.. _ddos_dst_zone_port_zone_service: ddos dst zone port zone-service =============================== DDOS Port & Protocol configuration zone-service Specification -------------------------- ===================================== ========================================================================================================== ===================================== ========================================================================================================== **Type** *Collection* **Object Key(s)** *port-num, protocol* **Collection Name** :ref:`1159_zone-service_list` **Collection URI** /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service **Element Name** zone-service **Element URI** /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} **Element Attributes** zone-service_attributes **Statistics Data URI** /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/stats **Operational Data URI** /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/oper **Schema** :download:`zone-service schema ` ===================================== ========================================================================================================== **Operations Allowed:** .. raw:: html .. raw:: html .. raw:: html .. raw:: html .. raw:: html .. raw:: html .. raw:: html .. raw:: html .. raw:: html .. raw:: html .. raw:: html
OperationMethodURIPayload
Create Object .. raw:: html POST .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service .. raw:: html :ref:`1159_zone-service_attributes` .. raw:: html
Create List .. raw:: html POST .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service .. raw:: html :ref:`1159_zone-service_attributes` .. raw:: html
Get Object .. raw:: html GET .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} .. raw:: html :ref:`1159_zone-service_attributes` .. raw:: html
Get List .. raw:: html GET .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service .. raw:: html :ref:`1159_zone-service_list` .. raw:: html
Modify Object .. raw:: html POST .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} .. raw:: html :ref:`1159_zone-service_attributes` .. raw:: html
Replace Object .. raw:: html PUT .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} .. raw:: html :ref:`1159_zone-service_attributes` .. raw:: html
Replace List .. raw:: html PUT .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service .. raw:: html :ref:`1159_zone-service_list` .. raw:: html
Delete Object .. raw:: html DELETE .. raw:: html /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} .. raw:: html :ref:`1159_zone-service_attributes` .. raw:: html
.. _1159_zone-service_list: zone-service-list ----------------- zone-service-list is **JSON List** of :ref:`1159_zone-service_attributes` zone-service-list : [ { :ref:`1159_zone-service_attributes` }, { :ref:`1159_zone-service_attributes` }, ... ] .. _1159_zone-service_attributes: zone-service attributes ----------------------- **apply-policy-on-overflow** **Description** Enable this flag to apply overflow policy when dynamic entry count overflows **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **capture-config** **Description:** capture-config is a **JSON Block**. Please see below for :ref:`1159_capture-config` **Type:** Object **default-action-list** **Description** Configure default-action-list **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/ddos/action-list ` **deny** **Description** Blacklist and Drop all incoming packets for protocol **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **dynamic-entry-overflow-policy-list** **Type:** List **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/dynamic-entry-overflow-policy/{dummy-name} ` **enable-class-list-overflow** **Description** Apply class-list overflow policy upon exceeding dynamic entry count specified for zone-port or class-list **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **enable-top-k** **Description** Enable ddos top-k detection **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **glid-cfg** **Description:** glid-cfg is a **JSON Block**. Please see below for :ref:`1159_glid-cfg` **Type:** Object **ips** **Description:** ips is a **JSON Block**. Please see below for :ref:`1159_ips` **Type:** Object **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/ips ` **level-list** **Type:** List **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/level/{level-num} ` **manual-mode-enable** **Description** Toggle manual mode to use fix templates **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **manual-mode-list** **Type:** List **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/manual-mode/{config} ` **max-dynamic-entry-count** **Description** Maximum count for dynamic source zone service entry **Type:** number **Range:** 0-2147483647 **outbound-only** **Description** Only allow outbound traffic **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **pattern-recognition** **Description:** pattern-recognition is a **JSON Block**. Please see below for :ref:`1159_pattern-recognition` **Type:** Object **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/pattern-recognition ` **port-ind** **Description:** port-ind is a **JSON Block**. Please see below for :ref:`1159_port-ind` **Type:** Object **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/port-ind ` **port-num** **Description** Port Number **Type:** number **Range:** 1-65535 **protocol** **Description** 'dns-tcp': DNS-TCP Port; 'dns-udp': DNS-UDP Port; 'http': HTTP Port; 'tcp': TCP Port; 'udp': UDP Port; 'ssl-l4': SSL-L4 Port; 'sip-udp': SIP-UDP Port; 'sip-tcp': SIP-TCP Port; **Type:** string **Supported Values:** dns-tcp, dns-udp, http, tcp, udp, ssl-l4, sip-udp, sip-tcp, quic **sflow-common** **Description** Enable all sFlow polling options under this zone port **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **Mutual Exclusion:** sflow-commonsflow-packets, sflow-tcp-basic, sflow-tcp-stateful and sflow-http are mutually exclusive **sflow-http** **Description** Enable sFlow HTTP counter polling **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **Mutual Exclusion:** sflow-http and sflow-common are mutually exclusive **sflow-packets** **Description** Enable sFlow packet-level counter polling **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **Mutual Exclusion:** sflow-packets and sflow-common are mutually exclusive **sflow-tcp** **Description:** sflow-tcp is a **JSON Block**. Please see below for :ref:`1159_sflow-tcp` **Type:** Object **signature-extraction** **Description:** signature-extraction is a **JSON Block**. Please see below for :ref:`1159_signature-extraction` **Type:** Object **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/signature-extraction ` **src-based-policy-list** **Type:** List **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/src-based-policy/{src-based-policy-name} ` **stateful** **Description** Enable stateful tracking of sessions (Default is stateless) **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **topk-sources** **Description:** topk-sources is a **JSON Block**. Please see below for :ref:`1159_topk-sources` **Type:** Object **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/topk-sources ` **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters **zone-template** **Description:** zone-template is a **JSON Block**. Please see below for :ref:`1159_zone-template` **Type:** Object .. _1159_pattern-recognition: pattern-recognition ^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **algorithm** **Description** 'heuristic': heuristic algorithm; **Type:** string **Supported Values:** heuristic **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters .. _1159_ips: ips ^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters .. _1159_glid-cfg: glid-cfg ^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **action-list** **Description** Configure action-list to take **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/ddos/action-list ` **glid** **Description** Global limit ID for the whole zone **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/glid ` **glid-action** **Description** 'drop': Drop packets for glid exceed (Default if default-action-list is not configured); 'ignore': Do nothing for glid exceed; **Type:** string **Supported Values:** drop, ignore **per-addr-glid** **Description** Global limit ID per address **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/glid ` .. _1159_zone-template: zone-template ^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **ips** **Description** IPS template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters .. _1159_signature-extraction: signature-extraction ^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **algorithm** **Description** 'heuristic': heuristic algorithm; **Type:** string **Supported Values:** heuristic **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters .. _1159_level-list: level-list ^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *list* **Block object keys** =============================== =================================================== **apply-extracted-filters** **Description** Apply extracted filters from this level **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **glid-action** **Description** 'drop': Drop packets for glid exceed (Default); 'blacklist-src': Blacklist-src for glid exceed; 'ignore': Do nothing for glid exceed; **Type:** string **Supported Values:** drop, blacklist-src, ignore **indicator-list** **Type:** List **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/level/{level-num}/indicator/{type} ` **level-num** **Description** '0': Default policy level; '1': Policy level 1; '2': Policy level 2; '3': Policy level 3; '4': Policy level 4; **Type:** string **Supported Values:** 0, 1, 2, 3, 4 **src-default-glid** **Description** Global limit ID **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/glid ` **src-escalation-score** **Description** Source activation score of this level **Type:** number **Range:** 1-1000000 **src-violation-actions** **Description** Violation actions apply due to source escalate from this level **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/ddos/violation-actions ` **start-pattern-recognition** **Description** Start pattern recognition from this level **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **user-tag** **Description** Customized tag **Type:** string **Format:** string-rlx **Maximum Length:** 127 characters **Maximum Length:** 1 characters **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters **zone-escalation-score** **Description** Zone activation score of this level **Type:** number **Range:** 1-1000000 **zone-template** **Description:** zone-template is a **JSON Block**. Please see below for :ref:`1159_level-list_zone-template` **Type:** Object **zone-violation-actions** **Description** Violation actions apply due to zone escalate from this level **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/ddos/violation-actions ` .. _1159_level-list_zone-template: level-list_zone-template ^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **dns** **Description** DDOS dns template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **encap** **Description** DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.) **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **http** **Description** DDOS http template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **quic** **Description** DDOS quic template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **sip** **Description** DDOS sip template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **ssl-l4** **Description** DDOS ssl-l4 template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **tcp** **Description** DDOS tcp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **udp** **Description** DDOS udp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters .. _1159_level-list_indicator-list: level-list_indicator-list ^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *list* **Block object keys** =============================== =================================================== **data-packet-size** **Description** Expected minimal data size **Type:** number **Range:** 0-2147483647 **score** **Description** Score corresponding to the indicator **Type:** number **Range:** 1-1000000 **src-threshold-num** **Description** Indicator per-src threshold **Type:** number **Range:** 0-2147483647 **src-threshold-str** **Description** Indicator per-src threshold **Type:** string **Maximum Length:** 128 characters **Maximum Length:** 1 characters **src-violation-actions** **Description** Violation actions to use when this src indicator threshold reaches **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/ddos/violation-actions ` **tcp-window-size** **Description** Expected minimal window size **Type:** number **Range:** 0-2147483647 **type** **Description** 'pkt-rate': rate of incoming packets; 'pkt-drop-rate': rate of packets got dropped; 'pkt-drop-ratio': ratio of incoming packet rate divided by the rate of dropping packets; 'bytes-to-bytes-from-ratio': ratio of incoming packet rate divided by the rate of outgoing packets; 'concurrent-conns': number of concurrent connections; 'conn-miss-rate': rate of incoming packets for which no previously established connection exists; 'syn-rate': rate on incoming SYN packets; 'fin-rate': rate on incoming FIN packets; 'rst-rate': rate of incoming RST packets; 'small-window-ack-rate': rate of small window advertisement; 'empty-ack-rate': rate of incoming packets which have no payload; 'small-payload-rate': rate of short payload packet; 'syn-fin-ratio': ratio of incoming SYN packet rate divided by the rate of incoming FIN packets; 'cpu-utilization': average data CPU utilization; 'interface-utilization': outside interface utilization; **Type:** string **Supported Values:** pkt-rate, pkt-drop-rate, pkt-drop-ratio, bytes-to-bytes-from-ratio, concurrent-conns, conn-miss-rate, syn-rate, fin-rate, rst-rate, small-window-ack-rate, empty-ack-rate, small-payload-rate, syn-fin-ratio, cpu-utilization, interface-utilization **user-tag** **Description** Customized tag **Type:** string **Format:** string-rlx **Maximum Length:** 127 characters **Maximum Length:** 1 characters **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters **zone-threshold-num** **Description** Threshold for the entire zone **Type:** number **Range:** 0-2147483647 **zone-threshold-str** **Description** Threshold for the entire zone **Type:** string **Maximum Length:** 128 characters **Maximum Length:** 1 characters **zone-violation-actions** **Description** Violation actions to