View Interface Statistics on ScreenOS

| Comments

Get command to see interface statistics on a SSG/ScreenOS

get counter statistics interface <interface>

This will display the following result:

FLFW1-> get count stati int eth0/2
Hardware counters for interface ethernet0/2:
in bytes      2391954371 | out bytes     2188210410 | early frame            0
in packets    2536213416 | out packets    926090442 | late frame             0
in no buffer           0 | out no buffer          0 | re-xmt limit           0
in overrun             0 | out underrun           0 | drop vlan              0
in coll err            0 | out coll err           0 | out cs lost            0
in misc err            0 | out misc err           0 |                         
in dma err             0 | out bs pak             0 |                         
in crc err             0 | out discard            0 |                         
in align err           0 | out defer              0 |                         
in short frame         0 | out heartbeat          0 |                         

Hardware 64-bit counters for interface ethernet0/2:
in bytes                7278066553795 |  out bytes               1376577745130
in ucast                   6831180712 |  out ucast                  5221057738
in mcast                            0 |  out mcast                           0
in bcast                            0 |  out bcast                           0

Total flow counters for interface ethernet0/2:
in bytes      1363202958 | out bytes     2188210410 | tcp proxy              0
in packets    2521677948 | out packets    926090442 | tear drop            387
in vlan                0 | out vlan               0 | in permit     3912073647
out permit    1539534845 | src route              0 | no g-parent            0
ping of death          0 | no gate sess           0 | address spoof          0
in icmp         12232565 | no nat vector         11 | land attack            0
in self                0 | no map                 0 | icmp flood         77599
in un-auth             0 | no conn                0 | no arp entry           0
udp flood              0 | in unk prot            0 | no dip                 0
winnuke                0 | in vpn         222640182 | no gate                0
port scan            194 | in other               0 | no xmit vpnf           0
ip sweep               0 | no mac                 0 | no route               0
tcp out of seq     88121 | mac relearn            0 | no frag sess           0
wrong intf             0 | slow mac               0 | no frag netpak         0
wrong slot             0 | trmng queue            0 | no sa                734
icmp broadcast         0 | trmng drop             0 | no sa policy           0
illegal pak      4739684 | tiny frag              0 | sa inactive        52449
url block              2 | syn frag               0 | sa policy deny         0
encrypt fail           0 | connections            0 | policy deny            0
mp fail                0 | misc prot              0 | auth deny              0
auth fail              2 | loopback drop         16 | big bkstr              0
proc sess              0 | mal url                0 | sessn thresh           0
invalid zone           0 | null zone              0 | no nsp-tunnel          0
IP cls failure         0 | first pak frag        18 | unknown pak     14532135
multiauth drop         0 | multi-DIP drop         0 | tcp sweep              0
udp sweep              0 | tcp check drop         0 | 

