Monitoring Troubleshooting an OSPF Network

Previous Table of Contents Next


In the following example, you can see the OSPF Flooding protocol provides a plethora of information on its operation. The debug ip ospf flood command generates information about flooding, which includes sending/receiving update/acknowledgement packet. The Received and Sending line means that the router has received or sent a packet; the lines that follow give you detailed information about the content of that packet.

    OSPF_Router# debug ip ospf flood    OSPF flooding debugging is on    Feb 21 22:52:57.973: OSPF: received update from 56.82.197.2, Ethernet1    Feb 21 22:52:57.973: OSPF: Rcv Update Type 1, LSID 156.35.254.43, Adv    rtr 156.35.254.43, age 2, seq 0x80003162    Feb 21 22:52:57.973: OSPF: Sending update on Ethernet0 to 224.0.0.6    Feb 21 22:52:57.973: OSPF: Send Type 1, LSID 156.35.254.43, Adv rtr    156.35.254.43, age 3, seq 0x80003162    Feb 21 22:52:57.973: OSPF: received update from 56.82.197.2, Ethernet0    Feb 21 22:52:57.973: OSPF: Rcv Update Type 1, LSID 156.35.254.43, Adv    rtr 156.35.254.43, age 2, seq 0x80003162    Feb 21 22:52:57.973: OSPF: Received same lsa    Feb 21 22:52:57.973:       Remove LSA from retransmission list    Feb 21 22:52:57.973: OSPF: received update from 156.35.255.76, Ethernet1    Feb 21 22:52:57.973: OSPF: Rcv Update Type 1, LSID 156.35.254.43, Adv    rtr 156.35.254.43, age 3, seq 0x80003162    Feb 21 22:52:57.973: OSPF: Received same lsa    Feb 21 22:52:57.973:       Remove LSA from retransmission list    Feb 21 22:52:59.973: OSPF: Received ACK from 56.82.127.3    Feb 21 22:52:59.973: OSPF: Rcv Ack Type 1, LSID 156.35.254.43, Adv    rtr 156.35.254.43, age 2, seq 0x80003162    Feb 21 22:52:59.973:       Remove LSA from retransmission list    Feb 21 22:52:59.973: OSPF: Received ACK from 56.82.197.2    Feb 21 22:52:59.973: OSPF: Rcv Ack Type 1, LSID 156.35.254.43, Adv    rtr 156.35.254.43, age 3, seq 0x80003162    Feb 21 22:53:00.473: OSPF: Sending delayed ACK on Ethernet1    Feb 21 22:53:00.473: OSPF: Ack Type 1, LSID 156.35.254.43, Adv rtr    156.35.254.43, age 2, seq 0x80003162    Feb 21 22:54:21.143: OSPF: received update from 56.82.197.2, Ethernet1    Feb 21 22:54:21.143: OSPF: Rcv Update Type 1, LSID 156.35.254.41, Adv    rtr 156.35.254.41, age 2, seq 0x80003168    Feb 21 22:54:21.143: OSPF: Sending update on Ethernet0 to 224.0.0.6    Feb 21 22:54:21.143: OSPF: Send Type 1, LSID 156.35.254.41, Adv    rtr 156.35.254.41, age 3, seq 0x80003168    Feb 21 22:54:21.143: OSPF: received update from 56.82.197.2, Ethernet0    Feb 21 22:54:21.143: OSPF: Rcv Update Type 1, LSID 156.35.254.41, Adv    rtr 156.35.254.41, age 2, seq 0x80003168    Feb 21 22:54:21.143: OSPF: Received same lsa    Feb 21 22:54:21.143:       Remove LSA from retransmission list    Feb 21 22:54:23.139: OSPF: Received ACK from 156.35.255.76    Feb 21 22:54:23.139: OSPF: Rcv Ack Type 1, LSID 156.35.254.41, Adv rtr    156.35.254.41, age 2, seq 0x80003168    Feb 21 22:54:23.139:       Remove LSA from retransmission list    Feb 21 22:54:23.143: OSPF: Received ACK from 56.82.127.3    Feb 21 22:54:23.143: OSPF: Rcv Ack Type 1, LSID 156.35.254.41, Adv    rtr 156.35.254.41, age 2, seq 0x80003168    Feb 21 22:54:23.143:       Remove LSA from retransmission list    Feb 21 22:54:23.643: OSPF: Sending delayed ACK on Ethernet1    Feb 21 22:54:23.643: OSPF: Ack Type 1, LSID 156.35.254.41, Adv rtr    156.35.254.41, age 2, seq 0x80003168 

