ON THIS PAGE
request support information
Syntax
request support information <brief> <cos> <dot1x> <evpn-mpls | evpn-vxlan | evpn-vxlan-pfe | evpn-vxlan-xml> <interface-debug> <ipsec-vpn> <security-components> <with-components> <with-logs> <with-options>
Syntax (ACX Series Router)
request support information <archive> <cos> <dot1x> <evpn-mpls> <evpn-vxlan> <with-components> <with-logs> <with-options>
Syntax (EX Series Switch)
request support information <brief> <cos> <dot1x> <evpn-mpls | evpn-vxlan | evpn-vxlan-pfe | evpn-vxlan-xml> <interface-debug> <ipsec-vpn> <security-components> <with-components> <with-logs> <with-options>
Syntax (MX Series Router)
request support information <archive> <cos> <dot1x> <evpn-mpls> <evpn-vxlan> <with-components> <with-logs> <with-options>
Syntax (PTX Series Router)
request support information <archive> <cos> <dot1x> <evpn-mpls> <evpn-vxlan> <with-components> <with-logs> <with-options>
Syntax (QFX Series Switches for Junos OS Evolved)
request support information <archive> <evpn-vxlan-pfe> <evpn-vxlan-xml> <with-components> <with-logs> <with-options> <default> <cos> <l3-debug> <evpn-vxlan>
Syntax (SRX Series Firewalls)
request support information <archive> <dot1x> <evpn-mpls> <evpn-vxlan> <security-components component> <with-components> <with-logs> <with-options>
Description
Display all configuration data for the system, including data hidden with the
apply-flags omit command. Issue this command before contacting
customer support, and then include the command output in your support request. Output from
this command varies somewhat, depending on which platform you issue the command from.
However, the command always executes a series of show commands, with the
appropriate information for your device automatically included.
The output from this command could be very long (thousands of lines of output). You might often want to redirect the output to a file (such as /var/log/rsi.log), as follows:
request support information <options> | save filename
The default file path for QFX Series switches with Junos OS Evolved files is /var/tmp.
Options
| brief |
(Optional) Display brief information for the command output. Without this option, display of the output can take a long time to complete. |
| archive |
Display a compressed archive file (tar.gz) in the
/var/tmp/rsi directory containing all output from the
|
| cos |
Display detailed information for Class of Service (Cos). |
| dot1x |
Display detailed dot1x status report. Note:
If you are logged in as a root user, this option skips any user interaction. |
| evpn-mpls |
(Optional) Display system information including in-depth EVPN control plane and Packet Forwarding Engine (PFE) status for EVPN-MPLS fabric configurations. The output includes:
|
| evpn-vxlan |
(Optional) Display system information including in-depth EVPN control plane and PFE status for EVPN-VXLAN fabric configurations. The output includes:
|
| ipsec-vpn |
(Optional) Display detailed system information for IPsec VPN. |
| all-members |
(EX Series switches and MX Series routers) (Optional) Display system information for all members of the Virtual Chassis configuration. |
| local |
(EX Series switches and MX Series routers) (Optional) Display system information for the local Virtual Chassis member. |
| l3-debug |
Display detailed information for L3 switching. |
| member member-id |
(EX Series switches and MX Series routers) (Optional) Display system information for
the specified member of the Virtual Chassis configuration. On EX Series switches,
replace |
| secure-gateway |
(SRX5400, SRX5600, and SRX5800 devices) (Optional) Display system information for secure gateway deployment scenarios. |
| security-components component |
(SRX Series) (Optional) Display information on security components.
|
| node |
(SRX5400, SRX5600, and SRX5800 devices) (Optional) Display detailed system status report for all nodes or a specific node.
|
| with-logs |
Display a compressed archive file (tar.gz) containing all output
from the Note:
The compressed archive file (tar.gz) contains log files located only in the /var/log directory, not in the /var/log/trace directory. |
| with-components |
Display a compressed archive file (tar.gz) containing output
from the component specific
|
| with-options |
Display a compressed archive file (tar.gz) containing output from the component
specific |
Additional Information
The show commands issued as a result of this command vary depending on
which platform you issue the command from. Output is always appropriate for the device. For
example, Table 1
lists the show commands that are called when you issue request
support information on an MX Series router.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The no-forwarding option ensures that all mgd processes
associated with the show command are properly halted if you break into
the output (Ctrl+C) while the command is still running.
Show command show interfaces extensive no-forwarding is not supported
for request support information brief command.
Table 2 lists the show commands that are called when you issue request
support information ipsec-vpn on a MX Series Router.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Starting in Release 20.2R1, Junos OS introduces ipsec-vpn option to the
existing request support information command. The request support
information ipsec-vpn command displays all the configurations, states, and
statistics at Routing Engine and Service Card level. This new option helps in debugging
IPsec-VPN related issues. The information collection is streamlined and reduces the output
file size.
Table 3
lists the show commands that are called when you issue request
support information on an EX Series 9200 switch. The table does not include the
no-forwarding option, which is used for purposes of the request
support information, itself.
|
|
|
|
show chassis fpcdetail |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Table 4 lists
the show commands that are called when you issue request support
information on SRX Series Firewalls.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
show security nat destination pool
all |
show security nat destination pool all
all-logical-systems-tenants |
show security nat destination rule
all |
show security nat destination summary
|
show security nat destination summary
no-forwarding all-logical-systems-tenants |
show security nat interface-nat-ports
no-forwarding all-logical-systems-tenants |
show security nat resource-usage source-pool all
|
show security nat source
deterministic |
show security nat source paired-address
all-logical-systems-tenants |
show security nat source persistent-nat-table all
all-logical-systems-tenants |
show security nat source persistent-nat-table
summary |
show security nat source pool all
|
show security nat source pool all
all-logical-systems-tenants |
show security nat source port-block
all-logical-systems-tenants |
show security nat source rule all
|
show security nat source summary |
show security nat source summary no-forwarding
all-logical-systems-tenants |
show security nat static rule all no-forwarding
all-logical-systems-tenants |
Starting in Junos OS Release 15.1X49-D110, on SRX5400, SRX5600, and SRX5800 devices, a new
option secure-gateway is added to the existing request support
information command. This new option displays all the required information that
is relevant for secure gateway deployment scenarios. In Junos OS Release 15.1X49-D100 and
earlier, request support information displays the information about all features that might
not be relevant for secure gateway deployments.
Starting in Junos OS Release 20.2R1, we’ve introduced the CLI ipsec-vpn
option to the existing request support information security-components
command. This new option displays all the configuration, states, and statistics information
necessary for debugging IPsec VPN related issues.
Required Privilege Level
Output Fields
For information about output fields, see the description for the specific command-–listed in the output– in which you are interested.
Sample Output
- request support information | save
- request support information security-components nat (SRX Series Firewall)
- request support information (SRX Series Firewall)
- request support information ipsec-vpn (MX Series Router)
request support information | save
user@host> request support information | save hostA Wrote 1143 lines of output to 'hostA' user@host>
request support information security-components nat (SRX Series Firewall)
user@host> request support information security-components nat
root@host> show security nat source pool all
Total pools: 1
Pool name : p1
Pool id : 4
Routing instance : default
Host address base : 0.0.0.0
Port : [1024, 63487]
Twin port : [63488, 65535]
Port overloading : 1
Address assignment : no-paired
Total addresses : 4
Translation hits : 0
Address range Single Ports Twin Ports
10.0.0.0 - 10.0.0.3 0 0
Total used ports : 0 0
root@host> show security nat source rule all
Total rules: 1
Total referenced IPv4/IPv6 ip-prefixes: 1/0
source NAT rule: r1
Rule set : src_rs1
Rule Id : 2
Rule position : 1
From zone : trust
To zone : untrust
Match
Source addresses : 0.0.0.0 - 255.255.255.255
Action : p1
Persistent NAT type : N/A
Persistent NAT mapping type : address-port-mapping
Inactivity timeout : 0
Max session number : 0
Persistent NAT block session: disabled
Translation hits : 0
Successful sessions : 0
Number of sessions : 0
root@host> show security nat source summary
Total port number usage for port translation pool: 258048
Maximum port number for port translation pool: 268435456
Total pools: 1
Pool Address Routing PAT Total
Name Range Instance Address
p1 10.0.0.0-10.0.0.3 default yes 4
Total rules: 1
Rule name : r1
Rule set : src_rs1
Action : p1
From : trust To : untrust
root@host> show security nat destination pool all
Total destination-nat pools: 0
root@host> show security nat destination rule all
Total destination-nat rules: 0
Total referenced IPv4/IPv6 ip-prefixes: 0/0
root@host> show security nat destination summary
Total pools: 0
Total rules: 0
root@host> show security nat source deterministic
root@host> show security nat resource-usage source-pool all
PAT pools(including address-shared pool) port utilization:
Pool : p1
Address : 4 Used : 0 Avail : 258048 Total : 258048 Usage : 0%
root@host> show security nat source persistent-nat-table summary
binding total : 524288
binding in use : 0
enode total : 16777216
enode in use : 0
root@host> show chassis cluster information detail | match "mode:"
error: Chassis cluster is not enabled.
root@host> show security nat source summary no-forwarding all-logical-systems-tenants
Logical system: root-logical-system
Total port number usage for port translation pool: 258048
Maximum port number for port translation pool: 268435456
Total pools: 1
Pool Address Routing PAT Total
Name Range Instance Address
p1 10.0.0.0-10.0.0.3 default yes 4
Total rules: 1
Logical system: root-logical-system
Rule name : r1
Rule set : src_rs1
Action : p1
From : trust To : untrust
root@host> show security nat destination summary no-forwarding all-logical-systems-tenants
Total pools: 0
Total rules: 0
root@host> show security nat static rule all no-forwarding all-logical-systems-tenants
Total static-nat rules: 0
Total referenced IPv4/IPv6 ip-prefixes: 0/0
root@host> show security nat interface-nat-ports no-forwarding all-logical-systems-tenants
Logical system: root-logical-system
Pool Total Single ports Single ports Twin ports Twin ports
index ports allocated available allocated available
0 64510 0 63486 0 1024
1 64510 0 63486 0 1024
2 64510 0 63486 0 1024
3 64510 0 63486 0 1024
4 64510 0 63486 0 1024
5 64510 0 63486 0 1024
6 64510 0 63486 0 1024
7 64510 0 63486 0 1024
8 64510 0 63486 0 1024
9 64510 0 63486 0 1024
10 64510 0 63486 0 1024
11 64510 0 63486 0 1024
12 64510 0 63486 0 1024
13 64510 0 63486 0 1024
14 64510 0 63486 0 1024
15 64510 0 63486 0 1024
16 64510 0 63486 0 1024
17 64510 0 63486 0 1024
18 64510 0 63486 0 1024
19 64510 0 63486 0 1024
20 64510 0 63486 0 1024
21 64510 0 63486 0 1024
22 64510 0 63486 0 1024
23 64510 0 63486 0 1024
24 64510 0 63486 0 1024
