This command creates a text description for a configuration context to help identify the content in the configuration file.
The no form of the command removes any description string from the context.
n/a
The shutdown command administratively disables the entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many objects must be shut down before they may be deleted. Many entities must be explicitly enabled using the no shutdown command.
Unlike other commands and parameters where the default state is not indicated in the configuration file, shutdown and no shutdown are always indicated in system-generated configuration files.
The no form of the command puts an entity into the administratively enabled state.
no shutdown
This command enables the context to create a filter log policy.
The no form of the command deletes the filter log ID. The log cannot be deleted if there are filter entries configured to write to the log. All filter entry logging associations need to be removed before the log can be deleted.
log 101
This command configures the destination for filter log entries for the specified filter log ID.
Filter logs can be sent to either memory or an existing syslog server. If the filter log destination is memory, the maximum number of entries in the log must be specified.
The no form of the command deletes the filter log association.
no destination
This command enables the context to configure log summarization. These settings apply only if syslog is the log destination.
This command defines the key of the index of the mini-table. If key information is changed while summary is in the no-shutdown state, the filter summary mini-table is flushed and reconfigured with different key information. Log packets received during the reconfiguration time will be handled as if summary was not active.
The no form of the command reverts to the default parameter.
dst-addr
This command configures a memory filter log to store log entries until full or to store the most recent log entries (circular buffer).
Specifying wrap-around configures the memory filter log to store the most recent filter log entries (circular buffer). When the log is full, the oldest filter log entries are overwritten with new entries.
The no form of the command configures the memory filter log to accept filter log entries until full. When the memory filter log is full, filter logging for the log filter ID ceases.
wrap-around
This command creates a configuration context for an IPv4 exception filter policy. After creating an exception filter ID, you can optionally assign it to a unique name with the filter-name command. The exception filter name can be used instead of the ID for exception configuration commands, show commands, monitor commands, clear commands, and port and interface association commands.
IP exception filter policies specify matching criteria that allow a packet to be an exception to where it is applied. For more information, refer to the ip-exception command in Router Interface Commands.
The IP exception filter policy is a template that can be applied to multiple router interface group encryption contexts as long as the scope of the policy is configured as template.
Any changes made to the existing policy, using any subcommands, are applied immediately to all network interfaces where the policy is applied.
The no form of the command deletes the IP exception filter policy. An exception filter policy cannot be deleted until it is removed from all network interfaces where it is applied.
This command creates a configuration context for an IPv4 filter policy. After creating a filter, you can optionally assign it a unique filter name with the filter-name command. The filter name can be used instead of the filter ID to refer to a filter for filter configuration commands, show commands, monitor commands, clear commands, and port association commands.
Filter IDs and filter names support CLI auto-completion. For more information, refer to the 7705 SAR Basic System Configuration Guide, “Entering CLI Commands”.
IP filter policies specify either a forward or a drop action for packets based on the specified match criteria.
The IP filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to multiple network ports as long as the scope of the policy is template.
Any changes made to the existing policy, using any of the subcommands, will be applied immediately to all network interfaces where this policy is applied.
The no form of the command deletes the IP filter policy. A filter policy cannot be deleted until it is removed from all network interfaces where it is applied.
This command creates a configuration context for an IPv6 filter policy. After creating a filter, you can optionally assign it a unique filter name with the filter-name command. The filter name can be used instead of the filter ID to refer to a filter for filter configuration commands, show commands, monitor commands, clear commands, and port association commands.
Filter IDs and Filter names support CLI auto-completion. For more information, refer to the 7705 SAR Basic System Configuration Guide, “Entering CLI Commands”.
IP filter policies specify either a forward or a drop action for packets based on the specified match criteria.
The IP filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to multiple network ports as long as the scope of the policy is template.
Any changes made to the existing policy, using any of the subcommands, will be applied immediately to all network interfaces where this policy is applied.
The no form of the command deletes the IP filter policy. A filter policy cannot be deleted until it is removed from all network interfaces where it is applied.
This command enables the context for a MAC filter policy. After creating a filter, you can optionally assign it a unique filter name with the filter-name command. The filter name can be used instead of the filter ID to refer to a filter for filter configuration commands, show commands, monitor commands, clear commands, and port association commands.
Filter IDs and Filter names support CLI auto-completion. For more information, refer to the 7705 SAR Basic System Configuration Guide, “Entering CLI Commands”.
The MAC filter policy specifies either a forward or a drop action for packets based on the specified match criteria.
The MAC filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to multiple services as long as the scope of the policy is template.
A MAC filter policy cannot be applied to a network interface, a VPRN service, or an IES service.
Any changes made to the existing policy, using any of the sub-commands, will be applied immediately to all services where this policy is applied.
The no form of the command deletes the MAC filter policy. A filter policy cannot be deleted until it is removed from all SAPs where it is applied.
This command enables the context for a VLAN filter policy. After creating a filter, you can optionally assign it a unique filter name with the filter-name command. The filter name can be used instead of the filter ID to refer to a filter for filter configuration commands, show commands, monitor commands, clear commands, and port association commands.
Filter IDs and Filter names support CLI auto-completion. For more information, refer to the 7705 SAR Basic System Configuration Guide, “Entering CLI Commands”.
The VLAN filter policy specifies either a forward or a drop action for packets based on the specified match criteria.
The VLAN filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to ring ports on the 2-port 10GigE (Ethernet) Adapter card and 2-port 10GigE (Ethernet) module. Each ring port can support one VLAN filter, and the same VLAN filter can be applied to both ring ports. The scope of a VLAN policy is always template.
A VLAN filter policy cannot be applied to any other type of adapter card.
Any changes made to an existing policy, using any of the sub-commands, is applied immediately to all ring ports where this policy is applied.
The no form of the command deletes the VLAN filter policy. A filter policy cannot be deleted until it is removed from all the ring ports where it is applied.
This command specifies the action to be applied to packets when the packets do not match the specified criteria in all of the IP, MAC, or VLAN filter entries of the filter.
drop
This command creates a unique name to associate with this filter. The filter name can be used instead of the filter ID to refer to a filter for filter configuration commands, show commands, monitor commands, clear commands, and port and interface association commands.
