Created on
12-23-2019
03:16 AM
Edited on
02-13-2025
07:44 AM
By
Jean-Philippe_P
Description
This article describes how to count IP pool, DNAT and SNAT sessions respectively.
Scope
FortiGate.
Solution
diagnose firewall ippool-all stats
vdom:root owns 1 ippool(s)
name: test
type: overload
startip: 172.16.14.60
endip: 172.16.14.65
total ses: 20
tcp ses: 16
udp ses: 2
other ses: 2
diagnose sys session list | grep -c 'dir=org act=snat'33
This result equals to those of the output of 'dir=reply act=dnat'
diagnose sys session list | grep -c 'dir=reply act=dnat'33
diagnose sys session list | grep -c 'dir=org act=dnat'1
This result equals to those of the output of 'dir=reply act=snat'
diagnose sys session list | grep -c "dir=reply act=snat"1
Complete list of sessions to which the NAT IP is currently applied. In this example, x.x.x.x is the Source NAT IP
diagnose sys session filter nsrc x.x.x.x
diagnose sys session list
Note:
v5.0 up to 6.4 is out of engineering support. So these commands might be different on higher versions. Consider upgrading the firmware level on the device to a supported version (7.0 up to 7.6). Check the firmware path and compatibility depending on the hardware: Upgrade tool.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.