USER’S GUIDE534 CyberSWITCHtrace x25 [on/off]Enables or disables the X.25 packet tracing option. This feature displays up to 15 octets of thepacket. To display the log file, issue thedr console command. This option is initially disabled.wan fr-ietf trace [on/off] [in/out] [device/fr_accessname_dlci] [prot]Enables or disables the tracing of incoming and out going frame relay IETF packets. Thisfeature displays the direction of the packet, the device or PVC name, the line protocol, and upto 15 octets of the packet. To display the log file, issue thedr console command. This option isinitially disabled.UDP C OMMANDSUDP (User Datagram Protocol) provides a datagram mode of communication for delivery ofpackets to a remote or on-node device. When the system’s IP operating mode is enabled, thefollowing UDP commands are available:udp connsDisplays the current UDP connection status.udp statsDisplays the current system UDP statistics. Refer to UDP Statistics, for a list of availablestatistics and their definitions.U SER L EVEL S ECURITY COMMANDSThe following console commands are available to provide information on the authenticationservers for user level security. They may be used to diagnose the following problems with:• connections to an off-node authentication server• CyberSWITCH configuration• authentication server user database entriessentry logThis command acts as a toggle switch, enabling or disabling user authentication rejectionmessages. If enabled, authentication rejection messages (identifying users who generated themessages) are written to the log file. To display the log file, issue thedr console command. Thisoption is initially disabled.sentry statusDisplays current Sentry status. This includes whether or not trace is enabled, as well as thestatus and port number of each authentication server on the system.sentry tacacsAttempts an authentication session using TACACS. The system will report whether theauthentication attempted was successful or rejected.sentry radiusAttempts an authentication session using RADIUS. The system will report whether theauthentication attempted was successful or rejected.