4.5. Show, Clear, Monitor, and Tools Command Reference

4.5.1. Command Hierarchies

4.5.1.1. Show Commands

show
— filter
dhcp [filter-id]
dhcp6 [filter-id]
gre-tunnel-template [gre-tunnel-template-name [associations]]
ip [filter-type filter-type]
ip embedded [inactive]
ip ip-filter-id embedded [inactive]
ip ip-filter-id [detail]
ip ip-filter-id associations
ip ip-filter-id type entry-type
ip ip-filter-id counters [type entry-type] [detail]
ip ip-filter-id entry entry-id [counters] [detail]
ip ip-filter-id [entry entry-id] effective-action [{ingress | egress}]
ip ip-filter-id [entry entry-id] effective-action router [{ingress | egress}]
ip ip-filter-id [entry entry-id] effective-action service service-id [{ingress | egress}]
ip-exceptionip-filter-id
ip-exceptionip-filter-id [{associations|counters}]
ip-exceptionip-filter-id entry entry-id [counters]
ipv6 [filter-type filter-type]
ipv6 embedded [inactive]
ipv6 ipv6-filter-id embedded [inactive]
ipv6 ipv6-filter-id [detail]
ipv6 ipv6-filter-id associations
ipv6 ipv6-filter-id type entry-type
ipv6 ipv6-filter-id counters [type entry-type] [detail]
ipv6 ipv6-filter-id entry entry-id [counters] [detail]
ipv6 ipv6-filter-id [entry entry-id] effective-action [{ingress | egress}]
ipv6 ipv6-filter-id [entry entry-id] effective-action router [{ingress | egress}]
ipv6 ipv6-filter-id [entry entry-id] effective-action service service-id [{ingress | egress}]
ipv6-exception exception
ipv6-exception exception [associations]
ipv6-exception exception [counters]
ipv6-exception exception entry entry-id [counters]
log [bindings]
log log-id [match string]
mac mac-filter-id
mac mac-filter-id associations
mac mac-filter-id [type entry-type] counters [detail]
mac mac-filter-id [entry entry-id] effective-action [{ingress | egress}]
mac mac-filter-id [entry entry-id] effective-action router [{ingress | egress}]
mac mac-filter-id [entry entry-id] effective-action service service-id [{ingress | egress}]
mac [mac-filter-id] embedded [inactive]
mac mac-filter-id entry entry-id [counters] [detail]
mac [filter-type filter-type]
mac mac-filter-id type entry-type
ip-prefix-list [prefix-list-name]
ip-prefix-list prefix-list-name references
ipv6-prefix-list [prefix-list-name]
ipv6-prefix-list prefix-list-name references
port-list [port-list-name]
port-list port-list-name references
protocol-list [protocol-list-name]
protocol-list protocol-list-name references
redirect-policy [redirect-policy-name {dest ip-address | associations}]
system-filter [chained-to]

4.5.1.2. Clear Commands

clear
— filter
ip ip-filter-id [entry entry-id] [{ingress | egress}]
ip-exception filter-id [entry entry-id] [{ingress | egress}]
ipv6 ipv6-filter-id [entry entry-id] [{ingress | egress}]
ipv6-exception exception [entry entry-id] [ingress]
log log-id
mac mac-filter-id [entry entry-id] [{ingress | egress}]

4.5.1.3. Monitor Commands

monitor
— filter
ip ip-filter-id entry entry-id [interval seconds] [repeat repeat] [{absolute | rate}]
ipv6 ipv6-filter-id entry entry-id [interval seconds] [repeat repeat] [{absolute | rate}]
mac mac-filter-id entry entry-id [interval seconds] [repeat repeat] [{absolute | rate}]

4.5.1.4. Tools Commands

tools
— dump
— filter
cam-utilization [card slot-number]
overload card slot-number fp fp-number
overload card slot-number fp fp-number cpm-ip
overload card slot-number fp fp-number cpm-ipv6
overload card slot-number fp fp-number cpm-mac
overload card slot-number fp fp-number ip ip-filter-id direction direction
overload card slot-number fp fp-number ipv6 ipv6-filter-id direction direction
overload card slot-number fp fp-number mac mac-filter-id direction direction
— resources
cpm
dest-tracking ip [detail]
dest-tracking ipv6 [detail]
dest-tracking sap [detail]
dest-tracking sdp [detail]
egress-pbr [detail]
http-redirect [detail]
iom [slot-number]
ip ip-filter-id
ipv6 ipv6-filter-id
mac mac-filter-id
pattern-match [detail]
tools
— perform
— filter
— ip-filter
— entry
— ipv6-filter
— entry
— mac-filter
— entry
— redirect-policy

4.5.2. Command Descriptions

4.5.2.1. Show Commands

The following command outputs are examples only; actual displays may differ depending on supported functionality and user configuration.

dhcp

Syntax 
dhcp [filter-id]
Context 
show>filter
Description 

This command displays DHCP filter information.

Parameters 
filter-id—
Displays detailed information for the specified filter ID and its filter entries.
Values—
1 to 65535

 

Output 

The following is a sample command output for the command when no filter ID is specified.

Sample Output
*B:TechPubs>config# show filter dhcp
===============================================================================
DHCP Filters
===============================================================================
Filter-Id   Applied Description
-------------------------------------------------------------------------------
10          No      test-dhcp-filter
-------------------------------------------------------------------------------
Num filter entries: 1
===============================================================================
*B:TechPubs>config#
 
 
*B:TechPubs>config# show filter dhcp 10
===============================================================================
DHCP Filter
===============================================================================
Filter-Id    : 10                       Applied      : No
Entries      : 0
Description  : test-dhcp-filter
-------------------------------------------------------------------------------
Filter Match Criteria
-------------------------------------------------------------------------------
No Match Criteria Found
===============================================================================
*B:TechPubs>config#

dhcp6

Syntax 
dhcp6 [filter-id]
Context 
show>filter
Description 

This command displays DHCP6 filter information.

Parameters 
filter-id—
Displays detailed information for the specified filter ID and its filter entries.
Values—
1 to 65535

 

gre-tunnel-template

Syntax 
gre-tunnel-template [gre-tunnel-template-name [associations]]
Context 
show>filter
Description 

This command displays GRE tunnel template information.

Parameters 
gre-tunnel-template-name—
Specifies a GRE tunnel template name, up to 32 characters.
associations—
Appends association information.
Output 

The following output is an example of GRE tunnel template information.

Sample Output
*A:node-3# show filter gre-tunnel-template "GRE-tunnels" associations
===============================================================================
GRE tunnel template
===============================================================================
GRE Tunnel template : GRE-tunnels                Applied      : No
Description         : 10.20.1.5
GRE key             : if-index
Skip ttl decrement  : No
Source address      : 10.20.1.3
Destination address : 10.20.1.2
Destination address : 10.20.1.5
-------------------------------------------------------------------------------
Associations
-------------------------------------------------------------------------------
No associations found
===============================================================================
*A:node-3#

ip

Syntax 
ip [filter-type filter-type]
ip embedded [inactive]
ip ip-filter-id embedded [inactive]
ip ip-filter-id [detail]
ip ip-filter-id associations
ip ip-filter-id type entry-type
ip ip-filter-id counters [type entry-type] [detail]
ip ip-filter-id entry entry-id [counters] [detail]
ip ip-filter-id [entry entry-id] effective-action [{ingress | egress}]
ip ip-filter-id [entry entry-id] effective-action router [{ingress | egress}]
ip ip-filter-id [entry entry-id] effective-action service service-id [{ingress | egress}]
Context 
show>filter
Description 

This command displays IPv4 filter information.

When effective-action is specified, this command displays what effectively happens to a packet that matches the criteria associated with the IPv4 filter policy.

Parameters 
filter-type—
Specifies the type of filter to display.
Values—
config, flowspec, host-common, openflow, vsd

 

inactive—
Displays all, or optionally inactive embeddings. If ip-filter-id is specified, displays embeddings for the IP filter ID.
ip-filter-id—
Specifies the IPv4 filter policy for which to display information. Values can be expressed in different formats; the following shows decimal integer format.
Values—
1 to 65535

 

detail—
Displays detailed information.
associations—
Appends, to the detailed filter policy output, information about where the specified filter policy is applied.
entry-type—
Specifies the type of filter entry to display.
Values—
fixed, radius-insert, credit-control-insert, flow-spec, embedded, radius-shared, pcc-rule (applies only to the 7750 SR)

 

counters—
Displays counter information for the specified filter ID. Egress counters count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.
entry-id—
Specifies the filter policy entry (of the specified filter policy) for which to display information.
Values—
1 to 2097151

 

effective-action—
Displays the action that the system will effectively apply to the packet.
ingress—
Filters the output and only displays the information for filter policies applied on ingress.
egress—
Filters the output and only displays the information for filter policies applied on egress.
router—
Filters the output and only displays the information for that specific service (“Base” instance).
service-id—
Filters the output and only displays the information for the specified service. The specified value must correspond to an existing service in which the filter has been applied.
Output 

Show Filter (no policy specified) — The following is a sample output of IPv4 filter information when no policy is specified. Table 61 describes the command output fields.

Sample Output
A:ALA-49# show filter ip
===============================================================================
Configured IP Filters                                            Total:     2
===============================================================================
Filter-Id   Scope     Applied Description
-------------------------------------------------------------------------------
5           Template  Yes
6           Template  Yes
 
===============================================================================
Host Common IP Filters                                           Total:     2
===============================================================================
Filter-Id                     Description
-------------------------------------------------------------------------------
5:P4                          Auto-created PCC-Rule Ingress Filter
6:P5                          Auto-created PCC-Rule Egress Filter
===============================================================================
Num IP filters: 4
===============================================================================
Table 61:  Show IP Filter Output Fields - no policy specified 

Label

Description

Filter Id

The IP filter ID

Scope

Template — the filter policy is of type template

Exclusive—the filter policy is of type exclusive

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Description

The IP filter policy description

Show Filter (no filter-id specified, embedded keyword specified) — The following is a sample output of IPv4 filter information when no filter ID is specified but the embedded keyword is specified. Table 62 describes the command output fields.

Sample Output
*A:Dut-C>config>filter# show filter ip embedded
==================================================================================
IP Filter embedding
==================================================================================
In    From      Priority       Inserted      Status
----------------------------------------------------------------------------------
10    2           50          1/1           OK
      1           100         1/2           OK- 1 entry overwritten
 
20    2           100         0/5           Failed – out of resources
==================================================================================
Table 62:  Filter IP Output Fields (No Filter ID Specified, Embedded Keyword Specified) 

Label

Description

In

Shows embedding filter index

From

Shows embedded filters included

Priority

Shows priority of embedded filter

Inserted

Shows embedded/total number of entries from embedded filter.

Status:

OK — embedding operation successful, if any entries are overwritten this will also be indicated

Failed — embedding failed, the reason is displayed (out of resources)

Show Filter (with filter-id specified) — The following is a sample output of IPv4 filter information with the filter ID specified. Table 63 describes the command output fields.