Deciphering Output

address spoof Number of suspected address spoofing attack packets received
auth deny Number of times user authentication was denied
auth fail Number of times user authentication failed
big bkstr Number of packets that are too big to buffer in the ARP back store while waiting for MAC-to-IP address resolution
connections Number of sessions established since the last boot
encrypt fail Number of failed Point-to-Point Tunneling Protocol (PPTP) packets
*icmp broadcast Number of ICMP broadcasts received
icmp flood Number of ICMP packets that are counted toward the ICMP flood threshold
illegal pak Number of packets dropped because they do not conform to the protocol standards
in arp req Number of incoming arp request packets
in arp resp Number of outgoing arp request packets
in bytes Number of bytes received
in icmp Number of Internet Control Message Protocol (ICMP) packets received
in other Number of incoming packets that are of a different Ethernet type
in packets Number of packets received
in self Number of packets addressed to the Management IP address
*in un auth Number of unauthorized incoming TCP, UDP, and ICMP packets
*in unk prot Number of incoming packets using an unknown Ethernet protocol
in vlan Number of incoming vlan packets
in vpn Number of IPsec packets received
invalid zone Number of packets destined for an invalid security zone
ip sweep Number of packets received and discarded beyond the specified ip sweep threshold
land attack Number of suspected land attack packets received
loopback drop Number of packets dropped because they cannot be looped back through the security device. An example of a loopback session is when a host in the Trust zone sends traffic to a MIP or VIP address that is mapped to a server that is also in the Trust zone. The security device creates a loopback session that directs such traffic from the host to the MIP or VIP server. mac relearn Number of times that the MAC address learning table had to relearn the interface associated with a MAC address because the location of the MAC address changed
mac tbl full Number of times that the MAC address learning table completely filled up
mal url Number of blocked packets destined for a URL determined to be malicious
*misc prot Number of packets using a protocol other than TCP, UDP, or ICMP
mp fail Number of times a problem occurred when sending a PCI message between the master processor module and the processor module
no conn Number of packets dropped because of unavailable Network Address Translation (NAT) connections
no dip Number of packets dropped because of unavailable Dynamic IP (DIP) addresses
no frag netpak Number of times that the available space in the netpak buffer fell below 70%
*no frag sess The number of times that fragmented sessions were greater than half of the maximum number of NAT sessions
no g-parent Number of packets dropped because the parent connection could not be found
no gate Number of packets dropped because no gate was available
no gate sess Number of terminated sessions because there were no gates in the firewall for them
no map Number of packets dropped because there was no map to the trusted side
no nat vector Number of packets dropped because the Network Address Translation (NAT) connection was unavailable for the gate
*no nsp tunnel Number of dropped packets sent to a tunnel interface to which no VPN tunnel is bound
no route Number of unroutable packets received
no sa The number of packets dropped because no Security Associations (SA) was defined
no sa policy Number of packets dropped because no policy was associated with an SA
*no xmit vpnf Number of dropped VPN packets due to fragmentation
null zone Number of dropped packets erroneously sent to an interface bound to the Null zone
nvec err Number of packets dropped because of NAT vector error
out bytes Number of bytes sents
out defer Number of deferred outgoing packets
out packets Number of packets sent
out defer Number of deferred outgoing packets
out vlan Number of outgoing vlan packets
ping of death Number of suspected Ping of Death attack packets received
policy deny Number of packets denied by a defined policy
port scan Number of packets that are counted as a port scan attempt
proc sess Number of times that the total number of sessions on a processor module exceeded the maximum threshold
sa inactive Number of packets dropped because of an inactive SA
sa policy deny Number of packets denied by an SA policy
sessn thresh the threshold for the maximum number of sessions
*slow mac Number of frames whose MAC addresses were slow to resolve
src route Number of packets dropped because of the filter source route option
syn frag Number of dropped SYN packets because of a fragmentation
tcp out of seq Number of TCP segments received whose sequence number is outside the acceptable range
tcp proxy Number of packets dropped from using a TCP proxy such as the SYN flood protection option or user authentication
teardrop Number of packets blocked as part of a suspected Teardrop attack
tiny frag Number of tiny fragmented packets received
trmn drop Number of packets dropped by traffic management
trmng queue Number of packets waiting in the queue
udp hdlen err Number of packets where the IP header is less than the IP header + UDP header. If IP Total Length is less than 28 bytes (8 bytes UDP header + 20 bytes IP header), it will increase this counter. This type of traffic is not valid.
udp flood Number of UDP packets that are counted toward the UDP flood threshold
unknown pak Any packets with an Ethernet type that the firewall does not recognize. Examples would be Spanning Tree or proprietary Cisco protocols that the firewall does not pass or is capable of reading. When the firewall sees a packet with a Ethernet type it does not recognize, it will drop the packet and increment the ‘unknown pak’ counter.
url block Number of HTTP requests that were blocked
winnuke Number of WinNuke attack packets received
wrong intf Number of session creation messages sent from a processor module to the master processor module
wrong slot Number of packets erroneously sent to the wrong processor module

Sources

http://kb.juniper.net/InfoCenter/index?page=content&id=KB4257
http://kb.juniper.net/InfoCenter/index?page=content&id=KB4261

counters, interface, juniper, screenos

Comments