<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Netdr IOS in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372218#M28564</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can help you on this question. Enabling netdr is not impacting the CPU and the captures are kept on separate (special) buffers for the job. So it is safe to enable it as it will capture the packets going to CPU giving an indication of why they are special handled. Even better if you specify interface when enabling it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my own question, I thought if better posting it here instead of opening a new subject:&lt;/P&gt;&lt;P&gt;WHere can I find a list describing the 'dest_indx' values?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example, Cisco has identified that "dest_indx 0x7F07" means that these packets are icmp redirects. And indeed with applying a msl rate limit for icmp redirects problem solved. So the question is where can i find a list explaining all codes for 'dest_indx' ? Now we have on another part of the network identified many packets with "dest_indx 0x380" and I don't want to open a TAC Case everytime to ask what kind of packet are those... ANy help?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 Sep 2010 07:33:58 GMT</pubDate>
    <dc:creator>George Karavitis</dc:creator>
    <dc:date>2010-09-10T07:33:58Z</dc:date>
    <item>
      <title>Netdr IOS</title>
      <link>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372215#M28561</link>
      <description>&lt;P&gt;Can someone explain the difference between the two debug netdr&amp;nbsp; commands. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SUP 720&lt;/P&gt;&lt;P&gt;122-33.SXH5&lt;/P&gt;&lt;P&gt;NJSE-425M-1-WAN1#debug netdr ?&lt;BR /&gt;&amp;nbsp; capture&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Capture packets into a buffer to show later&lt;BR /&gt;&amp;nbsp; clear-capture&amp;nbsp; Clear the capture buffer (leaves filters as was)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;SUP2&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="mso-fareast-font-family: 'Times New Roman';"&gt;122-18.SXD7b.bin&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="mso-fareast-font-family: 'Times New Roman';"&gt;NJSE-425M-1-WAN2#debug netdr ?&lt;BR /&gt;&amp;nbsp; all&amp;nbsp;&amp;nbsp;&amp;nbsp; All NetDriver debugging messages&lt;BR /&gt;&amp;nbsp; data&amp;nbsp;&amp;nbsp; NetDriver Data Flow&lt;BR /&gt;&amp;nbsp; error&amp;nbsp; NetDriver Errors&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="mso-fareast-font-family: 'Times New Roman';"&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2010 19:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372215#M28561</guid>
      <dc:creator>paul.pink</dc:creator>
      <dc:date>2010-02-24T19:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Netdr IOS</title>
      <link>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372216#M28562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sup2 had a much older implementation of debug netdr.&amp;nbsp; We would typically use debug netdr data rx.&amp;nbsp; Debug netdr all and errors -never tried it.&lt;/P&gt;&lt;P&gt;With sup720 the implementation is much cleaner and easier to use as you have shown below. We typically use these for troubleshooting high cpu or using it to figure out unauthorized packets hitting the cpu.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Aug 2010 16:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372216#M28562</guid>
      <dc:creator>Scott Bradley</dc:creator>
      <dc:date>2010-08-17T16:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: Netdr IOS</title>
      <link>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372217#M28563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sirs,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using hybrid 6500. We encountered several switching loops this past few months but it gets resolved prior to troubleshooting. According to Cisco TAC, they would like to run that netdr thing but I would also like to know what else it can do to locate the problem. The traffic in the network is high and I would like to know if enabling this netdr will hit the network or cpu utilization of the switch too much.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Can I use it even if I'm using hybrid? Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Aug 2010 16:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372217#M28563</guid>
      <dc:creator>jpl861</dc:creator>
      <dc:date>2010-08-28T16:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Netdr IOS</title>
      <link>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372218#M28564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can help you on this question. Enabling netdr is not impacting the CPU and the captures are kept on separate (special) buffers for the job. So it is safe to enable it as it will capture the packets going to CPU giving an indication of why they are special handled. Even better if you specify interface when enabling it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my own question, I thought if better posting it here instead of opening a new subject:&lt;/P&gt;&lt;P&gt;WHere can I find a list describing the 'dest_indx' values?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example, Cisco has identified that "dest_indx 0x7F07" means that these packets are icmp redirects. And indeed with applying a msl rate limit for icmp redirects problem solved. So the question is where can i find a list explaining all codes for 'dest_indx' ? Now we have on another part of the network identified many packets with "dest_indx 0x380" and I don't want to open a TAC Case everytime to ask what kind of packet are those... ANy help?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Sep 2010 07:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/netdr-ios/m-p/1372218#M28564</guid>
      <dc:creator>George Karavitis</dc:creator>
      <dc:date>2010-09-10T07:33:58Z</dc:date>
    </item>
  </channel>
</rss>

