debug ip ospf adjacency Command The debug ip ospf adjacency command will report to you the various events occurring in relation to the various adjacencies within OSPF. The following example shows that the router detected OSPF adjacency problems on the network to which it is connected. The no form of this command disables debugging output. OSPF_Router#debug ip ospf adj OSPF adjacency events debugging is on Feb 21 22:48:46.227: OSPF: Rcv pkt from 156.35.254.45, Ethernet1, area 0.0.0.0 : src not on the same network Feb 21 22:48:56.227: OSPF: Rcv pkt from 156.35.254.45, Ethernet1, area 0.0.0.0 : src not on the same network Feb 21 22:49:06.227: OSPF: Rcv pkt from 156.35.254.45, Ethernet1, area 0.0.0.0 : src not on the same network Feb 21 22:49:16.228: OSPF: Rcv pkt from 156.35.254.45, Ethernet1, area 0.0.0.0 : src not on the same network Feb 21 22:49:26.228: OSPF: Rcv pkt from 156.35.254.45, Ethernet1, area 0.0.0.0 : src not on the same network Feb 21 22:49:36.228: OSPF: Rcv pkt from 156.35.254.45, Ethernet1, area 0.0.0.0 : src not on the same network Feb 21 22:49:46.228: OSPF: Rcv pkt from 156.35.254.45, Ethernet1, area 0.0.0.0 : src not on the same network The debug message can be interpreted as follows:
debug ip ospf events Command Use the debug ip ospf events EXEC command to display information on Open Shortest Path First (OSPF)-related events, such as adjacencies, flooding information, designated router selection, and shortest path first (SPF) calculation, and so forth. The no form of this command disables debugging output. The basic syntax for this command is as follows: [no] debug ip ospf events The following is example output generated by the debug ip ospf events command: OSPF_router# debug ip ospf events OSPF:hello with invalid timers on interface Ethernet0 hello interval received 10 configured 10 net mask received 255.255.255.0 configured 255.255.255.0 dead interval received 40 configured 30 The example debug ip ospf events output might appear if any of the following occurs:
If a router configured for OSPF routing is not seeing an OSPF neighbor on an attached network, do the following:
debug ip ospf flood Command This debug command enables you to view the actions and events being generated by OSPFs Flooding protocol. The no form of this command disables debugging output. The basic syntax for this command is as follows: [no] debug ip ospf flood This debug command allows for several options to include access lists: OSPF_Router# debug ip ospf flood ? <1-99> Access list <cr> Access list is used to match the LSA ID and only LSA which LSA ID is permitted by the access-list will be displayed. It is used to reduce the debug message generated and make it more useful. For example, if you suspect that the flooding of external LSA is not working, then choose one or two external LSA and use the access list to filter it out with the debug to watch the exact operation of flooding on those LSA.
|