
CLI Command Reference Guide
Copyright© 2018, Juniper Networks, Inc.
57
Example
The following example displays information about the CoreCM server device type:
CoreCM(server)# show devicetype
Device type: cm, core
The following example requests data about the alternate-exhaust interface (eth2):
CoreCM(server)# show interface alternate-exhaust
The following example shows details about the Collector’s monitoring interface
(eth1):
CoreCM(server)# show interface monitoring
Interface: monitoring (eth1) Enabled: Yes Link: Yes
IP Address: unknown Mask: unknown MTU: 1500
MAC Address: 90:d6:1f:22:70:g6 Speed: 1000Mb/s Duplex:
Full
Auto-negotiation: Yes Medium: Copper
RX packets: 1869032424 Bytes: 1716560257902 Errors: 0
Overruns: 0
TX packets: 409287 Bytes: 44607401 Errors: 0 Overruns: 0
Traffic rate for the last 5 seconds/1 minute/5 minutes
RX bits/sec: 108616/160176/442736
RX packets/sec: 44/46/91
TX bits/sec: 0/112/128
TX packets/sec: 0/0/0
Summary of Contents for Advanced Threat Prevention Appliance
Page 70: ...Juniper Advanced Threat Prevention Appliance 62 Copyright 2018 Juniper Networks Inc ...
Page 94: ...Juniper Advanced Threat Prevention Appliance 86 Copyright 2018 Juniper Networks Inc ...
Page 118: ...Juniper Advanced Threat Prevention Appliance 110 Copyright 2018 Juniper Networks Inc ...