D

  debug buffer  

Platform: IOS based
Where: General
Info : Provides additional buffer debugging.

  debug buffer failure  

Platform: IOS based
Where: General
Info: Buffer allocation failures debugging.

  debug crypto isakmp detail  

Platform: IOS based
Where: General
Info: Crypto ISAKMP internals debugging.

Here's an example ( shortened ) output during ISAKMP SA establishment:

 6w3d: ISAKMP cookie gen for src 62.245.147.66 dst 195.244.119.2      6w3d: ISAKMP cookie B5FCAD89 B2BD7BFF      6w3d: ISAKMP: find_me a=(src 62.245.147.66 dst 195.244.119.2 state 0, init 1)            b=(src 0.0.0.0 dst 0.0.0.0 state 0, init 0)      6w3d: my_cookie a B5FCAD89 9BEC22F8      6w3d: my_cookie b B5FCAD89 B2BD7BFF      6w3d: his_cookie a DB28B716 6D61AE4F      6w3d: his_cookie b 00000000 00000000 
  debug crypto isakmp packet  

Platform: IOS based
Where: General
Info: Crypto ISAKMP packet debugging.

Here's an example (shortened) output during ISAKMP SA establishment:

 6w3d: -Traceback= 80A36FE0 80A3A5C0 80A3D41C 809F0880 809F8A34                    809F301C 809F33DC 809F5228 801710CC      6w3d: -Traceback= 80A36FE0 80A3A5C0 80A3D41C 809F8494 809F87C0                    809F8C20 809F301C 809F33DC 809F5228 801710CC      6w3d: ISAKMP: Main Mode packet contents (flags 0, len 72):      6w3d:            SA payload      6w3d:              PROPOSAL      6w3d:                TRANSFORM      6w3d: ISAKMP (0:1): sending packet to 195.244.119.2 (I) MM_NO_STATE      6w3d: ISAKMP (0:1): received packet from 195.244.119.2 (I) MM_NO_STATE      6w3d: ISAKMP: Main Mode packet contents (flags 0, len 72):      6w3d:            SA payload      6w3d:              PROPOSAL      6w3d:                TRANSFORM      6w3d: -Traceback= 80A36FE0 80A3A5C0 80A3D41C 809FF460 80A00E0C                    80A01070 809FBEBC 809F99B8 809F468C 809F51C8 801710CC 
  debug dialer detailed  

Platform: IOS based
Where: General
Info: Displays information about dial-on-demand detailed messages.

  debug dialer holdq  

Platform: IOS 11.2(12)
Where: General
Info: Activates debugging output for dialer hold queue events.

 Jan 13 14:56:03.240: Se0/1:15 DDR: Creating holdq 626B1B9C      Jan 13 14:56:03.240: DDR: Assigning holdq 626B1B9C to 627923F8      Jan 13 14:56:09.208: DDR: Assigning holdq 626B1B9C to 61B667F4      Jan 13 14:56:09.208: DDR: freeing dialer holdq 626B1B9C (Ref ptr 61B667F4)      Jan 13 14:56:09.208: DDR: Dialing failed, 0 packets unqueued and discarded      Jan 13 14:56:09.208: : 2 packets unqueued and discarded 
  debug eigrp neighbor [ sia-timer ]  

Platform: IOS based
Where: General
Info: Prints debug information about the operation of the Stuck In Active (SIA) timers. Generally not very useful (unless you are testing the timers).

  debug eigrp transmit [ sia ]  

Platform: IOS based
Where: General
Info: Prints debug information about SIA packets being sent. Most of the information found in this debug is part of the event log.

  debug eigrp sia { fast  reply [addr]  query [addr]  siareply [addr]  siaquery [addr] }  

Platform: IOS based
Where: General
Info: This command has been left in to assist testing with creating SIA events and will cause SIA events. The fast SIA timer will fire in 1ms on next route to go active query. The next query, reply next reply, siaquery next reply , and siareply next reply from peers will be ignored.

  debug ip ospf monitor  

Platform: IOS based
Where: General
Info: Debug command that shows OPSF database sync.

