a10_ddos_dst_zone
Synopsis
Configure a static zone entry
Parameters
Parameters |
Choices/Defaults |
Comment |
|
---|---|---|---|
state str/required |
[‘noop’, ‘present’, ‘absent’] |
State of the object to be created. |
|
ansible_host str/required |
Host for AXAPI authentication |
||
ansible_username str/required |
Username for AXAPI authentication |
||
ansible_password str/required |
Password for AXAPI authentication |
||
ansible_port int/required |
Port for AXAPI authentication |
||
a10_device_context_id int |
[‘1-8’] |
Device ID for aVCS configuration |
|
a10_partition str |
Destination/target partition for object/command |
||
zone_name str/required |
Field zone_name |
||
operational_mode str |
‘idle’= Idle mode; ‘monitor’= Monitor mode; ‘learning’= Learning mode; |
||
force_operational_mode bool |
Force configure operational mode |
||
continuous_learning bool |
Continuous learning of detection |
||
traffic_distribution_mode str |
‘default’= Distribute traffic to one slot using default distribution mechanism; ‘source-ip-based’= Distribute traffic between slots, based on source ip; |
||
ip list |
Field ip |
||
ip_addr str |
Specify IP address |
||
subnet_ip_addr str |
IP Subnet |
||
expand_ip_subnet bool |
Expand this subnet to individual IP address |
||
expand_ip_subnet_mode str |
‘default’= Default learning mechanism (Default= Dynamic); ‘dynamic’= Dynamic learning; ‘static’= Static learning; |
||
ipv6 list |
Field ipv6 |
||
ip6_addr str |
Specify IPv6 address |
||
subnet_ipv6_addr str |
IPV6 Subnet |
||
expand_ipv6_subnet bool |
Expand this subnet to individual IPv6 address |
||
expand_ipv6_subnet_mode str |
‘default’= Default learning mechanism (Default= Dynamic); ‘dynamic’= Dynamic learning; ‘static’= Static learning; |
||
description str |
Description for this Destination Zone |
||
zone_profile str |
Apply threshold profile |
||
enable_top_k list |
Field enable_top_k |
||
topk_type str |
‘destination’= Topk destination IP; |
||
topk_num_records int |
Maximum number of records to show in topk |
||
glid str |
Global limit ID for the whole zone |
||
action_list str |
Configure action-list to take |
||
per_addr_glid str |
Global limit ID per address |
||
dest_nat_ip str |
Destination NAT IP address |
||
dest_nat_ipv6 str |
Destination NAT IPv6 address |
||
source_nat_pool str |
Configure source NAT |
||
non_restrictive bool |
Non-restrictive mode ignores Zero Thresholds Indicators |
||
drop_frag_pkt bool |
Drop fragmented packets |
||
sflow_common bool |
Enable sFlow counter polling packets, tcp-basic, tcp-stateful and http. WARNING= Zone level Sflow polling might induce heavy CP |
||
sflow_packets bool |
Enable sFlow packet-level counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total |
||
sflow_layer_4 bool |
Enable sFlow Layer 4 counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the number of |
||
sflow_tcp dict |
Field sflow_tcp |
||
sflow_tcp_basic bool |
Enable sFlow basic TCP counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total nu |
||
sflow_tcp_stateful bool |
Enable sFlow stateful TCP counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total |
||
sflow_http bool |
Enable sFlow HTTP counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total number |
||
advertised_enable bool |
BGP advertised |
||
telemetry_enable bool |
Enable from-l3-peer flag for the zone, thus all the ip entries in the zone will be dynamically created/deleted based on the BGP |
||
zone_template dict |
Field zone_template |
||
logging str |
DDOS logging template |
||
inbound_forward_dscp int |
To set dscp value for inbound packets (DSCP Value for the clear traffic marking) |
||
outbound_forward_dscp int |
To set dscp value for outbound |
||
reporting_disabled bool |
Disable Reporting |
||
log_enable bool |
Enable logging |
||
log_periodic bool |
Enable log periodic |
||
log_high_frequency bool |
Enable High frequency logging for non-event logs per zone |
||
rate_limit int |
Rate limit per second per zone(Default = 1 per second) |
||
set_counter_base_val int |
Set T2 counter value of current context to specified value |
||
is_from_wizard bool |
Is It Created from Onbox GUI Wizard |
||
pattern_recognition_sensitivity str |
‘high’= High sensitive pattern recognition; ‘medium’= Medium sensitive pattern recognition; ‘low’= Low sensitive pattern recognition; |
||
pattern_recognition_hw_filter_enable bool |
to enable pattern recognition hardware filter |
||
collector list |
Field collector |
||
sflow_name str |
Name of configured custom sFlow collector |
||
uuid str |
uuid of the object |
||
user_tag str |
Customized tag |
||
sampling_enable list |
Field sampling_enable |
||
counters1 str |
‘all’= all; ‘zone_tcp_any_exceed’= TCP Dst IP-Proto Rate= Total Exceeded; ‘zone_tcp_pkt_rate_exceed’= TCP Dst IP-Proto Rate= Packet Exceeded; ‘zone_tcp_conn_rate_exceed’= TCP Dst IP-Proto Rate= Conn Exceeded; ‘zone_udp_any_exceed’= UDP Dst IP-Proto Rate= Total Exceeded; ‘zone_udp_pkt_rate_exceed’= UDP Dst IP-Proto Rate= Packet Exceeded; ‘zone_udp_conn_limit_exceed’= UDP Dst IP-Proto Limit= Conn Exceeded; ‘zone_udp_conn_rate_exceed’= UDP Dst IP-Proto Rate= Conn Exceeded; ‘zone_icmp_pkt_rate_exceed’= ICMP Dst Rate= Packet Exceeded; ‘zone_other_pkt_rate_exceed’= OTHER Dst IP-Proto Rate= Packet Exceeded; ‘zone_other_frag_pkt_rate_exceed’= OTHER Dst IP-Proto Rate= Frag Exceeded; ‘zone_port_pkt_rate_exceed’= Port Rate= Packet Exceeded; ‘zone_port_conn_limit_exceed’= Port Limit= Conn Exceeded; ‘zone_port_conn_rate_exceed’= Port Rate= Conn Exceeded; ‘zone_pkt_sent’= Inbound= Packets Forwarded; ‘zone_udp_pkt_sent’= UDP Total Packets Forwarded; ‘zone_tcp_pkt_sent’= TCP Total Packets Forwarded; ‘zone_icmp_pkt_sent’= ICMP Total Packets Forwarded; ‘zone_other_pkt_sent’= OTHER Total Packets Forwarded; ‘zone_tcp_conn_limit_exceed’= TCP Dst IP-Proto Limit= Conn Exceeded; ‘zone_tcp_pkt_rcvd’= TCP Total Packets Received; ‘zone_udp_pkt_rcvd’= UDP Total Packets Received; ‘zone_icmp_pkt_rcvd’= ICMP Total Packets Received; ‘zone_other_pkt_rcvd’= OTHER Total Packets Received; ‘zone_udp_filter_match’= UDP Filter Match; ‘zone_udp_filter_not_match’= UDP Filter Not Matched on Pkt; ‘zone_udp_filter_action_blacklist’= UDP Filter Action Blacklist; ‘zone_udp_filter_action_drop’= UDP Filter Action Drop; ‘zone_tcp_syn’= TCP Total SYN Received; ‘zone_tcp_syn_drop’= TCP SYN Packets Dropped; ‘zone_tcp_src_rate_drop’= TCP Src Rate= Total Exceeded; ‘zone_udp_src_rate_drop’= UDP Src Rate= Total Exceeded; ‘zone_icmp_src_rate_drop’= ICMP Src Rate= Total Exceeded; ‘zone_other_frag_src_rate_drop’= OTHER Src Rate= Frag Exceeded; ‘zone_other_src_rate_drop’= OTHER Src Rate= Total Exceeded; ‘zone_tcp_drop’= TCP Total Packets Dropped; ‘zone_udp_drop’= UDP Total Packets Dropped; ‘zone_icmp_drop’= ICMP Total Packets Dropped; ‘zone_frag_drop’= Fragmented Packets Dropped; ‘zone_other_drop’= OTHER Total Packets Dropped; ‘zone_tcp_auth’= TCP Auth= SYN Cookie Sent; ‘zone_udp_filter_action_default_pass’= UDP Filter Action Default Pass; ‘zone_tcp_filter_match’= TCP Filter Match; ‘zone_tcp_filter_not_match’= TCP Filter Not Matched on Pkt; ‘zone_tcp_filter_action_blacklist’= TCP Filter Action Blacklist; ‘zone_tcp_filter_action_drop’= TCP Filter Action Drop; ‘zone_tcp_filter_action_default_pass’= TCP Filter Action Default Pass; ‘zone_udp_filter_action_whitelist’= UDP Filter Action WL; ‘zone_over_limit_on’= Zone overlimit Trigger ON; ‘zone_over_limit_off’= Zone overlimit Trigger OFF; ‘zone_port_over_limit_on’= Zone port overlimit Trigger ON; ‘zone_port_over_limit_off’= Zone port overlimit Trigger OFF; ‘zone_over_limit_action’= Zone overlimit action; ‘zone_port_over_limit_action’= Zone port overlimit action; ‘scanning_detected_drop’= Scanning Detected drop (deprecated); ‘scanning_detected_blacklist’= Scanning Detected blacklist (deprecated); ‘zone_udp_kibit_rate_drop’= UDP Dst IP-Proto Rate= KiBit Exceeded; ‘zone_tcp_kibit_rate_drop’= TCP Dst IP-Proto Rate= KiBit Exceeded; ‘zone_icmp_kibit_rate_drop’= ICMP Dst Rate= KiBit Exceeded; ‘zone_other_kibit_rate_drop’= OTHER Dst IP-Proto Rate= KiBit Exceeded; ‘zone_port_undef_drop’= Dst Port Undefined Dropped; ‘zone_port_bl’= Dst Port Blacklist Packets Dropped; ‘zone_src_port_bl’= Dst SrcPort Blacklist Packets Dropped; ‘zone_port_kbit_rate_exceed’= Port Rate= KiBit Exceeded; ‘zone_tcp_src_drop’= TCP Src Packets Dropped; ‘zone_udp_src_drop’= UDP Src Packets Dropped; ‘zone_icmp_src_drop’= ICMP Src Packets Dropped; ‘zone_other_src_drop’= OTHER Src Packets Dropped; ‘tcp_syn_rcvd’= TCP Inbound SYN Received; ‘tcp_syn_ack_rcvd’= TCP SYN ACK Received; ‘tcp_ack_rcvd’= TCP ACK Received; ‘tcp_fin_rcvd’= TCP FIN Received; ‘tcp_rst_rcvd’= TCP RST Received; ‘ingress_bytes’= Inbound= Bytes Received; ‘egress_bytes’= Outbound= Bytes Received; ‘ingress_packets’= Inbound= Packets Received; ‘egress_packets’= Outbound= Packets Received; ‘tcp_fwd_recv’= TCP Inbound Packets Received; ‘udp_fwd_recv’= UDP Inbound Packets Received; ‘icmp_fwd_recv’= ICMP Inbound Packets Received; ‘tcp_syn_cookie_fail’= TCP Auth= SYN Cookie Failed; ‘zone_tcp_session_created’= TCP Sessions Created; ‘zone_udp_session_created’= UDP Sessions Created; ‘zone_tcp_filter_action_whitelist’= TCP Filter Action WL; ‘zone_other_filter_match’= OTHER Filter Match; ‘zone_other_filter_not_match’= OTHER Filter Not Matched on Pkt; ‘zone_other_filter_action_blacklist’= OTHER Filter Action Blacklist; ‘zone_other_filter_action_drop’= OTHER Filter Action Drop; ‘zone_other_filter_action_whitelist’= OTHER Filter Action WL; ‘zone_other_filter_action_default_pass’= OTHER Filter Action Default Pass; ‘zone_blackhole_inject’= Dst Blackhole Inject; ‘zone_blackhole_withdraw’= Dst Blackhole Withdraw; ‘zone_tcp_out_of_seq_excd’= TCP Out-Of-Seq Exceeded; ‘zone_tcp_retransmit_excd’= TCP Retransmit Exceeded; ‘zone_tcp_zero_window_excd’= TCP Zero-Window Exceeded; ‘zone_tcp_conn_prate_excd’= TCP Rate= Conn Pkt Exceeded; ‘zone_tcp_action_on_ack_init’= TCP Auth= ACK Retry Init; ‘zone_tcp_action_on_ack_gap_drop’= TCP Auth= ACK Retry Retry-Gap Dropped; ‘zone_tcp_action_on_ack_fail’= TCP Auth= ACK Retry Dropped; ‘zone_tcp_action_on_ack_pass’= TCP Auth= ACK Retry Passed; ‘zone_tcp_action_on_syn_init’= TCP Auth= SYN Retry Init; ‘zone_tcp_action_on_syn_gap_drop’= TCP Auth= SYN Retry-Gap Dropped; ‘zone_tcp_action_on_syn_fail’= TCP Auth= SYN Retry Dropped; ‘zone_tcp_action_on_syn_pass’= TCP Auth= SYN Retry Passed; ‘zone_payload_too_small’= UDP Payload Too Small; ‘zone_payload_too_big’= UDP Payload Too Large; ‘zone_udp_conn_prate_excd’= UDP Rate= Conn Pkt Exceeded; ‘zone_udp_ntp_monlist_req’= UDP NTP Monlist Request; ‘zone_udp_ntp_monlist_resp’= UDP NTP Monlist Response; ‘zone_udp_wellknown_sport_drop’= UDP SrcPort Wellknown; ‘zone_udp_retry_init’= UDP Auth= Retry Init; ‘zone_udp_retry_pass’= UDP Auth= Retry Passed; ‘zone_tcp_bytes_drop’= TCP Total Bytes Dropped; ‘zone_udp_bytes_drop’= UDP Total Bytes Dropped; ‘zone_icmp_bytes_drop’= ICMP Total Bytes Dropped; ‘zone_other_bytes_drop’= OTHER Total Bytes Dropped; ‘zone_out_no_route’= Dst IPv4/v6 Out No Route; ‘outbound_bytes_sent’= Outbound= Bytes Forwarded; ‘outbound_drop’= Outbound= Packets Dropped; ‘outbound_bytes_drop’= Outbound= Bytes Dropped; ‘outbound_pkt_sent’= Outbound= Packets Forwarded; ‘inbound_bytes_sent’= Inbound= Bytes Forwarded; ‘inbound_bytes_drop’= Inbound= Bytes Dropped; ‘zone_src_port_pkt_rate_exceed’= SrcPort Rate= Packet Exceeded; ‘zone_src_port_kbit_rate_exceed’= SrcPort Rate= KiBit Exceeded; ‘zone_src_port_conn_limit_exceed’= SrcPort Limit= Conn Exceeded; ‘zone_src_port_conn_rate_exceed’= SrcPort Rate= Conn Exceeded; ‘zone_ip_proto_pkt_rate_exceed’= IP-Proto Rate= Packet Exceeded; ‘zone_ip_proto_kbit_rate_exceed’= IP-Proto Rate= KiBit Exceeded; ‘zone_tcp_port_any_exceed’= TCP Port Rate= Total Exceed; ‘zone_udp_port_any_exceed’= UDP Port Rate= Total Exceed; ‘zone_tcp_auth_pass’= TCP Auth= SYN Auth Passed; ‘zone_tcp_rst_cookie_fail’= TCP Auth= RST Cookie Failed; ‘zone_tcp_unauth_drop’= TCP Auth= Unauth Dropped; ‘src_tcp_syn_auth_fail’= Src TCP Auth= SYN Auth Failed; ‘src_tcp_syn_cookie_sent’= Src TCP Auth= SYN Cookie Sent; ‘src_tcp_syn_cookie_fail’= Src TCP Auth= SYN Cookie Failed; ‘src_tcp_rst_cookie_fail’= Src TCP Auth= RST Cookie Failed; |
||
counters2 str |
‘src_tcp_unauth_drop’= Src TCP Auth= Unauth Dropped; ‘src_tcp_action_on_syn_init’= Src TCP Auth= SYN Retry Init; ‘src_tcp_action_on_syn_gap_drop’= Src TCP Auth= SYN Retry-Gap Dropped; ‘src_tcp_action_on_syn_fail’= Src TCP Auth= SYN Retry Dropped; ‘src_tcp_action_on_ack_init’= Src TCP Auth= ACK Retry Init; ‘src_tcp_action_on_ack_gap_drop’= Src TCP Auth= ACK Retry Retry-Gap Dropped; ‘src_tcp_action_on_ack_fail’= Src TCP Auth= ACK Retry Dropped; ‘src_tcp_out_of_seq_excd’= Src TCP Out-Of-Seq Exceeded; ‘src_tcp_retransmit_excd’= Src TCP Retransmit Exceeded; ‘src_tcp_zero_window_excd’= Src TCP Zero-Window Exceeded; ‘src_tcp_conn_prate_excd’= Src TCP Rate= Conn Pkt Exceeded; ‘src_udp_min_payload’= Src UDP Payload Too Small; ‘src_udp_max_payload’= Src UDP Payload Too Large; ‘src_udp_conn_prate_excd’= Src UDP Rate= Conn Pkt Exceeded; ‘src_udp_ntp_monlist_req’= Src UDP NTP Monlist Request; ‘src_udp_ntp_monlist_resp’= Src UDP NTP Monlist Response; ‘src_udp_wellknown_sport_drop’= Src UDP SrcPort Wellknown; ‘src_udp_retry_init’= Src UDP Auth= Retry