25 64510 0 63486 0 1024
26 64510 0 63486 0 1024
27 64510 0 63486 0 1024
28 64510 0 63486 0 1024
29 64510 0 63486 0 1024
30 64510 0 63486 0 1024
31 64510 0 63486 0 1024
32 64510 0 63486 0 1024
33 64510 0 63486 0 1024
34 64510 0 63486 0 1024
35 64510 0 63486 0 1024
36 64510 0 63486 0 1024
37 64510 0 63486 0 1024
38 64510 0 63486 0 1024
39 64510 0 63486 0 1024
40 64510 0 63486 0 1024
41 64510 0 63486 0 1024
42 64510 0 63486 0 1024
43 64510 0 63486 0 1024
44 64510 0 63486 0 1024
45 64510 0 63486 0 1024
46 64510 0 63486 0 1024
47 64510 0 63486 0 1024
48 64510 0 63486 0 1024
49 64510 0 63486 0 1024
50 64510 0 63486 0 1024
51 64510 0 63486 0 1024
52 64510 0 63486 0 1024
53 64510 0 63486 0 1024
54 64510 0 63486 0 1024
55 64510 0 63486 0 1024
56 64510 0 63486 0 1024
57 64510 0 63486 0 1024
58 64510 0 63486 0 1024
59 64510 0 63486 0 1024
60 64510 0 63486 0 1024
61 64510 0 63486 0 1024
62 64510 0 63486 0 1024
63 64510 0 63486 0 1024
root@host> show security nat source pool all all-logical-systems-tenants
Total pools: 1
Logical system: root-logical-system
Pool name : p1
Pool id : 4
Routing instance : default
Host address base : 0.0.0.0
Port : [1024, 63487]
Twin port : [63488, 65535]
Port overloading : 1
Address assignment : no-paired
Total addresses : 4
Translation hits : 0
Address range Single Ports Twin Ports
10.0.0.0 - 10.0.0.3 0 0
Total used ports : 0 0
root@host> show security nat destination pool all all-logical-systems-tenants
Total destination-nat pools: 0
root@host> show security nat source port-block all-logical-systems-tenants
root@host> show security nat source paired-address all-logical-systems-tenants
root@host> show security nat source persistent-nat-table all all-logical-systems-tenants
root@host> show security nat resource-usage source-pool all
PAT pools(including address-shared pool) port utilization:
Pool : p1
Address : 4 Used : 0 Avail : 258048 Total : 258048 Usage : 0%
fwdd is not online, Skipping..
request support information (SRX Series Firewall)
user@host> request support information
root@host> show security dns-cache
DNS entry number: 0
root@host> show security utm web-filtering statistics
UTM web-filtering statistics:
Web-filtering sessions in total: 512000
Web-filtering sessions in use: 0
Fallback: log-and-permit block
Default 0 0
Timeout 0 0
Connectivity 0 0
Too-many-requests 0 0
root@host> show security utm session
UTM session info:
Maximum sessions: 256000
Total allocated sessions: 0
Total freed sessions: 0
Active sessions: 0
root@host> show system uptime no-forwarding
Current time: 2017-07-09 21:38:01 PDT
Time Source: LOCAL CLOCK
System booted: 2017-07-09 20:58:06 PDT (00:39:55 ago)
Protocols started: 2017-07-09 20:58:07 PDT (00:39:54 ago)
Last configured: 2017-06-30 08:56:45 PDT (1w2d 12:41 ago) by user
9:38PM up 40 mins, 1 user, load averages: 0.10, 0.07, 0.04
...
request support information ipsec-vpn (MX Series Router)
user@host> request support information ipsec-vpn
root@mobst480e> show services ipsec-vpn ike security-associations detail | no-more
IKE peer 10.0.1.2
Role: Responder, State: Matured
Initiator cookie: 9425c926b3614be5, Responder cookie: 1bcf54a314423b3f
Exchange type: IKEv2, Authentication method: Pre-shared-keys
Local gateway interface: ge-4/3/3.0
Local: 10.0.1.1, Remote: 10.0.1.2
Lifetime: Expires in 1923 seconds
Peer ike-id: ipv4(any:0,[0..3]=10.0.1.2)
Algorithms:
Authentication : hmac-sha1-96
Encryption : 3des-cbc
Pseudo random function: hmac-sha1
Diffie-Hellman group : 2
Traffic statistics:
Input bytes : 8024
Output bytes : 7744
Input packets: 52
Output packets: 52
Flags: IKE SA created
