[cisco-bba] terminating l2 ADSL customers

Sunet Sysadmin sysadmin at sunet.com.au
Tue Feb 27 16:47:31 EST 2007


Thanks guys for your suggestions. Know I can see vpdn traffic coming 
throw and the tunel is forming with a tunnel id but for some reason the 
tunnel is breaking up. this keeps looping . Can you please suggest me 
where i am going wrong or can u point me through the right direction. 
following is the debug information for debug l2x-event. Any help is much 
appreciated.

Feb 28 08:58:44 210.80.157.1 30541: 16:00:24:   Tnl35407 L2TP: Shutdown 
tunnel
Feb 28 08:58:44 210.80.157.1 30542: 16:00:24:   Tnl35407 L2TP: Tunnel 
state change from shutting-down to idle
Feb 28 09:02:53 210.80.157.1 30543: 16:04:33: L2X: Parse  AVP 0, len 8, 
flag 0x8000 (M)
Feb 28 09:02:53 210.80.157.1 30544: 16:04:33: L2X: Parse SCCRQ
Feb 28 09:02:53 210.80.157.1 30545: 16:04:33: L2X: Parse  AVP 2, len 8, 
flag 0x8000 (M)
Feb 28 09:02:53 210.80.157.1 30546: 16:04:33: L2X: Protocol Ver 256
Feb 28 09:02:53 210.80.157.1 30547: 16:04:33: L2X: Parse  AVP 7, len 20, 
flag 0x8000 (M)
Feb 28 09:02:53 210.80.157.1 30548: 16:04:33: L2X: Hostname n2158726k-vez8
Feb 28 09:02:53 210.80.157.1 30549: 16:04:33: L2X: Parse  AVP 3, len 10, 
flag 0x8000 (M)
Feb 28 09:02:53 210.80.157.1 30550: 16:04:33: L2X: Framing Cap 0x1
Feb 28 09:02:53 210.80.157.1 30551: 16:04:33: L2X: Parse  AVP 9, len 8, 
flag 0x8000 (M)
Feb 28 09:02:53 210.80.157.1 30552: 16:04:33: L2X: Assigned Tunnel ID 668
Feb 28 09:02:53 210.80.157.1 30553: 16:04:33: L2X: Parse  AVP 10, len 8, 
flag 0x8000 (M)
Feb 28 09:02:53 210.80.157.1 30554: 16:04:33: L2X: Rx Window Size 64
Feb 28 09:02:53 210.80.157.1 30555: 16:04:33: L2X: Parse  AVP 11, len 
29, flag 0x8000 (M)
Feb 28 09:02:53 210.80.157.1 30556: 16:04:33: L2X: Chlng 
Feb 28 09:02:53 210.80.157.1 30557:      C5 A0 78 0E F2 39 21 08 C3 2E 
9F F6 AE F6 EC 4B
Feb 28 09:02:53 210.80.157.1 30558:      7F 34 58 93 68 4E 5A
Feb 28 09:02:53 210.80.157.1 30559: 16:04:33: L2X: Parse  AVP 6, len 8, 
flag 0x0
Feb 28 09:02:53 210.80.157.1 30560: 16:04:33: L2X: Firmware Ver 0x1428
Feb 28 09:02:53 210.80.157.1 30561: 16:04:33: L2X: Parse  AVP 8, len 28, 
flag 0x0
Feb 28 09:02:53 210.80.157.1 30562: 16:04:33: L2X: Vendor Name Juniper 
Networks, Inc.
Feb 28 09:02:53 210.80.157.1 30563: 16:04:33: L2X: Parse  AVP 76, len 
12, flag 0x0
Feb 28 09:02:53 210.80.157.1 30564: 16:04:33: L2X: Unknown  AVP 76 in CM 
SCCRQ
Feb 28 09:02:53 210.80.157.1 30565: 16:04:33: L2X: Ignoring unknown  AVP 76
Feb 28 09:02:53 210.80.157.1 30566: 16:04:33: L2X: Unknown AVP found 
during length verification. AVP is 76, vendor code is 0, len is 12
Feb 28 09:02:53 210.80.157.1 30567: 16:04:33: L2X: Ignoring unknown  AVP 76
Feb 28 09:02:53 210.80.157.1 30568: 16:04:33: L2X: No missing AVPs in SCCRQ
Feb 28 09:02:53 210.80.157.1 30569: 16:04:33: L2X: I SCCRQ, flg TLS, ver 
2, len 151, tnl 0, cl 0, ns 0, nr 0
Feb 28 09:02:53 210.80.157.1 30570:      C8 02 00 97 00 00 00 00 00 00 
00 00 80 08 00 00
Feb 28 09:02:53 210.80.157.1 30571:      00 00 00 01 80 08 00 00 00 02 
01 00 80 14 00 00
Feb 28 09:02:53 210.80.157.1 30572:      00 07 6E 32 31 35 38 37 32 36 
6B 2D 76 65 7A ...
Feb 28 09:02:53 210.80.157.1 30573: 16:04:33: L2TP: I SCCRQ from 
n2158726k-vez8 tnl 668
Feb 28 09:02:53 210.80.157.1 30574: 16:04:33:   Tnl59502 L2TP: Got a 
challenge in SCCRQ, nxxxxxxxxk-vez8
Feb 28 09:02:53 210.80.157.1 30575: 16:04:33:   Tnl59502 L2TP: New 
tunnel created for remote n2158726k-vez8, address 172.30.108.207
Feb 28 09:02:53 210.80.157.1 30576: 16:04:33:   Tnl59502 L2TP: O SCCRP  
to n2158726k-vez8 tnlid 668
Feb 28 09:02:53 210.80.157.1 30577: 16:04:33:   Tnl59502 L2TP: O SCCRP, 
flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:02:53 210.80.157.1 30578:      C8 02 00 98 02 9C 00 00 00 00 
00 01 80 08 00 00
Feb 28 09:02:53 210.80.157.1 30579:      00 00 00 02 80 08 00 00 00 02 
01 00 80 0A 00 00
Feb 28 09:02:53 210.80.157.1 30580:      00 03 00 00 00 00 80 0A 00 00 
00 04 00 00 00 ...
Feb 28 09:02:54 210.80.157.1 30581: 16:04:33:   Tnl59502 L2TP: Control 
channel retransmit delay set to 1 seconds
Feb 28 09:02:54 210.80.157.1 30582: 16:04:33:   Tnl59502 L2TP: Tunnel 
state change from idle to wait-ctl-reply
Feb 28 09:02:54 210.80.157.1 30583: 16:04:34:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:02:54 210.80.157.1 30584: 16:04:34:   Tnl59502 L2TP: Control 
channel retransmit delay set to 2 seconds
Feb 28 09:02:54 210.80.157.1 30585: 16:04:34: L2X: Parse  AVP 0, len 8, 
flag 0x8000 (M)
Feb 28 09:02:54 210.80.157.1 30586: 16:04:34: L2X: Parse SCCRQ
Feb 28 09:02:54 210.80.157.1 30587: 16:04:34: L2X: Parse  AVP 2, len 8, 
flag 0x8000 (M)
Feb 28 09:02:54 210.80.157.1 30588: 16:04:34: L2X: Protocol Ver 256
Feb 28 09:02:54 210.80.157.1 30589: 16:04:34: L2X: Parse  AVP 7, len 20, 
flag 0x8000 (M)
Feb 28 09:02:54 210.80.157.1 30590: 16:04:34: L2X: Hostname nxxxxxxxk-vez8
Feb 28 09:02:54 210.80.157.1 30591: 16:04:34: L2X: Parse  AVP 3, len 10, 
flag 0x8000 (M)
Feb 28 09:02:54 210.80.157.1 30592: 16:04:34: L2X: Framing Cap 0x1
Feb 28 09:02:54 210.80.157.1 30593: 16:04:34: L2X: Parse  AVP 9, len 8, 
flag 0x8000 (M)
Feb 28 09:02:54 210.80.157.1 30594: 16:04:34: L2X: Assigned Tunnel ID 668
Feb 28 09:02:54 210.80.157.1 30595: 16:04:34: L2X: Parse  AVP 10, len 8, 
flag 0x8000 (M)
Feb 28 09:02:54 210.80.157.1 30596: 16:04:34: L2X: Rx Window Size 64
Feb 28 09:02:54 210.80.157.1 30597: 16:04:34: L2X: Parse  AVP 11, len 
29, flag 0x8000 (M)
Feb 28 09:02:54 210.80.157.1 30598: 16:04:34: L2X: Chlng 
Feb 28 09:02:54 210.80.157.1 30599:      C5 A0 78 0E F2 39 21 08 C3 2E 
9F F6 AE F6 EC 4B
Feb 28 09:02:54 210.80.157.1 30600:      7F 34 58 93 68 4E 5A
Feb 28 09:02:54 210.80.157.1 30601: 16:04:34: L2X: Parse  AVP 6, len 8, 
flag 0x0
Feb 28 09:02:54 210.80.157.1 30602: 16:04:34: L2X: Firmware Ver 0x1428
Feb 28 09:02:54 210.80.157.1 30603: 16:04:34: L2X: Parse  AVP 8, len 28, 
flag 0x0
Feb 28 09:02:54 210.80.157.1 30604: 16:04:34: L2X: Vendor Name Juniper 
Networks, Inc.
Feb 28 09:02:54 210.80.157.1 30605: 16:04:34: L2X: Parse  AVP 76, len 
12, flag 0x0
Feb 28 09:02:54 210.80.157.1 30606: 16:04:34: L2X: Unknown  AVP 76 in CM 
SCCRQ
Feb 28 09:02:54 210.80.157.1 30607: 16:04:34: L2X: Ignoring unknown  AVP 76
Feb 28 09:02:54 210.80.157.1 30608: 16:04:34: L2X: Unknown AVP found 
during length verification. AVP is 76, vendor code is 0, len is 12
Feb 28 09:02:54 210.80.157.1 30609: 16:04:34: L2X: Ignoring unknown  AVP 76
Feb 28 09:02:54 210.80.157.1 30610: 16:04:34: L2X: No missing AVPs in SCCRQ
Feb 28 09:02:54 210.80.157.1 30611: 16:04:34: L2X: I SCCRQ, flg TLS, ver 
2, len 151, tnl 0, cl 0, ns 0, nr 0
Feb 28 09:02:55 210.80.157.1 30612:      C8 02 00 97 00 00 00 00 00 00 
00 00 80 08 00 00
Feb 28 09:02:55 210.80.157.1 30613:      00 00 00 01 80 08 00 00 00 02 
01 00 80 14 00 00
Feb 28 09:02:55 210.80.157.1 30614:      00 07 6E 32 31 35 38 37 32 36 
6B 2D 76 65 7A ...
