55. System and Chassis Information
Welcome back. Let’s look at the commands that we can use to view system and Chessie information. We’re going to try these commands from the terminal. But if you’d like to bookmark the commands, here’s the list. These are the commands that we’re going to use to view the system information. And these are the commands that we’ll use to view Chessie information. Now, let’s get to the terminal. All right, I’m here at the Junos terminal. Notice that I’m in the operational mode. I’m going to start with show question mark. And you’ll notice that we have quite a few options that we can try over here.
But right now, we are focused on system information and chessie information. So we’re going to try show system space, question mark. And you’ll notice there’s a lot of options. We can try here as well. Let’s start with the first one. Show system alarms. So this will show you any alarms that are active on your device. And here you can see that I’ve got an alarm that is active on my device.
The alarm is active because I do not have a rescue configuration on my device. Next, we’ll look at show system boot messages. This will allow you to see all the messages that were generated when the device was booting up. This is a long list of messages. Usually this is used for troubleshooting and identifying any problems or issues with the device, but process. It is possible to save these messages to a file so you could do show system, boot messages, pipe. And we can do safe. And then the file name. Enter. So now we can look at files, show bood dirty, sexy. And we’ll see the exact same information if required.
We can also transfer this file to a remote system. Let’s look at the next command. We’re only going to focus on the most important commands and the commands that you’re likely to use. So let’s do show system. Question mark. And the next command that we’re going to try is certificate show. System certificate. This will show you all install certificates that have been signed by Juniper or that have been signed by the Juniper Certificate Authority.
You can see over here each certificate has the organization name as Juniper Networks. Let’s look at the next command show system commit. This will show you the entire history of commit operations performed on the device. All right, let’s try the next one. Show system connections. This will show you a list of connections established on the device. So here we can see the protocol. Here we can see the local address, which is the address of the Junos device. Here we can see the foreign address or the remote address to which the device is connected. And here we can see the state of the connection. If you see established, that means the connection has been made. If you see listen, that means the port is open and is waiting for a connection. Let’s try the next one. Show system information. This command can be used to view high level system information about the device. So you can see things like the model. In this case, it’s a V.S. tricks. The device family, the operating system version running on that device. And they’re configured hostname. The next command is show system license.
This will show you the license information of this device. So, for example, here we can see that I’ve got licenses for IDP, app I.D., Virtual Appliance, and I’ve got a couple of licenses for remote access IPSEC, VPN client so we can see the licenses installed and the licenses that are currently used. The next commander we’re going to look at is show system log in and we’re going to look at log-in lock out. This will show you all users who have been locked out of the device as a result of trying an incorrect password multiple times.
So the command is show system, log in, lock out, and we can see here one user has been locked out. This is when the lockout started. And this is when the lockout is going to end. If you’d like to see where this is configured, let’s take a look at it. Let’s do a show config and we can see that under our system log in. The retry options is two.
This means if the user tries a wrong password a couple of times, he will get locked out for a period of 60 Minutes. All right, let’s try the next command. By the way, if you wanted to clear the lockout, you could see a clear system. Log in lockout and we can clear the lockout for all users or a specific user. So in this case, I’m going to clear that. And now if you tried that command show system logging lockout, we should see that none of the users are now locked out.
The next command that we’re going to look at is show system memory, and this will show you the memory utilization of the device. So here we can see the total memory, which is the available memory, here we can see the active memory, which is the memory being used right now. And here we can see the free memory.
And down here, we can see all the different processes. So we can see the process I.D. and we can see the process name and their current utilization levels. Let’s try the next command, which is show system processes. This will show you all the processes running on the Junos device. So here we can see the process I.D. and we can see the process name and how long the process has been running, this command show system processes has quite a few options that we can use.
So if we wanted to see a brief output, we can say show system processes brief and that will show you very limited output. Or we could say a show system processes summary and that will show you a summarized view of the processes. If you wanted a bit more information, you could say show system processes, detail. Or we could also say show system processes extensive and that will show you all possible information about all the processes running on the device. Yeah. So lots of information there. OK. Let’s look at the next command, which is show system reboot, and this will show you any pending reboot on the device show system reboot. So here we can see that a reboot is scheduled to occur at twelve forty three pm. The way you schedule a reboot is request system reboot. And you have multiple options here.
You can specify a time, an exact time, or you can say in X number of minutes, if you wanted to clear any pending reboots, you could say clear system reboot. And when you type in that command, that should clear that. So let’s take a look at it one more time. Show system reboot. And now we can see that no shut down or reboot is scheduled. Let’s look at the next one, which is show system rollback. We have spoken about this comment earlier. It allows you to look at a rollback configuration. So I’m going to say show system roll back to, for example, and that will show me the configuration stored on that roll back file. If you wanted to compare rollback files, you can use the key word compare. Let’s look at the next one show. System statistics. This command is used to view the statistics of different protocols that are running on your Junos device. You can press enter here and that will show you statistics of all the protocols. Or we can qualify it with a protocol name.
So these are the different options that we can use. Let’s try TCAP, for example. So show system statistics, TCAP, and that will show you the statistics for the TCAP protocol. So you can see a bunch of counters over here. Let’s try the next command, which is show system storage. And this will show you the storage information. So here we can see the different devices or the volumes attached on the device, the size of the volumes. How much storage is being used? How much is available. And the amount points for the different volumes. The next command is show system uptime. We’ve spoken about this earlier as well. When we talked about network time protocol, this allows you to see that current time on the Junos device. What is the clocking source? Is it a local clock or an A.P. clock? When was the system booted? When was the device last configured? Or in other words, when was the last commit operation performed? Who was the user who committed that configuration? What is the uptime of the device? And how many users are locked into the device? If we want to see the user names that are logged into the device, we can do show system users.
And that will show you the users can’t be locked into the device. All right. So those are the important system commands. Now, let’s try some of the Chessie commands. So let’s do a show, Chessie, question mark. And there’s a bunch of options here, but we’ll focus on the most important ones that you should be knowing. So show Chessie alarms. This will show you any alarms that are active for the CHESSY. So right now, I do not have any active alarms. The other one is show Chessie environment. So here we can see the components that are connected. You’ve got a routing engine and then you’ve got the power supply component. I’m using a V SRS device, so I do not have many components on this device. But if you’re trying a physical SRX device, you may see more information when you run this command. Show chassis environment. Let’s also try show Chessie Hardware again, since I’m on a ESR X device. I will see limited information over here. But if you’re trying this on a hardware device, you will see more information.
And let’s look at one last command, which is show Chessie routing engine. This will give you details about the routing engine. So, for example, we can see the total memory and DCP utilization and the start time, the uptime and the last reboot reason. So these are some of the important system and Chessie commands that you should know about in the upcoming videos, will understand how to monitor the other utilization levels of the Junos device.
56. Interface Monitoring – Stats and errors
Let’s talk about interface monitoring. Let’s understand the commands that we can use to view the configuration and the statistics of the interfaces and also the monitor command that can be used to view Real-Time traffic information on the interfaces. Before we get to the terminal and try these commands, if you’d like to bookmark them, here’s the list. All right. Now let’s get to the terminal and try these commands. OK. I’m here at the terminal. Notice that I’m in the operational mode. Let’s start with the show interfaces command. This command will show us a list of old interfaces and the statistics and the configuration of the interfaces. So, for example, here we can see the IP address configuration of the interface. Here we can see the settings that have been configured on the interface. And here we can see some counters. The show interfaces Comen has a few switches that we can use.
So, for example, we could do show interfaces, question mark. We could type in a specific interface name if we wanted to get that information or we can use one of these switches over here. Let’s start with show interfaces ters. We’ve spoken about this earlier. This will give you a summarized view of all the interfaces and the IP address configuration on them. Let’s give it a try. Show interfaces ters. So here we can see the list of interfaces, the administrative status, the linked status, the protocol and the IP address configuration of the interface. If you wanted to view this output, but only for specific interfaces, then we could try something like this show interfaces. Geez, you’re 0 star tours and that way my output will only be restricted to interfaces that begin with G. 0 0. Let’s say we only wanted to view information about the logical units or unit 0. So we could do show interfaces, start out 0 tours. And now we’re only looking at the logical portion or the logical unit, 0 of the different interfaces, you see, Junos is so flexible. There are so many ways we can get the output on a Junos device.
Let’s try the other commands. We’ve already spoken about these show interfaces detail. We’ll show you a lot more information about the interfaces. This is typically used for troubleshooting purposes. And you could also do show interfaces extensive and that will show you all possible information about the interfaces. Let’s now talk about the monitor command. The monitor command can be used to view Real-Time traffic information. I’ll start with a question mark. You will notice that we can monitor Real-Time Traffic or we can provide a specific interface name if we wanted to limit the output only for a specific interface. Also, notice here we have the option called start that will allow you to view the log file information in real time. So if I did something like this monitor start and the log file name. This will show me real time log messages being added to that file called messages. So the monitor command can not only be used to monitor real time traffic information, it can also be used to monitor real time updates to the different log files. Right now, we are going to do monitor traffic.
And let’s press enter. So here we can see the real time traffic information on the device, the traffic that is going in and out of the device. To stop the output, we can press ctrl c? Let’s try the next command monitor. Question mark. And this time we’re going to see a monitor interface. Question mark. Now, notice you can provide a specific interface name if you wanted to, or you could say monitor interface traffic, in which case it will show you the traffic information for the busiest interfaces. Let’s try that first monitor interface traffic.
And here we can see that information. Now, this device is not connected to any network. So you can see most of the counters are actually set to 0. But on a production environment or on a device that is connected to a network, you will see a lot of counters over here. Let’s also try monitor interface and the interface name. I’m going to try my management interface, which is F, X, B, 0 0. And here I can see a real time traffic information on my f, x, p0 interface.
57. Network Utilities
Let’s talk about the network utilities available on a Junos device. These utilities can be used to test network connectivity and can also be used to log into remote systems. So these are the utilities that we’re going to take a look at. We’ll take a look at Telnet SSH each paying choice, Roud and FCP. Let’s get to the terminal and try these commands. All right. I’m here at the Junos terminal. Notice that I’m in the operational mode. Let’s begin with a question mark. And here we can see the utilities that are available. We’ve got Telnet SS age. We’ve got ping. We also have FPP, which is not listed over here. And we also have a choice route. Let’s start with the first one, which is Telnet. I’ll start with a question mark. So here we can provide the hostname or the IP address of the remote system. I’ve got a Telnet server configured on this IP address, so I’m going to say Telnet space IP address.
By default, it will use port number twenty three for Telnet. But if you want to connect on a different port, no, we can use the keyword here, which is called as port. If you want to specify an interface for outgoing traffic, you can use the keyword interface. So let’s try this Telnet space IP address. And her I need to provide the user name and then the password. So I’m logged into the remote system. I’m going to exit and come back to the SRS device. Keep in mind that Telnet is not a secure protocol and it is not recommended. We should be using SSH age where possible. Let’s try the next command, which is SSH age. We’ll start with a question mark so we can provide SSH space, the hostname or the IP address. Notice we have the option to force the SSH connection to use version two of the protocol. We can also specify the outgoing interface. So I’m gonna say SSH age user name at IP address and I’m going to provide the password and I’m logged into the device. Let’s try the next command, which is Ping and I’m going to say ping space question mark. The ping command has quite a few options that we can use. Let’s first start with a simple ping command. I’m going to paying for it out to the to the to press enter and we can see responses coming back.
Now let’s look at some of the other options that are available here. Ping space, IP address, space question mark. And you’ll notice we can provide that count. So if we want to restrict the number of packets that are being sent, we can provide a count. So let’s do ping for out the to count three said we’ll send three packets and that should stop another commonly used option. Is this one here, which is rapid. Let’s do that ping for two to two, count three. And let’s also include the rapid command. In fact, let’s do count ten. So ping for two to two, count ten rapid. And you’ll notice that the ping packets are sent so quickly. It’s as if it completed in less than a second. So you can use the rapid keyword when you want to send requests rapidly. There are other options as well that we can use. For example, we can say TTL to set a different time to live value. We can also specify the size of the ping packet.
We can also specify the outgoing interface. And we also have a few other options that we can use. Like we can use a different source address. We can specify the routing instance, et cetera. Now, let’s try the next command, which is FPP. So I’m gonna say FPP and I’ll press enter or let’s do this. FCP space question mark. We need to provide the hostname or the IP address. So FPP space IP address led us to enter. And here we can provide the user name and then the password. And now I’m locked in so I can try the help command here. And here I have all the options that I can use for this FPP connection. I’ll say quit to close the connection and come back to the SRX device. The last command that we’re going to look at is choice. Root Choice route is used to look at the hops between your device and the remote system. It allows you to view all the hops between your device, which is the SRX device and the remote system.
So let’s do a trace out space, question mark, and let’s do a trace route for two to two. Press enter and you will notice that it shows you every hop between your SRX device and the target machine. All right. So that’s completed. So we can see that we had 14 hops or we took 14 hops to reach the target machine, which is for us to do to that, to a common option that is used with trace route is no result. This would prevent the domain name resolution. It will not try to resolve the domain names that you see over here. All right. So those are the important network utilities that we need to keep in mind from the examination perspective. You’ve got talent as a sage, FCP ping and choice route.