OSPF Network Design Solutions

Previous Table of Contents Next

In the following example, you can see the OSPF Flooding protocol provides a plethora of information on its operation. The debug ip ospf flood command generates information about flooding, which includes sending/receiving update/acknowledgement packet. The Received and Sending line means that the router has received or sent a packet; the lines that follow give you detailed information about the content of that packet.

OSPF_Router# debug ip ospf flood OSPF flooding debugging is on Feb 21 22:52:57.973: OSPF: received update from 56.82.197.2, Ethernet1 Feb 21 22:52:57.973: OSPF: Rcv Update Type 1, LSID 156.35.254.43, Adv rtr 156.35.254.43, age 2, seq 0x80003162 Feb 21 22:52:57.973: OSPF: Sending update on Ethernet0 to 224.0.0.6 Feb 21 22:52:57.973: OSPF: Send Type 1, LSID 156.35.254.43, Adv rtr 156.35.254.43, age 3, seq 0x80003162 Feb 21 22:52:57.973: OSPF: received update from 56.82.197.2, Ethernet0 Feb 21 22:52:57.973: OSPF: Rcv Update Type 1, LSID 156.35.254.43, Adv rtr 156.35.254.43, age 2, seq 0x80003162 Feb 21 22:52:57.973: OSPF: Received same lsa Feb 21 22:52:57.973: Remove LSA from retransmission list Feb 21 22:52:57.973: OSPF: received update from 156.35.255.76, Ethernet1 Feb 21 22:52:57.973: OSPF: Rcv Update Type 1, LSID 156.35.254.43, Adv rtr 156.35.254.43, age 3, seq 0x80003162 Feb 21 22:52:57.973: OSPF: Received same lsa Feb 21 22:52:57.973: Remove LSA from retransmission list Feb 21 22:52:59.973: OSPF: Received ACK from 56.82.127.3 Feb 21 22:52:59.973: OSPF: Rcv Ack Type 1, LSID 156.35.254.43, Adv rtr 156.35.254.43, age 2, seq 0x80003162 Feb 21 22:52:59.973: Remove LSA from retransmission list Feb 21 22:52:59.973: OSPF: Received ACK from 56.82.197.2 Feb 21 22:52:59.973: OSPF: Rcv Ack Type 1, LSID 156.35.254.43, Adv rtr 156.35.254.43, age 3, seq 0x80003162 Feb 21 22:53:00.473: OSPF: Sending delayed ACK on Ethernet1 Feb 21 22:53:00.473: OSPF: Ack Type 1, LSID 156.35.254.43, Adv rtr 156.35.254.43, age 2, seq 0x80003162 Feb 21 22:54:21.143: OSPF: received update from 56.82.197.2, Ethernet1 Feb 21 22:54:21.143: OSPF: Rcv Update Type 1, LSID 156.35.254.41, Adv rtr 156.35.254.41, age 2, seq 0x80003168 Feb 21 22:54:21.143: OSPF: Sending update on Ethernet0 to 224.0.0.6 Feb 21 22:54:21.143: OSPF: Send Type 1, LSID 156.35.254.41, Adv rtr 156.35.254.41, age 3, seq 0x80003168 Feb 21 22:54:21.143: OSPF: received update from 56.82.197.2, Ethernet0 Feb 21 22:54:21.143: OSPF: Rcv Update Type 1, LSID 156.35.254.41, Adv rtr 156.35.254.41, age 2, seq 0x80003168 Feb 21 22:54:21.143: OSPF: Received same lsa Feb 21 22:54:21.143: Remove LSA from retransmission list Feb 21 22:54:23.139: OSPF: Received ACK from 156.35.255.76 Feb 21 22:54:23.139: OSPF: Rcv Ack Type 1, LSID 156.35.254.41, Adv rtr 156.35.254.41, age 2, seq 0x80003168 Feb 21 22:54:23.139: Remove LSA from retransmission list Feb 21 22:54:23.143: OSPF: Received ACK from 56.82.127.3 Feb 21 22:54:23.143: OSPF: Rcv Ack Type 1, LSID 156.35.254.41, Adv rtr 156.35.254.41, age 2, seq 0x80003168 Feb 21 22:54:23.143: Remove LSA from retransmission list Feb 21 22:54:23.643: OSPF: Sending delayed ACK on Ethernet1 Feb 21 22:54:23.643: OSPF: Ack Type 1, LSID 156.35.254.41, Adv rtr 156.35.254.41, age 2, seq 0x80003168

