Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

show security idp counters packet-log

Syntax

Description

Displays the values of all IDP packet-log counters.

Starting in Junos OS Release 22.1R1, you can enable a secure SSL or TLS connection to send encrypted IDP packet capture log to the packet capture receiver. To establish the SSL or TLS connection, you must specify the SSL initiation profile that you want to use in the IDP packet log configuration. With this encryption support the output of this command is also enhanced to provide information on maximum number of RTCOM ports.

Options

none

Displays the values of all IDP packet-log counters.

logical-system logical-system-name

(Optional) Displays the values of all IDP packet-log counters for a specific logical system.

logical-system all

(Optional) Displays the values of all IDP packet-log counters for all logical systems. Displays values for all IDP counters from Junos release version 20.3R3.

tenant tenant-name

(Optional) Displays the values of all IDP packet-log counters for a specific tenant system.

Required Privilege Level

view

Output Fields

The following table lists the output fields for the show security idp counters packet-log command. Output fields are listed in the approximate order in which they appear.

Field Name

Field Description

Total packets captured since packet capture was activated

Number of packets captured by the device by the IDP service.

Total sessions enabled since packet capture was activated

Number of sessions that have performed packet capture since the capture facility was activated.

Sessions currently enabled for packet capture

Number of sessions that are actively capturing packets at this time.

Packets currently captured for enabled sessions

Number of packets that have been captured by active sessions.

Packet clone failures

Number of packet capture failures due to cloning error.

Session log object failures

Number of objects containing log messages generated during packet capture that were not successfully transmitted to the host.

Session packet log object failures

Number of objects containing captured packets that were not successfully transmitted to the host.

Sessions skipped because session limit exceeded

Number of sessions that could not initiate packet capture because the maximum number of sessions specified for the device were conducting captures at that time.

Packets skipped because packet limit exceeded

Number of packets not captured because the packet limit specified for this device was reached.

Packets skipped because total memory limit exceeded

Number of packets not captured because the memory allocated for packet capture on this device was exceeded.

Packet log host route lookup failures

Number of times captured packet failures due to missing route details.

Number of Packet-Log RTCOM create req successful

This counter is incremented each time RTCOM com create request is successful. This does not mean that the TCP + SSL handshake is complete, and connection is UP.

Number of Packet-Log RTCOM create req failed due to invalid param

This counter is incremented each time RTCOM com create request is failed due to an invalid parameter.

Number of Packet-Log RTCOM create req failed due to quota exceed

This counter is incremented each time RTCOM com create request is failed due to lack of ports availability.

Number of Packet-Log RTCOM create req failed due to status not ready

This counter is incremented each time RTCOM com create request is failed due to IDP plugin is not registered with RTCOM or registration was failed.

Number of Packet-Log RTCOM create done event received

This counter is incremented each time IDP plugin receives an event CREATE DONE from RTCOM plugin. This event is basically received after the handshake was complete and connection is established to the host.

Number of Packet-Log RTCOM peer close event received

This counter is incremented each time IDP plugin receives an event PEER CLOSE from RTCOM plugin. This event is basically received if the SSL/TLS connection is closed by host due to some reason.

Number of Packet-Log RTCOM conn abort event received

This counter is incremented each time IDP plugin receives an event CONN ABORT from RTCOM plugin. This event is basically received if the SSL/TLS connection is aborted due to some reason.

Number of Packet-Log RTCOM data rcvd event received

This counter is incremented each time IDP plugin receives an event DATA RCVD from RTCOM plugin. This event is basically received if some data is received on the established connection from the host.

Number of Packet-Log RTCOM connections established successfully

This counter is incremented when the SSL/TLS connection is successful to the host. Basically, handshake is completed, and data can be send over the established connection.

Number of Packet-Log RTCOM connections failed after retries

This counter is incremented when SSL/TLS connection can not be established to the specified host even after 3 retries. Only 3 connection attempts are made to the configured host initially and on receiving CONN ABORT or PEER CLOSE event. If connection is no successful even after 3 attempts, no more further attempts are performed and this counter is incremented.

Number of Packet-Log RTCOM connections closed successfully

Number of SSL/TLS connections closed successfully. This counter is incremented only for such connections on which connection is up and gets closed later.

Number of Packet-Log RTCOM data send successful

This counter is incremented each time RTCOM send is successful. For a single packet log, it will be incremented multiple time as packet log is send as a chunk of 1024 bytes.

Number of Packet-Log RTCOM data send failed

This counter is incremented each time RTCOM send is failed.

Number of Packet-Log RTCOM contexts created

This counter is incremented each time a new RTCOM context structure is created for a specific host ip, host port, source ip, LSYS identifier, SSL identifier combination.

Number of Packet-Log RTCOM contexts reused

This counter is incremented each time a RTCOM context structure is reused for a specific host IP, host port, source IP, LSYS identifier, SSL identifier combination. This happens when attacks are getting detected simultaneously on a specific LSYS across different sessions. All the packet logs corresponding to those different sessions are sent using same SSL/TLS connection.

Number of Packet-Log RTCOM contexts destroyed

This counter is incremented each time a RTCOM context structure is destroyed. This happens only when no session or no packet log is referring that context to send packet logs.

Number of Packet-Log RTCOM packet log send successful

This counter is incremented each time a packet log is send successfully.

Number of Packet-Log RTCOM packet log send failed

This counter is incremented each time a packet log is send failed.

Sample Output

show security idp counters packet-log

show security idp counters packet-log logical-system LSYS1

show security idp counters packet-log tenant TSYS1

show security idp counters packet-log tenant all

Release Information

Command introduced in Junos OS Release 10.2.

logical-system option introduced in Junos OS Release 18.3R1.

tenant option introduced in Junos OS Release 19.2R1.