Feb 28 09:02:55 210.80.157.1 30615: 16:04:34: L2TP: I SCCRQ from 
nxxxxxxxk-vez8 tnl 668
Feb 28 09:02:56 210.80.157.1 30616: 16:04:36:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:02:56 210.80.157.1 30617: 16:04:36:   Tnl59502 L2TP: Control 
channel retransmit delay set to 4 seconds
Feb 28 09:02:56 210.80.157.1 30618: 16:04:37: L2X: Parse  AVP 0, len 8, 
flag 0x8000 (M)
Feb 28 09:02:56 210.80.157.1 30619: 16:04:37: L2X: Parse SCCRQ
Feb 28 09:02:56 210.80.157.1 30620: 16:04:37: L2X: Parse  AVP 2, len 8, 
flag 0x8000 (M)
Feb 28 09:02:56 210.80.157.1 30621: 16:04:37: L2X: Protocol Ver 256
Feb 28 09:02:56 210.80.157.1 30622: 16:04:37: L2X: Parse  AVP 7, len 20, 
flag 0x8000 (M)
Feb 28 09:02:56 210.80.157.1 30623: 16:04:37: L2X: Hostname nxxxxxxxxk-vez8
Feb 28 09:02:56 210.80.157.1 30624: 16:04:37: L2X: Parse  AVP 3, len 10, 
flag 0x8000 (M)
Feb 28 09:02:56 210.80.157.1 30625: 16:04:37: L2X: Framing Cap 0x1
Feb 28 09:02:56 210.80.157.1 30626: 16:04:37: L2X: Parse  AVP 9, len 8, 
flag 0x8000 (M)
Feb 28 09:02:56 210.80.157.1 30627: 16:04:37: L2X: Assigned Tunnel ID 668
Feb 28 09:02:56 210.80.157.1 30628: 16:04:37: L2X: Parse  AVP 10, len 8, 
flag 0x8000 (M)
Feb 28 09:02:56 210.80.157.1 30629: 16:04:37: L2X: Rx Window Size 64
Feb 28 09:02:56 210.80.157.1 30630: 16:04:37: L2X: Parse  AVP 11, len 
29, flag 0x8000 (M)
Feb 28 09:02:56 210.80.157.1 30631: 16:04:37: L2X: Chlng 
Feb 28 09:02:56 210.80.157.1 30632:      C5 A0 78 0E F2 39 21 08 C3 2E 
9F F6 AE F6 EC 4B
Feb 28 09:02:56 210.80.157.1 30633:      7F 34 58 93 68 4E 5A
Feb 28 09:02:56 210.80.157.1 30634: 16:04:37: L2X: Parse  AVP 6, len 8, 
flag 0x0
Feb 28 09:02:56 210.80.157.1 30635: 16:04:37: L2X: Firmware Ver 0x1428
Feb 28 09:02:56 210.80.157.1 30636: 16:04:37: L2X: Parse  AVP 8, len 28, 
flag 0x0
Feb 28 09:02:56 210.80.157.1 30637: 16:04:37: L2X: Vendor Name Juniper 
Networks, Inc.
Feb 28 09:02:56 210.80.157.1 30638: 16:04:37: L2X: Parse  AVP 76, len 
12, flag 0x0
Feb 28 09:02:56 210.80.157.1 30639: 16:04:37: L2X: Unknown  AVP 76 in CM 
SCCRQ
Feb 28 09:02:56 210.80.157.1 30640: 16:04:37: L2X: Ignoring unknown  AVP 76
Feb 28 09:02:56 210.80.157.1 30641: 16:04:37: L2X: Unknown AVP found 
during length verification. AVP is 76, vendor code is 0, len is 12
Feb 28 09:02:56 210.80.157.1 30642: 16:04:37: L2X: Ignoring unknown  AVP 76
Feb 28 09:02:56 210.80.157.1 30643: 16:04:37: L2X: No missing AVPs in SCCRQ
Feb 28 09:02:57 210.80.157.1 30644: 16:04:37: L2X: I SCCRQ, flg TLS, ver 
2, len 151, tnl 0, cl 0, ns 0, nr 0
Feb 28 09:02:57 210.80.157.1 30645:      C8 02 00 97 00 00 00 00 00 00 
00 00 80 08 00 00
Feb 28 09:02:57 210.80.157.1 30646:      00 00 00 01 80 08 00 00 00 02 
01 00 80 14 00 00
Feb 28 09:02:57 210.80.157.1 30647:      00 07 6E 32 31 35 38 37 32 36 
6B 2D 76 65 7A ...
