This command gives an overview of either all traces or a specific trace on the WLAN-GW.
The following output is an example of traces of the UE being monitored.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7750 SR-2s, 7750 SR-7s, 7750 SR-14s
This command displays User Equipment (UE) information.
id: | 1 to 2147483647 |
svc-name: | Specifies an existing service name, up to 64 characters (svc-name is an alias for input only. The svc-name gets replaced with an id automatically by SR OS in the configuration) |
The following displays WLAN-GW information.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command dumps User Equipment (UE) information.
The summary option displays a count of UEs per ISA and the aggregate-summary displays a count of matched UEs over the whole WLAN-GW.
This command displays UE information.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command displays information about E-LMI mode, status, number of EVCs (SAPs) configured on the port for all of the ports on the service router.
The following output is an example of elmi uni information.
All
This command displays unicast negotiation information.
The following output is an example of PTP unicast information.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
This command lists errors of an unknown origin. Errors shown do have a corresponding SAP ID or a SDP ID.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command cancels the subscription of the current CLI session to the specified CLI log.
All
This command enables you to instruct MPLS to replace the path of a primary or secondary LSP. The primary or secondary LSP path is indirectly identified via the current-path-name value. The same path name cannot be used more than once in a given LSP name.
This command applies to both CSPF LSP and to a non-CSPF LSP. This command will only work when the specified current-path-name has the adaptive option enabled. The adaptive option can be enabled at the LSP level or the path level.
The new path must have been configured in the CLI or provided via SNMP. The CLI command for entering the path is
configure router mpls path path-name
The command fails if any of the following conditions exist:
When you execute this command, MPLS performs the following procedures:
All
This command displays operational information related to the usage of GTP uplink interfaces (Gn, S2a, S2b) in this routing context.
The following is an example of GTP uplink information.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command displays box-wide operational information related to the GTP uplink interfaces (Gn, S2a, S2b).
The following is an example of GTP uplink information
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command clears information related to the GTP uplink state for the routing context.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context display UPnP policy parameters.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command remove UPnP mappings for the specified subscriber. If protocol and outside-port are not specified, then all UPnP mappings of subscriber will be removed.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This commands displays upnp-policy related information.
Without any parameters the system outputs a list of configured UPnP policies.
The following is sample output for this command.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command clears UPnP policy statistics.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command displays the time since the system started.
The following output is an example of uptime information, and Table 557 describes the output field.
Label | Description |
System Up Time | Displays the length of time the system has been up in days, hr:min:sec format. |
All
This command displays information about the configured url-filter policy along with some associated raw statistics. These output statistics are:
In addition to these counters the system will count the type of action taken by the url-filter policy (allow, block, redirect, default) as well as the type of responses received from the icap server (allow, block, redirect, late).
The following is an example show output for the url-filter command.
Table 558 describes the output fields.
Label | Description |
Category-set-id | The ID of the category set used for URL categorization. |
Description | The description of the web-service profile. |
Profile Name | The name of the web-service profile. |
Blocked Categories | The blocked categories for the web-service profile. |
Allowed Categories | The allowed categories for the web-service profile. |
Category Id | The ID of the blocked or allowed category. |
Category Name | The name of the blocked or allowed category. |
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command displays information about the configured URL list.
The following output examples show URL list information.
Table 559 describes the URL list show command output fields.
Label | Description |
Description | The description of the URL list |
Size | [standard | extended] Size parameter for the URL list |
Host Expressions | If the host is enabled or disabled |
Admin Status | [Up | down] - Administrative status of the URL list |
Oper Status | [Up | down] - Operational status of the URL list |
Oper Flags | [admin-down | file-does-not-exist |invalid-file-format | too-many-urls | switch-over-error] |
File Deployed to ISA | [Yes | No] - This flag describes if the file located in the compact flash is the one deployed in the ISA, in the event the file is overwritten and before the admin upgrade command is used this flag will display "No". |
Upgrade Statistics | |
Last Success | Last time the list was successfully upgraded |
File Name | File name for the last successful upgrade |
URL Entries | Number of URLs loaded at the last success and percentage to full |
URL Characters | Number of characters loaded at the last success and percentage to full |
URL Host Expr Entries | URL host expression entries |
Blank/CommentLines | Number of blank or commented out lines |
Last Attempt | Last time the operator tried to upgrade the list |
Result | [Success | Failure]. Result of the last upgrade |
File Name | File name for the last upgrade attempt |
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command displays the consumed EVPN resources in the system. The Vxlan Destinations include static VXLAN destinations as well as Ethernet Segment (ES) Vxlan destinations.
This command displays per-subscriber usage-monitoring statistics.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command displays user registration information.
If no command line options are specified, summary information for all users displays.
The following are examples of user output information.
Table 560 describes user output fields.
Label | Description |
User ID | The name of a system user. |
Users | |
New Pwd | y — The user must change their password at the next login. n — The user does not need to change their password at the next login. |
User Permissions | console: y — The user is authorized for console access. n — The user is not authorized for console access. ftp: y — The user is authorized for FTP access. n — The user is not authorized for FTP access. li: y — The user is authorized for LI access. n — The user is not authorized for LI access. snmp: y — The user is authorized for SNMP access. n — The user is not authorized for SNMP access. netconf: y — The user is authorized for NETCONF access. n — The user is not authorized for NETCONF access. grpc: y — The user is authorized for gRPC access. n — The user is not authorized for gRPC access. |
Password Expires | The number of days after which the user must change their password. |
Login Attempt | The number of times that the user has attempted to log in, irrespective of whether the login succeeded or failed. |
Failed Logins | The number of unsuccessful login attempts. |
Local Conf | y — Password authentication is based on the local password database. n — Password authentication is not based on the local password database. |
Number of users | The total number of listed users. |
User Configuration Detail | |
new pw required | yes — The user must change their password at the next login. no — The user does not need to change their password at the next login. |
cannot change pw | yes — The user does not have the ability to change their password. no — The user has the ability to change their password. |
home directory | The local home directory for the user for both console and FTP access. |
restricted to home | yes — The user is not allowed to navigate to a directory higher in the directory tree on the home directory device. no — The user is allowed to navigate to a directory higher in the directory tree on the home directory device. |
login exec file | The user’s login exec file which executes whenever the user successfully logs in to a console session. |
profile | The security profiles associated with the user. |
locked-out | Whether the user is currently locked out, and, if they are locked out, how much time remains before the user can attempt to log into the node again. |
Currently Failed Login Attempts | |
Remaining Login Attempts | The number of login attempts remaining before the user is locked out. |
Remaining Lockout Time (min:sec) | The number of minutes and seconds remaining until the lockout expires and the user can attempt to log in again. |
With the introduction of the PKI on an SR (SSH Server) the authentication process can be done via PKI or password. SSH client usually authenticate via PKI and password if PKI is configured on the client. In this case PKI takes precedence over password in most clients.
All client authentications are logged and display in the show>system>security>user detail. Table 561 shows the rules where pass and fail attempts are logged.
Authentication Order | Client (such as, putty) | Server (such as, SR) | CLI Show System Security Attempts (SR) | ||
Private Key Programmed | Public Key Configured | Password Configured | Logins Attempts | Failed Logins | |
1. Public Key | Yes | Yes | N/A | Increment | |
2. Password | Yes | Yes (No match between client and server. Go to password.) | Yes | Increment | |
Yes | No | Yes | Increment | ||
No | N/A | Yes | Increment | ||
No | N/A | No | Increment | ||
1. Public Key (only) | Yes | Yes | N/A | Increment | |
Yes | Yes (No match between client and server. Go to password.) | Increment | |||
Yes | N/A | Increment | |||
No | N/A | Increment |
All
Displays console user login and connection information.
The following is an example of user information.
Table 562 describes show users output fields.
Label | Description |
User | The user name. |
Type | The user is authorized this access type. |
From | The originating IP address. |
Login time | The time the user logged in. |
Idle time | The amount of idle time for a specific login. |
Number of users | Displays the total number of users logged in. |
All
This command displays power management utilization.
The following output is an example of power management utilization information, and Table 563 describes the output fields.
Label | Description |
SUPPLY | |
Power Capacity | Indicates the total amount of power available to the chassis. |
Safety Level | Specifies the configured Power Safety Level, which is a percentage of the worst case power consumption level. |
Alert Level | Specifies the configured power level in watts, which causes the system to raise an alarm if the available power level drops below a set level. |
DEMAND | |
Fan | Specifies the amount of power used for the fan tray indicated. |
IO Module | Specifies the amount of power used for the IO Module indicated. |
CPM Module | Specifies the amount of power used for the CPM indicated. |
Fabric Module | Specifies the amount of power used for the SFM indicated. |
MDA Module | Specifies the amount of power used for the line card indicated. |
Current Util. | Specifies the total amount of power used for all system elements. |
Peak Util. | Specifies peak utilization starting from bootup. |
7750 SR-s, 7950 XRS