365
To enable checksum verification for protocol packets:
To do...
Command...
Remarks
1.
Enter system view.
system-view
—
2.
Enable checksum verification.
session
checksum
{
all
| {
icmp
|
tcp
|
udp
} * }
Required
Disabled by default
Specifying the persistent session rule
set some sessions that have specific characteristics as persistent sessions. The aging time of a persistent
session does not vary with the session state transitions, and a persistent session is not removed because
no packets match it. A persistent session can be specified with an aging time that is longer than those of
common sessions, or it can be configured to be a permanent connection, which is cleared only when the
session initiator or responder sends a request to close it or when you clear it manually.
Set the persistent session criteria by specifying a basic or advanced ACL. All sessions permitted by the
ACL are persistent sessions. For more information, see
ACL and QoS Configuration Guide
.
To specify the persistent session rule:
To do...
Command...
Remarks
1.
Enter system view.
system-view
—
2.
Specify the persistent session
rule.
session persist acl
acl-number
[
aging-time
time-value
]
Required.
Not specified by default.
A persistent session rule can
reference only one ACL.
Clearing sessions manually
To do...
Command...
Remarks
Clear
sessions.
On a
centralized
device
reset session
[
source-ip
source-ip
] [
destination-ip
destination-ip
] [
protocol-type
protocol-type
]
[
source-port
source-port
] [
destination-port
destination-
port
] [
vpn-instance
vpn-instance-name
]
Required
Available in user
view
On a
distributed
device
reset session
[
slot
slot-number
]
[
source-ip
source-ip
]
[
destination-ip
destination-ip
] [
protocol-type
protocol-type
]
[
source-port
source-port
] [
destination-port
destination-port
] [
vpn-instance
vpn-
instance-name
]
Configuring session logging
Session logs help track information about user access, IP address translation, and traffic, and they can
be sent to the log server or exported to the information center in flow log format. Session logs can help
network administrators in security auditing.
Enabling session logging