Feb 28 09:02:57 210.80.157.1 30648: 16:04:37: L2TP: I SCCRQ from 
nxxxxxxxxk-vez8 tnl 668
Feb 28 09:03:00 210.80.157.1 30649: 16:04:40:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:03:00 210.80.157.1 30650: 16:04:40:   Tnl59502 L2TP: Control 
channel retransmit delay set to 8 seconds
Feb 28 09:03:00 210.80.157.1 30651: 16:04:41: L2X: Parse  AVP 0, len 8, 
flag 0x8000 (M)
Feb 28 09:03:00 210.80.157.1 30652: 16:04:41: L2X: Parse SCCRQ
Feb 28 09:03:00 210.80.157.1 30653: 16:04:41: L2X: Parse  AVP 2, len 8, 
flag 0x8000 (M)
Feb 28 09:03:00 210.80.157.1 30654: 16:04:41: L2X: Protocol Ver 256
Feb 28 09:03:00 210.80.157.1 30655: 16:04:41: L2X: Parse  AVP 7, len 20, 
flag 0x8000 (M)
Feb 28 09:03:00 210.80.157.1 30656: 16:04:41: L2X: Hostname nxxxxxxxxk-vez8
Feb 28 09:03:00 210.80.157.1 30657: 16:04:41: L2X: Parse  AVP 3, len 10, 
flag 0x8000 (M)
Feb 28 09:03:00 210.80.157.1 30658: 16:04:41: L2X: Framing Cap 0x1
Feb 28 09:03:00 210.80.157.1 30659: 16:04:41: L2X: Parse  AVP 9, len 8, 
flag 0x8000 (M)
Feb 28 09:03:00 210.80.157.1 30660: 16:04:41: L2X: Assigned Tunnel ID 668
Feb 28 09:03:00 210.80.157.1 30661: 16:04:41: L2X: Parse  AVP 10, len 8, 
flag 0x8000 (M)
Feb 28 09:03:00 210.80.157.1 30662: 16:04:41: L2X: Rx Window Size 64
Feb 28 09:03:00 210.80.157.1 30663: 16:04:41: L2X: Parse  AVP 11, len 
29, flag 0x8000 (M)
Feb 28 09:03:00 210.80.157.1 30664: 16:04:41: L2X: Chlng 
Feb 28 09:03:00 210.80.157.1 30665:      C5 A0 78 0E F2 39 21 08 C3 2E 
9F F6 AE F6 EC 4B
Feb 28 09:03:00 210.80.157.1 30666:      7F 34 58 93 68 4E 5A
Feb 28 09:03:00 210.80.157.1 30667: 16:04:41: L2X: Parse  AVP 6, len 8, 
flag 0x0
Feb 28 09:03:00 210.80.157.1 30668: 16:04:41: L2X: Firmware Ver 0x1428
Feb 28 09:03:00 210.80.157.1 30669: 16:04:41: L2X: Parse  AVP 8, len 28, 
flag 0x0
Feb 28 09:03:00 210.80.157.1 30670: 16:04:41: L2X: Vendor Name Juniper 
Networks, Inc.
Feb 28 09:03:00 210.80.157.1 30671: 16:04:41: L2X: Parse  AVP 76, len 
12, flag 0x0
Feb 28 09:03:00 210.80.157.1 30672: 16:04:41: L2X: Unknown  AVP 76 in CM 
SCCRQ
Feb 28 09:03:00 210.80.157.1 30673: 16:04:41: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:00 210.80.157.1 30674: 16:04:41: L2X: Unknown AVP found 
during length verification. AVP is 76, vendor code is 0, len is 12
Feb 28 09:03:00 210.80.157.1 30675: 16:04:41: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:00 210.80.157.1 30676: 16:04:41: L2X: No missing AVPs in SCCRQ
Feb 28 09:03:01 210.80.157.1 30677: 16:04:41: L2X: I SCCRQ, flg TLS, ver 
2, len 151, tnl 0, cl 0, ns 0, nr 0
Feb 28 09:03:01 210.80.157.1 30678:      C8 02 00 97 00 00 00 00 00 00 
00 00 80 08 00 00
Feb 28 09:03:01 210.80.157.1 30679:      00 00 00 01 80 08 00 00 00 02 
01 00 80 14 00 00
Feb 28 09:03:01 210.80.157.1 30680:      00 07 6E 32 31 35 38 37 32 36 
6B 2D 76 65 7A ...
Feb 28 09:03:01 210.80.157.1 30681: 16:04:41: L2TP: I SCCRQ from 
nxxxxxxxxk-vez8 tnl 668
Feb 28 09:03:08 210.80.157.1 30682: 16:04:48:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:03:08 210.80.157.1 30683: 16:04:49: L2X: Parse  AVP 0, len 8, 
flag 0x8000 (M)
Feb 28 09:03:08 210.80.157.1 30684: 16:04:49: L2X: Parse SCCRQ
Feb 28 09:03:08 210.80.157.1 30685: 16:04:49: L2X: Parse  AVP 2, len 8, 
flag 0x8000 (M)
Feb 28 09:03:08 210.80.157.1 30686: 16:04:49: L2X: Protocol Ver 256
Feb 28 09:03:08 210.80.157.1 30687: 16:04:49: L2X: Parse  AVP 7, len 20, 
flag 0x8000 (M)
Feb 28 09:03:08 210.80.157.1 30688: 16:04:49: L2X: Hostname nxxxxxxxxxk-vez8
Feb 28 09:03:08 210.80.157.1 30689: 16:04:49: L2X: Parse  AVP 3, len 10, 
flag 0x8000 (M)
Feb 28 09:03:08 210.80.157.1 30690: 16:04:49: L2X: Framing Cap 0x1
Feb 28 09:03:08 210.80.157.1 30691: 16:04:49: L2X: Parse  AVP 9, len 8, 
flag 0x8000 (M)
Feb 28 09:03:08 210.80.157.1 30692: 16:04:49: L2X: Assigned Tunnel ID 668
Feb 28 09:03:08 210.80.157.1 30693: 16:04:49: L2X: Parse  AVP 10, len 8, 
flag 0x8000 (M)
Feb 28 09:03:08 210.80.157.1 30694: 16:04:49: L2X: Rx Window Size 64
Feb 28 09:03:08 210.80.157.1 30695: 16:04:49: L2X: Parse  AVP 11, len 
29, flag 0x8000 (M)
Feb 28 09:03:08 210.80.157.1 30696: 16:04:49: L2X: Chlng 
Feb 28 09:03:08 210.80.157.1 30697:      C5 A0 78 0E F2 39 21 08 C3 2E 
9F F6 AE F6 EC 4B
Feb 28 09:03:08 210.80.157.1 30698:      7F 34 58 93 68 4E 5A
Feb 28 09:03:08 210.80.157.1 30699: 16:04:49: L2X: Parse  AVP 6, len 8, 
flag 0x0
Feb 28 09:03:08 210.80.157.1 30700: 16:04:49: L2X: Firmware Ver 0x1428
Feb 28 09:03:08 210.80.157.1 30701: 16:04:49: L2X: Parse  AVP 8, len 28, 
flag 0x0
Feb 28 09:03:08 210.80.157.1 30702: 16:04:49: L2X: Vendor Name Juniper 
Networks, Inc.
Feb 28 09:03:08 210.80.157.1 30703: 16:04:49: L2X: Parse  AVP 76, len 
12, flag 0x0
Feb 28 09:03:08 210.80.157.1 30704: 16:04:49: L2X: Unknown  AVP 76 in CM 
SCCRQ
Feb 28 09:03:08 210.80.157.1 30705: 16:04:49: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:08 210.80.157.1 30706: 16:04:49: L2X: Unknown AVP found 
during length verification. AVP is 76, vendor code is 0, len is 12
Feb 28 09:03:08 210.80.157.1 30707: 16:04:49: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:08 210.80.157.1 30708: 16:04:49: L2X: No missing AVPs in SCCRQ
Feb 28 09:03:08 210.80.157.1 30709: 16:04:49: L2X: I SCCRQ, flg TLS, ver 
2, len 151, tnl 0, cl 0, ns 0, nr 0
Feb 28 09:03:09 210.80.157.1 30710:      C8 02 00 97 00 00 00 00 00 00 
00 00 80 08 00 00
Feb 28 09:03:09 210.80.157.1 30711:      00 00 00 01 80 08 00 00 00 02 
01 00 80 14 00 00
Feb 28 09:03:09 210.80.157.1 30712:      00 07 6E 32 31 35 38 37 32 36 
6B 2D 76 65 7A ...
Feb 28 09:03:09 210.80.157.1 30713: 16:04:49: L2TP: I SCCRQ from 
nxxxxxxxxk-vez8 tnl 668
Feb 28 09:03:17 210.80.157.1 30714: 16:04:56:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:03:24 210.80.157.1 30715: 16:05:04:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:03:24 210.80.157.1 30716: 16:05:05: L2X: Parse  AVP 0, len 8, 
flag 0x8000 (M)
Feb 28 09:03:24 210.80.157.1 30717: 16:05:05: L2X: Parse SCCRQ
Feb 28 09:03:24 210.80.157.1 30718: 16:05:05: L2X: Parse  AVP 2, len 8, 
flag 0x8000 (M)
Feb 28 09:03:24 210.80.157.1 30719: 16:05:05: L2X: Protocol Ver 256
Feb 28 09:03:24 210.80.157.1 30720: 16:05:05: L2X: Parse  AVP 7, len 20, 
flag 0x8000 (M)
Feb 28 09:03:24 210.80.157.1 30721: 16:05:05: L2X: Hostname nxxxxxxxk-vez8
Feb 28 09:03:24 210.80.157.1 30722: 16:05:05: L2X: Parse  AVP 3, len 10, 
flag 0x8000 (M)
Feb 28 09:03:24 210.80.157.1 30723: 16:05:05: L2X: Framing Cap 0x1
Feb 28 09:03:24 210.80.157.1 30724: 16:05:05: L2X: Parse  AVP 9, len 8, 
flag 0x8000 (M)
Feb 28 09:03:24 210.80.157.1 30725: 16:05:05: L2X: Assigned Tunnel ID 668
Feb 28 09:03:24 210.80.157.1 30726: 16:05:05: L2X: Parse  AVP 10, len 8, 
flag 0x8000 (M)
Feb 28 09:03:24 210.80.157.1 30727: 16:05:05: L2X: Rx Window Size 64
Feb 28 09:03:24 210.80.157.1 30728: 16:05:05: L2X: Parse  AVP 11, len 
29, flag 0x8000 (M)
Feb 28 09:03:24 210.80.157.1 30729: 16:05:05: L2X: Chlng 
Feb 28 09:03:24 210.80.157.1 30730:      C5 A0 78 0E F2 39 21 08 C3 2E 
9F F6 AE F6 EC 4B
Feb 28 09:03:24 210.80.157.1 30731:      7F 34 58 93 68 4E 5A
Feb 28 09:03:24 210.80.157.1 30732: 16:05:05: L2X: Parse  AVP 6, len 8, 
flag 0x0
Feb 28 09:03:24 210.80.157.1 30733: 16:05:05: L2X: Firmware Ver 0x1428
Feb 28 09:03:24 210.80.157.1 30734: 16:05:05: L2X: Parse  AVP 8, len 28, 
flag 0x0
Feb 28 09:03:24 210.80.157.1 30735: 16:05:05: L2X: Vendor Name Juniper 
Networks, Inc.
