/info/slb/sess
Session Table Information
 
[Session Table Information Menu]
cip - Show all session entries with source IP address
cip6 - Show all session entries with source IP6 address
cport - Show all session entries with source port
dip - Show all session entries with destination IP address
dip6 - Show all session entries with destination IP6 address
dport - Show all session entries with destination port
pip - Show all session entries with proxy IP address
pport - Show all session entries with proxy port
filter - Show all session entries with matching filter
flag - Show all session entries with matching flag
port - Show all session entries with ingress port
real - Show all session entries with real IP address
sp - Show all session entries on sp
hip - Show all session entries with host IP address
hip6 - Show all session entries with host IP6 address
dump - Show all session entries
help - Session entry description
 
Session Information Menu Options (/info/slb/sess) 
Command Syntax and Usage
cip <IP address>
 
Displays all session entries with client’s source IP address.
cip6 <IP6_address>
 
Display session entries with the specified IPv6 address.
cport <real port>
 
Displays all session entries with source (client) port.
dip <Destination IP address>
 
Displays all session entries with the destination IP address.
dip6 <IP6_address>
 
Display session entries with the specified IPv6 address.
dport <Destination real port>
 
Displays all session entries with destination port.
pip [v4|v6] <Proxy IP address>
 
Displays all session entries with proxy IP address.
pport <proxy port>
 
Displays all session entries with proxy port.
filter <filter ID (1-2048)>
 
Displays all session entries with matching filter.
flag <Ac|Au|Acc|B|Dci|Dcy|Dcn|Dsi|Dsy|Dsn|E|I|L|N|P|S|Sc|Rd|Rm|Rr|Rt |Ru|Ri|Vi|Vs|Vr|Vm|Vd|U|W|Sn|SnD|SnS|SnN]>
 
Displays all session entries with matching flag. For a sample output and description of these statistics, see Session Dump Information.
port <port number>
 
Displays all session entries on the ingress port.
real [v4|v6] <IP address>
 
Displays all session entries with real server IP address.
sp <port number (1-4)>
 
Displays all session entries on the processor.
hip <IP address>
 
Displays all session entries with specified host IP address.
Note: The hip IP address is used only for the HTTP proxy addition and removal command.
hip6 <IP6_address>
 
Display session entries with the specified host IPv6 address.
dump [v4|v6][sp <sp_num>][cip <v4_addr>|cip6 <v6_addr>][cport <port_num>][dip <v4_addr>|dip6 <v6_addr>][dport <port_num>][rip <v4_addr>|rip6 <v6_addr>][rport <port_num>][pip <v4_addr>|pip6 <v6_addr>][pport <port_num>][filt <filter_num>] [port <ingress_port>][flag <Ac|Au|E|L|N|P|S|Acc|B||Sc|Rt|Ru|Ri|Vi|Vr|Vs|Vm|Vd| U|W|Sn|SnD|SnS|SnN>][anyip <v4_addr>|anyip6 <v6_addr>][wandir <inbound|outbound>]
 
Displays session entries filtered by specified parameters. If no parameters are specified it displays all session entries.
In a session entry dump, information similar to the following displays:
3, 01: 1.1.1.1 4586, 2.2.2.1 https -> 1.1.1.2 3567 3.3.3.1 https age 6 f:10 EUSPT c
(1) (2) (3) (4) (5) (6) (7a) (7) (8) (9) (10) (11) (12) (13)
The fields 1 through 13 in this example are described in Session Dump Information.
For a set of more session entry dumps, see Session Dump Examples.
help
 
Displays the description of the session entry.
 
Session Dump Information 
Field
Description
(1) SP number
Indicates the Switch Processor (SP) number that created the session.
(2) Ingress port
Shows the physical port through which the client traffic enters Alteon.
(3) Source IP address
Contains the source IP address from the client’s IP packet in IPv4 or IPv6.
(4) Source port
Identifies the source port from the client’s TCP/UDP packet.
(5) Destination IP address
Identifies the destination IP address from the client’s TCP/UDP packet.
(6) Destination port
Identifies the destination port from client’s TCP/UDP packet.
(7a) Proxy IP address
Contains the proxy IP address substituted by Alteon. This field contains the real server IP address of the corresponding server that Alteon selects to forward the client packet to for load balancing. If Alteon does not find a live server, this field contains the same information as the destination IP address mentioned in field (5).
This field also shows the real server IP address for filtering. No address is shown if the filter action is Allow, Deny or NAT. It will show “ALLOW”, “DENY”, or “NAT” instead.
(7) Proxy Port
Identifies the TCP/UDP source port substituted by Alteon.
(8) Real Server IP Address
For load balancing, this field contains the IP address of the real server to which Alteon selects to forward a client packet. If Alteon does not find a live server, this field is the same as destination IP address (as in row 5). For example:
3,01: 1.1.1.1 1040, 2.2.2.1 https -> 3.3.3.1 https age 10
          3,01: 1.1.1.1 6970, 2.2.2.1 rtsp -> 2.2.2.1 21220 age 10 P
For filtering, this field also shows the real server IP address. No address is shown if the filter action is Allow, Deny or NAT. It will show ALLOW, DENY or NAT instead. For example:
3,01: 1.1.1.1 1040, 2.2.2.1 https -> 3.3.3.1 https age 10 f:11
       2,07: 1.1.1.1 1706, 2.2.2.1 https-> 192.168.4.10 linklb age 8 f:10 E
(9) Server port
This field is the same as the destination port (field 6) for load balancing, except for the RTSP UDP session. For RTSP UDP session, this server port is obtained from the client-server negotiation. This field is the filtering application port for filtering. It is for internal use only. This field can be urlwcr, wcr, idslb, linkslb or nonat.
(10) Age
This is the session timeout value. If no packet is received within the value specified, the session is freed. For example, if you define Age 10, then the session is aged out in 10 minutes. If your define Age 160, then the session is aged out in 160 minutes.
The < symbol for the session entry indicates that slowage is used. The user can configure slowage by using the command /cfg/slb/adv/slowage.
When the holddown is not triggered, the session age value starts with total-time-windows, and is decremented by one second until zero, then resets to the next total-time-windows value.
When the holddown is triggered, the session age starts with (holddur * 2), and is decremented after every X minutes, where X = 2 * 2 ^ slowage.
(11) Filter number
Indicates the session created by the filtering code as a result of the IP header keys matching the filtering criteria.
(12) VLAN number
This field is the ingress port’s VLAN.
(13) Flag
The list of flags includes:
*Ac — Indicates the session is application capping per-contract entry.
*Au — Indicates the session is application capping per-user entry.
*Acc — Indicates the session has Application Services Engine processing.
*B — Indicates the session is through a back-end connection with Application Services Engine processing.
*E — Indicates the session is established and will be aged out if no traffic is received within session timeout value.
*L — Indicates the session is a link load balance session.
*N — Indicates no NAT, which means the session only translates the destination MAC when forwarding client traffic to the real server.
*P — Indicates the session is a persistent session and is not to be aged out. Fields (6), (7), and (8) cannot have persistent sessions.
*S — Indicates the session is a persistent session and the application is SSL session ID, or cookie pbind.
*Sc — Indicates the session is an opened server session used in connection pooling.
*Rd — Indicates the session is an SIP UDP rules session and is in dependent mode. Some or all dependent rules are not yet matched.
*Rm — Indicates the session is an SIP UDP rules session and is in monitor mode.
*Rr — Indicates the session is an SIP UDP rules reverse session.
*Rt — Indicates the session is TCP rate limiting for every client entry.
*Ru — Indicates UDP rate limiting for every client entry.
*Ri — Indicates the session is ICMP rate limiting per-client entry.
*Vi — Indicates the session is a SIP INVITE session.
*Vs — Indicates the session is a SIP SUBSCRIBE session.
*Vr — Indicates the session is a SIP REGISTER session.
*Vm — Indicates the session is a SIP MESSAGE session.
*Vd — Indicates the session is a SIP NAT data session.
*U — Indicates the session is Layer 7 delayed binding and Alteon is trying to open a TCP connection to the real server.
*W —  Indicates the session only translates the destination MAC when forwarding Layer 7 WCR traffic to the real server.
*Sn —  Filters all types of Smart NAT sessions (static, dynamic or no-NAT)
*SnD —  Indicates the session is a dynamic SmartNAT session.
*SnS —  Indicates the session is a static SmartNAT session.
*SnN —  Indicates the session is a no-NAT SmartNAT session.
(14) Persistent session user count
This counter indicates the number of client sessions created to associate with this persistent session.
 
Session Dump Examples 
Session
Session Entry Dump
L4 HTTP
3,01: 172.21.12.19 1040, 39.2.2.1 https -> 47.81.24.79 https age 4
L4-L7 WCR HTTP
2,16: 172.21.8.200 44687, 172.21.8.51 https -> 192.168.1.11 wcr age 4 f:12 E
3,01: 172.21.12.19 1040, 39.2.2.1 https -> 47.81.24.79 urlwcr age 6 f:123 E
RTSP
L4-L7 RTSP
The first session is RTSP TCP control connection.
The second session is RTSP UDP data connection.
3,01: 172.21.12.19 4586, 39.2.2.1 rtsp -> 47.81.144.13 rtsp age 10 EU
3,01: 172.21.12.19 6970, 39.2.2.1 21220 -> 47.81.144.13 21220 age 10 P
During client-server port negotiation, the destination port shows “rtsp” and server port shows “0”.
3,01: 172.21.12.19 6970, 39.2.2.1 rtsp-> 47.81.144.13 0 age 10 P
L7 WCR RTSP
3,01: 172.21.12.19 4586, 39.2.2.1 rtsp -> 47.81.144.13 urlwcr age 10 f:100 EU
3,01: 172.21.12.19 6970, 39.2.2.1 21220 -> 47.81.144.13 21220 age 10 P
Filtering LinkLB
2,07: 10.0.1.26 1706, 205.178.14.84 https -> 192.168.4.10 linklb age 8 f:10 E
FTP
1,00: 172.31.4.215 80, 172.31.4.200 0 172.31.3.11 age 8 EP c:1
1,09: 172.31.4.215 4098, 172.31.4.200 ftp ->172.31.3.20 ftp age 10 EU
1,09: 172.31.4.215 4102, 172.31.4.200 ftp-data ->172.31.3.20 ftp-data age 10 E
NAT
2,05: 172.21.8.16 2559, 10.0.1.26 https NAT age 2 f:24 E
Persistent session
The destination port, real server IP and server port are not shown for persistent session.
3,00: 0xa476b182, 82.122.141.249 82.122.200.156 age 4 EPS c:3
Note: Refere to the info/slb/cookie command to decode the hexadecimal value to get the IP address