The difference is only on the output as shown below: The All Sessions console provides information about all FortiGate traffic.

We have completely same setup in 32 places but this one is very high user count and high congestion .Currently temporary solution was adjust the NAT time out default value (24 hours) to some short time value and watch out the outcome .

Usage of Dynamic Port Address Translations (PAT) Dynamic PAT sessions can be seen using the same command as to show the NAT sessions, which is show ip nat translations.

This console can be filtered by Application, Country, Destination Interface, Destination IP, Destination Port, NAT Source IP, NAT Source Port, Policy, Protocol, Source, Source Interface, Source IP, and Source Port. ID/vsys application state type flag src[sport]/zone/proto (translated IP[port])
The following example shows the output of the show ip nat statistics and show ip nat translations commands.

fwx_alloc is the table that maps real source ports with Security Gateway's allocated source ports, used for NAT.

For more on filters, see Filtering options. With this, we have successfully configured Dynamic PAT. The IP address information is printed showing the IP addresses involved in a connection and the direction the connection was initiated. If only two IP addresses are shown, it is a state to or from the pfSense® box itself. Examples: The following is a sample of output from the show ip nat translations command. All Sessions. Command Description: To display active Network Address Translation (NAT) translations, use the show ip nat translations EXEC command.. Prior to using the show commands, the NAT statistics and entries in the NAT table are cleared with the clear ip nat statistics and clear ip nat translation * commands. R1(config)#ip nat inside source list 22 pool MustBeGeek overload. If three are shown, then NAT has been applied.
Total active sessions : 7355 Active TCP sessions : 5248 Active UDP sessions : 2089 Active ICMP sessions : 16 For all information on all sessions: > show session all. A possible deployment locates clients "A" and "B" behind a Security Gateway, with 'NAT Hide' activated. I think the issue will be NAT overload config because PAT have 65535 port for one IP address. Without overloading, two inside hosts are exchanging packets with some number of outside hosts. Both NATed clients could, accidentally, use the same source port "X" and connect to …

# netstat-nat -n To display NAT connections with protocol selection, enter: # netstat-nat -np To display all connection by source IP called # netstat-nat -s To display all connections by destination IP/hostname called laptop, enter: # netstat-nat -s laptop To display SNAT connections, enter: # netstat-nat -S