Viewing Data Network Performance Monitoring - AudioCodes Mediant 4000 SBC User Manual

Session border controllers
Hide thumbs Also See for Mediant 4000 SBC:
Table of Contents

Advertisement

CHAPTER 49    Viewing Network Status
The following procedure describes how to view the IDS Active Black List table through the Web
interface. You can also view the table through CLI using the command, show voip ids blacklist act-
ive.
To view the active IDS blacklist:
Open the IDS Active Black List page (Monitor menu > Monitor tab > Network Status folder >
IDS Active Black List).
Index
Network Interface
IP Address
Port
Transport Type
Remaining Time
Removal Key

Viewing Data Network Performance Monitoring

You can view network performance monitoring of the device's data-router functionality through the
Web interface. This
To view data network performance monitoring:
Open the Network Performance Monitors page (Monitor menu > Monitor tab > Data Status
folder > Network Performance Monitors).
The figure below displays an example of the Network Performance Monitors page:
Table 49-2: IDS Active Black List Table Description
Field
Table row index.
The device's IP Interface on which the malicious attack
was detected.
The IP address of the attacker (remote host).
The port of the attacker (remote host).
Note: The field is applicable only if the 'Threshold Scope'
(IDSRule_ThresholdScope) parameter of the associated
IDS rule is configured to IP+Port.
The transport type used for the attack.
The duration left until the device deletes the attacker
(remote host) from the table and takes it off the IDS
blacklist. The blacklisted period is configured by the 'Deny
Period' (IDSRule_DenyPeriod) parameter.
A unique number (key) that the device assigns to the
blacklisted entry. This is used if you want to remove a
specific blacklisted entry from the table, which is done
through the CLI command, clear voip ids blacklist
<Removal Key>.
Description
- 755 -
Mediant 4000 SBC | User's Manual

Advertisement

Table of Contents
loading

Table of Contents