It munged the picture. That e0 is on Charlotte, not Boston.

Also, I forgot to apologize for suggesting that the writer of the Cisco
document might be slightly clueless. :-0
Usually TAC documents are great, which is what this one is. 

Priscilla


Priscilla Oppenheimer wrote:
> 
> You are right, Marty. I had to enable "no ip route-cache" on
> the serial interface of the router doing the relevant
> debugging, which is the router that is on the other side of the
> link where the pings are occurring.
> 
> Here's my lab:
> 
> Boston Router s0 ------------ s0 Charlotte Router
>                                        e0
> 
> Boston Router
> int s0
> 192.168.40.1
> 
> Charlotte Router
> int s0 
> 192.168.40.2
> int e0
> 10.10.0.2
> 
> I'm pinging from the Charlotte router to the Charlotte router
> s0 (192.168.40.2). But I'm debugging on the Boston router, and,
> sure enough, it sees the traffic!
> 
> The "debug ip icmp" command gives you the first hint that
> something is strange.
> 
> Boston#debug ip icmp
> ICMP packet debugging is on
> Boston#
> ICMP: redirect sent to 192.168.40.2 for dest 192.168.40.2, use
> gw 192.168.40.2
> ICMP: redirect sent to 192.168.40.2 for dest 192.168.40.2, use
> gw 192.168.40.2
> ICMP: redirect sent to 192.168.40.2 for dest 192.168.40.2, use
> gw 192.168.40.2
> ICMP: redirect sent to 192.168.40.2 for dest 192.168.40.2, use
> gw 192.168.40.2
> ICMP: redirect sent to 192.168.40.2 for dest 192.168.40.2, use
> gw 192.168.40.2
> 
> But "debug ip packet detail" really shows you that the packets
> are indeed arriving at the other end of the serial link. As you
> know, in the following output, the type 8, code 0 packets are
> pings. The type 5, code 0 are redirects. We also see the type
> 0, code 0 packets, which are ping replies.
> 
> Boston#debug ip packet detail
> IP packet debugging is on (detailed)
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=8, code=0
> IP: s=192.168.40.1 (local), d=192.168.40.2 (Serial0), len 72,
> sending
>     ICMP type=5, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=8, code=0
> IP: s=192.168.40.1 (local), d=192.168.40.2 (Serial0), len 60,
> sending
>     ICMP type=5, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=8, code=0
> IP: s=192.168.40.1 (local), d=192.168.40.2 (Serial0), len 60,
> sending
>     ICMP type=5, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=8, code=0
> IP: s=192.168.40.1 (local), d=192.168.40.2 (Serial0), len 60,
> sending
>     ICMP type=5, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=8, code=0
> IP: s=192.168.40.1 (local), d=192.168.40.2 (Serial0), len 60,
> sending
>     ICMP type=5, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0), len
> 104, redirected
>     ICMP type=0, code=0
> IP: s=192.168.40.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=0, code=0 
> 
> The Charlotte router is automatically selecting the serial
> interface as the source address. But the results are somewhat
> similar if I do extended pings and use the Ethernet interface,
> with some differences. There's no redirects and I also don't
> see the ping replies. The router seems to just happily forward
> the packets in this case.
> 
> Boston#debug ip packet detail
> IP packet debugging is on (detailed)
> Boston#
> IP: s=10.10.0.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=10.10.0.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=10.10.0.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=10.10.0.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> IP: s=10.10.0.2 (Serial0), d=192.168.40.2 (Serial0),
> g=192.168.40.2, forward
>     ICMP type=8, code=0
> 
> Weird. I can see that it is useful, though, that the packet
> actually goes out even when the interface is looped.
> 
> Priscilla
> 
> Marty Adkins wrote:
> > 
> > Priscilla Oppenheimer wrote:
> > > 
> > > s vermill wrote:
> > > >
> > > > Anyone smart on interworkings of Cisco routers care to
> > clarify
> > > > something for me?  I was in a discussion with someone in
> > > > another forum.  It was being discussed how pings from a
> > local
> > > > ethernet interface to a local serial interface on the same
> > > > router actually cross the WAN to which that serial
> > interface is
> > > > attached and are returned by the distand-end router.
> > > 
> > I'm not totally sure what you mean by "from a local ethernet
> > interface".
> > If you mean that the router forwarded a packet that arrived on
> > its
> > Ethernet interface, and the destination was its serial IP,
> then
> > the
> > packet will definitely *not* leave the router.
> > 
> > OTOH, if the router itself is the source of the packet, and it
> > pings
> > its own serial IP, and the outbound interface and layer 2
> encap
> > are
> > resolved and unambiguous, then the router will launch the
> packet
> > out that p2p interface or PVC.  I have done exactly what
> > Priscilla
> > describes, and not only seen the output from "debug ip icmp"
> on
> > the
> > neighbor router, but also observed it generating ICMP
> > redirects, since
> > the packet was forwarded out the interface it arrived on!
> > 
> > This Cisco aberation is extremely useful for troubleshooting
> > p2p WAN
> > links.  When the path has been looped (line protocol up
> > (looped)), the
> > only IP that is pingable is the directly connected one.  That
> > the router
> > actually sends the packet makes it possible to test the link
> > with ping.
> > 
> > Now I wasn't performing an extended ping and sourcing the ping
> > from a
> > different interface.  Maybe that's the difference?  I last did
> > this
> > with IOS 12.0(7)T.
> > 
> > Priscilla, I'm not saying what you observed is wrong!  I don't
> > have
> > access at the moment to replicate it, but I'm positive of what
> > I saw --
> > I had my students do it in class numerous times.
> > 
> > - Marty
> > 
> > 
> 
> 




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=53169&t=53148
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to