Feb 28 09:03:24 210.80.157.1 30736: 16:05:05: L2X: Parse  AVP 76, len 
12, flag 0x0
Feb 28 09:03:24 210.80.157.1 30737: 16:05:05: L2X: Unknown  AVP 76 in CM 
SCCRQ
Feb 28 09:03:24 210.80.157.1 30738: 16:05:05: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:24 210.80.157.1 30739: 16:05:05: L2X: Unknown AVP found 
during length verification. AVP is 76, vendor code is 0, len is 12
Feb 28 09:03:24 210.80.157.1 30740: 16:05:05: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:24 210.80.157.1 30741: 16:05:05: L2X: No missing AVPs in SCCRQ
Feb 28 09:03:24 210.80.157.1 30742: 16:05:05: L2X: I SCCRQ, flg TLS, ver 
2, len 151, tnl 0, cl 0, ns 0, nr 0
Feb 28 09:03:25 210.80.157.1 30743:      C8 02 00 97 00 00 00 00 00 00 
00 00 80 08 00 00
Feb 28 09:03:25 210.80.157.1 30744:      00 00 00 01 80 08 00 00 00 02 
01 00 80 14 00 00
Feb 28 09:03:25 210.80.157.1 30745:      00 07 6E 32 31 35 38 37 32 36 
6B 2D 76 65 7A ...
Feb 28 09:03:25 210.80.157.1 30746: 16:05:05: L2TP: I SCCRQ from 
nxxxxxxxxxk-vez8 tnl 668
Feb 28 09:03:33 210.80.157.1 30747: 16:05:12:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:03:40 210.80.157.1 30748: 16:05:20:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:03:40 210.80.157.1 30749: 16:05:21: L2X: Parse  AVP 0, len 8, 
flag 0x8000 (M)
Feb 28 09:03:40 210.80.157.1 30750: 16:05:21: L2X: Parse SCCRQ
Feb 28 09:03:40 210.80.157.1 30751: 16:05:21: L2X: Parse  AVP 2, len 8, 
flag 0x8000 (M)
Feb 28 09:03:40 210.80.157.1 30752: 16:05:21: L2X: Protocol Ver 256
Feb 28 09:03:40 210.80.157.1 30753: 16:05:21: L2X: Parse  AVP 7, len 20, 
flag 0x8000 (M)
Feb 28 09:03:40 210.80.157.1 30754: 16:05:21: L2X: Hostname n2158726k-vez8
Feb 28 09:03:40 210.80.157.1 30755: 16:05:21: L2X: Parse  AVP 3, len 10, 
flag 0x8000 (M)
Feb 28 09:03:40 210.80.157.1 30756: 16:05:21: L2X: Framing Cap 0x1
Feb 28 09:03:40 210.80.157.1 30757: 16:05:21: L2X: Parse  AVP 9, len 8, 
flag 0x8000 (M)
Feb 28 09:03:40 210.80.157.1 30758: 16:05:21: L2X: Assigned Tunnel ID 668
Feb 28 09:03:40 210.80.157.1 30759: 16:05:21: L2X: Parse  AVP 10, len 8, 
flag 0x8000 (M)
Feb 28 09:03:40 210.80.157.1 30760: 16:05:21: L2X: Rx Window Size 64
Feb 28 09:03:40 210.80.157.1 30761: 16:05:21: L2X: Parse  AVP 11, len 
29, flag 0x8000 (M)
Feb 28 09:03:40 210.80.157.1 30762: 16:05:21: L2X: Chlng 
Feb 28 09:03:40 210.80.157.1 30763:      C5 A0 78 0E F2 39 21 08 C3 2E 
9F F6 AE F6 EC 4B
Feb 28 09:03:40 210.80.157.1 30764:      7F 34 58 93 68 4E 5A
Feb 28 09:03:40 210.80.157.1 30765: 16:05:21: L2X: Parse  AVP 6, len 8, 
flag 0x0
Feb 28 09:03:40 210.80.157.1 30766: 16:05:21: L2X: Firmware Ver 0x1428
Feb 28 09:03:40 210.80.157.1 30767: 16:05:21: L2X: Parse  AVP 8, len 28, 
flag 0x0
Feb 28 09:03:40 210.80.157.1 30768: 16:05:21: L2X: Vendor Name Juniper 
Networks, Inc.
