ddos dst zone port zone-service¶
DDOS Port & Protocol configuration
zone-service Specification¶
Type
Collection
Object Key(s)
port-num, protocol
Collection Name
Collection URI
/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service
Element Name
zone-service
Element URI
/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}
Element Attributes
zone-service_attributes
Statistics Data URI
/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/stats
Operational Data URI
/axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/oper
Schema
Operations Allowed:
Operation | Method | URI | Payload | |
---|---|---|---|---|
Create Object | POST | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Create List | POST | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Get Object | GET | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} | ||
Get List | GET | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Modify Object | POST | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} | ||
Replace Object | PUT | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} | ||
Replace List | PUT | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Delete Object | DELETE | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} |
zone-service-list¶
zone-service-list is JSON List of zone-service attributes
zone-service-list : [
]
zone-service attributes¶
age
Description Idle age for ip entry
Type: number
Range: 2-1023
Default: 5
apply-policy-on-overflow
Description Enable this flag to apply overflow policy when dynamic entry count overflows
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
capture-config
Description: capture-config is a JSON Block. Please see below for capture-config
Type: Object
default-action-list
Description Configure default-action-list
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/action-list
deny
Description Blacklist and Drop all incoming packets for protocol
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
dynamic-entry-overflow-policy-list
enable-class-list-overflow
Description Apply class-list overflow policy upon exceeding dynamic entry count specified for zone-port or class-list
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
enable-top-k
Description Enable ddos top-k source IP detection
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
enable-top-k-destination
Description Enable ddos top-k destination IP detection
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
glid-cfg
Description: glid-cfg is a JSON Block. Please see below for glid-cfg
Type: Object
ips
Description: ips is a JSON Block. Please see below for ips
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/ips
level-list
Type: List
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/level/{level-num}
manual-mode-enable
Description Toggle manual mode to use fix templates
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
manual-mode-list
Type: List
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/manual-mode/{config}
max-dynamic-entry-count
Description Maximum count for dynamic source zone service entry
Type: number
Range: 0-2147483647
outbound-only
Description Only allow outbound traffic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
pattern-recognition
Description: pattern-recognition is a JSON Block. Please see below for pattern-recognition
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/pattern-recognition
pattern-recognition-pu-details
Description: pattern-recognition-pu-details is a JSON Block. Please see below for pattern-recognition-pu-details
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/pattern-recognition-pu-details
port-ind
Description: port-ind is a JSON Block. Please see below for port-ind
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/port-ind
port-num
Description Port Number
Type: number
Range: 1-65535
protocol
Description ‘dns-tcp’: DNS-TCP Port; ‘dns-udp’: DNS-UDP Port; ‘http’: HTTP Port; ‘tcp’: TCP Port; ‘udp’: UDP Port; ‘ssl-l4’: SSL-L4 Port; ‘sip-udp’: SIP-UDP Port; ‘sip-tcp’: SIP-TCP Port; ‘quic’: QUIC Port;
Type: string
Supported Values: dns-tcp, dns-udp, http, tcp, udp, ssl-l4, sip-udp, sip-tcp, quic
set-counter-base-val
Description Set T2 counter value of current context to specified value
Type: number
Range: 1-4294967295
sflow-common
Description Enable all sFlow polling options under this zone port
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-commonsflow-packets, sflow-tcp-basic, sflow-tcp-stateful and sflow-http are mutually exclusive
sflow-http
Description Enable sFlow HTTP counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-http and sflow-common are mutually exclusive
sflow-packets
Description Enable sFlow packet-level counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-packets and sflow-common are mutually exclusive
sflow-tcp
Description: sflow-tcp is a JSON Block. Please see below for sflow-tcp
Type: Object
signature-extraction
Description: signature-extraction is a JSON Block. Please see below for signature-extraction
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/signature-extraction
src-based-policy-list
stateful
Description Enable stateful tracking of sessions (Default is stateless)
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
topk-destinations
Description: topk-destinations is a JSON Block. Please see below for topk-destinations
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/topk-destinations
topk-dst-num-records
Description Maximum number of records to show in topk
Type: number
Range: 1-100
Default: 20
topk-num-records
Description Maximum number of records to show in topk
Type: number
Range: 1-100
Default: 20
topk-sources
Description: topk-sources is a JSON Block. Please see below for topk-sources
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/topk-sources
unlimited-dynamic-entry-count
Description No limit for maximum dynamic src entry count
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for zone-template
Type: Object
pattern-recognition¶
Specification
Type
object
algorithm
Description ‘heuristic’: heuristic algorithm;
Type: string
Supported Values: heuristic
capture-traffic
Description ‘all’: Capture all packets; ‘dropped’: Capture dropped packets (default);
Type: string
Supported Values: all, dropped
filter-inactive-threshold
Description Extracted filter inactive threshold
Type: number
Range: 5-255
filter-threshold
Description Extracted filter threshold
Type: number
Range: 0-100
mode
Description ‘capture-never-expire’: War-time capture without rate exceeding and never expires; ‘manual’: Manual mode;
Type: string
Supported Values: capture-never-expire, manual
sensitivity
Description ‘high’: High Sensitivity; ‘medium’: Medium Sensitivity; ‘low’: Low Sensitivity;
Type: string
Supported Values: high, medium, low
triggered-by
Description ‘zone-escalation’: Zone escalation trigger pattern recognition; ‘packet-rate-exceeds’: Packet rate limit exceeds trigger pattern recognition (default);
Type: string
Supported Values: zone-escalation, packet-rate-exceeds
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
ips¶
Specification
Type
object
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
glid-cfg¶
Specification
Type
object
action-list
Description Configure action-list to take
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/action-list
glid
Description Global limit ID for the whole zone
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
glid-action
Description ‘drop’: Drop packets for glid exceed (Default if default-action-list is not configured); ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, ignore
per-addr-glid
Description Global limit ID per address
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
zone-template¶
Specification
Type
object
ips
Description IPS template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
signature-extraction¶
Specification
Type
object
algorithm
Description ‘heuristic’: heuristic algorithm;
Type: string
Supported Values: heuristic
manual-mode
Description Enable manual mode
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
level-list¶
Specification
Type
list
Block object keys
apply-extracted-filters
Description Apply extracted filters from this level
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
glid-action
Description ‘drop’: Drop packets for glid exceed (Default); ‘blacklist-src’: Blacklist-src for glid exceed; ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, blacklist-src, ignore
indicator-list
Type: List
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/level/{level-num}/indicator/{type}
level-num
Description ‘0’: Default policy level; ‘1’: Policy level 1; ‘2’: Policy level 2; ‘3’: Policy level 3; ‘4’: Policy level 4;
Type: string
Supported Values: 0, 1, 2, 3, 4
src-default-glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
src-escalation-score
Description Source activation score of this level
Type: number
Range: 1-1000000
src-violation-actions
Description Violation actions apply due to source escalate from this level
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
start-pattern-recognition
Description Start pattern recognition from this level
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
start-signature-extraction
Description Start signature extraction from this level
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-escalation-score
Description Zone activation score of this level
Type: number
Range: 1-1000000
zone-template
Description: zone-template is a JSON Block. Please see below for level-list_zone-template
Type: Object
zone-violation-actions
Description Violation actions apply due to zone escalate from this level
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
level-list_zone-template¶
Specification
Type
object
dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
level-list_indicator-list¶
Specification
Type
list
Block object keys
data-packet-size
Description Expected minimal data size
Type: number
Range: 1-1500
score
Description Score corresponding to the indicator
Type: number
Range: 1-1000000
src-threshold-num
Description Indicator per-src threshold
Type: number
Range: 1-2147483647
src-threshold-str
Description Indicator per-src threshold (Non-zero floating point)
Type: string
Maximum Length: 128 characters
Maximum Length: 1 characters
src-violation-actions
Description Violation actions to use when this src indicator threshold reaches
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
tcp-window-size
Description Expected minimal window size
Type: number
Range: 1-500
type
Description ‘pkt-rate’: rate of incoming packets; ‘pkt-drop-rate’: rate of packets got dropped; ‘bit-rate’: rate of incoming bits; ‘pkt-drop-ratio’: ratio of incoming packet rate divided by the rate of dropping packets; ‘bytes-to-bytes-from-ratio’: ratio of incoming packet rate divided by the rate of outgoing packets; ‘concurrent-conns’: number of concurrent connections; ‘conn-miss-rate’: rate of incoming packets for which no previously established connection exists; ‘syn-rate’: rate on incoming SYN packets; ‘fin-rate’: rate on incoming FIN packets; ‘rst-rate’: rate of incoming RST packets; ‘small-window-ack-rate’: rate of small window advertisement; ‘empty-ack-rate’: rate of incoming packets which have no payload; ‘small-payload-rate’: rate of short payload packet; ‘syn-fin-ratio’: ratio of incoming SYN packet rate divided by the rate of incoming FIN packets; ‘cpu-utilization’: average data CPU utilization; ‘interface-utilization’: outside interface utilization;
Type: string
Supported Values: pkt-rate, pkt-drop-rate, bit-rate, pkt-drop-ratio, bytes-to-bytes-from-ratio, concurrent-conns, conn-miss-rate, syn-rate, fin-rate, rst-rate, small-window-ack-rate, empty-ack-rate, small-payload-rate, syn-fin-ratio, cpu-utilization, interface-utilization
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-threshold-num
Description Threshold for the entire zone
Type: number
Range: 1-2147483647
zone-threshold-str
Description Threshold for the entire zone (Non-zero floating point)
Type: string
Maximum Length: 128 characters
Maximum Length: 1 characters
zone-violation-actions
Description Violation actions to use when this zone indicator threshold reaches
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
manual-mode-list¶
Specification
Type
list
Block object keys
config
Description ‘configuration’: Manual-mode configuration;
Type: string
Supported Values: configuration
glid-action
Description ‘drop’: Drop packets for glid exceed (Default); ‘blacklist-src’: Blacklist-src for glid exceed; ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, blacklist-src, ignore
src-default-glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for manual-mode-list_zone-template
Type: Object
manual-mode-list_zone-template¶
Specification
Type
object
dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
src-based-policy-list¶
Specification
Type
list
Block object keys
policy-class-list-list
src-based-policy-name
Description Specify name of the policy
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
src-based-policy-list_policy-class-list-list¶
Specification
Type
list
Block object keys
action
Description ‘bypass’: Always permit for the Source to bypass all feature & limit checks; ‘deny’: Blacklist incoming packets for service;
Type: string
Supported Values: bypass, deny
class-list-name
Description Class-list name
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
class-list-overflow-policy-list
glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
glid-action
Description ‘drop’: Drop packets for glid exceed (Default); ‘blacklist-src’: Blacklist-src for glid exceed; ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, blacklist-src, ignore
log-enable
Description Enable logging
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
log-periodic
Description Enable log periodic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
max-dynamic-entry-count
Description Maximum count for dynamic source zone service entry allowed for this class-list
Type: number
Range: 0-2147483647
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for src-based-policy-list_policy-class-list-list_zone-template
Type: Object
src-based-policy-list_policy-class-list-list_zone-template¶
Specification
Type
object
dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ips
Description IPS template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
logging
Description DDOS logging template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list¶
Specification
Type
list
Block object keys
action
Description ‘bypass’: Always permit for the Source to bypass all feature & limit checks; ‘deny’: Blacklist incoming packets for service;
Type: string
Supported Values: bypass, deny
dummy-name
Description ‘configuration’: Configure overflow policy for class-list;
Type: string
Supported Values: configuration
glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
log-enable
Description Enable logging
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
log-periodic
Description Enable log periodic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list_zone-template
Type: Object
src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list_zone-template¶
Specification
Type
object
dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
logging
Description DDOS logging template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
pattern-recognition-pu-details¶
Specification
Type
object
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
port-ind¶
Specification
Type
object
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
sflow-tcp¶
Specification
Type
object
sflow-tcp-basic
Description Enable sFlow basic TCP counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-tcp-basic and sflow-common are mutually exclusive
sflow-tcp-stateful
Description Enable sFlow stateful TCP counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-tcp-stateful and sflow-common are mutually exclusive
topk-sources¶
Specification
Type
object
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
dynamic-entry-overflow-policy-list¶
Specification
Type
list
Block object keys
action
Description ‘bypass’: Always permit for the Source to bypass all feature & limit checks; ‘deny’: Blacklist incoming packets for service;
Type: string
Supported Values: bypass, deny
dummy-name
Description ‘configuration’: Configure overflow policy;
Type: string
Supported Values: configuration
glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
log-enable
Description Enable logging
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
log-periodic
Description Enable log periodic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for dynamic-entry-overflow-policy-list_zone-template
Type: Object
dynamic-entry-overflow-policy-list_zone-template¶
Specification
Type
object
dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
logging
Description DDOS logging template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
capture-config¶
Specification
Type
object
capture-config-mode
Description ‘drop’: Apply capture-config to dropped packets; ‘forward’: Apply capture-config to forwarded packets; ‘all’: Apply capture-config to both dropped and forwarded packets;
Type: string
Supported Values: drop, forward, all
capture-config-name
Description Capture-config name
Type: string
Format: string-rlx
Maximum Length: 128 characters
Maximum Length: 1 characters
topk-destinations¶
Specification
Type
object
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
stats dns-tcp-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
src_ack_auth_fail |
8 |
Src ACK Retry Dropped |
|
src_ack_retry_init |
8 |
Src ACK Retry Init |
|
tcp_rexmit_syn_limit_drop |
8 |
TCP SYN Retransmit Exceeded Drop |
|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
src_rate_limit_type0 |
8 |
Src Request Rate 1 Exceeded |
|
fqdn_rate_by_label_count_check |
8 |
FQDN Rate by Label Count Checked |
|
query_type_srv |
8 |
Query Type SRV |
|
src_ack_retry_gap_drop |
8 |
Src ACK Retry Retry-Gap Dropped |
|
req_sent |
8 |
DNS Requests Forwarded |
|
src_create_conn_non_syn_dropped |
8 |
Src Create Conn with non-SYN Packets Dropped |
|
prog_first_req_time_exceed |
8 |
Req-Resp: First Request Time Exceed |
|
sess_aged |
8 |
Sessions Aged Out |
|
tcp_auth_resp |
8 |
TCP Auth Responded |
|
ack_retry_rto_fail |
8 |
ACK Retry RTO Dropped |
|
conn_close |
8 |
Connections Closed |
|
syn_auth_fail |
8 |
SYN Auth Failed |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
syn_retry_init |
8 |
SYN Retry Init |
|
src_dns_fqdn_label_len_exceed |
8 |
Src FQDN Label Length Exceeded |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
tcp_req_incomplete |
8 |
TCP Request Incomplete |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
TCP SrcPort Wellknown |
|
prog_conn_time_exceed |
8 |
Connection: Time Exceed |
|
query_type_cname |
8 |
Query Type CNAME |
|
fqdn_stage_2_rate_exceed |
8 |
FQDN Rate Exceeded |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
port_syn_rate_exceed |
8 |
TCP SYN Rate Exceeded |
|
src_ack_retry_reset |
8 |
Src ACK Retry Timeout Reset |
|
dg_rate_exceed |
8 |
Domain Group Domain Query Rate Exceeded |
|
non_query_opcode_pass_through |
8 |
Non Query Opcode Pass Through |
|
src_fqdn_label_count_exceed |
8 |
Src FQDN Label Count Exceeded |
|
dns_query_class_chaos |
8 |
Query Class CHAOS |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
conn_rexmit_rate_excd |
8 |
TCP Conn Retransmit Rate Exceeded |
|
prog_win_rcvd_exceed |
8 |
Time Window: Received Exceed |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
syn_retry_reset |
8 |
SYN Retry Timeout Reset |
|
prog_resp_req_ratio_exceed |
8 |
Req-Resp: Response to Request Ratio Exceed |
|
out_of_seq_excd |
8 |
Out-Of-Seq Exceeded |
|
dg_action_default |
8 |
Domain Group Action Default |
|
port_src_escalation |
8 |
Src Escalation |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
src_ack_retry_rto_progress |
8 |
Src ACK Retry RTO Progress |
|
fqdn_label_count_exceed |
8 |
FQDN Label Count Exceeded |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
src_retransmit_excd |
8 |
Src Retransmit Exceeded |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
tcp_rexmit_syn_limit_bl |
8 |
TCP SYN Retransmit Exceeded Blacklist |
|
prog_win_rcvd_sent_ratio_exceed |
8 |
Time Window: Received to Sent Exceed |
|
src_ack_retry_timeout |
8 |
Src ACK Retry Timeout |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
conn_close_w_rst |
8 |
RST Connections Closed |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
src_syn_auth_fail |
8 |
Src SYN Auth Failed |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
filter5_match |
8 |
Filter5 Match |
|
prog_conn_rcvd_exceed |
8 |
Connection: Received Exceed |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
prog_conn_exceed_drop |
8 |
Connection: Violation Exceed Dropped |
|
port_bytes |
8 |
Inbound Bytes Received |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
syn_retry_rto_pass |
8 |
SYN Retry RTO Passed |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
syn_cookie_fail |
8 |
SYN Cookie Failed |
|
query_type_any |
8 |
Query Type ANY |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
src_well_known_port |
8 |
Src TCP SrcPort Wellknown |
|
prog_request_len_exceed |
8 |
Req-Resp: Request Length Exceed |
|
src_syn_retry_rto_fail |
8 |
Src SYN Retry RTO Dropped |
|
syn_retry_rto_progress |
8 |
SYN Retry RTO Progress |
|
src_conn_rexmit_rate_excd |
8 |
Src TCP Conn Retransmit Rate Exceeded |
|
prog_win_exceed_bl |
8 |
Time Window: Violation Exceed Blacklisted |
|
syn_retry_pass |
8 |
SYN Retry Passed |
|
rst_cookie_fail |
8 |
RST Cookie Failed |
|
bl |
8 |
Dst Blacklisted |
|
dg_action_permit |
8 |
Domain Group Action Permit |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
snat_fail |
8 |
Source NAT Failure |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
src_syn_retry_init |
8 |
Src SYN Retry Init |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
query_type_aaaa |
8 |
Query Type AAAA |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
fqdn_label_len_exceed |
8 |
FQDN Label Length Exceeded |
|
filter1_match |
8 |
Filter1 Match |
|
synack_reset_sent |
8 |
SYNACK Reset Sent |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
conn_create_from_syn |
8 |
Connections Created From SYN |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
prog_conn_sent_exceed |
8 |
Connection: Sent Exceed |
|
rate_limit_type4 |
8 |
Dst Request Rate 5 Exceeded |
|
rate_limit_type3 |
8 |
Dst Request Rate 4 Exceeded |
|
rate_limit_type2 |
8 |
Dst Request Rate 3 Exceeded |
|
rate_limit_type1 |
8 |
Dst Request Rate 2 Exceeded |
|
rate_limit_type0 |
8 |
Dst Request Rate 1 Exceeded |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
rrtype_drop |
8 |
Record Type Dropped |
|
req_retrans |
8 |
Request Retransmit |
|
ack_auth_fail |
8 |
ACK Retry Dropped |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
prog_exceed_drop |
8 |
Req-Resp: Violation Exceed Dropped |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
src_drop |
8 |
Src Packets Dropped |
|
query_type_a |
8 |
Query Type A |
|
syn_retry_blacklist |
8 |
SYN Retry Timeout Blacklisted |
|
dg_action_deny |
8 |
Domain Group Action Deny |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
query_type_mx |
8 |
Query Type MX |
|
syn_retry_gap_drop |
8 |
SYN Retry-Gap Dropped |
|
prog_resp_req_time_exceed |
8 |
Req-Resp: Response to Request Time Exceed |
|
conn_create_from_ack |
8 |
Connections Created From ACK |
|
filter_none_match |
8 |
Filter No Match |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
src_syn_retry_gap_drop |
8 |
Src SYN Retry-Gap Dropped |
|
prog_exceed_bl |
8 |
Req-Resp: Violation Exceed Blacklisted |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
syn_drop |
8 |
SYN Dropped |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
src_syn_rate_exceed |
8 |
Src TCP SYN Rate Exceeded |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
src_dns_malform |
8 |
Src Malform Query |
|
src_syn_retry_timeout |
8 |
Src SYN Retry Timeout |
|
prog_conn_exceed_bl |
8 |
Connection: Violation Exceed Blacklisted |
|
req_size_exceed |
8 |
Request Size Exceeded |
|
query_type_soa |
8 |
Query Type SOA |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
unauth_drop |
8 |
TCP Unauth Dropped |
|
dns_query_class_in |
8 |
Query Class INTERNET |
|
src_syn_cookie_sent |
8 |
Src SYN Cookie Sent |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
ack_retry_timeout |
8 |
ACK Retry Timeout |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
src_out_of_seq_excd |
8 |
Src Out-Of-Seq Exceeded |
|
syn_retry_timeout |
8 |
SYN Retry Timeout |
|
syn_tfo_rcv |
8 |
SYN TFO Received |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
malform_drop |
8 |
Malform Query Dropped |
|
src_unauth_drop |
8 |
Src TCP Unauth Dropped |
|
filter_action_whitelist |
8 |
Filter Action WL |
|
src_conn_pkt_rate_excd |
8 |
Src TCP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
dg_request_check_fail |
8 |
Domain Group Request Check Fail |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
conn_close_w_fin |
8 |
FIN Connections Closed |
|
src_syn_retry_blacklist |
8 |
Src SYN Retry Timeout Blacklisted |
|
src_zero_window_excd |
8 |
Src Zero-Window Exceeded |
|
src_conn_zwindow_rate_excd |
8 |
Src TCP Conn Zero-Window Rate Exceeded |
|
sess_create |
8 |
Session Create |
|
nxdomain_rate_exceed |
8 |
NXDOMAIN Response Rate Exceeded |
|
ack_retry_blacklist |
8 |
ACK Retry Timeout Blacklisted |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
dns_query_class_csnet |
8 |
Query Class CSNET |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
syn_auth_pass |
8 |
SYN Auth Passed |
|
src_dns_malform_drop |
8 |
Src Malform Query Dropped |
|
query_type_opt |
8 |
Query Type OPT |
|
syn_retry_rto_fail |
8 |
SYN Retry RTO Dropped |
|
prog_req_resp_time_exceed |
8 |
Req-Resp: Request to Response Time Exceed |
|
syn_cookie_sent |
8 |
SYN Cookie Sent |
|
retransmit_excd |
8 |
Retransmit Exceeded |
|
filter4_match |
8 |
Filter4 Match |
|
src_filter_action_whitelist |
8 |
Src Filter Action WL |
|
zero_window_excd |
8 |
Zero-Window Exceeded |
|
src_query_type_any_drop |
8 |
Src Query Type ANY Dropped |
|
conn_ofo_rate_excd |
8 |
TCP Conn Out-Of-Seq Rate Exceeded |
|
force_tcp_auth_pass |
8 |
Auth Force-TCP Passed |
|
filter2_match |
8 |
Filter2 Match |
|
src_ack_retry_blacklist |
8 |
Src ACK Retry Timeout Blacklisted |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
dns_query_class_hs |
8 |
Query Class HESIOD |
|
dns_query_class_none |
8 |
Query Class NONE |
|
prog_response_len_exceed |
8 |
Req-Resp: Response Length Exceed |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
ack_retry_pass |
8 |
ACK Retry Passed |
|
src_policy_drop |
8 |
Src Policy Dropped |
|
conn_close_w_idle |
8 |
Idle Connections Closed |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
is_nxdomain |
8 |
NXDOMAIN Response |
|
dns_malform |
8 |
Malform Query |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
src_rate_limit_type4 |
8 |
Src Request Rate 5 Exceeded |
|
src_rate_limit_type2 |
8 |
Src Request Rate 3 Exceeded |
|
src_rate_limit_type3 |
8 |
Src Request Rate 4 Exceeded |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
src_rate_limit_type1 |
8 |
Src Request Rate 2 Exceeded |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
query_type_any_drop |
8 |
Query Type ANY Dropped |
|
ack_retry_reset |
8 |
ACK Retry Timeout Reset |
|
tcp_auth_drop |
8 |
TCP Auth Dropped |
|
nxdomain_bl_drop |
8 |
NXDOMAIN Response Blacklisted |
|
src_syn_cookie_fail |
8 |
Src SYN Cookie Failed |
|
syn_retry_failed |
8 |
SYN Retry Dropped |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
ack_retry_init |
8 |
ACK Retry Init |
|
prog_conn_rcvd_sent_ratio_exceed |
8 |
Connection: Reveived to Sent Ratio Exceed |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
policy_drop |
8 |
Policy Dropped |
|
query_type_ns |
8 |
Query Type NS |
|
ack_retry_gap_drop |
8 |
ACK Retry Retry-Gap Dropped |
|
nxdomain_drop |
8 |
NXDOMAIN Response Dropped |
|
create_conn_non_syn_dropped |
8 |
Create Conn with non-SYN Packets Dropped |
|
current_es_level |
8 |
Current Escalation Level |
|
src_syn_retry_failed |
8 |
Src SYN Retry Dropped |
|
filter_action_drop |
8 |
Filter Action Drop |
|
src_ack_retry_rto_fail |
8 |
Src ACK Retry RTO Dropped |
|
conn_zwindow_rate_excd |
8 |
TCP Conn Zero-Window Rate Exceeded |
|
src_conn_ofo_rate_excd |
8 |
Src TCP Conn Out-Of-Seq Rate Exceeded |
|
dns_query_class_whitelist_miss |
8 |
Query Class Whitelist Miss |
|
ack_retry_rto_progress |
8 |
ACK Retry RTO Progress |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
prog_win_exceed_drop |
8 |
Time Window: Violation Exceed Dropped |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
port_drop |
8 |
Inbound Packets Dropped |
|
ack_retry_rto_pass |
8 |
ACK Retry RTO Passed |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
dns_query_class_any |
8 |
Query Class ANY |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
src_syn_retry_rto_pass |
8 |
Src SYN Retry RTO Passed |
|
src_syn_retry_reset |
8 |
Src SYN Retry Timeout Reset |
|
port_rcvd |
8 |
Inbound Packets Received |
|
conn_close_half_open |
8 |
Half Open Connections Closed |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
prog_win_sent_exceed |
8 |
Time Window: Sent Exceed |
|
synack_multiple_attempts_per_ip_detected |
8 |
SYNACK Multiple Attempts Per IP Detected |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
src_syn_retry_rto_progress |
8 |
Src SYN Retry RTO Progress |
|
src_ack_retry_rto_pass |
8 |
Src ACK Retry RTO Passed |
|
conn_prate_excd |
8 |
TCP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
src_rst_cookie_fail |
8 |
Src RST Cookie Failed |
|
src_auth_drop |
8 |
Src TCP Auth Dropped |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
|
fqdn_rate_by_label_count_exceed |
8 |
FQDN Rate by Label Count Exceeded |
stats dns-udp-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
nxdomain_rate_exceed |
8 |
NXDOMAIN Response Rate Exceeded |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
token_authentication_prev_salt_matched |
8 |
Token Authentication Previous Salt Matched |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
fqdn_rate_by_label_count_check |
8 |
FQDN Rate by Label Count Checked |
|
query_type_srv |
8 |
Query Type SRV |
|
req_sent |
8 |
DNS Requests Forwarded |
|
spoof_detect_fail |
8 |
UDP Retry Timeout |
|
sess_aged |
8 |
Sessions Aged Out |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
force_tcp_auth_timeout |
8 |
Auth Force-TCP With UDP Timeout |
|
udp_auth_pass |
8 |
Auth UDP Passed |
|
src_dns_fqdn_label_len_exceed |
8 |
Src FQDN Label Length Exceeded |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
token_authentication_curr_salt_matched |
8 |
Token Authentication Current Salt Matched |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
UDP SrcPort Wellknown |
|
query_type_cname |
8 |
Query Type CNAME |
|
fqdn_stage_2_rate_exceed |
8 |
FQDN Rate Exceeded |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
src_udp_retry_init |
8 |
Src UDP Retry Init |
|
src_payload_too_small |
8 |
Src UDP Payload Too Small |
|
non_query_opcode_pass_through |
8 |
Non Query Opcode Pass Through |
|
src_fqdn_label_count_exceed |
8 |
Src FQDN Label Count Exceeded |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
src_udp_retry_pass |
8 |
Src UDP Retry Passed |
|
udp_retry_init |
8 |
UDP Retry Init |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
dg_action_default |
8 |
Domain Group Action Default |
|
port_src_escalation |
8 |
Src Escalation |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
port_bytes |
8 |
Inbound Bytes Received |
|
fqdn_label_count_exceed |
8 |
FQDN Label Count Exceeded |
|
dns_auth_drop |
8 |
DNS Auth Dropped |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
filter5_match |
8 |
Filter5 Match |
|
src_udp_auth_fail |
8 |
Src Auth UDP Failed |
|
token_authentication_session_created |
8 |
Token Authentication Session Created |
|
src_udp_retry_gap_drop |
8 |
Src UDP Retry-Gap Dropped |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
query_type_any |
8 |
Query Type ANY |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
zone_src_udp_retry_timeout_blacklist |
8 |
Src UDP Retry Timeout Blacklisted |
|
filter4_match |
8 |
Filter4 Match |
|
bl |
8 |
Dst Blacklisted |
|
dg_action_permit |
8 |
Domain Group Action Permit |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
snat_fail |
8 |
Source NAT Failure |
|
payload_too_small |
8 |
UDP Payload Too Small |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
query_type_aaaa |
8 |
Query Type AAAA |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
fqdn_label_len_exceed |
8 |
FQDN Label Length Exceeded |
|
filter1_match |
8 |
Filter1 Match |
|
ntp_monlist_resp |
8 |
NTP Monlist Response |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
dns_auth_resp |
8 |
DNS Auth Responded |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
rate_limit_type4 |
8 |
Dst Request Rate 5 Exceeded |
|
rate_limit_type3 |
8 |
Dst Request Rate 4 Exceeded |
|
rate_limit_type2 |
8 |
Dst Request Rate 3 Exceeded |
|
rate_limit_type1 |
8 |
Dst Request Rate 2 Exceeded |
|
rate_limit_type0 |
8 |
Dst Request Rate 1 Exceeded |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
dst_udp_retry_timeout_blacklist |
8 |
UDP Retry Timeout Blacklisted |
|
rrtype_drop |
8 |
Record Type Dropped |
|
req_retrans |
8 |
Request Retransmit |
|
udp_auth_retry_gap_drop |
8 |
Auth UDP Retry-Gap Dropped |
|
src_udp_auth_drop |
8 |
Src UDP Auth Dropped |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
src_drop |
8 |
Src Packets Dropped |
|
query_type_a |
8 |
Query Type A |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
dg_action_deny |
8 |
Domain Group Action Deny |
|
udp_auth_retry_fail |
8 |
Auth UDP Retry Failed |
|
query_type_mx |
8 |
Query Type MX |
|
port_drop |
8 |
Inbound Packets Dropped |
|
filter_none_match |
8 |
Filter No Match |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
ntp_monlist_req |
8 |
NTP Monlist Request |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
payload_too_big |
8 |
UDP Payload Too Large |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
token_authentication_session_created_fail |
8 |
Token Authentication Session Created Fail |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
src_dns_malform |
8 |
Src Malform Query |
|
req_size_exceed |
8 |
Request Size Exceeded |
|
query_type_soa |
8 |
Query Type SOA |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
dns_query_class_in |
8 |
Query Class INTERNET |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
udp_retry_pass |
8 |
UDP Retry Passed |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
udp_retry_gap_drop |
8 |
UDP Retry-Gap Dropped |
|
malform_drop |
8 |
Malform Query Dropped |
|
filter_action_whitelist |
8 |
Filter Action Whitelist |
|
src_conn_pkt_rate_excd |
8 |
Src UDP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
dg_request_check_fail |
8 |
Domain Group Request Check Fail |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
sess_create |
8 |
Session Create |
|
src_well_known_port |
8 |
Src UDP SrcPort Wellknown |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
dns_query_class_csnet |
8 |
Query Class CSNET |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
src_dns_malform_drop |
8 |
Src Malform Query Dropped |
|
query_type_opt |
8 |
Query Type OPT |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
src_filter_action_whitelist |
8 |
Src Filter Action Whitelist |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
src_query_type_any_drop |
8 |
Src Query Type ANY Dropped |
|
src_payload_too_big |
8 |
Src UDP Payload Too Large |
|
filter2_match |
8 |
Filter2 Match |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
dns_query_class_hs |
8 |
Query Class HESIOD |
|
dns_query_class_none |
8 |
Query Class NONE |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
src_ntp_monlist_resp |
8 |
Src NTP Monlist Response |
|
src_rate_limit_type0 |
8 |
Src Request Rate 1 Exceeded |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_rate_limit_type1 |
8 |
Src Request Rate 2 Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
is_nxdomain |
8 |
NXDOMAIN Response |
|
dns_malform |
8 |
Malform Query |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
src_rate_limit_type4 |
8 |
Src Request Rate 5 Exceeded |
|
src_rate_limit_type2 |
8 |
Src Request Rate 3 Exceeded |
|
src_rate_limit_type3 |
8 |
Src Request Rate 4 Exceeded |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
udp_auth_drop |
8 |
UDP Auth Dropped |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
query_type_any_drop |
8 |
Query Type ANY Dropped |
|
src_ntp_monlist_req |
8 |
Src NTP Monlist Request |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
nxdomain_bl_drop |
8 |
NXDOMAIN Response Blacklisted |
|
udp_auth_init |
8 |
Auth UDP Init |
|
token_authentication_mismatched |
8 |
Token Authentication Mismatched Packets |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
dns_query_class_chaos |
8 |
Query Class CHAOS |
|
query_type_ns |
8 |
Query Type NS |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
nxdomain_drop |
8 |
NXDOMAIN Response Dropped |
|
current_es_level |
8 |
Current Escalation Level |
|
filter_action_drop |
8 |
Filter Action Drop |
|
src_dns_auth_drop |
8 |
Src DNS Auth Dropped |
|
dns_query_class_whitelist_miss |
8 |
Query Class Whitelist Miss |
|
src_udp_auth_init |
8 |
Src Auth UDP Init |
|
token_authentication_invalid |
8 |
Token Authentication Invalid Packets |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
dns_query_class_any |
8 |
Query Class ANY |
|
dg_rate_exceed |
8 |
Domain Group Domain Query Rate Exceeded |
|
port_rcvd |
8 |
Inbound Packets Received |
|
src_force_tcp_auth |
8 |
Src Auth Force-TCP |
|
force_tcp_auth |
8 |
Auth Force-TCP |
|
conn_prate_excd |
8 |
UDP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
src_udp_auth_timeout |
8 |
Src UDP Retry Timeout |
|
udp_auth_fail |
8 |
Auth UDP Failed |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
|
fqdn_rate_by_label_count_exceed |
8 |
FQDN Rate by Label Count Exceeded |
stats http-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
req |
8 |
Request Total |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
negative_resp_remain |
8 |
Negative Response Remain |
|
chunk_sz_2k |
8 |
Payload Chunk Size Less Than or Equal to 2K |
|
req_put |
8 |
Request Method PUT |
|
req_sz_gt_256k |
8 |
Request Payload Size Larger Than 256K |
|
prog_first_req_time_exceed |
8 |
Req-Resp: First Request Time Exceed |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
src_js_challenge_sent |
8 |
Src Challenge Javascript Sent |
|
req_sz_2k |
8 |
Request Payload Size Less Than or Equal to 2K |
|
filter10_match |
8 |
Filter10 Match |
|
parse_bad_chunk |
8 |
Malform Bad Chunk |
|
er_condition |
8 |
Error Condition |
|
filter9_drop |
8 |
Filter9 Match Dropped |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
tcp_filter_action_blacklist |
8 |
Filter Action Blacklist |
|
src_header_filter_action_drop |
8 |
Src Filter Action Drop |
|
src_create_conn_non_syn_dropped |
8 |
Src Create Conn with non-SYN Packets Dropped |
|
prog_win_rcvd_sent_ratio_exceed |
8 |
Time Window: Received to Sent Exceed |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
port_bytes |
8 |
Inbound Bytes Received |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
src_header_filter10_match |
8 |
Src Filter10 Match |
|
tcp_filter_none_match |
8 |
Filter No Match |
|
src_header_filter9_drop |
8 |
Src Filter9 Match Dropped |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
src_header_filter2_drop |
8 |
Src Filter2 Match Dropped |
|
header_processing_time_0 |
8 |
Header Process Time Less Than 1s |
|
header_processing_time_1 |
8 |
Header Process Time Less Than 10s |
|
header_processing_time_2 |
8 |
Header Process Time Less Than 30S |
|
header_processing_time_3 |
8 |
Header Process Time Larger or Equal to 30s |
|
prog_conn_exceed_drop |
8 |
Connection: Violation Exceed Dropped |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
prog_request_len_exceed |
8 |
Req-Resp: Request Length Exceed |
|
src_syn_retry_rto_fail |
8 |
Src SYN Retry RTO Dropped |
|
invalid_hdr_name |
8 |
HTTP Header Name Invalid |
|
src_header_filter8_drop |
8 |
Src Filter8 Match Dropped |
|
filter4_match |
8 |
Filter4 Match |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
pkts_ofo |
8 |
Out-Of-Order Packets |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
tcp_filter_action_drop |
8 |
Filter Action Drop |
|
src_ud_challenge_sent |
8 |
Src Challenge URL Redirect Sent |
|
filter9_match |
8 |
Filter9 Match |
|
src_header_filter_match |
8 |
Src Filter Total Match |
|
port_drop |
8 |
Inbound Packets Dropped |
|
filter_match |
8 |
Filter Total Match |
|
conn_create_from_ack |
8 |
Connections Created From ACK |
|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
syn_drop |
8 |
SYN Dropped |
|
ack_retry_rto_fail |
8 |
ACK Retry RTO Dropped |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
req_content_len |
8 |
Request Content Length Received |
|
req_sz_8k |
8 |
Request Payload Size Less Than or Equal to 8K |
|
new_syn |
8 |
TCP SYN |
|
src_syn_cookie_sent |
8 |
Src SYN Cookie Sent |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
dst_req_rate_exceed |
8 |
Dst Request Rate Exceeded |
|
src_conn_pkt_rate_excd |
8 |
Src TCP Conn Pkt Rate Exceeded |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
src_ack_retry_rto_pass |
8 |
Src ACK Retry RTO Passed |
|
src_well_known_port |
8 |
Src TCP SrcPort Wellknown |
|
tcp_filter4_match |
8 |
Filter4 Match |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
less_than_mss_exceed |
8 |
Min Payload Size Fail Exceeded |
|
src_header_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
src_header_filter7_match |
8 |
Src Filter7 Match |
|
syn_retry_rto_fail |
8 |
SYN Retry RTO Dropped |
|
req_unknown |
8 |
Request Method UNKNOWN |
|
req_options |
8 |
Request Method OPTIONS |
|
conn_ofo_rate_excd |
8 |
TCP Conn Out-Of-Seq Rate Exceeded |
|
dst_resp_rate_exceed |
8 |
Dst Response Rate Exceeded |
|
use_hdr_src_ip |
8 |
Use IP In Header As Src |
|
prog_exceed_bl |
8 |
Req-Resp: Violation Exceed Blacklisted |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
filter7_match |
8 |
Filter7 Match |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
pkts_retrans |
8 |
TCP Retransmit |
|
src_http_auth_drop |
8 |
Src HTTP Auth Dropped |
|
prog_conn_rcvd_sent_ratio_exceed |
8 |
Connection: Reveived to Sent Ratio Exceed |
|
req_connect |
8 |
Request Method CONNECT |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
current_es_level |
8 |
Current Escalation Level |
|
src_header_filter6_drop |
8 |
Src Filter6 Match Dropped |
|
referer_filter_blacklist |
8 |
Referer Filter Blacklisted |
|
src_header_filter5_drop |
8 |
Src Filter5 Match Dropped |
|
filter8_drop |
8 |
Filter8 Match Dropped |
|
src_syn_retry_rto_pass |
8 |
Src SYN Retry RTO Passed |
|
req_sz_1k |
8 |
Request Payload Size Less Than or Equal to 1K |
|
src_auth_drop |
8 |
Src TCP Auth Dropped |
|
resp_code_3xx |
8 |
HTTP Status Code 3XX |
|
req_sz_32k |
8 |
Request Payload Size Less Than or Equal to 32K |
|
src_challenge_js_fail |
8 |
Src Challenge Javascript Failed |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
invalid_hdr_val |
8 |
HTTP Header Value Invalid |
|
pkts_retrans_rst |
8 |
TCP Retransmit RST |
|
sess_aged |
8 |
Sessions Aged Out |
|
conn_close |
8 |
Connections Closed |
|
resp_code_5xx |
8 |
HTTP Status Code 5XX |
|
filter10_drop |
8 |
Filter10 Match Dropped |
|
src_header_filter_not_match |
8 |
Src Filter Not Matched on Pkt |
|
parse_req_line_too_small |
8 |
Malform Request Line Too Small |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
window_small_drop |
8 |
Window Size Small Dropped |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
TCP SrcPort Wellknown |
|
prog_conn_time_exceed |
8 |
Connection: Time Exceed |
|
rsp_chunk |
8 |
Response Chunk |
|
pkts_retrans_push |
8 |
TCP Retransmit PSH |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
resp_code_other |
8 |
HTTP Status Code OTHER |
|
prog_exceed_drop |
8 |
Req-Resp: Violation Exceed Dropped |
|
src_header_filter7_drop |
8 |
Src Filter7 Match Dropped |
|
parse_header_name_too_long |
8 |
Malform Header Name Too Long |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
tcp_filter_action_default_pass |
8 |
Filter Action Default Pass |
|
parse_line_too_long |
8 |
Malform Line Too Long |
|
tcp_auth_drop |
8 |
TCP Auth Dropped |
|
req_sz_4k |
8 |
Request Payload Size Less Than or Equal to 4K |
|
http_auth_resp |
8 |
HTTP Auth Responded |
|
syn_retry_rto_progress |
8 |
SYN Retry RTO Progress |
|
challenge_failed |
8 |
Challenge Failed |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
filter7_drop |
8 |
Filter7 Match Dropped |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
src_header_filter10_drop |
8 |
Src Filter10 Match Dropped |
|
src_post_rate_exceed |
8 |
Src Post Rate Exceeded |
|
src_zero_window_excd |
8 |
Src Zero-Window Exceeded |
|
tcp_rexmit_syn_limit_bl |
8 |
TCP SYN Retransmit Exceeded Blacklist |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
js_challenge_sent |
8 |
Challenge Javascript Sent |
|
src_syn_retry_gap_drop |
8 |
Src SYN Retry-Gap Dropped |
|
req_delete |
8 |
Request Method DELETE |
|
filter6_drop |
8 |
Filter6 Match Dropped |
|
ofo_queue_sz_exceed |
8 |
Out-Of-Order Queue Exceeded |
|
syn_retry_pass |
8 |
SYN Retry Passed |
|
filter8_match |
8 |
Filter8 Match |
|
header_processing_incomplete |
8 |
Header Process Incomplete |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
ack_retry_timeout |
8 |
ACK Retry Timeout |
|
parse_too_many_headers |
8 |
Malform Too Many Headers |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
dst_post_rate_exceed |
8 |
Dst Post Rate Exceeded |
|
tcp_filter2_match |
8 |
Filter2 Match |
|
src_ack_retry_init |
8 |
Src ACK Retry Init |
|
filter5_drop |
8 |
Filter5 Match Dropped |
|
filter5_match |
8 |
Filter5 Match |
|
port_syn_rate_exceed |
8 |
TCP SYN Rate Exceeded |
|
prog_req_resp_time_exceed |
8 |
Req-Resp: Request to Response Time Exceed |
|
syn_cookie_sent |
8 |
SYN Cookie Sent |
|
src_header_filter3_drop |
8 |
Src Filter3 Match Dropped |
|
src_ack_retry_reset |
8 |
Src ACK Retry Timeout Reset |
|
src_ack_retry_blacklist |
8 |
Src ACK Retry Timeout Blacklisted |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
resp_mib_chunk_bad |
8 |
Bad HTTP Response Chunk |
|
port_src_bl |
8 |
Src Blacklisted |
|
filter3_match |
8 |
Filter3 Match |
|
sess_create |
8 |
Session Create |
|
tcp_filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
ack_retry_init |
8 |
ACK Retry Init |
|
src_dos_policy_violation |
8 |
Src Policy Violation |
|
parse_req_line_too_long |
8 |
Malform Request Line Too Long |
|
filter3_drop |
8 |
Filter3 Match Dropped |
|
policy_drop |
8 |
Policy Dropped |
|
uri_filter_match |
8 |
URI Filter Match |
|
req_head |
8 |
Request Method HEAD |
|
src_syn_retry_failed |
8 |
Src SYN Retry Dropped |
|
partial_header |
8 |
Partial Header |
|
src_header_filter4_match |
8 |
Src Filter4 Match |
|
syn_tfo_rcv |
8 |
SYN TFO Received |
|
src_header_filter1_drop |
8 |
Src Filter1 Match Dropped |
|
syn_retry_reset |
8 |
SYN Retry Timeout Reset |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
synack_multiple_attempts_per_ip_detected |
8 |
SYNACK Multiple Attempts Per IP Detected |
|
src_ack_auth_fail |
8 |
Src ACK Retry Dropped |
|
snat_fail |
8 |
Source NAT Failure |
|
fail_alloc_hdr |
8 |
Alloc Header Failed |
|
src_ack_retry_gap_drop |
8 |
Src ACK Retry Retry-Gap Dropped |
|
tcp_auth_resp |
8 |
TCP Auth Responded |
|
parsereq_fail |
8 |
Parse Request Failed |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
req_post |
8 |
Request Method POST |
|
conn_rexmit_rate_excd |
8 |
TCP Conn Retransmit Rate Exceeded |
|
src_header_filter3_match |
8 |
Src Filter3 Match |
|
prog_resp_req_ratio_exceed |
8 |
Req-Resp: Response to Request Ratio Exceed |
|
conn_close_w_rst |
8 |
RST Connections Closed |
|
fail_alloc |
8 |
Alloc Failed |
|
user_agent_filter_match |
8 |
Agent Filter Match |
|
processed |
8 |
Packets Processed |
|
src_retransmit_excd |
8 |
Src Retransmit Exceeded |
|
src_ack_retry_timeout |
8 |
Src ACK Retry Timeout |
|
filter1_drop |
8 |
Filter1 Match Dropped |
|
src_header_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
chunk_sz_512 |
8 |
Payload Chunk Size Less Than or Equal to 512 |
|
chunk_sz_4k |
8 |
Payload Chunk Size Less Than or Equal to 4K |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
syn_cookie_fail |
8 |
SYN Cookie Failed |
|
req_sz_256k |
8 |
Request Payload Size Less Than or Equal to 256K |
|
prog_win_exceed_bl |
8 |
Time Window: Violation Exceed Blacklisted |
|
rst_cookie_fail |
8 |
RST Cookie Failed |
|
tcp_filter_action_whitelist |
8 |
Filter Action WL |
|
src_req_rate_exceed |
8 |
Src Request Rate Exceeded |
|
syn_retry_rto_pass |
8 |
SYN Retry RTO Passed |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
src_header_filter9_match |
8 |
Src Filter9 Match |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
filter_not_match |
8 |
Filter Not Matched on Pkt |
|
src_drop |
8 |
Src Packets Dropped |
|
resp_code_1xx |
8 |
HTTP Status Code 1XX |
|
filter4_drop |
8 |
Filter4 Match Dropped |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
fail_get_line |
8 |
Get Line Failed |
|
filter_none_match |
8 |
Filter No Match |
|
pkts_retrans_fin |
8 |
TCP Retransmit FIN |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
too_many_headers |
8 |
HTTP Header Too Many |
|
content_length_too_long |
8 |
Malform Content Length Too Long |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
prog_win_rcvd_exceed |
8 |
Time Window: Received Exceed |
|
src_header_filter6_match |
8 |
Src Filter6 Match |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
src_out_of_seq_excd |
8 |
Src Out-Of-Seq Exceeded |
|
src_filter_action_whitelist |
8 |
Src Filter Action WL |
|
referer_filter_match |
8 |
Referer Filter Match |
|
req_trace |
8 |
Request Method TRACE |
|
http_auth_drop |
8 |
HTTP Auth Dropped |
|
policy_violation |
8 |
Policy Violation |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
src_header_filter_action_whitelist |
8 |
Src Filter Action Whitelist |
|
conn_close_w_fin |
8 |
FIN Connections Closed |
|
src_syn_retry_blacklist |
8 |
Src SYN Retry Timeout Blacklisted |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
syn_auth_pass |
8 |
SYN Auth Passed |
|
retransmit_excd |
8 |
Retransmit Exceeded |
|
src_syn_auth_fail |
8 |
Src SYN Auth Failed |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
filter2_match |
8 |
Filter2 Match |
|
pkts_connect_passthru |
8 |
Connect Passthru Packets |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
ack_retry_pass |
8 |
ACK Retry Passed |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
req_retran |
8 |
Request Retransmit |
|
src_header_filter5_match |
8 |
Src Filter5 Match |
|
src_ack_retry_rto_fail |
8 |
Src ACK Retry RTO Dropped |
|
conn_zwindow_rate_excd |
8 |
TCP Conn Zero-Window Rate Exceeded |
|
idle_timeout |
8 |
Idle Timeout |
|
line_too_long |
8 |
Line Too Long |
|
prog_win_exceed_drop |
8 |
Time Window: Violation Exceed Dropped |
|
syn_retry_gap_drop |
8 |
SYN Retry-Gap Dropped |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
resp_code_2xx |
8 |
HTTP Status Code 2XX |
|
conn_close_half_open |
8 |
Half Open Connections Closed |
|
src_syn_retry_rto_progress |
8 |
Src SYN Retry RTO Progress |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
|
req_get |
8 |
Request Method GET |
|
tcp_rexmit_syn_limit_drop |
8 |
TCP SYN Retransmit Exceeded Drop |
|
resp_code_4xx |
8 |
HTTP Status Code 4XX |
|
user_agent_filter_blacklist |
8 |
Agent Filter Blacklisted |
|
src_header_filter1_match |
8 |
Src Filter1 Match |
|
filter2_drop |
8 |
Filter2 Match Dropped |
|
src_syn_retry_timeout |
8 |
Src SYN Retry Timeout |
|
syn_auth_fail |
8 |
SYN Auth Failed |
|
syn_retry_init |
8 |
SYN Retry Init |
|
tcp_filter5_match |
8 |
Filter5 Match |
|
req_ofo |
8 |
Out-Of-Order Request |
|
chunk_sz_1k |
8 |
Payload Chunk Size Less Than or Equal to 1K |
|
window_small |
8 |
Window Size Small |
|
out_of_seq_excd |
8 |
Out-Of-Seq Exceeded |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
port_src_escalation |
8 |
Src Escalation |
|
src_ack_retry_rto_progress |
8 |
Src ACK Retry RTO Progress |
|
synack_reset_sent |
8 |
SYNACK Reset Sent |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
client_rst |
8 |
Client TCP RST Received |
|
parse_req_line_invalid_method |
8 |
Malform Request Line Invalid Method |
|
prog_conn_rcvd_exceed |
8 |
Connection: Received Exceed |
|
prog_response_len_exceed |
8 |
Req-Resp: Response Length Exceed |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
chunk_sz_gt_4k |
8 |
Payload Chunk Size Larger Than 4K |
|
src_conn_rexmit_rate_excd |
8 |
Src TCP Conn Retransmit Rate Exceeded |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
src_syn_retry_init |
8 |
Src SYN Retry Init |
|
filter_action_drop |
8 |
Filter Action Drop |
|
src_header_filter8_match |
8 |
Src Filter8 Match |
|
bl |
8 |
Dst Blacklisted |
|
filter1_match |
8 |
Filter1 Match |
|
conn_create_from_syn |
8 |
Connections Created From SYN |
|
src_header_filter2_match |
8 |
Src Filter2 Match |
|
src_challenge_ud_fail |
8 |
Src Challenge URL Redirect Failed |
|
ud_challenge_failed |
8 |
Challenge URL Redirect Failed |
|
ack_auth_fail |
8 |
ACK Retry Dropped |
|
src_header_filter_none_match |
8 |
Src Filter No Match |
|
tcp_filter3_match |
8 |
Filter3 Match |
|
src_conn_ofo_rate_excd |
8 |
Src TCP Conn Out-Of-Seq Rate Exceeded |
|
prog_conn_exceed_bl |
8 |
Connection: Violation Exceed Blacklisted |
|
ofo_timer_expired |
8 |
Out-Of-Order Timeout |
|
unauth_drop |
8 |
TCP Unauth Dropped |
|
prog_conn_sent_exceed |
8 |
Connection: Sent Exceed |
|
prog_resp_req_time_exceed |
8 |
Req-Resp: Response to Request Time Exceed |
|
src_unauth_drop |
8 |
Src TCP Unauth Dropped |
|
filter_action_whitelist |
8 |
Filter Action Whitelist |
|
src_header_filter4_drop |
8 |
Src Filter4 Match Dropped |
|
tcp_filter1_match |
8 |
Filter1 Match |
|
slow_post |
8 |
Slow Post |
|
negative_req_remain |
8 |
Negative Request Remain |
|
src_conn_zwindow_rate_excd |
8 |
Src TCP Conn Zero-Window Rate Exceeded |
|
ack_retry_blacklist |
8 |
ACK Retry Timeout Blacklisted |
|
zero_window_excd |
8 |
Zero-Window Exceeded |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
js_challenge_failed |
8 |
Challenge Javascript Failed |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
src_syn_rate_exceed |
8 |
Src TCP SYN Rate Exceeded |
|
src_policy_drop |
8 |
Src Policy Dropped |
|
conn_close_w_idle |
8 |
Idle Connections Closed |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
ud_challenge_sent |
8 |
Challenge URL Redirect Sent |
|
header_name_too_long |
8 |
Header Name Too Long |
|
chunk_bad |
8 |
Bad Payload Chunk |
|
ack_retry_reset |
8 |
ACK Retry Timeout Reset |
|
src_syn_cookie_fail |
8 |
Src SYN Cookie Failed |
|
syn_retry_failed |
8 |
SYN Retry Dropped |
|
invalid_header |
8 |
HTTP Header Invalid |
|
req_http10 |
8 |
Request HTTP 1.0 |
|
req_http11 |
8 |
Request HTTP 1.1 |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
ack_retry_gap_drop |
8 |
ACK Retry Retry-Gap Dropped |
|
create_conn_non_syn_dropped |
8 |
Create Conn with non-SYN Packets Dropped |
|
syn_retry_blacklist |
8 |
SYN Retry Timeout Blacklisted |
|
filter6_match |
8 |
Filter6 Match |
|
req_sz_16k |
8 |
Request Payload Size Less Than or Equal to 16K |
|
req_sz_64k |
8 |
Request Payload Size Less Than or Equal to 64K |
|
ack_retry_rto_progress |
8 |
ACK Retry RTO Progress |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
ack_retry_rto_pass |
8 |
ACK Retry RTO Passed |
|
syn_retry_timeout |
8 |
SYN Retry Timeout |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
src_syn_retry_reset |
8 |
Src SYN Retry Timeout Reset |
|
port_rcvd |
8 |
Inbound Packets Received |
|
prog_win_sent_exceed |
8 |
Time Window: Sent Exceed |
|
conn_prate_excd |
8 |
TCP Conn Pkt Rate Exceeded |
|
src_rst_cookie_fail |
8 |
Src RST Cookie Failed |
stats l4-ssl-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
filter_none_match |
8 |
Filter No Match |
|
src_well_known_port |
8 |
Src TCP SrcPort Wellknown |
|
src_ack_auth_fail |
8 |
Src ACK Retry Dropped |
|
src_conn_rexmit_rate_excd |
8 |
Src TCP Conn Retransmit Rate Exceeded |
|
tcp_rexmit_syn_limit_drop |
8 |
TCP SYN Retransmit Exceeded Drop |
|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
src_ack_retry_gap_drop |
8 |
Src ACK Retry Retry-Gap Dropped |
|
filter4_match |
8 |
Filter4 Match |
|
src_create_conn_non_syn_dropped |
8 |
Src Create Conn with non-SYN Packets Dropped |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
|
sess_aged |
8 |
Sessions Aged Out |
|
tcp_auth_resp |
8 |
TCP Auth Responded |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
conn_close |
8 |
Connections Closed |
|
syn_auth_fail |
8 |
SYN Auth Failed |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
syn_retry_init |
8 |
SYN Retry Init |
|
renegotiation_exceed |
8 |
Renegotiation Exceeded |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
er_condition |
8 |
Error Condition |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
TCP SrcPort Wellknown |
|
prog_conn_time_exceed |
8 |
Connection: Time Exceed |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
port_syn_rate_exceed |
8 |
TCP SYN Rate Exceeded |
|
ssl_port_non_tls |
8 |
SSL Non-TLS Dropped |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
conn_rexmit_rate_excd |
8 |
TCP Conn Retransmit Rate Exceeded |
|
ssl_port_bad_ver |
8 |
SSL Header Bad Version |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
prog_resp_req_ratio_exceed |
8 |
Req-Resp: Response to Request Ratio Exceed |
|
out_of_seq_excd |
8 |
Out-Of-Seq Exceeded |
|
conn_close_w_rst |
8 |
RST Connections Closed |
|
port_src_escalation |
8 |
Src Escalation |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
src_ack_retry_rto_progress |
8 |
Src ACK Retry RTO Progress |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
processed |
8 |
Packets Processed |
|
src_retransmit_excd |
8 |
Src Retransmit Exceeded |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
tcp_rexmit_syn_limit_bl |
8 |
TCP SYN Retransmit Exceeded Blacklist |
|
prog_win_rcvd_sent_ratio_exceed |
8 |
Time Window: Received to Sent Exceed |
|
reset_while_other_in_handshake |
8 |
Reset While Others in Handshake |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
drop_packet |
8 |
Packets Dropped |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
filter5_match |
8 |
Filter5 Match |
|
prog_conn_rcvd_exceed |
8 |
Connection: Received Exceed |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
prog_conn_exceed_drop |
8 |
Connection: Violation Exceed Dropped |
|
tcp_auth_drop |
8 |
TCP Auth Dropped |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
syn_cookie_fail |
8 |
SYN Cookie Failed |
|
prog_request_len_exceed |
8 |
Req-Resp: Request Length Exceed |
|
src_syn_retry_rto_fail |
8 |
Src SYN Retry RTO Dropped |
|
syn_retry_rto_progress |
8 |
SYN Retry RTO Progress |
|
ssl_auth_drop |
8 |
SSL Auth Dropped |
|
prog_win_exceed_bl |
8 |
Time Window: Violation Exceed Blacklisted |
|
syn_retry_pass |
8 |
SYN Retry Passed |
|
rst_cookie_fail |
8 |
RST Cookie Failed |
|
ack_retry_rto_fail |
8 |
ACK Retry RTO Dropped |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
snat_fail |
8 |
Source NAT Failure |
|
is_ssl3 |
8 |
SSL v3 |
|
src_req_rate_exceed |
8 |
Src Request Rate Exceeded |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
src_syn_retry_init |
8 |
Src SYN Retry Init |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
syn_retry_rto_pass |
8 |
SYN Retry RTO Passed |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
bl |
8 |
Dst Blacklisted |
|
filter1_match |
8 |
Filter1 Match |
|
port_bytes |
8 |
Inbound Bytes Received |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
unauth_drop |
8 |
TCP Unauth Dropped |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
conn_create_from_syn |
8 |
Connections Created From SYN |
|
do_auth_handshake |
8 |
Auth Handshake |
|
auth_handshake_bl |
8 |
Auth Handshake Blacklisted |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
prog_conn_sent_exceed |
8 |
Connection: Sent Exceed |
|
prog_exceed_drop |
8 |
Req-Resp: Violation Exceed Dropped |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
src_zero_window_excd |
8 |
Src Zero-Window Exceeded |
|
ssl_bad_header_forw |
8 |
SSL Traffic Check Bad Header Forwarded |
|
prog_first_req_time_exceed |
8 |
Req-Resp: First Request Time Exceed |
|
ack_auth_fail |
8 |
ACK Retry Dropped |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
src_drop |
8 |
Src Packets Dropped |
|
syn_retry_blacklist |
8 |
SYN Retry Timeout Blacklisted |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
src_ack_retry_timeout |
8 |
Src ACK Retry Timeout |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
src_conn_ofo_rate_excd |
8 |
Src TCP Conn Out-Of-Seq Rate Exceeded |
|
syn_retry_gap_drop |
8 |
SYN Retry-Gap Dropped |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
conn_create_from_ack |
8 |
Connections Created From ACK |
|
auth_handshake_fail |
8 |
Auth Handshake Fail |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
src_syn_retry_gap_drop |
8 |
Src SYN Retry-Gap Dropped |
|
syn_retry_timeout |
8 |
SYN Retry Timeout |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
syn_drop |
8 |
SYN Dropped |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
src_syn_rate_exceed |
8 |
Src TCP SYN Rate Exceeded |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
prog_win_rcvd_exceed |
8 |
Time Window: Received Exceed |
|
src_syn_retry_timeout |
8 |
Src SYN Retry Timeout |
|
prog_conn_exceed_bl |
8 |
Connection: Violation Exceed Blacklisted |
|
ssl_port_bad_len |
8 |
SSL Header Bad Length |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
new_syn |
8 |
TCP SYN |
|
src_policy_reset |
8 |
Src Policy Reset |
|
src_syn_cookie_sent |
8 |
Src SYN Cookie Sent |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
ack_retry_timeout |
8 |
ACK Retry Timeout |
|
auth_handshake_success |
8 |
Auth Handshake Success |
|
src_out_of_seq_excd |
8 |
Src Out-Of-Seq Exceeded |
|
ssl_auth_resp |
8 |
SSL Auth Responded |
|
syn_tfo_rcv |
8 |
SYN TFO Received |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
dst_req_rate_exceed |
8 |
Dst Request Rate Exceeded |
|
src_ssl_auth_drop |
8 |
Src SSL Auth Dropped |
|
src_unauth_drop |
8 |
Src TCP Unauth Dropped |
|
filter_action_whitelist |
8 |
Filter Action WL |
|
src_conn_pkt_rate_excd |
8 |
Src TCP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
conn_close_w_fin |
8 |
FIN Connections Closed |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
src_syn_retry_blacklist |
8 |
Src SYN Retry Timeout Blacklisted |
|
auth_handshake_timeout |
8 |
Auth Handshake Timeout |
|
src_ack_retry_rto_pass |
8 |
Src ACK Retry RTO Passed |
|
src_conn_zwindow_rate_excd |
8 |
Src TCP Conn Zero-Window Rate Exceeded |
|
src_ack_retry_init |
8 |
Src ACK Retry Init |
|
ack_retry_blacklist |
8 |
ACK Retry Timeout Blacklisted |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
ssl_bad_header_drop |
8 |
SSL Traffic Check Bad Header Dropped |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
syn_auth_pass |
8 |
SYN Auth Passed |
|
syn_retry_rto_fail |
8 |
SYN Retry RTO Dropped |
|
prog_req_resp_time_exceed |
8 |
Req-Resp: Request to Response Time Exceed |
|
syn_cookie_sent |
8 |
SYN Cookie Sent |
|
prog_exceed_bl |
8 |
Req-Resp: Violation Exceed Blacklisted |
|
retransmit_excd |
8 |
Retransmit Exceeded |
|
src_syn_auth_fail |
8 |
Src SYN Auth Failed |
|
src_filter_action_whitelist |
8 |
Src Filter Action WL |
|
zero_window_excd |
8 |
Zero-Window Exceeded |
|
src_ack_retry_reset |
8 |
Src ACK Retry Timeout Reset |
|
conn_ofo_rate_excd |
8 |
TCP Conn Out-Of-Seq Rate Exceeded |
|
filter2_match |
8 |
Filter2 Match |
|
src_ack_retry_blacklist |
8 |
Src ACK Retry Timeout Blacklisted |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
syn_retry_reset |
8 |
SYN Retry Timeout Reset |
|
prog_response_len_exceed |
8 |
Req-Resp: Response Length Exceed |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
conn_close_w_idle |
8 |
Idle Connections Closed |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
sess_create |
8 |
Session Create |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
ack_retry_pass |
8 |
ACK Retry Passed |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
ack_retry_reset |
8 |
ACK Retry Timeout Reset |
|
is_tls1_2 |
8 |
TLS v1.2 |
|
is_tls1_1 |
8 |
TLS v1.1 |
|
is_tls1_0 |
8 |
TLS v1.0 |
|
policy_reset |
8 |
Policy Reset |
|
syn_retry_failed |
8 |
SYN Retry Dropped |
|
prog_resp_req_time_exceed |
8 |
Req-Resp: Response to Request Time Exceed |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
ack_retry_init |
8 |
ACK Retry Init |
|
prog_conn_rcvd_sent_ratio_exceed |
8 |
Connection: Reveived to Sent Ratio Exceed |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
policy_drop |
8 |
Policy Dropped |
|
ack_retry_gap_drop |
8 |
ACK Retry Retry-Gap Dropped |
|
create_conn_non_syn_dropped |
8 |
Create Conn with non-SYN Packets Dropped |
|
ssl_port_invalid_type |
8 |
SSL Header Invalid Type |
|
current_es_level |
8 |
Current Escalation Level |
|
src_syn_retry_failed |
8 |
Src SYN Retry Dropped |
|
filter_action_drop |
8 |
Filter Action Drop |
|
src_ack_retry_rto_fail |
8 |
Src ACK Retry RTO Dropped |
|
conn_zwindow_rate_excd |
8 |
TCP Conn Zero-Window Rate Exceeded |
|
renegotiation_incomplete |
8 |
Renegotiation Incomplete |
|
ack_retry_rto_progress |
8 |
ACK Retry RTO Progress |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
prog_win_exceed_drop |
8 |
Time Window: Violation Exceed Dropped |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
port_drop |
8 |
Inbound Packets Dropped |
|
ack_retry_rto_pass |
8 |
ACK Retry RTO Passed |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
src_syn_cookie_fail |
8 |
Src SYN Cookie Failed |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
src_syn_retry_rto_pass |
8 |
Src SYN Retry RTO Passed |
|
src_syn_retry_reset |
8 |
Src SYN Retry Timeout Reset |
|
port_rcvd |
8 |
Inbound Packets Received |
|
is_renegotiation |
8 |
SSL Renegotiation |
|
conn_close_half_open |
8 |
Half Open Connections Closed |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
prog_win_sent_exceed |
8 |
Time Window: Sent Exceed |
|
synack_multiple_attempts_per_ip_detected |
8 |
SYNACK Multiple Attempts Per IP Detected |
|
src_syn_retry_rto_progress |
8 |
Src SYN Retry RTO Progress |
|
conn_prate_excd |
8 |
TCP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
synack_reset_sent |
8 |
SYNACK Reset Sent |
|
src_rst_cookie_fail |
8 |
Src RST Cookie Failed |
|
src_auth_drop |
8 |
Src TCP Auth Dropped |
|
src_drop_packet |
8 |
Src Packets Dropped |
stats quic-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
snat_fail |
8 |
Source NAT Failure |
|
0rtt |
8 |
QUIC 0-RTT |
|
token_authentication_prev_salt_matched |
8 |
Token Authentication Previous Salt Matched |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
src_udp_retry_gap_drop |
8 |
Src UDP Retry-Gap Dropped |
|
filter4_match |
8 |
Filter4 Match |
|
spoof_detect_fail |
8 |
UDP Retry Timeout |
|
handshake |
8 |
QUIC Handshake |
|
sess_aged |
8 |
Sessions Aged Out |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
token_authentication_curr_salt_matched |
8 |
Token Authentication Current Salt Matched |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
UDP SrcPort Wellknown |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
invalid_packet_type |
8 |
Invalid Packet Type |
|
src_udp_retry_init |
8 |
Src UDP Retry Init |
|
src_payload_too_small |
8 |
Src UDP Payload Too Small |
|
version_match_action_taken |
8 |
Version Match Action Taken |
|
src_udp_retry_pass |
8 |
Src UDP Retry Passed |
|
udp_retry_init |
8 |
UDP Retry Init |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
port_src_escalation |
8 |
Src Escalation |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
port_bytes |
8 |
Inbound Bytes Received |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
processed |
8 |
QUIC Headers Processed |
|
fixed_bit_not_set |
8 |
Fixed Bit Not Set |
|
malformed_action_drop |
8 |
Malformed Action Drop |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
malformed_scid_len_max_exceed |
8 |
Malformed SCID Length Maximum Exceed |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
filter5_match |
8 |
Filter5 Match |
|
malformed_action_taken |
8 |
Malformed Action Taken |
|
token_authentication_session_created |
8 |
Token Authentication Session Created |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
retry |
8 |
QUIC Retry |
|
zone_src_udp_retry_timeout_blacklist |
8 |
Src UDP Retry Timeout Blacklisted |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
payload_too_small |
8 |
UDP Payload Too Small |
|
version_negotiation |
8 |
QUIC Version Negotiation |
|
src_payload_too_big |
8 |
Src UDP Payload Too Large |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
bl |
8 |
Dst Blacklisted |
|
filter1_match |
8 |
Filter1 Match |
|
ntp_monlist_resp |
8 |
NTP Monlist Response |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
udp_retry_pass |
8 |
UDP Retry Passed |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
dst_udp_retry_timeout_blacklist |
8 |
UDP Retry Timeout Blacklisted |
|
src_udp_auth_drop |
8 |
Src UDP Auth Dropped |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
src_drop |
8 |
Src Packets Dropped |
|
version_match_action_drop |
8 |
Version Match Action Drop |
|
initial_force_tcp |
8 |
Initial Force-TCP |
|
port_drop |
8 |
Inbound Packets Dropped |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
filter_none_match |
8 |
Filter No Match |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
ntp_monlist_req |
8 |
NTP Monlist Request |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
payload_too_big |
8 |
UDP Payload Too Large |
|
token_authentication_session_created_fail |
8 |
Token Authentication Session Created Fail |
|
malformed_dcid_len_max_exceed |
8 |
Malformed DCID Length Maximum Exceed |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
initial |
8 |
QUIC Initial |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
udp_retry_gap_drop |
8 |
UDP Retry-Gap Dropped |
|
filter_action_whitelist |
8 |
Filter Action Whitelist |
|
src_conn_pkt_rate_excd |
8 |
Src UDP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
src_well_known_port |
8 |
Src UDP SrcPort Wellknown |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
src_filter_action_whitelist |
8 |
Src Filter Action Whitelist |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
filter2_match |
8 |
Filter2 Match |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
malformed_action_blacklist |
8 |
Malformed Action Blacklist |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
src_ntp_monlist_resp |
8 |
Src NTP Monlist Response |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
sess_create |
8 |
Session Create |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
udp_auth_drop |
8 |
UDP Auth Dropped |
|
src_ntp_monlist_req |
8 |
Src NTP Monlist Request |
|
version_match_action_blacklist |
8 |
Version Match Action Blacklist |
|
token_authentication_mismatched |
8 |
Token Authentication Mismatched Packets |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
current_es_level |
8 |
Current Escalation Level |
|
filter_action_drop |
8 |
Filter Action Drop |
|
token_authentication_invalid |
8 |
Token Authentication Invalid Packets |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
port_rcvd |
8 |
Inbound Packets Received |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
conn_prate_excd |
8 |
UDP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
packet_parse_failed |
8 |
Packet Parse Failed |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
|
src_udp_auth_timeout |
8 |
Src UDP Retry Timeout |
stats sip-tcp-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
src_ack_auth_fail |
8 |
Src ACK Retry Dropped |
|
src_well_known_port |
8 |
Src TCP SrcPort Wellknown |
|
concatenate_msg |
8 |
Concatenate Message |
|
tcp_rexmit_syn_limit_drop |
8 |
TCP SYN Retransmit Exceeded Drop |
|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
invalid_header |
8 |
Invalid Header |
|
header_filter_filter2_match |
8 |
Header Filter 2 Match |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
src_ack_retry_gap_drop |
8 |
Src ACK Retry Retry-Gap Dropped |
|
src_out_of_seq_excd |
8 |
Src Out-Of-Seq Exceeded |
|
response_2xx |
8 |
Response Status Code 2xx |
|
src_create_conn_non_syn_dropped |
8 |
Src Create Conn with non-SYN Packets Dropped |
|
prog_first_req_time_exceed |
8 |
Req-Resp: First Request Time Exceed |
|
sess_aged |
8 |
Sessions Aged Out |
|
src_unauth_drop |
8 |
Src TCP Unauth Dropped |
|
tcp_auth_resp |
8 |
TCP Auth Responded |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
conn_close |
8 |
Connections Closed |
|
syn_auth_fail |
8 |
SYN Auth Failed |
|
max_header_value_len_exceed |
8 |
Max Header Value Length Exceed |
|
read_start_line_error |
8 |
Start Line Read Error |
|
malform_request |
8 |
Malformed Request |
|
response_3xx |
8 |
Response Status Code 3xx |
|
line_mem_allocated |
8 |
Line Memory Allocated |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
syn_drop |
8 |
SYN Dropped |
|
request_method_ack |
8 |
Request Method ACK |
|
src_rate3_limit_exceed |
8 |
Src Request Rate 3 Limit Exceed |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
TCP SrcPort Wellknown |
|
prog_conn_time_exceed |
8 |
Connection: Time Exceed |
|
src_ack_retry_rto_pass |
8 |
Src ACK Retry RTO Passed |
|
body_too_big |
8 |
Body Too Big |
|
port_syn_rate_exceed |
8 |
TCP SYN Rate Exceeded |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
response_unknown_version |
8 |
Unknown Response Version |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
request_method_subscribe |
8 |
Request Method SUBSCRIBE |
|
syn_retry_gap_drop |
8 |
SYN Retry-Gap Dropped |
|
response_6xx |
8 |
Response Status Code 6xx |
|
conn_rexmit_rate_excd |
8 |
TCP Conn Retransmit Rate Exceeded |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
prog_resp_req_ratio_exceed |
8 |
Req-Resp: Response to Request Ratio Exceed |
|
out_of_seq_excd |
8 |
Out-Of-Seq Exceeded |
|
syn_cookie_sent |
8 |
SYN Cookie Sent |
|
header_filter_filter3_match |
8 |
Header Filter 3 Match |
|
filter_none_match |
8 |
Filter No Match |
|
port_bytes |
8 |
Inbound Bytes Received |
|
src_ack_retry_rto_progress |
8 |
Src ACK Retry RTO Progress |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
too_many_header |
8 |
Max Header Count Exceed |
|
src_retransmit_excd |
8 |
Src Retransmit Exceeded |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
tcp_rexmit_syn_limit_bl |
8 |
TCP SYN Retransmit Exceeded Blacklist |
|
prog_win_rcvd_sent_ratio_exceed |
8 |
Time Window: Received to Sent Exceed |
|
src_ack_retry_timeout |
8 |
Src ACK Retry Timeout |
|
header_filter_filter5_match |
8 |
Header Filter 5 Match |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
conn_close_w_rst |
8 |
RST Connections Closed |
|
rate1_limit_exceed |
8 |
Dst Request Rate 1 Limit Exceed |
|
request_method_refer |
8 |
Request Method REFER |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
port_src_escalation |
8 |
Src Escalation |
|
filter5_match |
8 |
Filter5 Match |
|
client_rst |
8 |
Client Rst |
|
prog_conn_rcvd_exceed |
8 |
Connection: Received Exceed |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
prog_conn_exceed_drop |
8 |
Connection: Violation Exceed Dropped |
|
prog_conn_exceed_bl |
8 |
Connection: Violation Exceed Blacklisted |
|
tcp_auth_drop |
8 |
TCP Auth Dropped |
|
header_filter_action_default_pass |
8 |
Header Filter Action Default Pass |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
syn_retry_rto_pass |
8 |
SYN Retry RTO Passed |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
syn_cookie_fail |
8 |
SYN Cookie Failed |
|
filter4_match |
8 |
Filter4 Match |
|
prog_request_len_exceed |
8 |
Req-Resp: Request Length Exceed |
|
src_syn_retry_rto_fail |
8 |
Src SYN Retry RTO Dropped |
|
ack_retry_gap_drop |
8 |
ACK Retry Retry-Gap Dropped |
|
syn_retry_rto_progress |
8 |
SYN Retry RTO Progress |
|
src_conn_rexmit_rate_excd |
8 |
Src TCP Conn Retransmit Rate Exceeded |
|
prog_win_exceed_bl |
8 |
Time Window: Violation Exceed Blacklisted |
|
line_mem_freed |
8 |
Line Memory Freed |
|
rst_cookie_fail |
8 |
RST Cookie Failed |
|
ack_retry_rto_fail |
8 |
ACK Retry RTO Dropped |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
current_es_level |
8 |
Current Escalation Level |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
src_syn_retry_init |
8 |
Src SYN Retry Init |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
ofo_queue_size_exceed |
8 |
Out-Of-Order Queue Size Exceed |
|
request_method_prack |
8 |
Request Method PRACK |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
response_5xx |
8 |
Response Status Code 5xx |
|
bl |
8 |
Dst Blacklisted |
|
filter1_match |
8 |
Filter1 Match |
|
error_condition |
8 |
Error Condition |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
header_filter_action_whitelist |
8 |
Header Filter Action Whitelist |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
header_filter_not_match |
8 |
Header Filter Not Match |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
prog_conn_sent_exceed |
8 |
Connection: Sent Exceed |
|
header_filter_filter1_match |
8 |
Header Filter 1 Match |
|
ofo_timeout |
8 |
Out-of-Order Timeout |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
src_zero_window_excd |
8 |
Src Zero-Window Exceeded |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
ack_auth_fail |
8 |
ACK Retry Dropped |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
prog_exceed_drop |
8 |
Req-Resp: Violation Exceed Dropped |
|
parse_header_fail_error |
8 |
Header Parse Fail |
|
request_method_info |
8 |
Request Method INFO |
|
syn_retry_blacklist |
8 |
SYN Retry Timeout Blacklisted |
|
synack_reset_sent |
8 |
SYNACK Reset Sent |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
src_conn_ofo_rate_excd |
8 |
Src TCP Conn Out-Of-Seq Rate Exceeded |
|
port_drop |
8 |
Inbound Packets Dropped |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
conn_create_from_ack |
8 |
Connections Created From ACK |
|
parse_start_line_error |
8 |
Start Line Parse Error |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
max_uri_len_exceed |
8 |
Max URI Length Exceed |
|
src_syn_retry_gap_drop |
8 |
Src SYN Retry-Gap Dropped |
|
request_method_publish |
8 |
Request Method PUBLISH |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
request_unknown_version |
8 |
Unknown Request Version |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
src_syn_rate_exceed |
8 |
Src TCP SYN Rate Exceeded |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
prog_win_rcvd_exceed |
8 |
Time Window: Received Exceed |
|
src_syn_retry_timeout |
8 |
Src SYN Retry Timeout |
|
request_method_bye |
8 |
Request Method BYE |
|
response_1xx |
8 |
Response Status Code 1xx |
|
src_syn_retry_blacklist |
8 |
Src SYN Retry Timeout Blacklisted |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
src_rate1_limit_exceed |
8 |
Src Request Rate 1 Limit Exceed |
|
response_unknown |
8 |
Unknown Response Status Code |
|
keep_alive_msg |
8 |
KeepAlive Message |
|
unauth_drop |
8 |
TCP Unauth Dropped |
|
src_syn_cookie_sent |
8 |
Src SYN Cookie Sent |
|
header_filter_action_drop |
8 |
Header Filter Action Drop |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
ack_retry_timeout |
8 |
ACK Retry Timeout |
|
header_filter_filter4_match |
8 |
Header Filter 4 Match |
|
request_method_register |
8 |
Request Method REGISTER |
|
syn_retry_timeout |
8 |
SYN Retry Timeout |
|
syn_tfo_rcv |
8 |
SYN TFO Received |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
ack_retry_rto_pass |
8 |
ACK Retry RTO Passed |
|
response_4xx |
8 |
Response Status Code 4xx |
|
seq_check_ofo |
8 |
Sequence Check Out-Of-Order |
|
policy_violation |
8 |
Policy Violation |
|
seq_check_retrans_fin |
8 |
Sequence Check Retransmit Fin |
|
filter_action_whitelist |
8 |
Filter Action WL |
|
src_conn_pkt_rate_excd |
8 |
Src TCP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
request_method_unknown |
8 |
Unknown Request Method |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
mem_alloc_fail_error |
8 |
Memory Allocate Fail |
|
snat_fail |
8 |
Source NAT Failure |
|
request_method_invite |
8 |
Request Method INVITE |
|
conn_close_w_fin |
8 |
FIN Connections Closed |
|
src_rate2_limit_exceed |
8 |
Src Request Rate 2 Limit Exceed |
|
syn_retry_init |
8 |
SYN Retry Init |
|
request_method_message |
8 |
Request Method MESSAGE |
|
src_conn_zwindow_rate_excd |
8 |
Src TCP Conn Zero-Window Rate Exceeded |
|
sess_create |
8 |
Session Create |
|
src_ack_retry_init |
8 |
Src ACK Retry Init |
|
ack_retry_blacklist |
8 |
ACK Retry Timeout Blacklisted |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
prog_req_resp_time_exceed |
8 |
Req-Resp: Request to Response Time Exceed |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
syn_auth_pass |
8 |
SYN Auth Passed |
|
syn_retry_rto_fail |
8 |
SYN Retry RTO Dropped |
|
get_content_fail_error |
8 |
Get Content Fail |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
prog_exceed_bl |
8 |
Req-Resp: Violation Exceed Blacklisted |
|
retransmit_excd |
8 |
Retransmit Exceeded |
|
src_syn_auth_fail |
8 |
Src SYN Auth Failed |
|
src_filter_action_whitelist |
8 |
Src Filter Action WL |
|
zero_window_excd |
8 |
Zero-Window Exceeded |
|
seq_check_retrans_rst |
8 |
Sequence Check Retransmit Rst |
|
src_ack_retry_reset |
8 |
Src ACK Retry Timeout Reset |
|
conn_ofo_rate_excd |
8 |
TCP Conn Out-Of-Seq Rate Exceeded |
|
pkts_ofo_total |
8 |
Packet Out-Of-Order Total |
|
filter2_match |
8 |
Filter2 Match |
|
src_ack_retry_blacklist |
8 |
Src ACK Retry Timeout Blacklisted |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
syn_retry_reset |
8 |
SYN Retry Timeout Reset |
|
prog_response_len_exceed |
8 |
Req-Resp: Response Length Exceed |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
ack_retry_pass |
8 |
ACK Retry Passed |
|
conn_close_w_idle |
8 |
Idle Connections Closed |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
request_method_notify |
8 |
Request Method NOTIFY |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
header_filter_match |
8 |
Header Filter Match |
|
src_drop |
8 |
Src Packets Dropped |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
max_call_id_len_exceed |
8 |
Max Call ID Length Exceed |
|
header_name_too_long |
8 |
Max Header Name Length Exceed |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
pkts_retrans_total |
8 |
Packets Retransmit Total |
|
seq_check_retrans_other |
8 |
Sequence Check Retransmit Other |
|
header_filter_none_match |
8 |
None Header Filter Match |
|
request_method_options |
8 |
Request Method OPTIONS |
|
request_method_update |
8 |
Request Method UPDATE |
|
syn_retry_failed |
8 |
SYN Retry Dropped |
|
prog_resp_req_time_exceed |
8 |
Req-Resp: Response to Request Time Exceed |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
max_sdp_len_exceed |
8 |
Max SDP Length Exceed |
|
ack_retry_init |
8 |
ACK Retry Init |
|
prog_conn_rcvd_sent_ratio_exceed |
8 |
Connection: Reveived to Sent Ratio Exceed |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
policy_drop |
8 |
Policy Drop |
|
ack_retry_reset |
8 |
ACK Retry Timeout Reset |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
conn_create_from_syn |
8 |
Connections Created From SYN |
|
create_conn_non_syn_dropped |
8 |
Create Conn with non-SYN Packets Dropped |
|
syn_retry_pass |
8 |
SYN Retry Passed |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
prog_win_sent_exceed |
8 |
Time Window: Sent Exceed |
|
rate2_limit_exceed |
8 |
Dst Request Rate 2 Limit Exceed |
|
src_syn_retry_failed |
8 |
Src SYN Retry Dropped |
|
filter_action_drop |
8 |
Filter Action Drop |
|
src_ack_retry_rto_fail |
8 |
Src ACK Retry RTO Dropped |
|
conn_zwindow_rate_excd |
8 |
TCP Conn Zero-Window Rate Exceeded |
|
idle_timeout |
8 |
Idle Timeout |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
ack_retry_rto_progress |
8 |
ACK Retry RTO Progress |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
prog_win_exceed_drop |
8 |
Time Window: Violation Exceed Dropped |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
invalid_start_line_error |
8 |
Invalid Start Line |
|
rate3_limit_exceed |
8 |
Dst Request Rate 3 Limit Exceed |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
src_syn_cookie_fail |
8 |
Src SYN Cookie Failed |
|
line_too_long |
8 |
Line Too Long |
|
src_syn_retry_rto_pass |
8 |
Src SYN Retry RTO Passed |
|
src_syn_retry_reset |
8 |
Src SYN Retry Timeout Reset |
|
port_rcvd |
8 |
Inbound Packets Received |
|
conn_close_half_open |
8 |
Half Open Connections Closed |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
seq_check_retrans_push |
8 |
Sequence Check Retransmit Push |
|
synack_multiple_attempts_per_ip_detected |
8 |
SYNACK Multiple Attempts Per IP Detected |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
src_syn_retry_rto_progress |
8 |
Src SYN Retry RTO Progress |
|
request_method_cancel |
8 |
Request Method CANCEL |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
conn_prate_excd |
8 |
TCP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
header_filter_action_blacklist |
8 |
Header Filter Action Blacklist |
|
src_rst_cookie_fail |
8 |
Src RST Cookie Failed |
|
src_auth_drop |
8 |
Src TCP Auth Dropped |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
stats sip-udp-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
filter_none_match |
8 |
Filter No Match |
|
snat_fail |
8 |
Source NAT Failure |
|
concatenate_msg |
8 |
Concatenate Message |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
invalid_header |
8 |
Invalid Header |
|
header_filter_filter2_match |
8 |
Header Filter 2 Match |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
src_udp_retry_gap_drop |
8 |
Src UDP Retry-Gap Dropped |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
filter4_match |
8 |
Filter4 Match |
|
response_2xx |
8 |
Response Status Code 2xx |
|
spoof_detect_fail |
8 |
UDP Retry Timeout |
|
sess_aged |
8 |
Sessions Aged Out |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
max_header_value_len_exceed |
8 |
Max Header Value Length Exceed |
|
src_payload_too_small |
8 |
Src UDP Payload Too Small |
|
udp_auth_pass |
8 |
Auth UDP Passed |
|
read_start_line_error |
8 |
Start Line Read Error |
|
malform_request |
8 |
Malformed Request |
|
response_3xx |
8 |
Response Status Code 3xx |
|
line_mem_allocated |
8 |
Line Memory Allocated |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
udp_auth |
8 |
Auth UDP Init |
|
token_authentication_curr_salt_matched |
8 |
Token Authentication Current Salt Matched |
|
request_method_ack |
8 |
Request Method ACK |
|
src_rate3_limit_exceed |
8 |
Src Request Rate 3 Limit Exceed |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
UDP SrcPort Wellknown |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
body_too_big |
8 |
Body Too Big |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
src_udp_retry_init |
8 |
Src UDP Retry Init |
|
response_unknown_version |
8 |
Unknown Response Version |
|
token_authentication_prev_salt_matched |
8 |
Token Authentication Previous Salt Matched |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
request_method_subscribe |
8 |
Request Method SUBSCRIBE |
|
response_6xx |
8 |
Response Status Code 6xx |
|
src_udp_retry_pass |
8 |
Src UDP Retry Passed |
|
udp_retry_init |
8 |
UDP Retry Init |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
header_filter_filter3_match |
8 |
Header Filter 3 Match |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
port_bytes |
8 |
Inbound Bytes Received |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
too_many_header |
8 |
Max Header Count Exceed |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
header_filter_filter5_match |
8 |
Header Filter 5 Match |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
rate1_limit_exceed |
8 |
Dst Request Rate 1 Limit Exceed |
|
request_method_refer |
8 |
Request Method REFER |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
port_src_escalation |
8 |
Src Escalation |
|
filter5_match |
8 |
Filter5 Match |
|
src_udp_auth_fail |
8 |
Src Auth UDP Failed |
|
token_authentication_session_created |
8 |
Token Authentication Session Created |
|
header_filter_action_default_pass |
8 |
Header Filter Action Default Pass |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
zone_src_udp_retry_timeout_blacklist |
8 |
Src UDP Retry Timeout Blacklisted |
|
line_mem_freed |
8 |
Line Memory Freed |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
current_es_level |
8 |
Current Escalation Level |
|
payload_too_small |
8 |
UDP Payload Too Small |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
request_method_prack |
8 |
Request Method PRACK |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
response_5xx |
8 |
Response Status Code 5xx |
|
bl |
8 |
Dst Blacklisted |
|
filter1_match |
8 |
Filter1 Match |
|
ntp_monlist_resp |
8 |
NTP Monlist Response |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
header_filter_action_whitelist |
8 |
Header Filter Action Whitelist |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
header_filter_not_match |
8 |
Header Filter Not Match |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
header_filter_filter1_match |
8 |
Header Filter 1 Match |
|
udp_retry_pass |
8 |
UDP Retry Passed |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
dst_udp_retry_timeout_blacklist |
8 |
UDP Retry Timeout Blacklisted |
|
udp_auth_retry_gap_drop |
8 |
Auth UDP Retry-Gap Dropped |
|
src_udp_auth_drop |
8 |
Src UDP Auth Dropped |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
parse_header_fail_error |
8 |
Header Parse Fail |
|
request_method_info |
8 |
Request Method INFO |
|
udp_auth_retry_fail |
8 |
Auth UDP Retry Failed |
|
port_drop |
8 |
Inbound Packets Dropped |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
parse_start_line_error |
8 |
Start Line Parse Error |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
max_uri_len_exceed |
8 |
Max URI Length Exceed |
|
ntp_monlist_req |
8 |
NTP Monlist Request |
|
request_method_publish |
8 |
Request Method PUBLISH |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
payload_too_big |
8 |
UDP Payload Too Large |
|
request_unknown_version |
8 |
Unknown Request Version |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
token_authentication_session_created_fail |
8 |
Token Authentication Session Created Fail |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
request_method_bye |
8 |
Request Method BYE |
|
response_1xx |
8 |
Response Status Code 1xx |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
src_rate1_limit_exceed |
8 |
Src Request Rate 1 Limit Exceed |
|
response_unknown |
8 |
Unknown Response Status Code |
|
keep_alive_msg |
8 |
KeepAlive Message |
|
header_filter_action_drop |
8 |
Header Filter Action Drop |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
header_filter_filter4_match |
8 |
Header Filter 4 Match |
|
request_method_register |
8 |
Request Method REGISTER |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
udp_retry_gap_drop |
8 |
UDP Retry-Gap Dropped |
|
response_4xx |
8 |
Response Status Code 4xx |
|
policy_violation |
8 |
Policy Violation |
|
filter_action_whitelist |
8 |
Filter Action Whitelist |
|
src_conn_pkt_rate_excd |
8 |
Src UDP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
src_udp_auth |
8 |
Src Auth UDP Init |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
mem_alloc_fail_error |
8 |
Memory Allocate Fail |
|
request_method_invite |
8 |
Request Method INVITE |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
src_rate2_limit_exceed |
8 |
Src Request Rate 2 Limit Exceed |
|
request_method_message |
8 |
Request Method MESSAGE |
|
sess_create |
8 |
Session Create |
|
src_well_known_port |
8 |
Src UDP SrcPort Wellknown |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
get_content_fail_error |
8 |
Get Content Fail |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
src_filter_action_whitelist |
8 |
Src Filter Action Whitelist |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
src_payload_too_big |
8 |
Src UDP Payload Too Large |
|
filter2_match |
8 |
Filter2 Match |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
src_ntp_monlist_resp |
8 |
Src NTP Monlist Response |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
request_method_notify |
8 |
Request Method NOTIFY |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
header_filter_match |
8 |
Header Filter Match |
|
src_drop |
8 |
Src Packets Dropped |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
udp_auth_drop |
8 |
UDP Auth Dropped |
|
max_call_id_len_exceed |
8 |
Max Call ID Length Exceed |
|
header_name_too_long |
8 |
Max Header Name Length Exceed |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
src_ntp_monlist_req |
8 |
Src NTP Monlist Request |
|
header_filter_none_match |
8 |
None Header Filter Match |
|
request_method_options |
8 |
Request Method OPTIONS |
|
request_method_update |
8 |
Request Method UPDATE |
|
token_authentication_mismatched |
8 |
Token Authentication Mismatched Packets |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
max_sdp_len_exceed |
8 |
Max SDP Length Exceed |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
policy_drop |
8 |
Policy Drop |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
rate2_limit_exceed |
8 |
Dst Request Rate 2 Limit Exceed |
|
filter_action_drop |
8 |
Filter Action Drop |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
token_authentication_invalid |
8 |
Token Authentication Invalid Packets |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
invalid_start_line_error |
8 |
Invalid Start Line |
|
rate3_limit_exceed |
8 |
Dst Request Rate 3 Limit Exceed |
|
request_method_unknown |
8 |
Unknown Request Method |
|
line_too_long |
8 |
Line Too Long |
|
port_rcvd |
8 |
Inbound Packets Received |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
request_method_cancel |
8 |
Request Method CANCEL |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
conn_prate_excd |
8 |
UDP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
header_filter_action_blacklist |
8 |
Header Filter Action Blacklist |
|
udp_auth_fail |
8 |
Auth UDP Failed |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
|
src_udp_auth_timeout |
8 |
Src UDP Retry Timeout |
stats tcp-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
src_ack_auth_fail |
8 |
Src ACK Retry Dropped |
|
src_well_known_port |
8 |
Src TCP SrcPort Wellknown |
|
tcp_rexmit_syn_limit_drop |
8 |
TCP SYN Retransmit Exceeded Drop |
|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
auth_drop |
8 |
TCP Auth Dropped |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
src_ack_retry_gap_drop |
8 |
Src ACK Retry Retry-Gap Dropped |
|
filter4_match |
8 |
Filter4 Match |
|
src_create_conn_non_syn_dropped |
8 |
Src Create Conn with non-SYN Packets Dropped |
|
prog_first_req_time_exceed |
8 |
Req-Resp: First Request Time Exceed |
|
sess_aged |
8 |
Sessions Aged Out |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
conn_close |
8 |
Connections Closed |
|
syn_auth_fail |
8 |
SYN Auth Failed |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
syn_retry_init |
8 |
SYN Retry Init |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
TCP SrcPort Wellknown |
|
prog_conn_time_exceed |
8 |
Connection: Time Exceed |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
port_syn_rate_exceed |
8 |
TCP SYN Rate Exceeded |
|
conn_rexmit_rate_excd |
8 |
TCP Conn Retransmit Rate Exceeded |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
prog_resp_req_ratio_exceed |
8 |
Req-Resp: Response to Request Ratio Exceed |
|
out_of_seq_excd |
8 |
Out-Of-Seq Exceeded |
|
conn_close_w_rst |
8 |
RST Connections Closed |
|
port_src_escalation |
8 |
Src Escalation |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
src_ack_retry_rto_progress |
8 |
Src ACK Retry RTO Progress |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
src_retransmit_excd |
8 |
Src Retransmit Exceeded |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
tcp_rexmit_syn_limit_bl |
8 |
TCP SYN Retransmit Exceeded Blacklist |
|
prog_win_rcvd_sent_ratio_exceed |
8 |
Time Window: Received to Sent Exceed |
|
src_ack_retry_timeout |
8 |
Src ACK Retry Timeout |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
filter5_match |
8 |
Filter5 Match |
|
prog_conn_rcvd_exceed |
8 |
Connection: Received Exceed |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
prog_conn_exceed_drop |
8 |
Connection: Violation Exceed Dropped |
|
port_bytes |
8 |
Inbound Bytes Received |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
syn_cookie_fail |
8 |
SYN Cookie Failed |
|
prog_request_len_exceed |
8 |
Req-Resp: Request Length Exceed |
|
src_syn_retry_rto_fail |
8 |
Src SYN Retry RTO Dropped |
|
syn_retry_rto_progress |
8 |
SYN Retry RTO Progress |
|
src_conn_rexmit_rate_excd |
8 |
Src TCP Conn Retransmit Rate Exceeded |
|
prog_win_exceed_bl |
8 |
Time Window: Violation Exceed Blacklisted |
|
src_out_of_seq_excd |
8 |
Src Out-Of-Seq Exceeded |
|
rst_cookie_fail |
8 |
RST Cookie Failed |
|
ack_retry_rto_fail |
8 |
ACK Retry RTO Dropped |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
snat_fail |
8 |
Source NAT Failure |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
src_syn_retry_init |
8 |
Src SYN Retry Init |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
syn_retry_rto_pass |
8 |
SYN Retry RTO Passed |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
bl |
8 |
Dst Blacklisted |
|
filter1_match |
8 |
Filter1 Match |
|
auth_resp |
8 |
TCP Auth Responded |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
conn_create_from_syn |
8 |
Connections Created From SYN |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
prog_conn_sent_exceed |
8 |
Connection: Sent Exceed |
|
prog_exceed_drop |
8 |
Req-Resp: Violation Exceed Dropped |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
src_zero_window_excd |
8 |
Src Zero-Window Exceeded |
|
ack_auth_fail |
8 |
ACK Retry Dropped |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
src_drop |
8 |
Src Packets Dropped |
|
syn_retry_blacklist |
8 |
SYN Retry Timeout Blacklisted |
|
synack_reset_sent |
8 |
SYNACK Reset Sent |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
src_conn_ofo_rate_excd |
8 |
Src TCP Conn Out-Of-Seq Rate Exceeded |
|
syn_retry_gap_drop |
8 |
SYN Retry-Gap Dropped |
|
prog_resp_req_time_exceed |
8 |
Req-Resp: Response to Request Time Exceed |
|
conn_create_from_ack |
8 |
Connections Created From ACK |
|
filter_none_match |
8 |
Filter No Match |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
src_syn_retry_gap_drop |
8 |
Src SYN Retry-Gap Dropped |
|
prog_exceed_bl |
8 |
Req-Resp: Violation Exceed Blacklisted |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
syn_drop |
8 |
SYN Dropped |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
src_syn_rate_exceed |
8 |
Src TCP SYN Rate Exceeded |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
prog_win_rcvd_exceed |
8 |
Time Window: Received Exceed |
|
src_syn_retry_timeout |
8 |
Src SYN Retry Timeout |
|
prog_conn_exceed_bl |
8 |
Connection: Violation Exceed Blacklisted |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
unauth_drop |
8 |
TCP Unauth Dropped |
|
src_syn_cookie_sent |
8 |
Src SYN Cookie Sent |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
ack_retry_timeout |
8 |
ACK Retry Timeout |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
syn_retry_timeout |
8 |
SYN Retry Timeout |
|
syn_tfo_rcv |
8 |
SYN TFO Received |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
src_unauth_drop |
8 |
Src TCP Unauth Dropped |
|
filter_action_whitelist |
8 |
Filter Action WL |
|
src_conn_pkt_rate_excd |
8 |
Src TCP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
conn_close_w_fin |
8 |
FIN Connections Closed |
|
src_syn_retry_blacklist |
8 |
Src SYN Retry Timeout Blacklisted |
|
src_ack_retry_rto_pass |
8 |
Src ACK Retry RTO Passed |
|
src_conn_zwindow_rate_excd |
8 |
Src TCP Conn Zero-Window Rate Exceeded |
|
src_ack_retry_init |
8 |
Src ACK Retry Init |
|
ack_retry_blacklist |
8 |
ACK Retry Timeout Blacklisted |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
syn_auth_pass |
8 |
SYN Auth Passed |
|
syn_retry_rto_fail |
8 |
SYN Retry RTO Dropped |
|
prog_req_resp_time_exceed |
8 |
Req-Resp: Request to Response Time Exceed |
|
syn_cookie_sent |
8 |
SYN Cookie Sent |
|
retransmit_excd |
8 |
Retransmit Exceeded |
|
src_syn_auth_fail |
8 |
Src SYN Auth Failed |
|
src_filter_action_whitelist |
8 |
Src Filter Action WL |
|
zero_window_excd |
8 |
Zero-Window Exceeded |
|
src_ack_retry_reset |
8 |
Src ACK Retry Timeout Reset |
|
conn_ofo_rate_excd |
8 |
TCP Conn Out-Of-Seq Rate Exceeded |
|
filter2_match |
8 |
Filter2 Match |
|
src_ack_retry_blacklist |
8 |
Src ACK Retry Timeout Blacklisted |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
syn_retry_reset |
8 |
SYN Retry Timeout Reset |
|
prog_response_len_exceed |
8 |
Req-Resp: Response Length Exceed |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
conn_close_w_idle |
8 |
Idle Connections Closed |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
sess_create |
8 |
Session Create |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
ack_retry_pass |
8 |
ACK Retry Passed |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
ack_retry_reset |
8 |
ACK Retry Timeout Reset |
|
src_syn_cookie_fail |
8 |
Src SYN Cookie Failed |
|
syn_retry_failed |
8 |
SYN Retry Dropped |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
ack_retry_init |
8 |
ACK Retry Init |
|
prog_conn_rcvd_sent_ratio_exceed |
8 |
Connection: Reveived to Sent Ratio Exceed |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
ack_retry_gap_drop |
8 |
ACK Retry Retry-Gap Dropped |
|
create_conn_non_syn_dropped |
8 |
Create Conn with non-SYN Packets Dropped |
|
syn_retry_pass |
8 |
SYN Retry Passed |
|
current_es_level |
8 |
Current Escalation Level |
|
src_syn_retry_failed |
8 |
Src SYN Retry Dropped |
|
filter_action_drop |
8 |
Filter Action Drop |
|
src_ack_retry_rto_fail |
8 |
Src ACK Retry RTO Dropped |
|
conn_zwindow_rate_excd |
8 |
TCP Conn Zero-Window Rate Exceeded |
|
ack_retry_rto_progress |
8 |
ACK Retry RTO Progress |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
prog_win_exceed_drop |
8 |
Time Window: Violation Exceed Dropped |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
port_drop |
8 |
Inbound Packets Dropped |
|
ack_retry_rto_pass |
8 |
ACK Retry RTO Passed |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
src_syn_retry_rto_pass |
8 |
Src SYN Retry RTO Passed |
|
src_syn_retry_reset |
8 |
Src SYN Retry Timeout Reset |
|
port_rcvd |
8 |
Inbound Packets Received |
|
conn_close_half_open |
8 |
Half Open Connections Closed |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
prog_win_sent_exceed |
8 |
Time Window: Sent Exceed |
|
synack_multiple_attempts_per_ip_detected |
8 |
SYNACK Multiple Attempts Per IP Detected |
|
src_syn_retry_rto_progress |
8 |
Src SYN Retry RTO Progress |
|
conn_prate_excd |
8 |
TCP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
src_rst_cookie_fail |
8 |
Src RST Cookie Failed |
|
src_auth_drop |
8 |
Src TCP Auth Dropped |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
stats udp-zone-port¶
Counter |
Size |
Description |
|
---|---|---|---|
secondary_port_kbit_rate_exceed_pkt |
8 |
Per Addr-Port KiBit Rate Exceeded Count |
|
snat_fail |
8 |
Source NAT Failure |
|
pattern_filter5_match |
8 |
Extracted Filter5 Match |
|
token_authentication_prev_salt_matched |
8 |
Token Authentication Previous Salt Matched |
|
frag_drop |
8 |
Fragmented Packets Dropped |
|
outbound_port_bytes_sent |
8 |
Outbound Bytes Forwarded |
|
src_udp_retry_gap_drop |
8 |
Src UDP Retry-Gap Dropped |
|
filter4_match |
8 |
Filter4 Match |
|
spoof_detect_fail |
8 |
UDP Retry Timeout |
|
sess_aged |
8 |
Sessions Aged Out |
|
pattern_filter4_match |
8 |
Extracted Filter4 Match |
|
pattern_filter1_match |
8 |
Extracted Filter1 Match |
|
pattern_filter2_match |
8 |
Extracted Filter2 Match |
|
secondary_port_kbit_rate_exceed |
8 |
Per Addr-Port KiBit Rate Exceeded |
|
token_authentication_curr_salt_matched |
8 |
Token Authentication Current Salt Matched |
|
secondary_port_hit |
8 |
Per Addr-Port Hit |
|
wellknown_sport_drop |
8 |
UDP SrcPort Wellknown |
|
src_filter_total_not_match |
8 |
Src Filter Not Matched on Pkt |
|
src_udp_retry_init |
8 |
Src UDP Retry Init |
|
src_payload_too_small |
8 |
Src UDP Payload Too Small |
|
src_udp_retry_pass |
8 |
Src UDP Retry Passed |
|
udp_retry_init |
8 |
UDP Retry Init |
|
outbound_port_bytes |
8 |
Outbound Bytes Received |
|
src_filter5_match |
8 |
Src Filter5 Match |
|
port_src_escalation |
8 |
Src Escalation |
|
dst_hw_drop |
8 |
Dst Hardware Packets Dropped |
|
port_bytes |
8 |
Inbound Bytes Received |
|
frag_rcvd |
8 |
Fragmented Packets Received |
|
src_filter_action_blacklist |
8 |
Src Filter Action Blacklist |
|
pattern_filter3_match |
8 |
Extracted Filter3 Match |
|
dst_hw_drop_removed |
8 |
Dst Hardware Drop Rules Removed |
|
src_zone_service_entry_aged |
8 |
SrcZoneService Entry Aged |
|
outbound_port_drop |
8 |
Outbound Packets Dropped |
|
sflow_external_packets_sent |
8 |
Sflow External Packets Sent |
|
filter5_match |
8 |
Filter5 Match |
|
token_authentication_session_created |
8 |
Token Authentication Session Created |
|
no_policy_class_list_match |
8 |
No Policy Class-list Match |
|
src_filter_action_default_pass |
8 |
Src Filter Action Default Pass |
|
zone_src_udp_retry_timeout_blacklist |
8 |
Src UDP Retry Timeout Blacklisted |
|
filter_total_not_match |
8 |
Filter Not Matched on Pkt |
|
sflow_internal_packets_sent |
8 |
Sflow Internal Packets Sent |
|
payload_too_small |
8 |
UDP Payload Too Small |
|
src_payload_too_big |
8 |
Src UDP Payload Too Large |
|
outbound_port_bytes_drop |
8 |
Outbound Bytes Dropped |
|
exceed_action_tunnel |
8 |
Exceed Action: Tunnel |
|
bl |
8 |
Dst Blacklisted |
|
filter1_match |
8 |
Filter1 Match |
|
ntp_monlist_resp |
8 |
NTP Monlist Response |
|
sess_create_inbound |
8 |
Inbound Sessions Created |
|
filter_auth_fail |
8 |
Filter Auth Failed |
|
exceed_drop_brate_src_pkt |
8 |
Src KiBit Rate Exceeded Count |
|
src_filter1_match |
8 |
Src Filter1 Match |
|
udp_retry_pass |
8 |
UDP Retry Passed |
|
src_hw_drop_removed |
8 |
Src Hardware Drop Rules Removed |
|
dst_udp_retry_timeout_blacklist |
8 |
UDP Retry Timeout Blacklisted |
|
src_udp_auth_drop |
8 |
Src UDP Auth Dropped |
|
sflow_external_samples_packed |
8 |
Sflow External Samples Packed |
|
src_drop |
8 |
Src Packets Dropped |
|
pattern_recognition_pattern_changed |
8 |
Pattern Recognition: Pattern Change Detected |
|
port_drop |
8 |
Inbound Packets Dropped |
|
filter_none_match |
8 |
Filter No Match |
|
src_filter3_match |
8 |
Src Filter3 Match |
|
ntp_monlist_req |
8 |
NTP Monlist Request |
|
src_zone_service_entry_learned |
8 |
SrcZoneService Entry Learned |
|
payload_too_big |
8 |
UDP Payload Too Large |
|
token_authentication_session_created_fail |
8 |
Token Authentication Session Created Fail |
|
port_conn_rate_exceed |
8 |
Conn Rate Exceeded |
|
src_filter_none_match |
8 |
Src Filter No Match |
|
port_kbit_rate_exceed_pkt |
8 |
KiBit Rate Exceeded Count |
|
port_bytes_sent |
8 |
Inbound Bytes Forwarded |
|
exceed_drop_brate_src |
8 |
Src KiBit Rate Exceeded |
|
src_frag_drop |
8 |
Src Fragmented Packets Dropped |
|
port_kbit_rate_exceed |
8 |
KiBit Rate Exceeded |
|
udp_retry_gap_drop |
8 |
UDP Retry-Gap Dropped |
|
filter_action_whitelist |
8 |
Filter Action Whitelist |
|
src_conn_pkt_rate_excd |
8 |
Src UDP Conn Pkt Rate Exceeded |
|
port_src_bl |
8 |
Src Blacklisted |
|
outbound_port_rcvd |
8 |
Outbound Packets Received |
|
outbound_port_pkt_sent |
8 |
Outbound Packets Forwarded |
|
sess_create_outbound |
8 |
Outbound Sessions Created |
|
pattern_filter_drop |
8 |
Extracted Filter Drop |
|
pattern_recognition_proceeded |
8 |
Pattern Recognition: Engine Started |
|
src_well_known_port |
8 |
Src UDP SrcPort Wellknown |
|
filter_action_blacklist |
8 |
Filter Action Blacklist |
|
port_pkt_sent |
8 |
Inbound Packets Forwarded |
|
src_filter_action_whitelist |
8 |
Src Filter Action Whitelist |
|
secondary_port_conn_rate_exceed |
8 |
Per Addr-Port Conn Rate Exceeded |
|
dst_hw_drop_inserted |
8 |
Dst Hardware Drop Rules Inserted |
|
filter2_match |
8 |
Filter2 Match |
|
secondary_port_conn_limm_exceed |
8 |
Per Addr-Port Conn Limit Exceeded |
|
pattern_not_found |
8 |
Pattern Recognition: Pattern Not Found |
|
port_conn_limm_exceed |
8 |
Conn Limit Exceeded |
|
filter3_match |
8 |
Filter3 Match |
|
src_ntp_monlist_resp |
8 |
Src NTP Monlist Response |
|
secondary_port_pkt_rate_exceed |
8 |
Per Addr-Port Packet Rate Exceeded |
|
src_filter2_match |
8 |
Src Filter2 Match |
|
sess_create |
8 |
Session Create |
|
port_bytes_drop |
8 |
Inbound Bytes Dropped |
|
exceed_drop_prate_src |
8 |
Src Pkt Rate Exceeded |
|
exceed_drop_climit_src |
8 |
Src Conn Limit Exceeded |
|
udp_auth_drop |
8 |
UDP Auth Dropped |
|
pattern_recognition_generic_error |
8 |
Pattern Recognition: Exceptions |
|
src_ntp_monlist_req |
8 |
Src NTP Monlist Request |
|
token_authentication_mismatched |
8 |
Token Authentication Mismatched Packets |
|
pattern_recognition_sampling_started |
8 |
Pattern Recognition: Sampling Started |
|
src_filter4_match |
8 |
Src Filter4 Match |
|
sflow_internal_samples_packed |
8 |
Sflow Internal Samples Packed |
|
filter_action_default_pass |
8 |
Filter Action Default Pass |
|
current_es_level |
8 |
Current Escalation Level |
|
filter_action_drop |
8 |
Filter Action Drop |
|
token_authentication_invalid |
8 |
Token Authentication Invalid Packets |
|
port_pkt_rate_exceed |
8 |
Packet Rate Exceeded |
|
frag_timeout |
8 |
Fragmented Packets Timeout |
|
src_filter_auth_fail |
8 |
Src Filter Auth Failed |
|
port_rcvd |
8 |
Inbound Packets Received |
|
src_hw_drop_inserted |
8 |
Src Hardware Drop Rules Inserted |
|
conn_prate_excd |
8 |
UDP Conn Pkt Rate Exceeded |
|
exceed_drop_crate_src |
8 |
Src Conn Rate Exceeded |
|
src_filter_action_drop |
8 |
Src Filter Action Drop |
|
src_udp_auth_timeout |
8 |
Src UDP Retry Timeout |
operational data¶
Counter |
Size |
Description |
|
---|---|---|---|
app-stat |
flag |
app-stat |
|
black-listed |
flag |
black-listed |
|
authenticated |
flag |
authenticated |
|
l4-ext-rate |
flag |
l4-ext-rate |
|
overflow-policy |
flag |
overflow-policy |
|
class-list |
string |
class-list |
|
entry-displayed-count |
number |
entry-displayed-count |
|
subnet-ip-addr |
ipv4-cidr |
subnet-ip-addr |
|
exceeded |
flag |
exceeded |
|
ddos_entry_list |
ddos_entry_list |
||
service-displayed-count |
number |
service-displayed-count |
|
white-listed |
flag |
white-listed |
|
sources |
flag |
sources |
|
hw-blacklisted |
flag |
hw-blacklisted |
|
ipv6 |
ipv6-address |
ipv6 |
|
sources-all-entries |
flag |
sources-all-entries |
|
indicator-detail |
flag |
indicator-detail |
|
level |
flag |
level |
|
subnet-ipv6-addr |
ipv6-address-plen |
subnet-ipv6-addr |
|
indicators |
flag |
indicators |