Here, I list all of my mostly used Vyatta CLI here.
Firewall session table: show conntrack table ipv4
SNAT translation table: show nat source translations
DNAT translation table: show nat destination translations
Interface information: show interfaces detail
Packet capture: tshark -i eth1
IPSec VPN Phase1: show vpn ike sa
IPSec VPN Phase2: show vpn ipsec sa
Check Natting Log: show log nat
e.g.vyatta@vyatta1:~$ show log nat
/var/log/messages:Jun 16 05:10:55 rps1 kernel: [192545.838412] [NAT-SRC-10] IN= OUT=eth1 SRC=10.x.x.x DST=184.x.x.x LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=35173 SEQ=1
Check Firewall Log: show log firewall name Public
vyatta@rps1:~$ show log firewall name Public
Jun 16 05:58:15 rps1 kernel: [195385.962591] [Public-30-D] IN=eth1 OUT=eth0 MAC=06:21:45:85:93:06:00:09:0f:f0:6c:d1:08:00 SRC=60.x.x.x DST=10.66.x.x LEN=52 TOS=0x00 PREC=0x00 TTL=46 ID=7282 DF PROTO=TCP SPT=52134 DPT=8443 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 16 05:58:18 rps1 kernel: [195388.965874] [Public-30-D] IN=eth1 OUT=eth0 MAC=06:21:45:85:93:06:00:09:0f:f0:6c:d1:08:00 SRC=60.x.x.x DST=10.66.x.x LEN=52 TOS=0x00 PREC=0x00 TTL=46 ID=7285 DF PROTO=TCP SPT=52134 DPT=8443 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 16 05:58:24 rps1 kernel: [195394.969917] [Public-30-D] IN=eth1 OUT=eth0 MAC=06:21:45:85:93:06:00:09:0f:f0:6c:d1:08:00 SRC=60.x.x.x DST=10.66.x.x LEN=48 TOS=0x00 PREC=0x00 TTL=46 ID=7316 DF PROTO=TCP SPT=52134 DPT=8443 WINDOW=8192 RES=0x00 SYN URGP=0
Check IPSec log: show log vpn ipsec
Restore to factory default: In configuration mode,
#load /opt/vyatta/etc/config.boot.default
#save