12.07.2015 Views

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

Brocade MLX Series and Brocade NetIron XMR Diagnostic Guide ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MAC address learning 4<strong>Brocade</strong># debug mac learninglearning: debugging is oninfo - macmgr_ipc_learn_da_entry. Learn DA 00e0.5200.0000 IPC receivedinfo - macmgr_ipc_learn_sa_entry. Learn SA IPC received Mar 20 23:58:30mac address 00000200 00000001. Port 42 vlan 100 Mar 20 23:58:30 info -macmgr_ipc_sync_add_entry. Send add entry for0000020000000001 port 42 vlan 512.info - macmgr_ipc_learn_da_entry. Learn DA 0034.5678.9123 IPC receivedinfo - macmgr_ipc_learn_da_entry. Learn DA 0034.5678.9123 IPC receiveddebug ip icmpSyntax: [no] debug ip icmp [events | external_loop | internal_loop | packets | port_loop]• events - Displays information about ICMP events.• external_loop - Displays ICMP external loop activity.• internal_loop - Displays ICMP internal loop activity.• packets - Displays information about ICMP packets.• port_loop - Displays port loop activity.The debug ip icmp comm<strong>and</strong> displays information about IPv4 Internet Control Message Protocol(ICMP) transactions. This comm<strong>and</strong> is useful in determining if a router is sending or receiving ICMPmessages, <strong>and</strong> for troubleshooting end-to-end connections.debug ip icmp eventsSyntax: [no] debug ip icmp eventsThis comm<strong>and</strong> generates information about ICMP events, such as sent <strong>and</strong> received echo (ping)requests, destination-unreachable messages, <strong>and</strong> redirect messages. Comm<strong>and</strong> output resemblesthe following example.<strong>Brocade</strong># debug ip icmp eventsICMP: rcvd echo request packet of length 40 from 1.1.1.2ICMP: send echo request packet of length 60 to 1.1.1.2debug ip icmp packetsSyntax: [no] debug ip icmp packetsThis comm<strong>and</strong> generates information about ICMP packets. Comm<strong>and</strong> output resembles thefollowing example.<strong>Brocade</strong># debug ip icmp packetsICMP:dst (1.2.3.4), src (0.0.0.0) echo request typeICMP: Received message from 10.102.50.254 to 10.47.16.33 port mgmt1 type 11 size36ICMP: rxed error message from 10.102.50.254:May 23 16:11:32 original destination10.47.16.33 ICMP Time ExceededIP/ICMP: rxed message: size: 36ICMP: Received message from 67.98.68.129 to 10.47.16.33 port mgmt1 type 11 size36ICMP: rxed error message from 67.98.68.129:May 23 16:11:33 original destination10.47.16.33ICMP Time Exceeded<strong>Brocade</strong> <strong>MLX</strong> <strong>Series</strong> <strong>and</strong> <strong>Brocade</strong> <strong>NetIron</strong> <strong>XMR</strong> <strong>Diagnostic</strong> <strong>Guide</strong> 7953-1002426-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!