#

Sunday, July 28, 2019

Reading the Output of 'debug ip ospf packet'

Using debug ip ospf packet we can look at the parameters in OSPF packets which is receiving from a neighbor..

Reading it's output by using the codes it uses may be helpful in deep troubleshooting.

Let's see a sample debug of a one packet..







Date and time is the time which the packet is received.
OSPF-100 PAK meaning a packet which belongs to OSPF process id 100
rcv means received packet
v:2 means OSPF version is 2
t:1 means the OSPF packet type is 1
     Following are the packet types by it's number..
     1. Hello
     2. DBD (Database Discription)
     3. LSR (Link State Request)
     4. LSU (Link State Update)
     5. LSAck (Link State Ack)
l:48 means the packet length in bytes (this packet is 48 bytes)
rid:2.2.2.2 means the router-id of the packet sender
aid:0.0.0.0 means the area-id is 0
chk:4D40 is the checksum which is used to validate the packet
aut:0 means the authentication is none
         if aut:1 it means the authentication is plain text
         if aut:2 it means the authentication is MD5 digest
auk: will show some more details like the key-id and sequence if authentication is enabled
from Ethernet0/0 is the interface which the packet is received

No comments:

Post a Comment