rogueMediaOffendersList
and mediaOffenderListstatistics
, a new entry is created when the destination IP address or destination UDP port is different than the existing entries. Some offenders lists include the column “Source Unique.” If the “Source Unique” field is “notUnique”, the packets from multiple source IP addresses or source UDP ports were discarded. If the source unique field is “unique,” the packets from a single source IP address/UDP port were discarded.For all other “offenders list” categories, a new entry is created when the source IP address is different than the existing entries.
Use this window to reset the contents of a selected IP policing offender list table.
On the SBC main screen, go to All > System > IP Policing. The Commands window is displayed.
IP Policing Commands
Select Reset Offenders List from the Commands drop-down list and click Select. A pop-up window appears where you can select the Offenders List you want to reset.
resetOffendersList window
Select a list name and click resetOffendersList. The system returns a message confirming that the reset was successful.
Click OK to exit.
The following list names are displayed:
IP Policing Offenders Lists
List Name | Description |
---|---|
Bad Ether IP Hdr Offenders List | The table of statistics for the bad Ethernet/IP Header policer offenders list. For example:
|
ARP Offenders List | The table of statistics for the ARP policer offenders list. |
U Flow Offenders List | The table of statistics for for the micro flow policer offenders list. For example:
|
ACL Offenders List | The table of statistics for access control (ACL) list policer offenders list. |
Aggregate Offenders List | The table of statistics for the aggregate policer offenders list. |
IP Sec Decrypt Offenders List | The table of statistics for the IPSec cecrypt policer offenders list. For example:
|
Rogue Media Offenders List | The table of statistics for the rogue media policer offenders list. For example:
|
Media Offenders List | The table of statistics for the media policer offenders list. For example:
|
Discard Rule Offenders List | The table of statistics for the discard rule offenders list. For example:
|
Srtp Decrypt Offenders List | The table of statistics for the SRTP decrypt offenders list. For example:
|
Additional topics:
System - IP Policing - ACL Offenders List
System - IP Policing - ACL Offenders List Int Stats
System - IP Policing - Aggregate Offenders Int Stats
System - IP Policing - Aggregate Offenders List
System - IP Policing - ARP Offenders List
System - IP Policing - ARP Offenders List Int Stats
System - IP Policing - Bad Ether IP Hdr Offenders Int Stats
System - IP Policing - Bad Ether IP Hdr Offenders List
System - IP Policing - Discard Rule Offenders Int Stats
System - IP Policing - Discard Rule Offenders List
System - IP Policing - IP Sec Decrypt Offenders Int Stats
System - IP Policing - IP Sec Decrypt Offenders List
System - IP Policing - Media Offenders Int Stats
System - IP Policing - Media Offenders List
System - IP Policing - Rogue Media Int Stats
System - IP Policing - Rogue Media Offenders List
System - IP Policing - Srtp Decrypt Offenders Int Stats
System - IP Policing - Srtp Decrypt Offenders List
System - IP Policing - System Cur Stats
System - IP Policing - System Int Stats
System - IP Policing - U Flow Offenders List
System - IP Policing - U Flow Offenders List Int Stats
System - IP Policing - U Flow Stats