show services service-sets statistic screen-session-limit-counters (Next Gen Services)
Syntax
show services service-set statistic screen-session-limit-counters <interface interface> <service-set service-set>
Description
Display counters for session drops and packet drops resulting from session-limit checks performed by an IDS rule on an MS-MPC or MS-MIC.
Options
| none |
Display statistics for all configured services interfaces. |
| interface interface-name |
(Optional) Display statistics for the specified services interface. |
| service service-set |
Display statistics for the specified service set. |
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for the show services service-set statistics ids
session-limits counters command. Output fields are listed in the
approximate order in which they appear.
|
Field Name |
Field Description |
|---|---|
|
|
Session-limit TCP counters in the ingress direction for the following:
|
|
|
Session-limit UDP counters in the ingress direction for the following:
|
|
|
Session-limit ICMP counters in the ingress direction for the following:
|
|
|
Session-limit counters in the ingress direction for protocols other than TCP, UDP, and ICMP for the following:
|
|
|
Information for IDS rules for the service set in the egress direction.
|
|
|
Session-limit TCP counters in the egress direction for the following:
|
|
|
Session-limit UDP counters in the egress direction for the following:
|
|
|
Session-limit ICMP counters in the egress direction for the following:
|
|
|
Session-limit counters in the egress direction for protocols other than TCP, UDP, and ICMP for the following:
|
Sample Output
show services service-sets statistic screen-session-limit-counters
user@host> show services service-sets statistic screen-session-limit-counters
mams-3/0/0
Service set: JUNOS_NAT_SS
Ingress TCP Counters:
Sessions allowed: 0
Sessions allowed by white list: 0
Sessions allowed with syn cookie source session-limit: 0
Sessions allowed with syn cookie source CPS limit: 0
Sessions allowed with syn cookie destination session-limit: 0
Sessions allowed with syn cookie destination CPS limit: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0
Ingress UDP Counters:
Sessions allowed: 0
Sessions allowed by white list: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0
Ingress ICMP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0
Ingress Other-Protocols Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0
Egress TCP Counters:
Sessions allowed: 0
Sessions allowed by white list: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0
Egress UDP Counters:
Sessions allowed: 0
Sessions allowed by white list: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0
Egress ICMP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0
Egress Other-Protocols Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Sessions dropped due to suspicious packets: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Sessions hit due to high rate: 0Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480 and MX960 with the MX-SPC3 services card.