Chapter 9, Configuring the Point-to-Point Protocol (PPP)
Example 9-1, ``Sample logfile of PPP negotiation'',
shows the log entries of an example PPP negotiation session.
Example 9-1 Sample logfile of PPP negotiation 1 Feb 22 17:13:48 127.0.0.1 pppd[207]: Assigned link id for incoming link 2 (login:nppp pid:327) is 14 3 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):ICP:administrative 4 open,Initial->Starting 5 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):ICP:low layer up,Star 6 ting->Req_sent 7 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):ICP:Send config_req 8 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):ICP:Receive config_req+ 9 ,Req_sent->Ack_Sent 10 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):ICP:Send config_ack 11 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):ICP:Receive config_ack 12 ,Ack_Sent->Opened 13 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:low layer up, 14 Initial->Closed 15 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:administrative open 16 ,Closed->Req_sent 17 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Send config_req 18 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Send option MRU 1500 19 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Send option ACCM 20 ffffffff 21 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Send option auth 22 PAP 23 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Send option magic 24 number 46c6 25 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive config_ack 26 ,Req_sent->Ack_Rcvd 27 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive option MRU 28 1500 (Ack) 29 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive option ACCM 30 ffffffff (Ack) 31 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive option auth 32 PAP (Ack) 33 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive option 34 magic number:f2381e1f(Ack) 35 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive option 36 protocol compression (Ack) 37 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive option 38 addr&ctl compression (Ack) 39 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Receive config_req+ 40 ,Ack_Rcvd->Opened 41 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP:Send config_ack 42 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):LCP negotiated options: 43 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): local MRU:1500 44 remote MRU:1500 45 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): local ACCM:ffffffff 46 remote ACCM:ffffffff 47 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): local requires PAP 48 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): remote requires PAP 49 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): local disable 50 protocol compression 51 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): remote do 52 protocol compression 53 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): local disable 54 addr&ctl compression 55 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): remote do addr&ctl 56 compression 57 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14):send a PAP_REQ packet: 58 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): PID:mugwump.i88. 59 isc.com 60 Feb 22 17:13:48 127.0.0.1 pppd[206]: Link id(14): PWD:Bull 61 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14):receive a PAP_REQ 62 packet: 63 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14): PID:krusty.i88. 64 isc.com 65 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14): PWD:Blazer 66 Feb 22 17:13:49 127.0.0.1 pppd[207]: received PPCID_PAP 67 Feb 22 17:13:49 127.0.0.1 pppd[207]: PPCID_PAP auth success 68 Feb 22 17:13:49 127.0.0.1 pppd[207]: sent PPCID_PAP 69 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14):send a PAP_ACK packet 70 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14):receive a PAP_ACK packet 71 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14):IPCP:low layer up, 72 Initial->Closed 73 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14):IPCP:administrative 74 open,Closed->Req_sent 75 Feb 22 17:13:49 127.0.0.1 pppd[206]: Link id(14):IPCP:Send config_req 76 Feb 22 17:13:52 127.0.0.1 pppd[207]: received PPCID_PAP 77 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):receive a PAP_REQ packet: 78 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14): PID:krusty.i88.isc.com 79 Feb 22 17:13:52 127.0.0.1 pppd[207]: PPCID_PAP auth success 80 Feb 22 17:13:52 127.0.0.1 pppd[207]: sent PPCID_PAP 81 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14): PWD:Blazer 82 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):send a PAP_ACK packet 83 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Timeout+, 84 Req_sent->Req_sent 85 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Send config_req 86 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Receive option 87 ip addresses,local:132.147.118.1 88 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Receive option 89 ip addresses,remote:132.147.246.8 90 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Ack received 91 option ip addresses 92 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Receive option 93 vj compression MSI:15 CSI:1 (Ack) 94 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Receive config_ 95 req+,Req_sent->Ack_Sent 96 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Send config_ack 97 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP:Receive config_ 98 ack,Ack_Sent->Opened 99 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14):IPCP negotiated options: 100 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14): local address:132. 101 147.55.44 102 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14): remote address:132. 103 147.55.90 104 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14): local disable 105 vj compression 106 Feb 22 17:13:52 127.0.0.1 pppd[206]: Link id(14): remote do vj 107 compression MSI:16 CSI:1 108 Feb 22 17:14:32 127.0.0.1 pppd[206]: Link id(14):IPCP:Receive 109 terminate_req,Opened->Stopping 110 Feb 22 17:14:32 127.0.0.1 pppd[206]: Link id(14):IPCP:Send terminate_ack 111 Feb 22 17:14:32 127.0.0.1 pppd[206]: Link id(14):LCP:Receive 112 terminate_req,Opened->Stopping 113 Feb 22 17:14:32 127.0.0.1 pppd[206]: Link id(14):LCP:Send terminate_ack 114 Feb 22 17:14:32 127.0.0.1 pppd[206]: Link id(14):IPCP:low layer down, 115 Stopping->Starting 116 Feb 22 17:14:33 127.0.0.1 pppd[206]: Link id(14):Received frame 117 abort with bad fcs=0x4751 msglen=0x10f 118 Feb 22 17:14:33 127.0.0.1 pppd[207]: received PPCID_CLOSE: muxid=14 119 Feb 22 17:14:33 127.0.0.1 pppd[206]: Link id(14):LCP:Timeout-, 120 Stopping->Stopped 121 Feb 22 17:14:33 127.0.0.1 pppd[206]: Link id(14):ICP:administrative 122 close,Opened->Closing 123 Feb 22 17:14:33 127.0.0.1 pppd[206]: Link id(14):ICP:Send terminate_req 124 Feb 22 17:14:33 127.0.0.1 pppd[206]: Link id(14):LCP:low layer down, 125 Stopped->Starting 126 Feb 22 17:14:33 127.0.0.1 pppd[207]: ppp_rm_conn: I_UNLINK muxid=14 127 Feb 22 17:14:33 127.0.0.1 pppd[206]: Link id(14):ICP:Receive 128 terminate_ack,Closing->Closed 129 Feb 22 17:14:33 127.0.0.1 pppd[206]: Link id(14):ICP:low layer down, 130 Closed->Initial 131 Feb 22 17:14:33 127.0.0.1 pppd[207]: ppp_rm_conn sending pid 327 SIGUSR1 132 Feb 22 17:14:33 127.0.0.1 pppd[207]: Incoming call on '/dev/tty1A' 133 disconnected 134 Feb 22 17:14:37 127.0.0.1 -ppp[327]: sig_hup sig=1 The logfile may contain information from many sources within a host. Using the log to troubleshoot PPP negotiation problems requires a recognition of PPP entries. All log entries contain a date and time stamp followed by the name or IP address of the host from which the log message originated. The next field in a log entry is the process that inserted the entry and its pid. All PPP entries are inserted by either the PPP daemon (shown as ``pppd'') or a PPP shell (shown as ``-ppp''). Once host-to-host connectivity is established, the PPP daemon assigns a link ID to the connection. The following three lines show a link ID being assigned to an incoming link, an outgoing link, and a dedicated link, respectively. Feb 22 17:13:48 127.0.0.1 pppd[207]: Assigned link id for incoming link (login:nppp pid:327) is 14To identify entries for the link you are troubleshooting, you need to know the login name for incoming links and the IP address of the remote system for dedicated or outgoing links. The stage of negotiation is identified in each entry by the presence of ICP, LCP or IPCP. Log entries about the authentication stage do not have an identifier as ICP, LCP, and IPCP do. They do, however, include either the string ``PAP'' or ``CHAP'', which refer to the two authentication protocols that SCO supports. Examination of the log should progress from ICP, through LCP and authentication, to IPCP. If a failure occurs at an earlier stage, the later stages will never occur. For example, if a failure occurs at the LCP stage, no authentication or IPCP negotiation will occur. Following is a description of the key information to look for at each stage.
|
Networking
guide Call : 800-519- 2267 Vibrant boot camp offers MCSE, CCNA, CCNP Certification back to back
Vibrant
offers
MCSE
certification
training
boot camp
for $5400
all inclusive,
instructor
led at
California
and
Baltimore.
