Primary Communication Protocol
Indicates the primary communication protocol.
Secondary Communication Protocol
Indicates the secondary communication protocol.
Encryption Protocol
Indicates the protocol used to encrypt the communication.
Communication Direction
Indicates the direction of communication.
Value Content
Communication Start Request
Receiver (In)
The machine received a request to start communication.
Communication Start Request
Sender (Out)
The machine sent a request to start communication.
Communication Start Log ID
Indicates the log ID for the communication start time.
This is a hexadecimal ID that indicates the time at which the communication started.
Communication Start/End
Indicates the times at which the communication started and ended.
Network Attack Status
Indicates the machine's status when network attacks occur.
Value Content
Violation Detected An attack on the network was detected.
Recovered from Violation The network recovered from an attack.
Max. Host Capacity Reached The machine became inoperable due to the volume of
incoming data reaching the maximum host capacity.
Recovered from Max. Host
Capacity
The machine became operable again following reduction of
the volume of incoming data.
Network Attack Type
Identifies network attack types.
7. Managing the Machine
224