This command renumbers existing IP, MAC, VLAN, or IP exception filter entries to properly sequence filter entries.
This may be required in some cases since the software exits when the first match is found and executes the actions according to the accompanying action command. This requires that entries be sequenced correctly from most to least explicit.
This command configures the filter policy scope as exclusive or template. If the scope of the policy is template and is applied to one or more network interfaces, the scope cannot be changed.
The no form of the command sets the scope of the policy to the default of template.
template
This command creates or edits a filter entry. Multiple entries can be created using unique entry-id numbers within the filter. The 7705 SAR implementation exits the filter on the first match found and executes the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly, from most to least explicit.
Filter entry IDs support CLI auto-completion. For more information, refer to the 7705 SAR Basic System Configuration Guide, “Entering CLI Commands”.
IPv4 filter entries can specify one or more matching criteria, with one caveat. In order to support the maximum 256 entries for IPv4 filters, any entry that uses source port (src-port) and/or destination port (dst-port) ranges (lt, gt, or range keywords) as match criteria must be within the first 64 entries. See the dst-port and src-port commands for more information.
An entry might not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword are considered incomplete and are rendered inactive.
The no form of the command removes the specified entry from the filter. Entries removed from the filter are immediately removed from all entities to which that filter is applied.
n/a
This command specifies what action to take (drop or forward) when packets match the entry criteria. The action keyword must be entered for the entry to be active. If neither drop nor forward is specified, the filter action is drop.
The action forward next-hop keywords cannot be applied to multicast traffic and only apply to IPv4.
The action forward fc keywords only apply to IPv4.
Multiple action statements entered will overwrite previous action statements when defined.
The no form of the command removes the specified action statement. The filter entry is considered incomplete and is rendered inactive without the action keyword.
no action
If the next hop is not available, then a routing lookup is performed and if a match is found then the packet will be forwarded to the result of that lookup. If no match is found, then an “ICMP destination unreachable” message is send back to the origin.
There are eight forwarding classes, providing different classes of service. The forwarding classes are: nc (network control), h1 (high 1), ef (expedited forwarding), h2 (high 2), l1 (low 1), l2 (low 2), af (assured forwarding), be (best effort).
This command specifies what action to take (drop or forward) when packets match the entry criteria. The action keyword must be entered and for the entry to be active. If neither drop nor forward is specified, the filter action is drop.
Multiple action statements entered will overwrite previous action statements when defined.
The no form of the command removes the specified action statement. The filter entry is considered incomplete and is rendered inactive without the action keyword.
drop
This command enables the context to enable filter logging for a filter entry and specifies the destination filter log ID.
The filter log ID must exist before a filter entry can be enabled to use the filter log ID.
The no form of the command disables logging for the filter entry.
no log
This command enables the context to enter match criteria for the IPv4 or IP exception filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criterion (within one match statement) is configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
Protocol ID | Protocol | Description |
1 | icmp | Internet Control Message |
2 | igmp | Internet Group Management |
4 | ip | IP in IP (encapsulation) |
6 | tcp | Transmission Control |
8 | egp | Exterior Gateway Protocol |
9 | igp | Any private interior gateway |
17 | udp | User Datagram |
27 | rdp | Reliable Data Protocol |
41 | ipv6 | IPv6 |
43 | ipv6-route | Routing Header for IPv6 |
45 | idrp | Inter-Domain Routing Protocol |
46 | rsvp | Reservation Protocol |
47 | gre | General Routing Encapsulation |
58 | ipv6-icmp | ICMP for IPv6 |
59 | ipv6-no-nxt | No Next Header for IPv6 |
60 | ipv6-opts | Destination Options for IPv6 |
80 | iso-ip | ISO Internet Protocol |
88 | eigrp | EIGRP |
89 | ospf-igp | OSPFIGP |
97 | ether-ip | Ethernet-within-IP Encapsulation |
98 | encap | Encapsulation Header |
102 | pnni | PNNI over IP |
103 | pim | Protocol Independent Multicast |
112 | vrrp | Virtual Router Redundancy Protocol |
115 | l2tp | Layer Two Tunneling Protocol |
118 | stp | Schedule Transfer Protocol |
123 | ptp | Performance Transparency Protocol |
124 | isis | ISIS over IPv4 |
126 | crtp | Combat Radio Transport Protocol |
127 | crudp | Combat Radio User Datagram |
Note:
|
This command enables the context to enter match criteria for the IPv6 filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criterion (within one match statement) is configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
This command creates the context for entering/editing match criteria for the filter entry and specifies an Ethernet frame type for the entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criterion (within one match statement) is configured, then all criteria must be satisfied (AND function) before the action associated with the match will be executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
frame-type 802dot3
This command accesses the match criteria for the filter entry and specifies a match criteria. If the match criteria are satisfied, the action associated with the match criteria is executed.
Only one match criterion (within one match statement) is allowed.
The no form of the command removes the match criteria for the entry-id.
no match
This command configures a DiffServ Code Point (DSCP) name to be used as an IP filter match criterion.
The no form of the command removes the DSCP match criterion.
no dscp
This command configures a destination IPv4 address range to be used as an IP filter or IP exception filter match criterion.
To match on the destination IP address, specify the address and its associated mask; for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of the command removes the destination IP address match criterion.
n/a
This command configures a destination IPv6 address range to be used as an IP filter match criterion.
To match on the destination IP address, specify the address and prefix length; for example, 11::12/128.
The no form of the command removes the destination IP address match criterion.
n/a
This command configures a destination MAC address to be used as a MAC filter match criterion.
To match on the destination MAC address, specify the IEEE address.
The no form of the command removes the destination MAC address match criterion.
no dst-mac
This command configures a destination TCP or UDP port number or port range for an IP filter or IP exception filter match criterion.
The no form of the command removes the destination port match criterion.
n/a
lt specifies that all port numbers less than dst-port-number match
gt specifies that all port numbers greater than dst-port-number match
eq specifies that dst-port-number must be an exact match
This command configures an Ethernet type II Ethertype value to be used as a MAC filter match criterion.
