request support information
Syntax
request support information <brief> <evpn-mpls | evpn-vxlan> <ipsec-vpn>
Syntax (EX Series Switch)
request support information <brief> <all-members> <local> <member member-id>
Syntax (MX Series Router)
request support information <brief> <all-members> <local> <member member-id>
Syntax (SRX Series Firewalls)
request support information <brief> <secure-gateway> <security-components>
Syntax (TX Matrix Router)
request support information <brief> <all-lcc | lcc number | scc>
Syntax (TX Matrix Plus Router)
request support information <brief> <all-chassis | all-lcc | lcc number | sfc number>
Description
Display all configuration data for the system, including data hidden with the
apply-flags omit command. Issue this command before contacting
customer support, and then include the command output in your support request. Output from
this command varies somewhat, depending on which platform you issue the command from.
However, the command always executes a series of show
commands, with the
appropriate information for your device automatically included.
The output from this command could be very long (thousands of lines of output). You might often want to redirect the output to a file (such as /var/log/rsi.log), as follows:
request support information <options> | save filename
Options
brief |
(Optional) Display brief information for the command output. Without this option, display of the output can take a long time to complete. |
evpn-mpls |
(Optional) Display system information including in-depth EVPN control plane and Packet Forwarding Engine (PFE) status for EVPN-MPLS fabric configurations. The output includes:
|
evpn-vxlan |
(Optional) Display system information including in-depth EVPN control plane and PFE status for EVPN-VXLAN fabric configurations. The output includes:
|
ipsec-vpn |
(Optional) Display system information with details for IPsec VPNs. |
all-chassis |
(TX Matrix and TX Matrix Plus routers) (Optional) Display system information for all chassis. |
all-lcc |
(TX Matrix and TX Matrix Plus routers) (Optional) On a TX Matrix router, display system information for all T640 routers (or line-card chassis) connected to the TX Matrix router. On a TX Matrix Plus router, display system information for all chassis for all T1600 or T4000 routers (or line-card chassis) connected to the TX Matrix Plus router. |
all-members |
(EX Series switches and MX Series routers) (Optional) Display system information for all members of the Virtual Chassis configuration. |
lcc number |
(TX Matrix and TX Matrix Plus routers) (Optional) On a TX Matrix router, display system information for a specific T640 router that is connected to the TX Matrix router. On a TX Matrix Plus router, display system storage information for a specific router that is connected to the TX Matrix Plus router. Replace number with the following values depending on the LCC configuration:
|
local |
(EX Series switches and MX Series routers) (Optional) Display system information for the local Virtual Chassis member. |
member member-id |
(EX Series switches and MX Series routers) (Optional) Display system information for
the specified member of the Virtual Chassis configuration. On EX Series switches,
replace |
scc |
(TX Matrix routers) (Optional) Display system information for the TX Matrix router (or switch-card chassis). |
sfc number |
(TX Matrix Plus routers) (Optional) Display system information for the TX Matrix Plus
router (or switch-fabric chassis). Replace |
secure-gateway |
(SRX5400, SRX5600, and SRX5800 devices) (Optional) Display system information for secure gateway deployment scenarios. |
security-component |
(SRX Series) (Optional) Display information on security components.
|
node |
(SRX5400, SRX5600, and SRX5800 devices) (Optional) Display detailed system status report for all nodes or a specific node.
|
Additional Information
The show
commands issued as a result of this command vary depending on
which platform you issue the command from. Output is always appropriate for the device. For
example, Table 1
lists the show
commands that are called when you issue request
support information
on an MX Series router.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The no-forwarding
option ensures that all mgd
processes
associated with the show
command are properly halted if you break into
the output (Ctrl+C) while the command is still running.
Show command show interfaces extensive no-forwarding
is not supported
for request support information brief
command.
Table 2 lists the show
commands that are called when you issue request
support information ipsec-vpn
on a MX Series Router.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Starting in Release 20.2R1, Junos OS introduces ipsec-vpn
option to the
existing request support information
command. The request support
information ipsec-vpn
command displays all the configurations, states, and
statistics at Routing Engine and Service Card level. This new option helps in debugging
IPsec-VPN related issues. The information collection is streamlined and reduces the output
file size.
Table 3
lists the show
commands that are called when you issue request
support information
on an EX Series 9200 switch. The table does not include the
no-forwarding
option, which is used for purposes of the request
support information
, itself.
|
|
show chassis fpcdetail |
|
|
|
|
|
|
|
|
|
|
Table 4 lists
the show
commands that are called when you issue request support
information
on SRX Series Firewalls.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Starting in Junos OS Release 15.1X49-D110, on SRX5400, SRX5600, and SRX5800 devices, a new
option secure-gateway
is added to the existing request support
information
command. This new option displays all the required information that
is relevant for secure gateway deployment scenarios. In Junos OS Release 15.1X49-D100 and
earlier, request support information displays the information about all features that might
not be relevant for secure gateway deployments.
Starting in Junos OS Release 20.2R1, we’ve introduced the CLI ipsec-vpn
option to the existing request support information security-components
command. This new option displays all the configuration, states, and statistics information
necessary for debugging IPsec VPN related issues.
Required Privilege Level
maintenance
Output Fields
For information about output fields, see the description for the specific command-–listed in the output– in which you are interested.
Sample Output
- request support information | save
- request support information scc (TX Matrix Router)
- request support information sfc (TX Matrix Plus Router)
- request support information (SRX Series Firewall)
- request support information ipsec-vpn (MX Series Router)
request support information | save
user@host> request support information | save hostA Wrote 1143 lines of output to 'hostA' user@host>
request support information scc (TX Matrix Router)
user@host> request support information scc user@host> show system uptime scc-re0: -------------------------------------------------------------------------- Current time: 2004-09-15 00:49:06 PDT System booted: 2004-09-14 12:53:26 PDT (11:55:40 ago) Protocols started: 2004-09-14 12:54:19 PDT (11:54:47 ago) Last configured: 2004-09-14 13:07:47 PDT (11:41:19 ago) by user 12:49AM PDT up 11:56, 3 users, load averages: 0.00, 0.02, 0.03 lcc0-re0: -------------------------------------------------------------------------- Current time: 2004-09-15 00:49:06 PDT System booted: 2004-09-14 15:36:41 PDT (09:12:25 ago) Last configured: 2004-09-14 15:38:06 PDT (09:11:00 ago) by root 12:49AM PDT up 9:12, 0 users, load averages: 0.13, 0.05, 0.02 lcc2-re0: -------------------------------------------------------------------------- Current time: 2004-09-15 00:49:06 PDT System booted: 2004-09-14 15:36:47 PDT (09:12:19 ago) Last configured: 2004-09-14 15:38:09 PDT (09:10:57 ago) by root 12:49AM PDT up 9:12, 0 users, load averages: 0.00, 0.00, 0.00 user@host> show version scc-re0: -------------------------------------------------------------------------- Hostname: hostA Model: TX Matrix JUNOS Base OS boot [7.0I20040914_1707_mapte] JUNOS Base OS Software Suite [7.0I20040907_1922_rtuplur] JUNOS Kernel Software Suite [7.0I20040914_1707_mapte] JUNOS Packet Forwarding Engine Support (T Series) [7.0I20040914_1707_mapte] JUNOS Routing Software Suite [7.0I20040914_1707_mapte] JUNOS Online Documentation [7.0I20040914_1707_mapte] JUNOS Crypto Software Suite [7.0I20040914_1707_mapte] JUNOS Support Tools Package [7.0-20040908.0] lcc0-re0: -------------------------------------------------------------------------- Hostname: hostB Model: t640 JUNOS Base OS boot [7.0I20040914_1707_mapte] JUNOS Base OS Software Suite [7.0I20040907_1922_rtuplur] JUNOS Kernel Software Suite [7.0I20040914_1707_mapte] JUNOS Packet Forwarding Engine Support (T-Series) [7.0I20040914_1707_mapte] JUNOS Routing Software Suite [7.0I20040914_1707_mapte] JUNOS Online Documentation [7.0I20040914_1707_mapte] JUNOS Crypto Software Suite [7.0I20040914_1707_mapte] lcc2-re0: -------------------------------------------------------------------------- Hostname: dewey Model: t640 JUNOS Base OS boot [7.0I20040914_1707_mapte] JUNOS Base OS Software Suite [7.0I20040907_1922_rtuplur] JUNOS Kernel Software Suite [7.0I20040914_1707_mapte] JUNOS Packet Forwarding Engine Support (T-Series) [7.0I20040914_1707_mapte] JUNOS Routing Software Suite [7.0I20040914_1707_mapte] JUNOS Online Documentation [7.0I20040914_1707_mapte] JUNOS Crypto Software Suite [7.0I20040914_1707_mapte] ...
