CHAPTER56 Viewing Network Status
Mediant 1000 Gateway & E-SBC | User's Manual
Table 56-2: IDS Active Black List Table Description
Field Description
Index Table row index.
Network Interface The device's IP Interface on which the malicious attack
was detected.
IP Address The IP address of the attacker (remote host).
Port The port of the attacker (remote host).
Note: The field is applicable only if the 'Threshold Scope'
(IDSRule_ThresholdScope) parameter of the associated
IDS rule is configured to IP+Port.
Transport Type The transport type used for the attack.
Remaining Time The duration left until the device deletes the attacker
(remote host) from the table and takes it off the IDS
blacklist. The blacklisted period is configured by the 'Deny
Period' (IDSRule_DenyPeriod) parameter.
Removal Key A unique number (key) that the device assigns to the
blacklisted entry. This is used if you want to remove a
specific blacklisted entry from the table, which is done
through the CLI command, clear voip ids blacklist
<Removal Key>.
Viewing Data Network Performance Monitoring
You can view network performance monitoring of the device's data-router functionality through the
Web interface. This
➢ To view data network performance monitoring:
■ Open the Network Performance Monitors page (Monitor menu > Monitor tab > Data Status
folder > Network Performance Monitors).
The figure below displays an example of the Network Performance Monitors page:
- 965 -