Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

show security idp attack table

date_range 19-Nov-23

Syntax

content_copy zoom_out_map
show security idp attack table
<logical-system (logical-system-name | all)>
<tenant tenant-name>

Description

Displays the detailed information of IDP attack table and displays the IPv6 covert channels which are identified and mitigated.

Options

none

Displays the details of the IDP attack table.

logical-system logical-system-name

(Optional) Displays the details of the IDP attack table for a specific logical system.

logical-system all

(Optional) Displays the details of the IDP attack table for all logical systems.

tenant tenant-name

(Optional) Displays the details of the IDP attack table for a specific tenant system.

Required Privilege Level

view

Output Fields

Table 1 lists the output fields for the show security idp attack table command. Output fields are listed in the approximate order in which they appear.

Table 1: show security idp attack table Output Fields

Field Name

Field Description

Attack name

Name of the attack that you want to match in the monitored network traffic.

Hits

Total number of attack matches.

On SRX Series Firewalls, for brute force and time-binding-related attacks, the logging is to be done only when the match count is equal to the threshold. That is, only one log is generated within the 60-second period in which the threshold is measured. This process prevents repetitive logs from being generated and ensures consistency with other IDP platforms, such as IDP-standalone.

When no attack is seen within the 60-second period and the BFQ entry is flushed out, the match count starts over the new attack match shows up in the attack table, and the log is generated.

Sample Output

show security idp attack table

content_copy zoom_out_map
user@host> show security idp attack table             
IDP attack statistics:
  Attack name                                  #Hits
  HTTP:OVERFLOW:PI3WEB-SLASH-OF                1

show security idp attack table tenant TSYS1

content_copy zoom_out_map
user@host> show security idp attack table tenant TSYS1             
IDP attack statistics:

  Attack name                                  #Hits
  FTP:USER:ROOT                                1

Release Information

Command introduced in Junos OS Release 9.2.

logical-system option introduced in Junos OS Release 18.3R1.

IPv6 covert channels are detected in Junos OS Release 19.1R1.

tenant option introduced in Junos OS Release 19.2R1.

footer-navigation