Citrix ADC Internet Protocol (IP) Counters

Citrix ADC Internet Protocol (IP) Counters

book

Article ID: CTX131805

calendar_today

Updated On:

Description

This article contains information about the newnslog Internet Protocol (IP) counters and a brief description of the counters.

Using the Counters

Log on to the NetScaler using an SSH client, change to SHELL, navigate to the /var/nslog directory, and then use the ‘nsconmsg’ command to see comprehensive statistics using the different counters available. For the detailed procedure refer to Citrix Blog - NetScaler ‘Counters’ Grab-Bag!.

The newnslog IP Counters

The following table lists the different newnslog IP counters and a brief description of the counter.

Counter

Description                                     

ip_tot_rxpkts

IP packets received

ip_tot_rxbytes

Bytes of IP data received

ip_tot_txpkts

IP packets transmitted

ip_tot_txbytes

Bytes of IP data transmitted

ip_tot_rxMbits

Megabits of IP data received

ip_tot_txMbits

Megabits of IP data transmitted.

ip_tot_routedpkts

Total routed packets

ip_tot_routedMbits

Total routed Mbits

ip_tot_fragments

IP fragments received

ip_tot_addr_lookup_done

IP address lookups performed by the NetScaler appliance. When a packet is received on a non-established session, the NetScaler appliance checks if the destination IP address is one of the NetScaler owned IP addresses.

ip_tot_udp_frag_fwd

UDP fragments forwarded to the client or the server

ip_tot_tcp_frag_fwd

TCP fragments forwarded to the client or the server

ip_tot_makefrag_pkts

Fragmented packets created by the NetScaler

ip_tot_reass_attempts

IP packets that the NetScaler appliance attempts to reassemble. If one of the fragments is missing, the entire packet is dropped.

ip_tot_reass_success

Fragmented IP packets successfully reassembled on the NetScaler appliance

ip_tot_l2_mode_drops

Total number of IP packets dropped due to L2 Mode disabled

ip_tot_l3_mode_drops

Total number of IP packets dropped due to L3 Mode disabled

ip_tot_secondary_pe_drops

Total number of IP packets dropped by the Secondary NetScaler appliance

ip_tot_loopback_drops

Total number of Loopback IP packets dropped

ip_tot_subnet_bcast_drops

Total number of IP packets dropped due to destination address as subnet broadcast

ip_err_badchecksums

Packets received with an IP checksum error

ip_err_reass_failure

Packets received that could not be reassembled. This can occur when there is a checksum failure, an identification field mismatch, or when one of the fragments is missing.

ip_err_reass_len_err

Packets received for which the reassembled data exceeds the Ethernet packet data length of 1500 bytes.

ip_err_reass_zerolenfrags

Packets received with a fragment length of 0 bytes.

ip_err_reass_dupfrags

Duplicate IP fragments received. This can occur when the acknowledgement was not received within the expected time.

ip_err_reass_ooofrags

Fragments received that are out of order.

ip_err_unknown_destination

Packets received in which the destination IP address was not reachable or not owned by the NetScaler appliance.

ip_err_bad_transport

Packets received in which the protocol specified in the IP header is unknown to the NetScaler appliance.

ip_err_natvip_down

Packets received for which the Virtual IP is down. This can occur when all the services bound to the Virtual IP are down or the Virtual IP is manually disabled.

ip_err_fixheader

Packets received that contain an error in one or more components of the IP header.

ip_tot_addr_lookup_failed

IP address lookups performed by the NetScaler appliance that have failed because the destination IP address of the packet does not match any of the NetScaler owned IP addresses.

ip_err_hdrsize

Packets received in which an invalid data length is specified, or the value in the length field and the actual data length do not match. The range for the Ethernet packet data length is 0-1500 bytes.

ip_err_packetlen

Total number of packets received by the NetScaler appliance with invalid IP packet size

ip_err_nsblen

Truncated IP packets received. An overflow in the routers along the path can truncate IP packets.

net_err_noniplen

Truncated non-IP packets received

ip_err_zero_nexthop

Packets received that contain a 0 value in the next hop field. These packets are dropped.

net_err_badlen_txpkts

Packets received with a length greater than the normal maximum transmission unit of 1514 bytes.

net_err_badMACAddr_txpkts

IP packets transmitted with a bad MAC address

ip_err_max_clients

Attempts to open a new connection to a service for which the maximum limit has been exceeded. Default value, 0, applies no limit.

ip_err_unknown_services

Packets received on a port or service that is not configured

ip_err_landattack

Land-attack packets received. The source and the destination addresses are the same.

ip_err_ttl_expired

Packets for which the time-to-live (TTL) expired during transit. These packets are dropped.

Issue/Introduction

This article contains information about the newnslog Internet Protocol (IP) counters and a brief description of the counters.