Fortinet white logo
Fortinet white logo

New Features

Including denied multicast sessions in the session table 7.6.1

Including denied multicast sessions in the session table 7.6.1

Sessions can be created for denied multicast traffic, enabling subsequent packets to be directly matched and dropped, reducing CPU usage and improving performance.

To configure denied multicast session inclusion:
config system setting
    set ses-denied-multicast-traffic {disable | enable}
end

Value

Description

disable

Do not add denied multicast sessions to the session table (default).

enable

Include denied multicast sessions in the session table.

Example

In this example, denied multicast sessions are included in the session table of the VDOM. A deny multicast policy is created and a packet is then sent that hits the policy. Checking the multicast session list shows that a denied multicast session is created.

To configure and test including denied multicast sessions:
  1. Enable including denied multicast sessions:

    config system setting
        set ses-denied-multicast-traffic enable
    end
  2. Create a deny multicast policy in the multicast policy table:

    config firewall multicast-policy
        edit 1
            set name "Deny_Multicast_Policy"
            set srcintf "port1"
            set dstintf "port3"
            set srcaddr "172-16-200-0"
            set dstaddr "230-0-0-1"
            set action deny
            set logtraffic all
            set auto-asic-offload disable
        next
    end
  3. Send packets to hit the deny multicast policy then check the multicast session list. The second session shown is the denied multicast session:

    # diagnose sys mcast-session list
    
    session info: id=259 vf=1 proto=17 172.16.200.55.34896->230.0.0.10.7878
    used=2 path=1 duration=8 expire=174 indev=9 pkts=4 bytes=2160
    state=00000000:
    session-npu-info: ipid/vlifid=0/0 vlanid/vtag_in=0/0 in_npuid=0 tae_index=0 qid=0 fwd_map=0x00000000
    path: log npu-deny policy=2, outdev=11, tos=0xff
    
    session info: id=260 vf=1 proto=17 172.16.200.55.33488->230.0.0.1.7878
    used=2 path=0 duration=6 expire=177 indev=9 pkts=5 bytes=2700
    state=00000200: deny
    session-npu-info: ipid/vlifid=0/0 vlanid/vtag_in=0/0 in_npuid=0 tae_index=0 qid=0 fwd_map=0x00000000
    Total 2 sessions

Including denied multicast sessions in the session table 7.6.1

Including denied multicast sessions in the session table 7.6.1

Sessions can be created for denied multicast traffic, enabling subsequent packets to be directly matched and dropped, reducing CPU usage and improving performance.

To configure denied multicast session inclusion:
config system setting
    set ses-denied-multicast-traffic {disable | enable}
end

Value

Description

disable

Do not add denied multicast sessions to the session table (default).

enable

Include denied multicast sessions in the session table.

Example

In this example, denied multicast sessions are included in the session table of the VDOM. A deny multicast policy is created and a packet is then sent that hits the policy. Checking the multicast session list shows that a denied multicast session is created.

To configure and test including denied multicast sessions:
  1. Enable including denied multicast sessions:

    config system setting
        set ses-denied-multicast-traffic enable
    end
  2. Create a deny multicast policy in the multicast policy table:

    config firewall multicast-policy
        edit 1
            set name "Deny_Multicast_Policy"
            set srcintf "port1"
            set dstintf "port3"
            set srcaddr "172-16-200-0"
            set dstaddr "230-0-0-1"
            set action deny
            set logtraffic all
            set auto-asic-offload disable
        next
    end
  3. Send packets to hit the deny multicast policy then check the multicast session list. The second session shown is the denied multicast session:

    # diagnose sys mcast-session list
    
    session info: id=259 vf=1 proto=17 172.16.200.55.34896->230.0.0.10.7878
    used=2 path=1 duration=8 expire=174 indev=9 pkts=4 bytes=2160
    state=00000000:
    session-npu-info: ipid/vlifid=0/0 vlanid/vtag_in=0/0 in_npuid=0 tae_index=0 qid=0 fwd_map=0x00000000
    path: log npu-deny policy=2, outdev=11, tos=0xff
    
    session info: id=260 vf=1 proto=17 172.16.200.55.33488->230.0.0.1.7878
    used=2 path=0 duration=6 expire=177 indev=9 pkts=5 bytes=2700
    state=00000200: deny
    session-npu-info: ipid/vlifid=0/0 vlanid/vtag_in=0/0 in_npuid=0 tae_index=0 qid=0 fwd_map=0x00000000
    Total 2 sessions