The Ethernet type field is a 2-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify IPv4 packets. The Ethernet type II frame Ethertype value to be used as a match criterion can be expressed as a hexadecimal (0x0600 to 0xFFFF) or a decimal (1536 to 65535) value.
The Ethernet type field is used by the Ethernet version-II frames.
The no form of the command removes the previously entered etype field as the match criteria.
no etype
This command configures fragmented or non-fragmented IP packets as an IP filter match criterion.
The no form of the command removes the match criterion.
This command applies to IPv4 filters only.
false
This command configures matching on the ICMP code field in the ICMP header of an IPv4 or IPv6 packet as a filter match criterion, or configures matching on the ICMP code field in the ICMP header of an IPv4 packet as an exception filter match criterion.
This command applies only if the protocol match criteria specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-code
This command configures matching on the ICMP type field in the ICMP header of an IPv4 or IPv6 packet as a filter match criterion, or configures matching on the ICMP type field in the ICMP header of an IPv4 packet as an exception filter match criterion.
This command applies only if the protocol match criteria specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-type
This command configures matching packets with a specific IP option or a range of IP options in the IP header as an IP filter match criterion.
The option type octet contains three fields:
The no form of the command removes the match criterion.
This command applies to IPv4 filters only.
no ip-option
The decimal value entered for the match should be a combined value of the 8-bit option type field and not just the option number. Therefore, to match on IP packets that contain the Router Alert option (option number = 20), enter the option type of 148 (10010100).
This 8-bit mask can be entered using decimal, hexadecimal, or binary formats (see Table 73).
Format Style | Format Syntax | Example |
Decimal | DDD | 20 |
Hexadecimal | 0x | 0x14 |
Binary | 0bBBBBBBBB | 0b0010100 |
This command configures matching packets that contain more than one option field in the IP header as an IP filter match criterion.
The no form of the command removes the checking of the number of option fields in the IP header as a match criterion.
This command applies to IPv4 filters only.
no multiple-option
This command configures matching packets that contain the option field or have an option field of 0 in the IP header as an IP filter match criterion.
The no form of the command removes the checking of the option field in the IP header as a match criterion.
This command applies to IPv4 filters only.
This command configures a source IPv4 address range to be used as an IP filter or IP exception filter match criterion.
To match on the source IP address, specify the address and its associated mask; for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of the command removes the source IP address match criterion.
no src-ip
This command configures a source IPv6 address range to be used as an IP filter match criterion.
To match on the source IP address, specify the address and prefix length; for example, 11::12/128.
The no form of the command removes the source IP address match criterion.
n/a
This command configures a source MAC address to be used as a MAC filter match criterion.
The no form of the command removes the source MAC address as the match criterion.
no src-mac
This command configures a source TCP or UDP port number or port range for an IP filter or IP exception filter match criterion.
The no form of the command removes the source port match criterion.
no src-port
lt specifies that all port numbers less than src-port-number match
gt specifies that all port numbers greater than src-port-number match
eq specifies that src-port-number must be an exact match
This command configures matching on the ACK bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.
The no form of the command removes the criterion from the match entry.
no tcp-ack
This command configures matching on the SYN bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.
The SYN bit is normally set when the source of the packet wants to initiate a TCP session with the specified destination IP address.
The no form of the command removes the criterion from the match entry.
no tcp-syn
This command discards changes made to a security feature.
n/a
This command enters the mode to create or edit security features.
n/a
This command saves changes made to security features.
n/a
This command enters the context for creating an application group to be used in a security policy.
The no form of the command removes the configured application group.
n/a
This command configures a name for an application group, host group, or policer group.
The no form of the command removes the configured name.
This command configures a description for the specified application group, host group, or policer group.
n/a
This command enters the context for creating a host group to be used in a security policy.
The no form of the command removes the configured host group.
n/a
This command configures a range of hosts to be used in a host group. Up to 10 entries can be configured for a host group.
n/a
This command enters the security logging context.
n/a
This command configures the identifier for the security log. The 7705 SAR supports up to 100 security logs. This log ID can be applied at the zone level using the config>router>zone>log context or at the rule level using the config>security>policy>entry>logging context, but not to both at the same time.
The no form of the command removes the configured security group.
n/a
This command configures a description for the specified security log.
n/a
This command configures the destination location of the specified security log.
n/a
This command configures the name of the specified security log.
n/a
This command configures the logging profile to which the specified security log will match events.
n/a
This command disables logging to the specified security log. Logging is enabled by default.
The no form of this command enables logging to the specified security profile.
no shutdown
This command enables log wraparound when the maximum log size has been reached in the log destination location. When wraparound is enabled, the log starts over at 1 and overwrites the existing logs when the log size is at maximum. When wraparound is disabled, the log stops adding entries when the log size is at maximum.
The no form of this command disables log wraparound.
no wrap-around
This command configures the security logging profile.
The no form of the command removes the configured profile.
n/a
This command configures a description for this logging profile.
The no form of the command removes the configured description for this logging profile.
n/a
This command controls the generation of security log events. A log can be configured to generate all event types and events, or to generate specific event types and events. In addition, for each event type or event, one of three actions can be configured: suppress, throttle, or off. These configurations all become part of the specified logging profile. Table 74 lists the supported event types and events on 7705 SAR firewalls.
