2.9. Security Show, Clear, Debug, Tools, and Admin Command Reference

2.9.1. Command Hierarchies

2.9.1.1. Show Commands

2.9.1.1.1. System Security

show
— system
connections [detail] [address ip-address] [port port-number]
grpc
grpc connection
grpc rpc [rpc-id]
— security
access-group [group-name]
authentication [statistics]
ip-filter [entry entry-id]
ipv6-filter [entry entry-id]
mac-filter [entry entry-id]
cpm-queue queue-id
eth-cfm-monitoring [{service-id service-id sap-id sap-id} | {service-id service-id sdp-id sdp-id:vc-id}]
excessive-sources [service-id service-id sap-id sap-id]
policy [policy-id] association
violators [port] [interface] [sap] [video] [sdp]
policy [policy-id] [association detail]
keychain keychain-name [detail]
ip-filter [entry entry-id]
ipv6-filter [entry entry-id]
mac-filter [entry entry-id]
per-peer-queuing [detail]
profile [user-profile-name]
ssh [detail]
user [user-name] [detail]
user [user-name] lockout
view [view-name] [detail]
ca-profile name [association]
ocsp-cache [entry-id]
show
— card
— fp
show
— service
— id
— sap
dist-cpu-protection [detail]
show
— router
— interface
dist-cpu-protection [detail]

2.9.1.1.2. Login Control

show
users

2.9.1.2. Clear Commands

clear
— router
— authentication
statistics [interface ip-int-name | ip-address]
radius-proxy-server server-name statistics
— cpm-filter
ip-filter [entry entry-id]
ipv6-filter [entry entry-id]
mac-filter [entry entry-id]
violators [port] [interface] [sap]
cpm-queue queue-id
admin
— user
— user
lockout {name | all}
password-history {name | all}

2.9.1.3. Debug Commands

debug
[no] ocsp
[no] ca-profile profile-name
radius [detail] [hex]
— no radius
— system
[no] grpc
client all
client ip-address
— no client
type all
type [gnmi-capabilities] [gnmi-get] [gnmi-set] [gnmi-subscribe]
— no type

2.9.1.4. Tools Commands

tools
— dump
— security
violators enforcement {sap | interface} card slot-number [fp fp-number]
violators local-monitor {sap | interface} card slot-number [fp fp-number]
— perform
— security
release-hold-down interface interface-name [protocol protocol] [static-policer name]
release-hold-down sap sap-id [protocol protocol] [static-policer name]

2.9.1.5. Admin Commands

admin
— certificate
convert-file filename to output-file-name format {secure | legacy} [force]
— clear
lockout {user user-name | all}
password-history {user user-name | all}

2.9.2. Command Descriptions

The command outputs in the following section are examples only; actual displays may differ depending on supported functionality and user configuration.

2.9.2.1. Show Commands

2.9.2.1.1. System Commands

connections

Syntax 
connections [detail] [address ip-address] [port port-number]
Context 
show>system
Description 

This command displays TCP connections and UDP listeners.

Parameters 
detail—
Displays detail connection information
ip-address
Specifies the IPv4 or IPv6 address
Values—
ip-int-name - 32 chars max
ipv4-address - a.b.c.d
ipv6-address - x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x - [0..FFFF]H
d - [0..255]D

 

port-number—
Specifies the port number
Values—
0 to 65535

 

Output 

The following is an example of system connections information.

Sample Output
*A:cses-V22# show system connections detail 
===============================================================================
Connections (Detail)
===============================================================================
Prot RecvQ   TxmtQ   Local Address                                   State
                MSS  Remote Address                                      vRtrID
-------------------------------------------------------------------------------
TCP        0       0 0.0.0.0.22                                      LISTEN
               1024  0.0.0.0.0                                                0
TCP        0       0 0.0.0.0.6068                                    LISTEN
               1024  0.0.0.0.0                                                0
TCP        0       0 0.0.0.0.47806                                   LISTEN
               1024  0.0.0.0.0                                                0
TCP        0       0 ::.22                                           LISTEN
               1024  ::.0                                                     0
TCP        0       0 ::.47806                                        LISTEN
               1024  ::.0                                                     0
TCP        0       0 127.0.0.1.49511                                 ESTABLISH
               8192  127.0.0.1.49512                                       4095
TCP        0       0 127.0.0.1.49512                                 ESTABLISH
               8192  127.0.0.1.49511                                       4095
TCP        0       2 127.0.0.1.49513                                 ESTABLISH
               8192  127.0.0.1.49514                                       4095
TCP      163       0 127.0.0.1.49514                                 ESTABLISH
               8192  127.0.0.1.49513                                       4095
TCP        0       0 127.1.0.11.21                                   LISTEN
               1024  0.0.0.0.0                                             4095
TCP        0       0 127.1.0.11.21059                                LISTEN
               1024  0.0.0.0.0                                             4095
TCP        0       0 135.227.236.22.22                               LISTEN
               1024  0.0.0.0.0                                             4095
TCP        0    2256 135.227.236.22.22                               ESTABLISH
               1024  135.244.40.224.65066                                  4095
UDP        0       0 0.0.0.0.67                                       ---
                     0.0.0.0.0                                                0
UDP        0       0 0.0.0.0.68                                       ---
                     0.0.0.0.0                                                0
UDP        0       0 0.0.0.0.319                                      ---
                     0.0.0.0.0                                                0
UDP        0       0 0.0.0.0.320                                      ---
                     0.0.0.0.0                                                0
UDP        0       0 0.0.0.0.50700                                    ---
                     0.0.0.0.0                                                0
UDP        0       0 0.0.0.0.50702                                    ---
                     0.0.0.0.0                                                0
UDP        0       0 ::.50701                                         ---
                     ::.0                                                     0
UDP        0       0 ::.50703                                         ---
                     ::.0                                                     0
UDP        0       0 0.0.0.0.1025                                     ---
                     0.0.0.0.0                                                1
UDP        0       0 ::.1025                                          ---
                     ::.0                                                     1
UDP        0       0 0.0.0.0.49152                                    ---
                     0.0.0.0.0                                             4095
UDP        0       0 127.1.0.11.69                                    ---
                     0.0.0.0.0                                             4095
-------------------------------------------------------------------------------
No. of Connections: 25
-------------------------------------------------------------------------------
 TCP Statistics
-------------------------------------------------------------------------------
packets sent                                : 15349
data packets                                : 11627 (230636 bytes)
data packet retransmitted                   : 0 (0 bytes)
ack-only packets                            : 3691 (19 delayed)
URG only packet                             : 0
window probe packet                         : 0
window update packet                        : 7
control packets                             : 24
packets received                            : 15390
acks                                        : 4148 for (230443 bytes)
duplicate acks                              : 473
ack for unsent data                         : 0
packets received in-sequence                : 11007 (170236 bytes)
completely duplicate packet                 : 0 (0 bytes)
packet with some dup. data                  : 0 (0 bytes)
out-of-order packets                        : 0 (0 bytes)
packet of data after window                 : 0 (0 bytes)
window probe                                : 0
window update packet                        : 0
packets received after close                : 5
discarded for bad checksum                  : 0
discarded for bad header offset field       : 0
discarded because packet too short          : 0
packets dropped by md5                      : 0
packets dropped by enhanced auth            : 0
packets dropped by tcp-ao                   : 0
connection request                          : 9
connection accept                           : 11
connections established (including accepts) : 20
connections closed                          : 24 (including 5 drops)
embryonic connections dropped               : 0
segments updated rtt                        : 3617 (of 3612 attempts)
retransmit timeouts                         : 0
connections dropped by rexmit timeout       : 0
persist timeouts                            : 0
keepalive timeouts                          : 481
keepalive probes sent                       : 470
connections dropped by keepalive            : 1
connections dropped by full queue           : 0
pcb cache lookups failed                    : 12
path mtu discovery backoff                  : 0
===============================================================================
*A:cses-V22#

grpc

Syntax 
grpc
grpc connection
grpc rpc [rpc-id]
Context 
show>system
Description 

This command displays gRPC server information.

Parameters 
connection
This command displays information for gRPC connections.
rpc-id—
Specifies an rpc ID.
Values—
0 to 4294967295

 

Output 

The following is an example of system gRPC information.

Table 32 describes system gRPC output fields.

Sample Output
A:admin@Dut-A# show system grpc
===============================================================================
gRPC Server
===============================================================================
Administrative State      : Enabled
Operational State         : Up
Supported services
-------------------------------------------------------------------------------
gNMI Version              : 0.4.0
===============================================================================
 
 
A:admin@Dut-A# show system grpc connection
===============================================================================
gRPC Server connections
===============================================================================
Address                   : 192.99.5.0
Port                      : 49648
Establishment Time        : 2018/02/20 09:51:48
Active RPC Count          : 0
Total RPC Count           : 1
Rx Bytes                  : 2954
Tx Bytes                  : 3908
-------------------------------------------------------------------------------
No. of connections        : 1
===============================================================================
 
A:node-6>show>system# grpc rpc
===============================================================================
gRPC Server RPCs
===============================================================================
No. of RPCs               : 0
===============================================================================
Table 32:  Show System gRPC Output Fields  

Label

Description

gRPC Server

Specifies the gRPC server name.

Administrative State

Specifies the administrative state (Enabled, Disabled).

Operational State

Specifies the operational state (Up, Down).

Supported services

Specifies the supported services.

gNMI Version

Specifies the gNMI version.

Address

Specifies the IP address.

Port

Specifies the port number.

Establishment Time

Specifies the establishment time.

Active RPC Count

Specifies the active RPC count.

Total RPC Count

Specifies the total RPC count.

Rx Bytes

Specifies the number of received bytes.

Tx Bytes

Specifies the number of transmitted bytes.

No. of connections

Specifies the number of gRPC connections.

No. of RPCs

Specifies the number of RPCs.

2.9.2.1.2. Security Commands

access-group

Syntax 
access-group [group-name]
Context 
show>system>security
Description 

This command displays SNMP access group information.

Parameters 
group-name—
This command displays information for the specified access group.
Output 

The following is an example of access group information.

Table 33 describes security access group output fields.

Sample Output
A:ALA-4# show system security access-group
===============================================================================
Access Groups                                                                  
===============================================================================
group name        security  security  read          write         notify       
                  model     level     view          view          view         
-------------------------------------------------------------------------------
snmp-ro           snmpv1    none      no-security                 no-security  
snmp-ro           snmpv2c   none      no-security                 no-security  
snmp-rw           snmpv1    none      no-security   no-security   no-security  
snmp-rw           snmpv2c   none      no-security   no-security   no-security  
snmp-rwa          snmpv1    none      iso           iso           iso          
snmp-rwa          snmpv2c   none      iso           iso           iso          
snmp-trap         snmpv1    none                                  iso          
snmp-trap         snmpv2c   none                                  iso          
===============================================================================
A:ALA-7#
Table 33:  Show System Security Access Group Output Fields  

Label

Description

Group name

The access group name.

Security model

The security model required to access the views configured in this node.

Security level

Specifies the required authentication and privacy levels to access the views configured in this node.

Read view

Specifies the variable of the view to read the MIB objects.

Write view

Specifies the variable of the view to configure the contents of the agent.

Notify view

Specifies the variable of the view to send a trap about MIB objects.

authentication

Syntax 
authentication [statistics]
Context 
show>system>security
Description 

This command displays system login authentication configuration and statistics.

Parameters 
statistics—
Appends login and accounting statistics to the display.
Output 

The following is an example of authentication information.

Table 34 describes system security authentication output fields.

