Monitoring Stateful Firewall Statistics; Monitoring Stateful Firewall Filters; Monitoring Firewall Intrusion Detection Services (Ids) - Juniper J-Series Administration Manual

Juniper networks router administration guide
Hide thumbs Also See for J-Series:
Table of Contents

Advertisement

This section contains the following topics:

Monitoring Stateful Firewall Statistics

To view stateful firewall filter statistics in the J-Web interface, select
Monitor>Firewall>Statistics Summary. Alternatively, enter the CLI command
services stateful-firewall statistics
Table 70 on page 137 summarizes key output fields for stateful firewall filter statistics.
Table 70: Summary of Key Stateful Firewall Statistics Output Fields
Field
Values
Interface
Name of the services interface on which the service set is applied.
Service Set
Name of the service set.
Accept
Number of packets accepted by all rules defined in the service set.
Discard
Number of packets discarded by all rules defined in the service set.
Reject
Number of packets rejected by all rules defined in the service set.
New flows
Number of packets matching rules defined in new flows:
Existing flows
Number of packets matching rules defined in existing flows:
Drops
Number of packets dropped due to the following match conditions:
For more information about these match conditions, see the J-series Services Router Advanced WAN
Access Configuration Guide and the JUNOS Services Interfaces Configuration Guide.
Monitoring Stateful Firewall Statistics on page 137
Monitoring Stateful Firewall Filters on page 138
Monitoring Firewall Intrusion Detection Services (IDS) on page 139
Accept—Number of packets accepted.
Discards—Number of packets discarded.
Rejects—Number of packets rejected.
Accept—Number of packets accepted.
Discards—Number of packets discarded.
Rejects—Number of packets rejected.
IP Option—Number of packets dropped due to the inspection of the IP options field of the
packet.
TCP SYN Defense—Number of packets dropped due to the SYN defender, which prevents
denial-of-service (DoS) attacks.
NAT Ports Exhausted—Number of packets dropped because the router has no available NAT
ports to assign for a given source address.
Chapter 7: Monitoring the Router and Routing Operations
.
Using the Monitoring Tools
show
137

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents