NetScreen: Capturing baseline, and attach the results to the JTAC case

Run the following once:

get techget clock
get perf cpu all detail
get perf session detail
get net-pak s
get log sys
get session info
get sess frag
get counter stat
get gate
get pport
get flowget tcp
get zone untrust screen counter
get event

Run the following block of commands 4 times, 30 seconds apart:

get clock
get perf cpu all detail
get perf sess detail
get counter stat
get os taskget arp
get session info
get net-pak s
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s