# diagnose firewall ippool-all stats2) Count of SNAT sessions for originating direction.
vdom:root owns 1 ippool(s)
name: test
type: overload
startip: 172.16.14.60
endip: 172.16.14.65
total ses: 20
tcp ses: 16
udp ses: 2
other ses: 2
# diagnose sys session list | grep -c 'dir=org act=snat'33This result equals to those of the output of 'dir=reply act=dnat'
# diagnose sys session list | grep -c 'dir=reply act=dnat'333) Count of DNAT sessions for originating direction.
# diagnose sys session list | grep -c 'dir=org act=dnat'1This result equals to those of the output of 'dir=reply act=snat'
# diagnose sys session list | grep -c "dir=reply act=snat"1
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.