Monitoring Suspicious Control Flow
Use the commands described in this section to monitor suspicious control flows.
show suspicious-control-flow-detection counts
•
Use to display statistics for suspicious control flow detection. When a slot is specified,
displays only information for the specific slot. If no slot is specified, displays information
for all slots.
•
The
delta
keyword displays statistics for the current baseline.
•
Field descriptions
•
Number of suspicious flows total—Total number of suspicious flows, current and
past
•
Number of suspicious flows current—Number of suspicious flows currently detected
and monitored
•
Number of groups total—Total number of groups, current and past
•
Number of groups current—Number of groups currently detected and monitored
•
Number of false negatives total—Total number of flows monitored that have not
become suspicious (exceeded their threshold)
•
Number of false negatives current—Current number of flows monitored that have
not become suspicious (exceeded their threshold)
•
Number of table overflows—Number of times a flow table overflows
•
Example
host1(config)#
show suspicious-control-flow-detection counts
Suspicious Flow Detection System Counts
Number of suspicious flows total: 0
Number of suspicious flows current: 0
Number of groups total: 0
Number of groups current: 0
Number of false negatives total: 0
Number of false negatives current: 0
Number of table overflows: 0
•
See show suspicious-control-flow-detection counts.
show suspicious-control-flow-detection flows
•
Use to display suspicious flows.
•
Field descriptions
•
Interface—Interface for the flow
•
Protocol—Control protocol of the flow
•
MAC address—Source MAC address of the flow
441
Copyright © 2010, Juniper Networks, Inc.
Chapter 7: Passwords and Security
Summary of Contents for JUNOSE 11.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 3 x System Basics Configuration Guide...
Page 24: ...Copyright 2010 Juniper Networks Inc xxiv JunosE 11 3 x System Basics Configuration Guide...
Page 32: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 3 x System Basics Configuration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 116 JunosE 11 3 x System Basics Configuration Guide...
Page 166: ...Copyright 2010 Juniper Networks Inc 136 JunosE 11 3 x System Basics Configuration Guide...
Page 432: ...Copyright 2010 Juniper Networks Inc 402 JunosE 11 3 x System Basics Configuration Guide...
Page 488: ...Copyright 2010 Juniper Networks Inc 458 JunosE 11 3 x System Basics Configuration Guide...
Page 524: ...Copyright 2010 Juniper Networks Inc 494 JunosE 11 3 x System Basics Configuration Guide...
Page 554: ...Copyright 2010 Juniper Networks Inc 524 JunosE 11 3 x System Basics Configuration Guide...
Page 566: ...Copyright 2010 Juniper Networks Inc 536 JunosE 11 3 x System Basics Configuration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 558 JunosE 11 3 x System Basics Configuration Guide...
Page 613: ...PART 3 Index Index on page 585 583 Copyright 2010 Juniper Networks Inc...
Page 614: ...Copyright 2010 Juniper Networks Inc 584 JunosE 11 3 x System Basics Configuration Guide...
Page 632: ...Copyright 2010 Juniper Networks Inc 602 JunosE 11 3 x System Basics Configuration Guide...