request support information
Syntax
request support information <brief> <evpn-mpls | evpn-vxlan> <ipsec-vpn>
Syntax (ACX Series Router)
request support information <archive> <cos> <dot1x> <evpn-mpls> <evpn-vxlan> <with-components> <with-logs> <with-options>
Syntax (EX Series Switch)
request support information <brief> <all-members> <local> <member member-id>
Syntax (MX Series Router)
request support information <archive> <cos> <dot1x> <evpn-mpls> <evpn-vxlan> <with-components> <with-logs> <with-options>
Syntax (PTX Series Router)
request support information <archive> <cos> <dot1x> <evpn-mpls> <evpn-vxlan> <with-components> <with-logs> <with-options>
Syntax (SRX Series Firewalls)
request support information <archive> <dot1x> <evpn-mpls> <evpn-vxlan> <security-components component> <with-components> <with-logs> <with-options>
Description
Display all configuration data for the system, including data hidden with the
apply-flags omit command. Issue this command before contacting
customer support, and then include the command output in your support request. Output from
this command varies somewhat, depending on which platform you issue the command from.
However, the command always executes a series of show
commands, with the
appropriate information for your device automatically included.
The output from this command could be very long (thousands of lines of output). You might often want to redirect the output to a file (such as /var/log/rsi.log), as follows:
request support information <options> | save filename
Options
brief |
(Optional) Display brief information for the command output. Without this option, display of the output can take a long time to complete. |
archive |
Display a compressed archive file (tar.gz) in
the /var/tmp/rsi directory containing all output from the
|
dot1x |
Display detailed dot1x status report. |
evpn-mpls |
(Optional) Display system information including in-depth EVPN control plane and Packet Forwarding Engine (PFE) status for EVPN-MPLS fabric configurations. The output includes:
|
evpn-vxlan |
(Optional) Display system information including in-depth EVPN control plane and PFE status for EVPN-VXLAN fabric configurations. The output includes:
|
ipsec-vpn |
(Optional) Display detailed system information for IPsec VPN. |
all-members |
(EX Series switches and MX Series routers) (Optional) Display system information for all members of the Virtual Chassis configuration. |
local |
(EX Series switches and MX Series routers) (Optional) Display system information for the local Virtual Chassis member. |
member member-id |
(EX Series switches and MX Series routers) (Optional) Display system information for
the specified member of the Virtual Chassis configuration. On EX Series switches,
replace |
secure-gateway |
(SRX5400, SRX5600, and SRX5800 devices) (Optional) Display system information for secure gateway deployment scenarios. |
security-components component |
(SRX Series) (Optional) Display information on security components.
|
node |
(SRX5400, SRX5600, and SRX5800 devices) (Optional) Display detailed system status report for all nodes or a specific node.
|
with-logs |
Display a compressed archive file (tar.gz)
containing all output from the Note:
The compressed archive file (tar.gz) contains log files located only in the /var/log directory, not in the /var/log/trace directory. |
with-components |
Display a compressed archive file (tar.gz)
containing output from the component specific
|
with-options |
Display a compressed archive file (tar.gz) containing output from
the component specific |
Additional Information
The show
commands issued as a result of this command vary depending on
which platform you issue the command from. Output is always appropriate for the device. For
example, Table 1
lists the show
commands that are called when you issue request
support information
on an MX Series router.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The no-forwarding
option ensures that all mgd
processes
associated with the show
command are properly halted if you break into
the output (Ctrl+C) while the command is still running.
Show command show interfaces extensive no-forwarding
is not supported
for request support information brief
command.
Table 2 lists the show
commands that are called when you issue request
support information ipsec-vpn
on a MX Series Router.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Starting in Release 20.2R1, Junos OS introduces ipsec-vpn
option to the
existing request support information
command. The request support
information ipsec-vpn
command displays all the configurations, states, and
statistics at Routing Engine and Service Card level. This new option helps in debugging
IPsec-VPN related issues. The information collection is streamlined and reduces the output
file size.
Table 3
lists the show
commands that are called when you issue request
support information
on an EX Series 9200 switch. The table does not include the
no-forwarding
option, which is used for purposes of the request
support information
, itself.
|
|
show chassis fpcdetail |
|
|
|
|
|
|
|
|
|
|
Table 4 lists
the show
commands that are called when you issue request support
information
on SRX Series Firewalls.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Starting in Junos OS Release 15.1X49-D110, on SRX5400, SRX5600, and SRX5800 devices, a new
option secure-gateway
is added to the existing request support
information
command. This new option displays all the required information that
is relevant for secure gateway deployment scenarios. In Junos OS Release 15.1X49-D100 and
earlier, request support information displays the information about all features that might
not be relevant for secure gateway deployments.
Starting in Junos OS Release 20.2R1, we’ve introduced the CLI ipsec-vpn
option to the existing request support information security-components
command. This new option displays all the configuration, states, and statistics information
necessary for debugging IPsec VPN related issues.
Required Privilege Level
Output Fields
For information about output fields, see the description for the specific command-–listed in the output– in which you are interested.
Sample Output
- request support information | save
- request support information (SRX Series Firewall)
- request support information ipsec-vpn (MX Series Router)
request support information | save
user@host> request support information | save hostA Wrote 1143 lines of output to 'hostA' user@host>
request support information (SRX Series Firewall)
user@host> request support information root@host> show security dns-cache DNS entry number: 0 root@host> show security utm web-filtering statistics UTM web-filtering statistics: Web-filtering sessions in total: 512000 Web-filtering sessions in use: 0 Fallback: log-and-permit block Default 0 0 Timeout 0 0 Connectivity 0 0 Too-many-requests 0 0 root@host> show security utm session UTM session info: Maximum sessions: 256000 Total allocated sessions: 0 Total freed sessions: 0 Active sessions: 0 root@host> show system uptime no-forwarding Current time: 2017-07-09 21:38:01 PDT Time Source: LOCAL CLOCK System booted: 2017-07-09 20:58:06 PDT (00:39:55 ago) Protocols started: 2017-07-09 20:58:07 PDT (00:39:54 ago) Last configured: 2017-06-30 08:56:45 PDT (1w2d 12:41 ago) by user 9:38PM up 40 mins, 1 user, load averages: 0.10, 0.07, 0.04 ...
request support information ipsec-vpn (MX Series Router)
user@host> request support information ipsec-vpn root@mobst480e> show services ipsec-vpn ike security-associations detail | no-more IKE peer 10.0.1.2 Role: Responder, State: Matured Initiator cookie: 9425c926b3614be5, Responder cookie: 1bcf54a314423b3f Exchange type: IKEv2, Authentication method: Pre-shared-keys Local gateway interface: ge-4/3/3.0 Local: 10.0.1.1, Remote: 10.0.1.2 Lifetime: Expires in 1923 seconds Peer ike-id: ipv4(any:0,[0..3]=10.0.1.2) Algorithms: Authentication : hmac-sha1-96 Encryption : 3des-cbc Pseudo random function: hmac-sha1 Diffie-Hellman group : 2 Traffic statistics: Input bytes : 8024 Output bytes : 7744 Input packets: 52 Output packets: 52 Flags: IKE SA created IPSec security associations: 34 created, 36 deleted root@mobst480e> show services ipsec-vpn ike statistics | no-more IKE peer 10.0.1.2 Initiator cookie: 9425c926b3614be5, Responder cookie: 1bcf54a314423b3f Local: 10.0.1.1, Remote: 10.0.1.2 IPSec security associations: 34 created, 36 deleted IPSec tunnel rekeys: 17 Exchange type: IKEv2 Traffic statistics: Input bytes : 8024 Output bytes : 7744 Input packets: 52 Output packets: 52 Delete IPsec SA payload statistics: Delete IPsec SA payloads received: 18 Delete IPsec SA payloads sent : 17 DPD statistics: DPD request received : 18 DPD request sent : 0 DPD response received : 0 DPD response sent : 18 DPD response missed : 0 Worst case DPD response delay : 0 msec DPD sequential response missed : 0 Invalid SPI notification statistics: Notifications received: 0 Notifications sent : 0 root@mobst480e> show services ipsec-vpn ipsec security-associations detail | no-more Service set: ss1, IKE Routing-instance: default Rule: ipsec_vpn_rules_1, Term: term1, Tunnel index: 1 Local gateway: 10.0.1.1, Remote gateway: 10.0.1.2 IPSec inside interface: ms-2/0/0.1, Tunnel MTU: 1500 UDP encapsulate: Disabled, UDP Destination port: 0 Local identity: ipv4_subnet(any:0,[0..7]=192.168.60.0/24) Remote identity: ipv4_subnet(any:0,[0..7]=192.168.70.0/24) NATT Detection: Not Detected, NATT keepalive interval: 0 Total uptime: 0 days 2 hrs 45 mins 21 secs Direction: inbound, SPI: 2957881284, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 48 seconds Hard lifetime: Expires in 88 seconds Anti-replay service: Enabled, Replay window size: 4096 Copy ToS: Enabled Copy TTL: Disabled, TTL value: 64 SA lifetime: 180 seconds Direction: outbound, SPI: 3292864325, AUX-SPI: 0 Mode: tunnel, Type: dynamic, State: Installed Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc Soft lifetime: Expires in 48 seconds Hard lifetime: Expires in 88 seconds Anti-replay service: Enabled, Replay window size: 4096 Copy ToS: Enabled Copy TTL: Disabled, TTL value: 64 SA lifetime: 180 seconds root@mobst480e> show services ipsec-vpn ipsec statistics | no-more PIC: ms-2/0/0, Service set: ss1 ESP Statistics: Encrypted bytes: 0 Decrypted bytes: 0 Encrypted packets: 0 Decrypted packets: 0 AH Statistics: Input bytes: 0 Output bytes: 0 Input packets: 0 Output packets: 0 Errors: AH authentication failures: 0 ESP authentication failures: 0 ESP decryption failures: 0 Bad headers: 0, Bad trailers: 0 Replay before window drops: 0, Replayed pkts: 0 IP integrity errors: 0, Exceeds tunnel MTU: 0 Rule lookup failures: 0, No SA errors: 0 Flow errors: 0, Misc errors: 0
Release Information
Command introduced before Junos OS Release 7.4.
Option brief
introduced in Junos OS Release 13.2.
Option secure-gateway
introduced in Junos OS Release 15.1X49-D110 for
SRX5400, SRX5600, and SRX5800 devices.
Options security-components
and ipsec-vpn
introduced in
Junos OS Release 20.2R1.
Options evpn-mpls
and evpn-vxlan
introduced in Junos OS
and Junos OS Evolved Releases 21.2R3, 21.4R2, 21.4R3, and 22.2R1.
Additional EVPN multicast debug information added to evpn-vxlan
option
output in Junos OS and Junos OS Evolved Releases 22.4R2 and 23.1R1.
Options archive
, with-logs
,
with-components
, and with-options
introduced in Junos OS
and Junos OS Evolved Release 24.2R1.