Feb 28 09:03:40 210.80.157.1 30769: 16:05:21: L2X: Parse  AVP 76, len 
12, flag 0x0
Feb 28 09:03:40 210.80.157.1 30770: 16:05:21: L2X: Unknown  AVP 76 in CM 
SCCRQ
Feb 28 09:03:40 210.80.157.1 30771: 16:05:21: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:40 210.80.157.1 30772: 16:05:21: L2X: Unknown AVP found 
during length verification. AVP is 76, vendor code is 0, len is 12
Feb 28 09:03:40 210.80.157.1 30773: 16:05:21: L2X: Ignoring unknown  AVP 76
Feb 28 09:03:40 210.80.157.1 30774: 16:05:21: L2X: No missing AVPs in SCCRQ
Feb 28 09:03:40 210.80.157.1 30775: 16:05:21: L2X: I SCCRQ, flg TLS, ver 
2, len 151, tnl 0, cl 0, ns 0, nr 0
Feb 28 09:03:41 210.80.157.1 30776:      C8 02 00 97 00 00 00 00 00 00 
00 00 80 08 00 00
Feb 28 09:03:41 210.80.157.1 30777:      00 00 00 01 80 08 00 00 00 02 
01 00 80 14 00 00
Feb 28 09:03:41 210.80.157.1 30778:      00 07 6E 32 31 35 38 37 32 36 
6B 2D 76 65 7A ...
Feb 28 09:03:41 210.80.157.1 30779: 16:05:21: L2TP: I SCCRQ from 
nxxxxxxxk-vez8 tnl 668
Feb 28 09:03:49 210.80.157.1 30780: 16:05:28:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:03:57 210.80.157.1 30781: 16:05:36:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:04:05 210.80.157.1 30782: 16:05:44:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:04:13 210.80.157.1 30783: 16:05:52:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:04:21 210.80.157.1 30784: 16:06:00:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:04:29 210.80.157.1 30785: 16:06:08:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:04:37 210.80.157.1 30786: 16:06:16:   Tnl59502 L2TP: O Resend 
SCCRP, flg TLS, ver 2, len 152, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:04:45 210.80.157.1 30787: 16:06:24:   Tnl59502 L2TP: O 
StopCCN  to nxxxxxxxxk-vez8 tnlid 668
Feb 28 09:04:45 210.80.157.1 30788: 16:06:24:   Tnl59502 L2TP: O 
StopCCN, flg TLS, ver 2, len 66, tnl 668, cl 0, ns 0, nr 1
Feb 28 09:04:45 210.80.157.1 30789:      C8 02 00 42 02 9C 00 00 00 00 
00 01 80 08 00 00
Feb 28 09:04:45 210.80.157.1 30790:      00 00 00 04 80 08 00 00 00 09 
E8 6E 80 1E 00 00
Feb 28 09:04:45 210.80.157.1 30791:      00 01 00 02 00 06 54 6F 6F 20 
6D 61 6E 79 20 ...
Feb 28 09:04:45 210.80.157.1 30792: 16:06:24:   Tnl59502 L2TP: Tunnel 
state change from wait-ctl-reply to shutting-down
Feb 28 09:04:50 210.80.157.1 30793: 16:06:29:   Tnl59502 L2TP: Shutdown 
tunnel
Feb 28 09:04:50 210.80.157.1 30794: 16:06:29:   Tnl59502 L2TP: Tunnel 
state change from shutting-down to idle

Thanks guys
phani.

cisco-bba-request at puck.nether.net wrote:

>Send cisco-bba mailing list submissions to
>	cisco-bba at puck.nether.net
>
>To subscribe or unsubscribe via the World Wide Web, visit
>	https://puck.nether.net/mailman/listinfo/cisco-bba
>or, via email, send a message with subject or body 'help' to
>	cisco-bba-request at puck.nether.net
>
>You can reach the person managing the list at
>	cisco-bba-owner at puck.nether.net
>
>When replying, please edit your Subject line so it is more specific
>than "Re: Contents of cisco-bba digest..."
>
>
>Today's Topics:
>
>   1. terminating l2 ADSL customers (Sunet Sysadmin)
>   2. Re: terminating l2 ADSL customers (Oliver Boehmer (oboehmer))
>   3. Re: terminating l2 ADSL customers (Stavros Patiniotis)
>
>
>----------------------------------------------------------------------
>
>Message: 1
>Date: Tue, 27 Feb 2007 14:41:29 +1100
>From: Sunet Sysadmin <sysadmin at sunet.com.au>
>Subject: [cisco-bba] terminating l2 ADSL customers
>To: cisco-bba at puck.nether.net
>Message-ID: <45E3A869.3030801 at sunet.com.au>
>Content-Type: text/plain; charset=ISO-8859-1; format=flowed
>
> Hi ,
>I am using cisco 3660 router V-12.2 terminating DSL L2TP VPDN over ATM and  
>freeradius. 
