ddos dst zone port zone-service¶
DDOS Port & Protocol configuration
zone-service Specification¶
Type Collection Object Key(s) port-num, protocol Collection Name zone-service-list Collection URI /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service Element Name zone-service Element URI /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} Element Attributes zone-service_attributes Statistics Data URI /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/stats Operational Data URI /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/oper Schema zone-service schema
Operations Allowed:
Operation | Method | URI | Payload | |
---|---|---|---|---|
Create Object | POST | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Create List | POST | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Get Object | GET | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} | ||
Get List | GET | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Modify Object | POST | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} | ||
Replace Object | PUT | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} | ||
Replace List | PUT | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service | ||
Delete Object | DELETE | /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol} |
zone-service-list¶
zone-service-list is JSON List of zone-service attributes
zone-service-list : [
]
zone-service attributes¶
apply-policy-on-overflow
Description Enable this flag to apply overflow policy when dynamic entry count overflows
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
capture-config
Description: capture-config is a JSON Block. Please see below for capture-config
Type: Object
default-action-list
Description Configure default-action-list
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/action-list
deny
Description Blacklist and Drop all incoming packets for protocol
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
dynamic-entry-overflow-policy-list
enable-class-list-overflow
Description Apply class-list overflow policy upon exceeding dynamic entry count specified for zone-port or class-list
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
enable-top-k
Description Enable ddos top-k detection
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
glid-cfg
Description: glid-cfg is a JSON Block. Please see below for glid-cfg
Type: Object
ips
Description: ips is a JSON Block. Please see below for ips
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/ips
level-list
Type: List
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/level/{level-num}
manual-mode-enable
Description Toggle manual mode to use fix templates
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
manual-mode-list
Type: List
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/manual-mode/{config}
max-dynamic-entry-count
Description Maximum count for dynamic source zone service entry
Type: number
Range: 0-2147483647
outbound-only
Description Only allow outbound traffic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
pattern-recognition
Description: pattern-recognition is a JSON Block. Please see below for pattern-recognition
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/pattern-recognition
port-ind
Description: port-ind is a JSON Block. Please see below for port-ind
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/port-ind
port-num
Description Port Number
Type: number
Range: 1-65535
protocol
Description ‘dns-tcp’: DNS-TCP Port; ‘dns-udp’: DNS-UDP Port; ‘http’: HTTP Port; ‘tcp’: TCP Port; ‘udp’: UDP Port; ‘ssl-l4’: SSL-L4 Port; ‘sip-udp’: SIP-UDP Port; ‘sip-tcp’: SIP-TCP Port;
Type: string
Supported Values: dns-tcp, dns-udp, http, tcp, udp, ssl-l4, sip-udp, sip-tcp, quic
sflow-common
Description Enable all sFlow polling options under this zone port
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-commonsflow-packets, sflow-tcp-basic, sflow-tcp-stateful and sflow-http are mutually exclusive
sflow-http
Description Enable sFlow HTTP counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-http and sflow-common are mutually exclusive
sflow-packets
Description Enable sFlow packet-level counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-packets and sflow-common are mutually exclusive
sflow-tcp
Description: sflow-tcp is a JSON Block. Please see below for sflow-tcp
Type: Object
signature-extraction
Description: signature-extraction is a JSON Block. Please see below for signature-extraction
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/signature-extraction
src-based-policy-list
stateful
Description Enable stateful tracking of sessions (Default is stateless)
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
topk-sources
Description: topk-sources is a JSON Block. Please see below for topk-sources
Type: Object
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/topk-sources
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for zone-template
Type: Object
pattern-recognition¶
Specification Type object algorithm
Description ‘heuristic’: heuristic algorithm;
Type: string
Supported Values: heuristic
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
ips¶
Specification Type object uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
glid-cfg¶
Specification Type object action-list
Description Configure action-list to take
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/action-list
glid
Description Global limit ID for the whole zone
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
glid-action
Description ‘drop’: Drop packets for glid exceed (Default if default-action-list is not configured); ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, ignore
per-addr-glid
Description Global limit ID per address
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
zone-template¶
Specification Type object ips
Description IPS template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
signature-extraction¶
Specification Type object algorithm
Description ‘heuristic’: heuristic algorithm;
Type: string
Supported Values: heuristic
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
level-list¶
Specification Type list Block object keys apply-extracted-filters
Description Apply extracted filters from this level
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
glid-action
Description ‘drop’: Drop packets for glid exceed (Default); ‘blacklist-src’: Blacklist-src for glid exceed; ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, blacklist-src, ignore
indicator-list
Type: List
Refernce Object: /axapi/v3/ddos/dst/zone/{zone-name}/port/zone-service/{port-num}+{protocol}/level/{level-num}/indicator/{type}
level-num
Description ‘0’: Default policy level; ‘1’: Policy level 1; ‘2’: Policy level 2; ‘3’: Policy level 3; ‘4’: Policy level 4;
Type: string
Supported Values: 0, 1, 2, 3, 4
src-default-glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
src-escalation-score
Description Source activation score of this level
Type: number
Range: 1-1000000
src-violation-actions
Description Violation actions apply due to source escalate from this level
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
start-pattern-recognition
Description Start pattern recognition from this level
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-escalation-score
Description Zone activation score of this level
Type: number
Range: 1-1000000
zone-template
Description: zone-template is a JSON Block. Please see below for level-list_zone-template
Type: Object
zone-violation-actions
Description Violation actions apply due to zone escalate from this level
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
level-list_zone-template¶
Specification Type object dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
level-list_indicator-list¶
Specification Type list Block object keys data-packet-size
Description Expected minimal data size
Type: number
Range: 0-2147483647
score
Description Score corresponding to the indicator
Type: number
Range: 1-1000000
src-threshold-num
Description Indicator per-src threshold
Type: number
Range: 0-2147483647
src-threshold-str
Description Indicator per-src threshold
Type: string
Maximum Length: 128 characters
Maximum Length: 1 characters
src-violation-actions
Description Violation actions to use when this src indicator threshold reaches
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
tcp-window-size
Description Expected minimal window size
Type: number
Range: 0-2147483647
type
Description ‘pkt-rate’: rate of incoming packets; ‘pkt-drop-rate’: rate of packets got dropped; ‘pkt-drop-ratio’: ratio of incoming packet rate divided by the rate of dropping packets; ‘bytes-to-bytes-from-ratio’: ratio of incoming packet rate divided by the rate of outgoing packets; ‘concurrent-conns’: number of concurrent connections; ‘conn-miss-rate’: rate of incoming packets for which no previously established connection exists; ‘syn-rate’: rate on incoming SYN packets; ‘fin-rate’: rate on incoming FIN packets; ‘rst-rate’: rate of incoming RST packets; ‘small-window-ack-rate’: rate of small window advertisement; ‘empty-ack-rate’: rate of incoming packets which have no payload; ‘small-payload-rate’: rate of short payload packet; ‘syn-fin-ratio’: ratio of incoming SYN packet rate divided by the rate of incoming FIN packets; ‘cpu-utilization’: average data CPU utilization; ‘interface-utilization’: outside interface utilization;
Type: string
Supported Values: pkt-rate, pkt-drop-rate, pkt-drop-ratio, bytes-to-bytes-from-ratio, concurrent-conns, conn-miss-rate, syn-rate, fin-rate, rst-rate, small-window-ack-rate, empty-ack-rate, small-payload-rate, syn-fin-ratio, cpu-utilization, interface-utilization
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-threshold-num
Description Threshold for the entire zone
Type: number
Range: 0-2147483647
zone-threshold-str
Description Threshold for the entire zone
Type: string
Maximum Length: 128 characters
Maximum Length: 1 characters
zone-violation-actions
Description Violation actions to use when this zone indicator threshold reaches
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/ddos/violation-actions
manual-mode-list¶
Specification Type list Block object keys config
Description ‘configuration’: Manual-mode configuration;
Type: string
Supported Values: configuration
glid-action
Description ‘drop’: Drop packets for glid exceed (Default); ‘blacklist-src’: Blacklist-src for glid exceed; ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, blacklist-src, ignore
src-default-glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for manual-mode-list_zone-template
Type: Object
manual-mode-list_zone-template¶
Specification Type object dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
src-based-policy-list¶
Specification Type list Block object keys policy-class-list-list
src-based-policy-name
Description Specify name of the policy
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
src-based-policy-list_policy-class-list-list¶
Specification Type list Block object keys action
Description ‘bypass’: Always permit for the Source to bypass all feature & limit checks; ‘deny’: Blacklist incoming packets for service;
Type: string
Supported Values: bypass, deny
class-list-name
Description Class-list name
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
class-list-overflow-policy-list
glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
glid-action
Description ‘drop’: Drop packets for glid exceed (Default); ‘blacklist-src’: Blacklist-src for glid exceed; ‘ignore’: Do nothing for glid exceed;
Type: string
Supported Values: drop, blacklist-src, ignore
log-enable
Description Enable logging
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
log-periodic
Description Enable log periodic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
max-dynamic-entry-count
Description Maximum count for dynamic source zone service entry allowed for this class-list
Type: number
Range: 0-2147483647
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for src-based-policy-list_policy-class-list-list_zone-template
Type: Object
src-based-policy-list_policy-class-list-list_zone-template¶
Specification Type object dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ips
Description IPS template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
logging
Description DDOS logging template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list¶
Specification Type list Block object keys action
Description ‘bypass’: Always permit for the Source to bypass all feature & limit checks; ‘deny’: Blacklist incoming packets for service;
Type: string
Supported Values: bypass, deny
dummy-name
Description ‘configuration’: Configure overflow policy for class-list;
Type: string
Supported Values: configuration
glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
log-enable
Description Enable logging
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
log-periodic
Description Enable log periodic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list_zone-template
Type: Object
src-based-policy-list_policy-class-list-list_class-list-overflow-policy-list_zone-template¶
Specification Type object dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
logging
Description DDOS logging template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
port-ind¶
Specification Type object uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
sflow-tcp¶
Specification Type object sflow-tcp-basic
Description Enable sFlow basic TCP counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-tcp-basic and sflow-common are mutually exclusive
sflow-tcp-stateful
Description Enable sFlow stateful TCP counter polling
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
Mutual Exclusion: sflow-tcp-stateful and sflow-common are mutually exclusive
topk-sources¶
Specification Type object uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
dynamic-entry-overflow-policy-list¶
Specification Type list Block object keys action
Description ‘bypass’: Always permit for the Source to bypass all feature & limit checks; ‘deny’: Blacklist incoming packets for service;
Type: string
Supported Values: bypass, deny
dummy-name
Description ‘configuration’: Configure overflow policy;
Type: string
Supported Values: configuration
glid
Description Global limit ID
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
Refernce Object: /axapi/v3/glid
log-enable
Description Enable logging
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
log-periodic
Description Enable log periodic
Type: boolean
Supported Values: true, false, 1, 0
Default: 0
user-tag
Description Customized tag
Type: string
Format: string-rlx
Maximum Length: 127 characters
Maximum Length: 1 characters
uuid
Description uuid of the object
Type: string
Maximum Length: 64 characters
Maximum Length: 1 characters
zone-template
Description: zone-template is a JSON Block. Please see below for dynamic-entry-overflow-policy-list_zone-template
Type: Object
dynamic-entry-overflow-policy-list_zone-template¶
Specification Type object dns
Description DDOS dns template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
encap
Description DDOS encap template (IPv6-over-IPv4 / IPv4-over-IPv6 are not supported.)
