Kommandoen gir oversikt over sesjoner. Her havner trafikk som går gjennom brannmurregler.
diag sys session list
Eksempel på output:
session info: proto=6 proto_state=65 expire=14 timeout=3600 flags=00000000 sockflag=00000000 sockport=0 av_idx=0 use=4 bandwidth=0/sec guaranteed_bandwidth=0/sec traffic=0/sec prio=0 ha_id=0 hakey=23015 tunnel=/ state=redir local may_dirty ndr statistic(bytes/packets/err): org=1306/6/0 reply=1542/5/0 tuples=3 orgin->sink: org pre->post, reply pre->post dev=9->3/3->9 gwy=195.1.208.57/192.168.10.101 hook=post dir=org act=snat 192.168.10.101:3914->213.180.79.130:80(195.1.208.62:36370) hook=pre dir=reply act=dnat 213.180.79.130:80->195.1.208.62:36370(192.168.10.101:3914) hook=post dir=reply act=noop 213.180.79.130:80->192.168.10.101:3914(0.0.0.0:0) pos/(before,after) 0/(0,0), 0/(0,0) misc=20000 policy_id=1 auth_info=0 ids=0xcac41e78 vd=0 serial=000b259e tos=ff/ff app=0 session info: proto=6 proto_state=65 expire=14 timeout=3600 flags=00000000 sockflag=00000000 sockport=0 av_idx=0 use=4 bandwidth=0/sec guaranteed_bandwidth=0/sec traffic=0/sec prio=0 ha_id=0 hakey=23015 tunnel=/ state=redir local may_dirty ndr statistic(bytes/packets/err): org=1511/7/0 reply=2755/6/0 tuples=3 orgin->sink: org pre->post, reply pre->post dev=9->3/3->9 gwy=195.1.208.57/192.168.10.101 hook=post dir=org act=snat 192.168.10.101:3915->213.180.79.130:80(195.1.208.62:36371) hook=pre dir=reply act=dnat 213.180.79.130:80->195.1.208.62:36371(192.168.10.101:3915) hook=post dir=reply act=noop 213.180.79.130:80->192.168.10.101:3915(0.0.0.0:0) pos/(before,after) 0/(0,0), 0/(0,0) misc=20000 policy_id=1 auth_info=0 ids=0xcac41e78 vd=0 serial=000b259f tos=ff/ff app=0
Kommandoen kan gi mye output. Dette kan begrenses ved å bruke filter:
diag sys session filter <option>
<option> kan være:
clear | clear session filter |
dport | dest port |
dst | dest IP address |
negate | inverse filter |
policy | policy ID |
proto | protocol number |
sport | source port |
src | source IP address |
vd | index of virtual domain. -1 matches all |
Eksempel. List alle med «dest port» 80:
diag sys session filter dport 80 diag sys session list