debug ip rtp header-compression
To display events specific to Real-Time Transport Protocol (RTP) header compression, use the debug ip rtp header-compression command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ip rtp header-compression
no debug ip rtp header-compression
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Examples
The following is sample output from the debug ip rtp header-compression command:
Router# debug ip rtp header-compression
RHC BRI0: rcv compressed rtp packet
RHC BRI0: context0: expected sequence 0, received sequence 0
RHC BRI0: rcv compressed rtp packet
RHC BRI0: context0: expected sequence 1, received sequence 1
RHC BRI0: rcv compressed rtp packet
RHC BRI0: context0: expected sequence 2, received sequence 2
RHC BRI0: rcv compressed rtp packet
RHC BRI0: context0: expected sequence 3, received sequence 3
The table below describes the significant fields shown in the display.
Field |
Description |
---|---|
context0 |
Compression state for a connection 0. |
expected sequence |
RTP header compression link sequence (expected). |
received sequence |
RTP header compression link sequence (actually received). |