Summary
This article contains information about the newnslog Transmission Control Protocol
(TCP) counters, SNMP OID of the counters, and its brief description.
TCP Counters
The following table lists the newnslog TCP counters with a simple description of the
counter and the SNMP OID.
Newnslog Counter
SNMP OID
tcp_tot_ServerOpen
tcpTotServerConnOpened
tcp_tot_ServerClosed
tcpTotServerConnClosed
tcp_tot_ClientOpen
tcpTotClientConnOpened
tcp_tot_ClientClosed
tcp_tot_syn
tcpTotClientConnClosed
tcpTotSyn
tcp_tot_syn_probe
tcpTotSynProbe
tcp_tot_fin_srvr
tcpTotSvrFin
tcp_tot_fin_clnt
tcpTotCltFin
tcp_tot_timeWaitToSy
n
tcpWaitToSyn
tcp_tot_timeWaitData
tcpWaitToData
Description
Server connections initiated
by the NetScaler appliance
after startup. This counter is
reset when the appliance
restarts.
Total number of closed
server connections
Client connections initiated
on the NetScaler appliance
after startup. This counter is
reset when the appliance
restarts.
Total number of closed
client connections
SYN packets received
Probes from the NetScaler
appliance to a server. The
appliance sends a SYN
packet to the server to
check its availability and
expects a SYN_ACK packet
from the server before a
specified response timeout.
FIN packets received from
the server.
FIN packets received from
the clients.
SYN packets received on
connections that are in the
TIME_WAIT state. Packets
cannot be transferred on a
connection in this state.
Bytes of data received on
connections that are in the
TIME_WAIT state. Data
cannot be transferred on a
connection that is in this
state.
tcp_tot_clnt_flushed
tcp_tot_srvr_flushed
tcp_tot_clnt_flushed_h
o
tcp_tot_srvr_flushed_h
o
tcp_tot_clnt_flushed_a
hc
tcp_tot_srvr_flushed_a
hc
tcp_tot_clnt_flushed_p
hc
tcp_tot_srvr_flushed_p
hc
tcp_err_badchecksum
s
Client connections that are
flushed because the client is
tcpTotZombieCltConnFlushed
idle for some time.
Server connections that are
flushed because there are
no client requests in the
tcpTotZombieSvrConnFlushed queue for some time.
Half-opened client
connections that are flushed
because the three-way
tcpTotZombieHalfOpenCltConn handshakes are not
Flushed
complete.
Half-opened server
connections that are flushed
because the three-way
tcpTotZombieHalfOpenSvrCon handshakes are not
nFlushed
complete.
Active half-closed client
connections that are flushed
because the client has
closed the connection and
tcpTotZombieActiveHalfCloseCl there is no activity on the
tConnFlushed
connection.
Active half-closed server
connections that are flushed
because the server has
closed the connection and
tcpTotZombieActiveHalfCloseS there is no activity on the
vrConnFlushed
connection.
Passive half-closed client
connections that are flushed
because the NetScaler
appliance has closed the
tcpTotZombiePassiveHalfClose connection and there is no
CltConnFlushed
activity on the connection.
Passive half-closed server
connections that are flushed
because the NetScaler
appliance has closed the
tcpTotZombiePassiveHalfClose connection and there is no
SrvConnFlushed
activity on the connection.
Packets received with a
tcpErrBadCheckSum
TCP checksum error.
tcp_err_syn_n_syn_rc
vd
tcpErrSynInSynRcvd
tcp_err_syn_n_est
tcpErrSynInEst
tcp_err_syn_giveups
tcpErrSynGiveUp
tcp_err_syn_sentbada
ck
tcpErrSynSentBadAck
tcp_err_syn_retransmit tcpErrSynRetry
tcp_err_fin_retransmit
tcpErrFinRetry
tcp_err_fin_giveups
tcpErrFinGiveUp
tcp_err_fin_dup
tcpErrFinDup
tcp_err_rst
tcpErrRst
tcp_err_rst_not_est
tcpErrRstNonEst
tcp_err_rst_outof_wnd
tcpErrRstOutOfWindow
tcp_err_rst_inTimewait
s
tcpErrRstInTimewait
SYN packets received on a
connection that is in the
SYN_RCVD state. A
connection goes into the
SYN_RCVD state after
receiving a SYN packet.
SYN packets received on a
connection that is in the
ESTABLISHED state. A
SYN packet is not expected
on an ESTABLISHED
connection.
Attempts to establish a
connection on the NetScaler
appliance that timed out.
