show security screen statistics
Syntax
show security screen statistics <zone zone-name | interface interface-name> logical-system <logical-system-name | all> root-logical-system tenant <tenant-name >
Description
Display intrusion detection service (IDS) security screen statistics.
Options
zone zone-name
—Display screen statistics for this security zone.interface interface-name
—Display screen statistics for this interface.logical-system-name
—Display screen statistics for the named logical system.root-logical-system
—(Optional) Display screen statistics for the primary logical system only.tenant
—Display the name of the tenant system.
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show security screen statistics
command. Output fields are
listed in the approximate order in which they appear.
Field Name |
Field Description |
---|---|
|
Internet Control Message Protocol (ICMP) flood counter. An ICMP flood typically occurs when ICMP echo requests use all resources in responding, such that valid network traffic can no longer be processed. |
|
User Datagram Protocol (UDP) flood counter. UDP flooding occurs when an attacker sends IP packets containing UDP datagrams with the purpose of slowing down the resources, such that valid connections can no longer be handled. |
|
Number of Transport Control Protocol (TCP) WinNuke attacks. WinNuke is a denial-of-service (DoS) attack targeting any computer on the Internet running Windows. |
|
Number of TCP port scans. The purpose of this attack is to scan the available services in the hopes that at least one port will respond, thus identifying a service to target. |
|
Number of ICMP address sweeps. An IP address sweep can occur with the intent of triggering responses from active hosts. |
|
Number of teardrop attacks. Teardrop attacks exploit the reassembly of fragmented IP packets. |
|
Number of TCP SYN attacks. |
|
Number of IP spoofs. IP spoofing occurs when an invalid source address is inserted in the packet header to make the packet appear to come from a trusted source. |
|
ICMP ping of death counter. Ping of death occurs when IP packets are sent that exceed the maximum legal length (65,535 bytes). |
|
Number of IP source route attacks. |
|
Number of TCP address sweeps. |
|
Number of land attacks. Land attacks occur when an attacker sends spoofed SYN packets containing the IP address of the victim as both the destination and source IP address. |
|
Number of TCP SYN fragments. |
|
Number of TCP headers without flags set. A normal TCP segment header has at least one control flag set. |
|
Number of IPs. |
|
Number of invalid options. |
|
Number of packets with the IP record route option enabled. This option records the IP addresses of the network devices along the path that the IP packet travels. |
|
Number of IP timestamp option attacks. This option records the time (in Universal Time) when each network device receives the packet during its trip from the point of origin to its destination. |
|
Number of IP security option attacks. |
|
Number of IP loose source route option attacks. This option specifies a partial route list for a packet to take on its journey from source to destination. |
|
Number of IP strict source route option attacks. This option specifies the complete route list for a packet to take on its journey from source to destination. |
|
Number of stream option attacks. This option provides a way for the 16-bit SATNET stream identifier to be carried through networks that do not support streams. |
|
Number of ICMP fragments. Because ICMP packets contain very short messages, there is no legitimate reason for ICMP packets to be fragmented. If an ICMP packet is so large that it must be fragmented, something is amiss. |
|
Number of large ICMP packets. |
|
Number of TCP SYN FIN packets. |
|
Number of TCP FIN flags without the acknowledge (ACK) flag. |
|
Number of concurrent sessions that can be initiated from a source IP address. |
|
Number of TCP flags enabled with SYN-ACK-ACK. To prevent flooding with SYN-ACK-ACK sessions, you can enable the SYN-ACK-ACK proxy protection screen option. After the number of connections from the same IP address reaches the SYN-ACK-ACK proxy threshold and SRX Series Firewalls running Junos OS reject further connection requests from that IP address. |
|
Number of IP block fragments. |
|
Number of concurrent sessions that can be directed to a single destination IP address. |
|
Number of UDP address sweeps. |
|
Number of packets filtered for the defined IPv6 extension headers. |
|
Number of packets filtered for the defined IPv6 hop-by-hop option types. |
|
Number of packets filtered for the defined IPv6 destination option types. |
|
Number of packets filtered for crossing the defined IPv6 extension header limit. |
|
Number of IPv6 malformed headers defined for the intrusion detection service (IDS). |
|
Number of ICMPv6 malformed packets defined for the IDS options. |
Sample Output
show security screen statistics zone scrzone