|
Access List Commands, Access Lists, Application Laye - OSI layer, CCNA Bootcamp Notes, CCNA certification bootcamps, CCNA T1 Connections, CDP Setup, Cisco Bootcamp, TCP/IP Info, Cisco Hierarchical Model, Cisco Notes, TCP Ports, Configure Router Register, Configuring IPX, Configuring VLAN, Data Link Layer, DOD Model, Ethernet Frames, Ethernet Networking, Frame Relay information, HDLC WAN Notes, Host to Host Layer, IP Communication ports, IP Ports, ISDN settings, LAN Protocols, LAN Segmentation, Lan Switiching, LAPB CCNA Notes, Layer 2 Protocol, Network Access Layer, Network Laye, Cisco Boot camps, Novell Cisco Routing, OSI Layer, OSI Model, CCNP Bootcamps, Physical Layer, OSI Layer, Point to Point Protocol, PPP, PPP Link, Presentation Layer, OSI Layer, Process Application Layer, Rip Routing Setting, Router Images, Router Information, Router Interfaces, Router IOS Backup, Router IOS, Router Management, Router Password Setup, Router Recover Password, , San Francisco, Router Setup, , California, Router troubleshoot, Routing Protocol RIP, Session Layer, Subnet Masking, Supported RFCs, Switch Images, Switching Configuration, Switching Simulation, TCP/IP Ports, VLAN Communication, WAN Communication,
MCSE CCNA CCNP Boot Camp Schedule by Vibrant boot camps
MCSE Boot Camp Proven MCSE Boot camp Training for MCSE Certification Fast
MCSE CCNA CCNP Boot Camp Schedule by Vibrant boot camps
MCSE Boot Camp - Proven Boot camp for MCSE at Baltimore, Maryland
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
CCNA 801 Boot Camp by Vibrant boot camps, join MCSE camps
CCNA Boot Camp by Vibrant boot camps, join MCSE camps
CCNP Boot Camp by Vibrant boot camps, join CCNP camps
MCSE Boot Camp compare Vibrant boot camps, join MCSE camps
Comptia Security+ Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp contact Vibrant boot camps, join MCSE camps
MCSE Boot Camp course fees Vibrant boot camps, join MCSE camps
MCSE Boot Camp FAQ by Vibrant boot camps, join MCSE camps
MCSE Boot Camp location by Vibrant boot camps, join MCSE camps
MCSE Boot Camp location by Vibrant boot camps, join MCSE camps
MCSE Boot Camp MCSE Certification also MCSE Training Boot Camp
MCSE Boot Camp by Vibrant boot camps, join MCSE camps, MCSE Cert
MCSE Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp MCSE 14days all_incl MCSE Certifiation boot camp
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Security Boot Camp by Vibrant boot camps, join MCSE camps
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
MCSE CCNA CCNP Boot Camp Register by Vibrant boot camps
MCSE Boot Camp Testimonials by Vibrant boot camps
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
MCSE Boot Camp MCSE Certification also MCSE Training Boot Camp
Microsoft Vista Certification Boot Camp for Vista training boot camps
MCSE CCNA CCNP Boot Camp Register by Vibrant boot camps
MCSE Boot Camp all inclusive bootcamp Vibrant boot camps, join MCSE camps
MCSE CCNA CCNP Boot Camp Register by Vibrant boot camps
reason_to_join_vibrant_boot_camp.php
mta-it-infrastructure-windows-server-training-certification.php
msce-windows-2008-to-2016-upgrade.php
microsoft-mcse-messaging-certification-training-course.php
microsoft-certification-courses.php
mcse-productivity-exchange-server-2016.php
mcse-cloud-platform-infrastructure-azure-track.php
mcsa-windows-server-2016-training-certification-boot-camp.php
mcsa_server_2012_r2_boot_camp.php
comptia-certification-courses.php
comptia_a+_network+_boot_camp.php
comptia_a+_bootcamp_course.php
cisco-certification-courses.php
certified-ethical-hacker-ceh-certified-EC-council.php