Sample Output
*A:Dut-B>config>filter>ip-filter# show filter ip 10
===============================================================================
IP Filter
===============================================================================
Filter Id           : 10
Scope               : Embedded
Type                : Normal
Entries             : 4
Description         : (Not Specified)
Filter Name         : 10
Table 63:  Show IP Filter Policy Output Fields 

Label

Description

Filter Id

The IPv4 filter policy ID

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Scope

Template — the filter policy is of type template

Exclusive — the filter policy is of type exclusive

Type

Normal — the filter policy is of type normal

src-mac — the filter policy is of type src-mac

Packet-length — the filter policy is of type packet-length

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

System filter

Indicates if the filter has been chained to a system filter

Radius Ins Pt

Indicates the RADIUS insertion point, if any

CrCtl. Ins Pt

Indicates the Credit Control insertion point, if any

RadSh. Ins Pt

Indicates the RADIUS shared insertion point, if any

PccRl. Ins Pt

Indicates the PCC rule insertion point, if any

Entries

The number of entries configured in this filter ID

Description

The IPv4 filter policy entry description string

Filter Match Criteria

IP — indicates the filter is an IPv4 filter policy

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Description

The IPv4 filter policy entry description string

Log Id

The filter log ID

Src. IP

The source IPv4 address and prefix length match criterion; “0.0.0.0/0” indicates no criterion specified for the filter entry

Src. Port

The source TCP, UDP, or SCTP port number, port range, or port match list

Dest. IP

The destination IPv4 address and prefix length match criterion; “0.0.0.0/0” indicates no criterion specified for the filter entry

Dest. Port

The destination TCP, UDP, or SCTP port number, port range, or port match list

Protocol

The protocol for the match criteria; undefined indicates no protocol specified

Dscp

The DiffServ Code Point (DSCP) name

ICMP Type

The ICMP type match criterion; undefined indicates no ICMP type specified

ICMP Code

The ICMP code field in the ICMP header of an IPv4 packet

Fragment

False — indicates if the filter is configured to match on all non-fragmented packets

True — indicates if the filter is configured to match on all fragmented packets

First-Only — indicates if the filter is configured to match the first fragment of a fragmented packet

Non-First-Only — indicates if the filter is configured to match a fragment of a fragmented packet, but not the first fragment

Off — fragments are not a matching criteria. All fragments and non-fragments implicitly match

Src Route Opt

Indicates if the source route option has been set

Sampling

Off — specifies that traffic sampling is disabled

On—specifies that traffic matching the associated IPv4 filter entry is sampled

Int. Sampling

Off — interface traffic sampling is disabled

On — interface traffic sampling is enabled

IP-Option

Specifies matching packets with a specific IPv4 option or a range of IPv4 options in the IPv4 header for IPv4 filter match criteria

Multiple Option

Off — the option fields are not checked

On — packets containing one or more option fields in the IPv4 header will be used as IPv4 filter match criteria

Tcp-flag

Specifies the list of TCP flags selected:

  1. match true is represented with the TCP flag value
  2. match false is represented with an exclamation mark before the flag value

TCP flags not selected as match criteria are not displayed

Example:

Matching “tcp-ack true” and “tcp-rst false” is represented in the show command as Tcp-flag : Ack !Rst

Option-present

Off — specifies not to search for packets that contain the option field or have an option field of zero

On — matches packets that contain the option field or have an option field of zero be used as IPv4 filter match criteria

Egress PBR

Indicates if the egress-pbr flag is set for this entry

Primary Action

Indicates the configured action, if any; indented sub-labels in the show output provide configured parameters for this action

Secondary Action

Indicates the configured secondary action, if any; indented sub-labels in the show output provide configured parameters for this action

PBR Target Status

The status of the target of the primary or secondary action based on simple checks

Extended Action

Indicates the configured extended action, if any

PBR Down Action

Indicates the action to take when the target is down; packets that match the entry criteria will be subject to the PBR Down Action in case the target of the main action is down

Downloaded Action

The action downloaded by CPM to IOM

Dest. Stickiness

Indicates whether stickiness is configured

Hold Remain

The stickiness timer

Ing. Matches

The number of ingress filter matches/hits for the filter entry

Egr. Matches

The number of egress filter matches/hits for the filter entry

Show Filter Associations — The following is a sample output of IPv4 filter information when the associations keyword is specified. Table 64 describes the command output fields.

Sample Output
A:ALA-49# show filter ip 1 associations
===============================================================================
IP Filter
===============================================================================
Filter Id           : 4                            Applied        : Yes
Scope               : Template                     Def. Action    : Drop
System filter       : Unchained
Radius Ins Pt       : n/a
CrCtl. Ins Pt       : n/a
RadSh. Ins Pt       : n/a
PccRl. Ins Pt       : n/a
Entries             : 1
Description         : (Not Specified)
-------------------------------------------------------------------------------
Filter Association : IP
-------------------------------------------------------------------------------
Service Id          : 2                            Type           : VPLS
  - SAP    1/2/2   (Ingress)
-------------------------------------------------------------------------------
Filter associated with IOM: 1
===============================================================================
Table 64:  Filter IP Associations Output Fields 

Label

Description

Filter Id

The IPv4 filter policy ID

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Type

Normal — the filter policy is of type normal

src-mac — the filter policy is of type src-mac

Packet-length — the filter policy is of type packet-length

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop—the default action for the filter ID for packets that do not match the filter entries is to drop

System filter

Indicates if the filter has been chained to a system filter

Radius Ins Pt

Indicates the RADIUS insertion point, if any

CrCtl. Ins Pt

Indicates the Credit Control insertion point, if any

RadSh. Ins Pt

Indicates the RADIUS shared insertion point, if any

PccRl. Ins Pt

Indicates the PCC rule insertion point, if any

Entries

The number of entries configured in this filter ID

Description

The IPv4 filter policy description

Filter Association

Indicates the filter is an IPv4 filter policy

Service Id

The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied

Type

The type of service of the service ID

(Ingress)

The filter policy ID is applied as an ingress filter policy on the interface

(Egress)

The filter policy ID is applied as an egress filter policy on the interface

Show Filter Counters — The following is a sample output of IPv4 filter information when the counters keyword is specified. Table 65 describes the command output fields.

Egress counters count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.

Sample Output
*A:ALA-48# show filter ip 100 counters
===============================================================================
IP Filter
===============================================================================
Filter Id           : 4                            Applied        : Yes
Scope               : Template                     Def. Action    : Drop
System filter       : Unchained
Radius Ins Pt       : n/a
CrCtl. Ins Pt       : n/a
RadSh. Ins Pt       : n/a
PccRl. Ins Pt       : n/a
Entries             : 1
Description         : (Not Specified)
-------------------------------------------------------------------------------
Filter Match Criteria : IP
-------------------------------------------------------------------------------
Entry               : 4001
Ing. Matches        : 9788619 pkts (978861900 bytes)
Egr. Matches        : 9788619 pkts (978861900 bytes)
===============================================================================
Table 65:  Filter IP Counters Output Field Descriptions 

Label

Description

Filter Id

The IPv4 filter policy ID

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

System filter

Indicates if the filter has been chained to a system filter

Radius Ins Pt

Indicates the RADIUS insertion point, if any

CrCtl. Ins Pt

Indicates the Credit Control insertion point, if any

RadSh. Ins Pt

Indicates the RADIUS shared insertion point, if any

PccRl. Ins Pt

Indicates the PCC rule insertion point, if any

Entries

The number of entries configured in this filter ID

Description

The IPv4 filter policy description

Filter Match Criteria

IP — indicates the filter is an IPv4 filter policy

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Ing. Matches

The number of ingress filter matches/hits for the filter entry

Egr. Matches

The number of egress filter matches/hits for the filter entry

Show Filter IP Output (with effective-action specified) — The following is a sample output of IPv4 filter information when the effective-action keyword is specified. Table 66 describes the command output fields.

If the main action (either primary or secondary) cannot be performed, a reason will be given. This will be displayed on the same line as the Effective Action. The reason codes as currently defined are:

  1. action not supported in L2 service
  2. action not supported in L3 service
  3. action not supported on egress
  4. destination not reachable
  5. egress-pbr is off
  6. egress-pbr is on
  7. entry-default
  8. filter-default-action
  9. not POS unnumbered interface
  10. pbr-down-action-override
  11. target does not exist
Sample Output
show filter ip 1 effective-action
===============================================================================
IP Filter
===============================================================================
Filter Id           : 1                            Applied        : Yes
Scope               : Template                     Def. Action    : Drop
Entries             : 1
Description         : (Not Specified)
-------------------------------------------------------------------------------
Entry               : 1
-------------------------------------------------------------------------------
Stickiness          : No
PBR Dwn Act Override: None
PBR Down Action     : Drop (entry-default)
 
Configuration
Primary Action      : Forward (SAP)
  Next Hop          : 1/1/2
  Service Id        : 10
Secondary Action    : None
 
Status
Target status based on extended checks
  Primary Action    : Down
  Secondary Action  : None
Downloaded Action   : Primary
Stickiness Timer    : Not Running
 
Effective Action based on application context
Service Id          : 10                           Type           : VPLS
  Ingress
    Effective Action: Drop (entry-default)
===============================================================================
Table 66:  Show Filter IP effective-action Output Field Descriptions 

Label

Description

Filter Id

The IPv4 filter policy ID

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Entries

The number of entries configured in this filter ID

Description

The IPv4 filter policy description

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Stickiness

No — stickiness is not configured

Yes — stickiness is configured

PBR Dwn Act Override

Indicates whether or not the action to take when the PBR target is down has been overridden

PBR Down Action

Indicates the action to take when the target is down; packets that match the entry criteria will be subject to the PBR Down Action in case the target of the main action is down

Configuration

Section of the output providing information on the configured parameters

Primary Action

The configured action, if any; indented sub-labels in the show output provide configured parameters for this action

Secondary Action

The configured secondary action, if any; indented sub-labels in the show output provide configured parameters for this action

Status/Target status based on extended checks

Section of the output providing information on the operational status of certain parameters

Primary Action

The status of the target of the primary action, if any configured, based on extended checks

Secondary Action

The status of the target of the secondary action, if any configured, based on extended checks

Downloaded Action

The action downloaded by the CPM to the IOM

Stickiness Timer 

The status of the stickiness timer, if any

Effective Action based on application context

Section of the output providing the effective action, in the context of services, that a packet matching the criteria will be subject to

Service Id 

The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied

Type

The service type in which the service has been applied

Ingress/Egress

The direction in which the service has been applied

Effective Action

The effective action that the packet will be subject to

Extended Action

Indicates the configured extended action, if any

ip-exception

Syntax 
ip-exception
ip-exception ip-filter-id
ip-exception ip-filter-id [{associations|counters}]
ip-exception ip-filter-id entry entry-id [counters]
Context 
show>filter
Description 

This command shows IPv4 exception information.

Parameters 
filter-id—
Specifies the IPv4 exception filter.
Values—
1 to 65535

 

associations—
Displays associations applicable to the specified IPv4 exception.
counters—
Displays counters for the specified IPv4 exception.
entry entry-id
Specifies an integer that identifies the entry.
Values—
1 to 2097151

 

Output 

The following output is an example of IPv4 exception filter information, and Table 67 describes the fields.

Sample Output
*A:Dut-C>config>filter>ip-except>entry$ show filter ip-exception 1
===============================================================================
IP-Exception Filter
===============================================================================
Filter Id           : 1                            Applied        : Yes
Scope               : Template
Entries             : 2
Description         : Default description for ip-exception 1
Filter Name         : ip-exception-1
-------------------------------------------------------------------------------
Filter Match Criteria : IP
-------------------------------------------------------------------------------
Entry               : 1
Description         : Default description for Ip Exception Policy id # 1 entry
                      1
Src. IP             : 0.0.0.0/0
Src. Port           : n/a
Dest. IP            : 0.0.0.0/0
Dest. Port          : n/a
Protocol            : 1
ICMP Type           : Undefined                    ICMP Code      : Undefined
Ing. Matches        : 0 pkts
Egr. Matches        : 10 pkts (1060 bytes)
Entry               : 2
Description         : (Not Specified)
Src. IP             : 192.168.1.0/24
Src. Port           : n/a
Dest. IP            : 10.10.1.0/24
Dest. Port          : n/a
Protocol            : Undefined
ICMP Type           : Undefined                    ICMP Code      : Undefined
Ing. Matches        : 0 pkts
Egr. Matches        : 0 pkts
===============================================================================
*A:Dut-C>config>filter>ip-except>entry$
Table 67:  IPv4 Exception Output Fields 

Label

Description

Filter-Id

The filter ID.

Scope

Template — The filter policy is of type Template.

Exclusive — The filter policy is of type Exclusive.

Applied

No — The IPv6 exception filter has not been applied.

Yes — The IPv6 exception filter is applied.

Entries

The number of entries.

Description

The description of the specified filter, if specified.

Filter Name

The filter name.

Filter Match Criteria

IP — indicates the filter is an IPv4 filter policy.

Entry

The number of active or inactive entries.

Description

The IPv4 filter policy entry description string.

Src. IP

The source IP address of the logged packet.

Src. Port

The source port of the logged packet.

Dst. IP

The destination IP address of the logged packet.

Dst. Port

The destination port of the logged packet.

Protocol

The protocol for the match criteria; undefined indicates no protocol specified.

ICMP Type

The ICMP type match criterion. Undefined indicates no ICMP type specified.

Ing. Matches

The number of packets matched on ingress.

