show ddos-protection protocols
Syntax
show ddos-protection protocols <protocol-group (aggregate | packet-type)>
Description
Display control plane DDoS protection configuration and statistics for supported protocol groups or individual packet types.
Options
none | Display information for all packet types in all protocol groups. |
aggregate |
(Optional) Display control plane DDoS protection information for the aggregate policer. The |
packet-type | (Optional) Display control plane DDoS protection information for the specified packet type in the specified protocol group. The available packet types vary by protocol group, and only some protocol groups can have policers for individual packet types. |
protocol-group | (Optional) Display control plane DDoS protection information for a protocol group. |
See the following configuration statements for the list of available protocol-group and packet-type options on different devices that you can use with this command, which are the same as the supported options you use to change default policer configurations:
For routing devices except PTX Series routers, see protocols (DDoS).
For PTX Series routers and QFX Series switches, see protocols (DDoS) (ACX Series, PTX Series, and QFX Series).
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show ddos-protection protocols
command. Output fields are listed in the approximate order in which they appear.
Field Name |
Field Description |
---|---|
|
Number of packet types |
|
Number of packets for which policer values have been modified from the default. |
|
Number of traffic flows received. |
|
Number of flows that are currently violating the flow bandwidth limit. |
|
Number of active flows that are being tracked as culprit flows by flow detection. |
|
Total number of culprit flows that have been detected, including those that have recovered or timed out. |
|
Name of protocol group. |
|
Name of packet type in protocol group. |
|
Bandwidth policer value; number of packets per second that is allowed before a violation is declared. |
|
Burst policer value; the maximum number of packets that is allowed in a burst before a violation is declared. |
|
Priority of the packet type for individual packet policers that enables more important traffic to pass through in the event of traffic congestion: |
|
Time that must pass since the last violation before the traffic flow is considered to have recovered from the attack. A notification is generated when the timer expires. |
|
State of the policer:
Disabling can occur globally for all packet types at the |
|
State of the bypass aggregate configuration:
This field appears only for individual policers. |
|
State of flow detection configured on the router:
|
|
The following information collected for the router:
|
|
The following information collected for the Routing Engine:
|
|
The following information collected for the card in the indicated slot:
Note:
|
|
State of the bypass aggregate configuration:
Dashes indicate that the bypass aggregate configuration is not available; this is possible only for aggregate policers. |
|
Indicates whether configuration has changed from the default for any line cards.
|
|
Mode of operation for suspicious flow detection for the packet type: always-on ( |
|
Bandwidth policer value; number of packets per second that is allowed before a violation is declared. |
|
Flow operation mode, flow control mode, and flow bandwidth for traffic of the packet type at each traffic flow aggregation level: subscriber ( |
|
State of automatic logging of suspicious traffic flows for the packet type: on ( |
|
State of culprit flow timeout behavior for the packet type: flow is suppressed or monitored for a configured timeout period ( |
Sample Output
- show ddos-protection protocols
- show ddos-protection protocols (Specific Packet Type with Flow Detection Disabled)
- show ddos-protection protocols (Specific Packet Type with Flow Detection Enabled and Automatic)
- show ddos-protection protocols (Specific Packet Type with Bandwidth Violation)
- show ddos-protection protocols (ARP broadcast)
- show ddos-protection protocols (ARP unicast)
- show ddos-protection protocols ip-options parameters
show ddos-protection protocols
