ddos sip-udp-port¶
ddos dst sip-udp port counters
sip-udp-port Specification¶
Type Collection Object Key(s) sampling-enable Collection Name sip-udp-port-list Collection URI /axapi/v3/ddos/sip-udp-port Element Name sip-udp-port Element URI /axapi/v3/ddos/sip-udp-port/{sampling-enable} Element Attributes sip-udp-port_attributes Statistics Data URI /axapi/v3/ddos/sip-udp-port/{sampling-enable}/stats Schema sip-udp-port schema
Operations Allowed:
Operation | Method | URI | Payload | |
---|---|---|---|---|
Create Object | POST | /axapi/v3/ddos/sip-udp-port | ||
Create List | POST | /axapi/v3/ddos/sip-udp-port | ||
Get Object | GET | /axapi/v3/ddos/sip-udp-port/{sampling-enable} | ||
Get List | GET | /axapi/v3/ddos/sip-udp-port | ||
Modify Object | POST | /axapi/v3/ddos/sip-udp-port/{sampling-enable} | ||
Replace Object | PUT | /axapi/v3/ddos/sip-udp-port/{sampling-enable} | ||
Replace List | PUT | /axapi/v3/ddos/sip-udp-port | ||
Delete Object | DELETE | /axapi/v3/ddos/sip-udp-port/{sampling-enable} |
sip-udp-port-list¶
sip-udp-port-list is JSON List of sip-udp-port attributes
sip-udp-port-list : [
]
sip-udp-port attributes¶
sampling-enable
Type: List
sampling-enable¶
Specification Type list Block object keys counters1
Description ‘all’: all; ‘request_method_ack’: Request Method ACK; ‘request_method_bye’: Request Method BYE; ‘request_method_cancel’: Request Method CANCEL; ‘request_method_invite’: Request Method INVITE; ‘request_method_info’: Request Method INFO; ‘request_method_message’: Request Method MESSAGE; ‘request_method_notify’: Request Method NOTIFY; ‘request_method_options’: Request Method OPTIONS; ‘request_method_prack’: Request Method PRACK; ‘request_method_publish’: Request Method PUBLISH; ‘request_method_register’: Request Method REGISTER; ‘request_method_refer’: Request Method REFER; ‘request_method_subscribe’: Request Method SUBSCRIBE; ‘request_method_update’: Request Method UPDATE; ‘request_method_unknown’: Request Method UNKNOWN; ‘request_unknown_version’: Request Unknown Version; ‘keep_alive_msg’: Keep Alive Message; ‘rate1_limit_exceed’: Dst Rate1 Limit Exceed; ‘rate2_limit_exceed’: Dst Rate2 Limit Exceed; ‘rate3_limit_exceed’: Dst Rate3 Limit Exceed; ‘src_rate1_limit_exceed’: Src Rate1 Limit Exceed; ‘src_rate2_limit_exceed’: Src Rate2 Limit Exceed; ‘src_rate3_limit_exceed’: Src Rate3 Limit Exceed; ‘response_1xx’: Response 1xx; ‘response_2xx’: Response 2xx; ‘response_3xx’: Response 3xx; ‘response_4xx’: Response 4xx; ‘response_5xx’: Response 5xx; ‘response_6xx’: Response 6xx; ‘response_unknown’: Response Unknown; ‘response_unknown_version’: Response Unknown Version; ‘read_start_line_error’: Read Start Line Error; ‘invalid_start_line_error’: Invalid Start Line Error; ‘parse_start_line_error’: Parse Start Line Error; ‘line_too_long’: Line Too Long; ‘line_mem_allocated’: Line Memory Allocated; ‘line_mem_freed’: Line Memory Freed; ‘max_uri_len_exceed’: Maximum URI Length Exceed; ‘too_many_header’: Too Many Header; ‘invalid_header’: Invalid Header; ‘header_name_too_long’: Header Name Too Long; ‘parse_header_fail_error’: Parse Header Fail Error; ‘max_header_value_len_exceed’: Maximum Header Value Length Exceed; ‘max_call_id_len_exceed’: Maximum Call ID Length Exceed; ‘header_filter_match’: Header Filter Match; ‘header_filter_not_match’: Header Filter Not Match; ‘header_filter_none_match’: Header Filter None Match; ‘header_filter_action_drop’: Header Filter Action Drop; ‘header_filter_action_blacklist’: Header Filter Action Blacklist; ‘header_filter_action_whitelist’: Header Filter Action Whitelist; ‘header_filter_action_default_pass’: Header Filter Action Default Pass; ‘header_filter_filter1_match’: Header Filter Filter1 Match; ‘header_filter_filter2_match’: Header Filter Filter2 Match; ‘header_filter_filter3_match’: Header Filter Filter3 Match; ‘header_filter_filter4_match’: Header Filter Filter4 Match; ‘header_filter_filter5_match’: Header Filter Filter5 Match; ‘max_sdp_len_exceed’: Maximum SDP Length Exceed; ‘body_too_big’: Body Too Big; ‘get_content_fail_error’: Get Content Fail Error; ‘concatenate_msg’: Concatenate Msg; ‘mem_alloc_fail_error’: Memory Allocation Fail Error; ‘malform_request’: Malform Request; ‘udp_auth’: Auth UDP Init; ‘udp_auth_fail’: Auth UDP Failed; ‘port_rcvd’: Inbound Packets Received; ‘port_drop’: Inbound Packets Dropped; ‘port_pkt_sent’: Inbound Packets Forwarded; ‘port_pkt_rate_exceed’: Packet Rate Exceeded; ‘port_kbit_rate_exceed’: KiBit Rate Exceeded; ‘port_conn_rate_exceed’: Conn Rate Exceeded; ‘port_conn_limm_exceed’: Conn Limit Exceeded; ‘port_bytes’: Inbound Bytes Received; ‘outbound_port_bytes’: Outbound Bytes Received; ‘outbound_port_rcvd’: Outbound Packets Received; ‘outbound_port_pkt_sent’: Outbound Packets Forwarded; ‘port_bytes_sent’: Inbound Bytes Forwarded; ‘port_bytes_drop’: Inbound Bytes Dropped; ‘port_src_bl’: Src Blacklisted; ‘filter_auth_fail’: Filter Auth Failed; ‘spoof_detect_fail’: UDP Retry Timeout; ‘sess_create’: Session Create; ‘filter_action_blacklist’: Filter Action Blacklist; ‘filter_action_drop’: Filter Action Drop; ‘filter_action_default_pass’: Filter Action Default Pass; ‘filter_action_whitelist’: Filter Action Whitelist; ‘exceed_drop_prate_src’: Src Pkt Rate Exceeded; ‘exceed_drop_crate_src’: Src Conn Rate Exceeded; ‘exceed_drop_climit_src’: Src Conn Limit Exceeded; ‘exceed_drop_brate_src’: Src KiBit Rate Exceeded; ‘outbound_port_bytes_sent’: Outbound Bytes Forwarded; ‘outbound_port_drop’: Outbound Packets Dropped; ‘outbound_port_bytes_drop’: Outbound Bytes Dropped; ‘udp_auth_retry_fail’: Auth UDP Retry Failed; ‘exceed_drop_brate_src_pkt’: Src KiBit Rate Exceeded Count; ‘port_kbit_rate_exceed_pkt’: KiBit Rate Exceeded Count; ‘udp_retry_init’: UDP Retry Init; ‘conn_prate_excd’: UDP Conn Pkt Rate Exceeded; ‘ntp_monlist_req’: NTP Monlist Request; ‘ntp_monlist_resp’: NTP Monlist Response; ‘wellknown_sport_drop’: UDP SrcPort Wellknown; ‘payload_too_small’: UDP Payload Too Small; ‘payload_too_big’: UDP Payload Too Large; ‘udp_auth_retry_gap_drop’: Auth UDP Retry-Gap Dropped; ‘src_udp_auth’: Src Auth UDP Init; ‘udp_auth_pass’: Auth UDP Passed; ‘udp_auth_drop’: UDP Auth Dropped; ‘bl’: Dst Blacklisted; ‘src_drop’: Src Packets Dropped; ‘frag_rcvd’: Fragmented Packets Received; ‘frag_drop’: Fragmented Packets Dropped; ‘sess_create_inbound’: Inbound Sessions Created; ‘sess_create_outbound’: Outbound Sessions Created; ‘sess_aged’: Sessions Aged Out; ‘udp_retry_pass’: UDP Retry Passed; ‘udp_retry_gap_drop’: UDP Retry-Gap Dropped; ‘filter1_match’: Filter1 Match; ‘filter2_match’: Filter2 Match; ‘filter3_match’: Filter3 Match; ‘filter4_match’: Filter4 Match; ‘filter5_match’: Filter5 Match; ‘filter_none_match’: Filter No Match; ‘src_payload_too_small’: Src UDP Payload Too Small; ‘src_payload_too_big’: Src UDP Payload Too Large; ‘src_ntp_monlist_req’: Src NTP Monlist Request; ‘src_ntp_monlist_resp’: Src NTP Monlist Response; ‘src_well_known_port’: Src UDP SrcPort Wellknown; ‘src_conn_pkt_rate_excd’: Src UDP Conn Pkt Rate Exceeded; ‘src_udp_retry_init’: Src UDP Retry Init; ‘src_filter_action_blacklist’: Src Filter Action Blacklist; ‘src_filter_action_drop’: Src Filter Action Drop; ‘src_filter_action_default_pass’: Src Filter Action Default Pass; ‘src_filter_action_whitelist’: Src Filter Action Whitelist; ‘src_frag_drop’: Src Fragmented Packets Dropped; ‘frag_timeout’: Fragmented Packets Timeout; ‘src_udp_auth_fail’: Src Auth UDP Failed; ‘policy_drop’: Policy Drop; ‘policy_violation’: Policy Violation; ‘src_udp_auth_drop’: Src UDP Auth Dropped; ‘src_udp_retry_gap_drop’: Src UDP Retry-Gap Dropped; ‘src_filter1_match’: Src Filter1 Match; ‘src_filter2_match’: Src Filter2 Match; ‘src_filter3_match’: Src Filter3 Match; ‘src_filter4_match’: Src Filter4 Match; ‘src_filter5_match’: Src Filter5 Match; ‘src_filter_none_match’: Src Filter No Match; ‘src_filter_total_not_match’: Src Filter Not Matched on Pkt; ‘src_filter_auth_fail’: Src Filter Auth Failed; ‘filter_total_not_match’: Filter Not Matched on Pkt; ‘sflow_internal_samples_packed’: Sflow Internal Samples Packed; ‘sflow_external_samples_packed’: Sflow External Samples Packed; ‘sflow_internal_packets_sent’: Sflow Internal Packets Sent; ‘sflow_external_packets_sent’: Sflow External Packets Sent; ‘exceed_action_tunnel’: Exceed Action: Tunnel; ‘src_udp_auth_timeout’: Src UDP Retry Timeout; ‘src_udp_retry_pass’: Src UDP Retry Passed; ‘pattern_recognition_proceeded’: Pattern Recognition: Engine Started; ‘pattern_not_found’: Pattern Recognitoin: Pattern Not Found; ‘pattern_recognition_generic_error’: Pattern Recognition: Exceptions; ‘pattern_filter1_match’: Extracted Filter1 Match; ‘pattern_filter2_match’: Extracted Filter2 Match;
Type: string
Supported Values: all, request_method_ack, request_method_bye, request_method_cancel, request_method_invite, request_method_info, request_method_message, request_method_notify, request_method_options, request_method_prack, request_method_publish, request_method_register, request_method_refer, request_method_subscribe, request_method_update, request_method_unknown, request_unknown_version, keep_alive_msg, rate1_limit_exceed, rate2_limit_exceed, rate3_limit_exceed, src_rate1_limit_exceed, src_rate2_limit_exceed, src_rate3_limit_exceed, response_1xx, response_2xx, response_3xx, response_4xx, response_5xx, response_6xx, response_unknown, response_unknown_version, read_start_line_error, invalid_start_line_error, parse_start_line_error, line_too_long, line_mem_allocated, line_mem_freed, max_uri_len_exceed, too_many_header, invalid_header, header_name_too_long, parse_header_fail_error, max_header_value_len_exceed, max_call_id_len_exceed, header_filter_match, header_filter_not_match, header_filter_none_match, header_filter_action_drop, header_filter_action_blacklist, header_filter_action_whitelist, header_filter_action_default_pass, header_filter_filter1_match, header_filter_filter2_match, header_filter_filter3_match, header_filter_filter4_match, header_filter_filter5_match, max_sdp_len_exceed, body_too_big, get_content_fail_error, concatenate_msg, mem_alloc_fail_error, malform_request, udp_auth, udp_auth_fail, port_rcvd, port_drop, port_pkt_sent, port_pkt_rate_exceed, port_kbit_rate_exceed, port_conn_rate_exceed, port_conn_limm_exceed, port_bytes, outbound_port_bytes, outbound_port_rcvd, outbound_port_pkt_sent, port_bytes_sent, port_bytes_drop, port_src_bl, filter_auth_fail, spoof_detect_fail, sess_create, filter_action_blacklist, filter_action_drop, filter_action_default_pass, filter_action_whitelist, exceed_drop_prate_src, exceed_drop_crate_src, exceed_drop_climit_src, exceed_drop_brate_src, outbound_port_bytes_sent, outbound_port_drop, outbound_port_bytes_drop, udp_auth_retry_fail, exceed_drop_brate_src_pkt, port_kbit_rate_exceed_pkt, udp_retry_init, conn_prate_excd, ntp_monlist_req, ntp_monlist_resp, wellknown_sport_drop, payload_too_small, payload_too_big, udp_auth_retry_gap_drop, src_udp_auth, udp_auth_pass, udp_auth_drop, bl, src_drop, frag_rcvd, frag_drop, sess_create_inbound, sess_create_outbound, sess_aged, udp_retry_pass, udp_retry_gap_drop, filter1_match, filter2_match, filter3_match, filter4_match, filter5_match, filter_none_match, src_payload_too_small, src_payload_too_big, src_ntp_monlist_req, src_ntp_monlist_resp, src_well_known_port, src_conn_pkt_rate_excd, src_udp_retry_init, src_filter_action_blacklist, src_filter_action_drop, src_filter_action_default_pass, src_filter_action_whitelist, src_frag_drop, frag_timeout, src_udp_auth_fail, policy_drop, policy_violation, src_udp_auth_drop, src_udp_retry_gap_drop, src_filter1_match, src_filter2_match, src_filter3_match, src_filter4_match, src_filter5_match, src_filter_none_match, src_filter_total_not_match, src_filter_auth_fail, filter_total_not_match, sflow_internal_samples_packed, sflow_external_samples_packed, sflow_internal_packets_sent, sflow_external_packets_sent, exceed_action_tunnel, src_udp_auth_timeout, src_udp_retry_pass, pattern_recognition_proceeded, pattern_not_found, pattern_recognition_generic_error, pattern_filter1_match, pattern_filter2_match
counters2
Description ‘pattern_filter3_match’: Extracted Filter3 Match; ‘pattern_filter4_match’: Extracted Filter4 Match; ‘pattern_filter5_match’: Extracted Filter5 Match; ‘pattern_filter_drop’: Extracted Filter Drop; ‘pattern_recognition_sampling_started’: Pattern Recognition: Sampling Started; ‘pattern_recognition_pattern_changed’: Pattern Recognition: Pattern Change Detected; ‘dst_hw_drop’: Dst Hardware Packets Dropped;
Type: string
Supported Values: pattern_filter3_match, pattern_filter4_match, pattern_filter5_match, pattern_filter_drop, pattern_recognition_sampling_started, pattern_recognition_pattern_changed, dst_hw_drop
stats data¶
Counter | Size | Description | |
---|---|---|---|
filter_none_match | 8 | Filter No Match | |
concatenate_msg | 8 | Concatenate Msg | |
pattern_filter5_match | 8 | Extracted Filter5 Match | |
invalid_header | 8 | Invalid Header | |
header_filter_filter2_match | 8 | Header Filter Filter2 Match | |
outbound_port_bytes_sent | 8 | Outbound Bytes Forwarded | |
src_udp_retry_gap_drop | 8 | Src UDP Retry-Gap Dropped | |
filter_total_not_match | 8 | Filter Not Matched on Pkt | |
filter4_match | 8 | Filter4 Match | |
response_2xx | 8 | Response 2xx | |
spoof_detect_fail | 8 | UDP Retry Timeout | |
sess_aged | 8 | Sessions Aged Out | |
pattern_filter4_match | 8 | Extracted Filter4 Match | |
pattern_filter1_match | 8 | Extracted Filter1 Match | |
max_header_value_len_exceed | 8 | Maximum Header Value Length Exceed | |
src_payload_too_small | 8 | Src UDP Payload Too Small | |
udp_auth_pass | 8 | Auth UDP Passed | |
read_start_line_error | 8 | Read Start Line Error | |
malform_request | 8 | Malform Request | |
response_3xx | 8 | Response 3xx | |
line_mem_allocated | 8 | Line Memory Allocated | |
udp_auth | 8 | Auth UDP Init | |
request_method_ack | 8 | Request Method ACK | |
src_rate3_limit_exceed | 8 | Src Rate3 Limit Exceed | |
wellknown_sport_drop | 8 | UDP SrcPort Wellknown | |
src_filter_total_not_match | 8 | Src Filter Not Matched on Pkt | |
body_too_big | 8 | Body Too Big | |
src_udp_retry_init | 8 | Src UDP Retry Init | |
response_unknown_version | 8 | Response Unknown Version | |
sflow_internal_samples_packed | 8 | Sflow Internal Samples Packed | |
request_method_subscribe | 8 | Request Method SUBSCRIBE | |
response_6xx | 8 | Response 6xx | |
src_udp_retry_pass | 8 | Src UDP Retry Passed | |
udp_retry_init | 8 | UDP Retry Init | |
outbound_port_bytes | 8 | Outbound Bytes Received | |
src_filter5_match | 8 | Src Filter5 Match | |
header_filter_filter3_match | 8 | Header Filter Filter3 Match | |
dst_hw_drop | 8 | Dst Hardware Packets Dropped | |
port_bytes | 8 | Inbound Bytes Received | |
src_filter_action_blacklist | 8 | Src Filter Action Blacklist | |
too_many_header | 8 | Too Many Header | |
pattern_filter3_match | 8 | Extracted Filter3 Match | |
header_filter_filter5_match | 8 | Header Filter Filter5 Match | |
rate1_limit_exceed | 8 | Dst Rate1 Limit Exceed | |
request_method_refer | 8 | Request Method REFER | |
outbound_port_drop | 8 | Outbound Packets Dropped | |
pattern_recognition_pattern_changed | 8 | Pattern Recognition: Pattern Change Detected | |
sflow_external_packets_sent | 8 | Sflow External Packets Sent | |
filter5_match | 8 | Filter5 Match | |
src_udp_auth_fail | 8 | Src Auth UDP Failed | |
header_filter_action_default_pass | 8 | Header Filter Action Default Pass | |
src_filter4_match | 8 | Src Filter4 Match | |
src_filter_action_default_pass | 8 | Src Filter Action Default Pass | |
line_mem_freed | 8 | Line Memory Freed | |
sflow_internal_packets_sent | 8 | Sflow Internal Packets Sent | |
payload_too_small | 8 | UDP Payload Too Small | |
frag_rcvd | 8 | Fragmented Packets Received | |
outbound_port_bytes_drop | 8 | Outbound Bytes Dropped | |
request_method_prack | 8 | Request Method PRACK | |
exceed_action_tunnel | 8 | Exceed Action: Tunnel | |
response_5xx | 8 | Response 5xx | |
bl | 8 | Dst Blacklisted | |
filter1_match | 8 | Filter1 Match | |
ntp_monlist_resp | 8 | NTP Monlist Response | |
sess_create_inbound | 8 | Inbound Sessions Created | |
header_filter_action_whitelist | 8 | Header Filter Action Whitelist | |
filter_auth_fail | 8 | Filter Auth Failed | |
header_filter_not_match | 8 | Header Filter Not Match | |
exceed_drop_brate_src_pkt | 8 | Src KiBit Rate Exceeded Count | |
frag_timeout | 8 | Fragmented Packets Timeout | |
header_filter_filter1_match | 8 | Header Filter Filter1 Match | |
udp_retry_pass | 8 | UDP Retry Passed | |
port_bytes_sent | 8 | Inbound Bytes Forwarded | |
udp_auth_retry_gap_drop | 8 | Auth UDP Retry-Gap Dropped | |
src_udp_auth_drop | 8 | Src UDP Auth Dropped | |
sflow_external_samples_packed | 8 | Sflow External Samples Packed | |
parse_header_fail_error | 8 | Parse Header Fail Error | |
request_method_info | 8 | Request Method INFO | |
udp_auth_retry_fail | 8 | Auth UDP Retry Failed | |
port_drop | 8 | Inbound Packets Dropped | |
src_frag_drop | 8 | Src Fragmented Packets Dropped | |
parse_start_line_error | 8 | Parse Start Line Error | |
src_filter3_match | 8 | Src Filter3 Match | |
max_uri_len_exceed | 8 | Maximum URI Length Exceed | |
ntp_monlist_req | 8 | NTP Monlist Request | |
request_method_publish | 8 | Request Method PUBLISH | |
payload_too_big | 8 | UDP Payload Too Large | |
request_unknown_version | 8 | Request Unknown Version | |
src_filter1_match | 8 | Src Filter1 Match | |
port_conn_rate_exceed | 8 | Conn Rate Exceeded | |
request_method_bye | 8 | Request Method BYE | |
response_1xx | 8 | Response 1xx | |
src_filter_none_match | 8 | Src Filter No Match | |
src_rate1_limit_exceed | 8 | Src Rate1 Limit Exceed | |
response_unknown | 8 | Response Unknown | |
keep_alive_msg | 8 | Keep Alive Message | |
header_filter_action_drop | 8 | Header Filter Action Drop | |
exceed_drop_brate_src | 8 | Src KiBit Rate Exceeded | |
header_filter_filter4_match | 8 | Header Filter Filter4 Match | |
request_method_register | 8 | Request Method REGISTER | |
port_kbit_rate_exceed | 8 | KiBit Rate Exceeded | |
udp_retry_gap_drop | 8 | UDP Retry-Gap Dropped | |
response_4xx | 8 | Response 4xx | |
policy_violation | 8 | Policy Violation | |
filter_action_whitelist | 8 | Filter Action Whitelist | |
src_conn_pkt_rate_excd | 8 | Src UDP Conn Pkt Rate Exceeded | |
port_src_bl | 8 | Src Blacklisted | |
outbound_port_rcvd | 8 | Outbound Packets Received | |
src_udp_auth | 8 | Src Auth UDP Init | |
outbound_port_pkt_sent | 8 | Outbound Packets Forwarded | |
pattern_filter2_match | 8 | Extracted Filter2 Match | |
sess_create_outbound | 8 | Outbound Sessions Created | |
mem_alloc_fail_error | 8 | Memory Allocation Fail Error | |
request_method_invite | 8 | Request Method INVITE | |
pattern_recognition_proceeded | 8 | Pattern Recognition: Engine Started | |
src_rate2_limit_exceed | 8 | Src Rate2 Limit Exceed | |
request_method_message | 8 | Request Method MESSAGE | |
sess_create | 8 | Session Create | |
src_well_known_port | 8 | Src UDP SrcPort Wellknown | |
filter_action_blacklist | 8 | Filter Action Blacklist | |
port_pkt_sent | 8 | Inbound Packets Forwarded | |
get_content_fail_error | 8 | Get Content Fail Error | |
exceed_drop_prate_src | 8 | Src Pkt Rate Exceeded | |
src_filter_auth_fail | 8 | Src Filter Auth Failed | |
src_filter_action_whitelist | 8 | Src Filter Action Whitelist | |
src_payload_too_big | 8 | Src UDP Payload Too Large | |
filter2_match | 8 | Filter2 Match | |
frag_drop | 8 | Fragmented Packets Dropped | |
pattern_not_found | 8 | Pattern Recognitoin: Pattern Not Found | |
port_conn_limm_exceed | 8 | Conn Limit Exceeded | |
filter3_match | 8 | Filter3 Match | |
src_ntp_monlist_resp | 8 | Src NTP Monlist Response | |
src_filter2_match | 8 | Src Filter2 Match | |
request_method_notify | 8 | Request Method NOTIFY | |
port_bytes_drop | 8 | Inbound Bytes Dropped | |
header_filter_match | 8 | Header Filter Match | |
src_drop | 8 | Src Packets Dropped | |
exceed_drop_climit_src | 8 | Src Conn Limit Exceeded | |
udp_auth_drop | 8 | UDP Auth Dropped | |
max_call_id_len_exceed | 8 | Maximum Call ID Length Exceed | |
header_name_too_long | 8 | Header Name Too Long | |
pattern_recognition_generic_error | 8 | Pattern Recognition: Exceptions | |
src_ntp_monlist_req | 8 | Src NTP Monlist Request | |
header_filter_none_match | 8 | Header Filter None Match | |
request_method_options | 8 | Request Method OPTIONS | |
request_method_update | 8 | Request Method UPDATE | |
pattern_recognition_sampling_started | 8 | Pattern Recognition: Sampling Started | |
max_sdp_len_exceed | 8 | Maximum SDP Length Exceed | |
policy_drop | 8 | Policy Drop | |
filter_action_default_pass | 8 | Filter Action Default Pass | |
rate2_limit_exceed | 8 | Dst Rate2 Limit Exceed | |
filter_action_drop | 8 | Filter Action Drop | |
pattern_filter_drop | 8 | Extracted Filter Drop | |
port_pkt_rate_exceed | 8 | Packet Rate Exceeded | |
invalid_start_line_error | 8 | Invalid Start Line Error | |
rate3_limit_exceed | 8 | Dst Rate3 Limit Exceed | |
request_method_unknown | 8 | Request Method UNKNOWN | |
line_too_long | 8 | Line Too Long | |
port_rcvd | 8 | Inbound Packets Received | |
request_method_cancel | 8 | Request Method CANCEL | |
port_kbit_rate_exceed_pkt | 8 | KiBit Rate Exceeded Count | |
conn_prate_excd | 8 | UDP Conn Pkt Rate Exceeded | |
exceed_drop_crate_src | 8 | Src Conn Rate Exceeded | |
header_filter_action_blacklist | 8 | Header Filter Action Blacklist | |
udp_auth_fail | 8 | Auth UDP Failed | |
src_filter_action_drop | 8 | Src Filter Action Drop | |
src_udp_auth_timeout | 8 | Src UDP Retry Timeout |