Egr. Matches

The number of packets matched on egress.

ipv6

Syntax 
ipv6 [filter-type filter-type]
ipv6 embedded [inactive]
ipv6 ipv6-filter-id embedded [inactive]
ipv6 ipv6-filter-id [detail]
ipv6 ipv6-filter-id associations
ipv6 ipv6-filter-id type entry-type
ipv6 ipv6-filter-id counters [type entry-type] [detail]
ipv6 ipv6-filter-id entry entry-id [counters] [detail]
ipv6 ipv6-filter-id [entry entry-id] effective-action [{ingress | egress}]
ipv6 ipv6-filter-id [entry entry-id] effective-action router [{ingress | egress}]
ipv6 ipv6-filter-id [entry entry-id] effective-action service service-id [{ingress | egress}]
Context 
show>filter
Description 

This command shows IPv6 filter information.

When effective-action is specified, this command displays what effectively happens to a packet that matches the criteria associated with the IPv6 filter policy.

Parameters 
filter-type—
Specifies the type of filter to display.
Values—
config, flowspec, host-common, openflow, vsd

 

inactive—
Shows all embeddings, optionally shows inactive embedding only, if ipv6-filter-id is not specified shows all embedded filters.
ipv6-filter-id—
Specifies the IPv6 filter policy for which to display information. Values can be expressed in different formats. The following only shows decimal integer format.
Values—
1 to 65535

 

detail—
Displays detailed information.
associations—
Appends, to the detailed filter policy output, information as to where the specified filter policy ID is applied.
entry-type—
Specifies type of filter entry to display.
Values—
fixed, radius-insert, credit-control-insert, embedded, radius-shared

 

counters—
Displays counter information. Egress counters count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.
entry-id—
Specifies the filter policy entry (of the specified filter policy) to display information.
Values—
1 to 2097151

 

effective-action—
Displays the action that the system will effectively apply to the packet.
ingress—
Filters the output and only displays the information for filter policies applied on ingress.
egress—
Filters the output and only displays the information for filter policies applied on egress.
router—
Filters the output and only displays the information for that specific service (“Base” instance).
service-id—
Filters the output and only displays the information for the specified service. The specified value should correspond to an existing service in which the filter has been applied.
Output 

Show Filter (no filter-id specified) — The following output is an example of IPv6 filter information when no filter ID is specified, and Table 68 describes the fields.

Sample Output
A:ALA-48# show filter ipv6
===============================================================================
IP Filters
===============================================================================
Filter-Id Scope      Applied Description
-------------------------------------------------------------------------------
100       Template   Yes     test
200       Exclusive  Yes
-------------------------------------------------------------------------------
Num IPv6 filters: 2
===============================================================================
A:ALA-48# show filter ipv6 embedded
================================================
IP Filter embedding
================================================
In    From      Priority       Inserted      Status
----------------------------------------------------------------------------------
10    2           50          1/1           OK
      1           100         1/2           OK- 1 entry overwritten
 
20    2           100         0/5           Failed – out of resources
================================================
A:ALA-48#
===============================================================================
Configured IP Filters                                            Total:     4
===============================================================================
Filter-Id   Scope     Applied Description
-------------------------------------------------------------------------------
1           Template  No      
5           Exclusive No      
10          Template  Yes     
100         Embedded  N/A     
===============================================================================
System IP Filters                                                Total:     1
===============================================================================
Filter-Id                     Description
-------------------------------------------------------------------------------
_tmnx_ofs_test                of-switch 'test' embedded filter
-------------------------------------------------------------------------------
Num IP filters: 5
==============================================================================
Table 68:  IPv6 Filter Output Fields - no policy specified  

Label

Description

Filter Id

The IPv6 filter ID

Scope

Template — the filter policy is of type template

Exclusive — the filter policy is of type exclusive

Applied

No — the filter policy ID has not been applied

Yes—the filter policy ID is applied

Description

The IPv6 filter policy description

In

Shows embedding filter index

From

Shows embedded filters included

Priority

Shows priority of embedded filter

Inserted

Shows embedded/total number of entries from embedded filter

Status:

OK — embedding operation successful, if any entries are overwritten this will also be indicated

Failed — embedding failed, the reason is displayed (out of resources)

Show Filter (with filter-id specified) — The following output is an example of IPv6 filter information when filter-id is specified, and Table 69 describes the fields.

Sample Output
A:ALA-48# show filter ipv6 100
===============================================================================
IPv6 Filter
===============================================================================
Filter Id    : 100                              Applied        : Yes
Scope        : Template                         Def. Action    : Forward
Entries      : 1
Description : test
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry        : 10
Log Id       : 101
Src. IP      : ::/0                             Src. Port      : None
Dest. IP     : ::/0                             Dest. Port     : None
Next Header  : Undefined                        Dscp           : Undefined
ICMP Type    : Undefined                        ICMP Code      : Undefined
Tcp-flag     : (Not Specified)                     
Match action : Drop
Ing. Matches : 0                                Egr. Matches   : 0
===============================================================================
A:ALA-48#
Table 69:  IPv6 Filter Policy Output Fields 

Label

Description

Filter Id

The IPv6 filter policy ID

Scope

Template — the filter policy is of type template

Exclusive — the filter policy is of type exclusive

Entries

The number of entries configured in this filter ID

Description

The IPv6 filter policy description

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Filter Match Criteria

IP — indicates the filter is an IPv6 filter policy

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Log Id

The filter log ID

Src. IP

The source IPv6 address and mask match criterion

  1. “::/0” indicates no criterion specified for the filter entry

Dest. IP

The destination IPv6 address and mask match criterion

  1. “::/0” indicates no criterion specified for the filter entry

Protocol

The protocol ID for the match criteria; undefined indicates no protocol specified

ICMP Type

The ICMP type match criterion; undefined indicates no ICMP type specified

Fragment

False — configures a match on all non-fragmented IPv6 packets

True — configures a match on all fragmented IPv6 packets

Off — fragments are not a matching criteria; all fragments and nonfragments implicitly match

Sampling

Off — specifies that traffic sampling is disabled

On — specifies that traffic matching the associated IPv6 filter entry is sampled

IP-Option

Specifies matching packets with a specific IPv6 option or a range of IPv6 options in the IPv6 header for IPv6 filter match criteria

Match action

Default — the filter does not have an explicit forward or drop match action specified; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Drop — drop packets matching the filter entry

Forward—the explicit action to perform is forwarding of the packet; if the action is Forward, then if configured, the next hop information should be displayed, including nexthop: IPv6 address, Indirect: IPv6 address or Interface: IPv6 interface name

Ing. Matches

The number of ingress filter matches/hits for the filter entry

Src. Port

The source TCP, UDP, or SCTP port number, port range, or port match list

Dest. Port

The destination TCP, UDP, or SCTP port number, port range, or port match list

Dscp

The DiffServ Code Point (DSCP) name

ICMP Code

The ICMP code field in the ICMP header of an IPv6 packet

Tcp-flag

Specifies the list of TCP flags selected:

  1. match true is represented with the TCP Flag value
  2. match false is represented with an exclamation mark before the flag value

TCP flags not selected as match criteria are not displayed

Example:

Matching “tcp-ack true” and “tcp-rst false” is represented in the show command as Tcp-flag : Ack !Rst

Option-present

Off — specifies not to search for packets that contain the option field or have an option field of zero

On — matches packets that contain the option field or have an option field of zero be used as IPv6 filter match criteria

Int. Sampling

Off — interface traffic sampling is disabled

On — interface traffic sampling is enabled

Multiple Option

Off — the option fields are not checked

On — packets containing one or more option fields in the IPv6 header will be used as IPv6 filter match criteria

Egr. Matches

The number of egress filter matches/hits for the filter entry

Ing. Rate-limiter

The number of offered, forwarded, and dropped packet matches for the filter entry

Show Filter Associations — The following output is an example of IPv6 filter information when the associations keyword is specified, and Table 70 describes the fields.

Sample Output
A:ALA-48# show filter ipv6 1 associations
===============================================================================
IPv6 Filter
===============================================================================
Filter Id    : 1                                Applied        : Yes
Scope        : Template                         Def. Action    : Drop
Entries      : 1
-------------------------------------------------------------------------------
Filter Association : IPv6
-------------------------------------------------------------------------------
Service Id   : 2000                             Type           : IES
 - SAP    1/1/1:2000   (Ingress)
===============================================================================
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry        : 10
Log Id       : 101
Src. IP      : ::/0                             Src. Port      : None
Dest. IP     : ::/0                             Dest. Port     : None
Next Header  : Undefined                        Dscp           : Undefined
ICMP Type    : Undefined                        ICMP Code      : Undefined
TCP-flag     : (Not Specified)                  
Match action : Drop
Ing. Matches : 0                                Egr. Matches   : 0
===============================================================================
A:ALA-48#
Table 70:  Filter IPv6 Associations Output Fields 

Label

Description

Filter Id

The IPv6 filter policy ID

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Entries

The number of entries configured in this filter ID

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Service Id

The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied

SAP

The Service Access Point on which the filter policy ID is applied

(Ingress)

The filter policy ID is applied as an ingress filter policy on the interface

(Egress)

The filter policy ID is applied as an egress filter policy on the interface

Type

The type of service of the service ID

Entry

The filter entry ID; if the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified

Log Id

The filter log ID

Src. IP

The source IPv6 address and mask match criterion

  1. “0.0.0.0/0” indicates no criterion specified for the filter entry

Dest. IP

The destination IPv6 address and mask match criterion

  1. “0.0.0.0/0” indicates no criterion specified for the filter entry

Protocol

The protocol ID for the match criteria; undefined indicates no protocol specified

ICMP Type

The ICMP type match criterion; undefined indicates no ICMP type specified

Fragment

False — configures a match on all non-fragmented IPv6 packets

True — configures a match on all fragmented IPv6 packets

Off — fragments are not a matching criteria; all fragments and nonfragments implicitly match

Sampling

Off — specifies that traffic sampling is disabled

On — specifies that traffic matching the associated IPv6 filter entry is sampled

IP-Option

Specifies matching packets with a specific IPv6 option or a range of IPv6 options in the IPv6 header for IPv6 filter match criteria

TCP-syn

False — configures a match on packets with the SYN flag set to false

True — configures a match on packets with the SYN flag set to true

Off — the state of the TCP SYN flag is not considered as part of the match criteria

Match action

Default — the filter does not have an explicit forward or drop match action specified; if the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified

Drop — drop packets matching the filter entry

Forward — the explicit action to perform is forwarding of the packet; if the action is Forward, then if configured the nexthop information should be displayed, including Nexthop: <IPv6 address>, Indirect: <IPv6 address> or Interface: <IPv6 interface name>

Ing. Matches

The number of ingress filter matches/hits for the filter entry

Src. Port

The source TCP, UDP, or SCTP port number, port range, or port match list

Dest. Port

The destination TCP, UDP, or SCTP port number, port range, or port match list

Dscp

The DiffServ Code Point (DSCP) name

ICMP Code

The ICMP code field in the ICMP header of an IPv6 packet

Option-present

Off — specifies not to search for packets that contain the option field or have an option field of zero

On — matches packets that contain the option field or have an option field of zero be used as IPv6 filter match criteria

Int. Sampling

Off — interface traffic sampling is disabled

On — interface traffic sampling is enabled

Multiple Option

Off — the option fields are not checked

On — packets containing one or more option fields in the IPv6 header will be used as IPv6 filter match criteria

TCP-ack

False — configures a match on packets with the ACK flag set to false

True — configured a match on packets with the ACK flag set to true

Off — the state of the TCP ACK flag is not considered as part of the match criteria

Egr. Matches

The number of egress filter matches/hits for the filter entry

Show Filter Counters — The following output is an example of IPv6 filter information when the counters keyword is specified, and Table 71 describes the output fields.

Egress count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.

Sample Output
A:ALA-48# show filter ipv6 8 counters
===============================================================================
IPv6 Filter
===============================================================================
Filter Id    : 8                                Applied        : Yes
Scope        : Template                         Def. Action    : Forward
Entries      : 4
Description  : Description for Ipv6 Filter Policy id # 8
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry        : 5
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
  
Entry        : 6
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
  
Entry        : 8
Ing. Matches : 160 pkts (14400 bytes)
Egr. Matches : 80 pkts (6880 bytes)
                                       
Entry        : 10
Ing. Matches : 80 pkts (7200 bytes)
Egr. Matches : 80 pkts (6880 bytes)
  
====================================================================================
A:ALA-48#
Table 71:  Filter IPv6 Counters Output Fields 

Label

Description

IP Filter

Filter Id

The IPv6 filter policy ID

Scope

Template — the filter policy is of type template

Exclusive — the filter policy is of type exclusive

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Filter Match Criteria

IP — indicates the filter is an IPv6 filter policy

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Ing. Matches

The number of ingress filter matches/hits for the filter entry

Egr. Matches

The number of egress filter matches/hits for the filter entry

Egress count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.

Show Filter IPv6 Output (with effective-action specified) — The following is a sample output of IPv6 filter information when the effective-action keyword is specified. Table 72 describes the command output fields.

If the main action (either primary or secondary) cannot be performed, a reason will be given. This will be displayed on the same line as the Effective Action. The reason codes as currently defined are:

  1. action not supported in L2 service
  2. action not supported in L3 service
  3. action not supported on egress
  4. destination not reachable
  5. egress-pbr is off
  6. egress-pbr is on
  7. entry-default
  8. filter-default-action
  9. pbr-down-action-override
  10. target does not exist
Sample Output
show filter ipv6 10 entry 10 effective-action
===============================================================================
IPv6 Filter
===============================================================================
Filter Id           : 10                           Applied        : Yes
Scope               : Template                     Def. Action    : Drop
Entries             : 8
Description         : (Not Specified)
-------------------------------------------------------------------------------
Entry               : 10
-------------------------------------------------------------------------------
Origin              : Fixed - overwrites embedded filter 30 entry 5
Egress PBR          : Disabled
Stickiness          : No
PBR Dwn Act Override: None
PBR Down Action     : Drop (entry-default)
 
Configuration
Primary Action      : Forward (Next Hop VRF)
  Next Hop          : 3ffe:0:a0a:a01:: (Indirect)
  Router            : Base
  Extended Action   : Remark DSCP "cp51"
Secondary Action    : Forward (Next Hop VRF)
  Next Hop          : 3ffe:0:1414:1401:: (Indirect)
  Router            : Base
  Extended Action   : Remark DSCP "cp31"
 
Status
Target status based on extended checks
  Primary Action    : Up
  Secondary Action  : Up
Downloaded Action   : Primary
Stickiness Timer    : Not Running
 
Effective Action based on application context
Service Id          : 100                          Type           : IES
  Ingress
    Effective Action: Primary
    Extended Action : Performed
Service Id          : N/A                          Type           : Base Router
  Egress
    Effective Action: Primary
    Extended Action : Performed
===============================================================================
Table 72:  Filter IPv6 effective-action Output Fields 

Label

Description

Filter Id

The IPv6 filter policy ID

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Entries

The number of entries configured in this filter ID

Description

The IPv6 filter policy description

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Origin

The type of filter entry

Egress PBR

Indicates if the egress-pbr flag is set for this entry

Stickiness

No — stickiness is not configured

Yes — stickiness is configured

PBR Dwn Act Override

Indicates whether or not the action to take when the PBR target is down has been overridden

PBR Down Action

Indicates the action to take when the target is down; packets that match the entry criteria will be subject to the PBR Down Action in case the target of the main action is down

Configuration

Section of the output providing information on the configured parameters

Primary Action

The configured action, if any; indented sub-labels in the show output provide configured parameters for this action

Secondary Action

The configured secondary action, if any; indented sub-labels in the show output provide configured parameters for this action

Status/Target status based on extended checks

Section of the output providing information on the operational status of certain parameters

Primary Action

The status of the target of the primary action, if configured, based on extended checks

Secondary Action

The status of the target of the secondary action, if configured, based on extended checks

Downloaded Action

The action downloaded by the CPM to the IOM

Stickiness Timer 

The status of the stickiness timer, if any

Effective Action based on application context

Section of the output providing the effective action, in the context of services, that a packet matching the criteria will be subject to

Service Id 

The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied

Type

The service type in which the service has been applied

Ingress/Egress

The direction in which the service has been applied

Effective Action

Indicates the effective action the packet will be subject to

Extended Action

Indicates the configured extended action, if any

ipv6-exception

Syntax 
ipv6-exception exception
ipv6-exception exception [associations]
ipv6-exception exception [counters]
ipv6-exception exception entry entry-id [counters]
Context 
show>filter
Description 

This command shows IPv6 exception information.

Parameters 
exception—
Specifies the IPv6 exception filter.
Values—
exception-id: 1 to 65535
exception-name: An existing IPv6 exception filter name up to 64 characters.

 

associations—
Displays associations applicable to the specified IPv6 exception.
counters—
Displays counters for the specified IPv6 exception.
entry entry-id
Specifies an integer that identifies the entry.
Values—
1 to 2097151

 

Output 

The following output is an example of IPv6 exception filter information, and Table 73 describes the fields.

Sample Output
*A:Dut-C# show filter ipv6-exception
 
=============================================================================== 
Configured IPv6-Exception Filters                             Total:     1 
=============================================================================== 
Filter-Id   Scope    Applied Description 
------------------------------------------------------------------------------- 
1           Template  Yes?
 
=============================================================================== 
Num IPv6-Exception filters: 1 
=============================================================================== 
*A:kanlnx94: Dut-B# show filter ipv6-exception 1 
 
=============================================================================== 
IPv6-Exception Filter 
=============================================================================== 
Filter Id           : 1                             Applied       : Yes 
Scope               : Template
Entries             : 1
Description         : (Not Specified) 
Filter Name         : An IPv6 exception filter
------------------------------------------------------------------------------- 
Filter Match Criteria : IPv6 
------------------------------------------------------------------------------- 
Entry               : 10 (Inactive) 
Description         : (Not Specified) 
Src. IP             : ::/0 
Src. Port           : n/a 
Dest. IP            : ::/0 
Dest. Port          : eq 1234 
Next Header         : 6 
ICMP Type           : Undefined                    ICMP Code      : Undefined 
Ing. Matches        : 0 pkts 
Egr. Matches        : 0 pkts 
 
=============================================================================== 
*A:Dut-C# show filter ipv6-exception 1 associations 
 
=============================================================================== 
IPv6-Exception Filter 
=============================================================================== 
Filter Id           : 1                            Applied        : Yes 
Scope               : Template             
Entries             : 1 
Description         : (Not Specified) 
Filter Name         : An IPv6 exception filter
------------------------------------------------------------------------------- 
Filter Association : IPv6 
------------------------------------------------------------------------------- 
 
Service Id          : N/A                          Type           : Router Base 
 - Router Interface secure-interface 
------------------------------------------------------------------------------- 
Filter associated with IOM: 1
=============================================================================== 
*A:Dut-C# show filter ipv6-exception 1 counters
 
=============================================================================== 
IPv6-Exception Filter 
=============================================================================== 
Filter Id           : 1                            Applied        : Yes 
Scope               : Template
Entries             : 1 
Description         : (Not Specified) 
Filter Name         : An IPv6 exception filter 
------------------------------------------------------------------------------- 
Filter Match Criteria : IPv6 
------------------------------------------------------------------------------- 
Entry               : 10 (Inactive) 
Ing. Matches        : 0 pkts 
Egr. Matches        : 0 pkts 
 
=============================================================================== 
*A:Dut-C# show filter ipv6-exception 1 entry 10
 
=============================================================================== 
IPv6-Exception Filter 
=============================================================================== 
Filter Id           : 1                            Applied        : Yes 
Scope               : Template
Entries             : 1
Description         : (Not Specified) 
Filter Name         : An IPv6 exception filter
------------------------------------------------------------------------------- 
Filter Match Criteria : IPv6 
------------------------------------------------------------------------------- 
Entry               : 10 (Inactive) 
Description         : (Not Specified) 
Src. IP             : ::/0 
Src. Port           : n/a 
Dest. IP            : ::/0 
Dest. Port          : eq 1234 
Next Header         : 6
ICMP Type           : Undefined                    ICMP Code      : Undefined 
Ing. Matches        : 0 pkts 
Egr. Matches        : 0 pkts 
 
=============================================================================== 
*A:Dut-C# show filter ipv6-exception 1 entry 10 counters
 
=============================================================================== 
IPv6-Exception Filter 
=============================================================================== 
Filter Id           : 1                            Applied        : Yes 
Scope               : Template
Entries             : 1 
Description         : (Not Specified) 
Filter Name         : An IPv6 exception filter
------------------------------------------------------------------------------- 
Filter Match Criteria : IPv6 
------------------------------------------------------------------------------- 
Entry?              : 10 (Inactive) 
Ing. Matches        : 0 pkts 
Egr. Matches        : 0 pkts 
 
=============================================================================== 
*A:Dut-C#
Table 73:  IPv6 Exception Output Fields 

Label

Description

Configured IPv6-Exception Filters

The number of configured IPv6 exception filters.

Filter-Id

The filter ID.

Scope

Template — The filter policy is of type Template.

Exclusive — The filter policy is of type Exclusive.

Applied

No — The IPv6 exception filter has not been applied.

Yes — The IPv6 exception filter is applied.

Entries

The number of entries.

Description

The description of the specified filter, if specified.

Filter Name

The filter name.

Num IPv6-Exception filters

The number of IPv6 exception filters.

Entry

The number of active or inactive entries.

Src. IP

The source IP address of the logged packet.

Src. Port

The source port of the logged packet.

Dst. IP

The destination IP address of the logged packet.

Dst. Port

The destination port of the logged packet.

Next Header

8-bit selector. Identifies the type of header immediately following the IPv6 header.

ICMP Type

The ICMP type match criterion. Undefined indicates no ICMP type specified.

ICMP Code

The ICMP code field in the ICMP header of an IPv6 packet.

Ing. Matches

The number of packets matched on ingress.

Egr. Matches

The number of packets matched on egress.

Filter Association

Indicates the filter is an IPv6 filter policy.

Service Id

The service ID on which the IPv6 exception ID is applied.

Filter association with IOM

The number of filters associated with an IOM.

log

Syntax 
log [bindings]
log log-id [match string]
Context 
show>filter
Description 

This command shows the contents of a memory-based or a file-based filter log.

If the optional keyword match and string parameter are given, the command displays the given filter log from the first occurrence of the given string.

Parameters 
bindings—
Displays the number of filter logs currently instantiated.
log-id—
Specifies the filter log ID destination expressed as a decimal integer.
Values—
101 to 199

 

string—
Specifies to start displaying the filter log entries from the first occurrence of string.
Output 

The following output is an example of filter log entry information, and Table 74 describes the fields. If log summary is active, the filter log mini-tables contain the information described in Table 75.

Sample Output
2007/04/13 16:23:09  Filter: 100:100  Desc: Entry-100                  
Interface: to-ser1  Action: Forward                                    
Src MAC: 04-5b-01-01-00-02  Dst MAC: 04-5d-01-01-00-02  EtherType: 0800
Src IP: 10.10.0.1:646  Dst IP: 10.10.0.4:49509  Flags:   TOS: c0       
Protocol: TCP  Flags: ACK                                              
                                                                       
2007/04/13 16:23:10  Filter: 100:100  Desc: Entry-100                  
Interface: to-ser1  Action: Forward                                    
Src MAC: 04-5b-01-01-00-02  Dst MAC: 04-5d-01-01-00-02  EtherType: 0800
Src IP: 10.10.0.1:646  Dst IP: 10.10.0.3:646  Flags:   TOS: c0         
Protocol: UDP                                                          
 
2007/04/13 16:23:12  Filter: 100:100  Desc: Entry-100                  
Interface: to-ser1  Action: Forward                                    
Src MAC: 04-5b-01-01-00-02  Dst MAC: 01-00-5e-00-00-05  EtherType: 0800
Src IP: 10.10.13.1  Dst IP: 224.0.0.5  Flags:   TOS: c0                
Protocol: 89                                                           
Hex: 02 01 00 30 0a 0a 00 01 00 00 00 00 ba 90 00 00                   
     00 00 00 00 00 00 00 00 ff ff ff 00 00 03 02 01                   
 
A:ALA-A>config# show filter log bindings
===============================================================================
Filter Log Bindings
===============================================================================
Total Log Instances (Allowed)          : 2046
Total Log Instances (In Use)           : 0
Total Log Bindings                     : 0
-------------------------------------------------------------------------------
Type  FilterId EntryId   Log    Instantiated
-------------------------------------------------------------------------------
No Instances found
===============================================================================
A:ALA-A>config#
 

A summary log will be printed only in case TotCnt is different from 0. Only the address types with at least 1 entry in the mini-table will be printed.