Init; ‘dst_udp_retry_gap_drop’= UDP Auth= Retry-Gap Dropped; ‘dst_udp_retry_fail’= UDP Auth= Retry Timeout; ‘dst_tcp_session_aged’= TCP Sessions Aged; ‘dst_udp_session_aged’= UDP Sessions Aged; ‘dst_tcp_conn_close’= TCP Connections Closed; ‘dst_tcp_conn_close_half_open’= TCP Half Open Connections Closed; ‘dst_drop_frag_pkt’= Fragmented Packets Dropped; ‘src_tcp_filter_action_blacklist’= Src TCP Filter Action Blacklist; ‘src_tcp_filter_action_whitelist’= Src TCP Filter Action WL; ‘src_tcp_filter_action_drop’= Src TCP Filter Action Drop; ‘src_tcp_filter_action_default_pass’= Src TCP Filter Action Default Pass; ‘src_udp_filter_action_blacklist’= Src UDP Filter Action Blacklist; ‘src_udp_filter_action_whitelist’= Src UDP Filter Action WL; ‘src_udp_filter_action_drop’= Src UDP Filter Action Drop; ‘src_udp_filter_action_default_pass’= Src UDP Filter Action Default Pass; ‘src_other_filter_action_blacklist’= Src OTHER Filter Action Blacklist; ‘src_other_filter_action_whitelist’= Src OTHER Filter Action WL; ‘src_other_filter_action_drop’= Src OTHER Filter Action Drop; ‘src_other_filter_action_default_pass’= Src OTHER Filter Action Default Pass; ‘tcp_invalid_syn’= TCP Invalid SYN Received; ‘dst_tcp_conn_close_w_rst’= TCP RST Connections Closed; ‘dst_tcp_conn_close_w_fin’= TCP FIN Connections Closed; ‘dst_tcp_conn_close_w_idle’= TCP Idle Connections Closed; ‘dst_tcp_conn_create_from_syn’= TCP Connections Created From SYN; ‘dst_tcp_conn_create_from_ack’= TCP Connections Created From ACK; ‘src_frag_drop’= Src Fragmented Packets Dropped; ‘zone_port_kbit_rate_exceed_pkt’= Port Rate= KiBit Pkt Exceeded; ‘dst_tcp_bytes_rcv’= TCP Total Bytes Received; ‘dst_udp_bytes_rcv’= UDP Total Bytes Received; ‘dst_icmp_bytes_rcv’= ICMP Total Bytes Received; ‘dst_other_bytes_rcv’= OTHER Total Bytes Received; ‘dst_tcp_bytes_sent’= TCP Total Bytes Forwarded; ‘dst_udp_bytes_sent’= UDP Total Bytes Forwarded; ‘dst_icmp_bytes_sent’= ICMP Total Bytes Forwarded; ‘dst_other_bytes_sent’= OTHER Total Bytes Forwarded; ‘dst_udp_auth_drop’= UDP Auth= Dropped; ‘dst_tcp_auth_drop’= TCP Auth= Dropped; ‘dst_tcp_auth_resp’= TCP Auth= Responded; ‘dst_drop’= Inbound= Packets Dropped; ‘dst_entry_pkt_rate_exceed’= Entry Rate= Packet Exceeded; ‘dst_entry_kbit_rate_exceed’= Entry Rate= KiBit Exceeded; ‘dst_entry_conn_limit_exceed’= Entry Limit= Conn Exceeded; ‘dst_entry_conn_rate_exceed’= Entry Rate= Conn Exceeded; ‘dst_entry_frag_pkt_rate_exceed’= Entry Rate= Frag Packet Exceeded; ‘dst_l4_tcp_blacklist_drop’= Dst TCP IP-Proto Blacklist Dropped; ‘dst_l4_udp_blacklist_drop’= Dst UDP IP-Proto Blacklist Dropped; ‘dst_l4_icmp_blacklist_drop’= Dst ICMP IP-Proto Blacklist Dropped; ‘dst_l4_other_blacklist_drop’= Dst OTHER IP-Proto Blacklist Dropped; ‘dst_frag_timeout_drop’= Fragment Reassemble Timeout Drop; ‘dst_icmp_any_exceed’= ICMP Rate= Total Exceed; ‘dst_other_any_exceed’= OTHER Rate= Total Exceed; ‘tcp_rexmit_syn_limit_drop’= TCP SYN Retransmit Exceeded Drop; ‘tcp_rexmit_syn_limit_bl’= TCP SYN Retransmit Exceeded Blacklist; ‘dst_clist_overflow_policy_at_learning’= Dst Src-Based Overflow Policy Hit; ‘zone_frag_rcvd’= Fragmented Packets Received; ‘zone_tcp_wellknown_sport_drop’= TCP SrcPort Wellknown; ‘src_tcp_wellknown_sport_drop’= Src TCP SrcPort Wellknown; ‘secondary_dst_entry_pkt_rate_exceed’= Per Addr Rate= Packet Exceeded; ‘secondary_dst_entry_kbit_rate_exceed’= Per Addr Rate= KiBit Exceeded; ‘secondary_dst_entry_conn_limit_exceed’= Per Addr Limit= Conn Exceeded; ‘secondary_dst_entry_conn_rate_exceed’= Per Addr Rate= Conn Exceeded; ‘secondary_dst_entry_frag_pkt_rate_exceed’= Per Addr Rate= Frag Packet Exceeded; ‘src_udp_retry_gap_drop’= Src UDP Auth= Retry-Gap Dropped; ‘dst_entry_kbit_rate_exceed_count’= Entry Rate= KiBit Exceeded Count; ‘secondary_entry_learn’= Per Addr Entry Learned; ‘secondary_entry_hit’= Per Addr Entry Hit; ‘secondary_entry_miss’= Per Addr Entry Missed; ‘secondary_entry_aged’= Per Addr Entry Aged; ‘secondary_entry_learning_thre_exceed’= Per Addr Entry Count Overflow; ‘zone_port_undef_hit’= Dst Port undefined Hit; ‘zone_tcp_action_on_ack_timeout’= TCP Auth= ACK Retry Timeout; ‘zone_tcp_action_on_ack_reset’= TCP Auth= ACK Retry Timeout Reset; ‘zone_tcp_action_on_ack_blacklist’= TCP Auth= ACK Retry Timeout Blacklisted; ‘src_tcp_action_on_ack_timeout’= Src TCP Auth= ACK Retry Timeout; ‘src_tcp_action_on_ack_reset’= Src TCP Auth= ACK Retry Timeout Reset; ‘src_tcp_action_on_ack_blacklist’= Src TCP Auth= ACK Retry Timeout Blacklisted; ‘zone_tcp_action_on_syn_timeout’= TCP Auth= SYN Retry Timeout; ‘zone_tcp_action_on_syn_reset’= TCP Auth= SYN Retry Timeout Reset; ‘zone_tcp_action_on_syn_blacklist’= TCP Auth= SYN Retry Timeout Blacklisted; ‘src_tcp_action_on_syn_timeout’= Src TCP Auth= SYN Retry Timeout; ‘src_tcp_action_on_syn_reset’= Src TCP Auth= SYN Retry Timeout Reset; ‘src_tcp_action_on_syn_blacklist’= Src TCP Auth= SYN Retry Timeout Blacklisted; ‘zone_udp_frag_pkt_rate_exceed’= UDP Dst IP-Proto Rate= Frag Exceeded; ‘zone_udp_frag_src_rate_drop’= UDP Src Rate= Frag Exceeded; ‘zone_tcp_frag_pkt_rate_exceed’= TCP Dst IP-Proto Rate= Frag Exceeded; ‘zone_tcp_frag_src_rate_drop’= TCP Src Rate= Frag Exceeded; ‘zone_icmp_frag_pkt_rate_exceed’= ICMP Dst IP-Proto Rate= Frag Exceeded; ‘zone_icmp_frag_src_rate_drop’= ICMP Src Rate= Frag Exceeded; ‘sflow_internal_samples_packed’= Sflow Internal Samples Packed; ‘sflow_external_samples_packed’= Sflow External Samples Packed; ‘sflow_internal_packets_sent’= Sflow Internal Packets Sent; ‘sflow_external_packets_sent’= Sflow External Packets Sent; ‘dns_outbound_total_query’= DNS Outbound Total Query; ‘dns_outbound_query_malformed’= DNS Outbound Query Malformed; ‘dns_outbound_query_resp_chk_failed’= DNS Outbound Query Resp Check Failed; ‘dns_outbound_query_resp_chk_blacklisted’= DNS Outbound Query Resp Check Blacklisted; ‘dns_outbound_query_resp_chk_refused_sent’= DNS Outbound Query Resp Check REFUSED Sent; ‘dns_outbound_query_resp_chk_reset_sent’= DNS Outbound Query Resp Check RESET Sent; ‘dns_outbound_query_resp_chk_no_resp_sent’= DNS Outbound Query Resp Check No Response Sent; ‘dns_outbound_query_resp_size_exceed’= DNS Outbound Query Response Size Exceed; ‘dns_outbound_query_sess_timed_out’= DNS Outbound Query Session Timed Out; ‘source_entry_total’= Source Entry Total Count; ‘source_entry_udp’= Source Entry UDP Count; ‘source_entry_tcp’= Source Entry TCP Count; ‘source_entry_icmp’= Source Entry ICMP Count; ‘source_entry_other’= Source Entry OTHER Count; ‘dst_exceed_action_tunnel’= Entry Exceed Action= Tunnel; |
||
counters3 str |
‘dst_udp_retry_timeout_blacklist’= UDP Auth= Retry Timeout Blacklisted; ‘src_udp_auth_timeout’= Src UDP Auth= Retry Timeout; ‘zone_src_udp_retry_timeout_blacklist’= Src UDP Auth= Retry Timeout Blacklisted; ‘src_udp_retry_pass’= Src UDP Retry Passed; ‘secondary_port_learn’= Per Addr Port Learned; ‘secondary_port_aged’= Per Addr Port Aged; ‘dst_entry_outbound_udp_session_created’= Outbound= UDP Sessions Created; ‘dst_entry_outbound_udp_session_aged’= Outbound= UDP Sessions Aged; ‘dst_entry_outbound_tcp_session_created’= Outbound= TCP Sessions Created; ‘dst_entry_outbound_tcp_session_aged’= Outbound= TCP Sessions Aged; ‘dst_entry_outbound_pkt_rate_exceed’= Outbound Rate= Packet Exceeded; ‘dst_entry_outbound_kbit_rate_exceed’= Outbound Rate= KiBit Exceeded; ‘dst_entry_outbound_kbit_rate_exceed_count’= Outbound Rate= KiBit Exceeded Count; ‘dst_entry_outbound_conn_limit_exceed’= Outbound Limit= Conn Exceeded; ‘dst_entry_outbound_conn_rate_exceed’= Outbound Rate= Conn Exceeded; ‘dst_entry_outbound_frag_pkt_rate_exceed’= Outbound Rate= Frag Packet Exceeded; ‘prog_first_req_time_exceed’= Req-Resp= First Request Time Exceed; ‘prog_req_resp_time_exceed’= Req-Resp= Request to Response Time Exceed; ‘prog_request_len_exceed’= Req-Resp= Request Length Exceed; ‘prog_response_len_exceed’= Req-Resp= Response Length Exceed; ‘prog_resp_req_ratio_exceed’= Req-Resp= Response to Request Ratio Exceed; ‘prog_resp_req_time_exceed’= Req-Resp= Response to Request Time Exceed; ‘entry_sync_message_received’= Entry Sync Message Received; ‘entry_sync_message_sent’= Entry Sync Message Sent; ‘prog_conn_sent_exceed’= Connection= Sent Exceed; ‘prog_conn_rcvd_exceed’= Connection= Received Exceed; ‘prog_conn_time_exceed’= Connection= Time Exceed; ‘prog_conn_rcvd_sent_ratio_exceed’= Connection= Received to Sent Ratio Exceed; ‘prog_win_sent_exceed’= Time Window= Sent Exceed; ‘prog_win_rcvd_exceed’= Time Window= Received Exceed; ‘prog_win_rcvd_sent_ratio_exceed’= Time Window= Received to Sent Exceed; ‘prog_exceed_drop’= Req-Resp= Violation Exceed Dropped; ‘prog_exceed_bl’= Req-Resp= Violation Exceed Blacklisted; ‘prog_conn_exceed_drop’= Connection= Violation Exceed Dropped; ‘prog_conn_exceed_bl’= Connection= Violation Exceed Blacklisted; ‘prog_win_exceed_drop’= Time Window= Violation Exceed Dropped; ‘prog_win_exceed_bl’= Time Window= Violation Exceed Blacklisted; ‘east_west_inbound_rcv_pkt’= East West= Inbound Packets Received; ‘east_west_inbound_drop_pkt’= East West= Inbound Packets Dropped; ‘east_west_inbound_fwd_pkt’= East West= Inbound Packets Forwarded; ‘east_west_inbound_rcv_byte’= East West= Inbound Bytes Received; ‘east_west_inbound_drop_byte’= East West= Inbound Bytes Dropped; ‘east_west_inbound_fwd_byte’= East West= Inbound Bytes Forwarded; ‘east_west_outbound_rcv_pkt’= East West= Outbound Packets Received; ‘east_west_outbound_drop_pkt’= East West= Outbound Packets Dropped; ‘east_west_outbound_fwd_pkt’= East West= Outbound Packets Forwarded; ‘east_west_outbound_rcv_byte’= East West= Outbound Bytes Received; ‘east_west_outbound_drop_byte’= East West= Outbound Bytes Dropped; ‘east_west_outbound_fwd_byte’= East West= Outbound Bytes Forwarded; ‘dst_exceed_action_drop’= Entry Exceed Action= Dropped; ‘prog_conn_samples’= Sample Collected= Connection; ‘prog_req_samples’= Sample Collected= Req-Resp; ‘prog_win_samples’= Sample Collected= Time Window; ‘victim_ip_learned’= Victim Identification= IP Entry Learned; ‘victim_ip_aged’= Victim Identification= IP Entry Aged; ‘prog_conn_samples_processed’= Sample Processed= Connnection; ‘prog_req_samples_processed’= Sample Processed= Req-Resp; ‘prog_win_samples_processed’= Sample Processed= Time Window; ‘dst_src_learn_overflow’= Src Dynamic Entry Count Overflow; ‘dst_tcp_auth_rst’= TCP Auth= Reset; ‘token_auth_mismatched_packets’= Token Authentication Mismatched Packets; ‘token_auth_invalid_packets’= Token Authentication Invalid Packets; ‘token_auth_current_salt_matched’= Token Authentication Current Salt Matched; ‘token_auth_previous_salt_matched’= Token Authentication Previous Salt Matched; ‘token_auth_session_created’= Token Authentication Session Created; ‘token_auth_session_created_fail’= Token Authentication Session Created Fail; |
||
detection dict |
Field detection |
||
settings str |
‘settings’= settings; |
||
toggle str |
‘enable’= Enable detection; ‘disable’= Disable detection; |
||
uuid str |
uuid of the object |
||
notification dict |
Field notification |
||
outbound_detection dict |
Field outbound_detection |
||
service_discovery dict |
Field service_discovery |
||
packet_anomaly_detection dict |
Field packet_anomaly_detection |
||
victim_ip_detection dict |
Field victim_ip_detection |
||
packet_anomaly_detection dict |
Field packet_anomaly_detection |
||
uuid str |
uuid of the object |
||
outbound_policy dict |
Field outbound_policy |
||
name str |
Specify name of the outbound policy |
||
uuid str |
uuid of the object |
||
capture_config_list list |
Field capture_config_list |
||
name str |
Capture-config name |
||
mode str |
‘drop’= Apply capture-config to dropped packets; ‘forward’= Apply capture- config to forwarded packets; ‘all’= Apply capture-config to both dropped and forwarded packets; |
||
uuid str |
uuid of the object |
||
hw_blacklist_blocking dict |
Field hw_blacklist_blocking |
||
dst_enable bool |
Enable Dst side hardware blocking |
||
src_enable bool |
Enable Src side hardware blocking |
||
uuid str |
uuid of the object |
||
topk_destinations dict |
Field topk_destinations |
||
uuid str |
uuid of the object |
||
src_port_range_list list |
Field src_port_range_list |
||
src_port_range_start int |
Src Port-Range Start Port Number |
||
src_port_range_end int |
Src Port-Range End Port Number |
||
protocol str |
‘udp’= UDP port; ‘tcp’= TCP Port; |
||
deny bool |
Blacklist and Drop all incoming packets for protocol |
||
glid_cfg dict |
Field glid_cfg |
||
zone_template dict |
Field zone_template |
||
default_action_list str |
Configure default-action-list |
||
capture_config dict |
Field capture_config |
||
set_counter_base_val int |
Set T2 counter value of current context to specified value |
||
uuid str |
uuid of the object |
||
user_tag str |
Customized tag |
||
port_ind dict |
Field port_ind |
||
level_list list |
Field level_list |
||
src_port dict |
Field src_port |
||
zone_src_port_list list |
Field zone_src_port_list |
||
zone_src_port_other_list list |
Field zone_src_port_other_list |
||
ip_proto dict |
Field ip_proto |
||
proto_number_list list |
Field proto_number_list |
||
proto_tcp_udp_list list |
Field proto_tcp_udp_list |
||
proto_name_list list |
Field proto_name_list |
||
port dict |
Field port |
||
zone_service_list list |
Field zone_service_list |
||
zone_service_other_list list |
Field zone_service_other_list |
||
port_range_list list |
Field port_range_list |
||
port_range_start int |
Port-Range Start Port Number |
||
port_range_end int |
Port-Range End Port Number |
||
protocol str |
‘dns-tcp’= DNS-TCP Port; ‘dns-udp’= DNS-UDP Port; ‘http’= HTTP Port; ‘tcp’= TCP Port; ‘udp’= UDP Port; ‘ssl-l4’= SSL-L4 Port; ‘sip-udp’= SIP-UDP Port; ‘sip- tcp’= SIP-TCP Port; ‘quic’= QUIC Port; |
||
manual_mode_enable bool |
Toggle manual mode to use fix templates |
||
deny bool |
Blacklist and Drop all incoming packets for protocol |
||
glid_cfg dict |
Field glid_cfg |
||
stateful bool |
Enable stateful tracking of sessions (Default is stateless) |
||
default_action_list str |
Configure default-action-list |
||
sflow_common bool |
Enable all sFlow polling options under this zone port |
||
sflow_packets bool |
Enable sFlow packet-level counter polling |
||
sflow_tcp dict |
Field sflow_tcp |
||
sflow_http bool |
Enable sFlow HTTP counter polling |
||
unlimited_dynamic_entry_count bool |
No limit for maximum dynamic src entry count |
||
max_dynamic_entry_count int |
Maximum count for dynamic source zone service entry |
||
apply_policy_on_overflow bool |
Enable this flag to apply overflow policy when dynamic entry count overflows |
||
enable_class_list_overflow bool |
Apply class-list overflow policy upon exceeding dynamic entry count specified under zone port or each class-list |
||
enable_top_k bool |
Enable ddos top-k source IP detection |
||
topk_num_records int |
Maximum number of records to show in topk |
||
enable_top_k_destination bool |
Enable ddos top-k destination IP detection |
||
topk_dst_num_records int |
Maximum number of records to show in topk |
||
set_counter_base_val int |
Set T2 counter value of current context to specified value |
||
age int |
Idle age for ip entry |
||
outbound_only bool |
Only allow outbound traffic |
||
faster_de_escalation bool |
De-escalate faster in standalone mode |
||
ip_filtering_policy str |
Configure IP Filter |
||
uuid str |
uuid of the object |
||
user_tag str |
Customized tag |
||
ip_filtering_policy_oper dict |
Field ip_filtering_policy_oper |
||
pattern_recognition dict |
Field pattern_recognition |
||
pattern_recognition_pu_details dict |
Field pattern_recognition_pu_details |
||
level_list list |
Field level_list |
||
manual_mode_list list |
Field manual_mode_list |
||
ips dict |
Field ips |
||
port_ind dict |
Field port_ind |
||
topk_sources dict |
Field topk_sources |
||
topk_destinations dict |
Field topk_destinations |
||
progression_tracking dict |
Field progression_tracking |
||
src_based_policy_list list |
Field src_based_policy_list |
||
dynamic_entry_overflow_policy_list list |
Field dynamic_entry_overflow_policy_list |
||
web_gui dict |
Field web_gui |
||
status str |
‘newly’= newly; ‘learning’= learning; ‘learned’= learned; ‘activated’= activated; |
||
activated_after_learning bool |
Activate it after learning |
||
create_time str |
Configure create time |
||
modify_time str |
Configure modify time |
||
sensitivity str |
‘5’= Low; ‘3’= Medium; ‘1.5’= High; |
||
uuid str |
uuid of the object |
||
learning dict |
Field learning |
||
protection dict |
Field protection |
||
oper dict |
Field oper |
||
ddos_entry_list list |
Field ddos_entry_list |
||
total_dynamic_entry_count str |
Field total_dynamic_entry_count |
||
udp_dynamic_entry_count str |
Field udp_dynamic_entry_count |
||
tcp_dynamic_entry_count str |
Field tcp_dynamic_entry_count |
||
icmp_dynamic_entry_count str |
Field icmp_dynamic_entry_count |
||
other_dynamic_entry_count str |
Field other_dynamic_entry_count |
||
traffic_distribution_status list |
Field traffic_distribution_status |
||
entry_displayed_count int |
Field entry_displayed_count |
||
service_displayed_count int |
Field service_displayed_count |
||
no_t2_idx_port_count int |
Field no_t2_idx_port_count |
||
addresses bool |
Field addresses |
||
subnet_ip_addr str |
Field subnet_ip_addr |
||
subnet_ipv6_addr str |
Field subnet_ipv6_addr |
||
all_addresses bool |
Field all_addresses |
||
ip_proto_num int |
Field ip_proto_num |
||
all_ip_protos bool |
Field all_ip_protos |
||
port_num int |
Field port_num |
||
port_range_start int |
Field port_range_start |
||
port_range_end int |
Field port_range_end |
||
protocol str |
Field protocol |
||
all_ports bool |
Field all_ports |
||
dynamic_expand_subnet bool |
Field dynamic_expand_subnet |
||
blackhole bool |
Field blackhole |
||
zone_name str |
Field zone_name |
||
detection dict |
Field detection |
||
packet_anomaly_detection dict |
Field packet_anomaly_detection |
||
outbound_policy dict |
Field outbound_policy |
||
topk_destinations dict |
Field topk_destinations |
||
src_port_range_list list |
Field src_port_range_list |
||
src_port dict |
Field src_port |
||
ip_proto dict |
Field ip_proto |
||
port dict |
Field port |
||
port_range_list list |
Field port_range_list |
||
stats dict |
Field stats |
||
zone_tcp_any_exceed str |
TCP Dst IP-Proto Rate= Total Exceeded |
||
zone_tcp_pkt_rate_exceed str |
TCP Dst IP-Proto Rate= Packet Exceeded |
||
zone_tcp_conn_rate_exceed str |
TCP Dst IP-Proto Rate= Conn Exceeded |
||
zone_udp_any_exceed str |
UDP Dst IP-Proto Rate= Total Exceeded |
||
zone_udp_pkt_rate_exceed str |
UDP Dst IP-Proto Rate= Packet Exceeded |
||
zone_udp_conn_limit_exceed str |
UDP Dst IP-Proto Limit= Conn Exceeded |
||
zone_udp_conn_rate_exceed str |
UDP Dst IP-Proto Rate= Conn Exceeded |
||
zone_icmp_pkt_rate_exceed str |
ICMP Dst Rate= Packet Exceeded |
||
zone_other_pkt_rate_exceed str |
OTHER Dst IP-Proto Rate= Packet Exceeded |
||
zone_other_frag_pkt_rate_exceed str |
OTHER Dst IP-Proto Rate= Frag Exceeded |
||
zone_port_pkt_rate_exceed str |
Port Rate= Packet Exceeded |
||
zone_port_conn_limit_exceed str |
Port Limit= Conn Exceeded |
||
zone_port_conn_rate_exceed str |
Port Rate= Conn Exceeded |
||
zone_pkt_sent str |
Inbound= Packets Forwarded |
||
zone_udp_pkt_sent str |
UDP Total Packets Forwarded |
||
zone_tcp_pkt_sent str |
TCP Total Packets Forwarded |
||
zone_icmp_pkt_sent str |
ICMP Total Packets Forwarded |
||
zone_other_pkt_sent str |
OTHER Total Packets Forwarded |
||
zone_tcp_conn_limit_exceed str |
TCP Dst IP-Proto Limit= Conn Exceeded |
||
zone_tcp_pkt_rcvd str |
TCP Total Packets Received |
||
zone_udp_pkt_rcvd str |
UDP Total Packets Received |
||
zone_icmp_pkt_rcvd str |
ICMP Total Packets Received |
||
zone_other_pkt_rcvd str |
OTHER Total Packets Received |
||
zone_udp_filter_match str |
UDP Filter Match |
||
zone_udp_filter_not_match str |
UDP Filter Not Matched on Pkt |
||
zone_udp_filter_action_blacklist str |
UDP Filter Action Blacklist |
||
