nterface Screen Counters

The NetScreen device provides screen counters for monitoring general firewall behavior and for viewing the amount of traffic affected by specified policies.

Viewing the Interface Screen Counters

Interpreting the Interface Screen Counters

The Interface Screen Counters provide the following information:

Bad IP Option Detection: Indicates the number of frames discarded due to malformed or incomplete IP Options.

Block Fragment Traffic: Indicates the number of fragments blocked.

Block Java/Active X Component: Indicates the number of Java or Active X components blocked.

FIN bit with no ACK bit: Indicates the number of packets detected and dropped with an illegal combination of flags.

ICMP Flood Protection: Indicates the number of ICMP packets blocked as part of an ICMP flood.

ICMP Fragment: Indicates the number of ICMP frames with the More Fragments flag set, or with offset indicated in the offset field.

IP Loose Src Route Option: Indicates the number of IP packets detected with the Loose Source Route option enabled.

IP Record Route Option: Indicates the number of frames detected with the Record Route option enabled.

IP Security Option: Indicates the number of frames discarded with the IP Security option set.

IP Spoofing Attack Protection: Indicates the number of IP addresses blocked as part of an IP spoofing attack.

IP Strict Src Route Option: Indicates the number of packets detected with the Strict Source Route option enabled.

IP Stream Option: Indicates the number of packets discarded with the IP Stream identifier set.

IP Sweep Protection: Indicates the number of IP sweep attack packets detected and blocked.

IP Timestamp Option: Indicates the number of IP packets discarded with the Internet Timestamp option set.

Land Attack Protection: Indicates the number of packets blocked as part of a suspected land attack.

Large ICMP Packet: Indicates the number of ICMP frames detected with an IP length greater than 1024.

limit session: Indicates the number of undeliverable packets because the session limit had been reached.

Malicious URL Protection: Indicates the number of suspected malicious URLs blocked.

Ping-of-Death Protection: Indicates the number of suspected and rejected ICMP packets that are oversized or of an irregular size.

Port Scan Protection: Indicates the number of port scans detected and blocked.

Source Route IP Option Filter: Indicates the number of IP source routes filtered.

SYN and FIN bits set: Indicates the number of packets detected with an illegal combination of flags.

SYN Flood Protection: Indicates the number of SYN packets detected as part of a suspected SYN flood.

SYN Fragment Detection: Indicates the number of packet fragments dropped as part of a suspected SYN fragments attack.

SYN-ACK-ACK-Proxy DoS: Indicates the number of blocked packets because of the SYN-ACK-ACK-proxy DoS SCREEN option.

TCP Packet without Flag: Indicates the number of illegal packets dropped with missing or malformed flags field.

Tear-drop Attack Protection: Indicates the number of packets blocked as part of a tear-drop attack.

UDP Flood Protection: Indicates the number of UDP packets dropped as part of a suspected UDP flood.

Unknown Protocol Protection: Indicates the number of packets blocked as part of an unknown protocol.

WinNuke Attack Protection: Indicates the number of packets detected as part of a suspected winnuke attack.

Note: You can also view hardware counters that monitor hardware performance, and flow counters that monitor the number of packets inspected at the flow level. For more information, see Interface Statistics.