cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2663
Views
5
Helpful
28
Replies

Traceback logs on Cisco 1921

Hi all,

Any idea about the traceback logs shown on my Cisco 1921 with IOS Version 15.2(2)

I tried to decode the logs but I wasn't lucky enough!

 

Traceback= 0x256D5600z 0x256F1FCCz 0x256F2074z 0x256F4C34z 0x25686FF0z 0x25687C54z 0x2412021Cz 0x241208A0z
Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z

28 Replies 28

balaji.bandi
Hall of Fame
Hall of Fame

post the complete logs and tell us what is the problem ? by this we may not know what is the issue here ?

 

still like to know more, raise TAC engineer can help you.

 

 

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Leo Laohoo
Hall of Fame
Hall of Fame

Post the exact IOS version.  "15.2(2)" is incomplete.

Sorry,

15.2.2T4

If the router is running "T" train IOS, then expect Traceback and crashes is a "norm".

For stability purposes, upgrade to an "M" train.

I will upgrade to release 15.2.4 M11 and I'll be watching the log.

after upgrade to IOS 15.2.4 M11 next log entries

 

%ALIGN-3-TRACE: -Traceback= 0x256D5600z 0x256F1FCCz 0x256F2074z 0x256F4C34z 0x25686FF0z 0x25687C54z 0x2412021Cz 0x241208A0z

 

Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z

 

Do not just post "bits and pieces".  Give us the entire "sh log".

Hello, below you can see a log

 

Gate_#sh log
Syslog logging: enabled (0 messages dropped, 4116 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)

No Active Message Discriminator.

 

No Inactive Message Discriminator.


Console logging: level debugging, 64802 messages logged, xml disabled,
filtering disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level debugging, 68919 messages logged, xml disabled,
filtering disabled
Exception Logging: size (4096 bytes)
Count and timestamp logging messages: disabled
Persistent logging: disabled

No active filter modules.

Trap logging: level informational, 68922 message lines logged
Logging to x.x.x.x (udp port 5140, audit disabled, link up),
68921 message lines logged,
0 message lines rate-limited,
0 message lines dropped-by-MD,
xml disabled, sequence number disabled
filtering disabled
Logging Source-Interface: VRF Name:

Log Buffer (8192 bytes):
%FW-4-TCP_OoO_SEG: Dropping TCP Segment: seq:2059380530 1500 bytes is out-of-order; expected seq:2059355710. Reason: TCP reassembly queue overflow - session y.y.y.y:12771 to 152.195.132.112:80
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.66.157(17384) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 18 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.245.181(37359) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.186.245(28176) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.186.245(9836) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.1.105(5619) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.1.105(5496) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 35 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.69.69(57192) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.51.155(2499) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(89.64.24.198:55804)=>(z.z.z.z:443),tcp flag:0x10, pak:0x30764A24, iso:0x31483C60,tcp seq:0x2497CE89, tcp ack:0x1B81ECC0, tcp_window:65527, ip_checksum:0x69CF, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 89.64.24.198(55882) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 94.153.14.113(5842) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 94.153.14.113(5814) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.146.224.215(30788) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(11872) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(189.146.224.215:30884)=>(z.z.z.z:443),tcp flag:0x10, pak:0x30763110, iso:0x31483AE0,tcp seq:0x79105190, tcp ack:0xABBC944A, tcp_window:65527, ip_checksum:0x3B46, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 18 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.245.181(57012) -> z.z.z.z(443), 16 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 54.36.148.83(24220) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.18.189(50734) -> z.z.z.z(443), 5 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(25209) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(12709) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(46.204.51.155:2527)=>(z.z.z.z:443),tcp flag:0x10, pak:0x307612F8, iso:0x3148A6E0,tcp seq:0x9E36DB42, tcp ack:0xE5FBA3FD, tcp_window:65526, ip_checksum:0x6B1A, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.51.155(2488) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 16 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 189.147.7.80(6265) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(1965) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 185.51.134.230(15079) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.248.45(15865) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.248.45(56513) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 73 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.18.189(25355) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(38773) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.55.88(62917) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 46 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.69.69(57192) -> z.z.z.z(443), 5 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 103.1.237.180(61959) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.55.88(62742) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(103.1.237.180:61959)=>(z.z.z.z:443),tcp flag:0x10, pak:0x31336648, iso:0x31483060,tcp seq:0x6086973E, tcp ack:0x0, tcp_window:64240, ip_checksum:0x6DB3, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 46.204.55.88(62907) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 89.64.8.34(16626) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 89.64.8.34(16766) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 59 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(11872) -> z.z.z.z(443), 8 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.69.69(39759) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.175.157(51682) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.175.157(16197) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 12 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.245.181(57012) -> z.z.z.z(443), 6 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.18.189(25355) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 40.101.80.141(56295) -> z.z.z.z(443), 1 packet
%IPS-6-SEND_TCP_PAK: Sending TCP packet:(189.146.66.157:17384)=>(z.z.z.z:443),tcp flag:0x10, pak:0x2CEF8C5C, iso:0x314849E0,tcp seq:0x464676FF, tcp ack:0x8783C1E9, tcp_window:65527, ip_checksum:0xB57C, GigabitEthernet0/0,feat_flags:0x10000, fast_path(yes)
%SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 19 packets
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.187.125(60404) -> z.z.z.z(443), 1 packet
%SEC-6-IPACCESSLOGP: list WAN_IN_ACL permitted tcp 52.97.187.125(24815) -> z.z.z.z(443), 1 packet
%ALIGN-3-TRACE: -Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z
%ALIGN-3-TRACE: -Traceback= 2117CA64z 2117CBE0z 2117E18Cz 2117FD50z 21180230z 211649CCz 2117DB24z 21166510z 21166798z 21166878z 21166AB4z 23DE4920z 23DE4904z
%ALIGN-3-TRACE: -Traceback= 0x256D5600z 0x256F1FCCz 0x256F2074z 0x256F4C34z 0x25686FF0z 0x25687C54z 0x2412021Cz 0x241208A0z
Gate_#

Does the router's log have date and time enabled or not?

IMHO the date is not relevant in this case rather

traceback entries always appear at night between 1:10 AM and 2:15 AM,

and the given sh log contain's an entry from tonight after 1:15 AM May 10 2021


@00upaijcn6kIJPjXI5d6 wrote:

traceback entries always appear at night between 1:10 AM and 2:15 AM,


What is the size of the WAN links? 
Do you have server backups happening at 1am?

a) 1x 100 Mbps (backup one) + 1x200 Mbps (primary one)

b) Nop - not in the given time period

what is z.z.z.z ? router IP ?

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: