Analyzing malformed and unexpected packets

OMPROUTE issues console messages to report errors in the received OSPF packets. In addition, OMPROUTE tracks the number of malformed and unexpected packets that are received for the OSPF packet statistics. If such packets are being received, contact the manufacturer of the routing application that is sending them. The malformed packets are viewable for analysis from the following documentation:
  • Network sniffer trace
  • IP packet trace
  • OMPROUTE trace and debug output

An IP packet trace (SYSTCPDA) can be used to obtain traces of IPv4 and IPv6 OSPF packets flowing from and into TCP/IP on a z/OS® Communications Server host. The PKTTRACE statement or command enable you to trace IP packets as they enter or leave TCP/IP. The IP packets can be filtered to the OSPF protocol number by using the PROT option on the PKTTRACE statement or command.

To track the number of malformed and unexpected packets that are received, take the following steps:
  • Issue the command to display detailed information about an OSPF interface and analyze the # ERR PKTS RCVD field in the report to see the total number of packets received on the interface that contained errors.
  • Issue the command to display detailed information about an OSPF neighbor and analyze the # ERR LS RVCD field in the report to see the total number of advertisements received from the neighbor that were unexpected or contained errors.