debug ip ospf lsa-generation Command

This debug command enables you to view the actions and events being generated by OSPF’s Flooding protocol. The no form of this command disables debugging output. The basic syntax for this command is as follows:

    [no] debug ip ospf lsa-generation ? 

This debug command allows several options to include access lists, as previously discussed:

    OSPF_Router# debug ip ospf lsa-generation ?      <1-199> Access list      <cr> 

In the following example, you can see the OSPF Flooding protocol providing a plethora of information on its operation and LSA generation.

    OSPF_Router# debug ip ospf lsa-generation    OSPF summary lsa generation debugging is on 

debug ip ospf packet Command

Use the debug ip ospf packet EXEC command to display information about each Open Shortest Path First (OSPF) packet received. The no form of this command disables debugging output. The basic syntax for this command is as follows:

    [no] debug ip ospf packet 

The debug ip ospf packet command produces one set of information for each packet received. The output varies slightly depending on which type of authentication is used. The following example shows the OSPF packet being seen by the router.

    OSPF_Router# debug ip ospf packet    Feb 21 22:59:43.442: OSPF: rcv. v:2 t:1 l:84 rid:156.83.197.2    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0    Feb 21 22:59:43.446: OSPF: rcv. v:2 t:1 l:68 rid:156.83.197.2    aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1    Feb 21 22:59:48.974: OSPF: rcv. v:2 t:1 l:84 rid:156.82.197.2    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0    Feb 21 22:59:50.138: OSPF: rcv. v:2 t:1 l:84 rid:156.82.127.3    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0    Feb 21 22:59:51.222: OSPF: rcv. v:2 t:1 l:68 rid:156.82.197.2    aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1    Feb 21 22:59:51.494: OSPF: rcv. v:2 t:1 l:68 rid:156.82.127.3    aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1    Feb 21 22:59:53.442: OSPF: rcv. v:2 t:1 l:84 rid:156.83.197.2    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0    Feb 21 22:59:53.446: OSPF: rcv. v:2 t:1 l:68 rid:156.83.197.2    aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1    Feb 21 22:59:58.974: OSPF: rcv. v:2 t:1 l:84 rid:156.82.197.2    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0    Feb 21 23:00:00.138: OSPF: rcv. v:2 t:1 l:84 rid:156.82.127.3    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0    Feb 21 23:00:01.222: OSPF: rcv. v:2 t:1 l:68 rid:156.82.197.2    aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1    Feb 21 23:00:01.494: OSPF: rcv. v:2 t:1 l:68 rid:156.82.127.3    aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1    Feb 21 23:00:03.442: OSPF: rcv. v:2 t:1 l:84 rid:156.83.197.2    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0    Feb 21 23:00:03.446: OSPF: rcv. v:2 t:1 l:68 rid:156.83.197.2    aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1    Feb 21 23:00:08.974: OSPF: rcv. v:2 t:1 l:84 rid:156.82.197.2    aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 

The example that follows shows sample debug ip ospf packet output when MD5 authentication is used.

    OSPF_Router# debug ip ospf packet    OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.116          aid:0.0.0.0 chk:0 aut:2 keyid:1 seq:0x0 


Previous Table of Contents Next




OSPF Network Design Solutions
OSPF Network Design Solutions
ISBN: 1578700469
EAN: 2147483647
Year: 1998
Pages: 200
Authors: Tom Thomas

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net