A:ALA-A>config# show filter log 190
===============================================================================
Summary Log[190] Crit1: SrcAddr TotCnt:       723 ArpCnt:     83
 Mac          8  06-06-06-06-06-06
 Mac          8  06-06-06-06-06-05
 Mac          8  06-06-06-06-06-04
 Mac          8  06-06-06-06-06-03
 Mac          8  06-06-06-06-06-02
  Ip         16  10.6.6.1
  Ip         16  10.6.6.2
  Ip         16  10.6.6.3
  Ip         16  10.6.6.4
  Ip          8  10.6.6.5
Ipv6          8  3ffe:1616:1616:1616:1616:1616::
Ipv6          8  3ffe:1616:1616:1616:1616:1616:ffff:ffff
Ipv6          8  3ffe:1616:1616:1616:1616:1616:ffff:fffe
Ipv6          8  3ffe:1616:1616:1616:1616:1616:ffff:fffd
Ipv6          8  3ffe:1616:1616:1616:1616:1616:ffff:fffc 
===============================================================================
A:ALA-A

Log Message Formatting — Each filter log entry contains the following information in case summary log feature is not active (as appropriate).

Table 74:  Filter Log Output Fields 

Label

Description

yyyy/mm/dd hh:mm:ss

The date and timestamp for the log filter entry where yyyy is the year, mm is the month, dd is the day, hh is the hour, mm is the minute and ss is the second

Filter

The filter ID and the entry ID which generated the filter log entry in the form Filter_ID:Entry_ID

Desc

The description of the filter entry ID which generated the filter log entry

Interface

The IP interface on which the filter ID and entry ID was associated which generated the filter log entry

Action

The action of the filter entry on the logged packet

Src MAC

The source MAC address of the logged packet

Dst MAC

The destination MAC of the logged packet

EtherType

The Ethernet type of the logged Ethernet type II packet

Src IP

The source IP address of the logged packet; the source port will be displayed after the IP address as appropriate separated with a colon

Dst IP

The destination IP address of the logged packet; the source port will be displayed after the IP address as appropriate separated with a colon

Flags

(IP flags)

M — the more fragments IP flag is set in the logged packet

DF — the do not fragment IP flag is set in the logged packet

TOS

The ToS byte value in the logged packet

Protocol

The IP protocol of the logged packet (TCP, UDP, ICMP or a protocol number in hex)

Flags

(TCP flags)

URG — Urgent bit set

ACK — Acknowledgment bit set

RST — Reset bit set

SYN — Synchronize bit set

FIN — Finish bit set

HEX

If an IP protocol does not have a supported decode, the first 32 bytes following the IP header are printed in a hex dump

Log entries for non-IP packets include the Ethernet frame information and a hex dump of the first 40 bytes of the frame after the Ethernet header

Total Log Instances (Allowed)

Specifies the maximum allowed instances of filter logs allowed on the system

Total Log Instances (In Use)

Specifies the instances of filter logs presently existing on the system

Total Log Bindings

Specifies the count of the filter log bindings presently existing on the system

Type

The type of service of the service ID

Filter ID

Uniquely identifies an IP filter as configured on the system

Entry ID

The identifier which uniquely identifies an entry in a filter table

Log

Specifies an entry in the filter log table

Instantiated

Specifies if the filter log for this filter entry has or has not been instantiated

If the packet being logged does not have a source or destination MAC address (that is, POS) then the MAC information output line is omitted from the log entry.

If log summary is active, the filter log mini-tables contain the information described in Table 75.

Table 75:  Filter Log Summary Mini-Table Fields 

Label

Description

Summary Log LogID

Displays the log ID

Crit1

Summary criterion that is used as index into the mini-tables of the log

TotCnt

The total count of logs

ArpCnt

Displays the total number of ARP messages logged for this log ID

Src...

Dst...

The address type indication of the key in the mini-table

count

The number of messages logged with the specified source/destination address

address

The address for which count messages where received

mac

Syntax 
mac mac-filter-id
mac mac-filter-id associations
mac mac-filter-id [type entry-type] counters [detail]
mac mac-filter-id [entry entry-id] effective-action [{ingress | egress}]
mac mac-filter-id [entry entry-id] effective-action router [{ingress | egress}]
mac mac-filter-id [entry entry-id] effective-action service service-id [{ingress | egress}]
mac [mac-filter-id] embedded [inactive]
mac mac-filter-id entry entry-id [counters] [detail]
mac [filter-type filter-type]
mac mac-filter-id type entry-type
Context 
show>filter
Description 

This command displays MAC filter information.

When effective-action is specified, this command displays what effectively happens to a packet that matches the criteria associated with the MAC filter policy.

Parameters 
mac-filter-id—
Displays detailed information for the specified filter ID and its filter entries.
Values—
1 to 65535

 

associations—
Appends information as to where the filter policy ID is applied to the detailed filter policy ID output.
entry-type—
Specifies the type of filter entries as “fixed” or “embedded”.
counters—
Displays counter information for the specified filter ID.
detail—
Displays detailed information.
entry-id—
Displays information on the specified filter entry ID for the specified filter ID only.
Values—
1 to 2097151

 

effective-action—
Displays the action that the system will effectively apply to the packet.
ingress—
Filters the output and only displays the information for filter policies applied on ingress.
egress—
Filters the output and only displays the information for filter policies applied on egress.
router—
Filters the output and only displays the information for that specific service (“Base” instance).
service-id—
Filters the output and only displays the information for the specified service. The specified value must correspond to an existing service in which the filter has been applied.
filter-type—
Specifies the type of filter entries as “config” or “vsd”.
Output 

No Parameters Specified — A brief listing of MAC filters is produced when no parameters are specified; Table 76 describes the output fields.

Sample Output
*A:Dut-C# show filter mac
===============================================================================
Configured Mac Filters                                           Total:     1
===============================================================================
Filter-Id   Scope     Applied Description                                Type
-------------------------------------------------------------------------------
10          Template  No                                                 normal
===============================================================================
Num Mac filters: 1
===============================================================================
*A:Dut-C#
Table 76:  Filter MAC Output Fields 

Label

Description

Filter Id

The MAC filter ID

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Description

The MAC filter policy description

Filter ID Specified — The following output is an example of MAC filter information when the filter ID is specified, and Table 77 describes the fields. Detailed filter information for the filter ID and its entries is produced when the filter ID is specified.

Sample Output
===============================================================================
Mac Filter : 200
===============================================================================
Filter Id       : 200                     Applied         : No
Scope           : Exclusive               D. Action       : Drop
Description     : Forward SERVER sourced packets
-------------------------------------------------------------------------------
Filter Match Criteria : Mac
-------------------------------------------------------------------------------
Entry           : 200                     FrameType       : 802.2SNAP
Description     : Not Available
Src Mac         : 00:00:5a:00:00:00 ff:ff:ff:00:00:00
Dest Mac        : 00:00:00:00:00:00 00:00:00:00:00:00
Dot1p           : Undefined               Ethertype       : 802.2SNAP
DSAP            : Undefined               SSAP            : Undefined
Snap-pid        : Undefined               ESnap-oui-zero  : Undefined
Match action    : Forward
Ing. Matches    : 0                       Egr. Matches    : 0
Entry           : 300 (Inactive)          FrameType       : Ethernet
Description     : Not Available
Src Mac         : 00:00:00:00:00:00 00:00:00:00:00:00
Dest Mac       : 00:00:00:00:00:00 00:00:00:00:00:00
Dot1p          : Undefined               Ethertype       : Ethernet
DSAP           : Undefined               SSAP            : Undefined
Snap-pid       : Undefined               ESnap-oui-zero  : Undefined
Match action   : Default
Ing. Matches   : 0                       Egr. Matches    : 0
===============================================================================
Table 77:  Filter MAC with Filter-ID Specified Output Fields 

Label

Description

MAC Filter

Filter Id

The MAC filter policy ID

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Description

The MAC filter policy description

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Filter Match Criteria

MAC — indicates the filter is an MAC filter policy

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Description

The filter entry description

FrameType

Ethernet — the entry ID match frame type is Ethernet IEEE 802.3

Ethernet II — the entry ID match frame type is Ethernet Type II

Src MAC

The source MAC address and mask match criterion; when both the MAC address and mask are all zeros, no criterion specified for the filter entry

Dest MAC

The destination MAC address and mask match criterion; when both the MAC address and mask are all zeros, no criterion specified for the filter entry

Dot1p

The IEEE 802.1p value for the match criteria; undefined indicates no value is specified

Ethertype

The Ethertype value match criterion

DSAP

The DSAP value match criterion; undefined indicates no value specified

SSAP

SSAP value match criterion; undefined indicates no value specified

Snap-pid

The Ethernet SNAP PID value match criterion; undefined indicates no value specified

Esnap-oui-zero

Non-Zero — filter entry matches a non-zero value for the Ethernet SNAP OUI

Zero — filter entry matches a zero value for the Ethernet SNAP OUI

Undefined — no Ethernet SNAP OUI value specified

Match action

Default — the filter does not have an explicit forward or drop match action specified; if the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified

Drop — packets matching the filter entry criteria will be dropped

Forward — packets matching the filter entry criteria is forwarded

Ing. Matches

The number of ingress filter matches/hits for the filter entry

Egr. Matches

The number of egress filter matches/hits for the filter entry

Filter Associations — The associations for a filter ID will be displayed if the associations keyword is specified. The association information is appended to the filter information.

The following output is an example of MAC filter information when the associations keyword is specified, and Table 78 describes the fields.

Sample Output
A:ALA-49# show filter mac 3 associations
===============================================================================
Mac Filter
===============================================================================
Filter ID    : 3                     Applied          : Yes
Scope        : Template              Def. Action      : Drop
Entries      : 1
-------------------------------------------------------------------------------
Filter Association : Mac
-------------------------------------------------------------------------------
Service Id   : 1001                  Type             : VPLS
- SAP          1/1/1:1001            (Egress)
===============================================================================
Table 78:  Filter MAC Associations Output Fields 

Label

Description

Filter Association

Mac — the filter associations displayed are for a MAC filter policy ID

Service Id

The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied

SAP

The Service Access Point or spoke/mesh SDP on which the filter policy ID is applied

Type

The type of service of the Service ID

(Ingress)

The filter policy ID is applied as an ingress filter policy on the interface

(Egress)

The filter policy ID is applied as an egress filter policy on the interface

Filter Entry Counters Output — When the counters keyword is specified, the filter entry output displays the filter matches/hit information. The following table describes the command output for the command.

A:ALA-49# show filter mac 8 counters
===============================================================================
Mac Filter
===============================================================================
Filter Id   : 8                                Applied         : Yes
Scope       : Template                         Def. Action     : Forward
Entries     : 2
Description : Description for Mac Filter Policy id # 8
-------------------------------------------------------------------------------
Filter Match Criteria : Mac
-------------------------------------------------------------------------------
Entry       : 8                                FrameType       : Ethernet
Ing. Matches: 80 pkts (5440 bytes)
Egr. Matches: 62 pkts (3968 bytes)
  
Entry       : 10                               FrameType       : Ethernet
Ing. Matches: 80 pkts (5440 bytes)
Egr. Matches: 80 pkts (5120 bytes)
===============================================================================
Table 79:  Filter MAC Counters Output Field Descriptions 

Label

Description

Mac Filter

Filter Id

The MAC filter policy ID

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Description

The MAC filter policy description

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Filter Match Criteria

Mac — indicates the filter is an MAC filter policy

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

FrameType

Ethernet — the entry ID match frame type is Ethernet IEEE 802.3

802.2LLC — the entry ID match frame type is Ethernet IEEE 802.2 LLC

802.2SNAP — the entry ID match frame type is Ethernet IEEE 802.2 SNAP

Ethernet II — the entry ID match frame type is Ethernet Type II

Ing. Matches

The number of ingress filter matches/hits for the filter entry

Egr. Matches

The number of egress filter matches/hits for the filter entry

Show Filter MAC Output (with effective-action specified) — The following is a sample output of MAC filter information when the effective-action keyword is specified. Table 80 describes the command output fields.

If the main action (either primary or secondary) cannot be performed, a reason will be given. This will be displayed on the same line as the Effective Action. The reason codes as currently defined are:

  1. entry-default
  2. filter-default-action
  3. pbr-down-action-override
  4. action not supported on egress
  5. target does not exist
Sample Output
show filter mac 1 effective-action
===============================================================================
Mac Filter
===============================================================================
Filter Id           : 1                            Applied        : Yes
Scope               : Template                     Def. Action    : Drop
Entries             : 1                            Type           : normal
Description         : (Not Specified)
-------------------------------------------------------------------------------
Entry               : 2
-------------------------------------------------------------------------------
Stickiness          : No
PBR Dwn Act Override: None
PBR Down Action     : Drop (entry-default)
 
Configuration
Primary Action      : Forward (SAP)
  Next Hop          : 1/1/3
  Service Id        : Not configured
Secondary Action    : None
 
Status
Target status based on extended checks
  Primary Action    : Target does not exist
  Secondary Action  : None
Downloaded Action   : Forward
Stickiness Timer    : Not Running
 
Effective Action based on application context
Service Id          : 10                           Type           : VPLS
  Ingress
    Effective Action: Forward (target does not exist)
===============================================================================
Table 80:  Filter MAC effective-action Output Fields 

Label

Description

Filter Id

The MAC filter policy ID

Applied

No — the filter policy ID has not been applied

Yes — the filter policy ID is applied

Scope

Template — the filter policy is of type Template

Exclusive — the filter policy is of type Exclusive

Def. Action

Forward — the default action for the filter ID for packets that do not match the filter entries is to forward

Drop — the default action for the filter ID for packets that do not match the filter entries is to drop

Entries

The number of entries configured in this filter ID

Type

The type of entries configures in this filter

Description

The MAC filter policy description

Entry

The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified

Stickiness

No — stickiness is not configured

Yes — stickiness is configured

PBR Dwn Act Override

Indicates whether or not the action to take when the PBR target is down has been overridden

PBR Down Action

The action to take in case the target is down

Configuration

Section of the output providing information on the configured parameters

Primary Action

The configured action, if any; indented sub-labels in the show output provide configured parameters for this action

Secondary Action

The configured secondary action, if any; indented sub-labels in the show output provide configured parameters for this action

Status/Target status based on extended checks

Section of the output providing information on the operational status of certain parameters

Primary Action

The status of the target of the primary action, if configured, based on extended checks

Secondary Action

The status of the target of the secondary action, if configured, based on extended checks

Downloaded Action

The action downloaded by the CPM to the IOM

Stickiness Timer 

The status of the stickiness timer, if any

Effective Action based on application context

Section of the output providing the effective action, in the context of services, that a packet matching the criteria will be subject to

Service Id 

The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied

Type

The service type in which the service has been applied

Ingress/Egress

The direction in which the service has been applied

Effective Action

Indicates the effective action the packet will be subject to

match-list

Syntax 
match-list
Context 
show>filter
Description 

This command enables the context to display information for match lists used in filter policies (IOM/FP and CPM).

ip-prefix-list

Syntax 
ip-prefix-list [prefix-list-name]
ip-prefix-list prefix-list-name references
Context 
show>filter>match-list
Description 

This command displays IPv4 prefixes information for match criteria in IPv4 ACL and CPM filter policies.

Parameters 
prefix-list-name—
A string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
references—
Displays the filter policies, policy entries and source/destination IPv4 match type per entry referring to this match list.

ipv6-prefix-list

Syntax 
ipv6-prefix-list [prefix-list-name]
ipv6-prefix-list prefix-list-name references
Context 
show>filter>match-list
Description 

This command displays IPv6 prefixes information for match criteria in IPv6 ACL and CPM filter policies.

Parameters 
prefix-list-name—
A string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
references—
Displays the filter policies, policy entries and source/destination IPv6 match type per entry referring to this match list.

port-list

Syntax 
port-list [port-list-name]
port-list port-list-name references
Context 
show>filter>match-list
Description 

This command displays TCP/UDP/SCTP port values or ranges for match criteria in IPv4 and IPv6 ACL and CPM filter policies.

Parameters 
port-list-name—
A string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
references—
Displays the filter policies, policy entries and source/destination/port match type per entry referring to this match list.

protocol-list

Syntax 
protocol-list [protocol-list-name]
protocol-list protocol-list-name references
Context 
show>filter>match-list
Description 

This command displays the protocol-list information.

Parameters 
protocol-list-name—
A string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
references—
Displays the filter policies and policy entries referring to this match.

md-auto-id

Syntax 
md-auto-id
Context 
show>filter
Description 

This command displays information about filter IDs that have been automatically assigned by SR OS using the md-auto-id functionality. See the md-auto-id configuration command for further details.

Output 

The following output is an example of md-auto-id filter information and Table 81 describes the output fields.

Sample Output
*A:node-6# show filter md-auto-id
===============================================================================
MD Auto-Id Information
===============================================================================
Filter-id Range
Start              : 1073741822                  End                : 2147483647
Ip-filter Count    : 30
Ipv6-filter Count  : 20
Mac-filter Count   : 10
===============================================================================
Table 81:  MD Auto-Id Filter Output Fields 

Label

Description  

Start

Displays the start of the range for an automatic filter policy ID

End

Displays the end of the range for an automatic filter policy ID

Ip-filter Count

Displays the number of IP filter policies with automatically-assigned IDs

Ipv6-filter Count

Displays the number of IPv6 filter policies with automatically-assigned IDs

Mac-filter Count

Displays the number of MAC filter policies with automatically-assigned IDs

redirect-policy

Syntax 
redirect-policy [redirect-policy-name {dest ip-address | associations}]
Context 
show>filter
Description 

This command shows redirect filter information.

Parameters 
redirect-policy-name—
Displays information for the specified redirect policy, up to 32 characters.
dest ip-address
Directs the router to use a specified IP address for communication.
Values—

ipv4-address:

a.b.c.d.

ipv6-address:

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x: [0 to FFFF]H

d: [0 to 255]D

 

associations—
Appends association information.
Output 

Redirect Policy Output — The following output is an example of redirect policy information, and Table 82 describes the fields.

Sample Output
A:ALA-A>config>filter# show filter redirect-policy
===============================================================================
Redirect Policies
===============================================================================
Redirect Policy                  Applied Description
-------------------------------------------------------------------------------
wccp                             Yes
redirect1                        Yes     New redirect info
redirect2                        Yes     Test test test test
===============================================================================
ALA-A>config>filter#
               
 
ALA-A>config>filter# show filter redirect-policy redirect1
===============================================================================
Redirect Policy
===============================================================================
Redirect Policy: redirect1                        Applied      : Yes
Description    : New redirect info
Active Dest    : 10.10.10.105
-------------------------------------------------------------------------------
Destination    : 10.10.10.105
-------------------------------------------------------------------------------
Description    : another test
Admin Priority : 95                               Oper Priority: 105
Admin State    : Up                               Oper State   : Down
 
Ping Test
Source Address : None
Interval       : 1                                Timeout      : 30
Drop Count     : 5
Hold Down      : 0                                Hold Remain  : 0
Last Action at : 03/19/2007 00:46:55              Action Taken : Disable
===============================================================================
A:ALA-A>config>filter#
Table 82:  Filter Redirect-Policy Output Fields 

Label

Description

Redirect Policy

Specifies a specific redirect policy

Applied

Specifies whether the redirect policy is applied to a filter policy entry

Description

Displays the user-provided description for this redirect policy

Active Destination

IP address — specifies the IP address of the active destination

none — indicates that there is currently no active destination

Destination

Specifies the destination IP address

Oper Priority

Specifies the operational value of the priority for this destination; the highest operational priority across multiple destinations is used as the preferred destination

Admin Priority

Specifies the configured base priority for the destination

Admin State

Specifies the configured state of the destination

Out of Service — tests for this destination will not be conducted

Oper State

Specifies the operational state of the destination

Ping Test

Specifies the name of the ping test

Source Address

Specifies the source address of the ping test (if any)

Timeout

Specifies the amount of time in seconds that is allowed for receiving a response from the far-end host; if a reply is not received within this time the far-end host is considered unresponsive

Interval

Specifies the amount of time in seconds between consecutive requests sent to the far end host

Drop Count

Specifies the number of consecutive requests that must fail for the destination to declared unreachable

Hold Down

Specifies the amount of time in seconds that the system should be held down if any of the test has marked it unreachable

Hold Remain

Specifies the amount of time in seconds that the system will remain in a hold down state before being used again

Last Action at

Displays a time stamp of when this test received a response for a probe that was sent out

redirect-policy-binding

Syntax 
redirect-policy-binding [name]
Context 
show>filter
Description 

This command shows configured redirect-policy bindings information.

Parameters 
name—
Displays information for the specified redirect policy binding, up to 32 characters.
Output 

Redirect Policy Output — The following output is an example of redirect policy binding information, and Table 83 describes the fields.

Sample Output
A:ALA-A>config>filter# show filter redirect-policy-binding
===============================================================================
Redirect Policy Bindings
===============================================================================
Name                             Binding Operator Oper State
-------------------------------------------------------------
TestBinding                      And              Up
===============================================================================
ALA-A#
Table 83:  Filter Redirect Policy Bindings Output Fields 

Label

Description

Test Binding

Specifies a specific test binding field

system-filter

Syntax 
system-filter [chained-to]
Context 
show>filter
Description 

This command shows system filter information.

Parameters 
chained-to—
Displays filters that chain to a given system filter.
Output 

No Parameters Specified — When no parameters are specified, the output is grouped for IPv4 and IPv6, and displays information about the active system filter and all filters with scope system.

The following output is an example of system filter information when no parameters are specified.

Sample Output
*A:Dut-C>show>filter# system-filter
 
===============================================================================
IP system filters
===============================================================================
Filter-Id                     Active
-------------------------------------------------------------------------------
100                           Yes
65535                         No
-------------------------------------------------------------------------------
No. of IP system filters (total / active): 2 / 1
===============================================================================
 
===============================================================================
IPv6 system filters
===============================================================================
Filter-Id                     Active
-------------------------------------------------------------------------------
No Matching Entries
-------------------------------------------------------------------------------
No. of IPv6 system filters (total / active): 0 / 0
===============================================================================

With chained-to Option Specified — The following output is an example of system filter information when the chained-to option is specified.

*A:Dut-C>show>filter# system-filter chained-to
 
============================================================================
IP filters that chain to the active IP system filter
============================================================================
3                  4                  5                  6
5:23               6:24
----------------------------------------------------------------------------
No. of IP filters that chain to the active IP system filter: 6
============================================================================
 
============================================================================
IPv6 filters that chain to the active IPv6 system filter
============================================================================
No Matching Entries
----------------------------------------------------------------------------
No. of IPv6 filters that chain to the active IPv6 system filter: 0
============================================================================

4.5.2.2. Clear Commands

ip

Syntax 
ip ip-filter-id [entry entry-id] [{ingress | egress}]
Context 
clear>filter
Description 

Clears the counters associated with the entries of the specified IPv4 filter policy.

By default, the counters associated with each entry of the specified filter policy are all cleared. The scope of which counters are cleared can be narrowed using the command line parameters.

Default 

Clears all counters associated with each entry of the specified IPv4 filter policy.

Parameters 
ip-filter-id—
The IPv4 filter policy ID for which to clear the entry counters. Values can be expressed in different formats. The following shows decimal integer format.
Values—
1 to 65535

 

entry-id—
Specifies that only the counters associated with the specified filter policy entry are cleared.
Values—
1 to 2097151

 

ingress—
Specifies to only clear the ingress counters.
egress—
Specifies to only clear the egress counters.

ip-exception

Syntax 
ip-exception filter-id [entry entry-id] [{ingress | egress}]
Context 
clear>router
Description 

This command clears the counters associated with the entries of the specified IP exception filter policy.

