These commands improve the capability of network engineers to diagnose conditions affecting their product.
CAUTION: The output of “debug” commands can be long and may adversely affect system performance.
This command is useful to debug accounting configuration and functionality in User Manager.
Use this command to turn off debugging of User Manager accounting functionality.
Use this command to enable ARP debug protocol messages.
Use this command to disable ARP debug protocol messages.
Use this command to enable Auto VOIP debug messages. Use the optional parameters to trace H323, SCCP, or SIP packets respectively.
Use this command to disable Auto VOIP debug messages.
This command disables all previously enabled "debug" traces.
This command enables the display of “debug” trace output on the login session in which it is executed. Debug console display must be enabled in order to view any trace output. The output of debug trace commands will appear on all login sessions for which debug console has been enabled. The configuration of this command remains in effect for the life of the login session. The effect of this command is not persistent across resets.
This command disables the display of “debug” trace output on the login session in which it is executed.
This command enables the ssh/telnet to OS on the login session in which it is executed. Debug file system display must be enabled in order to access a ssh/telnet session.
This command displays "debug" information about DHCPv4 client activities and traces DHCPv4 packets to and from the local DHCPv4 client.
This command disables the display of "debug" trace output for DHCPv4 client activity.
This command displays “debug” information about mac filtered DHCPv4 client activities and traces DHCPv4 packets to and from the local DHCPv4 client.
This command disables the display of “debug” trace output for mac filtered DHCPv4 client activity.
Use this command to enable dot1x packet debug trace.
Use this command to disable dot1x packet debug trace.
This command enables tracing of IGMP Snooping packets received and transmitted by the switch.
This command disables tracing of IGMP Snooping packets.
This command enables tracing of IGMP Snooping packets transmitted by the switch. Snooping should be enabled on the device and the interface in order to monitor packets for a particular interface.
A sample output of the trace message is shown below.
<15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]: igmp_snooping_debug.c(116) 908 % Pkt TX - Intf: 1/0/20(20), Vlan_Id:1 Src_Mac: 00:03:0e:00:00:00 Dest_Mac: 01:00:5e:00:00:01 Src_IP: 9.1.1.1 Dest_IP: 225.0.0.1 Type: V2_Membership_Report Group: 225.0.0.1
The following parameters are displayed in the trace message:
This command disables tracing of transmitted IGMP snooping packets.
This command enables tracing of IGMP Snooping packets received by the switch. Snooping should be enabled on the device and the interface in order to monitor packets for a particular interface.
A sample output of the trace message is shown below.
<15> JAN 01 02:45:06 192.168.17.29-1 IGMPSNOOP[185429992]: igmp_snooping_debug.c(116) 908 % Pkt RX - Intf: 1/0/20(20), Vlan_Id:1 Src_Mac: 00:03:0e:00:00:10 Dest_Mac: 01:00:5e:00:00:05 Src_IP: 11.1.1.1 Dest_IP: 225.0.0.5 Type: Membership_Query Group: 225.0.0.5
The following parameters are displayed in the trace message:
This command disables tracing of received IGMP Snooping packets.
Use this command to enable debug of IP Protocol packets matching the ACL criteria.
Use this command to disable debug of IP Protocol packets matching the ACL criteria.
Use this command to trace IGMP packet reception and transmission. receive traces only received IGMP packets and transmit traces only transmitted IGMP packets. When neither keyword is used in the command, then all IGMP packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console.
Use this command to disable debug tracing of IGMP packet reception and transmission.
Use this command to enable VRRP debug protocol messages.
Use this command to disable VRRP debug protocol messages.
Use this command to enable OSPFv3 packet debug trace.
Use this command to disable tracing of OSPFv3 packets.
This command displays "debug" information about DHCPv6 client activities and traces DHCPv6 packets to and from the local DHCPv6 client.
This command disables the display of "debug" trace output for DHCPv6 client activity.
Use this command for tracing MDATAv6 packet reception and transmission. receive traces only received data packets and transmit traces only transmitted data packets. When neither keyword is used in the command, then all data packet traces are dumped. Vital information such as source address, destination address, packet length, and the interface on which the packet is received or transmitted is displayed on the console.
Use this command to disable debug tracing of MDATAv6 packet reception and transmission.
Use this command to trace MLDv6 packet reception and transmission. receive traces only received MLDv6 packets and transmit traces only transmitted MLDv6 packets. When neither keyword is used in the command, then all MLDv6 packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console.
Use this command to disable debug tracing of MLDv6 packet reception and transmission.
Use this command to trace PIMDMv6 packet reception and transmission. receive traces only received PIMDMv6 packets and transmit traces only transmitted PIMDMv6 packets. When neither keyword is used in the command, then all PIMDMv6 packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console.
Use this command to disable debug tracing of PIMDMv6 packet reception and transmission.
Use this command to trace PIMSMv6 packet reception and transmission. receive traces only received PIMSMv6 packets and transmit traces only transmitted PIMSMv6 packets. When neither keyword is used in the command, then all PIMSMv6 packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console.
Use this command to disable debug tracing of PIMSMv6 packet reception and transmission.
This command enables tracing of LACP packets received and transmitted by the switch.
A sample output of the trace message is shown below.
<15> JAN 01 14:04:51 10.254.24.31-1 DOT3AD[183697744]: dot3ad_debug.c(385) 58%% Pkt TX - Intf: 1/0/1(1), Type: LACP, Sys: 00:11:88:14:62:e1, State: 0x47, Key: 0x36
This command disables tracing of LACP packets.