Incorrect ACK packets
received on a connection
that is in the SYN_SENT
state. An incorrect ACK
packet is the third packet in
the three-way handshake
that has an incorrect
sequence number.
SYN packets resent to a
server.
FIN packets resent to a
server or a client.
Connections that were timed
out by the NetScaler
appliance because of not
receiving the ACK packet
after retransmitting the FIN
packet four times.
Number of duplicate FIN
packets received
Reset packets received from
a client or a server
Reset packets received on a
connection that is not in the
ESTABLISHED state
Reset packets received on a
connection that is out of the
current TCP Window
Reset packets received on a
connection that is in the
TIME_WAIT state. Packets
tcp_err_srvr_retransmi
t
tcpErrSvrRetrasmit
tcp_err_clnt_retransmit tcpErrCltRetrasmit
tcp_err_full_retransmit
tcp_err_partial_retrans
mit
tcp_err_srvr_out_of_or
der
tcp_err_clnt_out_of_or
der
tcpErrFullRetrasmit
tcpErrPartialRetrasmit
tcpErrSvrOutOfOrder
tcpErrCltOutOfOrder
tcp_err_hole_client
tcpErrCltHole
tcp_err_hole_server
tcp_err_cookie_pkt_se
tcpErrSvrHole
tcpErrCookiePktSeqReject
cannot be transferred on a
connection in the
TIME_WAIT state.
Packets retransmitted by a
server. This usually occurs
because the
acknowledgement from the
NetScaler appliance has not
reached the server.
Packets retransmitted by a
client. This usually occurs
because the
acknowledgement from the
NetScaler appliance has not
reached the client.
Full packets retransmitted
by the client or the server
Partial packet retransmits by
a client or server because of
congestion on the
connection. This usually
occurs because the Window
advertised by the NetScaler
appliance is not big enough
to hold the full packet.
Out of order TCP packets
received from a server.
Out of order TCP packets
received from a client.
TCP holes created on a
client connection. When out
of order packets are
received from a client, a
hole is created on the
NetScaler appliance for
each group of missing
packets.
TCP holes created on a
server connection. When
out of order packets are
received from a server, a
hole is created on the
NetScaler appliance for
each group of missing
packets.
SYN cookie packets
q_reject
tcp_err_cookie_signat
ure_reject
tcpErrCookiePktSigReject
tcp_err_cookie_pkt_se
q_drop
tcpErrCookiePktSeqDrop
tcp_err_cookie_mss
tcpErrCookiePktMssReject
tcp_err_retransmit
tcpErrRetransmit
tcp_err_retransmit_giv
eups
tcpErrRetransmitGiveUp
tcp_max_Clients
maxTcpConnections
tcp_max_ReqPerConn
maxReqPerConnection
rejected because they
contain an incorrect
sequence number.
SYN cookie packets
rejected because they
contain an incorrect
signature.
SYN cookie packets
dropped because the
sequence number specified
in the packets is outside the
current Window.
SYN cookie packets
rejected because the
maximum segment size
(MSS) specified in the
packets is incorrect.
TCP packets retransmitted.
The NetScaler appliance
attempts to retransmit the
packet up to seven times,
after which it resets the
other half of the TCP
connection.
The number of times the
NetScaler appliance
terminates a connection
after retransmitting the
packet seven times on that
connection.
The maximum number of
connections that can be
made from the system to the
Web server(s) attached to it.
This value is applied
globally to all attached
servers.
The maximum number of
requests that the system
can pass on a particular
connection between the
system and a server
attached to it. If the Value is
zero, then it allows an
unlimited number of
requests to be passed.
tcp_err_cip_alloc
tcp_tot_ClientOpen_R
ate
tcpErrCipAlloc
tcp_tot_acl_bridge
aclTotPktsBridged
tcp_tot_acl_drop
aclTotPktsDenied
tcp_tot_acl_allow
aclTotPktsAllowed
tcp_tot_acl_nat
tcp_tot_acl_hits
aclTotPktsNAT
aclTotHits
tcp_tot_acl_miss
aclTotMisses
tcp_tot_sacl_bridge
saclTotPktsBridged
tcp_tot_sacl_drop
saclTotPktsDenied
tcp_tot_sacl_allow
saclTotPktsAllowed
tcp_tot_sacl_hits
saclTotHits
tcp_tot_sacl_miss
saclTotMisses
tcp_tot_sacl_count
saclsCount
tcp_tot_sacl6_bridge
sacl6TotPktsBridged
tcpTotClientConnOpenRate
Number of times TCP level
client header insertion
failure
Rate at which connections
are opened in the system.