Event Type | Event |
Packet | TcpInvalidHeader DnsInvalidHeader DnsUnmatchedAnswer IcmpUnmatchedReply TcpInvalidFlagCombination TcpRst PolicyErrorFrag FragDropAction DuplicateFrag LandAttack |
Zone | NoRuleMatched SessionLimitReached |
Policy | Matched MatchedNAT ActionReject MaxConcurrentUsesReached FragsNotAccepted TcpSynReqdtoEstablish |
Session | SessionBegin SessionEnd SessionBeginEnd RuleActionDrop ProhibitedIpOption InvalidIcmpT3 PktLimitReached |
Application | Summary HandshakeMissing HandshakeCtlInvalid HandshakeDataUnexpected OptError OptBadLen OptTTcpForbidden OptNonStdForbidden OptTStampMissing OptTStampUnexpected TStampTooOld TStampEchoInvalid ScaleUnexpected SeqNumOutside AckNumOutside AckNumNotZero AckNumStale AckUnexpected AckMissing FlagsSynRst SynUnexpected SynMissing FinUnexpected InvCksum ConnReused RstSeqNumUnexpected TTL NotFullHeader FlagsSynFin SplitHandshake |
ALG | CmdIncomplete DynamicRuleInserted DynamicRuleInsertedPASV CannotInsertDynamicRule CannotInsertDynamicRulePASV BadCmdSyntax BadPortCmdSyntax BadPasvCmdSyntax BadAddrSyntax TftpDynRuleInsertErr TftpDynRuleInserted |
n/a
This command configures a name for this logging profile.
The no form of the command removes the configured name for this logging profile.
n/a
This command configures a profile group that provides a context within which you can configure security features such as session idle timeouts and application assurance parameters. Profile 1 is a default profile and cannot be modified.
The no form of the command removes the configured profile group.
1
This command enters the application context for firewall configuration.
This command enables application level gateway (ALG) inspection by the firewall.
The no form of the command disables ALG inspection by the firewall.
n/a
This command enables the context for configuring application assurance parameters. Enabling application assurance automatically sets the defaults for the parameters as listed in Table 75.
Parameter | Default Value |
DNS | reply-only |
ICMP | limit-type3 |
IP | options permit-any |
TCP | no strict |
The no form of the command disables application assurance on the firewall.
n/a
This command enables the context for configuring DNS inspection parameters on a firewall in the application assurance parameters context.
n/a
This command limits the number of replies to DNS requests. When enabled, the firewall permits a single reply to each DNS request.
The no form of the command disables the limiting of DNS replies; the firewall permits all replies to each DNS request.
reply-only
This command enables the context for configuring ICMP limit parameters on a firewall in the application assurance parameters context.
n/a
This command limits the number of ICMP type 3 replies through a firewall. When enabled, only 15 ICMP type 3 replies are permitted through the firewall for each ICMP and IP session.
The no form of the command disables the limiting of ICMP type 3 replies through a firewall; all ICMP type 3 replies are permitted through the firewall for each ICMP and IP session.
limit-type3
This command configures the number of ICMP requests and replies allowed through the firewall for each ICMP session. Any requests or replies that are received beyond the configured limit are discarded until the ICMP session times out.
The no form of the command allows all ICMP requests and replies through the firewall for each ICMP session.
5
This command enables the context for configuring IP layer inspection on a firewall in the application assurance parameters context.
n/a
This command controls the inspection of IP options in an IP packet header. The IP options can be specified using either the bit mask value or the name.
The permit command only applies when using bit mask values. It allows packets through the firewall when the IP options on those packets match the bit mask value specified in the ip-option-mask parameter. The ip-option-mask is a flat bit representation of the IP Option Number. The IP Option Copy Bit and IP Option Class Bits are omitted from the ip-option-mask. For example, to permit a packet with the router alert option (which uses IP Option Number 20), bit 20 of the ip-option-mask should be set, which configures the ip-option-mask parameter as 0x00100000. To discard all IP packets with IP options, configure the ip-option-mask parameter as 0x0. To permit any option, configure the ip-option-mask parameter as 0xffffffff or use the permit-any command. When permit-any is configured, the 7705 SAR does not examine IP options and allows all packets through the firewall.
Multiple options can be permitted in a single line of configuration by “AND”ing the IP option bit mask values. For example, to permit packets with the router alert, EOOL, and NOP options, configure the ip-option-mask parameter as 0x00100003.
When IP options are specified using ip-option-name, the permit command is implied. Multiple options can be specified by listing multiple names.
Table 76 lists the names and bit mask values of the supported IP options.
IP Option Number | IP Option Value | IP Option Name | Bit Mask Value |
0 | 0 | EOOL – End of Options List | 0x00000001 |
1 | 1 | NOP – No Operation | 0x00000002 |
2 | 130 | SEC – Security | 0x00000004 |
3 | 131 | LSR – Loose Source Route | 0x00000008 |
4 | 68 | TS – time Stamp | 0x00000010 |
5 | 133 | E-SEC – Extended Security | 0x00000020 |
6 | 134 | CIPSO – Commercial Security | 0x00000040 |
7 | 7 | RR – Record Route | 0x00000080 |
8 | 136 | SID – Stream ID | 0x00000100 |
9 | 137 | SSR – Strict Source Route | 0x00000200 |
10 | 10 | ZSU – Experimental Measurement | 0x00000400 |
11 | 11 | MTUP – MTU Probe | 0x00000800 |
12 | 12 | MTUR – MTU Reply | 0x00001000 |
13 | 205 | FINN – Experimental Flow Control | 0x00002000 |
14 | 142 | VISA – Experimental Access Control | 0x00004000 |
15 | 15 | Encode | 0x00008000 |
16 | 144 | IMITD – IMI Traffic Descriptor | 0x00010000 |
17 | 145 | EIP – Extended Internet Protocol | 0x00020000 |
18 | 82 | TR – Traceroute | 0x00040000 |
19 | 147 | ADDEXT – Address Extension | 0x00080000 |
20 | 148 | RTRALT – Router Alert | 0x00100000 |
21 | 149 | SDB – Selective Directed Broadcast | 0x00200000 |
22 | 150 | unassigned | 0x00400000 |
23 | 151 | DPS – Dynamic Packet State | 0x00800000 |
24 | 152 | UMP – Upstream Multicast Packet | 0x01000000 |
25 | 25 | QS – Quick-Start | 0x02000000 |
30 | 30 | EXP – RFC3692-style experiment | 0x40000000 |
30 | 94 | EXP – RFC3692-style experiment | 0x40000000 |
30 | 158 | EXP – RFC3692-style experiment | 0x40000000 |
30 | 222 | EXP – RFC3692-style experiment | 0x40000000 |
permit-any
This command enables the context for configuring TCP layer inspection on a firewall in the application assurance parameters context.
n/a
This command enables strict examination of TCP packets through the firewall. When enabled, the firewall examines the header of each TCP packet for that session to ensure compliance with RFC 793.
