-
show security flow session session-identifier
-
session-identifier
- <node ( node-id | all | local
| primary)>
Command introduced in Release 8.5 of JUNOS software; node options added in Release 9.0 of JUNOS software.
Display detailed information about the session with this identifier.
This command is supported on J-series and SRX-series devices.
session-identifier —Identifier of the session about which to display information.
node—(Optional) For chassis cluster configurations, display session information about the sessions with this identifier on a specific node.
view
clear security flow session session-identifier
Table 45 lists the output fields for the show security flow session session-identifier command. Output fields are listed in the approximate order in which they appear.
Table 45: show security flow session session-identifier Output Fields
user@host> show
security flow session session-identifier 36
Session ID: 36, Status: Normal, Flag: 0x8094540
Virtual system: Root VSYS(I), Policy name: foo/4
Maximum timeout: 1800, Current timeout: 1646
Start time: 61995, Duration: 158
In: 10.10.10.1/4923 --> 3.3.3.2/23;tcp,
Interface: t1-1/0/0.0,
Session token: 0x12, Flag: 0x8094530
Route: 0x70010, Gateway: 10.10.10.0, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0, Cookie: 0,
Out: 3.3.3.2/23 --> 10.10.10.1/4923;tcp,
Interface: .local..0,
Session token: 0x4, Flag: 0x8094530
Route: 0xfffb0006, Gateway: 3.3.3.2, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0, Cookie: 0,
1 sessions displayed
user@host> show
security flow session session-identifier 2218
Session ID: 2218, Status: Normal, Flag: 0x8094660
Virtual system: Root VSYS(I), Policy name: foo/4
Maximum timeout: 60, Current timeout: 60
Start time: 0, Duration: 0
Client: MGCP ALG, Group: 2047, Resource: 8188
In: 12.0.102.26/28072 --> 11.0.101.236/23252;udp,
Interface: ge-0/0/2.0,
Session token: 0xa, Flag: 0x8094740
Route: 0xb0010, Gateway: 12.0.102.26, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0, Cookie: 0,
Out: 11.0.101.236/23252 --> 12.0.102.26/28072;udp,
Interface: ge-0/0/1.0,
Session token: 0x8, Flag: 0x8094740
Route: 0xa0010, Gateway: 11.0.101.236, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0, Cookie: 0,
1 sessions displayed
user@host> show
security flow session session-identifier 33
Session ID: 33, Status: Normal, Flag: 0x80a15f0
Virtual system: Root VSYS(I), Policy name: default-policy/2
Application: junos-ftp/1
Maximum timeout: 1800, Current timeout: 1492
Start time: 31128, Duration: 121
In: 10.10.10.1/2851 --> 192.168.0.2/21;tcp,
Interface: t1-1/0/0.0,
Session token: 0x6, Flag: 0x80a15e0
Route: 0x60010, Gateway: 10.10.10.0, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0, Cookie: 0,
Out: 192.168.0.2/21 --> 10.10.10.1/2851;tcp,
Interface: ge-0/0/1.0,
Session token: 0x6, Flag: 0x80a15e0
Route: 0x90010, Gateway: 192.168.0.2, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0, Cookie: 0,
1 sessions displayed
user@host> show
security flow session session-identifier 1 node primary
node0:
--------------------------------------------------------------------------
Session ID: 1, Status: Normal, State: Active
Flag: 0x40
Virtual system: root, Policy name: sfw1/4
Maximum timeout: 60, Current timeout: 60
Start time: 472, Duration: 142
In: 1.1.1.2/2000 --> 11.11.1.2/40000;udp,
Interface: reth0.1,
Session token: 0xa, Flag: 0x1
Route: 0x1bfb01, Gateway: 1.1.1.2, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0,
Out: 11.11.1.2/40000 --> 1.1.1.2/2000;udp,
Interface: reth1.1,
Session token: 0x12, Flag: 0x0
Route: 0x1b9b01, Gateway: 11.11.1.2, Tunnel: 0
Port sequence: 0, FIN sequence: 0,
FIN state: 0,
1 sessions displayed