Packets matching a bridge
Access Control List (ACL),
which in transparent mode
bypasses service
processing.
Packets dropped because
they match ACLs with
processing mode set to
DENY.
Packets matching ACLs with
processing mode set to
ALLOW. NetScaler
appliance processes these
packets.
Packets matching a NAT
ACL, resulting in a NAT
session.
Packets matching an ACL.
Packets not matching any
ACL.
Total packets that matched
a SimpleACL with action
BRIDGE and got bridged by
NetScaler appliance.
Packets dropped because
they match Deny Simple
ACL.
Total packets that matched
a Simple ACL with action
ALLOW and got consumed
by NetScaler appliance.
Packets matching a simple
ACL.
Packets not matching any
simple ACL.
Number of simple ACLs
configured.
Total packets that matched
a SimpleACL6 with action
BRIDGE and got bridged by
NetScaler appliance.
tcp_tot_sacl6_drop
sacl6TotPktsDenied
tcp_tot_sacl6_allow
sacl6TotPktsAllowed
tcp_tot_sacl6_hits
sacl6TotHits
tcp_tot_sacl6_miss
sacl6TotMisses
tcp_tot_sacl6_count
sacl6sCount
tcp_tot_acl6_bridge
acl6TotPktsBridged
tcp_tot_acl6_drop
acl6TotPktsDenied
tcp_tot_acl6_allow
acl6TotPktsAllowed
tcp_tot_acl6_nat
acl6TotPktsNAT
tcp_tot_acl6_hits
acl6TotHits
tcp_tot_acl6_miss
acl6TotMisses
pbr_tot_allow
pbrTotPktsAllowed
pbr_tot_deny
pbrTotPktsDenied
pbr_tot_hits
pbrTotHits
pbr_tot_miss
tcp_tot_rxpkts
tcp_tot_rxbytes
tcp_tot_txpkts
tcp_tot_txbytes
pbrTotMisses
tcpTotRxPkts
tcpTotRxBytes
tcpTotTxPkts
tcpTotTxBytes
Packets dropped because
they match deny simple
ACL6.
Total packets that matched
a SimpleACL6 with action
ALLOW and got consumed
by NetScaler appliance.
Packets matching a simple
ACL6.
Packets not matching any
simple ACL6.
Number of simple ACL6s
configured.
Packets matching a bridge
IPv6 ACL, which in
transparent mode bypasses
service processing.
Packets dropped because
they match IPv6 ACLs with
processing mode set to
DENY.
Packets matching IPv6
ACLs with processing mode
set to ALLOW. NetScaler
appliance processes these
packets.
Packets matching a NAT
ACL6, resulting in a NAT
session.
Packets matching an IPv6
ACL.
Packets not matching any
IPv6 ACL.
Total packets that matched
the PBR with action ALLOW
Total packets that matched
PBR with action DENY
Total packets that matched
any PBR
Total packets that did not
match any PBR
TCP packets received
Bytes of TCP data received
TCP packets transmitted
Bytes of TCP data
pcb_tot_zombie_called pcbTotZombieCall
tcp_tot_synheld
tcpTotSynHeld
tcp_tot_synheld_flushe
d
tcpTotSynFlush
tcp_tot_fintimewaitcon
nclosedearly
tcpTotFinWaitClosed
tcp_err_any_portalloc_
failed
tcpErrAnyPortFail
tcp_err_ip_portalloc_fa
iled
tcpErrIpPortFail
tcp_err_stray_packets
tcpErrStrayPkt
tcp_err_send_rst
tcpErrSentRst
tcp_err_bad_state_con
nections
tcpErrBadStateConn
transmitted
Number of times the Zombie
cleanup function is called.
Every time a connection is
flushed, it is marked for
cleanup. The Zombie
cleanup function clears all
these connections at
predefined intervals.
SYN packets held on the
NetScaler appliance that are
waiting for a server
connection.
SYN packets flushed on the
NetScaler appliance
because of no response
from the server for three or
more seconds.
Connections closed on the
NetScaler appliance
because the number of
connections in the
TIME_WAIT state has
exceeded the default value
of 7000.
Port allocations that have
failed on a mapped IP
address because the
maximum limit of 65536 has
exceeded or the mapped IP
address is not configured.
Port allocations that have
failed on a subnet IP
address or virtual server IP
address because the
maximum limit of 65536 has
exceeded.
Packets received on a
connection whose state is
not maintained on the
NetScaler appliance.
Reset packets sent to a
client or a server.
