See the following sections:
- flood {
- threshold number ;
- }
- [edit security screen ids-option screen-name icmp]
Statement modified in Release 9.2 of JUNOS software.
Configure the device to detect and prevent Internet Control Message Protocol (ICMP) floods. An ICMP flood occurs when ICMP echo requests are broadcast with the purpose of flooding a system with so much data that it first slows down, and then times out and is disconnected. The threshold defines the number of ICMP packets per second allowed to ping the same destination address before the device rejects further ICMP packets.
This statement is supported on J-series and SRX-series devices.
threshold number —Number of ICMP packets per second allowed to ping the same destination address before the device rejects further ICMP packets.
![]() |
Note: For SRX-series devices the applicable range is 1 through 4000000 per second. |
For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
- flood {
- threshold number ;
- }
- [edit security screen ids-option screen-name udp]
Statement modified in Release 9.2 of JUNOS software.
Configure the device to detect and prevent UDP floods. UDP flooding occurs when an attacker sends UDP packets to slow down the system to the point that it can no longer process valid connection requests.
The threshold defines the number of UDP packets per second allowed to ping the same destination IP address/port pair. When the number of packets exceeds this value within any 1-second period, the device generates an alarm and drops subsequent packets for the remainder of that second.
This statement is supported on J-series and SRX-series devices.
threshold number —Number of UDP packets per second allowed to ping the same destination address before the device rejects further UDP packets.
![]() |
Note: For SRX-series devices the applicable range is 1 through 4000000 per second. |
For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.