EasyManua.ls Logo

AudioCodes E-SBC

AudioCodes E-SBC
1414 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
CHAPTER56 Viewing Network Status
Mediant 1000 Gateway & E-SBC | User's Manual
Table 56-2: IDS Active Black List Table Description
Field Description
Index Table row index.
Network Interface The device's IP Interface on which the malicious attack
was detected.
IP Address The IP address of the attacker (remote host).
Port The port of the attacker (remote host).
Note: The field is applicable only if the 'Threshold Scope'
(IDSRule_ThresholdScope) parameter of the associated
IDS rule is configured to IP+Port.
Transport Type The transport type used for the attack.
Remaining Time The duration left until the device deletes the attacker
(remote host) from the table and takes it off the IDS
blacklist. The blacklisted period is configured by the 'Deny
Period' (IDSRule_DenyPeriod) parameter.
Removal Key A unique number (key) that the device assigns to the
blacklisted entry. This is used if you want to remove a
specific blacklisted entry from the table, which is done
through the CLI command, clear voip ids blacklist
<Removal Key>.
Viewing Data Network Performance Monitoring
You can view network performance monitoring of the device's data-router functionality through the
Web interface. This
To view data network performance monitoring:
Open the Network Performance Monitors page (Monitor menu > Monitor tab > Data Status
folder > Network Performance Monitors).
The figure below displays an example of the Network Performance Monitors page:
- 965 -

Table of Contents

Related product manuals