 0[queue 7] 0[queue 8]
queue-limit ratios: 100[queue 1] 0[queue 2] 0[queue 3] 0[queue 4] 0[queue 5] 0[queu
e 6] 0[queue 7] 0[queue 8]

queue tail-drop-thresholds
--------------------------
1 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
2 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
3 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
4 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
5 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
6 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
7 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
8 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]

queue random-detect-min-thresholds
----------------------------------
1 40[1] 40[2] 50[3] 50[4] 50[5] 50[6] 50[7] 50[8]
2 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
3 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
4 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
5 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
6 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
7 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
8 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]

queue random-detect-max-thresholds
----------------------------------
1 70[1] 80[2] 90[3] 100[4] 100[5] 100[6] 100[7] 100[8]
2 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
3 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
4 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
5 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
6 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
7 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]
8 100[1] 100[2] 100[3] 100[4] 100[5] 100[6] 100[7] 100[8]

WRED disabled queues: 1 2 3 4 5 6 7 8

queue thresh cos-map
---------------------------------------
1 1 0 1 2 3 4 5 6 7
1 2
1 3
1 4
1 5
1 6
1 7
1 8
2 1
2 2
2 3
2 4
2 5
2 6
2 7
2 8
3 1
3 2
3 3
3 4
3 5
3 6
3 7
3 8
4 1
4 2
4 3
4 4
4 5
4 6
4 7
4 8
5 1
5 2
5 3
5 4
5 5
5 6
5 7
5 8
6 1
6 2
6 3
6 4
6 5
6 6
6 7
6 8
7 1
7 2
7 3
7 4
7 5
7 6
7 7
7 8
8 1
8 2
8 3
8 4
8 5
8 6
8 7
8 8


Packets dropped on Transmit:

queue dropped [cos-map]
---------------------------------------------
1 0 [0 ]
2 0 [1 2 3 4 6 7 ]
3 0 []
4 0 []
5 0 []
6 0 []
7 0 []
8 0 [5 ]

Packets dropped on Receive:

queue dropped [cos-map]
---------------------------------------------
1 0 [0 1 2 3 4 5 6 7 ]
2 0 []
3 0 []
4 0 []
5 0 []
6 0 []
7 0 []
8 0 []

Multicast

The following commands are useful in troubleshooting multicast:

show ip mroute

show ip mroute ssm

show ip mroute active

show ip pim neighbor

show ip igmp snooping

show ip igmp groups

show ip igmp ssm-mapping

show ip igmp membership

debug ip igmp

debug ip pim

debug domain

show ip mroute

To see the details of the multicast routing table, use the show ip mroute command. The output of this command also shows the legend for the flags.

AR3# show ip mroute

IP Multicast Routing Table

Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,

L - Local, P - Pruned, R - RP-bit set, F - Register flag,

T - SPT-bit set, J - Join SPT, M - MSDP created entry,

X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,

U - URD, I - Received Source Specific Host Report, Z - Multicast Tunnel

Y - Joined MDT-data group, y - Sending to MDT-data group

Outgoing interface flags: H - Hardware switched, A - Assert winner

Timers: Uptime/Expires

Interface state: Interface, Next-Hop or VCD, State/Mode

(192.168.70.101, 232.1.5.220), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

Vlan130, Forward/Sparse, 1w1d/00:01:46, H

(192.168.70.101, 232.1.5.221), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

Vlan130, Forward/Sparse, 1w1d/00:01:46, H

(192.168.70.101, 232.1.5.222), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

Vlan130, Forward/Sparse, 1w1d/00:01:46, H

(192.168.70.101, 232.1.5.223), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

show ip mroute ssm

To verify the source-specific multicast (SSM) mapping of multicast groups to multicast sources, use the show ip mroute ssm command. With this command, you can also verify the path of the multicast ingress and egress interface(s).


Tip To see the legend for the flags field, you must use the show ip mroute command.


