Checking the number of sessions that UTM proxy uses
Each FortiGate model has a maximum number of sessions that the UTM proxy supports. The UTM proxy handles all the traffic for the following protocols: HTTP, SMTP, POP3, IMAP, FTP, and NNTP. If the proxy for a protocol fills up its session table, FortiGate enters conserve mode until entries and memory free up again.
Conserve or failopen mode
Depending on the conserve mode configuration, no new sessions are created until old ones end, once the maximum is reached. You can configure this behavior when memory is running low or the proxy connection limit has been reached.
To configure failopen in the CLI:
config system global
set av-failopen-session {enable | disable}
set av-failopen {off | one-shot | pass}
end
To set the behavior for these conditions, you must enable av-failopen-session
. When enabled, and a proxy for a protocol runs out of room in its session table, that protocol goes into failopen mode and behaves as defined in the av-failopen
command.
av-failopen
determines the behavior of the proxy until entries are free in the session table again for that proxy.
off |
This option turns off accepting any new AV sessions, but continues to process any existing AV sessions that are currently active. All the protocols listed (HTTP, SMTP, POP3, IMAP, FTP, and NNTP) are scanned by FortiGate Antivirus. If AV scanning is enabled, For example, if the POP3 session table is full and email AV scanning is enabled, no additional POP3 connections are allowed until the session table has free space. This is a secure option because no unscanned traffic is allowed to pass. |
one-shot |
When memory is low, bypass the antivirus system. The term This is a very unsecure option because it allows all traffic without AV scanning, and it never reverts to normal without manual assistance. |
pass |
When memory is low, bypass the antivirus system. The difference between This is an unsecure option because it allows traffic to pass without AV scanning. However, it is better than |
If the proxy session table is full for one or more protocols, and your FortiGate enters into conserve or failopen mode:
- It appears as though the FortiGate has lost the connection.
- Network services are intermittent or don't exist.
- Other services work normally until their sessions end, and then they join the queue of session-starved applications.
Checking sessions in use
Sessions are organized into sections according to the protocol they use. This provides statistics and errors specific to that protocol.
Due to the amount of output from this command, you should connect to the CLI with a terminal program, such as puTTY, that logs output. Otherwise, you may not be able to access all the output information from the command. |
To check sessions in use and related errors in the CLI:
# get test proxyworker 4
Sample output
The following output only displays HTTP entries. The other protocols were removed to limit the output. There will be separate entries for each supported protocol (HTTP, SMTP, POP3, IMAP, FTP, and NNTP) in each section of the output. To view the session descriptions, scroll to the end of the output.
FGT# # get test proxyworker 4
Worker[0]
HTTP Common
Current Connections 8/8032
Max Concurrent Connections 76
Worker Stat
Running time (HH:MM:SS:usec) 29:06:27:369365
Time in loop scanning 2:08:000198
Error Count (accept) 0
Error Count (read) 0
Error Count (write) 0
Error Count (poll) 0
Error Count (alloc) 0
Last Error 0
Acceptor Read 6386
Acceptor Write 19621
Acceptor Close 0
HTTP Stat
Bytes sent 667012 (kb)
Bytes received 680347 (kb)
Error Count (alloc) 0
Error Count (accept) 0
Error Count (bind) 0
Error Count (connect) 0
Error Count (socket) 0
Error Count (read) 134
Error Count (write) 0
Error Count (retry) 40
Error Count (poll) 0
Error Count (scan reset) 2
Error Count (urlfilter wait) 3
Last Error 104
Web responses clean 17950
Web responses scan errors 23
Web responses detected 16
Web responses infected with worms 0
Web responses infected with viruses 0
Web responses infected with susp 0
Web responses file blocked 0
Web responses file exempt 0
Web responses bannedword detected 0
Web requests oversize pass 16
Web requests oversize block 0
Last Server Scan errors 102
URL requests exempt 0
URL requests blocked 0
URL requests passed 0
URL requests submit error 0
URL requests rating error 0
URL requests rating block 0
URL requests rating allow 10025
URL requests infected with worms 0
Web requests detected 0
Web requests file blocked 0
Web requests file exempt 0
POST requests clean 512
POST requests scan errors 0
POST requests infected with viruses 0
POST requests infected with susp 0
POST requests file blocked 0
POST requests bannedword detected 0
POST requests oversize pass 0
POST requests oversize block 0
Web request backlog drop 0
Web response backlog drop 0
Worker Accounting
poll=721392/649809/42 pollfail=0 cmdb=85 scan=19266 acceptor=25975
HTTP Accounting
setup_ok=8316 setup_fail=0 conn_ok=0 conn_inp=8316
urlfilter=16553/21491/20 uf_lookupf=0
scan=23786 clt=278876 srv=368557
SMTP Accounting
setup_ok=12 setup_fail=0 conn_ok=0 conn_inp=12
scan=12 suspend=0 resume=0 reject=0 spamadd=0 spamdel=0 clt=275 srv=279
POP3 Accounting
setup_ok=30 setup_fail=0 conn_ok=0 conn_inp=30
scan=3 clt=5690 srv=5836
IMAP Accounting
setup_ok=0 setup_fail=0 conn_ok=0 conn_inp=0
scan=0 clt=0 srv=0
FTP Accounting
setup_ok=0 setup_fail=0 conn_ok=0 conn_inp=0
scan=0 clt=0 srv=0 datalisten=0 dataclt=0 datasrv=0
NNTP Accounting
setup_ok=0 setup_fail=0 conn_ok=0 conn_inp=0
scan=0 clt=0 srv=0
Section descriptions:
Section |
Description |
---|---|
HTTP Common current connections |
This displays an entry for each protocol. Each protocol displays the connections currently used, and the maximum connections allowed. This maximum is for the UTM proxy, which means all of the protocol connections combined cannot be larger than this number. The maximum session count for each protocol is the same. You may also see |
Worker Stat | This displays statistics about the UTM proxy including how long it has been running, and how many errors it has found. |
HTTP Stat |
This section includes statistics about the HTTP protocol proxy. This is a very extensive list that includes errors, web responses, and any UTM positive matches. There are similar sections for each protocol, but the specific entries for the protocol will vary based on what UTM scanning is looking for (spam control for email, file transfer blocking for FTP, and so on). |
Worker Accounting |
Lists accounting information about the UTM proxy such as polling statistics, how many sessions were scanned, and how many were accepted. This information can show you if expected AV scanning is taking place or not. Under normal operation there should not be errors or fails. |
HTTP Accounting |
The accounting sections for each protocol provide information about successful session creation, failures, how many sessions are being scanned or filtered, and how many are client or server originated. If |
Related commands
To dump memory usage:
# get test proxyworker 1
To display statistics per VDOM:
# get test proxyworker 4444
To restart the proxy:
# get test proxyworker 99