Note: The TCP sessions that are configured with strict TCP are processed in the 7705 SAR CSM complex. Aggregate throughput of sessions through the CSM is limited by the processing power of the CSM that is performing multiple tasks. Throughput for a session on the CSM will not match the maximum throughput of a session that only traverses the datapath. |
The no form of the command disables examination of the TCP header on each TCP packet.
no strict
This command configures a forward policer group for a security profile. A TCP/UDP security session is bidirectional. When a security sessions is created from a private domain to a public domain, the session’s forward direction is from the private to the public domain and the session’s reverse direction is from the public to the private domain. A forward-direction policer group acts on traffic that is traversing from the private domain to the public domain.
The no form of the command removes the configured forward policer group.
This command configures a profile group name.
The no form of the command removes the configured profile group name.
This command configures a reverse policer group for a security profile. A TCP/UDP security session is bidirectional. When a security sessions is created from a private domain to a public domain, the session’s forward direction is from the private to the public domain and the session’s reverse direction is from the public to the private domain. A reverse-direction policer group acts on traffic that is traversing from the public domain to the private domain.
The no form of the command removes the configured reverse policer group.
This command configures session idle timeouts for this profile.
This command sets the timeout for an ICMP security session. An ICMP session is based on the packet source and destination IP addresses and ICMP identifier. This timer removes the ICMP session if no ICMP packets have been received for the configured time.
The no form of the command removes the timeout set for icmp-request.
60 s
This command sets the timeout for protocol sessions other than TCP, UDP, or ICMP. These other protocol sessions are based on a 3-tuple match of source IP address, destination IP address, and protocol, except for SCTP (protocol 132), which uses a 5-tuple match like UDP. If no packets are received after the configured time, the firewall session is discontinued and removed from the 7705 SAR.
The no form of the command removes the timeout set for other-sessions.
n/a
This command sets the timeout for a TCP session in the established state.
The no form of the command removes the timeout set for tcp-established.
n/a
This command configures the timeout applied to a TCP session in the SYN state.
The no form of the command removes the timeout set for tcp-syn.
n/a
This command configures the timeout applied to a TCP session in a time-wait state.
The no form of the command removes the timeout set for tcp-time-wait.
n/a
This command configures the idle timeout applied to a TCP session in a transitory state.
The no form of the command removes the timeout set for tcp-transitory.
n/a
This command configures the UDP mapping timeout.
The no form of the command removes the UDP mapping timeout.
n/a
This command configures the timeout applied to a UDP session with destination port 53.
The no form of the command removes the udp-dns timeout.
n/a
This command configures the timeout applied to a UDP session in its initial state.
The no form of the command removes the udp-initial timeout.
n/a
This command enters the context for creating a policer group to be used in a security profile.
The no form of the command removes the configured policer group.
This command sets the policer rate and CBS buffer size for the policer group.
This command configures a policy group that provides a context within which you can configure a security policy.
The no form of the command removes the configured policy group.
n/a
This command configures an entry in a security policy or in an application group.
The no form of this command deletes the entry with the specified ID. When an entry is deleted, all configuration parameters for the entry are also deleted.
This command specifies what action to take (forward, reject, drop, or NAT) when packets match the entry criteria. An action must be specified in order for the entry to be active. If no action is specified, the entry is inactive.
The nat and forward actions each cause a 6-tuple lookup (source/destination IP address, source/destination port number, protocol, and source zone).
The drop action configures a firewall session on the datapath with the action to drop packets that match the entry criteria. The drop action should be used when an IP connection is carrying a large amount of traffic and CSM processing resources need to be preserved, because the drop action means that packets will not be extracted to the CSM to be rejected. Drop sessions are unidirectional and can be used as a way of blocking traffic from a source issuing a denial of service (DoS) attack.
Entering multiple action statements will overwrite previous action statements.
The no form of the command removes the specified action statement.
no action
This command specifies the destination IP address and port to which packets that have NAT applied to them are sent.
NAT actions cause a 6-tuple lookup (source/destination IP address, source/destination port number, protocol, and source zone). If there is a match, NAT is applied and the packet is routed based on the datapath session table.
Entering multiple action statements will overwrite previous action statements.
The no form of the command removes the specified action statement. An entry is considered incomplete and is rendered inactive if no action is specified.
no action
This command is used to enter the limit context.
n/a
This command specifies the maximum number of concurrent security sessions that can be created for the specified policy.
The no form of the command returns the system to the default.
no concurrent-sessions
This command forces a firewall to create a unidirectional session when a packet matches the criteria of the policy entry. In normal operating mode, when a packet matches the criteria and the packet is allowed through, the firewall creates a bidirectional session so that packets traveling in the reverse direction on that session are also allowed through the firewall.
The no form of the command creates a bidirectional firewall session for a matched packet.
no fwd-direction-only
This command configures logging control for this security policy entry. Logging can be enabled per entry using the to log-id command, or per zone using the to zone command. Logging is suppressed by default.
suppressed
This command configures match criteria for an application group entry based on the specified protocol. An application group must be configured with at least one matching protocol before it can be assigned to a security policy.
When an application group is applied to NAT, the only protocols supported as match criteria are TCP, UDP, and ICMP.
The no form of the command removes the match criteria for the entry.
no match
This command configures match criteria for an entry based on the specified protocol or application group.
When a security policy is applied to NAT, the only protocols supported as match criteria are TCP, UDP, ICMP, and *.
The no form of the command removes the match criteria for the entry.
n/a
This command sets the direction of the traffic to be matched against the IP criteria. For example, if zone-inbound is configured, then all inbound traffic to the zone has the match criteria applied to it.
both
This command configures the destination IP address or address range to be used in the matching criteria of a policy entry. All packets within the specified IP address range are processed for matching criteria. For host group matching criteria, the host group must be configured before adding it to the policy.