AR2# show ip mroute ssm

(192.168.70.101, 232.1.5.220), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

Vlan130, Forward/Sparse, 1w1d/00:01:40, H

(192.168.70.101, 232.1.5.221), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

Vlan130, Forward/Sparse, 1w1d/00:01:40, H

(192.168.70.101, 232.1.5.222), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

Vlan130, Forward/Sparse, 1w1d/00:01:40, H

(192.168.70.101, 232.1.5.223), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

Vlan130, Forward/Sparse, 1w1d/00:01:40, H

(192.168.70.101, 232.1.5.216), 1w4d/stopped, flags: sTI

Incoming interface: Null, RPF nbr 0.0.0.0

Outgoing interface list:

show ip mroute active

To verify the bitrate of a multicast group, use the show ip mroute active command.

AR2# show ip mroute active

Active IP Multicast Sources - sending >= 4 kbps

Group: 232.255.0.1, (?)
Source: 192.168.71.105 (1.0.255.232.coronado.net)
Rate: 334 pps/3517 kbps(1sec), 2829 kbps(last 30 secs), 2703 kbps(life avg)

<rest of the output omitted>

show ip pim neighbor

To verify the protocol-independent multicast (PIM) neighbors, use the show ip pim neighbor command.

AR2# show ip pim neighbor

PIM Neighbor Table
Neighbor Interface Uptime/Expires Ver DR
Address Prio/Mode
192.168.254.9 Vlan908 1d16h/00:01:34 v2 1 / S
192.168.254.18 Vlan916 1d16h/00:01:24 v2 1 / DR S

show ip igmp snooping

To verify IGMP snooping on the switch and interfaces, use the show ip igmp snooping command.

AR2# show ip igmp snooping

Global IGMP Snooping configuration:
-----------------------------------
IGMP snooping : Enabled
IGMPv3 snooping : Enabled
Report suppression : Enabled
TCN solicit query : Disabled
TCN flood query count : 2

Vlan 1:
--------
IGMP snooping : Enabled
IGMPv2 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
CGMP interoperability mode : IGMP_ONLY

Vlan 70:
--------
IGMP snooping : Enabled
IGMPv2 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
CGMP interoperability mode : IGMP_ONLY

<rest of output omitted>

show ip igmp groups

To verify IGMP group membership on a switch, use the show ip igmp groups command.

AR2# show ip igmp groups

IGMP Connected Group Membership
Group Address Interface Uptime Expires Last Reporter
232.255.0.1 Vlan120 1d17h stopped 0.0.0.0
232.255.0.2 Vlan120 1d17h stopped 0.0.0.0
232.255.0.3 Vlan120 1d17h stopped 0.0.0.0
232.255.0.5 Vlan120 1d17h stopped 0.0.0.0
232.255.0.12 Vlan120 1d17h stopped 0.0.0.0
224.0.1.40 Vlan120 1d16h 00:02:56 192.168.120.1

show ip igmp ssm-mapping

To verify the SSM mapping configuration on the switch, use the show ip igmp ssm-mapping command.

AR3# show ip igmp ssm-mapping

SSM Mapping : Enabled
DNS Lookup : Enabled
Mcast domain : coronado.net
Name servers : 192.168.11.101

show ip igmp membership

Another command to verify IGMP group membership, which provides some additional information compared to the previous command, is the show ip igmp membership command.

AR2# show ip igmp membership

Flags: A - aggregate, T - tracked
L - Local, S - static, V - virtual, R - Reported through v3
I - v3lite, U - Urd, M - SSM (S,G) channel
1,2,3 - The version of IGMP, the group is in
Channel/Group-Flags:
/ - Filtering entry (Exclude mode (S,G), Include mode (G))
Reporter:
<mac-or-ip-address> - last reporter if group is not explicitly tracked
<n>/<m> - <n> reporter in include mode, <m> reporter in exclude

Channel/Group Reporter Uptime Exp. Flags Interface
/*,232.255.0.1 0.0.0.0 1d17h stop 2MA Vl120
192.168.71.105,232.255.0.1 1d17h stop SA Vl120
/*,232.255.0.2 0.0.0.0 1d17h stop 2MA Vl120
192.168.71.105,232.255.0.2 1d17h stop SA Vl120
/*,232.255.0.3 0.0.0.0 1d17h stop 2MA Vl120
192.168.71.105,232.255.0.3 1d17h stop SA Vl120
/*,232.255.0.5 0.0.0.0 1d17h stop 2MA Vl120
192.168.71.105,232.255.0.5 1d17h stop SA Vl120
/*,232.255.0.12 0.0.0.0 1d17h stop 2MA Vl120
192.168.71.105,232.255.0.12 1d17h stop SA Vl120
*,224.0.1.40 192.168.120.1 1d16h 02:22 2LA Vl120

debug ip igmp

To troubleshoot IGMP issues, use the debug ip igmp command. The debug output indicates IGMP membership queries, membership responses, and the conversion of IGMPv2 to IGMPv3 through DNS lookup.