zone_udp_filter_action_drop str |
UDP Filter Action Drop |
||
zone_tcp_syn str |
TCP Total SYN Received |
||
zone_tcp_syn_drop str |
TCP SYN Packets Dropped |
||
zone_tcp_src_rate_drop str |
TCP Src Rate= Total Exceeded |
||
zone_udp_src_rate_drop str |
UDP Src Rate= Total Exceeded |
||
zone_icmp_src_rate_drop str |
ICMP Src Rate= Total Exceeded |
||
zone_other_frag_src_rate_drop str |
OTHER Src Rate= Frag Exceeded |
||
zone_other_src_rate_drop str |
OTHER Src Rate= Total Exceeded |
||
zone_tcp_drop str |
TCP Total Packets Dropped |
||
zone_udp_drop str |
UDP Total Packets Dropped |
||
zone_icmp_drop str |
ICMP Total Packets Dropped |
||
zone_frag_drop str |
Fragmented Packets Dropped |
||
zone_other_drop str |
OTHER Total Packets Dropped |
||
zone_tcp_auth str |
TCP Auth= SYN Cookie Sent |
||
zone_udp_filter_action_default_pass str |
UDP Filter Action Default Pass |
||
zone_tcp_filter_match str |
TCP Filter Match |
||
zone_tcp_filter_not_match str |
TCP Filter Not Matched on Pkt |
||
zone_tcp_filter_action_blacklist str |
TCP Filter Action Blacklist |
||
zone_tcp_filter_action_drop str |
TCP Filter Action Drop |
||
zone_tcp_filter_action_default_pass str |
TCP Filter Action Default Pass |
||
zone_udp_filter_action_whitelist str |
UDP Filter Action WL |
||
zone_udp_kibit_rate_drop str |
UDP Dst IP-Proto Rate= KiBit Exceeded |
||
zone_tcp_kibit_rate_drop str |
TCP Dst IP-Proto Rate= KiBit Exceeded |
||
zone_icmp_kibit_rate_drop str |
ICMP Dst Rate= KiBit Exceeded |
||
zone_other_kibit_rate_drop str |
OTHER Dst IP-Proto Rate= KiBit Exceeded |
||
zone_port_undef_drop str |
Dst Port Undefined Dropped |
||
zone_port_bl str |
Dst Port Blacklist Packets Dropped |
||
zone_src_port_bl str |
Dst SrcPort Blacklist Packets Dropped |
||
zone_port_kbit_rate_exceed str |
Port Rate= KiBit Exceeded |
||
zone_tcp_src_drop str |
TCP Src Packets Dropped |
||
zone_udp_src_drop str |
UDP Src Packets Dropped |
||
zone_icmp_src_drop str |
ICMP Src Packets Dropped |
||
zone_other_src_drop str |
OTHER Src Packets Dropped |
||
tcp_syn_rcvd str |
TCP Inbound SYN Received |
||
tcp_syn_ack_rcvd str |
TCP SYN ACK Received |
||
tcp_ack_rcvd str |
TCP ACK Received |
||
tcp_fin_rcvd str |
TCP FIN Received |
||
tcp_rst_rcvd str |
TCP RST Received |
||
ingress_bytes str |
Inbound= Bytes Received |
||
egress_bytes str |
Outbound= Bytes Received |
||
ingress_packets str |
Inbound= Packets Received |
||
egress_packets str |
Outbound= Packets Received |
||
tcp_fwd_recv str |
TCP Inbound Packets Received |
||
udp_fwd_recv str |
UDP Inbound Packets Received |
||
icmp_fwd_recv str |
ICMP Inbound Packets Received |
||
tcp_syn_cookie_fail str |
TCP Auth= SYN Cookie Failed |
||
zone_tcp_session_created str |
TCP Sessions Created |
||
zone_udp_session_created str |
UDP Sessions Created |
||
zone_tcp_filter_action_whitelist str |
TCP Filter Action WL |
||
zone_other_filter_match str |
OTHER Filter Match |
||
zone_other_filter_not_match str |
OTHER Filter Not Matched on Pkt |
||
zone_other_filter_action_blacklist str |
OTHER Filter Action Blacklist |
||
zone_other_filter_action_drop str |
OTHER Filter Action Drop |
||
zone_other_filter_action_whitelist str |
OTHER Filter Action WL |
||
zone_other_filter_action_default_pass str |
OTHER Filter Action Default Pass |
||
zone_blackhole_inject str |
Dst Blackhole Inject |
||
zone_blackhole_withdraw str |
Dst Blackhole Withdraw |
||
zone_tcp_out_of_seq_excd str |
TCP Out-Of-Seq Exceeded |
||
zone_tcp_retransmit_excd str |
TCP Retransmit Exceeded |
||
zone_tcp_zero_window_excd str |
TCP Zero-Window Exceeded |
||
zone_tcp_conn_prate_excd str |
TCP Rate= Conn Pkt Exceeded |
||
zone_tcp_action_on_ack_init str |
TCP Auth= ACK Retry Init |
||
zone_tcp_action_on_ack_gap_drop str |
TCP Auth= ACK Retry Retry-Gap Dropped |
||
zone_tcp_action_on_ack_fail str |
TCP Auth= ACK Retry Dropped |
||
zone_tcp_action_on_ack_pass str |
TCP Auth= ACK Retry Passed |
||
zone_tcp_action_on_syn_init str |
TCP Auth= SYN Retry Init |
||
zone_tcp_action_on_syn_gap_drop str |
TCP Auth= SYN Retry-Gap Dropped |
||
zone_tcp_action_on_syn_fail str |
TCP Auth= SYN Retry Dropped |
||
zone_tcp_action_on_syn_pass str |
TCP Auth= SYN Retry Passed |
||
zone_payload_too_small str |
UDP Payload Too Small |
||
zone_payload_too_big str |
UDP Payload Too Large |
||
zone_udp_conn_prate_excd str |
UDP Rate= Conn Pkt Exceeded |
||
zone_udp_ntp_monlist_req str |
UDP NTP Monlist Request |
||
zone_udp_ntp_monlist_resp str |
UDP NTP Monlist Response |
||
zone_udp_wellknown_sport_drop str |
UDP SrcPort Wellknown |
||
zone_udp_retry_init str |
UDP Auth= Retry Init |
||
zone_udp_retry_pass str |
UDP Auth= Retry Passed |
||
zone_tcp_bytes_drop str |
TCP Total Bytes Dropped |
||
zone_udp_bytes_drop str |
UDP Total Bytes Dropped |
||
zone_icmp_bytes_drop str |
ICMP Total Bytes Dropped |
||
zone_other_bytes_drop str |
OTHER Total Bytes Dropped |
||
zone_out_no_route str |
Dst IPv4/v6 Out No Route |
||
outbound_bytes_sent str |
Outbound= Bytes Forwarded |
||
outbound_drop str |
Outbound= Packets Dropped |
||
outbound_bytes_drop str |
Outbound= Bytes Dropped |
||
outbound_pkt_sent str |
Outbound= Packets Forwarded |
||
inbound_bytes_sent str |
Inbound= Bytes Forwarded |
||
inbound_bytes_drop str |
Inbound= Bytes Dropped |
||
zone_src_port_pkt_rate_exceed str |
SrcPort Rate= Packet Exceeded |
||
zone_src_port_kbit_rate_exceed str |
SrcPort Rate= KiBit Exceeded |
||
zone_src_port_conn_limit_exceed str |
SrcPort Limit= Conn Exceeded |
||
zone_src_port_conn_rate_exceed str |
SrcPort Rate= Conn Exceeded |
||
zone_ip_proto_pkt_rate_exceed str |
IP-Proto Rate= Packet Exceeded |
||
zone_ip_proto_kbit_rate_exceed str |
IP-Proto Rate= KiBit Exceeded |
||
zone_tcp_port_any_exceed str |
TCP Port Rate= Total Exceed |
||
zone_udp_port_any_exceed str |
UDP Port Rate= Total Exceed |
||
zone_tcp_auth_pass str |
TCP Auth= SYN Auth Passed |
||
zone_tcp_rst_cookie_fail str |
TCP Auth= RST Cookie Failed |
||
zone_tcp_unauth_drop str |
TCP Auth= Unauth Dropped |
||
src_tcp_syn_auth_fail str |
Src TCP Auth= SYN Auth Failed |
||
src_tcp_syn_cookie_sent str |
Src TCP Auth= SYN Cookie Sent |
||
src_tcp_syn_cookie_fail str |
Src TCP Auth= SYN Cookie Failed |
||
src_tcp_rst_cookie_fail str |
Src TCP Auth= RST Cookie Failed |
||
src_tcp_unauth_drop str |
Src TCP Auth= Unauth Dropped |
||
src_tcp_action_on_syn_init str |
Src TCP Auth= SYN Retry Init |
||
src_tcp_action_on_syn_gap_drop str |
Src TCP Auth= SYN Retry-Gap Dropped |
||
src_tcp_action_on_syn_fail str |
Src TCP Auth= SYN Retry Dropped |
||
src_tcp_action_on_ack_init str |
Src TCP Auth= ACK Retry Init |
||
src_tcp_action_on_ack_gap_drop str |
