NSX-T Data Center REST API
PolicyIdsEventFlowData (type)
{
"additionalProperties": false,
"description": "IDS event flow data specific to each IDS event. The data includes source ip, source port, destination ip, destination port, protocol, rule id, profile id, and the action.",
"id": "PolicyIdsEventFlowData",
"module_id": "PolicyIDSMetrics",
"properties": {
"action_type": {
"description": "The action pertaining to the detected intrusion. Possible values are ALERT, DROP, REJECT, and INVALID. ALERT - If there is a signature match on the packet, it is allowed to pass but a notification is sent to the user notifying an intrusion was detected. DROP - On a signature match, the packet is silently dropped. An alert is sent to the user that an intrusion was detected. REJECT - On a signature match, the packet is dropped and TCP RST or ICMP error messages (for non-TCP pkts) are sent to the endpoints. An alert is sent to the user that an intrusion was detected. INVALID - If the action doesn't belong to any of the above mentioned categories, it is marked as INVALID.",
"enum": [
"ALERT",
"DROP",
"REJECT",
"INVALID"
],
"readonly": true,
"required": false,
"title": "IDS Event action",
"type": "string"
},
"bytes_toclient": {
"description": "Bytes sent to client.",
"readonly": true,
"required": false,
"title": "Bytes to client",
"type": "integer"
},
"bytes_toserver": {
"description": "Bytes sent to server.",
"readonly": true,
"required": false,
"title": "Bytes to server",
"type": "integer"
},
"client_ip": {
"description": "IP address of the VM that initiated the communication.",
"readonly": true,
"required": false,
"title": "IP address of the client VM",
"type": "string"
},
"destination_ip": {
"description": "IP address of the destination VM on the intrusion flow.",
"readonly": true,
"required": false,
"title": "IP address of the destination VM",
"type": "string"
},
"destination_port": {
"description": "Port on the destination VM where the traffic was sent to.",
"readonly": true,
"required": false,
"title": "Destination port",
"type": "integer"
},
"gateway": {
"description": "Name of the gateway on which this intrusion was detected.",
"readonly": true,
"required": false,
"title": "Gateway where the intrusion was detected at",
"type": "string"
},
"gateway_tags": {
"description": "Tags associated with the gateway on which this intrusion was detected.",
"items": {
"$ref": "Tag
},
"readonly": true,
"required": false,
"title": "Tags associated with the gateway",
"type": "array"
},
"host": {
"description": "Name of the host on which this intrusion was detected.",
"readonly": true,
"required": false,
"title": "Host where intrusion was seen",
"type": "string"
},
"local_vm_ip": {
"description": "IP address of VM on the host where IDS engine is running.",
"readonly": true,
"required": false,
"title": "IP address of the local VM",
"type": "string"
},
"profile_id": {
"description": "The IDS profile id that is associated with the IDS rule pertaining to the intrusion event detected.",
"readonly": true,
"required": false,
"title": "IDS profile id",
"type": "string"
},
"protocol": {
"description": "Traffic protocol pertaining to the detected intrusion, could be TCP/UDP etc.",
"readonly": true,
"required": false,
"title": "Traffic protocol pertaining to the intrusion",
"type": "string"
},
"rule_id": {
"description": "The IDS Rule id pertaining to the detected intrusion.",
"readonly": true,
"required": false,
"title": "IDS Rule id of detected intrusion",
"type": "integer"
},
"source_ip": {
"description": "IP address of the source VM on the intrusion flow.",
"readonly": true,
"required": false,
"title": "IP address of the source VM",
"type": "string"
},
"source_port": {
"description": "Source port through which traffic was initiated that caused the intrusion to be detected.",
"readonly": true,
"required": false,
"title": "Source port",
"type": "integer"
},
"traffic_type": {
"description": "The source where the intrusion was detected. Possible values are GATEWAY and HOST.",
"enum": [
"GATEWAY",
"HOST"
],
"readonly": true,
"required": false,
"title": "IDS event detection source",
"type": "string"
}
},
"title": "IDS event flow data",
"type": "object"
}