use when this zone indicator threshold reaches **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/ddos/violation-actions ` .. _1159_manual-mode-list: manual-mode-list ^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *list* **Block object keys** =============================== =================================================== **config** **Description** 'configuration': Manual-mode configuration; **Type:** string **Supported Values:** configuration **glid-action** **Description** 'drop': Drop packets for glid exceed (Default); 'blacklist-src': Blacklist-src for glid exceed; 'ignore': Do nothing for glid exceed; **Type:** string **Supported Values:** drop, blacklist-src, ignore **src-default-glid** **Description** Global limit ID **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/glid ` **user-tag** **Description** Customized tag **Type:** string **Format:** string-rlx **Maximum Length:** 127 characters **Maximum Length:** 1 characters **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters **zone-template** **Description:** zone-template is a **JSON Block**. Please see below for :ref:`1159_manual-mode-list_zone-template` **Type:** Object .. _1159_manual-mode-list_zone-template: manual-mode-list_zone-template ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **dns** **Description** DDOS dns template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **encap** **Description** DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.) **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **http** **Description** DDOS http template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **quic** **Description** DDOS quic template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **sip** **Description** DDOS sip template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **ssl-l4** **Description** DDOS ssl-l4 template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **tcp** **Description** DDOS tcp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **udp** **Description** DDOS udp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters .. _1159_src-based-policy-list: src-based-policy-list ^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *list* **Block object keys** =============================== =================================================== **policy-class-list-list** **Type:** List **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/src-based-policy/{src-based-policy-name}/policy-class-list/{class-list-name} ` **src-based-policy-name** **Description** Specify name of the policy **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **user-tag** **Description** Customized tag **Type:** string **Format:** string-rlx **Maximum Length:** 127 characters **Maximum Length:** 1 characters **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters .. _1159_src-based-policy-list_policy-class-list-list: src-based-policy-list_policy-class-list-list ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *list* **Block object keys** =============================== =================================================== **action** **Description** 'bypass': Always permit for the Source to bypass all feature & limit checks; 'deny': Blacklist incoming packets for service; **Type:** string **Supported Values:** bypass, deny **class-list-name** **Description** Class-list name **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **class-list-overflow-policy-list** **Type:** List **Refernce Object:** :doc:`/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/src-based-policy/{src-based-policy-name}/policy-class-list/{class-list-name}/class-list-overflow-policy/{dummy-name} ` **glid** **Description** Global limit ID **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/glid ` **glid-action** **Description** 'drop': Drop packets for glid exceed (Default); 'blacklist-src': Blacklist-src for glid exceed; 'ignore': Do nothing for glid exceed; **Type:** string **Supported Values:** drop, blacklist-src, ignore **log-enable** **Description** Enable logging **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **log-periodic** **Description** Enable log periodic **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **max-dynamic-entry-count** **Description** Maximum count for dynamic source zone service entry allowed for this class-list **Type:** number **Range:** 0-2147483647 **user-tag** **Description** Customized tag **Type:** string **Format:** string-rlx **Maximum Length:** 127 characters **Maximum Length:** 1 characters **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters **zone-template** **Description:** zone-template is a **JSON Block**. Please see below for :ref:`1159_src-based-policy-list_policy-class-list-list_zone-template` **Type:** Object .. _1159_src-based-policy-list_policy-class-list-list_zone-template: src-based-policy-list_policy-class-list-list_zone-template ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **dns** **Description** DDOS dns template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **encap** **Description** DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.) **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **http** **Description** DDOS http template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **ips** **Description** IPS template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **logging** **Description** DDOS logging template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **quic** **Description** DDOS quic template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **sip** **Description** DDOS sip template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **ssl-l4** **Description** DDOS ssl-l4 template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **tcp** **Description** DDOS tcp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **udp** **Description** DDOS udp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters .. _1159_src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list: src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *list* **Block object keys** =============================== =================================================== **action** **Description** 'bypass': Always permit for the Source to bypass all feature & limit checks; 'deny': Blacklist incoming packets for service; **Type:** string **Supported Values:** bypass, deny **dummy-name** **Description** 'configuration': Configure overflow policy for class-list; **Type:** string **Supported Values:** configuration **glid** **Description** Global limit ID **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/glid ` **log-enable** **Description** Enable logging **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **log-periodic** **Description** Enable log periodic **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **user-tag** **Description** Customized tag **Type:** string **Format:** string-rlx **Maximum Length:** 127 characters **Maximum Length:** 1 characters **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters **zone-template** **Description:** zone-template is a **JSON Block**. Please see below for :ref:`1159_src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list_zone-template` **Type:** Object .. _1159_src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list_zone-template: src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list_zone-template ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **dns** **Description** DDOS dns template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **encap** **Description** DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.) **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **http** **Description** DDOS http template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **logging** **Description** DDOS logging template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **quic** **Description** DDOS quic template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **sip** **Description** DDOS sip template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **ssl-l4** **Description** DDOS ssl-l4 template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **tcp** **Description** DDOS tcp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **udp** **Description** DDOS udp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters .. _1159_port-ind: port-ind ^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters .. _1159_sflow-tcp: sflow-tcp ^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **sflow-tcp-basic** **Description** Enable sFlow basic TCP counter polling **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **Mutual Exclusion:** sflow-tcp-basic and sflow-common are mutually exclusive **sflow-tcp-stateful** **Description** Enable sFlow stateful TCP counter polling **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **Mutual Exclusion:** sflow-tcp-stateful and sflow-common are mutually exclusive .. _1159_topk-sources: topk-sources ^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters .. _1159_dynamic-entry-overflow-policy-list: dynamic-entry-overflow-policy-list ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *list* **Block object keys** =============================== =================================================== **action** **Description** 'bypass': Always permit for the Source to bypass all feature & limit checks; 'deny': Blacklist incoming packets for service; **Type:** string **Supported Values:** bypass, deny **dummy-name** **Description** 'configuration': Configure overflow policy; **Type:** string **Supported Values:** configuration **glid** **Description** Global limit ID **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **Refernce Object:** :doc:`/axapi/v3/glid ` **log-enable** **Description** Enable logging **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **log-periodic** **Description** Enable log periodic **Type:** boolean **Supported Values:** true, false, 1, 0 **Default:** 0 **user-tag** **Description** Customized tag **Type:** string **Format:** string-rlx **Maximum Length:** 127 characters **Maximum Length:** 1 characters **uuid** **Description** uuid of the object **Type:** string **Maximum Length:** 64 characters **Maximum Length:** 1 characters **zone-template** **Description:** zone-template is a **JSON Block**. Please see below for :ref:`1159_dynamic-entry-overflow-policy-list_zone-template` **Type:** Object .. _1159_dynamic-entry-overflow-policy-list_zone-template: dynamic-entry-overflow-policy-list_zone-template ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **dns** **Description** DDOS dns template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **encap** **Description** DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.) **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **http** **Description** DDOS http template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **logging** **Description** DDOS logging template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **quic** **Description** DDOS quic template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **sip** **Description** DDOS sip template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **ssl-l4** **Description** DDOS ssl-l4 template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **tcp** **Description** DDOS tcp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters **udp** **Description** DDOS udp template **Type:** string **Format:** string-rlx **Maximum Length:** 63 characters **Maximum Length:** 1 characters .. _1159_capture-config: capture-config ^^^^^^^^^^^^^^ =============================== =================================================== **Specification** =============================== =================================================== **Type** *object* =============================== =================================================== **capture-config-mode** **Description** 'drop': Apply capture-config to dropped packets; 'forward': Apply capture-config to forwarded packets; 'all': Apply capture-config to both dropped and forwarded packets; **Type:** string **Supported Values:** drop, forward, all **capture-config-name** **Description** Capture-config name **Type:** string **Format:** string-rlx **Maximum Length:** 128 characters **Maximum Length:** 1 characters .. _1159_stats_dns-tcp-zone-port: stats dns-tcp-zone-port ----------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - src_ack_auth_fail - 8 - Src ACK Retry Dropped * - - src_ack_retry_init - 8 - Src ACK Retry Init * - - tcp_rexmit_syn_limit_drop - 8 - TCP SYN Retransmit Exceed Drop * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - src_rate_limit_type0 - 8 - Src Request Rate 1 Exceeded * - - fqdn_rate_by_label_count_check - 8 - FQDN Rate by Label Count Checked * - - query_type_srv - 8 - Query Type SRV * - - src_ack_retry_gap_drop - 8 - Src ACK Retry Retry-Gap Dropped * - - req_sent - 8 - DNS Requests Forwarded * - - src_create_conn_non_syn_dropped - 8 - Src Create Conn with non-SYN Packets Dropped * - - sess_aged - 8 - Sessions Aged Out * - - tcp_auth_resp - 8 - TCP Auth Responded * - - ack_retry_rto_fail - 8 - ACK Retry RTO Dropped * - - conn_close - 8 - Connections Closed * - - syn_auth_fail - 8 - SYN Auth Failed * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - syn_retry_init - 8 - SYN Retry Init * - - src_dns_fqdn_label_len_exceed - 8 - Src FQDN Label Length Exceeded * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - tcp_req_incomplete - 8 - TCP Request Incomplete * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - TCP SrcPort Wellknown * - - query_type_cname - 8 - Query Type CNAME * - - fqdn_stage_2_rate_exceed - 8 - FQDN Rate Exceeded * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - port_syn_rate_exceed - 8 - TCP SYN Rate Exceeded * - - src_ack_retry_reset - 8 - Src ACK Retry Timeout Reset * - - dg_rate_exceed - 8 - Domain Group Domain Query Rate Exceeded * - - non_query_opcode_pass_through - 8 - Non Query Opcode Pass Through * - - src_fqdn_label_count_exceed - 8 - Src FQDN Label Count Exceeded * - - dns_query_class_chaos - 8 - Query Class CHAOS * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - conn_rexmit_rate_excd - 8 - TCP Conn Retransmit Rate Exceeded * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - syn_retry_reset - 8 - SYN Retry Timeout Reset * - - out_of_seq_excd - 8 - Out-Of-Seq Exceeded * - - dg_action_default - 8 - Domain Group Action Default * - - port_src_escalation - 8 - Src Escalation * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - src_ack_retry_rto_progress - 8 - Src ACK Retry RTO Progress * - - fqdn_label_count_exceed - 8 - FQDN Label Count Exceeded * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - src_retransmit_excd - 8 - Src Retransmit Exceeded * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - tcp_rexmit_syn_limit_bl - 8 - TCP SYN Retransmit Exceed Blacklist * - - src_ack_retry_timeout - 8 - Src ACK Retry Timeout * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - conn_close_w_rst - 8 - RST Connections Closed * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - src_syn_auth_fail - 8 - Src SYN Auth Failed * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - filter5_match - 8 - Filter5 Match * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - port_bytes - 8 - Inbound Bytes Received * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - syn_retry_rto_pass - 8 - SYN Retry RTO Passed * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - syn_cookie_fail - 8 - SYN Cookie Failed * - - query_type_any - 8 - Query Type ANY * - - src_filter_none_match - 8 - Src Filter No Match * - - src_well_known_port - 8 - Src TCP SrcPort Wellknown * - - src_syn_retry_rto_fail - 8 - Src SYN Retry RTO Dropped * - - syn_retry_rto_progress - 8 - SYN Retry RTO Progress * - - src_conn_rexmit_rate_excd - 8 - Src TCP Conn Retransmit Rate Exceeded * - - syn_retry_pass - 8 - SYN Retry Passed * - - rst_cookie_fail - 8 - RST Cookie Failed * - - bl - 8 - Dst Blacklisted * - - dg_action_permit - 8 - Domain Group Action Permit * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - frag_rcvd - 8 - Fragmented Packets Received * - - src_syn_retry_init - 8 - Src SYN Retry Init * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - query_type_aaaa - 8 - Query Type AAAA * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - fqdn_label_len_exceed - 8 - FQDN Label Length Exceeded * - - filter1_match - 8 - Filter1 Match * - - synack_reset_sent - 8 - SYNACK Reset Sent * - - sess_create_inbound - 8 - Inbound Sessions Created * - - filter_auth_fail - 8 - Filter Auth Failed * - - conn_create_from_syn - 8 - Connections Created From SYN * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - rate_limit_type4 - 8 - Dst Request Rate 5 Exceeded * - - rate_limit_type3 - 8 - Dst Request Rate 4 Exceeded * - - rate_limit_type2 - 8 - Dst Request Rate 3 Exceeded * - - rate_limit_type1 - 8 - Dst Request Rate 2 Exceeded * - - rate_limit_type0 - 8 - Dst Request Rate 1 Exceeded * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - rrtype_drop - 8 - Record Type Dropped * - - req_retrans - 8 - Request Retransmit * - - ack_auth_fail - 8 - ACK Retry Dropped * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - src_drop - 8 - Src Packets Dropped * - - query_type_a - 8 - Query Type A * - - syn_retry_blacklist - 8 - SYN Retry Timeout Blacklisted * - - dg_action_deny - 8 - Domain Group Action Deny * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - query_type_mx - 8 - Query Type MX * - - syn_retry_gap_drop - 8 - SYN Retry-Gap Dropped * - - conn_create_from_ack - 8 - Connections Created From ACK * - - filter_none_match - 8 - Filter No Match * - - src_filter3_match - 8 - Src Filter3 Match * - - src_syn_retry_gap_drop - 8 - Src SYN Retry-Gap Dropped * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - syn_drop - 8 - SYN Dropped * - - src_filter1_match - 8 - Src Filter1 Match * - - src_syn_rate_exceed - 8 - Src TCP SYN Rate Exceeded * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - src_dns_malform - 8 - Src Malform Query * - - src_syn_retry_timeout - 8 - Src SYN Retry Timeout * - - req_size_exceed - 8 - Request Size Exceeded * - - query_type_soa - 8 - Query Type SOA * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - unauth_drop - 8 - TCP Unauth Dropped * - - dns_query_class_in - 8 - Query Class INTERNET * - - src_syn_cookie_sent - 8 - Src SYN Cookie Sent * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - ack_retry_timeout - 8 - ACK Retry Timeout * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - src_out_of_seq_excd - 8 - Src Out-Of-Seq Exceeded * - - syn_retry_timeout - 8 - SYN Retry Timeout * - - syn_tfo_rcv - 8 - SYN TFO Received * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - malform_drop - 8 - Malform Query Dropped * - - src_unauth_drop - 8 - Src TCP Unauth Dropped * - - filter_action_whitelist - 8 - Filter Action WL * - - src_conn_pkt_rate_excd - 8 - Src TCP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - frag_timeout - 8 - Fragmented Packets Timeout * - - dg_request_check_fail - 8 - Domain Group Request Check Fail * - - src_filter5_match - 8 - Src Filter5 Match * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - sess_create_outbound - 8 - Outbound Sessions Created * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - conn_close_w_fin - 8 - FIN Connections Closed * - - src_syn_retry_blacklist - 8 - Src SYN Retry Timeout Blacklisted * - - src_zero_window_excd - 8 - Src Zero-Window Exceeded * - - src_conn_zwindow_rate_excd - 8 - Src TCP Conn Zero-Window Rate Exceeded * - - sess_create - 8 - Session Create * - - nxdomain_rate_exceed - 8 - NXDOMAIN Response Rate Exceeded * - - ack_retry_blacklist - 8 - ACK Retry Timeout Blacklisted * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - dns_query_class_csnet - 8 - Query Class CSNET * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - syn_auth_pass - 8 - SYN Auth Passed * - - src_dns_malform_drop - 8 - Src Malform Query Dropped * - - query_type_opt - 8 - Query Type OPT * - - syn_retry_rto_fail - 8 - SYN Retry RTO Dropped * - - syn_cookie_sent - 8 - SYN Cookie Sent * - - retransmit_excd - 8 - Retransmit Exceeded * - - filter4_match - 8 - Filter4 Match * - - src_filter_action_whitelist - 8 - Src Filter Action WL * - - zero_window_excd - 8 - Zero-Window Exceeded * - - src_query_type_any_drop - 8 - Src Query Type ANY Dropped * - - conn_ofo_rate_excd - 8 - TCP Conn Out-Of-Seq Rate Exceeded * - - force_tcp_auth_pass - 8 - Auth Force-TCP Passed * - - filter2_match - 8 - Filter2 Match * - - src_ack_retry_blacklist - 8 - Src ACK Retry Timeout Blacklisted * - - frag_drop - 8 - Fragmented Packets Dropped * - - pattern_not_found - 8 - Pattern Recognition: Pattern Not Found * - - dns_query_class_hs - 8 - Query Class HESIOD * - - dns_query_class_none - 8 - Query Class NONE * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - ack_retry_pass - 8 - ACK Retry Passed * - - src_policy_drop - 8 - Src Policy Dropped * - - conn_close_w_idle - 8 - Idle Connections Closed * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - is_nxdomain - 8 - NXDOMAIN Response * - - dns_malform - 8 - Malform Query * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - src_rate_limit_type4 - 8 - Src Request Rate 5 Exceeded * - - src_rate_limit_type2 - 8 - Src Request Rate 3 Exceeded * - - src_rate_limit_type3 - 8 - Src Request Rate 4 Exceeded * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - src_rate_limit_type1 - 8 - Src Request Rate 2 Exceeded * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - query_type_any_drop - 8 - Query Type ANY Dropped * - - ack_retry_reset - 8 - ACK Retry Timeout Reset * - - tcp_auth_drop - 8 - TCP Auth Dropped * - - nxdomain_bl_drop - 8 - NXDOMAIN Response Blacklisted * - - src_syn_cookie_fail - 8 - Src SYN Cookie Failed * - - syn_retry_failed - 8 - SYN Retry Dropped * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - ack_retry_init - 8 - ACK Retry Init * - - src_filter4_match - 8 - Src Filter4 Match * - - policy_drop - 8 - Policy Dropped * - - query_type_ns - 8 - Query Type NS * - - ack_retry_gap_drop - 8 - ACK Retry Retry-Gap Dropped * - - nxdomain_drop - 8 - NXDOMAIN Response Dropped * - - create_conn_non_syn_dropped - 8 - Create Conn with non-SYN Packets Dropped * - - current_es_level - 8 - Current Escalation Level * - - src_syn_retry_failed - 8 - Src SYN Retry Dropped * - - filter_action_drop - 8 - Filter Action Drop * - - src_ack_retry_rto_fail - 8 - Src ACK Retry RTO Dropped * - - conn_zwindow_rate_excd - 8 - TCP Conn Zero-Window Rate Exceeded * - - src_conn_ofo_rate_excd - 8 - Src TCP Conn Out-Of-Seq Rate Exceeded * - - dns_query_class_whitelist_miss - 8 - Query Class Whitelist Miss * - - ack_retry_rto_progress - 8 - ACK Retry RTO Progress * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - port_drop - 8 - Inbound Packets Dropped * - - ack_retry_rto_pass - 8 - ACK Retry RTO Passed * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - dns_query_class_any - 8 - Query Class ANY * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - src_syn_retry_rto_pass - 8 - Src SYN Retry RTO Passed * - - src_syn_retry_reset - 8 - Src SYN Retry Timeout Reset * - - port_rcvd - 8 - Inbound Packets Received * - - conn_close_half_open - 8 - Half Open Connections Closed * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - synack_multiple_attempts_per_ip_detected - 8 - SYNACK Multiple Attempts Per IP Detected * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - src_syn_retry_rto_progress - 8 - Src SYN Retry RTO Progress * - - src_ack_retry_rto_pass - 8 - Src ACK Retry RTO Passed * - - conn_prate_excd - 8 - TCP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - src_rst_cookie_fail - 8 - Src RST Cookie Failed * - - src_auth_drop - 8 - Src TCP Auth Dropped * - - src_filter_action_drop - 8 - Src Filter Action Drop * - - fqdn_rate_by_label_count_exceed - 8 - FQDN Rate by Label Count Exceeded .. _1159_stats_dns-udp-zone-port: stats dns-udp-zone-port ----------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - nxdomain_rate_exceed - 8 - NXDOMAIN Response Rate Exceeded * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - fqdn_rate_by_label_count_check - 8 - FQDN Rate by Label Count Checked * - - query_type_srv - 8 - Query Type SRV * - - req_sent - 8 - DNS Requests Forwarded * - - spoof_detect_fail - 8 - UDP Retry Timeout * - - sess_aged - 8 - Sessions Aged Out * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - force_tcp_auth_timeout - 8 - Auth Force-TCP With UDP Timeout * - - udp_auth_pass - 8 - Auth UDP Passed * - - src_dns_fqdn_label_len_exceed - 8 - Src FQDN Label Length Exceeded * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - UDP SrcPort Wellknown * - - query_type_cname - 8 - Query Type CNAME * - - fqdn_stage_2_rate_exceed - 8 - FQDN Rate Exceeded * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - src_udp_retry_init - 8 - Src UDP Retry Init * - - src_payload_too_small - 8 - Src UDP Payload Too Small * - - non_query_opcode_pass_through - 8 - Non Query Opcode Pass Through * - - src_fqdn_label_count_exceed - 8 - Src FQDN Label Count Exceeded * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - src_udp_retry_pass - 8 - Src UDP Retry Passed * - - udp_retry_init - 8 - UDP Retry Init * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - dg_action_default - 8 - Domain Group Action Default * - - port_src_escalation - 8 - Src Escalation * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - port_bytes - 8 - Inbound Bytes Received * - - fqdn_label_count_exceed - 8 - FQDN Label Count Exceeded * - - dns_auth_drop - 8 - DNS Auth Dropped * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - src_filter5_match - 8 - Src Filter5 Match * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - filter5_match - 8 - Filter5 Match * - - src_udp_auth_fail - 8 - Src Auth UDP Failed * - - src_udp_retry_gap_drop - 8 - Src UDP Retry-Gap Dropped * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - query_type_any - 8 - Query Type ANY * - - src_filter_none_match - 8 - Src Filter No Match * - - zone_src_udp_retry_timeout_blacklist - 8 - Src UDP Retry Timeout Blacklisted * - - filter4_match - 8 - Filter4 Match * - - bl - 8 - Dst Blacklisted * - - dg_action_permit - 8 - Domain Group Action Permit * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - payload_too_small - 8 - UDP Payload Too Small * - - frag_rcvd - 8 - Fragmented Packets Received * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - query_type_aaaa - 8 - Query Type AAAA * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - fqdn_label_len_exceed - 8 - FQDN Label Length Exceeded * - - filter1_match - 8 - Filter1 Match * - - ntp_monlist_resp - 8 - NTP Monlist Response * - - sess_create_inbound - 8 - Inbound Sessions Created * - - filter_auth_fail - 8 - Filter Auth Failed * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - dns_auth_resp - 8 - DNS Auth Responded * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - rate_limit_type4 - 8 - Dst Request Rate 5 Exceeded * - - rate_limit_type3 - 8 - Dst Request Rate 4 Exceeded * - - rate_limit_type2 - 8 - Dst Request Rate 3 Exceeded * - - rate_limit_type1 - 8 - Dst Request Rate 2 Exceeded * - - rate_limit_type0 - 8 - Dst Request Rate 1 Exceeded * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - dst_udp_retry_timeout_blacklist - 8 - UDP Retry Timeout Blacklisted * - - rrtype_drop - 8 - Record Type Dropped * - - req_retrans - 8 - Request Retransmit * - - udp_auth_retry_gap_drop - 8 - Auth UDP Retry-Gap Dropped * - - src_udp_auth_drop - 8 - Src UDP Auth Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - src_drop - 8 - Src Packets Dropped * - - query_type_a - 8 - Query Type A * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - dg_action_deny - 8 - Domain Group Action Deny * - - udp_auth_retry_fail - 8 - Auth UDP Retry Failed * - - query_type_mx - 8 - Query Type MX * - - port_drop - 8 - Inbound Packets Dropped * - - filter_none_match - 8 - Filter No Match * - - src_filter3_match - 8 - Src Filter3 Match * - - ntp_monlist_req - 8 - NTP Monlist Request * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - payload_too_big - 8 - UDP Payload Too Large * - - src_filter1_match - 8 - Src Filter1 Match * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - src_dns_malform - 8 - Src Malform Query * - - req_size_exceed - 8 - Request Size Exceeded * - - query_type_soa - 8 - Query Type SOA * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - dns_query_class_in - 8 - Query Class INTERNET * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - udp_retry_pass - 8 - UDP Retry Passed * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - udp_retry_gap_drop - 8 - UDP Retry-Gap Dropped * - - malform_drop - 8 - Malform Query Dropped * - - filter_action_whitelist - 8 - Filter Action Whitelist * - - src_conn_pkt_rate_excd - 8 - Src UDP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - frag_timeout - 8 - Fragmented Packets Timeout * - - dg_request_check_fail - 8 - Domain Group Request Check Fail * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - sess_create_outbound - 8 - Outbound Sessions Created * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - sess_create - 8 - Session Create * - - src_well_known_port - 8 - Src UDP SrcPort Wellknown * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - dns_query_class_csnet - 8 - Query Class CSNET * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - src_dns_malform_drop - 8 - Src Malform Query Dropped * - - query_type_opt - 8 - Query Type OPT * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - src_filter_action_whitelist - 8 - Src Filter Action Whitelist * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - src_query_type_any_drop - 8 - Src Query Type ANY Dropped * - - src_payload_too_big - 8 - Src UDP Payload Too Large * - - filter2_match - 8 - Filter2 Match * - - frag_drop - 8 - Fragmented Packets Dropped * - - pattern_not_found - 8 - Pattern Recognition: Pattern Not Found * - - dns_query_class_hs - 8 - Query Class HESIOD * - - dns_query_class_none - 8 - Query Class NONE * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - src_ntp_monlist_resp - 8 - Src NTP Monlist Response * - - src_rate_limit_type0 - 8 - Src Request Rate 1 Exceeded * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_rate_limit_type1 - 8 - Src Request Rate 2 Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - is_nxdomain - 8 - NXDOMAIN Response * - - dns_malform - 8 - Malform Query * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - src_rate_limit_type4 - 8 - Src Request Rate 5 Exceeded * - - src_rate_limit_type2 - 8 - Src Request Rate 3 Exceeded * - - src_rate_limit_type3 - 8 - Src Request Rate 4 Exceeded * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - udp_auth_drop - 8 - UDP Auth Dropped * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - query_type_any_drop - 8 - Query Type ANY Dropped * - - src_ntp_monlist_req - 8 - Src NTP Monlist Request * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - nxdomain_bl_drop - 8 - NXDOMAIN Response Blacklisted * - - udp_auth_init - 8 - Auth UDP Init * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - src_filter4_match - 8 - Src Filter4 Match * - - dns_query_class_chaos - 8 - Query Class CHAOS * - - query_type_ns - 8 - Query Type NS * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - nxdomain_drop - 8 - NXDOMAIN Response Dropped * - - current_es_level - 8 - Current Escalation Level * - - filter_action_drop - 8 - Filter Action Drop * - - src_dns_auth_drop - 8 - Src DNS Auth Dropped * - - dns_query_class_whitelist_miss - 8 - Query Class Whitelist Miss * - - src_udp_auth_init - 8 - Src Auth UDP Init * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - dns_query_class_any - 8 - Query Class ANY * - - dg_rate_exceed - 8 - Domain Group Domain Query Rate Exceeded * - - port_rcvd - 8 - Inbound Packets Received * - - src_force_tcp_auth - 8 - Src Auth Force-TCP * - - force_tcp_auth - 8 - Auth Force-TCP * - - conn_prate_excd - 8 - UDP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - src_udp_auth_timeout - 8 - Src UDP Retry Timeout * - - udp_auth_fail - 8 - Auth UDP Failed * - - src_filter_action_drop - 8 - Src Filter Action Drop * - - fqdn_rate_by_label_count_exceed - 8 - FQDN Rate by Label Count Exceeded .. _1159_stats_http-zone-port: stats http-zone-port -------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - req_sz_32k - 8 - Request Payload Size Less Than or Equal to 32K * - - syn_retry_rto_progress - 8 - SYN Retry RTO Progress * - - src_ack_retry_init - 8 - Src ACK Retry Init * - - fail_alloc_hdr - 8 - Alloc Header Failed * - - src_challenge_js_fail - 8 - Src Challenge Javascript Failed * - - req_get - 8 - Request Method GET * - - tcp_rexmit_syn_limit_drop - 8 - TCP SYN Retransmit Exceed Drop * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - negative_resp_remain - 8 - Negative Response Remain * - - resp_code_4xx - 8 - HTTP Status Code 4XX * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - src_syn_rate_exceed - 8 - Src TCP SYN Rate Exceeded * - - chunk_sz_2k - 8 - Payload Chunk Size Less Than or Equal to 2K * - - user_agent_filter_blacklist - 8 - Agent Filter Blacklisted * - - invalid_hdr_val - 8 - HTTP Header Value Invalid * - - src_header_filter1_match - 8 - Src Header Filter1 Match * - - pkts_retrans_rst - 8 - TCP Retransmit RST * - - req_put - 8 - Request Method PUT * - - src_create_conn_non_syn_dropped - 8 - Src Create Conn with non-SYN Packets Dropped * - - filter2_drop - 8 - Filter2 Match Dropped * - - req_sz_gt_256k - 8 - Request Payload Size Larger Than 256K * - - sess_aged - 8 - Sessions Aged Out * - - tcp_auth_resp - 8 - TCP Auth Responded * - - parsereq_fail - 8 - Parse Request Failed * - - tcp_filter_action_blacklist - 8 - Filter Action Blacklist * - - src_js_challenge_sent - 8 - Src Challenge Javascript Sent * - - resp_code_5xx - 8 - HTTP Status Code 5XX * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - filter10_drop - 8 - Filter10 Match Dropped * - - src_header_filter3_drop - 8 - Src Header Filter3 Match Dropped * - - src_header_filter_not_match - 8 - Src Header Filter Not Matched on Pkt * - - parse_req_line_too_small - 8 - Malform Request Line Too Small * - - req_sz_2k - 8 - Request Payload Size Less Than or Equal to 2K * - - syn_retry_init - 8 - SYN Retry Init * - - filter10_match - 8 - Filter10 Match * - - parse_bad_chunk - 8 - Malform Bad Chunk * - - window_small_drop - 8 - Window Size Small Dropped * - - er_condition - 8 - Error Condition * - - tcp_filter5_match - 8 - Filter5 Match * - - req_post - 8 - Request Method POST * - - src_ack_auth_fail - 8 - Src ACK Retry Dropped * - - rsp_chunk - 8 - Response Chunk * - - filter9_drop - 8 - Filter9 Match Dropped * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - filter3_drop - 8 - Filter3 Match Dropped * - - port_syn_rate_exceed - 8 - TCP SYN Rate Exceeded * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - req_ofo - 8 - Out-Of-Order Request * - - src_ack_retry_gap_drop - 8 - Src ACK Retry Retry-Gap Dropped * - - chunk_sz_1k - 8 - Payload Chunk Size Less Than or Equal to 1K * - - pkts_retrans_push - 8 - TCP Retransmit PSH * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - window_small - 8 - Window Size Small * - - conn_rexmit_rate_excd - 8 - TCP Conn Retransmit Rate Exceeded * - - src_header_filter_action_drop - 8 - Src Header Filter Action Drop * - - src_header_filter3_match - 8 - Src Header Filter3 Match * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - syn_retry_reset - 8 - SYN Retry Timeout Reset * - - resp_code_other - 8 - HTTP Status Code OTHER * - - syn_cookie_sent - 8 - SYN Cookie Sent * - - fail_alloc - 8 - Alloc Failed * - - user_agent_filter_match - 8 - Agent Filter Match * - - src_header_filter8_drop - 8 - Src Header Filter8 Match Dropped * - - port_bytes - 8 - Inbound Bytes Received * - - src_ack_retry_rto_progress - 8 - Src ACK Retry RTO Progress * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - processed - 8 - Packets Processed * - - parse_header_name_too_long - 8 - Malform Header Name Too Long * - - src_retransmit_excd - 8 - Src Retransmit Exceeded * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - src_header_filter10_match - 8 - Src Header Filter10 Match * - - tcp_filter_none_match - 8 - Filter No Match * - - out_of_seq_excd - 8 - Out-Of-Seq Exceeded * - - src_filter1_match - 8 - Src Filter1 Match * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - filter1_drop - 8 - Filter1 Match Dropped * - - conn_close_w_rst - 8 - RST Connections Closed * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - src_syn_auth_fail - 8 - Src SYN Auth Failed * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - port_src_escalation - 8 - Src Escalation * - - header_processing_time_0 - 8 - Header Process Time Less Than 1s * - - client_rst - 8 - Client TCP RST Received * - - header_processing_time_2 - 8 - Header Process Time Less Than 30S * - - header_processing_time_3 - 8 - Header Process Time Larger or Equal to 30s * - - chunk_sz_512 - 8 - Payload Chunk Size Less Than or Equal to 512 * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - src_header_filter_action_whitelist - 8 - Src Header Filter Action Whitelist * - - parse_line_too_long - 8 - Malform Line Too Long * - - src_header_filter_none_match - 8 - Src Header Filter No Match * - - tcp_auth_drop - 8 - TCP Auth Dropped * - - chunk_sz_4k - 8 - Payload Chunk Size Less Than or Equal to 4K * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - req_sz_4k - 8 - Request Payload Size Less Than or Equal to 4K * - - req_sz_256k - 8 - Request Payload Size Less Than or Equal to 256K * - - src_filter_none_match - 8 - Src Filter No Match * - - src_well_known_port - 8 - Src TCP SrcPort Wellknown * - - chunk_sz_gt_4k - 8 - Payload Chunk Size Larger Than 4K * - - conn_ofo_rate_excd - 8 - TCP Conn Out-Of-Seq Rate Exceeded * - - invalid_hdr_name - 8 - HTTP Header Name Invalid * - - req_trace - 8 - Request Method TRACE * - - req - 8 - Request Total * - - src_conn_rexmit_rate_excd - 8 - Src TCP Conn Retransmit Rate Exceeded * - - filter4_match - 8 - Filter4 Match * - - rst_cookie_fail - 8 - RST Cookie Failed * - - challenge_failed - 8 - Challenge Failed * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - current_es_level - 8 - Current Escalation Level * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - tcp_filter_action_whitelist - 8 - Filter Action WL * - - src_req_rate_exceed - 8 - Src Request Rate Exceeded * - - frag_rcvd - 8 - Fragmented Packets Received * - - src_header_filter7_drop - 8 - Src Header Filter7 Match Dropped * - - src_header_filter4_drop - 8 - Src Header Filter4 Match Dropped * - - src_syn_retry_init - 8 - Src SYN Retry Init * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - filter6_match - 8 - Filter6 Match * - - syn_retry_rto_pass - 8 - SYN Retry RTO Passed * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - src_header_filter8_match - 8 - Src Header Filter8 Match * - - bl - 8 - Dst Blacklisted * - - sess_create_inbound - 8 - Inbound Sessions Created * - - synack_reset_sent - 8 - SYNACK Reset Sent * - - filter1_match - 8 - Filter1 Match * - - unauth_drop - 8 - TCP Unauth Dropped * - - filter_auth_fail - 8 - Filter Auth Failed * - - conn_create_from_syn - 8 - Connections Created From SYN * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - src_ack_retry_blacklist - 8 - Src ACK Retry Timeout Blacklisted * - - src_header_filter9_match - 8 - Src Header Filter9 Match * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - ack_retry_pass - 8 - ACK Retry Passed * - - src_post_rate_exceed - 8 - Src Post Rate Exceeded * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - src_challenge_ud_fail - 8 - Src Challenge URL Redirect Failed * - - dst_resp_rate_exceed - 8 - Dst Response Rate Exceeded * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - filter7_drop - 8 - Filter7 Match Dropped * - - filter_not_match - 8 - Filter Not Matched on Pkt * - - pkts_ofo - 8 - Out-Of-Order Packets * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - tcp_filter_action_drop - 8 - Filter Action Drop * - - ud_challenge_failed - 8 - Challenge URL Redirect Failed * - - tcp_rexmit_syn_limit_bl - 8 - TCP SYN Retransmit Exceed Blacklist * - - ack_auth_fail - 8 - ACK Retry Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - src_header_filter_action_default_pass - 8 - Src Header Filter Action Default Pass * - - src_drop - 8 - Src Packets Dropped * - - resp_code_1xx - 8 - HTTP Status Code 1XX * - - syn_retry_blacklist - 8 - SYN Retry Timeout Blacklisted * - - parse_req_line_invalid_method - 8 - Malform Request Line Invalid Method * - - filter9_match - 8 - Filter9 Match * - - src_ack_retry_timeout - 8 - Src ACK Retry Timeout * - - filter4_drop - 8 - Filter4 Match Dropped * - - conn_close - 8 - Connections Closed * - - src_conn_ofo_rate_excd - 8 - Src TCP Conn Out-Of-Seq Rate Exceeded * - - js_challenge_sent - 8 - Challenge Javascript Sent * - - port_drop - 8 - Inbound Packets Dropped * - - resp_mib_chunk_bad - 8 - Bad HTTP Response Chunk * - - filter_match - 8 - Filter Total Match * - - conn_create_from_ack - 8 - Connections Created From ACK * - - filter_none_match - 8 - Filter No Match * - - src_filter3_match - 8 - Src Filter3 Match * - - syn_auth_fail - 8 - SYN Auth Failed * - - pkts_retrans_fin - 8 - TCP Retransmit FIN * - - syn_retry_timeout - 8 - SYN Retry Timeout * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - syn_drop - 8 - SYN Dropped * - - too_many_headers - 8 - HTTP Header Too Many * - - filter6_drop - 8 - Filter6 Match Dropped * - - content_length_too_long - 8 - Malform Content Length Too Long * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - ack_retry_rto_progress - 8 - ACK Retry RTO Progress * - - ofo_queue_sz_exceed - 8 - Out-Of-Order Queue Exceeded * - - src_syn_retry_timeout - 8 - Src SYN Retry Timeout * - - ack_retry_rto_fail - 8 - ACK Retry RTO Dropped * - - ofo_timer_expired - 8 - Out-Of-Order Timeout * - - req_content_len - 8 - Request Content Length Received * - - filter8_match - 8 - Filter8 Match * - - new_syn - 8 - TCP SYN * - - src_syn_cookie_sent - 8 - Src SYN Cookie Sent * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - header_processing_incomplete - 8 - Header Process Incomplete * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - ack_retry_timeout - 8 - ACK Retry Timeout * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - src_out_of_seq_excd - 8 - Src Out-Of-Seq Exceeded * - - parse_too_many_headers - 8 - Malform Too Many Headers * - - syn_tfo_rcv - 8 - SYN TFO Received * - - src_header_filter10_drop - 8 - Src Header Filter10 Match Dropped * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - referer_filter_match - 8 - Referer Filter Match * - - dst_req_rate_exceed - 8 - Dst Request Rate Exceeded * - - http_auth_drop - 8 - HTTP Auth Dropped * - - policy_violation - 8 - Policy Violation * - - src_unauth_drop - 8 - Src TCP Unauth Dropped * - - filter_action_whitelist - 8 - Filter Action Whitelist * - - src_conn_pkt_rate_excd - 8 - Src TCP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - frag_timeout - 8 - Fragmented Packets Timeout * - - dst_post_rate_exceed - 8 - Dst Post Rate Exceeded * - - tcp_filter2_match - 8 - Filter2 Match * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - src_syn_retry_gap_drop - 8 - Src SYN Retry-Gap Dropped * - - sess_create_outbound - 8 - Outbound Sessions Created * - - slow_post - 8 - Slow Post * - - src_header_filter6_match - 8 - Src Header Filter6 Match * - - negative_req_remain - 8 - Negative Request Remain * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - conn_close_w_fin - 8 - FIN Connections Closed * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - src_syn_retry_blacklist - 8 - Src SYN Retry Timeout Blacklisted * - - src_zero_window_excd - 8 - Src Zero-Window Exceeded * - - src_conn_zwindow_rate_excd - 8 - Src TCP Conn Zero-Window Rate Exceeded * - - req_delete - 8 - Request Method DELETE * - - ack_retry_blacklist - 8 - ACK Retry Timeout Blacklisted * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - tcp_filter4_match - 8 - Filter4 Match * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - less_than_mss_exceed - 8 - Min Payload Size Fail Exceeded * - - filter5_drop - 8 - Filter5 Match Dropped * - - src_header_filter_action_blacklist - 8 - Src Header Filter Action Blacklist * - - src_header_filter7_match - 8 - Src Header Filter7 Match * - - filter5_match - 8 - Filter5 Match * - - syn_retry_rto_fail - 8 - SYN Retry RTO Dropped * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - header_processing_time_1 - 8 - Header Process Time Less Than 10s * - - req_unknown - 8 - Request Method UNKNOWN * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - retransmit_excd - 8 - Retransmit Exceeded * - - req_options - 8 - Request Method OPTIONS * - - src_filter_action_whitelist - 8 - Src Filter Action WL * - - zero_window_excd - 8 - Zero-Window Exceeded * - - src_ack_retry_reset - 8 - Src ACK Retry Timeout Reset * - - src_ud_challenge_sent - 8 - Src Challenge URL Redirect Sent * - - src_header_filter2_match - 8 - Src Header Filter2 Match * - - filter2_match - 8 - Filter2 Match * - - syn_auth_pass - 8 - SYN Auth Passed * - - frag_drop - 8 - Fragmented Packets Dropped * - - js_challenge_failed - 8 - Challenge Javascript Failed * - - pkts_connect_passthru - 8 - Connect Passthru packets * - - pattern_not_found - 8 - Pattern Recognitoin: Pattern Not Found * - - use_hdr_src_ip - 8 - Use IP In Header As Src * - - fail_get_line - 8 - Get Line Failed * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - ack_retry_gap_drop - 8 - ACK Retry Retry-Gap Dropped * - - filter3_match - 8 - Filter3 Match * - - req_sz_8k - 8 - Request Payload Size Less Than or Equal to 8K * - - src_policy_drop - 8 - Src Policy Dropped * - - conn_close_w_idle - 8 - Idle Connections Closed * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - sess_create - 8 - Session Create * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - src_header_filter_match - 8 - Src Header Filter Total Match * - - req_retran - 8 - Request Retransmit * - - filter7_match - 8 - Filter7 Match * - - ud_challenge_sent - 8 - Challenge URL Redirect Sent * - - src_header_filter2_drop - 8 - Src Header Filter2 Match Dropped * - - header_name_too_long - 8 - Header Name Too Long * - - chunk_bad - 8 - Bad Payload Chunk * - - tcp_filter_total_not_match - 8 - Filter Not Matched on Pkt * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - pkts_retrans - 8 - TCP Retransmit * - - ack_retry_reset - 8 - ACK Retry Timeout Reset * - - src_http_auth_drop - 8 - Src HTTP Auth Dropped * - - src_header_filter5_match - 8 - Src Header Filter5 Match * - - wellknown_sport_drop - 8 - TCP SrcPort Wellknown * - - src_syn_cookie_fail - 8 - Src SYN Cookie Failed * - - syn_retry_failed - 8 - SYN Retry Dropped * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - invalid_header - 8 - HTTP Header Invalid * - - ack_retry_init - 8 - ACK Retry Init * - - tcp_filter1_match - 8 - Filter1 Match * - - src_dos_policy_violation - 8 - Src Policy Violation * - - parse_req_line_too_long - 8 - Malform Request Line Too Long * - - src_filter4_match - 8 - Src Filter4 Match * - - req_http10 - 8 - Request HTTP 1.0 * - - req_http11 - 8 - Request HTTP 1.1 * - - req_connect - 8 - Request Method CONNECT * - - policy_drop - 8 - Policy Dropped * - - src_header_filter9_drop - 8 - Src Header Filter9 Match Dropped * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - tcp_filter_action_default_pass - 8 - Filter Action Default Pass * - - uri_filter_match - 8 - URI Filter Match * - - create_conn_non_syn_dropped - 8 - Create Conn with non-SYN Packets Dropped * - - syn_retry_pass - 8 - SYN Retry Passed * - - tcp_filter3_match - 8 - Filter3 Match * - - syn_cookie_fail - 8 - SYN Cookie Failed * - - req_head - 8 - Request Method HEAD * - - src_syn_retry_failed - 8 - Src SYN Retry Dropped * - - filter_action_drop - 8 - Filter Action Drop * - - src_ack_retry_rto_fail - 8 - Src ACK Retry RTO Dropped * - - conn_zwindow_rate_excd - 8 - TCP Conn Zero-Window Rate Exceeded * - - src_header_filter6_drop - 8 - Src Header Filter6 Match Dropped * - - req_sz_16k - 8 - Request Payload Size Less Than or Equal to 16K * - - idle_timeout - 8 - Idle Timeout * - - req_sz_64k - 8 - Request Payload Size Less Than or Equal to 64K * - - partial_header - 8 - Partial Header * - - referer_filter_blacklist - 8 - Referer Filter Blacklisted * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - src_header_filter4_match - 8 - Src Header Filter4 Match * - - syn_retry_gap_drop - 8 - SYN Retry-Gap Dropped * - - ack_retry_rto_pass - 8 - ACK Retry RTO Passed * - - src_header_filter5_drop - 8 - Src Header Filter5 Match Dropped * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - filter8_drop - 8 - Filter8 Match Dropped * - - src_header_filter1_drop - 8 - Src Header Filter1 Match Dropped * - - resp_code_2xx - 8 - HTTP Status Code 2XX * - - src_filter5_match - 8 - Src Filter5 Match * - - line_too_long - 8 - Line Too Long * - - src_syn_retry_rto_pass - 8 - Src SYN Retry RTO Passed * - - src_syn_retry_reset - 8 - Src SYN Retry Timeout Reset * - - port_rcvd - 8 - Inbound Packets Received * - - src_syn_retry_rto_fail - 8 - Src SYN Retry RTO Dropped * - - conn_close_half_open - 8 - Half Open Connections Closed * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - req_sz_1k - 8 - Request Payload Size Less Than or Equal to 1K * - - synack_multiple_attempts_per_ip_detected - 8 - SYNACK Multiple Attempts Per IP Detected * - - http_auth_resp - 8 - HTTP Auth Responded * - - src_syn_retry_rto_progress - 8 - Src SYN Retry RTO Progress * - - src_ack_retry_rto_pass - 8 - Src ACK Retry RTO Passed * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - conn_prate_excd - 8 - TCP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - src_rst_cookie_fail - 8 - Src RST Cookie Failed * - - src_auth_drop - 8 - Src TCP Auth Dropped * - - resp_code_3xx - 8 - HTTP Status Code 3XX * - - src_filter_action_drop - 8 - Src Filter Action Drop .. _1159_stats_l4-ssl-zone-port: stats l4-ssl-zone-port ---------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - filter_none_match - 8 - Filter No Match * - - src_well_known_port - 8 - Src TCP SrcPort Wellknown * - - src_ack_auth_fail - 8 - Src ACK Retry Dropped * - - src_conn_rexmit_rate_excd - 8 - Src TCP Conn Retransmit Rate Exceeded * - - tcp_rexmit_syn_limit_drop - 8 - TCP SYN Retransmit Exceed Drop * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - src_ack_retry_gap_drop - 8 - Src ACK Retry Retry-Gap Dropped * - - filter4_match - 8 - Filter4 Match * - - src_create_conn_non_syn_dropped - 8 - Src Create Conn with non-SYN Packets Dropped * - - src_filter_action_drop - 8 - Src Filter Action Drop * - - sess_aged - 8 - Sessions Aged Out * - - tcp_auth_resp - 8 - TCP Auth Responded * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - conn_close - 8 - Connections Closed * - - syn_auth_fail - 8 - SYN Auth Failed * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - syn_retry_init - 8 - SYN Retry Init * - - renegotiation_exceed - 8 - Renegotiation Exceeded * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - er_condition - 8 - Error Condition * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - TCP SrcPort Wellknown * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - port_syn_rate_exceed - 8 - TCP SYN Rate Exceeded * - - ssl_port_non_tls - 8 - SSL Non-TLS Dropped * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - conn_rexmit_rate_excd - 8 - TCP Conn Retransmit Rate Exceeded * - - ssl_port_bad_ver - 8 - SSL Header Bad Version * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - out_of_seq_excd - 8 - Out-Of-Seq Exceeded * - - conn_close_w_rst - 8 - RST Connections Closed * - - port_src_escalation - 8 - Src Escalation * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - src_ack_retry_rto_progress - 8 - Src ACK Retry RTO Progress * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - processed - 8 - Packets Processed * - - src_retransmit_excd - 8 - Src Retransmit Exceeded * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - tcp_rexmit_syn_limit_bl - 8 - TCP SYN Retransmit Exceed Blacklist * - - reset_while_other_in_handshake - 8 - Reset While Others in Handshake * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - drop_packet - 8 - Packets Dropped * - - src_filter5_match - 8 - Src Filter5 Match * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - filter5_match - 8 - Filter5 Match * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - tcp_auth_drop - 8 - TCP Auth Dropped * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - syn_cookie_fail - 8 - SYN Cookie Failed * - - src_syn_retry_rto_fail - 8 - Src SYN Retry RTO Dropped * - - syn_retry_rto_progress - 8 - SYN Retry RTO Progress * - - ssl_auth_drop - 8 - SSL Auth Dropped * - - syn_retry_pass - 8 - SYN Retry Passed * - - rst_cookie_fail - 8 - RST Cookie Failed * - - ack_retry_rto_fail - 8 - ACK Retry RTO Dropped * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - is_ssl3 - 8 - SSL v3 * - - src_req_rate_exceed - 8 - Src Request Rate Exceeded * - - frag_rcvd - 8 - Fragmented Packets Received * - - src_syn_retry_init - 8 - Src SYN Retry Init * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - syn_retry_rto_pass - 8 - SYN Retry RTO Passed * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - bl - 8 - Dst Blacklisted * - - filter1_match - 8 - Filter1 Match * - - port_bytes - 8 - Inbound Bytes Received * - - sess_create_inbound - 8 - Inbound Sessions Created * - - unauth_drop - 8 - TCP Unauth Dropped * - - filter_auth_fail - 8 - Filter Auth Failed * - - conn_create_from_syn - 8 - Connections Created From SYN * - - do_auth_handshake - 8 - Auth Handshake * - - auth_handshake_bl - 8 - Auth Handshake Blacklisted * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - src_zero_window_excd - 8 - Src Zero-Window Exceeded * - - ssl_bad_header_forw - 8 - SSL Traffic Check Bad Header Forwarded * - - ack_auth_fail - 8 - ACK Retry Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - src_drop - 8 - Src Packets Dropped * - - syn_retry_blacklist - 8 - SYN Retry Timeout Blacklisted * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - src_ack_retry_timeout - 8 - Src ACK Retry Timeout * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - src_conn_ofo_rate_excd - 8 - Src TCP Conn Out-Of-Seq Rate Exceeded * - - syn_retry_gap_drop - 8 - SYN Retry-Gap Dropped * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - conn_create_from_ack - 8 - Connections Created From ACK * - - auth_handshake_fail - 8 - Auth Handshake Fail * - - src_filter3_match - 8 - Src Filter3 Match * - - src_syn_retry_gap_drop - 8 - Src SYN Retry-Gap Dropped * - - syn_retry_timeout - 8 - SYN Retry Timeout * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - syn_drop - 8 - SYN Dropped * - - src_filter1_match - 8 - Src Filter1 Match * - - src_syn_rate_exceed - 8 - Src TCP SYN Rate Exceeded * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - src_syn_retry_timeout - 8 - Src SYN Retry Timeout * - - ssl_port_bad_len - 8 - SSL Header Bad Length * - - src_filter_none_match - 8 - Src Filter No Match * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - new_syn - 8 - TCP SYN * - - src_policy_reset - 8 - Src Policy Reset * - - src_syn_cookie_sent - 8 - Src SYN Cookie Sent * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - ack_retry_timeout - 8 - ACK Retry Timeout * - - auth_handshake_success - 8 - Auth Handshake Success * - - src_out_of_seq_excd - 8 - Src Out-Of-Seq Exceeded * - - ssl_auth_resp - 8 - SSL Auth Responded * - - syn_tfo_rcv - 8 - SYN TFO Received * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - dst_req_rate_exceed - 8 - Dst Request Rate Exceeded * - - src_ssl_auth_drop - 8 - Src SSL Auth Dropped * - - src_unauth_drop - 8 - Src TCP Unauth Dropped * - - filter_action_whitelist - 8 - Filter Action WL * - - src_conn_pkt_rate_excd - 8 - Src TCP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - frag_timeout - 8 - Fragmented Packets Timeout * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - sess_create_outbound - 8 - Outbound Sessions Created * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - conn_close_w_fin - 8 - FIN Connections Closed * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - src_syn_retry_blacklist - 8 - Src SYN Retry Timeout Blacklisted * - - auth_handshake_timeout - 8 - Auth Handshake Timeout * - - src_ack_retry_rto_pass - 8 - Src ACK Retry RTO Passed * - - src_conn_zwindow_rate_excd - 8 - Src TCP Conn Zero-Window Rate Exceeded * - - src_ack_retry_init - 8 - Src ACK Retry Init * - - ack_retry_blacklist - 8 - ACK Retry Timeout Blacklisted * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - ssl_bad_header_drop - 8 - SSL Traffic Check Bad Header Dropped * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - syn_auth_pass - 8 - SYN Auth Passed * - - syn_retry_rto_fail - 8 - SYN Retry RTO Dropped * - - syn_cookie_sent - 8 - SYN Cookie Sent * - - retransmit_excd - 8 - Retransmit Exceeded * - - src_syn_auth_fail - 8 - Src SYN Auth Failed * - - src_filter_action_whitelist - 8 - Src Filter Action WL * - - zero_window_excd - 8 - Zero-Window Exceeded * - - src_ack_retry_reset - 8 - Src ACK Retry Timeout Reset * - - conn_ofo_rate_excd - 8 - TCP Conn Out-Of-Seq Rate Exceeded * - - filter2_match - 8 - Filter2 Match * - - src_ack_retry_blacklist - 8 - Src ACK Retry Timeout Blacklisted * - - frag_drop - 8 - Fragmented Packets Dropped * - - pattern_not_found - 8 - Pattern Recognitoin: Pattern Not Found * - - syn_retry_reset - 8 - SYN Retry Timeout Reset * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - conn_close_w_idle - 8 - Idle Connections Closed * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - sess_create - 8 - Session Create * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - ack_retry_pass - 8 - ACK Retry Passed * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - ack_retry_reset - 8 - ACK Retry Timeout Reset * - - is_tls1_2 - 8 - TLS v1.2 * - - is_tls1_1 - 8 - TLS v1.1 * - - is_tls1_0 - 8 - TLS v1.0 * - - policy_reset - 8 - Policy Reset * - - syn_retry_failed - 8 - SYN Retry Dropped * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - ack_retry_init - 8 - ACK Retry Init * - - src_filter4_match - 8 - Src Filter4 Match * - - policy_drop - 8 - Policy Dropped * - - ack_retry_gap_drop - 8 - ACK Retry Retry-Gap Dropped * - - create_conn_non_syn_dropped - 8 - Create Conn with non-SYN Packets Dropped * - - ssl_port_invalid_type - 8 - SSL Header Invalid Type * - - current_es_level - 8 - Current Escalation Level * - - src_syn_retry_failed - 8 - Src SYN Retry Dropped * - - filter_action_drop - 8 - Filter Action Drop * - - src_ack_retry_rto_fail - 8 - Src ACK Retry RTO Dropped * - - conn_zwindow_rate_excd - 8 - TCP Conn Zero-Window Rate Exceeded * - - renegotiation_incomplete - 8 - Renegotiation Incomplete * - - ack_retry_rto_progress - 8 - ACK Retry RTO Progress * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - port_drop - 8 - Inbound Packets Dropped * - - ack_retry_rto_pass - 8 - ACK Retry RTO Passed * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - src_syn_cookie_fail - 8 - Src SYN Cookie Failed * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - src_syn_retry_rto_pass - 8 - Src SYN Retry RTO Passed * - - src_syn_retry_reset - 8 - Src SYN Retry Timeout Reset * - - port_rcvd - 8 - Inbound Packets Received * - - is_renegotiation - 8 - SSL Renegotiation * - - conn_close_half_open - 8 - Half Open Connections Closed * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - synack_multiple_attempts_per_ip_detected - 8 - SYNACK Multiple Attempts Per IP Detected * - - src_syn_retry_rto_progress - 8 - Src SYN Retry RTO Progress * - - conn_prate_excd - 8 - TCP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - synack_reset_sent - 8 - SYNACK Reset Sent * - - src_rst_cookie_fail - 8 - Src RST Cookie Failed * - - src_auth_drop - 8 - Src TCP Auth Dropped * - - src_drop_packet - 8 - Src Packets Dropped .. _1159_stats_quic-zone-port: stats quic-zone-port -------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - 0rtt - 8 - QUIC 0-RTT * - - frag_drop - 8 - Fragmented Packets Dropped * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - src_udp_retry_gap_drop - 8 - Src UDP Retry-Gap Dropped * - - filter4_match - 8 - Filter4 Match * - - spoof_detect_fail - 8 - UDP Retry Timeout * - - handshake - 8 - QUIC Handshake * - - sess_aged - 8 - Sessions Aged Out * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - UDP SrcPort Wellknown * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - invalid_packet_type - 8 - Invalid Packet Type * - - src_udp_retry_init - 8 - Src UDP Retry Init * - - src_payload_too_small - 8 - Src UDP Payload Too Small * - - version_match_action_taken - 8 - Version Match Action Taken * - - src_udp_retry_pass - 8 - Src UDP Retry Passed * - - udp_retry_init - 8 - UDP Retry Init * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - src_filter5_match - 8 - Src Filter5 Match * - - port_src_escalation - 8 - Src Escalation * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - port_bytes - 8 - Inbound Bytes Received * - - frag_rcvd - 8 - Fragmented Packets Received * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - processed - 8 - QUIC Headers Processed * - - fixed_bit_not_set - 8 - Fixed Bit Not Set * - - malformed_action_drop - 8 - Malformed Action Drop * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - malformed_scid_len_max_exceed - 8 - Malformed SCID Length Maximum Exceed * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - filter5_match - 8 - Filter5 Match * - - malformed_action_taken - 8 - Malformed Action Taken * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - retry - 8 - QUIC Retry * - - zone_src_udp_retry_timeout_blacklist - 8 - Src UDP Retry Timeout Blacklisted * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - payload_too_small - 8 - UDP Payload Too Small * - - version_negotiation - 8 - QUIC Version Negotiation * - - src_payload_too_big - 8 - Src UDP Payload Too Large * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - bl - 8 - Dst Blacklisted * - - filter1_match - 8 - Filter1 Match * - - ntp_monlist_resp - 8 - NTP Monlist Response * - - sess_create_inbound - 8 - Inbound Sessions Created * - - filter_auth_fail - 8 - Filter Auth Failed * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - src_filter1_match - 8 - Src Filter1 Match * - - udp_retry_pass - 8 - UDP Retry Passed * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - dst_udp_retry_timeout_blacklist - 8 - UDP Retry Timeout Blacklisted * - - src_udp_auth_drop - 8 - Src UDP Auth Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - src_drop - 8 - Src Packets Dropped * - - version_match_action_drop - 8 - Version Match Action Drop * - - initial_force_tcp - 8 - Initial Force-TCP * - - port_drop - 8 - Inbound Packets Dropped * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - filter_none_match - 8 - Filter No Match * - - src_filter3_match - 8 - Src Filter3 Match * - - ntp_monlist_req - 8 - NTP Monlist Request * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - payload_too_big - 8 - UDP Payload Too Large * - - malformed_dcid_len_max_exceed - 8 - Malformed DCID Length Maximum Exceed * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - src_filter_none_match - 8 - Src Filter No Match * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - initial - 8 - QUIC Initial * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - udp_retry_gap_drop - 8 - UDP Retry-Gap Dropped * - - filter_action_whitelist - 8 - Filter Action Whitelist * - - src_conn_pkt_rate_excd - 8 - Src UDP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - sess_create_outbound - 8 - Outbound Sessions Created * - - src_well_known_port - 8 - Src UDP SrcPort Wellknown * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - src_filter_action_whitelist - 8 - Src Filter Action Whitelist * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - filter2_match - 8 - Filter2 Match * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - malformed_action_blacklist - 8 - Malformed Action Blacklist * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - src_ntp_monlist_resp - 8 - Src NTP Monlist Response * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - sess_create - 8 - Session Create * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - udp_auth_drop - 8 - UDP Auth Dropped * - - src_ntp_monlist_req - 8 - Src NTP Monlist Request * - - version_match_action_blacklist - 8 - Version Match Action Blacklist * - - src_filter4_match - 8 - Src Filter4 Match * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - current_es_level - 8 - Current Escalation Level * - - filter_action_drop - 8 - Filter Action Drop * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - frag_timeout - 8 - Fragmented Packets Timeout * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - port_rcvd - 8 - Inbound Packets Received * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - conn_prate_excd - 8 - UDP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - packet_parse_failed - 8 - Packet Parse Failed * - - src_filter_action_drop - 8 - Src Filter Action Drop * - - src_udp_auth_timeout - 8 - Src UDP Retry Timeout .. _1159_stats_sip-tcp-zone-port: stats sip-tcp-zone-port ----------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - src_ack_auth_fail - 8 - Src ACK Retry Dropped * - - src_well_known_port - 8 - Src TCP SrcPort Wellknown * - - concatenate_msg - 8 - Concatenate Msg * - - tcp_rexmit_syn_limit_drop - 8 - TCP SYN Retransmit Exceeded Drop * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - invalid_header - 8 - Invalid Header * - - header_filter_filter2_match - 8 - Header Filter Filter2 Match * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - src_ack_retry_gap_drop - 8 - Src ACK Retry Retry-Gap Dropped * - - src_out_of_seq_excd - 8 - Src Out-Of-Seq Exceeded * - - response_2xx - 8 - Response 2xx * - - src_create_conn_non_syn_dropped - 8 - Src Create Conn with non-SYN Packets Dropped * - - sess_aged - 8 - Sessions Aged Out * - - src_unauth_drop - 8 - Src TCP Unauth Dropped * - - tcp_auth_resp - 8 - TCP Auth Responded * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - conn_close - 8 - Connections Closed * - - syn_auth_fail - 8 - SYN Auth Failed * - - max_header_value_len_exceed - 8 - Maximum Header Value Length Exceed * - - read_start_line_error - 8 - Read Start Line Error * - - malform_request - 8 - Malform Request * - - response_3xx - 8 - Response 3xx * - - line_mem_allocated - 8 - Line Memory Allocated * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - syn_drop - 8 - SYN Dropped * - - request_method_ack - 8 - Request Method ACK * - - src_rate3_limit_exceed - 8 - Src Rate3 Limit Exceed * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - TCP SrcPort Wellknown * - - src_ack_retry_rto_pass - 8 - Src ACK Retry RTO Passed * - - body_too_big - 8 - Body Too Big * - - port_syn_rate_exceed - 8 - TCP SYN Rate Exceeded * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - response_unknown_version - 8 - Response Unknown Version * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - request_method_subscribe - 8 - Request Method SUBSCRIBE * - - syn_retry_gap_drop - 8 - SYN Retry-Gap Dropped * - - response_6xx - 8 - Response 6xx * - - conn_rexmit_rate_excd - 8 - TCP Conn Retransmit Rate Exceeded * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - out_of_seq_excd - 8 - Out-Of-Seq Exceeded * - - syn_cookie_sent - 8 - SYN Cookie Sent * - - header_filter_filter3_match - 8 - Header Filter Filter3 Match * - - filter_none_match - 8 - Filter No Match * - - port_bytes - 8 - Inbound Bytes Received * - - src_ack_retry_rto_progress - 8 - Src ACK Retry RTO Progress * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - too_many_header - 8 - Too Many Header * - - src_retransmit_excd - 8 - Src Retransmit Exceeded * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - tcp_rexmit_syn_limit_bl - 8 - TCP SYN Retransmit Exceeded Blacklist * - - src_ack_retry_timeout - 8 - Src ACK Retry Timeout * - - header_filter_filter5_match - 8 - Header Filter Filter5 Match * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - conn_close_w_rst - 8 - RST Connections Closed * - - rate1_limit_exceed - 8 - Dst Rate1 Limit Exceed * - - request_method_refer - 8 - Request Method REFER * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - port_src_escalation - 8 - Src Escalation * - - filter5_match - 8 - Filter5 Match * - - client_rst - 8 - Client Rst * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - tcp_auth_drop - 8 - TCP Auth Dropped * - - header_filter_action_default_pass - 8 - Header Filter Action Default Pass * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - syn_retry_rto_pass - 8 - SYN Retry RTO Passed * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - syn_cookie_fail - 8 - SYN Cookie Failed * - - filter4_match - 8 - Filter4 Match * - - src_syn_retry_rto_fail - 8 - Src SYN Retry RTO Dropped * - - ack_retry_gap_drop - 8 - ACK Retry Retry-Gap Dropped * - - syn_retry_rto_progress - 8 - SYN Retry RTO Progress * - - src_conn_rexmit_rate_excd - 8 - Src TCP Conn Retransmit Rate Exceeded * - - line_mem_freed - 8 - Line Memory Freed * - - rst_cookie_fail - 8 - RST Cookie Failed * - - ack_retry_rto_fail - 8 - ACK Retry RTO Dropped * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - current_es_level - 8 - Current Escalation Level * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - frag_rcvd - 8 - Fragmented Packets Received * - - src_syn_retry_init - 8 - Src SYN Retry Init * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - ofo_queue_size_exceed - 8 - Out-Of-Order Queue Size Exceed * - - request_method_prack - 8 - Request Method PRACK * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - response_5xx - 8 - Response 5xx * - - bl - 8 - Dst Blacklisted * - - filter1_match - 8 - Filter1 Match * - - error_condition - 8 - Error Condition * - - sess_create_inbound - 8 - Inbound Sessions Created * - - header_filter_action_whitelist - 8 - Header Filter Action Whitelist * - - filter_auth_fail - 8 - Filter Auth Failed * - - header_filter_not_match - 8 - Header Filter Not Match * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - frag_timeout - 8 - Fragmented Packets Timeout * - - header_filter_filter1_match - 8 - Header Filter Filter1 Match * - - ofo_timeout - 8 - Out-of-Order Timeout * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - src_zero_window_excd - 8 - Src Zero-Window Exceeded * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - ack_auth_fail - 8 - ACK Retry Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - parse_header_fail_error - 8 - Parse Header Fail Error * - - request_method_info - 8 - Request Method INFO * - - syn_retry_blacklist - 8 - SYN Retry Timeout Blacklisted * - - synack_reset_sent - 8 - SYNACK Reset Sent * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - src_conn_ofo_rate_excd - 8 - Src TCP Conn Out-Of-Seq Rate Exceeded * - - port_drop - 8 - Inbound Packets Dropped * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - conn_create_from_ack - 8 - Connections Created From ACK * - - parse_start_line_error - 8 - Parse Start Line Error * - - src_filter3_match - 8 - Src Filter3 Match * - - max_uri_len_exceed - 8 - Maximum URI Length Exceed * - - src_syn_retry_gap_drop - 8 - Src SYN Retry-Gap Dropped * - - request_method_publish - 8 - Request Method PUBLISH * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - request_unknown_version - 8 - Request Unknown Version * - - src_filter1_match - 8 - Src Filter1 Match * - - src_syn_rate_exceed - 8 - Src TCP SYN Rate Exceeded * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - src_syn_retry_timeout - 8 - Src SYN Retry Timeout * - - request_method_bye - 8 - Request Method BYE * - - response_1xx - 8 - Response 1xx * - - src_syn_retry_blacklist - 8 - Src SYN Retry Timeout Blacklisted * - - src_filter_none_match - 8 - Src Filter No Match * - - src_rate1_limit_exceed - 8 - Src Rate1 Limit Exceed * - - response_unknown - 8 - Response Unknown * - - keep_alive_msg - 8 - Keep Alive Message * - - unauth_drop - 8 - TCP Unauth Dropped * - - src_syn_cookie_sent - 8 - Src SYN Cookie Sent * - - header_filter_action_drop - 8 - Header Filter Action Drop * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - ack_retry_timeout - 8 - ACK Retry Timeout * - - header_filter_filter4_match - 8 - Header Filter Filter4 Match * - - request_method_register - 8 - Request Method REGISTER * - - syn_retry_timeout - 8 - SYN Retry Timeout * - - syn_tfo_rcv - 8 - SYN TFO Received * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - ack_retry_rto_pass - 8 - ACK Retry RTO Passed * - - response_4xx - 8 - Response 4xx * - - seq_check_ofo - 8 - Sequence Check Out-Of-Order * - - policy_violation - 8 - Policy Violation * - - seq_check_retrans_fin - 8 - Sequence Check Retransmit Fin * - - filter_action_whitelist - 8 - Filter Action WL * - - src_conn_pkt_rate_excd - 8 - Src TCP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - request_method_unknown - 8 - Request Method UNKNOWN * - - src_filter5_match - 8 - Src Filter5 Match * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - sess_create_outbound - 8 - Outbound Sessions Created * - - mem_alloc_fail_error - 8 - Memory Allocation Fail Error * - - request_method_invite - 8 - Request Method INVITE * - - conn_close_w_fin - 8 - FIN Connections Closed * - - src_rate2_limit_exceed - 8 - Src Rate2 Limit Exceed * - - syn_retry_init - 8 - SYN Retry Init * - - request_method_message - 8 - Request Method MESSAGE * - - src_conn_zwindow_rate_excd - 8 - Src TCP Conn Zero-Window Rate Exceeded * - - sess_create - 8 - Session Create * - - src_ack_retry_init - 8 - Src ACK Retry Init * - - ack_retry_blacklist - 8 - ACK Retry Timeout Blacklisted * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - syn_auth_pass - 8 - SYN Auth Passed * - - syn_retry_rto_fail - 8 - SYN Retry RTO Dropped * - - get_content_fail_error - 8 - Get Content Fail Error * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - retransmit_excd - 8 - Retransmit Exceeded * - - src_syn_auth_fail - 8 - Src SYN Auth Failed * - - src_filter_action_whitelist - 8 - Src Filter Action WL * - - zero_window_excd - 8 - Zero-Window Exceeded * - - seq_check_retrans_rst - 8 - Sequence Check Retransmit Rst * - - src_ack_retry_reset - 8 - Src ACK Retry Timeout Reset * - - conn_ofo_rate_excd - 8 - TCP Conn Out-Of-Seq Rate Exceeded * - - pkts_ofo_total - 8 - Packet Out-Of-Order Total * - - filter2_match - 8 - Filter2 Match * - - src_ack_retry_blacklist - 8 - Src ACK Retry Timeout Blacklisted * - - frag_drop - 8 - Fragmented Packets Dropped * - - pattern_not_found - 8 - Pattern Recognitoin: Pattern Not Found * - - syn_retry_reset - 8 - SYN Retry Timeout Reset * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - ack_retry_pass - 8 - ACK Retry Passed * - - conn_close_w_idle - 8 - Idle Connections Closed * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - request_method_notify - 8 - Request Method NOTIFY * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - header_filter_match - 8 - Header Filter Match * - - src_drop - 8 - Src Packets Dropped * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - max_call_id_len_exceed - 8 - Maximum Call ID Length Exceed * - - header_name_too_long - 8 - Header Name Too Long * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - pkts_retrans_total - 8 - Packets Retransmit Total * - - seq_check_retrans_other - 8 - Sequence Check Retransmit Other * - - header_filter_none_match - 8 - Header Filter None Match * - - request_method_options - 8 - Request Method OPTIONS * - - request_method_update - 8 - Request Method UPDATE * - - syn_retry_failed - 8 - SYN Retry Dropped * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - max_sdp_len_exceed - 8 - Maximum SDP Length Exceed * - - ack_retry_init - 8 - ACK Retry Init * - - src_filter4_match - 8 - Src Filter4 Match * - - policy_drop - 8 - Policy Drop * - - ack_retry_reset - 8 - ACK Retry Timeout Reset * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - conn_create_from_syn - 8 - Connections Created From SYN * - - create_conn_non_syn_dropped - 8 - Create Conn with non-SYN Packets Dropped * - - syn_retry_pass - 8 - SYN Retry Passed * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - rate2_limit_exceed - 8 - Dst Rate2 Limit Exceed * - - src_syn_retry_failed - 8 - Src SYN Retry Dropped * - - filter_action_drop - 8 - Filter Action Drop * - - src_ack_retry_rto_fail - 8 - Src ACK Retry RTO Dropped * - - conn_zwindow_rate_excd - 8 - TCP Conn Zero-Window Rate Exceeded * - - idle_timeout - 8 - Idle Timeout * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - ack_retry_rto_progress - 8 - ACK Retry RTO Progress * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - invalid_start_line_error - 8 - Invalid Start Line Error * - - rate3_limit_exceed - 8 - Dst Rate3 Limit Exceed * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - src_syn_cookie_fail - 8 - Src SYN Cookie Failed * - - line_too_long - 8 - Line Too Long * - - src_syn_retry_rto_pass - 8 - Src SYN Retry RTO Passed * - - src_syn_retry_reset - 8 - Src SYN Retry Timeout Reset * - - port_rcvd - 8 - Inbound Packets Received * - - conn_close_half_open - 8 - Half Open Connections Closed * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - seq_check_retrans_push - 8 - Sequence Check Retransmit Push * - - synack_multiple_attempts_per_ip_detected - 8 - SYNACK Multiple Attempts Per IP Detected * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - src_syn_retry_rto_progress - 8 - Src SYN Retry RTO Progress * - - request_method_cancel - 8 - Request Method CANCEL * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - conn_prate_excd - 8 - TCP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - header_filter_action_blacklist - 8 - Header Filter Action Blacklist * - - src_rst_cookie_fail - 8 - Src RST Cookie Failed * - - src_auth_drop - 8 - Src TCP Auth Dropped * - - src_filter_action_drop - 8 - Src Filter Action Drop .. _1159_stats_sip-udp-zone-port: stats sip-udp-zone-port ----------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - filter_none_match - 8 - Filter No Matched * - - concatenate_msg - 8 - Concatenate Msg * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - invalid_header - 8 - Invalid Header * - - header_filter_filter2_match - 8 - Header Filter Filter2 Match * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - src_udp_retry_gap_drop - 8 - Src UDP Retry-Gap Dropped * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - filter4_match - 8 - Filter4 Match * - - response_2xx - 8 - Response 2xx * - - spoof_detect_fail - 8 - UDP Retry Timeout * - - sess_aged - 8 - Sessions Aged Out * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - max_header_value_len_exceed - 8 - Maximum Header Value Length Exceed * - - src_payload_too_small - 8 - Src UDP Payload Too Small * - - udp_auth_pass - 8 - Auth UDP Passed * - - read_start_line_error - 8 - Read Start Line Error * - - malform_request - 8 - Malform Request * - - response_3xx - 8 - Response 3xx * - - line_mem_allocated - 8 - Line Memory Allocated * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - udp_auth - 8 - Auth UDP Init * - - request_method_ack - 8 - Request Method ACK * - - src_rate3_limit_exceed - 8 - Src Rate3 Limit Exceed * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - UDP SrcPort Wellknown * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - body_too_big - 8 - Body Too Big * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - src_udp_retry_init - 8 - Src UDP Retry Init * - - response_unknown_version - 8 - Response Unknown Version * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - request_method_subscribe - 8 - Request Method SUBSCRIBE * - - response_6xx - 8 - Response 6xx * - - src_udp_retry_pass - 8 - Src UDP Retry Passed * - - udp_retry_init - 8 - UDP Retry Init * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - src_filter5_match - 8 - Src Filter5 Match * - - header_filter_filter3_match - 8 - Header Filter Filter3 Match * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - port_bytes - 8 - Inbound Bytes Received * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - too_many_header - 8 - Too Many Header * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - header_filter_filter5_match - 8 - Header Filter Filter5 Match * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - rate1_limit_exceed - 8 - Dst Rate1 Limit Exceed * - - request_method_refer - 8 - Request Method REFER * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - port_src_escalation - 8 - Src Escalation * - - filter5_match - 8 - Filter5 Match * - - src_udp_auth_fail - 8 - Src Auth UDP Failed * - - header_filter_action_default_pass - 8 - Header Filter Action Default Pass * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - zone_src_udp_retry_timeout_blacklist - 8 - Src UDP Retry Timeout Blacklisted * - - line_mem_freed - 8 - Line Memory Freed * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - current_es_level - 8 - Current Escalation Level * - - payload_too_small - 8 - UDP Payload Too Small * - - frag_rcvd - 8 - Fragmented Packets Received * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - request_method_prack - 8 - Request Method PRACK * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - response_5xx - 8 - Response 5xx * - - bl - 8 - Dst Blacklisted * - - filter1_match - 8 - Filter1 Match * - - ntp_monlist_resp - 8 - NTP Monlist Response * - - sess_create_inbound - 8 - Inbound Sessions Created * - - header_filter_action_whitelist - 8 - Header Filter Action Whitelist * - - filter_auth_fail - 8 - Filter Auth Failed * - - header_filter_not_match - 8 - Header Filter Not Match * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - frag_timeout - 8 - Fragmented Packets Timeout * - - header_filter_filter1_match - 8 - Header Filter Filter1 Match * - - udp_retry_pass - 8 - UDP Retry Passed * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - dst_udp_retry_timeout_blacklist - 8 - UDP Retry Timeout Blacklisted * - - udp_auth_retry_gap_drop - 8 - Auth UDP Retry-Gap Dropped * - - src_udp_auth_drop - 8 - Src UDP Auth Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - parse_header_fail_error - 8 - Parse Header Fail Error * - - request_method_info - 8 - Request Method INFO * - - udp_auth_retry_fail - 8 - Auth UDP Retry Failed * - - port_drop - 8 - Inbound Packets Dropped * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - parse_start_line_error - 8 - Parse Start Line Error * - - src_filter3_match - 8 - Src Filter3 Match * - - max_uri_len_exceed - 8 - Maximum URI Length Exceed * - - ntp_monlist_req - 8 - NTP Monlist Request * - - request_method_publish - 8 - Request Method PUBLISH * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - payload_too_big - 8 - UDP Payload Too Large * - - request_unknown_version - 8 - Request Unknown Version * - - src_filter1_match - 8 - Src Filter1 Match * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - request_method_bye - 8 - Request Method BYE * - - response_1xx - 8 - Response 1xx * - - src_filter_none_match - 8 - Src Filter No Match * - - src_rate1_limit_exceed - 8 - Src Rate1 Limit Exceed * - - response_unknown - 8 - Response Unknown * - - keep_alive_msg - 8 - Keep Alive Message * - - header_filter_action_drop - 8 - Header Filter Action Drop * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - header_filter_filter4_match - 8 - Header Filter Filter4 Match * - - request_method_register - 8 - Request Method REGISTER * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - udp_retry_gap_drop - 8 - UDP Retry-Gap Dropped * - - response_4xx - 8 - Response 4xx * - - policy_violation - 8 - Policy Violation * - - filter_action_whitelist - 8 - Filter Action Whitelist * - - src_conn_pkt_rate_excd - 8 - Src UDP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - src_udp_auth - 8 - Src Auth UDP Init * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - sess_create_outbound - 8 - Outbound Sessions Created * - - mem_alloc_fail_error - 8 - Memory Allocation Fail Error * - - request_method_invite - 8 - Request Method INVITE * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - src_rate2_limit_exceed - 8 - Src Rate2 Limit Exceed * - - request_method_message - 8 - Request Method MESSAGE * - - sess_create - 8 - Session Create * - - src_well_known_port - 8 - Src UDP SrcPort Wellknown * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - get_content_fail_error - 8 - Get Content Fail Error * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - src_filter_action_whitelist - 8 - Src Filter Action Whitelist * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - src_payload_too_big - 8 - Src UDP Payload Too Large * - - filter2_match - 8 - Filter2 Match * - - frag_drop - 8 - Fragmented Packets Dropped * - - pattern_not_found - 8 - Pattern Recognitoin: Pattern Not Found * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - src_ntp_monlist_resp - 8 - Src NTP Monlist Response * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - request_method_notify - 8 - Request Method NOTIFY * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - header_filter_match - 8 - Header Filter Match * - - src_drop - 8 - Src Packets Dropped * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - udp_auth_drop - 8 - UDP Auth Dropped * - - max_call_id_len_exceed - 8 - Maximum Call ID Length Exceed * - - header_name_too_long - 8 - Header Name Too Long * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - src_ntp_monlist_req - 8 - Src NTP Monlist Request * - - header_filter_none_match - 8 - Header Filter None Match * - - request_method_options - 8 - Request Method OPTIONS * - - request_method_update - 8 - Request Method UPDATE * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - max_sdp_len_exceed - 8 - Maximum SDP Length Exceed * - - src_filter4_match - 8 - Src Filter4 Match * - - policy_drop - 8 - Policy Drop * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - rate2_limit_exceed - 8 - Dst Rate2 Limit Exceed * - - filter_action_drop - 8 - Filter Action Drop * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - invalid_start_line_error - 8 - Invalid Start Line Error * - - rate3_limit_exceed - 8 - Dst Rate3 Limit Exceed * - - request_method_unknown - 8 - Request Method UNKNOWN * - - line_too_long - 8 - Line Too Long * - - port_rcvd - 8 - Inbound Packets Received * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - request_method_cancel - 8 - Request Method CANCEL * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - conn_prate_excd - 8 - UDP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - header_filter_action_blacklist - 8 - Header Filter Action Blacklist * - - udp_auth_fail - 8 - Auth UDP Failed * - - src_filter_action_drop - 8 - Src Filter Action Drop * - - src_udp_auth_timeout - 8 - Src UDP Retry Timeout .. _1159_stats_tcp-zone-port: stats tcp-zone-port ------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - src_ack_auth_fail - 8 - Src ACK Retry Dropped * - - src_well_known_port - 8 - Src TCP SrcPort Wellknown * - - tcp_rexmit_syn_limit_drop - 8 - TCP SYN Retransmit Exceed Drop * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - auth_drop - 8 - TCP Auth Dropped * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - src_ack_retry_gap_drop - 8 - Src ACK Retry Retry-Gap Dropped * - - filter4_match - 8 - Filter4 Match * - - src_create_conn_non_syn_dropped - 8 - Src Create Conn with non-SYN Packets Dropped * - - sess_aged - 8 - Sessions Aged Out * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - conn_close - 8 - Connections Closed * - - syn_auth_fail - 8 - SYN Auth Failed * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - syn_retry_init - 8 - SYN Retry Init * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - TCP SrcPort Wellknown * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - port_syn_rate_exceed - 8 - TCP SYN Rate Exceeded * - - conn_rexmit_rate_excd - 8 - TCP Conn Retransmit Rate Exceeded * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - out_of_seq_excd - 8 - Out-Of-Seq Exceeded * - - conn_close_w_rst - 8 - RST Connections Closed * - - port_src_escalation - 8 - Src Escalation * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - src_ack_retry_rto_progress - 8 - Src ACK Retry RTO Progress * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - src_retransmit_excd - 8 - Src Retransmit Exceeded * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - tcp_rexmit_syn_limit_bl - 8 - TCP SYN Retransmit Exceed Blacklist * - - src_ack_retry_timeout - 8 - Src ACK Retry Timeout * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - src_filter5_match - 8 - Src Filter5 Match * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - filter5_match - 8 - Filter5 Match * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - port_bytes - 8 - Inbound Bytes Received * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - syn_cookie_fail - 8 - SYN Cookie Failed * - - src_syn_retry_rto_fail - 8 - Src SYN Retry RTO Dropped * - - syn_retry_rto_progress - 8 - SYN Retry RTO Progress * - - src_conn_rexmit_rate_excd - 8 - Src TCP Conn Retransmit Rate Exceeded * - - src_out_of_seq_excd - 8 - Src Out-Of-Seq Exceeded * - - rst_cookie_fail - 8 - RST Cookie Failed * - - ack_retry_rto_fail - 8 - ACK Retry RTO Dropped * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - frag_rcvd - 8 - Fragmented Packets Received * - - src_syn_retry_init - 8 - Src SYN Retry Init * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - syn_retry_rto_pass - 8 - SYN Retry RTO Passed * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - bl - 8 - Dst Blacklisted * - - filter1_match - 8 - Filter1 Match * - - auth_resp - 8 - TCP Auth Responded * - - sess_create_inbound - 8 - Inbound Sessions Created * - - filter_auth_fail - 8 - Filter Auth Failed * - - conn_create_from_syn - 8 - Connections Created From SYN * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - src_zero_window_excd - 8 - Src Zero-Window Exceeded * - - ack_auth_fail - 8 - ACK Retry Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - src_drop - 8 - Src Packets Dropped * - - syn_retry_blacklist - 8 - SYN Retry Timeout Blacklisted * - - synack_reset_sent - 8 - SYNACK Reset Sent * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - src_conn_ofo_rate_excd - 8 - Src TCP Conn Out-Of-Seq Rate Exceeded * - - syn_retry_gap_drop - 8 - SYN Retry-Gap Dropped * - - conn_create_from_ack - 8 - Connections Created From ACK * - - filter_none_match - 8 - Filter No Match * - - src_filter3_match - 8 - Src Filter3 Match * - - src_syn_retry_gap_drop - 8 - Src SYN Retry-Gap Dropped * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - syn_drop - 8 - SYN Dropped * - - src_filter1_match - 8 - Src Filter1 Match * - - src_syn_rate_exceed - 8 - Src TCP SYN Rate Exceeded * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - src_syn_retry_timeout - 8 - Src SYN Retry Timeout * - - src_filter_none_match - 8 - Src Filter No Match * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - unauth_drop - 8 - TCP Unauth Dropped * - - src_syn_cookie_sent - 8 - Src SYN Cookie Sent * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - ack_retry_timeout - 8 - ACK Retry Timeout * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - syn_retry_timeout - 8 - SYN Retry Timeout * - - syn_tfo_rcv - 8 - SYN TFO Received * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - src_unauth_drop - 8 - Src TCP Unauth Dropped * - - filter_action_whitelist - 8 - Filter Action WL * - - src_conn_pkt_rate_excd - 8 - Src TCP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - frag_timeout - 8 - Fragmented Packets Timeout * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - sess_create_outbound - 8 - Outbound Sessions Created * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - conn_close_w_fin - 8 - FIN Connections Closed * - - src_syn_retry_blacklist - 8 - Src SYN Retry Timeout Blacklisted * - - src_ack_retry_rto_pass - 8 - Src ACK Retry RTO Passed * - - src_conn_zwindow_rate_excd - 8 - Src TCP Conn Zero-Window Rate Exceeded * - - src_ack_retry_init - 8 - Src ACK Retry Init * - - ack_retry_blacklist - 8 - ACK Retry Timeout Blacklisted * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - syn_auth_pass - 8 - SYN Auth Passed * - - syn_retry_rto_fail - 8 - SYN Retry RTO Dropped * - - syn_cookie_sent - 8 - SYN Cookie Sent * - - retransmit_excd - 8 - Retransmit Exceeded * - - src_syn_auth_fail - 8 - Src SYN Auth Failed * - - src_filter_action_whitelist - 8 - Src Filter Action WL * - - zero_window_excd - 8 - Zero-Window Exceeded * - - src_ack_retry_reset - 8 - Src ACK Retry Timeout Reset * - - conn_ofo_rate_excd - 8 - TCP Conn Out-Of-Seq Rate Exceeded * - - filter2_match - 8 - Filter2 Match * - - src_ack_retry_blacklist - 8 - Src ACK Retry Timeout Blacklisted * - - frag_drop - 8 - Fragmented Packets Dropped * - - pattern_not_found - 8 - Pattern Recognition: Pattern Not Found * - - syn_retry_reset - 8 - SYN Retry Timeout Reset * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - conn_close_w_idle - 8 - Idle Connections Closed * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - sess_create - 8 - Session Create * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - ack_retry_pass - 8 - ACK Retry Passed * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - ack_retry_reset - 8 - ACK Retry Timeout Reset * - - src_syn_cookie_fail - 8 - Src SYN Cookie Failed * - - syn_retry_failed - 8 - SYN Retry Dropped * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - ack_retry_init - 8 - ACK Retry Init * - - src_filter4_match - 8 - Src Filter4 Match * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - ack_retry_gap_drop - 8 - ACK Retry Retry-Gap Dropped * - - create_conn_non_syn_dropped - 8 - Create Conn with non-SYN Packets Dropped * - - syn_retry_pass - 8 - SYN Retry Passed * - - current_es_level - 8 - Current Escalation Level * - - src_syn_retry_failed - 8 - Src SYN Retry Dropped * - - filter_action_drop - 8 - Filter Action Drop * - - src_ack_retry_rto_fail - 8 - Src ACK Retry RTO Dropped * - - conn_zwindow_rate_excd - 8 - TCP Conn Zero-Window Rate Exceeded * - - ack_retry_rto_progress - 8 - ACK Retry RTO Progress * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - port_drop - 8 - Inbound Packets Dropped * - - ack_retry_rto_pass - 8 - ACK Retry RTO Passed * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - src_syn_retry_rto_pass - 8 - Src SYN Retry RTO Passed * - - src_syn_retry_reset - 8 - Src SYN Retry Timeout Reset * - - port_rcvd - 8 - Inbound Packets Received * - - conn_close_half_open - 8 - Half Open Connections Closed * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - synack_multiple_attempts_per_ip_detected - 8 - SYNACK Multiple Attempts Per IP Detected * - - src_syn_retry_rto_progress - 8 - Src SYN Retry RTO Progress * - - conn_prate_excd - 8 - TCP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - src_rst_cookie_fail - 8 - Src RST Cookie Failed * - - src_auth_drop - 8 - Src TCP Auth Dropped * - - src_filter_action_drop - 8 - Src Filter Action Drop .. _1159_stats_udp-zone-port: stats udp-zone-port ------------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - secondary_port_kbit_rate_exceed_pkt - 8 - Per Addr-Port KiBit Rate Exceeded Count * - - pattern_filter5_match - 8 - Extracted Filter5 Match * - - frag_drop - 8 - Fragmented Packets Dropped * - - outbound_port_bytes_sent - 8 - Outbound Bytes Forwarded * - - src_udp_retry_gap_drop - 8 - Src UDP Retry-Gap Dropped * - - filter4_match - 8 - Filter4 Match * - - spoof_detect_fail - 8 - UDP Retry Timeout * - - sess_aged - 8 - Sessions Aged Out * - - pattern_filter4_match - 8 - Extracted Filter4 Match * - - pattern_filter1_match - 8 - Extracted Filter1 Match * - - pattern_filter2_match - 8 - Extracted Filter2 Match * - - secondary_port_kbit_rate_exceed - 8 - Per Addr-Port KiBit Rate Exceeded * - - secondary_port_hit - 8 - Per Addr-Port Hit * - - wellknown_sport_drop - 8 - UDP SrcPort Wellknown * - - src_filter_total_not_match - 8 - Src Filter Not Matched on Pkt * - - src_udp_retry_init - 8 - Src UDP Retry Init * - - src_payload_too_small - 8 - Src UDP Payload Too Small * - - src_udp_retry_pass - 8 - Src UDP Retry Passed * - - udp_retry_init - 8 - UDP Retry Init * - - outbound_port_bytes - 8 - Outbound Bytes Received * - - src_filter5_match - 8 - Src Filter5 Match * - - port_src_escalation - 8 - Src Escalation * - - dst_hw_drop - 8 - Dst Hardware Packets Dropped * - - port_bytes - 8 - Inbound Bytes Received * - - frag_rcvd - 8 - Fragmented Packets Received * - - src_filter_action_blacklist - 8 - Src Filter Action Blacklist * - - pattern_filter3_match - 8 - Extracted Filter3 Match * - - dst_hw_drop_removed - 8 - Dst Hardware Drop Rules Removed * - - src_zone_service_entry_aged - 8 - SrcZoneService Entry Aged * - - outbound_port_drop - 8 - Outbound Packets Dropped * - - sflow_external_packets_sent - 8 - Sflow External Packets Sent * - - filter5_match - 8 - Filter5 Match * - - no_policy_class_list_match - 8 - No Policy Class-list Match * - - src_filter_action_default_pass - 8 - Src Filter Action Default Pass * - - zone_src_udp_retry_timeout_blacklist - 8 - Src UDP Retry Timeout Blacklisted * - - filter_total_not_match - 8 - Filter Not Matched on Pkt * - - sflow_internal_packets_sent - 8 - Sflow Internal Packets Sent * - - payload_too_small - 8 - UDP Payload Too Small * - - src_payload_too_big - 8 - Src UDP Payload Too Large * - - outbound_port_bytes_drop - 8 - Outbound Bytes Dropped * - - exceed_action_tunnel - 8 - Exceed Action: Tunnel * - - bl - 8 - Dst Blacklisted * - - filter1_match - 8 - Filter1 Match * - - ntp_monlist_resp - 8 - NTP Monlist Response * - - sess_create_inbound - 8 - Inbound Sessions Created * - - filter_auth_fail - 8 - Filter Auth Failed * - - exceed_drop_brate_src_pkt - 8 - Src KiBit Rate Exceeded Count * - - src_filter1_match - 8 - Src Filter1 Match * - - udp_retry_pass - 8 - UDP Retry Passed * - - src_hw_drop_removed - 8 - Src Hardware Drop Rules Removed * - - dst_udp_retry_timeout_blacklist - 8 - UDP Retry Timeout Blacklisted * - - src_udp_auth_drop - 8 - Src UDP Auth Dropped * - - sflow_external_samples_packed - 8 - Sflow External Samples Packed * - - src_drop - 8 - Src Packets Dropped * - - pattern_recognition_pattern_changed - 8 - Pattern Recognition: Pattern Change Detected * - - port_drop - 8 - Inbound Packets Dropped * - - filter_none_match - 8 - Filter No Match * - - src_filter3_match - 8 - Src Filter3 Match * - - ntp_monlist_req - 8 - NTP Monlist Request * - - src_zone_service_entry_learned - 8 - SrcZoneService Entry Learned * - - payload_too_big - 8 - UDP Payload Too Large * - - port_conn_rate_exceed - 8 - Conn Rate Exceeded * - - src_filter_none_match - 8 - Src Filter No Match * - - port_kbit_rate_exceed_pkt - 8 - KiBit Rate Exceeded Count * - - port_bytes_sent - 8 - Inbound Bytes Forwarded * - - exceed_drop_brate_src - 8 - Src KiBit Rate Exceeded * - - src_frag_drop - 8 - Src Fragmented Packets Dropped * - - port_kbit_rate_exceed - 8 - KiBit Rate Exceeded * - - udp_retry_gap_drop - 8 - UDP Retry-Gap Dropped * - - filter_action_whitelist - 8 - Filter Action Whitelist * - - src_conn_pkt_rate_excd - 8 - Src UDP Conn Pkt Rate Exceeded * - - port_src_bl - 8 - Src Blacklisted * - - outbound_port_rcvd - 8 - Outbound Packets Received * - - outbound_port_pkt_sent - 8 - Outbound Packets Forwarded * - - sess_create_outbound - 8 - Outbound Sessions Created * - - pattern_filter_drop - 8 - Extracted Filter Drop * - - pattern_recognition_proceeded - 8 - Pattern Recognition: Engine Started * - - src_well_known_port - 8 - Src UDP SrcPort Wellknown * - - filter_action_blacklist - 8 - Filter Action Blacklist * - - port_pkt_sent - 8 - Inbound Packets Forwarded * - - src_filter_action_whitelist - 8 - Src Filter Action Whitelist * - - secondary_port_conn_rate_exceed - 8 - Per Addr-Port Conn Rate Exceeded * - - dst_hw_drop_inserted - 8 - Dst Hardware Drop Rules Inserted * - - filter2_match - 8 - Filter2 Match * - - secondary_port_conn_limm_exceed - 8 - Per Addr-Port Conn Limit Exceeded * - - pattern_not_found - 8 - Pattern Recognition: Pattern Not Found * - - port_conn_limm_exceed - 8 - Conn Limit Exceeded * - - filter3_match - 8 - Filter3 Match * - - src_ntp_monlist_resp - 8 - Src NTP Monlist Response * - - secondary_port_pkt_rate_exceed - 8 - Per Addr-Port Packet Rate Exceeded * - - src_filter2_match - 8 - Src Filter2 Match * - - sess_create - 8 - Session Create * - - port_bytes_drop - 8 - Inbound Bytes Dropped * - - exceed_drop_prate_src - 8 - Src Pkt Rate Exceeded * - - exceed_drop_climit_src - 8 - Src Conn Limit Exceeded * - - udp_auth_drop - 8 - UDP Auth Dropped * - - pattern_recognition_generic_error - 8 - Pattern Recognition: Exceptions * - - src_ntp_monlist_req - 8 - Src NTP Monlist Request * - - pattern_recognition_sampling_started - 8 - Pattern Recognition: Sampling Started * - - src_filter4_match - 8 - Src Filter4 Match * - - sflow_internal_samples_packed - 8 - Sflow Internal Samples Packed * - - filter_action_default_pass - 8 - Filter Action Default Pass * - - current_es_level - 8 - Current Escalation Level * - - filter_action_drop - 8 - Filter Action Drop * - - port_pkt_rate_exceed - 8 - Packet Rate Exceeded * - - frag_timeout - 8 - Fragmented Packets Timeout * - - src_filter_auth_fail - 8 - Src Filter Auth Failed * - - port_rcvd - 8 - Inbound Packets Received * - - src_hw_drop_inserted - 8 - Src Hardware Drop Rules Inserted * - - conn_prate_excd - 8 - UDP Conn Pkt Rate Exceeded * - - exceed_drop_crate_src - 8 - Src Conn Rate Exceeded * - - src_filter_action_drop - 8 - Src Filter Action Drop * - - src_udp_auth_timeout - 8 - Src UDP Retry Timeout .. _1159_oper_data: operational data ---------------- .. list-table:: :widths: 10 20 30 80 :header-rows: 2 :stub-columns: 1 * - - Counter - Size - Description * - - - - * - - app-stat - flag - app-stat * - - black-listed - flag - black-listed * - - authenticated - flag - authenticated * - - l4-ext-rate - flag - l4-ext-rate * - - overflow-policy - flag - overflow-policy * - - class-list - string - class-list * - - entry-displayed-count - number - entry-displayed-count * - - subnet-ip-addr - ipv4-cidr - subnet-ip-addr * - - exceeded - flag - exceeded * - - ddos_entry_list - - ddos_entry_list * - - service-displayed-count - number - service-displayed-count * - - white-listed - flag - white-listed * - - sources - flag - sources * - - hw-blacklisted - flag - hw-blacklisted * - - ipv6 - ipv6-address - ipv6 * - - sources-all-entries - flag - sources-all-entries * - - indicator-detail - flag - indicator-detail * - - level - flag - level * - - subnet-ipv6-addr - ipv6-address-plen - subnet-ipv6-addr * - - indicators - flag - indicators