user@host> show ddos-protection protocols Packet types: 190, Modified: 0, Received traffic: 12, Currently violated: 3 Currently tracked flows: 0, Total detected flows: 0 * = User configured value Protocol Group: IPv4-Unclassified Packet type: aggregate (Aggregate for unclassified host-bound IPv4 traffic) Aggregate policer configuration: Bandwidth: 2000 pps Burst: 10000 packets Recover time: 300 seconds Enabled: Yes Flow detection configuration: Detection mode: Automatic Detect time: 3 seconds Log flows: No Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 2000 pps System-wide information: Aggregate bandwidth is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Routing Engine information: Bandwidth: 2000 pps, Burst: 10000 packets, enabled Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by individual policers: 0 FPC slot 1 information: Bandwidth: 100% (2000 pps), Burst: 100% (10000 packets), enabled Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by individual policers: 0 Dropped by flow suppression: 0 … Protocol Group: PPPoE Packet type: aggregate (Aggregate for all PPPoE control traffic) Aggregate policer configuration: Bandwidth: 2000 pps Burst: 2000 packets Recover time: 300 seconds Enabled: Yes Flow detection configuration: Detection mode: Automatic Detect time: 3 seconds Log flows: No Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 2000 pps System-wide information: Aggregate bandwidth is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Routing Engine information: Bandwidth: 2000 pps, Burst: 2000 packets, enabled Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by individual policers: 0 FPC slot 1 information: Bandwidth: 100% (2000 pps), Burst: 100% (2000 packets), enabled Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by individual policers: 0 Dropped by flow suppression: 0 Packet type: padi (PPPoE PADI) Individual policer configuration: Bandwidth: 500 pps Burst: 500 packets Priority: Low Recover time: 300 seconds Enabled: Yes Bypass aggregate: No Flow detection configuration: Detection mode: Automatic Detect time: 3 seconds Log flows: No Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 500 pps System-wide information: Bandwidth is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Routing Engine information: Bandwidth: 500 pps, Burst: 500 packets, enabled Policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by aggregate policer: 0 FPC slot 1 information: Bandwidth: 100% (500 pps), Burst: 100% (500 packets), enabled Policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by aggregate policer: 0 Dropped by flow suppression: 0 ...
show ddos-protection protocols (Specific Packet Type with Flow Detection Disabled)
user@host> show ddos-protection protocols pppoe padi Currently tracked flows: 0, Total detected flows: 0 * = User configured value Protocol Group: PPPoE Packet type: padi (PPPoE PADI) Individual policer configuration: Bandwidth: 500 pps Burst: 500 packets Priority: Low Recover time: 300 seconds Enabled: Yes Bypass aggregate: No Flow detection configuration: Detection mode: Off* Detect time: 3 seconds Log flows: No Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 500 pps System-wide information: Bandwidth is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Routing Engine information: Bandwidth: 500 pps, Burst: 500 packets, enabled Policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by aggregate policer: 0 FPC slot 1 information: Bandwidth: 100% (500 pps), Burst: 100% (500 packets), enabled Policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by aggregate policer: 0 Dropped by flow suppression: 0
show ddos-protection protocols (Specific Packet Type with Flow Detection Enabled and Automatic)
user@host> show ddos-protection protocols pppoe padi Currently tracked flows: 0, Total detected flows: 0 * = User configured value Protocol Group: PPPoE Packet type: padi (PPPoE PADI) Individual policer configuration: Bandwidth: 500 pps Burst: 500 packets Priority: Low Recover time: 300 seconds Enabled: Yes Bypass aggregate: No Flow detection configuration: Detection mode: Automatic Detect time: 3 seconds Log flows: No Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 500 pps System-wide information: Bandwidth is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Routing Engine information: Bandwidth: 500 pps, Burst: 500 packets, enabled Policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by aggregate policer: 0 FPC slot 1 information: Bandwidth: 100% (500 pps), Burst: 100% (500 packets), enabled Policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by aggregate policer: 0 Dropped by flow suppression: 0
show ddos-protection protocols (Specific Packet Type with Bandwidth Violation)
