03-Security Command Reference

HomeSupportReference GuidesCommand ReferencesH3C SecPath M9000 Command Reference(V7)(R9900)-6W10003-Security Command Reference
25-Session management commands
Title Size Download
25-Session management commands 746.07 KB

Contents

Session management commands· 1

destination-ip· 1

display session aging-time application· 2

display session aging-time state· 3

display session alg-app-change· 4

display session dual-active transparent statistics· 6

display session fast-drop statistics· 7

display session fast-drop table ipv4· 10

display session fast-drop table ipv6· 13

display session fast-drop top-statistics· 16

display session ip-top-count policy· 19

display session ipv6-top-count policy· 19

display session relation-table· 20

display session relation-table aging-time application· 23

display session statistics· 23

display session statistics flow-redirect 28

display session statistics ipv4· 30

display session statistics ipv6· 34

display session statistics multicast 38

display session statistics summary all 39

display session table ipv4· 40

display session table ipv6· 44

display session table multicast ipv4· 49

display session table multicast ipv6· 53

display session top-statistics· 57

reset session alg-app-change· 58

reset session relation-table· 59

reset session statistics· 61

reset session statistics multicast 61

reset session table· 62

reset session table ipv4· 63

reset session table ipv6· 64

reset session table multicast 66

reset session table multicast ipv4· 66

reset session table multicast ipv6· 68

session aging-time application· 69

session aging-time state· 71

session alarm rate-abrupt enable· 73

session alarm rate-abrupt threshold· 73

session alarm try-rate-abrupt enable· 74

session alarm try-rate-abrupt threshold· 75

session alarm usage-abrupt enable· 76

session alarm usage-abrupt threshold· 77

session alarm-log enable· 78

session alg fragment 78

session dual-active create-mode· 79

session dual-active enable· 80

session dual-active transparent udp enable· 80

session fast-drop aging-time· 82

session fast-drop enable· 82

session fast-drop hardware-fast-forwarding· 83

session fast-drop resource-ratio· 84

session fast-drop top-statistics enable· 85

session fast-drop-usage threshold· 85

session flow-redirect enable· 86

session flow-redirect hardware-fast-forwarding· 87

session ip-top-count enable· 88

session ip-top-count policy· 89

session ipv6-top-count enable· 89

session ipv6-top-count policy· 90

session log { bytes-active | packets-active } 91

session log enable· 92

session log flow-begin· 93

session log flow-end· 94

session log time-active· 94

session log with-endtime· 95

session persistent acl 96

session relation-table aging-time application sunrpc· 97

session relation-table match destination-ip sip enable· 98

session relation-table-usage threshold· 98

session state-machine mode· 99

session statistics enable· 100

session statistics hardware-fast-forwarding· 101

session synchronization { dns | http } * 102

session synchronization enable· 103

session table-state-backup enable· 104

session top-statistics enable· 104

session usage threshold· 105

source-ip· 106

 


Session management commands

Non-default vSystems do not support some of the session management commands. For information about vSystem support for a command, see the usage guidelines on that command. For information about vSystem, see Virtual Technologies Configuration Guide.

destination-ip

Use destination-ip to specify a destination IP address matching criterion in a top session statistics policy.

Use undo destination-ip to delete a destination IP address matching criterion from a top session statistics policy.

Syntax

Top IPv4 session statistics policy view:

destination-ip subnet subnet-ip-address mask-length

undo destination-ip

Top IPv6 session statistics policy view:

destination-ip subnet subnet-ipv6-address prefix-length

undo destination-ip

Default

No destination IP address matching criterion is specified.

Views

Top IPv4 session statistics policy view

Top IPv6 session statistics policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

subnet subnet-ipv4-address mask-length: Specifies an IPv4 subnet address and its mask. The mask value is in the range of 16 to 32.

subnet subnet-ipv6-address prefix-length: Specifies an IPv6 subnet address and its prefix. The prefix value is in the range of 96 to 128.

Usage guidelines

Operating mechanism

With this feature configured, the system collects only statistics for sessions that match the specified destination IP address.

Restrictions and guidelines

You can configure only one destination subnet address matching criterion for a top IPv4 or IPv6 session statistics policy. If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify destination IP address 10.1.0.0/16 in a top session statistics policy.

[Sysname] Session ip-top-count policy

[Sysname-session-ip-top-count-policy] destination-ip subnet 10.1.0.0 16

Related commands

session ip-top-count policy

session ipv6-top-count policy

display session aging-time application

Use display session aging-time application to display the aging time for sessions of different application layer protocols or applications.

Syntax

display session aging-time application

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Examples

# Display the aging time for sessions of different application layer protocols or applications.

<Sysname> display session aging-time application

Application                                                    Aging time(s)

bootpc                                                         120

bootps                                                         120

dns                                                            30

ftp                                                            3600

ftp-data                                                       240

gprs-data                                                      60

gprs-sig                                                       60

gtp-control                                                    60

gtp-user                                                       60

h225                                                           3600

h245                                                           3600

https                                                          600

ils                                                            3600

l2tp                                                           120

mgcp-callagent                                                 60

mgcp-gateway                                                   60

netbios-dgm                                                    3600

netbios-ns                                                     3600

netbios-ssn                                                    3600

ntp                                                            120

pptp                                                           3600

qq                                                             120

ras                                                            300

rip                                                            120

rsh                                                            60

rtsp                                                           3600

sccp                                                           3600

sip                                                            300

snmp                                                           120

snmptrap                                                       120

sqlnet                                                         600

stun                                                           600

syslog                                                         120

tacacs-ds                                                      120

tftp                                                           60

who                                                            120

xdmcp                                                          3600

others                                                         1200

Table 1 Command output

Field

Description

Application

Application layer protocol or application name.

Aging time(s)

Aging time in seconds.

others

All applications with an aging time of 1200 seconds.

 

Related commands

session aging-time application

display session aging-time state

Use display session aging-time stat to display the aging time for sessions in different protocol states.

Syntax

display session aging-time state

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Examples

# Display the aging time for sessions in different protocol states.

<Sysname> display session aging-time state

State                     Aging Time(s)

SYN                       10

TCP-EST                   3600

FIN                       10

UDP-OPEN                  10

UDP-READY                 30

ICMP-REQUEST              30

ICMP-REPLY                10

RAWIP-OPEN                30

RAWIP-READY               60

UDPLITE-OPEN              30

UDPLITE-READY             60

DCCP-REQUEST              30

DCCP-EST                  3600

DCCP-CLOSEREQ             30

SCTP-INIT                 30

SCTP-EST                  3600

SCTP-SHUTDOWN             30

ICMPV6-REQUEST            60

ICMPV6-REPLY              30

TCP-TIME-WAIT             2

TCP-CLOSE                 2

Table 2 Command output

Field

Description

State

Protocol state.

Aging Time(s)

Aging time in seconds.

 

Related commands

session aging-time state

display session alg-app-change

Use display session alg-app-change to display APP ID change statistics.

Syntax

In standalone mode:

display session alg-app-change [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session alg-app-change [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

mdc-admin

mdc-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays APP ID change statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays APP ID change statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Display APP ID change statistics.

<Sysname> display system internal session alg-app-change

Slot 1:

IPV4  : Failed to change session to session             : 0

IPV4  : Success to change session to session            : 0

IPV4  : Failed to change session to ext-session         : 0

IPV4  : Success to change ext-session to ext-session    : 0

IPV4  : Failed to change ext-session to ext-session     : 0

IPV4  : Success change L7 application                   : 1

        other:FileDownload:2024-03-07 11:25:4

IPV6  : Failed to change session to session             : 0

IPV6  : Success to change session to session            : 0

IPV6  : Failed to change session to ext-session         : 0

IPV6  : Success to change ext-session to ext-session    : 0

IPV6  : Failed to change ext-session to ext-session     : 0

IPV6  : Success change L7 application

Table 3 Command output

Field

Description

Failed to change session to session

Number of regular sessions failing to be changed to regular sessions.

Success to change session to session

Number of regular sessions changed to regular sessions successfully. The APP ID before the change, the APP ID after the change, and the chagne time will be displayed.

Failed to change session to ext-session

Number of regular sessions failing to be changed to extended sessions.

Success to change ext-session to ext-session

Number of regular sessions changed to extended sessions successfully. The APP ID before the change, the APP ID after the change, and the chagne time will be displayed.

Failed to change ext-session to ext-session

Number of extended sessions failing to be changed to extended sessions.

Success change L7 application

Number of successful L7 APP ID changes. The APP ID before the change, the APP ID after the change, and the chagne time will be displayed.

 

Related commands

reset session alg-app-change

display session dual-active transparent statistics

Use display session dual-active transparent statistics to display statistics about transparently transmitted packets in session dual-active mode.

Syntax

In standalone mode:

display session dual-active transparent statistics [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session dual-active transparent statistics [chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays packet statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays packet statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Usage guidelines

Non-default vSystems do not support this command.

Examples

# (In standalone mode.) Display statistics about transparently transmitted packets in session dual-active mode.

<Sysname> display session dual-active transparent statistics

Slot 2 in chassis 1:

          UDP relay packets :                    0

    Received relay packets :                     0

 Driver-sent failed relay packets :                    0

Transferring failed relay packets :                    0

         Processing error packets :                    0

Table 4 Command output

Field

Description

UDP relay packets

Number of transparently transmitted UDP packets.

Received relay packets

Number of received packets that are transparently transmitted.

Driver-sent failed relay packets

Number of packets call driver fails to send.

Transferring failed relay packets

Number of packets that fail conversion for transparent transmission.

Processing error packets

Number of packets that have processing errors.

 

Related commands

session dual-active enable

session statistics enable

display session fast-drop statistics

Use display session fast-drop statistics to display unicast deny session statistics.

Syntax

In standalone mode:

display session fast-drop statistics [ summary ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session fast-drop statistics [ summary ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

summary: Displays summary information about unicast deny session statistics. If you do not specify this keyword, the command displays detailed information about unicast deny session statistics.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information on all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information on all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Usage guidelines

Non-default vSystems do not support this command.

Examples

# (In standalone mode.) Display detailed information about unicast deny session statistics.

<Sysname> display session fast-drop statistics

Slot 1:

Current : 1

  Session type              Est count

           TCP :                    0

           UDP :                    0

          ICMP :                    1

        ICMPv6 :                    0

      UDP-Lite :                    0

          SCTP :                    0

          DCCP :                    0

         RAWIP :                    0

           DNS :                    0

           FTP :                    0

           GTP :                    0

          H323 :                    0

          HTTP :                    0

           ILS :                    0

          MGCP :                    0

           NBT :                    0

          PPTP :                    0

           RSH :                    0

          RTSP :                    0

          SCCP :                    0

           SIP :                    0

          SMTP :                    0

        SQLNET :                    0

           SSH :                    0

        TELNET :                    0

          TFTP :                    0

         XDMCP :                    0

Deny session establishment rate: 0/s

 Session type               Est count

          TCP :                   0/s

          UDP :                   0/s

         ICMP :                   0/s

       ICMPv6 :                   0/s

     UDP-Lite :                   0/s

         SCTP :                   0/s

         DCCP :                   0/s

        RAWIP :                   0/s

Table 5 Command output

Field

Description

Current

Total number of unicast deny sessions.

Session type

Deny session type:

·     TCP.

·     UDP.

·     ICMP.

·     ICMPv6.

·     UDP-Lite.

·     SCTP.

·     DCCP.

·     RAWIP.

·     DNS.

·     FTP.

·     GTP.

·     H323.

·     HTTP.

·     ILS.

·     MGCP.

·     NBT.

·     PPTP.

·     RSH.

·     RTSP.

·     SCCP.

·     SIP.

·     SMTP.

·     SQLNET.

·     SSH.

·     TELNET.

·     TFTP.

·     XDMCP.

Est count

Number of deny sessions created for each protocol.

Deny session establishment rate

Rate of deny session establishment.

Session type

Deny session type:

·     TCP.

·     UDP.

·     ICMP.

·     ICMPv6.

·     UDP-Lite.

·     SCTP.

·     DCCP.

·     RAWIP.

Est count

Number of deny sessions created per second for each protocol.

 

# (In standalone mode.) Display summary information about unicast deny session statistics.

<Sysname> display session fast-drop statistics summary

Slot 1:

type      Sessions  TCP sessions  UDP sessions  Rate      TCP rate  UDP rate

Est       1         0             0             1/s       0/s       0/s

Try       47        0             0             1/s       0/s       0/s

Table 6 Command output

Field

Description

type

Deny session type:

·     Est—Existing session. This counter decrements by 1 when a session is aged out.

·     Try—All sessions, including both sessions created successfully and sessions failing to be created. This counter is cleared after the reset session statistics command is executed.

Sessions

Total number of unicast deny sessions.

TCP sessions

Number of TCP unicast deny sessions.

UDP sessions

Number of UDP unicast deny sessions.

Rate

Rate of unicast deny session creation.

TCP rate

Rate of TCP unicast deny session creation.

UDP rate

Rate of UDP unicast deny session creation.

 

display session fast-drop table ipv4

Use display session fast-drop table ipv4 to display IPv4 unicast deny session entries.

Syntax

In standalone mode:

display session fast-drop table ipv4 [ { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ slot slot-number [ cpu cpu-number ] ] [ verbose ]

In IRF mode:

display session fast-drop table ipv4 [ { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ verbose ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

destination-ip start-destination-ip [ end-destination-ip ]: Specifies a destination IPv4 address or IPv4 address range for a unicast deny session from the initiator to the responder. The start-destination-ip argument specifies the start destination IPv4 address. The end-destination-ip argument specifies the end destination IPv4 address.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a unicast deny session from the initiator to the responder. The value range for the destination-port argument is 0 to 65535.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv4 transport layer protocol, including DCCP, ICMP, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

source-ip start-source-ip [ end-source-ip ]: Specifies a source IPv4 address or IPv4 address range for a unicast deny session from the initiator to the responder. The start-source-ip argument specifies the start source IPv4 address. The end-source-ip argument specifies the end source IPv4 address.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a unicast deny session from the initiator to the responder. The value range for the source-port argument is 0 to 65535.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information on all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information on all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

verbose: Displays detailed information about IPv4 unicast deny session entries. If you do not specify this keyword, the command displays brief information about IPv4 unicast deny session entries.

Usage guidelines

If you do not specify any parameters, this command displays all IPv4 unicast deny session entries.

Examples

# (In standalone mode.) Display brief information about all IPv4 unicast deny session entries.

<Sysname> display session fast-drop table ipv4

Slot 1:

Initiator:

  Source      IP/port: 192.168.1.18/1877

  Destination IP/port: 192.168.1.55/22

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

Total deny session found: 1

# (In standalone mode.) Display detailed information about all IPv4 unicast deny session entries.

<Sysname> display session fast-drop table ipv4 verbose

Slot 1:

Initiator:

  Source      IP/port: 192.168.1.18/1877

  Destination IP/port: 192.168.1.55/22

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

Responder:

  Source      IP/port: 192.168.1.55/22

  Destination IP/port: 192.168.1.18/1877

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/2

  Source security zone: Local

State: TCP_SYN_SENT

FPGA state: TCP_SYN_SENT

Application: SSH

Rule ID: 1

Rule name: test

Start time: 2011-07-29 19:12:36  TTL: 28s

Initiator->Responder:         1 packets         48 bytes

Responder->Initiator:         0 packets          0 bytes

Total deny session found: 1

Table 7 Command output

Field

Description

Initiator

Information about the unicast deny session from the initiator to the responder.

Responder

Information about the unicast deny session from the responder to the initiator.

DS-Lite tunnel peer

Address of the DS-Lite tunnel peer. When the unicast deny session is not tunneled by DS-Lite, this field displays a hyphen (-).

VPN instance/VLAN ID/Inline ID

MPLS L3VPN instance to which the unicast deny session belongs.This field is not supported in this software version.

VLAN and inline to which the deny session belongs during Layer 2 forwarding.

If a parameter is not specified, a hyphens (-) is displayed for the proper field.

Protocol

Transport layer protocol:

·     DCCP.

·     ICMP.

·     ICMPv6.

·     Raw IP.

·     SCTP.

·     TCP.

·     UDP.

·     UDP-Lite.

The number in the brackets indicates the protocol number.

Inbound interface

Interface on which packets are received.

Source security zone

Security zone to which the inbound interface belongs. If the inbound interface does not belong to any security zone, this field displays a hyphen (-).

State

Unicast deny session state.

FPGA state

Logical session state.

If the logical session state cannot be obtained, this field displays NA. if hardware fast forwarding is disabled, this field is not displayed.

Application

Application layer protocol, FTP or DNS.

If it is an unknown protocol identified by an unknown port, this field displays OTHER.

Rule ID

ID of the security policy rule.

Rule name

Name of the security policy rule.

Start time

Unicast deny session establishment time.

TTL

Remaining lifetime of the unicast deny session, in seconds.

Initiator->Responder

Number of packets and bytes from the initiator to the responder.

Responder->Initiator

Number of packets and bytes from the responder to the initiator.

Total deny session found

Total number of found unicast deny session entries.

 

display session fast-drop table ipv6

Use display session fast-drop table ipv6 to display IPv6 unicast deny session entries.

Syntax

In standalone mode:

display session fast-drop table ipv6 [ { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ slot slot-number [ cpu cpu-number ] ] [ verbose ]

In IRF mode:

display session fast-drop table ipv6 [ { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ verbose ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

destination-ip start-destination-ip [ end-destination-ip ]: Specifies a destination IPv6 address or IPv6 address range for a unicast deny session from the initiator to the responder. The start-destination-ip argument specifies the start destination IPv6 address. The end-destination-ip argument specifies the end destination IPv6 address.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a unicast deny session from the initiator to the responder. The value range for the destination-port argument is 0 to 65535.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv6 transport layer protocol, including DCCP, ICMP, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

source-ip start-source-ip [ end-source-ip ]: Specifies a source IPv6 address or IPv6 address range for a unicast deny session from the initiator to the responder. The start-source-ip argument specifies the start source IPv6 address. The end-source-ip argument specifies the end source IPv6 address.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a unicast deny session from the initiator to the responder. The value range for the source-port argument is 0 to 65535.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information on all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information on all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

verbose: Displays detailed information about IPv6 unicast deny session entries. If you do not specify this keyword, the command displays brief information about IPv6 unicast deny session entries.

Usage guidelines

If you do not specify any parameters, this command displays all IPv6 unicast deny session entries.

Examples

# (In standalone mode.) Display brief information about all IPv6 unicast deny session entries.

<Sysname> display session fast-drop table ipv6

Slot 1:

Initiator:

  Source      IP/port: 2011::2/58473

  Destination IP/port: 2011::8/32768

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

Total deny session found: 1

# (In standalone mode.) Display detailed information about all IPv6 unicast deny session entries.

<Sysname> display session fast-drop table ipv6 verbose

Slot 1:

Initiator:

  Source      IP/port: 2011::2/58473

  Destination IP/port: 2011::8/32768

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

Responder:

  Source      IP/port: 192.168.1.55/22

  Destination IP/port: 192.168.1.18/1877

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/2

  Source security zone: Local

State: TCP_SYN_SENT

FPGA state: TCP_SYN_SENT

Application: SSH

Rule ID: 1

Rule name: test

Start time: 2011-07-29 19:12:36  TTL: 28s

Initiator->Responder:         1 packets         48 bytes

Responder->Initiator:         0 packets          0 bytes

Total deny session found: 1

Table 8 Command output

Field

Description

Initiator

Information about the unicast deny session from the initiator to the responder.

Responder

Information about the unicast deny session from the responder to the initiator.

DS-Lite tunnel peer

Address of the DS-Lite tunnel peer. When the unicast deny session is not tunneled by DS-Lite, this field displays a hyphen (-).

VPN instance/VLAN ID/Inline ID

MPLS L3VPN instance to which the unicast deny session belongs.

VLAN and inline to which the unicast deny session belongs during Layer 2 forwarding.

If a parameter is not specified, a hyphens (-) is displayed for the proper field.

Protocol

Transport layer protocol:

·     DCCP.

·     ICMP.

·     ICMPv6.

·     Raw IP.

·     SCTP.

·     TCP.

·     UDP.

·     UDP-Lite.

The number in the brackets indicates the protocol number.

Inbound interface

Interface on which packets are received.

Source security zone

Security zone to which the inbound interface belongs. If the inbound interface does not belong to any security zone, this field displays a hyphen (-).

State

Unicast deny session state.

FPGA state

Logical session state.

If the logical session state cannot be obtained, this field displays NA. if hardware fast forwarding is disabled, this field is not displayed.

Application

Application layer protocol, FTP or DNS.

If it is an unknown protocol identified by an unknown port, this field displays OTHER.

Rule ID

ID of the security policy rule.

Rule name

Name of the security policy rule.

Start time

Unicast deny session establishment time.

TTL

Remaining lifetime of the unicast deny session, in seconds.

Initiator->Responder

Number of packets and bytes from the initiator to the responder.

Responder->Initiator

Number of packets and bytes from the responder to the initiator.

Total deny session found

Total number of found unicast deny session entries.

 

display session fast-drop top-statistics

Use display session fast-drop top-statistics to display top deny session statistics.

Syntax

display session fast-drop top-statistics { last-1-hour | last-24-hours | last-30-days }

The following compatibility matrixes show the support of hardware platforms for this command:

 

F1000 series

Models

Command compatibility

F1000-X-G5 series

F1000-A-G5, F1000-C-G5, F1000-C-G5-LI, F1000-E-G5, F1000-H-G5, F1000-S-G5

Yes

F1000-X-G3 series

F1000-A-G3, F1000-C-G3, F1000-E-G3, F1000-S-G3

Yes

F1000-X-G2 series

F1000-A-G2, F1000-C-G2, F1000-E-G2, F1000-S-G2

Yes

F1000-9X0-AI series

F1000-9390-AI, F1000-9385-AI, F1000-9380-AI, F1000-9370-AI, F1000-9360-AI, F1000-9350-AI, F1000-9330-AI, F1000-9320-AI, F1000-990-AI, F1000-980-AI, F1000-970-AI, F1000-960-AI, F1000-950-AI, F1000-930-AI, F1000-920-AI, F1000-910-AI, F1000-905-AI

Yes

F1000-C83X0 series

F1000-C8395, F1000-C8390, F1000-C8385, F1000-C8380, F1000-C8370, F1000-C8360, F1000-C8350, F1000-C8330

Yes

F1000-C81X0 series

F1000-C8180, F1000-C8170, F1000-C8160, F1000-C8150, F1000-C8130, F1000-C8120, F1000-C8110

Yes

F1000-7X0-HI series

F1000-770-HI, F1000-750-HI, F1000-740-HI, F1000-730-HI, F1000-720-HI, F1000-710-HI

Yes

F1000-C-X series

F1000-C-EI, F1000-C-HI, F1000-C-XI, F1000-E-XI

Yes

F1000-V series

F1000-E-VG, F1000-S-VG

Yes

SecBlade IV

LSPM6FWD8, LSQM2FWDSC8

No

F100 series

Models

Command compatibility

F100-X-G5 series

F100-A-G5, F100-C-G5, F100-E-G5, F100-M-G5, F100-S-G5

Yes

F100-X-G3 series

F100-A-G3, F100-C-G3, F100-E-G3, F100-M-G3, F100-S-G3

Yes

F100-X-G2 series

F100-A-G2, F100-C-G2, F100-E-G2, F100-M-G2, F100-S-G2

Yes

F100-WiNet series

F100-A80-WiNet, F100-C80-WiNet, F100-C60-WiNet, F100-C50-WiNet, F100-S80-WiNet, F100-A91-WiNet, F100-A81-WiNet

Yes

F100-C-A series

F100-C-A6, F100-C-A5, F100-C-A3, F100-C-A2, F100-C-A1, F100-C-A6-WL, F100-C-A5-W, F100-C-A3-W

Yes

F100-X-XI series

F100-A-EI, F100-A-HI, F100-A-SI, F100-C-EI, F100-C-HI, F100-C-XI, F100-E-EI, F100-S-HI, F100-S-XI

Yes

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

last-1-hour: Displays top deny session statistics in last hour.

last-24-hours: Displays top deny session statistics in last 24 hours.

last-30-days: Displays top deny session statistics in last 30 days.

Usage guidelines

Non-default vSystems do not support this command.

This command displays nothing if the top deny session statistics feature is disabled. A maximum of 10 session items can be displayed.

Examples

# Display top deny session statistics in last hour.

<Sysname> display session fast-drop top-statistics last-1-hour

Counting by source addresses:

No.      Source address          Sessions

1        8.1.1.1                 6085

2        111.15.111.16           10

3        6::2                    2

 

Counting by destination addresses:

No.      Destination address     Sessions

1        8.1.1.2                 6085

2        6::3                    2

3        30.1.1.8                1

4        30.1.1.4                1

5        30.1.1.11               1

6        30.1.1.9                1

7        30.1.1.6                1

8        30.1.1.5                1

9        30.1.1.7                1

10       30.1.1.3                1

Table 9 Command output

Field

Description

Counting by source addresses

Top deny session statistics based on source addresses.

Counting by destination addresses

Top deny session statistics based on destination addresses.

No.

Ranking number.

Source address

Source IP address of the deny sessions.

Destination address

Destination IP address of the deny sessions.

Sessions

Total number of deny sessions.

 

Related commands

session fast-drop enable

session fast-drop top-statistics enable

display session ip-top-count policy

Use display session ip-top-count policy to display the configuration about top IPv4 session statistics.

Syntax

display session ip-top-count policy

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Examples

# Display the configuration about top IPv4 session statistics.

[Sysname] display session ip-top-count policy

Top IPv4 session statistics policy:

  Source IP Subnet: 1.1.1.0 24

  Destination IP Subnet: 2.2.2.0 24

Table 10 Command output

Field

Description

Source IP subnet

Source IP address matching criterion in the top session statistics policy for IPv4 sessions.

Destination IP subnet

Destination IP address matching criterion in the top session statistics policy for IPv4 sessions.

 

Related commands

session ip-top-count policy

display session ipv6-top-count policy

Use display session ipv6-top-count policy to display the configuration about top IPv6 session statistics.

Syntax

display session ipv6-top-count policy

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Examples

# Display the configuration about top IPv6 session statistics.

[Sysname] display session ipv6-top-count policy

Top IPv6 session statistics policy:

  Source IPv6 Subnet: 1234::ss96

  Destination IPv6 Subnet: 5678::96

Table 11 Command output

Field

Description

Source IP subnet

Source IP address matching criterion in the top IPv6 session statistics policy.

Destination IP subnet

Destination IP address matching criterion in the top IPv6 session statistics policy.

 

Related commands

session ipv6-top-count policy

display session relation-table

Use display session relation-table to display relation entries.

Syntax

In standalone mode:

display session relation-table { ipv4 | ipv6 } [ slot slot-number [ cpu cpu-number ] ] [ count number ] [ { application application-name | destination-ip destination-ip | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip source-ip | source-port source-port } * ]

In IRF mode:

display session relation-table { ipv4 | ipv6 } [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ count number ] [ { application application-name | destination-ip destination-ip | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip source-ip | source-port source-port } * ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

ipv4: Specifies IPv4 relation entries.

ipv6: Specifies IPv6 relation entries.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays relation entries for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays relation entries for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

count number Specifies the number of relation entries, in the range of 1 to 100000.

application application-name: Specifies an application protocol by its name. The application-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

destination-ip destination-ip: Specifies a destination IPv4 address for a relation entry.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a relation entry. The value range for the destination-port argument is 0 to 65535.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies a protocol.

source-ip source-ip: Specifies a source IPv4 address for a relation entry.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a relation entry. The value range for the source-port argument is 0 to 65535.

Examples

# (In standalone mode.) Display all IPv4 relation entries.

<Sysname> display session relation-table ipv4

Slot 1:

Source IP/port:      192.168.1.100/-

Destination IP/port: 192.168.2.100/99

DS-Lite tunnel peer: -

VPN instance/VLAN ID/Inline ID: 1/-/-

Protocol: TCP(6)    TTL: 1234s

Application: FTP-DATA

 

Source IP/port:      -/-

Destination IP/port: 192.168.2.200/1212

DS-Lite tunnel peer: -

VPN instance/VLAN ID/Inline ID: 1/-/-

Protocol: TCP(6)    TTL: 3100s

Application: H225

 

Source IP/port:       10.1.1.2/-

Destination IP/port: 30.1.1.4/10000

DS-Lite tunnel peer: -

VPN instance/VLAN ID/Inline ID: -/-/-

Protocol: UDP(17)    TTL: 266s

Application: RTP

CallID: [email protected]

 

Total entries found:  3

# (In standalone mode.) Display all IPv6 relation entries.

<Sysname> display session relation-table ipv6

Slot 1:

Source IP:             2011::0002

Destination IP/port: 2011::0008/1212

DS-Lite tunnel peer: -

VPN instance/VLAN ID/Inline ID: -/-/-

Protocol: TCP(6)    TTL: 567s

Application: FTP-DATA

 

Total entries found:  1

# (In standalone mode.) Display IPv4 relation entries for source IP address 192.168.1.100.

<Sysname> display session relation-table ipv4 source-ip 192.168.1.100

Slot 1:

Source IP/port:      192.168.1.100/-

Destination IP/port: 192.168.2.100/99

DS-Lite tunnel peer: -

VPN instance/VLAN ID/Inline ID: 1/-/-

Protocol: TCP(6)    TTL: 1234s

Application: FTP-DATA

 

Total entries found:  1

Table 12 Command output

Field

Description

Source IP/port

Source IP address and port number of the session. If the IP or port number is not specified, this field displays a hyphen (-).

For an IPv6 relation entry, the source port number is not displayed.

Destination IP/port

Destination IP address and port number of the session.

DS-Lite tunnel peer

Peer tunnel interface address of the DS-Lite tunnel to which the session belongs. If no peer tunnel interface address is specified, a hyphen (-) is displayed.

VPN instance/VLAN ID/ Inline ID

MPLS L3VPN instance to which the relation entry belongs.

VLAN and inline to which the relation entry belongs during Layer 2 forwarding.

If a parameter is not specified, a hyphen (-) is displayed for the proper field.

Protocol

Transport layer protocol.

TTL

Remaining lifetime of the relation entry, in seconds.

Application

Application layer protocol.

CallID

Unique identifier that identifies an SIP session.

Total entries found

Total number of found relation entries.

 

display session relation-table aging-time application

Use display session relation-table aging-time application to display the aging time for session relation entries.

Syntax

display session relation-table aging-time application

Views

Any view

Predefined user roles

network-admin

context-admin

Examples

# Display the aging time for SUNRPC session relation entries.

<Sysname> display session relation-table aging-time application

  Application               Aging time(s)

  SUNRPC                    14400

Table 13 Command output

Field

Description

Application

Application layer protocol name. Only SUNRPC is supported.

Aging time(s)

Aging time for the session relation entries, in seconds.

 

display session statistics

Use display session statistics to display unicast session statistics.

Syntax

In standalone mode:

display session statistics [ history-max | summary ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session statistics [ history-max | summary ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

history-max: Displays history statistics of the maximum unicast sessions and the maximum unicast session establishment rates. If you do not specify this keyword, the command displays all unicast session statistics.

summary: Displays summary information about unicast session statistics. If you do not specify this keyword, the command displays detailed information about unicast session statistics.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays unicast session statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays unicast session statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Usage guidelines

If you do not specify any parameters, this command displays detailed information about the current unicast session statistics.

Examples

# Display detailed information about unicast session statistics.

<Sysname> display session statistics

Slot 1:

Current sessions: 3

          TCP sessions:                    0

          UDP sessions:                    0

         ICMP sessions:                    3

       ICMPv6 sessions:                    0

     UDP-Lite sessions:                    0

         SCTP sessions:                    0

         DCCP sessions:                    0

        RAWIP sessions:                    0

          DNS sessions:                    0

          FTP sessions:                    0

          GTP sessions:                    0

         H323 sessions:                    0

         HTTP sessions:                    0

          ILS sessions:                    0

         MGCP sessions:                    0

          NBT sessions:                    0

         PPTP sessions:                    0

          RSH sessions:                    0

         RTSP sessions:                    0

         SCCP sessions:                    0

          SIP sessions:                    0

         SMTP sessions:                    0

       SQLNET sessions:                    0

          SSH sessions:                    0

       SUNRPC sessions:                    0

       TELNET sessions:                    0

         TFTP sessions:                    0

        XDMCP sessions:                    0

History average sessions per second:

      Past hour: 1

      Past 24 hours: 0

      Past 30 days: 0

History average session establishment rate:

      Past hour: 0/s

      Past 24 hours: 0/s

      Past 30 days: 0/s

Current relation-table entries: 0

Relation table establishment rate: 0/s

Session establishment rate: 0/s

          TCP:                   0/s

          UDP:                   0/s

         ICMP:                   0/s

       ICMPv6:                   0/s

     UDP-Lite:                   0/s

         SCTP:                   0/s

         DCCP:                   0/s

        RAWIP:                   0/s

Received TCP      :                   0 packets                    0 bytes

Received UDP      :                 118 packets                13568 bytes

Received ICMP     :                 105 packets                 8652 bytes

Received ICMPv6   :                   0 packets                    0 bytes

Received UDP-Lite :                   0 packets                    0 bytes

Received SCTP     :                   0 packets                    0 bytes

Received DCCP     :                   0 packets                    0 bytes

Received RAWIP    :                   0 packets                    0 bytes

Table 14 Command output

Field

Description

Current sessions

Total number of unicast sessions.

TCP sessions

Number of TCP sessions.

UDP sessions

Number of UDP sessions.

ICMP sessions

Number of ICMP sessions.

ICMPv6 sessions

Number of ICMPv6 sessions.

UDP-Lite sessions

Number of UDP-Lite sessions.

SCTP sessions

Number of SCTP sessions.

DCCP sessions

Number of DCCP sessions.

RAWIP sessions

Number of Raw IP sessions.

DNS sessions

Number of DNS unicast sessions.

FTP sessions

Number of FTP unicast sessions.

GTP sessions

Number of GTP unicast sessions.

H323 sessions

Number of H.323 unicast sessions.

HTTP sessions

Number of HTTP unicast sessions.

ILS sessions

Number of ILS unicast sessions.

MGCP sessions

Number of MGCP unicast sessions.

NBT sessions

Number of NBT unicast sessions.

PPTP sessions

Number of PPTP unicast sessions.

RSH sessions

Number of RSH unicast sessions.

RTSP sessions

Number of RTSP unicast sessions.

SCCP sessions

Number of SCCP unicast sessions.

SIP sessions

Number of SIP unicast sessions.

SMTP sessions

Number of SMTP unicast sessions.

SQLNET sessions

Number of SQLNET unicast sessions.

SSH sessions

Number of SSH unicast sessions.

SUNRPC sessions

Number of SUNRPC unicast sessions.

TELNET sessions

Number of Telnet unicast sessions.

TFTP sessions

Number of TFTP unicast sessions.

XDMCP sessions

Number of XDMCP unicast sessions.

History average sessions per second

History statistics of average sessions per second.

Past hour

The average number of sessions per second in the most recent hour.

Past 24 hours

The average number of sessions per second in the most recent 24 hours.

Past 30 days

The average number of sessions per second in the most recent 30 days.

History average session establishment rate

History statistics of average session establishment rates.

Past hour

The average session establishment rate in the most recent hour.

Past 24 hours

The average session establishment rate in the most recent 24 hours.

Past 30 days

The average session establishment rate in the most recent 30 days.

Current relation-table entries

Total number of relation entries.

Relation table establishment rate

Rate of relation table establishment.

Session establishment rate

Unicast session establishment rate, and rates for establishing unicast sessions of different protocols.

Received TCP

Number of received TCP packets and bytes.

Received UDP

Number of received UDP packets and bytes.

Received ICMP

Number of received ICMP packets and bytes.

Received ICMPv6

Number of received ICMPv6 packets and bytes.

Received UDP-Lite

Number of received UDP-Lite packets and bytes.

Received SCTP

Number of received SCTP packets and bytes.

Received DCCP

Number of received DCCP packets and bytes.

Received RAWIP

Number of received Raw IP packets and bytes.

 

# (In standalone mode.) Display summary information about unicast session statistics.

<Sysname> display session statistics summary

Slot CPU Sessions  TCP       UDP       Rate      TCP rate  UDP rate

1    1   3         0         0         0/s       0/s       0/s

Table 15 Command output

Field

Description

Sessions

Total number of unicast sessions.

TCP

Number of TCP unicast sessions.

UDP

Number of UDP unicast sessions.

Rate

Rate of unicast session creation.

TCP rate

Rate of TCP unicast session creation.

UDP rate

Rate of UDP unicast session creation.

 

# (In standalone mode.) Display history statistics of the maximum unicast sessions and maximum unicast session establishment rates.

<Sysname> display session statistics history-max

CPU 1 on slot 1

Max sessions: 20084                            Time: 2017-03-04 12:03:53

Max session establishment rate: 9080/s         Time: 2017-03-04 12:03:53

Max TCP sessions: 20084                        Time: 2017-03-04 12:03:53

Max TCP session establishment rate: 9080/s     Time: 2017-03-04 12:03:53

Max UDP sessions: 0                            Time: 2017-03-04 12:03:53

Max UDP session establishment rate: 0          Time: 2017-03-04 12:03:53

Table 16 Command output

Field

Description

Max sessions

History statistics of the maximum unicast sessions.

Max session establishment rate

History statistics of the maximum rate at which unicast sessions were created.

Max TCP sessions

History statistics of the maximum TCP unicast sessions.

Max TCP session establishment rate

History statistics of the maximum rate at which TCP unicast sessions were created.

Max UDP sessions

History statistics of the maximum UDP unicast sessions.

Max UDP session establishment rate

History statistics of the maximum rate at which UDP unicast sessions were created.

 

display session statistics flow-redirect

Use display session statistics flow-redirect to display statistics about redirected sessions.

Syntax

In standalone mode:

display session statistics flow-redirect { message | packet | session } [ slot slot-number cpu cpu-number ]

In IRF mode:

display session statistics flow-redirect { message | packet | session } [ chassis chassis-number slot slot-number cpu cpu-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Parameters

message: Displays message statistics about redirected sessions.

packet: Displays packet statistics about redirected sessions.

session: Displays session statistics about redirected sessions.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays redirected session statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays redirected session statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Usage guidelines

Non-default vSystems do not support this command.

Redirected sessions are sessions generated by the session flow redirection feature.

For this command to display statistics, make sure the session flow redirection feature is enabled.

Examples

# (In standalone mode.) Display message statistics about redirected sessions.

<Sysname> display session statistics flow-redirect message

Slot CPU RecvMsg      SentMsg

0    1   90           2

1    1   2            90

5    0   0            0

0    0   0            0

4    1   10           3

5    1   4            10

# (In IRF mode.) Display message statistics about redirected sessions.

<Sysname> display session statistics flow-redirect message

Chassis Slot CPU RecvMsg      SentMsg

1       0    1   90           2

1       1    1   2            90

1       5    0   0            0

2       0    0   0            0

2       4    1   10           3

2       5    1   4            10

Table 17 Command output

Field

Description

RecvMsg

Number of messages received through redirected sessions.

SentMsg

Number of messages sent through redirected sessions.

 

# (In standalone mode.) Display packet statistics about redirected sessions.

<Sysname> display session statistics flow-redirect packet

Slot CPU RecvPkts     SentPkts

0    1   90           2

1    1   2            90

5    0   0            0

0    0   0            0

4    1   10           3

5    1   4            10

# (In IRF mode.) Display packet statistics about redirected sessions.

<Sysname> display session statistics flow-redirect packet

Chassis Slot CPU RecvPkts     SentPkts

1       0    1   90           2

1       1    1   2            90

1       5    0   0            0

2       0    0   0            0

2       4    1   10           3

2       5    1   4            10

Table 18 Command output

Field

Description

RecvPkts

Number of packets received through redirected sessions.

SentPkts

Number of packets sent through redirected sessions.

 

# (In standalone mode.) Display session statistics about redirected sessions.

<Sysname> display session statistics flow-redirect session

Slot CPU Out       Resent      In      InRate InHotback    InHotbackRate

0    1   0         7           0       0      0            0

1    1   7         0           1       0      0            0

5    0   0         0           0       0      0            0

0    0   0         0           0       0      0            0

4    1   0         571         2       0      0            0

5    1   571       0           0       0      1            0

# (In IRF mode.) Display session statistics about redirected sessions.

<Sysname> display session statistics flow-redirect session

Chassis Slot CPU Out       Resent      In      InRate InHotback    InHotbackRate

1       0    1   0         7           0       0      0            0

1       1    1   7         0           1       0      0            0

1       5    0   0         0           0       0      0            0

2       0    0   0         0           0       0      0            0

2       4    1   0         571         2       0      0            0

2       5    1   571       0           0       0      1            0

Table 19 Command output

Field

Description

Out

Number of sent redirected sessions.

Resent

Number of resent redirected sessions.

In

Number of received redirected sessions.

InRate

Rate at which received redirected sessions were created.

InHotback

Number of received synchronized sessions.

InHotbackRate

Rate at which received synchronized sessions were created.

 

Related commands

session flow-redirect enable

display session statistics ipv4

Use display session statistics ipv4 to display IPv4 unicast session statistics.

Syntax

In standalone mode:

display session statistics ipv4 [ [ responder ] { application application-name | destination-ip destination-ip | destination-port destination-port | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | dns | ftp | gtp | h323 | http | icmp | ils | mgcp | nbt | pptp | raw-ip | rsh | rtsp | sccp | sctp | sip | smtp | sqlnet | ssh | tcp | telnet | tftp | udp | udp-lite | xdmcp } | security-policy-rule rule-name | source-ip source-ip | source-port source-port | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmp-reply | icmp-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session statistics ipv4 [ [ responder ] { application application-name | destination-ip destination-ip | destination-port destination-port | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | dns | ftp | gtp | h323 | http | icmp | ils | mgcp | nbt | pptp | raw-ip | rsh | rtsp | sccp | sctp | sip | smtp | sqlnet | ssh | tcp | telnet | tftp | udp | udp-lite | xdmcp } | security-policy-rule rule-name | source-ip source-ip | source-port source-port | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmp-reply | icmp-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

responder: Displays statistics about IPv4 unicast sessions from the responder to the initiator. If you do not specify this keyword, the command displays statistics about IPv4 unicast sessions from the initiator to the responder.

application application-name: Specifies an application protocol by its name. The application-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

destination-ip destination-ip: Specifies a destination IPv4 address for a unicast session.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of an IPv6 unicast session. The value range for the destination-port argument is 0 to 65535.

destination-zone destination-zone-name: Specifies a destination security zone by its name, a case-insensitive string of 1 to 31 characters.

interface interface-type interface-num: Specifies an interface by its type and number.

protocol { dccp | dns | ftp | gtp | h323 | http | icmp | ils | mgcp | nbt | pptp | raw-ip | rsh | rtsp | sccp | sctp | sip | smtp | sqlnet | ssh | tcp | telnet | tftp | udp | udp-lite | xdmcp }: Specifies an IPv4 protocol.

security-policy-rule rule-name: Specifies a security policy rule by its name for session filtering. The rule-name argument represents the name of the security policy rule, a case-sensitive string of 1 to 127 characters.

source-ip source-ip: Specifies a source IPv4 address for a unicast session.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of an IPv4 unicast session. The value range for the source-port argument is 0 to 65535.

source-zone source-zone-name: Specifies a source security zone by its name, a case-insensitive string of 1 to 31 characters.

state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmp-reply | icmp-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready }: Specifies a protocol state.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command displays IPv4 unicast session statistics in the public network.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays IPv4 unicast session statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays IPv4 unicast session statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Usage guidelines

If you do not specify any parameters, this command displays all IPv4 unicast session statistics.

Examples

# Display statistics for unicast sessions from IP address 111.15.111.66.

<Sysname> display session statistics ipv4 source-ip 111.15.111.66

CPU 1 on slot 1:

Current sessions: 3

          TCP sessions:                    0

          UDP sessions:                    0

         ICMP sessions:                    3

     UDP-Lite sessions:                    0

         SCTP sessions:                    0

         DCCP sessions:                    0

        RAWIP sessions:                    0

 

          DNS sessions:                    0

          FTP sessions:                    0

          GTP sessions:                    0

         H323 sessions:                    0

         HTTP sessions:                    0

          ILS sessions:                    0

         MGCP sessions:                    0

          NBT sessions:                    0

         PPTP sessions:                    0

          RSH sessions:                    0

         RTSP sessions:                    0

         SCCP sessions:                    0

          SIP sessions:                    0

         SMTP sessions:                    0

       SQLNET sessions:                    0

          SSH sessions:                    0

       TELNET sessions:                    0

         TFTP sessions:                    0

        XDMCP sessions:                    0

# Display statistics for IPv4 unicast TCP sessions.

<Sysname> display session statistics ipv4 protocol tcp

CPU 1 on slot 1:

Current sessions: 3

          TCP sessions:                    3

Table 20 Command output

Field

Description

Current sessions

Total number of unicast sessions.

TCP sessions

Number of TCP unicast sessions.

UDP sessions

Number of UDP unicast sessions.

ICMP sessions

Number of ICMP unicast sessions.

UDP-Lite sessions

Number of UDP-Lite unicast sessions.

SCTP sessions

Number of SCTP unicast sessions.

DCCP sessions

Number of DCCP unicast sessions.

RAWIP sessions

Number of Raw IP unicast sessions.

DNS sessions

Number of DNS unicast sessions.

FTP sessions

Number of FTP unicast sessions.

GTP sessions

Number of GTP unicast sessions.

H323 sessions

Number of H.323 unicast sessions.

HTTP sessions

Number of HTTP unicast sessions.

ILS sessions

Number of ILS unicast sessions.

MGCP sessions

Number of MGCP unicast sessions.

NBT sessions

Number of NBT unicast sessions.

PPTP sessions

Number of PPTP unicast sessions.

RSH sessions

Number of RSH unicast sessions.

RTSP sessions

Number of RTSP unicast sessions.

SCCP sessions

Number of SCCP unicast sessions.

SIP sessions

Number of SIP unicast sessions.

SMTP sessions

Number of SMTP unicast sessions.

SQLNET sessions

Number of SQLNET unicast sessions.

SSH sessions

Number of SSH unicast sessions.

TELNET sessions

Number of Telnet unicast sessions.

TFTP sessions

Number of TFTP unicast sessions.

XDMCP sessions

Number of XDMCP unicast sessions.

 

display session statistics ipv6

Use display session statistics ipv6 to display IPv6 unicast session statistics.

Syntax

In standalone mode:

display session statistics ipv6 [ [ responder ] { application application-name | destination-ip destination-ip | destination-port destination-port | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | dns | ftp | gtp | h323 | http | icmpv6 | ils | mgcp | nbt | pptp | raw-ip | rsh | rtsp | sccp | sctp | sip | smtp | sqlnet | ssh | tcp | telnet | tftp | udp | udp-lite | xdmcp } | security-policy-rule rule-name | source-ip source-ip | source-port source-port | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session statistics ipv6 [ [ responder ] { application application-name | destination-ip destination-ip | destination-port destination-port | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | dns | ftp | gtp | h323 | http | icmpv6 | ils | mgcp | nbt | pptp | raw-ip | rsh | rtsp | sccp | sctp | sip | smtp | sqlnet | ssh | tcp | telnet | tftp | udp | udp-lite | xdmcp } | security-policy-rule rule-name | source-ip source-ip | source-port source-port | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

responder: Displays statistics about IPv6 unicast sessions from the responder to the initiator. If you do not specify this keyword, the command displays statistics about IPv6 unicast sessions from the initiator to the responder.

application application-name: Specifies an application protocol by its name. The application-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

destination-ip destination-ip: Specifies a destination IPv6 address for a unicast session.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of an IPv6 unicast session. The value range for the destination-port argument is 0 to 65535.

destination-zone destination-zone-name: Specifies a destination security zone by its name, a case-insensitive string of 1 to 31 characters.

interface interface-type interface-num: Specifies an interface by its type and number.

protocol { dccp | dns | ftp | gtp | h323 | http | icmpv6 | ils | mgcp | nbt | pptp | raw-ip | rsh | rtsp | sccp | sctp | sip | smtp | sqlnet | ssh | tcp | telnet | tftp | udp | udp-lite | xdmcp }: Specifies an IPv6 protocol.

security-policy-rule rule-name: Specifies a security policy rule by its name for session filtering. The rule-name argument represents the name of the security policy rule, a case-sensitive string of 1 to 127 characters.

source-ip source-ip: Specifies a source IPv6 address for a unicast session.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of an IPv6 unicast session. The value range for the source-port argument is 0 to 65535.

source-zone source-zone-name: Specifies a source security zone by its name, a case-insensitive string of 1 to 31 characters.

state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready }: Specifies a protocol state.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command displays IPv6 unicast session statistics in the public network.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays IPv6 unicast session statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays IPv6 unicast session statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Display statistics for unicast sessions from IPv6 address 100::2.

<Sysname> display session statistics ipv6 source-ip 100::2

CPU 1 on slot 1:

Current sessions: 3

          TCP sessions:                    0

          UDP sessions:                    0

       ICMPv6 sessions:                    3

     UDP-Lite sessions:                    0

         SCTP sessions:                    0

         DCCP sessions:                    0

        RAWIP sessions:                    0

 

          DNS sessions:                    0

          FTP sessions:                    0

          GTP sessions:                    0

         H323 sessions:                    0

         HTTP sessions:                    0

          ILS sessions:                    0

         MGCP sessions:                    0

          NBT sessions:                    0

         PPTP sessions:                    0

          RSH sessions:                    0

         RTSP sessions:                    0

         SCCP sessions:                    0

          SIP sessions:                    0

         SMTP sessions:                    0

       SQLNET sessions:                    0

          SSH sessions:                    0

       TELNET sessions:                    0

         TFTP sessions:                    0

        XDMCP sessions:                    0

# Display statistics for IPv6 unicast TCP sessions.

<Sysname> display session statistics ipv6 protocol tcp

CPU 1 on slot 1:

Current sessions: 3

          TCP sessions:                    3

Table 21 Command output

Field

Description

Current sessions

Total number of unicast sessions.

TCP sessions

Number of TCP unicast sessions.

UDP sessions

Number of UDP unicast sessions.

ICMPv6 sessions

Number of ICMPv6 unicast sessions.

UDP-Lite sessions

Number of UDP-Lite unicast sessions.

SCTP sessions

Number of SCTP unicast sessions.

DCCP sessions

Number of DCCP unicast sessions.

RAWIP sessions

Number of Raw IP unicast sessions.

DNS sessions

Number of DNS unicast sessions.

FTP sessions

Number of FTP unicast sessions.

GTP sessions

Number of GTP unicast sessions.

H323 sessions

Number of H.323 unicast sessions.

HTTP sessions

Number of HTTP unicast sessions.

ILS sessions

Number of ILS unicast sessions.

MGCP sessions

Number of MGCP unicast sessions.

NBT sessions

Number of NBT unicast sessions.

PPTP sessions

Number of PPTP unicast sessions.

RSH sessions

Number of RSH unicast sessions.

RTSP sessions

Number of RTSP unicast sessions.

SCCP sessions

Number of SCCP unicast sessions.

SIP sessions

Number of SIP unicast sessions.

SMTP sessions

Number of SMTP unicast sessions.

SQLNET sessions

Number of SQLNET unicast sessions.

SSH sessions

Number of SSH unicast sessions.

TELNET sessions

Number of Telnet unicast sessions.

TFTP sessions

Number of TFTP unicast sessions.

XDMCP sessions

Number of XDMCP unicast sessions.

 

display session statistics multicast

Use display session statistic multicast to display multicast session statistics.

Syntax

In standalone mode:

display session statistics multicast [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session statistics multicast [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays multicast session statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays multicast session statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# (In standalone mode.) Display information about multicast session statistics.

<Sysname> display session statistics multicast

Slot 1:

Current sessions: 0

Session establishment rate: 0/s

History max sessions: 0                                Time: 2017-04-25 11:28:00

History max session establishment rate: 0/s            Time: 2017-04-25 11:28:00

Received:                   0 packets                    0 bytes

Sent    :                   0 packets                    0 bytes

Table 22 Command output

Field

Description

Current sessions

Total number of multicast sessions.

Session establishment rate

Rate of multicast session creation.

History max sessions

History statistics of the maximum multicast sessions.

History max session establishment rate

History statistics of the maximum rate at which multicast sessions were created.

Received

Number of received multicast packets and bytes.

Sent

Number of sent multicast packets and bytes.

 

display session statistics summary all

Use display session statistics summary all to display session statistics summary.

Syntax

display session statistics summary all

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Examples

# Display session statistics summary.

<Sysname> system-view

[Sysname] display session statistics summary all

Total sessions  Session creation rate

10              0

Related commands

display session statistics summary

display session table ipv4

Use display session table ipv4 to display information about IPv4 unicast session entries that match specific criteria.

Syntax

In standalone mode:

display session table ipv4 [ slot slot-number [ cpu cpu-number ] ] [ [ responder ] { application application-name | destination-ip start-destination-ip [ end-destination-ip ] | destination-port start-destination-port [ end-destination-port ] | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | security-policy-rule rule-name | security-policy-rule-id rule-id | source-ip start-source-ip [ end-source-ip ] | source-port start-source-port [ end-source-port ] | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmp-reply | icmp-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ verbose | brief ]

In IRF mode:

display session table ipv4 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ [ responder ] { application application-name | destination-ip start-destination-ip [ end-destination-ip ] | destination-port start-destination-port [ end-destination-port ] | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | security-policy-rule rule-name | security-policy-rule-id rule-id | source-ip start-source-ip [ end-source-ip ] | source-port start-source-port [ end-source-port ] | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmp-reply | icmp-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ verbose | brief ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

responder: Displays entries of IPv4 unicast sessions from the responder to the initiator. If you do not specify this keyword, the command displays entries of IPv4 unicast sessions from the initiator to the responder.

application application-name: Specifies an application protocol by its name. The application-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

destination-ip start-destination-ip [ end-destination-ip ]: Specifies a destination IPv4 address or IPv4 address range for a unicast session. The start destination-ip argument specifies the start destination IPv4 address. The end destination-ip argument specifies the end destination IPv4 address.

destination-port start-destination-port [ end-destination-port ]: Specifies a destination port or destination port range for a unicast session. The start-destination-port argument specifies the start destination port. The end-destination-port argument specifies the end destination port. The value ranges for the start-destination-port and end-destination-port arguments are both 0 to 65535.

destination-zone destination-zone-name: Specifies a destination security zone by its name, a case-insensitive string of 1 to 31 characters.

interface interface-type interface-num: Specifies an interface by its type and number.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv4 transport layer protocol, including DCCP, ICMP, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

security-policy-rule rule-name: Specifies a security policy rule by its name for session filtering. The rule-name argument represents the name of the security policy rule, a case-sensitive string of 1 to 127 characters.

security-policy-rule-id rule-id: Specifies a security policy rule by its ID in the range of 0 to 4294967295.

source-ip start-source-ip [ end-source-ip ]: Specifies a source IPv4 address or IPv4 address range for a unicast session. The start source-ip argument specifies the start source IPv4 address. The end source-ip argument specifies the end source IPv4 address.

source-port start-source-port [ end-source-port ]: Specifies a source port or source port range for a unicast session. The start-source-port argument specifies the start source port. The end-source-port argument specifies the end source port. The value ranges for the start-source-port and end-source-port arguments are both 0 to 65535.

source-zone source-zone-name: Specifies a source security zone by its name, a case-insensitive string of 1 to 31 characters.

state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmp-reply | icmp-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready }: Specifies a protocol state.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command displays IPv4 unicast session entries in the public network.

verbose: Displays detailed information about IPv4 unicast session entries. If you do not specify this keyword, the command displays summary information about IPv4 unicast session entries.

brief: Displays brief information about IPv4 unicast session entries. If you do not specify this keyword, the command displays summary information about IPv4 unicast session entries.

Usage guidelines

If you do not specify any parameters, this command displays all IPv4 unicast session entries.

Examples

# (In standalone mode.) Display summary information about all IPv4 unicast session entries.

<Sysname> display session table ipv4

Total number of sessions on all slots: 1

Slot 1:

Initiator:

  Source      IP/port: 192.168.1.18/1877

  Destination IP/port: 192.168.1.55/22

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

  NAT global policy: example

Total sessions found: 1

# (In standalone mode.) Display detailed information about all IPv4 unicast session entries.

<Sysname> display session table ipv4 verbose

Total number of sessions on all slots: 1

Slot 1:

Initiator:

  Source      IP/port: 192.168.1.18/1877

  Destination IP/port: 192.168.1.55/22

  DS-Lite tunnel peer:-

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

  NAT global policy: example

Responder:

  Source      IP/port: 192.168.1.55/22

  Destination IP/port: 192.168.1.18/1877

  DS-Lite tunnel peer:-

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: TCP(6)

  Inbound interface: GigabitEthernet1/0/2

  Source security zone: Local

  NAT global policy: example

State: TCP_SYN_SENT

FPGA state: TCP_SYN_SENT

Application: SSH (Service name: SSH)

Rule ID: 4294967292

Rule name: default

Start time: 2011-07-29 19:12:36  TTL: 28s

Initiator->Responder:         1 packets         48 bytes

Responder->Initiator:         0 packets          0 bytes

 

Total sessions found: 1

# (In standalone mode.) Display brief information about all IPv4 unicast session entries.

<Sysname> display session table ipv4 brief

Total number of sessions on all slots: 1

Slot 1:

Application      VPN(Src->Dst)   SIP/Port->DIP/Port

GENERAL_TCP      public->public  (backup)192.168.1.1/4398(1.1.1.1/2107)->192.168.2.2/2048

Total sessions found: 1

Table 23 Command output

Field

Description

Initiator

Information about the unicast session from the initiator to the responder.

Responder

Information about the unicast session from the responder to the initiator.

DS-Lite tunnel peer

Address of the DS-Lite tunnel peer.

When the unicast session does not belong to any DS-Lite tunnel, this field displays a hyphen (-).

VPN instance/VLAN ID/Inline ID

MPLS L3VPN instance to which the unicast session belongs.

VLAN and inline to which the session belongs during Layer 2 forwarding.

If a parameter is not specified, a hyphens (-) is displayed for the proper field.

Protocol

Transport layer protocol:

·     DCCP.

·     ICMP.

·     ICMPv6.

·     Raw IP.

·     SCTP.

·     TCP.

·     UDP.

·     UDP-Lite.

The number in the brackets indicates the protocol number.

Inbound interface

Interface on which packets are received.

Source security zone

Security zone to which the inbound interface belongs. If the inbound interface does not belong to any security zone, this field displays a hyphen (-).

NAT global policy

Name of the global NAT rule.

State

Unicast session state.

FPGA state

Logical session state.

If the logical session state cannot be obtained, this field displays NA. if hardware fast forwarding is disabled, this field is not displayed.

Application

Application layer protocol, FTP or DNS.

If it is an unknown protocol identified by an unknown port, this field displays OTHER.

Service name indicates the service type, which can be DNS, FTP, or SSH.

Rule ID

ID of the security policy rule.

Rule name

Name of the security policy rule.

Start time

Unicast session establishment time.

TTL

Remaining lifetime of the unicast session, in seconds.

Initiator->Responder

Number of packets and bytes from the initiator to the responder.

Responder->Initiator

Number of packets and bytes from the responder to the initiator.

Total sessions found

Total number of found unicast session entries.

VPN(Src->Dst)

Source VPN instance name and destination VPN instance name.

(backup)

A session backed up from the hot backup peer.

SIP/Port->DIP/Port

The source IP address/port number and destination IP address/port number. If the session undergoes NAT conversion, the post-NAT converted address is enclosed with square brackets ([]).

 

display session table ipv6

Use display session table ipv6 to display information about IPv6 unicast session entries that match specific criteria.

Syntax

In standalone mode:

display session table ipv6 [ slot slot-number [ cpu cpu-number ] ] [ [ responder ] { application application-name | destination-ip start-destination-ip [ end-destination-ip ] | destination-port start-destination-port [ end-destination-port ] | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } | security-policy-rule rule-name | security-policy-rule-id rule-id | source-ip start-source-ip [ end-source-ip ] | source-port start-source-port [ end-source-port ] | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ verbose | brief ]

In IRF mode:

display session table ipv6 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ [ responder ] { application application-name | destination-ip start-destination-ip [ end-destination-ip ] | destination-port start-destination-port [ end-destination-port ] | destination-zone destination-zone-name | interface interface-type interface-number | protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } | security-policy-rule rule-name | security-policy-rule-id rule-id | source-ip start-source-ip [ end-source-ip ] | source-port start-source-port [ end-source-port ] | source-zone source-zone-name | state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready } | vpn-instance vpn-instance-name } * ] [ verbose | brief ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

responder: Displays entries of IPv6 unicast sessions from the responder to the initiator. If you do not specify this keyword, the command displays entries of IPv6 unicast sessions from the initiator to the responder.

application application-name: Specifies an application protocol by its name. The application-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

destination-ip start-destination-ip [ end-destination-ip ]: Specifies a destination IPv6 address or IPv6 address range for a unicast session. The start destination-ip argument specifies the start destination IPv6 address. The end destination-ip argument specifies the end destination IPv6 address.

destination-port start-destination-port [ end-destination-port ]: Specifies a destination port or destination port range for an IPv6 unicast session. The start-destination-port argument specifies the start destination port. The end-destination-port argument specifies the end destination port. The value ranges for the start-destination-port and end-destination-port arguments are both 0 to 65535.

destination-zone destination-zone-name: Specifies a destination security zone by its name, a case-insensitive string of 1 to 31 characters.

interface interface-type interface-num: Specifies an interface by its type and number.

protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv6 transport layer protocol, including DCCP, ICMPv6, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

security-policy-rule rule-name: Specifies a security policy rule by its name for session filtering. The rule-name argument represents the name of the security policy rule, a case-sensitive string of 1 to 127 characters.

security-policy-rule-id rule-id: Specifies a security policy rule by its ID in the range of 0 to 4294967295.

source-ip start-source-ip [ end-source-ip ]: Specifies a source IPv6 address or IPv6 address range for a unicast session. The start source-ip argument specifies the start source IPv6 address. The end source-ip argument specifies the end source IPv6 address.

source-port start-source-port [ end-source-port ]: Specifies a source port or source port range for an IPv6 unicast session. The start-source-port argument specifies the start source port. The end-source-port argument specifies the end source port. The value ranges for the start-source-port and end-source-port arguments are both 0 to 65535.

source-zone source-zone-name: Specifies a source security zone by its name, a case-insensitive string of 1 to 31 characters.

state { dccp-closereq | dccp-closing | dccp-open | dccp-partopen | dccp-request | dccp-respond | dccp-timewait | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | sctp-closed | sctp-cookie-echoed | sctp-cookie-wait | sctp-established | sctp-shutdown-ack-sent | sctp-shutdown-recd | sctp-shutdown-sent | tcp-close | tcp-close-wait | tcp-est | tcp-fin-wait | tcp-last-ack | tcp-syn-recv | tcp-syn-sent | tcp-syn-sent2 | tcp-time-wait | udp-open | udp-ready | udplite-open | udplite-ready }: Specifies a protocol state.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the command displays IPv6 unicast session entries in the public network.

verbose: Displays detailed information about IPv6 unicast session entries. If you do not specify this keyword, the command displays summary information about IPv6 unicast session entries.

brief: Displays brief information about IPv6 unicast session entries. If you do not specify this keyword, the command displays summary information about IPv6 unicast session entries.

Usage guidelines

If you do not specify any parameters, this command displays all IPv6 unicast session entries.

Examples

# (In standalone mode.) Display summary information about all IPv6 unicast session entries.

<Sysname> display session table ipv6

Total number of sessions on all slots: 1

Slot 1:

Initiator:

  Source      IP/port: 2011::2/58473

  Destination IP/port: 2011::8/32768

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: IPV6-ICMP(58)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

  NAT global policy: example

 

Total sessions found: 1

# (In standalone mode.) Display detailed information about all IPv6 unicast session entries.

<Sysname> display session table ipv6 verbose

Total number of sessions on all slots: 1

Slot 1:

Initiator:

  Source      IP/port: 2011::2/58473

  Destination IP/port: 2011::8/32768

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: IPV6-ICMP(58)

  Inbound interface: GigabitEthernet1/0/1

  Source security zone: Trust

  NAT global policy: example

Responder:

  Source      IP/port: 2011::8/58473

  Destination IP/port: 2011::2/33024

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: IPV6-ICMP(58)

  Inbound interface: GigabitEthernet1/0/2

  Source security zone: Local

  NAT global policy: example

State: ICMPV6_REQUEST

FPGA state: ICMPV6_REQUEST

Application: OTHER (Service name: ICMP)

Rule ID: 4294967292

Rule name: default

Start time: 2011-07-29 19:23:41  TTL: 55s

Initiator->Responder:         1 packets         104 bytes

Responder->Initiator:         0 packets          0 bytes

 

Total sessions found: 1

# (In standalone mode.) Display brief information about all IPv6 unicast session entries.

<Sysname> display session table ipv6 brief

Total number of sessions on all slots: 1

Slot 1:

Application      VPN(Src->Dst)   SIP/Port->DIP/Port

GENERAL_TCP      public->public  (backup)1:1::/1(3:3::/1213)->2:2::/32768

Total sessions found: 1

Table 24 Command output

Field

Description

Initiator

Information about the unicast session from the initiator to the responder.

Responder

Information about the unicast session from the responder to the initiator.

DS-Lite tunnel peer

Address of the DS-Lite tunnel peer.

When the unicast session is not tunneled by DS-Lite, this field displays a hyphen (-).

VPN instance/VLAN ID/Inline ID

MPLS L3VPN instance to which the unicast session belongs.

VLAN and inline to which the unicast session belongs during Layer 2 forwarding.

If a parameter is not specified, a hyphens (-) is displayed for the proper field.

Protocol

Transport layer protocol:

·     DCCP.

·     ICMP.

·     ICMPv6.

·     Raw IP.

·     SCTP.

·     TCP.

·     UDP.

·     UDP-Lite.

The number in the brackets indicates the protocol number.

Inbound interface

Interface on which packets are received.

Source security zone

Security zone to which the inbound interface belongs. If the inbound interface does not belong to any security zone, this field displays a hyphen (-).

NAT global policy

Name of the global NAT rule.

State

Unicast session state.

FPGA state

Logical session state.

If the logical session state cannot be obtained, this field displays NA. if hardware fast forwarding is disabled, this field is not displayed.

Application

Application layer protocol, FTP or DNS.

If it is an unknown protocol identified by an unknown port, this field displays OTHER.

Service name indicates the service type, which can be DNS, FTP, or SSH.

Rule ID

ID of the security policy rule.

Rule name

Name of the security policy rule.

Start time

Unicast session establishment time.

TTL

Remaining lifetime of the unicast session, in seconds.

Initiator->Responder

Number of packets and bytes from the initiator to the responder.

Responder->Initiator

Number of packets and bytes from the responder to the initiator.

Total sessions found

Total number of found unicast session entries.

VPN(Src->Dst)

Source VPN instance name and destination VPN instance name.

(backup)

A session backed up from the hot backup peer.

SIP/Port->DIP/Port

The source IP address/port number and destination IP address/port number. If the session undergoes NAT conversion, the post-NAT converted address is enclosed with square brackets ([]).

 

display session table multicast ipv4

Use display session table multicast ipv4 to display information about IPv4 multicast session entries that match specific criteria.

Syntax

In standalone mode:

display session table multicast ipv4 [ slot slot-number [ cpu cpu-number ] ] [ [ responder ] { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ verbose ]

In IRF mode:

display session table multicast ipv4 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ [ responder ] { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ verbose ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

responder: Displays entries of IPv4 multicast sessions from the responder to the initiator. If you do not specify this keyword, the command displays entries of IPv4 multicast sessions from the initiator to the responder.

destination-ip start-destination-ip [ end-destination-ip ]: Specifies a destination IPv4 address or IPv4 address range for a multicast session. The start destination-ip argument specifies the start destination IPv4 address. The end destination-ip argument specifies the end destination IPv4 address.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a multicast session. The value range for the destination-port argument is 0 to 65535.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv4 transport layer protocol.

source-ip start-source-ip [ end-source-ip ]: Specifies a source IPv4 address or IPv4 address range for a multicast session. The start source-ip argument specifies the start source IPv4 address. The end source-ip argument specifies the end source IPv4 address.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a multicast session. The value range for the source-port argument is 0 to 65535.

verbose: Displays detailed information about IPv4 multicast session entries. If you do not specify this keyword, the command displays brief information about IPv4 multicast session entries.

Usage guidelines

If you do not specify any parameters, this command displays all IPv4 multicast session entries.

Examples

# (In standalone mode.) Display brief information about all IPv4 multicast session entries.

<Sysname> display session table multicast ipv4

CPU 1 on slot 1:

Inbound initiator:

  Source      IP/port: 3.3.3.4/1609

  Destination IP/port: 232.0.0.1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Inbound interface: GigabitEthernet1/0/1

Outbound interface list:

    GigabitEthernet1/0/2

    GigabitEthernet1/0/3

 

Total sessions found: 3

# (In standalone mode.) Display detailed information about all IPv4 multicast session entries.

<Sysname> display session table multicast ipv4 verbose

CPU 1 on slot 1:

Total sessions found: 0

 

CPU 1 on slot 2:

Inbound initiator:

  Source      IP/port: 3.3.3.4/1609

  Destination IP/port: 232.0.0.1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Inbound responder:

  Source      IP/port: 232.0.0.1/1025

  Destination IP/port: 3.3.3.4/1609

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Inbound interface: GigabitEthernet1/0/1

Source security zone: Trust

State: UDP_OPEN

Application: OTHER

Start time: 2014-03-03 15:59:22  TTL: 18s

Initiator->Responder:            1 packets         84 bytes

 

Outbound initiator:

  Source      IP/port: 3.3.3.4/1609

  Destination IP/port: 232.0.0.1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound responder:

  Source      IP/port: 232.0.0.1/1025

  Destination IP/port: 3.3.3.4/1609

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound interface: GigabitEthernet1/0/2

Destination security zone: aaa

State: UDP_OPEN

Application: OTHER

Start time: 2014-03-03 15:59:22  TTL: 18s

Initiator->Responder:            1 packets         84 bytes

 

Outbound initiator:

  Source      IP/port: 3.3.3.4/1609

  Destination IP/port: 232.0.0.1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound responder:

  Source      IP/port: 232.0.0.1/1025

  Destination IP/port: 3.3.3.4/1609

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound interface: GigabitEthernet1/0/3

Destination security zone: bbb

State: UDP_OPEN

Application: OTHER

Start time: 2014-03-03 15:59:22  TTL: 18s

Initiator->Responder:            1 packets         84 bytes

 

Total sessions found: 3

Table 25 Command output

Field

Description

Inbound initiator

Information about the multicast session from the initiator to the responder on the inbound interface.

Inbound responder

Information about the multicast session from the responder to the initiator on the inbound interface.

Outbound initiator

Information about the multicast session from the initiator to the responder on the outbound interface.

Outbound responder

Information about the multicast session from the responder to the initiator on the outbound interface.

DS-Lite tunnel peer

Address of the DS-Lite tunnel peer.

If the multicast session is not tunneled by DS-Lite, this field displays a hyphen (-).

VPN instance/VLAN ID/Inline ID

MPLS L3VPN instance to which the multicast session belongs.

VLAN and inline to which the multicast session belongs during Layer 2 forwarding.

If a parameter is not specified, a hyphens (-) is displayed for the proper field.

Protocol

Transport layer protocol:

·     DCCP.

·     ICMP.

·     Raw IP.

·     SCTP.

·     TCP.

·     UDP.

·     UDP-Lite.

The number in the brackets indicates the protocol number.

State

Multicast session state.

Application

Application layer protocol, FTP or DNS.

If it is an unknown protocol identified by an unknown port, this field displays OTHER.

Start time

Time when the multicast session was created.

TTL

Remaining lifetime of the multicast session, in seconds.

Inbound interface

Inbound interface of the first packet from the initiator to responder.

Outbound interface

Outbound interface of the first packet from the initiator to responder.

Outbound interface list

Outbound interfaces of the first packet from the initiator to responder.

Source security zone

Security zone to which the inbound interface belongs. If the inbound interface does not belong to any security zone, this field displays a hyphen (-).

Destination security zone

Security zone to which the outbound interface belongs. If the outbound interface does not belong to any security zone, this field displays a hyphen (-).

Initiator->Responder

Number of packets and bytes from the initiator to the responder.

Total sessions found

Total number of found multicast session entries.

 

display session table multicast ipv6

Use display session table multicast ipv6 to display information about IPv6 multicast session entries that match specific criteria.

Syntax

In standalone mode:

display session table multicast ipv6 [ slot slot-number [ cpu cpu-number ] ] [ [ responder ] { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ verbose ]

In IRF mode:

display session table multicast ipv6 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ [ responder ] { destination-ip start-destination-ip [ end-destination-ip ] | destination-port destination-port | protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } | source-ip start-source-ip [ end-source-ip ] | source-port source-port } * ] [ verbose ]

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

responder: Displays entries of IPv6 multicast sessions from the responder to the initiator. If you do not specify this keyword, the command displays entries of IPv4 multicast sessions from the initiator to the responder.

destination-ip start-destination-ip [ end-destination-ip ]: Specifies a destination IPv6 address or IPv6 address range for a multicast session. The start destination-ip argument specifies the start destination IPv6 address. The end destination-ip argument specifies the end destination IPv6 address.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a multicast session. The value range for the destination-port argument is 0 to 65535.

protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv6 transport layer protocol.

source-ip start-source-ip [ end-source-ip ]: Specifies a source IPv6 address or IPv6 address range for a multicast session. The start source-ip argument specifies the start source IPv6 address. The end source-ip argument specifies the end source IPv6 address.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a multicast session. The value range for the source-port argument is 0 to 65535.

verbose: Displays detailed information about IPv6 multicast session entries. If you do not specify this keyword, the command displays brief information about IPv6 multicast session entries.

Usage guidelines

If you do not specify any parameters, this command displays all IPv6 multicast session entries.

Examples

# (In standalone mode.) Display brief information about all IPv6 multicast session entries.

<Sysname> display session table multicast ipv6

CPU 1 on slot 1:

Inbound initiator:

  Source      IP/port: 3::4/1617

  Destination IP/port: FF0E::1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Inbound interface: GigabitEthernet1/0/1

Outbound interface list:

    GigabitEthernet1/0/2

    GigabitEthernet1/0/3

 

Total sessions found: 3

# (In standalone mode.) Display detailed information about all IPv6 multicast session entries.

<Sysname> display session table multicast ipv6 verbose

CPU 1 on slot 1:

Inbound initiator:

  Source      IP/port: 3::4/1617

  Destination IP/port: FF0E::1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Inbound responder:

  Source      IP/port: FF0E::1/1025

  Destination IP/port: 3::4/1617

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Inbound interface: GigabitEthernet1/0/1

Source security zone: Trust

State: UDP_OPEN

Application: OTHER

Start time: 2014-03-03 16:10:58  TTL: 23s

Initiator->Responder:            5 packets        520 bytes

 

Outbound initiator:

  Source      IP/port: 3::4/1617

  Destination IP/port: FF0E::1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound responder:

  Source      IP/port: FF0E::1/1025

  Destination IP/port: 3::4/1617

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound interface: GigabitEthernet1/0/2

Destination security zone: bbb

State: UDP_OPEN

Application: OTHER

Start time: 2014-03-03 16:10:58  TTL: 23s

Initiator->Responder:            5 packets        520 bytes

 

Outbound initiator:

  Source      IP/port: 3::4/1617

  Destination IP/port: FF0E::1/1025

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound responder:

  Source      IP/port: FF0E::1/1025

  Destination IP/port: 3::4/1617

  DS-Lite tunnel peer: -

  VPN instance/VLAN ID/Inline ID: -/-/-

  Protocol: UDP(17)

Outbound interface: GigabitEthernet1/0/3

Destination security zone: ccc

State: UDP_OPEN

Application: OTHER

Start time: 2014-03-03 16:10:58  TTL: 23s

Initiator->Responder:            5 packets        520 bytes

 

Total sessions found: 3

Table 26 Command output

Field

Description

Inbound initiator

Information about the multicast session from the initiator to the responder on the inbound interface.

Inbound responder

Information about the multicast session from the responder to the initiator on the inbound interface.

Outbound initiator

Information about the multicast session from the initiator to the responder on the outbound interface.

Outbound responder

Information about the multicast session from the responder to the initiator on the outbound interface.

DS-Lite tunnel peer

Address of the DS-Lite tunnel peer.

If the multicast session is not tunneled by DS-Lite, this field displays a hyphen (-).

VPN instance/VLAN ID/Inline ID

MPLS L3VPN instance to which the multicast session belongs.

VLAN and inline to which the multicast session belongs during Layer 2 forwarding.

If a parameter is not specified, a hyphens (-) is displayed for the proper field.

Protocol

Transport layer protocol:

·     DCCP.

·     ICMPv6.

·     Raw IP.

·     SCTP.

·     TCP.

·     UDP.

·     UDP-Lite.

The number in the brackets indicates the protocol number.

State

Multicast session state.

Application

Application layer protocol, FTP or DNS.

If it is an unknown protocol identified by an unknown port, this field displays OTHER.

Start time

Time when the multicast session was created.

TTL

Remaining lifetime of the multicast session, in seconds.

Inbound interface

Inbound interface of the first packet from the initiator to responder.

Outbound interface

Outbound interface of the first packet from the initiator to responder.

Outbound interface list

Outbound interfaces of the first packet from the initiator to responder.

Source security zone

Security zone to which the inbound interface belongs. If the inbound interface does not belong to any security zone, this field displays a hyphen (-).

Destination security zone

Security zone to which the outbound interface belongs. If the outbound interface does not belong to any security zone, this field displays a hyphen (-).

Initiator->Responder

Number of packets and bytes from the initiator to the responder.

Total sessions found

Total number of found multicast session entries.

 

display session top-statistics

Use display session top-statistics to display top session statistics.

Syntax

display session top-statistics { last-1-hour | last-24-hours | last-30-days }

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

last-1-hour: Displays top session statistics in last hour.

last-24-hours: Displays top session statistics in last 24 hours.

last-30-days: Displays top session statistics in last 30 days.

Usage guidelines

This command displays nothing if the top session statistics feature is not enabled. A maximum of ten session items can be displayed.

Examples

# Display top session statistics in last hour.

<Sysname> display session top-statistics last-1-hour

 

Counting by source addresses:

No.      Source address                Sessions

1        10.1.2.3                      50004302

2        10.1.2.2                      40123255

3        10.2.2.10                     26664302

4        10.1.2.11                     7123255

5        10.1.2.12                     424302

6        10.1.2.13                     253255

7        10.1.2.14                     55302

8        10.1.2.15                     50025

9        10.1.2.16                     3555

10       10.1.2.1                      995

 

Counting by destination addresses:

No.      Destination address           Sessions

1        20.1.2.3                      50004302

2        20.1.2.2                      40123255

3        20.2.2.10                     26664302

4        20.1.2.11                     7123255

5        20.1.2.12                     424302

6        20.1.2.13                     325325

7        20.1.2.14                     55530

8        20.1.2.15                     50025

9        20.1.2.16                     3555

10       20.1.2.1                      995

Table 27 Command output

Field

Description

Counting by source addresses

Top session statistics based on source addresses.

Counting by destination addresses

Top session statistics based on destination addresses.

No.

Ranking number.

Source address

Source IP address of the sessions.

Destination address

Destination IP address of the sessions.

Sessions

Total number of sessions.

 

Related commands

session top-statistics enable

reset session alg-app-change

Use reset session alg-app-change to clear APP ID change statistics.

Syntax

In standalone mode:

display session alg-app-change [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display session alg-app-change [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

Any view

Predefined user roles

network-admin

network-operator

mdc-admin

mdc-operator

context-admin

context-operator

vsys-admin

vsys-operator

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears APP ID change statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears APP ID change statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Display APP ID change statistics.

<Sysname> clear system internal session alg-app-change

Related commands

display session alg-app-change

reset session relation-table

Use reset session relation-table to clear relation entries.

Syntax

In standalone mode:

reset session relation-table [ ipv4 | ipv6 ] [ slot slot-number [ cpu cpu-number ] ] [ { application application-name | destination-ip destination-ip | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip source-ip | source-port source-port } * ]

In IRF mode:

reset session relation-table [ ipv4 | ipv6 ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ { application application-name | destination-ip destination-ip | destination-port destination-port | protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } | source-ip source-ip | source-port source-port } * ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

ipv4: Specifies IPv4 relation entries.

ipv6: Specifies IPv6 relation entries.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears relation entries for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears relation entries for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

application application-name: Specifies an application protocol by its name. The application-name argument is a case-insensitive string of 1 to 63 characters. The names invalid and other are not allowed.

destination-ip destination-ip: Specifies a destination IPv4 address for a relation entry.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a relation entry. The value range for the destination-port argument is 0 to 65535.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies a protocol.

source-ip source-ip: Specifies a source IPv4 address for a relation entry.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a relation entry. The value range for the source-port argument is 0 to 65535.

Usage guidelines

If you do not specify any parameters, this command clears all relation entries.

Examples

# Clear all IPv4 relation entries.

<Sysname> reset session relation-table ipv4

# Clear IPv4 relation entries for source IP address 10.10.10.10.

<Sysname> reset session relation-table ipv4 source-ip 10.10.10.10

Related commands

display session relation-table

reset session statistics

Use reset session statistics to clear unicast session statistics.

Syntax

In standalone mode:

reset session statistics [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

reset session statistics [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears unicast session statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears unicast session statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Clear all unicast session statistics.

<Sysname> reset session statistics

Related commands

display session statistics

reset session statistics multicast

Use reset session statistics multicast to clear multicast session statistics.

Syntax

In standalone mode:

reset session statistics multicast [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

reset session statistics multicast [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears multicast session statistics for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears multicast session statistics for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Clear all multicast session statistics.

<Sysname> reset session statistics multicast

Related commands

display session statistics multicast

reset session table

Use reset session table to clear IP unicast session entries.

Syntax

In standalone mode:

reset session table [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

reset session table [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears unicast session entries for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears unicast session entries for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Clear all unicast session entries.

<Sysname> reset session table

Related commands

display session table ipv4

display session table ipv6

reset session table ipv4

Use reset session table ipv4 to clear information about IPv4 unicast session entries that match specific criteria.

Syntax

In standalone mode:

reset session table ipv4 [ slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port start-source-port [ end-source-port ] ] [ destination-port start-destination-port [ end-destination-port ] ] [ vpn-instance vpn-instance-name ]

In IRF mode:

reset session table ipv4 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port start-source-port [ end-source-port ] ] [ destination-port start-destination-port [ end-destination-port ] ] [ vpn-instance vpn-instance-name ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

source-ip source-ip: Specifies a source IPv4 address. The source-ip argument specifies the source IPv4 address of a unicast session from the initiator to the responder.

destination-ip destination-ip: Specifies a destination IPv4 address. The destination-ip argument specifies the destination IPv4 address of a unicast session from the initiator to the responder.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv4 transport layer protocol, including DCCP, ICMP, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

source-port start-source-port [ end-source-port ]: Specifies a source port or source port range for a unicast session. The start-source-port argument specifies the start source port. The end-source-port argument specifies the end source port. The value ranges for the start-source-port and end-source-port arguments are both 0 to 65535.

destination-port start-destination-port [ end-destination-port ]: Specifies a destination port or destination port range for a unicast session. The start-destination-port argument specifies the start destination port. The end-destination-port argument specifies the end destination port. The value ranges for the start-destination-port and end-destination-port arguments are both 0 to 65535.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you want to clear IPv4 unicast session entries on the public network, do not specify this option.

Usage guidelines

If you do not specify any parameters, this command clears all IPv4 unicast session entries on the public network.

Examples

# Clear all IPv4 unicast session entries.

<Sysname> reset session table ipv4

# Clear the IPv4 unicast session entries with the source IP address of 10.10.10.10.

<Sysname> reset session table ipv4 source-ip 10.10.10.10

Related commands

display session table ipv4

reset session table ipv6

Use reset session table ipv6 to clear information about IPv6 unicast session entries that match the specified criteria.

Syntax

In standalone mode:

reset session table ipv6 [ slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port start-source-port [ end-source-port ] ] [ destination-port start-destination-port [ end-destination-port ] ] [ vpn-instance vpn-instance-name ]

In IRF mode:

reset session table ipv6 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port start-source-port [ end-source-port ] ] [ destination-port start-destination-port [ end-destination-port ] ] [ vpn-instance vpn-instance-name ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

source-ip source-ip: Specifies a source IPv6 address. The source-ip argument specifies the source IPv6 address of a unicast session from the initiator to the responder.

destination-ip destination-ip: Specifies a destination IPv6 address. The destination-ip argument specifies the destination IPv6 address of a unicast session from the initiator to the responder.

protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv6 transport layer protocol, including DCCP, ICMPv6, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

source-port start-source-port [ end-source-port ]: Specifies a source port or source port range for an IPv6 unicast session. The start-source-port argument specifies the start source port. The end-source-port argument specifies the end source port. The value ranges for the start-source-port and end-source-port arguments are both 0 to 65535.

destination-port start-destination-port [ end-destination-port ]: Specifies a destination port or destination port range for an IPv6 unicast session. The start-destination-port argument specifies the start destination port. The end-destination-port argument specifies the end destination port. The value ranges for the start-destination-port and end-destination-port arguments are both 0 to 65535.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you want to clear IPv6 unicast session entries on the public network, do not specify this option.

Usage guidelines

If you do not specify any parameters, this command clears all IPv6 unicast session entries on the public network.

Examples

# Clear all IPv6 unicast session entries.

<Sysname> reset session table ipv6

# Clear the IPv6 unicast session entries with the source IP address of 2011::0002.

<Sysname> reset session table ipv6 source-ip 2011::0002

Related commands

display session table ipv6

reset session table multicast

Use reset session table multicast to clear IP multicast session entries.

Syntax

In standalone mode:

reset session table multicast [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

reset session table multicast [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears multicast session entries for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears multicast session entries for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

Examples

# Clear all multicast session entries.

<Sysname> reset session table multicast

Related commands

display session table multicast ipv4

display session table multicast ipv6

reset session table multicast ipv4

Use reset session table multicast ipv4 to clear information about IPv4 multicast session entries that match specific criteria.

Syntax

In standalone mode:

reset session table multicast ipv4 [ slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port source-port ] [ destination-port destination-port ] [ vpn-instance vpn-instance-name ]

In IRF mode:

reset session table multicast ipv4 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port source-port ] [ destination-port destination-port ] [ vpn-instance vpn-instance-name ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

source-ip source-ip: Specifies a source IPv4 address. The source-ip argument specifies the source IPv4 address of a multicast session from the initiator to the responder.

destination-ip destination-ip: Specifies a destination IPv4 address. The destination-ip argument specifies the destination IPv4 address of a multicast session from the initiator to the responder.

protocol { dccp | icmp | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv4 transport layer protocol, including DCCP, ICMP, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a multicast session from the initiator to the responder. The value range for the source-port argument is 0 to 65535.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a multicast session from the initiator to the responder. The value range for the destination-port argument is 0 to 65535.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you want to clear IPv4 multicast session entries on the public network, do not specify this option.

Usage guidelines

If you do not specify any parameters, this command clears all IPv4 multicast session entries on the public network.

Examples

# Clear all IPv4 multicast session entries.

<Sysname> reset session table multicast ipv4

# Clear the IPv4 multicast session entries with the source IP address of 10.10.10.10.

<Sysname> reset session table multicast ipv4 source-ip 10.10.10.10

Related commands

display session table multicast ipv4

reset session table multicast ipv6

Use reset session table multicast ipv6 to clear information about IPv6 multicast session entries that match specific criteria.

Syntax

In standalone mode:

reset session table multicast ipv6 [ slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port source-port ] [ destination-port destination-port ] [ vpn-instance vpn-instance-name ]

In IRF mode:

reset session table multicast ipv6 [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ source-ip source-ip ] [ destination-ip destination-ip ] [ protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite } ] [ source-port source-port ] [ destination-port destination-port ] [ vpn-instance vpn-instance-name ]

Views

User view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command clears information for all cards. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on a member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command clears information for all cards. (In IRF mode.)

cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs are available on the specified slot.

source-ip source-ip: Specifies a source IPv6 address. The source-ip argument specifies the source IPv6 address of a multicast session from the initiator to the responder.

destination-ip destination-ip: Specifies a destination IPv6 address. The destination-ip argument specifies the destination IPv6 address of a multicast session from the initiator to the responder.

protocol { dccp | icmpv6 | raw-ip | sctp | tcp | udp | udp-lite }: Specifies an IPv6 transport layer protocol, including DCCP, ICMPv6, Raw IP, SCTP, TCP, UDP, and UDP-Lite.

source-port source-port: Specifies a source port by its number. The source-port argument specifies the source port of a multicast session from the initiator to the responder. The value range for the source-port argument is 0 to 65535.

destination-port destination-port: Specifies a destination port by its number. The destination-port argument specifies the destination port of a multicast session from the initiator to the responder. The value range for the destination-port argument is 0 to 65535.

vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you want to clear IPv6 multicast session entries on the public network, do not specify this option.

Usage guidelines

If you do not specify any parameters, this command clears all IPv6 multicast session entries on the public network.

Examples

# Clear all IPv6 multicast session entries.

<Sysname> reset session table multicast ipv6

# Clear the IPv6 multicast session entries with the source IP address of 2011::0002.

<Sysname> reset session table multicast ipv6 source-ip 2011::0002

Related commands

display session table multicast ipv6

session aging-time application

Use session aging-time application to set the aging time for sessions of an application layer protocol or an application.

Use undo session aging-time application to restore the default. If you do not specify an application layer protocol or an application, this command restores the default aging time for all sessions of the supported application layer protocols and applications.

Syntax

session aging-time application application-name time-value

undo session aging-time application [ application-name ]

Default

The aging time is 1200 seconds for sessions of application layer protocols or applications except for the following sessions:

·     BOOTPC sessions: 120 seconds.

·     BOOTPS sessions: 120 seconds.

·     DNS sessions: 30 seconds.

·     FTP sessions: 3600 seconds.

·     FTP-DATA sessions: 240 seconds.

·     GPRS-DATA sessions: 60 seconds.

·     GPRS-SIG sessions: 60 seconds.

·     GTP-CONTROL sessions: 60 seconds.

·     GTP-USER sessions: 60 seconds.

·     H.225 sessions: 3600 seconds.

·     H.245 sessions: 3600 seconds.

·     HTTPS sessions: 600 seconds.

·     ILS sessions: 3600 seconds.

·     L2TP sessions: 120 seconds.

·     MGCP-CALLAGENT sessions: 60 seconds.

·     MGCP-GATEWAY sessions: 60 seconds.

·     NETBIOS-DGM sessions: 3600 seconds.

·     NETBIOS-NS sessions: 3600 seconds.

·     NETBIOS-SSN sessions: 3600 seconds.

·     NTP sessions: 120 seconds.

·     PPTP sessions: 3600 seconds.

·     QQ sessions: 120 seconds.

·     RAS sessions: 300 seconds.

·     RIP sessions: 120 seconds.

·     RSH sessions: 60 seconds.

·     RTSP session: 3600 seconds.

·     SCCP sessions: 3600 seconds.

·     SIP sessions: 300 seconds.

·     SNMP sessions: 120 seconds.

·     SNMPTRAP sessions: 120 seconds.

·     SQLNET sessions: 600 seconds.

·     STUN sessions: 600 seconds.

·     SYSLOG sessions: 120 seconds.

·     TACACS-DS sessions: 120 seconds.

·     TFTP sessions: 60 seconds.

·     WHO sessions: 120 seconds.

·     XDMCP sessions: 3600 seconds.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

application-name: Specifies an application layer protocol or an application by its name, a case-insensitive string of 1 to 63 characters. Valid characters can be digits, letters, hyphens (-), and underscores (_). The names invalid and other are not allowed. The application layer protocol or application must exist on the device.

time-value: Specifies the aging time in seconds. The value range 1 to 100000.

Usage guidelines

This command sets the aging time for stable sessions of the specified application layer protocols or applications. For TCP sessions, the stable state is ESTABLISHED. For UDP sessions, the stable state is READY.

For sessions of application layer protocols or applications that are not supported by this command, the aging time is set by the session aging-time state command. For persistent sessions, the aging time is set by the session persistent acl command.

Supported application layer protocols or applications specified in this command depend on the APR module. For information about APR, see Security Configuration Guide.

Examples

# Set the aging time for FTP sessions to 1800 seconds.

<Sysname> system-view

[Sysname] session aging-time application ftp 1800

# Set the aging time for 126WebEmail sessions to 1800 seconds.

<Sysname> system-view

[Sysname] session aging-time application 126WebEmail 1800

Related commands

display session aging-time application

nbar application

port-mapping

session aging-time state

session persistent acl

session aging-time state

Use session aging-time state to set the aging time for the sessions in a protocol state.

Use undo session aging-time state to restore the default for the sessions in a protocol state. If you do not specify a protocol state, this command restores all aging time for sessions in different protocol states to the default.

Syntax

session aging-time state { fin | icmp-reply | icmp-request | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | syn | tcp-close | tcp-est | tcp-time-wait | udp-open | udp-ready } time-value

undo session aging-time state [ fin | icmp-reply | icmp-request | icmpv6-reply | icmpv6-request | rawip-open | rawip-ready | syn | tcp-close | tcp-est | tcp-time-wait | udp-open | udp-ready ]

Default

The aging time for sessions in different protocol states is as follows:

·     FIN_WAIT: 30 seconds.

·     ICMP-REPLY: 30 seconds.

·     ICMP-REQUEST: 60 seconds.

·     ICMPv6-REPLY: 30 seconds.

·     ICMPv6-REQUEST: 60 seconds.

·     RAWIP-OPEN: 30 seconds.

·     RAWIP-READY: 60 seconds.

·     TCP SYN-SENT and SYN-RCV: 30 seconds.

·     TCP-CLOSE: 2 seconds.

·     TCP ESTABLISHED: 3600 seconds.

·     TCP TIME-WAIT: 2 seconds.

·     UDP-OPEN: 30 seconds.

·     UDP-READY: 60 seconds.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

fin: Specifies the TCP FIN_WAIT state.

icmp-reply: Specifies the ICMP REPLY state.

icmp-request: Specifies the IGMP REQUEST state.

icmpv6-reply: Specifies the ICMPv6 REPLY state.

icmpv6-request: Specifies the IGMPv6 REQUEST state.

rawip-open: Specifies the RAWIP-OPEN state.

rawip-ready: Specifies the RAWIP-READY state.

syn: Specifies the TCP SYN-SENT and SYN-RCV states.

tcp-close: Specifies the TCP CLOSE state.

tcp-est: Specifies the TCP ESTABLISHED state.

tcp-time-wait: Specifies the TCP TIME-WAIT state.

udp-open: Specifies the UDP OPEN state.

udp-ready: Specifies the UDP READY state.

time-value: Specifies the aging time in seconds. For the TCP CLOSE and TCP TIME-WAIT states, the value range is 0 to 100000. For other states, the value range is 1 to 100000. If the device is installed with service modules that support hardware fast forwarding, the value range is 0 to 63 for the TCP CLOSE state.

Usage guidelines

This command sets the aging time for stable sessions of the application layer protocols that are not supported by the session aging-time application command. For persistent sessions, the aging time is set by the session persistent acl command.

Examples

# Set the aging time for TCP sessions in SYN-SENT and SYN-RCV states to 60 seconds.

<Sysname> system-view

[Sysname] session aging-time state syn 60

Related commands

display session aging-time state

session aging-time application

session persistent acl

session alarm rate-abrupt enable

Use session alarm rate-abrupt enable to enable alarms for abrupt session creation rate changes.

Use undo session alarm rate-abrupt enable to disable alarms for abrupt session creation rate changes.

Syntax

session alarm rate-abrupt enable

undo session alarm rate-abrupt enable

Default

Alarms are disabled for abrupt session creation rate changes.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Non-default vSystems do not support this command.

This command enables the device to generate alarms for abrupt increase or drop in the session creation rate when the alarm thresholds for abrupt session creation rate changes are crossed.

Examples

# Enable alarms for abrupt session creation rate changes.

<Sysname> system-view

[Sysname] session alarm rate-abrupt enable

Related commands

session alarm rate-abrupt threshold

session alarm rate-abrupt threshold

Use session alarm rate-abrupt threshold to set the alarm thresholds for abrupt session creation rate changes.

Use undo session alarm rate-abrupt threshold to restore the default.

Syntax

session alarm rate-abrupt threshold threshold-value [ base-threshold base-value ]

undo session alarm rate-abrupt threshold

Default

The session creation rate change threshold is 20%, and the base session creation rate threshold is 10%.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

threshold-value: Sets the session creation rate change threshold in percentage. The value range for this argument is 1 to 100.

base-threshold base-value: Sets the base session creation rate threshold in percentage. The value range for this argument is 1 to 100. If you do not specify this option, the default setting applies.

Usage guidelines

Non-default vSystems do not support this command.

With alarms enabled for abrupt session creation rate changes, the system collects the session creation rate at an interval of 10 seconds and checks whether the following indicators reach the corresponding alarm thresholds:

·     Session creation rate change in percentage—Obtained by dividing the difference between the session creation rates at the beginning and end of a collection interval by the session creation rate at the beginning of the collection interval.

·     Base session creation rate in percentage—Obtained by dividing the session creation rate at the beginning of a collection interval by 100000.

If both of the following conditions are met in a detection interval, the system generates an alarm for the abrupt change of the session creation rate:

·     The session creation rate change threshold is reached.

·     The base session creation rate threshold is crossed.

Examples

# Set the session creation rate change threshold to 30%.

<Sysname> system-view

[Sysname] session alarm rate-abrupt threshold 30

Related commands

session alarm rate-abrupt enable

session alarm try-rate-abrupt enable

Use session alarm try-rate-abrupt enable to enable alarms for abrupt session attempt rate changes.

Use undo session alarm try-rate-abrupt enable to disable alarms for abrupt session attempt rate changes.

Syntax

session alarm try-rate-abrupt enable

undo session alarm try-rate-abrupt enable

Default

Alarms are disabled for abrupt session attempt rate changes.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Non-default vSystems do not support this command.

This command enables the device to generate alarms for abrupt increase or drop in the session creation attempt rate when the alarm thresholds for abrupt session attempt rate changes are reached.

Examples

# Enable alarms for abrupt session attempt rate changes.

<Sysname> system-view

[Sysname] session alarm try-rate-abrupt enable

Related commands

session alarm try-rate-abrupt threshold

session alarm try-rate-abrupt threshold

Use session alarm try-rate-abrupt threshold to set the alarm thresholds for abrupt session attempt rate changes.

Use undo session alarm try-rate-abrupt threshold to restore the default.

Syntax

session alarm try-rate-abrupt threshold threshold-value [ base-threshold base-value ]

undo session alarm try-rate-abrupt threshold

Default

The session attempt rate change threshold is 20%, and the base session attempt rate threshold is 10%.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

threshold-value: Sets the session attempt rate change threshold in percentage. The value range for this argument is 1 to 100.

base-threshold base-value: Sets the base session attempt rate threshold in percentage. The value range for this argument is 1 to 100. If you do not specify this option, the default setting applies.

Usage guidelines

Non-default vSystems do not support this command.

With alarms enabled for abrupt session attempt rate changes, the system collects the session creation attempt rate at an interval of 10 seconds and checks whether the following indicators reach the corresponding alarm thresholds:

·     Session attempt rate change in percentage—Obtained by dividing the difference between the session creation attempt rates at the beginning and end of a collection interval by the session creation attempt rate at the beginning of the collection interval.

·     Base session attempt rate in percentage—Obtained by dividing the session creation attempt rate at the beginning of a collection interval by 100000.

If both of the following conditions are met in a detection interval, the system generates an alarm for the abrupt change of the session creation attempt rate:

·     The session attempt rate change threshold is reached.

·     The base session attempt rate threshold is crossed.

Examples

# Set the session attempt rate change threshold to 30%.

<Sysname> system-view

[Sysname] session alarm try-rate-abrupt threshold 30

Related commands

session alarm try-rate-abrupt enable

session alarm usage-abrupt enable

Use session alarm usage-abrupt enable to enable alarms for abrupt session table usage changes.

Use undo session alarm usage-abrupt enable to disable alarms for abrupt session table usage changes.

Syntax

session alarm usage-abrupt enable

undo session alarm usage-abrupt enable

Default

Alarms are disabled for abrupt session table usage changes.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Non-default vSystems do not support this command.

This command enables the device to generate alarms for abrupt increase or drop in the session table usage when the alarm thresholds for abrupt session table usage changes are reached.

Examples

# Enable alarms for abrupt session table usage changes.

<Sysname> system-view

[Sysname] session alarm usage-abrupt enable

Related commands

session alarm usage-abrupt threshold

session alarm usage-abrupt threshold

Use session alarm usage-abrupt threshold to set the alarm thresholds for abrupt session table usage changes.

Use undo session alarm usage-abrupt threshold to restore the default.

Syntax

session alarm usage-abrupt threshold threshold-value [ base-threshold base-value ]

undo session alarm usage-abrupt threshold

Default

The session table usage change threshold is 20%, and the base session table usage threshold is 10%.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

threshold-value: Sets the session table usage change threshold in percentage. The value range for this argument is 1 to 100.

base-threshold base-value: Sets the base session table usage threshold in percentage. The value range for this argument is 1 to 100. If you do not specify this option, the default setting applies.

Usage guidelines

Non-default vSystems do not support this command.

With alarms enabled for abrupt session table usage changes, the system collects the session table usage at an interval of 10 seconds and checks whether the following indicators reach the corresponding alarm thresholds:

·     Session table usage change in percentage—Obtained by dividing the difference between the session entry counts at the beginning and end of a collection interval by the session entry count at the beginning of the collection interval.

·     Base session table usage in percentage—Obtained by dividing the session entry count at the beginning of a collection interval by the supported maximum number of session entries.

If both of the following conditions are met in a detection interval, the system generates an alarm for the abrupt change of the session table usage:

·     The session table usage change threshold is reached.

·     The base session table usage threshold is crossed.

Examples

# Set the session table usage change threshold to 30%.

<Sysname> system-view

[Sysname] session alarm usage-abrupt threshold 30

Related commands

session alarm usage-abrupt enable

session alarm-log enable

Use session alarm-log enable to enable session usage alarm logging.

Use undo session alarm-log to disable session usage alarm logging.

Syntax

session alarm-log enable

undo session alarm-log enable

Default

Session usage alarm logging is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

Enable session usage alarm logging for the device to send alarm logs for crossing of the session entry usage alarm threshold, relation entry usage alarm threshold, and deny session entry usage alarm threshold.

Examples

# Enable session usage alarm logging.

<Sysname> system-view

[Sysname] session alarm-log enable

Related commands

session usage threshold

session relation-table-usage threshold

session fast-drop-usage threshold

session alg fragment

Use session alg fragment to enable ALG to process IP fragments and TCP segments.

Use undo session alg fragment to disable ALG from processing IP fragments and TCP segments.

Syntax

session alg fragment sip

undo session alg fragment sip

Default

ALG does not process IP fragments and TCP segments.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

sip: Specifies IP fragments and TCP segments .

Usage guidelines

Operating mechanism

This command enables ALG to process IP fragments and TCP segments of specified protocols. In the current software version, ALG can process only IP fragments and TCP segments of SIP.

Restrictions and guidelines

Non-default vSystems do not support this command.

ALG does not process TCP segments of NAT-processed packets.

Examples

# Enable ALG to process IP fragments and TCP segments of SIP.

<Sysname> system

[Sysname] session alg fragment sip

session dual-active create-mode

Use session dual-active create-mode to set the session creation mode when the device is operating in session dual-active mode.

Use undo session dual-active create-mode to restore the default.

Syntax

session dual-active create-mode { hash | local }

undo session dual-active create-mode

Default

Local-based session creation is used in session dual-active mode.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

hash: Specifies hash-based session creation.

local: Specifies local-based session creation.

Usage guidelines

Non-default vSystems do not support this command.

This feature takes effect only in session dual-active mode.

In a hot backup system operating in session dual-active mode, both devices process services. To balance the service load on the devices, you can use one of the following session creation modes:

·     Hash-based session creation—A session is created on the device to which its first packet is relayed according to the hash result. The device where a session is created might not be the device that receives the traffic. This mode applies if traffic is unevenly distributed among the devices.

·     Local-based session creation—A session is created on the device where the first packet of the session arrives. This mode applies if traffic is evenly distributed among the devices.

Examples

# Enable hash-based session creation when the device is operating in session dual-active mode.

<Sysname> system-view

[Sysname] session dual-active create-mode hash

Related commands

session dual-active enable

session dual-active enable

Use session dual-active enable to enable session dual-active mode.

Use undo session dual-active enable to disable session dual-active mode.

Syntax

session dual-active enable

undo session dual-active enable

Default

Session dual-active mode is disabled. The device is operating in session active/standby mode.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Non-default vSystems do not support this command.

In a hot backup system operating in session active/standby mode, only one device processes security services. Session dual-active mode increases load capacity of the system by enabling both devices to process security services.

Examples

# Enable session dual-active mode.

<Sysname> system-view

[Sysname] session dual-active enable

Related commands

session synchronization enable

session dual-active transparent udp enable

Use session dual-active transparent udp enable to enable transparent transmission for UDP packets in session dual-active mode.

Use undo session dual-active transparent udp enable to disable transparent transmission for UDP packets in session dual-active mode.

Syntax

session dual-active transparent udp enable

undo session dual-active transparent udp enable

Default

Transparent transmission for UDP packets is disabled in session dual-active mode.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Application scenarios

In a hot backup system operating in session dual-active mode, a device cannot identify the direction of packets in a UDP traffic flow due to UDP mechanisms. By default, if the return packets of a session do not match any sessions, the device creates a new session. This results in the following issues:

·     If the security control policy permits a UDP traffic flow in one direction, the return packets of the flow are dropped.

·     If the security control policy permits a UDP traffic flow in both directions, two sessions are created for the flow. This affects traffic processing of security services.

To resolve these issues, you can enable transparent transmission for UDP packets. This feature allows a device to relay UDP packets that do not match any sessions to the other device in the hot back system. If the UDP packets also do not match any sessions on the other device, a new session is created locally.

As a best practice, enable this feature only when asymmetric UDP traffic exists in the hot backup system and sessions cannot be synchronized timely. This feature degrades forwarding performance. Make sure you are fully aware of the impact of this feature when you use it on a live network.

Prerequisite

This feature takes effect only in session dual-active mode.

Operating mechanism

Transparent transmission for UDP packets takes effect only when local-based session creation is used. If hash-based session creation is used, the devices do not relay UDP packets.

Restrictions and guidelines

Non-default vSystems do not support this command.

Examples

# Enable transparent transmission for UDP packets in session dual-active mode.

<Sysname> system-view

[Sysname] session dual-active transparent udp enable

Related commands

session dual-active enable

session fast-drop aging-time

Use session fast-drop aging-time to set the aging time for deny sessions.

Use undo session fast-drop aging-time to restore the default.

Syntax

session fast-drop aging-time time-value

undo session fast-drop aging-time

Default

The aging time for deny sessions is 3 seconds.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

time-value: Specifies the aging time in seconds. The value range 1 to 3.

Usage guidelines

Non-default vSystems do not support this command.

The system deletes deny sessions based on the deny session aging time. The deny session aging time is not refreshed when packets match deny sessions.

Examples

# Set the aging time for deny sessions to 1 second.

<Sysname> system-view

[Sysname] session fast-drop aging-time 1

Related commands

session fast-drop aspf enable

session fast-drop enable

Use session fast-drop enable to enable the deny session feature for modules.

Use undo session fast-drop enable to disable the deny session feature for modules.

Syntax

session fast-drop { aspf | connection-limit } * enable

undo session fast-drop { aspf | connection-limit } * enable

Default

The deny session feature is disabled.

Views

System view

Parameters

aspf: Specifies the ASPF module.

connection-limit: Specifies the connection limit module.

Predefined user roles

network-admin

context-admin

Usage guidelines

Operating mechanism

The deny session feature allows the device to create sessions for dropped packets. These sessions are called deny sessions. To improve forwarding performance, the device drops all packets that match deny sessions.

Restrictions and guidelines

Non-default vSystems do not support this command.

The device generates deny sessions only for the packets dropped by the ASPF or connection limit module.

Examples

# Enable the deny session feature for ASPF.

<Sysname> system-view

[Sysname] session fast-drop aspf enable

Related commands

display session fast-drop table ipv4

display session fast-drop table ipv6

session fast-drop hardware-fast-forwarding

Use session fast-drop hardware-fast-forwarding to enable hardware fast forwarding for deny sessions.

Use undo session fast-drop hardware-fast-forwarding to disable hardware fast forwarding for deny sessions.

Syntax

session fast-drop hardware-fast-forwarding

undo session fast-drop hardware-fast-forwarding

Default

Hardware fast forwarding for deny sessions is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Operating mechanism

This feature enables the device to issue deny session entries to chips and perform fast packet dropping based on those entries.

Prerequisite

This feature takes effect only when both the deny session and hardware fast forwarding features are enabled. For more information about hardware fast forwarding, see Layer 3—IP Services Configuration Guide.

Recommended configuration

As a best practice, disable hardware fast forwarding for deny sessions only when you troubleshoot problems for forwarding chips.

Restrictions and guidelines

Non-default vSystems do not support this command.

Examples

# Enable hardware fast forwarding for deny sessions.

<Sysname> system

[Sysname] session fast-drop hardware-fast-forwarding

Relate commands

hardware fast-forwarding enable (Layer 3—IP Services Command Reference)

session fast-drop enable

session fast-drop resource-ratio

Use session fast-drop resource-ratio to set the maximum ratio of deny sessions to all sessions.

Use undo session fast-drop resource-ratio to restore the default.

Syntax

session fast-drop resource-ratio ratio

undo session fast-drop resource-ratio

Default

The maximum ratio of deny sessions to all sessions is 50‰.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

ratio: Specifies the maximum ratio of deny sessions to all sessions, in permillage. The value range for this argument is 1 to 100.

Usage guidelines

Non-default vSystems do not support this command.

When the ratio of deny session entries reaches the maximum ratio set by using this command, the device stops generating deny sessions.

Examples

# Set the maximum ratio of deny sessions to all sessions to 1‰.

<Sysname> system-view

[Sysname] session fast-drop resource-ratio 1

Related commands

session fast-drop aspf enable

session fast-drop top-statistics enable

Use session fast-drop top-statistics enable to enable the top deny session statistics feature.

Use undo session fast-drop top-statistics enable to disable the top deny session statistics feature.

Syntax

session fast-drop top-statistics enable

undo session fast-drop top-statistics enable

Default

The top deny session statistics feature is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Non-default vSystems do not support this command.

This command collects the number of deny sessions for session-based services and ranks the deny sessions by source address and by destination address.

To display the top deny session statistics, use the display session fast-drop top-statistics command.

Examples

# Enable the top deny session statistics feature.

<Sysname> system-view

[Sysname] session fast-drop top-statistics enable

Related commands

display session fast-drop top-statistics

session fast-drop enable

session fast-drop-usage threshold

Use session fast-drop-usage threshold to set the deny session entry usage alarm threshold.

Use undo session fast-drop-usage threshold to restore the default.

Syntax

session fast-drop-usage threshold threshold-value

undo session fast-drop-usage threshold

Default

The deny session entry usage alarm threshold is 95%.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

threshold-value: Sets the deny session entry usage alarm threshold in percentage. The value range is 1 to 99.

Usage guidelines

Operating mechanism

This command enables the device to send alarms when the deny session entry usage exceeds or drops below the alarm threshold.

Prerequisite

For the device to send alarm logs for crossing of the deny session entry usage alarm threshold, enable session usage alarm logging by using the session alarm-log enable command.

Restrictions and guidelines

Non-default vSystems do not support this command.

Examples

# Set the deny session entry usage alarm threshold to 80%.

<Sysname> system-view

[Sysname] session fast-drop-usage threshold 80

Related commands

session alarm-log enable

session flow-redirect enable

Use session flow-redirect enable to enable session flow redirection.

Use undo session flow-redirect enable to disable session flow redirection.

Syntax

session flow-redirect enable

undo session flow-redirect enable

Default

Session flow redirection is disabled. Flows are redirected by OpenFlow entries.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Operating mechanism

This feature ensures that packets and return packets of a data flow can be correctly processed when they are forwarded to different security modules. After this feature is enabled, the system immediately synchronizes the session information created for the packets to the security module where return packets are processed. When the sessions for packets are deleted, the synchronized session information in other security modules will be deleted accordingly.

Typically, the system uses OpenFlow entries for packet forwarding to ensure that packets and return packets of a data flow can be processed in the same security module. The number of OpenFlow entries supported by the device is limited. When the upper limit is reached, packets and return packets of a data flow might be forwarded to different security modules, which causes packet processing failures. To resolve this problem, disable OpenFlow entry generation on service modules and enable session flow redirection.

Restrictions and guidelines

For this feature to take effect, make sure the OpenFlow entry generation by service modules is disabled. For information about disabling OpenFlow entry generation by service modules, see configuration guides of related service modules.

Restrictions and guidelines

Non-default vSystems do not support this command.

When both session flow redirection and hardware fast forwarding are enabled, the device does not issue session entries to hardware chips of security modules. As a result, hardware fast forwarding does not take effect on security modules. To use hardware fast forwarding and session flow redirection together, you must also enable hardware fast forwarding for session flow redirection by using the session flow-redirect hardware-fast-forwarding command. For information about hardware fast forwarding, see fast forwarding in Layer 3IP Services Configuration Guide.

Examples

# Enable session flow redirection.

<Sysname> system-view

[Sysname] session flow-redirect enable

Related commands

display session table ipv4

display session table ipv6

session flow-redirect hardware-fast-forwarding

undo nat flow-redirect all (NAT Command Reference)

session flow-redirect hardware-fast-forwarding

Use session flow-redirect hardware-fast-forwarding to enable hardware fast forwarding for session flow redirection.

Use undo session flow-redirect hardware-fast-forwarding to disable hardware fast forwarding for session flow redirection.

Syntax

session flow-redirect hardware-fast-forwarding

undo session flow-redirect hardware-fast-forwarding

Default

Hardware fast forwarding is disabled for session flow redirection.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Operating mechanism

This command enables the device to issue the session entry created for the first packet of a flow to hardware chips to speed up forwarding of subsequent traffic of the flow.

Prerequisite

This command takes effect only when both session flow redirection and hardware fast forwarding are enabled. For more information about hardware fast forwarding, see Layer 3—IP Services Configuration Guide.

You can disable hardware fast forwarding when you troubleshoot problems on hardware chips.

Restrictions and guidelines

Non-default vSystems do not support this command.

Examples

# Enable hardware fast forwarding for session flow redirection.

<Sysname> system-view

[Sysname] session flow-redirect hardware-fast-forwarding

Related commands

hardware fast-forwarding enable (Layer 3—IP Services Command Reference)

session flow-redirect enable

session ip-top-count enable

Use session ip-top-count enable to enable the top IPv4 session statistics feature.

Use undo session ip-top-count enable to disable the top IPv4 session statistics feature.

Syntax

session ip-top-count enable

undo session ip-top-count enable

Default

The top IPv4 session statistics feature is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

This command enables the device to collect the number of IPv4 sessions for session-based services based on the session creation rate and the number of concurrent sessions, and rank the sessions by source address and by destination address.

To view the ranking results, log in to the device management page through the Web interface.

Examples

# Enable the top IPv4 session statistics feature.

<Sysname> system-view

[Sysname] session ip-top-count enable

Relate commands

session ip-top-count policy

session ip-top-count policy

Use session ip-top-count policy to enter top IPv4 session statistics policy view.

Syntax

session ip-top-count policy

Default

No configuration exists in top IPv4 session statistics policy view.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

If you specify a source or destination IPv4 address for a top session statistics policy, the system collects statistics for only IPv4 sessions that match the specified address. If you do not specify any source or destination IPv4 address, the system collects statistics for all sessions.

Examples

# Enter top IPv4 session statistics policy view.

<Sysname> system-view

[Sysname] session ip-top-count policy

Related commands

display session ip-top-count policy

source-ip

destination-ip

session ipv6-top-count enable

Use session ipv6-top-count enable to enable the top IPv6 session statistics feature.

Use undo session ipv6-top-count enable to disable the top IPv6 session statistics feature.

Syntax

session ipv6-top-count enable

undo session ipv6-top-count enable

Default

The top IPv6 session statistics feature is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

This command enables the device to collect the number of IPv6 sessions for session-based services based on the session creation rate and the number of concurrent sessions, and rank the sessions by source address and by destination address.

To view the ranking results, log in to the device management page through the Web interface.

Examples

# Enable the top IPv6 session statistics feature.

<Sysname> system-view

[Sysname] session ipv6-top-count enable

Related commands

session ipv6-top-count policy

session ipv6-top-count policy

Use session ipv6-top-count policy to enter top IPv6 session statistics policy view.

Syntax

session ipv6-top-count policy

Default

No configuration exists in top IPv6 session statistics policy view.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

If you specify a source or destination IPv6 address for a top session statistics policy, the system collects statistics for only IPv6 sessions that match the specified address. If you do not specify any source or destination IPv6 address, the system collects statistics for all sessions.

Examples

# Enter top IPv6 session statistics policy view.

<Sysname> system-view

[Sysname] Session ipv6-top-count policy

Related commands

display session ipv6-top-count policy

source-ip

destination-ip

session log { bytes-active | packets-active }

Use session log { bytes-active | packets-active } to set a threshold for traffic-based logging.

Use undo session log { bytes-active | packets-active } to restore the default.

Syntax

session log { bytes-active bytes-value | packets-active packets-value }

undo session log { bytes-active | packets-active }

Default

No threshold is set for traffic-based logging.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

bytes-value: Specifies the byte-based threshold in the range of 1 to 100000 MB.

packets-value: Specifies the packet-based threshold in the range of 1 to 100000 mega-packets.

Usage guidelines

Operating mechanism

If you set both the traffic-based and time-based logging, the device outputs a session log when whichever is reached. After outputting a session log, the device resets the traffic counter and restarts the interval for the session.

If you execute this command multiple times, the most recent configuration takes effect.

Prerequisite

For this command to take effect, make sure the session statistics collection for software fast forwarding feature is enabled.

Examples

# Configure the device to output session logs on a per-10-mega-packet basis.

<Sysname> system-view

[Sysname] session statistics enable

[Sysname] session log packets-active 10

Related commands

session log enable

session statistics enable

session log enable

Use session log enable to enable session logging.

Use undo session log enable to disable session logging.

Syntax

session log enable { ipv4 | ipv6 } [ acl acl-number ] { inbound | outbound }

undo session log enable { ipv4 | ipv6 } [ acl acl-number ] { inbound | outbound }

Default

Session logging is disabled.

Views

Interface view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

ipv4: Logs IPv4 sessions.

ipv6: Logs IPv6 sessions.

acl acl-number: Specifies an ACL by its number in the range of 2000 to 3999. If you do not specify an ACL, this command enables session logging for all IPv4 or IPv6 sessions on the interface.

inbound: Specifies the inbound direction.

outbound: Specifies the outbound direction.

Usage guidelines

Operating mechanism

If you do not specify the inbound or the outbound keyword, this command enables session logging on both directions.

A maximum of one IPv4 ACL and one IPv6 ACL can be applied to each direction.

After session logging is enabled, the device outputs session logs as follows:

·     Outputs a session log when the specified traffic threshold or interval is reached.

·     Outputs a session log when a session entry is created or removed only if the logging for session creation or deletion is enabled.

Prerequisite

The session logging feature must work with the flow log or fast log output feature to generate session logs. Session logs can be output in flow log or fast log output format. By default, they are output in flow log format. For information about flow log and fast log output, see Network Management and Monitoring.

Examples

# Enable IPv4 session logging in the inbound direction of GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] session log flow-begin

[Sysname] session log flow-end

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] session log enable ipv4 inbound

# Enable session logging on GigabitEthernet 1/0/2 for IPv4 sessions that match ACL 2050 in the outbound direction.

<Sysname> system-view

[Sysname] session log flow-begin

[Sysname] session log flow-end

[Sysname] interface gigabitethernet 1/0/2

[Sysname-GigabitEthernet1/0/2] session log enable ipv4 acl 2050 outbound

# Enable session logging on GigabitEthernet 1/0/3 for IPv6 sessions that match ACL 2050 in the outbound direction.

<Sysname> system-view

[Sysname] session log flow-begin

[Sysname] session log flow-end

[Sysname] interface gigabitethernet 1/0/3

[Sysname-GigabitEthernet1/0/3] session log enable ipv6 acl 2050 outbound

Related commands

session log bytes-active

session log flow-begin

session log flow-end

session log packets-active

session log time-active

session log flow-begin

Use session log flow-begin to enable logging for session creation.

Use undo session log flow-begin to disable logging for session creation.

Syntax

session log flow-begin

undo session log flow-begin

Default

Logging for session creation is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

For the device to output a session log when a session entry is created, make sure both session logging and logging for session creation are enabled.

Examples

# Enable logging for session creation.

<Sysname> system-view

[Sysname] session log flow-begin

Related commands

session log enable

session log flow-end

Use session log flow-end to enable logging for session deletion.

Use undo session log flow-end to disable logging for session deletion.

Syntax

session log flow-end

undo session log flow-end

Default

Logging for session deletion is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

For the device to output a session log when a session entry is deleted, make sure both session logging and logging for session deletion are enabled.

Examples

# Enable logging for session deletion.

<Sysname> system-view

[Sysname] session log flow-end

Related commands

session log enable

session log time-active

Use session log time-active to set the time-based session logging.

Use undo session log time-active to restore the default.

Syntax

session log time-active time-value

undo session log time-active

Default

The device does not output session logs.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

time-value: Specifies the interval in minutes. The value range for the time-value argument is 10 to 120 and the value must be integer times of 10.

Usage guidelines

If you set both time-based and traffic-based logging, the device outputs a session log when whichever is reached. After outputting a session log, the device resets the traffic counter and restarts the interval for the session.

Examples

# Configure the device to output session logs every 50 minutes.

<Sysname> system

[Sysname] session log time-active 50

Related commands

session log enable

session log { bytes-active | packets-active }

session log with-endtime

Use session log with-endtime to configure the session end time field for session creation logs and active session logs.

Use undo session log with-endtime to restore the default.

Syntax

session log with-endtime

undo session log with-endtime

Default

The session end time field is empty for session creation logs and active session logs.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

Non-default vSystems do not support this command.

This feature fills in the session end time field with the session creation time for sessions not aged out.

Examples

# Configure the session end time field for session creation logs and active session logs.

<Sysname> system-view

[Sysname] session log with-endtime

session persistent acl

Use session persistent acl to specify persistent sessions.

Use undo session persistent acl to restore the default.

Syntax

session persistent acl [ ipv6 ] acl-number [ aging-time time-value ]

undo session persistent acl [ ipv6 ] acl-number

Default

No persistent sessions exist.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

ipv6: Specifies an IPv6 ACL. To specify an IPv4 ACL, do not specify this keyword.

acl-number: Specifies an ACL by its number in the range of 2000 to 3999.

aging-time time-value: Specifies the aging time for persistent sessions in hours. The value range for the time-value argument is 0 to 360, and the default value is 24. To disable the aging for persistent sessions, set the value to 0.

Usage guidelines

This command is effective only on TCP sessions in ESTABLISHED state.

For a TCP session in ESTABLISHED state, the priority of the aging time is as follows:

·     Aging time for persistent sessions.

·     Aging time for sessions of application layer protocols.

·     Aging time for sessions in different protocol states.

A persistent session is not removed until one of the following events occurs:

·     The session entry ages out.

·     The device receives a connection close request from the initiator or responder.

·     You manually clear the session entries.

The configuration of persistent sessions applies only to new sessions. It has no effect on existing sessions.

Repeat this command to use multiple ACLs to specify persistent sessions.

Examples

# Specify IPv4 ACL 2000 for identifying persistent sessions and set the aging time to 72 hours.

<Sysname> system-view

[Sysname] session persistent acl 2000 aging-time 72

# Specify IPv6 ACL 3000 for identifying persistent sessions and set the aging time to 100 hours.

<Sysname> system-view

[Sysname] session persistent acl ipv6 3000 aging-time 100

Related commands

session aging-time application

session aging-time state

session relation-table aging-time application sunrpc

Use session relation-table aging-time application sunrpc to set the aging time for SUNRPC session relation entries.

Use undo session relation-table aging-time application to restore the default.

Syntax

session relation-table aging-time application sunrpc time-value

undo session relation-table aging-time application [ sunrpc ]

Default

The aging time for SUNRPC session relation entries is 115200 seconds.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

time-value: Specifies the aging time for SUNRPC session relation entries, in the range of 1 to 259200 seconds.

sunrpc: Restores the aging time for SUNRPC session relation entries to the default value. If you do not specify this keyword, the command restores the aging time for all protocol session relation entries to the default value.

Usage guidelines

If no traffic matches a session relation entry during the aging time, the session relation entry will age automatically.

Examples

# Set the aging time for SUNRPC session relation entries to 14400 seconds.

<Sysname> system-view

[Sysname] session relation-table aging-time application sunrpc 14400

Related commands

display session relation-table aging-time application

session relation-table match destination-ip sip enable

Use session relation-table match destination-ip sip enable to enable destination address matching for SIP relation entries.

Use undo session relation-table match destination-ip sip enable to disable destination address matching for SIP relation entries.

Syntax

session relation-table match destination-ip sip enable

undo session relation-table match destination-ip sip enable

Default

Destination address matching is disabled for SIP relation entries.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

In an SIP network, data traffic does not match destination addresses when matching the relation table entries. In this case, if a client is to access multiple servers through multiple outbound interfaces, incorrect match of the relation entries might cause the traffic to be forwarded incorrectly.

This feature requires the data traffic to match the destination addresses when matching the relation entries, which helps to forward traffic correctly.

Examples

# Enable destination address matching for SIP relation entries.

<Sysname> system-view

[Sysname] session relation-table match destination-ip sip enable

session relation-table-usage threshold

Use session relation-table-usage threshold to set the relation entry usage alarm threshold.

Use undo session relation-table-usage threshold to restore the default.

Syntax

session relation-table-usage threshold threshold-value

undo session relation-table-usage threshold

Default

The relation entry usage alarm threshold is 95%.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

threshold-value: Sets the relation entry usage alarm threshold in percentage. The value range is 1 to 99.

Usage guidelines

Operating mechanism

This command enables the device to send alarms when the relation entry usage exceeds or drops below the alarm threshold.

Prerequisite

For the device to send alarm logs for crossing of the relation entry usage alarm threshold, enable session usage alarm logging by using the session alarm-log enable command.

Restrictions and guidelines

Non-default vSystems do not support this command.

Examples

# Set the relation entry usage alarm threshold to 80%.

<Sysname> system-view

[Sysname] session relation-table-usage threshold 80

Related commands

session alarm-log enable

session state-machine mode

Use session state-machine mode to set the mode of session state machine.

Use undo session state-machine mode to restore the default.

Syntax

session state-machine mode { compact | loose }

undo session state-machine mode

Default

The session state machine is in strict mode.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

compact: Specifies compact mode.

loose: Specifies loose mode.

Usage guidelines

Application scenarios

When asymmetric-path traffic exists in a hot backup system operating in session active/standby mode, set the mode of session state machine to loose to avoid abnormal traffic loss.

When asymmetric-path traffic exists in a hot backup system operating in session dual-active mode, set the mode of session state machine to compact for disconnected sessions to age out timely.

Recommended configuration

As a best practice, change the mode of session state machine only when asymmetric-path traffic exists. This feature degrades performance of session-based security check. Make sure you are fully aware of the impact of this command when you use it on a live network.

Operating mechanism

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the mode of session state machine to loose.

<Sysname> system-view

[Sysname] session state-machine mode loose

session statistics enable

Use session statistics enable to enable session statistics collection for software fast forwarding.

Use undo session statistics enable to disable session statistics collection for software fast forwarding.

Syntax

session statistics enable

undo session statistics enable

Default

Session statistics collection is disabled for software fast forwarding.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

This command enables the device to collect the session-based outbound and inbound packets and bytes for software fast forwarding.

To display statistics per session, use the display session table command. To display statistics per packet type, use the display session statistics command.

This command does not take effect on packets processed by hardware fast forwarding. To collect statistics of packets processed by hardware fast forwarding, use the session statistics hardware-fast-forwarding command to enable statistics collection for hardware fast forwarding. For information about fast forwarding, see Layer 3—IP Services Configuration Guide.

This command is CPU and memory intensive. Before using this command, make sure you fully understand its impact on system performance.

Examples

# Enable session statistics collection for software fast forwarding.

<Sysname> system-view

[Sysname] session statistics enable

Related commands

display session statistics

display session table

session statistics hardware-fast-forwarding

session statistics hardware-fast-forwarding

Use session statistics hardware-fast-forwarding to enable session statistics collection and set the logging threshold for hardware fast forwarding.

Use undo session statistics hardware-fast-forwarding to disable session statistics collection for hardware fast forwarding.

Syntax

session statistics hardware-fast-forwarding { bytes-active

 bytes-value | packets-active packets-value }

undo session statistics hardware-fast-forwarding { bytes-active | packets-active }

Default

Session statistics collection is disabled for hardware fast forwarding.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

bytes-active: Specifies a byte-based threshold.

bytes-value: Byte-based threshold value, in the range of 1 to 100000. The default unit is MB.

packets-active packets-value: Specifies the packet-based threshold in the range of 1 to 100000 mega-packets.

Usage guidelines

Operating mechanism

This command enables the device to collect the packets processed by hardware fast forwarding for the session and other service modules. The session and other service modules will use the collected statistics for more accurate statistics collection.

When you execute this command multiple times, the most recent configuration takes effect.

Restrictions and guidelines

When you configure the following commands together, make sure you have specified the same type of logging threshold:

·     session statistics hardware-fast-forwarding { bytes-active | packets-active }.

·     session log { bytes-active | packets-active }.

Examples

# Enable session statistics collection and set the logging threshold to 10 MB for hardware fast forwarding.

<Sysname> system-view

[Sysname] session statistics hardware-fast-forwarding bytes-active 10

session synchronization { dns | http } *

Use session synchronization { dns | http } * to enable session synchronization for DNS, HTTP, or both.

Use undo session synchronization { dns | http } * to disable session synchronization for DNS, HTTP, or both.

Syntax

session synchronization { dns | http } *

undo session synchronization { dns | http } *

Default

Session synchronization is disabled for DNS and HTTP.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

dns: Specifies the DNS protocol.

http: Specifies the HTTP protocol.

Usage guidelines

Application scenarios

DNS or HTTP connections usually do not last long. When a DNS or HTTP connection is terminated because of an active/standby switchover, the client will immediately reinitiate a connection request. The connection exception is barely noticed.

DNS and HTTP sessions do not require session synchronization except for the following conditions:

·     Users are aware that the current HTTP or DNS sessions will last for a long time.

·     HTTP or DNS session backup is required.

For this command to take effect, you must also configure the session synchronization enable command.

Restrictions and guidelines

This command takes effect only on sessions of the application protocols HTTP and DNS. Sessions of other application protocols will be backed up if the session synchronization enable command is configured.

Non-default vSystems do not support this command.

Examples

# Enable session synchronization for stateful failover, and enable session synchronization for HTTP.

<Sysname> system-view

[Sysname] session synchronization enable

[Sysname] session synchronization http

Related commands

session synchronization enable

session synchronization enable

Use session synchronization enable to enable session synchronization for stateful failover.

Use undo session synchronization enable to disable session synchronization for stateful failover.

Syntax

session synchronization enable [ asymmetric ]

undo session synchronization enable

Default

Session synchronization for stateful failover is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

asymmetric: Specifies asymmetric traffic. If you do not specify this keyword, this command supports only symmetric traffic.

Usage guidelines

Feature compatibility

This command cannot be used together with the hot-backup enable command. For information about the hot-backup enable command, see RBM in High Availability Command Reference.

Application scenarios

In a network that has asymmetric traffic, heavy service traffic might cause service delay or service unavailable because sessions cannot be backed up timely. For example, one device forwards the TCP SYN packets, and another device forwards its ACK packets. If the session tables of the two devices are not synchronized, the TCP packets will be dropped because of state error. To resolve this issue, use the session synchronization enable asymmetric command.

Operating mechanism

This features enables the master and backup devices to synchronize sessions and dynamic entries of session-based services.

Restrictions and guidelines

Non-default vSystems do not support this command.

Examples

# Enable session synchronization for stateful failover.

<Sysname> system-view

<Sysname> session synchronization enable

# Enable session synchronization for both symmetric and asymmetric traffic.

<Sysname> system-view

<Sysname> session synchronization enable asymmetric

Related commands

hot-backup enable (High Availability Command Reference)

 

session table-state-backup enable

Use session table-state-backup enable to enable session table state backup.

Use undo session table-state-backup enable to disable session table state backup.

Syntax

session table-state-backup enable

undo session table-state-backup enable

Default

Session table state backup is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

With session table state backup enabled, if the session table state reaches steady state, the device will synchronize the session table state to the standby session to address the interruption caused by simultaneous aging and active device failure. After the session table state is backed up, the standby session can switch to steady state and process traffic when the active device fails.

Examples

# Enable session table state backup.

<Sysname> system

[Sysname] session table-state-backup enable

Related commands

session synchronization enable

session top-statistics enable

Use session top-statistics enable to enable the top session statistics feature.

Use undo session top-statistics enable to disable the top session statistics feature.

Syntax

session top-statistics enable

undo session top-statistics enable

Default

The top session statistics feature is disabled.

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

This command collects the number of sessions for session-based services and ranks the sessions by source address and by destination address.

To display the top session statistics, use the display session top-statistics command.

Examples

# Enable the top session statistics feature.

<Sysname> system-view

[Sysname] session top-statistics enable

Related commands

display session top-statistics

session usage threshold

Use session usage threshold to set the session entry usage alarm threshold.

Use undo session usage threshold to restore the default.

Syntax

session usage threshold threshold-value

undo session usage threshold

Default

The session entry usage alarm threshold is 95%.

Views

System view

Predefined user roles

network-admin

context-admin

Parameters

threshold-value: Sets the session entry usage alarm threshold in percentage. The value range is 1 to 99.

Usage guidelines

Operating mechanism

This command enables the device to send alarms when the session entry usage exceeds or drops below the alarm threshold.

Prerequisite

For the device to send alarm logs for crossing of the session entry usage alarm threshold, enable session usage alarm logging by using the session alarm-log enable command.

Restrictions and guidelines

Non-default vSystems do not support this command.

Examples

# Set the session entry usage alarm threshold to 90%.

<Sysname> system-view

[Sysname] session usage threshold 90

Related commands

session alarm-log enable

source-ip

Use source-ip to specify a source IP address matching criterion in a top session statistics policy.

Use undo source-ip to delete a source IP address matching criterion from a top session statistics policy.

Syntax

Top IPv4 session statistics policy view:

source-ip subnet subnet-ip-address mask-length

undo source-ip

Top IPv6 session statistics policy view:

source-ip subnet subnet-ipv6-address prefix-length

undo source-ip

Default

No source IP address matching criterion is specified.

Views

Top IPv4 session statistics policy view

Top IPv6 session statistics policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

subnet subnet-ipv4-address mask-length: Specifies an IPv4 subnet address and its mask. The mask value is in the range of 16 to 32.

subnet subnet-ipv6-address prefix-length: Specifies an IPv6 subnet address and its prefix. The prefix value is in the range of 96 to 128.

Usage guidelines

With this feature configured, the system collects only statistics for sessions that match the specified source IP address.

You can configure only one source subnet address matching criterion for a top session statistics policy for IPv4 or IPv6 sessions. If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Specify source IP address 10.1.0.0/16 in a top session statistics policy.

[Sysname] session ip-top-count policy

[Sysname-session-ip-top-count-policy] destination-ip  subnet 10.1.0.0 16

Related commands

session ip-top-count policy

session ipv6-top-count policy

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us