Fortinet white logo
Fortinet white logo

FortiOS Carrier

PFCP diagnose commands

PFCP diagnose commands

You can use the following command to display information about active PFCP sessions:

diagnose firewall pfcp {profile | path | request | stat | hash-stat-session | hash-stat-path | hash-stat-req | runtime-stat | session }

profile list list PFCP profiles.

path {list | flush} list and delete PFCP paths.

request {list | flush} list and delete PFCP requests.

stat display PFCP statistics.

hash-stat-session display PFCP session hash statistics.

hash-stat-path display PFCP path hash statistics.

hash-stat-req PFCP request hash statistics.

runtime-stat PFCP runtime statistics.

session {list | flush | filter} list PFCP sessions. You can use filter to filter the sessions to display and flush to delete all current PFCP sessions.

Example session output

The following example, shows the information displayed by for a single PFCP session:

diagnose firewall pfcp session list
list pfcp sessions

-----------prof=Sxb-profile ref=11 pdr=4 far=3 te=0 n4u=0-----------
-----------index=0000004d life=6(sec) idle=6(sec) vd=0  ver=1-----------
c_pkt=2 c_bytes=645 u_pkt=0 u_bytes=0
Control Plane fseid:
    addr=172.30.111.5/::1 vd=0 seid=0000000000000022
User Plane fseid:
    addr=172.30.111.7 vd=0 seid=0000000000000021
4 PDRs:
pdr_id=1 ue_ip_addr=10.45.0.35 far_id=1 source_interface=Core traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
pdr_id=2 ue_ip_addr=Unknown far_id=2 source_interface=Access traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
1 FTEIDs shown:
        addr=172.30.111.7 teid=0x00000082 vd=0 packet=0 bytes=0 fteid_type=PDR destination_interface=Invalid
pdr_id=3 ue_ip_addr=Unknown far_id=1 source_interface=CP traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
1 FTEIDs shown:
        addr=172.30.111.7 teid=0x00000083 vd=0 packet=0 bytes=0 fteid_type=PDR destination_interface=Invalid
pdr_id=4 ue_ip_addr=Unknown far_id=3 source_interface=Access traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
3 FARs:
far_id=1 CP-allocated apply_action=Forward 
1 FTEIDs shown:
        addr=172.30.111.6 teid=0x0000015d vd=0 packet=0 bytes=0 fteid_type=FAR Forward destination_interface=Access
far_id=2 CP-allocated apply_action=Forward 
far_id=3 CP-allocated apply_action=Forward 
1 FTEIDs shown:
        addr=172.30.111.5/::1 teid=0x00000022 vd=0 packet=0 bytes=0 fteid_type=FAR Forward destination_interface=CP

PFCP diagnose commands

PFCP diagnose commands

You can use the following command to display information about active PFCP sessions:

diagnose firewall pfcp {profile | path | request | stat | hash-stat-session | hash-stat-path | hash-stat-req | runtime-stat | session }

profile list list PFCP profiles.

path {list | flush} list and delete PFCP paths.

request {list | flush} list and delete PFCP requests.

stat display PFCP statistics.

hash-stat-session display PFCP session hash statistics.

hash-stat-path display PFCP path hash statistics.

hash-stat-req PFCP request hash statistics.

runtime-stat PFCP runtime statistics.

session {list | flush | filter} list PFCP sessions. You can use filter to filter the sessions to display and flush to delete all current PFCP sessions.

Example session output

The following example, shows the information displayed by for a single PFCP session:

diagnose firewall pfcp session list
list pfcp sessions

-----------prof=Sxb-profile ref=11 pdr=4 far=3 te=0 n4u=0-----------
-----------index=0000004d life=6(sec) idle=6(sec) vd=0  ver=1-----------
c_pkt=2 c_bytes=645 u_pkt=0 u_bytes=0
Control Plane fseid:
    addr=172.30.111.5/::1 vd=0 seid=0000000000000022
User Plane fseid:
    addr=172.30.111.7 vd=0 seid=0000000000000021
4 PDRs:
pdr_id=1 ue_ip_addr=10.45.0.35 far_id=1 source_interface=Core traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
pdr_id=2 ue_ip_addr=Unknown far_id=2 source_interface=Access traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
1 FTEIDs shown:
        addr=172.30.111.7 teid=0x00000082 vd=0 packet=0 bytes=0 fteid_type=PDR destination_interface=Invalid
pdr_id=3 ue_ip_addr=Unknown far_id=1 source_interface=CP traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
1 FTEIDs shown:
        addr=172.30.111.7 teid=0x00000083 vd=0 packet=0 bytes=0 fteid_type=PDR destination_interface=Invalid
pdr_id=4 ue_ip_addr=Unknown far_id=3 source_interface=Access traffic_endpoint_cnt=0 traffic_endpoint_id=0/0
3 FARs:
far_id=1 CP-allocated apply_action=Forward 
1 FTEIDs shown:
        addr=172.30.111.6 teid=0x0000015d vd=0 packet=0 bytes=0 fteid_type=FAR Forward destination_interface=Access
far_id=2 CP-allocated apply_action=Forward 
far_id=3 CP-allocated apply_action=Forward 
1 FTEIDs shown:
        addr=172.30.111.5/::1 teid=0x00000022 vd=0 packet=0 bytes=0 fteid_type=FAR Forward destination_interface=CP