Product Documentation

protocol ip

Sep 12, 2016

The following operations can be performed on "protocol ip":

stat protocol ip

Displays statistics of the IP protocol.

Synopsys

stat protocol ip [-detail] [-fullValues] [-ntimes <positive_integer>] [-logFile <input_filename>] [-clearstats ( basic | full )]

Arguments

detail

Specifies detailed output (including more statistics). The output can be quite voluminous. Without this argument, the output will show only a summary.

fullValues

Specifies that numbers and strings should be displayed in their full form. Without this option, long strings are shortened and large numbers are abbreviated

ntimes

The number of times, in intervals of seven seconds, the statistics should be displayed.

Default value: 1

Minimum value: 0

logFile

The name of the log file to be used as input.

clearstats

Clear the statsistics / counters

Possible values: basic, full

Outputs

IP packets received (IPPktRx)

IP packets received.

IP bytes received (IPbRx)

Bytes of IP data received.

IP packets transmitted (IPPktTx)

IP packets transmitted.

IP bytes transmitted (IPbTx)

Bytes of IP data transmitted.

Megabits received (IPMbRx)

Megabits of IP data received.

Megabits transmitted (IPMbTx)

Megabits of IP data transmitted.

Total routed IP packets (IPRoutedPkts)

Total routed packets.

Total routed IP Mbits (IPRoutedMbits)

Total routed Mbits

IP fragments received (IPFragRx)

IP fragments received.

Successful reassembly (reasSucc)

Fragmented IP packets successfully reassembled on the NetScaler.

Reassembly attempted (reasAtmp)

IP packets that the NetScaler attempts to reassemble. If one of the fragments is missing, the whole packet is dropped.

IP address lookups (IpLkUp)

IP address lookups performed by the NetScaler. When a packet is received on a non-established session, the NetScaler checks if the destination IP address is one of the NetScaler owned IP addresses.

IP address lookup failure (IpLkFail)

IP address lookups performed by the NetScaler that have failed because the destination IP address of the packet does not match any of the NetScaler owned IP addresses.

UDP fragments forwarded (udpFgFwd)

UDP fragments forwarded to the client or the server.

TCP fragments forwarded (tcpFgFwd)

TCP fragments forwarded to the client or the server.

Fragmentation packets created (frgPktCr)

Fragmented packets created by the NetScaler.

Bad IP checksums (badCksum)

Packets received with an IP checksum error.

Unsuccessful reassembly (reasFail)

Packets received that could not be reassembled. This can occur when there is a checksum failure, an identification field mismatch, or when one of the fragments is missing.

Reassembled data too big (reasBig)

Packets received for which the reassembled data exceeds the Ethernet packet data length of 1500 bytes.

Zero fragment length received (zeroLen)

Packets received with a fragment length of 0 bytes.

Duplicate fragments received (dupFrag)

Duplicate IP fragments received. This can occur when the acknowledgement was not received within the expected time.

Out of order fragment received (oooFrag)

Fragments received that are out of order.

Unknown destination received (UnkDst)

Packets received in which the destination IP address was not reachable or not owned by the NetScaler.

Bad Transport (badTran)

Packets received in which the protocol specified in the IP header is unknown to the NetScaler.

VIP down (vipDown)

Packets received for which the VIP is down. This can occur when all the services bound to the VIP are down or the VIP is manually disabled.

Fix header failure (hdrFail)

Packets received that contain an error in one or more components of the IP header.

TTL expired during transit (ttlExp)

Packets for which the time-to-live (TTL) expired during transit. These packets are dropped.

max non-TCP clients (maxClt)

Attempts to open a new connection to a service for which the maximum limit has been exceeded. Default value, 0, applies no limit.

Unknown services (UnkSvc)

Packets received on a port or service that is not configured.

land-attacks (LndAtk)

Land-attack packets received. The source and destination addresses are the same.

Invalid IP header size (errHdrSz)

Packets received in which an invalid data length is specified, or the value in the length field and the actual data length do not match. The range for the Ethernet packet data length is 0-1500 bytes.

Invalid IP packet size (errPktLen)

Total number of packets received by NetScaler with invalid IP packet size.

Truncated IP packet (trIP)

Truncated IP packets received. An overflow in the routers along the path can truncate IP packets.

Truncated non-IP packet (trNonIp)

Truncated non-IP packets received.

ZERO next hop (zrNxtHop)

Packets received that contain a 0 value in the next hop field. These packets are dropped.

Packets with len > 1514 rcvd (BadLenTx)

Packets received with a length greater than the normal maximum transmission unit of 1514 bytes.

Packets with bad MAC sent (BadMacTx)

IP packets transmitted with a bad MAC address.