Professional Documents
Culture Documents
Data Collection Troubleshooting
Data Collection Troubleshooting
troubleshooting
Article IDKB21781
Created2011-09-01
Last Updated2021-05-18
SubscribePrintReport a Security Vulnerability
Description
Data Collection and Troubleshooting Guides can help with issue investigation as well as reduce time to resolve.
Each problem/issue could require a different set of data to collect. This article contains a list of data to collect as
well as pointers to Resolution Guides and references on how to collect the data.
Symptoms
Solution
Regardless of configuration, all cases will benefit from attaching session captures, request information output,
and logs when you initially open the case. If you need to investigate an intermittent concern (for example slow
transfers at peak hours), be sure to collect this data at the time of the problem.
All Background 1. Provide all SSH / Telnet session captures.
2. Provide any available topology information.
3. Provide a summary of how the device is being used (production, l
system, co-location, etc).
information 4. Provide a summary of device history (new install, production for X
months/years, other recent cases, etc).
5. Provide a summary of any recent changes in the network or on the
device.
1. Enter: request support information | save
/var/log/rsi1.log .
Configurations 2. After step #1 completes, wait enough time to ensure that the condi
Request support
you wish to address continues/appears before proceeding to the ne
info
step.
3. Enter: request support information | save
/var/log/rsi2.log .
Archive the /var/log/ contents:
file archive compress source /var/log/* destination
Logs /var/tmp/CURRENT-DATE.tgz
To ensure the /var/log/ directory was properly archived, check the file
using the command: file list /var/tmp/CURRENT-DATE.tgz detail
In addition, collect the data shown below for the following issues:
Jump to:
Chassis Cluster
Traffic failing for a specific host / application
High CPU
OSPF
BGP
Multicast
ALG
UTM - Anti-Virus
UTM - Anti-Spam
UTM - Web Filtering
UTM - Content Filtering
IPSec - Route Based
IPSec - Policy Based
IPSec - Dynamic VPNM
IPSec- NCP Exclusive Remove Access Client Connections
IDP - Security Package Update
IDP - Attack Detection
ATP - Advanced-Anti-Malware File Inspection
ATP - Security-Intelligence
OSP
F (If OSPF is running in a routing instance, specify which instance where
applicable)
set cli timestamp
show ospf overview
show ospf database
show ospf neighbor detail
Show show ospf route
commands: show ospf statistics
show ospf interface
show ospf log
show route protocol ospf
show route <x.x.x.x> extensive
show ospf database extensive
Logs: /var/log/messages
Traceoptions: (use below for inet.0 default instance)
set protocols ospf traceoptions file ospf.tr
Caveats set protocols ospf traceoptions file size 5m
set protocols ospf traceoptions file files 5
set protocols ospf traceoptions flag all
(use below for routing instances)
set routing-instances ospf-vr protocols ospf
traceoptions file ospf-vr.tr
set routing-instances ospf-vr protocols ospf
traceoptions file size 5m
set routing-instances ospf-vr protocols ospf
traceoptions file files 5
set routing-instances ospf-vr protocols ospf
traceoptions flag all
Known Issues: PR Search
[ Back to Top ]