Sample Output
A:ALA-4# show system security authentication
==============================================================================
Authentication             sequence : radius tacplus local ldap exit-on-reject
==============================================================================
type                               status   timeout (secs)   retry count
   server address                                            
   server name                                               
------------------------------------------------------------------------------
radius                             down     3                3
   192.168.255.255                                                               
   n/a
ldap                               up       3                3
   192.168.0.10(389)
   my_first_LDAP_server
ldap                               down     3                3
   10.0.0.0(389)
   n/a
------------------------------------------------------------------------------
radius admin/oper status  : up/down
ldap admin/oper status    : up/up
health check              : enabled (interval 30 secs)
------------------------------------------------------------------------------
No. of Servers: 3                     
==============================================================================
 
 
A:ALA-4# show system security authentication statistics
============================================================================
Authentication           sequence : radius tacplus ldap local
============================================================================
type                             status      timeout (secs)     retry count
   server address                                                          
   server name                                                             
----------------------------------------------------------------------------
ldap                               down                   3               3
   10.20.194.179:10390
   n/a
----------------------------------------------------------------------------
ldap admin/oper status    : down/down
health check              : enabled (interval 30 secs)
----------------------------------------------------------------------------
No. of Servers: 1
===============================================================================
Login Statistics
===============================================================================
server address                                       conn   accepted  rejected
                                                     errors logins    logins
-------------------------------------------------------------------------------
135.243.194.179                                      0      2         7
local                                                n/a    10        8
===============================================================================
Authorization Statistics (TACACS+)
===============================================================================
server address                                       conn   sent      rejected
                                                     errors pkts      pkts
-------------------------------------------------------------------------------
===============================================================================
Accounting Statistics
===============================================================================
server address                                       conn   sent      rejected
                                                     errors pkts      pkts
-------------------------------------------------------------------------------
============================================================================
 
 
A:ALA-4# show system security authentication
===============================================================================
Authentication                  sequence : radius tacplus local ldap exit-on-reject
===============================================================================
type                               status   timeout (secs)   retry count
 server address
 server name
-------------------------------------------------------------------------------
radius                             up       5                5
 10.10.10.103
 n/a
radius                             up       5                5
 10.10.10.1
 n/a
radius                             up       5                5
 10.10.10.2
 n/a
radius                             up       5                5
 10.10.10.3
 n/a
-------------------------------------------------------------------------------
radius admin status  : up
tacplus admin status : up
health check         : enabled (interval 30)
-------------------------------------------------------------------------------
No. of Servers: 4
===============================================================================
A:ALA-4#
 
 
A:ALA-7>show>system>security# authentication statistics
===============================================================================
Authentication                  sequence : radius tacplus local 
===============================================================================
type                               status   timeout (secs)   retry count
 server address
-------------------------------------------------------------------------------
radius                             up       5                5
 10.10.10.103
radius                             up       5                5
 10.10.10.1
radius                             up       5                5
 10.10.10.2
radius                             up       5                5
 10.10.10.3
-------------------------------------------------------------------------------
radius admin status  : up
tacplus admin status : up
health check         : enabled (interval 30)
-------------------------------------------------------------------------------
No. of Servers: 4
===============================================================================
Login Statistics
===============================================================================
server address      connection errors   accepted logins     rejected logins
-------------------------------------------------------------------------------
10.10.10.103        0                   0                   0
10.10.0.1           0                   0                   0
10.10.0.2           0                   0                   0
10.10.0.3           0                   0                   0
local               n/a                 1                   0
===============================================================================
Authorization Statistics (TACACS+)
===============================================================================
server address      connection errors   sent packets        rejected packets
-------------------------------------------------------------------------------
===============================================================================
Accounting Statistics
===============================================================================
server address      connection errors   sent packets        rejected packets
-------------------------------------------------------------------------------
10.10.10.103        0                   0                   0
10.10.0.1           0                   0                   0
10.10.0.2           0                   0                   0
10.10.0.3           0                   0                   0
===============================================================================
A:ALA-7#
 
 
*A:Dut-C# show system security authentication statistics
 
===============================================================================
Authentication                  sequence : radius tacplus local 
===============================================================================
type                               status   timeout (secs)   retry count
 server address
-------------------------------------------------------------------------------
radius                             up       5                5
 10.10.10.103
radius                             up       5                5
 10.10.10.1
radius                             up       5                5
 10.10.10.2
radius                             up       5                5
 10.10.10.3
-------------------------------------------------------------------------------
radius admin status  : up
tacplus admin status : up
health check         : enabled (interval 30)
-------------------------------------------------------------------------------
No. of Servers: 4
===============================================================================
 
===============================================================================
Login Statistics
===============================================================================
server address                                       conn   accepted  rejected
                                                     errors logins    logins
-------------------------------------------------------------------------------
local                                                n/a    4         0
 
===============================================================================
Authorization Statistics (TACACS+)
===============================================================================
server address                                       conn   sent      rejected
                                                     errors pkts      pkts
-------------------------------------------------------------------------------
 
===============================================================================
Accounting Statistics
===============================================================================
server address                                       conn   sent      rejected
                                                     errors pkts      pkts
-------------------------------------------------------------------------------
==============================================================================
Table 34:  Show System Security Authentication Output Fields  

Label

Description

Sequence

The sequence in which authentication is processed.

Server address

The IP address of the RADIUS server.

Status

Current status of the RADIUS server.

Type

The authentication type.

Timeout (secs)

The number of seconds the router waits for a response from a RADIUS server.

Retry count

Displays the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server.

Connection errors

Displays a sum of the the number of sending failures and request timeouts to defined servers.

Accepted logins

The number of times the user has successfully logged in.

Rejected logins

The number of unsuccessful login attempts.

Sent packets

The number of packets sent.

Rejected packets

The number of packets rejected.

cli-session-group

Syntax 
cli-session-group session-group-name
Context 
show>system>security
Description 

This command displays the user profiles of this CLI session group and the session group details.

Parameters 
session-group-name—
Specifies a session group, up to 32 characters.

policy

Syntax 
policy [policy-id] association
Context 
show>system>security>cpu-protection
show>system>security>dist-cpu-protection
Description 

This command displays CPU protection policy information.

Parameters 
policy-id—
Displays CPU protection policy information for the specified policy ID.
association—
This keyword displays associations for the specified policy ID.

cpm-filter

Syntax 
cpm-filter
Context 
show>system>security
Description 

This command displays CPM filters.

ip-filter

Syntax 
ip-filter [entry entry-id]
Context 
show>system>security>cpm-filter
Description 

This command displays CPM IP filters.

Parameters 
entry-id
Identifies a CPM filter entry as configured on this system.
Values—
1 to 131072

 

Output 

The following displays IP filter entry information.

Table 35 describes CPM IP filter output fields.

Sample Output
A:ALA-35# show system security cpm-filter ip-filter 
===============================================================================
CPM IP Filters
===============================================================================
Entry-Id  Dropped   Forwarded Description                                      
-------------------------------------------------------------------------------
101       25880     0         CPM-Filter 10.4.101.2 #101                       
102       25880     0         CPM-Filter 10.4.102.2 #102                       
103       25880     0         CPM-Filter 10.4.103.2 #103                       
104       25882     0         CPM-Filter 10.4.104.2 #104                       
105       25926     0         CPM-Filter 10.4.105.2 #105                       
106       25926     0         CPM-Filter 10.4.106.2 #106                       
107       25944     0         CPM-Filter 10.4.107.2 #107                       
108       25950     0         CPM-Filter 10.4.108.2 #108                       
109       25968     0         CPM-Filter 10.4.109.2 #109                       
110       25984     0         CPM-Filter 10.4.110.2 #110                       
111       26000     0         CPM-Filter 10.4.111.2 #111                       
112       26018     0         CPM-Filter 10.4.112.2 #112                       
113       26034     0         CPM-Filter 10.4.113.2 #113                       
114       26050     0         CPM-Filter 10.4.114.2 #114                       
115       26066     0         CPM-Filter 10.4.115.2 #115                       
116       26084     0         CPM-Filter 10.4.116.2 #116                       
===============================================================================
A:ALA-35# 
 
A:ALA-35# show system security cpm-filter ip-filter entry 101
===============================================================================
CPM IP Filter Entry
===============================================================================
Entry Id           : 101                                                       
Description : CPM-Filter 10.4.101.2 #101
-------------------------------------------------------------------------------
Filter Entry Match Criteria :
-------------------------------------------------------------------------------
Log Id             : n/a                                                       
Src. IP            : 10.4.101.2/32      Src. Port          : 0                 
Dest. IP           : 10.4.101.1/32      Dest. Port         : 0                 
Protocol           : 6                  Dscp               : ef                
ICMP Type          : Undefined          ICMP Code          : Undefined         
Fragment           : True               Option-present     : Off               
IP-Option          : 130/255            Multiple Option    : True              
TCP-syn            : Off                TCP-ack            : True              
Match action       : Drop                                                      
===============================================================================
A:ALA-35#
Table 35:  Show CPM IP Filter Output Fields  

Label

Description

Entry-Id

Displays information about the specified management access filter entry

Dropped

Displays the number of dropped events.

Forwarded

Displays the number of forwarded events.

Description

Displays the CPM filter description.

Log ID

Displays the log ID where matched packets will be logged.

Src IP

Displays the source IP address(/netmask or prefix-list)

Dest. IP

Displays the destination IP address(/netmask).

Src Port

Displays the source port number (range).

Dest. Port

Displays the destination port number (range).

Protocol

Displays the Protocol field in the IP header.

Dscp

Displays the DSCP field in the IP header.

Fragment

Displays the 3-bit fragment flags or 13-bit fragment offset field.

ICMP Type

Displays the ICMP type field in the ICMP header.

ICMP Code

Displays the ICMP code field in the ICMP header.

TCP-syn

Displays the SYN flag in the TCP header.

TCP-ack

Displays the ACK flag in the TCP header

Match action

When the criteria matches, displays drop or forward packet.

Next Hop

In case match action is forward, indicates destination of the matched packet.

Dropped pkts

Indicates number of matched dropped packets

Forwarded pkts

Indicates number of matched forwarded packets.

ipv6-filter

Syntax 
ipv6-filter [entry entry-id]
Context 
show>system>security>cpm-filter
Description 

This command displays CPM IPv6 filters and only applies to the 7750 SR and 7950 XRS.

Parameters 
entry-id
Identifies a CPM IPv6 filter entry as configured on this system.
Values—
1 to 131072

 

Output 

The following displays an example of IPv6 filter entry information.

Table 36 describes CPM IPv6 filter output fields.

The following is an output example on the 7750 SR:
A:ALA-35# show system security cpm-filter ipv6-filter
===============================================================================
CPM IPv6 Filters
===============================================================================
Entry-Id Dropped Forwarded Description
-------------------------------------------------------------------------------
101      25880   0         CPM-Filter 2001:db8::101:2 #101
102      25880   0         CPM-Filter 2001:db8::102:2 #102
103      25880   0         CPM-Filter 2001:db8::103:2 #103
104      25880   0         CPM-Filter 2001:db8::104:2 #104
105      25880   0         CPM-Filter 2001:db8::105:2 #105
106      25880   0         CPM-Filter 2001:db8::106:2 #106
107      25880   0         CPM-Filter 2001:db8::107:2 #107
108      25880   0         CPM-Filter 2001:db8::108:2 #108
109      25880   0         CPM-Filter 2001:db8::109:2 #109
===============================================================================
A:ALA-35#
 
 
A:ALA-35# show system security cpm-filter ipv6-filter entry 101
===============================================================================
CPM IPv6 Filter Entry
===============================================================================
Entry Id : 1
Description : CPM-Filter 2001:db8::101:2 #101
-------------------------------------------------------------------------------
Filter Entry Match Criteria :
-------------------------------------------------------------------------------
Log Id : n/a
Src. IP : 2001:db8::101:2       Src. Port : 0
Dest. IP : 2001:db8::101:1      Dest. Port : 0
next-header : none        Dscp : Undefined
ICMP Type : Undefined     ICMP Code : Undefined
TCP-syn : Off             TCP-ack : Off
Match action : Drop
Dropped pkts : 25880      Forwarded pkts : 0
===============================================================================
A:ALA-35#
Table 36:  Show CPM IPv6 Filter Output Fields  

Label

Description

Entry-Id

Displays information about the specified management access filter entry

Dropped

Displays the number of dropped events.

Forwarded

Displays the number of forwarded events.

Description

Displays the CPM filter description.

Log ID

Log Id where matched packets will be logged.

Src IP

Displays Source IP address(/netmask)

Dest. IP

Displays Destination IP address(/netmask).

Src Port

Displays Source Port Number (range).

Dest. Port

Displays Destination Port Number (range).

next-header

Displays next-header field in the IPv6 header.

Dscp

Displays Traffic Class field in the IPv6 header.

ICMP Type

Displays ICMP type field in the icmp header.

ICMP Code

Displays ICMP code field in the icmp header.

TCP-syn

Displays the SYN flag in the TCP header.

TCP-ack

Displays the ACK flag in the TCP header

Match action

When criteria matches, displays drop or forward packet.

Next Hop

In case match action is forward, indicates destination of the matched packet.

Dropped pkts

Indicating number of matched dropped packets

Forwarded pkts

Indicating number of matched forwarded packets.

mac-filter

Syntax 
mac-filter [entry entry-id]
Context 
show>system>security>cpm-filter
Description 

This command displays CPM MAC filters.

Parameters 
entry-id
Displays information about the specified entry.
Values—
1 to 131072

 

Output 

The following is an output example of CPU MAC filter information.

Sample Output
*B:bksim67# show system security cpm-filter mac-filter 
===============================================================================
CPM Mac Filter (applied)
===============================================================================
Entry-Id  Dropped   Forwarded Description                                      
-------------------------------------------------------------------------------
1         23002     47094                                                      
-------------------------------------------------------------------------------
Num CPM Mac filter entries: 1
===============================================================================
*B:bksim67#

cpm-queue

Syntax 
cpm-queue queue-id
Context 
show>system>security
Description 

This command displays CPM queues.

Parameters 
queue-id—
Specifies an integer value that identifies a CPM queue.
Values—
0, 33 to 2000

 

Output 

The following display CPM IPv6 filter information.

Table 37 describes CPM queue output fields.

Sample Output
A:ALA-35# show system security cpm-queue 1001 
===============================================================================
CPM Queue Entry
===============================================================================
Queue Id           : 1001                                                      
-------------------------------------------------------------------------------
Queue Parameters :
-------------------------------------------------------------------------------
PIR                : 10000000           CIR                : 1000000           
CBS                : 4096               MBS                : 8192              
===============================================================================
A:ALA-35# 
Table 37:  Show CPM IPv6 Filter Output Fields  

Label

Description

PIR

Displays the administrative Peak Information Rate (PIR) for the queue.

CIR

Displays the amount of bandwidth committed to the queue.

CBS

Displays the amount of buffer drawn from the reserved buffer portion of the queue’s buffer pool.

MBS

Displays the maximum queue depth to which a queue can grow.

cpu-protection

Syntax 
cpu-protection
Context 
show>system>security
Description 

This command enables the context to display CPU protection information.

Output 

The following output is an example of ETH CFM monitoring.

Sample Output
show system security cpu-protection eth-cfm-monitoring   
===============================================================================
SAP's where the protection policy Eth-CFM rate limit is exceeded
===============================================================================
SAP-Id                                        Service-Id    Plcy 
-------------------------------------------------------------------------------
1/1/1                                         3             100  
-------------------------------------------------------------------------------
1 SAP('s) found
===============================================================================
===============================================================================
SDP's where the protection policy Eth-CFM rate limit is exceeded
===============================================================================
SDP-Id            Service-Id    Plcy
-------------------------------------------------------------------------------
1:3               3             100 
-------------------------------------------------------------------------------
1 SDP('s) found
===============================================================================
 
show system security cpu-protection eth-cfm-monitoring service-id 3 sap-id 1/1/1
 ===============================================================================
Flows exceeding the Eth-CFM monitoring rate limit
===============================================================================
Service-Id : 3
SAP-Id     : 1/1/1
Plcy       : 100
-------------------------------------------------------------------------------
Limit  MAC-Address        Level  OpCode 
  First-Time            Last-Time             Violation-Periods 
-------------------------------------------------------------------------------
0      8c:8c:8c:8c:8c:8c  1      18     
  03/21/2009 23:32:29   03/21/2009 23:34:39   4000000019        
61234  8d:8d:8d:8d:8d:8d  2      19     
  03/21/2009 23:32:39   03/21/2009 23:34:59   4000000020        
61234  Aggregated         3      20     
  03/21/2009 23:32:49   03/21/2009 23:35:19   4000000021        
61234  8f:8f:8f:8f:8f:8f  4      21     
  03/21/2009 23:32:59   03/21/2009 23:35:39   4000000022        
61234  90:90:90:90:90:90  5      22     
  03/21/2009 23:33:09   03/21/2009 23:35:59   4000000023        
61234  91:91:91:91:91:91  6      23     
  03/21/2009 23:33:19   03/21/2009 23:36:19   4000000024        
61234  92:92:92:92:92:92  7      24     
  03/21/2009 23:33:29   03/21/2009 23:36:39   4000000025        
max    Aggregated         0      25     
  03/21/2009 23:33:39   03/21/2009 23:36:59   4000000026        
0      94:94:94:94:94:94  1      26     
  03/21/2009 23:33:49   03/21/2009 23:37:19   4000000027        
-------------------------------------------------------------------------------
9 flows(s) found
===============================================================================
 
 
show system security cpu-protection eth-cfm-monitoring service-id 3 sdp-id 1:3 
===============================================================================
Flows exceeding the Eth-CFM monitoring rate limit
===============================================================================
Service-Id : 3
SDP-Id     : 1:3
Plcy       : 100
-------------------------------------------------------------------------------
Limit  MAC-Address        Level  OpCode 
  First-Time            Last-Time             Violation-Periods 
-------------------------------------------------------------------------------
0      8c:8c:8c:8c:8c:8c  1      18     
  03/21/2009 23:32:29   03/21/2009 23:34:39   3000000019        
61234  8d:8d:8d:8d:8d:8d  2      19     
  03/21/2009 23:32:39   03/21/2009 23:34:59   3000000020        
61234  Aggregated         3      20     
  03/21/2009 23:32:49   03/21/2009 23:35:19   3000000021        
61234  8f:8f:8f:8f:8f:8f  4      21     
  03/21/2009 23:32:59   03/21/2009 23:35:39   3000000022        
61234  90:90:90:90:90:90  5      22     
  03/21/2009 23:33:09   03/21/2009 23:35:59   3000000023        
61234  91:91:91:91:91:91  6      23     
  03/21/2009 23:33:19   03/21/2009 23:36:19   3000000024        
61234  92:92:92:92:92:92  7      24     
  03/21/2009 23:33:29   03/21/2009 23:36:39   3000000025        
max    Aggregated         0      25     
  03/21/2009 23:33:39   03/21/2009 23:36:59   3000000026        
0      94:94:94:94:94:94  1      26     
  03/21/2009 23:33:49   03/21/2009 23:37:19   3000000027        
-------------------------------------------------------------------------------
9 flow(s) found
===============================================================================
 
 
show system security cpu-protection excessive-sources service-id 3 sdp-id 1:3  
===============================================================================
Sources exceeding the per-source rate limit
===============================================================================
Service-Id : 3
SDP-Id     : 1:3
Plcy       : 100
Limit      : 65534
-------------------------------------------------------------------------------
MAC-Address       First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
00:00:00:00:00:01 03/22/2009 00:41:59 03/22/2009 01:53:39 3000000043 
00:00:00:00:00:02 03/22/2009 00:43:39 03/22/2009 01:56:59 3000000044 
00:00:00:00:00:03 03/22/2009 00:45:19 03/22/2009 02:00:19 3000000045 
00:00:00:00:00:04 03/22/2009 00:46:59 03/22/2009 02:03:39 3000000046 
00:00:00:00:00:05 03/22/2009 00:48:39 03/22/2009 02:06:59 3000000047 
-------------------------------------------------------------------------------
5 source(s) found
===============================================================================
 
 
show system security cpu-protection violators sdp                         
===============================================================================
SDP's where the protection policy overall rate limit is violated
===============================================================================
SDP-Id           Service-Id
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
1:1              3          
  100  61234 05/01/2010 01:43:53 06/27/2010 22:37:20 3000000007 
1:2              3          
  255  max   05/01/2010 01:43:55 06/27/2010 22:37:23 3000000008 
1:3              3          
  100  61234 05/01/2010 01:43:57 06/27/2010 22:37:26 3000000009 
1:4              3          
  255  max   05/01/2010 01:43:59 06/27/2010 22:37:29 3000000010 
1:5              3          
  100  61234 05/01/2010 01:44:01 06/27/2010 22:37:32 3000000011 
-------------------------------------------------------------------------------
5 SDP('s) found
===============================================================================
 
 
show system security cpu-protection excessive-sources                           
===============================================================================
SAP's where the protection policy per-source rate limit is exceeded
===============================================================================
SAP-Id                                       Service-Id
  Plcy Limit
-------------------------------------------------------------------------------
1/1/1                                        3          
  100  65534 
-------------------------------------------------------------------------------
1 SAP('s) found
===============================================================================
SDP's where the protection policy per-source rate limit is exceeded
===============================================================================
SDP-Id            Service-Id    Plcy    Limit
-------------------------------------------------------------------------------
1:3               3             100     65534 
1:4               3             255     max   
1:5               3             100     65534 
-------------------------------------------------------------------------------
3 SDP('s) found
===============================================================================
 
 
show system security cpu-protection policy association                           
===============================================================================
Associations for CPU Protection policy 100
===============================================================================
Description : (Not Specified)
SAP associations
-------------------------------------------------------------------------------
Service Id  : 3                         Type   : VPLS
  SAP 1/1/1                                         mac-monitoring 
  SAP 1/1/2                                         eth-cfm-monitoring aggr car
  SAP 1/1/3                                         eth-cfm-monitoring 
  SAP 1/1/4                                         
-------------------------------------------------------------------------------
Number of SAP's : 4
SDP associations
-------------------------------------------------------------------------------
Service Id  : 3                         Type   : VPLS
  SDP 1:1                eth-cfm-monitoring aggr car
  SDP 1:3                eth-cfm-monitoring aggr 
  SDP 1:5                mac-monitoring 
  SDP 17407:4123456789   eth-cfm-monitoring car
-------------------------------------------------------------------------------
Number of SDP's : 4
Interface associations
-------------------------------------------------------------------------------
  None
Managed SAP associations
-------------------------------------------------------------------------------
  None
Video-Interface associations
-------------------------------------------------------------------------------
  None
===============================================================================
Associations for CPU Protection policy 254
===============================================================================
Description : Default (Modifiable) CPU-Protection Policy assigned to Access
              Interfaces
SAP associations
-------------------------------------------------------------------------------
  None
SDP associations
-------------------------------------------------------------------------------
  None
Interface associations
-------------------------------------------------------------------------------
Router-Name : Base                      
  ies6If
Router-Name : vprn7                     
  vprn If
-------------------------------------------------------------------------------
Number of interfaces : 2
Managed SAP associations
-------------------------------------------------------------------------------
  None
Video-Interface associations
-------------------------------------------------------------------------------
  None
===============================================================================
Associations for CPU Protection policy 255
===============================================================================
Description : Default (Modifiable) CPU-Protection Policy assigned to Network
              Interfaces
 
SAP associations
-------------------------------------------------------------------------------
  None
SDP associations
-------------------------------------------------------------------------------
Service Id  : 3                         Type   : VPLS
  SDP 1:2                
  SDP 1:4                eth-cfm-monitoring 
Service Id  : 6                         Type   : IES
  SDP 1:6                
Service Id  : 7                         Type   : VPRN
  SDP 1:7                
Service Id  : 9                         Type   : Epipe
  SDP 1:9                
Service Id  : 300                       Type   : VPLS
  SDP 1:300              
-------------------------------------------------------------------------------
Number of SDP's : 6
Interface associations
-------------------------------------------------------------------------------
Router-Name : Base                      
  system
-------------------------------------------------------------------------------
Number of interfaces : 1
Managed SAP associations
-------------------------------------------------------------------------------
  None
Video-Interface associations
-------------------------------------------------------------------------------
  None
===============================================================================
 
 
show system security cpu-protection policy 100 association                  
===============================================================================
Associations for CPU Protection policy 100
===============================================================================
Description : (Not Specified)
 
SAP associations
-------------------------------------------------------------------------------
Service Id  : 3                         Type   : VPLS
  SAP 1/1/1                                         mac-monitoring 
  SAP 1/1/2                                         eth-cfm-monitoring aggr car
  SAP 1/1/3                                         eth-cfm-monitoring 
  SAP 1/1/4                                         
-------------------------------------------------------------------------------
Number of SAP's : 4
SDP associations
-------------------------------------------------------------------------------
Service Id  : 3                         Type   : VPLS
  SDP 1:1                eth-cfm-monitoring aggr car
  SDP 1:3                eth-cfm-monitoring aggr 
  SDP 1:5                mac-monitoring 
  SDP 17407:4123456789   eth-cfm-monitoring car
-------------------------------------------------------------------------------
Number of SDP's : 4
Interface associations
-------------------------------------------------------------------------------
  None
Managed SAP associations
-------------------------------------------------------------------------------
  None
Video-Interface associations
-------------------------------------------------------------------------------
  None
===============================================================================
A:bksim130# 
 
 
show system security cpu-protection violators    
 ==============================================================================
Ports where a rate limit is violated
===============================================================================
Port-Id
  Type Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
No ports found
===============================================================================
Interfaces where the protection policy overall rate limit is violated
===============================================================================
Interface-Name                               Router-Name
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
No interfaces found
===============================================================================
SAP's where the protection policy overall rate limit is violated
===============================================================================
SAP-Id                                       Service-Id
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
1/1/1                                        3          
  100  61234 05/01/2010 01:43:41 06/27/2010 22:37:02 3000000001 
-------------------------------------------------------------------------------
1 SAP('s) found
===============================================================================
SDP's where the protection policy overall rate limit is violated
===============================================================================
SDP-Id           Service-Id
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
1:1              3          
  100  61234 05/01/2010 01:43:41 06/27/2010 22:37:02 3000000001 
1:2              3          
  255  max   05/01/2010 01:43:43 06/27/2010 22:37:05 3000000002 
1:3              3          
  100  61234 05/01/2010 01:43:45 06/27/2010 22:37:08 3000000003 
1:4              3          
  255  max   05/01/2010 01:43:47 06/27/2010 22:37:11 3000000004 
1:5              3          
  100  61234 05/01/2010 01:43:49 06/27/2010 22:37:14 3000000005 
-------------------------------------------------------------------------------
5 SDP('s) found
===============================================================================
Video clients where the protection policy per-source rate limit is violated
===============================================================================
Client IP Address  Video-Interface                 Service-Id
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
No clients found
===============================================================================

eth-cfm-monitoring

Syntax 
eth-cfm-monitoring [{service-id service-id sap-id sap-id} | {service-id service-id sdp-id sdp-id:vc-id}]
Context 
show>system>security>cpu-protection
Description 

This command displays sources exceeding their eth-cfm-monitoring rate limit.

Parameters 
service-id—
Specifies the service ID.
Values—
1 to 2148278317, svc-name up to 64 characters in length

 

excessive-sources

Syntax 
excessive-sources [service-id service-id sap-id sap-id]
Context 
show>system>security>cpu-protection
Description 

This command displays sources exceeding their per-source rate limit.

Parameters 
service-id
Displays information for services exceeding their per-source rate limit.
sap-id
Displays information for SAPs exceeding their per-source rate limit.

protocol-protection

Syntax 
protocol-protection
Context 
show>system>security>cpu-protection
Description 

This command display all interfaces with non-zero drop counters.

violators

Syntax 
violators [port] [interface] [sap] [video] [sdp]
Context 
show>system>security>cpu-protection
Description 

This command displays all interfaces, ports or SAPs with CPU protection policy violators. It also includes objects (SAPs, interfaces) that exceed the out-profile-rate and have the log-events keyword enabled for the out-profile-rate in the cpu-protection policy associated with the object.

Parameters 
port—
Displays violators associated with the port.
interface—
Displays violators associated with the interface.
sap—
Displays violators associated with the SAP.
video—
Displays violators associated with the video entity.
sdp—
Displays violators associated with the SDP.
Output 

The following is an example of CPU protection violators information.

Sample Output
*A:SecuritySR7>config>sys>security>cpu-protection>policy# show system security
 cpu-protection violators
===============================================================================
Ports where a rate limit is violated
===============================================================================
Port-Id
  Type Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
No ports found
===============================================================================
Interfaces where the protection policy overall rate limit is violated
===============================================================================
Interface-Name                               Router-Name
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
toIxia                                       Base           
  255  1000  10/02/2012 18:38:23 10/02/2012 18:39:31 70         
-------------------------------------------------------------------------------
1 interface(s) found
===============================================================================
SAP's where the protection policy overall rate limit is violated
===============================================================================
SAP-Id                                       Service-Id
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
No SAP's found
===============================================================================
 
SDP's where the protection policy overall rate limit is violated
===============================================================================
SDP-Id           Service-Id
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
No SDP's found
===============================================================================
Video clients where the protection policy per-source rate limit is violated
===============================================================================
Client IP Address  Video-Interface                 Service-Id
  Plcy Limit First-Time          Last-Time           Violation-Periods
-------------------------------------------------------------------------------
No clients found
===============================================================================

dist-cpu-protection

Syntax 
cpu-protection
Context 
show>system>security
Description 

This command enables the context to display Distributed CPU Protection information.

keychain

Syntax 
keychain [key-chain] [detail]
Context 
show>system>security
Description 

This command displays keychain information.

Parameters 
key-chain—
Specifies the keychain name to display.
detail—
Displays detailed keychain information.
Output 

The following is an example of keychain information.

Sample Output
*A:ALA-A# show system security keychain test
===============================================================================
Key chain:test
===============================================================================
TCP-Option number send     : 254                    Admin state   : Up
TCP-Option number receive  : 254                    Oper state    : Up
===============================================================================
*A:ALA-A# 
*A:ALA-A#  show system security keychain test detail
===============================================================================
Key chain:test
===============================================================================
TCP-Option number send     : 254                    Admin state   : Up
TCP-Option number receive  : 254                    Oper state    : Up
===============================================================================
Key entries for key chain: test
===============================================================================
Id               : 0
Direction        : send-receive         Algorithm        : hmac-sha-1-96
Admin State      : Up                   Valid            : Yes
Active           : Yes                  Tolerance        : 300
Begin Time       : 2007/02/15 18:28:37  Begin Time (UTC) : 2007/02/15 17:28:37
End Time         : N/A                  End Time (UTC)   : N/A
===============================================================================
Id               : 1
Direction        : send-receive         Algorithm        : aes-128-cmac-96
Admin State      : Up                   Valid            : Yes
Active           : No                   Tolerance        : 300
Begin Time       : 2007/02/15 18:27:57  Begin Time (UTC) : 2007/02/15 17:27:57
End Time         : 2007/02/15 18:28:13  End Time (UTC)   : 2007/02/15 17:28:13
===============================================================================
Id               : 2
Direction        : send-receive         Algorithm        : aes-128-cmac-96
Admin State      : Up                   Valid            : Yes
Active           : No                   Tolerance        : 500
Begin Time       : 2007/02/15 18:28:13  Begin Time (UTC) : 2007/02/15 17:28:13
End Time         : 2007/02/15 18:28:37  End Time (UTC)   : 2007/02/15 17:28:37
===============================================================================
*A:ALA-A# 

management-access-filter

Syntax 
management-access-filter
Context 
show>system>security
Description 

This command enables the context to display management access filter information for IP and MAC filters.

ip-filter

Syntax 
ip-filter [entry entry-id]
Context 
show>system>security>mgmt-access-filter
Description 

This command displays management-access IP filters.

Parameters 
entry-id—
Displays information for the specified entry.
Values—
1 to 9999

 

Output 

The following is an example of MAF IP filter information

Table 38 describes management access filter output fields.

Sample Output
*A:Dut-F# show system security management-access-filter ip-filter
=============================================================================
IPv4 Management Access Filter
=============================================================================
filter type:  : ip
Def. Action   : permit
Admin Status  : enabled (no shutdown)
-----------------------------------------------------------------------------
Entry         : 1
Src IP        : 192.168.0.0/16
Src interface : undefined
Dest port     : undefined
Protocol      : undefined
Router        : undefined
Action        : none
Log           : disabled
Matches       : 0
=============================================================================
*A:Dut-F#
Table 38:  Show Management Access Filter Output Fields  

Label

Description

Def. action

Permit — Specifies that packets not matching the configured selection criteria in any of the filter entries are permitted.

Deny — Specifies that packets not matching the configured selection criteria in any of the filter entries are denied and that a ICMP host unreachable message will be issued.

Deny-host-unreachable — Specifies that packets not matching the configured selection criteria in the filter entries are denied.

Entry

The entry ID in a policy or filter table.

Description

A text string describing the filter.

Src IP

The source IP address used for management access filter match criteria.

Src interface

The interface name for the next hop to which the packet should be forwarded if it hits this filter entry.

Dest port

The destination port.

Matches

The number of times a management packet has matched this filter entry.

Protocol

The IP protocol to match.

Action

The action to take for packets that match this filter entry.

ipv6-filter

Syntax 
ipv6-filter [entry entry-id]
Context 
show>system>security>mgmt-access-filter
Description 

This command displays management-access IPv6 filters and only applies to the 7750 SR and 7950 XRS.

Parameters 
entry-id—
Specifies the IPv6 filter entry ID to display.
Values—
1 to 9999

 

Output 

The following is an example of MAF IPv6 filter information

Sample Output
*A:Dut-C# show system security management-access-filter ipv6-filter entry 1
=============================================================================
IPv6 Management Access Filter
=============================================================================
filter type   : ipv6
Def. Action   : permit
Admin Status  : enabled (no shutdown)
-----------------------------------------------------------------------------
Entry         : 1
Src IP        : 2001:db8::1/128
Flow label    : undefined
Src interface : undefined
Dest port     : undefined
Next-header   : undefined
Router        : undefined
Action        : permit
Log           : enabled
Matches       : 0
=============================================================================
*A:Dut-C# s

mac-filter

Syntax 
mac-filter [entry entry-id]
Context 
show>system>security>mgmt-access-filter
Description 

This command displays management access MAC filters.

Parameters 
entry-id
Displays information about the specified entry.
Values—
1 to 9999

 

Output 

The following is an example of management access filter MAC filter information.

Sample Output
*B:bksim67# show system security management-access-filter mac-filter 
=============================================================================
Mac Management Access Filter
=============================================================================
filter type   : mac                                                          
Def. Action   : permit                                                       
Admin Status  : enabled (no shutdown)                                        
-------------------------------------------------------------------------------
Entry              : 1                  Action             : deny              
FrameType          : ethernet_II        Svc-Id             : Undefined         
Src Mac            : Undefined
Dest Mac           : Undefined
Dot1p              : Undefined          Ethertype          : Disabled          
DSAP               : Undefined          SSAP               : Undefined         
Snap-pid           : Undefined          ESnap-oui-zero     : Undefined         
cfm-opcode         : Undefined                                                 
Log                : disabled           Matches            : 0                 
=============================================================================
*B:bksim67#

password-options

Syntax 
password-options
Context 
show>system>security
Description 

This command displays configured password options.

Output 

The following is an example of password options information.

Table 39 describes password options output fields.

Sample Output
A:ALA-7# show system security password-options
===============================================================================
Password Options
===============================================================================
Password aging in days                           : none
Time required between password changes           : 0d 00:10:00
 
Number of invalid attempts permitted per login   : 3
Time in minutes per login attempt                : 5
Lockout period (when threshold breached)         : 10
Authentication order                             : radius tacplus local
User password history length                     : disabled
Accepted password length                         : 6..56 characters
Credits for each character type                  : none
Required character types                         : none
Minimum number different character types         : 0
Required distance with previous password         : 5
Allow consecutively repeating a character        : always
Allow passwords containing username              : yes
Palindrome allowed                               : no
===============================================================================
A:ALA-7#
Table 39:  Show Password Options Output Fields 

Label

Description

Password aging in days

Displays the number of days a user password is valid before the user must change their password.

