[Session Table Information Menu] cip - Show all session entries with source IP address cip6 - Show all session entries with source IP6 address cport - Show all session entries with source port dip - Show all session entries with destination IP address dip6 - Show all session entries with destination IP6 address dport - Show all session entries with destination port pip - Show all session entries with proxy IP address pport - Show all session entries with proxy port filter - Show all session entries with matching filter flag - Show all session entries with matching flag port - Show all session entries with ingress port real - Show all session entries with real IP address sp - Show all session entries on sp hip - Show all session entries with host IP address hip6 - Show all session entries with host IP6 address dump - Show all session entries help - Session entry description |
Command Syntax and Usage | |
---|---|
cip <IP address> | |
Displays all session entries with client’s source IP address. | |
cip6 <IP6_address> | |
Display session entries with the specified IPv6 address. | |
cport <real port> | |
Displays all session entries with source (client) port. | |
dip <Destination IP address> | |
Displays all session entries with the destination IP address. | |
dip6 <IP6_address> | |
Display session entries with the specified IPv6 address. | |
dport <Destination real port> | |
Displays all session entries with destination port. | |
pip [v4|v6] <Proxy IP address> | |
Displays all session entries with proxy IP address. | |
pport <proxy port> | |
Displays all session entries with proxy port. | |
filter <filter ID (1-2048)> | |
Displays all session entries with matching filter. | |
flag <Ac|Au|Acc|B|Dci|Dcy|Dcn|Dsi|Dsy|Dsn|E|I|L|N|P|S|Sc|Rd|Rm|Rr|Rt |Ru|Ri|Vi|Vs|Vr|Vm|Vd|U|W|Sn|SnD|SnS|SnN]> | |
Displays all session entries with matching flag. For a sample output and description of these statistics, see Session Dump Information. | |
port <port number> | |
Displays all session entries on the ingress port. | |
real [v4|v6] <IP address> | |
Displays all session entries with real server IP address. | |
sp <port number (1-4)> | |
Displays all session entries on the processor. | |
hip <IP address> | |
Displays all session entries with specified host IP address. Note: The hip IP address is used only for the HTTP proxy addition and removal command. | |
hip6 <IP6_address> | |
Display session entries with the specified host IPv6 address. | |
dump [v4|v6][sp <sp_num>][cip <v4_addr>|cip6 <v6_addr>][cport <port_num>][dip <v4_addr>|dip6 <v6_addr>][dport <port_num>][rip <v4_addr>|rip6 <v6_addr>][rport <port_num>][pip <v4_addr>|pip6 <v6_addr>][pport <port_num>][filt <filter_num>] [port <ingress_port>][flag <Ac|Au|E|L|N|P|S|Acc|B||Sc|Rt|Ru|Ri|Vi|Vr|Vs|Vm|Vd| U|W|Sn|SnD|SnS|SnN>][anyip <v4_addr>|anyip6 <v6_addr>][wandir <inbound|outbound>] | |
Displays session entries filtered by specified parameters. If no parameters are specified it displays all session entries. In a session entry dump, information similar to the following displays: 3, 01: 1.1.1.1 4586, 2.2.2.1 https -> 1.1.1.2 3567 3.3.3.1 https age 6 f:10 EUSPT c (1) (2) (3) (4) (5) (6) (7a) (7) (8) (9) (10) (11) (12) (13) The fields 1 through 13 in this example are described in Session Dump Information. For a set of more session entry dumps, see Session Dump Examples. | |
help | |
Displays the description of the session entry. |
Field | Description |
---|---|
(1) SP number | Indicates the Switch Processor (SP) number that created the session. |
(2) Ingress port | Shows the physical port through which the client traffic enters Alteon. |
(3) Source IP address | Contains the source IP address from the client’s IP packet in IPv4 or IPv6. |
(4) Source port | Identifies the source port from the client’s TCP/UDP packet. |
(5) Destination IP address | Identifies the destination IP address from the client’s TCP/UDP packet. |
(6) Destination port | Identifies the destination port from client’s TCP/UDP packet. |
(7a) Proxy IP address | Contains the proxy IP address substituted by Alteon. This field contains the real server IP address of the corresponding server that Alteon selects to forward the client packet to for load balancing. If Alteon does not find a live server, this field contains the same information as the destination IP address mentioned in field (5). This field also shows the real server IP address for filtering. No address is shown if the filter action is Allow, Deny or NAT. It will show “ALLOW”, “DENY”, or “NAT” instead. |
(7) Proxy Port | Identifies the TCP/UDP source port substituted by Alteon. |
(8) Real Server IP Address | For load balancing, this field contains the IP address of the real server to which Alteon selects to forward a client packet. If Alteon does not find a live server, this field is the same as destination IP address (as in row 5). For example: 3,01: 1.1.1.1 1040, 2.2.2.1 https -> 3.3.3.1 https age 10 3,01: 1.1.1.1 6970, 2.2.2.1 rtsp -> 2.2.2.1 21220 age 10 P For filtering, this field also shows the real server IP address. No address is shown if the filter action is Allow, Deny or NAT. It will show ALLOW, DENY or NAT instead. For example: 3,01: 1.1.1.1 1040, 2.2.2.1 https -> 3.3.3.1 https age 10 f:11 2,07: 1.1.1.1 1706, 2.2.2.1 https-> 192.168.4.10 linklb age 8 f:10 E |
(9) Server port | This field is the same as the destination port (field 6) for load balancing, except for the RTSP UDP session. For RTSP UDP session, this server port is obtained from the client-server negotiation. This field is the filtering application port for filtering. It is for internal use only. This field can be urlwcr, wcr, idslb, linkslb or nonat. |
(10) Age | This is the session timeout value. If no packet is received within the value specified, the session is freed. For example, if you define Age 10, then the session is aged out in 10 minutes. If your define Age 160, then the session is aged out in 160 minutes. The < symbol for the session entry indicates that slowage is used. The user can configure slowage by using the command /cfg/slb/adv/slowage. When the holddown is not triggered, the session age value starts with total-time-windows, and is decremented by one second until zero, then resets to the next total-time-windows value. When the holddown is triggered, the session age starts with (holddur * 2), and is decremented after every X minutes, where X = 2 * 2 ^ slowage. |
(11) Filter number | Indicates the session created by the filtering code as a result of the IP header keys matching the filtering criteria. |
(12) VLAN number | This field is the ingress port’s VLAN. |
(13) Flag | The list of flags includes: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
(14) Persistent session user count | This counter indicates the number of client sessions created to associate with this persistent session. |
Session | Session Entry Dump |
---|---|
L4 HTTP | 3,01: 172.21.12.19 1040, 39.2.2.1 https -> 47.81.24.79 https age 4 |
L4-L7 WCR HTTP | 2,16: 172.21.8.200 44687, 172.21.8.51 https -> 192.168.1.11 wcr age 4 f:12 E 3,01: 172.21.12.19 1040, 39.2.2.1 https -> 47.81.24.79 urlwcr age 6 f:123 E |
RTSP L4-L7 RTSP | The first session is RTSP TCP control connection. The second session is RTSP UDP data connection. 3,01: 172.21.12.19 4586, 39.2.2.1 rtsp -> 47.81.144.13 rtsp age 10 EU 3,01: 172.21.12.19 6970, 39.2.2.1 21220 -> 47.81.144.13 21220 age 10 P During client-server port negotiation, the destination port shows “rtsp” and server port shows “0”. 3,01: 172.21.12.19 6970, 39.2.2.1 rtsp-> 47.81.144.13 0 age 10 P |
L7 WCR RTSP | 3,01: 172.21.12.19 4586, 39.2.2.1 rtsp -> 47.81.144.13 urlwcr age 10 f:100 EU 3,01: 172.21.12.19 6970, 39.2.2.1 21220 -> 47.81.144.13 21220 age 10 P |
Filtering LinkLB | 2,07: 10.0.1.26 1706, 205.178.14.84 https -> 192.168.4.10 linklb age 8 f:10 E |
FTP | 1,00: 172.31.4.215 80, 172.31.4.200 0 172.31.3.11 age 8 EP c:1 1,09: 172.31.4.215 4098, 172.31.4.200 ftp ->172.31.3.20 ftp age 10 EU 1,09: 172.31.4.215 4102, 172.31.4.200 ftp-data ->172.31.3.20 ftp-data age 10 E |
NAT | 2,05: 172.21.8.16 2559, 10.0.1.26 https NAT age 2 f:24 E |
Persistent session | The destination port, real server IP and server port are not shown for persistent session. 3,00: 0xa476b182, 82.122.141.249 82.122.200.156 age 4 EPS c:3 Note: Refere to the info/slb/cookie command to decode the hexadecimal value to get the IP address |