The table below lists parameters displayed in the table of sessions and the corresponding names of the parameters that can be used in a primary filter text query. A description is also provided for each parameter.
Parameters in the table of sessions and in the primary filter
Session table parameter |
Primary filter parameter |
Parameter description |
---|---|---|
Session ID |
|
Session ID that is unique across all Kaspersky NGFW devices. |
Security rule name |
|
Name of the network traffic security rule. If you change the name of a security rule in the policy, it also changes in the Session Manager. |
Date/time created |
|
Date and time when the session was created. |
Date/time closed |
|
Date and time when the session was closed. |
Duration (s) |
|
Session lifetime in seconds. |
Last activity time |
|
Date and time when the last packet was received as part of the current session. |
Aging |
|
Time in seconds elapsed since the last received packet. |
Session meta state |
|
Meta state of the session. |
Session protocol state |
|
|
Packets |
|
Total number of packets received as part of the session. |
Packets c2s |
|
Number of packets received from the client. |
Packets s2c |
|
Number of packets received from the server. |
Bytes |
|
Total number of bytes received as part of the session. |
Bytes c2s |
|
Number of bytes received from the client. |
Bytes s2c |
|
Number of bytes received from the server. |
Source IP |
|
Source IP address. |
Destination IP |
|
Destination IP address. |
Protocol |
|
Transport layer protocol. |
URL(s) |
– |
Identified web address or array of web addresses. |
Source port |
|
Source port for TCP and UDP. For ICMP, the ICMP ID is displayed. For other protocols, ( |
Destination port |
|
Destination port for TCP and UDP. For ICMP, the ICMP ID is displayed. For other protocols, ( |
ICMP type |
|
ICMP type. For protocols other than ICMP, the table cell is empty. For ICMP, the value is specified in the following format: {<ICMP type number of the ICMP request> / <ICMP type number of the ICMP response>}. |
ICMP code |
|
ICMP code. For protocols other than ICMP, the table cell is empty. For ICMP, the value is specified in the following format: {<ICMP code of the ICMP request> / <ICMP code of the ICMP response>}. When receiving an ICMP message with ICMP codes that the administrator cannot configure, the field is filled anyway. |
TCP redirected |
|
Parameter indicating whether the session was redirected to a transparent TCP proxy. Possible values:
For UDP and ICMP sessions, always No. |
Decrypted |
|
Parameter indicating whether the session has been decrypted. Possible values:
|
Decryption rule name |
|
Name of the network traffic decryption rule. If you change the name of a decryption rule in the policy, it also changes in the Session Manager. |
Application protocol |
– |
The application path used in the session. |
Client application |
|
Client application. |
Application service category |
– |
Category of the service or a list of the categories of services that the client accessed. |
Прикладные протоколы |
|
Application layer protocols. For a complete list, see the List of possible protocol values for services article. If neither UDP nor TCP are used for transport, including the case of unrecognized UDP and TCP, – is displayed as the value. |
Application service |
|
Application service. |
Action |
|
The action to perform with traffic. Possible values:
|
Full match |
|
Parameter indicating whether the session matches any security rule. Possible values:
|
AV profile |
|
Security profile of the Anti-Virus security engine applied to the session. Possible values:
|
IDPS profile |
|
Security profile of the IDPS security engine applied to the session. Possible values:
|
Web Control profile |
|
Security profile of the Web Control security engine applied to the session. Possible values:
|
DNS Security profile |
|
Security profile of the DNS Security security engine applied to the session. Possible values:
|
End reason |
|
The reason why the session ended. Only sessions that have a reason why they were ended, but for which the timeout until the session is removed from Kaspersky NGFW has not yet run out. In the Session manager section, the session ending reasons are displayed only for sessions in the DISCARD meta-state or the TCP_TIME_WAIT protocol state. Additional reasons are available in the Session Log. Possible values:
If a security engine error occurs, the session is not ended automatically and the reason is not displayed in the table. Depending on the security engine that encountered the error, Kaspersky NGFW performs one of the following actions: sends a TCP RST and removes the session (SSL inspection), bypasses the packet (bypass) in proxy mode or drops the packet in direct control mode (DPI and IDPS), bypasses the packet (Web Control), sends a TCP RST and removes the session for DNS over TCP or drops the packet for DNS over UDP (DNS Security). |
NAT rule |
|
Name of the translation rule applied to traffic in the session (if applicable). |
Translated source address |
|
IP address that replaced the original source IP address of the traffic in the session. |
Translated source port |
|
Port that replaced the original source port of the traffic in the session. |
Translated destination address |
|
IP address that replaced the original destination IP address of the traffic in the session. |
Translated destination port |
|
Port that replaced the original destination port of the traffic in the session. |
– |
|
IP address that can be the source or destination IP address. Can be used as an additional parameter in the filter to match both the source and destination address. |
– |
|
Port that can be the source or destination port. Can be used as an additional parameter in the filter to match both the source and the destination. |