IPSec security associations: 34 created, 36 deleted
root@mobst480e> show services ipsec-vpn ike statistics | no-more
IKE peer 10.0.1.2
Initiator cookie: 9425c926b3614be5, Responder cookie: 1bcf54a314423b3f
Local: 10.0.1.1, Remote: 10.0.1.2
IPSec security associations: 34 created, 36 deleted
IPSec tunnel rekeys: 17
Exchange type: IKEv2
Traffic statistics:
Input bytes : 8024
Output bytes : 7744
Input packets: 52
Output packets: 52
Delete IPsec SA payload statistics:
Delete IPsec SA payloads received: 18
Delete IPsec SA payloads sent : 17
DPD statistics:
DPD request received : 18
DPD request sent : 0
DPD response received : 0
DPD response sent : 18
DPD response missed : 0
Worst case DPD response delay : 0 msec
DPD sequential response missed : 0
Invalid SPI notification statistics:
Notifications received: 0
Notifications sent : 0
root@mobst480e> show services ipsec-vpn ipsec security-associations detail | no-more
Service set: ss1, IKE Routing-instance: default
Rule: ipsec_vpn_rules_1, Term: term1, Tunnel index: 1
Local gateway: 10.0.1.1, Remote gateway: 10.0.1.2
IPSec inside interface: ms-2/0/0.1, Tunnel MTU: 1500
UDP encapsulate: Disabled, UDP Destination port: 0
Local identity: ipv4_subnet(any:0,[0..7]=192.168.60.0/24)
Remote identity: ipv4_subnet(any:0,[0..7]=192.168.70.0/24)
NATT Detection: Not Detected, NATT keepalive interval: 0
Total uptime: 0 days 2 hrs 45 mins 21 secs
Direction: inbound, SPI: 2957881284, AUX-SPI: 0
Mode: tunnel, Type: dynamic, State: Installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Soft lifetime: Expires in 48 seconds
Hard lifetime: Expires in 88 seconds
Anti-replay service: Enabled, Replay window size: 4096
Copy ToS: Enabled
Copy TTL: Disabled, TTL value: 64
SA lifetime: 180 seconds
Direction: outbound, SPI: 3292864325, AUX-SPI: 0
Mode: tunnel, Type: dynamic, State: Installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Soft lifetime: Expires in 48 seconds
Hard lifetime: Expires in 88 seconds
Anti-replay service: Enabled, Replay window size: 4096
Copy ToS: Enabled
Copy TTL: Disabled, TTL value: 64
SA lifetime: 180 seconds
root@mobst480e> show services ipsec-vpn ipsec statistics | no-more
PIC: ms-2/0/0, Service set: ss1
ESP Statistics:
Encrypted bytes: 0
Decrypted bytes: 0
Encrypted packets: 0
Decrypted packets: 0
AH Statistics:
Input bytes: 0
Output bytes: 0
Input packets: 0
Output packets: 0
Errors:
AH authentication failures: 0
ESP authentication failures: 0
ESP decryption failures: 0
Bad headers: 0, Bad trailers: 0
Replay before window drops: 0, Replayed pkts: 0
IP integrity errors: 0, Exceeds tunnel MTU: 0
Rule lookup failures: 0, No SA errors: 0
Flow errors: 0, Misc errors: 0
Release Information
Command introduced before Junos OS Release 7.4.
Option brief introduced in Junos OS Release 13.2.
Option secure-gateway introduced in Junos OS Release 15.1X49-D110 for
SRX5400, SRX5600, and SRX5800 devices.
Options security-components and ipsec-vpn introduced in
Junos OS Release 20.2R1.
Options evpn-mpls and evpn-vxlan introduced in Junos OS
and Junos OS Evolved Releases 21.2R3, 21.4R2, 21.4R3, and 22.2R1.
Additional EVPN multicast debug information added to evpn-vxlan option
output in Junos OS and Junos OS Evolved Releases 22.4R2 and 23.1R1.
Options archive, with-logs,
with-components, and with-options introduced in Junos OS
and Junos OS Evolved Release 24.2R1.
Option timing-debug added to with-components option to
include timing specific information output in Junos OS Evolved Releases 24.4R1.
Option
nat introduced in Junos OS Release 25.1R1.
Options cos and l3-debug introduced in Junos OS Evolved
Release 25.2R1 for QFX Series Switches.