The no form of the command removes the destination IP address match criterion.
n/a
This command configures a destination protocol TCP or UDP port number or port range for the match criterion.
The no form of the command removes the destination port match criterion.
no dst-port
lt specifies that all port numbers less than the tcp/udp port number match
gt specifies that all port numbers greater than the tcp/udp port number match
eq specifies that the tcp/udp port number must be an exact match
This command configures matching on an ICMP code field in the ICMP header of an IPv4 packet as a match criterion.
This option is only meaningful if the protocol match criterion specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-code
This command configures matching on the ICMP type field in the ICMP header of an IPv4 packet as a match criterion.
This option is only meaningful if the protocol match criterion specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-type
This command configures the source IP address or address range to be used in the matching criteria of a policy entry. All packets within the specified IP address range are processed for matching criteria. For host group matching criteria, the host group must be configured before adding it to the policy.
The no form of the command removes the source IP address match criterion.
n/a
This command configures a source protocol TCP or UDP port number or port range for the match criterion.
The no form of the command removes the source port match criterion.
no src-port
lt specifies that all port numbers less than the tcp/udp port number match
gt specifies all port numbers greater than the tcp/udp port number match
eq specifies that the tcp/udp port number must be an exact match
This command assigns an already configured profile to a policy.
The no form of the command removes the assigned profile.
1
This command configures a policy group name.
The no form of the command removes the configured policy group name.
This command configures the high-water mark threshold for security sessions. An alarm is raised when the high-water mark threshold is reached or exceeded. The value must be greater than or equal to the session-low-wmark value.
The no form of the command removes the high-water mark setting.
no session-high-wmark
This command configures the low-water mark threshold for security sessions. The alarm is cleared when the session utilization percentage is equal to or less than the low-water mark threshold. The value must be less than or equal to the session-high-wmark value.
The no form of the command removes the low-water mark setting.
no session-low-wmark
Note: The following command outputs are examples only; actual displays may differ depending on supported functionality and user configuration. |
This command displays IPv4 and IPv6 filter information.
The following outputs are examples of IP filter information:
Label | Description |
Filter Id | The IP filter ID |
Scope | Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive | |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Description | The IP filter policy description |
Label | Description |
Filter Id | The IP filter policy ID |
Scope | Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive | |
Entries | The number of entries configured in this filter ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
Filter Match Criteria | IP — the filter is an IPv4 filter policy |
IPv6 — the filter is an IPv6 filter policy | |
Entry | The filter entry ID. If the filter entry ID indicates that the entry is Inactive, the filter entry is incomplete as no action has been specified. |
Description | The IP filter policy description |
Src. IP | The source IP address and prefix length match criterion |
Dest. IP | The destination IP address and prefix length match criterion |
Protocol | The protocol ID for the match criteria. Undefined indicates no protocol specified. (IPv4 filters only) |
Next Header | The next header ID for the match criteria. Undefined indicates no next header is specified. (IPv6 filters only) |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type is specified. |
Fragment: (IPv4 filters only) | Off — configures a match on all unfragmented packets |
On — configures a match on all fragmented packets | |
IP-Option | Specifies matching packets with a specific IP option or range of IP options in the IP header for IP filter match criteria (IPv4 filters only) |
TCP-syn | Off — the SYN bit is disabled |
On — the SYN bit is set | |
Match action | Default — the filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates that the entry is Inactive, the filter entry is incomplete as no action was specified. |
Drop — drop packets matching the filter entry | |
Forward — forward packets matching the filter entry | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Src. Port | The source TCP or UDP port number or port range |
Dest. Port | The destination TCP or UDP port number or port range |
Dscp | The DSCP name |
ICMP Code | The ICMP code field in the ICMP header of an IP packet |
Option-present: (IPv4 filters only) | Off — does not search for packets that contain the option field or have an option field of zero |
On — matches packets that contain the option field or have an option field of zero | |
Multiple Option: (IPv4 filters only) | Off — the option fields are not checked |
On — packets containing one or more option fields in the IP header will be used as IP filter match criteria | |
TCP-ack | Off — the ACK bit is not matched |
On — matches the ACK bit being set or reset in the control bits of the TCP header of an IP packet |
Label | Description |
Filter Id | The IP filter policy ID |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Entries | The number of entries configured in this filter ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
Filter Association | IP or IPv6 |
Entry | The filter entry ID. If the filter entry ID indicates that the entry is Inactive, the filter entry is incomplete as no action was specified. |
Src. IP | The source IP address and mask match criterion. 0.0.0.0/0 indicates no criterion specified for the filter entry. |
Dest. IP | The destination IP address and mask match criterion. 0.0.0.0/0 indicates no criterion specified for the filter entry. |
Protocol | The protocol ID for the match criteria. Undefined indicates no protocol specified. (IPv4 filters only) |
Next Header | The next header ID for the match criteria. Undefined indicates no next header is specified. (IPv6 filters only) |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type specified. |
Fragment: (IPv4 filters only) | Off — configures a match on all unfragmented packets |
On — configures a match on all fragmented packets | |
TCP-syn | Off — the SYN bit is disabled |
On — the SYN bit is set | |
Match action | Default — the filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates the entry is inactive, the filter entry is incomplete (no action was specified). |
Drop — drop packets matching the filter entry | |
Forward — forward packets matching the filter entry | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Src. Port | The source TCP or UDP port number or port range |
Dest. Port | The destination TCP or UDP port number or port range |
Dscp | The DSCP name |
ICMP Code | The ICMP code field in the ICMP header of an IP packet |
Option-present: (IPv4 filters only) | Off — does not search for packets that contain the option field or have an option field of zero |
On — matches packets that contain the option field or have an option field of zero | |
Multiple Option: (IPv4 filters only) | Off — the option fields are not checked |
On — packets containing one or more option fields in the IP header will be used as IP filter match criteria | |
TCP-ack | Off — the ACK bit is not matched |
On — matches the ACK bit being set or reset in the control bits of the TCP header of an IP packet |
Label | Description |
Filter Id | The IP filter policy ID |
Scope | Template — the filter policy is of type Template: |
Exclusive — the filter policy is of type Exclusive: | |
Entries | The number of entries configured in this filter ID |
Applied | No — the filter policy ID has not been applied: |
Yes — the filter policy ID is applied: | |
Def. Action | Drop — the default action for the filter ID for packets that do not match the filter entries is to drop: |
Filter Match Criteria | IP — indicates the filter is an IPv4 filter policy: |
IPv6 — indicates the filter is an IPv6 filter policy | |
Entry | The filter entry ID. If the filter entry ID indicates the entry is (Inactive), the filter entry is incomplete as no action has been specified. |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
This command displays filter log information.When a filter log command is used with a MAC filter and a packet is matched, the log entry is different from an IP filter entry. For a MAC filter, the source and destination IP address of incoming packets are not included in the log.
The following outputs are examples of filter log information:
Label | Description |
Log-Id | The filter log ID |
Dest./Destination | The destination of the filter log: memory or syslog |
Id/Entries | The number of entries configured for this filter log |
Enabled | Indicates whether the log is administratively enabled |
Admin State | The administrative state of the log: enabled or disabled |
Description | The description string configured for the filter log |
Wrap | Indicates whether the wraparound function (circular buffer) is enabled |
Maximum entries configured | The maximum number of entries allowed in this filter log |
Number of entries logged | The number of entries in this filter log |
(date) | The timestamp of the entry |
Ip Filter | The filter ID and entry ID |
Desc. | The description string for the filter log |
SDP | The SDP using this filter |
Direction | The direction of the traffic being filtered |
Action | The action taken as a result of the filter |
Src MAC | The source MAC address of the packet |
Dst MAC | The destination MAC address of the packet |
EtherType | The Ethertype of the packet |
Src IP | The source IP address of the packet |
Dst IP | The destination IP address of the packet |
Flags | The number of flags associated with the packet |
TOS | The type of service for the packet expressed as a hexadecimal number. Use the show>qos>dscp-table command to see the definitions of the numbers. |
TTL | The time to live setting remaining for the packet |
Protocol | The protocol used for the packet |
====================================================================
Label | Description |
Total Log Instances (Allowed) | The maximum allowed instances of filter logs allowed on the system |
Total Log Instances (In Use) | The instances of filter logs presently existing on the system |
Total Log Bindings | The count of the filter log bindings presently existing on the system |
Type | The type of filter: CPM, IP, or MAC |
FilterID | The unique identifier of the filter |
EntryID | The unique identifier of an entry in the filter table |
Log | The filter log identifier |
Instantiated | Specifies if the filter log for this filter entry has been enabled |
This command displays MAC filter information.
The following outputs are examples of MAC filter information:
When no parameters are specified, a brief listing of MAC filters is produced.
Label | Description |
Filter-Id | The MAC filter ID |
Scope: | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Description | The MAC filter policy description |
When the filter ID is specified, detailed filter information for the filter ID and its entries is displayed.
Label | Description |
MAC Filter | |
Filter Id | The MAC filter policy ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Entries | The number of entries in the filter policy |
Description | The MAC filter policy description |
Filter Match Criteria: Mac | |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
FrameType | Ethernet — the entry ID match frame type is Ethernet IEEE 802.3 |
Ethernet II — the entry ID match frame type is Ethernet Type II. | |
Description | The filter entry description |
Log Id | The filter log identifier |
Src Mac | The source MAC address match criterion. If the MAC address is all zeros, no criterion is specified for the filter entry. |
Dest Mac | The destination MAC address match criterion. If the MAC address is all zeros, no criterion is specified for the filter entry. |
Dot1p | The IEEE 802.1p value for the match criterion. Undefined indicates that no value is specified |
Ethertype | The Ethertype value match criterion |
DSAP | The DSAP value match criterion. Undefined indicates that no value is specified |
SSAP | The SSAP value match criterion. Undefined indicates that no value is specified |
Snap-pid | The Ethernet SNAP PID value match criterion. Undefined indicates that no value is specified |
Esnap-oui-zero | Non-Zero — filter entry matches a non-zero value for the Ethernet SNAP OUI |
Zero — filter entry matches a zero value for the Ethernet SNAP OUI | |
Undefined — no Ethernet SNAP OUI value is specified | |
Match action | Default— the filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified |
Drop — packets matching the filter entry criteria will be dropped | |
Forward — packets matching the filter entry criteria are forwarded | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Egr. Matches | The number of egress filter matches/hits for the filter entry |
Label | Description |
Filter Id | The IP filter ID |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Entries | The number of entries in the filter |
Description | The MAC filter policy description |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Filter Association | The type of filter association |
Label | Description |
Filter Id | The IP filter ID |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Entries | The number of entries in the filter |
Description | The MAC filter policy description |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Filter Match Criteria: Mac | |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
FrameType | Ethernet — the entry ID match frame type is Ethernet IEEE 802.3 |
Ethernet II — the entry ID match frame type is Ethernet Type II | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Egr. Matches | The number of egress filter matches/hits for the filter entry |
This command displays VLAN filter information.
The following outputs are examples of VLAN filter information:
When no parameters are specified, a brief listing of VLAN filters is displayed.
Label | Description |
Filter-Id | The VLAN filter ID |
Scope | Template — the VLAN filter policy is always of type Template |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Description | The VLAN filter policy description |
When the filter ID is specified, detailed filter information for the filter and its entries is displayed.
Label | Description |
VLAN Filter | |
Filter Id | The VLAN filter policy ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Scope | Template — the filter policy is always of type Template |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Entries | The number of entries in the filter policy |
Description | The VLAN filter policy description |
Filter Match Criteria: | |
Entry | The filter entry ID. If the filter entry ID indicates that the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Description | The filter entry description |
Match | VLAN— the type of match criteria for the entry is VLAN |
Untagged — the type of match criteria for the entry is untagged | |
Action | Drop — packets matching the filter entry criteria will be dropped |
Forward — packets matching the filter entry criteria will be forwarded | |
Operation | The match criteria operator. Valid operators are: lt (less than), gt (greater than), eq (equal to), and range (for a range of VLAN IDs). |
Vlan-Id | The VLAN ID when the match criteria defines a specific VLAN ID |
From | The start VLAN ID when the match criteria defines a VLAN ID range |
To | The end VLAN ID when the match criteria defines a VLAN ID range |
This command displays firewall application group information.