request support information sfc (TX Matrix Plus Router)
user@host> request support information sfc 0 sfc0-re0: -------------------------------------------------------------------------- root@host> show system uptime no-forwarding Current time: 2009-05-25 03:43:28 PDT System booted: 2009-05-25 01:15:04 PDT (02:28:24 ago) Protocols started: 2009-05-25 01:16:01 PDT (02:27:27 ago) Last configured: 2009-05-25 03:03:42 PDT (00:39:46 ago) by user 3:43AM up 2:28, 7 users, load averages: 0.00, 0.00, 0.00 root@host> show version detail no-forwarding Hostname: aj Model: txp JUNOS Base OS boot [9.6-20090519.0] JUNOS Base OS Software Suite [9.6-20090519.0] JUNOS Kernel Software Suite [9.6-20090519.0] ... root@host> show system core-dumps no-forwarding -rw------- 1 root wheel 152223744 May 25 03:10 /var/crash/vmcore.0 -rw-r--r-- 1 bdeleon field 139417 May 22 10:17 /var/tmp/aj-core-apps-config-n-gres.txt ... root@host> show chassis alarms no-forwarding 9 alarms currently active Alarm time Class Description 2009-05-25 01:27:08 PDT Minor LCC 0 Minor Errors 2009-05-25 01:27:08 PDT Minor Spare SIB F13 6 Fault ... root@host> show chassis hardware detail no-forwarding Hardware inventory: Item Version Part number Serial number Description Chassis JN112F007AHB TXP Midplane REV 05 710-022574 TS4027 SFC Midplane FPM Display REV 03 710-024027 DX0282 TXP FPM Display ... root@host> show system processes extensive no-forwarding last pid: 6639; load averages: 0.00, 0.00, 0.00 up 0+02:28:54 03:43:28 161 processes: 5 running, 138 sleeping, 18 waiting Mem: 236M Active, 227M Inact, 104M Wired, 392M Cache, 69M Buf, 2296M Free Swap: 2048M Total, 2048M Free PID USERNAME THR PRI NICE SIZE RES STATE TIME WCPU COMMAND 11 root 1 171 52 0K 12K RUN 143:00 96.78% idle 1530 root 1 96 0 38160K 24812K select 2:54 1.12% chassisd 1343 root 1 76 0 0K 12K 0:18 0.00% bcmLINK.0 1345 root 1 76 0 0K 12K 0:15 0.00% brq17: uhci1 uhci* ... root@host> show pfe statistics error Slot 4 SLCHIP Error statistics: SLCHIP 0 1 ------------------------------------------------------- Lin XIF : 0 0 Lin SRCTL : 0 0 ... root@host>show pfe statistics traffic Packet Forwarding Engine traffic statistics: Input packets: 2590754 0 pps Output packets: 2640010 0 pps Packet Forwarding Engine local traffic statistics: Local packets input : 2064527 Local packets output : 2115925 Software input control plane drops : 0 Software input high drops : 0 Software input medium drops : 0 Software input low drops : 0 Software output drops : 0 Hardware input drops : 0 Packet Forwarding Engine local protocol statistics: HDLC keepalives : 0 ATM OAM : 0 Frame Relay LMI : 0 PPP LCP/NCP : 0 OSPF hello : 20048 OSPF3 hello : 109 RSVP hello : 3485 LDP hello : 7191 BFD : 0 IS-IS IIH : 11318 LACP : 0 ARP : 629 ETHER OAM : 930 Unknown : 13212 Packet Forwarding Engine hardware discard statistics: Timeout : 0 Truncated key : 0 Bits to test : 0 Data error : 0 Stack underflow : 0 Stack overflow : 0 Normal discard : 18060 Extended discard : 0 Invalid interface : 0 Info cell drops : 0 Fabric drops : 0 Packet Forwarding Engine Input IPv4 Header Checksum Error and Output MTU Error statistics: Input Checksum : 0 Output MTU : 0 root@host> show chassis routing-engine no-forwarding Routing Engine status: Slot 0: Current state Master Election priority Master (default) Temperature 32 degrees C / 89 degrees F CPU temperature 46 degrees C / 114 degrees F DRAM 3327 MB ... root@host> show chassis environment no-forwarding Class Item Status Measurement Temp PEM 0 OK 30 degrees C / 86 degrees F ... root@host> show chassis firmware no-forwarding Part Type Version Global FPC 4 Global FPC 6 Global FPC 7 ... root@host> show system boot-messages no-forwarding ...
request support information (SRX Series Firewall)
user@host> request support information root@host> show security dns-cache DNS entry number: 0 root@host> show security utm web-filtering statistics UTM web-filtering statistics: Web-filtering sessions in total: 512000 Web-filtering sessions in use: 0 Fallback: log-and-permit block Default 0 0 Timeout 0 0 Connectivity 0 0 Too-many-requests 0 0 root@host> show security utm session UTM session info: Maximum sessions: 256000 Total allocated sessions: 0 Total freed sessions: 0 Active sessions: 0 root@host> show system uptime no-forwarding Current time: 2017-07-09 21:38:01 PDT Time Source: LOCAL CLOCK System booted: 2017-07-09 20:58:06 PDT (00:39:55 ago) Protocols started: 2017-07-09 20:58:07 PDT (00:39:54 ago) Last configured: 2017-06-30 08:56:45 PDT (1w2d 12:41 ago) by user 9:38PM up 40 mins, 1 user, load averages: 0.10, 0.07, 0.04 ...
request support information ipsec-vpn (MX Series Router)
user@host> request support information ipsec-vpn root@mobst480e> show services ipsec-vpn ike security-associations detail | no-more IKE peer 10.0.1.2 Role: Responder, State: Matured Initiator cookie: 9425c926b3614be5, Responder cookie: 1bcf54a314423b3f Exchange type: IKEv2, Authentication method: Pre-shared-keys Local gateway interface: ge-4/3/3.0 Local: 10.0.1.1, Remote: 10.0.1.2 Lifetime: Expires in 1923 seconds Peer ike-id: ipv4(any:0,[0..3]=10.0.1.2) Algorithms: Authentication : hmac-sha1-96 Encryption : 3des-cbc Pseudo random function: hmac-sha1 Diffie-Hellman group : 2 Traffic statistics: Input bytes : 8024 Output bytes : 7744 Input packets: 52 Output packets: 52 Flags: IKE SA created IPSec security associations: 34 created, 36 deleted root@mobst480e> show services ipsec-vpn ike statistics | no-more IKE peer 10.0.1.2 Initiator cookie: 9425c926b3614be5, Responder cookie: 1bcf54a314423b3f Local: 10.0.1.1, Remote: 10.0.1.2 IPSec security associations: 34 created, 36 deleted IPSec tunnel rekeys: 17 Exchange type: IKEv2 Traffic statistics: Input bytes : 8024 Output bytes : 7744 Input packets: 52 Output packets: 52 Delete IPsec SA payload statistics: Delete IPsec SA payloads received: 18 Delete IPsec SA payloads sent : 17 DPD statistics: DPD request received : 18 DPD request sent : 0 DPD response received : 0 DPD response sent : 18 DPD response missed : 0 Worst case DPD response delay : 0 msec DPD sequential response missed : 0 Invalid SPI notification statistics: Notifications received: 0 Notifications sent : 0 root@mobst480e> show services ipsec-vpn ipsec security-associations detail | no-more Service set: ss1, IKE Routing-instance: default Rule: ipsec_vpn_rules_1, Term: term1, Tunnel index: 1 Local gateway: 10.0.1.1, Remote gateway: 10.0.1.2 IPSec inside interface: ms-2/0/0.1, Tunnel MTU: 1500 UDP encapsulate: Disabled, UDP Destination port: 0 Local identity: ipv4_subnet(any:0,[0..7]=192.168.60.0/24) Remote identity: ipv4_subnet(any:0,[0..7]=192.168.70.0/24) NATT Detection: Not Detected, NATT keepalive interval: 0 Total uptime: 0 days 2 hrs 45 mins 21 secs Direction: inbound, SPI: 2957881284, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 48 seconds Hard lifetime: Expires in 88 seconds Anti-replay service: Enabled, Replay window size: 4096 Copy ToS: Enabled Copy TTL: Disabled, TTL value: 64 SA lifetime: 180 seconds Direction: outbound, SPI: 3292864325, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 48 seconds Hard lifetime: Expires in 88 seconds Anti-replay service: Enabled, Replay window size: 4096 Copy ToS: Enabled Copy TTL: Disabled, TTL value: 64 SA lifetime: 180 seconds root@mobst480e> show services ipsec-vpn ipsec statistics | no-more PIC: ms-2/0/0, Service set: ss1 ESP Statistics: Encrypted bytes: 0 Decrypted bytes: 0 Encrypted packets: 0 Decrypted packets: 0 AH Statistics: Input bytes: 0 Output bytes: 0 Input packets: 0 Output packets: 0 Errors: AH authentication failures: 0 ESP authentication failures: 0 ESP decryption failures: 0 Bad headers: 0, Bad trailers: 0 Replay before window drops: 0, Replayed pkts: 0 IP integrity errors: 0, Exceeds tunnel MTU: 0 Rule lookup failures: 0, No SA errors: 0 Flow errors: 0, Misc errors: 0
Release Information
Command introduced before Junos OS Release 7.4.
Option brief
introduced in Junos OS Release 13.2.
Option secure-gateway
introduced in Junos OS Release 15.1X49-D110 for
SRX5400, SRX5600, and SRX5800 devices.
Options security-components
and ipsec-vpn
introduced in
Junos OS Release 20.2R1.
Options evpn-mpls
and evpn-vxlan
introduced in Junos OS
and Junos OS Evolved Releases 21.2R3, 21.4R2, 21.4R3, and 22.2R1.
Additional EVPN multicast debug information added to evpn-vxlan
option
output in Junos OS and Junos OS Evolved Releases 22.4R2 and 23.1R1.