Description
Shows the list of interfaces that SecureXL uses.
Syntax for IPv4
|
Syntax for IPv6
|
Parameters
Parameter |
Description |
|
Specifies the SecureXL instance ID (for IPv4 only). |
Example
[Expert@MyGW:0]# sim if Name | Address | Netmask | CXL Address | CXL Netmask | MTU | F | SIM F | IRQ | IFN:FWN:DVN | Dev ------------------------------------------------------------------------------------------------------------------------------------ eth0 | 192.168.3.242 | 0.0.0.0 | 192.168.3.243 | 255.255.255.0 | 1500 | 039 | 00080 | 67 | 2: 1: 2 | 0x0x3e836000 eth1 | 10.20.30.242 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 029 | 00088 | 75 | 3: 2: 3 | 0x0x3d508000 eth2 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 59 | 4: 3: 4 | 0x0x3d6b4000 eth3 | 192.168.196.18 | 0.0.0.0 | 40.50.60.52 | 0.0.0.0 | 1500 | 029 | 00080 | 67 | 5: 4: 5 | 0x0x3dbc1000 eth4 | 192.168.196.18 | 0.0.0.0 | 100.100.100.53 | 0.0.0.0 | 1500 | 029 | 00080 | 83 | 6: 5: 6 | 0x0x3d678000 eth5 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 75 | 7: 6: 7 | 0x0x3c6ba000 eth6 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 59 | 8: 7: 8 | 0x0x3e370000 eth2.53 | 192.168.196.2 | 0.0.0.0 | 200.200.200.53 | 0.0.0.0 | 1500 | 029 | 00580 | 0 | 11: 10: 11 | 0x0x2ca90000 eth2.52 | 192.168.196.2 | 0.0.0.0 | 70.80.90.52 | 0.0.0.0 | 1500 | 029 | 00580 | 0 | 12: 11: 12 | 0x0x2c980000 [Expert@MyGW:0]# |
Explanation about the configuration flags in the "F" and "SIM F" columns
The "F
" column shows the internal configuration flags that Firewall set on these interfaces.
The "SIM F
" column shows the internal configuration flags that SecureXL set on these interfaces.
Flag |
Description |
---|---|
0x001 |
If this flag is set, the SecureXL drops the packet at the end of the inbound inspection, if the packet is a "cut-through" packet. In outbound, SecureXL forwards all the packets to the network. |
0x002 |
If this flag is set, the SecureXL sends an appropriate notification whenever a TCP state change occurs (connection is established / torn down). |
0x004 |
If this flag is set, the SecureXL it sets the UDP header's checksum field correctly when the SecureXL encapsulates an encrypted packet (UDP encapsulation). If flag is not set, SecureXL sets the UDP header's checksum field to zero. It is safe to ignore this flag, if it is set to 0 (SecureXL still calculates the UDP packet's checksum). |
0x008 |
If this flag is set, the SecureXL does not create new connections that match a template, and SecureXL drops the packet that matches the template, when the Connections Table reaches the specified limit. If this flag is not set, the SecureXL forwards the packet to the Firewall. |
0x010 |
If this flag is set, the SecureXL forwards fragments to the Firewall. |
0x020 |
If this flag is set, the SecureXL does not create connections from TCP templates anymore. The Firewall can still offload connections to SecureXL. This flag only disables only the creation of TCP templates. |
0x040 |
If this flag is set, the SecureXL periodically notifies the Firewall, so it refreshes the accelerated connections in the Firewall kernel tables. |
0x080 |
If this flag is set, the SecureXL does not create connections from non-TCP templates anymore. The Firewall can still offload connections to SecureXL. This flag only disables only the creation of non-TCP templates. |
0x100 |
If this flag is set, the SecureXL allows sequence verification violations for connections that did not complete the TCP 3-way handshake process (otherwise, SecureXL must forward the violating packets to the Firewall). |
0x200 |
If this flag is set, the SecureXL allows sequence verification violations for connections that completed the TCP 3-way handshake process (otherwise, SecureXL must forward the violating packets to the Firewall). |
0x400 |
If this flag is set, the SecureXL forwards TCP [RST] packets to the Firewall. |
0x0001 |
If this flag is set, the SecureXL notifies the Firewall about HitCount data. |
0x0002 |
If this flag is set, the VSX Virtual System acts as a junction, rather than a normal Virtual System (only the local Virtual System flag is applicable). |
0x0004 |
If this flag is set, the SecureXL disables the reply counter of inbound encrypted traffic. This makes SecureXL kernel module act in the same way as the VPN kernel module does. |
0x0008 |
If this flag is set, the SecureXL enables the MSS Clamping. Refer to the kernel parameters ' |
0x0010 |
If this flag is set, the SecureXL disables the "No Match Ranges" (NMR) Templates (see sk117755). |
0x0020 |
If this flag is set, the SecureXL disables the "No Match Time" (NMT) Templates (see sk117755). |
0x0040 |
If this flag is set, the SecureXL does not send Drop Templates notifications (about dropped packets) to the Firewall (to maintain the drop counters). For example, if you set the value of the kernel parameter |
0x0080 |
If this flag is set, the SecureXL enables the MultiCore support for IPsec VPN (see sk118097). |
0x0100 |
If this flag is set, the SecureXL enables the support for CoreXL Dynamic Dispatcher (see sk105261). |
0x0800 |
If this flag is set, the SecureXL does not enforce the Path MTU Discovery for IP multicast packets. |
0x1000 |
If this flag is set, the SecureXL disables the SIM "drop_templates" feature. |
0x2000 |
If this flag is set, it indicates that an administrator enabled the Link Selection Load Sharing feature. |
0x4000 |
If this flag is set, the SecureXL disables the asynchronous notification feature. |
0x8000 |
If this flag is set, it indicates that the Firewall Connections Table capacity is unlimited. |
Examples:
Value |
Description |
---|---|
0x039 |
Means the sum of these flags:
|
0x00008a16 |
Means the sum of these flags:
|
0x00009a16 |
Means the sum of these flags:
|