user@host> show security screen statistics zone scrzone Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 91 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0
Sample Output
show security screen statistics zone untrust (IPv6)
user@host>show security screen statistics zone untrust Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 …… IPv6 extension header 0 IPv6 extension hop by hop option 0 IPv6 extension destination option 0 IPv6 extension header limit 0 IPv6 malformed header 0 ICMPv6 malformed packet 0
Sample Output
show security screen statistics interface ge-0/0/3
user@host> show security screen statistics interface ge-0/0/3 Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 91 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0
Sample Output
show security screen statistics interface ge-0/0/1 (IPv6)
user@host> show security screen statistics interface ge-0/0/1 Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 …… IPv6 extension header 0 IPv6 extension hop by hop option 0 IPv6 extension destination option 0 IPv6 extension header limit 0 IPv6 malformed header 0 ICMPv6 malformed packet 0
Sample Output
show security screen statistics interface ge-0/0/1 node primary
user@host> show security screen statistics interface ge-0/0/1 node primary node0: -------------------------------------------------------------------------- Screen statistics: IDS attack type Statistics ICMP flood 1 UDP flood 1 TCP winnuke 1 TCP port scan 1 ICMP address sweep 1 TCP sweep 1 UDP sweep 1 IP tear drop 1 TCP SYN flood 1 IP spoofing 1 ICMP ping of death 1 IP source route option 1 TCP land attack 1 TCP SYN fragment 1 TCP no flag 1 IP unknown protocol 1 IP bad options 1 IP record route option 1 IP timestamp option 1 IP security option 1 IP loose source route option 1 IP strict source route option 1 IP stream option 1 ICMP fragment 1 ICMP large packet 1 TCP SYN FIN 1 TCP FIN no ACK 1 Source session limit 1 TCP SYN-ACK-ACK proxy 1 IP block fragment 1 Destination session limit 1
Sample Output
- show security screen statistics zone trust logical-system all
- show security screen statistics zone trust tenant TN1
- show security screen statistics zone trust tenant all
show security screen statistics zone trust logical-system all
user@host> show security screen statistics zone trust logical-system all Logical system: root-logical-system Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 0 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0 Logical system: ls1 Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 0 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0 Logical system: ls2 Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 0 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0
show security screen statistics zone trust tenant TN1
user@host> show security screen statistics zone trust tenant TN1 Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 0 UDP port scan 0 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 SYN flood source 0 SYN flood destination 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0 IPv6 extension header 0 IPv6 extension hop by hop option 0 IPv6 extension destination option 0 IPv6 extension header limit 0 IPv6 malformed header 0 ICMPv6 malformed packet 0 IP tunnel summary 0
show security screen statistics zone trust tenant all
user@host> show security screen statistics zone trust tenant all Logical system: root-logical-system creen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 0 UDP port scan 0 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 SYN flood source 0 SYN flood destination 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0 IPv6 extension header 0 IPv6 extension hop by hop option 0 IPv6 extension destination option 0 IPv6 extension header limit 0 IPv6 malformed header 0 ICMPv6 malformed packet 0 IP tunnel summary 0 Tenant: TN1 Screen statistics: IDS attack type Statistics ICMP flood 0 UDP flood 0 TCP winnuke 0 TCP port scan 0 UDP port scan 0 ICMP address sweep 0 TCP sweep 0 UDP sweep 0 IP tear drop 0 TCP SYN flood 0 SYN flood source 0 SYN flood destination 0 IP spoofing 0 ICMP ping of death 0 IP source route option 0 TCP land attack 0 TCP SYN fragment 0 TCP no flag 0 IP unknown protocol 0 IP bad options 0 IP record route option 0 IP timestamp option 0 IP security option 0 IP loose source route option 0 IP strict source route option 0 IP stream option 0 ICMP fragment 0 ICMP large packet 0 TCP SYN FIN 0 TCP FIN no ACK 0 Source session limit 0 TCP SYN-ACK-ACK proxy 0 IP block fragment 0 Destination session limit 0 IPv6 extension header 0 IPv6 extension hop by hop option 0 IPv6 extension destination option 0 IPv6 extension header limit 0 IPv6 malformed header 0 ICMPv6 malformed packet 0 IP tunnel summary 0
Release Information
Command introduced in Junos OS Release 8.5.
The node
option added in Junos OS Release 9.0.
The logical-system
all
option added in Junos OS Release 11.2R6.
Support for IPv6 extension header screens added in Junos OS Release 12.1X46-D10.
The tenant
option is introduced in Junos OS Release 18.3R1.