user@host> show ddos-protection protocols bfd Packet types: 1, Modified: 0, Received traffic: 1, Currently violated: 1 Currently tracked flows: 1, Total detected flows: 1 * = User configured value Protocol Group: BFD Packet type: aggregate (Aggregate for all bfd traffic) Aggregate policer configuration: Bandwidth: 20000 pps Burst: 20000 packets Recover time: 300 seconds Enabled: Yes Flow detection configuration: Detection mode: Automatic Detect time: 3 seconds Log flows: No Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 20000 pps System-wide information: Aggregate bandwidth is being violated! No. of FPCs currently receiving excess traffic: 1 No. of FPCs that have received excess traffic: 1 Violation first detected at: 2012-10-24 23:40:20 EDT Violation last seen at: 2012-10-25 10:25:48 EDT Duration of violation: 10:45:28 Number of violations: 1 Received: 1173471731 Arrival rate: 30304 pps Dropped: 399135607 Max arrival rate: 30331 pps Flow counts: Aggregation level Current Total detected Subscriber 1 1 Total 1 1 Routing Engine information: Bandwidth: 20000 pps, Burst: 20000 packets, enabled Aggregate policer is never violated Received: 366831604 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 9522 pps Dropped by individual policers: 0 FPC slot 1 information: Bandwidth: 100% (20000 pps), Burst: 100% (20000 packets), enabled Aggregate policer is currently being violated! Violation first detected at: 2012-10-24 23:40:21 EDT Violation last seen at: 2012-10-25 10:25:48 EDT Duration of violation: 10:45:27 Number of violations: 1 Received: 1173471731 Arrival rate: 30304 pps Dropped: 399135607 Max arrival rate: 30331 pps Dropped by individual policers: 0 Dropped by aggregate policer: 398854530 Dropped by flow suppression: 281077 Flow counts: Aggregation level Current Total detected State Subscriber 1 1 Active Logical-interface 0 0 Active Physical-interface 0 0 Active Total 1 1
show ddos-protection protocols (ARP broadcast)
user@host> show ddos-protection protocols arp bcast Currently tracked flows: 0, Total detected flows: 0 * = User configured value Protocol Group: ARP Packet type: bcast (Arp broadcast) Aggregate policer configuration: Bandwidth: 10000 pps Burst: 10000 packets Priority: Low Recover time: 300 seconds Enabled: Yes Flow detection configuration: Flow detection system is off Detection mode: Automatic Detect time: 3 seconds Log flows: Yes Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 10000 pps System-wide information: Aggregate bandwidth is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Routing Engine information: Bandwidth: 10000 pps, Burst: 10000 packets, enabled Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by individual policers: 0 FPC slot 2 information: Bandwidth: 100% (10000 pps), Burst: 100% (10000 packets), enabled Hostbound queue 2 Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by individual policers: 0 Dropped by flow suppression: 0
show ddos-protection protocols (ARP unicast)
user@host> show ddos-protection protocols arp ucast Currently tracked flows: 0, Total detected flows: 0 * = User configured value Protocol Group: ARP Packet type: ucast (Arp unicast) Aggregate policer configuration: Bandwidth: 10000 pps Burst: 10000 packets Priority: High Recover time: 300 seconds Enabled: Yes Bypass aggregate: No Flow detection configuration: Flow detection system is off Detection mode: Automatic Detect time: 3 seconds Log flows: Yes Recover time: 60 seconds Timeout flows: No Timeout time: 300 seconds Flow aggregation level configuration: Aggregation level Detection mode Control mode Flow rate Subscriber Automatic Drop 10 pps Logical interface Automatic Drop 10 pps Physical interface Automatic Drop 10000 pps System-wide information: Aggregate bandwidth is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Routing Engine information: Bandwidth: 10000 pps, Burst: 10000 packets, enabled Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by individual policers: 0 FPC slot 2 information: Bandwidth: 100% (10000 pps), Burst: 100% (10000 packets), enabled Hostbound queue 3 Aggregate policer is never violated Received: 0 Arrival rate: 0 pps Dropped: 0 Max arrival rate: 0 pps Dropped by aggregate policer: 0 Dropped by flow suppression: 0
show ddos-protection protocols ip-options parameters
user@host> show ddos-protection protocols ip-options parameters Packet types: 1, Modified: 0 * = User configured value Protocol Group: IP-Options Packet type: aggregate (Aggregate for all options traffic) Aggregate policer configuration: Bandwidth: 100 pps Burst: 100 packets Priority: Medium Recover time: 300 seconds Enabled: Yes Routing Engine information: Bandwidth: 100 pps, Burst: 100 packets, enabled FPC slot 0 information: Bandwidth: 100% (100 pps), Burst: 100% (100 packets), enabled Hostbound queue 255 FPC slot 1 information: Bandwidth: 100% (100 pps), Burst: 100% (100 packets), enabled Hostbound queue 255 FPC slot 7 information: Bandwidth: 100% (100 pps), Burst: 100% (100 packets), enabled Hostbound queue 255
Release Information
Command introduced in Junos OS Release 11.2.
Support for Enhanced Subscriber Management added in Junos OS Release 17.3R1.
Support for ARP broadcast and unicast protocol added in Junos OS Release 23.2R1.