05-06-2021 03:18 PM
Hi all,
Any idea about the traceback logs shown on my Cisco 1921 with IOS Version 15.2(2)
I tried to decode the logs but I wasn't lucky enough!
Traceback= 0x256D5600z 0x256F1FCCz 0x256F2074z 0x256F4C34z 0x25686FF0z 0x25687C54z 0x2412021Cz 0x241208A0z
Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z
05-06-2021 05:49 PM
post the complete logs and tell us what is the problem ? by this we may not know what is the issue here ?
still like to know more, raise TAC engineer can help you.
05-07-2021 12:42 AM
Post the exact IOS version. "15.2(2)" is incomplete.
05-07-2021 05:20 AM
Sorry,
15.2.2T4
05-07-2021 06:00 AM
If the router is running "T" train IOS, then expect Traceback and crashes is a "norm".
For stability purposes, upgrade to an "M" train.
05-07-2021 11:06 AM
I will upgrade to release 15.2.4 M11 and I'll be watching the log.
05-07-2021 01:22 PM
after upgrade to IOS 15.2.4 M11 next log entries
%ALIGN-3-TRACE: -Traceback= 0x256D5600z 0x256F1FCCz 0x256F2074z 0x256F4C34z 0x25686FF0z 0x25687C54z 0x2412021Cz 0x241208A0z
Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z
05-07-2021 05:12 PM
Do not just post "bits and pieces". Give us the entire "sh log".
05-10-2021 12:17 AM
Hello, below you can see a log
Gate_#sh log
Syslog logging: enabled (0 messages dropped, 4116 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)
No Active Message Discriminator.
No Inactive Message Discriminator.
Console logging: level debugging, 64802 messages logged, xml disabled,
filtering disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level debugging, 68919 messages logged, xml disabled,
filtering disabled
Exception Logging: size (4096 bytes)
Count and timestamp logging messages: disabled
Persistent logging: disabled
No active filter modules.
Trap logging: level informational, 68922 message lines logged
Logging to x.x.x.x (udp port 5140, audit disabled, link up),
68921 message lines logged,
0 message lines rate-limited,
0 message lines dropped-by-MD,
xml disabled, sequence number disabled
filtering disabled
Logging Source-Interface: VRF Name:
Log Buffer (8192 bytes):
%FW-4-TCP_OoO_SEG: Dropping TCP Segment: seq:2059380530 1500 bytes is out-of-order; expected seq:2059355710. Reason: TCP reassembly queue overflow - session y.y.y.y:12771 to 152.195.132.112:80
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.66.157(17384) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 18 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.245.181(37359) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.186.245(28176) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.186.245(9836) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.1.105(5619) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.1.105(5496) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 35 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.69.69(57192) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.51.155(2499) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(89.64.24.198:55804)=>(z.z.z.z:443),tcp flag:0x10, pak:0x30764A24, iso:0x31483C60,tcp seq:0x2497CE89, tcp ack:0x1B81ECC0, tcp_window:65527, ip_checksum:0x69CF, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 89.64.24.198(55882) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 94.153.14.113(5842) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 94.153.14.113(5814) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.224.215(30788) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(11872) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(189.146.224.215:30884)=>(z.z.z.z:443),tcp flag:0x10, pak:0x30763110, iso:0x31483AE0,tcp seq:0x79105190, tcp ack:0xABBC944A, tcp_window:65527, ip_checksum:0x3B46, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 18 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.245.181(57012) -> z.z.z.z(443), 16 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 54.36.148.83(24220) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.18.189(50734) -> z.z.z.z(443), 5 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(25209) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(12709) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(46.204.51.155:2527)=>(z.z.z.z:443),tcp flag:0x10, pak:0x307612F8, iso:0x3148A6E0,tcp seq:0x9E36DB42, tcp ack:0xE5FBA3FD, tcp_window:65526, ip_checksum:0x6B1A, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.51.155(2488) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 16 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.147.7.80(6265) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(1965) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(15079) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.248.45(15865) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.248.45(56513) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 73 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.18.189(25355) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(38773) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.55.88(62917) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 46 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.69.69(57192) -> z.z.z.z(443), 5 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 103.1.237.180(61959) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.55.88(62742) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(103.1.237.180:61959)=>(z.z.z.z:443),tcp flag:0x10, pak:0x31336648, iso:0x31483060,tcp seq:0x6086973E, tcp ack:0x0, tcp_window:64240, ip_checksum:0x6DB3, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.55.88(62907) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 89.64.8.34(16626) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 89.64.8.34(16766) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 59 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(11872) -> z.z.z.z(443), 8 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.69.69(39759) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.175.157(51682) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.175.157(16197) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 12 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.245.181(57012) -> z.z.z.z(443), 6 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.18.189(25355) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(56295) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(189.146.66.157:17384)=>(z.z.z.z:443),tcp flag:0x10, pak:0x2CEF8C5C, iso:0x314849E0,tcp seq:0x464676FF, tcp ack:0x8783C1E9, tcp_window:65527, ip_checksum:0xB57C, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 19 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.187.125(60404) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.187.125(24815) -> z.z.z.z(443), 1 packet
%ALIGN-3-TRACE: -Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z
%ALIGN-3-TRACE: -Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z
%ALIGN-3-TRACE: -Traceback= 0x256D5600z 0x256F1FCCz 0x256F2074z 0x256F4C34z 0x25686FF0z 0x25687C54z 0x2412021Cz 0x241208A0z
Gate_#
05-10-2021 01:02 AM
Does the router's log have date and time enabled or not?
05-10-2021 01:23 AM
IMHO the date is not relevant in this case rather
05-10-2021 01:26 AM
traceback entries always appear at night between 1:10 AM and 2:15 AM,
and the given sh log contain's an entry from tonight after 1:15 AM May 10 2021
05-10-2021 02:52 AM
@00upaijcn6kIJPjXI5d6 wrote:
traceback entries always appear at night between 1:10 AM and 2:15 AM,
What is the size of the WAN links?
Do you have server backups happening at 1am?
05-10-2021 06:24 AM
a) 1x 100 Mbps (backup one) + 1x200 Mbps (primary one)
b) Nop - not in the given time period
05-10-2021 10:58 AM
what is z.z.z.z ? router IP ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide