- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-03-2019 02:18 PM - edited 10-03-2019 02:52 PM
Does anyone know how to view the sfp installed on an m500/600 panorama or log collector?
I have tried the below command and even put a wildcard on it but it only gives me hard drive info.
> show system state filter sys.sX.pY.phy
09-21-2023 09:30 AM
As per PA this is not possible right now.
We can do the feature request to PA via Sales Engineer of PA.
Regards
10-03-2019 09:28 PM
please try below link
10-04-2019 05:44 AM
thank you for the transceiver list but the question is "How to view SFP installed on a Panorama or Logcollector ?"
10-04-2019 08:45 AM
Maybe try a match instead of a filter? That might get you the info also.
show system state | match phy
10-04-2019 08:50 AM
tried that and got nothing. I think the way they monitor interfaces on this chassis is different than the firewalls.
10-04-2019 06:42 PM
might be need to see if someone replies here.
10-05-2019 09:07 PM
i tried on panorama
show system state filter sys.s1.p*.phy
'sys.s1.p*.phy': NO_MATCHES
10-07-2019 12:39 PM
running the command noted will not produce the interfaces on the panorama or log collector, this is why you show a NO_MATCHES. Hopefully someone from PA will chime in with some knowledge on the topic.
09-14-2023 11:22 AM
can someone from PA please provide a solution to this?
09-18-2023 11:53 PM
Hello @PktBlocker ,
Since Log Collectors and Panoramas are different from a normal firewall, try using the following command to see if this helps:
show system state filter net.s*.eth*.*
This should show the entire ports of said Panorama/Log Collector.
I hope this helps.
09-21-2023 09:30 AM
As per PA this is not possible right now.
We can do the feature request to PA via Sales Engineer of PA.
Regards
09-27-2023 12:19 PM
so i got this command from PA support but it does not show any detail like what SFP was installed, etc. We as PA customers should not have to ask for a troubleshooting command to work. It should work just like it does on the firewalls.
> show system state filter net.s0.eth*
> show system state filter net.s0.eth4*
net.s0.eth4.dhcp-dns: { }
net.s0.eth4.dhcp-ntp: { }
net.s0.eth4.dhcp-opcmd: 3
net.s0.eth4.dhcp-options: { }
net.s0.eth4.hwcfg: { 'advertised': [ ], 'link': Up, 'mode': Force, 'setting': 10Gb/s-full, }
net.s0.eth4.stats: { 'rx-bytes': 8554201114194, 'rx-compressed': 0, 'rx-drop': 378483, 'rx-errs': 358, 'rx-fifo': 0, 'rx-frame': 358, 'rx-m ulticast': 488251, 'rx-packets': 6191837675, 'tx-bytes': 10742051800052, 'tx-carrier': 0, 'tx-colls': 0, 'tx-compressed': 0, 'tx-drop': 0, 'tx-errs': 0, 'tx-fifo': 0, 'tx-packets': 16544900691, }
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!