set system setting additional-threat-log on
This command enables the firewall to generate Threat logs for various packet-based attacks, including floods.
show zone-protection zone <zone-name>
Replace
<zone-name>
with the actual name of the zone you wish to inspect. Look for incrementing drop counters related to flood protection.
show interface ethernet1/1
This command provides interface statistics, including drops related to Zone Protection.
show counter global filter severity drop
This helps identify packets dropped due to protection profiles.
show running resource-monitor
This command provides information on CPU and memory usage, which can indicate flood attacks.
Navigate to Monitor > Logs > Threat .
Apply the following filter to view flood protection events:
( subtype eq 'flood' )
This displays logs where flood protection mechanisms were triggered. Note that for Zone Protection Profile-detected floods, the source and destination IPs may not be displayed.
To ensure that flood protection events are forwarded to external systems:
Flood protection events can also trigger alarms visible on the dashboard: