ddos dns-udp-port¶
ddos dst dns-udp port counters
dns-udp-port Specification¶
Type Collection Object Key(s) sampling-enable Collection Name dns-udp-port-list Collection URI /axapi/v3/ddos/dns-udp-port Element Name dns-udp-port Element URI /axapi/v3/ddos/dns-udp-port/{sampling-enable} Element Attributes dns-udp-port_attributes Statistics Data URI /axapi/v3/ddos/dns-udp-port/{sampling-enable}/stats Schema dns-udp-port schema
Operations Allowed:
Operation | Method | URI | Payload | |
---|---|---|---|---|
Create Object | POST | /axapi/v3/ddos/dns-udp-port | ||
Create List | POST | /axapi/v3/ddos/dns-udp-port | ||
Get Object | GET | /axapi/v3/ddos/dns-udp-port/{sampling-enable} | ||
Get List | GET | /axapi/v3/ddos/dns-udp-port | ||
Modify Object | POST | /axapi/v3/ddos/dns-udp-port/{sampling-enable} | ||
Replace Object | PUT | /axapi/v3/ddos/dns-udp-port/{sampling-enable} | ||
Replace List | PUT | /axapi/v3/ddos/dns-udp-port | ||
Delete Object | DELETE | /axapi/v3/ddos/dns-udp-port/{sampling-enable} |
dns-udp-port-list¶
dns-udp-port-list is JSON List of dns-udp-port attributes
dns-udp-port-list : [
]
dns-udp-port attributes¶
sampling-enable
Type: List
sampling-enable¶
Specification Type list Block object keys counters1
Description ‘all’: all; ‘force_tcp_auth’: Auth Force-TCP; ‘udp_auth’: Auth UDP Init; ‘rate_limit_type0’: Dst Request Rate 1 Exceeded; ‘rate_limit_type1’: Dst Request Rate 2 Exceeded; ‘rate_limit_type2’: Dst Request Rate 3 Exceeded; ‘rate_limit_type3’: Dst Request Rate 4 Exceeded; ‘rate_limit_type4’: Dst Request Rate 5 Exceeded; ‘nxdomain_bl_drop’: NXDOMAIN Response Blacklisted; ‘is_nxdomain’: NXDOMAIN Response; ‘nxdomain_drop’: NXDOMAIN Response Dropped; ‘udp_auth_fail’: Auth UDP Failed; ‘dns_malform_drop’: Malform Query Dropped; ‘fqdn_stage_2_rate_exceed’: FQDN Rate Exceeded; ‘req_sent’: DNS Requests Forwarded; ‘req_size_exceed’: Request Size Exceeded; ‘req_retrans’: Request Retransmit; ‘fqdn_label_len_exceed’: FQDN Label Length Exceeded; ‘query_type_a’: Query Type A; ‘query_type_aaaa’: Query Type AAAA; ‘query_type_ns’: Query Type NS; ‘query_type_cname’: Query Type CNAME; ‘query_type_any’: Query Type ANY; ‘query_type_srv’: Query Type SRV; ‘query_type_mx’: Query Type MX; ‘query_type_soa’: Query Type SOA; ‘query_type_opt’: Query Type OPT; ‘port_rcvd’: Inbound Packets Received; ‘port_drop’: Inbound Packets Dropped; ‘port_pkt_sent’: Inbound Packets Forwarded; ‘port_pkt_rate_exceed’: Packet Rate Exceeded; ‘port_kbit_rate_exceed’: KiBit Rate Exceeded; ‘port_conn_rate_exceed’: Conn Rate Exceeded; ‘port_conn_limm_exceed’: Conn Limit Exceeded; ‘dg_action_permit’: Domain Group Action Permit; ‘dg_action_deny’: Domain Group Action Deny; ‘dg_action_default’: Domain Group Action Default; ‘port_bytes’: Inbound Bytes Received; ‘outbound_port_bytes’: Outbound Bytes Received; ‘outbound_port_rcvd’: Outbound Packets Received; ‘outbound_port_pkt_sent’: Outbound Packets Forwarded; ‘port_bytes_sent’: Inbound Bytes Forwarded; ‘port_bytes_drop’: Inbound Bytes Dropped; ‘port_src_bl’: Src Blacklisted; ‘filter_auth_fail’: Filter Auth Failed; ‘spoof_detect_fail’: UDP Retry Timeout; ‘sess_create’: Session Create; ‘filter_action_blacklist’: Filter Action Blacklist; ‘filter_action_drop’: Filter Action Drop; ‘filter_action_default_pass’: Filter Action Default Pass; ‘filter_action_whitelist’: Filter Action Whitelist; ‘exceed_drop_prate_src’: Src Pkt Rate Exceeded; ‘exceed_drop_crate_src’: Src Conn Rate Exceeded; ‘exceed_drop_climit_src’: Src Conn Limit Exceeded; ‘exceed_drop_brate_src’: Src KiBit Rate Exceeded; ‘outbound_port_bytes_sent’: Outbound Bytes Forwarded; ‘outbound_port_drop’: Outbound Packets Dropped; ‘outbound_port_bytes_drop’: Outbound Bytes Dropped; ‘udp_auth_retry_fail’: Auth UDP Retry Failed; ‘src_rate_limit_type0’: Src Request Rate 1 Exceeded; ‘src_rate_limit_type1’: Src Request Rate 2 Exceeded; ‘src_rate_limit_type2’: Src Request Rate 3 Exceeded; ‘src_rate_limit_type3’: Src Request Rate 4 Exceeded; ‘src_rate_limit_type4’: Src Request Rate 5 Exceeded; ‘exceed_drop_brate_src_pkt’: Src KiBit Rate Exceeded Count; ‘port_kbit_rate_exceed_pkt’: KiBit Rate Exceeded Count; ‘udp_retry_init’: UDP Retry Init; ‘conn_prate_excd’: UDP Conn Pkt Rate Exceeded; ‘ntp_monlist_req’: NTP Monlist Request; ‘ntp_monlist_resp’: NTP Monlist Response; ‘wellknown_sport_drop’: UDP SrcPort Wellknown; ‘payload_too_small’: UDP Payload Too Small; ‘payload_too_big’: UDP Payload Too Large; ‘fqdn_rate_by_label_count_check’: FQDN Rate by Label Count Checked; ‘fqdn_rate_by_label_count_exceed’: FQDN Rate by Label Count Exceeded; ‘udp_auth_retry_gap_drop’: Auth UDP Retry-Gap Dropped; ‘fqdn_label_count_exceed’: FQDN Label Count Exceeded; ‘rrtype_drop’: Record Type Dropped; ‘src_dns_fqdn_label_len_exceed’: Src FQDN Label Length Exceeded; ‘src_fqdn_label_count_exceed’: Src FQDN Label Count Exceeded; ‘src_udp_auth_fail’: Src Auth UDP Failed; ‘src_force_tcp_auth’: Src Auth Force-TCP; ‘src_dns_malform_drop’: Src Malform Query Dropped; ‘src_udp_auth’: Src Auth UDP Init; ‘udp_auth_pass’: Auth UDP Passed; ‘force_tcp_auth_timeout’: Auth Force-TCP With UDP Timeout; ‘udp_auth_drop’: UDP Auth Dropped; ‘dns_auth_drop’: DNS Auth Dropped; ‘dns_auth_resp’: DNS Auth Responded; ‘dns_query_class_in’: Query Class INTERNET; ‘dns_query_class_csnet’: Query Class CSNET; ‘dns_query_class_chaos’: Query Class CHAOS; ‘dns_query_class_hs’: Query Class HESIOD; ‘dns_query_class_none’: Query Class NONE; ‘dns_query_class_any’: Query Class ANY; ‘dns_query_class_whitelist_miss’: Query Class Whitelist Miss; ‘bl’: Dst Blacklisted; ‘src_drop’: Src Packets Dropped; ‘frag_rcvd’: Fragmented Packets Received; ‘frag_drop’: Fragmented Packets Dropped; ‘sess_create_inbound’: Inbound Sessions Created; ‘sess_create_outbound’: Outbound Sessions Created; ‘sess_aged’: Sessions Aged Out; ‘udp_retry_pass’: UDP Retry Passed; ‘udp_retry_gap_drop’: UDP Retry-Gap Dropped; ‘filter1_match’: Filter1 Match; ‘filter2_match’: Filter2 Match; ‘filter3_match’: Filter3 Match; ‘filter4_match’: Filter4 Match; ‘filter5_match’: Filter5 Match; ‘filter_none_match’: Filter No Match; ‘src_payload_too_small’: Src UDP Payload Too Small; ‘src_payload_too_big’: Src UDP Payload Too Large; ‘src_ntp_monlist_req’: Src NTP Monlist Request; ‘src_ntp_monlist_resp’: Src NTP Monlist Response; ‘src_well_known_port’: Src UDP SrcPort Wellknown; ‘src_conn_pkt_rate_excd’: Src UDP Conn Pkt Rate Exceeded; ‘src_udp_retry_init’: Src UDP Retry Init; ‘src_filter_action_blacklist’: Src Filter Action Blacklist; ‘src_filter_action_drop’: Src Filter Action Drop; ‘src_filter_action_default_pass’: Src Filter Action Default Pass; ‘src_filter_action_whitelist’: Src Filter Action Whitelist; ‘nxdomain_rate_exceed’: NXDOMAIN Response Rate Exceeded; ‘dns_malform’: Malform Query; ‘src_dns_malform’: Src Malform Query; ‘dg_request_check_fail’: Domain Group Request Check Fail; ‘query_type_any_drop’: Query Type ANY Dropped; ‘src_query_type_any_drop’: Src Query Type ANY Dropped; ‘src_udp_auth_drop’: Src UDP Auth Dropped; ‘src_dns_auth_drop’: Src DNS Auth Dropped; ‘src_frag_drop’: Src Fragmented Packets Dropped; ‘frag_timeout’: Fragmented Packets Timeout; ‘dg_rate_exceed’: Domain Group Domain Query Rate Exceeded; ‘pattern_recognition_proceeded’: Pattern Recognition: Engine Started; ‘pattern_not_found’: Pattern Recognition: Pattern Not Found; ‘pattern_recognition_generic_error’: Pattern Recognition: Exceptions; ‘pattern_filter1_match’: Extracted Filter1 Match; ‘pattern_filter2_match’: Extracted Filter2 Match; ‘pattern_filter3_match’: Extracted Filter3 Match; ‘pattern_filter4_match’: Extracted Filter4 Match; ‘pattern_filter5_match’: Extracted Filter5 Match; ‘pattern_filter_drop’: Extracted Filter Drop; ‘non_query_opcode_pass_through’: Non Query Opcode Pass Through; ‘src_udp_retry_gap_drop’: Src UDP Retry-Gap Dropped; ‘src_filter1_match’: Src Filter1 Match; ‘src_filter2_match’: Src Filter2 Match; ‘src_filter3_match’: Src Filter3 Match; ‘src_filter4_match’: Src Filter4 Match; ‘src_filter5_match’: Src Filter5 Match; ‘src_filter_none_match’: Src Filter No Match; ‘src_filter_total_not_match’: Src Filter Not Matched on Pkt; ‘src_filter_auth_fail’: Src Filter Auth Failed; ‘filter_total_not_match’: Filter Not Matched on Pkt; ‘sflow_internal_samples_packed’: Sflow Internal Samples Packed; ‘sflow_external_samples_packed’: Sflow External Samples Packed; ‘sflow_internal_packets_sent’: Sflow Internal Packets Sent; ‘sflow_external_packets_sent’: Sflow External Packets Sent; ‘pattern_recognition_sampling_started’: Pattern Recognition: Sampling Started; ‘pattern_recognition_pattern_changed’: Pattern Recognition: Pattern Change Detected; ‘exceed_action_tunnel’: Exceed Action: Tunnel;
Type: string
Supported Values: all, force_tcp_auth, udp_auth, rate_limit_type0, rate_limit_type1, rate_limit_type2, rate_limit_type3, rate_limit_type4, nxdomain_bl_drop, is_nxdomain, nxdomain_drop, udp_auth_fail, dns_malform_drop, fqdn_stage_2_rate_exceed, req_sent, req_size_exceed, req_retrans, fqdn_label_len_exceed, query_type_a, query_type_aaaa, query_type_ns, query_type_cname, query_type_any, query_type_srv, query_type_mx, query_type_soa, query_type_opt, port_rcvd, port_drop, port_pkt_sent, port_pkt_rate_exceed, port_kbit_rate_exceed, port_conn_rate_exceed, port_conn_limm_exceed, dg_action_permit, dg_action_deny, dg_action_default, port_bytes, outbound_port_bytes, outbound_port_rcvd, outbound_port_pkt_sent, port_bytes_sent, port_bytes_drop, port_src_bl, filter_auth_fail, spoof_detect_fail, sess_create, filter_action_blacklist, filter_action_drop, filter_action_default_pass, filter_action_whitelist, exceed_drop_prate_src, exceed_drop_crate_src, exceed_drop_climit_src, exceed_drop_brate_src, outbound_port_bytes_sent, outbound_port_drop, outbound_port_bytes_drop, udp_auth_retry_fail, src_rate_limit_type0, src_rate_limit_type1, src_rate_limit_type2, src_rate_limit_type3, src_rate_limit_type4, exceed_drop_brate_src_pkt, port_kbit_rate_exceed_pkt, udp_retry_init, conn_prate_excd, ntp_monlist_req, ntp_monlist_resp, wellknown_sport_drop, payload_too_small, payload_too_big, fqdn_rate_by_label_count_check, fqdn_rate_by_label_count_exceed, udp_auth_retry_gap_drop, fqdn_label_count_exceed, rrtype_drop, src_dns_fqdn_label_len_exceed, src_fqdn_label_count_exceed, src_udp_auth_fail, src_force_tcp_auth, src_dns_malform_drop, src_udp_auth, udp_auth_pass, force_tcp_auth_timeout, udp_auth_drop, dns_auth_drop, dns_auth_resp, dns_query_class_in, dns_query_class_csnet, dns_query_class_chaos, dns_query_class_hs, dns_query_class_none, dns_query_class_any, dns_query_class_whitelist_miss, bl, src_drop, frag_rcvd, frag_drop, sess_create_inbound, sess_create_outbound, sess_aged, udp_retry_pass, udp_retry_gap_drop, filter1_match, filter2_match, filter3_match, filter4_match, filter5_match, filter_none_match, src_payload_too_small, src_payload_too_big, src_ntp_monlist_req, src_ntp_monlist_resp, src_well_known_port, src_conn_pkt_rate_excd, src_udp_retry_init, src_filter_action_blacklist, src_filter_action_drop, src_filter_action_default_pass, src_filter_action_whitelist, nxdomain_rate_exceed, dns_malform, src_dns_malform, dg_request_check_fail, query_type_any_drop, src_query_type_any_drop, src_udp_auth_drop, src_dns_auth_drop, src_frag_drop, frag_timeout, dg_rate_exceed, pattern_recognition_proceeded, pattern_not_found, pattern_recognition_generic_error, pattern_filter1_match, pattern_filter2_match, pattern_filter3_match, pattern_filter4_match, pattern_filter5_match, pattern_filter_drop, non_query_opcode_pass_through, src_udp_retry_gap_drop, src_filter1_match, src_filter2_match, src_filter3_match, src_filter4_match, src_filter5_match, src_filter_none_match, src_filter_total_not_match, src_filter_auth_fail, filter_total_not_match, sflow_internal_samples_packed, sflow_external_samples_packed, sflow_internal_packets_sent, sflow_external_packets_sent, pattern_recognition_sampling_started, pattern_recognition_pattern_changed, exceed_action_tunnel
counters2
Description ‘src_udp_auth_timeout’: Src UDP Retry Timeout; ‘src_udp_retry_pass’: Src UDP Retry Passed; ‘dst_hw_drop’: Dst Hardware Packets Dropped;
Type: string
Supported Values: src_udp_auth_timeout, src_udp_retry_pass, dst_hw_drop
stats data¶
Counter | Size | Description | |
---|---|---|---|
nxdomain_rate_exceed | 8 | NXDOMAIN Response Rate Exceeded | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
fqdn_rate_by_label_count_check | 8 | FQDN Rate by Label Count Checked | |
query_type_srv | 8 | Query Type SRV | |
req_sent | 8 | DNS Requests Forwarded | |
spoof_detect_fail | 8 | UDP Retry Timeout | |
sess_aged | 8 | Sessions Aged Out | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
force_tcp_auth_timeout | 8 | Auth Force-TCP With UDP Timeout | |
udp_auth_pass | 8 | Auth UDP Passed | |
src_dns_fqdn_label_len_exceed | 8 | Src FQDN Label Length Exceeded | |
udp_auth | 8 | Auth UDP Init | |
wellknown_sport_drop | 8 | UDP SrcPort Wellknown | |
query_type_cname | 8 | Query Type CNAME | |
fqdn_stage_2_rate_exceed | 8 | FQDN Rate Exceeded | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
src_udp_retry_init | 8 | Src UDP Retry Init | |
src_payload_too_small | 8 | Src UDP Payload Too Small | |
non_query_opcode_pass_through | 8 | Non Query Opcode Pass Through | |
src_fqdn_label_count_exceed | 8 | Src FQDN Label Count Exceeded | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
src_udp_retry_pass | 8 | Src UDP Retry Passed | |
udp_retry_init | 8 | UDP Retry Init | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
dg_action_default | 8 | Domain Group Action Default | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
port_bytes | 8 | Inbound Bytes Received | |
fqdn_label_count_exceed | 8 | FQDN Label Count Exceeded | |
dns_auth_drop | 8 | DNS Auth Dropped | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
src_filter5_match | 8 | Src Filter5 Match | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
filter5_match | 8 | Filter5 Match | |
src_udp_auth_fail | 8 | Src Auth UDP Failed | |
src_udp_retry_gap_drop | 8 | Src UDP Retry-Gap Dropped | |
src_filter4_match | 8 | Src Filter4 Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
query_type_any | 8 | Query Type ANY | |
src_filter_none_match | 8 | Src Filter No Match | |
filter4_match | 8 | Filter4 Match | |
bl | 8 | Dst Blacklisted | |
dg_action_permit | 8 | Domain Group Action Permit | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
payload_too_small | 8 | UDP Payload Too Small | |
frag_rcvd | 8 | Fragmented Packets Received | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
query_type_aaaa | 8 | Query Type AAAA | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
fqdn_label_len_exceed | 8 | FQDN Label Length Exceeded | |
filter1_match | 8 | Filter1 Match | |
ntp_monlist_resp | 8 | NTP Monlist Response | |
sess_create_inbound | 8 | Inbound Sessions Created | |
filter_auth_fail | 8 | Filter Auth Failed | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
dns_auth_resp | 8 | DNS Auth Responded | |
src_filter1_match | 8 | Src Filter1 Match | |
rate_limit_type4 | 8 | Dst Request Rate 5 Exceeded | |
rate_limit_type3 | 8 | Dst Request Rate 4 Exceeded | |
rate_limit_type2 | 8 | Dst Request Rate 3 Exceeded | |
rate_limit_type1 | 8 | Dst Request Rate 2 Exceeded | |
rate_limit_type0 | 8 | Dst Request Rate 1 Exceeded | |
rrtype_drop | 8 | Record Type Dropped | |
req_retrans | 8 | Request Retransmit | |
udp_auth_retry_gap_drop | 8 | Auth UDP Retry-Gap Dropped | |
src_udp_auth_drop | 8 | Src UDP Auth Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
src_drop | 8 | Src Packets Dropped | |
query_type_a | 8 | Query Type A | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
dg_action_deny | 8 | Domain Group Action Deny | |
udp_auth_retry_fail | 8 | Auth UDP Retry Failed | |
query_type_mx | 8 | Query Type MX | |
port_drop | 8 | Inbound Packets Dropped | |
filter_none_match | 8 | Filter No Match | |
src_filter3_match | 8 | Src Filter3 Match | |
ntp_monlist_req | 8 | NTP Monlist Request | |
payload_too_big | 8 | UDP Payload Too Large | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_dns_malform | 8 | Src Malform Query | |
req_size_exceed | 8 | Request Size Exceeded | |
query_type_soa | 8 | Query Type SOA | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
dns_malform_drop | 8 | Malform Query Dropped | |
dns_query_class_in | 8 | Query Class INTERNET | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
udp_retry_pass | 8 | UDP Retry Passed | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
udp_retry_gap_drop | 8 | UDP Retry-Gap Dropped | |
filter_action_whitelist | 8 | Filter Action Whitelist | |
src_conn_pkt_rate_excd | 8 | Src UDP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
frag_timeout | 8 | Fragmented Packets Timeout | |
dg_request_check_fail | 8 | Domain Group Request Check Fail | |
src_udp_auth | 8 | Src Auth UDP Init | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
sess_create | 8 | Session Create | |
src_well_known_port | 8 | Src UDP SrcPort Wellknown | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
dns_query_class_csnet | 8 | Query Class CSNET | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
src_dns_malform_drop | 8 | Src Malform Query Dropped | |
query_type_opt | 8 | Query Type OPT | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
src_filter_action_whitelist | 8 | Src Filter Action Whitelist | |
src_query_type_any_drop | 8 | Src Query Type ANY Dropped | |
src_payload_too_big | 8 | Src UDP Payload Too Large | |
filter2_match | 8 | Filter2 Match | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognition: Pattern Not Found | |
dns_query_class_hs | 8 | Query Class HESIOD | |
dns_query_class_none | 8 | Query Class NONE | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
src_ntp_monlist_resp | 8 | Src NTP Monlist Response | |
src_rate_limit_type0 | 8 | Src Request Rate 1 Exceeded | |
src_rate_limit_type1 | 8 | Src Request Rate 2 Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
is_nxdomain | 8 | NXDOMAIN Response | |
dns_malform | 8 | Malform Query | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
src_rate_limit_type4 | 8 | Src Request Rate 5 Exceeded | |
src_rate_limit_type2 | 8 | Src Request Rate 3 Exceeded | |
src_rate_limit_type3 | 8 | Src Request Rate 4 Exceeded | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
udp_auth_drop | 8 | UDP Auth Dropped | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
query_type_any_drop | 8 | Query Type ANY Dropped | |
src_ntp_monlist_req | 8 | Src NTP Monlist Request | |
nxdomain_bl_drop | 8 | NXDOMAIN Response Blacklisted | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
dns_query_class_chaos | 8 | Query Class CHAOS | |
query_type_ns | 8 | Query Type NS | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
nxdomain_drop | 8 | NXDOMAIN Response Dropped | |
filter_action_drop | 8 | Filter Action Drop | |
src_dns_auth_drop | 8 | Src DNS Auth Dropped | |
dns_query_class_whitelist_miss | 8 | Query Class Whitelist Miss | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
dns_query_class_any | 8 | Query Class ANY | |
dg_rate_exceed | 8 | Domain Group Domain Query Rate Exceeded | |
port_rcvd | 8 | Inbound Packets Received | |
src_force_tcp_auth | 8 | Src Auth Force-TCP | |
force_tcp_auth | 8 | Auth Force-TCP | |
conn_prate_excd | 8 | UDP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
src_udp_auth_timeout | 8 | Src UDP Retry Timeout | |
udp_auth_fail | 8 | Auth UDP Failed | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
fqdn_rate_by_label_count_exceed | 8 | FQDN Rate by Label Count Exceeded |