Use this command to trace MLD snooping packet reception and transmission. receive traces only received MLD snooping packets and transmit traces only transmitted MLD snooping packets. When neither keyword is used in the command, then all MLD snooping packet traces are dumped. Vital information such as source address, destination address, control packet type, packet length, and the interface on which the packet is received or transmitted is displayed on the console.
Use this command to disable debug tracing of MLD snooping packet reception and transmission.
This command enables tracing of OSPF packets received and transmitted by the switch.
Sample outputs of the trace messages are shown below.
<15> JAN 02 11:03:31 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25430 % Pkt RX - Intf:2/0/48 Src, Ip:192.168.50.2 DestIp:224.0.0.5 AreaId:0.0.0.0 Type:HELLO, NetMask:255.255.255.0 D esigRouter:0.0.0.0 Backup:0.0.0.0
<15> JAN 02 11:03:35 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25431 % Pkt TX - Intf:2/0/48 Src Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:DB_DSCR Mtu:1500 Options:E Flags: I/M/MS Seq:126166
<15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25434 % Pkt RX - Intf:2/0/48 Src Ip:192.168.50.2 DestIp:192.168.50.1 AreaId:0.0.0.0 Type:LS_REQ Length: 1500
<15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25435 % Pkt TX - Intf:2/0/48 Src Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:LS_UPD Length: 1500
<15> JAN 02 11:03:37 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25441 % Pkt TX - Intf:2/0/48 Src Ip:10.50.50.1 DestIp:224.0.0.6 AreaId:0.0.0.0 Type:LS_ACK Length: 1500
The following parameters are displayed in the trace message:
The remaining fields in the trace are specific to the type of OSPF Packet.
HELLO packet field definitions:
DB_DSCR packet field definitions:
LS_REQ packet field definitions:
LS_UPD packet field definitions.
LS_ACK packet field definitions.
This command disables tracing of OSPF packets.
This command enables tracing of ICMP echo requests and responses. The command traces pings on the network port/ serviceport for switching packages. For routing packages, pings are traced on the routing ports as well.
A sample output of the trace message is shown below.
<15> JAN 01 00:21:22 192.168.17.29-1 SIM[181040176]: sim_debug.c(128) 20 % Pkt TX - Intf: 1/0/1(1), SRC_IP:10.50.50.2, DEST_IP:10.50.50.1, Type:ECHO_REQUEST <15> JAN 01 00:21:22 192.168.17.29-1 SIM[182813968]: sim_debug.c(82) 21 % Pkt RX - Intf: 1/0/1(1), SRC_IP:10.50.50.1, DEST_IP:10.50.50.2, Type:ECHO_REPLY
The following parameters are displayed in the trace message:
This command disables tracing of ICMP echo requests and responses.
This command turns on tracing of RIP requests and responses. This command takes no options. The output is directed to the log file.
A sample output of the trace message is shown below.
<15> JAN 01 00:35:15 192.168.17.29-1 RIP[181783160]: rip_map_debug.c(96) 775%, Pkt RX on Intf: 1/0/1(1), Src_IP:43.1.1.1 Dest_IP:43.1.1.2, Rip_Version: RIPv2 Packet_Type:RIP_RESPONSE, ROUTE 1): Network: 10.1.1.0 Mask: 255.255.255.0 Metric: 1, ROUTE 2): Network: 40.1.0.0 Mask: 255.255.0.0 Metric: 1, ROUTE 3): Network: 10.50.50.0 Mask: 255.255.255.0 Metric: 1, ROUTE 4): Network: 41.1.0.0 Mask: 255.255.0.0 Metric: 1, ROUTE 5): Network:42.0.0.0 Mask:255.0.0.0 Metric:1. Another 6 routes present in packet not displayed.
The following parameters are displayed in the trace message:
This command disables tracing of RIP requests and responses.
Use this command to enable sFlow debug packet trace.
Use this command to disable sFlow debug packet trace.
This command enables tracing of spanning tree BPDUs received and transmitted by the switch.
This command disables tracing of spanning tree BPDUs.
This command enables tracing of spanning tree BPDUs received by the switch. Spanning tree should be enabled on the device and on the interface in order to monitor packets for a particular interface.
A sample output of the trace message is shown below.
<15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt RX - Intf: 1/0/9(9), Source_Mac: 00:11:88:4e:c2:10 Version: 3, Root Mac: 00:11:88:4e:c2:00, Root Priority: 0x8000 Path Cost: 0
The following parameters are displayed in the trace message:
This command disables tracing of received spanning tree BPDUs.
This command enables tracing of spanning tree BPDUs transmitted by the switch. Spanning tree should be enabled on the device and on the interface in order to monitor packets on a particular interface.
A sample output of the trace message is shown below.
<15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt TX - Intf: 1/0/7(7), Source_Mac: 00:11:88:4e:c2:00 Version: 3, Root_Mac: 00:11:88:4e:c2:00, Root_Priority: 0x8000 Path_Cost: 0
The following parameters are displayed in the trace message:
This command disables tracing of transmitted spanning tree BPDUs.
Use the show debugging command to display enabled packet tracing configurations.
Use the no show debugging command to disable packet tracing configurations.
Use this command to configure the Persistent logging for the switch. The severity level of logging messages is specified at severity level. Possible values for severity level are (emergency|0, alert|1, critical|2, error|3, warning|4, notice|5, info|6, debug|7).
Use this command to disable the persistent logging in the switch.