a10_ddos_dst_zone

Synopsis

Configure a static zone entry

Parameters

Parameters

Choices/Defaults

Comment

state

str/required

[‘noop’, ‘present’, ‘absent’]

State of the object to be created.

ansible_host

str/required

Host for AXAPI authentication

ansible_username

str/required

Username for AXAPI authentication

ansible_password

str/required

Password for AXAPI authentication

ansible_port

int/required

Port for AXAPI authentication

a10_device_context_id

int

[‘1-8’]

Device ID for aVCS configuration

a10_partition

str

Destination/target partition for object/command

zone_name

str/required

Field zone_name

operational_mode

str

‘idle’= Idle mode; ‘monitor’= Monitor mode; ‘learning’= Learning mode;

force_operational_mode

bool

Force configure operational mode

continuous_learning

bool

Continuous learning of detection

traffic_distribution_mode

str

‘default’= Distribute traffic to one slot using default distribution mechanism; ‘source-ip-based’= Distribute traffic between slots, based on source ip;

ip

list

Field ip

ip_addr

str

Specify IP address

subnet_ip_addr

str

IP Subnet

expand_ip_subnet

bool

Expand this subnet to individual IP address

expand_ip_subnet_mode

str

‘default’= Default learning mechanism (Default= Dynamic); ‘dynamic’= Dynamic learning; ‘static’= Static learning;

ipv6

list

Field ipv6

ip6_addr

str

Specify IPv6 address

subnet_ipv6_addr

str

IPV6 Subnet

expand_ipv6_subnet

bool

Expand this subnet to individual IPv6 address

expand_ipv6_subnet_mode

str

‘default’= Default learning mechanism (Default= Dynamic); ‘dynamic’= Dynamic learning; ‘static’= Static learning;

description

str

Description for this Destination Zone

zone_profile

str

Apply threshold profile

enable_top_k

list

Field enable_top_k

topk_type

str

‘destination’= Topk destination IP;

topk_num_records

int

Maximum number of records to show in topk

glid

str

Global limit ID for the whole zone

action_list

str

Configure action-list to take

per_addr_glid

str

Global limit ID per address

dest_nat_ip

str

Destination NAT IP address

dest_nat_ipv6

str

Destination NAT IPv6 address

source_nat_pool

str

Configure source NAT

non_restrictive

bool

Non-restrictive mode ignores Zero Thresholds Indicators

drop_frag_pkt

bool

Drop fragmented packets

sflow_common

bool

Enable sFlow counter polling packets, tcp-basic, tcp-stateful and http. WARNING= Zone level Sflow polling might induce heavy CP

sflow_packets

bool

Enable sFlow packet-level counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total

sflow_layer_4

bool

Enable sFlow Layer 4 counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the number of

sflow_tcp

dict

Field sflow_tcp

sflow_tcp_basic

bool

Enable sFlow basic TCP counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total nu

sflow_tcp_stateful

bool

Enable sFlow stateful TCP counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total

sflow_http

bool

Enable sFlow HTTP counter polling. WARNING= Zone level Sflow polling might induce heavy CPU load depending on the total number

advertised_enable

bool

BGP advertised

telemetry_enable

bool

Enable from-l3-peer flag for the zone, thus all the ip entries in the zone will be dynamically created/deleted based on the BGP

zone_template

dict

Field zone_template

logging

str

DDOS logging template

inbound_forward_dscp

int

To set dscp value for inbound packets (DSCP Value for the clear traffic marking)

outbound_forward_dscp

int

To set dscp value for outbound

reporting_disabled

bool

Disable Reporting

log_enable

bool

Enable logging

log_periodic

bool

Enable log periodic

log_high_frequency

bool

Enable High frequency logging for non-event logs per zone

rate_limit

int

Rate limit per second per zone(Default = 1 per second)

set_counter_base_val

int

Set T2 counter value of current context to specified value

is_from_wizard

bool

Is It Created from Onbox GUI Wizard

pattern_recognition_sensitivity

str

‘high’= High sensitive pattern recognition; ‘medium’= Medium sensitive pattern recognition; ‘low’= Low sensitive pattern recognition;

pattern_recognition_hw_filter_enable

bool

to enable pattern recognition hardware filter

collector

list

Field collector

sflow_name

str

Name of configured custom sFlow collector

uuid

str

uuid of the object

user_tag

str

Customized tag

sampling_enable

list

Field sampling_enable

counters1

str

‘all’= all; ‘zone_tcp_any_exceed’= TCP Dst IP-Proto Rate= Total Exceeded; ‘zone_tcp_pkt_rate_exceed’= TCP Dst IP-Proto Rate= Packet Exceeded; ‘zone_tcp_conn_rate_exceed’= TCP Dst IP-Proto Rate= Conn Exceeded; ‘zone_udp_any_exceed’= UDP Dst IP-Proto Rate= Total Exceeded; ‘zone_udp_pkt_rate_exceed’= UDP Dst IP-Proto Rate= Packet Exceeded; ‘zone_udp_conn_limit_exceed’= UDP Dst IP-Proto Limit= Conn Exceeded; ‘zone_udp_conn_rate_exceed’= UDP Dst IP-Proto Rate= Conn Exceeded; ‘zone_icmp_pkt_rate_exceed’= ICMP Dst Rate= Packet Exceeded; ‘zone_other_pkt_rate_exceed’= OTHER Dst IP-Proto Rate= Packet Exceeded; ‘zone_other_frag_pkt_rate_exceed’= OTHER Dst IP-Proto Rate= Frag Exceeded; ‘zone_port_pkt_rate_exceed’= Port Rate= Packet Exceeded; ‘zone_port_conn_limit_exceed’= Port Limit= Conn Exceeded; ‘zone_port_conn_rate_exceed’= Port Rate= Conn Exceeded; ‘zone_pkt_sent’= Inbound= Packets Forwarded; ‘zone_udp_pkt_sent’= UDP Total Packets Forwarded; ‘zone_tcp_pkt_sent’= TCP Total Packets Forwarded; ‘zone_icmp_pkt_sent’= ICMP Total Packets Forwarded; ‘zone_other_pkt_sent’= OTHER Total Packets Forwarded; ‘zone_tcp_conn_limit_exceed’= TCP Dst IP-Proto Limit= Conn Exceeded; ‘zone_tcp_pkt_rcvd’= TCP Total Packets Received; ‘zone_udp_pkt_rcvd’= UDP Total Packets Received; ‘zone_icmp_pkt_rcvd’= ICMP Total Packets Received; ‘zone_other_pkt_rcvd’= OTHER Total Packets Received; ‘zone_udp_filter_match’= UDP Filter Match; ‘zone_udp_filter_not_match’= UDP Filter Not Matched on Pkt; ‘zone_udp_filter_action_blacklist’= UDP Filter Action Blacklist; ‘zone_udp_filter_action_drop’= UDP Filter Action Drop; ‘zone_tcp_syn’= TCP Total SYN Received; ‘zone_tcp_syn_drop’= TCP SYN Packets Dropped; ‘zone_tcp_src_rate_drop’= TCP Src Rate= Total Exceeded; ‘zone_udp_src_rate_drop’= UDP Src Rate= Total Exceeded; ‘zone_icmp_src_rate_drop’= ICMP Src Rate= Total Exceeded; ‘zone_other_frag_src_rate_drop’= OTHER Src Rate= Frag Exceeded; ‘zone_other_src_rate_drop’= OTHER Src Rate= Total Exceeded; ‘zone_tcp_drop’= TCP Total Packets Dropped; ‘zone_udp_drop’= UDP Total Packets Dropped; ‘zone_icmp_drop’= ICMP Total Packets Dropped; ‘zone_frag_drop’= Fragmented Packets Dropped; ‘zone_other_drop’= OTHER Total Packets Dropped; ‘zone_tcp_auth’= TCP Auth= SYN Cookie Sent; ‘zone_udp_filter_action_default_pass’= UDP Filter Action Default Pass; ‘zone_tcp_filter_match’= TCP Filter Match; ‘zone_tcp_filter_not_match’= TCP Filter Not Matched on Pkt; ‘zone_tcp_filter_action_blacklist’= TCP Filter Action Blacklist; ‘zone_tcp_filter_action_drop’= TCP Filter Action Drop; ‘zone_tcp_filter_action_default_pass’= TCP Filter Action Default Pass; ‘zone_udp_filter_action_whitelist’= UDP Filter Action WL; ‘zone_over_limit_on’= Zone overlimit Trigger ON; ‘zone_over_limit_off’= Zone overlimit Trigger OFF; ‘zone_port_over_limit_on’= Zone port overlimit Trigger ON; ‘zone_port_over_limit_off’= Zone port overlimit Trigger OFF; ‘zone_over_limit_action’= Zone overlimit action; ‘zone_port_over_limit_action’= Zone port overlimit action; ‘scanning_detected_drop’= Scanning Detected drop (deprecated); ‘scanning_detected_blacklist’= Scanning Detected blacklist (deprecated); ‘zone_udp_kibit_rate_drop’= UDP Dst IP-Proto Rate= KiBit Exceeded; ‘zone_tcp_kibit_rate_drop’= TCP Dst IP-Proto Rate= KiBit Exceeded; ‘zone_icmp_kibit_rate_drop’= ICMP Dst Rate= KiBit Exceeded; ‘zone_other_kibit_rate_drop’= OTHER Dst IP-Proto Rate= KiBit Exceeded; ‘zone_port_undef_drop’= Dst Port Undefined Dropped; ‘zone_port_bl’= Dst Port Blacklist Packets Dropped; ‘zone_src_port_bl’= Dst SrcPort Blacklist Packets Dropped; ‘zone_port_kbit_rate_exceed’= Port Rate= KiBit Exceeded; ‘zone_tcp_src_drop’= TCP Src Packets Dropped; ‘zone_udp_src_drop’= UDP Src Packets Dropped; ‘zone_icmp_src_drop’= ICMP Src Packets Dropped; ‘zone_other_src_drop’= OTHER Src Packets Dropped; ‘tcp_syn_rcvd’= TCP Inbound SYN Received; ‘tcp_syn_ack_rcvd’= TCP SYN ACK Received; ‘tcp_ack_rcvd’= TCP ACK Received; ‘tcp_fin_rcvd’= TCP FIN Received; ‘tcp_rst_rcvd’= TCP RST Received; ‘ingress_bytes’= Inbound= Bytes Received; ‘egress_bytes’= Outbound= Bytes Received; ‘ingress_packets’= Inbound= Packets Received; ‘egress_packets’= Outbound= Packets Received; ‘tcp_fwd_recv’= TCP Inbound Packets Received; ‘udp_fwd_recv’= UDP Inbound Packets Received; ‘icmp_fwd_recv’= ICMP Inbound Packets Received; ‘tcp_syn_cookie_fail’= TCP Auth= SYN Cookie Failed; ‘zone_tcp_session_created’= TCP Sessions Created; ‘zone_udp_session_created’= UDP Sessions Created; ‘zone_tcp_filter_action_whitelist’= TCP Filter Action WL; ‘zone_other_filter_match’= OTHER Filter Match; ‘zone_other_filter_not_match’= OTHER Filter Not Matched on Pkt; ‘zone_other_filter_action_blacklist’= OTHER Filter Action Blacklist; ‘zone_other_filter_action_drop’= OTHER Filter Action Drop; ‘zone_other_filter_action_whitelist’= OTHER Filter Action WL; ‘zone_other_filter_action_default_pass’= OTHER Filter Action Default Pass; ‘zone_blackhole_inject’= Dst Blackhole Inject; ‘zone_blackhole_withdraw’= Dst Blackhole Withdraw; ‘zone_tcp_out_of_seq_excd’= TCP Out-Of-Seq Exceeded; ‘zone_tcp_retransmit_excd’= TCP Retransmit Exceeded; ‘zone_tcp_zero_window_excd’= TCP Zero-Window Exceeded; ‘zone_tcp_conn_prate_excd’= TCP Rate= Conn Pkt Exceeded; ‘zone_tcp_action_on_ack_init’= TCP Auth= ACK Retry Init; ‘zone_tcp_action_on_ack_gap_drop’= TCP Auth= ACK Retry Retry-Gap Dropped; ‘zone_tcp_action_on_ack_fail’= TCP Auth= ACK Retry Dropped; ‘zone_tcp_action_on_ack_pass’= TCP Auth= ACK Retry Passed; ‘zone_tcp_action_on_syn_init’= TCP Auth= SYN Retry Init; ‘zone_tcp_action_on_syn_gap_drop’= TCP Auth= SYN Retry-Gap Dropped; ‘zone_tcp_action_on_syn_fail’= TCP Auth= SYN Retry Dropped; ‘zone_tcp_action_on_syn_pass’= TCP Auth= SYN Retry Passed; ‘zone_payload_too_small’= UDP Payload Too Small; ‘zone_payload_too_big’= UDP Payload Too Large; ‘zone_udp_conn_prate_excd’= UDP Rate= Conn Pkt Exceeded; ‘zone_udp_ntp_monlist_req’= UDP NTP Monlist Request; ‘zone_udp_ntp_monlist_resp’= UDP NTP Monlist Response; ‘zone_udp_wellknown_sport_drop’= UDP SrcPort Wellknown; ‘zone_udp_retry_init’= UDP Auth= Retry Init; ‘zone_udp_retry_pass’= UDP Auth= Retry Passed; ‘zone_tcp_bytes_drop’= TCP Total Bytes Dropped; ‘zone_udp_bytes_drop’= UDP Total Bytes Dropped; ‘zone_icmp_bytes_drop’= ICMP Total Bytes Dropped; ‘zone_other_bytes_drop’= OTHER Total Bytes Dropped; ‘zone_out_no_route’= Dst IPv4/v6 Out No Route; ‘outbound_bytes_sent’= Outbound= Bytes Forwarded; ‘outbound_drop’= Outbound= Packets Dropped; ‘outbound_bytes_drop’= Outbound= Bytes Dropped; ‘outbound_pkt_sent’= Outbound= Packets Forwarded; ‘inbound_bytes_sent’= Inbound= Bytes Forwarded; ‘inbound_bytes_drop’= Inbound= Bytes Dropped; ‘zone_src_port_pkt_rate_exceed’= SrcPort Rate= Packet Exceeded; ‘zone_src_port_kbit_rate_exceed’= SrcPort Rate= KiBit Exceeded; ‘zone_src_port_conn_limit_exceed’= SrcPort Limit= Conn Exceeded; ‘zone_src_port_conn_rate_exceed’= SrcPort Rate= Conn Exceeded; ‘zone_ip_proto_pkt_rate_exceed’= IP-Proto Rate= Packet Exceeded; ‘zone_ip_proto_kbit_rate_exceed’= IP-Proto Rate= KiBit Exceeded; ‘zone_tcp_port_any_exceed’= TCP Port Rate= Total Exceed; ‘zone_udp_port_any_exceed’= UDP Port Rate= Total Exceed; ‘zone_tcp_auth_pass’= TCP Auth= SYN Auth Passed; ‘zone_tcp_rst_cookie_fail’= TCP Auth= RST Cookie Failed; ‘zone_tcp_unauth_drop’= TCP Auth= Unauth Dropped; ‘src_tcp_syn_auth_fail’= Src TCP Auth= SYN Auth Failed; ‘src_tcp_syn_cookie_sent’= Src TCP Auth= SYN Cookie Sent; ‘src_tcp_syn_cookie_fail’= Src TCP Auth= SYN Cookie Failed; ‘src_tcp_rst_cookie_fail’= Src TCP Auth= RST Cookie Failed;

counters2

str

‘src_tcp_unauth_drop’= Src TCP Auth= Unauth Dropped; ‘src_tcp_action_on_syn_init’= Src TCP Auth= SYN Retry Init; ‘src_tcp_action_on_syn_gap_drop’= Src TCP Auth= SYN Retry-Gap Dropped; ‘src_tcp_action_on_syn_fail’= Src TCP Auth= SYN Retry Dropped; ‘src_tcp_action_on_ack_init’= Src TCP Auth= ACK Retry Init; ‘src_tcp_action_on_ack_gap_drop’= Src TCP Auth= ACK Retry Retry-Gap Dropped; ‘src_tcp_action_on_ack_fail’= Src TCP Auth= ACK Retry Dropped; ‘src_tcp_out_of_seq_excd’= Src TCP Out-Of-Seq Exceeded; ‘src_tcp_retransmit_excd’= Src TCP Retransmit Exceeded; ‘src_tcp_zero_window_excd’= Src TCP Zero-Window Exceeded; ‘src_tcp_conn_prate_excd’= Src TCP Rate= Conn Pkt Exceeded; ‘src_udp_min_payload’= Src UDP Payload Too Small; ‘src_udp_max_payload’= Src UDP Payload Too Large; ‘src_udp_conn_prate_excd’= Src UDP Rate= Conn Pkt Exceeded; ‘src_udp_ntp_monlist_req’= Src UDP NTP Monlist Request; ‘src_udp_ntp_monlist_resp’= Src UDP NTP Monlist Response; ‘src_udp_wellknown_sport_drop’= Src UDP SrcPort Wellknown; ‘src_udp_retry_init’= Src UDP Auth= Retry Init; ‘dst_udp_retry_gap_drop’= UDP Auth= Retry-Gap Dropped; ‘dst_udp_retry_fail’= UDP Auth= Retry Timeout; ‘dst_tcp_session_aged’= TCP Sessions Aged; ‘dst_udp_session_aged’= UDP Sessions Aged; ‘dst_tcp_conn_close’= TCP Connections Closed; ‘dst_tcp_conn_close_half_open’= TCP Half Open Connections Closed; ‘dst_drop_frag_pkt’= Fragmented Packets Dropped; ‘src_tcp_filter_action_blacklist’= Src TCP Filter Action Blacklist; ‘src_tcp_filter_action_whitelist’= Src TCP Filter Action WL; ‘src_tcp_filter_action_drop’= Src TCP Filter Action Drop; ‘src_tcp_filter_action_default_pass’= Src TCP Filter Action Default Pass; ‘src_udp_filter_action_blacklist’= Src UDP Filter Action Blacklist; ‘src_udp_filter_action_whitelist’= Src UDP Filter Action WL; ‘src_udp_filter_action_drop’= Src UDP Filter Action Drop; ‘src_udp_filter_action_default_pass’= Src UDP Filter Action Default Pass; ‘src_other_filter_action_blacklist’= Src OTHER Filter Action Blacklist; ‘src_other_filter_action_whitelist’= Src OTHER Filter Action WL; ‘src_other_filter_action_drop’= Src OTHER Filter Action Drop; ‘src_other_filter_action_default_pass’= Src OTHER Filter Action Default Pass; ‘tcp_invalid_syn’= TCP Invalid SYN Received; ‘dst_tcp_conn_close_w_rst’= TCP RST Connections Closed; ‘dst_tcp_conn_close_w_fin’= TCP FIN Connections Closed; ‘dst_tcp_conn_close_w_idle’= TCP Idle Connections Closed; ‘dst_tcp_conn_create_from_syn’= TCP Connections Created From SYN; ‘dst_tcp_conn_create_from_ack’= TCP Connections Created From ACK; ‘src_frag_drop’= Src Fragmented Packets Dropped; ‘zone_port_kbit_rate_exceed_pkt’= Port Rate= KiBit Pkt Exceeded; ‘dst_tcp_bytes_rcv’= TCP Total Bytes Received; ‘dst_udp_bytes_rcv’= UDP Total Bytes Received; ‘dst_icmp_bytes_rcv’= ICMP Total Bytes Received; ‘dst_other_bytes_rcv’= OTHER Total Bytes Received; ‘dst_tcp_bytes_sent’= TCP Total Bytes Forwarded; ‘dst_udp_bytes_sent’= UDP Total Bytes Forwarded; ‘dst_icmp_bytes_sent’= ICMP Total Bytes Forwarded; ‘dst_other_bytes_sent’= OTHER Total Bytes Forwarded; ‘dst_udp_auth_drop’= UDP Auth= Dropped; ‘dst_tcp_auth_drop’= TCP Auth= Dropped; ‘dst_tcp_auth_resp’= TCP Auth= Responded; ‘dst_drop’= Inbound= Packets Dropped; ‘dst_entry_pkt_rate_exceed’= Entry Rate= Packet Exceeded; ‘dst_entry_kbit_rate_exceed’= Entry Rate= KiBit Exceeded; ‘dst_entry_conn_limit_exceed’= Entry Limit= Conn Exceeded; ‘dst_entry_conn_rate_exceed’= Entry Rate= Conn Exceeded; ‘dst_entry_frag_pkt_rate_exceed’= Entry Rate= Frag Packet Exceeded; ‘dst_l4_tcp_blacklist_drop’= Dst TCP IP-Proto Blacklist Dropped; ‘dst_l4_udp_blacklist_drop’= Dst UDP IP-Proto Blacklist Dropped; ‘dst_l4_icmp_blacklist_drop’= Dst ICMP IP-Proto Blacklist Dropped; ‘dst_l4_other_blacklist_drop’= Dst OTHER IP-Proto Blacklist Dropped; ‘dst_frag_timeout_drop’= Fragment Reassemble Timeout Drop; ‘dst_icmp_any_exceed’= ICMP Rate= Total Exceed; ‘dst_other_any_exceed’= OTHER Rate= Total Exceed; ‘tcp_rexmit_syn_limit_drop’= TCP SYN Retransmit Exceeded Drop; ‘tcp_rexmit_syn_limit_bl’= TCP SYN Retransmit Exceeded Blacklist; ‘dst_clist_overflow_policy_at_learning’= Dst Src-Based Overflow Policy Hit; ‘zone_frag_rcvd’= Fragmented Packets Received; ‘zone_tcp_wellknown_sport_drop’= TCP SrcPort Wellknown; ‘src_tcp_wellknown_sport_drop’= Src TCP SrcPort Wellknown; ‘secondary_dst_entry_pkt_rate_exceed’= Per Addr Rate= Packet Exceeded; ‘secondary_dst_entry_kbit_rate_exceed’= Per Addr Rate= KiBit Exceeded; ‘secondary_dst_entry_conn_limit_exceed’= Per Addr Limit= Conn Exceeded; ‘secondary_dst_entry_conn_rate_exceed’= Per Addr Rate= Conn Exceeded; ‘secondary_dst_entry_frag_pkt_rate_exceed’= Per Addr Rate= Frag Packet Exceeded; ‘src_udp_retry_gap_drop’= Src UDP Auth= Retry-Gap Dropped; ‘dst_entry_kbit_rate_exceed_count’= Entry Rate= KiBit Exceeded Count; ‘secondary_entry_learn’= Per Addr Entry Learned; ‘secondary_entry_hit’= Per Addr Entry Hit; ‘secondary_entry_miss’= Per Addr Entry Missed; ‘secondary_entry_aged’= Per Addr Entry Aged; ‘secondary_entry_learning_thre_exceed’= Per Addr Entry Count Overflow; ‘zone_port_undef_hit’= Dst Port undefined Hit; ‘zone_tcp_action_on_ack_timeout’= TCP Auth= ACK Retry Timeout; ‘zone_tcp_action_on_ack_reset’= TCP Auth= ACK Retry Timeout Reset; ‘zone_tcp_action_on_ack_blacklist’= TCP Auth= ACK Retry Timeout Blacklisted; ‘src_tcp_action_on_ack_timeout’= Src TCP Auth= ACK Retry Timeout; ‘src_tcp_action_on_ack_reset’= Src TCP Auth= ACK Retry Timeout Reset; ‘src_tcp_action_on_ack_blacklist’= Src TCP Auth= ACK Retry Timeout Blacklisted; ‘zone_tcp_action_on_syn_timeout’= TCP Auth= SYN Retry Timeout; ‘zone_tcp_action_on_syn_reset’= TCP Auth= SYN Retry Timeout Reset; ‘zone_tcp_action_on_syn_blacklist’= TCP Auth= SYN Retry Timeout Blacklisted; ‘src_tcp_action_on_syn_timeout’= Src TCP Auth= SYN Retry Timeout; ‘src_tcp_action_on_syn_reset’= Src TCP Auth= SYN Retry Timeout Reset; ‘src_tcp_action_on_syn_blacklist’= Src TCP Auth= SYN Retry Timeout Blacklisted; ‘zone_udp_frag_pkt_rate_exceed’= UDP Dst IP-Proto Rate= Frag Exceeded; ‘zone_udp_frag_src_rate_drop’= UDP Src Rate= Frag Exceeded; ‘zone_tcp_frag_pkt_rate_exceed’= TCP Dst IP-Proto Rate= Frag Exceeded; ‘zone_tcp_frag_src_rate_drop’= TCP Src Rate= Frag Exceeded; ‘zone_icmp_frag_pkt_rate_exceed’= ICMP Dst IP-Proto Rate= Frag Exceeded; ‘zone_icmp_frag_src_rate_drop’= ICMP Src Rate= Frag Exceeded; ‘sflow_internal_samples_packed’= Sflow Internal Samples Packed; ‘sflow_external_samples_packed’= Sflow External Samples Packed; ‘sflow_internal_packets_sent’= Sflow Internal Packets Sent; ‘sflow_external_packets_sent’= Sflow External Packets Sent; ‘dns_outbound_total_query’= DNS Outbound Total Query; ‘dns_outbound_query_malformed’= DNS Outbound Query Malformed; ‘dns_outbound_query_resp_chk_failed’= DNS Outbound Query Resp Check Failed; ‘dns_outbound_query_resp_chk_blacklisted’= DNS Outbound Query Resp Check Blacklisted; ‘dns_outbound_query_resp_chk_refused_sent’= DNS Outbound Query Resp Check REFUSED Sent; ‘dns_outbound_query_resp_chk_reset_sent’= DNS Outbound Query Resp Check RESET Sent; ‘dns_outbound_query_resp_chk_no_resp_sent’= DNS Outbound Query Resp Check No Response Sent; ‘dns_outbound_query_resp_size_exceed’= DNS Outbound Query Response Size Exceed; ‘dns_outbound_query_sess_timed_out’= DNS Outbound Query Session Timed Out; ‘source_entry_total’= Source Entry Total Count; ‘source_entry_udp’= Source Entry UDP Count; ‘source_entry_tcp’= Source Entry TCP Count; ‘source_entry_icmp’= Source Entry ICMP Count; ‘source_entry_other’= Source Entry OTHER Count; ‘dst_exceed_action_tunnel’= Entry Exceed Action= Tunnel;

