cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
294
Views
5
Helpful
4
Replies

Strange Wireshark Capture XR Span

Evan Roggenkamp
Beginner
Beginner

Good afternoon. I am working on Inter-op with a brocade CER and an ASR 9001 and I am running into an issue getting ISIS adjacency up. I was able to solve this on our other systems by paying close attention to wireshark captures of the authentication of Hello and LSP adjacency.

However, when mirroring on the XR, I am getting some strange output. Here is my config:

monitor-session BROCADE ethernet
 destination interface GigabitEthernet0/0/0/2

interface GigabitEthernet0/0/0/10
 description UPLINK TO BOTTOM BROCADE ETHERNET 2
 ipv4 address 10.9.0.94 255.255.255.252
 monitor-session BROCADE ethernet
 !
 negotiation auto

Here is a screenshot of the packet capture:

http://goo.gl/7xDLxw

 

4 Replies 4

Ruben Cocheno
Enthusiast
Enthusiast

hi,

Can you share the config from both sides? if you disable the IS-IS authentication on this interface the adjacency comes up?

Please mark it helpfull if it was the case, and i have this problem too. Double touchdown is amazing. Thanks to make Engineering easy.

Here is the brocade side:

router isis
 net 49.0002.0100.0900.0200.00
 auth-mode cleartext level-2
 auth-key "********" level-2
 bfd all-interfaces
 log adjacency
 log invalid-lsp-packets                                          
 set-overload-bit on-startup 30
 address-family ipv4 unicast
  default-metric 200
  metric-style wide
 exit-address-family
 
 address-family ipv6 unicast
 exit-address-family

 

interface ethernet 1/2
 port-name P2P to West 9001
 enable
 route-only
 ip router isis
 ip address 10.9.0.93/30
 isis auth-mode cleartext
 isis auth-key "********"
 isis circuit-type level-2
 isis ipv6 metric 200
 isis metric 200
 isis point-to-point

Here is the Cisco side:

router isis lab
 set-overload-bit on-startup 30
 net 49.0002.0100.0900.0197.00
 nsf ietf
 lsp-gen-interval maximum-wait 30000 initial-wait 30000 secondary-wait 30000
 lsp-password text encrypted 130232020F3901130F1D0C356205373D11362B425A level 2
 address-family ipv4 unicast
  metric-style wide
  metric 16000000
  ispf
  default-information originate
 !
 address-family ipv6 unicast
  metric-style wide
  metric 16000000
 !
 interface Loopback0
  passive
  circuit-type level-2-only
  address-family ipv4 unicast
   metric 200
  !
 !
!
 !
 interface GigabitEthernet0/0/0/10
  circuit-type level-2-only
  point-to-point
  hello-password text encrypted 121E2007163E093D0E12002E641206290023291555
  address-family ipv4 unicast
   metric 200

I have not disabled ISIS authentication because although it is a lab others are working in it and would interrupt some of what they are doing.

So far in the wireshark it looks like I can see hellos from the Cisco, but not from the brocade. Perhaps I am on the wrong support forums? :)