Technical data
ServerIron ADX NAT64 Configuration Guide 19
53-1002288-02
Displaying NAT64 information
2
DRAFT: BROCADE CONFIDENTIAL
Displaying session information
You can use the show session all command at the rconsole to display sessions on the ServerIron
ADX including NAT64 sessions. NAT64 sessions are indicated by a unique session type in the
output. This output is displayed as follows.
ServerIron ADX# rconsole 1 1
ServerIron ADX1/1 show session all 0
Session Info:
Flags - 0:UDP, 1:TCP, 2:IP, 3:INT, 4:INVD, H: sessInHash, N: sessInNextEntry
Index Src-IP Dst-IP S-port D-port Age Server Flags
===== ====== ====== ====== ====== === ====== ========
0 192.168.1.101 200.1.1.2 80 38912 60 n/a NAT641 H
1 3003::10 0.0.0.0 0 0 57 n/a NAT641 H
2 3003::10 4003::c0a8:165 1417 80 60 n/a NAT641 H
Syntax: show session all <index>
The <index> variable specifies the integer value of the record in the table that you want to begin
the display from. Using the value “0” will display all records in the table.
Displaying NAT 64 translations
You can use the show nat64 translation command to display the client IP, NAT IP and Destination IP
addresses in a stateful NAT64 gateway. This output is displayed as follows.
ServerIron ADX# show nat64 translation
Pro Client IP NAT IP Dest IP
tcp 3003::10|1418 200.1.1.2|38913 192.168.1.101|80
Syntax: show nat translation
TABLE 4 Display fields for show session all
This field... Displays...
Index The row number of this entry in the Session Table.
Src-IP: The Source IP address for the session flow.
Dst-IP The Destination IP address for the session flow.
S-port The Layer 4 Source Port number for the session flow.
D-port The Layer 4 Destination Port number for the session flow.
Age The session age.
Server The real server name the session belongs to. N/A to NAT64
sessions.
Flags Flag identifying session type. For example: NAT64 TCP sessions
are identified as NAT641. Flags displayed can be:
0:UDP
1:TCP
2:IP
3:INT
4:INVD
H: sessInHash
N: sessInNextEntry