Print Download PDF Send Feedback

Previous

Next

sim if

Description

Shows the list of interfaces that SecureXL uses.

Syntax for IPv4

sim [-i <SecureXL ID>] if

Syntax for IPv6

sim6 if

Parameters

Parameter

Description

-i <SecureXL ID>

Specifies the SecureXL instance ID (for IPv4 only).

Example

[Expert@MyGW:0]# sim if

Name | Address | Netmask | CXL Address | CXL Netmask | MTU | F | SIM F | IRQ | IFN:FWN:DVN | Dev

------------------------------------------------------------------------------------------------------------------------------------

eth0 | 192.168.3.242 | 0.0.0.0 | 192.168.3.243 | 255.255.255.0 | 1500 | 039 | 00080 | 67 | 2: 1: 2 | 0x0x3e836000

eth1 | 10.20.30.242 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 029 | 00088 | 75 | 3: 2: 3 | 0x0x3d508000

eth2 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 59 | 4: 3: 4 | 0x0x3d6b4000

eth3 | 192.168.196.18 | 0.0.0.0 | 40.50.60.52 | 0.0.0.0 | 1500 | 029 | 00080 | 67 | 5: 4: 5 | 0x0x3dbc1000

eth4 | 192.168.196.18 | 0.0.0.0 | 100.100.100.53 | 0.0.0.0 | 1500 | 029 | 00080 | 83 | 6: 5: 6 | 0x0x3d678000

eth5 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 75 | 7: 6: 7 | 0x0x3c6ba000

eth6 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 59 | 8: 7: 8 | 0x0x3e370000

eth2.53 | 192.168.196.2 | 0.0.0.0 | 200.200.200.53 | 0.0.0.0 | 1500 | 029 | 00580 | 0 | 11: 10: 11 | 0x0x2ca90000

eth2.52 | 192.168.196.2 | 0.0.0.0 | 70.80.90.52 | 0.0.0.0 | 1500 | 029 | 00580 | 0 | 12: 11: 12 | 0x0x2c980000

[Expert@MyGW:0]#

Explanation about the configuration flags in the "F" and "SIM F" columns

The "F" column shows the internal configuration flags that Firewall set on these interfaces.

The "SIM F" column shows the internal configuration flags that SecureXL set on these interfaces.

Flag

Description

0x001

If this flag is set, the SecureXL drops the packet at the end of the inbound inspection, if the packet is a "cut-through" packet. In outbound, SecureXL forwards all the packets to the network.

0x002

If this flag is set, the SecureXL sends an appropriate notification whenever a TCP state change occurs (connection is established / torn down).

0x004

If this flag is set, the SecureXL it sets the UDP header's checksum field correctly when the SecureXL encapsulates an encrypted packet (UDP encapsulation).

If flag is not set, SecureXL sets the UDP header's checksum field to zero. It is safe to ignore this flag, if it is set to 0 (SecureXL still calculates the UDP packet's checksum).

0x008

If this flag is set, the SecureXL does not create new connections that match a template, and SecureXL drops the packet that matches the template, when the Connections Table reaches the specified limit.

If this flag is not set, the SecureXL forwards the packet to the Firewall.

0x010

If this flag is set, the SecureXL forwards fragments to the Firewall.

0x020

If this flag is set, the SecureXL does not create connections from TCP templates anymore. The Firewall can still offload connections to SecureXL. This flag only disables only the creation of TCP templates.

0x040

If this flag is set, the SecureXL periodically notifies the Firewall, so it refreshes the accelerated connections in the Firewall kernel tables.

0x080

If this flag is set, the SecureXL does not create connections from non-TCP templates anymore. The Firewall can still offload connections to SecureXL. This flag only disables only the creation of non-TCP templates.

0x100

If this flag is set, the SecureXL allows sequence verification violations for connections that did not complete the TCP 3-way handshake process (otherwise, SecureXL must forward the violating packets to the Firewall).

0x200

If this flag is set, the SecureXL allows sequence verification violations for connections that completed the TCP 3-way handshake process (otherwise, SecureXL must forward the violating packets to the Firewall).

0x400

If this flag is set, the SecureXL forwards TCP [RST] packets to the Firewall.

0x0001

If this flag is set, the SecureXL notifies the Firewall about HitCount data.

0x0002

If this flag is set, the VSX Virtual System acts as a junction, rather than a normal Virtual System (only the local Virtual System flag is applicable).

0x0004

If this flag is set, the SecureXL disables the reply counter of inbound encrypted traffic. This makes SecureXL kernel module act in the same way as the VPN kernel module does.

0x0008

If this flag is set, the SecureXL enables the MSS Clamping. Refer to the kernel parameters 'fw_clamp_tcp_mss' and 'fw_clamp_vpn_mss' in sk101219.

0x0010

If this flag is set, the SecureXL disables the "No Match Ranges" (NMR) Templates (see sk117755).

0x0020

If this flag is set, the SecureXL disables the "No Match Time" (NMT) Templates (see sk117755).

0x0040

If this flag is set, the SecureXL does not send Drop Templates notifications (about dropped packets) to the Firewall (to maintain the drop counters). For example, if you set the value of the kernel parameter activate_optimize_drops_support_now to 1, it disables the Drop Templates notifications.

0x0080

If this flag is set, the SecureXL enables the MultiCore support for IPsec VPN (see sk118097).

0x0100

If this flag is set, the SecureXL enables the support for CoreXL Dynamic Dispatcher (see sk105261).

0x0800

If this flag is set, the SecureXL does not enforce the Path MTU Discovery for IP multicast packets.

0x1000

If this flag is set, the SecureXL disables the SIM "drop_templates" feature.

0x2000

If this flag is set, it indicates that an administrator enabled the Link Selection Load Sharing feature.

0x4000

If this flag is set, the SecureXL disables the asynchronous notification feature.

0x8000

If this flag is set, it indicates that the Firewall Connections Table capacity is unlimited.

Examples:

Value

Description

0x039

Means the sum of these flags:

  • 0x001
  • 0x008
  • 0x010
  • 0x020

0x00008a16

Means the sum of these flags:

  • 0x0002
  • 0x0004
  • 0x0010
  • 0x0200
  • 0x0800
  • 0x8000

0x00009a16

Means the sum of these flags:

  • 0x0002
  • 0x0004
  • 0x0010
  • 0x0200
  • 0x0800
  • 0x1000
  • 0x8000