Central Site Remote Access Switch 623S YSTEM COMMANDSUDP Commandstrace ipxwan [on/off]Enables or disables the IPXWAN tracing option, which tracks all packets which are received orsent out using IPXWAN protocol, and places this information in the system log. To display thelog file, issue thedr command. This option is initially disabled.trace lapb [on/off]Enables or disables the LAPB data link information packet tracing option. This feature displaysup to 15 octets of the packet. To display the log file, issue thedr console command. This optionis initially disabled.trace [on/off]Enable or disables the call trace information reports. If enabled, you can then view the loggedcall trace information by issuing thedr command. For details on call trace messages, refer tothe chapter titled Trace Messages.trace ppp [on/off]Enables or disables the tracing of incoming and outgoing PPP packets. If enabled, you can viewthe trace PPP information by issuing thedr command.trace x25 [on/off]Enables or disables the X.25 packet tracing option. This feature displays up to 15 octets of thepacket. To display the log file, issue thedr console command. This option is initially disabled.wan fr-ietf trace [on/off] [in/out] [device/fr_accessname_dlci] [prot]Enables or disables the tracing of incoming and out going frame relay IETF packets. Thisfeature displays the direction of the packet, the device or PVC name, the line protocol, and upto 15 octets of the packet. To display the log file, issue thedr console command. This option isinitially disabled.UDP C OMMANDSUDP (User Datagram Protocol) provides a datagram mode of communication for delivery ofpackets to a remote or on-node device. When the system’s IP operating mode is enabled, thefollowing UDP commands are available:udp connsDisplays the current UDP connection status.udp statsDisplays the current system UDP statistics. Refer to UDP Statistics for definitions.U SER L EVEL S ECURITY COMMANDSThe following console commands are available to provide information on the authenticationservers for user level security. They may be used to diagnose the following problems with:• connections to an off-node authentication server• CyberSWITCH configuration• authentication server user database entries