ddos dns-udp-port

ddos dst dns-udp port counters

dns-udp-port Specification

   
Type Collection
Object Key(s) sampling-enable
Collection Name dns-udp-port-list
Collection URI /axapi/v3/ddos/dns-udp-port
Element Name dns-udp-port
Element URI /axapi/v3/ddos/dns-udp-port/{sampling-enable}
Element Attributes dns-udp-port_attributes
Statistics Data URI /axapi/v3/ddos/dns-udp-port/{sampling-enable}/stats
Schema dns-udp-port schema

Operations Allowed:

OperationMethodURIPayload

Create Object

POST

/axapi/v3/ddos/dns-udp-port

dns-udp-port attributes

Create List

POST

/axapi/v3/ddos/dns-udp-port

dns-udp-port attributes

Get Object

GET

/axapi/v3/ddos/dns-udp-port/{sampling-enable}

dns-udp-port attributes

Get List

GET

/axapi/v3/ddos/dns-udp-port

dns-udp-port-list

Modify Object

POST

/axapi/v3/ddos/dns-udp-port/{sampling-enable}

dns-udp-port attributes

Replace Object

PUT

/axapi/v3/ddos/dns-udp-port/{sampling-enable}

dns-udp-port attributes

Replace List

PUT

/axapi/v3/ddos/dns-udp-port

dns-udp-port-list

Delete Object

DELETE

/axapi/v3/ddos/dns-udp-port/{sampling-enable}

dns-udp-port attributes

dns-udp-port-list

dns-udp-port-list is JSON List of dns-udp-port attributes

dns-udp-port-list : [

dns-udp-port attributes

sampling-enable

Type: List

sampling-enable

Specification  
Type list
Block object keys  

counters1

Description ‘all’: all; ‘force_tcp_auth’: Auth Force-TCP; ‘udp_auth’: Auth UDP Init; ‘rate_limit_type0’: Dst Request Rate 1 Exceeded; ‘rate_limit_type1’: Dst Request Rate 2 Exceeded; ‘rate_limit_type2’: Dst Request Rate 3 Exceeded; ‘rate_limit_type3’: Dst Request Rate 4 Exceeded; ‘rate_limit_type4’: Dst Request Rate 5 Exceeded; ‘nxdomain_bl_drop’: NXDOMAIN Response Blacklisted; ‘is_nxdomain’: NXDOMAIN Response; ‘nxdomain_drop’: NXDOMAIN Response Dropped; ‘udp_auth_fail’: Auth UDP Failed; ‘dns_malform_drop’: Malform Query Dropped; ‘fqdn_stage_2_rate_exceed’: FQDN Rate Exceeded; ‘req_sent’: DNS Requests Forwarded; ‘req_size_exceed’: Request Size Exceeded; ‘req_retrans’: Request Retransmit; ‘fqdn_label_len_exceed’: FQDN Label Length Exceeded; ‘query_type_a’: Query Type A; ‘query_type_aaaa’: Query Type AAAA; ‘query_type_ns’: Query Type NS; ‘query_type_cname’: Query Type CNAME; ‘query_type_any’: Query Type ANY; ‘query_type_srv’: Query Type SRV; ‘query_type_mx’: Query Type MX; ‘query_type_soa’: Query Type SOA; ‘query_type_opt’: Query Type OPT; ‘port_rcvd’: Inbound Packets Received; ‘port_drop’: Inbound Packets Dropped; ‘port_pkt_sent’: Inbound Packets Forwarded; ‘port_pkt_rate_exceed’: Packet Rate Exceeded; ‘port_kbit_rate_exceed’: KiBit Rate Exceeded; ‘port_conn_rate_exceed’: Conn Rate Exceeded; ‘port_conn_limm_exceed’: Conn Limit Exceeded; ‘dg_action_permit’: Domain Group Action Permit; ‘dg_action_deny’: Domain Group Action Deny; ‘dg_action_default’: Domain Group Action Default; ‘port_bytes’: Inbound Bytes Received; ‘outbound_port_bytes’: Outbound