>
>my configuration is as follows
>
>aaa authentication login default local
>aaa authentication ppp default if-needed group radius
>aaa authorization network default group radius 
>aaa session-id common
>
>vpdn enable
>!         
>vpdn-group 1
> accept-dialin
>  protocol l2tp
>  virtual-template 10
> terminate-from hostname 172.31.248.207
> lcp renegotiation always
> l2tp tunnel password 7 xxxxxxxxxxxxxxxxxxx
>!         
>virtual-template 10 pre-clone 600
>
>interface Virtual-Template10
>mtu 1492 
>ip unnumbered FastEthernet0/0.1
>ppp authentication chap pap
>
>this is my configuration to run l2 on ATM(AGVC). 
>I can ping the LAC.
>
>1) do i need to create seperate VPDN-group for each LAC.
>2)People who maintainLAC(which is Telstra in this case) told me session is initiated at their end and they get vpdn service unavailable.
>
>when i start the debug for vpdn packets i don't see any thing. 
>
>Where am i going wrong. can u please point me through the right direction.any help is much appreciated.
>
>
>cheers
>phani. 
>
>
>
>
>
>
> 
>
>
>
>------------------------------
>
>Message: 2
>Date: Tue, 27 Feb 2007 08:25:02 +0100
>From: "Oliver Boehmer \(oboehmer\)" <oboehmer at cisco.com>
>Subject: Re: [cisco-bba] terminating l2 ADSL customers
>To: "Sunet Sysadmin" <sysadmin at sunet.com.au>,
>	<cisco-bba at puck.nether.net>
>Message-ID:
>	<70B7A1CCBFA5C649BD562B6D9F7ED784034DE259 at xmb-ams-333.emea.cisco.com>
>Content-Type: text/plain;	charset="us-ascii"
>
>Sunet Sysadmin <> wrote on Tuesday, February 27, 2007 4:41 AM:
>
>  
>
>> Hi ,
>>I am using cisco 3660 router V-12.2 terminating DSL L2TP VPDN over
>>ATM and 
>>freeradius.
>>
>>my configuration is as follows
>>
>>aaa authentication login default local
>>aaa authentication ppp default if-needed group radius
>>aaa authorization network default group radius
>>aaa session-id common
>>
>>vpdn enable
>>!
>>vpdn-group 1
>> accept-dialin
>>  protocol l2tp
>>  virtual-template 10
>> terminate-from hostname 172.31.248.207
>> lcp renegotiation always
>> l2tp tunnel password 7 xxxxxxxxxxxxxxxxxxx
>>!
>>virtual-template 10 pre-clone 600
>>
>>interface Virtual-Template10
>>mtu 1492
>>ip unnumbered FastEthernet0/0.1
>>ppp authentication chap pap
>>
>>this is my configuration to run l2 on ATM(AGVC).
>>I can ping the LAC.
>>
>>1) do i need to create seperate VPDN-group for each LAC.
>>    
>>
>
>No. Just agree with your partner (Telstra) on a tunnel name and
>reference this one in "terminate-from hostname <name>", see also below.
>
>  
>
>>2)People who maintainLAC(which is Telstra in this case) told me
>>session is initiated at their end and they get vpdn service
>>unavailable.  
>>    
>>
>
>Right, you have "terminate-from hostname 172.31.248.207" configured, and
>IOS treats "172.31.248.207" as a literal name, not as an IP address. So
>please check with Telstra which tunnel name they use, and use this one
>in the vpdn-group..
>
>  
>
>>when i start the debug for vpdn packets i don't see any thing.
>>    
>>
>
>try "debug vpdn l2x-event" or "debug vpdn l2x-packet"..
>
>	oli
>
>
>
>------------------------------
>
>Message: 3
>Date: Tue, 27 Feb 2007 18:04:14 +1030
>From: "Stavros Patiniotis" <stavros at staff.esc.net.au>
>Subject: Re: [cisco-bba] terminating l2 ADSL customers
>To: "'Sunet Sysadmin'" <sysadmin at sunet.com.au>,
>	<cisco-bba at puck.nether.net>
>Message-ID: <0dea01c75a41$ae5b6db0$9f00000a at WKSTN10>
>Content-Type: text/plain;	charset="us-ascii"
>
>
>Hi,
>
>  
>
>>I am using cisco 3660 router V-12.2 terminating DSL L2TP VPDN 
>>over ATM and  
>>freeradius. 
>>    
>>
>
>Really breifly....
>
>  
>
>> terminate-from hostname 172.31.248.207
>>    
>>
>
>Remove this, as the tunnel may be setup from multiple points on Telstras
>network.
>
>Also try adding source-ip x.x.x.x toyou vpdn configuration to ensure you are
>using the right ip address to terminate the tunnel. This is the ip address
>that you have given to Telstra for your LNS.
>
>See how you go with that.
>
>Stav!
>
>
>
>------------------------------
>
>_______________________________________________
>cisco-bba mailing list
>cisco-bba at puck.nether.net
>https://puck.nether.net/mailman/listinfo/cisco-bba
>
>
>End of cisco-bba Digest, Vol 45, Issue 5
>****************************************
>  
>


More information about the cisco-bba mailing list