cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
484
Views
0
Helpful
0
Replies

Intepreting outputs from monitor np counter

karthik.vilas
Level 1
Level 1

Hi All,

I have performed a "monitor np counter RSV_DROP_IPM4_ING_RTE_DFLAG_DROP np4 count 1 location 0/1/CPU0 detail" on an ASR 9K in an attempt to identify some multicast packets that are dropped.

The capture shows three sections with hex values, which i am able to decode with wireshark. In the decode each of the sections shows a different source mac and destination mac. Could someone explain what these three sections represent:-

1) OMEM: 192 bytes (Order corrected)

<hex values, i have removed to keep this short>

 

2) FMEM: bytes[0-3,64-67] usually invalid!

<hex values, i have removed to keep this short>

 

3) Result: 128 bytes (Order corrected)

<hex values, i have removed to keep this short>

 

Why are there different source/destination macs in each section?

 

output attached in file.

 

Any help on this would be wonderful.

Thanks.

 

 

 

0 Replies 0
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: