[Contents] [Prev] [Next] [Index] [Report an Error]

show security flow session session-identifier

Syntax

show security flow session session-identifier
session-identifier
<node ( node-id | all | local | primary)>

Release Information

Command introduced in Release 8.5 of JUNOS software; node options added in Release 9.0 of JUNOS software.

Description

Display detailed information about the session with this identifier.

This command is supported on J-series and SRX-series devices.

Options

session-identifier —Identifier of the session about which to display information.

node—(Optional) For chassis cluster configurations, display session information about the sessions with this identifier on a specific node.

Required Privilege Level

view

Related Topics

clear security flow session session-identifier

List of Sample Output

show security flow session session-identifier 36
show security flow session session-identifier 2218
show security flow session session-identifier 33
show security flow session session-identifier 1 node primary

Output Fields

Table 45 lists the output fields for the show security flow session session-identifier command. Output fields are listed in the approximate order in which they appear.

Table 45: show security flow session session-identifier Output Fields

Field Name

Field Description

Session ID

Number that identifies the session. You can use this ID to get additional information about the session.

Status

Session status.

Flag

Internal flag depicting the state of the session, used for debugging purposes.

Virtual system

Virtual system to which the session belongs.

Policy name

Name and ID of the policy that the first packet of the session matched.

Maximum timeout

Maximum session timeout.

Current timeout

Remaining time for the session unless traffic exists in the session.

Start time

Time when the session was created, offset from the system start time.

Duration

Length of time for which the session is active.

In

For the input flow:

  • Source and destination addresses and protocol tuple for the input flow.
  • Interface: Input flow interface.
  • Session token: Internal token derived from the virtual routing instance.
  • Flag: Internal debugging flags.
  • Route: Internal next hop of the route to be used by the flow.
  • Gateway: Next-hop gateway of the flow.
  • Tunnel: If the flow is going into a tunnel, the tunnel ID. Otherwise, 0 (zero).
  • Port Sequence, FIN sequence, FIN state, Cookie: Internal TCP state tracking information.

Out

For the reverse flow:

  • Source and destination addresses, and protocol tuple for the reverse flow.
  • Interface: Reverse flow interface.
  • Session token: Internal token derived from the virtual routing instance.
  • Flag: Internal debugging flags.
  • Route: Internal next hop of the route to be used by the flow.
  • Gateway: Next-hop gateway of the flow.
  • Tunnel: If the flow is going into a tunnel, the tunnel ID. Otherwise, 0 (zero).
  • Port Sequence, FIN sequence, FIN state, Cookie: Internal TCP state tracking information.

show security flow session session-identifier 36

user@host> show security flow session session-identifier 36
Session ID: 36, Status: Normal, Flag: 0x8094540
Virtual system: Root VSYS(I), Policy name: foo/4
Maximum timeout: 1800, Current timeout: 1646
Start time: 61995, Duration: 158
   In: 10.10.10.1/4923 --> 3.3.3.2/23;tcp,
    Interface: t1-1/0/0.0,
    Session token: 0x12, Flag: 0x8094530
    Route: 0x70010, Gateway: 10.10.10.0, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0, Cookie: 0,
   Out: 3.3.3.2/23 --> 10.10.10.1/4923;tcp,
    Interface: .local..0,
    Session token: 0x4, Flag: 0x8094530
    Route: 0xfffb0006, Gateway: 3.3.3.2, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0, Cookie: 0,
1 sessions displayed

show security flow session session-identifier 2218

user@host> show security flow session session-identifier 2218
Session ID: 2218, Status: Normal, Flag: 0x8094660
Virtual system: Root VSYS(I), Policy name: foo/4
Maximum timeout: 60, Current timeout: 60
Start time: 0, Duration: 0
Client: MGCP ALG, Group: 2047, Resource: 8188
   In: 12.0.102.26/28072 --> 11.0.101.236/23252;udp,
    Interface: ge-0/0/2.0,
    Session token: 0xa, Flag: 0x8094740
    Route: 0xb0010, Gateway: 12.0.102.26, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0, Cookie: 0,
   Out: 11.0.101.236/23252 --> 12.0.102.26/28072;udp,
    Interface: ge-0/0/1.0,
    Session token: 0x8, Flag: 0x8094740
Route: 0xa0010, Gateway: 11.0.101.236, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0, Cookie: 0,
1 sessions displayed

show security flow session session-identifier 33

user@host> show security flow session session-identifier 33
Session ID: 33, Status: Normal, Flag: 0x80a15f0
Virtual system: Root VSYS(I), Policy name: default-policy/2
Application: junos-ftp/1
Maximum timeout: 1800, Current timeout: 1492
Start time: 31128, Duration: 121
   In: 10.10.10.1/2851 --> 192.168.0.2/21;tcp,
    Interface: t1-1/0/0.0,
Session token: 0x6, Flag: 0x80a15e0
    Route: 0x60010, Gateway: 10.10.10.0, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0, Cookie: 0,
   Out: 192.168.0.2/21 --> 10.10.10.1/2851;tcp,
    Interface: ge-0/0/1.0,
    Session token: 0x6, Flag: 0x80a15e0
    Route: 0x90010, Gateway: 192.168.0.2, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0, Cookie: 0,
1 sessions displayed

show security flow session session-identifier 1 node primary

user@host> show security flow session session-identifier 1 node primary
node0:
--------------------------------------------------------------------------
Session ID: 1, Status: Normal, State: Active
Flag: 0x40
Virtual system: root, Policy name: sfw1/4
Maximum timeout: 60, Current timeout: 60
Start time: 472, Duration: 142
   In: 1.1.1.2/2000 --> 11.11.1.2/40000;udp,
    Interface: reth0.1,
    Session token: 0xa, Flag: 0x1
    Route: 0x1bfb01, Gateway: 1.1.1.2, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0,
   Out: 11.11.1.2/40000 --> 1.1.1.2/2000;udp,
    Interface: reth1.1,
    Session token: 0x12, Flag: 0x0
    Route: 0x1b9b01, Gateway: 11.11.1.2, Tunnel: 0
    Port sequence: 0, FIN sequence: 0,
    FIN state: 0,
1 sessions displayed

[Contents] [Prev] [Next] [Index] [Report an Error]