Monitoring Stateful Firewall
This section shows how to set a stateful firewall statistics baseline, lists the system event logs associated with the stateful firewall feature, and describes the show commands you can use to view inspection lists, inspection parameters, current sessions, firewall configuration, license information, and firewall-related statistics.
System Event Logs
To troubleshoot and monitor your firewall, use the following system event logs:
For more information about using event logs, see the JUNOSe System Event Logging Reference Guide.
Establishing a Baseline for Firewall Statistics
You can establish a baseline for firewall statistics by setting a group of reference counters to zero. The router implements the baseline by reading and storing the statistics at the time the baseline is set, and then subtracting this baseline whenever you retrieve baseline-relative statistics.
baseline ip inspection global
- Use to set a statistics baseline for global firewall statistics.
- Use the delta keyword with IP show commands to specify that baselined statistics are to be shown.
- Example
host1#baseline ip inspection globalThere is no no version. baseline ip inspection name
- Use to set a statistics baseline for the specified inspection list.
- Use the delta keyword with IP show commands to specify that baselined statistics are to be shown.
- Example
host1#baseline ip inspection name list1There is no no version. Viewing Firewall Information
You can monitor the following aspects of IP by using show ip commands:
To set a statistics baseline for stateful firewall, use the baseline ip inspection global and baseline ip inspection name commands. Use the delta keyword with firewall show commands to specify that baselined statistics are to be shown.
You can use the output filtering feature of the show command to include or exclude lines of output based on a text string that you specify. See JUNOSe System Basics Configuration Guide, Chapter 2, Command-Line Interface, for details.
show ip inspect
- Inspection ListName of the inspection list
- Time since counters last resetLength of time since the statistical counters were last reset
- Number of connections permittedNumber of sessions allowed for any interface with which this inspection list is associated
- Number of current connectionsNumber of current sessions
- Number of interfaces usingNumber of interfaces using this inspection list
- Application [ application ]Audit trail control state, alert control state, and idle timeout value for each application configured in the inspection list
- Referenced by Profile(s)Name of any profile that references this inspection list and the interface direction (ingress or egress) for which the inspection list applies
host1#show ip inspectInspection Lists:(Inspection List Information Spans all virtual routers)Inspection List listinTime since counters last reset: 04:44:07Number of connections permitted 1Number of current connections 1Number of interfaces using 1Application TCPAuditing follows router stateAlerting follows router stateTimeout set to: 3000Application UDPAuditing follows router stateAlerting follows router stateTimeout set to: 30Application ICMPAuditing follows router stateAlerting follows router stateTimeout set to: 10Application FtpAuditing follows router stateAlerting follows router stateTimeout set to: 3600Referenced by Profile(s):foo (ingress)Inspection List listoutTime since counters last reset: 00:01:33Number of connections permitted 0Number of current connections 0Number of interfaces using 0Application TCPAuditing follows router stateAlerting follows router stateTimeout set to: 3000Application HttpAuditing follows router stateAlerting follows router stateTimeout set to: 3600Referenced by Profile(s):foo (egress)show ip inspect config
- AlertStatus of alert logging at the router level
- Audit trailStatus of audit trail logging at the router level
- Syn-Wait TimeAmount of time the software waits for a TCP session
- Fin-Wait TimeAmount of time a TCP session is managed after the firewall detects a FIN-exchange
- Tcp Idle TimeTCP idle timer value
- Udp Idle TimeUDP idle timer value
- Icmp Idle TimeICMP idle timer value
- Dns TimeDNS timer value
- Max Incomplete HighMax-incomplete high value
- Max Incomplete LowMax-incomplete low value
- One Minute HighOne-minute high value
- One Minute LowOne-minute low value
- Max Host NumberMaximum number of half-complete TCP sessions that the router allows to the same destination before it begins removing sessions
- Max Host Block TimeAmount of time that the router disallows connection to affected hosts after removing sessions to those hosts
- Inspection ListName of the inspection list
- Application [ application ]Audit trail control state, alert control state, and idle timeout value for each application configured in the inspection list
- Referenced by Profile(s)Name of any profile that references this inspection list and the interface direction (ingress or egress) to which the inspection list applies
- Interface AttachmentsInterfaces with which the inspection lists are associated
host1#show ip inspect configGlobal Firewall ParametersAlert is onAudit trail is offSyn-Wait Time: 30Fin-Wait Time: 5Tcp Idle Time: 3000Udp Idle Time: 30Icmp Idle Time: 10Dns Time: 5Max Incomplete High: 500Max Incomplete Low: 400One Minute High: 500One Minute Low: 400Max Host Number: 250Max Host Block Time: 0Inspection Lists:(Inspection List Information Spans all virtual routers)Inspection List listinApplication TCPAuditing follows router stateAlerting follows router stateTimeout set to: 3000Application UDPAuditing follows router stateAlerting follows router stateTimeout set to: 30Application ICMPAuditing follows router stateAlerting follows router stateTimeout set to: 10Application FtpAuditing follows router stateAlerting follows router stateTimeout set to: 3600Referenced by Profile(s):foo (ingress)Inspection List listoutApplication TCPAuditing follows router stateAlerting follows router stateTimeout set to: 3000Application HttpAuditing follows router stateAlerting follows router stateTimeout set to: 3600Referenced by Profile(s):foo (egress)Interface AttachmentsInterface: ATM10/0.1 (ingress) listinshow ip inspect name
- Inspection ListName of the inspection list
- Time since counters last resetLength of time since the statistical counters were last reset
- Number of connections permittedNumber of sessions allowed for any interface with which this inspection list is associated
- Number of current connectionsNumber of current sessions
- Number of interfaces usingNumber of interfaces using this inspection list
- Application [ application ]Audit trail control state, alert control state, and idle timeout value for each application configured in the inspection list
- Referenced by Profile(s)Name of any profile that references this inspection list and the interface direction (ingress or egress) to which the inspection list applies
host1#show ip inspect name listinInspection List list1(Information spans all virtual routers)Time since counters last reset: 04:44:04Number of connections permitted 1Number of current connections 1Number of interfaces using 1Application TCPAuditing follows router stateAlerting follows router stateTimeout set to: 3000Application UDPAuditing follows router stateAlerting follows router stateTimeout set to: 30Application ICMPAuditing follows router stateAlerting follows router stateTimeout set to: 10Application FtpAuditing follows router stateAlerting follows router stateTimeout set to: 3600Application RTSPAuditing follows router stateAlerting follows router stateTimeout set to: 3600Referenced by Profile(s):foo (ingress)show ip inspect session
- EntryTable entry number
- SourceSource address
- DestinationDestination address
- ProtProtocol operating over this session (TCP, UDP, or ICMP)
- Time since CreationTime elapsed since this session was created
- Time since last useTime elapsed since this session was last used
- Inspection NameName of the inspection list used to allow this session
- Application UsedConfigured application in the inspection list that was used to allow this session
host1#show ip inspect sessionTime Timesince since InspectionEntry Source Destination Prot Creation last use Name------ ---------------- ---------------- ---- ---------- ---------- ----------1 10.1.1.1:1038 13.1.1.1:23 TCP 00:00:49 00:00:07 listinApplicationEntry Used------ -----------1 TCPshow ip inspect statistics
- Number of blocked destinationsNumber of destinations blocked by the firewall
- Size of the half open tableNumber of half-open connections in the half-open table
- Time since last resetTime elapsed since last statistics were reset
- EvaluationsTotal number of evaluations performed
- PermitsTotal number of permits allowed
- Denies by ruleTotal number of denials based on inspection list rules
- Denies due to blocked destinationsTotal number of denials due to blocked destinations
- Evaluate permitted but no resourcesTotal number of evaluations permitted but not performed due to resource constraints
- Denies for other reasonsTotal number of denials that occurred for reasons not mentioned above
- Packets forwarded through firewallTotal number of packets forwarded through the firewall
- Bytes forwarded through firewallTotal number of bytes forwarded through the firewall
- Packets discarded (flow control error)Total number of packets discarded for flow control errors
- Packets discarded (packet error)Total number of packets discarded for packet errors
- Packets discarded (reassembly)Total number of packets discarded for reassembly errors
- Packets discarded (other)Total number of packets discarded for packet errors other than those mentioned above
- Deleted half open connectionsTotal number of deleted half-open connections
- Total blocked destinationsTotal number of blocked destinations
- Transitions into rate flood protectionTotal number of times the firewall has entered into rate flood protection because the number of half-open sessions exceeded the configured maximum value
- Transitions out of rate flood protectionTotal number of times the firewall has ceased rate flood protection because the number of half-open sessions returned to below the configured maximum value
- Transitions into size flood protectionTotal number of times the firewall has entered into SYN flood protection because the number of half-open sessions exceeded the configured maximum value
- Transitions out of size flood protectionTotal number of times the firewall has ceased SYN flood protection because the number of half-open sessions returned to below the configured maximum value
- Dynamic Translation TypeAlways reads "fully extended" to indicate a 5-tuple entry
- CurrentNumber of current sessions
- PeakNumber of peak concurrent sessions
- AccumulatedTotal number of sessions
- FailedNumber of times the router could not create a session
host1#show ip inspect statisticsVirtual Router StatisticsCurrent InformationNumber of blocked destinations: 0Size of the half open table: 0StatisticsTime since last reset 04:41:27Evaluations : 3Permits : 3Denies by rule : 0Denies due to blocked destinations : 0Evaluate permitted but no resources : 0Denies for other reasons : 0Packets forwarded through firewall : 28Bytes forwarded through firewall : 1770Packets discarded (flow control error) : 0Packets discarded (packet error) : 0Packets discarded (reassembly) : 0Packets discarded (other) : 2Deleted half open connections : 0Total blocked destinations : 0Transitions into rate flood protection : 0Transitions out of rate flood protection: 0Transitions into size flood protection : 0Transitions out of size flood protection: 0Dynamic Translation Type Current Peak Accumulated Failed---------------------------- ---------- ---------- ----------- ----------Fully Extended 1 1 3 0show license firewall
host1#show license firewallFirewall license is firewall_license