This command displays summary information about the captured packets stored in the debug security log.
The following output is an example of captured packet information.
This command displays a summary of the receive control queues for a security zone.
The following output is an example of receive control queue information.
This command displays a system-level security engine statistics. During a CSM switch, security statistics roll back to zero.
The following output is an example of security engine statistics.
This command displays firewall host group information.
This command displays firewall logging information.
The following output is an example of security log information, and Table 89 describes the fields.
Label | Description |
Security Logs | |
Description | The security log identifier |
Profile | The security logging profile to which the log applies |
Memory log contents | Details of the log content |
Outbound | Session location of the zone in the outbound direction |
Inbound | Session location of the zone in the inbound direction |
Session | The session ID |
Report | The security log event code |
IP header | The IPv4 packet header |
Security Logging Events | |
Name | The name of the event type and event |
ID | The event identifier |
Severity | The severity of the event |
State | Indicates how each event is being handled |
This command displays policer group information.
The following output is an example of policer group information.
This command displays a summary of traffic statistics for policers.
The following output is an example of traffic statistics for policers.
This command displays security policy information.
The following output is an example of security policy information, and Table 90 describes the fields.
Label | Description |
Policy Id | The security policy ID |
Name | The name of the policy |
Scope | Template — the policy is of type template |
Exclusive — the policy is of type exclusive | |
Entries | The number of entries configured in this policy ID |
Description | The security policy description |
Applied | No — the security policy ID has not been applied |
Yes — the security policy ID is applied | |
Def. Action | Reject — the default action for packets that do not match the policy entries is to reject |
Policy Match Criteria | |
Entry | The policy entry ID |
Description | The policy entry description |
Match Direction | Zone inbound — the match criteria is applied to packets inbound to the zone |
Zone outbound — the match criteria is applied to packets outbound from the zone | |
Both — the match criteria is applied to packets both inbound to and outbound from the zone | |
Src. IP | The source IP address and prefix length match criterion |
Dest. IP | The destination IP address and prefix length match criterion |
Protocol | The protocol for the match criteria. Undefined indicates no protocol specified. |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type is specified. |
Profile ID | The profile ID |
Active | No — the policy match criteria entry is not active |
Yes — the policy match criteria entry is active | |
Action | nat — applies NAT to the packets matching the profile entry |
reject — rejects packets matching the profile entry on the CSM session | |
forwards — forward packets matching the profile entry | |
drops — drop the packets matching the profile entry on the datapath session | |
Src. Port | The source TCP or UDP port number or port range |
Dest. Port | The destination TCP or UDP port number or port range |
ICMP Code | The ICMP code field in the ICMP header of an IP packet |
Session | Indicates whether the security session is bidirectional or unidirectional (forward only) |
Session Limit | The maximum number of concurrent sessions |
Logging | Indicates whether logging has been enabled per policy entry or per zone, or whether all logs generated by the entry are suppressed |
This command displays security profile information.
The following output is an example of security profile information, and Table 91 describes the fields.
Label | Description |
Profile Id | The security profile ID |
Name | The name of the profile |
Description | The profile description |
Packet | The configured packet level options |
Fragmentation | Controls processing of IP packet fragments on a session |
Application | The configured profile application parameters |
TCP Syn-Rcvd | Timeout configured for a TCP session in a SYN state |
TCP Transitory | Timeout configured for a TCP session in a transitory state |
TCP Established | Timeout configured for a TCP session in an established state |
TCP Time-Wait | Timeout configured for a TCP session in a time-wait state |
UDP Initial | Timeout configured for a UDP session in an initial state |
UDP Idle | Timeout configured for a UDP session in an idle state |
UDP DNS | Timeout configured for a UDP session with destination port 53 |
ICMP Request | Timeout configured for an ICMP session in which an ICMP request is sent but no ICMP response is received |
Other Sessions | Timeout for sessions other than TCP, UDP, or ICMP |
Applied | No — the security profile ID has not been applied |
Yes — the security profile ID is applied | |
ALG | Application level gateway: auto, FTP, or TFTP |
This command displays a summary of active security sessions for zones.
The following output is an example of security session summary information, and Table 92 describes the fields.
Label | Description |
Total Created | The total number of security sessions created since node startup or last cleared statistics |
Active | The number of security sessions that are currently active |
Limit | The total number of security sessions allowed |
Utilization | The number of active security sessions, expressed as a percentage of the total allowed |
Hi-Wtr-Mark | Indicates the high-water mark threshold configured for security sessions |
Lo-Wtr-Mark | Indicates the low-water mark threshold configured for security sessions |
Zone-Id | The zone ID |
Name | The name of the zone |
Type | The zone type |
Svc-Id | The service ID |
Inbound Sessions | The number of sessions inbound to the zone |
Outbound Sessions | The number of sessions outbound from the zone |
This command displays a summary of security information.
The following output is an example of security summary information.
This command displays security zone information. During a CSM activity switch, security session statistics roll back to zero; however, statistics for active security sessions do not.
The following output is an example of zone information.
This command displays NAT pool information.
The following output is an example of zone pool information.
This command displays security zone policy information.
The following output is an example of zone policy information.
This command displays security zone session information.
The following output is an example of zone session information.
This command clears the counters associated with the IPv4 filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
clears all counters associated with the IPv4 filter policy entries
This command clears the counters associated with the IPv6 filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
clears all counters associated with the IPv6 filter policy entries
This command clears the entries associated with the specified filter log. The clear command applies only to logs whose destination is to memory.
This command clears the counters associated with the MAC filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
clears all counters associated with the MAC filter policy entries
This command clears the specified sessions and can also clear the associated session statistics.
This command clears security zone information.
This command monitors the counters associated with the IPv4 filter policy.
This command monitors the counters associated with the IPv6 filter policy.
This command monitors the counters associated with the MAC filter policy.