Parameters 
filter-id—
Specifies the filter policy ID for which to clear the entry counters.
Values—
1 to 65535

 

entry-id—
Specifies that only the counters associated with the specified filter policy entry are cleared.
Values—
1 to 2097151

 

ingress—
Specifies to only clear the ingress counters.
egress—
Specifies to only clear the egress counters.

ipv6

Syntax 
ipv6 ipv6-filter-id [entry entry-id] [{ingress | egress}]
Context 
clear>filter
Description 

Clears the counters associated with the entries of the specified IPv6 filter policy.

By default, the counters associated with each entry of the specified filter policy are all cleared. The scope of which counters are cleared can be narrowed using the command line parameters.

Default 

Clears all counters associated with each entry of the specified IPv6 filter policy.

Parameters 
ipv6-filter-id—
The IPv6 filter policy ID for which to clear the entry counters. Values can be expressed in different formats. The following only shows decimal integer format.
Values—
1 to 65535

 

entry-id—
Specifies that only the counters associated with the specified filter policy entry are cleared.
Values—
1 to 2097151

 

ingress—
Specifies to only clear the ingress counters.
egress—
Specifies to only clear the egress counters.

ipv6-exception

Syntax 
ipv6-exception exception [entry entry-id] [ingress]
Context 
clear>filter
Description 

This command clears the information about the IPv6 exception filter.

Parameters 
exception—
Specifies the IPv6 exception filter by ID or name.
Values—
exception-id | exception-name

 

exception-id—
Specifies the IPv6 exception filter ID for which to clear the entry counters.
Values—
1 to 65535

 

exception-name—
Specifies name of the IPv6 exception filter, up to 64 characters.
entry-id—
Specifies that only the counters associated with the specified filter policy entry are cleared.
Values—
1 to 2097151

 

ingress—
Specifies to only clear the ingress counters.

log

Syntax 
log log-id
Context 
clear>filter
Description 

Clears the contents of a memory or file based filter log.

This command has no effect on a syslog based filter log.

Parameters 
log-id—
Specifies the filter log ID as a decimal integer.
Values—
101 to 199

 

mac

Syntax 
mac mac-filter-id [entry entry-id] [{ingress | egress}]
Context 
clear>filter
Description 

Clears the counters associated with the entries of the specified MAC filter policy.

By default, the counters associated with each entry of the specified filter policy are all cleared. The scope of which counters are cleared can be narrowed using the command line parameters.

Default 

Clears all counters associated with each entry of the specified MAC filter policy.

Parameters 
mac-filter-id—
The MAC filter policy ID for which to clear the entry counters. Values can either be expressed as a decimal integer or as an ASCII string of up to 64 characters. The following values only shows decimal integer.
Values—
1 to 65535

 

entry-id—
Specifies that only the counters associated with the specified filter policy entry will be cleared. The values are expressed as a decimal integer.
Values—
1 to 2097151

 

ingress—
Specifies to only clear the ingress counters.
egress—
Specifies to only clear the egress counters.

4.5.2.3. Monitor Commands

The following command outputs are examples only; actual displays may differ depending on supported functionality and user configuration.

ip

Syntax 
ip ip-filter-id entry entry-id [interval seconds] [repeat repeat] [{absolute | rate}]
Context 
monitor>filter
Description 

This command monitors the counters associated with the specified entry of the specified IP filter policy.

Parameters 
ip-filter-id—
The IPv4 filter policy ID. Values can be expressed in different formats. The following only shows decimal integer format values.
Values—
1 to 65535

 

entry-id—
Specifies the filter policy entry to monitor, as a decimal integer.
Values—
1 to 2097151

 

seconds—
Configures the interval for each display in seconds.
Default—
10 seconds
Values—
3 to 60

 

repeat—
Configures how many times the command is repeated.
Default—
10
Values—
1 to 999

 

absolute—
Displays the raw statistics without processing. No calculations are performed on the delta or rate statistics.
rate—
Displays the rate-per-second for each statistic instead of the delta.
Default—
absolute

ipv6

Syntax 
ipv6 ipv6-filter-id entry entry-id [interval seconds] [repeat repeat] [{absolute | rate}]
Context 
monitor>filter
Description 

This command monitors the counters associated with the IPv6 filter policy.

Parameters 
ipv6-filter-id—
The IPv6 filter policy ID. Values can be expressed in different formats. The following only shows decimal integer format values.
Values—
1 to 65535

 

entry-id—
Specifies the filter policy entry to monitor, as a decimal integer.
Values—
1 to 2097151

 

seconds—
Configures the interval for each display in seconds.
Default—
10 seconds
Values—
3 to 60

 

repeat—
Configures how many times the command is repeated.
Default—
10
Values—
1 to 999

 

absolute—
Displays the raw statistics without processing. No calculations are performed on the delta or rate statistics.
rate—
Displays the rate-per-second for each statistic instead of the delta.
Default—
absolute

mac

Syntax 
mac mac-filter-id entry entry-id [interval seconds] [repeat repeat] [{absolute | rate}]
Context 
monitor>filter
Description 

This command monitors the counters associated with the specified entry of the specified MAC filter policy.

Parameters 
mac-filter-id—
The MAC filter policy ID. Values can be expressed in different formats. The following only shows decimal integer format values.
Values—
1 to 65535

 

entry-id—
Specifies the filter policy entry to monitor, as a decimal integer.
Values—
1 to 2097151

 

seconds—
Configures the interval for each display in seconds.
Default—
10 seconds
Values—
3 to 60

 

repeat—
Configures how many times the command is repeated.
Default—
10
Values—
1 to 999

 

absolute—
Displays the raw statistics without processing. No calculations are performed on the delta or rate statistics.
rate—
Displays the rate-per-second for each statistic instead of the delta.
Default—
absolute

4.5.2.4. Tools Commands

The following command outputs are examples only; actual displays may differ depending on supported functionality and user configuration.

cam-utilization

Syntax 
cam-utilization [card slot-number]
Context 
tools>dump>filter
Description 

This command, when used without parameters, specifies the utilization per CAM table for line card ACL filters per FP for FP4 based cards in the system. Optionally, the card number can be provided as a parameter to limit the output to a single card.

Parameters 
slot-number—
Specifies the IOM slot number.
Values—
1 to 10, A, B

 

Output 

The following output is an example of CAM utilization information for filters.

Sample Output
*A:7750# tools dump filter cam-utilization
============================================
Filter Cam Utilization
============================================
Slot FP  Dir   Type       Cam Utilization %
--------------------------------------------
2    1   Ing   ip-mac                     0
2    1   Egr   ip-mac                   100
2    1   Ing   ipv6                       0
2    1   Egr   ipv6                       0
============================================

overload

Syntax 
overload
overload card slot-number fp fp-number
overload card slot-number fp fp-number cpm-ip
overload card slot-number fp fp-number cpm-ipv6
overload card slot-number fp fp-number cpm-mac
overload card slot-number fp fp-number ip ip-filter-id direction direction
overload card slot-number fp fp-number ipv6 ipv6-filter-id direction direction
overload card slot-number fp fp-number mac mac-filter-id direction direction
Context 
tools>dump>filter
Description 

This command, when used without parameters, allows the operator to identify filter memory banks with one or more policies in overload in the system by slot number, FP number, direction (ingress or egress), and type (IP-MAC or IPv6).

The command, when used with only the card and fp parameters, lists the filter policy ID as well as the number of entries in overload on a specified FP when the optional parameters slot-number and fp-number are specified.

This command, when used with the ip, ipv6, or mac parameters in conjunction with the direction parameter, displays the entries not programmed for a specified filter policy due to an overload condition.

This command, when used with the cpm-ip, cpm-ipv6, or cpm-mac parameters, displays the entries not programmed for a specified CPM filter policy. This command is available on applicable platforms only. Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR System Management Guide, CPM Filters and Traffic Management section for more details.

Parameters 
slot-number—
Specifies the IOM slot number or CPM for the overload command.
Values—
1 to 10

 

Values—
A (when used with cpm-ip, cpm-ipv6, or cpm-mac parameters)

 

fp-number—
Specifies the FP number.
Values—
1 to 8

 

ip-filter-id—
Specifies the IP filter policy ID or name for which to display information.
Values—
1 to 65535 (Specifies the policy ID)
name (Specifies a string of up to 64 characters uniquely identifying this filter policy name)

 

direction—
Specifies the direction.
Values—
ingress or egress

 

ipv6-filter-id—
Specifies the IPv6 filter policy ID or name for which to display information.
Values—
1 to 65535 (Specifies the policy ID)
name (Specifies a string of up to 64 characters uniquely identifying this filter policy name)

 

mac-filter-id—
Specifies the MAC filter ID policy for which to display information. Values can be expressed in different formats and refer to static or dynamic filters. The following values only shows decimal integer format.
Values—
1 to 65535
filter-name (Specifies a string of up to 64 characters uniquely identifying this filter policy name)

 

Output 

The following output is an example of filter overload status.

Sample Output
*A:Dut# tools dump filter overload
==========================================================
Filter Overload Status
==========================================================
Slot FP  Dir   Type
----------------------------------------------------------
1    1   Ing   ip-mac
1    1   Egr   ipv6
==========================================================

Sample overload output with card and fp parameters only:

A:Dut# tools dump filter overload card 1 fp 1
==========================================================
Filter Overload Status
==========================================================
Slot FP  Dir   Type                      Filter  #Entries
----------------------------------------------------------
1    1   Ing   ip                             5         1
1    1   Egr   ipv6                       40008        10
==========================================================

Sample overload output with card, fp, {cpm-ip, cpm-ipv6, or cpm-mac} parameters only

*A:Dut# tools dump filter overload card "a" fp 1 cpm-ipv6
==========================================================
Filter Overload Status
==========================================================
Slot FP  Dir   Type                      Filter     Entry
----------------------------------------------------------
A    1         cpm-ipv6                                168
==========================================================

Sample overload output with card, fp, {ip, ipv6, or mac} and direction parameters only:

*A:Dut# tools dump filter overload card 1 fp 1 ip 9 direction ingress
==========================================================
Filter Overload Status
==========================================================
Slot FP  Dir   Type                      Filter     Entry
----------------------------------------------------------
1    1   Ing   ip                             9       100
==========================================================

cpm

Syntax 
cpm
Context 
tools>dump>filter>resources
Description 

This command displays information about filter resource utilization on the CPM, consumption by filter-using services such as OpenFlow, and the filters that use the most resources.

Output 

The following output is an example of filter resource utilization information.

Sample Output
*A:Dut-C>tools>dump>filter>resources># cpm
 
===========================================================================
Number of ACL filters defined on CPM
===========================================================================
Owner                     MAC             IP           IPv6          Total
---------------------------------------------------------------------------
Configuration               0              7              0              7
Host Common                 0              2              0              2
Openflow                    0              2              1              3
---------------------------------------------------------------------------
Total                       0             14              4             18
===========================================================================
Available filters (except openflow): 16369
Available openflow filters:          16381
 
=============================================================================
Number of ACL filter entries / subentries defined on CPM
=============================================================================
Inserted by                             MAC       IP     IPv6          Total
-----------------------------------------------------------------------------
User configuration                        0       21        1             22
                                          0       21        1             22
Radius                                    0        0        0              0
                                          0        0        0              0
Credit Control                            0        0        0              0
                                          0        0        0              0
Embedded                                  0        0        0              0
                                          0        0        0              0
Radius shared host                        0        2        0              2
                                          0        2        0              2
Openflow                                  0        0        0              0
                                          0        0        0              0
PCC-Rule                                  0        0        0              0
                                          0        0        0              0
Other                                     0        0        0              0
                                          0        0        0              0
-----------------------------------------------------------------------------
Total                                     0       23        1             24
                                          0       23        1             24
=============================================================================
Available subentries (except openflow): 262120
Available openflow subentries:          262144
 
===============================================================================
Filters utilizing most resources (ordered by CPM entries)
===============================================================================
Type Id                                  Entries     Subentries   TCAM entries
                                                                (per FlexPath)
-------------------------------------------------------------------------------
No Mac filters found
-------------------------------------------------------------------------------
Ip   100                                       5              5              5
Ip   65535                                     5              5              5
Ip   1                                         4              4              4
Ip   5:23                                      2              2              2
Ip   6:24                                      2              2              2
-------------------------------------------------------------------------------
Ipv6 fSpec-0                                   0              0              0
Ipv6 fSpec-2345                                0              0              0
Ipv6 _tmnx_ofs_system:1                        0              0              0
No more Ipv6 filters
===============================================================================
 
===============================================================================
Filters utilizing most resources (ordered by CPM subentries)
===============================================================================
Type Id                                  Entries     Subentries   TCAM entries
                                                                (per FlexPath)
-------------------------------------------------------------------------------
No Mac filters found
-------------------------------------------------------------------------------
Ip   100                                       5              5              5
Ip   65535                                     5              5              5
Ip   1                                         4              4              4
Ip   5:23                                      2              2              2
Ip   6:24                                      2              2              2
-------------------------------------------------------------------------------
Ipv6 fSpec-0                                   0              0              0
Ipv6 fSpec-2345                                0              0              0
Ipv6 _tmnx_ofs_system:1                        0              0              0
No more Ipv6 filters
===============================================================================
 

dest-tracking

Syntax 
dest-tracking ip [detail]
dest-tracking ipv6 [detail]
dest-tracking sap [detail]
dest-tracking sdp [detail]
Context 
tools>dump>filter>resources
Description 

This command displays information about resources pertaining to tracked targets.

Parameters 
ip—
Displays information about IPv4 targets.
ipv6—
Displays information about IPv6 targets.
sap—
Displays information about SAP targets.
sdp—
Displays information about SDP targets.
detail—
Displays detailed information.
Output 

The following output is an example of filter resource SAP destination tracking information.

Sample Output
dest-tracking sap
===============================================================================
Unique SAPs with tracked forwarding states ====================================
Used  : 1
Free  : 4095
Total : 4096
===============================================================================

The following output is an example of filter resource SAP destination tracking detailed information.

 
dest-tracking# sap detail
===============================================================================
Unique SAPs with tracked forwarding states ====================================
Num  Destination                                      Ref. count
-------------------------------------------------------------------------------
    1 sap 1/2/2                                        1
===============================================================================
Unique SAPs with tracked forwarding states ====================================
Used  : 1
Free  : 4095
Total : 4096
===============================================================================

egress-pbr

Syntax 
egress-pbr [detail]
Context 
tools>dump>filter>resources
Description 

This command displays the number of allocated unique egress PBR destinations.

Parameters 
detail—
Displays number of allocated unique egress PBR destinations together with a list of destinations and their ref counts.
Output 

The following output is an example of filter resource egress PBR destination information.

Sample Output
*A:Dut-C>tools dump filter resources egress-pbr
 
===============================
Egress PBR destinations
===============================
Name                     Count
-------------------------------
All destinations             8
Unique destinations          4
===============================
 
 
*A:Dut-C# tools dump filter resources egress-pbr detail
 
===============================================================================
Unique egress PBR destinations
===============================================================================
Num Action       Ref. count Parameters
-------------------------------------------------------------------------------
  1 Esi L3       1          esi  00:00:00:00:00:00:00:00:00:01
                            ip   5.5.1.5
                            if   VasToFromAccess
                            rtr  123
-------------------------------------------------------------------------------
  2 Esi L3       2          esi  00:00:00:00:00:00:00:00:00:02
                            ip   5.5.0.5
                            if   VasToFromNetwork
                            rtr  123
-------------------------------------------------------------------------------
  3 Red-pol      3          name egress-pbr
-------------------------------------------------------------------------------
  4 Red-pol      2          name ingress-pbr
===============================================================================

gre-tunnel-template

Syntax 
gre-tunnel-template
Context 
tools>dump>filter>resources
Description 

This command displays how many GRE tunnel templates are configured.

Output 

The following output is an example of filter resource GRE tunnel templates information.

Sample Output
*A:Dut-C# tools dump filter resources gre-tunnel-template
 
===============================================================================
Filter - GRE tunnel template resources
===============================================================================
Used  : 1024
Free  : 0
Total : 1024
===============================================================================

http-redirect

Syntax 
http-redirect [detail]
Context 
tools>dump>filter>resources
Description 

This command displays the number of unique and total installed HTTP redirect destinations per system.

Parameters 
detail—
Displays the number of unique and total installed HTTP redirect destinations per system, together with a list of unique HTTP redirect destinations.
Output 

The following output is an example of filter resource HTTP redirect information.

Sample Output
A:SROS# /tools dump filter resources http-redirect detail
===============================================================================
Unique http-redirects
===============================================================================
Num   Not emb.       Emb. Override URL
-------------------------------------------------------------------------------
  1          1          0 no ovr.  http://portal_1.com
-------------------------------------------------------------------------------
  2         10          1 no ovr.  http://portal_2.com
-------------------------------------------------------------------------------
  3          1          0 no ovr.  http://portal_3.com
-------------------------------------------------------------------------------
  4          1          0 no ovr.  http://portal_4.com
-------------------------------------------------------------------------------
  5          1          0 no ovr.  http://portal_5.com
===============================================================================
====================================
Http-redirects
====================================
Name                          Count
------------------------------------
Unique redirects                  5
Not embedded redirects           14
Embedded redirects                1
All redirects                    15
====================================

iom

Syntax 
iom [slot-number]
Context 
tools>dump>filter>resources
Description 

This command shows information about filter resource utilization on all IOMs or a specified IOM. Resource utilization per filter type is available, as well as filters using most resources on a given line card.

Parameters 
slot-number—
Specifies that only the filter resource utilization associated with the IOM card in this slot will be displayed.
Values—
1 to 10

 

Output 

The following output is an example of filter resource utilization information for all IOMs.

Sample Output
*A:Dut-C>tools>dump>filter>resources># iom
 
=======================================================
Number of ACL filter entries used / available on IOMs
=======================================================
Slot                          Used           Available
-------------------------------------------------------
1                               11               65524
2                                5               65530
3                                5               65530
=======================================================
 
===========================================================================
Number of ACL filters and filter entries used / available on FlexPaths
===========================================================================
Slot FlexPath    Dir  Filters  Filters   MAC/IP   MAC/IP     IPv6     IPv6
                         used    avail  entries  entries  entries  entries
                                           used    avail     used    avail
---------------------------------------------------------------------------
1    1          Ingr        2     2045       10    65526        2    28670
                 Egr        2     2045        5    32763        2    16382
2    1          Ingr        4     2043        7    65529        2    28670
                 Egr        0     2047        2    32766        2    16382
3    1          Ingr        0     2047        7    65529        2    28670
                 Egr        0     2047        2    32766        2    16382
===========================================================================
 
===============================================================================
Filters utilizing most resources (ordered by TCAM entries per FlexPath)
Only filters present on any IOM are displayed
===============================================================================
Type Id                                  Entries     Subentries   TCAM entries
                                                                (per FlexPath)
-------------------------------------------------------------------------------
No Mac filters found
-------------------------------------------------------------------------------
Ip   100                                       5              5              5
Ip   5:23                                      2              2              2
Ip   6:24                                      2              2              2
Ip   3                                         1              1              1
Ip   4                                         1              1              1
-------------------------------------------------------------------------------
Ipv6 fSpec-0                                   0              0              0
Ipv6 fSpec-2345                                0              0              0
No more Ipv6 filters
===============================================================================
 

ip

Syntax 
ip ip-filter-id
Context 
tools>dump>filter>resources
Description 

This command displays information about the specified IP filter including resource utilization on CPM and IOM, the IOMs on which the filter is used, and the entries using the most resources.

Parameters 
ip-filter-id—
Specifies that only the filter resource utilization associated with this IP filter will be displayed.
Values—
1 to 65535

 

Output 

The following output is an example of IP filter resource utilization information.

Sample Output
*A:Dut-C>tools>dump>filter>resources># ip 100
 
===============================================================================
Resource utilization details for Ip filter 100
===============================================================================
CPM entries used                       : 5
CPM subentries used                    : 5
TCAM entries used (per FlexPath)       : 5
Associated with IOMs                   : 1,2,3,4,5,6,7,8,9,10
 
---------------------------------------------------------------------------
Largest 5 entries
---------------------------------------------------------------------------
Entry ID                                        Active        TCAM entries
                                                            (per FlexPath)
---------------------------------------------------------------------------
3                                                  Yes                   1
4                                                  Yes                   1
5                                                  Yes                   1
6                                                  Yes                   1
100                                                Yes                   1
---------------------------------------------------------------------------
===============================================================================
 

ipv6

Syntax 
ipv6 ipv6-filter-id
Context 
tools>dump>filter>resources
Description 

This command displays information about the specified IPv6 filter including resource utilization on CPM and IOM, the IOMs on which the filter is used, and the entries using the most resources.

Parameters 
ipv6-filter-id—
Specifies that only the filter resource utilization associated with this IPv6 filter will be displayed.
Values—
1 to 65535

 

Output 

The following output is an example of IPv6 filter resource utilization information.

Sample Output
*A:Dut-C>tools>dump>filter>resources># ipv6 "fSpec-0"
 
===============================================================================
Resource utilization details for Ipv6 filter fSpec-0
===============================================================================
CPM entries used                       : 0
CPM subentries used                    : 0
TCAM entries used (per FlexPath)       : 0
Associated with IOMs                   : 2
 
---------------------------------------------------------------------------
Largest 5 entries
---------------------------------------------------------------------------
Entry ID                                        Active        TCAM entries
                                                            (per FlexPath)
---------------------------------------------------------------------------
No Matching Entries
---------------------------------------------------------------------------
===============================================================================
 

mac

Syntax 
mac mac-filter-id
Context 
tools>dump>filter>resources
Description 

This command displays information about the specified MAC filter including resource utilization on CPM and IOM, the IOMs on which the filter is used, and the entries using the most resources.

Parameters 
mac-filter-id—
Specifies that only the filter resource utilization associated with this IPv6 filter will be displayed.
Values—
1 to 65535

 

Output 

The following output is an example of MAC filter resource utilization information.

Sample Output
*A:Dut-C>tools>dump>filter>resources># mac 1
 
===============================================================================
Resource utilization details for Mac filter 1
===============================================================================
CPM entries used                       : 1
CPM subentries used                    : 1
TCAM entries used (per FlexPath)       : 1
Associated with IOMs                   : 1
 
---------------------------------------------------------------------------
Largest 5 entries
---------------------------------------------------------------------------
Entry ID                                        Active        TCAM entries
                                                            (per FlexPath)
---------------------------------------------------------------------------
1                                                  Yes                   1
No more entries defined
---------------------------------------------------------------------------
===============================================================================

pattern-match

Syntax 
pattern-match [detail]
Context 
tools>dump>filter>resources
Description 

This command displays pattern match records.

Parameters 
detail—
Displays detailed pattern match records.
Output 

The following output is an example of detailed pattern match records.

Sample Output
A:Dut-A# tools dump filter resources pattern-match
===============================================================================
Unique filter pattern match patterns
===============================================================================
Used  : 1
Free  : 1022
Total : 1023
===============================================================================
A:Dut-A# tools dump filter resources pattern-match detail
===================================================================
Unique pattern match
===================================================================
Num  Pattern             Mask                  Not emb.       Emb.
-------------------------------------------------------------------
   1 0xff00000000000000  0xff00000000000000           1          0
===================================================================
===============================================================================
Unique filter pattern match patterns
===============================================================================
Used  : 1
Free  : 1022
Total : 1023
===============================================================================

sticky-dest

Syntax 
sticky-dest
Context 
tools>dump>filter>resources
Description 

This command displays information about resources pertaining to sticky destinations timers.

Output 

The following output is an example of sticky destination filter action information.

Sample Output
===============================================================================
Filter action - Sticky-dest resources
===============================================================================
Used  : 1
Free  : 2047
Total : 2048
===============================================================================

activate-primary-action

Syntax 
activate-primary-action
Context 
tools>perform>filter>ip-filter>entry
tools>perform>filter>ipv6-filter>entry
tools>perform>filter>mac-filter>entry
Description 

This command allows an operator to activate the primary action for the given filter policy entry. If the primary action is already active, the command has no effect. If a secondary action is active, the primary action will be activated unless the primary target is down. If the sticky destination timer is running for the primary action entry, it will expire.

activate-best-dest

Syntax 
activate-best-dest
Context 
tools>perform>filter>redirect-policy
Description 

This command allows the operator to force a PBR switch to the best destination selected by the redirect policy when that destination is not currently active as result of sticky destination functionality being enabled for the specified redirect policy. If hold-time-up is running, the timer is also expired.