AR2# debug ip igmp

IGMP debugging is on
AR2#
*Aug 8 14:20:53.039: IGMP(0): Received v2 Query on Vlan908 from 192.168.254.9
AR2#
*Aug 8 14:21:16.880: IGMP(0): Send v2 general Query on Vlan120
*Aug 8 14:21:16.880: IGMP(0): Set report delay time to 8.4 seconds for 224.0.1.40 on Vlan120
*Aug 8 14:21:16.880: IGMP(0): Send v2 general Query on Vlan916
AR2#
*Aug 8 14:21:25.881: IGMP(0): Send v2 Report for 224.0.1.40 on Vlan120
*Aug 8 14:21:25.881: IGMP(0): Received v2 Report on Vlan120 from 192.168.120.1 for 224.0.1.40
*Aug 8 14:21:25.881: IGMP(0): Received Group record for group 224.0.1.40, mode 2 from 192.168.120.1
for 0 sources
*Aug 8 14:21:25.881: IGMP(0): Updating EXCLUDE group timer for 224.0.1.40
*Aug 8 14:21:25.881: IGMP(0): MRT Add/Update Vlan120 for (*,224.0.1.40) by 0
AR2#
*Aug 8 14:21:39.089: IGMP(0): Convert IGMPv2 static (*, 232.255.0.1) to IGMPv3 with 1 source(s) using DNS
*Aug 8 14:21:39.089: IGMP(0): Convert IGMPv2 static (*, 232.255.0.2) to IGMPv3 with 1 source(s) using DNS
*Aug 8 14:21:39.089: IGMP(0): Convert IGMPv2 static (*, 232.255.0.3) to IGMPv3 with 1 source(s) using DNS
*Aug 8 14:21:39.089: IGMP(0): Convert IGMPv2 static (*, 232.255.0.5) to IGMPv3 with 1 source(s) using DNS
*Aug 8 14:21:39.089: IGMP(0): Convert IGMPv2 static (*, 232.255.0.12) to IGMPv3 with 1 source(s) using DNS

debug ip pim

To troubleshoot PIM issues, use the debug ip pim command. The output indicates join and prune messages for PIM.

AR2# debug ip pim

PIM debugging is on
AR2#
*Aug 8 14:23:04.149: PIM(0): Building Periodic Join/Prune message for 232.255.0.1
*Aug 8 14:23:04.149: PIM(0): Insert (192.168.71.105,232.255.0.1) join in nbr 192.168.254.18's queue
*Aug 8 14:23:04.149: PIM(0): Building Join/Prune packet for nbr 192.168.254.18
*Aug 8 14:23:04.149: PIM(0): Adding v2 (192.168.71.105/32, 232.255.0.1), S-bit Join
*Aug 8 14:23:04.149: PIM(0): Send v2 join/prune to 192.168.254.18 (Vlan916)

debug domain

To troubleshoot domain name server (DNS) lookup issues, use the debug domain command.

AR2# debug domain

Aug 8 21:28:34.274: Domain: query for 1.0.255.232.coronado.net type 1 to 192.168.11.101
Aug 8 21:28:34.274: DOM: dom2cache: hostname is 1.0.255.232.coronado.net, RR type=1, class=1, ttl=43200, n=4
Reply received ok

UDLR and Unidirectional Links

The following commands are useful in troubleshooting unidirectional link routing (UDLR) and unidirectional links:

show interface tunnel

show interface

debug tunnel

show interface tunnel

To verify the tunnel for a unidirectional link, use the show interface tunnel command. From the output, you can verify the state of the tunnel (up), the encapsulation (GRE), the tunnel source and destination, the associated unidirectional link, and the number of packets through the tunnel.

AR1# show interfaces tunnel 0

Tunnel0 is up, line protocol is up
Hardware is Tunnel
Description: Tx-side of Rx-only Gig3/3
MTU 1514 bytes, BW 9 Kbit, DLY 500000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation TUNNEL, loopback not set
Keepalive not set
Tunnel source 10.10.10.2, destination 10.10.10.1, fastswitch TTL 255
Tunnel is send-only UDLR tunnel for receive-only interface GigabitEthernet3/3
Tunnel protocol/transport GRE/IP, key disabled, sequencing disabled
Tunnel TTL 255
Checksumming of packets disabled, fast tunneling enabled
Last input never, output 00:00:00, output hang never
Last clearing of "show interface" counters 1w0d
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/0 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicast)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
681125 packets output, 71116160 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 output buffer failures, 0 output buffers swapped out

show interface

To verify a unidirectional link, use the show interface type slot/module command. From the output, you can verify the state of the interface (up at Layer 1 and Layer 2), the bitrate, output drops, and errors.

AR1# show interfaces gigabitEthernet 3/3

GigabitEthernet3/3 is up, line protocol is up (connected)
Hardware is Gigabit Ethernet Port, address is 000c.850e.80bf (bia 000c.850e.80bf)
Description: Transport to/from L3VPN-PE (Gig7/3)
Internet address is 192.168.253.2/30
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Carrier delay is 0 msec
Transmit interface is Tunnel0
Full-duplex, 1000Mb/s, link type is force-up, media type is 1000BaseSX
input flow-control is on, output flow-control is off
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output never, output hang never
Last clearing of "show interface" counters 1w0d
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
30 second input rate 1000 bits/sec, 1 packets/sec
30 second output rate 0 bits/sec, 0 packets/sec
L3 in Switched: ucast: 34536 pkt, 2869265 bytes - mcast: 0 pkt, 0 bytes
L3 out Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes
729329 packets input, 75599071 bytes, 0 no buffer
Received 694750 broadcasts (0 IP multicast)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 input packets with dribble condition detected
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out

debug tunnel

To troubleshoot the GRE tunnel for UDLR, use the debug tunnel command. From the output, you can see packets encapsulated in GRE and sent from a source loopback interface to a destination loopback interface.

AR1# debug tunnel

Tunnel Interface debugging is on
AR1#
Aug 8 15:09:26.770: Tunnel8: GRE/IP encapsulated 10.10.10.10->10.10.10.9 (linktype=7, len=104)
Aug 8 15:09:26.770: Tunnel12: GRE/IP encapsulated 10.10.10.14->10.10.10.13 (linktype=7, len=104)
Aug 8 15:09:26.770: Tunnel16: GRE/IP encapsulated 10.10.10.18->10.10.10.17 (linktype=7, len=104)
Aug 8 15:09:26.946: Tunnel4: GRE/IP encapsulated 10.10.10.6->10.10.10.5 (linktype=7, len=104)
Aug 8 15:09:26.946: Tunnel20: GRE/IP encapsulated 10.10.10.22->10.10.10.21 (linktype=7, len=104)
Aug 8 15:09:27.022: Tunnel28: GRE/IP to classify 10.10.10.30->10.10.10.29 (len=104 ttl=254 tos=0xC0)

References

The following documents provide practical tips on configuring the switches used in the solution.

Best Practices for Catalyst 6500/6000 Series and Catalyst 4500/4000 Series Switches Running Cisco IOS Software, at the following URL:

http://www.cisco.com/en/US/partner/products/hw/switches/ps700/products_white_paper09186a00801b49a4.shtml#cg24

Cisco ISP Essentials: Essential IOS Features Every ISP Should Consider, by Barry Green and Philip Smith, at the following URL:

http://wwwin-cons.cisco.com/~philsmit/isp/workshop/afnog2004/inet2000/adv-bgp/iosess29.pdf


Note A Cisco Connection Online (CCO) password may be required to access these documents.




hometocprevnextglossaryfeedbacksearchhelp

Posted: Wed Sep 20 08:55:56 PDT 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.