Connections that are not in
a valid TCP state.
tcp_tot_fast_retransmit
tcpErrFastRetransmissions
tcp_err_1st_retransmit
tcp_err_2nd_retransmi
t
tcpErrFirstRetransmissions
tcp_err_3rd_retransmit
tcpErrThirdRetransmissions
tcp_err_4th_retransmit
tcpErrForthRetransmissions
tcp_err_5th_retransmit
tcpErrFifthRetransmissions
tcp_err_6th_retransmit
tcpErrSixthRetransmissions
tcp_err_7th_retransmit
tcpErrSeventhRetransmissions
tcp_err_data_after_fin
tcpErrDataAfterFin
tcp_err_threshold
tcpErrRstThreshold
tcp_err_oowindow
tcpErrOutOfWindowPkts
tcpErrSecondRetransmissions
TCP packets on which the
NetScaler appliance
performs a fast
retransmission in response
to three duplicate
acknowledgements or a
partial acknowledgement.
The appliance assumes that
the packet is lost and
retransmits the packet
before its time-out.
Packets retransmitted once
by the NetScaler appliance.
Packets retransmitted twice
by the NetScaler appliance.
Packets retransmitted three
times by the NetScaler
appliance.
Packets retransmitted four
times by the NetScaler
appliance.
Packets retransmitted five
times by the NetScaler
appliance.
Packets retransmitted six
times by the NetScaler
appliance.
Packets retransmitted seven
times by the NetScaler
appliance. If this fails, the
appliance terminates the
connection.
Bytes received following a
connection termination
request. This error is usually
caused by reordering
packets during transmission.
Reset packets dropped
because the default
threshold of 100 resets per
10 milliseconds has
exceeded. This is a
configurable value using the
set rate Control command.
Packets received that are
out of the current advertised
tcp_err_in_congestion
_syndropped
tcpErrSynDroppedCongestion
tcp_tot_bdg_mac_mov
ed
tcpTotBdgMacMoved
tcp_tot_bdg_collisions
tcpTotBdgCollisions
tcp_err_bdg_muted
tcpErrBdgMuted
bdg_tot_pkts
totbdgpkts
bdg_tot_Mbits
totbdgMbits
tcp_cur_ServerConn
tcpCurServerConn
tcp_cur_ServerConnCl
osing
tcpCurServerConnClosing
tcp_cur_ServerConnE
st
tcpCurServerConnEstablished
tcp_cur_ServerConnO
pening
tcpCurServerConnOpening
tcp_cur_ClientConn
tcpCurClientConn
tcp_cur_ClientConnClo
sing
tcpCurClientConnClosing
tcp_cur_ClientConnEst tcpCurClientConnEstablished
Window.
SYN packets dropped
because of network
congestion.
The number of times
bridging registered MAC
moved
The number of bridging
table collisions
The number of bridging
related interface mutes
The total number of bridged
traffic
The total number of bridged
Mbits
Server connections,
including connections in the
Opening, Established, and
Closing state.
Server connections in the
Closing state, which
indicates that the connection
termination process has
initiated but is not complete.
Current server connections
in the Established state,
which indicates that data
transfer can occur between
the NetScaler appliance and
the server.
Server connections in the
Opening state, which
indicates that the
handshakes are not yet
complete.
Client connections, including
connections in the Opening,
Established, and Closing
state.
Client connections in the
Closing state, which
indicates that the connection
termination process has
initiated but is not complete.
Current client connections in
the Established state, which
tcp_cur_ClientConnOp
ening
tcpCurClientConnOpening
tcp_cur_surgequeuele
n
tcpSurgeQueueLen
tcp_cur_GlobalReuseP
ool
tcpSpareConn
tcp_cur_active_server
_conn
tcpActiveServerConn
tcp_cur_nServers
tcpCurPhysicalServers
tcp_tot_reuse_hit
tcpReuseHit
indicates that data transfer
can occur between the
NetScaler appliance and the
client.
Client connections in the
Opening state, which
indicates that the
handshakes are not yet
complete.
Connections in the surge
queue. When the NetScaler
appliance cannot open a
connection to the server, for
example when maximum
connections are reached,
the appliance queues these
requests.
Spare connections
available. To save time and
resources in establishing
another connection for a
new client, the connection
on the server is not closed
after completing the request
from the first client and is
available for serving future
requests.
Connections to a server
currently responding to
requests.
The number of physical
servers that the NetScaler
appliance has opened
connections with.
Total number of client
transactions found with the
server connection in the
reuse-pool.
Additional Resources
Refer to CTX128667 - Citrix NetScaler Administration Guide - Release 9.3 for more
information to configure SNMP.