2.51. THRESHOLD

These log messages refer to the THRESHOLD category.

2.51.1. [ID: 1115] Threshold notice

Log Categories
THRESHOLD,FLOW
Log Message
Threshold notice.
Default Log Severity
Dynamic
Parameters
thresholdset, matchkey, rule
Explanation
A flow setup attempt triggered the given thresholdset in threshold rule rule: The flow setup was allowed to continue.
Gateway Action
Allow
Action Description
None
Proposed Action
None

2.51.2. [ID: 1085] Threshold blacklist

Log Categories
THRESHOLD,FLOW,BLACKLIST
Log Message
Threshold blacklist.
Default Log Severity
Dynamic
Parameters
thresholdset, matchkey, rule
Explanation
A flow setup attempt triggered the given thresholdset in threshold rule rule: The attempt has been blocked and the source is now blacklisted.
Gateway Action
Drop
Action Description
None
Proposed Action
Contact the owner of the blacklisted source.

2.51.3. [ID: 1128] Threshold block flow

Log Categories
THRESHOLD,FLOW
Log Message
Threshold block flow.
Default Log Severity
Dynamic
Parameters
thresholdset, matchkey, rule
Explanation
A flow setup attempt triggered the given thresholdset in threshold rule rule: This particular attempt was blocked.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.51.4. [ID: 1147] Threshold reject flow

Log Categories
THRESHOLD,FLOW
Log Message
Threshold reject flow.
Default Log Severity
Dynamic
Parameters
thresholdset, matchkey, rule
Explanation
A flow setup attempt triggered the given thresholdset in threshold rule rule: This particular attempt was rejected.
Gateway Action
Reject
Action Description
Reject is a polite way of denying access to a protected service, by sending an error message back to the source
Proposed Action
Carefully consider the security implications created by using the reject action.

2.51.5. [ID: 1123] Threshold tag flow

Log Categories
THRESHOLD,FLOW
Log Message
Threshold tag flow.
Default Log Severity
Dynamic
Parameters
thresholdset, matchkey, rule
Explanation
A flow setup attempt triggered the given thresholdset in threshold rule rule: The flow setup was allowed to continue, but the flow has been tagged for later analysis. The tag will not affect the functionality of the forwarded traffic in any way, but some functionality can apply the tag as a filter (notably CLI commands and log messages).
Gateway Action
Allow
Action Description
None
Proposed Action
Review the tagged flows.

2.51.6. [ID: 1126] Threshold definition is no longer exceeded

Log Categories
THRESHOLD
Log Message
Threshold definition is no longer exceeded.
Default Log Severity
Information
Parameters
definition, group, threshold, interval, value, time, lifetime
Explanation
The specific threshold group group no longer exceeds the corresponding threshold definition (with the configured threshold over the configured interval seconds): The group measurement is currently value over a period of time seconds. Before this event happened, the group did exceed the threshold for lifetime seconds.
Gateway Action
None
Action Description
None
Proposed Action
None

2.51.7. [ID: 1107] Threshold definition is exceeded

Log Categories
THRESHOLD
Log Message
Threshold definition is exceeded.
Default Log Severity
Dynamic
Parameters
definition, group, threshold, interval, value, time, lifetime
Explanation
The specific threshold group group now exceeds the corresponding threshold definition (with the configured threshold over the configured interval seconds): The group measurement is currently value over a period of time seconds. Before this event happened, the group did spend lifetime seconds without being exceeded.
Gateway Action
None
Action Description
None
Proposed Action
None

2.51.8. [ID: 1130] Random group replacement

Log Categories
THRESHOLD
Log Message
Random group replacement.
Default Log Severity
Warning
Parameters
group
Explanation
There was a shortage of free threshold group instances and therefore, one randomly selected active threshold group instance was removed. This only happens when there are excessive flow open requests coming from many different sources (assuming the grouping is per source). Threshold rules that contain rate-based thresholds with a long configured interval are prone to this during distributed denial-of-service attacks since old group instances cannot be sensibly discarded until activity has ceased for a whole configured interval. The impact of losing an active group instance is that the system will forget information that could have been used to identify traffic that should have trigged a threshold action. This can potentially be used as an attempt to mask another more "stealthy" attack.
Gateway Action
None
Action Description
None
Proposed Action
Review the threshold rules; length of intervals, grouping parameters and actions. Consider to use grouping by network segments rather than individual IP addresses, as this will decrease the maximum possible number of groups that an attack can cause to be setup. As a last resort, the setting TrafficMgmtSettings:MaxThresholdMemUsage can be adjusted to support more simultaneous threshold groups.