 2611b#debug ip ospf monitor      OSPF spf monitoring debugging is on      2w3d: OSPF: Syncing Routing table with OSPF Database -Traceback= 6064B628 603B6D2C        603B6D18      2w3d: OSPF: Completed Syncing and runtime is 4 msec -Traceback= 6064B65C 603B6D2C        603B6D18      2w3d: OSPF: Start redist-scanning -Traceback= 6064AC20 6062B430 603B6D2C 603B6D18      2w3d: OSPF: Scan for both redistribution and translation -Traceback= 6064AC60       6062B430 603B6D2C 603B6D18      2w3d: OSPF: End scanning, Elapsed time 0ms -Traceback= 6064B13C 6062B430 603B6D2C        603B6D18      2w3d: OSPF: Syncing Routing table with OSPF Database -Traceback= 6064B628 603B6D2C        603B6D18 
  debug ip packet ... dump  

Platform: IOS based
Where: General
Info: Outputs a hex and ASCII dump of the packet's contents.

  debug isdn code  

Platform: IOS based
Where: General
Info: Shows detailed ISDN debugging.

 gw-globalnet.it#debug isdn code      ISDN detailed info debugging is on 
  debug isdn q931 l3  

Platform: IOS 12.0(13)
Where: General
Info: Shows additional information on ISDNthat is, the corresponding call reference number in all ISDN messages.

  debug oir  

Platform: IOS based
Where: General
Info: Debug online insertion and removalextended online insertion and removal debugging information.

 2611b#debug oir      Online Insertion and Removal debugging is on      2w3d: OIR: Process woke, 'Event', stall=2, usec=0xB6835B36 -Traceback= 6040967C       603B6D2C 603B6D18      2w3d: OIR: Shutdown pulled interface for Serial5/0 -Traceback= 600E30C4 60409204        604096C8 603B6D2C 603B6D18      2w3d: %OIR-6-REMCARD: Card removed from slot 5, interfaces disabled -Traceback=        60409748 603B6D2C 603B6D18      2w3d: OIR: Remove hwidbs for slot 5 -Traceback= 60409368 60409750 603B6D2C       603B6D18      2w3d: OIR: Process woke, 'Event(max not running)', stall=3, usec=0xD0115C9E      -Traceback= 6040967C 603B6D2C 603B6D18      2w3d: OIR: Process woke, 'Timer(max running)', stall=3, usec=0xDDBB56D6 -      Traceback= 6040967C 603B6D2C 603B6D18      2w3d: OIR: (Re)Init card 5, retry_count=3 -Traceback= 60409894 603B6D2C 603B6D18      2w3d: %OIR-6-INSCARD: Card inserted in slot 5, interfaces administratively shut       down -Traceback= 604098BC 603B6D2C 603B6D18 
  debug parser mode  

Platform: IOS based
Where: General
Info: Shows what is happening at the parser at specific instances. Shows you a basic walkthrough of the lookups needed to process the CLI commands.

 2611b#debug par mo      Parser mode debugging is on      00:54:40: Look up of parser mode 'controller' succeeded      00:54:40: Look up of parser mode 'route-map' succeeded 
  debug sanity  

Platform: IOS based
Where: General
Info: Debugs buffer pool.

 2611b#debug sanity      Buffer pool sanity debugging is on 
  debug snmp {bag  dll  io  mib { all  by-mib-name }  packets  sysdb  timers}  

Platform: IOS based
Where: General
Info: Enables debugging options for SNMP management commands.

  debug subsys  

Platform: IOS based
Where: General
Info: Debugs discrete subsystem information indicating a code segment and its version. When we had debugging on, we tried reloading the system microcode , which did not cause any interesting debugging information.

 2611b#debug sub      Subsystem debugging is on 
  dialer mult-map-same-name  

Platform: IOS based
Where: Configuration
Info: Useful if you have dialup clients using the same CHAP/PAP username.

  dhcp-server import all  

Platform: IOS based
Where: Configuration
Info: Takes all DHCP client info from the ip address dhcp client and assumes that info for our DHCP server.



Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net