debug ip ospf lsa-generation Command

This debug command enables you to view the actions and events being generated by OSPF’s Flooding protocol. The no form of this command disables debugging output. The basic syntax for this command is as follows:

[no] debug ip ospf lsa-generation ?

This debug command allows several options to include access lists, as previously discussed:

OSPF_Router# debug ip ospf lsa-generation ? <1-199> Access list <cr>

In the following example, you can see the OSPF Flooding protocol providing a plethora of information on its operation and LSA generation.

OSPF_Router# debug ip ospf lsa-generation OSPF summary lsa generation debugging is on

debug ip ospf packet Command

Use the debug ip ospf packet EXEC command to display information about each Open Shortest Path First (OSPF) packet received. The no form of this command disables debugging output. The basic syntax for this command is as follows:

[no] debug ip ospf packet

The debug ip ospf packet command produces one set of information for each packet received. The output varies slightly depending on which type of authentication is used. The following example shows the OSPF packet being seen by the router.

OSPF_Router# debug ip ospf packet Feb 21 22:59:43.442: OSPF: rcv. v:2 t:1 l:84 rid:156.83.197.2 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 Feb 21 22:59:43.446: OSPF: rcv. v:2 t:1 l:68 rid:156.83.197.2 aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1 Feb 21 22:59:48.974: OSPF: rcv. v:2 t:1 l:84 rid:156.82.197.2 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 Feb 21 22:59:50.138: OSPF: rcv. v:2 t:1 l:84 rid:156.82.127.3 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 Feb 21 22:59:51.222: OSPF: rcv. v:2 t:1 l:68 rid:156.82.197.2 aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1 Feb 21 22:59:51.494: OSPF: rcv. v:2 t:1 l:68 rid:156.82.127.3 aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1 Feb 21 22:59:53.442: OSPF: rcv. v:2 t:1 l:84 rid:156.83.197.2 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 Feb 21 22:59:53.446: OSPF: rcv. v:2 t:1 l:68 rid:156.83.197.2 aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1 Feb 21 22:59:58.974: OSPF: rcv. v:2 t:1 l:84 rid:156.82.197.2 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 Feb 21 23:00:00.138: OSPF: rcv. v:2 t:1 l:84 rid:156.82.127.3 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 Feb 21 23:00:01.222: OSPF: rcv. v:2 t:1 l:68 rid:156.82.197.2 aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1 Feb 21 23:00:01.494: OSPF: rcv. v:2 t:1 l:68 rid:156.82.127.3 aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1 Feb 21 23:00:03.442: OSPF: rcv. v:2 t:1 l:84 rid:156.83.197.2 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0 Feb 21 23:00:03.446: OSPF: rcv. v:2 t:1 l:68 rid:156.83.197.2 aid:0.0.0.0 chk:200 aut:0 auk: from Ethernet1 Feb 21 23:00:08.974: OSPF: rcv. v:2 t:1 l:84 rid:156.82.197.2 aid:0.0.0.0 chk:2D83 aut:0 auk: from Ethernet0

The example that follows shows sample debug ip ospf packet output when MD5 authentication is used.

OSPF_Router# debug ip ospf packet OSPF: rcv. v:2 t:1 l:48 rid:200.0.0.116 aid:0.0.0.0 chk:0 aut:2 keyid:1 seq:0x0

Previous Table of Contents Next

Категории