Verifying Session Establishment On LAN Traffic

Purpose

Verify if, in this example configuration, sessions are established when traffic is transmitted on interfaces with the firewall filter bypass-flow-filter.

Action

To verify if selective stateless packet-based services are working, you check if internal traffic bypasses flow-based forwarding and no sessions are established. To verify if sessions are established, you perform the following tasks:

  1. On device R1, enter the operational mode command clear security flow session all in the CLI to clear all existing security flow sessions.
  2. On device R0, enter the operational mode command ping in the CLI to transmit traffic to device Master-VR.
  3. On device R1, with traffic transmitting from devices R0 through R1, enter the operational mode command show security flow session in the CLI.

Note: To verify established sessions, make sure to enter the show security flow session command while the ping command is sending and receiving packets.

Sample Output


user@R0> ping 1.1.1.1
PING 1.1.1.1 (1.1.1.1): 56 data bytes
64 bytes from 1.1.1.1: icmp_seq=0 ttl=63 time=2.208 ms
64 bytes from 1.1.1.1: icmp_seq=1 ttl=63 time=2.568 ms
64 bytes from 1.1.1.1: icmp_seq=2 ttl=63 time=2.573 ms
64 bytes from 1.1.1.1: icmp_seq=3 ttl=63 time=2.310 ms
64 bytes from 1.1.1.1: icmp_seq=4 ttl=63 time=1.566 ms
64 bytes from 1.1.1.1: icmp_seq=5 ttl=63 time=1.569 ms
...

user@R1>show security flow session
0 sessions displayed

Meaning

The output shows traffic transmitting from R0 to Master-VR and no sessions are established. In this example, you applied the bypass-flow-filter with the packet-mode action modifier on interfaces ge-0/0/0 and lt-0/0/0.0 for your company’s LAN traffic. This output verifies that the traffic between the two interfaces is correctly bypassing flow-based forwarding and hence no sessions are established.

Related Topics

For more information about the show security flow session command, see the Junos OS CLI Reference.

For information about the ping command, see the Junos OS Administration Guide for Security Devices or the Junos System Basics Configuration Guide.