Time required between password changes

Displays the time interval between changed passwords.

Number of invalid attempts permitted per login

Displays the number of unsuccessful login attempts allowed for the specified time.

Time in minutes per login attempt

Displays the period of time, in minutes, that a specified number of unsuccessful attempts can be made before the user is locked out.

Lockout period (when threshold breached)

Displays the number of minutes that the user is locked out if the threshold of unsuccessful login attempts has been exceeded.

Authentication order

Displays the sequence in which password authentication is attempted among RADIUS, TACACS+, and local passwords.

User password history length

Displays the size of the password history file to be stored.

Accepted password length

Displays the minimum length required for local passwords.

Credits for each character type

Displays the credit for each character type. A credit is obtained for a particular character type; for example, uppercase, lowercase, numeric, or special character. Credits per character type are configurable. Credits can be used towards the minimum length of the password, so a trade-off can be made between a very long, simple password and a short, complex one.

Required character types

Displays the character types that are required in a password; for example, uppercase, lowercase, numeric, or special character.

Minimum number different character types

Displays the minimum number of each different character types in a password.

Required distance with previous password

Displays the minimum Levenshtein distance between a new password and the old password.

Allow consecutively repeating a character

Displays the number of times the same character is allowed to be repeated consecutively.

Allow passwords containing username

Displays whether the user name is allowed as part of the password.

Palindrome allowed

Displays whether palindromes are allowed as part of the password.

per-peer-queuing

Syntax 
per-peer-queuing [detail]
Context 
show>system>security
Description 

This command enables or disables CPM hardware queuing per peer. TTL security only operates when per-peer-queuing is enabled.

Output 

The following is an example of per peer queuing information.

Table 40 describes per-peer-queuing output fields.

Sample Output
A:ALA-48# show system security per-peer-queuing
=================================================
CPM Hardware Queuing
=================================================
Per Peer Queuing        : Enabled
Total Num of Queues     : 8192
Num of Queues In Use    : 2
=================================================
A:ALA-48# configure
Table 40:  Show Per-Peer-Queuing Output Fields 

Label

Description

Per Peer Queuing

Displays the status (enabled or disabled) of CPM hardware queuing per peer.

Total Num of Queues

Displays the total number of hardware queues.

Num of Queues In Use

Displays the total number of hardware queues in use.

profile

Syntax 
profile [user-profile-name]
Context 
show>system>security
Description 

This command displays user profile information.

If the profile-name is not specified, then information for all profiles are displayed.

Parameters 
user-profile-name—
Displays information for the specified user profile.
Output 

The following is an example of user profile output information.

Table 41 describes user profile output fields.

Sample Output
A:ALA-7# show system security profile administrative
=============================================================================== 
User Profile                                                                    
=============================================================================== 
User Profile : administrative                                                   
Def. Action  : permit-all                                                       
------------------------------------------------------------------------------- 
Entry        : 10                                                               
Description  :                                                                  
Match Command: configure system security                                        
Action       : permit                                                           
------------------------------------------------------------------------------- 
Entry        : 20                                                               
Description  :                                                                  
Match Command: show system security                                             
Action       : permit                                                           
-------------------------------------------------------------------------------
No. of profiles: 
===============================================================================
A:ALA-7#
Table 41:  Show User Profile Output Fields  

Label

Description  

User Profile

Displays the profile name used to deny or permit user console access to a hierarchical branch or to specific commands.

Def. action

Permit all — Permits access to all commands.

Deny — Denies access to all commands.

None — No action is taken.

Entry

The entry ID in a policy or filter table.

Description

Displays the text string describing the entry.

Match Command

Displays the command or subtree commands in subordinate command levels.

Action

Permit all — Commands matching the entry command match criteria are permitted.

Deny — Commands not matching the entry command match criteria are not permitted.

No. of profiles

The total number of profiles listed.

source-address

Syntax 
source-address
Context 
show>system>security
Description 

This command displays source-address configured for applications.

Output 

The following is an example of source address output information.

Table 42 describes source address output fields.

Sample Output
A:SR-7# show system security source-address
===============================================================================
Source-Address applications
===============================================================================
Application         IP address/Interface Name                    Oper status
-------------------------------------------------------------------------------
telnet              10.20.1.7                                    Up
radius              loopback1                                    Up
===============================================================================
A:SR-7# 
Table 42:  Show Source Address Output Fields  

Label

Description

Application

Displays the source-address application.

IP address Interface Name

Displays the source address IP address or interface name.

Oper status

Up: The source address is operationally up.

Down: The source address is operationally down.

ssh

Syntax 
ssh
Context 
show>system>security
Description 

This command displays all the SSH sessions as well as the SSH status and fingerprint. The type of SSH application (CLI, SCP, SFTP, or NETCONF) is indicated for each SSH connection.

Output 

The following is an example of SSH output information.

Table 43 describes SSH output fields

Sample output
A:dut-c# show system security ssh 
===============================================================================
SSH Server
===============================================================================
Administrative State      : Enabled
Operational State         : Up
Preserve Key              : Disabled
Key-re-exchange           : 60 minutes / 1024 MB
 
SSH Protocol Version 1    : Disabled
 
SSH Protocol Version 2    : Enabled
DSA Host Key Fingerprint  : b2:9f:d6:b7:fa:f4:dc:7b:cc:a8:97:46:80:4c:f3:7a
RSA Host Key Fingerprint  : cd:43:17:59:7f:17:f8:64:c6:a8:51:9c:99:44:0f:d4
 
-------------------------------------------------------------------------------
Connection                                Username     
   Version   Cipher                       ServerName  Status
Router Ins   MAC                                      Key-re-exchange
-------------------------------------------------------------------------------
10.20.142.155                             admin
   2         aes128-ctr                   cli         connected
management   hmac-md5                                 60 minutes / 1024 MB
10.10.18.2                                admin
   2         aes128-ctr                   cli         connected
Base         hmac-md5                                 15 minutes / 512 MB
-------------------------------------------------------------------------------
Number of SSH sessions : 2
===============================================================================
Table 43:  Show System Security SSH Options Output Fields 

Label

Description  

Administrative State

Enabled: The SSH server is enabled.

Disabled: The SSH server is disabled.

Operational State

Up: The SSH server is up.

Down: The SSH server is down.

Preserve Key

Enabled: The preserve-key is enabled.

Disabled: The preserve-key is disabled.

Key-re-exchange

Displays the maximum time elapsed and maximum mbytes transmitted before a key re-exchange is initiated. All new sessions will be created with this value.

SSH protocol version 1

Enabled: SSH1 is enabled.

Disabled: SSH1 is disabled.

SSH protocol version 2

Enabled: SSH2 is enabled.

Disabled: SSH2 is disabled.

DSA Host Key Fingerprint

The key fingerprint is the server’s identity. Clients trying to connect to the server verify the server's fingerprint. If the server fingerprint is not known, the client may not continue with the SSH session since the server might be spoofed.

RSA Host Key Fingerprint

The key fingerprint is the server’s identity. Clients trying to connect to the server verify the server's fingerprint. If the server fingerprint is not known, the client cannot continue with the SSH session since the server might be spoofed.

Connection

The IP address of the connected routers (remote client).

Username

The name of the user.

Version

The SSH version number.

Cipher

3des: A SSHv1 encryption method that allows proprietary information to be transmitted over untrusted networks.

3des-cbc: A SSHv2 encryption method.

aes128-cbc: A SSHv2 128-bit encryption method.

aes128-ctr: A SSHv2 128-bit encryption method.

aes192-cbc: A SSHv2 192-bit encryption method.

aes192-ctr: A SSHv2 192-bit encryption method.

aes256-cbc: A SSHv2 256-bit encryption method.

aes256-ctr: A SSHv2 256-bit encryption method.

arcfour: A SSHv2 encryption method.

des: A SSHv1 encryption method using a private (secret) key.

blowfish: A SSHv1 encryption method.

blowfish-cbc: A SSHv2 encryption method.

cast128-cbc: A SSHv2 1280-bit encryption method.

rijndael-cbc: A SSHv2 encryption method.

Server Name

The server name.

Status

connected: The SSH connection is connected.

disconnected: The SSH connection is disconnected.

Router Ins

SSH server router instance. Can be the router name ("Base" or "management") or the VPRN Id (1 to 2147483647).

MAC

hmac-sha2-512: The SSH MAC algorithm used is hmac-sha2-512.

hmac-sha2-256: The SSH MAC algorithm used is hmac-sha2-256.

hmac-sha1: The SSH MAC algorithm used is hmac-sha1.

hmac-sha1-96: The SSH MAC algorithm used is hmac-sha1-96.

hmac-md5: The SSH MAC algorithm used is hmac-md5.

hmac-ripemd160: The SSH MAC algorithm used is hmac-ripemd160.

hmac-sha2-512: The SSH MAC algorithm used is hmac-sha2-512.

hmac-ripemd160-openssh-com: The SSH MAC algorithm used is hmac-ripemd160-openssh-com.

Key-re-exchange

Maximum time elapsed and maximum mbytes transmitted before a key re-exchange is initiated for this session.

Number of SSH sessions

The total number of SSH sessions.

The following is an example of SSH detail output information.

Table 44 describes SSH detail output fields

Sample output
*A:dut-a# show system security ssh detail 
===============================================================================
SSH Server Global
===============================================================================
Administrative State      : Enabled
Operational State         : Up
Preserve Key              : Disabled
Key-re-exchange           : 60 minutes / 1024 MB
SSH Protocol Version 1    : Disabled
SSH Protocol Version 2    : Enabled
DSA Host Key Fingerprint  : 48:4d:d0:97:0f:17:56:53:b1:23:6b:a1:5c:f2:9c:75
RSA Host Key Fingerprint  : 6d:64:ad:db:23:49:23:37:11:65:20:6b:d5:6a:ea:0a
===============================================================================
SSH Server Router Instance [Base]
===============================================================================
Access allowed            : Allowed
-------------------------------------------------------------------------------
Connection                                Username     
   Version   Cipher                       ServerName  Status
             MAC                                      Key-re-exchange
-------------------------------------------------------------------------------
No entries found
===============================================================================
SSH Server Router Instance [management]
===============================================================================
Access allowed            : Allowed
-------------------------------------------------------------------------------
Connection                                Username     
   Version   Cipher                       ServerName  Status
             MAC                                      Key-re-exchange
-------------------------------------------------------------------------------
No entries found
===============================================================================
SSH Server Router Instance [1000]
===============================================================================
Access allowed            : Disallowed
-------------------------------------------------------------------------------
Connection                                Username     
   Version   Cipher                       ServerName  Status
             MAC                                      Key-re-exchange
-------------------------------------------------------------------------------
No entries found
==============================================================================
Table 44:  Show System Security SSH Detail Options Output Fields 

Label

Description  

Administrative State

Enabled: The SSH server is enabled.

Disabled: The SSH server is disabled.

Operational State

Up: The SSH server is up.

Down: The SSH server is down.

Preserve Key

Enabled: The preserve-key is enabled.

Disabled: The preserve-key is disabled.

Key-re-exchange

Displays the maximum time elapsed and the maximum number of Mbytes transmitted before a key re-exchange is initiated.

SSH protocol version 1

Enabled: SSH1 is enabled.

Disabled: SSH1 is disabled.

SSH protocol version 2

Enabled: SSH2 is enabled.

Disabled: SSH2 is disabled.

DSA Host Key Fingerprint

The key fingerprint is the server’s identity. Clients trying to connect to the server verify the server's fingerprint. If the server fingerprint is not known, the client cannot continue with the SSH session since the server might be spoofed.

SSH Server Router Instance

SSH server router instance. Can be the router name ("Base" or "management") or the VPRN Id (1 to 2147483647).

Access Allowed

Allowed: Access to the SSH server is allowed.

Disallowed: Access to the SSH server is disallowed.

Connection

The IP address of the connected routers (remote client).

Username

The name of the user.

Version

The SSH version number.

Cipher

3des: A SSHv1 encryption method that allows proprietary information to be transmitted over untrusted networks.

3des-cbc: A SSHv2 encryption method.

aes128-cbc: A SSHv2 128-bit encryption method.

aes128-ctr: A SSHv2 128-bit encryption method.

aes192-cbc: A SSHv2 192-bit encryption method.

aes192-ctr: A SSHv2 192-bit encryption method.

aes256-cbc: A SSHv2 256-bit encryption method.

aes256-ctr: A SSHv2 256-bit encryption method.

arcfour: A SSHv2 encryption method.

des: A SSHv1 encryption method using a private (secret) key.

blowfish: A SSHv1 encryption method.

blowfish-cbc: A SSHv2 encryption method.

cast128-cbc: A SSHv2 1280-bit encryption method.

rijndael-cbc: A SSHv2 encryption method.

Server Name

The server name.

Status

connected: Displays that the SSH connection is connected.

disconnected: Displays that the SSH connection is disconnected.

MAC

hmac-sha2-512: The SSH MAC algorithm used is hmac-sha2-512.

hmac-sha2-256: The SSH MAC algorithm used is hmac-sha2-256.

hmac-sha1: The SSH MAC algorithm used is hmac-sha1.

hmac-sha1-96: The SSH MAC algorithm used is hmac-sha1-96.

hmac-md5: The SSH MAC algorithm used is hmac-md5.

hmac-ripemd160: The SSH MAC algorithm used is hmac-ripemd160.

hmac-sha2-512: The SSH MAC algorithm used is hmac-sha2-512.

hmac-ripemd160-openssh-com: The SSH MAC algorithm used is hmac-ripemd160-openssh-com.

Key-re-exchange

Displays the maximum time elapsed and the maximum number of Mbytes transmitted before a key re-exchange is initiated for this session.

Number of SSH sessions

The total number of SSH sessions.

user

Syntax 
user [user-id] [detail]
user [user-id] lockout
Context 
show>system>security
Description 

This command displays user registration information.

If no command line options are specified, summary information for all users displays.

Parameters 
user-id—
Displays information for the specified user.
Default—
All users
detail—
Displays detailed user information to the summary output.
lockout—
Displays information about any users who are currently locked out.
Output 

The following is an example of user output information.

Table 45 describes user output fields.

Sample Output
show system security user
===============================================================================
Users
===============================================================================
user id      need    user permissions           password attempted failed local
             new pwd console ftp snmp           expires  logins    logins conf
-------------------------------------------------------------------------------
admin        n       y       n   n              never    21        0      y
===============================================================================
 
show system security user detail
===============================================================================
Users
===============================================================================
user id       need     user permissions   password   attempted  failed    local
              new pwd  console ftp snmp   expires    logins     logins    conf
-------------------------------------------------------------------------------
admin         n        y       n   n      never      21         0         y
===============================================================================
User Configuration Detail
===============================================================================
user id            : admin
-------------------------------------------------------------------------------
console parameters
-------------------------------------------------------------------------------
new pw required    :                     no cannot change pw : no
home directory     : cf3:\
restricted to home : no
login exec file    :
profile            : administrative
-------------------------------------------------------------------------------
snmp parameters
===============================================================================
 
show system security user detail
===============================================================================
Users
===============================================================================
User ID      New User Permissions                 Password Login   Failed Local
             Pwd console ftp li snmp netconf grpc Expires  Attempt Logins Conf
-------------------------------------------------------------------------------
admin        n   y       y   n  y    y       n    never    9       0      y
-------------------------------------------------------------------------------
Number of users : 1
===============================================================================
===============================================================================
User Configuration Detail
===============================================================================
===============================================================================
user id            : admin
-------------------------------------------------------------------------------
console parameters
-------------------------------------------------------------------------------
new pw required    : no                 cannot change pw   : no
home directory     :
restricted to home : no
login exec file    :
profile            : default
profile            : administrative
locked-out         : no
-------------------------------------------------------------------------------
snmp parameters
-------------------------------------------------------------------------------
 
show system security user lockout
===============================================================================
Currently Failed Login Attempts
===============================================================================
User ID Remaining Login attempts Remaining Lockout Time (min:sec)
-------------------------------------------------------------------------------
user123 N/A 9:56
-------------------------------------------------------------------------------
Number of users : 1
===============================================================================
Table 45:  Show System Security User Output Fields 

Label

Description  

User ID

The name of a system user.

Users

New Pwd

y — The user must change their password at the next login.

n — The user does not need to change their password at the next login.

User Permissions

console:

y — The user is authorized for console access.

n — The user is not authorized for console access.

ftp:

y — The user is authorized for FTP access.

n — The user is not authorized for FTP access.

li:

y — The user is authorized for LI access.

n — The user is not authorized for LI access.

snmp:

y — The user is authorized for SNMP access.

n — The user is not authorized for SNMP access.

netconf:

y — The user is authorized for NETCONF access.

n — The user is not authorized for NETCONF access.

grpc:

y — The user is authorized for gRPC access.

n — The user is not authorized for gRPC access.

Password Expires

The number of days after which the user must change their password.

Login Attempt

The number of times that the user has attempted to log in, irrespective of whether the login succeeded or failed.

Failed Logins

The number of unsuccessful login attempts.

Local Conf

y — Password authentication is based on the local password database.

n — Password authentication is not based on the local password database.

Number of users

The total number of listed users.

User Configuration Detail

new pw required

yes — The user must change their password at the next login.

no — The user does not need to change their password at the next login.

cannot change pw

yes — The user does not have the ability to change their password.

no — The user has the ability to change their password.

home directory

The local home directory for the user for both console and FTP access.

restricted to home

yes — The user is not allowed to navigate to a directory higher in the directory tree on the home directory device.

no — The user is allowed to navigate to a directory higher in the directory tree on the home directory device.

login exec file

The user’s login exec file which executes whenever the user successfully logs in to a console session.

profile

The security profiles associated with the user.

locked-out

Whether the user is currently locked out, and, if they are locked out, how much time remains before the user can attempt to log into the node again.

Currently Failed Login Attempts

Remaining Login Attempts

The number of login attempts remaining before the user is locked out.

Remaining Lockout Time (min:sec)

The number of minutes and seconds remaining until the lockout expires and the user can attempt to log in again.

With the introduction of the PKI on an SR (SSH Server) the authentication process can be done via PKI or password. SSH client usually authenticate via PKI and password if PKI is configured on the client. In this case PKI takes precedence over password in most clients.

All client authentications are logged and display in the show>system>security>user detail. Table 46 shows the rules where pass and fail attempts are logged.

Table 46:  Pass/Fail Login Attempts  

Authentication Order

Client (such as, putty)

Server (such as, SR)

CLI Show System Security Attempts (SR)

Private Key Programmed

Public Key Configured

Password Configured

Logins Attempts

Failed Logins

1. Public Key

Yes

Yes

N/A

Increment

2. Password

Yes

Yes (No match between client and server. Go to password.)

Yes

Increment

Yes

No

Yes

Increment

No

N/A

Yes

Increment

No

N/A

No

Increment

1. Public Key (only)

Yes

Yes

N/A

Increment

Yes

Yes (No match between client and server. Go to password.)

Increment

Yes

N/A

Increment

No

N/A

Increment

view

Syntax 
view [view-name] [detail]
Context 
show>system>security
Description 

This command displays the SNMP MIB views.

Parameters 
view-name—
Specifies the name of the view to display output. If no view name is specified, the complete list of views displays.
detail—
Displays detailed view information.
Output 

The following is an example of SNMP MIB view information.

Table 47 describes show view output fields.

Sample Output
A:ALA-48# show system security view
===============================================================================
Views
===============================================================================
view name         oid tree                        mask              permission
-------------------------------------------------------------------------------
iso               1                                                 included
read1             1.1.1.1                         11111111          included
write1            2.2.2.2                         11111111          included
testview          1                               11111111          included
testview          1.3.6.1.2                       11111111          excluded
mgmt-view         1.3.6.1.2.1.2                                     included
mgmt-view         1.3.6.1.2.1.4                                     included
...
mgmt-view         1.3.6.1.4.1.6527.3.1.2.3.11                       included
vprn-view         1.3.6.1.2.1.2                                     included
vprn-view         1.3.6.1.2.1.4                                     included
...
vprn-view         1.3.6.1.4.1.6527.3.1.2.20.1                       included
no-security       1                                                 included
no-security       1.3.6.1.6.3                                       excluded
...
no-security       1.3.6.1.6.3.15.1.1                                included
on-security       2                               00000000          included
-------------------------------------------------------------------------------
No. of Views: 33
===============================================================================
A:ALA-48#
Table 47:  Show View Output Fields  

Label

Description  

view name

The name of the view. Views control the accessibility of a MIB object within the configured MIB view and subtree.

oid tree

The object identifier of the ASN.1 subtree.

mask

The bit mask that defines a family of view subtrees.

permission

Indicates whether each view is included or excluded

No. of Views

Displays the total number of views.

certificate

Syntax 
certificate
Context 
show
Description 

This command displays certificate information.

ca-profile

Syntax 
ca-profile
ca-profile name [association]
Context 
show>certificate
Description 

This command shows certificate-authority profile information.

Parameters 
name—
Specifies the name of the Certificate Authority (CA) profile.
association—
Displays associated CA profiles.

ocsp-cache

Syntax 
ocsp-cache [entry-id]
Context 
show>certificate
Description 

This command displays the current cached OCSP results. The output includes the following information:

Certificate issuer

Certificate serial number

OCSP result

Cache entry expire time

Parameters 
entry-id—
Specifies the local cache entry identifier of the certificate that was validated by the OCSP responder.
Values—
1 to 2000

 

statistics

Syntax 
statistics
Context 
show>certificate
Description 

This command shows certificate related statistics.

dist-cpu-protection

Syntax 
dist-cpu-protection
Context 
show>card>fp
Description 

This command displays Distributed CPU Protection parameters and status at the per card and forwarding plane level.

Output 

The following is an example of distributed CPU protection fields. Table 48 describes Distributed CPU Protection output fields.

Sample Output
*A:nodeA# show card 1 fp 1 dist-cpu-protection
===============================================================================
Card : 1 Forwarding Plane(FP) : 1
===============================================================================
Dynamic Enforcement Policer Pool : 2000
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Statistics Information
-------------------------------------------------------------------------------
Dynamic-Policers Currently In Use      : 48
Hi-WaterMark Hit Count                 : 72
Hi-WaterMark Hit Time                  : 01/03/2013 15:08:42 UTC
Dynamic-Policers Allocation Fail Count : 0
-------------------------------------------------------------------------------
===============================================================================
Table 48:  Show Distributed CPU Protection Output Fields  

Label

Description

Card

The card identifier

Forwarding Plane(FP)

Identifies the instance of the FP (FastPath) chipset. Some cards have a single FP (for example, an IOM3-XP) and some cards can contain multiple FPs (for example, an XCM can house multiple FPs via its two XMAs).

Dynamic Enforcement Policer Pool

The configured size of the dynamic-enforcement-policer-pool for this card or FP.

Dynamic-Policers Currently In Use

The number of policers from the dynamic enforcement policer pool that are currently in use. The policers are allocated from the pool and instantiated as per-object-per-protocol dynamic enforcement policers after a local monitor triggered for an object (such as a SAP or Network Interface).

Hi-WaterMark Hit Count

The maximum Currently In Use value since it was last cleared (clear card x fp y dist-cpu-protection)

Hi-WaterMark Hit Time

The time at which the current Hi-WaterMark Hit Count was first recorded.

Dynamic-Policers Allocation Fail Count

Indicates how many times the system attempted to allocate dynamic enforcement policers but could not get enough the fill the request.

dist-cpu-protection

Syntax 
dist-cpu-protection [detail]
Context 
show>service>id>sap
Description 

This command displays Distributed CPU Protection parameters and status at the per SAP level.