counters3

str

‘dst_udp_retry_timeout_blacklist’= UDP Auth= Retry Timeout Blacklisted; ‘src_udp_auth_timeout’= Src UDP Auth= Retry Timeout; ‘zone_src_udp_retry_timeout_blacklist’= Src UDP Auth= Retry Timeout Blacklisted; ‘src_udp_retry_pass’= Src UDP Retry Passed; ‘secondary_port_learn’= Per Addr Port Learned; ‘secondary_port_aged’= Per Addr Port Aged; ‘dst_entry_outbound_udp_session_created’= Outbound= UDP Sessions Created; ‘dst_entry_outbound_udp_session_aged’= Outbound= UDP Sessions Aged; ‘dst_entry_outbound_tcp_session_created’= Outbound= TCP Sessions Created; ‘dst_entry_outbound_tcp_session_aged’= Outbound= TCP Sessions Aged; ‘dst_entry_outbound_pkt_rate_exceed’= Outbound Rate= Packet Exceeded; ‘dst_entry_outbound_kbit_rate_exceed’= Outbound Rate= KiBit Exceeded; ‘dst_entry_outbound_kbit_rate_exceed_count’= Outbound Rate= KiBit Exceeded Count; ‘dst_entry_outbound_conn_limit_exceed’= Outbound Limit= Conn Exceeded; ‘dst_entry_outbound_conn_rate_exceed’= Outbound Rate= Conn Exceeded; ‘dst_entry_outbound_frag_pkt_rate_exceed’= Outbound Rate= Frag Packet Exceeded; ‘prog_first_req_time_exceed’= Req-Resp= First Request Time Exceed; ‘prog_req_resp_time_exceed’= Req-Resp= Request to Response Time Exceed; ‘prog_request_len_exceed’= Req-Resp= Request Length Exceed; ‘prog_response_len_exceed’= Req-Resp= Response Length Exceed; ‘prog_resp_req_ratio_exceed’= Req-Resp= Response to Request Ratio Exceed; ‘prog_resp_req_time_exceed’= Req-Resp= Response to Request Time Exceed; ‘entry_sync_message_received’= Entry Sync Message Received; ‘entry_sync_message_sent’= Entry Sync Message Sent; ‘prog_conn_sent_exceed’= Connection= Sent Exceed; ‘prog_conn_rcvd_exceed’= Connection= Received Exceed; ‘prog_conn_time_exceed’= Connection= Time Exceed; ‘prog_conn_rcvd_sent_ratio_exceed’= Connection= Received to Sent Ratio Exceed; ‘prog_win_sent_exceed’= Time Window= Sent Exceed; ‘prog_win_rcvd_exceed’= Time Window= Received Exceed; ‘prog_win_rcvd_sent_ratio_exceed’= Time Window= Received to Sent Exceed; ‘prog_exceed_drop’= Req-Resp= Violation Exceed Dropped; ‘prog_exceed_bl’= Req-Resp= Violation Exceed Blacklisted; ‘prog_conn_exceed_drop’= Connection= Violation Exceed Dropped; ‘prog_conn_exceed_bl’= Connection= Violation Exceed Blacklisted; ‘prog_win_exceed_drop’= Time Window= Violation Exceed Dropped; ‘prog_win_exceed_bl’= Time Window= Violation Exceed Blacklisted; ‘east_west_inbound_rcv_pkt’= East West= Inbound Packets Received; ‘east_west_inbound_drop_pkt’= East West= Inbound Packets Dropped; ‘east_west_inbound_fwd_pkt’= East West= Inbound Packets Forwarded; ‘east_west_inbound_rcv_byte’= East West= Inbound Bytes Received; ‘east_west_inbound_drop_byte’= East West= Inbound Bytes Dropped; ‘east_west_inbound_fwd_byte’= East West= Inbound Bytes Forwarded; ‘east_west_outbound_rcv_pkt’= East West= Outbound Packets Received; ‘east_west_outbound_drop_pkt’= East West= Outbound Packets Dropped; ‘east_west_outbound_fwd_pkt’= East West= Outbound Packets Forwarded; ‘east_west_outbound_rcv_byte’= East West= Outbound Bytes Received; ‘east_west_outbound_drop_byte’= East West= Outbound Bytes Dropped; ‘east_west_outbound_fwd_byte’= East West= Outbound Bytes Forwarded; ‘dst_exceed_action_drop’= Entry Exceed Action= Dropped; ‘prog_conn_samples’= Sample Collected= Connection; ‘prog_req_samples’= Sample Collected= Req-Resp; ‘prog_win_samples’= Sample Collected= Time Window; ‘victim_ip_learned’= Victim Identification= IP Entry Learned; ‘victim_ip_aged’= Victim Identification= IP Entry Aged; ‘prog_conn_samples_processed’= Sample Processed= Connnection; ‘prog_req_samples_processed’= Sample Processed= Req-Resp; ‘prog_win_samples_processed’= Sample Processed= Time Window; ‘dst_src_learn_overflow’= Src Dynamic Entry Count Overflow; ‘dst_tcp_auth_rst’= TCP Auth= Reset; ‘token_auth_mismatched_packets’= Token Authentication Mismatched Packets; ‘token_auth_invalid_packets’= Token Authentication Invalid Packets; ‘token_auth_current_salt_matched’= Token Authentication Current Salt Matched; ‘token_auth_previous_salt_matched’= Token Authentication Previous Salt Matched; ‘token_auth_session_created’= Token Authentication Session Created; ‘token_auth_session_created_fail’= Token Authentication Session Created Fail;

detection

dict

Field detection

settings

str

‘settings’= settings;

toggle

str

‘enable’= Enable detection; ‘disable’= Disable detection;

uuid

str

uuid of the object

notification

dict

Field notification

outbound_detection

dict

Field outbound_detection

service_discovery

dict

Field service_discovery

packet_anomaly_detection

dict

Field packet_anomaly_detection

victim_ip_detection

dict

Field victim_ip_detection

packet_anomaly_detection

dict

Field packet_anomaly_detection

uuid

str

uuid of the object

outbound_policy

dict

Field outbound_policy

name

str

Specify name of the outbound policy

uuid

str

uuid of the object

capture_config_list

list

Field capture_config_list

name

str

Capture-config name

mode

str

‘drop’= Apply capture-config to dropped packets; ‘forward’= Apply capture- config to forwarded packets; ‘all’= Apply capture-config to both dropped and forwarded packets;

uuid

str

uuid of the object

hw_blacklist_blocking

dict

Field hw_blacklist_blocking

dst_enable

bool

Enable Dst side hardware blocking

src_enable

bool

Enable Src side hardware blocking

uuid

str

uuid of the object

topk_destinations

dict

Field topk_destinations

uuid

str

uuid of the object

src_port_range_list

list

Field src_port_range_list

src_port_range_start

int

Src Port-Range Start Port Number

src_port_range_end

int

Src Port-Range End Port Number

protocol

str

‘udp’= UDP port; ‘tcp’= TCP Port;

deny

bool

Blacklist and Drop all incoming packets for protocol

glid_cfg

dict

Field glid_cfg

zone_template

dict

Field zone_template

default_action_list

str

Configure default-action-list

capture_config

dict

Field capture_config

set_counter_base_val

int

Set T2 counter value of current context to specified value

uuid

str

uuid of the object

user_tag

str

Customized tag

port_ind

dict

Field port_ind

level_list

list

Field level_list

src_port

dict

Field src_port

zone_src_port_list

list

Field zone_src_port_list

zone_src_port_other_list

list

Field zone_src_port_other_list

ip_proto

dict

Field ip_proto

proto_number_list

list

Field proto_number_list

proto_tcp_udp_list

list

Field proto_tcp_udp_list

proto_name_list

list

Field proto_name_list

port

dict

Field port

zone_service_list

list

Field zone_service_list

zone_service_other_list

list

Field zone_service_other_list

port_range_list

list

Field port_range_list

port_range_start

int

Port-Range Start Port Number

port_range_end

int

Port-Range End Port Number

protocol

str

‘dns-tcp’= DNS-TCP Port; ‘dns-udp’= DNS-UDP Port; ‘http’= HTTP Port; ‘tcp’= TCP Port; ‘udp’= UDP Port; ‘ssl-l4’= SSL-L4 Port; ‘sip-udp’= SIP-UDP Port; ‘sip- tcp’= SIP-TCP Port; ‘quic’= QUIC Port;

manual_mode_enable

bool

Toggle manual mode to use fix templates

deny

bool

Blacklist and Drop all incoming packets for protocol

glid_cfg

dict

Field glid_cfg

stateful

bool

Enable stateful tracking of sessions (Default is stateless)

default_action_list

str

Configure default-action-list

sflow_common

bool

Enable all sFlow polling options under this zone port

sflow_packets

bool

Enable sFlow packet-level counter polling

sflow_tcp

dict

Field sflow_tcp

sflow_http

bool

Enable sFlow HTTP counter polling

unlimited_dynamic_entry_count

bool

No limit for maximum dynamic src entry count

max_dynamic_entry_count

int

Maximum count for dynamic source zone service entry

apply_policy_on_overflow

bool

Enable this flag to apply overflow policy when dynamic entry count overflows

enable_class_list_overflow

bool

Apply class-list overflow policy upon exceeding dynamic entry count specified under zone port or each class-list

enable_top_k

bool

Enable ddos top-k source IP detection

topk_num_records

int

Maximum number of records to show in topk

enable_top_k_destination

bool

Enable ddos top-k destination IP detection

topk_dst_num_records

int

Maximum number of records to show in topk

set_counter_base_val

int

Set T2 counter value of current context to specified value

age

int

Idle age for ip entry

outbound_only

bool

Only allow outbound traffic

faster_de_escalation

bool

De-escalate faster in standalone mode

ip_filtering_policy

str

Configure IP Filter

uuid

str

uuid of the object

user_tag

str

Customized tag

ip_filtering_policy_oper

dict

Field ip_filtering_policy_oper

pattern_recognition

dict

Field pattern_recognition

pattern_recognition_pu_details

dict

Field pattern_recognition_pu_details

level_list

list

Field level_list

manual_mode_list

list

Field manual_mode_list

ips

dict

Field ips

port_ind

dict

Field port_ind

topk_sources

dict

Field topk_sources

topk_destinations

dict

Field topk_destinations

progression_tracking

dict

Field progression_tracking

src_based_policy_list

list

Field src_based_policy_list

dynamic_entry_overflow_policy_list

list

Field dynamic_entry_overflow_policy_list

web_gui

dict

Field web_gui

status

str

‘newly’= newly; ‘learning’= learning; ‘learned’= learned; ‘activated’= activated;

activated_after_learning

bool

Activate it after learning

create_time

str

Configure create time

modify_time

str

Configure modify time

sensitivity

str

‘5’= Low; ‘3’= Medium; ‘1.5’= High;

uuid

str

uuid of the object

learning

dict

Field learning

protection

dict

Field protection

oper

dict

Field oper

ddos_entry_list

list

Field ddos_entry_list

total_dynamic_entry_count

str

Field total_dynamic_entry_count

udp_dynamic_entry_count

str

Field udp_dynamic_entry_count

tcp_dynamic_entry_count

str

Field tcp_dynamic_entry_count

icmp_dynamic_entry_count

str

Field icmp_dynamic_entry_count

other_dynamic_entry_count

str

Field other_dynamic_entry_count

traffic_distribution_status

list

Field traffic_distribution_status

entry_displayed_count

int

Field entry_displayed_count

service_displayed_count

int

Field service_displayed_count

no_t2_idx_port_count

int

Field no_t2_idx_port_count

addresses

bool

Field addresses

subnet_ip_addr

str

Field subnet_ip_addr

subnet_ipv6_addr

str

Field subnet_ipv6_addr

all_addresses

bool

Field all_addresses

ip_proto_num

int

Field ip_proto_num

all_ip_protos

bool

Field all_ip_protos

port_num

int

Field port_num

port_range_start

int

Field port_range_start

port_range_end

int

Field port_range_end

protocol

str

Field protocol

all_ports

bool

Field all_ports

dynamic_expand_subnet

bool

Field dynamic_expand_subnet

blackhole

bool

Field blackhole

zone_name

str

Field zone_name

detection

dict

Field detection

packet_anomaly_detection

dict

Field packet_anomaly_detection

outbound_policy

dict

Field outbound_policy

topk_destinations

dict

Field topk_destinations

src_port_range_list

list

Field src_port_range_list

src_port

dict

Field src_port

ip_proto

dict

Field ip_proto

port

dict

Field port

port_range_list

list

Field port_range_list

stats

dict

Field stats

zone_tcp_any_exceed

str

TCP Dst IP-Proto Rate= Total Exceeded

zone_tcp_pkt_rate_exceed

str

TCP Dst IP-Proto Rate= Packet Exceeded

zone_tcp_conn_rate_exceed

str

TCP Dst IP-Proto Rate= Conn Exceeded

zone_udp_any_exceed

str

UDP Dst IP-Proto Rate= Total Exceeded

zone_udp_pkt_rate_exceed

str

UDP Dst IP-Proto Rate= Packet Exceeded

zone_udp_conn_limit_exceed

str

UDP Dst IP-Proto Limit= Conn Exceeded

zone_udp_conn_rate_exceed

str

UDP Dst IP-Proto Rate= Conn Exceeded

zone_icmp_pkt_rate_exceed

str

ICMP Dst Rate= Packet Exceeded

zone_other_pkt_rate_exceed

str

OTHER Dst IP-Proto Rate= Packet Exceeded

zone_other_frag_pkt_rate_exceed

str

OTHER Dst IP-Proto Rate= Frag Exceeded

zone_port_pkt_rate_exceed

str

Port Rate= Packet Exceeded

zone_port_conn_limit_exceed

str

Port Limit= Conn Exceeded

zone_port_conn_rate_exceed

str

Port Rate= Conn Exceeded

zone_pkt_sent

str

Inbound= Packets Forwarded

zone_udp_pkt_sent

str

UDP Total Packets Forwarded

zone_tcp_pkt_sent

str

TCP Total Packets Forwarded

zone_icmp_pkt_sent

str

ICMP Total Packets Forwarded

zone_other_pkt_sent

str

OTHER Total Packets Forwarded

zone_tcp_conn_limit_exceed

str

TCP Dst IP-Proto Limit= Conn Exceeded

zone_tcp_pkt_rcvd

str

TCP Total Packets Received

zone_udp_pkt_rcvd

str

UDP Total Packets Received

zone_icmp_pkt_rcvd

str

ICMP Total Packets Received

zone_other_pkt_rcvd

str

OTHER Total Packets Received

zone_udp_filter_match

str

UDP Filter Match

zone_udp_filter_not_match

str

UDP Filter Not Matched on Pkt

zone_udp_filter_action_blacklist

str

UDP Filter Action Blacklist

zone_udp_filter_action_drop

str

UDP Filter Action Drop

zone_tcp_syn

str

TCP Total SYN Received

zone_tcp_syn_drop

str

TCP SYN Packets Dropped

zone_tcp_src_rate_drop

str

TCP Src Rate= Total Exceeded

zone_udp_src_rate_drop

str

UDP Src Rate= Total Exceeded

zone_icmp_src_rate_drop

str

ICMP Src Rate= Total Exceeded

zone_other_frag_src_rate_drop

str

OTHER Src Rate= Frag Exceeded

zone_other_src_rate_drop

str

OTHER Src Rate= Total Exceeded

zone_tcp_drop

str

TCP Total Packets Dropped

zone_udp_drop

str

UDP Total Packets Dropped

zone_icmp_drop

str

ICMP Total Packets Dropped

zone_frag_drop

str

Fragmented Packets Dropped

zone_other_drop

str

OTHER Total Packets Dropped

zone_tcp_auth

str

TCP Auth= SYN Cookie Sent

zone_udp_filter_action_default_pass

str

UDP Filter Action Default Pass

zone_tcp_filter_match

str

TCP Filter Match

zone_tcp_filter_not_match

str

TCP Filter Not Matched on Pkt

zone_tcp_filter_action_blacklist

str

TCP Filter Action Blacklist

zone_tcp_filter_action_drop

str

TCP Filter Action Drop

zone_tcp_filter_action_default_pass

str

TCP Filter Action Default Pass

zone_udp_filter_action_whitelist

str

UDP Filter Action WL

zone_udp_kibit_rate_drop

str

UDP Dst IP-Proto Rate= KiBit Exceeded

zone_tcp_kibit_rate_drop

str

TCP Dst IP-Proto Rate= KiBit Exceeded

zone_icmp_kibit_rate_drop

str

ICMP Dst Rate= KiBit Exceeded

zone_other_kibit_rate_drop

str

OTHER Dst IP-Proto Rate= KiBit Exceeded

zone_port_undef_drop

str

Dst Port Undefined Dropped

zone_port_bl

str

Dst Port Blacklist Packets Dropped

zone_src_port_bl

str

Dst SrcPort Blacklist Packets Dropped

zone_port_kbit_rate_exceed

str

Port Rate= KiBit Exceeded

zone_tcp_src_drop

str

TCP Src Packets Dropped

zone_udp_src_drop

str

UDP Src Packets Dropped

zone_icmp_src_drop

str

ICMP Src Packets Dropped

zone_other_src_drop

str

OTHER Src Packets Dropped

tcp_syn_rcvd

str

TCP Inbound SYN Received

tcp_syn_ack_rcvd

str

TCP SYN ACK Received

tcp_ack_rcvd

str

TCP ACK Received

tcp_fin_rcvd

str

TCP FIN Received

tcp_rst_rcvd

str

TCP RST Received

ingress_bytes

str

Inbound= Bytes Received

egress_bytes

str

Outbound= Bytes Received

ingress_packets

str

Inbound= Packets Received

egress_packets

str

Outbound= Packets Received

tcp_fwd_recv

str

TCP Inbound Packets Received

udp_fwd_recv

str

UDP Inbound Packets Received

icmp_fwd_recv

str

ICMP Inbound Packets Received

tcp_syn_cookie_fail

str

TCP Auth= SYN Cookie Failed

zone_tcp_session_created

str

TCP Sessions Created

zone_udp_session_created

str

UDP Sessions Created

zone_tcp_filter_action_whitelist

str

TCP Filter Action WL

zone_other_filter_match

str

OTHER Filter Match

zone_other_filter_not_match

str

OTHER Filter Not Matched on Pkt

zone_other_filter_action_blacklist

str

OTHER Filter Action Blacklist

zone_other_filter_action_drop

str

OTHER Filter Action Drop

zone_other_filter_action_whitelist

str

OTHER Filter Action WL

zone_other_filter_action_default_pass

str

OTHER Filter Action Default Pass

zone_blackhole_inject

str

Dst Blackhole Inject

zone_blackhole_withdraw

str

Dst Blackhole Withdraw

zone_tcp_out_of_seq_excd

str

TCP Out-Of-Seq Exceeded

zone_tcp_retransmit_excd

str

TCP Retransmit Exceeded

zone_tcp_zero_window_excd

str

TCP Zero-Window Exceeded

zone_tcp_conn_prate_excd

str

TCP Rate= Conn Pkt Exceeded

zone_tcp_action_on_ack_init

str

TCP Auth= ACK Retry Init

zone_tcp_action_on_ack_gap_drop

str

TCP Auth= ACK Retry Retry-Gap Dropped

zone_tcp_action_on_ack_fail

str

TCP Auth= ACK Retry Dropped

zone_tcp_action_on_ack_pass

str

TCP Auth= ACK Retry Passed

zone_tcp_action_on_syn_init

str

TCP Auth= SYN Retry Init

zone_tcp_action_on_syn_gap_drop

str

TCP Auth= SYN Retry-Gap Dropped

zone_tcp_action_on_syn_fail

str

TCP Auth= SYN Retry Dropped

zone_tcp_action_on_syn_pass

str

TCP Auth= SYN Retry Passed

zone_payload_too_small

str

UDP Payload Too Small

zone_payload_too_big

str

UDP Payload Too Large

zone_udp_conn_prate_excd

str

UDP Rate= Conn Pkt Exceeded

zone_udp_ntp_monlist_req

str

UDP NTP Monlist Request

zone_udp_ntp_monlist_resp

str

UDP NTP Monlist Response

zone_udp_wellknown_sport_drop

str

UDP SrcPort Wellknown

zone_udp_retry_init

str

UDP Auth= Retry Init

zone_udp_retry_pass

str

UDP Auth= Retry Passed

zone_tcp_bytes_drop

str

TCP Total Bytes Dropped

zone_udp_bytes_drop

str

UDP Total Bytes Dropped

zone_icmp_bytes_drop

str

ICMP Total Bytes Dropped

zone_other_bytes_drop

str

OTHER Total Bytes Dropped

zone_out_no_route

str

Dst IPv4/v6 Out No Route

outbound_bytes_sent

str

Outbound= Bytes Forwarded

outbound_drop

str

Outbound= Packets Dropped

outbound_bytes_drop

str

Outbound= Bytes Dropped

outbound_pkt_sent

str

Outbound= Packets Forwarded

inbound_bytes_sent

str

Inbound= Bytes Forwarded

inbound_bytes_drop

str

Inbound= Bytes Dropped

zone_src_port_pkt_rate_exceed

str

SrcPort Rate= Packet Exceeded

zone_src_port_kbit_rate_exceed

str

SrcPort Rate= KiBit Exceeded

zone_src_port_conn_limit_exceed

str

SrcPort Limit= Conn Exceeded

zone_src_port_conn_rate_exceed

str

SrcPort Rate= Conn Exceeded

zone_ip_proto_pkt_rate_exceed

str

IP-Proto Rate= Packet Exceeded

zone_ip_proto_kbit_rate_exceed

str

IP-Proto Rate= KiBit Exceeded

zone_tcp_port_any_exceed

str

TCP Port Rate= Total Exceed

zone_udp_port_any_exceed

str

UDP Port Rate= Total Exceed

zone_tcp_auth_pass

str

TCP Auth= SYN Auth Passed

zone_tcp_rst_cookie_fail

str

TCP Auth= RST Cookie Failed

zone_tcp_unauth_drop

str

TCP Auth= Unauth Dropped

src_tcp_syn_auth_fail

str

Src TCP Auth= SYN Auth Failed

src_tcp_syn_cookie_sent

str

Src TCP Auth= SYN Cookie Sent

src_tcp_syn_cookie_fail

str

Src TCP Auth= SYN Cookie Failed

src_tcp_rst_cookie_fail

str

Src TCP Auth= RST Cookie Failed

src_tcp_unauth_drop

str

Src TCP Auth= Unauth Dropped

src_tcp_action_on_syn_init

str

Src TCP Auth= SYN Retry Init

src_tcp_action_on_syn_gap_drop

str

Src TCP Auth= SYN Retry-Gap Dropped

src_tcp_action_on_syn_fail

str

Src TCP Auth= SYN Retry Dropped

src_tcp_action_on_ack_init

str

Src TCP Auth= ACK Retry Init

src_tcp_action_on_ack_gap_drop

str

Src TCP Auth= ACK Retry Retry-Gap Dropped

src_tcp_action_on_ack_fail

str

Src TCP Auth= ACK Retry Dropped

src_tcp_out_of_seq_excd

str

Src TCP Out-Of-Seq Exceeded

src_tcp_retransmit_excd

str

Src TCP Retransmit Exceeded

src_tcp_zero_window_excd

str

Src TCP Zero-Window Exceeded

src_tcp_conn_prate_excd

str

Src TCP Rate= Conn Pkt Exceeded

src_udp_min_payload

str

Src UDP Payload Too Small

src_udp_max_payload

str

Src UDP Payload Too Large

src_udp_conn_prate_excd

str

Src UDP Rate= Conn Pkt Exceeded

src_udp_ntp_monlist_req

str

Src UDP NTP Monlist Request

src_udp_ntp_monlist_resp

str

Src UDP NTP Monlist Response

src_udp_wellknown_sport_drop

str

Src UDP SrcPort Wellknown

src_udp_retry_init

str

Src UDP Auth= Retry Init

dst_udp_retry_gap_drop

str

UDP Auth= Retry-Gap Dropped

dst_udp_retry_fail

str

UDP Auth= Retry Timeout

dst_tcp_session_aged

str

TCP Sessions Aged

dst_udp_session_aged

str

UDP Sessions Aged

dst_tcp_conn_close

str

TCP Connections Closed

dst_tcp_conn_close_half_open

str

TCP Half Open Connections Closed

src_tcp_filter_action_blacklist

str

Src TCP Filter Action Blacklist

src_tcp_filter_action_whitelist

str

Src TCP Filter Action WL

src_tcp_filter_action_drop

str

Src TCP Filter Action Drop

src_tcp_filter_action_default_pass

str

Src TCP Filter Action Default Pass

src_udp_filter_action_blacklist

str

Src UDP Filter Action Blacklist

src_udp_filter_action_whitelist

str

Src UDP Filter Action WL

src_udp_filter_action_drop

str

Src UDP Filter Action Drop

src_udp_filter_action_default_pass

str

Src UDP Filter Action Default Pass

src_other_filter_action_blacklist

str

Src OTHER Filter Action Blacklist

src_other_filter_action_whitelist

str

Src OTHER Filter Action WL

src_other_filter_action_drop

str

Src OTHER Filter Action Drop

src_other_filter_action_default_pass

str

Src OTHER Filter Action Default Pass

tcp_invalid_syn

str

TCP Invalid SYN Received

dst_tcp_conn_close_w_rst

str

TCP RST Connections Closed

dst_tcp_conn_close_w_fin

str

TCP FIN Connections Closed

dst_tcp_conn_close_w_idle

str

TCP Idle Connections Closed

dst_tcp_conn_create_from_syn

str

TCP Connections Created From SYN

dst_tcp_conn_create_from_ack

str

TCP Connections Created From ACK

src_frag_drop

str

Src Fragmented Packets Dropped

zone_port_kbit_rate_exceed_pkt

str

Port Rate= KiBit Pkt Exceeded

dst_tcp_bytes_rcv

str

TCP Total Bytes Received

dst_udp_bytes_rcv

str

UDP Total Bytes Received

dst_icmp_bytes_rcv

str

ICMP Total Bytes Received

dst_other_bytes_rcv

str

OTHER Total Bytes Received

dst_tcp_bytes_sent

str

TCP Total Bytes Forwarded

dst_udp_bytes_sent

str

UDP Total Bytes Forwarded

dst_icmp_bytes_sent

str

ICMP Total Bytes Forwarded

dst_other_bytes_sent

str

OTHER Total Bytes Forwarded

dst_udp_auth_drop

str

UDP Auth= Dropped

dst_tcp_auth_drop

str

TCP Auth= Dropped

dst_tcp_auth_resp

str

TCP Auth= Responded

dst_drop

str

Inbound= Packets Dropped

dst_entry_pkt_rate_exceed

str

Entry Rate= Packet Exceeded

dst_entry_kbit_rate_exceed

str

Entry Rate= KiBit Exceeded

dst_entry_conn_limit_exceed

str

Entry Limit= Conn Exceeded

dst_entry_conn_rate_exceed

str

Entry Rate= Conn Exceeded

dst_entry_frag_pkt_rate_exceed

str

Entry Rate= Frag Packet Exceeded

dst_l4_tcp_blacklist_drop

str

Dst TCP IP-Proto Blacklist Dropped

dst_l4_udp_blacklist_drop

str

Dst UDP IP-Proto Blacklist Dropped

dst_l4_icmp_blacklist_drop

str

Dst ICMP IP-Proto Blacklist Dropped

dst_l4_other_blacklist_drop

str

Dst OTHER IP-Proto Blacklist Dropped

dst_icmp_any_exceed

str

ICMP Rate= Total Exceed

dst_other_any_exceed

str

OTHER Rate= Total Exceed

tcp_rexmit_syn_limit_drop

str

TCP SYN Retransmit Exceeded Drop

tcp_rexmit_syn_limit_bl

str

TCP SYN Retransmit Exceeded Blacklist

dst_clist_overflow_policy_at_learning

str

Dst Src-Based Overflow Policy Hit

zone_frag_rcvd

str

Fragmented Packets Received

zone_tcp_wellknown_sport_drop

str

TCP SrcPort Wellknown

src_tcp_wellknown_sport_drop

str

Src TCP SrcPort Wellknown

secondary_dst_entry_pkt_rate_exceed

str

Per Addr Rate= Packet Exceeded

secondary_dst_entry_kbit_rate_exceed

str

Per Addr Rate= KiBit Exceeded

secondary_dst_entry_conn_limit_exceed

str

Per Addr Limit= Conn Exceeded

secondary_dst_entry_conn_rate_exceed

str

Per Addr Rate= Conn Exceeded

secondary_dst_entry_frag_pkt_rate_exceed

str

Per Addr Rate= Frag Packet Exceeded

src_udp_retry_gap_drop

str

Src UDP Auth= Retry-Gap Dropped

dst_entry_kbit_rate_exceed_count

str

Entry Rate= KiBit Exceeded Count

secondary_entry_learn

str

Per Addr Entry Learned

secondary_entry_hit

str

Per Addr Entry Hit

secondary_entry_miss

str

Per Addr Entry Missed

secondary_entry_aged

str

Per Addr Entry Aged

secondary_entry_learning_thre_exceed

str

Per Addr Entry Count Overflow

zone_port_undef_hit

str

Dst Port undefined Hit

zone_tcp_action_on_ack_timeout

str

TCP Auth= ACK Retry Timeout

zone_tcp_action_on_ack_reset

str

TCP Auth= ACK Retry Timeout Reset

zone_tcp_action_on_ack_blacklist

str

TCP Auth= ACK Retry Timeout Blacklisted

src_tcp_action_on_ack_timeout

str

Src TCP Auth= ACK Retry Timeout

src_tcp_action_on_ack_reset

str

Src TCP Auth= ACK Retry Timeout Reset

src_tcp_action_on_ack_blacklist

str

Src TCP Auth= ACK Retry Timeout Blacklisted

zone_tcp_action_on_syn_timeout

str

TCP Auth= SYN Retry Timeout

zone_tcp_action_on_syn_reset

str

TCP Auth= SYN Retry Timeout Reset

zone_tcp_action_on_syn_blacklist

str

TCP Auth= SYN Retry Timeout Blacklisted

src_tcp_action_on_syn_timeout

str

Src TCP Auth= SYN Retry Timeout

src_tcp_action_on_syn_reset

str

Src TCP Auth= SYN Retry Timeout Reset

src_tcp_action_on_syn_blacklist

str

Src TCP Auth= SYN Retry Timeout Blacklisted

zone_udp_frag_pkt_rate_exceed

str

UDP Dst IP-Proto Rate= Frag Exceeded

zone_udp_frag_src_rate_drop

str

UDP Src Rate= Frag Exceeded

zone_tcp_frag_pkt_rate_exceed

str

TCP Dst IP-Proto Rate= Frag Exceeded

zone_tcp_frag_src_rate_drop

str

TCP Src Rate= Frag Exceeded

zone_icmp_frag_pkt_rate_exceed

str

ICMP Dst IP-Proto Rate= Frag Exceeded

zone_icmp_frag_src_rate_drop

str

ICMP Src Rate= Frag Exceeded

sflow_internal_samples_packed

str

Sflow Internal Samples Packed

sflow_external_samples_packed

str

Sflow External Samples Packed

sflow_internal_packets_sent

str

Sflow Internal Packets Sent

sflow_external_packets_sent

str

Sflow External Packets Sent

dns_outbound_total_query

str

DNS Outbound Total Query

dns_outbound_query_malformed

str

DNS Outbound Query Malformed

dns_outbound_query_resp_chk_failed

str

DNS Outbound Query Resp Check Failed

dns_outbound_query_resp_chk_blacklisted

str

DNS Outbound Query Resp Check Blacklisted

dns_outbound_query_resp_chk_refused_sent

str

DNS Outbound Query Resp Check REFUSED Sent

dns_outbound_query_resp_chk_reset_sent

str

DNS Outbound Query Resp Check RESET Sent

dns_outbound_query_resp_chk_no_resp_sent

str

DNS Outbound Query Resp Check No Response Sent

dns_outbound_query_resp_size_exceed

str

DNS Outbound Query Response Size Exceed

dns_outbound_query_sess_timed_out

str

DNS Outbound Query Session Timed Out

source_entry_total

str

Source Entry Total Count

source_entry_udp

str

Source Entry UDP Count

source_entry_tcp

str

Source Entry TCP Count

source_entry_icmp

str

Source Entry ICMP Count

source_entry_other

str

Source Entry OTHER Count

dst_exceed_action_tunnel

str

Entry Exceed Action= Tunnel

dst_udp_retry_timeout_blacklist

str

UDP Auth= Retry Timeout Blacklisted

src_udp_auth_timeout

str

Src UDP Auth= Retry Timeout

zone_src_udp_retry_timeout_blacklist

str

Src UDP Auth= Retry Timeout Blacklisted

src_udp_retry_pass

str

Src UDP Retry Passed

secondary_port_learn

str

Per Addr Port Learned

secondary_port_aged

str

Per Addr Port Aged

dst_entry_outbound_udp_session_created

str

Outbound= UDP Sessions Created

dst_entry_outbound_udp_session_aged

str

Outbound= UDP Sessions Aged

dst_entry_outbound_tcp_session_created

str

Outbound= TCP Sessions Created

dst_entry_outbound_tcp_session_aged

str

Outbound= TCP Sessions Aged

dst_entry_outbound_pkt_rate_exceed

str

Outbound Rate= Packet Exceeded

dst_entry_outbound_kbit_rate_exceed

str

Outbound Rate= KiBit Exceeded

dst_entry_outbound_kbit_rate_exceed_count

str

Outbound Rate= KiBit Exceeded Count

dst_entry_outbound_conn_limit_exceed

str

Outbound Limit= Conn Exceeded

dst_entry_outbound_conn_rate_exceed

str

Outbound Rate= Conn Exceeded

dst_entry_outbound_frag_pkt_rate_exceed

str

Outbound Rate= Frag Packet Exceeded

prog_first_req_time_exceed

str

Req-Resp= First Request Time Exceed

prog_req_resp_time_exceed

str

Req-Resp= Request to Response Time Exceed

prog_request_len_exceed

str

Req-Resp= Request Length Exceed

prog_response_len_exceed

str

Req-Resp= Response Length Exceed

prog_resp_req_ratio_exceed

str

Req-Resp= Response to Request Ratio Exceed

prog_resp_req_time_exceed

str

Req-Resp= Response to Request Time Exceed

entry_sync_message_received

str

Entry Sync Message Received

entry_sync_message_sent

str

Entry Sync Message Sent

prog_conn_sent_exceed

str

Connection= Sent Exceed

prog_conn_rcvd_exceed

str

Connection= Received Exceed

prog_conn_time_exceed

str

Connection= Time Exceed

prog_conn_rcvd_sent_ratio_exceed

str

Connection= Received to Sent Ratio Exceed

prog_win_sent_exceed

str

Time Window= Sent Exceed

prog_win_rcvd_exceed

str

Time Window= Received Exceed

prog_win_rcvd_sent_ratio_exceed

str

Time Window= Received to Sent Exceed

prog_exceed_drop

str

Req-Resp= Violation Exceed Dropped

prog_exceed_bl

str

Req-Resp= Violation Exceed Blacklisted

prog_conn_exceed_drop

str

Connection= Violation Exceed Dropped

prog_conn_exceed_bl

str

Connection= Violation Exceed Blacklisted

prog_win_exceed_drop

str

Time Window= Violation Exceed Dropped

prog_win_exceed_bl

str

Time Window= Violation Exceed Blacklisted

east_west_inbound_rcv_pkt

str

East West= Inbound Packets Received

east_west_inbound_drop_pkt

str

East West= Inbound Packets Dropped

east_west_inbound_fwd_pkt

str

East West= Inbound Packets Forwarded

east_west_inbound_rcv_byte

str

East West= Inbound Bytes Received

east_west_inbound_drop_byte

str

East West= Inbound Bytes Dropped

east_west_inbound_fwd_byte

str

East West= Inbound Bytes Forwarded

east_west_outbound_rcv_pkt

str

East West= Outbound Packets Received

east_west_outbound_drop_pkt

str

East West= Outbound Packets Dropped

east_west_outbound_fwd_pkt

str

East West= Outbound Packets Forwarded

east_west_outbound_rcv_byte

str

East West= Outbound Bytes Received

east_west_outbound_drop_byte

str

East West= Outbound Bytes Dropped

east_west_outbound_fwd_byte

str

East West= Outbound Bytes Forwarded

dst_exceed_action_drop

str

Entry Exceed Action= Dropped

prog_conn_samples

str

Sample Collected= Connection

prog_req_samples

str

Sample Collected= Req-Resp

prog_win_samples

str

Sample Collected= Time Window

victim_ip_learned

str

Victim Identification= IP Entry Learned

victim_ip_aged

str

Victim Identification= IP Entry Aged

prog_conn_samples_processed

str

Sample Processed= Connnection

prog_req_samples_processed

str

Sample Processed= Req-Resp

prog_win_samples_processed

str

Sample Processed= Time Window

dst_src_learn_overflow

str

Src Dynamic Entry Count Overflow

dst_tcp_auth_rst

str

TCP Auth= Reset

token_auth_mismatched_packets

str

Token Authentication Mismatched Packets

token_auth_invalid_packets

str

Token Authentication Invalid Packets

token_auth_current_salt_matched

str

Token Authentication Current Salt Matched

token_auth_previous_salt_matched

str

Token Authentication Previous Salt Matched

token_auth_session_created

str

Token Authentication Session Created

token_auth_session_created_fail

str

Token Authentication Session Created Fail

zone_name

str

Field zone_name

Examples


Return Values

modified_values (changed, dict, )

Values modified (or potential changes if using check_mode) as a result of task operation

axapi_calls (always, list, )

Sequential list of AXAPI calls made by the task

endpoint (, str, [‘/axapi/v3/slb/virtual_server’, ‘/axapi/v3/file/ssl-cert’])

The AXAPI endpoint being accessed.

http_method (, str, [‘POST’, ‘GET’])

HTTP method being used by the primary task to interact with the AXAPI endpoint.

request_body (, complex, )

Params used to query the AXAPI

response_body (, complex, )

Response from the AXAPI

Status

  • This module is not guaranteed to have a backwards compatible interface. [preview]

  • This module is maintained by community.

Authors

  • A10 Networks