Bytes Received; ‘outbound_port_rcvd’: Outbound Packets Received; ‘outbound_port_pkt_sent’: Outbound Packets Forwarded; ‘port_bytes_sent’: Inbound Bytes Forwarded; ‘port_bytes_drop’: Inbound Bytes Dropped; ‘port_src_bl’: Src Blacklisted; ‘filter_auth_fail’: Filter Auth Failed; ‘spoof_detect_fail’: UDP Retry Timeout; ‘sess_create’: Session Create; ‘filter_action_blacklist’: Filter Action Blacklist; ‘filter_action_drop’: Filter Action Drop; ‘filter_action_default_pass’: Filter Action Default Pass; ‘filter_action_whitelist’: Filter Action Whitelist; ‘exceed_drop_prate_src’: Src Pkt Rate Exceeded; ‘exceed_drop_crate_src’: Src Conn Rate Exceeded; ‘exceed_drop_climit_src’: Src Conn Limit Exceeded; ‘exceed_drop_brate_src’: Src KiBit Rate Exceeded; ‘outbound_port_bytes_sent’: Outbound Bytes Forwarded; ‘outbound_port_drop’: Outbound Packets Dropped; ‘outbound_port_bytes_drop’: Outbound Bytes Dropped; ‘udp_auth_retry_fail’: Auth UDP Retry Failed; ‘src_rate_limit_type0’: Src Request Rate 1 Exceeded; ‘src_rate_limit_type1’: Src Request Rate 2 Exceeded; ‘src_rate_limit_type2’: Src Request Rate 3 Exceeded; ‘src_rate_limit_type3’: Src Request Rate 4 Exceeded; ‘src_rate_limit_type4’: Src Request Rate 5 Exceeded; ‘exceed_drop_brate_src_pkt’: Src KiBit Rate Exceeded Count; ‘port_kbit_rate_exceed_pkt’: KiBit Rate Exceeded Count; ‘udp_retry_init’: UDP Retry Init; ‘conn_prate_excd’: UDP Conn Pkt Rate Exceeded; ‘ntp_monlist_req’: NTP Monlist Request; ‘ntp_monlist_resp’: NTP Monlist Response; ‘wellknown_sport_drop’: UDP SrcPort Wellknown; ‘payload_too_small’: UDP Payload Too Small; ‘payload_too_big’: UDP Payload Too Large; ‘fqdn_rate_by_label_count_check’: FQDN Rate by Label Count Checked; ‘fqdn_rate_by_label_count_exceed’: FQDN Rate by Label Count Exceeded; ‘udp_auth_retry_gap_drop’: Auth UDP Retry-Gap Dropped; ‘fqdn_label_count_exceed’: FQDN Label Count Exceeded; ‘rrtype_drop’: Record Type Dropped; ‘src_dns_fqdn_label_len_exceed’: Src FQDN Label Length Exceeded; ‘src_fqdn_label_count_exceed’: Src FQDN Label Count Exceeded; ‘src_udp_auth_fail’: Src Auth UDP Failed; ‘src_force_tcp_auth’: Src Auth Force-TCP; ‘src_dns_malform_drop’: Src Malform Query Dropped; ‘src_udp_auth’: Src Auth UDP Init; ‘udp_auth_pass’: Auth UDP Passed; ‘force_tcp_auth_timeout’: Auth Force-TCP With UDP Timeout; ‘udp_auth_drop’: UDP Auth Dropped; ‘dns_auth_drop’: DNS Auth Dropped; ‘dns_auth_resp’: DNS Auth Responded; ‘dns_query_class_in’: Query Class INTERNET; ‘dns_query_class_csnet’: Query Class CSNET; ‘dns_query_class_chaos’: Query Class CHAOS; ‘dns_query_class_hs’: Query Class HESIOD; ‘dns_query_class_none’: Query Class NONE; ‘dns_query_class_any’: Query Class ANY; ‘dns_query_class_whitelist_miss’: Query Class Whitelist Miss; ‘bl’: Dst Blacklisted; ‘src_drop’: Src Packets Dropped; ‘frag_rcvd’: Fragmented Packets Received; ‘frag_drop’: Fragmented Packets Dropped; ‘sess_create_inbound’: Inbound Sessions Created; ‘sess_create_outbound’: Outbound Sessions Created; ‘sess_aged’: Sessions Aged Out; ‘udp_retry_pass’: UDP Retry Passed; ‘udp_retry_gap_drop’: UDP Retry-Gap Dropped; ‘filter1_match’: Filter1 Match; ‘filter2_match’: Filter2 Match; ‘filter3_match’: Filter3 Match; ‘filter4_match’: Filter4 Match; ‘filter5_match’: Filter5 Match; ‘filter_none_match’: Filter No Match; ‘src_payload_too_small’: Src UDP Payload Too Small; ‘src_payload_too_big’: Src UDP Payload Too Large; ‘src_ntp_monlist_req’: Src NTP Monlist Request; ‘src_ntp_monlist_resp’: Src NTP Monlist Response; ‘src_well_known_port’: Src UDP SrcPort Wellknown; ‘src_conn_pkt_rate_excd’: Src UDP Conn Pkt Rate Exceeded; ‘src_udp_retry_init’: Src UDP Retry Init; ‘src_filter_action_blacklist’: Src Filter Action Blacklist; ‘src_filter_action_drop’: Src Filter Action Drop; ‘src_filter_action_default_pass’: Src Filter Action Default Pass; ‘src_filter_action_whitelist’: Src Filter Action Whitelist; ‘nxdomain_rate_exceed’: NXDOMAIN Response Rate Exceeded; ‘dns_malform’: Malform Query; ‘src_dns_malform’: Src Malform Query; ‘dg_request_check_fail’: Domain Group Request Check Fail; ‘query_type_any_drop’: Query Type ANY Dropped; ‘src_query_type_any_drop’: Src Query Type ANY Dropped; ‘src_udp_auth_drop’: Src UDP Auth Dropped; ‘src_dns_auth_drop’: Src DNS Auth Dropped; ‘src_frag_drop’: Src Fragmented Packets Dropped; ‘frag_timeout’: Fragmented Packets Timeout; ‘dg_rate_exceed’: Domain Group Domain Query Rate Exceeded; ‘pattern_recognition_proceeded’: Pattern Recognition: Engine Started; ‘pattern_not_found’: Pattern Recognition: Pattern Not Found; ‘pattern_recognition_generic_error’: Pattern Recognition: Exceptions; ‘pattern_filter1_match’: Extracted Filter1 Match; ‘pattern_filter2_match’: Extracted Filter2 Match; ‘pattern_filter3_match’: Extracted Filter3 Match; ‘pattern_filter4_match’: Extracted Filter4 Match; ‘pattern_filter5_match’: Extracted Filter5 Match; ‘pattern_filter_drop’: Extracted Filter Drop; ‘non_query_opcode_pass_through’: Non Query Opcode Pass Through; ‘src_udp_retry_gap_drop’: Src UDP Retry-Gap Dropped; ‘src_filter1_match’: Src Filter1 Match; ‘src_filter2_match’: Src Filter2 Match; ‘src_filter3_match’: Src Filter3 Match; ‘src_filter4_match’: Src Filter4 Match; ‘src_filter5_match’: Src Filter5 Match; ‘src_filter_none_match’: Src Filter No Match; ‘src_filter_total_not_match’: Src Filter Not Matched on Pkt; ‘src_filter_auth_fail’: Src Filter Auth Failed; ‘filter_total_not_match’: Filter Not Matched on Pkt; ‘sflow_internal_samples_packed’: Sflow Internal Samples Packed; ‘sflow_external_samples_packed’: Sflow External Samples Packed; ‘sflow_internal_packets_sent’: Sflow Internal Packets Sent; ‘sflow_external_packets_sent’: Sflow External Packets Sent; ‘pattern_recognition_sampling_started’: Pattern Recognition: Sampling Started; ‘pattern_recognition_pattern_changed’: Pattern Recognition: Pattern Change Detected; ‘exceed_action_tunnel’: Exceed Action: Tunnel;

Type: string

Supported Values: all, force_tcp_auth, udp_auth, rate_limit_type0, rate_limit_type1, rate_limit_type2, rate_limit_type3, rate_limit_type4, nxdomain_bl_drop, is_nxdomain, nxdomain_drop, udp_auth_fail, dns_malform_drop, fqdn_stage_2_rate_exceed, req_sent, req_size_exceed, req_retrans, fqdn_label_len_exceed, query_type_a, query_type_aaaa, query_type_ns, query_type_cname, query_type_any, query_type_srv, query_type_mx, query_type_soa, query_type_opt, port_rcvd, port_drop, port_pkt_sent, port_pkt_rate_exceed, port_kbit_rate_exceed, port_conn_rate_exceed, port_conn_limm_exceed, dg_action_permit, dg_action_deny, dg_action_default, port_bytes, outbound_port_bytes, outbound_port_rcvd, outbound_port_pkt_sent, port_bytes_sent, port_bytes_drop, port_src_bl, filter_auth_fail, spoof_detect_fail, sess_create, filter_action_blacklist, filter_action_drop, filter_action_default_pass, filter_action_whitelist, exceed_drop_prate_src, exceed_drop_crate_src, exceed_drop_climit_src, exceed_drop_brate_src, outbound_port_bytes_sent, outbound_port_drop, outbound_port_bytes_drop, udp_auth_retry_fail, src_rate_limit_type0, src_rate_limit_type1, src_rate_limit_type2, src_rate_limit_type3, src_rate_limit_type4, exceed_drop_brate_src_pkt, port_kbit_rate_exceed_pkt, udp_retry_init, conn_prate_excd, ntp_monlist_req, ntp_monlist_resp, wellknown_sport_drop, payload_too_small, payload_too_big, fqdn_rate_by_label_count_check, fqdn_rate_by_label_count_exceed, udp_auth_retry_gap_drop, fqdn_label_count_exceed, rrtype_drop, src_dns_fqdn_label_len_exceed, src_fqdn_label_count_exceed, src_udp_auth_fail, src_force_tcp_auth, src_dns_malform_drop, src_udp_auth, udp_auth_pass, force_tcp_auth_timeout, udp_auth_drop, dns_auth_drop, dns_auth_resp, dns_query_class_in, dns_query_class_csnet, dns_query_class_chaos, dns_query_class_hs, dns_query_class_none, dns_query_class_any, dns_query_class_whitelist_miss, bl, src_drop, frag_rcvd, frag_drop, sess_create_inbound, sess_create_outbound, sess_aged, udp_retry_pass, udp_retry_gap_drop, filter1_match, filter2_match, filter3_match, filter4_match, filter5_match, filter_none_match, src_payload_too_small, src_payload_too_big, src_ntp_monlist_req, src_ntp_monlist_resp, src_well_known_port, src_conn_pkt_rate_excd, src_udp_retry_init, src_filter_action_blacklist, src_filter_action_drop, src_filter_action_default_pass, src_filter_action_whitelist, nxdomain_rate_exceed, dns_malform, src_dns_malform, dg_request_check_fail, query_type_any_drop, src_query_type_any_drop, src_udp_auth_drop, src_dns_auth_drop, src_frag_drop, frag_timeout, dg_rate_exceed, pattern_recognition_proceeded, pattern_not_found, pattern_recognition_generic_error, pattern_filter1_match, pattern_filter2_match, pattern_filter3_match, pattern_filter4_match, pattern_filter5_match, pattern_filter_drop, non_query_opcode_pass_through, src_udp_retry_gap_drop, src_filter1_match, src_filter2_match, src_filter3_match, src_filter4_match, src_filter5_match, src_filter_none_match, src_filter_total_not_match, src_filter_auth_fail, filter_total_not_match, sflow_internal_samples_packed, sflow_external_samples_packed, sflow_internal_packets_sent, sflow_external_packets_sent, pattern_recognition_sampling_started, pattern_recognition_pattern_changed, exceed_action_tunnel

counters2

Description ‘src_udp_auth_timeout’: Src UDP Retry Timeout; ‘src_udp_retry_pass’: Src UDP Retry Passed; ‘dst_hw_drop’: Dst Hardware Packets Dropped;

Type: string

Supported Values: src_udp_auth_timeout, src_udp_retry_pass, dst_hw_drop

stats data

  Counter Size Description
       
  nxdomain_rate_exceed 8 NXDOMAIN Response Rate Exceeded
  pattern_filter5_match 8 Extracted Filter5 Match
  outbound_port_bytes_sent 8 Outbound Bytes Forwarded
  fqdn_rate_by_label_count_check 8 FQDN Rate by Label Count Checked
  query_type_srv 8 Query Type SRV
  req_sent 8 DNS Requests Forwarded
  spoof_detect_fail 8 UDP Retry Timeout
  sess_aged 8 Sessions Aged Out
  pattern_filter4_match 8 Extracted Filter4 Match
  pattern_filter1_match 8 Extracted Filter1 Match
  pattern_filter2_match 8 Extracted Filter2 Match
  force_tcp_auth_timeout 8 Auth Force-TCP With UDP Timeout
  udp_auth_pass 8 Auth UDP Passed
  src_dns_fqdn_label_len_exceed 8 Src FQDN Label Length Exceeded
  udp_auth 8 Auth UDP Init
  wellknown_sport_drop 8 UDP SrcPort Wellknown
  query_type_cname 8 Query Type CNAME
  fqdn_stage_2_rate_exceed 8 FQDN Rate Exceeded
  src_filter_total_not_match 8 Src Filter Not Matched on Pkt
  src_udp_retry_init 8 Src UDP Retry Init
  src_payload_too_small 8 Src UDP Payload Too Small
  non_query_opcode_pass_through 8 Non Query Opcode Pass Through
  src_fqdn_label_count_exceed 8 Src FQDN Label Count Exceeded
  sflow_internal_samples_packed 8 Sflow Internal Samples Packed
  src_udp_retry_pass 8 Src UDP Retry Passed
  udp_retry_init 8 UDP Retry Init
  outbound_port_bytes 8 Outbound Bytes Received
  dg_action_default 8 Domain Group Action Default
  sflow_external_packets_sent 8 Sflow External Packets Sent
  dst_hw_drop 8 Dst Hardware Packets Dropped
  port_bytes 8 Inbound Bytes Received
  fqdn_label_count_exceed 8 FQDN Label Count Exceeded
  dns_auth_drop 8 DNS Auth Dropped
  pattern_filter3_match 8 Extracted Filter3 Match
  src_filter5_match 8 Src Filter5 Match
  outbound_port_drop 8 Outbound Packets Dropped
  pattern_recognition_pattern_changed 8 Pattern Recognition: Pattern Change Detected
  filter5_match 8 Filter5 Match
  src_udp_auth_fail 8 Src Auth UDP Failed
  src_udp_retry_gap_drop 8 Src UDP Retry-Gap Dropped
  src_filter4_match 8 Src Filter4 Match
  src_filter_action_default_pass 8 Src Filter Action Default Pass
  query_type_any 8 Query Type ANY
  src_filter_none_match 8 Src Filter No Match
  filter4_match 8 Filter4 Match
  bl 8 Dst Blacklisted
  dg_action_permit 8 Domain Group Action Permit
  src_filter_action_blacklist 8 Src Filter Action Blacklist
  payload_too_small 8 UDP Payload Too Small
  frag_rcvd 8 Fragmented Packets Received
  outbound_port_bytes_drop 8 Outbound Bytes Dropped
  query_type_aaaa 8 Query Type AAAA
  exceed_action_tunnel 8 Exceed Action: Tunnel
  fqdn_label_len_exceed 8 FQDN Label Length Exceeded
  filter1_match 8 Filter1 Match
  ntp_monlist_resp 8 NTP Monlist Response
  sess_create_inbound 8 Inbound Sessions Created
  filter_auth_fail 8 Filter Auth Failed
  exceed_drop_brate_src_pkt 8 Src KiBit Rate Exceeded Count
  dns_auth_resp 8 DNS Auth Responded
  src_filter1_match 8 Src Filter1 Match
  rate_limit_type4 8 Dst Request Rate 5 Exceeded
  rate_limit_type3 8 Dst Request Rate 4 Exceeded
  rate_limit_type2 8 Dst Request Rate 3 Exceeded
  rate_limit_type1 8 Dst Request Rate 2 Exceeded
  rate_limit_type0 8 Dst Request Rate 1 Exceeded
  rrtype_drop 8 Record Type Dropped
  req_retrans 8 Request Retransmit
  udp_auth_retry_gap_drop 8 Auth UDP Retry-Gap Dropped
  src_udp_auth_drop 8 Src UDP Auth Dropped
  sflow_external_samples_packed 8 Sflow External Samples Packed
  filter_total_not_match 8 Filter Not Matched on Pkt
  src_drop 8 Src Packets Dropped
  query_type_a 8 Query Type A
  sflow_internal_packets_sent 8 Sflow Internal Packets Sent
  dg_action_deny 8 Domain Group Action Deny
  udp_auth_retry_fail 8 Auth UDP Retry Failed
  query_type_mx 8 Query Type MX
  port_drop 8 Inbound Packets Dropped
  filter_none_match 8 Filter No Match
  src_filter3_match 8 Src Filter3 Match
  ntp_monlist_req 8 NTP Monlist Request
  payload_too_big 8 UDP Payload Too Large
  port_conn_rate_exceed 8 Conn Rate Exceeded
  src_dns_malform 8 Src Malform Query
  req_size_exceed 8 Request Size Exceeded
  query_type_soa 8 Query Type SOA
  port_kbit_rate_exceed_pkt 8 KiBit Rate Exceeded Count
  dns_malform_drop 8 Malform Query Dropped
  dns_query_class_in 8 Query Class INTERNET
  port_bytes_sent 8 Inbound Bytes Forwarded
  exceed_drop_brate_src 8 Src KiBit Rate Exceeded
  udp_retry_pass 8 UDP Retry Passed
  src_frag_drop 8 Src Fragmented Packets Dropped
  port_kbit_rate_exceed 8 KiBit Rate Exceeded
  udp_retry_gap_drop 8 UDP Retry-Gap Dropped
  filter_action_whitelist 8 Filter Action Whitelist
  src_conn_pkt_rate_excd 8 Src UDP Conn Pkt Rate Exceeded
  port_src_bl 8 Src Blacklisted
  frag_timeout 8 Fragmented Packets Timeout
  dg_request_check_fail 8 Domain Group Request Check Fail
  src_udp_auth 8 Src Auth UDP Init
  outbound_port_pkt_sent 8 Outbound Packets Forwarded
  sess_create_outbound 8 Outbound Sessions Created
  pattern_filter_drop 8 Extracted Filter Drop
  pattern_recognition_proceeded 8 Pattern Recognition: Engine Started
  sess_create 8 Session Create
  src_well_known_port 8 Src UDP SrcPort Wellknown
  filter_action_blacklist 8 Filter Action Blacklist
  dns_query_class_csnet 8 Query Class CSNET
  port_pkt_sent 8 Inbound Packets Forwarded
  src_dns_malform_drop 8 Src Malform Query Dropped
  query_type_opt 8 Query Type OPT
  src_filter_auth_fail 8 Src Filter Auth Failed
  src_filter_action_whitelist 8 Src Filter Action Whitelist
  src_query_type_any_drop 8 Src Query Type ANY Dropped
  src_payload_too_big 8 Src UDP Payload Too Large
  filter2_match 8 Filter2 Match
  frag_drop 8 Fragmented Packets Dropped
  pattern_not_found 8 Pattern Recognition: Pattern Not Found
  dns_query_class_hs 8 Query Class HESIOD
  dns_query_class_none 8 Query Class NONE
  port_conn_limm_exceed 8 Conn Limit Exceeded
  filter3_match 8 Filter3 Match
  src_ntp_monlist_resp 8 Src NTP Monlist Response
  src_rate_limit_type0 8 Src Request Rate 1 Exceeded
  src_rate_limit_type1 8 Src Request Rate 2 Exceeded
  src_filter2_match 8 Src Filter2 Match
  is_nxdomain 8 NXDOMAIN Response
  dns_malform 8 Malform Query
  port_bytes_drop 8 Inbound Bytes Dropped
  exceed_drop_prate_src 8 Src Pkt Rate Exceeded
  src_rate_limit_type4 8 Src Request Rate 5 Exceeded
  src_rate_limit_type2 8 Src Request Rate 3 Exceeded
  src_rate_limit_type3 8 Src Request Rate 4 Exceeded
  exceed_drop_climit_src 8 Src Conn Limit Exceeded
  udp_auth_drop 8 UDP Auth Dropped
  pattern_recognition_generic_error 8 Pattern Recognition: Exceptions
  query_type_any_drop 8 Query Type ANY Dropped
  src_ntp_monlist_req 8 Src NTP Monlist Request
  nxdomain_bl_drop 8 NXDOMAIN Response Blacklisted
  pattern_recognition_sampling_started 8 Pattern Recognition: Sampling Started
  dns_query_class_chaos 8 Query Class CHAOS
  query_type_ns 8 Query Type NS
  filter_action_default_pass 8 Filter Action Default Pass
  nxdomain_drop 8 NXDOMAIN Response Dropped
  filter_action_drop 8 Filter Action Drop
  src_dns_auth_drop 8 Src DNS Auth Dropped
  dns_query_class_whitelist_miss 8 Query Class Whitelist Miss
  port_pkt_rate_exceed 8 Packet Rate Exceeded
  outbound_port_rcvd 8 Outbound Packets Received
  dns_query_class_any 8 Query Class ANY
  dg_rate_exceed 8 Domain Group Domain Query Rate Exceeded
  port_rcvd 8 Inbound Packets Received
  src_force_tcp_auth 8 Src Auth Force-TCP
  force_tcp_auth 8 Auth Force-TCP
  conn_prate_excd 8 UDP Conn Pkt Rate Exceeded
  exceed_drop_crate_src 8 Src Conn Rate Exceeded
  src_udp_auth_timeout 8 Src UDP Retry Timeout
  udp_auth_fail 8 Auth UDP Failed
  src_filter_action_drop 8 Src Filter Action Drop
  fqdn_rate_by_label_count_exceed 8 FQDN Rate by Label Count Exceeded