This document is not up to date as the firewall is PIX. Maybe the ASA codes have the same command as this old PIX. I did not have time to test it.
Use the following commands to check your PPPoE interface:
- show ip address outside pppoe
- show vpdn session pppoe
- show vpdn pppinterface
- show vpdn group
Here is an example what are the outputs for the commands above.
pixfirewall(config)# show ip address outside pppoe
PPPoE Assigned IP addr: 50.50.50.82 255.255.255.255 on Interface: outside Remote IP addr: 50.50.50.1 pixfirewall(config)# show vpdn tunnel pppoe |
Debugging PPPoE:
If you have problems with PPPoE, you can enable the following debugging and look for the tipical PADI – PADO – PADR – PADS sequence in the debug output.
pixfirewall(config)# debug pppoe event pixfirewall(config)# debug pppoe error |
Here is an example output for the 2 PPPoE debug commands.
pixfirewall(config)# sh interface interface ethernet0 “outside” is up, line protocol is up Hardware is i82559 ethernet, address is 0013.7f6d.4beb IP address 50.50.50.83, subnet mask 255.255.255.255 MTU 1492 bytes, BW 100000 Kbit full duplex 14990260 packets input, 3826603448 bytes, 0 no buffer Received 14954607 broadcasts, 0 runts, 0 giants 115896 input errors, 1 CRC, 1 frame, 115894 overrun, 1 ignored, 0 abort 6374 packets output, 477058 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 8 lost carrier, 0 no carrier input queue (curr/max blocks): hardware (128/128) software (0/128) output queue (curr/max blocks): hardware (0/2) software (0/1) interface ethernet1 “inside” is up, line protocol is up Hardware is i82559 ethernet, address is 0013.7f6d.4bee MTU 1500 bytes, BW 100000 Kbit full duplex 14955792 packets input, 3823096216 bytes, 0 no buffer Received 14955792 broadcasts, 0 runts, 0 giants 116124 input errors, 0 CRC, 0 frame, 116124 overrun, 0 ignored, 0 abort 2 packets output, 120 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 0 lost carrier, 0 no carrier input queue (curr/max blocks): hardware (128/128) software (0/157) output queue (curr/max blocks): hardware (0/1) software (0/1) pixfirewall(config)# pixfirewall(config)# ip address outside pppoe setroute speixfnidr_ewpalal(cdoin:f(igS)n#d ) Dest:ffff.ffff.ffff Src:0013.7f6d.4beb Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:09=PADI Sess:0 Len:12 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000004 PPPoE:(Rcv) Dest:0013.7f6d.4beb Src:0012.80cb.4508 Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:07=PADO Sess:0 Len:44 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000004 Type:0102:ACNAME-AC Name Len:8 7204-ISP Type:0104:ACCOOKIE-AC Cookie Len:16 68516E78 F499010D D4D3D3F7 84017B1D PPPoE: PADO send_padr:(Snd) Dest:0012.80cb.4508 Src:0013.7f6d.4beb Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:19=PADR Sess:0 Len:44 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000004 Type:0102:ACNAME-AC Name Len:8 7204-ISP Type:0104:ACCOOKIE-AC Cookie Len:16 68516E78 F499010D D4D3D3F7 84017B1D PPPoE:(Rcv) Dest:0013.7f6d.4beb Src:001a.a18f.1f74 Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:07=PADO Sess:0 Len:45 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000004 Type:0102:ACNAME-AC Name Len:9 wr17-1801 Type:0104:ACCOOKIE-AC Cookie Len:16 7FAD81B7 203ACB7F DFE50D2D C4FEE607 PPPoE: PADO PPPoE: Unsolicited PADO, Invalid session state PPPoE:(Rcv) Dest:0013.7f6d.4beb Src:0012.80cb.4508 Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:65=PADS Sess:98 Len:44 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000004 Type:0102:ACNAME-AC Name Len:8 7204-ISP Type:0104:ACCOOKIE-AC Cookie Len:16 68516E78 F499010D D4D3D3F7 84017B1D PPPoE: PADS IN PADS from PPPoE tunnel PPPoE: Opening PPP link and starting negotiations. PPP virtual access open, ifc = 0 Xmit Link Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 05060a09e181 LCP Option: MAGIC_NUMBER, len: 6, data: 0a09e181 Rcvd Link Control Protocol pkt, Action code is: Config Request, len is: 10 Pkt dump: 010405d405064ad7155b LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: MAGIC_NUMBER, len: 6, data: 4ad7155b Xmit Link Control Protocol pkt, Action code is: Config ACK, len is: 10 Pkt dump: 010405d405064ad7155b LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: MAGIC_NUMBER, len: 6, data: 4ad7155b Rcvd Link Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 05060a09e181 LCP Option: MAGIC_NUMBER, len: 6, data: 0a09e181 Xmit Link Control Protocol pkt, Action code is: Echo Request, len is: 4 Pkt dump: 0a09e181 Rcvd IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 030632323201 IPCP Option: Config IP, IP = 50.50.50.1 Xmit IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 030600000000 IPCP Option: Config IP, IP = 0.0.0.0 Xmit IP Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 030632323201 IPCP Option: Config IP, IP = 50.50.50.1 Rcvd Link Control Protocol pkt, Action code is: Echo Reply, len is: 4 Pkt dump: 4ad7155b Rcvd IP Control Protocol pkt, Action code is: Config NAK, len is: 6 Pkt dump: 030632323253 IPCP Option: Config IP, IP = 50.50.50.83 Xmit IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 030632323253 IPCP Option: Config IP, IP = 50.50.50.83 Rcvd IP Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 030632323253 IPCP Option: Config IP, IP = 50.50.50.83 Rcvd Link Control Protocol pkt, Action code is: Echo Request, len is: 8 Pkt dump: 4ad7155b0a09e181 Xmit Link Control Protocol pkt, Action code is: Echo Reply, len is: 8 Pkt dump: 0a09e1810a09e181 Rcvd Link Control Protocol pkt, Action code is: Echo Request, len is: 8 Pkt dump: 4ad7155b0a09e181 Xmit Link Control Protocol pkt, Action code is: Echo Reply, len is: 8 Pkt dump: 0a09e1810a09e181 Xmit Link Control Protocol pkt, Action code is: Echo Request, len is: 4 Pkt dump: 0a09e181 Rcvd Link Control Protocol pkt, Action code is: Echo Reply, len is: 4 Pkt dump: 4ad7155b pixfirewall(config)# undeb all |
Posted on November 24, 2010
0