Src TCP Auth= ACK Retry Retry-Gap Dropped |
||
src_tcp_action_on_ack_fail str |
Src TCP Auth= ACK Retry Dropped |
||
src_tcp_out_of_seq_excd str |
Src TCP Out-Of-Seq Exceeded |
||
src_tcp_retransmit_excd str |
Src TCP Retransmit Exceeded |
||
src_tcp_zero_window_excd str |
Src TCP Zero-Window Exceeded |
||
src_tcp_conn_prate_excd str |
Src TCP Rate= Conn Pkt Exceeded |
||
src_udp_min_payload str |
Src UDP Payload Too Small |
||
src_udp_max_payload str |
Src UDP Payload Too Large |
||
src_udp_conn_prate_excd str |
Src UDP Rate= Conn Pkt Exceeded |
||
src_udp_ntp_monlist_req str |
Src UDP NTP Monlist Request |
||
src_udp_ntp_monlist_resp str |
Src UDP NTP Monlist Response |
||
src_udp_wellknown_sport_drop str |
Src UDP SrcPort Wellknown |
||
src_udp_retry_init str |
Src UDP Auth= Retry Init |
||
dst_udp_retry_gap_drop str |
UDP Auth= Retry-Gap Dropped |
||
dst_udp_retry_fail str |
UDP Auth= Retry Timeout |
||
dst_tcp_session_aged str |
TCP Sessions Aged |
||
dst_udp_session_aged str |
UDP Sessions Aged |
||
dst_tcp_conn_close str |
TCP Connections Closed |
||
dst_tcp_conn_close_half_open str |
TCP Half Open Connections Closed |
||
src_tcp_filter_action_blacklist str |
Src TCP Filter Action Blacklist |
||
src_tcp_filter_action_whitelist str |
Src TCP Filter Action WL |
||
src_tcp_filter_action_drop str |
Src TCP Filter Action Drop |
||
src_tcp_filter_action_default_pass str |
Src TCP Filter Action Default Pass |
||
src_udp_filter_action_blacklist str |
Src UDP Filter Action Blacklist |
||
src_udp_filter_action_whitelist str |
Src UDP Filter Action WL |
||
src_udp_filter_action_drop str |
Src UDP Filter Action Drop |
||
src_udp_filter_action_default_pass str |
Src UDP Filter Action Default Pass |
||
src_other_filter_action_blacklist str |
Src OTHER Filter Action Blacklist |
||
src_other_filter_action_whitelist str |
Src OTHER Filter Action WL |
||
src_other_filter_action_drop str |
Src OTHER Filter Action Drop |
||
src_other_filter_action_default_pass str |
Src OTHER Filter Action Default Pass |
||
tcp_invalid_syn str |
TCP Invalid SYN Received |
||
dst_tcp_conn_close_w_rst str |
TCP RST Connections Closed |
||
dst_tcp_conn_close_w_fin str |
TCP FIN Connections Closed |
||
dst_tcp_conn_close_w_idle str |
TCP Idle Connections Closed |
||
dst_tcp_conn_create_from_syn str |
TCP Connections Created From SYN |
||
dst_tcp_conn_create_from_ack str |
TCP Connections Created From ACK |
||
src_frag_drop str |
Src Fragmented Packets Dropped |
||
zone_port_kbit_rate_exceed_pkt str |
Port Rate= KiBit Pkt Exceeded |
||
dst_tcp_bytes_rcv str |
TCP Total Bytes Received |
||
dst_udp_bytes_rcv str |
UDP Total Bytes Received |
||
dst_icmp_bytes_rcv str |
ICMP Total Bytes Received |
||
dst_other_bytes_rcv str |
OTHER Total Bytes Received |
||
dst_tcp_bytes_sent str |
TCP Total Bytes Forwarded |
||
dst_udp_bytes_sent str |
UDP Total Bytes Forwarded |
||
dst_icmp_bytes_sent str |
ICMP Total Bytes Forwarded |
||
dst_other_bytes_sent str |
OTHER Total Bytes Forwarded |
||
dst_udp_auth_drop str |
UDP Auth= Dropped |
||
dst_tcp_auth_drop str |
TCP Auth= Dropped |
||
dst_tcp_auth_resp str |
TCP Auth= Responded |
||
dst_drop str |
Inbound= Packets Dropped |
||
dst_entry_pkt_rate_exceed str |
Entry Rate= Packet Exceeded |
||
dst_entry_kbit_rate_exceed str |
Entry Rate= KiBit Exceeded |
||
dst_entry_conn_limit_exceed str |
Entry Limit= Conn Exceeded |
||
dst_entry_conn_rate_exceed str |
Entry Rate= Conn Exceeded |
||
dst_entry_frag_pkt_rate_exceed str |
Entry Rate= Frag Packet Exceeded |
||
dst_l4_tcp_blacklist_drop str |
Dst TCP IP-Proto Blacklist Dropped |
||
dst_l4_udp_blacklist_drop str |
Dst UDP IP-Proto Blacklist Dropped |
||
dst_l4_icmp_blacklist_drop str |
Dst ICMP IP-Proto Blacklist Dropped |
||
dst_l4_other_blacklist_drop str |
Dst OTHER IP-Proto Blacklist Dropped |
||
dst_icmp_any_exceed str |
ICMP Rate= Total Exceed |
||
dst_other_any_exceed str |
OTHER Rate= Total Exceed |
||
tcp_rexmit_syn_limit_drop str |
TCP SYN Retransmit Exceeded Drop |
||
tcp_rexmit_syn_limit_bl str |
TCP SYN Retransmit Exceeded Blacklist |
||
dst_clist_overflow_policy_at_learning str |
Dst Src-Based Overflow Policy Hit |
||
zone_frag_rcvd str |
Fragmented Packets Received |
||
zone_tcp_wellknown_sport_drop str |
TCP SrcPort Wellknown |
||
src_tcp_wellknown_sport_drop str |
Src TCP SrcPort Wellknown |
||
secondary_dst_entry_pkt_rate_exceed str |
Per Addr Rate= Packet Exceeded |
||
secondary_dst_entry_kbit_rate_exceed str |
Per Addr Rate= KiBit Exceeded |
||
secondary_dst_entry_conn_limit_exceed str |
Per Addr Limit= Conn Exceeded |
||
secondary_dst_entry_conn_rate_exceed str |
Per Addr Rate= Conn Exceeded |
||
secondary_dst_entry_frag_pkt_rate_exceed str |
Per Addr Rate= Frag Packet Exceeded |
||
src_udp_retry_gap_drop str |
Src UDP Auth= Retry-Gap Dropped |
||
dst_entry_kbit_rate_exceed_count str |
Entry Rate= KiBit Exceeded Count |
||
secondary_entry_learn str |
Per Addr Entry Learned |
||
secondary_entry_hit str |
Per Addr Entry Hit |
||
secondary_entry_miss str |
Per Addr Entry Missed |
||
secondary_entry_aged str |
Per Addr Entry Aged |
||
secondary_entry_learning_thre_exceed str |
Per Addr Entry Count Overflow |
||
zone_port_undef_hit str |
Dst Port undefined Hit |
||
zone_tcp_action_on_ack_timeout str |
TCP Auth= ACK Retry Timeout |
||
zone_tcp_action_on_ack_reset str |
TCP Auth= ACK Retry Timeout Reset |
||
zone_tcp_action_on_ack_blacklist str |
TCP Auth= ACK Retry Timeout Blacklisted |
||
src_tcp_action_on_ack_timeout str |
Src TCP Auth= ACK Retry Timeout |
||
src_tcp_action_on_ack_reset str |
Src TCP Auth= ACK Retry Timeout Reset |
||
src_tcp_action_on_ack_blacklist str |
Src TCP Auth= ACK Retry Timeout Blacklisted |
||
zone_tcp_action_on_syn_timeout str |
TCP Auth= SYN Retry Timeout |
||
zone_tcp_action_on_syn_reset str |
TCP Auth= SYN Retry Timeout Reset |
||
zone_tcp_action_on_syn_blacklist str |
TCP Auth= SYN Retry Timeout Blacklisted |
||
src_tcp_action_on_syn_timeout str |
Src TCP Auth= SYN Retry Timeout |
||
src_tcp_action_on_syn_reset str |
Src TCP Auth= SYN Retry Timeout Reset |
||
src_tcp_action_on_syn_blacklist str |
Src TCP Auth= SYN Retry Timeout Blacklisted |
||
zone_udp_frag_pkt_rate_exceed str |
UDP Dst IP-Proto Rate= Frag Exceeded |
||
zone_udp_frag_src_rate_drop str |
UDP Src Rate= Frag Exceeded |
||
zone_tcp_frag_pkt_rate_exceed str |
TCP Dst IP-Proto Rate= Frag Exceeded |
||
zone_tcp_frag_src_rate_drop str |
TCP Src Rate= Frag Exceeded |
||
zone_icmp_frag_pkt_rate_exceed str |
ICMP Dst IP-Proto Rate= Frag Exceeded |
||
zone_icmp_frag_src_rate_drop str |
ICMP Src Rate= Frag Exceeded |
||
sflow_internal_samples_packed str |
Sflow Internal Samples Packed |
||
