Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

show services stateful-firewall flows

date_range 19-Nov-23

Syntax

content_copy zoom_out_map
show services stateful-firewall flows 
<brief | extensive | summary | terse>
<application-protocol protocol> 
<count> 
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<limit number> 
<protocol protocol> 
<service-set service-set> 
<source-port source-port> 
<source-prefix source-prefix> 

Description

Display stateful firewall flow table entries. When the interface is used for softwire processing, the type of softwire concentrator (DS-LITE or 6rd) is shown, and frame counts are provided.

Options

none

Display standard information about all stateful firewall flows.

brief | extensive | summary | terse

(Optional) Display the specified level of output.

application-protocol application-protocol

(Optional) Display information about one of the following application-level gateway (ALG) protocol types:

  • bootp—Bootstrap protocol

  • dce-rpc—Distributed Computing Environment (DCE) remote procedure call (RPC) protocol

    Note:

    Use this option to select Microsoft Remote Procedure Call (MSRPC).

  • dce-rpc-portmap—Distributed Computing Environment (DCE) remote procedure call (RPC) portmap protocol

  • dns—Domain Name Service protocol

  • exec—Remote execution protocol

  • ftp—File Transfer Protocol

  • h323—H.323 protocol

  • icmp—Internet Control Message Protocol

  • iiop—Internet Inter-ORB Protocol

  • ip—Internet protocol

  • netbios—NetBIOS protocol

  • netshow—Netshow protocol

  • pptp —Point-to-Point Tunneling Protocol

  • realaudio—RealAudio protocol

  • rpc—Remote Procedure Call protocol

    Note:

    Use this option to select Sun Microsystems Remote Procedure Call protocol (SunRPC).

  • rpc-portmap—Remote Procedure Call portmap protocol

  • rtsp—Real-Time Streaming Protocol

  • sip—Session Initiation Protocol

  • snmp—Simple Network Management Protocol

  • talk—Talk protocol

  • tftp—Trivial File Transfer Protocol

  • traceroute—Traceroute

  • winframe—WinFrame

count

(Optional) Display a count of the matching entries.

destination-port destination-port

(Optional) Display information for a particular destination port. The range of values is from 0 to 65535.

destination-prefix destination-prefix

(Optional) Display information for a particular destination prefix.

interface interface-name

(Optional) Display information about a particular interface. On M Series and T Series routers, interface-name can be ms-fpc/pic/port or rspnumber.

limit number

(Optional) Maximum number of entries to display.

protocol protocol

(Optional) Display information about one of the following IP types:

  • number—Numeric protocol value from 0 to 255

  • ah—IPsec Authentication Header protocol

  • egp—An exterior gateway protocol

  • esp—IPsec Encapsulating Security Payload protocol

  • gre—A generic routing encapsulation protocol

  • icmp—Internet Control Message Protocol

  • igmp—Internet Group Management Protocol

  • ipip—IP-within-IP Encapsulation Protocol

  • ospf—Open Shortest Path First protocol

  • pim—Protocol Independent Multicast protocol

  • rsvp—Resource Reservation Protocol

  • sctp—Stream Control Protocol

  • tcp—Transmission Control Protocol

  • udp—User Datagram Protocol

service-set service-set

(Optional) Display information for a particular service set.

source-port source-port

(Optional) Display information for a particular source port. The range of values is from 0 to 65535.

source-prefix source-prefix

(Optional) Display information for a particular source prefix.

Required Privilege Level

view

Output Fields

Table 1 lists the output fields for the show services stateful-firewall flows command. Output fields are listed in the approximate order in which they appear.

Table 1: show services stateful-firewall flows Output Fields

Field Name

Field Description

Interface

Name of the interface.

Service set

Name of a service set. Individual empty service sets are not displayed. If no service set has any flows, a flow table header is displayed for each service set.

Flow Count

Number of flows in a session.

Flow or Flow Prot

Protocol used for this flow.

Source

Source prefix of the flow in the format source-prefix:port. For ICMP flows, port information is not displayed.

Dest

Destination prefix of the flow. For ICMP flows, port information is not displayed.

State

Status of the flow:

  • Drop—Drop all packets in the flow without response.

  • Forward—Forward the packet in the flow without looking at it.

  • Reject—Drop all packets in the flow with response.

  • Watch—Inspect packets in the flow.

Dir

Direction of the flow: input (I) or output (O). For any configured stateful firewall rule, the reverse flow is dynamically created, so you will see an input and an output flow.

Frm count

Number of frames in the flow. If this value is zero, then that flow does not yet exist.

Sample Output

show services stateful-firewall flows

On the MX Series router, both input (I) and output (O) flow entries appear, even if traffic only flows in one direction. This applies to both NAT and non-NAT cases.

content_copy zoom_out_map
user@host> show services stateful-firewall flows  
Interface: ms-1/3/0, Service set: green

Flow       
Prot     Source                 Dest               State      Dir     Frm count
TCP     10.58.255.178:23   ->    10.59.16.100:4000 Forward    O               
TCP      10.58.255.50:33005->   10.58.255.178:23   Forward    I              1
  Source NAT    10.58.255.50:33005->    10.59.16.100:4000
  Destin NAT    10.58.255.178:23   ->         0.0.0.0:4000

show services stateful-firewall flows (For Softwire Flows)

When a service set includes softwire processing, the following output format is used for the softwire flows:

content_copy zoom_out_map
user@host> show services stateful-firewall flows  
Interface: sp-0/1/0, Service set: dslite-svc-set2
Flow                                                State    Dir       Frm count
TCP      200.200.200.2:80    ->     44.44.44.1:1025  Forward  O          219942
    NAT dest        44.44.44.1:1025    ->       20.20.1.4:1025
    Softwire           2001::2         ->         1001::1
TCP          20.20.1.2:1025  ->  200.200.200.2:80    Forward  I          110244
    NAT source       20.20.1.2:1025    ->      44.44.44.1:1024
    Softwire           2001::2         ->         1001::1
TCP      200.200.200.2:80    ->     44.44.44.1:1024  Forward  O          219140
    NAT dest        44.44.44.1:1024    ->       20.20.1.2:1025
    Softwire           2001::2         ->         1001::1
DS-LITE         2001::2      ->        1001::1       Forward  I          988729
TCP      200.200.200.2:80    ->     44.44.44.1:1026  Forward  O          218906
    NAT dest        44.44.44.1:1026    ->       20.20.1.3:1025
    Softwire           2001::2         ->         1001::1
TCP          20.20.1.3:1025  ->  200.200.200.2:80    Forward  I          110303
    NAT source       20.20.1.3:1025    ->      44.44.44.1:1026
    Softwire           2001::2         ->         1001::1
TCP          20.20.1.4:1025  ->  200.200.200.2:80    Forward  I          110944
    NAT source       20.20.1.4:1025    ->      44.44.44.1:1025
    Softwire           2001::2         ->         1001::1

show services stateful-firewall flows brief

The output for the show services stateful-firewall flows brief command is identical to that for the show services stateful-firewall flows command. For sample output, see show services stateful-firewall flows.

show services stateful-firewall flows extensive

content_copy zoom_out_map
user@host> show services stateful-firewall flows extensive     
Interface: ms-0/3/0, Service set: ss_nat
Flow                                                				State    	Dir       Frm count
TCP           16.1.0.1:2330  ->      16.49.0.1:21    				Forward  		I              8
    NAT source        16.1.0.1:2330    ->       16.41.0.1:2330
    NAT dest         16.49.0.1:21      ->       16.99.0.1:21
  Byte count: 455, TCP established, TCP window size: 57344
  TCP acknowledge: 3251737524, TCP tickle enabled, tcp_tickle: 0
  Flow role: Master, Timeout: 720
TCP          16.99.0.1:21    ->      16.41.0.1:2330  				Forward  		O              5
    NAT source       16.99.0.1:21      ->       16.49.0.1:21
    NAT dest         16.41.0.1:2330    ->        16.1.0.1:2330
  Byte count: 480, TCP established, TCP window size: 57344
  TCP acknowledge: 463128048, TCP tickle enabled, tcp_tickle: 0
  Flow role: Responder, Timeout: 720

show services stateful-firewall flows count

content_copy zoom_out_map
user@host> show services stateful-firewall flows count     
Interface             Service set                                    Flow Count

ms-1/3/0              green                                                   2

show services stateful-firewall flows destination port

content_copy zoom_out_map
user@host> show services stateful-firewall flows destination-port 21
Interface: ms-0/3/0, Service set: svc_set_trust
Flow
                                                State    Dir       Frm count
Interface: ms-0/3/0, Service set: svc_set_untrust
Flow                                                State    Dir       Frm count
TCP         10.50.10.2:2143  ->     10.50.20.2:21    Watch    O               0

show services stateful-firewall flows source port

content_copy zoom_out_map
user@host> show services stateful-firewall flows source-port 2143
Interface: ms-0/3/0, Service set: svc_set_trust
Flow   
                                             State    Dir       Frm count
Interface: ms-0/3/0, Service set: svc_set_untrust
Flow                                                State    Dir       Frm count
TCP         10.50.10.2:2143  ->     10.50.20.2:21    Watch    O               0

show services stateful-firewall flows (Twice NAT)

content_copy zoom_out_map
user@host> show services stateful-firewall flows
Flow                                               State    Dir       Frm count
UDP          40.0.0.8:23439 ->     80.0.0.1:16485   Watch    I             20
    NAT source        40.0.0.8:23439   ->     172.16.1.10:1028
    NAT dest          80.0.0,1:16485   ->     192.16.1.10:22415
UDP      192.16.1.10:22415  ->  172.16.1.10:1028    Watch    O             20
    NAT source     192.16.1.10:22415   ->        80.0.0.1:16485
    NAT dest       172.16.1.10:1028    ->        40.0.0.8:23439

Release Information

Command introduced before Junos OS Release 7.4.

pgcp option introduced in Junos OS Release 8.4.

application-protocol option introduced in Junos OS Release 10.4.

footer-navigation