Parameters 
detail
Specifies to include the adapted operational rate parameters in the CLI output. The adapted Oper. parameters are only applicable if the policer is instantiated (for example, if the associated forwarding plane is operational, or for an interface if there is a physical port configured for the interface, or if the dynamic policers are allocated), otherwise values of 0 kb/s, and so on, are displayed.
Output 

The following is an example of distributed CPU Protection Policer Output information.

Table 49 describes Distributed CPU Protection Policer output fields.

Sample Output
*A:nodeA# show service id 33 sap 1/1/3:33 dist-cpu-protection detail
===============================================================================
Service Access Points(SAP) 1/1/3:33
===============================================================================
Distributed CPU Protection Policy :  test1
-------------------------------------------------------------------------------
Statistics/Policer-State Information
===============================================================================
-------------------------------------------------------------------------------
Static Policer
-------------------------------------------------------------------------------
Policer-Name        : arp
Card/FP             : 1/1                Policer-State      : Conform
Protocols Mapped    : arp
Exceed-Count        : 0
Detec. Time Remain  : 0 seconds          Hold-Down Remain.  : none
Operational (adapted) rate parameters:
 Oper. Packets      : 5 ppi              Oper. Within       : 8 seconds
 Oper. Initial Delay: 6 packets
 Oper. Depth        : 0 packets
 
Policer-Name        : dhcp
Card/FP             : 1/1                Policer-State      : Conform
Protocols Mapped    : dhcp
Exceed-Count        : 0
Detec. Time Remain  : 0 seconds          Hold-Down Remain.  : none
Operational (adapted) rate parameters:
 Oper. Kbps         : 2343 kbps          Oper. MBS          : 240 kilobytes
 Oper. Depth        : 0 bytes
 
… (snip)
 
 
*A:nodaA# show service id 33 sap 1/1/3:34 dist-cpu-protection detail
===============================================================================
Service Access Points(SAP) 1/1/3:34
===============================================================================
Distributed CPU Protection Policy :  test2
-------------------------------------------------------------------------------
Statistics/Policer-State Information
===============================================================================
Static Policer
-------------------------------------------------------------------------------
No entries found
-------------------------------------------------------------------------------
Local-Monitoring Policer
-------------------------------------------------------------------------------
Policer-Name        : my-local-mon1
Card/FP             : 1/1                Policer-State      : conform
Protocols Mapped    : arp, pppoe-pppoa
Exceed-Count        : 0
All Dyn-Plcr Alloc. : False
Operational (adapted) rate parameters:
 Oper. Packets      : 10 ppi             Oper. Within       : 8 seconds
 Oper. Initial Delay: 8 packets
 Oper. Depth        : 0 packets
-------------------------------------------------------------------------------
Dynamic-Policer (Protocol)
-------------------------------------------------------------------------------
Protocol(Dyn-Plcr)  : arp
Card/FP             : 1/1                Protocol-State     : not-applicable
Exceed-Count        : 0
Detec. Time Remain  : 0 seconds          Hold-Down Remain.  : none
Dyn-Policer Alloc.  : False
Operational (adapted) rate parameters: unknown
 
Protocol(Dyn-Plcr)  : pppoe-pppoa
Card/FP             : 1/1                Protocol-State     : not-applicable
Exceed-Count        : 0
Detec. Time Remain  : 0 seconds          Hold-Down Remain.  : none
Dyn-Policer Alloc.  : False
Operational (adapted) rate parameters: unknown
-------------------------------------------------------------------------------
Table 49:  Show Distributed CPU Protection Policer Output Fields  

Label

Description

Distributed CPU Protection Policy

The DCP policy assigned to the object.

Policer-Name

The configured name of the static policer

Card/FP

The card and FP identifier. FP identifies the instance of the FP (FastPath) chipset. Some cards have a single FP (for example, IOM3-XP) and some cards can contain multiple FPs (for example, an XCM can house multiple FPs via its two XMAs).

Policer-State

The state of the policer with the following potential values:

Exceed — The policer has been detected as not conforming to the associated DCP policy parameters (for example, packets exceeded the configured rate and the DCP polling process identified this occurrence)

ConformThe policer has been detected as conforming to the associated DCP policy parameters (rate)

not-applicableNewly-created policers or policers that are not currently instantiated. This includes policers configured on line cards that are not in service.

Protocols Mapped

A list of protocols that are configured to map to the particular policer.

Oper. xyz fields

The actual hardware may not be able to perfectly rate limit to the exact configured rate parameters in a DCP policy. In this case the configured rate parameters will be adapted to the closest supported rate. These adapted operational values are displayed in CLI when the detail keyword is included in the show command. The adapted Oper. parameters are only applicable if the policer is instantiated (for example, if the associated forwarding plane is operational, or for an interface if there is a physical port configured for the interface, or if the dynamic policers are allocated), otherwise values of 0 kb/s, and so on, are displayed.

Oper. Kbps - The adapted “kilobits-per-second” value for DCP “kbps” rates

Oper. MBS - The adapted “mbs size” value for DCP “kbps” rates

Oper. Depth - The calculated policer bucket depth in packets (for DCP “packets” rates) or in bytes (for DCP “kbps” rates)

Oper. Packets - The adapted “ppi” value for DCP “packets” rates

Oper. Within - The adapted “within seconds” value for DCP “packets” rates

Oper. Init. Delay - The adapted “initial-delay packets” value for DCP “packets” rates

Exceed-Count

The count of packets exceeding the policing parameters since the given policer was previously declared as conforming or newly-instantiated. This counter has the same behavior as the exceed counter in the DCP the log events, they are baselined (reset) when the policer transitions to conforming.

Detec. Time Remain

The remaining time in the detection-time countdown during which a policer in the exceed state is being monitored to see if it conforms again.

Hold-Down Remain

The remaining time in the hold-down countdown during which a policer is treating all packets as exceeding.

All Dyn-Plcr Alloc.

Indicates that all the dynamic enforcement policers have been allocated and instantiated for a given local-monitor.

Dyn-Policer Alloc.

Indicates that a dynamic policer has been instantiated.

dist-cpu-protection

Syntax 
dist-cpu-protection [detail]
Context 
show>router>interface
Description 

This command displays Distributed CPU Protection parameters and status at the router Interface level.

Parameters 
detail
Specifies to include the adapted operational rate parameters in the CLI output. The adapted Oper. parameters are only applicable if the policer is instantiated (for example, if the associated forwarding plane is operational, or for an interface if there is a physical port configured for the interface, or if the dynamic policers are allocated), otherwise values of 0 kb/s, and so on, are displayed.
Output 

The following is an example of Distributed CPU Protection Policer Output information.

Table 50 describes Distributed CPU Protection Policer output fields.

Sample Output
 
*A:Dut-A# show router interface "test" dist-cpu-protection detail 
===============================================================================
Interface "test" (Router: Base)
===============================================================================
Distributed CPU Protection Policy :  dcpuPol
-------------------------------------------------------------------------------
Statistics/Policer-State Information
===============================================================================
Static Policer
-------------------------------------------------------------------------------
Policer-Name        : staticArpPolicer 
Card/FP             : 4/1               Policer-State       : Exceed
Protocols Mapped    : arp  
Exceed-Count        : 10275218          
Detec. Time Remain  : 29 seconds        Hold-Down Remain.   : none
Operational (adapted) Rate Parameters:
 Oper. Packets      : 100 ppi            Oper. Within       : 1 seconds
 Oper. Initial Delay: none              
 Oper. Depth        : 100 packets       
-------------------------------------------------------------------------------
Local-Monitoring Policer
-------------------------------------------------------------------------------
Policer-Name        : localMonitor 
Card/FP             : 4/1               Policer-State       : Exceed
Protocols Mapped    : icmp, ospf 
Exceed-Count        : 8019857           
All Dyn-Plcr Alloc. : True              
Operational (adapted) Rate Parameters:
 Oper. Packets      : 200 ppi            Oper. Within       : 1 seconds
 Oper. Initial Delay: none              
 Oper. Depth        : 0 packets         
-------------------------------------------------------------------------------
Dynamic-Policer (Protocol)
-------------------------------------------------------------------------------
Protocol(Dyn-Plcr)  : icmp 
Card/FP             : 4/1               Protocol-State      : Exceed
Exceed-Count        : 1948137           
Detec. Time Remain  : 29 seconds        Hold-Down Remain.   : none
Dyn-Policer Alloc.  : True              
Operational (adapted) Rate Parameters:
 Oper. Kbps         : 25 kbps            Oper. MBS          : 256 bytes
 Oper. Depth        : 274 bytes         
 
Protocol(Dyn-Plcr)  : ospf 
Card/FP             : 4/1               Protocol-State      : Exceed
Exceed-Count        : 1487737           
Detec. Time Remain  : 29 seconds        Hold-Down Remain.   : none
Dyn-Policer Alloc.  : True              
Operational (adapted) Rate Parameters:
 Oper. Kbps         : 25 kbps            Oper. MBS          : 256 bytes
 Oper. Depth        : 284 bytes         
-------------------------------------------------------------------------------
===============================================================================
Table 50:  Show Distributed CPU Protection Policer Output Fields  

Label

Description

Distributed CPU Protection Policy

Displays the DCP policy assigned to the object.

Policer-Name

Displays the configured name of the static policer

Card/FP

Displays the card and FP identifier. FP identifies the instance of the FP (FastPath) chipset. Some cards have a single FP (for example, IOM3-XP) and some cards can contain multiple FPs (for example, an XCM can house multiple FPs via its two XMAs).

Policer-State

Displays the state of the policer with the following potential values:

Exceed - The policer has been detected as nonconforming to the associated DCP policy parameters (packets exceeded the configured rate and the DCP polling process identified this occurrence)

Conform - The policer has been detected as conforming to the associated DCP policy parameters (rate)

not-applicable - newly-created policers or policers that are not currently instantiated. This includes policers configured on line cards that are not in service.

Protocols Mapped

Displays a list of protocols that are configured to map to the particular policer.

Oper. xyz fields

The actual hardware may not be able to perfectly rate limit to the exact configured rate parameters in a DCP policy. In this case the configured rate parameters will be adapted to the closest supported rate. These adapted operational values are displayed in CLI when the detail keyword is included in the show command. The adapted Oper. parameters are only applicable if the policer is instantiated (for example, if the associated forwarding plane is operational, or for an interface if there is a physical port configured for the interface, or if the dynamic policers are allocated), otherwise values of 0 kb/s, and so on, are displayed.

Oper. Kbps - Displays the adapted “kilobits-per-second” value for DCP “kbps” rates

Oper. MBS - Displays the adapted “mbs size” value for DCP “kbps” rates

Oper. Depth - Displays the calculated policer bucket depth in packets (for DCP “packets” rates) or in bytes (for DCP “kbps” rates)

Oper. Packets - Displays the adapted “ppi” value for DCP “packets” rates

Oper. Within - Displays the adapted “within seconds” value for DCP “packets” rates

Oper. Init. Delay - Displays the adapted “initial-delay packets” value for DCP “packets” rates

Exceed-Count

Displays the count of packets exceeding the policing parameters since the given policer was previously declared as conforming or newly-instantiated. This counter has the same behavior as the exceed counter in the DCP the log events – they are baselined (reset) when the policer transitions to conforming.

Detec. Time Remain

Displays the remaining time in the detection-time countdown during which a policer in the exceed state is being monitored to see if it conforms again.

Hold-Down Remain

Displays the remaining time in the hold-down countdown during which a policer is treating all packets as exceeding.

All Dyn-Plcr Alloc.

Indicates that all the dynamic enforcement policers have been allocated and instantiated for a given local-monitor.

Dyn-Policer Alloc.

Indicates that a dynamic policer has been instantiated.

Table 51:  Show Distributed CPU Protection Policer Output Fields  

Label

Description

Distributed CPU Protection Policy

Displays the DCP policy assigned to the object.

Policer-Name

Displays the configured name of the static policer

Card/FP

Displays the card and FP identifier. FP identifies the instance of the FP (FastPath) chipset. Some cards have a single FP (for example, IOM3-XP) and some cards can contain multiple FPs (for example, an XCM can house multiple FPs via its two XMAs).

Policer-State

Displays the state of the policer with the following potential values:

Exceed — The policer has been detected as nonconforming to the associated DCP policy parameters (packets exceeded the configured rate and the DCP polling process identified this occurrence).

ConformThe policer has been detected as conforming to the associated DCP policy parameters (rate).

not-applicableNewly-created policers or policers that are not currently instantiated. This includes policers configured on line cards that are not in service.

Protocols Mapped

Displays a list of protocols that are configured to map to the particular policer.

Oper. xyz fields

The actual hardware may not be able to perfectly rate limit to the exact configured rate parameters in a DCP policy. In this case the configured rate parameters will be adapted to the closest supported rate. These adapted operational values are displayed in CLI when the detail keyword is included in the show command. The adapted Oper. parameters are only applicable if the policer is instantiated (for example, if the associated forwarding plane is operational, or for an interface if there is a physical port configured for the interface, or if the dynamic policers are allocated), otherwise values of 0 kb/s, and so on, are displayed.

Oper. KbpsDisplays the adapted “kilobits-per-second” value for DCP “kbps” rates

Oper. MBS — Displays the adapted “mbs size” value for DCP “kbps” rates

Oper. DepthDisplays the calculated policer bucket depth in packets (for DCP “packets” rates) or in bytes (for DCP “kbps” rates)

Oper. PacketsDisplays the adapted “ppi” value for DCP “packets” rates

Oper. WithinDisplays the adapted “within seconds” value for DCP “packets” rates

Oper. Init. DelayDisplays the adapted “initial-delay packets” value for DCP “packets” rates

Exceed-Count

Displays the count of packets exceeding the policing parameters since the given policer was previously declared as conforming or newly-instantiated. This counter has the same behavior as the exceed counter in the DCP the log events – they are baselined (reset) when the policer transitions to conforming.

Detec. Time Remain

Displays the remaining time in the detection-time countdown during which a policer in the exceed state is being monitored to see if it conforms again.

Hold-Down Remain

Displays the remaining time in the hold-down countdown during which a policer is treating all packets as exceeding.

All Dyn-Plcr Alloc.

Indicates that all the dynamic enforcement policers have been allocated and instantiated for a given local-monitor.

Dyn-Policer Alloc.

Indicates that a dynamic policer has been instantiated.

2.9.2.1.3. Login Control

users

Syntax 
users
Context 
show
Description 

Displays console user login and connection information.

Output 

The following is an example of user information.

Table 52 describes show users output fields.

Sample Console Users Output
*A:node-1# show users
===============================================================================
User                             Type      Login time           Idle time
  Session ID   From
===============================================================================
                                 Console         --             3d 10:11:02 --
  6            --
admin                            SSHv2     12OCT2018 20:44:15   0d 00:00:50 A-
  83           192.168.255.255
admin                            SSHv2     12OCT2018 21:09:25   0d 00:00:00 --
 #84           192.168.255.255
-------------------------------------------------------------------------------
Number of users: 2
'#' indicates the current active session
'A' indicates user is in admin mode
===============================================================================
Table 52:  Show Users Output Fields  

Label

Description

User

The user name.

Type

The user is authorized this access type.

From

The originating IP address.

Login time

The time the user logged in.

Idle time

The amount of idle time for a specific login.

Number of users

Displays the total number of users logged in.

2.9.2.2. Clear Commands

statistics

Syntax 
statistics [interface ip-int-name | ip-address]
Context 
clear>router>authentication
Description 

This command clears authentication statistics.

Parameters 
ip-int-name —
Clears the authentication statistics for the specified interface name. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.
ip-address—
Clears the authentication statistics for the specified IP address.

radius-proxy-server

Syntax 
radius-proxy-server server-name statistics
Context 
clear>router
Description 

This command clears RADIUS proxy server data.

Parameters 
server-name—
Specifies the proxy server name.
statistics—
Clears statistics for the specified server.

ip-filter

Syntax 
ip-filter [entry entry-id]
Context 
clear>cpm-filter
Description 

This command clears IP filter statistics.

Parameters 
entry-id
Specifies a particular CPM IP filter entry.
Values—
1 to 2048

 

ipv6-filter

Syntax 
ipv6-filter [entry entry-id]
Context 
clear>cpm-filter
Description 

This command clears IPv6 filter information and only applies to the 7750 SR and 7950 XRS.

Parameters 
entry-id
Specifies a particular CPM IPv6 filter entry.
Values—
1 to 2048

 

ipv6-filter

Syntax 
ipv6-filter [entry entry-id]
Context 
clear>cpm-filter
Description 

This command clears IPv6 filter statistics.

Parameters 
entry-id
Specifies a particular CPM IP filter entry.
Values—
1 to 2048

 

mac-filter

Syntax 
mac-filter [entry entry-id]
Context 
clear>cpm-filter
Description 

This command clears MAC filter statistics.

Parameters 
entry-id
Specifies a particular CPM MAC filter entry.
Values—
1 to 2048

 

2.9.2.2.1. CPU Protection Commands

cpu-protection

Syntax 
cpu-protection
Context 
clear
Description 

This command enables the context to clear CPU protection data.

excessive-sources

Syntax 
excessive-sources
Context 
clear>cpu-protection
Description 

This command clears the records of sources exceeding their per-source rate limit.

protocol-protection

Syntax 
protocol-protection
Context 
clear>cpu-protection
Description 

This command clears the interface counts of packets dropped by protocol protection.

violators

Syntax 
violators [port] [interface] [sap]
Context 
clear>cpu-protection
Description 

This command clears the rate limit violator record.

Parameters 
port—
Clears entries for ports.
interface—
Clears entries for interfaces.
sap—
Clears entries for SAPs.

cpm-queue

Syntax 
cpm-queue queue-id
Context 
clear
Description 

This command clears CPM queue information.

Parameters 
queue-id—
Specifies the CPM queue ID.
Values—
33 to 2000

 

2.9.2.3. Debug Commands

radius

Syntax 
radius [detail] [hex]
no radius
Context 
debug
Description 

This command enables debugging for RADIUS connections.

The no form of the command disables the debug output.

Parameters 
detail—
Displays detailed output.
hex—
Displays the packet dump in hex format.

certificate

Syntax 
certificate
Context 
debug
Description 

This command enters the debug certificate context.

ocsp

Syntax 
[no] ocsp
Context 
debug>certificate
Description 

This command enables debug output of the OCSP protocol for a CA profile.

The no form of this command disables the debug output.

ca-profile

Syntax 
[no] ca-profile profile-name
Context 
debug>certificate>ocsp
Description 

This command enables debug output for a specific CA profile.

The no form of this command disables the debug output.

Parameters 
profile-name—
Specifies the profile name, up to 32 characters.

grpc

Syntax 
[no] grpc
Context 
debug>system
Description 

This command enables the debug context for gRPC.

The no form of this command removes any debug activation within the gRPC context.

client

Syntax 
client all
client ip-address
no client
Context 
debug>system>grpc
Description 

This command enables debug output for all clients for a particular client.

The no form of this command deactivates debugging for all clients.

Parameters 
all
Specifies that debugging will occur for all clients.
ip-address
Specifies the IPv4 or IPv6 address of the client.

type

Syntax 
type all
type [gnmi-capabilities] [gnmi-get] [gnmi-set] [gnmi-subscribe]
no type
Context 
debug>system>grpc
Description 

This command enables debugging for all RPCs or a particular RPC.

The no form of this command deactivates debugging for all RPCs.

Parameters 
all
Specifies that debugging is enabled for all RPCs.
gnmi-capabilities
Specifies that debugging is enabled for gNMI capability RPC.
gnmi-get
Specifies that debugging is enabled for gNMI get RPC.
gnmi-set
Specifies that debugging is enabled for gNMI set RPC.
gnmi-subscribe
Specifies that debugging is enabled for gNMI subscribe RPC.

2.9.2.4. Tools Commands

dist-cpu-protection

Syntax 
dist-cpu-protection
Context 
tools>perform>security
tools>dump>security
Description 

This command displays to release Distributed CPU Protection parameters and status at the per card and forwarding plane level.

violators

Syntax 
violators enforcement {sap | interface} card slot-number [fp fp-number]
violators local-monitor {sap | interface} card slot-number [fp fp-number]
Context 
tools>dump>security>dist-cpu-protection
Description 

This command shows the nonconforming enforcement policers and local monitors.

Parameters 
sap —
-Indicates to display the violators associated with SAPs
interface —
- Indicates to display the violators associated with router interfaces.
enforcement—
Shows exceed and hold-down for Static and Dynamic Policers.
local-monitor—
Shows state of dynamic policer allocation for Local Monitoring Policers.
card slot-number
The physical slot number for the card.
Values—
1 to n (n is platform dependent)

 

fp fp-number
Identifies the instance of the FP (FastPath) chipset. Some cards have a single FP (for example, an IOM3-XP) and some cards can contain multiple FPs (for example, an XCM can house multiple FPs via its two XMAs).
Values—
1 to 8

 

Output 

Users Output

Table 53 describes show users output fields.

Sample Output
*A:Dut-A# tools dump security dist-cpu-protection violators enforcement interface
 card 4 fp 1 
===============================================================================
Distributed Cpu Protection Current Interface Enforcer Policer Violators
===============================================================================
Interface                       Policer/Protocol                    Hld Rem       
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Violators on Slot-4 Fp-1
-------------------------------------------------------------------------------
test                            staticArpPolicer                [S] none         
test                            icmp                            [D] none         
test                            ospf                            [D] none 
-------------------------------------------------------------------------------
[S]-Static [D]-Dynamic [M]-Monitor
-------------------------------------------------------------------------------
===============================================================================
Table 53:  Output Parameters 

Label

Description

Interface

The name of the router interface

Policer/Protocol

The configured name of the static policer (indicated with an [S]) or the DCP protocol name for a dynamic policer (indicated with a [D]).

[S] / [D]

indicates a static vs dynamic policer

Hld Rem

The remaining time in the hold-down countdown during which a policer is treating all packets as exceeding.

release-hold-down

Syntax 
release-hold-down interface interface-name [protocol protocol] [static-policer name]
release-hold-down sap sap-id [protocol protocol] [static-policer name]
Context 
tools>perform>security>dist-cpu-protection
Description 

This command releases a Distributed CPU Protection (DCP) policer from a hold-down countdown (or indefinite hold-down if configured as such).

Parameters 
interface interface-name
Specifies Router interface name.
sap sap-id
Specifies sap identifier.
protocol protocol
Specifies DCP protocol name (for example, arp, dhcp)
static-policer name
Specifies DCP static policer name as defined in the DCP policy.

2.9.2.5. Admin Commands

convert-file

Syntax 
convert-file filename to output-file-name format {secure | legacy} [force]
Context 
admin>certificate
Description 

This command converts imported certificates and keys in the cf3:/system-pki directory between secure and legacy format.

Parameters 
filename—
Specifies an existing filename, up to 95 characters
output-file-name—
Specifies the output file name, up to 95 characters. If the output filename already exists, and the force keyword is not selected, the system prompts to proceed or abort.
format—
Specifies the target format
Values—
secure — Specifies the enhanced secure format
legacy — Specifies the legacy format

 

force—
Forces the conversion even if there is an existing file with the same output filename

lockout

Syntax 
clear lockout {user user-name | all}
Context 
admin>clear
Description 

This command is used to clear any lockouts for a specific user, or for all users.

Parameters 
user-name
Clears the locked username.
all—
Clears all locked usernames.

password-history

Syntax 
password-history {user user-name | all}
Context 
admin>clear
Description 

This command is used to clear old passwords used by a specific user, or for all users.

Parameters 
user-name
Clears the password history information about the specified user, up to 32 characters.
all—
Clears the password history information for all users.