sflow_external_samples_packed str |
Sflow External Samples Packed |
||
sflow_internal_packets_sent str |
Sflow Internal Packets Sent |
||
sflow_external_packets_sent str |
Sflow External Packets Sent |
||
dns_outbound_total_query str |
DNS Outbound Total Query |
||
dns_outbound_query_malformed str |
DNS Outbound Query Malformed |
||
dns_outbound_query_resp_chk_failed str |
DNS Outbound Query Resp Check Failed |
||
dns_outbound_query_resp_chk_blacklisted str |
DNS Outbound Query Resp Check Blacklisted |
||
dns_outbound_query_resp_chk_refused_sent str |
DNS Outbound Query Resp Check REFUSED Sent |
||
dns_outbound_query_resp_chk_reset_sent str |
DNS Outbound Query Resp Check RESET Sent |
||
dns_outbound_query_resp_chk_no_resp_sent str |
DNS Outbound Query Resp Check No Response Sent |
||
dns_outbound_query_resp_size_exceed str |
DNS Outbound Query Response Size Exceed |
||
dns_outbound_query_sess_timed_out str |
DNS Outbound Query Session Timed Out |
||
source_entry_total str |
Source Entry Total Count |
||
source_entry_udp str |
Source Entry UDP Count |
||
source_entry_tcp str |
Source Entry TCP Count |
||
source_entry_icmp str |
Source Entry ICMP Count |
||
source_entry_other str |
Source Entry OTHER Count |
||
dst_exceed_action_tunnel str |
Entry Exceed Action= Tunnel |
||
dst_udp_retry_timeout_blacklist str |
UDP Auth= Retry Timeout Blacklisted |
||
src_udp_auth_timeout str |
Src UDP Auth= Retry Timeout |
||
zone_src_udp_retry_timeout_blacklist str |
Src UDP Auth= Retry Timeout Blacklisted |
||
src_udp_retry_pass str |
Src UDP Retry Passed |
||
secondary_port_learn str |
Per Addr Port Learned |
||
secondary_port_aged str |
Per Addr Port Aged |
||
dst_entry_outbound_udp_session_created str |
Outbound= UDP Sessions Created |
||
dst_entry_outbound_udp_session_aged str |
Outbound= UDP Sessions Aged |
||
dst_entry_outbound_tcp_session_created str |
Outbound= TCP Sessions Created |
||
dst_entry_outbound_tcp_session_aged str |
Outbound= TCP Sessions Aged |
||
dst_entry_outbound_pkt_rate_exceed str |
Outbound Rate= Packet Exceeded |
||
dst_entry_outbound_kbit_rate_exceed str |
Outbound Rate= KiBit Exceeded |
||
dst_entry_outbound_kbit_rate_exceed_count str |
Outbound Rate= KiBit Exceeded Count |
||
dst_entry_outbound_conn_limit_exceed str |
Outbound Limit= Conn Exceeded |
||
dst_entry_outbound_conn_rate_exceed str |
Outbound Rate= Conn Exceeded |
||
dst_entry_outbound_frag_pkt_rate_exceed str |
Outbound Rate= Frag Packet Exceeded |
||
prog_first_req_time_exceed str |
Req-Resp= First Request Time Exceed |
||
prog_req_resp_time_exceed str |
Req-Resp= Request to Response Time Exceed |
||
prog_request_len_exceed str |
Req-Resp= Request Length Exceed |
||
prog_response_len_exceed str |
Req-Resp= Response Length Exceed |
||
prog_resp_req_ratio_exceed str |
Req-Resp= Response to Request Ratio Exceed |
||
prog_resp_req_time_exceed str |
Req-Resp= Response to Request Time Exceed |
||
entry_sync_message_received str |
Entry Sync Message Received |
||
entry_sync_message_sent str |
Entry Sync Message Sent |
||
prog_conn_sent_exceed str |
Connection= Sent Exceed |
||
prog_conn_rcvd_exceed str |
Connection= Received Exceed |
||
prog_conn_time_exceed str |
Connection= Time Exceed |
||
prog_conn_rcvd_sent_ratio_exceed str |
Connection= Received to Sent Ratio Exceed |
||
prog_win_sent_exceed str |
Time Window= Sent Exceed |
||
prog_win_rcvd_exceed str |
Time Window= Received Exceed |
||
prog_win_rcvd_sent_ratio_exceed str |
Time Window= Received to Sent Exceed |
||
prog_exceed_drop str |
Req-Resp= Violation Exceed Dropped |
||
prog_exceed_bl str |
Req-Resp= Violation Exceed Blacklisted |
||
prog_conn_exceed_drop str |
Connection= Violation Exceed Dropped |
||
prog_conn_exceed_bl str |
Connection= Violation Exceed Blacklisted |
||
prog_win_exceed_drop str |
Time Window= Violation Exceed Dropped |
||
prog_win_exceed_bl str |
Time Window= Violation Exceed Blacklisted |
||
east_west_inbound_rcv_pkt str |
East West= Inbound Packets Received |
||
east_west_inbound_drop_pkt str |
East West= Inbound Packets Dropped |
||
east_west_inbound_fwd_pkt str |
East West= Inbound Packets Forwarded |
||
east_west_inbound_rcv_byte str |
East West= Inbound Bytes Received |
||
east_west_inbound_drop_byte str |
East West= Inbound Bytes Dropped |
||
east_west_inbound_fwd_byte str |
East West= Inbound Bytes Forwarded |
||
east_west_outbound_rcv_pkt str |
East West= Outbound Packets Received |
||
east_west_outbound_drop_pkt str |
East West= Outbound Packets Dropped |
||
east_west_outbound_fwd_pkt str |
East West= Outbound Packets Forwarded |
||
east_west_outbound_rcv_byte str |
East West= Outbound Bytes Received |
||
east_west_outbound_drop_byte str |
East West= Outbound Bytes Dropped |
||
east_west_outbound_fwd_byte str |
East West= Outbound Bytes Forwarded |
||
dst_exceed_action_drop str |
Entry Exceed Action= Dropped |
||
prog_conn_samples str |
Sample Collected= Connection |
||
prog_req_samples str |
Sample Collected= Req-Resp |
||
prog_win_samples str |
Sample Collected= Time Window |
||
victim_ip_learned str |
Victim Identification= IP Entry Learned |
||
victim_ip_aged str |
Victim Identification= IP Entry Aged |
||
prog_conn_samples_processed str |
Sample Processed= Connnection |
||
prog_req_samples_processed str |
Sample Processed= Req-Resp |
||
prog_win_samples_processed str |
Sample Processed= Time Window |
||
dst_src_learn_overflow str |
Src Dynamic Entry Count Overflow |
||
dst_tcp_auth_rst str |
TCP Auth= Reset |
||
token_auth_mismatched_packets str |
Token Authentication Mismatched Packets |
||
token_auth_invalid_packets str |
Token Authentication Invalid Packets |
||
token_auth_current_salt_matched str |
Token Authentication Current Salt Matched |
||
token_auth_previous_salt_matched str |
Token Authentication Previous Salt Matched |
||
token_auth_session_created str |
Token Authentication Session Created |
||
token_auth_session_created_fail str |
Token Authentication Session Created Fail |
||
zone_name str |
Field zone_name |
Examples
Return Values
- modified_values (changed, dict, )
Values modified (or potential changes if using check_mode) as a result of task operation
- axapi_calls (always, list, )
Sequential list of AXAPI calls made by the task
- endpoint (, str, [‘/axapi/v3/slb/virtual_server’, ‘/axapi/v3/file/ssl-cert’])
The AXAPI endpoint being accessed.
- http_method (, str, [‘POST’, ‘GET’])
HTTP method being used by the primary task to interact with the AXAPI endpoint.
- request_body (, complex, )
Params used to query the AXAPI
- response_body (, complex, )
Response from the AXAPI
Status
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by community.