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
http
Description DDOS http template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
logging
Description DDOS logging template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
quic
Description DDOS quic template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
sip
Description DDOS sip template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
ssl-l4
Description DDOS ssl-l4 template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
tcp
Description DDOS tcp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
udp
Description DDOS udp template
Type: string
Format: string-rlx
Maximum Length: 63 characters
Maximum Length: 1 characters
capture-config¶
Specification Type object capture-config-mode
Description ‘drop’: Apply capture-config to dropped packets; ‘forward’: Apply capture-config to forwarded packets; ‘all’: Apply capture-config to both dropped and forwarded packets;
Type: string
Supported Values: drop, forward, all
capture-config-name
Description Capture-config name
Type: string
Format: string-rlx
Maximum Length: 128 characters
Maximum Length: 1 characters
stats dns-tcp-zone-port¶
Counter | Size | Description | |
---|---|---|---|
src_ack_auth_fail | 8 | Src ACK Retry Dropped | |
src_ack_retry_init | 8 | Src ACK Retry Init | |
tcp_rexmit_syn_limit_drop | 8 | TCP SYN Retransmit Exceed Drop | |
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
src_rate_limit_type0 | 8 | Src Request Rate 1 Exceeded | |
fqdn_rate_by_label_count_check | 8 | FQDN Rate by Label Count Checked | |
query_type_srv | 8 | Query Type SRV | |
src_ack_retry_gap_drop | 8 | Src ACK Retry Retry-Gap Dropped | |
req_sent | 8 | DNS Requests Forwarded | |
src_create_conn_non_syn_dropped | 8 | Src Create Conn with non-SYN Packets Dropped | |
sess_aged | 8 | Sessions Aged Out | |
tcp_auth_resp | 8 | TCP Auth Responded | |
ack_retry_rto_fail | 8 | ACK Retry RTO Dropped | |
conn_close | 8 | Connections Closed | |
syn_auth_fail | 8 | SYN Auth Failed | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
syn_retry_init | 8 | SYN Retry Init | |
src_dns_fqdn_label_len_exceed | 8 | Src FQDN Label Length Exceeded | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
tcp_req_incomplete | 8 | TCP Request Incomplete | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | TCP SrcPort Wellknown | |
query_type_cname | 8 | Query Type CNAME | |
fqdn_stage_2_rate_exceed | 8 | FQDN Rate Exceeded | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
port_syn_rate_exceed | 8 | TCP SYN Rate Exceeded | |
src_ack_retry_reset | 8 | Src ACK Retry Timeout Reset | |
dg_rate_exceed | 8 | Domain Group Domain Query Rate Exceeded | |
non_query_opcode_pass_through | 8 | Non Query Opcode Pass Through | |
src_fqdn_label_count_exceed | 8 | Src FQDN Label Count Exceeded | |
dns_query_class_chaos | 8 | Query Class CHAOS | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
conn_rexmit_rate_excd | 8 | TCP Conn Retransmit Rate Exceeded | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
syn_retry_reset | 8 | SYN Retry Timeout Reset | |
out_of_seq_excd | 8 | Out-Of-Seq Exceeded | |
dg_action_default | 8 | Domain Group Action Default | |
port_src_escalation | 8 | Src Escalation | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
src_ack_retry_rto_progress | 8 | Src ACK Retry RTO Progress | |
fqdn_label_count_exceed | 8 | FQDN Label Count Exceeded | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
src_retransmit_excd | 8 | Src Retransmit Exceeded | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
tcp_rexmit_syn_limit_bl | 8 | TCP SYN Retransmit Exceed Blacklist | |
src_ack_retry_timeout | 8 | Src ACK Retry Timeout | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
conn_close_w_rst | 8 | RST Connections Closed | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
src_syn_auth_fail | 8 | Src SYN Auth Failed | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
filter5_match | 8 | Filter5 Match | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
port_bytes | 8 | Inbound Bytes Received | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
syn_retry_rto_pass | 8 | SYN Retry RTO Passed | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
syn_cookie_fail | 8 | SYN Cookie Failed | |
query_type_any | 8 | Query Type ANY | |
src_filter_none_match | 8 | Src Filter No Match | |
src_well_known_port | 8 | Src TCP SrcPort Wellknown | |
src_syn_retry_rto_fail | 8 | Src SYN Retry RTO Dropped | |
syn_retry_rto_progress | 8 | SYN Retry RTO Progress | |
src_conn_rexmit_rate_excd | 8 | Src TCP Conn Retransmit Rate Exceeded | |
syn_retry_pass | 8 | SYN Retry Passed | |
rst_cookie_fail | 8 | RST Cookie Failed | |
bl | 8 | Dst Blacklisted | |
dg_action_permit | 8 | Domain Group Action Permit | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
frag_rcvd | 8 | Fragmented Packets Received | |
src_syn_retry_init | 8 | Src SYN Retry Init | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
query_type_aaaa | 8 | Query Type AAAA | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
fqdn_label_len_exceed | 8 | FQDN Label Length Exceeded | |
filter1_match | 8 | Filter1 Match | |
synack_reset_sent | 8 | SYNACK Reset Sent | |
sess_create_inbound | 8 | Inbound Sessions Created | |
filter_auth_fail | 8 | Filter Auth Failed | |
conn_create_from_syn | 8 | Connections Created From SYN | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
rate_limit_type4 | 8 | Dst Request Rate 5 Exceeded | |
rate_limit_type3 | 8 | Dst Request Rate 4 Exceeded | |
rate_limit_type2 | 8 | Dst Request Rate 3 Exceeded | |
rate_limit_type1 | 8 | Dst Request Rate 2 Exceeded | |
rate_limit_type0 | 8 | Dst Request Rate 1 Exceeded | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
rrtype_drop | 8 | Record Type Dropped | |
req_retrans | 8 | Request Retransmit | |
ack_auth_fail | 8 | ACK Retry Dropped | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
src_drop | 8 | Src Packets Dropped | |
query_type_a | 8 | Query Type A | |
syn_retry_blacklist | 8 | SYN Retry Timeout Blacklisted | |
dg_action_deny | 8 | Domain Group Action Deny | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
query_type_mx | 8 | Query Type MX | |
syn_retry_gap_drop | 8 | SYN Retry-Gap Dropped | |
conn_create_from_ack | 8 | Connections Created From ACK | |
filter_none_match | 8 | Filter No Match | |
src_filter3_match | 8 | Src Filter3 Match | |
src_syn_retry_gap_drop | 8 | Src SYN Retry-Gap Dropped | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
syn_drop | 8 | SYN Dropped | |
src_filter1_match | 8 | Src Filter1 Match | |
src_syn_rate_exceed | 8 | Src TCP SYN Rate Exceeded | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_dns_malform | 8 | Src Malform Query | |
src_syn_retry_timeout | 8 | Src SYN Retry Timeout | |
req_size_exceed | 8 | Request Size Exceeded | |
query_type_soa | 8 | Query Type SOA | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
unauth_drop | 8 | TCP Unauth Dropped | |
dns_query_class_in | 8 | Query Class INTERNET | |
src_syn_cookie_sent | 8 | Src SYN Cookie Sent | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
ack_retry_timeout | 8 | ACK Retry Timeout | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
src_out_of_seq_excd | 8 | Src Out-Of-Seq Exceeded | |
syn_retry_timeout | 8 | SYN Retry Timeout | |
syn_tfo_rcv | 8 | SYN TFO Received | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
malform_drop | 8 | Malform Query Dropped | |
src_unauth_drop | 8 | Src TCP Unauth Dropped | |
filter_action_whitelist | 8 | Filter Action WL | |
src_conn_pkt_rate_excd | 8 | Src TCP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
frag_timeout | 8 | Fragmented Packets Timeout | |
dg_request_check_fail | 8 | Domain Group Request Check Fail | |
src_filter5_match | 8 | Src Filter5 Match | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
conn_close_w_fin | 8 | FIN Connections Closed | |
src_syn_retry_blacklist | 8 | Src SYN Retry Timeout Blacklisted | |
src_zero_window_excd | 8 | Src Zero-Window Exceeded | |
src_conn_zwindow_rate_excd | 8 | Src TCP Conn Zero-Window Rate Exceeded | |
sess_create | 8 | Session Create | |
nxdomain_rate_exceed | 8 | NXDOMAIN Response Rate Exceeded | |
ack_retry_blacklist | 8 | ACK Retry Timeout Blacklisted | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
dns_query_class_csnet | 8 | Query Class CSNET | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
syn_auth_pass | 8 | SYN Auth Passed | |
src_dns_malform_drop | 8 | Src Malform Query Dropped | |
query_type_opt | 8 | Query Type OPT | |
syn_retry_rto_fail | 8 | SYN Retry RTO Dropped | |
syn_cookie_sent | 8 | SYN Cookie Sent | |
retransmit_excd | 8 | Retransmit Exceeded | |
filter4_match | 8 | Filter4 Match | |
src_filter_action_whitelist | 8 | Src Filter Action WL | |
zero_window_excd | 8 | Zero-Window Exceeded | |
src_query_type_any_drop | 8 | Src Query Type ANY Dropped | |
conn_ofo_rate_excd | 8 | TCP Conn Out-Of-Seq Rate Exceeded | |
force_tcp_auth_pass | 8 | Auth Force-TCP Passed | |
filter2_match | 8 | Filter2 Match | |
src_ack_retry_blacklist | 8 | Src ACK Retry Timeout Blacklisted | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognition: Pattern Not Found | |
dns_query_class_hs | 8 | Query Class HESIOD | |
dns_query_class_none | 8 | Query Class NONE | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
ack_retry_pass | 8 | ACK Retry Passed | |
src_policy_drop | 8 | Src Policy Dropped | |
conn_close_w_idle | 8 | Idle Connections Closed | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
is_nxdomain | 8 | NXDOMAIN Response | |
dns_malform | 8 | Malform Query | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
src_rate_limit_type4 | 8 | Src Request Rate 5 Exceeded | |
src_rate_limit_type2 | 8 | Src Request Rate 3 Exceeded | |
src_rate_limit_type3 | 8 | Src Request Rate 4 Exceeded | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
src_rate_limit_type1 | 8 | Src Request Rate 2 Exceeded | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
query_type_any_drop | 8 | Query Type ANY Dropped | |
ack_retry_reset | 8 | ACK Retry Timeout Reset | |
tcp_auth_drop | 8 | TCP Auth Dropped | |
nxdomain_bl_drop | 8 | NXDOMAIN Response Blacklisted | |
src_syn_cookie_fail | 8 | Src SYN Cookie Failed | |
syn_retry_failed | 8 | SYN Retry Dropped | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
ack_retry_init | 8 | ACK Retry Init | |
src_filter4_match | 8 | Src Filter4 Match | |
policy_drop | 8 | Policy Dropped | |
query_type_ns | 8 | Query Type NS | |
ack_retry_gap_drop | 8 | ACK Retry Retry-Gap Dropped | |
nxdomain_drop | 8 | NXDOMAIN Response Dropped | |
create_conn_non_syn_dropped | 8 | Create Conn with non-SYN Packets Dropped | |
current_es_level | 8 | Current Escalation Level | |
src_syn_retry_failed | 8 | Src SYN Retry Dropped | |
filter_action_drop | 8 | Filter Action Drop | |
src_ack_retry_rto_fail | 8 | Src ACK Retry RTO Dropped | |
conn_zwindow_rate_excd | 8 | TCP Conn Zero-Window Rate Exceeded | |
src_conn_ofo_rate_excd | 8 | Src TCP Conn Out-Of-Seq Rate Exceeded | |
dns_query_class_whitelist_miss | 8 | Query Class Whitelist Miss | |
ack_retry_rto_progress | 8 | ACK Retry RTO Progress | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
port_drop | 8 | Inbound Packets Dropped | |
ack_retry_rto_pass | 8 | ACK Retry RTO Passed | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
dns_query_class_any | 8 | Query Class ANY | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
src_syn_retry_rto_pass | 8 | Src SYN Retry RTO Passed | |
src_syn_retry_reset | 8 | Src SYN Retry Timeout Reset | |
port_rcvd | 8 | Inbound Packets Received | |
conn_close_half_open | 8 | Half Open Connections Closed | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
synack_multiple_attempts_per_ip_detected | 8 | SYNACK Multiple Attempts Per IP Detected | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
src_syn_retry_rto_progress | 8 | Src SYN Retry RTO Progress | |
src_ack_retry_rto_pass | 8 | Src ACK Retry RTO Passed | |
conn_prate_excd | 8 | TCP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
src_rst_cookie_fail | 8 | Src RST Cookie Failed | |
src_auth_drop | 8 | Src TCP Auth Dropped | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
fqdn_rate_by_label_count_exceed | 8 | FQDN Rate by Label Count Exceeded |
stats dns-udp-zone-port¶
Counter | Size | Description | |
---|---|---|---|
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
nxdomain_rate_exceed | 8 | NXDOMAIN Response Rate Exceeded | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
fqdn_rate_by_label_count_check | 8 | FQDN Rate by Label Count Checked | |
query_type_srv | 8 | Query Type SRV | |
req_sent | 8 | DNS Requests Forwarded | |
spoof_detect_fail | 8 | UDP Retry Timeout | |
sess_aged | 8 | Sessions Aged Out | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
force_tcp_auth_timeout | 8 | Auth Force-TCP With UDP Timeout | |
udp_auth_pass | 8 | Auth UDP Passed | |
src_dns_fqdn_label_len_exceed | 8 | Src FQDN Label Length Exceeded | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | UDP SrcPort Wellknown | |
query_type_cname | 8 | Query Type CNAME | |
fqdn_stage_2_rate_exceed | 8 | FQDN Rate Exceeded | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
src_udp_retry_init | 8 | Src UDP Retry Init | |
src_payload_too_small | 8 | Src UDP Payload Too Small | |
non_query_opcode_pass_through | 8 | Non Query Opcode Pass Through | |
src_fqdn_label_count_exceed | 8 | Src FQDN Label Count Exceeded | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
src_udp_retry_pass | 8 | Src UDP Retry Passed | |
udp_retry_init | 8 | UDP Retry Init | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
dg_action_default | 8 | Domain Group Action Default | |
port_src_escalation | 8 | Src Escalation | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
port_bytes | 8 | Inbound Bytes Received | |
fqdn_label_count_exceed | 8 | FQDN Label Count Exceeded | |
dns_auth_drop | 8 | DNS Auth Dropped | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
src_filter5_match | 8 | Src Filter5 Match | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
filter5_match | 8 | Filter5 Match | |
src_udp_auth_fail | 8 | Src Auth UDP Failed | |
src_udp_retry_gap_drop | 8 | Src UDP Retry-Gap Dropped | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
query_type_any | 8 | Query Type ANY | |
src_filter_none_match | 8 | Src Filter No Match | |
zone_src_udp_retry_timeout_blacklist | 8 | Src UDP Retry Timeout Blacklisted | |
filter4_match | 8 | Filter4 Match | |
bl | 8 | Dst Blacklisted | |
dg_action_permit | 8 | Domain Group Action Permit | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
payload_too_small | 8 | UDP Payload Too Small | |
frag_rcvd | 8 | Fragmented Packets Received | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
query_type_aaaa | 8 | Query Type AAAA | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
fqdn_label_len_exceed | 8 | FQDN Label Length Exceeded | |
filter1_match | 8 | Filter1 Match | |
ntp_monlist_resp | 8 | NTP Monlist Response | |
sess_create_inbound | 8 | Inbound Sessions Created | |
filter_auth_fail | 8 | Filter Auth Failed | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
dns_auth_resp | 8 | DNS Auth Responded | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
rate_limit_type4 | 8 | Dst Request Rate 5 Exceeded | |
rate_limit_type3 | 8 | Dst Request Rate 4 Exceeded | |
rate_limit_type2 | 8 | Dst Request Rate 3 Exceeded | |
rate_limit_type1 | 8 | Dst Request Rate 2 Exceeded | |
rate_limit_type0 | 8 | Dst Request Rate 1 Exceeded | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
dst_udp_retry_timeout_blacklist | 8 | UDP Retry Timeout Blacklisted | |
rrtype_drop | 8 | Record Type Dropped | |
req_retrans | 8 | Request Retransmit | |
udp_auth_retry_gap_drop | 8 | Auth UDP Retry-Gap Dropped | |
src_udp_auth_drop | 8 | Src UDP Auth Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
src_drop | 8 | Src Packets Dropped | |
query_type_a | 8 | Query Type A | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
dg_action_deny | 8 | Domain Group Action Deny | |
udp_auth_retry_fail | 8 | Auth UDP Retry Failed | |
query_type_mx | 8 | Query Type MX | |
port_drop | 8 | Inbound Packets Dropped | |
filter_none_match | 8 | Filter No Match | |
src_filter3_match | 8 | Src Filter3 Match | |
ntp_monlist_req | 8 | NTP Monlist Request | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
payload_too_big | 8 | UDP Payload Too Large | |
src_filter1_match | 8 | Src Filter1 Match | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_dns_malform | 8 | Src Malform Query | |
req_size_exceed | 8 | Request Size Exceeded | |
query_type_soa | 8 | Query Type SOA | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
dns_query_class_in | 8 | Query Class INTERNET | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
udp_retry_pass | 8 | UDP Retry Passed | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
udp_retry_gap_drop | 8 | UDP Retry-Gap Dropped | |
malform_drop | 8 | Malform Query Dropped | |
filter_action_whitelist | 8 | Filter Action Whitelist | |
src_conn_pkt_rate_excd | 8 | Src UDP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
frag_timeout | 8 | Fragmented Packets Timeout | |
dg_request_check_fail | 8 | Domain Group Request Check Fail | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
sess_create | 8 | Session Create | |
src_well_known_port | 8 | Src UDP SrcPort Wellknown | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
dns_query_class_csnet | 8 | Query Class CSNET | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
src_dns_malform_drop | 8 | Src Malform Query Dropped | |
query_type_opt | 8 | Query Type OPT | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
src_filter_action_whitelist | 8 | Src Filter Action Whitelist | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
src_query_type_any_drop | 8 | Src Query Type ANY Dropped | |
src_payload_too_big | 8 | Src UDP Payload Too Large | |
filter2_match | 8 | Filter2 Match | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognition: Pattern Not Found | |
dns_query_class_hs | 8 | Query Class HESIOD | |
dns_query_class_none | 8 | Query Class NONE | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
src_ntp_monlist_resp | 8 | Src NTP Monlist Response | |
src_rate_limit_type0 | 8 | Src Request Rate 1 Exceeded | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_rate_limit_type1 | 8 | Src Request Rate 2 Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
is_nxdomain | 8 | NXDOMAIN Response | |
dns_malform | 8 | Malform Query | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
src_rate_limit_type4 | 8 | Src Request Rate 5 Exceeded | |
src_rate_limit_type2 | 8 | Src Request Rate 3 Exceeded | |
src_rate_limit_type3 | 8 | Src Request Rate 4 Exceeded | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
udp_auth_drop | 8 | UDP Auth Dropped | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
query_type_any_drop | 8 | Query Type ANY Dropped | |
src_ntp_monlist_req | 8 | Src NTP Monlist Request | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
nxdomain_bl_drop | 8 | NXDOMAIN Response Blacklisted | |
udp_auth_init | 8 | Auth UDP Init | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
src_filter4_match | 8 | Src Filter4 Match | |
dns_query_class_chaos | 8 | Query Class CHAOS | |
query_type_ns | 8 | Query Type NS | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
nxdomain_drop | 8 | NXDOMAIN Response Dropped | |
current_es_level | 8 | Current Escalation Level | |
filter_action_drop | 8 | Filter Action Drop | |
src_dns_auth_drop | 8 | Src DNS Auth Dropped | |
dns_query_class_whitelist_miss | 8 | Query Class Whitelist Miss | |
src_udp_auth_init | 8 | Src Auth UDP Init | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
dns_query_class_any | 8 | Query Class ANY | |
dg_rate_exceed | 8 | Domain Group Domain Query Rate Exceeded | |
port_rcvd | 8 | Inbound Packets Received | |
src_force_tcp_auth | 8 | Src Auth Force-TCP | |
force_tcp_auth | 8 | Auth Force-TCP | |
conn_prate_excd | 8 | UDP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
src_udp_auth_timeout | 8 | Src UDP Retry Timeout | |
udp_auth_fail | 8 | Auth UDP Failed | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
fqdn_rate_by_label_count_exceed | 8 | FQDN Rate by Label Count Exceeded |
stats http-zone-port¶
Counter | Size | Description | |
---|---|---|---|
req_sz_32k | 8 | Request Payload Size Less Than or Equal to 32K | |
syn_retry_rto_progress | 8 | SYN Retry RTO Progress | |
src_ack_retry_init | 8 | Src ACK Retry Init | |
fail_alloc_hdr | 8 | Alloc Header Failed | |
src_challenge_js_fail | 8 | Src Challenge Javascript Failed | |
req_get | 8 | Request Method GET | |
tcp_rexmit_syn_limit_drop | 8 | TCP SYN Retransmit Exceed Drop | |
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
negative_resp_remain | 8 | Negative Response Remain | |
resp_code_4xx | 8 | HTTP Status Code 4XX | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
src_syn_rate_exceed | 8 | Src TCP SYN Rate Exceeded | |
chunk_sz_2k | 8 | Payload Chunk Size Less Than or Equal to 2K | |
user_agent_filter_blacklist | 8 | Agent Filter Blacklisted | |
invalid_hdr_val | 8 | HTTP Header Value Invalid | |
src_header_filter1_match | 8 | Src Header Filter1 Match | |
pkts_retrans_rst | 8 | TCP Retransmit RST | |
req_put | 8 | Request Method PUT | |
src_create_conn_non_syn_dropped | 8 | Src Create Conn with non-SYN Packets Dropped | |
filter2_drop | 8 | Filter2 Match Dropped | |
req_sz_gt_256k | 8 | Request Payload Size Larger Than 256K | |
sess_aged | 8 | Sessions Aged Out | |
tcp_auth_resp | 8 | TCP Auth Responded | |
parsereq_fail | 8 | Parse Request Failed | |
tcp_filter_action_blacklist | 8 | Filter Action Blacklist | |
src_js_challenge_sent | 8 | Src Challenge Javascript Sent | |
resp_code_5xx | 8 | HTTP Status Code 5XX | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
filter10_drop | 8 | Filter10 Match Dropped | |
src_header_filter3_drop | 8 | Src Header Filter3 Match Dropped | |
src_header_filter_not_match | 8 | Src Header Filter Not Matched on Pkt | |
parse_req_line_too_small | 8 | Malform Request Line Too Small | |
req_sz_2k | 8 | Request Payload Size Less Than or Equal to 2K | |
syn_retry_init | 8 | SYN Retry Init | |
filter10_match | 8 | Filter10 Match | |
parse_bad_chunk | 8 | Malform Bad Chunk | |
window_small_drop | 8 | Window Size Small Dropped | |
er_condition | 8 | Error Condition | |
tcp_filter5_match | 8 | Filter5 Match | |
req_post | 8 | Request Method POST | |
src_ack_auth_fail | 8 | Src ACK Retry Dropped | |
rsp_chunk | 8 | Response Chunk | |
filter9_drop | 8 | Filter9 Match Dropped | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
filter3_drop | 8 | Filter3 Match Dropped | |
port_syn_rate_exceed | 8 | TCP SYN Rate Exceeded | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
req_ofo | 8 | Out-Of-Order Request | |
src_ack_retry_gap_drop | 8 | Src ACK Retry Retry-Gap Dropped | |
chunk_sz_1k | 8 | Payload Chunk Size Less Than or Equal to 1K | |
pkts_retrans_push | 8 | TCP Retransmit PSH | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
window_small | 8 | Window Size Small | |
conn_rexmit_rate_excd | 8 | TCP Conn Retransmit Rate Exceeded | |
src_header_filter_action_drop | 8 | Src Header Filter Action Drop | |
src_header_filter3_match | 8 | Src Header Filter3 Match | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
syn_retry_reset | 8 | SYN Retry Timeout Reset | |
resp_code_other | 8 | HTTP Status Code OTHER | |
syn_cookie_sent | 8 | SYN Cookie Sent | |
fail_alloc | 8 | Alloc Failed | |
user_agent_filter_match | 8 | Agent Filter Match | |
src_header_filter8_drop | 8 | Src Header Filter8 Match Dropped | |
port_bytes | 8 | Inbound Bytes Received | |
src_ack_retry_rto_progress | 8 | Src ACK Retry RTO Progress | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
processed | 8 | Packets Processed | |
parse_header_name_too_long | 8 | Malform Header Name Too Long | |
src_retransmit_excd | 8 | Src Retransmit Exceeded | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
src_header_filter10_match | 8 | Src Header Filter10 Match | |
tcp_filter_none_match | 8 | Filter No Match | |
out_of_seq_excd | 8 | Out-Of-Seq Exceeded | |
src_filter1_match | 8 | Src Filter1 Match | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
filter1_drop | 8 | Filter1 Match Dropped | |
conn_close_w_rst | 8 | RST Connections Closed | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
src_syn_auth_fail | 8 | Src SYN Auth Failed | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
port_src_escalation | 8 | Src Escalation | |
header_processing_time_0 | 8 | Header Process Time Less Than 1s | |
client_rst | 8 | Client TCP RST Received | |
header_processing_time_2 | 8 | Header Process Time Less Than 30S | |
header_processing_time_3 | 8 | Header Process Time Larger or Equal to 30s | |
chunk_sz_512 | 8 | Payload Chunk Size Less Than or Equal to 512 | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
src_header_filter_action_whitelist | 8 | Src Header Filter Action Whitelist | |
parse_line_too_long | 8 | Malform Line Too Long | |
src_header_filter_none_match | 8 | Src Header Filter No Match | |
tcp_auth_drop | 8 | TCP Auth Dropped | |
chunk_sz_4k | 8 | Payload Chunk Size Less Than or Equal to 4K | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
req_sz_4k | 8 | Request Payload Size Less Than or Equal to 4K | |
req_sz_256k | 8 | Request Payload Size Less Than or Equal to 256K | |
src_filter_none_match | 8 | Src Filter No Match | |
src_well_known_port | 8 | Src TCP SrcPort Wellknown | |
chunk_sz_gt_4k | 8 | Payload Chunk Size Larger Than 4K | |
conn_ofo_rate_excd | 8 | TCP Conn Out-Of-Seq Rate Exceeded | |
invalid_hdr_name | 8 | HTTP Header Name Invalid | |
req_trace | 8 | Request Method TRACE | |
req | 8 | Request Total | |
src_conn_rexmit_rate_excd | 8 | Src TCP Conn Retransmit Rate Exceeded | |
filter4_match | 8 | Filter4 Match | |
rst_cookie_fail | 8 | RST Cookie Failed | |
challenge_failed | 8 | Challenge Failed | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
current_es_level | 8 | Current Escalation Level | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
tcp_filter_action_whitelist | 8 | Filter Action WL | |
src_req_rate_exceed | 8 | Src Request Rate Exceeded | |
frag_rcvd | 8 | Fragmented Packets Received | |
src_header_filter7_drop | 8 | Src Header Filter7 Match Dropped | |
src_header_filter4_drop | 8 | Src Header Filter4 Match Dropped | |
src_syn_retry_init | 8 | Src SYN Retry Init | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
filter6_match | 8 | Filter6 Match | |
syn_retry_rto_pass | 8 | SYN Retry RTO Passed | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
src_header_filter8_match | 8 | Src Header Filter8 Match | |
bl | 8 | Dst Blacklisted | |
sess_create_inbound | 8 | Inbound Sessions Created | |
synack_reset_sent | 8 | SYNACK Reset Sent | |
filter1_match | 8 | Filter1 Match | |
unauth_drop | 8 | TCP Unauth Dropped | |
filter_auth_fail | 8 | Filter Auth Failed | |
conn_create_from_syn | 8 | Connections Created From SYN | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
src_ack_retry_blacklist | 8 | Src ACK Retry Timeout Blacklisted | |
src_header_filter9_match | 8 | Src Header Filter9 Match | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
ack_retry_pass | 8 | ACK Retry Passed | |
src_post_rate_exceed | 8 | Src Post Rate Exceeded | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
src_challenge_ud_fail | 8 | Src Challenge URL Redirect Failed | |
dst_resp_rate_exceed | 8 | Dst Response Rate Exceeded | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
filter7_drop | 8 | Filter7 Match Dropped | |
filter_not_match | 8 | Filter Not Matched on Pkt | |
pkts_ofo | 8 | Out-Of-Order Packets | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
tcp_filter_action_drop | 8 | Filter Action Drop | |
ud_challenge_failed | 8 | Challenge URL Redirect Failed | |
tcp_rexmit_syn_limit_bl | 8 | TCP SYN Retransmit Exceed Blacklist | |
ack_auth_fail | 8 | ACK Retry Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
src_header_filter_action_default_pass | 8 | Src Header Filter Action Default Pass | |
src_drop | 8 | Src Packets Dropped | |
resp_code_1xx | 8 | HTTP Status Code 1XX | |
syn_retry_blacklist | 8 | SYN Retry Timeout Blacklisted | |
parse_req_line_invalid_method | 8 | Malform Request Line Invalid Method | |
filter9_match | 8 | Filter9 Match | |
src_ack_retry_timeout | 8 | Src ACK Retry Timeout | |
filter4_drop | 8 | Filter4 Match Dropped | |
conn_close | 8 | Connections Closed | |
src_conn_ofo_rate_excd | 8 | Src TCP Conn Out-Of-Seq Rate Exceeded | |
js_challenge_sent | 8 | Challenge Javascript Sent | |
port_drop | 8 | Inbound Packets Dropped | |
resp_mib_chunk_bad | 8 | Bad HTTP Response Chunk | |
filter_match | 8 | Filter Total Match | |
conn_create_from_ack | 8 | Connections Created From ACK | |
filter_none_match | 8 | Filter No Match | |
src_filter3_match | 8 | Src Filter3 Match | |
syn_auth_fail | 8 | SYN Auth Failed | |
pkts_retrans_fin | 8 | TCP Retransmit FIN | |
syn_retry_timeout | 8 | SYN Retry Timeout | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
syn_drop | 8 | SYN Dropped | |
too_many_headers | 8 | HTTP Header Too Many | |
filter6_drop | 8 | Filter6 Match Dropped | |
content_length_too_long | 8 | Malform Content Length Too Long | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
ack_retry_rto_progress | 8 | ACK Retry RTO Progress | |
ofo_queue_sz_exceed | 8 | Out-Of-Order Queue Exceeded | |
src_syn_retry_timeout | 8 | Src SYN Retry Timeout | |
ack_retry_rto_fail | 8 | ACK Retry RTO Dropped | |
ofo_timer_expired | 8 | Out-Of-Order Timeout | |
req_content_len | 8 | Request Content Length Received | |
filter8_match | 8 | Filter8 Match | |
new_syn | 8 | TCP SYN | |
src_syn_cookie_sent | 8 | Src SYN Cookie Sent | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
header_processing_incomplete | 8 | Header Process Incomplete | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
ack_retry_timeout | 8 | ACK Retry Timeout | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
src_out_of_seq_excd | 8 | Src Out-Of-Seq Exceeded | |
parse_too_many_headers | 8 | Malform Too Many Headers | |
syn_tfo_rcv | 8 | SYN TFO Received | |
src_header_filter10_drop | 8 | Src Header Filter10 Match Dropped | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
referer_filter_match | 8 | Referer Filter Match | |
dst_req_rate_exceed | 8 | Dst Request Rate Exceeded | |
http_auth_drop | 8 | HTTP Auth Dropped | |
policy_violation | 8 | Policy Violation | |
src_unauth_drop | 8 | Src TCP Unauth Dropped | |
filter_action_whitelist | 8 | Filter Action Whitelist | |
src_conn_pkt_rate_excd | 8 | Src TCP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
frag_timeout | 8 | Fragmented Packets Timeout | |
dst_post_rate_exceed | 8 | Dst Post Rate Exceeded | |
tcp_filter2_match | 8 | Filter2 Match | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
src_syn_retry_gap_drop | 8 | Src SYN Retry-Gap Dropped | |
sess_create_outbound | 8 | Outbound Sessions Created | |
slow_post | 8 | Slow Post | |
src_header_filter6_match | 8 | Src Header Filter6 Match | |
negative_req_remain | 8 | Negative Request Remain | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
conn_close_w_fin | 8 | FIN Connections Closed | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
src_syn_retry_blacklist | 8 | Src SYN Retry Timeout Blacklisted | |
src_zero_window_excd | 8 | Src Zero-Window Exceeded | |
src_conn_zwindow_rate_excd | 8 | Src TCP Conn Zero-Window Rate Exceeded | |
req_delete | 8 | Request Method DELETE | |
ack_retry_blacklist | 8 | ACK Retry Timeout Blacklisted | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
tcp_filter4_match | 8 | Filter4 Match | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
less_than_mss_exceed | 8 | Min Payload Size Fail Exceeded | |
filter5_drop | 8 | Filter5 Match Dropped | |
src_header_filter_action_blacklist | 8 | Src Header Filter Action Blacklist | |
src_header_filter7_match | 8 | Src Header Filter7 Match | |
filter5_match | 8 | Filter5 Match | |
syn_retry_rto_fail | 8 | SYN Retry RTO Dropped | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
header_processing_time_1 | 8 | Header Process Time Less Than 10s | |
req_unknown | 8 | Request Method UNKNOWN | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
retransmit_excd | 8 | Retransmit Exceeded | |
req_options | 8 | Request Method OPTIONS | |
src_filter_action_whitelist | 8 | Src Filter Action WL | |
zero_window_excd | 8 | Zero-Window Exceeded | |
src_ack_retry_reset | 8 | Src ACK Retry Timeout Reset | |
src_ud_challenge_sent | 8 | Src Challenge URL Redirect Sent | |
src_header_filter2_match | 8 | Src Header Filter2 Match | |
filter2_match | 8 | Filter2 Match | |
syn_auth_pass | 8 | SYN Auth Passed | |
frag_drop | 8 | Fragmented Packets Dropped | |
js_challenge_failed | 8 | Challenge Javascript Failed | |
pkts_connect_passthru | 8 | Connect Passthru packets | |
pattern_not_found | 8 | Pattern Recognitoin: Pattern Not Found | |
use_hdr_src_ip | 8 | Use IP In Header As Src | |
fail_get_line | 8 | Get Line Failed | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
ack_retry_gap_drop | 8 | ACK Retry Retry-Gap Dropped | |
filter3_match | 8 | Filter3 Match | |
req_sz_8k | 8 | Request Payload Size Less Than or Equal to 8K | |
src_policy_drop | 8 | Src Policy Dropped | |
conn_close_w_idle | 8 | Idle Connections Closed | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
sess_create | 8 | Session Create | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
src_header_filter_match | 8 | Src Header Filter Total Match | |
req_retran | 8 | Request Retransmit | |
filter7_match | 8 | Filter7 Match | |
ud_challenge_sent | 8 | Challenge URL Redirect Sent | |
src_header_filter2_drop | 8 | Src Header Filter2 Match Dropped | |
header_name_too_long | 8 | Header Name Too Long | |
chunk_bad | 8 | Bad Payload Chunk | |
tcp_filter_total_not_match | 8 | Filter Not Matched on Pkt | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
pkts_retrans | 8 | TCP Retransmit | |
ack_retry_reset | 8 | ACK Retry Timeout Reset | |
src_http_auth_drop | 8 | Src HTTP Auth Dropped | |
src_header_filter5_match | 8 | Src Header Filter5 Match | |
wellknown_sport_drop | 8 | TCP SrcPort Wellknown | |
src_syn_cookie_fail | 8 | Src SYN Cookie Failed | |
syn_retry_failed | 8 | SYN Retry Dropped | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
invalid_header | 8 | HTTP Header Invalid | |
ack_retry_init | 8 | ACK Retry Init | |
tcp_filter1_match | 8 | Filter1 Match | |
src_dos_policy_violation | 8 | Src Policy Violation | |
parse_req_line_too_long | 8 | Malform Request Line Too Long | |
src_filter4_match | 8 | Src Filter4 Match | |
req_http10 | 8 | Request HTTP 1.0 | |
req_http11 | 8 | Request HTTP 1.1 | |
req_connect | 8 | Request Method CONNECT | |
policy_drop | 8 | Policy Dropped | |
src_header_filter9_drop | 8 | Src Header Filter9 Match Dropped | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
tcp_filter_action_default_pass | 8 | Filter Action Default Pass | |
uri_filter_match | 8 | URI Filter Match | |
create_conn_non_syn_dropped | 8 | Create Conn with non-SYN Packets Dropped | |
syn_retry_pass | 8 | SYN Retry Passed | |
tcp_filter3_match | 8 | Filter3 Match | |
syn_cookie_fail | 8 | SYN Cookie Failed | |
req_head | 8 | Request Method HEAD | |
src_syn_retry_failed | 8 | Src SYN Retry Dropped | |
filter_action_drop | 8 | Filter Action Drop | |
src_ack_retry_rto_fail | 8 | Src ACK Retry RTO Dropped | |
conn_zwindow_rate_excd | 8 | TCP Conn Zero-Window Rate Exceeded | |
src_header_filter6_drop | 8 | Src Header Filter6 Match Dropped | |
req_sz_16k | 8 | Request Payload Size Less Than or Equal to 16K | |
idle_timeout | 8 | Idle Timeout | |
req_sz_64k | 8 | Request Payload Size Less Than or Equal to 64K | |
partial_header | 8 | Partial Header | |
referer_filter_blacklist | 8 | Referer Filter Blacklisted | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
src_header_filter4_match | 8 | Src Header Filter4 Match | |
syn_retry_gap_drop | 8 | SYN Retry-Gap Dropped | |
ack_retry_rto_pass | 8 | ACK Retry RTO Passed | |
src_header_filter5_drop | 8 | Src Header Filter5 Match Dropped | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
filter8_drop | 8 | Filter8 Match Dropped | |
src_header_filter1_drop | 8 | Src Header Filter1 Match Dropped | |
resp_code_2xx | 8 | HTTP Status Code 2XX | |
src_filter5_match | 8 | Src Filter5 Match | |
line_too_long | 8 | Line Too Long | |
src_syn_retry_rto_pass | 8 | Src SYN Retry RTO Passed | |
src_syn_retry_reset | 8 | Src SYN Retry Timeout Reset | |
port_rcvd | 8 | Inbound Packets Received | |
src_syn_retry_rto_fail | 8 | Src SYN Retry RTO Dropped | |
conn_close_half_open | 8 | Half Open Connections Closed | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
req_sz_1k | 8 | Request Payload Size Less Than or Equal to 1K | |
synack_multiple_attempts_per_ip_detected | 8 | SYNACK Multiple Attempts Per IP Detected | |
http_auth_resp | 8 | HTTP Auth Responded | |
src_syn_retry_rto_progress | 8 | Src SYN Retry RTO Progress | |
src_ack_retry_rto_pass | 8 | Src ACK Retry RTO Passed | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
conn_prate_excd | 8 | TCP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
src_rst_cookie_fail | 8 | Src RST Cookie Failed | |
src_auth_drop | 8 | Src TCP Auth Dropped | |
resp_code_3xx | 8 | HTTP Status Code 3XX | |
src_filter_action_drop | 8 | Src Filter Action Drop |
stats l4-ssl-zone-port¶
Counter | Size | Description | |
---|---|---|---|
filter_none_match | 8 | Filter No Match | |
src_well_known_port | 8 | Src TCP SrcPort Wellknown | |
src_ack_auth_fail | 8 | Src ACK Retry Dropped | |
src_conn_rexmit_rate_excd | 8 | Src TCP Conn Retransmit Rate Exceeded | |
tcp_rexmit_syn_limit_drop | 8 | TCP SYN Retransmit Exceed Drop | |
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
src_ack_retry_gap_drop | 8 | Src ACK Retry Retry-Gap Dropped | |
filter4_match | 8 | Filter4 Match | |
src_create_conn_non_syn_dropped | 8 | Src Create Conn with non-SYN Packets Dropped | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
sess_aged | 8 | Sessions Aged Out | |
tcp_auth_resp | 8 | TCP Auth Responded | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
conn_close | 8 | Connections Closed | |
syn_auth_fail | 8 | SYN Auth Failed | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
syn_retry_init | 8 | SYN Retry Init | |
renegotiation_exceed | 8 | Renegotiation Exceeded | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
er_condition | 8 | Error Condition | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | TCP SrcPort Wellknown | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
port_syn_rate_exceed | 8 | TCP SYN Rate Exceeded | |
ssl_port_non_tls | 8 | SSL Non-TLS Dropped | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
conn_rexmit_rate_excd | 8 | TCP Conn Retransmit Rate Exceeded | |
ssl_port_bad_ver | 8 | SSL Header Bad Version | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
out_of_seq_excd | 8 | Out-Of-Seq Exceeded | |
conn_close_w_rst | 8 | RST Connections Closed | |
port_src_escalation | 8 | Src Escalation | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
src_ack_retry_rto_progress | 8 | Src ACK Retry RTO Progress | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
processed | 8 | Packets Processed | |
src_retransmit_excd | 8 | Src Retransmit Exceeded | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
tcp_rexmit_syn_limit_bl | 8 | TCP SYN Retransmit Exceed Blacklist | |
reset_while_other_in_handshake | 8 | Reset While Others in Handshake | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
drop_packet | 8 | Packets Dropped | |
src_filter5_match | 8 | Src Filter5 Match | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
filter5_match | 8 | Filter5 Match | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
tcp_auth_drop | 8 | TCP Auth Dropped | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
syn_cookie_fail | 8 | SYN Cookie Failed | |
src_syn_retry_rto_fail | 8 | Src SYN Retry RTO Dropped | |
syn_retry_rto_progress | 8 | SYN Retry RTO Progress | |
ssl_auth_drop | 8 | SSL Auth Dropped | |
syn_retry_pass | 8 | SYN Retry Passed | |
rst_cookie_fail | 8 | RST Cookie Failed | |
ack_retry_rto_fail | 8 | ACK Retry RTO Dropped | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
is_ssl3 | 8 | SSL v3 | |
src_req_rate_exceed | 8 | Src Request Rate Exceeded | |
frag_rcvd | 8 | Fragmented Packets Received | |
src_syn_retry_init | 8 | Src SYN Retry Init | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
syn_retry_rto_pass | 8 | SYN Retry RTO Passed | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
bl | 8 | Dst Blacklisted | |
filter1_match | 8 | Filter1 Match | |
port_bytes | 8 | Inbound Bytes Received | |
sess_create_inbound | 8 | Inbound Sessions Created | |
unauth_drop | 8 | TCP Unauth Dropped | |
filter_auth_fail | 8 | Filter Auth Failed | |
conn_create_from_syn | 8 | Connections Created From SYN | |
do_auth_handshake | 8 | Auth Handshake | |
auth_handshake_bl | 8 | Auth Handshake Blacklisted | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
src_zero_window_excd | 8 | Src Zero-Window Exceeded | |
ssl_bad_header_forw | 8 | SSL Traffic Check Bad Header Forwarded | |
ack_auth_fail | 8 | ACK Retry Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
src_drop | 8 | Src Packets Dropped | |
syn_retry_blacklist | 8 | SYN Retry Timeout Blacklisted | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
src_ack_retry_timeout | 8 | Src ACK Retry Timeout | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
src_conn_ofo_rate_excd | 8 | Src TCP Conn Out-Of-Seq Rate Exceeded | |
syn_retry_gap_drop | 8 | SYN Retry-Gap Dropped | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
conn_create_from_ack | 8 | Connections Created From ACK | |
auth_handshake_fail | 8 | Auth Handshake Fail | |
src_filter3_match | 8 | Src Filter3 Match | |
src_syn_retry_gap_drop | 8 | Src SYN Retry-Gap Dropped | |
syn_retry_timeout | 8 | SYN Retry Timeout | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
syn_drop | 8 | SYN Dropped | |
src_filter1_match | 8 | Src Filter1 Match | |
src_syn_rate_exceed | 8 | Src TCP SYN Rate Exceeded | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_syn_retry_timeout | 8 | Src SYN Retry Timeout | |
ssl_port_bad_len | 8 | SSL Header Bad Length | |
src_filter_none_match | 8 | Src Filter No Match | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
new_syn | 8 | TCP SYN | |
src_policy_reset | 8 | Src Policy Reset | |
src_syn_cookie_sent | 8 | Src SYN Cookie Sent | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
ack_retry_timeout | 8 | ACK Retry Timeout | |
auth_handshake_success | 8 | Auth Handshake Success | |
src_out_of_seq_excd | 8 | Src Out-Of-Seq Exceeded | |
ssl_auth_resp | 8 | SSL Auth Responded | |
syn_tfo_rcv | 8 | SYN TFO Received | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
dst_req_rate_exceed | 8 | Dst Request Rate Exceeded | |
src_ssl_auth_drop | 8 | Src SSL Auth Dropped | |
src_unauth_drop | 8 | Src TCP Unauth Dropped | |
filter_action_whitelist | 8 | Filter Action WL | |
src_conn_pkt_rate_excd | 8 | Src TCP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
frag_timeout | 8 | Fragmented Packets Timeout | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
conn_close_w_fin | 8 | FIN Connections Closed | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
src_syn_retry_blacklist | 8 | Src SYN Retry Timeout Blacklisted | |
auth_handshake_timeout | 8 | Auth Handshake Timeout | |
src_ack_retry_rto_pass | 8 | Src ACK Retry RTO Passed | |
src_conn_zwindow_rate_excd | 8 | Src TCP Conn Zero-Window Rate Exceeded | |
src_ack_retry_init | 8 | Src ACK Retry Init | |
ack_retry_blacklist | 8 | ACK Retry Timeout Blacklisted | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
ssl_bad_header_drop | 8 | SSL Traffic Check Bad Header Dropped | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
syn_auth_pass | 8 | SYN Auth Passed | |
syn_retry_rto_fail | 8 | SYN Retry RTO Dropped | |
syn_cookie_sent | 8 | SYN Cookie Sent | |
retransmit_excd | 8 | Retransmit Exceeded | |
src_syn_auth_fail | 8 | Src SYN Auth Failed | |
src_filter_action_whitelist | 8 | Src Filter Action WL | |
zero_window_excd | 8 | Zero-Window Exceeded | |
src_ack_retry_reset | 8 | Src ACK Retry Timeout Reset | |
conn_ofo_rate_excd | 8 | TCP Conn Out-Of-Seq Rate Exceeded | |
filter2_match | 8 | Filter2 Match | |
src_ack_retry_blacklist | 8 | Src ACK Retry Timeout Blacklisted | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognitoin: Pattern Not Found | |
syn_retry_reset | 8 | SYN Retry Timeout Reset | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
conn_close_w_idle | 8 | Idle Connections Closed | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
sess_create | 8 | Session Create | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
ack_retry_pass | 8 | ACK Retry Passed | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
ack_retry_reset | 8 | ACK Retry Timeout Reset | |
is_tls1_2 | 8 | TLS v1.2 | |
is_tls1_1 | 8 | TLS v1.1 | |
is_tls1_0 | 8 | TLS v1.0 | |
policy_reset | 8 | Policy Reset | |
syn_retry_failed | 8 | SYN Retry Dropped | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
ack_retry_init | 8 | ACK Retry Init | |
src_filter4_match | 8 | Src Filter4 Match | |
policy_drop | 8 | Policy Dropped | |
ack_retry_gap_drop | 8 | ACK Retry Retry-Gap Dropped | |
create_conn_non_syn_dropped | 8 | Create Conn with non-SYN Packets Dropped | |
ssl_port_invalid_type | 8 | SSL Header Invalid Type | |
current_es_level | 8 | Current Escalation Level | |
src_syn_retry_failed | 8 | Src SYN Retry Dropped | |
filter_action_drop | 8 | Filter Action Drop | |
src_ack_retry_rto_fail | 8 | Src ACK Retry RTO Dropped | |
conn_zwindow_rate_excd | 8 | TCP Conn Zero-Window Rate Exceeded | |
renegotiation_incomplete | 8 | Renegotiation Incomplete | |
ack_retry_rto_progress | 8 | ACK Retry RTO Progress | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
port_drop | 8 | Inbound Packets Dropped | |
ack_retry_rto_pass | 8 | ACK Retry RTO Passed | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
src_syn_cookie_fail | 8 | Src SYN Cookie Failed | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
src_syn_retry_rto_pass | 8 | Src SYN Retry RTO Passed | |
src_syn_retry_reset | 8 | Src SYN Retry Timeout Reset | |
port_rcvd | 8 | Inbound Packets Received | |
is_renegotiation | 8 | SSL Renegotiation | |
conn_close_half_open | 8 | Half Open Connections Closed | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
synack_multiple_attempts_per_ip_detected | 8 | SYNACK Multiple Attempts Per IP Detected | |
src_syn_retry_rto_progress | 8 | Src SYN Retry RTO Progress | |
conn_prate_excd | 8 | TCP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
synack_reset_sent | 8 | SYNACK Reset Sent | |
src_rst_cookie_fail | 8 | Src RST Cookie Failed | |
src_auth_drop | 8 | Src TCP Auth Dropped | |
src_drop_packet | 8 | Src Packets Dropped |
stats quic-zone-port¶
Counter | Size | Description | |
---|---|---|---|
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
0rtt | 8 | QUIC 0-RTT | |
frag_drop | 8 | Fragmented Packets Dropped | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
src_udp_retry_gap_drop | 8 | Src UDP Retry-Gap Dropped | |
filter4_match | 8 | Filter4 Match | |
spoof_detect_fail | 8 | UDP Retry Timeout | |
handshake | 8 | QUIC Handshake | |
sess_aged | 8 | Sessions Aged Out | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | UDP SrcPort Wellknown | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
invalid_packet_type | 8 | Invalid Packet Type | |
src_udp_retry_init | 8 | Src UDP Retry Init | |
src_payload_too_small | 8 | Src UDP Payload Too Small | |
version_match_action_taken | 8 | Version Match Action Taken | |
src_udp_retry_pass | 8 | Src UDP Retry Passed | |
udp_retry_init | 8 | UDP Retry Init | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
src_filter5_match | 8 | Src Filter5 Match | |
port_src_escalation | 8 | Src Escalation | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
port_bytes | 8 | Inbound Bytes Received | |
frag_rcvd | 8 | Fragmented Packets Received | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
processed | 8 | QUIC Headers Processed | |
fixed_bit_not_set | 8 | Fixed Bit Not Set | |
malformed_action_drop | 8 | Malformed Action Drop | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
malformed_scid_len_max_exceed | 8 | Malformed SCID Length Maximum Exceed | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
filter5_match | 8 | Filter5 Match | |
malformed_action_taken | 8 | Malformed Action Taken | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
retry | 8 | QUIC Retry | |
zone_src_udp_retry_timeout_blacklist | 8 | Src UDP Retry Timeout Blacklisted | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
payload_too_small | 8 | UDP Payload Too Small | |
version_negotiation | 8 | QUIC Version Negotiation | |
src_payload_too_big | 8 | Src UDP Payload Too Large | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
bl | 8 | Dst Blacklisted | |
filter1_match | 8 | Filter1 Match | |
ntp_monlist_resp | 8 | NTP Monlist Response | |
sess_create_inbound | 8 | Inbound Sessions Created | |
filter_auth_fail | 8 | Filter Auth Failed | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
src_filter1_match | 8 | Src Filter1 Match | |
udp_retry_pass | 8 | UDP Retry Passed | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
dst_udp_retry_timeout_blacklist | 8 | UDP Retry Timeout Blacklisted | |
src_udp_auth_drop | 8 | Src UDP Auth Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
src_drop | 8 | Src Packets Dropped | |
version_match_action_drop | 8 | Version Match Action Drop | |
initial_force_tcp | 8 | Initial Force-TCP | |
port_drop | 8 | Inbound Packets Dropped | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
filter_none_match | 8 | Filter No Match | |
src_filter3_match | 8 | Src Filter3 Match | |
ntp_monlist_req | 8 | NTP Monlist Request | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
payload_too_big | 8 | UDP Payload Too Large | |
malformed_dcid_len_max_exceed | 8 | Malformed DCID Length Maximum Exceed | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_filter_none_match | 8 | Src Filter No Match | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
initial | 8 | QUIC Initial | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
udp_retry_gap_drop | 8 | UDP Retry-Gap Dropped | |
filter_action_whitelist | 8 | Filter Action Whitelist | |
src_conn_pkt_rate_excd | 8 | Src UDP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
src_well_known_port | 8 | Src UDP SrcPort Wellknown | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
src_filter_action_whitelist | 8 | Src Filter Action Whitelist | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
filter2_match | 8 | Filter2 Match | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
malformed_action_blacklist | 8 | Malformed Action Blacklist | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
src_ntp_monlist_resp | 8 | Src NTP Monlist Response | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
sess_create | 8 | Session Create | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
udp_auth_drop | 8 | UDP Auth Dropped | |
src_ntp_monlist_req | 8 | Src NTP Monlist Request | |
version_match_action_blacklist | 8 | Version Match Action Blacklist | |
src_filter4_match | 8 | Src Filter4 Match | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
current_es_level | 8 | Current Escalation Level | |
filter_action_drop | 8 | Filter Action Drop | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
frag_timeout | 8 | Fragmented Packets Timeout | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
port_rcvd | 8 | Inbound Packets Received | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
conn_prate_excd | 8 | UDP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
packet_parse_failed | 8 | Packet Parse Failed | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
src_udp_auth_timeout | 8 | Src UDP Retry Timeout |
stats sip-tcp-zone-port¶
Counter | Size | Description | |
---|---|---|---|
src_ack_auth_fail | 8 | Src ACK Retry Dropped | |
src_well_known_port | 8 | Src TCP SrcPort Wellknown | |
concatenate_msg | 8 | Concatenate Msg | |
tcp_rexmit_syn_limit_drop | 8 | TCP SYN Retransmit Exceeded Drop | |
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
invalid_header | 8 | Invalid Header | |
header_filter_filter2_match | 8 | Header Filter Filter2 Match | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
src_ack_retry_gap_drop | 8 | Src ACK Retry Retry-Gap Dropped | |
src_out_of_seq_excd | 8 | Src Out-Of-Seq Exceeded | |
response_2xx | 8 | Response 2xx | |
src_create_conn_non_syn_dropped | 8 | Src Create Conn with non-SYN Packets Dropped | |
sess_aged | 8 | Sessions Aged Out | |
src_unauth_drop | 8 | Src TCP Unauth Dropped | |
tcp_auth_resp | 8 | TCP Auth Responded | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
conn_close | 8 | Connections Closed | |
syn_auth_fail | 8 | SYN Auth Failed | |
max_header_value_len_exceed | 8 | Maximum Header Value Length Exceed | |
read_start_line_error | 8 | Read Start Line Error | |
malform_request | 8 | Malform Request | |
response_3xx | 8 | Response 3xx | |
line_mem_allocated | 8 | Line Memory Allocated | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
syn_drop | 8 | SYN Dropped | |
request_method_ack | 8 | Request Method ACK | |
src_rate3_limit_exceed | 8 | Src Rate3 Limit Exceed | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | TCP SrcPort Wellknown | |
src_ack_retry_rto_pass | 8 | Src ACK Retry RTO Passed | |
body_too_big | 8 | Body Too Big | |
port_syn_rate_exceed | 8 | TCP SYN Rate Exceeded | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
response_unknown_version | 8 | Response Unknown Version | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
request_method_subscribe | 8 | Request Method SUBSCRIBE | |
syn_retry_gap_drop | 8 | SYN Retry-Gap Dropped | |
response_6xx | 8 | Response 6xx | |
conn_rexmit_rate_excd | 8 | TCP Conn Retransmit Rate Exceeded | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
out_of_seq_excd | 8 | Out-Of-Seq Exceeded | |
syn_cookie_sent | 8 | SYN Cookie Sent | |
header_filter_filter3_match | 8 | Header Filter Filter3 Match | |
filter_none_match | 8 | Filter No Match | |
port_bytes | 8 | Inbound Bytes Received | |
src_ack_retry_rto_progress | 8 | Src ACK Retry RTO Progress | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
too_many_header | 8 | Too Many Header | |
src_retransmit_excd | 8 | Src Retransmit Exceeded | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
tcp_rexmit_syn_limit_bl | 8 | TCP SYN Retransmit Exceeded Blacklist | |
src_ack_retry_timeout | 8 | Src ACK Retry Timeout | |
header_filter_filter5_match | 8 | Header Filter Filter5 Match | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
conn_close_w_rst | 8 | RST Connections Closed | |
rate1_limit_exceed | 8 | Dst Rate1 Limit Exceed | |
request_method_refer | 8 | Request Method REFER | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
port_src_escalation | 8 | Src Escalation | |
filter5_match | 8 | Filter5 Match | |
client_rst | 8 | Client Rst | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
tcp_auth_drop | 8 | TCP Auth Dropped | |
header_filter_action_default_pass | 8 | Header Filter Action Default Pass | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
syn_retry_rto_pass | 8 | SYN Retry RTO Passed | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
syn_cookie_fail | 8 | SYN Cookie Failed | |
filter4_match | 8 | Filter4 Match | |
src_syn_retry_rto_fail | 8 | Src SYN Retry RTO Dropped | |
ack_retry_gap_drop | 8 | ACK Retry Retry-Gap Dropped | |
syn_retry_rto_progress | 8 | SYN Retry RTO Progress | |
src_conn_rexmit_rate_excd | 8 | Src TCP Conn Retransmit Rate Exceeded | |
line_mem_freed | 8 | Line Memory Freed | |
rst_cookie_fail | 8 | RST Cookie Failed | |
ack_retry_rto_fail | 8 | ACK Retry RTO Dropped | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
current_es_level | 8 | Current Escalation Level | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
frag_rcvd | 8 | Fragmented Packets Received | |
src_syn_retry_init | 8 | Src SYN Retry Init | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
ofo_queue_size_exceed | 8 | Out-Of-Order Queue Size Exceed | |
request_method_prack | 8 | Request Method PRACK | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
response_5xx | 8 | Response 5xx | |
bl | 8 | Dst Blacklisted | |
filter1_match | 8 | Filter1 Match | |
error_condition | 8 | Error Condition | |
sess_create_inbound | 8 | Inbound Sessions Created | |
header_filter_action_whitelist | 8 | Header Filter Action Whitelist | |
filter_auth_fail | 8 | Filter Auth Failed | |
header_filter_not_match | 8 | Header Filter Not Match | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
frag_timeout | 8 | Fragmented Packets Timeout | |
header_filter_filter1_match | 8 | Header Filter Filter1 Match | |
ofo_timeout | 8 | Out-of-Order Timeout | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
src_zero_window_excd | 8 | Src Zero-Window Exceeded | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
ack_auth_fail | 8 | ACK Retry Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
parse_header_fail_error | 8 | Parse Header Fail Error | |
request_method_info | 8 | Request Method INFO | |
syn_retry_blacklist | 8 | SYN Retry Timeout Blacklisted | |
synack_reset_sent | 8 | SYNACK Reset Sent | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
src_conn_ofo_rate_excd | 8 | Src TCP Conn Out-Of-Seq Rate Exceeded | |
port_drop | 8 | Inbound Packets Dropped | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
conn_create_from_ack | 8 | Connections Created From ACK | |
parse_start_line_error | 8 | Parse Start Line Error | |
src_filter3_match | 8 | Src Filter3 Match | |
max_uri_len_exceed | 8 | Maximum URI Length Exceed | |
src_syn_retry_gap_drop | 8 | Src SYN Retry-Gap Dropped | |
request_method_publish | 8 | Request Method PUBLISH | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
request_unknown_version | 8 | Request Unknown Version | |
src_filter1_match | 8 | Src Filter1 Match | |
src_syn_rate_exceed | 8 | Src TCP SYN Rate Exceeded | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_syn_retry_timeout | 8 | Src SYN Retry Timeout | |
request_method_bye | 8 | Request Method BYE | |
response_1xx | 8 | Response 1xx | |
src_syn_retry_blacklist | 8 | Src SYN Retry Timeout Blacklisted | |
src_filter_none_match | 8 | Src Filter No Match | |
src_rate1_limit_exceed | 8 | Src Rate1 Limit Exceed | |
response_unknown | 8 | Response Unknown | |
keep_alive_msg | 8 | Keep Alive Message | |
unauth_drop | 8 | TCP Unauth Dropped | |
src_syn_cookie_sent | 8 | Src SYN Cookie Sent | |
header_filter_action_drop | 8 | Header Filter Action Drop | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
ack_retry_timeout | 8 | ACK Retry Timeout | |
header_filter_filter4_match | 8 | Header Filter Filter4 Match | |
request_method_register | 8 | Request Method REGISTER | |
syn_retry_timeout | 8 | SYN Retry Timeout | |
syn_tfo_rcv | 8 | SYN TFO Received | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
ack_retry_rto_pass | 8 | ACK Retry RTO Passed | |
response_4xx | 8 | Response 4xx | |
seq_check_ofo | 8 | Sequence Check Out-Of-Order | |
policy_violation | 8 | Policy Violation | |
seq_check_retrans_fin | 8 | Sequence Check Retransmit Fin | |
filter_action_whitelist | 8 | Filter Action WL | |
src_conn_pkt_rate_excd | 8 | Src TCP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
request_method_unknown | 8 | Request Method UNKNOWN | |
src_filter5_match | 8 | Src Filter5 Match | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
mem_alloc_fail_error | 8 | Memory Allocation Fail Error | |
request_method_invite | 8 | Request Method INVITE | |
conn_close_w_fin | 8 | FIN Connections Closed | |
src_rate2_limit_exceed | 8 | Src Rate2 Limit Exceed | |
syn_retry_init | 8 | SYN Retry Init | |
request_method_message | 8 | Request Method MESSAGE | |
src_conn_zwindow_rate_excd | 8 | Src TCP Conn Zero-Window Rate Exceeded | |
sess_create | 8 | Session Create | |
src_ack_retry_init | 8 | Src ACK Retry Init | |
ack_retry_blacklist | 8 | ACK Retry Timeout Blacklisted | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
syn_auth_pass | 8 | SYN Auth Passed | |
syn_retry_rto_fail | 8 | SYN Retry RTO Dropped | |
get_content_fail_error | 8 | Get Content Fail Error | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
retransmit_excd | 8 | Retransmit Exceeded | |
src_syn_auth_fail | 8 | Src SYN Auth Failed | |
src_filter_action_whitelist | 8 | Src Filter Action WL | |
zero_window_excd | 8 | Zero-Window Exceeded | |
seq_check_retrans_rst | 8 | Sequence Check Retransmit Rst | |
src_ack_retry_reset | 8 | Src ACK Retry Timeout Reset | |
conn_ofo_rate_excd | 8 | TCP Conn Out-Of-Seq Rate Exceeded | |
pkts_ofo_total | 8 | Packet Out-Of-Order Total | |
filter2_match | 8 | Filter2 Match | |
src_ack_retry_blacklist | 8 | Src ACK Retry Timeout Blacklisted | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognitoin: Pattern Not Found | |
syn_retry_reset | 8 | SYN Retry Timeout Reset | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
ack_retry_pass | 8 | ACK Retry Passed | |
conn_close_w_idle | 8 | Idle Connections Closed | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
request_method_notify | 8 | Request Method NOTIFY | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
header_filter_match | 8 | Header Filter Match | |
src_drop | 8 | Src Packets Dropped | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
max_call_id_len_exceed | 8 | Maximum Call ID Length Exceed | |
header_name_too_long | 8 | Header Name Too Long | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
pkts_retrans_total | 8 | Packets Retransmit Total | |
seq_check_retrans_other | 8 | Sequence Check Retransmit Other | |
header_filter_none_match | 8 | Header Filter None Match | |
request_method_options | 8 | Request Method OPTIONS | |
request_method_update | 8 | Request Method UPDATE | |
syn_retry_failed | 8 | SYN Retry Dropped | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
max_sdp_len_exceed | 8 | Maximum SDP Length Exceed | |
ack_retry_init | 8 | ACK Retry Init | |
src_filter4_match | 8 | Src Filter4 Match | |
policy_drop | 8 | Policy Drop | |
ack_retry_reset | 8 | ACK Retry Timeout Reset | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
conn_create_from_syn | 8 | Connections Created From SYN | |
create_conn_non_syn_dropped | 8 | Create Conn with non-SYN Packets Dropped | |
syn_retry_pass | 8 | SYN Retry Passed | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
rate2_limit_exceed | 8 | Dst Rate2 Limit Exceed | |
src_syn_retry_failed | 8 | Src SYN Retry Dropped | |
filter_action_drop | 8 | Filter Action Drop | |
src_ack_retry_rto_fail | 8 | Src ACK Retry RTO Dropped | |
conn_zwindow_rate_excd | 8 | TCP Conn Zero-Window Rate Exceeded | |
idle_timeout | 8 | Idle Timeout | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
ack_retry_rto_progress | 8 | ACK Retry RTO Progress | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
invalid_start_line_error | 8 | Invalid Start Line Error | |
rate3_limit_exceed | 8 | Dst Rate3 Limit Exceed | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
src_syn_cookie_fail | 8 | Src SYN Cookie Failed | |
line_too_long | 8 | Line Too Long | |
src_syn_retry_rto_pass | 8 | Src SYN Retry RTO Passed | |
src_syn_retry_reset | 8 | Src SYN Retry Timeout Reset | |
port_rcvd | 8 | Inbound Packets Received | |
conn_close_half_open | 8 | Half Open Connections Closed | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
seq_check_retrans_push | 8 | Sequence Check Retransmit Push | |
synack_multiple_attempts_per_ip_detected | 8 | SYNACK Multiple Attempts Per IP Detected | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
src_syn_retry_rto_progress | 8 | Src SYN Retry RTO Progress | |
request_method_cancel | 8 | Request Method CANCEL | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
conn_prate_excd | 8 | TCP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
header_filter_action_blacklist | 8 | Header Filter Action Blacklist | |
src_rst_cookie_fail | 8 | Src RST Cookie Failed | |
src_auth_drop | 8 | Src TCP Auth Dropped | |
src_filter_action_drop | 8 | Src Filter Action Drop |
stats sip-udp-zone-port¶
Counter | Size | Description | |
---|---|---|---|
filter_none_match | 8 | Filter No Matched | |
concatenate_msg | 8 | Concatenate Msg | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
invalid_header | 8 | Invalid Header | |
header_filter_filter2_match | 8 | Header Filter Filter2 Match | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
src_udp_retry_gap_drop | 8 | Src UDP Retry-Gap Dropped | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
filter4_match | 8 | Filter4 Match | |
response_2xx | 8 | Response 2xx | |
spoof_detect_fail | 8 | UDP Retry Timeout | |
sess_aged | 8 | Sessions Aged Out | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
max_header_value_len_exceed | 8 | Maximum Header Value Length Exceed | |
src_payload_too_small | 8 | Src UDP Payload Too Small | |
udp_auth_pass | 8 | Auth UDP Passed | |
read_start_line_error | 8 | Read Start Line Error | |
malform_request | 8 | Malform Request | |
response_3xx | 8 | Response 3xx | |
line_mem_allocated | 8 | Line Memory Allocated | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
udp_auth | 8 | Auth UDP Init | |
request_method_ack | 8 | Request Method ACK | |
src_rate3_limit_exceed | 8 | Src Rate3 Limit Exceed | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | UDP SrcPort Wellknown | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
body_too_big | 8 | Body Too Big | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
src_udp_retry_init | 8 | Src UDP Retry Init | |
response_unknown_version | 8 | Response Unknown Version | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
request_method_subscribe | 8 | Request Method SUBSCRIBE | |
response_6xx | 8 | Response 6xx | |
src_udp_retry_pass | 8 | Src UDP Retry Passed | |
udp_retry_init | 8 | UDP Retry Init | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
src_filter5_match | 8 | Src Filter5 Match | |
header_filter_filter3_match | 8 | Header Filter Filter3 Match | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
port_bytes | 8 | Inbound Bytes Received | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
too_many_header | 8 | Too Many Header | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
header_filter_filter5_match | 8 | Header Filter Filter5 Match | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
rate1_limit_exceed | 8 | Dst Rate1 Limit Exceed | |
request_method_refer | 8 | Request Method REFER | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
port_src_escalation | 8 | Src Escalation | |
filter5_match | 8 | Filter5 Match | |
src_udp_auth_fail | 8 | Src Auth UDP Failed | |
header_filter_action_default_pass | 8 | Header Filter Action Default Pass | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
zone_src_udp_retry_timeout_blacklist | 8 | Src UDP Retry Timeout Blacklisted | |
line_mem_freed | 8 | Line Memory Freed | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
current_es_level | 8 | Current Escalation Level | |
payload_too_small | 8 | UDP Payload Too Small | |
frag_rcvd | 8 | Fragmented Packets Received | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
request_method_prack | 8 | Request Method PRACK | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
response_5xx | 8 | Response 5xx | |
bl | 8 | Dst Blacklisted | |
filter1_match | 8 | Filter1 Match | |
ntp_monlist_resp | 8 | NTP Monlist Response | |
sess_create_inbound | 8 | Inbound Sessions Created | |
header_filter_action_whitelist | 8 | Header Filter Action Whitelist | |
filter_auth_fail | 8 | Filter Auth Failed | |
header_filter_not_match | 8 | Header Filter Not Match | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
frag_timeout | 8 | Fragmented Packets Timeout | |
header_filter_filter1_match | 8 | Header Filter Filter1 Match | |
udp_retry_pass | 8 | UDP Retry Passed | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
dst_udp_retry_timeout_blacklist | 8 | UDP Retry Timeout Blacklisted | |
udp_auth_retry_gap_drop | 8 | Auth UDP Retry-Gap Dropped | |
src_udp_auth_drop | 8 | Src UDP Auth Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
parse_header_fail_error | 8 | Parse Header Fail Error | |
request_method_info | 8 | Request Method INFO | |
udp_auth_retry_fail | 8 | Auth UDP Retry Failed | |
port_drop | 8 | Inbound Packets Dropped | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
parse_start_line_error | 8 | Parse Start Line Error | |
src_filter3_match | 8 | Src Filter3 Match | |
max_uri_len_exceed | 8 | Maximum URI Length Exceed | |
ntp_monlist_req | 8 | NTP Monlist Request | |
request_method_publish | 8 | Request Method PUBLISH | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
payload_too_big | 8 | UDP Payload Too Large | |
request_unknown_version | 8 | Request Unknown Version | |
src_filter1_match | 8 | Src Filter1 Match | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
request_method_bye | 8 | Request Method BYE | |
response_1xx | 8 | Response 1xx | |
src_filter_none_match | 8 | Src Filter No Match | |
src_rate1_limit_exceed | 8 | Src Rate1 Limit Exceed | |
response_unknown | 8 | Response Unknown | |
keep_alive_msg | 8 | Keep Alive Message | |
header_filter_action_drop | 8 | Header Filter Action Drop | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
header_filter_filter4_match | 8 | Header Filter Filter4 Match | |
request_method_register | 8 | Request Method REGISTER | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
udp_retry_gap_drop | 8 | UDP Retry-Gap Dropped | |
response_4xx | 8 | Response 4xx | |
policy_violation | 8 | Policy Violation | |
filter_action_whitelist | 8 | Filter Action Whitelist | |
src_conn_pkt_rate_excd | 8 | Src UDP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
src_udp_auth | 8 | Src Auth UDP Init | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
sess_create_outbound | 8 | Outbound Sessions Created | |
mem_alloc_fail_error | 8 | Memory Allocation Fail Error | |
request_method_invite | 8 | Request Method INVITE | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
src_rate2_limit_exceed | 8 | Src Rate2 Limit Exceed | |
request_method_message | 8 | Request Method MESSAGE | |
sess_create | 8 | Session Create | |
src_well_known_port | 8 | Src UDP SrcPort Wellknown | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
get_content_fail_error | 8 | Get Content Fail Error | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
src_filter_action_whitelist | 8 | Src Filter Action Whitelist | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
src_payload_too_big | 8 | Src UDP Payload Too Large | |
filter2_match | 8 | Filter2 Match | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognitoin: Pattern Not Found | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
src_ntp_monlist_resp | 8 | Src NTP Monlist Response | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
request_method_notify | 8 | Request Method NOTIFY | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
header_filter_match | 8 | Header Filter Match | |
src_drop | 8 | Src Packets Dropped | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
udp_auth_drop | 8 | UDP Auth Dropped | |
max_call_id_len_exceed | 8 | Maximum Call ID Length Exceed | |
header_name_too_long | 8 | Header Name Too Long | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
src_ntp_monlist_req | 8 | Src NTP Monlist Request | |
header_filter_none_match | 8 | Header Filter None Match | |
request_method_options | 8 | Request Method OPTIONS | |
request_method_update | 8 | Request Method UPDATE | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
max_sdp_len_exceed | 8 | Maximum SDP Length Exceed | |
src_filter4_match | 8 | Src Filter4 Match | |
policy_drop | 8 | Policy Drop | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
rate2_limit_exceed | 8 | Dst Rate2 Limit Exceed | |
filter_action_drop | 8 | Filter Action Drop | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
invalid_start_line_error | 8 | Invalid Start Line Error | |
rate3_limit_exceed | 8 | Dst Rate3 Limit Exceed | |
request_method_unknown | 8 | Request Method UNKNOWN | |
line_too_long | 8 | Line Too Long | |
port_rcvd | 8 | Inbound Packets Received | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
request_method_cancel | 8 | Request Method CANCEL | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
conn_prate_excd | 8 | UDP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
header_filter_action_blacklist | 8 | Header Filter Action Blacklist | |
udp_auth_fail | 8 | Auth UDP Failed | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
src_udp_auth_timeout | 8 | Src UDP Retry Timeout |
stats tcp-zone-port¶
Counter | Size | Description | |
---|---|---|---|
src_ack_auth_fail | 8 | Src ACK Retry Dropped | |
src_well_known_port | 8 | Src TCP SrcPort Wellknown | |
tcp_rexmit_syn_limit_drop | 8 | TCP SYN Retransmit Exceed Drop | |
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
auth_drop | 8 | TCP Auth Dropped | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
src_ack_retry_gap_drop | 8 | Src ACK Retry Retry-Gap Dropped | |
filter4_match | 8 | Filter4 Match | |
src_create_conn_non_syn_dropped | 8 | Src Create Conn with non-SYN Packets Dropped | |
sess_aged | 8 | Sessions Aged Out | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
conn_close | 8 | Connections Closed | |
syn_auth_fail | 8 | SYN Auth Failed | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
syn_retry_init | 8 | SYN Retry Init | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | TCP SrcPort Wellknown | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
port_syn_rate_exceed | 8 | TCP SYN Rate Exceeded | |
conn_rexmit_rate_excd | 8 | TCP Conn Retransmit Rate Exceeded | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
out_of_seq_excd | 8 | Out-Of-Seq Exceeded | |
conn_close_w_rst | 8 | RST Connections Closed | |
port_src_escalation | 8 | Src Escalation | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
src_ack_retry_rto_progress | 8 | Src ACK Retry RTO Progress | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
src_retransmit_excd | 8 | Src Retransmit Exceeded | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
tcp_rexmit_syn_limit_bl | 8 | TCP SYN Retransmit Exceed Blacklist | |
src_ack_retry_timeout | 8 | Src ACK Retry Timeout | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
src_filter5_match | 8 | Src Filter5 Match | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
filter5_match | 8 | Filter5 Match | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
port_bytes | 8 | Inbound Bytes Received | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
syn_cookie_fail | 8 | SYN Cookie Failed | |
src_syn_retry_rto_fail | 8 | Src SYN Retry RTO Dropped | |
syn_retry_rto_progress | 8 | SYN Retry RTO Progress | |
src_conn_rexmit_rate_excd | 8 | Src TCP Conn Retransmit Rate Exceeded | |
src_out_of_seq_excd | 8 | Src Out-Of-Seq Exceeded | |
rst_cookie_fail | 8 | RST Cookie Failed | |
ack_retry_rto_fail | 8 | ACK Retry RTO Dropped | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
frag_rcvd | 8 | Fragmented Packets Received | |
src_syn_retry_init | 8 | Src SYN Retry Init | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
syn_retry_rto_pass | 8 | SYN Retry RTO Passed | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
bl | 8 | Dst Blacklisted | |
filter1_match | 8 | Filter1 Match | |
auth_resp | 8 | TCP Auth Responded | |
sess_create_inbound | 8 | Inbound Sessions Created | |
filter_auth_fail | 8 | Filter Auth Failed | |
conn_create_from_syn | 8 | Connections Created From SYN | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
src_zero_window_excd | 8 | Src Zero-Window Exceeded | |
ack_auth_fail | 8 | ACK Retry Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
src_drop | 8 | Src Packets Dropped | |
syn_retry_blacklist | 8 | SYN Retry Timeout Blacklisted | |
synack_reset_sent | 8 | SYNACK Reset Sent | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
src_conn_ofo_rate_excd | 8 | Src TCP Conn Out-Of-Seq Rate Exceeded | |
syn_retry_gap_drop | 8 | SYN Retry-Gap Dropped | |
conn_create_from_ack | 8 | Connections Created From ACK | |
filter_none_match | 8 | Filter No Match | |
src_filter3_match | 8 | Src Filter3 Match | |
src_syn_retry_gap_drop | 8 | Src SYN Retry-Gap Dropped | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
syn_drop | 8 | SYN Dropped | |
src_filter1_match | 8 | Src Filter1 Match | |
src_syn_rate_exceed | 8 | Src TCP SYN Rate Exceeded | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_syn_retry_timeout | 8 | Src SYN Retry Timeout | |
src_filter_none_match | 8 | Src Filter No Match | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
unauth_drop | 8 | TCP Unauth Dropped | |
src_syn_cookie_sent | 8 | Src SYN Cookie Sent | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
ack_retry_timeout | 8 | ACK Retry Timeout | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
syn_retry_timeout | 8 | SYN Retry Timeout | |
syn_tfo_rcv | 8 | SYN TFO Received | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
src_unauth_drop | 8 | Src TCP Unauth Dropped | |
filter_action_whitelist | 8 | Filter Action WL | |
src_conn_pkt_rate_excd | 8 | Src TCP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
frag_timeout | 8 | Fragmented Packets Timeout | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
conn_close_w_fin | 8 | FIN Connections Closed | |
src_syn_retry_blacklist | 8 | Src SYN Retry Timeout Blacklisted | |
src_ack_retry_rto_pass | 8 | Src ACK Retry RTO Passed | |
src_conn_zwindow_rate_excd | 8 | Src TCP Conn Zero-Window Rate Exceeded | |
src_ack_retry_init | 8 | Src ACK Retry Init | |
ack_retry_blacklist | 8 | ACK Retry Timeout Blacklisted | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
syn_auth_pass | 8 | SYN Auth Passed | |
syn_retry_rto_fail | 8 | SYN Retry RTO Dropped | |
syn_cookie_sent | 8 | SYN Cookie Sent | |
retransmit_excd | 8 | Retransmit Exceeded | |
src_syn_auth_fail | 8 | Src SYN Auth Failed | |
src_filter_action_whitelist | 8 | Src Filter Action WL | |
zero_window_excd | 8 | Zero-Window Exceeded | |
src_ack_retry_reset | 8 | Src ACK Retry Timeout Reset | |
conn_ofo_rate_excd | 8 | TCP Conn Out-Of-Seq Rate Exceeded | |
filter2_match | 8 | Filter2 Match | |
src_ack_retry_blacklist | 8 | Src ACK Retry Timeout Blacklisted | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognition: Pattern Not Found | |
syn_retry_reset | 8 | SYN Retry Timeout Reset | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
conn_close_w_idle | 8 | Idle Connections Closed | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
sess_create | 8 | Session Create | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
ack_retry_pass | 8 | ACK Retry Passed | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
ack_retry_reset | 8 | ACK Retry Timeout Reset | |
src_syn_cookie_fail | 8 | Src SYN Cookie Failed | |
syn_retry_failed | 8 | SYN Retry Dropped | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
ack_retry_init | 8 | ACK Retry Init | |
src_filter4_match | 8 | Src Filter4 Match | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
ack_retry_gap_drop | 8 | ACK Retry Retry-Gap Dropped | |
create_conn_non_syn_dropped | 8 | Create Conn with non-SYN Packets Dropped | |
syn_retry_pass | 8 | SYN Retry Passed | |
current_es_level | 8 | Current Escalation Level | |
src_syn_retry_failed | 8 | Src SYN Retry Dropped | |
filter_action_drop | 8 | Filter Action Drop | |
src_ack_retry_rto_fail | 8 | Src ACK Retry RTO Dropped | |
conn_zwindow_rate_excd | 8 | TCP Conn Zero-Window Rate Exceeded | |
ack_retry_rto_progress | 8 | ACK Retry RTO Progress | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
port_drop | 8 | Inbound Packets Dropped | |
ack_retry_rto_pass | 8 | ACK Retry RTO Passed | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
src_syn_retry_rto_pass | 8 | Src SYN Retry RTO Passed | |
src_syn_retry_reset | 8 | Src SYN Retry Timeout Reset | |
port_rcvd | 8 | Inbound Packets Received | |
conn_close_half_open | 8 | Half Open Connections Closed | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
synack_multiple_attempts_per_ip_detected | 8 | SYNACK Multiple Attempts Per IP Detected | |
src_syn_retry_rto_progress | 8 | Src SYN Retry RTO Progress | |
conn_prate_excd | 8 | TCP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
src_rst_cookie_fail | 8 | Src RST Cookie Failed | |
src_auth_drop | 8 | Src TCP Auth Dropped | |
src_filter_action_drop | 8 | Src Filter Action Drop |
stats udp-zone-port¶
Counter | Size | Description | |
---|---|---|---|
secondary_port_kbit_rate_exceed_pkt | 8 | Per Addr-Port KiBit Rate Exceeded Count | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
frag_drop | 8 | Fragmented Packets Dropped | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
src_udp_retry_gap_drop | 8 | Src UDP Retry-Gap Dropped | |
filter4_match | 8 | Filter4 Match | |
spoof_detect_fail | 8 | UDP Retry Timeout | |
sess_aged | 8 | Sessions Aged Out | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
secondary_port_kbit_rate_exceed | 8 | Per Addr-Port KiBit Rate Exceeded | |
secondary_port_hit | 8 | Per Addr-Port Hit | |
wellknown_sport_drop | 8 | UDP SrcPort Wellknown | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
src_udp_retry_init | 8 | Src UDP Retry Init | |
src_payload_too_small | 8 | Src UDP Payload Too Small | |
src_udp_retry_pass | 8 | Src UDP Retry Passed | |
udp_retry_init | 8 | UDP Retry Init | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
src_filter5_match | 8 | Src Filter5 Match | |
port_src_escalation | 8 | Src Escalation | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
port_bytes | 8 | Inbound Bytes Received | |
frag_rcvd | 8 | Fragmented Packets Received | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
dst_hw_drop_removed | 8 | Dst Hardware Drop Rules Removed | |
src_zone_service_entry_aged | 8 | SrcZoneService Entry Aged | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
filter5_match | 8 | Filter5 Match | |
no_policy_class_list_match | 8 | No Policy Class-list Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
zone_src_udp_retry_timeout_blacklist | 8 | Src UDP Retry Timeout Blacklisted | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
payload_too_small | 8 | UDP Payload Too Small | |
src_payload_too_big | 8 | Src UDP Payload Too Large | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
bl | 8 | Dst Blacklisted | |
filter1_match | 8 | Filter1 Match | |
ntp_monlist_resp | 8 | NTP Monlist Response | |
sess_create_inbound | 8 | Inbound Sessions Created | |
filter_auth_fail | 8 | Filter Auth Failed | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
src_filter1_match | 8 | Src Filter1 Match | |
udp_retry_pass | 8 | UDP Retry Passed | |
src_hw_drop_removed | 8 | Src Hardware Drop Rules Removed | |
dst_udp_retry_timeout_blacklist | 8 | UDP Retry Timeout Blacklisted | |
src_udp_auth_drop | 8 | Src UDP Auth Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
src_drop | 8 | Src Packets Dropped | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
port_drop | 8 | Inbound Packets Dropped | |
filter_none_match | 8 | Filter No Match | |
src_filter3_match | 8 | Src Filter3 Match | |
ntp_monlist_req | 8 | NTP Monlist Request | |
src_zone_service_entry_learned | 8 | SrcZoneService Entry Learned | |
payload_too_big | 8 | UDP Payload Too Large | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
src_filter_none_match | 8 | Src Filter No Match | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
udp_retry_gap_drop | 8 | UDP Retry-Gap Dropped | |
filter_action_whitelist | 8 | Filter Action Whitelist | |
src_conn_pkt_rate_excd | 8 | Src UDP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
sess_create_outbound | 8 | Outbound Sessions Created | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
src_well_known_port | 8 | Src UDP SrcPort Wellknown | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
src_filter_action_whitelist | 8 | Src Filter Action Whitelist | |
secondary_port_conn_rate_exceed | 8 | Per Addr-Port Conn Rate Exceeded | |
dst_hw_drop_inserted | 8 | Dst Hardware Drop Rules Inserted | |
filter2_match | 8 | Filter2 Match | |
secondary_port_conn_limm_exceed | 8 | Per Addr-Port Conn Limit Exceeded | |
pattern_not_found | 8 | Pattern Recognition: Pattern Not Found | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
src_ntp_monlist_resp | 8 | Src NTP Monlist Response | |
secondary_port_pkt_rate_exceed | 8 | Per Addr-Port Packet Rate Exceeded | |
src_filter2_match | 8 | Src Filter2 Match | |
sess_create | 8 | Session Create | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
udp_auth_drop | 8 | UDP Auth Dropped | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
src_ntp_monlist_req | 8 | Src NTP Monlist Request | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
src_filter4_match | 8 | Src Filter4 Match | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
current_es_level | 8 | Current Escalation Level | |
filter_action_drop | 8 | Filter Action Drop | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
frag_timeout | 8 | Fragmented Packets Timeout | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
port_rcvd | 8 | Inbound Packets Received | |
src_hw_drop_inserted | 8 | Src Hardware Drop Rules Inserted | |
conn_prate_excd | 8 | UDP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
src_udp_auth_timeout | 8 | Src UDP Retry Timeout |
operational data¶
Counter | Size | Description | |
---|---|---|---|
app-stat | flag | app-stat | |
black-listed | flag | black-listed | |
authenticated | flag | authenticated | |
l4-ext-rate | flag | l4-ext-rate | |
overflow-policy | flag | overflow-policy | |
class-list | string | class-list | |
entry-displayed-count | number | entry-displayed-count | |
subnet-ip-addr | ipv4-cidr | subnet-ip-addr | |
exceeded | flag | exceeded | |
ddos_entry_list | ddos_entry_list | ||
service-displayed-count | number | service-displayed-count | |
white-listed | flag | white-listed | |
sources | flag | sources | |
hw-blacklisted | flag | hw-blacklisted | |
ipv6 | ipv6-address | ipv6 | |
sources-all-entries | flag | sources-all-entries | |
indicator-detail | flag | indicator-detail | |
level | flag | level | |
subnet-ipv6-addr | ipv6-address-plen | subnet-ipv6-addr | |
indicators | flag | indicators |