Cisco Certification: Introduction To ISDN, Part V

The major reason I recommend getting your hands on real Cisco equipment rather than a simulator is that real Cisco routers give you the chance to practice and learn show and debug commands.

The knowledge you acquire from debugs is invaluable. Frankly, it???s this knowledge that puts you above the ???average??? CCNA who doesn???t have that hands-on experience. Watching debugs in action also gives you a head start on the CCNP. Since 90 ??" 95% of CCNAs go on to pursue the CCNP, it???s a great idea to get started with debugs now.

Don???t make the mistake of waiting until you???re studying for your CCNP and CCIE to start learning debugs and shows. The work you do for the CCNA is the foundation for everything you???ll do in the future.

Never, ever, ever practice debugs on a production network. There are debugs that will give you so much information that the router actually becomes overloaded and then locks up. Never practice debugs on a production network.

It???s important to know the proper show and debug commands for ISDN for several reasons. First, by watching ISDN in operation, you can see its processes and better understand what???s going on. Secondly, it???s difficult if not impossible to properly troubleshoot ISDN without knowing the proper show and debug commands. (It???s easy to overlook an ISDN authentication error just by looking at the configuration, but running debug ppp negotiation will quickly show you where the problem lies.)

Let???s take a look at the ISDN show and debug commands that every CCNA and CCNP should know.

Show ISDN Status

If you only know one ISDN show command, it???s got to be this one. Always use this command after configuring your ISDN switch type and any necessary SPIDs. The command will show you the switch type (and will also show you if you did not configure a switch type), and whether the SPIDs you entered are valid:

R1#show isdn status Global ISDN Switchtype = basic-ni < ISDN switch type is correctly configured.> ISDN BRI0 interface

dsl 0, interface ISDN Switchtype = basic-ni

Layer 1 Status:

ACTIVE

Layer 2 Status:

TEI = 91, Ces = 1, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED

TEI = 92, Ces = 2, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED

Spid Status:

TEI 91, ces = 1, state = 5(init)

spid1 configured, no LDN, spid1 sent, spid1 valid < SPID 1 is good.>

Endpoint ID Info: epsf = 0, usid = 1, tid = 1

TEI 92, ces = 2, state = 5(init)

spid2 configured, no LDN, spid2 sent, spid2 valid

Endpoint ID Info: epsf = 0, usid = 3, tid = 1

Layer 3 Status:

0 Active Layer 3 Call(s)

Activated dsl 0 CCBs = 0

The Free Channel Mask: 0x80000003

Once in a while, you???ll get this output from show isdn status:

R2#show isdn status The current ISDN Switchtype = basic-ni1 ISDN BRI0 interface

Layer 1 Status:

ACTIVE

Layer 2 Status:

Layer 2 NOT Activated

Spid Status:

TEI Not Assigned, ces = 1, state = 3(await establishment)

spid1 configured, no LDN, spid1 NOT sent, spid1 NOT valid

TEI Not Assigned, ces = 2, state = 1(terminal down)

spid2 configured, no LDN, spid2 NOT sent, spid2 NOT valid

Check your running configuration, and if the SPIDs look good, simply close the BRI interface and open it again. Then run show ISDN status again. If you then see ???spids are valid???, you???re ready to proceed. If you still see a message that the spids are invalid, you???ve most likely mistyped the SPID.

Show Access-List

What???s this command got to do with ISDN? Everything.

Remember how the ISDN link comes up in the first place? Interesting traffic. By default, there is no interesting traffic. You define interesting traffic with the dialer-list and dialer-group commands, AND the access-list command. If you have a problem with your link never coming up or with it coming up and staying up, use this command to see what traffic has been defined as interesting.

Show Dialer

Another helpful command to determine why an ISDN link is coming up and staying up. This command shows you how many successful calls and failed calls have taken place, what the current idle-timer value is (by default, it???s 120 seconds), and most importantly, what the source and destination was for the current interesting traffic:

R1#show dialer
BRI0 - dialer type = ISDN
Dial String Successes Failures Last called Last status
8358662 1 0 00:00:59
successful
0 incoming call(s) have been screened.
0 incoming call(s) rejected for callback.

BRI0:1 - dialer type = ISDN
Idle timer (120 secs), Fast idle timer (20 secs)
Wait for carrier (30 secs), Re-enable (15 secs)
Dialer state is data link layer up
Dial reason: ip (s=172.12.21.1, d=172.12.21.2) < s=Source, d=Destination >
Time until disconnect 62 secs
< Idle timer, reset by interesting traffic only >
Connected to 8358662 (R2)

Here, you can see that the idle-timer value is at its default, that there are 62 seconds left until the link comes down (unless interesting traffic resets the timer), and that the source of the interesting traffic was 172.12.21.1 and the destination is 172.12.21.2. If that destination is the multicast address of a routing protocol ??" say, 224.0.0.5 for OSPF ??" you know what traffic is keeping the line up.

Show ISDN History

Want to see what calls have been made in the last 15 minutes? Just run this command. It???s helpful if you???re walking in to an ISDN troubleshooting situation and want to see what calls have been made.

R1#show isdn
history-------------------------------------------------------------------------------- ISDN CALL HISTORY--------------------------------------------------------------------------------History table has a maximum of 100 entries.History table data is retained for a maximum of 15 Minutes.--------------------------------------------------------------------------------Call Calling Called Remote Seconds Seconds Seconds ChargesType Number .Number Name Used Left Idle Units/Currency-------------------------------------------------------------------------------------- ---------------------Out 8358662 R2 121 0Out 8358662 R2 121 0--------------------------------------------------------------------------------------------------- --

Debug PPP Negotiation

Not only do you need to know this command for your CCNA and CCNP exams, you MUST know it to be an effective ISDN troubleshooter.

When PPP authentication is first configured, it???s simple to mistype a password, or forget to configure a ???username / password??? combination. Instead of continually reading your running configuration to see what the problem is, run debug ppp negotiation and send a ping to bring the line up. You???ll quickly see where the problem is.

R2#debug ppp negotiation PPP protocol negotiation debugging is on R2#ping 172.12.21.1

BR0:1 PPP: Phase is AUTHENTICATING, by both < Both routers are authenticating the other with CHAP. > BR0:1 CHAP: O CHALLENGE id 1 len 23 from "R2" < R2 is sending a challenge to the remote router. O = ???outgoing???. > BR0:1 CHAP: I CHALLENGE id 1 len 23 from "R1" < A CHAP challenge has come in from R1. I = ???incoming???> BR0:1 CHAP: O RESPONSE id 1 len 23 from "R2" < R2 is sending a response to the challenge. > BR0:1 CHAP: I SUCCESS id 1 len 4 < A success message has come in , indicating the challenge was successfully met. > BR0:1 CHAP: I RESPONSE id 1 len 23 from "R1" < A response to the challenge sent to R1 is now coming in. > BR0:1 CHAP: O SUCCESS id 1 len 4 < The challenge was successfully met by R1, and a success message is sent. >

By mastering these simple ISDN show and debug commands, you increase your chances of passing the CCNA and CCNP exams greatly, and vastly improve your on-the-job skills.

I recommend you visit www.cisco.com/univercd for more show and debug commands. Learning to negotiate this valuable online resource will truly help you become more valuable on the job. Every Cisco router and switch command, along with default and usage guidelines, can be found on this site. I???ll have an article posted soon to help you learn your way around the site; in the meantime, I urge you to begin adding this website to your troubleshooting toolkit.

Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He has written several books that have helped CCNA candidates around the world achieve the coveted CCNA certification, including several concentrating on binary math conversions and subnetting questions that the average CCNA candidate will need to answer on their CCNA exams.

He is the owner of The Bryant Advantage (http://www.thebryantadvantage.com) where he teaches affordable world-class CCNA courses via the Internet, and sells his popular Cisco certification books. He???s proud to have helped CCNA candidates around the world achieve their career goals. Mr. Bryant???s books and courses are sold on his site, on eBay, and on several other major Cisco certification sites.

housekeepers near Buffalo Grove ..
In The News:

Analysts at Silent Push have uncovered a widespread scam that uses counterfeit retail websites to steal the credit card information of online shoppers.
Chrome users need to update their browsers immediately as Google addresses a critical vulnerability that hackers are actively exploiting. Additional security measures are recommended.
A study found teens glance at phones for dangerous two-second intervals while driving, using devices primarily for entertainment, texting and navigation despite crash risks.
Security researchers uncovered a flaw in Windows 11 that allows attackers to disable Secure Boot using Microsoft-signed tools, requiring manual updates to protect against bootkits.
Carnegie Mellon's noninvasive brain technology allows users to move robotic fingers by thinking about the motion, offering new possibilities for people with motor impairments.
Multi-factor authentication (MFA) adds an extra layer of protection to your accounts. Instead of relying only on a password, MFA requires you to verify your identity using two or more methods.
Scientists from Duke, Harvard, and the University of Otago have unveiled a game-changing tool called DunedinPACNI. It uses a single AI brain scan to reveal how fast a person is biologically aging.
A disturbing wave of fake agent phone scams is sweeping across the United States, catching people off guard and draining their savings.
Emojis aren't just playful add-ons; they're powerful tools for building stronger connections in our increasingly digital world.
Google has taken a major step toward the future of clean energy by partnering with Commonwealth Fusion Systems (CFS), an MIT spin-out working to build one of the world’s first commercial fusion reactors.
If you create and share art online, you might have seen messages warning that Facebook's parent company, Meta, claims the right to use or even sell anything you post, whether it's pictures, poems, or artwork.
Cybercriminals hit Qantas in a major data breach that exposed information from up to six million customers.
Having reliable, loud, and timely emergency alerts on your phone or device is important because when severe weather strikes, every second counts.
Here's how your daily brew is becoming the foundation for greener buildings.
Artificial intelligence (AI) and large language models (LLMs), such as ChatGPT, are transforming how we learn. But what does this mean for AI and learning retention?
Modern AI data centers use much more electricity than traditional cloud servers. In many cases, the existing power grid cannot keep up. One innovative solution is gaining traction: repurposed EV batteries for AI data centers.
Microsoft 365 and Outlook users are being targeted by a tactic that injects fake billing alerts directly into their calendars.
Researchers are now showing us that old smartphones as data centers could be the next big thing in sustainable tech.
Scientists have created micro-robots for sinus infection treatment that can enter the nasal cavity, eliminate bacteria directly at the source, and exit without harming surrounding tissue.
Let's examine how your data is collected in everyday life, who is buying and selling it, what happens to it afterward, and, most importantly, what you can do to protect yourself.
Researchers at the University of Sheffield in the U.K. developed small robots called "Pipebots" that can travel inside water pipes to find and potentially repair leaks, all without any excavation.
A groundbreaking new study has uncovered disturbing AI blackmail behavior that many people are unaware of yet.
Four teams of autonomous humanoid robots competed in China's first AI soccer tournament, demonstrating advanced capabilities in ball detection and independent decision-making.
The ID. Buzz autonomous van features self-driving technology with 13 cameras, nine LiDAR units and five radars after Volkswagen partnered with Hamburg and Uber for 2026 deployments.
Social Security phishing scams use urgency and impersonation to steal personal data. Learn how to spot fake SSA emails and implement 10 protective measures.

Business Plan Software Review: Ultimate Business Planner?

One of the main reasons business owners and entrepreneurs use... Read More

Lotus Notes Domino and Web: Application Development ? Tips for Programmers

Beginning with Domino version R4 it has integration with the... Read More

Crystal Reports - Microsoft SQL Server

Microsoft SQL Server is the leader for inexpensive and middle... Read More

Microsoft Navision Customization Upgrade ? Tips For Programmer/IT Specialist

Currently Microsoft Business Solutions is on the way of creating... Read More

Reduce Pop-ups and Annoying Ads

There is many things more frustrating than surfing a website... Read More

Benefits of Integrating Online Chat Software with CRM

Customer Relationship Management (CRM) is a strategy and processes used... Read More

How to Choose the BEST Charting Software

I suggest that you do not spend a lot of... Read More

Is Software Tester a Most Infamous Person in a Software Project Team?

The fact that a software tester is a most infamous... Read More

Are You Waiting for Microsoft Longhorn Operating System

I love new technology. I am still ready to wait... Read More

Create ASP in Minutes

DBxtra goes ASPGetting to the information hidden within corporate databases... Read More

Microsoft CRM for Corporate Business ? Working Offline

If your company has regional and worldwide operations, you might... Read More

Create A Flash Presentation For Free With Open Office

The intentions of this short tutorial are not to teach... Read More

How To Choose A Fire Wall Software Program

In the real world a "fire wall" is a fireproof... Read More

Microsoft CRM: Data Conversion ? Import from Act!

Best Software Act! is very popular CRM for small and... Read More

Falling in Love With More Than One Screensaver: The Fun Part

Having from five to ten and more favorite screensavers is... Read More

Getting Patched with Windows Service Pack

Are you one of those people that keeps track of... Read More

The Top 5 Wrong Reasons For Not Hiring Testers

Considering whether or not your software company should hire a... Read More

Microsoft Great Plains Dynamics on Pervasive SQL.2000 Data Repair ? Overview For DBAs

Some introduction into Great Plains Software products, now Microsoft Business... Read More

Dont Choose Adobe When Working With PDF

While Adobe is the most known maker of PDF tools,... Read More

String in Java

Handling character strings in Java is supported through two final... Read More

Microsoft Great Plains: Annual Enhancement Program ? How To Be Re-Enrolled

Microsoft Business Solutions Great Plains is mid and even corporate... Read More

Save Your Resources - Combine Your IM Clients

There are so many different programs that clutter up your... Read More

Microsoft Great Plains RW: Report Writer

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

Daffodil DB: Web Database

What is a Web Database?A web database is a database... Read More

Microsoft Great Plains FA: Fixed Assets ? Overview For Consultant

Great Plains Fixed Assets Management module is a robust tool... Read More

custom home cleaning Mundelein ..