: inspect flow internal
Focus
Focus

inspect flow internal

Table of Contents

inspect flow internal

Use the inspect flow internal command to display the details of flows that match the input filter. It displays existing flows and their path, along with information on applications and attached interfaces.

Command

inspect flow internal (srcv4= src-ipv4 | dstv4=dst-ipv4 | srcport=src-port | dstport=dst-port | prot-nm=(udp | tcp | icmp) | prot-no= 0 - 255)

Options

srcv4Enter the source IP address.
dstv4Enter the destination IP address.
srcportEnter the source port.
dstportEnter the destination port.
prot-nmTab to select UDP, TCP, or ICMP.
prot-noEnter a protocol number ranging from 0 - 255.

Command Notes

RoleSuper, Read Only
Related Commands
Introduced in Release 5.0.3

Example

inspect flow internal FLOW DETAILS : app_id : 16150106802370049 app_idle_timeout : 20 app_iface_cookie : 0 attached_iface_1 : type: FC_DP_IFACE_LAN name: ethr3 vlan_id: 0 alt_vlan_id: 0 signature: 0xdeadcafe (-559035650) dp_fid: 39 cookie: 0 policy_action tos: 0 out_port_name: bwc_out_1 push_vlan_id: 0 queue_id: 2097187 idle_timeout: 20 insert_flow: 1 policy_action_flags: 0 cookie: 0 nw_src: 0.0.0.0 nw_dst: 0.0.0.0 src_eth_addr: 00:00:00:00:00:00, dst_eth_addr: 00:00:00:00:00:00, attached_iface_2 : type: FC_DP_IFACE_WAN name: tnl-1 vlan_id: 0 alt_vlan_id: 0 signature: 0xdeadcafe (-559035650) dp_fid: 43 cookie: 0 policy_action tos: 0 out_port_name: bwc_in_1 push_vlan_id: 0 queue_id: 2097187 idle_timeout: 20 insert_flow: 1 policy_action_flags: 0 cookie: 2 nw_src: 0.0.0.0 nw_dst: 0.0.0.0 src_eth_addr: 00:00:00:00:00:00, dst_eth_addr: 00:00:00:00:00:00, byte_count : 0 cookie : 4 detected_app_count : 0 dport : 0 dropped_cookie : 0 dscp : -- dst : 192.168.20.100 dst_vlan_id : 0 expire_time : 430123 flow_count : 4 flow_drop_reason : not dropped flow_type : NORMAL id : 35 idle_timeout : 20 iface_count : 4 lan2_type : lan-unknown lan_type : spoke-lan ln_id : 16200275524390210 loopback_to_edge_fid : 0 meta_packet_count : 1 mp_vlan_id : 0 nat_nw_src : 0 nctx_id : 0 net_dpf_id : 0 net_nctx_id : 0 net_policy_name : Rule 1 net_spf_id : 0 other_pkt_count : 2 other_sec_state_valid : 1 packet_count : 0 path_type : lan_to_public_vpn prefix_iface_cookie : 0 prefix_mask : 827453603864 prev_flow_path_type : unknown_flow_path prev_flow_type : NORMAL pri_dpf_id : 0 pri_nctx_id : 0 pri_policy_name : icmp-ping-Policy pri_spf_id : 0 priority : 2 protocol : 1 refcnt : 2 security_policy : sec_stack_id : 16242998621490011 sec_app_count : 1 sec_app : sec_rule_index : 0 sec_action : ALLOW sec_result_count : 1 sec_result : sec_src_id : 16200275524390210 sec_dst_id : 100 sec_src_zone_id : 16200471619100074 sec_dst_zone_id : 16204672468290016 sec_action : ALLOW sec_rule_id : 16246315738930189 sec_rule_num : 1 sec_rule_app_count : 0 set_flags : is_src_lan is_src_origis_lan_to_wan is_eps is_dst_wan is_dst_server is_fast_path is_matured_flow is_icmp_req_orig is_icmp_ping_app bwc_enabled non_port_scanning app_detection_done update_stats sport : 8 src : 192.168.7.100 src_vlan_id : 0 start_time : 2021-08-11 01:21:02 state : ESTABLISHED term_app_id : 16150106802370049 traffic_typ : xact tuple : 192.168.7.100 > 192.168.20.100: icmp, update_priority : 0 wan2_type : wan-unknown wan_path_change_count : 0 wan_path_id : 16261257799450062 wan_type : public-vpn-wan