Hi All,
I have performed a "monitor np counter RSV_DROP_IPM4_ING_RTE_DFLAG_DROP np4 count 1 location 0/1/CPU0 detail" on an ASR 9K in an attempt to identify some multicast packets that are dropped.
The capture shows three sections with hex values, which i am able to decode with wireshark. In the decode each of the sections shows a different source mac and destination mac. Could someone explain what these three sections represent:-
1) OMEM: 192 bytes (Order corrected)
<hex values, i have removed to keep this short>
2) FMEM: bytes[0-3,64-67] usually invalid!
<hex values, i have removed to keep this short>
3) Result: 128 bytes (Order corrected)
<hex values, i have removed to keep this short>
Why are there different source/destination macs in each section?
output attached in file.
Any help on this would be wonderful.
Thanks.