<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://allegro-packets.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Hartmut</id>
	<title>Allegro Network Multimeter Manual - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://allegro-packets.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Hartmut"/>
	<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/Special:Contributions/Hartmut"/>
	<updated>2026-04-23T19:09:48Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.13</generator>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Snort&amp;diff=5146</id>
		<title>Snort</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Snort&amp;diff=5146"/>
		<updated>2025-07-08T09:54:56Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Simple editor */ Typo fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Warning|title=In Development|This page documents as of yet unreleased features}}&lt;br /&gt;
&lt;br /&gt;
{{Warning|title=Beta Feature|This feature is still in active development and is therefore subject to changes in the future. There may be bugs or unexpected behavior when using this feature.}}Version 4.3.0 of the Allegro Network Multimeter introduced Snort as a new capture method for network traffic. Similar to the Webshark analysis this capture mode does not produce raw packets, but instead sends them to another tool for further processing. With Snort the user is able to conveniently analyze the traffic in their network for potential attacks or intrusions, both live and retroactively.&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
For Snort to function properly it needs to be configured. The multimeter comes pre-equipped with the community ruleset to provide a basic set of rules to cover the most well-known and common attacks in a network. Note that currently no updates are provided for this ruleset by Allegro Packets, instead the user is expected to keep their ruleset up do date themselves.&lt;br /&gt;
&lt;br /&gt;
All configurations of the Snort analysis are done via the Global Settings, under Generic Settings &amp;gt; Snort analysis.&lt;br /&gt;
[[File:Snort Settings.png|thumb|Snort section of the generic settings page]]&lt;br /&gt;
&lt;br /&gt;
=== Configuring memory ===&lt;br /&gt;
Snort needs a certain amount of memory to be able to perform the intrusion detection and threat analysis. The more memory Snort is configured to use, the less memory will be available for the in-memory databases of the multimeter. Snort may only use half of the systems memory at max, but generally the software is able to run with less than one gigabyte of memory. The default setting allocates 256MB for the Snort analysis, and generally we do not recommend going too far below this value, as too little memory can cause Snort to hang and crash during analysis. If you experience similar issue, try raising the memory threshold.&lt;br /&gt;
&lt;br /&gt;
Below the slider for maximum memory, a value for &amp;quot;Usable memory&amp;quot; is displayed. This value is a soft memory limit for Snort, which will cause it to be throttled when it reaches it. The usable memory is 5MB below the maximum. If Snort should reach the true maximum memory threshold it will immediately be killed by the OOM manager.&lt;br /&gt;
&lt;br /&gt;
Changing this setting requires a processing restart in order to allocate the configured memory.&lt;br /&gt;
&lt;br /&gt;
=== Configuring Snort ===&lt;br /&gt;
==== Config====&lt;br /&gt;
Snort can be configured via Lua scripts which are executed in a sandboxed environment at startup. The multimeter is delivered with the default configuration files of Snort, with the exception that some of the variables have been moved to a new &amp;lt;code&amp;gt;config.lua&amp;lt;/code&amp;gt; file. This file is included before everything else.&lt;br /&gt;
&lt;br /&gt;
To learn more about how Snort configuration works, refer to [https://docs.snort.org/start/configuration their documentation].&lt;br /&gt;
&lt;br /&gt;
In order to edit this configuration the multimeter provides a web-based interface to either change the &amp;lt;code&amp;gt;config.lua&amp;lt;/code&amp;gt; via a GUI, or to edit any configuration file directly. To start editing the configuration click the &amp;quot;Edit config&amp;quot; button. This opens a new modal providing the two editing modes, which can be switched via the buttons at the top center of the window.&lt;br /&gt;
&lt;br /&gt;
=====Simple editor=====&lt;br /&gt;
This is the first editing mode, and is the one selected by default when opening the config modal. It provides a GUI which allows the user to edit the variables stored in the &amp;lt;code&amp;gt;config.lua&amp;lt;/code&amp;gt;. Note that this implies that &amp;lt;code&amp;gt;config.lua&amp;lt;/code&amp;gt; is a managed file, which means that directly editing this file is discouraged. As the warning in this file states, editing the values of variables will work fine, however adding new content to the file will cause it to be overridden once the simple editor is used for the next time.&lt;br /&gt;
[[File:Snort config simple settings.png|thumb|The Snort config&#039;s simple editor]]&lt;br /&gt;
The simple editor provides only a few values that can be edited. Users are encouraged to adjust these values according to their network setup. Setting the home and external network is the only strictly necessary configuration, as the other values are derived from them. The default values for these networks is &amp;quot;any&amp;quot;. Refer to the Snort documentation (see above) to find out which values are allowed. Values with a dollar sign ($) in front of them are variables, e.g. setting your DNS servers to &amp;lt;code&amp;gt;$HOME_NET&amp;lt;/code&amp;gt; will set the value of the DNS servers field to the value of the Home network field. This is the default.&lt;br /&gt;
&lt;br /&gt;
Modifications to these values are not committed until the &amp;quot;Apply&amp;quot; button is pressed.&lt;br /&gt;
&lt;br /&gt;
=====Lua editor=====&lt;br /&gt;
This is the &amp;quot;advanced&amp;quot; configuration mode for Snort, and is toggled by clicking the appropriate button at the center top of the modal.[[File:Snort configuration lua mode.png|thumb|The Snort config&#039;s lua editor]]&lt;br /&gt;
This view provides a text editor interface which allows for editing any of the Snort configuration files. The left hand side provides a file browser displaying all files in Snort&#039;s configuration folder. This does not necessarily mean that all of these files are used in the configuration. Only files included by an active configuration file are used. The analysis invokes Snort with &amp;lt;code&amp;gt;snort.lua&amp;lt;/code&amp;gt; as the config file, so any other config files need to be included either by &amp;lt;code&amp;gt;snort.lua&amp;lt;/code&amp;gt;, or one of its included files.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;While the &amp;lt;code&amp;gt;config.lua&amp;lt;/code&amp;gt; is displayed in this list, it is discouraged to edit it directly.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It is possible to create new files via the button at the bottom of the file list. Hovering over a file reveals four buttons:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;Rename file&#039;&#039;&lt;br /&gt;
* &#039;&#039;Delete file&#039;&#039;&lt;br /&gt;
* &#039;&#039;Download file&#039;&#039;&lt;br /&gt;
* &#039;&#039;Restore file&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Changes to files (including deleting a file) are not committed until the &amp;quot;Apply&amp;quot; button is pressed. Restoring a file discards uncommitted changes. In the case of default config files (i.e. files that are shipped by default with the multimeter firmware) can also be deleted and recovered later. After deletion they will appear greyed out in the file list.&lt;br /&gt;
&lt;br /&gt;
New files can be created by clicking the green &amp;quot;New file&amp;quot; button at the bottom of the file list on the left hand side of the modal. Below this button there are two more buttons that allow for file uploads and downloads. Downloading the config will zip all config files and download the archive.&lt;br /&gt;
&lt;br /&gt;
==== Rules ====&lt;br /&gt;
[[File:Snort config rule editor.png|thumb|The Snort rule editor]]&lt;br /&gt;
Snort needs a set of rules in order to know what malicious network traffic looks like. The [https://docs.snort.org/rules/ Snort documentation] goes into exhaustive detail about how rules are written, and we recommend users who are interested in writing their own rules read it carefully. The multimeter comes pre-equipped with an older version of the community ruleset, which is a file containing a huge list of rules which is not up-to-date, but still provides a good starter set to detect the most common suspicious network activity. Updates to this ruleset are not provided, so users who want to use the most recent set of rules need to keep this ruleset updated themselves.&lt;br /&gt;
&lt;br /&gt;
To start editing the ruleset click the &amp;quot;Edit rules&amp;quot; button. This will bring up a modal displaying a file editor which is functionally identical to the [https://allegro-packets.com/wiki/Snort#Lua_editor Lua editor] . From here it is possible to create new ruleset files as well as editing or deleting existing ones.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tip: Users who want to stay up-to-date and get access to rulesets containing the most recent exploits and attack vectors may want to consider subscribing to [https://www.snort.org/products#rule_subscriptions Snort&#039;s official ruleset].&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
All files in this view are loaded by Snort, so no additional action needs to be taken to add a new file to the ruleset.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:SSL_module.png&amp;diff=5090</id>
		<title>File:SSL module.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:SSL_module.png&amp;diff=5090"/>
		<updated>2025-05-16T10:27:12Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut uploaded a new version of File:SSL module.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSL module&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=5001</id>
		<title>RADIUS module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=5001"/>
		<updated>2025-03-03T16:53:54Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Connections */ Link to live filtering of tables page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RADIUS module shows information about RADIUS (Remote Authentication Dial-In User Service) traffic, which is used for authentication and accounting of users for dial-up connections like DSL, WLAN or VPN. Each RADIUS packet contains one message, which may carry optional attributes. RADIUS messages can be grouped into classes, the standard [https://datatracker.ietf.org/doc/html/rfc2865 RFC 2865] defined &#039;&#039;Access&#039;&#039; and &#039;&#039;Accounting&#039;&#039;, but many other message types were implemented by various vendors.&lt;br /&gt;
&lt;br /&gt;
=== Access messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Access Request&#039;&#039;&#039;: Clients send such messages to the server with information used to determine if the user should be granted access. Attached information attributes may be the &#039;&#039;Called Station ID&#039;&#039;, the &#039;&#039;Calling Station ID&#039;&#039; or the &#039;&#039;Network Access Server (NAS) Specifier&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Access Accept&#039;&#039;&#039;: Servers may respond with such messages to provide configuration information to the client for using the requested services.&lt;br /&gt;
* &#039;&#039;&#039;Access Reject&#039;&#039;&#039;: Servers may respond with such messages if the received request did not contain valid information to grant access to its services.&lt;br /&gt;
* &#039;&#039;&#039;Access Challenge&#039;&#039;&#039;: Servers may respond with such messages send the client a challenge, requiring a response.&lt;br /&gt;
&lt;br /&gt;
=== Accounting messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Accounting Request&#039;&#039;&#039;: Clients send such messages to the server with information to identify the user, who uses a service.&lt;br /&gt;
* &#039;&#039;&#039;Accounting Response&#039;&#039;&#039;: Servers respond with such messages to acknowledge that the request of the client has been received and recorded successfully.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[File: RADIUS_overview.png|thumb|RADIUS overview]]&lt;br /&gt;
Information about all RADIUS packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of RADIUS on the overall traffic. A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;Packet response times&#039;&#039; section shows the delay between client requests and their server responses as minimum, average and maximum duration values, as well as in a graph.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;RADIUS messages&#039;&#039; section shows counters and graphs for the different message types grouped by their message type classes. Transport quality issues are indicated in the &#039;&#039;Messages with not in order sequence number&#039;&#039; subsection. Counters show for clients and servers the number of &#039;&#039;Expected messages&#039;&#039;. Transport problems due to &#039;&#039;Repeated messages&#039;&#039;, &#039;&#039;Reordered messages&#039;&#039; or even &#039;&#039;Lost messages&#039;&#039; are shown for both directions as counters and graphs.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
[[File: RADIUS_connections.png|thumb|RADIUS connections common columns]]&lt;br /&gt;
All RADIUS connections with their client and server IPs and ports and optional details like host names are shown. Various toggles allow to show only relevant information about the connections:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Name&#039;&#039;&#039;: The reported &#039;&#039;Called Station ID&#039;&#039;, &#039;&#039;Calling Station ID&#039;&#039; and &#039;&#039;NAS Specifier&#039;&#039; of the client requests are shown.&lt;br /&gt;
* &#039;&#039;&#039;Timing&#039;&#039;&#039;: The &#039;&#039;Start time&#039;&#039;, &#039;&#039;Last activity&#039;&#039; and &#039;&#039;Duration&#039;&#039; of the connection will be visible.&lt;br /&gt;
* &#039;&#039;&#039;Counters&#039;&#039;&#039;: RADIUS packets and bytes are shown as total counters as well as rates in packets or bits per second.&lt;br /&gt;
* &#039;&#039;&#039;Message types&#039;&#039;&#039;: Counters for the total RADIUS message count and the different message type classes &#039;&#039;RADIUS Access messages&#039;&#039;, &#039;&#039;RADIUS Accounting messages&#039;&#039; and &#039;&#039;RADIUS Other messages&#039;&#039; are shown for servers and clients.&lt;br /&gt;
** &#039;&#039;&#039;Access Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Access Accept messages&#039;&#039;, &#039;&#039;RADIUS Access Challenge messages&#039;&#039;, &#039;&#039;RADIUS Access Reject messages&#039;&#039; and &#039;&#039;RADIUS Access Response messages&#039;&#039; are shown.&lt;br /&gt;
** &#039;&#039;&#039;Accounting Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Accounting Request messages&#039;&#039; and &#039;&#039;RADIUS Accounting Response messages&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Lost/repeated Packets&#039;&#039;&#039;: Packet counters with the result of the message sequence counter (RADIUS identifier) analysis can be shown. &#039;&#039;Expected Messages&#039;&#039; are the amount of RADIUS messages the peer should have sent according to the sequence numbers used. &#039;&#039;Repeated Messages&#039;&#039; count repeatedly seen packets from a peer with the same sequence number, while &#039;&#039;Reordered Messages&#039;&#039; indicate conditions, where older messages are seen after newer ones. &#039;&#039;Lost Messages&#039;&#039; count gaps in the seen sequence numbers, indicating that expected packets got lost.&lt;br /&gt;
* &#039;&#039;&#039;Response times&#039;&#039;&#039;: The duration statistics between the seen client request packet and its corresponding (according to the RADIUS identifier) server response packet are shown for minimum, average and maximum value.&lt;br /&gt;
* &#039;&#039;&#039;VLAN&#039;&#039;&#039;: The used IDs of &#039;&#039;Outer VLANs&#039;&#039; and &#039;&#039;Inner VLANs&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Graph&#039;&#039;&#039;: Up to five graphs can be selected from the following available graphs to be shown simultaneously:&lt;br /&gt;
** RADIUS traffic (bit/s)&lt;br /&gt;
** RADIUS traffic (packets/s)&lt;br /&gt;
** Packet response times&lt;br /&gt;
** RADIUS messages (messages/s)&lt;br /&gt;
** RADIUS Access messages (messages/s)&lt;br /&gt;
** RADIUS Accounting messages (messages/s)&lt;br /&gt;
** Client message flow (messages/s)&lt;br /&gt;
** Server message flow (messages/s)&lt;br /&gt;
* &#039;&#039;&#039;PCAP&#039;&#039;&#039;: The PCAP download button is shown for each RADIUS connection.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown connections to the specific needs. See [[Live filtering of tables]] for a detailed description about how to use this.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=TDS_module&amp;diff=5000</id>
		<title>TDS module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=TDS_module&amp;diff=5000"/>
		<updated>2025-03-03T16:52:26Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Connections */ Link to live filtering of tables page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The TDS module shows information about TDS (Tabular Data Stream) traffic, used for database connections with Microsoft SQL Servers. Detected connections between clients and SQL servers are shown.&lt;br /&gt;
&lt;br /&gt;
== Overview==&lt;br /&gt;
[[File: TDS_overview.png|thumb|TDS overview]]&lt;br /&gt;
Information about all TDS packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of TDS on the overall traffic. A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
In the section of overall TDS messages, recognized SQL Batch queries, as well as Remote Procedure Call queries and their server response messages are shown as counters and in a graph. The delay statistics between client queries and server response messages are shown as minimum, average and maximum Request-Response time values, as well as in a graph.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connections==&lt;br /&gt;
[[File: TDS_connections.png|thumb|TDS connections common columns]]&lt;br /&gt;
All TDS connections with their client and server IPs and ports are shown together with the recognized TDS version. If the &#039;&#039;Timing&#039;&#039; toggle is activated, the start and end time, as well as the duration of the connection will be visible. The &#039;&#039;Counters&#039;&#039; toggle switches visibility of common traffic counters for total packets and bytes, traffic rate counters for packets per second and bit per second, as well as the recognized valid SQL query and response messages. The connection quality can be evaluated in two columns: the &#039;&#039;Response times&#039;&#039; toggle enables the view of TCP handshake time separated for client and server, maximum and average response times, as well as SQL query response times (time between a SQL Batch query or Remote Procedure Call request sent by the client, until the server responds). Retransmissions (in byte and as a percentage of the total traffic), missed bytes and duplicated ACK-packets are shown when the &#039;&#039;TCP Retransmissions&#039;&#039; toggle is enabled.&lt;br /&gt;
&lt;br /&gt;
The following graphs are available for individual selection:&lt;br /&gt;
&lt;br /&gt;
* TDS traffic bitrate&lt;br /&gt;
* TDS traffic packet rate&lt;br /&gt;
* TDS SQL query response times (for both SQL Batch Queries and Remote Procedure Calls)&lt;br /&gt;
* TDS SQL query and response messages&lt;br /&gt;
&lt;br /&gt;
The TDS traffic of each connection can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown connections to the specific needs. See [[Live filtering of tables]] for a detailed description about how to use this.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4999</id>
		<title>IEC61850 module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4999"/>
		<updated>2025-03-03T16:49:33Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Link to live filtering of tables page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IEC 61850 module shows information about communication protocols for intelligent electronic devices at electrical substations. These currently supported protocols are:&lt;br /&gt;
&lt;br /&gt;
* GOOSE (&#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent)&lt;br /&gt;
* Sampled Values&lt;br /&gt;
&lt;br /&gt;
The recognized data is transferred as payload of OSI-Layer 2 packets (optionally with VLAN tags). For GOOSE (in &#039;&#039;&#039;P&#039;&#039;&#039;rotocol &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - PDU) and Sampled Values (in &#039;&#039;&#039;A&#039;&#039;&#039;pplication &#039;&#039;&#039;S&#039;&#039;&#039;ervice &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - ASDU) data units, sequence counters are used to allow reordering the received packets and detecting lost packets.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:IEC61850 dashboard.png|thumb|IEC&amp;amp;nbsp;61850 overview]]&lt;br /&gt;
Information about all recognized IEC&amp;amp;nbsp;61850 packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of each IEC&amp;amp;nbsp;61850 protocol on the overall traffic.&lt;br /&gt;
&lt;br /&gt;
For each of the protocols, measures of packets and data (accumulated and as per second rate), provide an impression of the used network capacity. Problems in the packet sequence are available as counters for expected packets (according to seen sequence numbers), lost packets (expected sequence number missing), repeated packets (sequence number seen multiple times). A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
&lt;br /&gt;
[[File:IEC61850 devices.png|thumb|IEC&amp;amp;nbsp;61850 devices]]&lt;br /&gt;
All devices sending or receiving IEC&amp;amp;nbsp;61850 traffic are shown with their MAC address and the detected protocol. Besides packet counts and data rates of the protocol, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
&lt;br /&gt;
* general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific device and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown devices to the specific needs. See [[Live filtering of tables]] for a detailed description about how to use this.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
&lt;br /&gt;
[[File:IEC61850 connections.png|thumb|IEC&amp;amp;nbsp;61850 connections]]&lt;br /&gt;
All connections containing IEC&amp;amp;nbsp;61850 traffic are shown with their two communication partners&#039; MAC address and the detected protocol. Besides packet counts, data rates and time of last detected activity, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
*general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific connection and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown connections to the specific needs. See [[Live filtering of tables]] for a detailed description about how to use this.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Live_filtering_of_tables&amp;diff=4998</id>
		<title>Live filtering of tables</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Live_filtering_of_tables&amp;diff=4998"/>
		<updated>2025-03-03T16:39:44Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Available keywords */ add IEC 61850, TDS and RADIUS complex filter tokens&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== General ==&lt;br /&gt;
Multiple measuring statistics show all entries in tables with different columns for all measured values, which can be sorted individually. &lt;br /&gt;
&lt;br /&gt;
Since often there are a lot of entries, the Allegro Network Multimeter allows for filtering those tables to quickly find the relevant information.&lt;br /&gt;
&lt;br /&gt;
All search text areas show a hint about for what kind of information the table can be filtered. Once entered, the table is updated immediately while still updating the measured values for the visible entries. &lt;br /&gt;
&lt;br /&gt;
This live filtering allows for viewing live data only for the entries that are currently important for the investigation of a network problem.&lt;br /&gt;
&lt;br /&gt;
== Single word matching == &lt;br /&gt;
It is always possible the enter a single word for filtering. &lt;br /&gt;
&lt;br /&gt;
In this case the Allegro Network Multimeter will match any possible field for the given text.&lt;br /&gt;
&lt;br /&gt;
For instance, in the IP statistics, the IP will be matched if a number representation is entered, with an optional subnet mask length (1.2.3.4/8). &lt;br /&gt;
&lt;br /&gt;
The known alternative names are also matched, so it is possible to enter a host name and the list will show only those entries which contain the string in the DHCP name, DNS name, HTTP name, or any other name field.&lt;br /&gt;
&lt;br /&gt;
== Complex filter expressions == &lt;br /&gt;
Some tables allow for using more complex expressions for flexible live filtering. &lt;br /&gt;
&lt;br /&gt;
The support of filter expressions is indicated by the hint text in the search area, which informs that the entered string must start with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
In this mode it is possible to enter expressions in the form of &#039;&#039;&#039;keyword == value&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The keyword depends on the actual context of the search field, often &#039;&#039;&#039;name&#039;&#039;&#039;, &#039;&#039;&#039;ip&#039;&#039;&#039;, or &#039;&#039;&#039;packets&#039;&#039;&#039; is possible. &lt;br /&gt;
&lt;br /&gt;
The web interface will give hints about all possible keywords in the current context which usually directly correlate with the available columns.&lt;br /&gt;
&lt;br /&gt;
Also, the comparison operator can be &#039;&#039;&#039;==&#039;&#039;&#039; or &#039;&#039;&#039;!=&#039;&#039;&#039; for equal or unequal compare, but for numbers &#039;&#039;&#039;&amp;lt;&#039;&#039;&#039;, &#039;&#039;&#039;&amp;gt;=&#039;&#039;&#039;, etc can be used too.&lt;br /&gt;
&lt;br /&gt;
Multiple expressions can be combined with boolean operators &#039;&#039;&#039;and&#039;&#039;&#039; or &#039;&#039;&#039;or&#039;&#039;&#039; (or equivalent &#039;&#039;&#039;&amp;amp;&amp;amp;&#039;&#039;&#039; / &#039;&#039;&#039;||&#039;&#039;&#039;). Also, parentheses can be used to enter even more complex expressions.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
# Show all IPs with at least 100 packets, that have been active within the last minute:&lt;br /&gt;
#: &amp;lt;code&amp;gt;(packets &amp;gt; 100 and lasttime &amp;lt; 60)&amp;lt;/code&amp;gt;&lt;br /&gt;
# Show all IPs that showed up not more than 24 hours ago and have an associated name of alice or bob:&lt;br /&gt;
#: &amp;lt;code&amp;gt;( (firsttime &amp;lt; 86400 and ( name == alice or name == bob ))&amp;lt;/code&amp;gt;&lt;br /&gt;
#: 86400 is the number of seconds in 24 hours (24 * 60 * 60)&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
 &lt;br /&gt;
* It is possible to enter values in quotes if they contain reserved characters used for the expressions (&amp;lt;,=,&amp;amp;,(, etc).&lt;br /&gt;
* Under the search text area, the interface will show all valid values for the last element entered in the expression.&lt;br /&gt;
* A green check mark indicates if the entered expression has been successfully parsed.&lt;br /&gt;
&lt;br /&gt;
== Available keywords ==&lt;br /&gt;
&lt;br /&gt;
The available keywords vary depending on the web interface section.&lt;br /&gt;
&lt;br /&gt;
The web interface will always show the available keywords in the specific context. The following table contains all keywords:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Keyword !! Description  &lt;br /&gt;
|-           &lt;br /&gt;
|name || any name information (DNS, DHCP, SSL, HTTP, custom names, etc)&lt;br /&gt;
|-           &lt;br /&gt;
|name.dns || DNS name information only for IPs and IP connections&lt;br /&gt;
|-&lt;br /&gt;
|category ||the category of a custom name&lt;br /&gt;
|-&lt;br /&gt;
|ip ||the IP address of the client or server side&lt;br /&gt;
|-&lt;br /&gt;
|ipgroup ||  the name(s) of the matching IP groups if configured&lt;br /&gt;
|-&lt;br /&gt;
|clientip || the IP address of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverip || the IP address of the server&lt;br /&gt;
|-&lt;br /&gt;
|packets || the number of packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|rxpackets ||  the number of received packets&lt;br /&gt;
|-&lt;br /&gt;
|txpackets ||  the number of transmitted packets&lt;br /&gt;
|-&lt;br /&gt;
|clientpackets ||  the number of packets sent by the client&lt;br /&gt;
|-&lt;br /&gt;
|serverpackets ||  the number of packets sent by the server&lt;br /&gt;
|-&lt;br /&gt;
|bytes || the number of bytes (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|rxbytes ||  the number of received bytes&lt;br /&gt;
|-&lt;br /&gt;
|txbytes || the number of transmitted bytes&lt;br /&gt;
|-&lt;br /&gt;
|clientbytes ||  the number of bytes sent by the client&lt;br /&gt;
|-&lt;br /&gt;
|serverbytes ||  the number of bytes sent by the server&lt;br /&gt;
|-&lt;br /&gt;
|pps ||  the packets per second value&lt;br /&gt;
|-&lt;br /&gt;
|rxpps||the received packets per second value&lt;br /&gt;
|-&lt;br /&gt;
|txpps|| the transmitted packets per second value&lt;br /&gt;
|-&lt;br /&gt;
| bps ||the bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|rxbps ||the received bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|txbps||the transmitted bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|firsttime||the time of the first activity&lt;br /&gt;
|-&lt;br /&gt;
|lasttime || the time of the last activity&lt;br /&gt;
|-&lt;br /&gt;
|tcppackets||the number of TCP packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|udppackets|| the number of UDP packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|tcppayload||the amount of bytes processed as TCP payload&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetrans||the amount of payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransRx||the amount of received payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransTx||the amount of transmitted payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
| tcpRetransClient||the amount of client payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransServer ||the amount of server payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|mac||the MAC address of the client or server&lt;br /&gt;
|-&lt;br /&gt;
|port||the layer 4 port of the client or server (a number or range)&lt;br /&gt;
|-&lt;br /&gt;
|clientport||the layer 4 port of the client (a number or range)&lt;br /&gt;
|-&lt;br /&gt;
|serverport||the layer 4 port of the server (a number or range)&lt;br /&gt;
|-&lt;br /&gt;
|l4protocol|| the layer 4 protocol name (tcp, udp, icmp, etc)&lt;br /&gt;
|-&lt;br /&gt;
|l7protocol||the layer 7 protocol name (http, dns, etc)&lt;br /&gt;
|-&lt;br /&gt;
|tcpend ||the ending reason of a TCP connection (open, fin, rst, timeout)&lt;br /&gt;
|-&lt;br /&gt;
|tcpstate ||the state of a TCP connection (valid, invalid, unknown)&lt;br /&gt;
|-&lt;br /&gt;
|tcpclienthandshake||the TCP handshake time in milliseconds for the client (time to answer the server&#039;s syn packet)&lt;br /&gt;
|-&lt;br /&gt;
|tcpserverhandshake||the TCP handshake time in milliseconds for the server (time to answer the client&#039;s syn packet)&lt;br /&gt;
|-&lt;br /&gt;
|tcpdataresponseavg||the average TCP data response time in milliseconds of the connection&lt;br /&gt;
|-&lt;br /&gt;
|tcpdataresponsemax||the max TCP data response time in milliseconds of the connection (any direction)&lt;br /&gt;
|-&lt;br /&gt;
|httpresponse ||the HTTP response time for a request&lt;br /&gt;
|-&lt;br /&gt;
|httpstatus||the HTTP status code of the response&lt;br /&gt;
|-&lt;br /&gt;
|sslhandshake||the SSL handshake time (time for the server to answer the SSL setup)&lt;br /&gt;
|-&lt;br /&gt;
|packetratio||the client/server packet ratio as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| vlan ||the VLAN tag (a tag or &#039;none&#039;), both outer and inner VLAN will be considered&lt;br /&gt;
|-&lt;br /&gt;
|outervlan||the outer VLAN tag (a tag or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
| innervlan||the inner VLAN tag (a tag or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|interface.name||the interface name or ID (starting at 1)&lt;br /&gt;
|-&lt;br /&gt;
|interface.rawid&lt;br /&gt;
|the raw interface ID (starting at 0)&lt;br /&gt;
|-&lt;br /&gt;
|validconnections||the number of valid TCP connections&lt;br /&gt;
|-&lt;br /&gt;
|invalidconnections|| the number of invalid TCP connections&lt;br /&gt;
|-&lt;br /&gt;
| profinetFrameId||the number of a Profinet frame ID&lt;br /&gt;
|-&lt;br /&gt;
| minCallerJitter||the minimum jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| avgCallerJitter|| the average jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| maxCallerJitter||the maximum jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| minCalleeJitter|| the minimum jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCalleeJitter ||the average jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCalleeJitter||the maximum jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minJitter ||the minimum jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| avgJitter || the average jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxJitter||the maximum jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minCallerMos||the minimum MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCallerMos ||the average MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCallerMos||the maximum MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minCalleeMos ||the minimum MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCalleeMos || the average MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCalleeMos||the maximum MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| minMos||the minimum MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgMos||the average MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxMos||the maximum MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minClientJitter ||the minimum jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxClientJitter ||the maximum jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgClientJitter ||the average jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minServerJitter ||the minimum jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxServerJitter||the maximum jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgServerJitter||the average jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|statusCode||the number of a status code&lt;br /&gt;
|-&lt;br /&gt;
|mpls||the MPLS label (a label or &#039;none&#039;), both outer and inner MPLS label will be considered&lt;br /&gt;
|-&lt;br /&gt;
| outermpls||the outer MPLS label (a label or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|innermpls|| the inner MPLS label (a label or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|qos||Filter for presence or absence of QoS. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|qosIpDscp||the DSCP value in the IP header&lt;br /&gt;
|-&lt;br /&gt;
|qosMplsTc|| the traffic class value in the outermost MPLS label stack entry&lt;br /&gt;
|-&lt;br /&gt;
|qosVlanPcp||the priority code point in the outermost VLAN tag&lt;br /&gt;
|-&lt;br /&gt;
|usedCipherSuite||the negotiated SSL/TLS cipher suite name&lt;br /&gt;
|-&lt;br /&gt;
|usedTlsVersion&lt;br /&gt;
|the negotiated SSL/TLS version&lt;br /&gt;
|-&lt;br /&gt;
|pppoeSessionId||the PPPoE session ID (in hexadecimal or decimal representation)&lt;br /&gt;
|-&lt;br /&gt;
|mtu||the MTU value in bytes&lt;br /&gt;
|-&lt;br /&gt;
|rxMtu ||the MTU value of the RX direction in bytes&lt;br /&gt;
|-&lt;br /&gt;
|txMtu||the MTU value of the TX direction in bytes&lt;br /&gt;
|-&lt;br /&gt;
|clientMtu||the MTU value of the sent direction of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|serverMtu||the MTU value of the sent direction of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|callId|| the string value of a SIP call ID or similar identifier (e.g. P-Palladion-ID)&lt;br /&gt;
|-&lt;br /&gt;
| dnsresponse|| the DNS response time (for DNS connections)&lt;br /&gt;
|-&lt;br /&gt;
| dnsstatus||matches DNS response status (either a DNS reply code, e.g, 0 for success, or noanswer for unanswered DNS connections&lt;br /&gt;
|-&lt;br /&gt;
|dnsname||the requested DNS name&lt;br /&gt;
|-&lt;br /&gt;
|callerRtpPacketLoss || the amount of lost packets of the RTP flow of the caller&lt;br /&gt;
|-&lt;br /&gt;
| calleeRtpPacketLoss||the amount of lost packets of the RTP flow of the callee&lt;br /&gt;
|-&lt;br /&gt;
| rtpPacketLoss || the amount of lost packets of the RTP flow of the caller or callee&lt;br /&gt;
|-&lt;br /&gt;
| clientRtpPacketLoss ||the amount of lost packets of the RTP flow of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverRtpPacketLoss||the amount of lost packets of the RTP flow of the server&lt;br /&gt;
|-&lt;br /&gt;
|callerRtpJitterBufferExceeded || the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the caller&lt;br /&gt;
|-&lt;br /&gt;
| calleeRtpJitterBufferExceeded||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the callee&lt;br /&gt;
|-&lt;br /&gt;
| rtpJitterBufferExceeded || the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the caller or callee&lt;br /&gt;
|-&lt;br /&gt;
| clientRtpJitterBufferExceeded ||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverRtpJitterBufferExceeded||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the server&lt;br /&gt;
|-&lt;br /&gt;
| callerRtpPayloadType||the payload type of the RTP flow of the caller as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|calleeRtpPayloadType|| the payload type of the RTP flow of the callee as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|rtpPayloadType||the payload type of the RTP flow of the caller or callee as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|duration, sipDuration ||the duration of a connection or a SIP call, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|callerDuration|| the duration of a SIP call of the caller, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|calleeDuration||the duration of a SIP call of the callee, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|diffRtpSipDuration||the difference between the duration of a SIP call and its RTP connection, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|sipQos||Filter for presence or absence of QoS in SIP calls. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|sipQosIpDscp||the DSCP value in the IP header of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
| sipQosMplsTc|| the traffic class value in the outermost MPLS label stack entry of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
|sipQosVlanPcp||the priority code point in the outermost VLAN tag of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQos||Filter for presence or absence of QoS in RTP streams. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosIpDscp ||the DSCP value in the IP header of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosMplsTc||the traffic class value in the outermost MPLS label stack entry of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosVlanPcp||the priority code point in the outermost VLAN tag of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindow || the number of TCP zero window packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowRx||the number of TCP zero window packets in RX direction&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowTx|| the number of TCP zero window packets in TX direction&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowClient||the number of TCP zero window packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowServer ||the number of TCP zero window packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSize||the value of the announced TCP window size in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSizeClient||the value of the announced TCP window size of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSizeServer|| the value of the announced TCP window size of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSize|| the smallest announced TCP window in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSizeClient|| the smallest announced TCP window of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSizeServer|| the smallest announced TCP window of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScale&lt;br /&gt;
|the value of the announced TCP window scale&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScaleClient&lt;br /&gt;
|the value of the announced TCP window scale of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScaleServer&lt;br /&gt;
|the value of the announced TCP window scale of the server&lt;br /&gt;
|-&lt;br /&gt;
| tcpUsedWindowSize||the value of the actual used TCP window in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpUsedWindowSizeClient||the value of the actual used TCP window of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
| tcpUsedWindowSizeServer||the value of the actual used TCP window of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSyn||the number of TCP SYN packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynClient||the number of TCP SYN packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynServer||the number of TCP SYN packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynRx||the number of received TCP SYN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynTx||the number of transmitted TCP SYN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAck||the number of TCP SYN-ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckClient||the number of TCP SYN-ACK packets of the client&lt;br /&gt;
|-&lt;br /&gt;
| tcpSynAckServer||the number of TCP SYN-ACK packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckRx||the number of received TCP SYN-ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckTx||the number of transmitted TCP SYN-ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpRst||the number of TCP RST packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstClient||the number of TCP RST packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstServer ||the number of TCP RST packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstRx||the number of received TCP RST packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstTx||the number of transmitted TCP RST packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpFin || the number of TCP FIN packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinClient||the number of TCP FIN packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinServer||the number of TCP FIN packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinRx||the number of received TCP FIN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinTx||the number of transmitted TCP FIN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAck || the number of TCP DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckClient||the number of TCP DUP ACK packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckServer||the number of TCP DUP ACK packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckRx||the number of received TCP DUP ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckTx||the number of transmitted TCP DUP ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpMissedData||the estimated amount of TCP bytes to not see&lt;br /&gt;
|-&lt;br /&gt;
|tcpDataTransferTime&lt;br /&gt;
|the data transfer time in milliseconds (TCP applications times)&lt;br /&gt;
|-&lt;br /&gt;
|tcpFirstDataResponseTime&lt;br /&gt;
|first data response time in milliseconds (TCP applications times)&lt;br /&gt;
|-&lt;br /&gt;
|tcpTotalRequestResponseTransferTime&lt;br /&gt;
|total request response transfer time in milliseconds (TCP applications times)&lt;br /&gt;
|-&lt;br /&gt;
|traceroute||the IP or host name of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tracerouteHostname||the host name of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tracerouteIp||the IP of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tlsAlert||the description of TLS alert messages (see RFC8446 section 6 for a full list)&lt;br /&gt;
|-&lt;br /&gt;
|tlsAlertLevel||the TLS alert level (can be warning, fatal or unknown)&lt;br /&gt;
|-&lt;br /&gt;
|supportedTlsVersion&lt;br /&gt;
|the announced TLS version&lt;br /&gt;
|-&lt;br /&gt;
|supportedCipherSuite&lt;br /&gt;
| the announced SSL/TLS cipher suite name&lt;br /&gt;
|-&lt;br /&gt;
|spi||IPSec SPI (security parameter index), a number in hexadecimal or decimal representation&lt;br /&gt;
|-&lt;br /&gt;
|number||The phone number of the caller or callee of a SIP call. Extracted from &#039;From&#039;, &#039;To&#039;, &#039;Contact&#039;, &#039;P-Asserted-Identity&#039;, or &#039;P-Preferred-Identity&#039; field or request URI.&lt;br /&gt;
|-&lt;br /&gt;
|callerNumber||The phone number of the caller of a SIP call. Extracted from &#039;From&#039; field.&lt;br /&gt;
|-&lt;br /&gt;
|calleeNumber||The phone number of the callee of a SIP call. Extracted from &#039;To&#039; field.&lt;br /&gt;
|-&lt;br /&gt;
|packetTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max). This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|callerPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the caller. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|calleePacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the callee. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|clientPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the client. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|serverPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the server. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|serverMaxPacketLossBurst || The longest RTP packet loss in a row of the server.&lt;br /&gt;
|-&lt;br /&gt;
|clientMaxPacketLossBurst || The longest RTP packet loss in a row of the client.&lt;br /&gt;
|-&lt;br /&gt;
|callerMaxPacketLossBurst || The longest RTP packet loss in a row of the caller.&lt;br /&gt;
|-&lt;br /&gt;
|calleeMaxPacketLossBurst || The longest RTP packet loss in a row of the callee.&lt;br /&gt;
|-&lt;br /&gt;
|maxPacketLossBurst || The longest RTP packet loss in a row of either client/server or caller/callee.&lt;br /&gt;
|-&lt;br /&gt;
|peerRole || The peer role. Could be either client or server.&lt;br /&gt;
|-&lt;br /&gt;
|ssrc || The RTP synchronization source value of either client or server. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|clientSsrc || The RTP synchronization source value of the client. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|serverSsrc || The RTP synchronization source value of the server. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|callerSsrc || The RTP synchronization source value of the caller. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|calleeSsrc || The RTP synchronization source value of the callee. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|peers || The amount of peers of an IP address.&lt;br /&gt;
|-&lt;br /&gt;
|sipCallerIp || The IP address of the SIP caller, usually the sender of SIP Invite packet.&lt;br /&gt;
|-&lt;br /&gt;
|sipCalleeIp || The IP address of the SIP callee, usually the receiver of SIP Invite packet.&lt;br /&gt;
|-&lt;br /&gt;
|minTtl || The min value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|maxTtl || The max value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|avgTtl || The avg value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
There are some additional keywords to support some limited set of wireshark compatible filter expressions:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Keyword&lt;br /&gt;
!Description&lt;br /&gt;
!Available in firmware version&lt;br /&gt;
|-&lt;br /&gt;
|ip.addr&lt;br /&gt;
|the IPv4 address (either source or destination)&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
| ip.src &lt;br /&gt;
|the IPv4 source address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
| ip.dst&lt;br /&gt;
|the IPv4 destination address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.addr&lt;br /&gt;
|the IPv6 address (either source or destination)&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.src&lt;br /&gt;
|the IPv6 source address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.dst&lt;br /&gt;
|the IPv6 destination address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.port&lt;br /&gt;
|the source or destination port of a TCP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.srcport&lt;br /&gt;
|the source port of a TCP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.dstport&lt;br /&gt;
|the destination port of a TCP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.port&lt;br /&gt;
|the source or destination port of a UDP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.srcport&lt;br /&gt;
|the source port of a UDP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.dstport&lt;br /&gt;
|the destination port of a UDP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|smb.shareName &lt;br /&gt;
|the Name of the smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.connectionEncrypted&lt;br /&gt;
|if the connection between a client and a server is encrypted (possible values are: &amp;quot;encrypted&amp;quot; and &amp;quot;unencrypted&amp;quot;&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.negotiationState&lt;br /&gt;
| the negotiation state of a connection&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.successfulConnects / smb.failedConnects&lt;br /&gt;
|number of successful/failed connects to a smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.successfulDisconnects / smb.failedDisconnects&lt;br /&gt;
|number of successful/failed disconnects to a smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialect&lt;br /&gt;
|the used dialects of a smb server&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialectReq&lt;br /&gt;
|the dialects requested by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialectUsed&lt;br /&gt;
|the dialects used by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedOpens / smb.successfulOpens &lt;br /&gt;
|the number of successful/failed opens of a file by a client of a file&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedOpens / smb.successfulOpens &lt;br /&gt;
|the number of successful/failed opens of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
| smb.failedCloses / smb.successfulCloses &lt;br /&gt;
|the number of successful/failed closes of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedDeletes / smb.successfulDeletes &lt;br /&gt;
|the number of successful/failed deletes of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.firstOpen / smb.lastOpen&lt;br /&gt;
|time since the first/last open&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.lastClose&lt;br /&gt;
|time since the file got closed the last time&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.lastDelete&lt;br /&gt;
|time since  the file got deleted the last time&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.bytesWritten / smb.bytesRead&lt;br /&gt;
|the number of bytes written to/read from the file&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|icmp.pingLatencyMin&lt;br /&gt;
| the ping latency (min) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|icmp.pingLatencyAvg&lt;br /&gt;
|the ping latency (average) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|icmp.pingLatencyMax&lt;br /&gt;
|the ping latency (max) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|icmp.requests&lt;br /&gt;
| the number of ICMP ping requests of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|icmp.replies&lt;br /&gt;
|the number of ICMP ping replies of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|ip.ttl.min / max / avg&lt;br /&gt;
| the min / max / avg TTL value of an IPv4&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.hlim.min / max / avg&lt;br /&gt;
| the min / max / avg hop limit value of an IPv6&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|goose.packetsExpected&lt;br /&gt;
| the number of expected IEC 61850 GOOSE packets&lt;br /&gt;
| 4.2&lt;br /&gt;
|-&lt;br /&gt;
|goose.packetsLost&lt;br /&gt;
|the number of lost IEC 61850 GOOSE packets&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|goose.packetsRepeat&lt;br /&gt;
|the number of repeated IEC 61850 GOOSE packets &lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|sv.asduExpected&lt;br /&gt;
|the number of expected IEC 61850 Sampled Values ASDUs&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|sv.asduLost&lt;br /&gt;
|the number of lost IEC 61850 Sampled Values ASDUs&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|sv.asduRepeat &lt;br /&gt;
|the number of repeated IEC 61850 Sampled Values ASDUs&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
|tds.loginack.tdsversion &lt;br /&gt;
|the used TDS version as negotiated during the login process&lt;br /&gt;
|4.3&lt;br /&gt;
|-&lt;br /&gt;
|tds.sqlqueryresponse.avg/min/max&lt;br /&gt;
| the average/min/max response time for TDS SQL queries in ms &lt;br /&gt;
| 4.3&lt;br /&gt;
|-&lt;br /&gt;
|tds.sqlqueryrequests&lt;br /&gt;
|the number of TDS SQL queries&lt;br /&gt;
|4.3 &lt;br /&gt;
|-&lt;br /&gt;
|tds.sqlqueryresponses&lt;br /&gt;
|the number of responses to TDS SQL queries&lt;br /&gt;
|4.3&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages&lt;br /&gt;
radius.client.messages&lt;br /&gt;
radius.server.messages&lt;br /&gt;
|the number of (total/client/server) RADIUS messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.access&lt;br /&gt;
radius.client.messages.access&lt;br /&gt;
radius.server.messages.access&lt;br /&gt;
|the number of (total/client/server) RADIUS Access messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.access.accept&lt;br /&gt;
radius.client.messages.access.accept&lt;br /&gt;
radius.server.messages.access.accept&lt;br /&gt;
|the number of (total/client/server) RADIUS Access Accept messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.access.challenge&lt;br /&gt;
radius.client.messages.access.challenge&lt;br /&gt;
radius.server.messages.access.challenge&lt;br /&gt;
|the number of (total/client/server) RADIUS Access Challenge messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.access.reject&lt;br /&gt;
radius.client.messages.access.reject&lt;br /&gt;
radius.server.messages.access.reject&lt;br /&gt;
|the number of (total/client/server) RADIUS Access Reject messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.access.request&lt;br /&gt;
radius.client.messages.access.request&lt;br /&gt;
radius.server.messages.access.request&lt;br /&gt;
|the number of (total/client/server) RADIUS Access Request messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.accounting&lt;br /&gt;
radius.client.messages.accounting&lt;br /&gt;
radius.server.messages.accounting&lt;br /&gt;
|the number of (total/client/server) RADIUS Accounting messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.accounting.request&lt;br /&gt;
radius.client.messages.accounting.request&lt;br /&gt;
radius.server.messages.accounting.request&lt;br /&gt;
|the number of (total/client/server) RADIUS Accounting Request messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.accounting.response&lt;br /&gt;
radius.client.messages.accounting.response&lt;br /&gt;
radius.server.messages.accounting.response&lt;br /&gt;
|the number of (total/client/server) RADIUS Accounting Response messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.messages.others&lt;br /&gt;
radius.client.messages.others&lt;br /&gt;
radius.server.messages.others&lt;br /&gt;
|the number of other (total/client/server) RADIUS messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.client.messages.expected&lt;br /&gt;
radius.server.messages.expected&lt;br /&gt;
|the number of expected (client/server) RADIUS messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.client.messages.lost&lt;br /&gt;
radius.server.messages.lost&lt;br /&gt;
|the number of lost (client/server) RADIUS messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.client.messages.reorder&lt;br /&gt;
radius.server.messages.reorder&lt;br /&gt;
|the number of reordered (client/server) RADIUS messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.client.messages.repeat&lt;br /&gt;
radius.server.messages.repeat&lt;br /&gt;
|the number of repeated (client/server) RADIUS messages&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.calledStationId&lt;br /&gt;
|the called station ID string sent by the RADIUS client&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.callingStationId&lt;br /&gt;
|the calling station ID string sent by the RADIUS client&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.nasSpecifier&lt;br /&gt;
|the NAS Specifier/Identifier string sent by the RADIUS client&lt;br /&gt;
|4.4&lt;br /&gt;
|-&lt;br /&gt;
|radius.responsetime.avg/min/max&lt;br /&gt;
|the average/min/max duration between client requests and server responses&lt;br /&gt;
|4.4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Wireshark filter syntax==&lt;br /&gt;
Wireshark uses a filter syntax that is not directly compatible to the filter syntax in the Allegro Network Multimeter as it is more strict regarding the expression and also supports many packet header related fields.&lt;br /&gt;
&lt;br /&gt;
However, Wireshark conversion filters for IPV4, IPV6, TCP, and UDP can be used directly:&lt;br /&gt;
&lt;br /&gt;
*Example: The filter &amp;quot;(ip.addr eq 1.2.3.4 and ip.addr eq 2.3.4.5) and (tcp.port eq 80 and tcp.port eq 1234)&amp;quot; is a valid filter expression. The corresponding native expression is:  &amp;quot;ip == 1.2.3.4 and ip == 2.3.4.5 and port == 80 and port == 1234 and l4protocol == TCP&amp;quot; (the last part about the l4protocol can be left out since most of the time there is only one connection matching the port portion).&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Quic_server.png&amp;diff=4979</id>
		<title>File:Quic server.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Quic_server.png&amp;diff=4979"/>
		<updated>2025-02-25T15:15:36Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut uploaded a new version of File:Quic server.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Overview of the QUIC TLS server tab&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=4978</id>
		<title>RADIUS module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=4978"/>
		<updated>2025-02-24T14:14:08Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Connections */ Mention filter support&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RADIUS module shows information about RADIUS (Remote Authentication Dial-In User Service) traffic, which is used for authentication and accounting of users for dial-up connections like DSL, WLAN or VPN. Each RADIUS packet contains one message, which may carry optional attributes. RADIUS messages can be grouped into classes, the standard [https://datatracker.ietf.org/doc/html/rfc2865 RFC 2865] defined &#039;&#039;Access&#039;&#039; and &#039;&#039;Accounting&#039;&#039;, but many other message types were implemented by various vendors.&lt;br /&gt;
&lt;br /&gt;
=== Access messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Access Request&#039;&#039;&#039;: Clients send such messages to the server with information used to determine if the user should be granted access. Attached information attributes may be the &#039;&#039;Called Station ID&#039;&#039;, the &#039;&#039;Calling Station ID&#039;&#039; or the &#039;&#039;Network Access Server (NAS) Specifier&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Access Accept&#039;&#039;&#039;: Servers may respond with such messages to provide configuration information to the client for using the requested services.&lt;br /&gt;
* &#039;&#039;&#039;Access Reject&#039;&#039;&#039;: Servers may respond with such messages if the received request did not contain valid information to grant access to its services.&lt;br /&gt;
* &#039;&#039;&#039;Access Challenge&#039;&#039;&#039;: Servers may respond with such messages send the client a challenge, requiring a response.&lt;br /&gt;
&lt;br /&gt;
=== Accounting messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Accounting Request&#039;&#039;&#039;: Clients send such messages to the server with information to identify the user, who uses a service.&lt;br /&gt;
* &#039;&#039;&#039;Accounting Response&#039;&#039;&#039;: Servers respond with such messages to acknowledge that the request of the client has been received and recorded successfully.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[File: RADIUS_overview.png|thumb|RADIUS overview]]&lt;br /&gt;
Information about all RADIUS packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of RADIUS on the overall traffic. A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;Packet response times&#039;&#039; section shows the delay between client requests and their server responses as minimum, average and maximum duration values, as well as in a graph.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;RADIUS messages&#039;&#039; section shows counters and graphs for the different message types grouped by their message type classes. Transport quality issues are indicated in the &#039;&#039;Messages with not in order sequence number&#039;&#039; subsection. Counters show for clients and servers the number of &#039;&#039;Expected messages&#039;&#039;. Transport problems due to &#039;&#039;Repeated messages&#039;&#039;, &#039;&#039;Reordered messages&#039;&#039; or even &#039;&#039;Lost messages&#039;&#039; are shown for both directions as counters and graphs.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
[[File: RADIUS_connections.png|thumb|RADIUS connections common columns]]&lt;br /&gt;
All RADIUS connections with their client and server IPs and ports and optional details like host names are shown. Various toggles allow to show only relevant information about the connections:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Name&#039;&#039;&#039;: The reported &#039;&#039;Called Station ID&#039;&#039;, &#039;&#039;Calling Station ID&#039;&#039; and &#039;&#039;NAS Specifier&#039;&#039; of the client requests are shown.&lt;br /&gt;
* &#039;&#039;&#039;Timing&#039;&#039;&#039;: The &#039;&#039;Start time&#039;&#039;, &#039;&#039;Last activity&#039;&#039; and &#039;&#039;Duration&#039;&#039; of the connection will be visible.&lt;br /&gt;
* &#039;&#039;&#039;Counters&#039;&#039;&#039;: RADIUS packets and bytes are shown as total counters as well as rates in packets or bits per second.&lt;br /&gt;
* &#039;&#039;&#039;Message types&#039;&#039;&#039;: Counters for the total RADIUS message count and the different message type classes &#039;&#039;RADIUS Access messages&#039;&#039;, &#039;&#039;RADIUS Accounting messages&#039;&#039; and &#039;&#039;RADIUS Other messages&#039;&#039; are shown for servers and clients.&lt;br /&gt;
** &#039;&#039;&#039;Access Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Access Accept messages&#039;&#039;, &#039;&#039;RADIUS Access Challenge messages&#039;&#039;, &#039;&#039;RADIUS Access Reject messages&#039;&#039; and &#039;&#039;RADIUS Access Response messages&#039;&#039; are shown.&lt;br /&gt;
** &#039;&#039;&#039;Accounting Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Accounting Request messages&#039;&#039; and &#039;&#039;RADIUS Accounting Response messages&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Lost/repeated Packets&#039;&#039;&#039;: Packet counters with the result of the message sequence counter (RADIUS identifier) analysis can be shown. &#039;&#039;Expected Messages&#039;&#039; are the amount of RADIUS messages the peer should have sent according to the sequence numbers used. &#039;&#039;Repeated Messages&#039;&#039; count repeatedly seen packets from a peer with the same sequence number, while &#039;&#039;Reordered Messages&#039;&#039; indicate conditions, where older messages are seen after newer ones. &#039;&#039;Lost Messages&#039;&#039; count gaps in the seen sequence numbers, indicating that expected packets got lost.&lt;br /&gt;
* &#039;&#039;&#039;Response times&#039;&#039;&#039;: The duration statistics between the seen client request packet and its corresponding (according to the RADIUS identifier) server response packet are shown for minimum, average and maximum value.&lt;br /&gt;
* &#039;&#039;&#039;VLAN&#039;&#039;&#039;: The used IDs of &#039;&#039;Outer VLANs&#039;&#039; and &#039;&#039;Inner VLANs&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Graph&#039;&#039;&#039;: Up to five graphs can be selected from the following available graphs to be shown simultaneously:&lt;br /&gt;
** RADIUS traffic (bit/s)&lt;br /&gt;
** RADIUS traffic (packets/s)&lt;br /&gt;
** Packet response times&lt;br /&gt;
** RADIUS messages (messages/s)&lt;br /&gt;
** RADIUS Access messages (messages/s)&lt;br /&gt;
** RADIUS Accounting messages (messages/s)&lt;br /&gt;
** Client message flow (messages/s)&lt;br /&gt;
** Server message flow (messages/s)&lt;br /&gt;
* &#039;&#039;&#039;PCAP&#039;&#039;&#039;: The PCAP download button is shown for each RADIUS connection.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown connections to the specific needs.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4977</id>
		<title>Measurement modules</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4977"/>
		<updated>2025-02-24T13:33:43Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* L7 - Application Layer */ add RADIUS module&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter provides a number of network measurement modules for different use cases. Here&lt;br /&gt;
you can find a list of modules and a short description and see the specific module for detailed documentation. &lt;br /&gt;
&lt;br /&gt;
== Generic modules ==&lt;br /&gt;
&lt;br /&gt;
* [[Capture_module|Capture module]]&lt;br /&gt;
:The Capture module lists all running captures which were started interactively in any other module. &lt;br /&gt;
:It also allows for starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
* [[Path_measurement|Path measurement]]&lt;br /&gt;
:This module allows you to measure packet loss and latency between two Allegro Network Multimeter installations.&lt;br /&gt;
&lt;br /&gt;
* [[Packet_ring_buffer|Packet ring buffer]]&lt;br /&gt;
:The packet ring buffer feature allows you to create a buffer of fixed size on an external storage device to which all processed packets will be recorded. If the fixed size buffer is full, the oldest packets in the buffer will be replaced with new packets in a round-robin fashion.&lt;br /&gt;
&lt;br /&gt;
* [[PCAP#Pcap_analysis_module|Pcap analysis module]]&lt;br /&gt;
:The Pcap analysis module allows for the analysis of Pcap files by sending them to the appliance. After analyzing a Pcap, the web interface displays all the metadata as if the packets are live traffic at the time of the Pcap recording.&lt;br /&gt;
&lt;br /&gt;
* [[Incidents#Incidents_module|Incidents module]]&lt;br /&gt;
:The Incidents module allows for notifications to be created when specific network incidents are detected.&lt;br /&gt;
&lt;br /&gt;
== L2 - WiFi ==&lt;br /&gt;
&lt;br /&gt;
* [[WiFi module]]&lt;br /&gt;
:This module analyse wireless frames forwarded by access points.&lt;br /&gt;
&lt;br /&gt;
== L2 - Ethernet Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[MAC_module|MAC module]]&lt;br /&gt;
:The MAC module gathers information about all captured MAC addresses, including the protocols used, traffic, communication peers and MAC/IP mappings.&lt;br /&gt;
&lt;br /&gt;
* [[QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags VLAN PCP and MPLS TC on Layer 2 (and IP DSCP on Layer 3).&lt;br /&gt;
&lt;br /&gt;
* [[Packet_size_module|Packet size module]]&lt;br /&gt;
:The packet size module accounts the size of all packets (Layer 2 with CRC) and shows packet size distribution.&lt;br /&gt;
&lt;br /&gt;
* [[ARP_module|ARP module]]&lt;br /&gt;
:The ARP module monitors ARP packets for tracking MAC addresses and announced IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[VLAN_module|VLAN module]]&lt;br /&gt;
:The VLAN module accounts traffic per VLAN tag seen on the network.&lt;br /&gt;
&lt;br /&gt;
* [[MAC_protocols_module|MAC protocols module]]&lt;br /&gt;
:The MAC protocols module accounts traffic of all different MAC protocols.&lt;br /&gt;
&lt;br /&gt;
* [[STP_module|STP module]]&lt;br /&gt;
:The stp module analyzes STP traffic and shows a history of the identified root Bridges with their configurations.&lt;br /&gt;
&lt;br /&gt;
* [[MPLS_module|MPLS module]]&lt;br /&gt;
:The MPLS module displays information about all identified MPLS labels (single label and double-stacked).&lt;br /&gt;
&lt;br /&gt;
* [[LLDP_module|LLDP module]]&lt;br /&gt;
:The LLDP module extracts information from LLDP (Link Layer Discovery Protocol) messages and correlates this information to the respective MAC and IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[PPPoE module]]&lt;br /&gt;
:The PPPoE module displays all PPPoE sessions and traffic within a specific session.&lt;br /&gt;
&lt;br /&gt;
* [[Burst_analysis|Burst analysis]]&lt;br /&gt;
:The Burst analysis module measures throughput per interface or MAC address and displays utilization graphs for fast burst recognition.&lt;br /&gt;
&lt;br /&gt;
* [[LACP_module|LACP module]]&lt;br /&gt;
:The LACP module shows information gathered from LACP packets about port channels.&lt;br /&gt;
&lt;br /&gt;
* [[VXLAN_module|VXLAN module]]&lt;br /&gt;
:The VXLAN module shows information about all seen VXLANs.&lt;br /&gt;
&lt;br /&gt;
* [[Geneve_module|GENEVE module]]&lt;br /&gt;
:The GENEVE module shows information about all seen GENEVE VNIs.&lt;br /&gt;
&lt;br /&gt;
== L3 - IP Layer ==&lt;br /&gt;
* [[IP_module|IP module]]&lt;br /&gt;
:The IP module gathers information about all captured IPv4 and IPv6 addresses including the protocol used, traffic, communication peers, and connections.&lt;br /&gt;
&lt;br /&gt;
* [[IP_groups|IP groups]]&lt;br /&gt;
:The IP groups module gathers information for groups of IP addresses. Any IP subnet can be configured to be used as a group.&lt;br /&gt;
&lt;br /&gt;
* [[IP_pairs|IP pairs]]&lt;br /&gt;
:The IP pairs module shows traffic information between pairs of IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[QoS_module|QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags for IP DSCP on Layer 3 and VLAN PCP (and MPLS TC on Layer 2).&lt;br /&gt;
&lt;br /&gt;
* [[Geolocation_statistics|Geolocation statistics]]&lt;br /&gt;
:The Allegro Network Multimeter uses a geolocation library to identify the IP addresses of individual countries. The country information is shown in other modules; however, this web page lists all countries and their corresponding amount of traffic. It also shows detailed statistics per country including all IP addresses seen for that country.&lt;br /&gt;
&lt;br /&gt;
* [[DHCP_module|DHCP module]]&lt;br /&gt;
:The DHCP module tracks requests and responses for dynamic IP assignments in networks.&lt;br /&gt;
&lt;br /&gt;
* [[DNS_module|DNS module]]&lt;br /&gt;
:DNS name resolving is handled passively by processing all DNS requests and responses captured by the system. &lt;br /&gt;
:This module lists all IP addresses and names known by the system. This information is used by other modules to look up names.&lt;br /&gt;
&lt;br /&gt;
* [[NetBIOS_module|NetBIOS module]]&lt;br /&gt;
:The NetBIOS module monitors NetBIOS packets for tracking announced host names for IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[ICMP_module|ICMP module]]&lt;br /&gt;
:The ICMP module shows information about ICMP traffic and specific packet types.&lt;br /&gt;
&lt;br /&gt;
* [[Multicast_statistics|Multicast statistics]]&lt;br /&gt;
:The multicast module analyzes IGMP traffic and displays detailed information on multicast groups and members.&lt;br /&gt;
&lt;br /&gt;
== L4 - Transport Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[Connections_module|Connections module]]&lt;br /&gt;
:The Connections module provides access to a list of connections of all IPs aggregated together based on selected sort and filter parameters.&lt;br /&gt;
&lt;br /&gt;
* [[TCP_module|TCP module]]&lt;br /&gt;
:The TCP module measures the TCP handshake time for connection setup. It allows you to identify slow responding servers in a network.&lt;br /&gt;
&lt;br /&gt;
* [[UDP module|UDP module]]&lt;br /&gt;
:The UDP module shows global UDP traffic, IP adresses with UDP traffic and UDP connections.&lt;br /&gt;
&lt;br /&gt;
* [[Layer_4_server_ports_module|Layer 4 server ports module]]&lt;br /&gt;
:The Layer 4 server ports module measures traffic per TCP and UDP server port.&lt;br /&gt;
&lt;br /&gt;
* [[IPSec_module|IPSec module]]&lt;br /&gt;
:The IPSec module shows information about IPSec ESP traffic and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
== L7 - Application Layer ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[SSL_module|SSL module]]&lt;br /&gt;
:The SSL module keeps track of SSL server names and common names in SSL/TLS encrypted traffic. It enables you to get the name resolved even if no DNS has been seen.&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_module|HTTP module]]&lt;br /&gt;
:The HTTP module keeps track of HTTP host names requested in HTTP connections. It allows you to get the name resolved even if no DNS has been seen and to see which virtual host is handled by a given server.&lt;br /&gt;
&lt;br /&gt;
* [[L7_module|L7 module]]&lt;br /&gt;
:The L7 module gathers information about all supported Layer 7 protocols. This includes information on how much traffic was seen for each protocol for each IPv4 and IPv6 address.&lt;br /&gt;
&lt;br /&gt;
* [[Response_time_analysis|Response time analysis]]&lt;br /&gt;
:The response-time analysis module allows you to define your own protocol request and response pattern and measure the response time and request/response loss.&lt;br /&gt;
&lt;br /&gt;
* [[SMB_statistics|SMB statistics]]&lt;br /&gt;
:The SMB module gathers information about all SMB servers handling unencrypted traffic. It shows which shares have been accessed and which files in those shares have been read or written to, together with detailed statistics per file.&lt;br /&gt;
&lt;br /&gt;
* [[SIP_module|SIP module]]&lt;br /&gt;
:The SIP statistics includes all SIP calls and their associated metadata.&lt;br /&gt;
&lt;br /&gt;
* [[NTP_module|NTP module]]&lt;br /&gt;
:The NTP module shows detailed information about Network Time Protocol servers selected and their corresponding network clients.&lt;br /&gt;
&lt;br /&gt;
* [[PTP_module|PTP module]]&lt;br /&gt;
:The PTP module stores the PTP members and their associated metadata like the PTP version.&lt;br /&gt;
&lt;br /&gt;
* [[Profinet_module|Profinet module]]&lt;br /&gt;
:The Profinet module analyzes Profinet RT cyclic and acyclic traffic and displays details on all devices and their communication relationships.&lt;br /&gt;
&lt;br /&gt;
* [[OPC-UA_module|OPC-UA module]]&lt;br /&gt;
:The OPC-UA module displays information about OPC-UA binary protocol traffic and performs response-time measurement.&lt;br /&gt;
&lt;br /&gt;
* [[Fix_module|FIX module]]&lt;br /&gt;
:The FIX module shows information about &#039;&#039;&#039;F&#039;&#039;&#039;inancial &#039;&#039;&#039;I&#039;&#039;&#039;nformation e&#039;&#039;&#039;X&#039;&#039;&#039;change traffic.&lt;br /&gt;
&lt;br /&gt;
* [[IEC_60870-5-104_module|IEC 60870-5-104 module]]&lt;br /&gt;
:The IEC 60870-5-104 module shows information about IEC 60870-5-104 traffic, sequence counter correctness and response times.&lt;br /&gt;
&lt;br /&gt;
* [[IEC61850_module|IEC 61850 module]]&lt;br /&gt;
:The IEC 61850 module analyzes &#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent (GOOSE) and IEC 61850 Sampled Values traffic and shows information about the different traffic types and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
* [[RADIUS_module|RADIUS module]]&lt;br /&gt;
:The RADIUS module analyzes &#039;&#039;&#039;R&#039;&#039;&#039;emote &#039;&#039;&#039;A&#039;&#039;&#039;uthentication &#039;&#039;&#039;D&#039;&#039;&#039;ial-&#039;&#039;&#039;I&#039;&#039;&#039;n &#039;&#039;&#039;U&#039;&#039;&#039;ser &#039;&#039;&#039;S&#039;&#039;&#039;ervice traffic and shows the protocol traffic, response times, message types and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
* [[TDS_module|TDS module]]&lt;br /&gt;
:The TDS module analyzes MS-SQL &#039;&#039;&#039;T&#039;&#039;&#039;abular &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;S&#039;&#039;&#039;tream traffic and shows the protocol traffic, response times and the recognized negotiated protocol version.&lt;br /&gt;
&lt;br /&gt;
* [[TETRA_module|TETRA module]]&lt;br /&gt;
:The TETRA module shows detailed information about &#039;&#039;&#039;Te&#039;&#039;&#039;rrestrial &#039;&#039;&#039;T&#039;&#039;&#039;runked &#039;&#039;&#039;Ra&#039;&#039;&#039;dio traffic.&lt;br /&gt;
&lt;br /&gt;
* [[QUIC module]]&lt;br /&gt;
:The QUIC Analysis Module provides comprehensive insights into &#039;&#039;&#039;Q&#039;&#039;&#039;uick &#039;&#039;&#039;U&#039;&#039;&#039;DP &#039;&#039;&#039;I&#039;&#039;&#039;nternet &#039;&#039;&#039;C&#039;&#039;&#039;onnections traffic.&lt;br /&gt;
&lt;br /&gt;
* [[DICOM_statistics|DICOM module]]&lt;br /&gt;
:The DICOM module shows information about DICOM (Digital Imaging and Communications in Medicine) protocol usage.&lt;br /&gt;
&lt;br /&gt;
* [[RTP_statistics|RTP statistics]]&lt;br /&gt;
:The RTP module shows detailed information about RTP codecs used.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=4976</id>
		<title>RADIUS module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=4976"/>
		<updated>2025-02-24T13:25:44Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Connections */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RADIUS module shows information about RADIUS (Remote Authentication Dial-In User Service) traffic, which is used for authentication and accounting of users for dial-up connections like DSL, WLAN or VPN. Each RADIUS packet contains one message, which may carry optional attributes. RADIUS messages can be grouped into classes, the standard [https://datatracker.ietf.org/doc/html/rfc2865 RFC 2865] defined &#039;&#039;Access&#039;&#039; and &#039;&#039;Accounting&#039;&#039;, but many other message types were implemented by various vendors.&lt;br /&gt;
&lt;br /&gt;
=== Access messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Access Request&#039;&#039;&#039;: Clients send such messages to the server with information used to determine if the user should be granted access. Attached information attributes may be the &#039;&#039;Called Station ID&#039;&#039;, the &#039;&#039;Calling Station ID&#039;&#039; or the &#039;&#039;Network Access Server (NAS) Specifier&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Access Accept&#039;&#039;&#039;: Servers may respond with such messages to provide configuration information to the client for using the requested services.&lt;br /&gt;
* &#039;&#039;&#039;Access Reject&#039;&#039;&#039;: Servers may respond with such messages if the received request did not contain valid information to grant access to its services.&lt;br /&gt;
* &#039;&#039;&#039;Access Challenge&#039;&#039;&#039;: Servers may respond with such messages send the client a challenge, requiring a response.&lt;br /&gt;
&lt;br /&gt;
=== Accounting messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Accounting Request&#039;&#039;&#039;: Clients send such messages to the server with information to identify the user, who uses a service.&lt;br /&gt;
* &#039;&#039;&#039;Accounting Response&#039;&#039;&#039;: Servers respond with such messages to acknowledge that the request of the client has been received and recorded successfully.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[File: RADIUS_overview.png|thumb|RADIUS overview]]&lt;br /&gt;
Information about all RADIUS packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of RADIUS on the overall traffic. A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;Packet response times&#039;&#039; section shows the delay between client requests and their server responses as minimum, average and maximum duration values, as well as in a graph.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;RADIUS messages&#039;&#039; section shows counters and graphs for the different message types grouped by their message type classes. Transport quality issues are indicated in the &#039;&#039;Messages with not in order sequence number&#039;&#039; subsection. Counters show for clients and servers the number of &#039;&#039;Expected messages&#039;&#039;. Transport problems due to &#039;&#039;Repeated messages&#039;&#039;, &#039;&#039;Reordered messages&#039;&#039; or even &#039;&#039;Lost messages&#039;&#039; are shown for both directions as counters and graphs.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
[[File: RADIUS_connections.png|thumb|RADIUS connections common columns]]&lt;br /&gt;
All RADIUS connections with their client and server IPs and ports and optional details like host names are shown. Various toggles allow to show only relevant information about the connections:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Name&#039;&#039;&#039;: The reported &#039;&#039;Called Station ID&#039;&#039;, &#039;&#039;Calling Station ID&#039;&#039; and &#039;&#039;NAS Specifier&#039;&#039; of the client requests are shown.&lt;br /&gt;
* &#039;&#039;&#039;Timing&#039;&#039;&#039;: The &#039;&#039;Start time&#039;&#039;, &#039;&#039;Last activity&#039;&#039; and &#039;&#039;Duration&#039;&#039; of the connection will be visible.&lt;br /&gt;
* &#039;&#039;&#039;Counters&#039;&#039;&#039;: RADIUS packets and bytes are shown as total counters as well as rates in packets or bits per second.&lt;br /&gt;
* &#039;&#039;&#039;Message types&#039;&#039;&#039;: Counters for the total RADIUS message count and the different message type classes &#039;&#039;RADIUS Access messages&#039;&#039;, &#039;&#039;RADIUS Accounting messages&#039;&#039; and &#039;&#039;RADIUS Other messages&#039;&#039; are shown for servers and clients.&lt;br /&gt;
** &#039;&#039;&#039;Access Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Access Accept messages&#039;&#039;, &#039;&#039;RADIUS Access Challenge messages&#039;&#039;, &#039;&#039;RADIUS Access Reject messages&#039;&#039; and &#039;&#039;RADIUS Access Response messages&#039;&#039; are shown.&lt;br /&gt;
** &#039;&#039;&#039;Accounting Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Accounting Request messages&#039;&#039; and &#039;&#039;RADIUS Accounting Response messages&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Lost/repeated Packets&#039;&#039;&#039;: Packet counters with the result of the message sequence counter (RADIUS identifier) analysis can be shown. &#039;&#039;Expected Messages&#039;&#039; are the amount of RADIUS messages the peer should have sent according to the sequence numbers used. &#039;&#039;Repeated Messages&#039;&#039; count repeatedly seen packets from a peer with the same sequence number, while &#039;&#039;Reordered Messages&#039;&#039; indicate conditions, where older messages are seen after newer ones. &#039;&#039;Lost Messages&#039;&#039; count gaps in the seen sequence numbers, indicating that expected packets got lost.&lt;br /&gt;
* &#039;&#039;&#039;Response times&#039;&#039;&#039;: The duration statistics between the seen client request packet and its corresponding (according to the RADIUS identifier) server response packet are shown for minimum, average and maximum value.&lt;br /&gt;
* &#039;&#039;&#039;VLAN&#039;&#039;&#039;: The used IDs of &#039;&#039;Outer VLANs&#039;&#039; and &#039;&#039;Inner VLANs&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Graph&#039;&#039;&#039;: Up to five graphs can be selected from the following available graphs to be shown simultaneously:&lt;br /&gt;
** RADIUS traffic (bit/s)&lt;br /&gt;
** RADIUS traffic (packets/s)&lt;br /&gt;
** Packet response times&lt;br /&gt;
** RADIUS messages (messages/s)&lt;br /&gt;
** RADIUS Access messages (messages/s)&lt;br /&gt;
** RADIUS Accounting messages (messages/s)&lt;br /&gt;
** Client message flow (messages/s)&lt;br /&gt;
** Server message flow (messages/s)&lt;br /&gt;
* &#039;&#039;&#039;PCAP&#039;&#039;&#039;: The PCAP download button is shown for each RADIUS connection.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=4975</id>
		<title>RADIUS module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=RADIUS_module&amp;diff=4975"/>
		<updated>2025-02-24T13:24:02Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: RADIUS module description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RADIUS module shows information about RADIUS (Remote Authentication Dial-In User Service) traffic, which is used for authentication and accounting of users for dial-up connections like DSL, WLAN or VPN. Each RADIUS packet contains one message, which may carry optional attributes. RADIUS messages can be grouped into classes, the standard [https://datatracker.ietf.org/doc/html/rfc2865 RFC 2865] defined &#039;&#039;Access&#039;&#039; and &#039;&#039;Accounting&#039;&#039;, but many other message types were implemented by various vendors.&lt;br /&gt;
&lt;br /&gt;
=== Access messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Access Request&#039;&#039;&#039;: Clients send such messages to the server with information used to determine if the user should be granted access. Attached information attributes may be the &#039;&#039;Called Station ID&#039;&#039;, the &#039;&#039;Calling Station ID&#039;&#039; or the &#039;&#039;Network Access Server (NAS) Specifier&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Access Accept&#039;&#039;&#039;: Servers may respond with such messages to provide configuration information to the client for using the requested services.&lt;br /&gt;
* &#039;&#039;&#039;Access Reject&#039;&#039;&#039;: Servers may respond with such messages if the received request did not contain valid information to grant access to its services.&lt;br /&gt;
* &#039;&#039;&#039;Access Challenge&#039;&#039;&#039;: Servers may respond with such messages send the client a challenge, requiring a response.&lt;br /&gt;
&lt;br /&gt;
=== Accounting messages ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Accounting Request&#039;&#039;&#039;: Clients send such messages to the server with information to identify the user, who uses a service.&lt;br /&gt;
* &#039;&#039;&#039;Accounting Response&#039;&#039;&#039;: Servers respond with such messages to acknowledge that the request of the client has been received and recorded successfully.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[File: RADIUS_overview.png|thumb|RADIUS overview]]&lt;br /&gt;
Information about all RADIUS packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of RADIUS on the overall traffic. A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;Packet response times&#039;&#039; section shows the delay between client requests and their server responses as minimum, average and maximum duration values, as well as in a graph.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;RADIUS messages&#039;&#039; section shows counters and graphs for the different message types grouped by their message type classes. Transport quality issues are indicated in the &#039;&#039;Messages with not in order sequence number&#039;&#039; subsection. Counters show for clients and servers the number of &#039;&#039;Expected messages&#039;&#039;. Transport problems due to &#039;&#039;Repeated messages&#039;&#039;, &#039;&#039;Reordered messages&#039;&#039; or even &#039;&#039;Lost messages&#039;&#039; are shown for both directions as counters and graphs.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
[[File: RADIUS_connections.png|thumb|RADIUS connections common columns]]&lt;br /&gt;
All RADIUS connections with their client and server IPs and ports and optional details like host names are shown. Various toggles allow to show only relevant information about the connections:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Name&#039;&#039;&#039;: The reported &#039;&#039;Called Station ID&#039;&#039;, &#039;&#039;Calling Station ID&#039;&#039; and &#039;&#039;NAS Specifier&#039;&#039; of the client requests are shown.&lt;br /&gt;
* &#039;&#039;&#039;Timing&#039;&#039;&#039;: The &#039;&#039;Start time&#039;&#039;, &#039;&#039;Last activity&#039;&#039; and &#039;&#039;Duration&#039;&#039; of the connection will be visible.&lt;br /&gt;
* &#039;&#039;&#039;Counters&#039;&#039;&#039;: RADIUS packets and bytes are shown as total counters as well as rates in packets or bits per second.&lt;br /&gt;
* &#039;&#039;&#039;Message types&#039;&#039;&#039;: Counters for the total RADIUS message count and the different message type classes &#039;&#039;RADIUS Access messages&#039;&#039;, &#039;&#039;RADIUS Accounting messages&#039;&#039; and &#039;&#039;RADIUS Other messages&#039;&#039; are shown for servers and clients.&lt;br /&gt;
** &#039;&#039;&#039;Access Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Access Accept messages&#039;&#039;, &#039;&#039;RADIUS Access Challenge messages&#039;&#039;, &#039;&#039;RADIUS Access Reject messages&#039;&#039; and &#039;&#039;RADIUS Access Response messages&#039;&#039; are shown.&lt;br /&gt;
** &#039;&#039;&#039;Accounting Messages&#039;&#039;&#039;: In combination with the &#039;&#039;Message types&#039;&#039; toggle, counters for the message types &#039;&#039;RADIUS Accounting Request messages&#039;&#039; and &#039;&#039;RADIUS Accounting Response messages&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Lost/repeated Packets&#039;&#039;&#039;: Packet counters with the result of the message sequence counter (RADIUS identifier) analysis can be shown. &#039;&#039;Expected Messages&#039;&#039; are the amount of RADIUS messages the peer should have sent according to the sequence numbers used. &#039;&#039;Repeated Messages&#039;&#039; count repeatedly seen packets from a peer with the same sequence number, while &#039;&#039;Reordered Messages&#039;&#039; indicate conditions, where older messages are seen after newer ones. &#039;&#039;Lost Messages&#039;&#039; count gaps in the seen sequence numbers, indicating that expected packets got lost.&lt;br /&gt;
* &#039;&#039;&#039;Response times&#039;&#039;&#039;: The duration statistics between the seen client request packet and its corresponding (according to the RADIUS identifier) server response packet are shown for minimum, average and maximum value.&lt;br /&gt;
* &#039;&#039;&#039;VLAN&#039;&#039;&#039;: The used IDs of &#039;&#039;Outer VLANs&#039;&#039; and &#039;&#039;Inner VLANs&#039;&#039; are shown.&lt;br /&gt;
* &#039;&#039;&#039;Graph&#039;&#039;&#039;: Up to five graphs can be selected from the following available graphs to be shown simultaneously:&lt;br /&gt;
** &#039;&#039;&#039;RADIUS traffic (bit/s)&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;RADIUS traffic (packets/s)&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Packet response times&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;RADIUS messages (messages/s)&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;RADIUS Access messages (messages/s)&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;RADIUS Accounting messages (messages/s)&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Client message flow (messages/s)&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Server message flow (messages/s)&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;PCAP&#039;&#039;&#039;: The PCAP download button is shown for each RADIUS connection.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:RADIUS_connections.png&amp;diff=4974</id>
		<title>File:RADIUS connections.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:RADIUS_connections.png&amp;diff=4974"/>
		<updated>2025-02-24T13:22:22Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:RADIUS_overview.png&amp;diff=4973</id>
		<title>File:RADIUS overview.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:RADIUS_overview.png&amp;diff=4973"/>
		<updated>2025-02-24T13:20:30Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4967</id>
		<title>Incidents</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4967"/>
		<updated>2025-02-12T14:31:30Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Channel configuration */ SNMP v3 engineID clarification&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:Incidents_list.png|alt=|none|thumb|800x800px|Incident page]]&lt;br /&gt;
Incidents are used to alarm the user when configured network events occur, usually for traffic based rules, but also for system-specific events. These notifications can be viewed in the web GUI and may also be delivered on various notification channels. Repeating incidents are counted as such and the time of the first and last occurrence of an incident is remembered. This feature can be disabled for some incidents. What makes an incident unique depends on the type of incident. &lt;br /&gt;
&lt;br /&gt;
The incident feature allows to define rules which are checked on the configured trigger point, like when a connection ends, a SIP call ends, or for checks on ongoing traffic. When such a trigger hits, configurable traffic attributes will be checked and if all attributes of a rule match, an incident is created.&lt;br /&gt;
&lt;br /&gt;
Occurred incidents can be seen in the web interface, additionally reporting via the following notification channels is possible:&lt;br /&gt;
* email&lt;br /&gt;
* Apache Kafka&lt;br /&gt;
* SNMP trap&lt;br /&gt;
* syslog&lt;br /&gt;
&lt;br /&gt;
The first occurrence of a medium or high severity incident will also trigger a status notification which is visible at the top right of the web GUI.&lt;br /&gt;
&lt;br /&gt;
A configurable number of incidents will be remembered by the system and if the limit is exceeded the oldest incidents will be discarded [fixed number of 1000 incidents in firmware &amp;lt; 4.1].&lt;br /&gt;
&lt;br /&gt;
== Rule configuration ==&lt;br /&gt;
[[File:Incidents rules.png|thumb|600x600px|Rule configuration]]&lt;br /&gt;
Incident rules can be defined in the Incident rules&amp;quot; tab in the menu &amp;quot;Generic -&amp;gt; Incidents&amp;quot;. All changes to the rule configuration will only take effect after saving the current configuration by clicking on the save button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
The page shows a table containing the existing rules and their configuration.&lt;br /&gt;
&lt;br /&gt;
Each existing rule can be modified by clicking on the pencil symbol, or deleted by clicking on the &amp;quot;minus&amp;quot; symbol.&lt;br /&gt;
&lt;br /&gt;
New rules can be added by clicking on the &amp;quot;Add rule&amp;quot; button. A dialog appears allowing for configuration of the rule. The same dialog is used when modifying an existing rule.&lt;br /&gt;
&lt;br /&gt;
=== Add/modify a rule ===&lt;br /&gt;
[[File:Incidents add rule.png|thumb|600x600px|Add rule dialog]]&lt;br /&gt;
A rule is defined by the following settings:&lt;br /&gt;
&lt;br /&gt;
* Rule name: This is an arbitrary text describing the purpose of the rule. This text is shown in the incident list and email/Kafka/SNMP trap/syslog ouptut.&lt;br /&gt;
* Severity: three different severity values &amp;quot;low&amp;quot;, &amp;quot;medium&amp;quot;, and &amp;quot;high&amp;quot; can be used to group more important and less important incidents. Reporting channels can be configured to only report incidents of a minimum severity level.  A rule can also be disabled by choosing the severity level &amp;quot;disabled&amp;quot;. It will not be evaluated and can be enabled later at will.&lt;br /&gt;
* Trigger: The trigger defines when a rule is evaluated. For each available trigger, a description is shown next to it giving more details about the trigger.  Some triggers are evaluated at a very specific time, like when a VoIP call ends, or are evaluated regularly like for throughput triggers of IP traffic which can be configured to be checked periodically.  See list below for a detailed description of the available triggers.&lt;br /&gt;
* Attributes: Attributes are used to make actual comparison of expected values vs. actual values.&lt;br /&gt;
** Each trigger has a different set of attributes which can be checked for, and some triggers don&#039;t need to have an attribute at all.  See list below for a detailed description of the available attributes&lt;br /&gt;
** Up to four attributes can be added by clicking on the &amp;quot;Add attribute&amp;quot; button.&lt;br /&gt;
** Multiple attributes must all match at the same time to let the rule create an incident.&lt;br /&gt;
** Each attribute can be compared to a specific value, so that the actual value is lower, equal, or greater than a defined value.&lt;br /&gt;
** Some attributes have an additional parameter, like a time span which defines how the attribute value is calculated.&lt;br /&gt;
* Virtual link group: The rule can be limited to a selected [[Virtual Link Group functionality|virtual link group]] or to be applied for any group.  Some triggers cannot be limited to a virtual link group so the configuration will be hidden.&lt;br /&gt;
* IP filter: Depending on the selected trigger, the rule can be limited to a specific IP address. The IP filter can also be an IP subnet in the format IP/mask-length (Example: 10.0.0.0/8)&lt;br /&gt;
* IP group: Depending on the selected trigger, the rule can be applied to an IP group instead of an individual IP address.&lt;br /&gt;
* Virtual link group, IP and IP filter can also be used inversely by using the != comparator&lt;br /&gt;
* Report channel: Incidents are always visible in the web interface, but can also be reported via multiple channels which can be configured separately in the tab &amp;quot;Notification channels&amp;quot;.  Up to ten channels can be selected so that the incident for this rule is reported on each channel.  Also, no channel can be configured so the incident is only accessible on the web interface.&lt;br /&gt;
* Aggregation of recurring Incidents: Incidents are aggregated by default. This means the table only shows the number of incidents of the type and the timestamps of the first and the last  incident. This can be disabled for most of the incidents, so that you are able to see every indent of the incident-type.&lt;br /&gt;
* Time Profiles: You are able to set a profile which defines the active time of an incident rule.&lt;br /&gt;
* Traffic capturing: If supported by the trigger, the rule can be configured to capture the network traffic triggering the rule, including some extra time before and after the incident.&lt;br /&gt;
** Possible options:&lt;br /&gt;
*** Disabled: capturing is disabled for this rule&lt;br /&gt;
*** Live traffic: capturing happens only for live network traffic&lt;br /&gt;
*** Replay traffic: capturing happens only for replayed network traffic (from PCAP files)&lt;br /&gt;
*** Always: capturing happens in all traffic processing types.&lt;br /&gt;
** Extra capture time: configure the number of seconds before the start of the incident and after the end of the incident.&lt;br /&gt;
*** If a time span parameter is used for attributes, the capture time includes this time duration as well.&lt;br /&gt;
** The traffic is automatically filtered to only contain the traffic that actually triggered the rule, i.e., an IP address or an IP group for IP rules.&lt;br /&gt;
&lt;br /&gt;
=== Available triggers ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Trigger name&lt;br /&gt;
!Description&lt;br /&gt;
!Attributes&lt;br /&gt;
!Attribute usage&lt;br /&gt;
|-&lt;br /&gt;
|ARP: MAC change for an IP&amp;lt;br&amp;gt;&lt;br /&gt;
(arp_ip_mac_changed)&lt;br /&gt;
|This trigger is checked on an ARP response and MAC address changed for a requested IP.&lt;br /&gt;
|time_since_last_mac&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server is not responding&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_not_responding)&lt;br /&gt;
|This trigger is checked when a DNS server is not responding for some time. A server is considered unresponsive when more than 3 requests to the DNS server went unanswered for a period of more than 5 seconds. Such a server must have answered at least two requests previously.&lt;br /&gt;
|time_since_first_unanswered_request&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server response error&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_response_error)&lt;br /&gt;
|This trigger is checked when a DNS server responds a configured error of type format error, server failure or non-existing domain&lt;br /&gt;
|error_type&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(global_new_connection)&lt;br /&gt;
|This trigger is checked continuously at connection start. It can be used to report new connections with a certain layer 4 protocol and a given port range.&lt;br /&gt;
|l4_protocol, port_range, since_start_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: GPS synchronization status change&amp;lt;br&amp;gt;&lt;br /&gt;
(global_gps_sync_status_change)&lt;br /&gt;
|This trigger is checked when the GPS clock synchronization status changes.&lt;br /&gt;
|gps_sync_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Number of connections&amp;lt;br&amp;gt;&lt;br /&gt;
(global_connections)&lt;br /&gt;
|This trigger is checked continuously whether the amount of newly created connections exceeds a threshold. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|new_connections&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Regular expressions&amp;lt;br&amp;gt;&lt;br /&gt;
(global_regex_match)&lt;br /&gt;
|This trigger allows to configure a list of regular expressions and is checked for each packet whose L7 data matches one of the regular expressions in the list. Since there are no attributes associated with this trigger, this effectively means that any packet which matches one of the regular expressions will result in an incident. The incident also contains information about which connection this packet belongs to as well as which of the regular expressions matches the packet.&lt;br /&gt;
|&lt;br /&gt;
|no attributes are available for this trigger&lt;br /&gt;
|-&lt;br /&gt;
|Global: Ring buffer&amp;lt;br&amp;gt;&lt;br /&gt;
(global_ring_buffer)&lt;br /&gt;
|This trigger is checked continuously to report changes in the ring buffer.&lt;br /&gt;
|used_size, bytes_captured, bytes_dropped&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_change)&lt;br /&gt;
|This trigger is checked when the speed of an interfaces changes.&lt;br /&gt;
|interface_speed&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed mismatch for an interface pair&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_mismatch)&lt;br /&gt;
|This trigger is checked when the status or speed of an interfaces changes and mismatches the speed of corresponding interface of a link.&lt;br /&gt;
|link_speed_difference&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Status change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_status_change)&lt;br /&gt;
|This trigger is checked when the status of an interfaces changes.&lt;br /&gt;
|interface_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(global_traffic)&lt;br /&gt;
|This trigger is checked continuously for the total traffic of the device. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC 61850 - GOOSE: State number change&amp;lt;br&amp;gt;&lt;br /&gt;
(iec61850_goose_state_change)&lt;br /&gt;
|This trigger is checked when a change in the state number of GOOSE packets is detected.&lt;br /&gt;
|GoCBRef&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Response times&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_response_times)&lt;br /&gt;
|This trigger is checked whenever an IEC104 ACTCON reply for an ACT has been seen.&lt;br /&gt;
|response_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_traffic)&lt;br /&gt;
|This trigger is checked continuously for each IEC104 connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|percent_loss, absolute_loss, not_in_order&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection end&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_end)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow ended.&lt;br /&gt;
|total_packets, total_bytes, tcp_handshake_time, percent_retransmissions, zero_window_packets, duration, l7_protocol&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_start)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow starts.&lt;br /&gt;
|new_connections, geolocation&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Local IP with multiple MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_local_ip_multiple_macs)&lt;br /&gt;
|This trigger is checked on each new flow of a local IP address and more than one MAC address uses this IP.&lt;br /&gt;
|mac_count&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New local IP address&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_local_ip)&lt;br /&gt;
|This trigger is checked once for each new IP belonging to a private network address range.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_l7_protocol)&lt;br /&gt;
|This trigger is checked once for each new l7 protocol used by an IP.&lt;br /&gt;
|since_start_time, local_ip, l7_protocol&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: TCP handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_tcp_handshake)&lt;br /&gt;
|This trigger is checked after successful TCP handshake or at connection end if handshake failed.&lt;br /&gt;
|handshake_time, server_handshake_time, client_handshake_time, handshake_failed&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Traffic on IP addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active IP or IP group. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase, total_packets, total_bytes, retransmission_ratio, zero_window_packets, tcp_syn_packets, tcp_fin_packets, tcp_rst_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: TTL change&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_ttl_change)&lt;br /&gt;
|This trigger is checked continuously for each active IP.&lt;br /&gt;
|ttl_change&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|LACP: Status change of a channel&amp;lt;br&amp;gt;&lt;br /&gt;
(lacp_channel_status_change)&lt;br /&gt;
|This trigger is checked when the status of a LACP port channel changes.&lt;br /&gt;
|channel_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_l7_protocol)&lt;br /&gt;
|This trigger is checked when a unicast MAC address uses a l7 protocol for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New MAC address&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_address)&lt;br /&gt;
|This trigger is checked once when a new unicast MAC address appears for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: Traffic on MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active MAC address. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|broadcast_packet_rate&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE: PPPoE Discovery traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(pppoe_discovery_traffic)&lt;br /&gt;
|This trigger is checked continuously for PPPoE discovery traffic. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|pppoe_discovery_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Profinet: Traffic of Profinet devices&amp;lt;br&amp;gt;&lt;br /&gt;
(profinet_traffic)&lt;br /&gt;
|This trigger is checked continuously for Profinet traffic. For max jitter, the update interval is defined by the timespan parameter of the attributes. All other attributes will be checked upon event.&lt;br /&gt;
|alarms_low, alarms_high, errors, frames_lost, frames_repeated, frames_wrong_sequence, max_jitter&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PTP: Timestamp packet&amp;lt;br&amp;gt;&lt;br /&gt;
(ptp_timestamp_packet)&lt;br /&gt;
|This trigger is checked when a PTP packet containing a valid timestamp is seen.&lt;br /&gt;
|time_offset&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|QOS: Traffic on QoS classes&amp;lt;br&amp;gt;&lt;br /&gt;
(qos_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active QoS class. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|RTP: Traffic for RTP connections&amp;lt;br&amp;gt;&lt;br /&gt;
(rtp_traffic)&lt;br /&gt;
|This trigger is checked continuously for traffic of each RTP connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|jitter, percent_loss&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SIP: Call end&amp;lt;br&amp;gt;&lt;br /&gt;
(sip_call_end)&lt;br /&gt;
|This trigger is checked when a SIP call ended.&lt;br /&gt;
|duration, status, mos, percent_loss, jitter, total_packets, total_bytes, total_caller_packets, total_callee_packets, total_caller_bytes, total_callee_bytes&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SMB: SMB1 negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(smb_version_negotiation,&lt;br /&gt;
&lt;br /&gt;
prior to 4.3: &amp;lt;s&amp;gt;smb_v1_negotiation&amp;lt;/s&amp;gt;)&lt;br /&gt;
|This trigger is executed at the beginning of each SMB connection and checks whether insecure SMB1 has been negotiated (until firmware 4.3).&lt;br /&gt;
|&lt;br /&gt;
|none&lt;br /&gt;
|-&lt;br /&gt;
|SMB: SMB version negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(smb_version_negotiation)&lt;br /&gt;
|This trigger is executed at the beginning of each SMB connection and checks for a given SMB version (starting with firmware 4.4).&lt;br /&gt;
|version&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|TLS: first data packet&lt;br /&gt;
(tls_handshake_first_data)&lt;br /&gt;
|This trigger is checked when receiving the first data packet of each TLS connection.&lt;br /&gt;
|tls_first_data_time_ms&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|TLS: Handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(tls_handshake,&lt;br /&gt;
&lt;br /&gt;
prior to 4.4: &amp;lt;s&amp;gt;ssl_handshake&amp;lt;/s&amp;gt;)&lt;br /&gt;
|This trigger is checked during handshake of each TLS connection.&lt;br /&gt;
|certificate_expires, tls_alert_level&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|TLS: TLS Handshake Server Hello&lt;br /&gt;
(tls_handshake_server_hello, &lt;br /&gt;
&lt;br /&gt;
prior to 4.4: &amp;lt;s&amp;gt;tls_version&amp;lt;/s&amp;gt;)&lt;br /&gt;
|This trigger is checked when receiving the Server Hello message of each TLS connection.&lt;br /&gt;
|used_tls_version, tls_handshake_time_ms&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|WiFi: Handshake failure&lt;br /&gt;
(wifi_handshake_failure)&lt;br /&gt;
|This trigger is checked during certain parts of a WiFi handshake when a client tries to join a network. &lt;br /&gt;
|handshake_failure_type&lt;br /&gt;
|mandatory&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Special trigger properties ====&lt;br /&gt;
Some triggers are checked continuously every configured time span period, so the incidents are generated differently than for fixed event specific triggers like a call end.&lt;br /&gt;
&lt;br /&gt;
# Repeating incidents:  The following triggers will be evaluated every configured time span and will be re-issued whenever the configured attributes match.&lt;br /&gt;
## ip_traffic&lt;br /&gt;
## mac_traffic&lt;br /&gt;
## qos_traffic&lt;br /&gt;
## rtp_traffic&lt;br /&gt;
# Start/stop incidents:  The following triggers are reported once the configured attributes match and for a second time when the attributes no longer match.&lt;br /&gt;
## global_traffic&lt;br /&gt;
&lt;br /&gt;
So for repeating incidents you will get repeated incidents for the same attribute every time span. For example, if an IP address has traffic of 100 Mbit/s for 2 minutes and a rule checks for more than 50 Mbit/s over 30 seconds, the rule will hit 4 times. There will be one incident which will contain the exact number of repetitions for reference.&lt;br /&gt;
&lt;br /&gt;
For start/stop incidents, you will only see two rule hits and the incident description will state the start and stop time.&lt;br /&gt;
&lt;br /&gt;
=== Available attributes ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;absolute_loss&#039;&#039;&#039;: Count of lost packets for IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;alarms_low&#039;&#039;&#039;, &#039;&#039;&#039;alarms_high&#039;&#039;&#039;: Whether an low/high alarm occurred for a Profinet device.&lt;br /&gt;
* &#039;&#039;&#039;broadcast_packet_rate&#039;&#039;&#039;: The attribute is the number of packets per second on average over the configured timespan for MAC broadcast packets.&lt;br /&gt;
* &#039;&#039;&#039;bytes_captured&#039;&#039;&#039;: The amount of bytes captured by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;bytes_dropped&#039;&#039;&#039;: The amount of bytes dropped by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;certificate_expires&#039;&#039;&#039;: This is the number of days until the certificate expires. If the certificate is already expired, the value is &amp;lt;= 0.&lt;br /&gt;
* &#039;&#039;&#039;channel_status&#039;&#039;&#039;: 0 means that the LACP port channel is not synchronized, 1 means that the LACP port channel is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;duration&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The time between first and last packet of the flow.&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The call duration.&lt;br /&gt;
* &#039;&#039;&#039;errors&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;Profinet: Traffic of Profinet devices: Whether errors occured.&lt;br /&gt;
* &#039;&#039;&#039;error_type&#039;&#039;&#039;: equal or not equal to:&lt;br /&gt;
** Format Error: DNS responds a format error.&lt;br /&gt;
** Non-existent Domain: DNS could not find queried domain name.&lt;br /&gt;
** Server Failure: DNS responds server failure.&lt;br /&gt;
* &#039;&#039;&#039;frames_lost&#039;&#039;&#039;, &#039;&#039;&#039;frames_repeated&#039;&#039;&#039;, &#039;&#039;&#039;frames_wrong_sequence&#039;&#039;&#039;: Whether Profinet frames have been seen with problems in sequence. For loss the count of lost frames is calculated.&lt;br /&gt;
* &#039;&#039;&#039;geolocation&#039;&#039;&#039;: checks if a country is part of the connection&lt;br /&gt;
** &#039;&#039;&#039;Direction&#039;&#039;&#039;: The direction of traffic&lt;br /&gt;
*** &#039;&#039;from&#039;&#039;: Traffic is coming &#039;&#039;from the&#039;&#039; specified country&lt;br /&gt;
*** &#039;&#039;to&#039;&#039;: Traffic is going &#039;&#039;to&#039;&#039; the specified country&lt;br /&gt;
*** &#039;&#039;any:&#039;&#039; The specified country is on either side of the connection, or on neither side if the inequality is selected.&lt;br /&gt;
* &#039;&#039;&#039;GoCBRef&#039;&#039;&#039;, The GOOSE control block reference name of the device to filter.&lt;br /&gt;
* &#039;&#039;&#039;gps_sync_status&#039;&#039;&#039;: 0 means that the GPS clock in not synchronized, 1 means that the GPS clock is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;handshake_failed&#039;&#039;&#039;: Whether TCP handshake failed, i.e. one packet of SYN, SYN-ACK, ACK sequence is missing. If no handshake is seen at all but data (e.g. Allegro was started in the middle of a connection), no incident is generated.&lt;br /&gt;
* &#039;&#039;&#039;handshake_failure_type&#039;&#039;&#039;: The type of failure that occured during a WiFi handshake&lt;br /&gt;
** &#039;&#039;&#039;Erroneous handshake&#039;&#039;&#039;: The handshake violated the protocol laid out by IEEE802.11. This is not an authentication failure, this is a technical issue with a network device, or an issue with signal strength at the multimeter.&lt;br /&gt;
** &#039;&#039;&#039;Failure to authenticate&#039;&#039;&#039; &#039;&#039;&#039;(WPA)&#039;&#039;&#039;: A client attempted to join a network but failed to authenticate via WPA2 or WPA3. This indicates a problem during the EAPOL key derivation (most likely invalid credentials).&lt;br /&gt;
** &#039;&#039;&#039;Failure to authenticate (WEP)&#039;&#039;&#039;: A client attempted to join a network but failed to authenticate via WEP. This indicates a general authentication failure in an authentication frame. More information can be found in the details panel of the offending authentication frame on the handshake details page.&lt;br /&gt;
** &#039;&#039;&#039;Failure to (re)associate&#039;&#039;&#039;: A client attempted to join a network, succeeded authentication but ultimately failed to associate with the network. More information can be found in the details panel of the offending (re)association response frame on the handshake details page. Note that association happens &#039;&#039;after&#039;&#039; successful WEP authentication, but &#039;&#039;before&#039;&#039; WPA authentication.&lt;br /&gt;
* &#039;&#039;&#039;handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet and the ACK packet for the SYN/ACK packet of the server.&lt;br /&gt;
** &#039;&#039;&#039;client_handshake_time&#039;&#039;&#039;: The TCP handshake time between the SYN/ACK packet of the server and the ACK packet of the client.&lt;br /&gt;
** &#039;&#039;&#039;server_handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet of the client and the SYN/ACK packet of the server.&lt;br /&gt;
* &#039;&#039;&#039;interface_speed&#039;&#039;&#039;: The current speed of the interface in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;interface_status&#039;&#039;&#039;: 0 means interface is down, 1 means interface is up.&lt;br /&gt;
* &#039;&#039;&#039;jitter&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The average jitter of the call, using the maximum value of both call sides.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The average jitter of the RTP connection for the given timespan, using the maximum value of both directions.&lt;br /&gt;
* &#039;&#039;&#039;l4_protocol&#039;&#039;&#039;: The layer 4 protocol. Can be TCP, UDP or other.&lt;br /&gt;
* &#039;&#039;&#039;l7_protocol&#039;&#039;&#039;: The layer 7 protocol short name. Can also be a list, e.g. &amp;quot;HTTP, SSH, DHCP&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;local_ip&#039;&#039;&#039;: Whether the IP is local (10/8, 172.16/12, 192.168/16, 169.254/16, fe80::/10, fc00::/7)&lt;br /&gt;
* &#039;&#039;&#039;link_speed_difference&#039;&#039;&#039;: This is the absolute difference between the speeds of both interface of a link in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;mac_count&#039;&#039;&#039;: The number of different MAC addresses for the corresponding IP address.&lt;br /&gt;
* &#039;&#039;&#039;max_jitter&#039;&#039;&#039;: The max jitter value for a Profinet device in % in a given timespan.&lt;br /&gt;
* &#039;&#039;&#039;mos&#039;&#039;&#039;: The average MOS quality value of the call, using the minimum of both call sides.&lt;br /&gt;
* &#039;&#039;&#039;new_connections&#039;&#039;&#039;: The amount of newly created connections (TCP and UDP) for the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;not_in_order&#039;&#039;&#039;: Count of not in order packets for IEC104 connection. The sequence number could be too high, too low or repeated.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate&#039;&#039;&#039;: The packet rate in packets per second on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate_increase&#039;&#039;&#039;: The packet rate increase in % during the configured timespan compared to the average packet rate of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;percent_loss&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;:  The percentage of RTP packet loss for the call, accounting packets from both directions.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The percentage of RTP packet loss for the given timespan, accounting packets from both directions of the RTP connection.&lt;br /&gt;
** &#039;&#039;IEC104: Traffic for IEC104 connections&#039;&#039;: The percentage of IEC104 packet loss for the given timespan, accounting packets from both directions of the IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;percent_transmissions&#039;&#039;&#039;: The amount of TCP retransmission as a percentage of the total bytes.&lt;br /&gt;
* &#039;&#039;&#039;port_range&#039;&#039;&#039;: The TCP or UDP port. Can be also a range, e.g. 80,443,8443-8445&lt;br /&gt;
* &#039;&#039;&#039;pppoe_discovery_packets&#039;&#039;&#039;: The number of PPPoE discovery packets seen during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;response_time&#039;&#039;&#039;: The response time of IEC104 ACT requests and ACTCON replies.&lt;br /&gt;
* &#039;&#039;&#039;retransmission_ratio&#039;&#039;&#039;: The TCP retransmission ratio seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;since_start_time&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;MAC: New L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when a new Layer-7 protocol for the MAC address appeared.&lt;br /&gt;
** &#039;&#039;MAC: New MAC address&#039;&#039;:  This is the number of seconds after packet processing start when the MAC address appeared. This is useful to only report new MAC address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local IP address&#039;&#039;: This is the number of seconds after packet processing start when the IP address appeared. This is useful to only report new IP address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when the Layer-7 protocol for the IP address appeared.&lt;br /&gt;
** &#039;&#039;Global: Connection start&#039;&#039;: This is the number of seconds after packet processing start when the connection hast been started. This is useful to only report new connections after some learning time.&lt;br /&gt;
* &#039;&#039;&#039;status&#039;&#039;&#039;: The call status code (a three digit number, like 200 for Success)&lt;br /&gt;
* &#039;&#039;&#039;tcp_handshake_time&#039;&#039;&#039;: The TCP handshake time.&lt;br /&gt;
* &#039;&#039;&#039;tcp_fin_packets&#039;&#039;&#039;: The number of TCP FIN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_rst_packets&#039;&#039;&#039;: The number of TCP RST packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_syn_packets&#039;&#039;&#039;: The number of TCP SYN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput&#039;&#039;&#039;: The throughput bandwidth in bit/s on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput_increase&#039;&#039;&#039;: The throughput bandwidth increase in % during the configured timespan compared to the average throughput of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;time_offset&#039;&#039;&#039;: The time offset between the local time and the timestamp seen in the PTP packet.&lt;br /&gt;
* &#039;&#039;&#039;time_since_first_unanswered_request&#039;&#039;&#039;: This is the time span between when the trigger is checked and the first DNS request that has not been answered by the DNS server.&lt;br /&gt;
* &#039;&#039;&#039;time_since_last_mac&#039;&#039;&#039;: This is the number of seconds between changed MAC addresses. If, for examples, dynamic IP assignment is used, changing MAC addresses is normal so the test can be limited to only a certain amount of time.&lt;br /&gt;
* &#039;&#039;&#039;tls_alert_level&#039;&#039;&#039;: The alert level of a TLS alert packet. Can be &#039;fatal&#039;, &#039;warning&#039; or &#039;unknown&#039;. A fatal alert will be sent if e.g. TLS handshake failed and connection shall be closed.&lt;br /&gt;
* &#039;&#039;&#039;tls_handshake_time_ms:&#039;&#039;&#039; The [[TLS module|TLS handshake response time]] of the TLS handshake.&lt;br /&gt;
* &#039;&#039;&#039;tls_handshake_first_data:&#039;&#039;&#039; The [[TLS module|TLS data response time]] of the TLS handshake.&lt;br /&gt;
* &#039;&#039;&#039;total_bytes&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of bytes seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of bytes seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_bytes&#039;&#039;&#039;: The number of bytes seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_bytes&#039;&#039;&#039;: The number of bytes seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;total_packets&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of packets seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of packets seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_packets&#039;&#039;&#039;: The number of packets seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_packets&#039;&#039;&#039;: The number of packets seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;ttl_change&#039;&#039;&#039;: Whether TTL or hop limit has changed.&lt;br /&gt;
* &#039;&#039;&#039;type&#039;&#039;&#039;: The type of PPPoE discovery packet (PADI, PADO, PADR, PADS, PADT or any).&lt;br /&gt;
* &#039;&#039;&#039;used_size&#039;&#039;&#039;: The percentage of the ring buffer that needs to be filled.&lt;br /&gt;
* &#039;&#039;&#039;used_tls_version&#039;&#039;&#039;: The TLS version (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3)&lt;br /&gt;
* &#039;&#039;&#039;version&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SMB: SMB version negotiation&#039;&#039;: The SMB version SMB1 or SMB2/3&lt;br /&gt;
* &#039;&#039;&#039;window_below_mss&#039;&#039;&#039;: Whether the smallest announced TCP window was below the TCP MSS value. An additional offset is available, to check whether window was smaller than MSS + x bytes.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of packets with a TCP window of 0 for both directions of the flow.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of zero window packets seen in the configured timespan.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings ===&lt;br /&gt;
It is possible to automatically capture traffic for occurred incidents. These global settings control where capture files are stored and the capturing itself can be enabled for each rule separately.&lt;br /&gt;
&lt;br /&gt;
The incident capture feature requires an active packet ring buffer since the packets are extracted from the buffer at the end of the incident period.&lt;br /&gt;
&lt;br /&gt;
Available settings:&lt;br /&gt;
&lt;br /&gt;
* Capture cooldown period: For each rule a cooldown period prevents multiple captures from happening in fast succession. By default, new captures happen firstly after 5 seconds, but any other value of at least 1 second can be configured. The cooldown is applied to each rule separately, but for each individual rule it does not matter if the same or a different entity triggers an incident. The incident is still reported within the cooldown period, but no additional capture is started.&lt;br /&gt;
* Storage device: Select the storage device where the captures should be stored on.&lt;br /&gt;
* Storage directory: Enter the directory where capture files should be stored or leave empty to use the top level directory.&lt;br /&gt;
* Select packet ring buffer to capture from: if multiple ring buffer cluster are in use, you can select which ring buffer to use for extraction.&lt;br /&gt;
* Capture profile: A capture profile can be configured to apply packet truncation rules to the capture file. If unset, the complete packets are captured (if the ring buffer uses separate truncation rules, truncated packets might still be within the capture file).&lt;br /&gt;
&lt;br /&gt;
== Time Profiles ==&lt;br /&gt;
Incident rules can be active configured to be active in configured time spans (time profiles).&lt;br /&gt;
&lt;br /&gt;
Every time profile allows the user to define one or more time spans per day of the week in which a rule should be active. After saving the user is able select the time profile when editing the rule.&lt;br /&gt;
&lt;br /&gt;
Notes: Overlapping time spans will be merged. The earliest a time span is allowed to start is 0 and the latest end is 24, minutes are not allowed. The rule is not active for a day if there is no time span defined for the day.&lt;br /&gt;
&lt;br /&gt;
== Channel configuration ==&lt;br /&gt;
[[File:Incidents channels.png|thumb|600x600px|Channel configuration]]&lt;br /&gt;
Incidents can be reported on different channels. The configuration allows to add new channels so they can be selected in the rule configuration described above.&lt;br /&gt;
&lt;br /&gt;
Each channel can be of type:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;email&#039;&#039;&#039; Incidents will be sent to the email address configured in the [[Global settings]].&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;kafka&#039;&#039;&#039; The incidents are sent to a topic on the configured Apache Kafka server. The message is the same as for syslog.&lt;br /&gt;
* Bootstrap Server: hostname/ip:port of a Kafka Broker or multiple Brokers separated by comma&lt;br /&gt;
* Protocol: Plaintext (no authentication, no encryption), SASL Paintext (Plain authentication, no encryption), SASL SSL (Plain authentication, TLS/SSL encryption)&lt;br /&gt;
* Ignore TLS Certificate: Ignore the TLS Certificate of the Brokers (only SASL SSL)&lt;br /&gt;
* Username: Broker Login (only SASL)&lt;br /&gt;
* Password: Broker Login (only SASL)&lt;br /&gt;
* Topic: The name of the topic into which the Incidents are sent.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;snmp_trap&#039;&#039;&#039; Incidents will be sent to the configured SNMP trap receiver. A MIB file with the Allegro Network Multimeter SNMP trap definitions is available for download in the channel configuration dialog.&lt;br /&gt;
* Version: Supported SNMP version of the trap receiver (SNMP v2c or SNMP v3)&lt;br /&gt;
* Trap receiver (manager) hostname/IP: The trap receiver hostname or IP address&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v2c&#039;&#039;:&lt;br /&gt;
* Community name: SNMP community name expected by the trap receiver&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v3&#039;&#039;:&lt;br /&gt;
* Authentication protocol: Protocol for authenticated messages (MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512)&lt;br /&gt;
* Authentication password: Pass phrase for authenticated messages&lt;br /&gt;
* Privacy protocol: Protocol for message encryption (AES, DES)&lt;br /&gt;
* Privacy password: Pass phrase for message encryption&lt;br /&gt;
* Security name: Security name for authenticated SNMP messages&lt;br /&gt;
* Security level: Security level for SNMP messages (noAuthNoPriv, authNoPriv, authPriv)&lt;br /&gt;
* Engine ID: Authoritative (security) engineID (hexadecimal number of an even amount of 10 to 64 hexadecimal digits, optionally prefixed with &amp;quot;0x&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;syslog&#039;&#039;&#039; Incidents will be sent to the configured syslog server via TCP on any TCP or UDP port.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Incidents add channel.png|thumb|alt=|none|Adding a new channel]]&lt;br /&gt;
Each channel also uses a minimum severity setting, so only incidents are reported which are of at least that severity.&lt;br /&gt;
&lt;br /&gt;
Each channel can be configured to only handle incidents from live traffic or from replayed traffic.&lt;br /&gt;
&lt;br /&gt;
Some incidents cannot be configured via rules and you can choose to get those incidents also via email by enabling the settings at the lower part of the settings page.&lt;br /&gt;
&lt;br /&gt;
After saving the configuration, a test message can be sent to the target system.&lt;br /&gt;
&lt;br /&gt;
== Other settings ==&lt;br /&gt;
&lt;br /&gt;
=== Interface burst incident ===&lt;br /&gt;
[[File:Incidents others.png|thumb|600x600px|Other incidents]]&lt;br /&gt;
Burst incidents with milli-second resolution can be generated when the interface throughput exceeds a configurable threshold. The incident contains a graph of traffic for that interface with some data points before and after the threshold has been exceeded depending on the measurement interval. A PCAP link for capturing from the packet ring buffer is shown. For further investigation of that incident, the button &amp;quot;Use as global time range&amp;quot; can be used to set the global range to the start and end of the incident graph (at least 5 seconds) so that all modules of the Allegro Network Multimeter show that time span.&lt;br /&gt;
&lt;br /&gt;
The incident generation can be configured in the &amp;quot;Other settings&amp;quot; tab as follows:&lt;br /&gt;
* &#039;&#039;&#039;Report &amp;quot;throughput threshold exceeded&amp;quot; with severity&#039;&#039;&#039;: report an incident with the selected severity level if the throughput of any network interface exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput threshold (Mbit/s)&#039;&#039;&#039;: The threshold is configured in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;How long throughput must be above threshold to generate incident (in milliseconds)&#039;&#039;&#039;: The throughput must exceed the threshold for this duration in order to generate the incident. If set to zero (default) the incident is generated immediately after the threshold has been exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput cool-down period between two incidents in milliseconds&#039;&#039;&#039;: Defines the time after an incident where no new incident is generated even if the threshold is exceeded. If this period is passed, throughput incidents could be generated again.&lt;br /&gt;
Since each burst incidents stores the high resolution traffic graph, this feature uses a significant amount of memory. The actual amount is shown below and also depends on the maximum number of incidents configured in the section below.&lt;br /&gt;
&lt;br /&gt;
=== Generic incident settings ===&lt;br /&gt;
This section allows to modify generic settings regarding the incident feature:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum number of stored incidents&#039;&#039;&#039;: This value defines how many incidents are stored before old incidents are removed.  Increasing this value also increased the amount of memory reserved for this feature.&amp;lt;br&amp;gt;The corresponding value for the active setting is shown below, changing the configuration value requires a restart of the packet processing to take affect.&lt;br /&gt;
&lt;br /&gt;
== Occured incidents ==&lt;br /&gt;
This page shows up to the last incidents occurred on the system. The table can be filtered for specific severity levels, as well as for specific trigger sources by selecting the trigger from the drop down menu.&lt;br /&gt;
[[File:Incidents list filter.png|thumb|600x600px|Filter incidents by severity or trigger]]&lt;br /&gt;
The list can also be filtered for the subject of the incident.&lt;br /&gt;
&lt;br /&gt;
Individual incidents can be viewed in detail by clicking on the subject. The details page shows detailed information including links to the relevant measurement page.&lt;br /&gt;
&lt;br /&gt;
Incidents can be deleted individually by clicking on the delete button next to the incident, or all incidents can be deleted by clicking on the button on the top right of the page.&lt;br /&gt;
&lt;br /&gt;
The number of incidents available in this view is limited by a configurable number (firmware &amp;lt;4.1 was limited to 1000), the configuration as available in the &amp;quot;Other settings&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
== Incident statistics ==&lt;br /&gt;
[[File:Incidents stats.png|thumb|600x600px|Statistics about rules]]&lt;br /&gt;
This page shows graphs about how often each rule has been hit both in absolute numbers as well as relatively to how often the rule has been checked.&lt;br /&gt;
&lt;br /&gt;
== Incident list per measurement modules ==&lt;br /&gt;
Since incidents are triggered by different measurement modules (as indicate by the prefix of the trigger name, like the mac or ip module), the list of incidents from that specific module can also be seen in the corresponding tab of the measurement module for quicker access. This per-module view only lists those incidents coming from that module, all other potential incidents are hidden and must be accessed in their corresponding module page, or in the global view in the &amp;quot;Generic -&amp;gt; Incident&amp;quot; menu.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
Some technical limitations apply:&lt;br /&gt;
&lt;br /&gt;
* continuously checked triggers like &amp;quot;IP traffic&amp;quot; are only evaluated if there was at least one packet in the corresponding time interval. Therefore, rules check for zero packet count or throughput will never match.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Generic_Allegro_Network_Multimeter_installation&amp;diff=4882</id>
		<title>Generic Allegro Network Multimeter installation</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Generic_Allegro_Network_Multimeter_installation&amp;diff=4882"/>
		<updated>2024-10-09T12:15:02Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Device specific installation guides */ Add Allegro 1010/3010 installation guides&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Generic install information ==&lt;br /&gt;
&lt;br /&gt;
All Allegro Network Multimeters share the same basic installation steps.&lt;br /&gt;
&lt;br /&gt;
A quick installation guide is provided with each device as a printed document or on our [https://allegro-packets.com/en/support web site].&lt;br /&gt;
&lt;br /&gt;
The basic steps, described in detail in the installation guide, are:&lt;br /&gt;
&lt;br /&gt;
# Connect the external power supply or cable to the internal power supply.&lt;br /&gt;
# Connect the LAN connection for management access,&lt;br /&gt;
# Or, connect the Wi-Fi device for wireless access.&lt;br /&gt;
# Setup Bridge or Sink mode depending on whether you want to deploy the device in-line or on a passive Tap or Mirror Port.&lt;br /&gt;
# Connect the measurement ports.&lt;br /&gt;
# Start the device.&lt;br /&gt;
# Access the web interface.&lt;br /&gt;
Note that an initial configuration of the [[Management interface settings on console]] is possible.&lt;br /&gt;
&lt;br /&gt;
== Device specific installation guides ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Allegro model !! Installation guide&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 200 || [[Media:Installation Guide Allegro 200-1000-3000-en.pdf|Installation Guide 200 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro-200-1000-3000-dt.pdf|Installation Guide 200 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 500 || [[Media:Installation Guide Allegro 500-en.pdf|Installation Guide Allegro 500 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro 500-dt.pdf|Installation Guide Allegro 500 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 800&amp;lt;br&amp;gt;Allegro 1000/1200&amp;lt;br&amp;gt;Allegro 3000/3200 &lt;br /&gt;
|[[Media:Installation Guide Allegro 800-1000-3000 (English).pdf|Installation Guide 800/1000/1200/3000/3200 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro-200-1000-3000-dt.pdf|Installation Guide 1000/1200/3000/3200 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 1010&amp;lt;br&amp;gt;Allegro 3010&lt;br /&gt;
|[[Media:Installation_Guide_1010-3010_en.pdf|Installation Guide Allegro 1010/3010 (English)]]&amp;lt;br&amp;gt;[[Media:Installation_Guide_1010-3010_de.pdf|Installation Guide Allegro 1010/3010 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1210/3210/5210&lt;br /&gt;
|[[Media:X210 Installation Guide English.pdf|Installation Guide Allegro 1210/3210/5210 (English)]]&amp;lt;br&amp;gt;[[Media:X210 Installation Guide Deutsch.pdf|Installation Guide Allegro 1210/3210/5210 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 1300/3300/5300 || [[Media:Installation Guide x300-en.pdf|Installation Guide Allegro 1300/3300/5300 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro x300-dt.pdf|Installation Guide Allegro 1300/3300/5300 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1310/3310/5310/7310&lt;br /&gt;
|[[Media:18.08-Installation Guide x310-en v1.pdf|Installation Guide Allegro 1310/3310/5310/7310 (English)]]&amp;lt;br&amp;gt;[[Media:Installationsanleitung x310 de.pdf|Installation Guide Allegro 1310/3310/5310/7310 (Deutsch)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x310 korean.pdf|Installation Guide Allegro 1310/3310/5310/7310 (Korean)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x310-traditionalChinese.pdf|Installation Guide Allegro 1310/3310/5310/7310 (Traditional Chinese)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1400/3400/5400||[[Media:Installation Guide Allegro x400-en.pdf|Installation Guide Allegro 1400/3400/5400 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro x400-dt.pdf|Installation Guide Allegro 1400/3400/5400 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1410/3410/5410/7410&lt;br /&gt;
|[[Media:Installation Guide x410 en Web.pdf|Installation Guide Allegro 1410/3410/5410/7410 (English)]]&amp;lt;br&amp;gt;[[Media:Installationsanleitung x410 de.pdf|Installation Guide Allegro 1410/3410/5410/7410 (Deutsch)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x410-korean.pdf|Installation Guide Allegro 1410/3410/5410/7410 (Korean)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x410-traditionalChinese.pdf|Installation Guide Allegro 1410/3410/5410/7410 (Traditional Chinese)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1500/3500/5500||[[Media:Installation Guide x500-en.pdf|Installation Guide Allegro 1500/3500/5500 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro x500-dt.pdf|Installation Guide Allegro 1500/3500/5500 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1510/3510/5510/7510&lt;br /&gt;
|[[Media:Installation Guide x510-en.pdf|Installation Guide Allegro 1510/3510/5510/7510 (English)]]&amp;lt;br&amp;gt;[[Media:Installationsanleitung x510-de.pdf|Installation Guide Allegro 1510/3510/5510/7510 (Deutsch)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x510 korean.pdf|Installation Guide Allegro 1510/3510/5510/7510 (Korean)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x510-traditionalChinese.pdf|Installation Guide Allegro 1510/3510/5510/7510 (Traditional Chinese)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro Virtual Edition||[[Media:Installation Guide Allegro Virtual Edition-en.pdf|Installation Guide Allegro Virtual Edition (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro Virtual Edition-dt.pdf|Installation Guide Allegro Virtual Edition (Deutsch)]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Generic_Allegro_Network_Multimeter_installation&amp;diff=4881</id>
		<title>Generic Allegro Network Multimeter installation</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Generic_Allegro_Network_Multimeter_installation&amp;diff=4881"/>
		<updated>2024-10-09T12:09:08Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Device specific installation guides */ always list english version first&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Generic install information ==&lt;br /&gt;
&lt;br /&gt;
All Allegro Network Multimeters share the same basic installation steps.&lt;br /&gt;
&lt;br /&gt;
A quick installation guide is provided with each device as a printed document or on our [https://allegro-packets.com/en/support web site].&lt;br /&gt;
&lt;br /&gt;
The basic steps, described in detail in the installation guide, are:&lt;br /&gt;
&lt;br /&gt;
# Connect the external power supply or cable to the internal power supply.&lt;br /&gt;
# Connect the LAN connection for management access,&lt;br /&gt;
# Or, connect the Wi-Fi device for wireless access.&lt;br /&gt;
# Setup Bridge or Sink mode depending on whether you want to deploy the device in-line or on a passive Tap or Mirror Port.&lt;br /&gt;
# Connect the measurement ports.&lt;br /&gt;
# Start the device.&lt;br /&gt;
# Access the web interface.&lt;br /&gt;
Note that an initial configuration of the [[Management interface settings on console]] is possible.&lt;br /&gt;
&lt;br /&gt;
== Device specific installation guides ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Allegro model !! Installation guide&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 200 || [[Media:Installation Guide Allegro 200-1000-3000-en.pdf|Installation Guide 200 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro-200-1000-3000-dt.pdf|Installation Guide 200 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 500 || [[Media:Installation Guide Allegro 500-en.pdf|Installation Guide Allegro 500 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro 500-dt.pdf|Installation Guide Allegro 500 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 800&amp;lt;br&amp;gt;Allegro 1000/1200&amp;lt;br&amp;gt;Allegro 3000/3200 &lt;br /&gt;
|[[Media:Installation Guide Allegro 800-1000-3000 (English).pdf|Installation Guide 800/1000/1200/3000/3200 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro-200-1000-3000-dt.pdf|Installation Guide 1000/1200/3000/3200 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1210/3210/5210&lt;br /&gt;
|[[Media:X210 Installation Guide English.pdf|Installation Guide Allegro 1210/3210/5210 (English)]]&amp;lt;br&amp;gt;[[Media:X210 Installation Guide Deutsch.pdf|Installation Guide Allegro 1210/3210/5210 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
| Allegro 1300/3300/5300 || [[Media:Installation Guide x300-en.pdf|Installation Guide Allegro 1300/3300/5300 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro x300-dt.pdf|Installation Guide Allegro 1300/3300/5300 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1310/3310/5310/7310&lt;br /&gt;
|[[Media:18.08-Installation Guide x310-en v1.pdf|Installation Guide Allegro 1310/3310/5310/7310 (English)]]&amp;lt;br&amp;gt;[[Media:Installationsanleitung x310 de.pdf|Installation Guide Allegro 1310/3310/5310/7310 (Deutsch)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x310 korean.pdf|Installation Guide Allegro 1310/3310/5310/7310 (Korean)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x310-traditionalChinese.pdf|Installation Guide Allegro 1310/3310/5310/7310 (Traditional Chinese)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1400/3400/5400||[[Media:Installation Guide Allegro x400-en.pdf|Installation Guide Allegro 1400/3400/5400 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro x400-dt.pdf|Installation Guide Allegro 1400/3400/5400 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1410/3410/5410/7410&lt;br /&gt;
|[[Media:Installation Guide x410 en Web.pdf|Installation Guide Allegro 1410/3410/5410/7410 (English)]]&amp;lt;br&amp;gt;[[Media:Installationsanleitung x410 de.pdf|Installation Guide Allegro 1410/3410/5410/7410 (Deutsch)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x410-korean.pdf|Installation Guide Allegro 1410/3410/5410/7410 (Korean)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x410-traditionalChinese.pdf|Installation Guide Allegro 1410/3410/5410/7410 (Traditional Chinese)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1500/3500/5500||[[Media:Installation Guide x500-en.pdf|Installation Guide Allegro 1500/3500/5500 (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro x500-dt.pdf|Installation Guide Allegro 1500/3500/5500 (Deutsch)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro 1510/3510/5510/7510&lt;br /&gt;
|[[Media:Installation Guide x510-en.pdf|Installation Guide Allegro 1510/3510/5510/7510 (English)]]&amp;lt;br&amp;gt;[[Media:Installationsanleitung x510-de.pdf|Installation Guide Allegro 1510/3510/5510/7510 (Deutsch)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x510 korean.pdf|Installation Guide Allegro 1510/3510/5510/7510 (Korean)]]&amp;lt;br&amp;gt;[[Media:Installation Guide x510-traditionalChinese.pdf|Installation Guide Allegro 1510/3510/5510/7510 (Traditional Chinese)]]&lt;br /&gt;
|-&lt;br /&gt;
|Allegro Virtual Edition||[[Media:Installation Guide Allegro Virtual Edition-en.pdf|Installation Guide Allegro Virtual Edition (English)]]&amp;lt;br&amp;gt;[[Media:Installation Guide Allegro Virtual Edition-dt.pdf|Installation Guide Allegro Virtual Edition (Deutsch)]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Installation_Guide_1010-3010_de.pdf&amp;diff=4880</id>
		<title>File:Installation Guide 1010-3010 de.pdf</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Installation_Guide_1010-3010_de.pdf&amp;diff=4880"/>
		<updated>2024-10-09T12:07:36Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Allegro 1010/3010 Installation Guide (deutsch)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Allegro 1010/3010 Installation Guide (deutsch)&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Installation_Guide_1010-3010_en.pdf&amp;diff=4879</id>
		<title>File:Installation Guide 1010-3010 en.pdf</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Installation_Guide_1010-3010_en.pdf&amp;diff=4879"/>
		<updated>2024-10-09T12:04:51Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Allegro 1010/3010 Installation Guide (english)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Allegro 1010/3010 Installation Guide (english)&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=TDS_module&amp;diff=4848</id>
		<title>TDS module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=TDS_module&amp;diff=4848"/>
		<updated>2024-08-26T16:42:50Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: SQL Query response time feature added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The TDS module shows information about TDS (Tabular Data Stream) traffic, used for database connections with Microsoft SQL Servers. Detected connections between clients and SQL servers are shown.&lt;br /&gt;
&lt;br /&gt;
== Overview==&lt;br /&gt;
[[File: TDS_overview.png|thumb|TDS overview]]&lt;br /&gt;
Information about all TDS packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of TDS on the overall traffic. A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
In the section of overall TDS messages, recognized SQL Batch queries, as well as Remote Procedure Call queries and their server response messages are shown as counters and in a graph. The delay statistics between client queries and server response messages are shown as minimum, average and maximum Request-Response time values, as well as in a graph.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connections==&lt;br /&gt;
[[File: TDS_connections.png|thumb|TDS connections common columns]]&lt;br /&gt;
All TDS connections with their client and server IPs and ports are shown together with the recognized TDS version. If the &#039;&#039;Timing&#039;&#039; toggle is activated, the start and end time, as well as the duration of the connection will be visible. The &#039;&#039;Counters&#039;&#039; toggle switches visibility of common traffic counters for total packets and bytes, traffic rate counters for packets per second and bit per second, as well as the recognized valid SQL query and response messages. The connection quality can be evaluated in two columns: the &#039;&#039;Response times&#039;&#039; toggle enables the view of TCP handshake time separated for client and server, maximum and average response times, as well as SQL query response times (time between a SQL Batch query or Remote Procedure Call request sent by the client, until the server responds). Retransmissions (in byte and as a percentage of the total traffic), missed bytes and duplicated ACK-packets are shown when the &#039;&#039;TCP Retransmissions&#039;&#039; toggle is enabled.&lt;br /&gt;
&lt;br /&gt;
The following graphs are available for individual selection:&lt;br /&gt;
&lt;br /&gt;
* TDS traffic bitrate&lt;br /&gt;
* TDS traffic packet rate&lt;br /&gt;
* TDS SQL query response times (for both SQL Batch Queries and Remote Procedure Calls)&lt;br /&gt;
* TDS SQL query and response messages&lt;br /&gt;
&lt;br /&gt;
The TDS traffic of each connection can be captured using the PCAP download button.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:TDS_overview.png&amp;diff=4847</id>
		<title>File:TDS overview.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:TDS_overview.png&amp;diff=4847"/>
		<updated>2024-08-26T12:57:04Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:TDS_connections.png&amp;diff=4845</id>
		<title>File:TDS connections.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:TDS_connections.png&amp;diff=4845"/>
		<updated>2024-08-26T11:51:36Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut uploaded a new version of File:TDS connections.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
MS-SQL TDS connections page&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4832</id>
		<title>Incidents</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4832"/>
		<updated>2024-08-08T16:11:17Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Available attributes */ GOOSE control block reference attribute&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:Incidents_list.png|alt=|none|thumb|800x800px|Incident page]]&lt;br /&gt;
Incidents are used to alarm the user when configured network events occur, usually for traffic based rules, but also for system-specific events. These notifications can be viewed in the web GUI and may also be delivered on various notification channels. Repeating incidents are counted as such and the time of the first and last occurrence of an incident is remembered. This feature can be disabled for some incidents. What makes an incident unique depends on the type of incident. &lt;br /&gt;
&lt;br /&gt;
The incident feature allows to define rules which are checked on the configured trigger point, like when a connection ends, a SIP call ends, or for checks on ongoing traffic. When such a trigger hits, configurable traffic attributes will be checked and if all attributes of a rule match, an incident is created.&lt;br /&gt;
&lt;br /&gt;
Occurred incidents can be seen in the web interface, additionally reporting via the following notification channels is possible:&lt;br /&gt;
* email&lt;br /&gt;
* Apache Kafka&lt;br /&gt;
* SNMP trap&lt;br /&gt;
* syslog&lt;br /&gt;
&lt;br /&gt;
The first occurrence of a medium or high severity incident will also trigger a status notification which is visible at the top right of the web GUI.&lt;br /&gt;
&lt;br /&gt;
A configurable number of incidents will be remembered by the system and if the limit is exceeded the oldest incidents will be discarded [fixed number of 1000 incidents in firmware &amp;lt; 4.1].&lt;br /&gt;
&lt;br /&gt;
== Rule configuration ==&lt;br /&gt;
[[File:Incidents rules.png|thumb|600x600px|Rule configuration]]&lt;br /&gt;
Incident rules can be defined in the &amp;quot;Configuration of incident rules&amp;quot; tab in the menu &amp;quot;Generic -&amp;gt; Incidents&amp;quot;. All changes to the rule configuration will only take effect after saving the current configuration by clicking on the save button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
The page shows a table containing the existing rules and their configuration.&lt;br /&gt;
&lt;br /&gt;
Each existing rule can be modified by clicking on the pencil symbol, or deleted by clicking on the &amp;quot;minus&amp;quot; symbol.&lt;br /&gt;
&lt;br /&gt;
New rules can be added by clicking on the &amp;quot;Add rule&amp;quot; button. A dialog appears allowing for configuration of the rule. The same dialog is used when modifying an existing rule.&lt;br /&gt;
&lt;br /&gt;
=== Add/modify a rule ===&lt;br /&gt;
[[File:Incidents add rule.png|thumb|600x600px|Add rule dialog]]&lt;br /&gt;
A rule is defined by the following settings:&lt;br /&gt;
&lt;br /&gt;
* Rule name: This is an arbitrary text describing the purpose of the rule. This text is shown in the incident list and email/Kafka/SNMP trap/syslog ouptut.&lt;br /&gt;
* Severity: three different severity values &amp;quot;low&amp;quot;, &amp;quot;medium&amp;quot;, and &amp;quot;high&amp;quot; can be used to group more important and less important incidents. Reporting channels can be configured to only report incidents of a minimum severity level.  A rule can also be disabled by choosing the severity level &amp;quot;disabled&amp;quot;. It will not be evaluated and can be enabled later at will.&lt;br /&gt;
* Trigger: The trigger defines when a rule is evaluated. For each available trigger, a description is shown next to it giving more details about the trigger.  Some triggers are evaluated at a very specific time, like when a VoIP call ends, or are evaluated regularly like for throughput triggers of IP traffic which can be configured to be checked periodically.  See list below for a detailed description of the available triggers.&lt;br /&gt;
* Attributes: Attributes are used to make actual comparison of expected values vs. actual values.&lt;br /&gt;
** Each trigger has a different set of attributes which can be checked for, and some triggers don&#039;t need to have an attribute at all.  See list below for a detailed description of the available attributes&lt;br /&gt;
** Up to four attributes can be added by clicking on the &amp;quot;Add attribute&amp;quot; button.&lt;br /&gt;
** Multiple attributes must all match at the same time to let the rule create an incident.&lt;br /&gt;
** Each attribute can be compared to a specific value, so that the actual value is lower, equal, or greater than a defined value.&lt;br /&gt;
** Some attributes have an additional parameter, like a time span which defines how the attribute value is calculated.&lt;br /&gt;
* Virtual link group: The rule can be limited to a selected [[Virtual Link Group functionality|virtual link group]] or to be applied for any group.  Some triggers cannot be limited to a virtual link group so the configuration will be hidden.&lt;br /&gt;
* IP filter: Depending on the selected trigger, the rule can be limited to a specific IP address. The IP filter can also be an IP subnet in the format IP/mask-length (Example: 10.0.0.0/8)&lt;br /&gt;
* IP group: Depending on the selected trigger, the rule can be applied to an IP group instead of an individual IP address.&lt;br /&gt;
* Virtual link group, IP and IP filter can also be used inversely by using the != comparator&lt;br /&gt;
* Report channel: Incidents are always visible in the web interface, but can also be reported via multiple channels which can be configured separately in the tab &amp;quot;Configuration of notification channels&amp;quot;.  Up to ten channels can be selected so that the incident for this rule is reported on each channel.  Also, no channel can be configured so the incident is only accessible on the web interface.&lt;br /&gt;
* Aggregation of recurring Incidents: Incidents are aggregated by default. This means the table only shows the number of incidents of the type and the timestamps of the first and the last  incident. This can be disabled for most of the incidents, so that you are able to see every indent of the incident-type.&lt;br /&gt;
* Time Profiles: You are able to set a profile which defines the active time of an incident rule.&lt;br /&gt;
* Traffic capturing: If supported by the trigger, the rule can be configured to capture the network traffic triggering the rule, including some extra time before and after the incident.&lt;br /&gt;
** Possible options:&lt;br /&gt;
*** Disabled: capturing is disabled for this rule&lt;br /&gt;
*** Live traffic: capturing happens only for live network traffic&lt;br /&gt;
*** Replay traffic: capturing happens only for replayed network traffic (from PCAP files)&lt;br /&gt;
*** Always: capturing happens in all traffic processing types.&lt;br /&gt;
** Extra capture time: configure the number of seconds before the start of the incident and after the end of the incident.&lt;br /&gt;
*** If a time span parameter is used for attributes, the capture time includes this time duration as well.&lt;br /&gt;
** The traffic is automatically filtered to only contain the traffic that actually triggered the rule, i.e., an IP address or an IP group for IP rules.&lt;br /&gt;
&lt;br /&gt;
=== Available triggers ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Trigger name&lt;br /&gt;
!Description&lt;br /&gt;
!Attributes&lt;br /&gt;
!Attribute usage&lt;br /&gt;
|-&lt;br /&gt;
|ARP: MAC change for an IP&amp;lt;br&amp;gt;&lt;br /&gt;
(arp_ip_mac_changed)&lt;br /&gt;
|This trigger is checked on an ARP response and MAC address changed for a requested IP.&lt;br /&gt;
|time_since_last_mac&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server is not responding&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_not_responding)&lt;br /&gt;
|This trigger is checked when a DNS server is not responding for some time. A server is considered unresponsive when more than 3 requests to the DNS server went unanswered for a period of more than 5 seconds. Such a server must have answered at least two requests previously.&lt;br /&gt;
|time_since_first_unanswered_request&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server response error&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_response_error)&lt;br /&gt;
|This trigger is checked when a DNS server responds a configured error of type format error, server failure or non-existing domain&lt;br /&gt;
|error_type&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(global_new_connection)&lt;br /&gt;
|This trigger is checked continuously at connection start. It can be used to report new connections with a certain layer 4 protocol and a given port range.&lt;br /&gt;
|l4_protocol, port_range, since_start_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: GPS synchronization status change&amp;lt;br&amp;gt;&lt;br /&gt;
(global_gps_sync_status_change)&lt;br /&gt;
|This trigger is checked when the GPS clock synchronization status changes.&lt;br /&gt;
|gps_sync_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Number of connections&amp;lt;br&amp;gt;&lt;br /&gt;
(global_connections)&lt;br /&gt;
|This trigger is checked continuously whether the amount of newly created connections exceeds a threshold. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|new_connections&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Regular expressions&amp;lt;br&amp;gt;&lt;br /&gt;
(global_regex_match)&lt;br /&gt;
|This trigger allows to configure a list of regular expressions and is checked for each packet whose L7 data matches one of the regular expressions in the list. Since there are no attributes associated with this trigger, this effectively means that any packet which matches one of the regular expressions will result in an incident. The incident also contains information about which connection this packet belongs to as well as which of the regular expressions matches the packet.&lt;br /&gt;
|&lt;br /&gt;
|no attributes are available for this trigger&lt;br /&gt;
|-&lt;br /&gt;
|Global: Ring buffer&amp;lt;br&amp;gt;&lt;br /&gt;
(global_ring_buffer)&lt;br /&gt;
|This trigger is checked continuously to report changes in the ring buffer.&lt;br /&gt;
|used_size, bytes_captured, bytes_dropped&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_change)&lt;br /&gt;
|This trigger is checked when the speed of an interfaces changes.&lt;br /&gt;
|interface_speed&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed mismatch for an interface pair&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_mismatch)&lt;br /&gt;
|This trigger is checked when the status or speed of an interfaces changes and mismatches the speed of corresponding interface of a link.&lt;br /&gt;
|link_speed_difference&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Status change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_status_change)&lt;br /&gt;
|This trigger is checked when the status of an interfaces changes.&lt;br /&gt;
|interface_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(global_traffic)&lt;br /&gt;
|This trigger is checked continuously for the total traffic of the device. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC 61850 - GOOSE: State number change&amp;lt;br&amp;gt;&lt;br /&gt;
(iec61850_goose_state_change)&lt;br /&gt;
|This trigger is checked when a change in the state number of GOOSE packets is detected.&lt;br /&gt;
|GoCBRef&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Response times&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_response_times)&lt;br /&gt;
|This trigger is checked whenever an IEC104 ACTCON reply for an ACT has been seen.&lt;br /&gt;
|response_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_traffic)&lt;br /&gt;
|This trigger is checked continuously for each IEC104 connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|percent_loss, absolute_loss, not_in_order&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection end&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_end)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow ended.&lt;br /&gt;
|total_packets, total_bytes, tcp_handshake_time, percent_retransmissions, zero_window_packets, duration, l7_protocol&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_start)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow starts.&lt;br /&gt;
|new_connections, geolocation&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Local IP with multiple MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_local_ip_multiple_macs)&lt;br /&gt;
|This trigger is checked on each new flow of a local IP address and more than one MAC address uses this IP.&lt;br /&gt;
|mac_count&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New local IP address&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_local_ip)&lt;br /&gt;
|This trigger is checked once for each new IP belonging to a private network address range.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_l7_protocol)&lt;br /&gt;
|This trigger is checked once for each new l7 protocol used by an IP.&lt;br /&gt;
|since_start_time, local_ip, l7_protocol&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: TCP handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_tcp_handshake)&lt;br /&gt;
|This trigger is checked after successful TCP handshake or at connection end if handshake failed.&lt;br /&gt;
|handshake_time, server_handshake_time, client_handshake_time, handshake_failed&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Traffic on IP addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active IP or IP group. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase, total_packets, total_bytes, retransmission_ratio, zero_window_packets, tcp_syn_packets, tcp_fin_packets, tcp_rst_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: TTL change&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_ttl_change)&lt;br /&gt;
|This trigger is checked continuously for each active IP.&lt;br /&gt;
|ttl_change&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|LACP: Status change of a channel&amp;lt;br&amp;gt;&lt;br /&gt;
(lacp_channel_status_change)&lt;br /&gt;
|This trigger is checked when the status of a LACP port channel changes.&lt;br /&gt;
|channel_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_l7_protocol)&lt;br /&gt;
|This trigger is checked when a unicast MAC address uses a l7 protocol for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New MAC address&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_address)&lt;br /&gt;
|This trigger is checked once when a new unicast MAC address appears for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: Traffic on MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active MAC address. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|broadcast_packet_rate&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE: PPPoE Discovery traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(pppoe_discovery_traffic)&lt;br /&gt;
|This trigger is checked continuously for PPPoE discovery traffic. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|pppoe_discovery_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Profinet: Traffic of Profinet devices&amp;lt;br&amp;gt;&lt;br /&gt;
(profinet_traffic)&lt;br /&gt;
|This trigger is checked continuously for Profinet traffic. For max jitter, the update interval is defined by the timespan parameter of the attributes. All other attributes will be checked upon event.&lt;br /&gt;
|alarms_low, alarms_high, errors, frames_lost, frames_repeated, frames_wrong_sequence, max_jitter&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PTP: Timestamp packet&amp;lt;br&amp;gt;&lt;br /&gt;
(ptp_timestamp_packet)&lt;br /&gt;
|This trigger is checked when a PTP packet containing a valid timestamp is seen.&lt;br /&gt;
|time_offset&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|QOS: Traffic on QoS classes&amp;lt;br&amp;gt;&lt;br /&gt;
(qos_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active QoS class. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|RTP: Traffic for RTP connections&amp;lt;br&amp;gt;&lt;br /&gt;
(rtp_traffic)&lt;br /&gt;
|This trigger is checked continuously for traffic of each RTP connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|jitter, percent_loss&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SIP: Call end&amp;lt;br&amp;gt;&lt;br /&gt;
(sip_call_end)&lt;br /&gt;
|This trigger is checked when a SIP call ended.&lt;br /&gt;
|duration, status, mos, percent_loss, jitter, total_packets, total_bytes, total_caller_packets, total_callee_packets, total_caller_bytes, total_callee_bytes&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SMB: SMB1 negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(smb_v1_negotiation)&lt;br /&gt;
|This trigger is executed at the beginning of each SMB connection and checks whether insecure SMB1 has been negotiated.&lt;br /&gt;
|&lt;br /&gt;
|none&lt;br /&gt;
|-&lt;br /&gt;
|SSL: Handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ssl_handshake)&lt;br /&gt;
|This trigger is checked during handshake of each SSL connection.&lt;br /&gt;
|certificate_expires, tls_alert_level&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SSL: SSL/TLS version negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(tls_version)&lt;br /&gt;
|This trigger is checked during version negotiation at handshake of each SSL connection.&lt;br /&gt;
|used_tls_version&lt;br /&gt;
|mandatory&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Special trigger properties ====&lt;br /&gt;
Some triggers are checked continuously every configured time span period, so the incidents are generated differently than for fixed event specific triggers like a call end.&lt;br /&gt;
&lt;br /&gt;
# Repeating incidents:  The following triggers will be evaluated every configured time span and will be re-issued whenever the configured attributes match.&lt;br /&gt;
## ip_traffic&lt;br /&gt;
## mac_traffic&lt;br /&gt;
## qos_traffic&lt;br /&gt;
## rtp_traffic&lt;br /&gt;
# Start/stop incidents:  The following triggers are reported once the configured attributes match and for a second time when the attributes no longer match.&lt;br /&gt;
## global_traffic&lt;br /&gt;
&lt;br /&gt;
So for repeating incidents you will get repeated incidents for the same attribute every time span. For example, if an IP address has traffic of 100 Mbit/s for 2 minutes and a rule checks for more than 50 Mbit/s over 30 seconds, the rule will hit 4 times. There will be one incident which will contain the exact number of repetitions for reference.&lt;br /&gt;
&lt;br /&gt;
For start/stop incidents, you will only see two rule hits and the incident description will state the start and stop time.&lt;br /&gt;
&lt;br /&gt;
=== Available attributes ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;absolute_loss&#039;&#039;&#039;: Count of lost packets for IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;alarms_low&#039;&#039;&#039;, &#039;&#039;&#039;alarms_high&#039;&#039;&#039;: Whether an low/high alarm occurred for a Profinet device.&lt;br /&gt;
* &#039;&#039;&#039;broadcast_packet_rate&#039;&#039;&#039;: The attribute is the number of packets per second on average over the configured timespan for MAC broadcast packets.&lt;br /&gt;
* &#039;&#039;&#039;bytes_captured&#039;&#039;&#039;: The amount of bytes captured by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;bytes_dropped&#039;&#039;&#039;: The amount of bytes dropped by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;certificate_expires&#039;&#039;&#039;: This is the number of days until the certificate expires. If the certificate is already expired, the value is &amp;lt;= 0.&lt;br /&gt;
* &#039;&#039;&#039;channel_status&#039;&#039;&#039;: 0 means that the LACP port channel is not synchronized, 1 means that the LACP port channel is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;duration&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The time between first and last packet of the flow.&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The call duration.&lt;br /&gt;
* &#039;&#039;&#039;errors&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;Profinet: Traffic of Profinet devices: Whether errors occured.&lt;br /&gt;
* &#039;&#039;&#039;error_type&#039;&#039;&#039;: equal or not equal to:&lt;br /&gt;
** Format Error: DNS responds a format error.&lt;br /&gt;
** Non-existent Domain: DNS could not find queried domain name.&lt;br /&gt;
** Server Failure: DNS responds server failure.&lt;br /&gt;
* &#039;&#039;&#039;frames_lost&#039;&#039;&#039;, &#039;&#039;&#039;frames_repeated&#039;&#039;&#039;, &#039;&#039;&#039;frames_wrong_sequence&#039;&#039;&#039;: Whether Profinet frames have been seen with problems in sequence. For loss the count of lost frames is calculated.&lt;br /&gt;
* &#039;&#039;&#039;geolocation&#039;&#039;&#039;: checks if a country is part of the connection&lt;br /&gt;
** &#039;&#039;&#039;Direction&#039;&#039;&#039;: The direction of traffic&lt;br /&gt;
*** &#039;&#039;from&#039;&#039;: Traffic is coming &#039;&#039;from the&#039;&#039; specified country&lt;br /&gt;
*** &#039;&#039;to&#039;&#039;: Traffic is going &#039;&#039;to&#039;&#039; the specified country&lt;br /&gt;
*** &#039;&#039;any:&#039;&#039; The specified country is on either side of the connection, or on neither side if the inequality is selected.&lt;br /&gt;
* &#039;&#039;&#039;GoCBRef&#039;&#039;&#039;, The GOOSE control block reference name of the device to filter.&lt;br /&gt;
* &#039;&#039;&#039;gps_sync_status&#039;&#039;&#039;: 0 means that the GPS clock in not synchronized, 1 means that the GPS clock is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;handshake_failed&#039;&#039;&#039;: Whether TCP handshake failed, i.e. one packet of SYN, SYN-ACK, ACK sequence is missing. If no handshake is seen at all but data (e.g. Allegro was started in the middle of a connection), no incident is generated.&lt;br /&gt;
* &#039;&#039;&#039;handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet and the ACK packet for the SYN/ACK packet of the server.&lt;br /&gt;
** &#039;&#039;&#039;client_handshake_time&#039;&#039;&#039;: The TCP handshake time between the SYN/ACK packet of the server and the ACK packet of the client.&lt;br /&gt;
** &#039;&#039;&#039;server_handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet of the client and the SYN/ACK packet of the server.&lt;br /&gt;
* &#039;&#039;&#039;interface_speed&#039;&#039;&#039;: The current speed of the interface in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;interface_status&#039;&#039;&#039;: 0 means interface is down, 1 means interface is up.&lt;br /&gt;
* &#039;&#039;&#039;jitter&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The average jitter of the call, using the maximum value of both call sides.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The average jitter of the RTP connection for the given timespan, using the maximum value of both directions.&lt;br /&gt;
* &#039;&#039;&#039;l4_protocol&#039;&#039;&#039;: The layer 4 protocol. Can be TCP, UDP or other.&lt;br /&gt;
* &#039;&#039;&#039;l7_protocol&#039;&#039;&#039;: The layer 7 protocol short name. Can also be a list, e.g. &amp;quot;HTTP, SSH, DHCP&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;local_ip&#039;&#039;&#039;: Whether the IP is local (10/8, 172.16/12, 192.168/16, 169.254/16, fe80::/10, fc00::/7)&lt;br /&gt;
* &#039;&#039;&#039;link_speed_difference&#039;&#039;&#039;: This is the absolute difference between the speeds of both interface of a link in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;mac_count&#039;&#039;&#039;: The number of different MAC addresses for the corresponding IP address.&lt;br /&gt;
* &#039;&#039;&#039;max_jitter&#039;&#039;&#039;: The max jitter value for a Profinet device in % in a given timespan.&lt;br /&gt;
* &#039;&#039;&#039;mos&#039;&#039;&#039;: The average MOS quality value of the call, using the minimum of both call sides.&lt;br /&gt;
* &#039;&#039;&#039;new_connections&#039;&#039;&#039;: The amount of newly created connections (TCP and UDP) for the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;not_in_order&#039;&#039;&#039;: Count of not in order packets for IEC104 connection. The sequence number could be too high, too low or repeated.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate&#039;&#039;&#039;: The packet rate in packets per second on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate_increase&#039;&#039;&#039;: The packet rate increase in % during the configured timespan compared to the average packet rate of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;percent_loss&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;:  The percentage of RTP packet loss for the call, accounting packets from both directions.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The percentage of RTP packet loss for the given timespan, accounting packets from both directions of the RTP connection.&lt;br /&gt;
** &#039;&#039;IEC104: Traffic for IEC104 connections&#039;&#039;: The percentage of IEC104 packet loss for the given timespan, accounting packets from both directions of the IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;percent_transmissions&#039;&#039;&#039;: The amount of TCP retransmission as a percentage of the total bytes.&lt;br /&gt;
* &#039;&#039;&#039;port_range&#039;&#039;&#039;: The TCP or UDP port. Can be also a range, e.g. 80,443,8443-8445&lt;br /&gt;
* &#039;&#039;&#039;pppoe_discovery_packets&#039;&#039;&#039;: The number of PPPoE discovery packets seen during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;response_time&#039;&#039;&#039;: The response time of IEC104 ACT requests and ACTCON replies.&lt;br /&gt;
* &#039;&#039;&#039;retransmission_ratio&#039;&#039;&#039;: The TCP retransmission ratio seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;since_start_time&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;MAC: New L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when a new Layer-7 protocol for the MAC address appeared.&lt;br /&gt;
** &#039;&#039;MAC: New MAC address&#039;&#039;:  This is the number of seconds after packet processing start when the MAC address appeared. This is useful to only report new MAC address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local IP address&#039;&#039;: This is the number of seconds after packet processing start when the IP address appeared. This is useful to only report new IP address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when the Layer-7 protocol for the IP address appeared.&lt;br /&gt;
** &#039;&#039;Global: Connection start&#039;&#039;: This is the number of seconds after packet processing start when the connection hast been started. This is useful to only report new connections after some learning time.&lt;br /&gt;
* &#039;&#039;&#039;status&#039;&#039;&#039;: The call status code (a three digit number, like 200 for Success)&lt;br /&gt;
* &#039;&#039;&#039;tcp_handshake_time&#039;&#039;&#039;: The TCP handshake time.&lt;br /&gt;
* &#039;&#039;&#039;tcp_fin_packets&#039;&#039;&#039;: The number of TCP FIN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_rst_packets&#039;&#039;&#039;: The number of TCP RST packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_syn_packets&#039;&#039;&#039;: The number of TCP SYN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput&#039;&#039;&#039;: The throughput bandwidth in bit/s on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput_increase&#039;&#039;&#039;: The throughput bandwidth increase in % during the configured timespan compared to the average throughput of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;time_offset&#039;&#039;&#039;: The time offset between the local time and the timestamp seen in the PTP packet.&lt;br /&gt;
* &#039;&#039;&#039;time_since_first_unanswered_request&#039;&#039;&#039;: This is the time span between when the trigger is checked and the first DNS request that has not been answered by the DNS server.&lt;br /&gt;
* &#039;&#039;&#039;time_since_last_mac&#039;&#039;&#039;: This is the number of seconds between changed MAC addresses. If, for examples, dynamic IP assignment is used, changing MAC addresses is normal so the test can be limited to only a certain amount of time.&lt;br /&gt;
* &#039;&#039;&#039;tls_alert_level&#039;&#039;&#039;: The alert level of a TLS alert packet. Can be &#039;fatal&#039;, &#039;warning&#039; or &#039;unknown&#039;. A fatal alert will be sent if e.g. TLS handshake failed and connection shall be closed.&lt;br /&gt;
* &#039;&#039;&#039;total_bytes&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of bytes seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of bytes seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_bytes&#039;&#039;&#039;: The number of bytes seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_bytes&#039;&#039;&#039;: The number of bytes seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;total_packets&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of packets seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of packets seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_packets&#039;&#039;&#039;: The number of packets seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_packets&#039;&#039;&#039;: The number of packets seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;ttl_change&#039;&#039;&#039;: Whether TTL or hop limit has changed.&lt;br /&gt;
* &#039;&#039;&#039;type&#039;&#039;&#039;: The type of PPPoE discovery packet (PADI, PADO, PADR, PADS, PADT or any).&lt;br /&gt;
* &#039;&#039;&#039;used_size&#039;&#039;&#039;: The percentage of the ring buffer that needs to be filled.&lt;br /&gt;
* &#039;&#039;&#039;used_tls_version&#039;&#039;&#039;: The TLS version (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3)&lt;br /&gt;
* &#039;&#039;&#039;window_below_mss&#039;&#039;&#039;: Whether the smallest announced TCP window was below the TCP MSS value. An additional offset is available, to check whether window was smaller than MSS + x bytes.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of packets with a TCP window of 0 for both directions of the flow.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of zero window packets seen in the configured timespan.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings ===&lt;br /&gt;
It is possible to automatically capture traffic for occurred incidents. These global settings control where capture files are stored and the capturing itself can be enabled for each rule separately.&lt;br /&gt;
&lt;br /&gt;
The incident capture feature requires an active packet ring buffer since the packets are extracted from the buffer at the end of the incident period.&lt;br /&gt;
&lt;br /&gt;
Available settings:&lt;br /&gt;
&lt;br /&gt;
* Capture cooldown period: For each rule a cooldown period prevents multiple captures from happening in fast succession. By default, new captures happen firstly after 5 seconds, but any other value of at least 1 second can be configured. The cooldown is applied to each rule separately, but for each individual rule it does not matter if the same or a different entity triggers an incident. The incident is still reported within the cooldown period, but no additional capture is started.&lt;br /&gt;
* Storage device: Select the storage device where the captures should be stored on.&lt;br /&gt;
* Storage directory: Enter the directory where capture files should be stored or leave empty to use the top level directory.&lt;br /&gt;
* Select packet ring buffer to capture from: if multiple ring buffer cluster are in use, you can select which ring buffer to use for extraction.&lt;br /&gt;
* Capture profile: A capture profile can be configured to apply packet truncation rules to the capture file. If unset, the complete packets are captured (if the ring buffer uses separate truncation rules, truncated packets might still be within the capture file).&lt;br /&gt;
&lt;br /&gt;
== Time Profiles ==&lt;br /&gt;
Incident rules can be active configured to be active in configured time spans (time profiles).&lt;br /&gt;
&lt;br /&gt;
Every time profile allows the user to define one or more time spans per day of the week in which a rule should be active. After saving the user is able select the time profile when editing the rule.&lt;br /&gt;
&lt;br /&gt;
Notes: Overlapping time spans will be merged. The earliest a time span is allowed to start is 0 and the latest end is 24, minutes are not allowed. The rule is not active for a day if there is no time span defined for the day.&lt;br /&gt;
&lt;br /&gt;
== Channel configuration ==&lt;br /&gt;
[[File:Incidents channels.png|thumb|600x600px|Channel configuration]]&lt;br /&gt;
Incidents can be reported on different channels. The configuration allows to add new channels so they can be selected in the rule configuration described above.&lt;br /&gt;
&lt;br /&gt;
Each channel can be of type:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;email&#039;&#039;&#039; Incidents will be sent to the email address configured in the [[Global settings]].&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;kafka&#039;&#039;&#039; The incidents are sent to a topic on the configured Apache Kafka server. The message is the same as for syslog.&lt;br /&gt;
* Bootstrap Server: hostname/ip:port of a Kafka Broker or multiple Brokers separated by comma&lt;br /&gt;
* Protocol: Plaintext (no authentication, no encryption), SASL Paintext (Plain authentication, no encryption), SASL SSL (Plain authentication, TLS/SSL encryption)&lt;br /&gt;
* Ignore TLS Certificate: Ignore the TLS Certificate of the Brokers (only SASL SSL)&lt;br /&gt;
* Username: Broker Login (only SASL)&lt;br /&gt;
* Password: Broker Login (only SASL)&lt;br /&gt;
* Topic: The name of the topic into which the Incidents are sent.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;snmp_trap&#039;&#039;&#039; Incidents will be sent to the configured SNMP trap receiver. A MIB file with the Allegro Network Multimeter SNMP trap definitions is available for download in the channel configuration dialog.&lt;br /&gt;
* Version: Supported SNMP version of the trap receiver (SNMP v2c or SNMP v3)&lt;br /&gt;
* Trap receiver (manager) hostname/IP: The trap receiver hostname or IP address&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v2c&#039;&#039;:&lt;br /&gt;
* Community name: SNMP community name expected by the trap receiver&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v3&#039;&#039;:&lt;br /&gt;
* Authentication protocol: Protocol for authenticated messages (MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512)&lt;br /&gt;
* Authentication password: Pass phrase for authenticated messages&lt;br /&gt;
* Privacy protocol: Protocol for message encryption (AES, DES)&lt;br /&gt;
* Privacy password: Pass phrase for message encryption&lt;br /&gt;
* Security name: Security name for authenticated SNMP messages&lt;br /&gt;
* Security level: Security level for SNMP messages (noAuthNoPriv, authNoPriv, authPriv)&lt;br /&gt;
* Engine ID: Authoritative (security) engineID (hexadecimal number)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;syslog&#039;&#039;&#039; Incidents will be sent to the configured syslog server via TCP on any TCP or UDP port.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Incidents add channel.png|thumb|alt=|none|Adding a new channel]]&lt;br /&gt;
Each channel also uses a minimum severity setting, so only incidents are reported which are of at least that severity.&lt;br /&gt;
&lt;br /&gt;
Each channel can be configured to only handle incidents from live traffic or from replayed traffic.&lt;br /&gt;
&lt;br /&gt;
Some incidents cannot be configured via rules and you can choose to get those incidents also via email by enabling the settings at the lower part of the settings page.&lt;br /&gt;
&lt;br /&gt;
== Other settings ==&lt;br /&gt;
&lt;br /&gt;
=== Interface burst incident ===&lt;br /&gt;
[[File:Incidents others.png|thumb|600x600px|Other incidents]]&lt;br /&gt;
Burst incidents with milli-second resolution can be generated when the interface throughput exceeds a configurable threshold. The incident contains a graph of traffic for that interface with some data points before and after the threshold has been exceeded depending on the measurement interval. A PCAP link for capturing from the packet ring buffer is shown. For further investigation of that incident, the button &amp;quot;Use as global time range&amp;quot; can be used to set the global range to the start and end of the incident graph (at least 5 seconds) so that all modules of the Allegro Network Multimeter show that time span.&lt;br /&gt;
&lt;br /&gt;
The incident generation can be configured in the &amp;quot;Other settings&amp;quot; tab as follows:&lt;br /&gt;
* &#039;&#039;&#039;Report &amp;quot;throughput threshold exceeded&amp;quot; with severity&#039;&#039;&#039;: report an incident with the selected severity level if the throughput of any network interface exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput threshold (Mbit/s)&#039;&#039;&#039;: The threshold is configured in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;How long throughput must be above threshold to generate incident (in milliseconds)&#039;&#039;&#039;: The throughput must exceed the threshold for this duration in order to generate the incident. If set to zero (default) the incident is generated immediately after the threshold has been exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput cool-down period between two incidents in milliseconds&#039;&#039;&#039;: Defines the time after an incident where no new incident is generated even if the threshold is exceeded. If this period is passed, throughput incidents could be generated again.&lt;br /&gt;
Since each burst incidents stores the high resolution traffic graph, this feature uses a significant amount of memory. The actual amount is shown below and also depends on the maximum number of incidents configured in the section below.&lt;br /&gt;
&lt;br /&gt;
=== Generic incident settings ===&lt;br /&gt;
This section allows to modify generic settings regarding the incident feature:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum number of stored incidents&#039;&#039;&#039;: This value defines how many incidents are stored before old incidents are removed.  Increasing this value also increased the amount of memory reserved for this feature.&amp;lt;br&amp;gt;The corresponding value for the active setting is shown below, changing the configuration value requires a restart of the packet processing to take affect.&lt;br /&gt;
&lt;br /&gt;
== Occured incidents ==&lt;br /&gt;
This page shows up to the last incidents occurred on the system. The table can be filtered for specific severity levels, as well as for specific trigger sources by selecting the trigger from the drop down menu.&lt;br /&gt;
[[File:Incidents list filter.png|thumb|600x600px|Filter incidents by severity or trigger]]&lt;br /&gt;
The list can also be filtered for the subject of the incident.&lt;br /&gt;
&lt;br /&gt;
Individual incidents can be viewed in detail by clicking on the subject. The details page shows detailed information including links to the relevant measurement page.&lt;br /&gt;
&lt;br /&gt;
Incidents can be deleted individually by clicking on the delete button next to the incident, or all incidents can be deleted by clicking on the button on the top right of the page.&lt;br /&gt;
&lt;br /&gt;
The number of incidents available in this view is limited by a configurable number (firmware &amp;lt;4.1 was limited to 1000), the configuration as available in the &amp;quot;Other settings&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
== Statistics about incident rules ==&lt;br /&gt;
[[File:Incidents stats.png|thumb|600x600px|Statistics about rules]]&lt;br /&gt;
This page shows graphs about how often each rule has been hit both in absolute numbers as well as relatively to how often the rule has been checked.&lt;br /&gt;
&lt;br /&gt;
== Incident list per measurement modules ==&lt;br /&gt;
Since incidents are triggered by different measurement modules (as indicate by the prefix of the trigger name, like the mac or ip module), the list of incidents from that specific module can also be seen in the corresponding tab of the measurement module for quicker access. This per-module view only lists those incidents coming from that module, all other potential incidents are hidden and must be accessed in their corresponding module page, or in the global view in the &amp;quot;Generic -&amp;gt; Incident&amp;quot; menu.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
Some technical limitations apply:&lt;br /&gt;
&lt;br /&gt;
* continuously checked triggers like &amp;quot;IP traffic&amp;quot; are only evaluated if there was at least one packet in the corresponding time interval. Therefore, rules check for zero packet count or throughput will never match.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4831</id>
		<title>Incidents</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4831"/>
		<updated>2024-08-08T16:06:42Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Available triggers */ add GOOSE state number change trigger&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:Incidents_list.png|alt=|none|thumb|800x800px|Incident page]]&lt;br /&gt;
Incidents are used to alarm the user when configured network events occur, usually for traffic based rules, but also for system-specific events. These notifications can be viewed in the web GUI and may also be delivered on various notification channels. Repeating incidents are counted as such and the time of the first and last occurrence of an incident is remembered. This feature can be disabled for some incidents. What makes an incident unique depends on the type of incident. &lt;br /&gt;
&lt;br /&gt;
The incident feature allows to define rules which are checked on the configured trigger point, like when a connection ends, a SIP call ends, or for checks on ongoing traffic. When such a trigger hits, configurable traffic attributes will be checked and if all attributes of a rule match, an incident is created.&lt;br /&gt;
&lt;br /&gt;
Occurred incidents can be seen in the web interface, additionally reporting via the following notification channels is possible:&lt;br /&gt;
* email&lt;br /&gt;
* Apache Kafka&lt;br /&gt;
* SNMP trap&lt;br /&gt;
* syslog&lt;br /&gt;
&lt;br /&gt;
The first occurrence of a medium or high severity incident will also trigger a status notification which is visible at the top right of the web GUI.&lt;br /&gt;
&lt;br /&gt;
A configurable number of incidents will be remembered by the system and if the limit is exceeded the oldest incidents will be discarded [fixed number of 1000 incidents in firmware &amp;lt; 4.1].&lt;br /&gt;
&lt;br /&gt;
== Rule configuration ==&lt;br /&gt;
[[File:Incidents rules.png|thumb|600x600px|Rule configuration]]&lt;br /&gt;
Incident rules can be defined in the &amp;quot;Configuration of incident rules&amp;quot; tab in the menu &amp;quot;Generic -&amp;gt; Incidents&amp;quot;. All changes to the rule configuration will only take effect after saving the current configuration by clicking on the save button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
The page shows a table containing the existing rules and their configuration.&lt;br /&gt;
&lt;br /&gt;
Each existing rule can be modified by clicking on the pencil symbol, or deleted by clicking on the &amp;quot;minus&amp;quot; symbol.&lt;br /&gt;
&lt;br /&gt;
New rules can be added by clicking on the &amp;quot;Add rule&amp;quot; button. A dialog appears allowing for configuration of the rule. The same dialog is used when modifying an existing rule.&lt;br /&gt;
&lt;br /&gt;
=== Add/modify a rule ===&lt;br /&gt;
[[File:Incidents add rule.png|thumb|600x600px|Add rule dialog]]&lt;br /&gt;
A rule is defined by the following settings:&lt;br /&gt;
&lt;br /&gt;
* Rule name: This is an arbitrary text describing the purpose of the rule. This text is shown in the incident list and email/Kafka/SNMP trap/syslog ouptut.&lt;br /&gt;
* Severity: three different severity values &amp;quot;low&amp;quot;, &amp;quot;medium&amp;quot;, and &amp;quot;high&amp;quot; can be used to group more important and less important incidents. Reporting channels can be configured to only report incidents of a minimum severity level.  A rule can also be disabled by choosing the severity level &amp;quot;disabled&amp;quot;. It will not be evaluated and can be enabled later at will.&lt;br /&gt;
* Trigger: The trigger defines when a rule is evaluated. For each available trigger, a description is shown next to it giving more details about the trigger.  Some triggers are evaluated at a very specific time, like when a VoIP call ends, or are evaluated regularly like for throughput triggers of IP traffic which can be configured to be checked periodically.  See list below for a detailed description of the available triggers.&lt;br /&gt;
* Attributes: Attributes are used to make actual comparison of expected values vs. actual values.&lt;br /&gt;
** Each trigger has a different set of attributes which can be checked for, and some triggers don&#039;t need to have an attribute at all.  See list below for a detailed description of the available attributes&lt;br /&gt;
** Up to four attributes can be added by clicking on the &amp;quot;Add attribute&amp;quot; button.&lt;br /&gt;
** Multiple attributes must all match at the same time to let the rule create an incident.&lt;br /&gt;
** Each attribute can be compared to a specific value, so that the actual value is lower, equal, or greater than a defined value.&lt;br /&gt;
** Some attributes have an additional parameter, like a time span which defines how the attribute value is calculated.&lt;br /&gt;
* Virtual link group: The rule can be limited to a selected [[Virtual Link Group functionality|virtual link group]] or to be applied for any group.  Some triggers cannot be limited to a virtual link group so the configuration will be hidden.&lt;br /&gt;
* IP filter: Depending on the selected trigger, the rule can be limited to a specific IP address. The IP filter can also be an IP subnet in the format IP/mask-length (Example: 10.0.0.0/8)&lt;br /&gt;
* IP group: Depending on the selected trigger, the rule can be applied to an IP group instead of an individual IP address.&lt;br /&gt;
* Virtual link group, IP and IP filter can also be used inversely by using the != comparator&lt;br /&gt;
* Report channel: Incidents are always visible in the web interface, but can also be reported via multiple channels which can be configured separately in the tab &amp;quot;Configuration of notification channels&amp;quot;.  Up to ten channels can be selected so that the incident for this rule is reported on each channel.  Also, no channel can be configured so the incident is only accessible on the web interface.&lt;br /&gt;
* Aggregation of recurring Incidents: Incidents are aggregated by default. This means the table only shows the number of incidents of the type and the timestamps of the first and the last  incident. This can be disabled for most of the incidents, so that you are able to see every indent of the incident-type.&lt;br /&gt;
* Time Profiles: You are able to set a profile which defines the active time of an incident rule.&lt;br /&gt;
* Traffic capturing: If supported by the trigger, the rule can be configured to capture the network traffic triggering the rule, including some extra time before and after the incident.&lt;br /&gt;
** Possible options:&lt;br /&gt;
*** Disabled: capturing is disabled for this rule&lt;br /&gt;
*** Live traffic: capturing happens only for live network traffic&lt;br /&gt;
*** Replay traffic: capturing happens only for replayed network traffic (from PCAP files)&lt;br /&gt;
*** Always: capturing happens in all traffic processing types.&lt;br /&gt;
** Extra capture time: configure the number of seconds before the start of the incident and after the end of the incident.&lt;br /&gt;
*** If a time span parameter is used for attributes, the capture time includes this time duration as well.&lt;br /&gt;
** The traffic is automatically filtered to only contain the traffic that actually triggered the rule, i.e., an IP address or an IP group for IP rules.&lt;br /&gt;
&lt;br /&gt;
=== Available triggers ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Trigger name&lt;br /&gt;
!Description&lt;br /&gt;
!Attributes&lt;br /&gt;
!Attribute usage&lt;br /&gt;
|-&lt;br /&gt;
|ARP: MAC change for an IP&amp;lt;br&amp;gt;&lt;br /&gt;
(arp_ip_mac_changed)&lt;br /&gt;
|This trigger is checked on an ARP response and MAC address changed for a requested IP.&lt;br /&gt;
|time_since_last_mac&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server is not responding&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_not_responding)&lt;br /&gt;
|This trigger is checked when a DNS server is not responding for some time. A server is considered unresponsive when more than 3 requests to the DNS server went unanswered for a period of more than 5 seconds. Such a server must have answered at least two requests previously.&lt;br /&gt;
|time_since_first_unanswered_request&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server response error&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_response_error)&lt;br /&gt;
|This trigger is checked when a DNS server responds a configured error of type format error, server failure or non-existing domain&lt;br /&gt;
|error_type&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(global_new_connection)&lt;br /&gt;
|This trigger is checked continuously at connection start. It can be used to report new connections with a certain layer 4 protocol and a given port range.&lt;br /&gt;
|l4_protocol, port_range, since_start_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: GPS synchronization status change&amp;lt;br&amp;gt;&lt;br /&gt;
(global_gps_sync_status_change)&lt;br /&gt;
|This trigger is checked when the GPS clock synchronization status changes.&lt;br /&gt;
|gps_sync_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Number of connections&amp;lt;br&amp;gt;&lt;br /&gt;
(global_connections)&lt;br /&gt;
|This trigger is checked continuously whether the amount of newly created connections exceeds a threshold. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|new_connections&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Regular expressions&amp;lt;br&amp;gt;&lt;br /&gt;
(global_regex_match)&lt;br /&gt;
|This trigger allows to configure a list of regular expressions and is checked for each packet whose L7 data matches one of the regular expressions in the list. Since there are no attributes associated with this trigger, this effectively means that any packet which matches one of the regular expressions will result in an incident. The incident also contains information about which connection this packet belongs to as well as which of the regular expressions matches the packet.&lt;br /&gt;
|&lt;br /&gt;
|no attributes are available for this trigger&lt;br /&gt;
|-&lt;br /&gt;
|Global: Ring buffer&amp;lt;br&amp;gt;&lt;br /&gt;
(global_ring_buffer)&lt;br /&gt;
|This trigger is checked continuously to report changes in the ring buffer.&lt;br /&gt;
|used_size, bytes_captured, bytes_dropped&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_change)&lt;br /&gt;
|This trigger is checked when the speed of an interfaces changes.&lt;br /&gt;
|interface_speed&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed mismatch for an interface pair&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_mismatch)&lt;br /&gt;
|This trigger is checked when the status or speed of an interfaces changes and mismatches the speed of corresponding interface of a link.&lt;br /&gt;
|link_speed_difference&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Status change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_status_change)&lt;br /&gt;
|This trigger is checked when the status of an interfaces changes.&lt;br /&gt;
|interface_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(global_traffic)&lt;br /&gt;
|This trigger is checked continuously for the total traffic of the device. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC 61850 - GOOSE: State number change&amp;lt;br&amp;gt;&lt;br /&gt;
(iec61850_goose_state_change)&lt;br /&gt;
|This trigger is checked when a change in the state number of GOOSE packets is detected.&lt;br /&gt;
|GoCBRef&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Response times&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_response_times)&lt;br /&gt;
|This trigger is checked whenever an IEC104 ACTCON reply for an ACT has been seen.&lt;br /&gt;
|response_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_traffic)&lt;br /&gt;
|This trigger is checked continuously for each IEC104 connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|percent_loss, absolute_loss, not_in_order&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection end&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_end)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow ended.&lt;br /&gt;
|total_packets, total_bytes, tcp_handshake_time, percent_retransmissions, zero_window_packets, duration, l7_protocol&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_start)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow starts.&lt;br /&gt;
|new_connections, geolocation&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Local IP with multiple MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_local_ip_multiple_macs)&lt;br /&gt;
|This trigger is checked on each new flow of a local IP address and more than one MAC address uses this IP.&lt;br /&gt;
|mac_count&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New local IP address&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_local_ip)&lt;br /&gt;
|This trigger is checked once for each new IP belonging to a private network address range.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_l7_protocol)&lt;br /&gt;
|This trigger is checked once for each new l7 protocol used by an IP.&lt;br /&gt;
|since_start_time, local_ip, l7_protocol&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: TCP handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_tcp_handshake)&lt;br /&gt;
|This trigger is checked after successful TCP handshake or at connection end if handshake failed.&lt;br /&gt;
|handshake_time, server_handshake_time, client_handshake_time, handshake_failed&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Traffic on IP addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active IP or IP group. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase, total_packets, total_bytes, retransmission_ratio, zero_window_packets, tcp_syn_packets, tcp_fin_packets, tcp_rst_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: TTL change&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_ttl_change)&lt;br /&gt;
|This trigger is checked continuously for each active IP.&lt;br /&gt;
|ttl_change&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|LACP: Status change of a channel&amp;lt;br&amp;gt;&lt;br /&gt;
(lacp_channel_status_change)&lt;br /&gt;
|This trigger is checked when the status of a LACP port channel changes.&lt;br /&gt;
|channel_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_l7_protocol)&lt;br /&gt;
|This trigger is checked when a unicast MAC address uses a l7 protocol for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New MAC address&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_address)&lt;br /&gt;
|This trigger is checked once when a new unicast MAC address appears for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: Traffic on MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active MAC address. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|broadcast_packet_rate&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE: PPPoE Discovery traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(pppoe_discovery_traffic)&lt;br /&gt;
|This trigger is checked continuously for PPPoE discovery traffic. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|pppoe_discovery_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Profinet: Traffic of Profinet devices&amp;lt;br&amp;gt;&lt;br /&gt;
(profinet_traffic)&lt;br /&gt;
|This trigger is checked continuously for Profinet traffic. For max jitter, the update interval is defined by the timespan parameter of the attributes. All other attributes will be checked upon event.&lt;br /&gt;
|alarms_low, alarms_high, errors, frames_lost, frames_repeated, frames_wrong_sequence, max_jitter&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PTP: Timestamp packet&amp;lt;br&amp;gt;&lt;br /&gt;
(ptp_timestamp_packet)&lt;br /&gt;
|This trigger is checked when a PTP packet containing a valid timestamp is seen.&lt;br /&gt;
|time_offset&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|QOS: Traffic on QoS classes&amp;lt;br&amp;gt;&lt;br /&gt;
(qos_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active QoS class. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|RTP: Traffic for RTP connections&amp;lt;br&amp;gt;&lt;br /&gt;
(rtp_traffic)&lt;br /&gt;
|This trigger is checked continuously for traffic of each RTP connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|jitter, percent_loss&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SIP: Call end&amp;lt;br&amp;gt;&lt;br /&gt;
(sip_call_end)&lt;br /&gt;
|This trigger is checked when a SIP call ended.&lt;br /&gt;
|duration, status, mos, percent_loss, jitter, total_packets, total_bytes, total_caller_packets, total_callee_packets, total_caller_bytes, total_callee_bytes&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SMB: SMB1 negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(smb_v1_negotiation)&lt;br /&gt;
|This trigger is executed at the beginning of each SMB connection and checks whether insecure SMB1 has been negotiated.&lt;br /&gt;
|&lt;br /&gt;
|none&lt;br /&gt;
|-&lt;br /&gt;
|SSL: Handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ssl_handshake)&lt;br /&gt;
|This trigger is checked during handshake of each SSL connection.&lt;br /&gt;
|certificate_expires, tls_alert_level&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SSL: SSL/TLS version negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(tls_version)&lt;br /&gt;
|This trigger is checked during version negotiation at handshake of each SSL connection.&lt;br /&gt;
|used_tls_version&lt;br /&gt;
|mandatory&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Special trigger properties ====&lt;br /&gt;
Some triggers are checked continuously every configured time span period, so the incidents are generated differently than for fixed event specific triggers like a call end.&lt;br /&gt;
&lt;br /&gt;
# Repeating incidents:  The following triggers will be evaluated every configured time span and will be re-issued whenever the configured attributes match.&lt;br /&gt;
## ip_traffic&lt;br /&gt;
## mac_traffic&lt;br /&gt;
## qos_traffic&lt;br /&gt;
## rtp_traffic&lt;br /&gt;
# Start/stop incidents:  The following triggers are reported once the configured attributes match and for a second time when the attributes no longer match.&lt;br /&gt;
## global_traffic&lt;br /&gt;
&lt;br /&gt;
So for repeating incidents you will get repeated incidents for the same attribute every time span. For example, if an IP address has traffic of 100 Mbit/s for 2 minutes and a rule checks for more than 50 Mbit/s over 30 seconds, the rule will hit 4 times. There will be one incident which will contain the exact number of repetitions for reference.&lt;br /&gt;
&lt;br /&gt;
For start/stop incidents, you will only see two rule hits and the incident description will state the start and stop time.&lt;br /&gt;
&lt;br /&gt;
=== Available attributes ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;absolute_loss&#039;&#039;&#039;: Count of lost packets for IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;alarms_low&#039;&#039;&#039;, &#039;&#039;&#039;alarms_high&#039;&#039;&#039;: Whether an low/high alarm occurred for a Profinet device.&lt;br /&gt;
* &#039;&#039;&#039;broadcast_packet_rate&#039;&#039;&#039;: The attribute is the number of packets per second on average over the configured timespan for MAC broadcast packets.&lt;br /&gt;
* &#039;&#039;&#039;bytes_captured&#039;&#039;&#039;: The amount of bytes captured by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;bytes_dropped&#039;&#039;&#039;: The amount of bytes dropped by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;certificate_expires&#039;&#039;&#039;: This is the number of days until the certificate expires. If the certificate is already expired, the value is &amp;lt;= 0.&lt;br /&gt;
* &#039;&#039;&#039;channel_status&#039;&#039;&#039;: 0 means that the LACP port channel is not synchronized, 1 means that the LACP port channel is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;duration&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The time between first and last packet of the flow.&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The call duration.&lt;br /&gt;
* &#039;&#039;&#039;errors&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;Profinet: Traffic of Profinet devices: Whether errors occured.&lt;br /&gt;
* &#039;&#039;&#039;error_type&#039;&#039;&#039;: equal or not equal to:&lt;br /&gt;
** Format Error: DNS responds a format error.&lt;br /&gt;
** Non-existent Domain: DNS could not find queried domain name.&lt;br /&gt;
** Server Failure: DNS responds server failure.&lt;br /&gt;
* &#039;&#039;&#039;frames_lost&#039;&#039;&#039;, &#039;&#039;&#039;frames_repeated&#039;&#039;&#039;, &#039;&#039;&#039;frames_wrong_sequence&#039;&#039;&#039;: Whether Profinet frames have been seen with problems in sequence. For loss the count of lost frames is calculated.&lt;br /&gt;
* &#039;&#039;&#039;geolocation&#039;&#039;&#039;: checks if a country is part of the connection&lt;br /&gt;
** &#039;&#039;&#039;Direction&#039;&#039;&#039;: The direction of traffic&lt;br /&gt;
*** &#039;&#039;from&#039;&#039;: Traffic is coming &#039;&#039;from the&#039;&#039; specified country&lt;br /&gt;
*** &#039;&#039;to&#039;&#039;: Traffic is going &#039;&#039;to&#039;&#039; the specified country&lt;br /&gt;
*** &#039;&#039;any:&#039;&#039; The specified country is on either side of the connection, or on neither side if the inequality is selected.&lt;br /&gt;
* &#039;&#039;&#039;gps_sync_status&#039;&#039;&#039;: 0 means that the GPS clock in not synchronized, 1 means that the GPS clock is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;handshake_failed&#039;&#039;&#039;: Whether TCP handshake failed, i.e. one packet of SYN, SYN-ACK, ACK sequence is missing. If no handshake is seen at all but data (e.g. Allegro was started in the middle of a connection), no incident is generated.&lt;br /&gt;
* &#039;&#039;&#039;handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet and the ACK packet for the SYN/ACK packet of the server.&lt;br /&gt;
** &#039;&#039;&#039;client_handshake_time&#039;&#039;&#039;: The TCP handshake time between the SYN/ACK packet of the server and the ACK packet of the client.&lt;br /&gt;
** &#039;&#039;&#039;server_handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet of the client and the SYN/ACK packet of the server.&lt;br /&gt;
* &#039;&#039;&#039;interface_speed&#039;&#039;&#039;: The current speed of the interface in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;interface_status&#039;&#039;&#039;: 0 means interface is down, 1 means interface is up.&lt;br /&gt;
* &#039;&#039;&#039;jitter&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The average jitter of the call, using the maximum value of both call sides.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The average jitter of the RTP connection for the given timespan, using the maximum value of both directions.&lt;br /&gt;
* &#039;&#039;&#039;l4_protocol&#039;&#039;&#039;: The layer 4 protocol. Can be TCP, UDP or other.&lt;br /&gt;
* &#039;&#039;&#039;l7_protocol&#039;&#039;&#039;: The layer 7 protocol short name. Can also be a list, e.g. &amp;quot;HTTP, SSH, DHCP&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;local_ip&#039;&#039;&#039;: Whether the IP is local (10/8, 172.16/12, 192.168/16, 169.254/16, fe80::/10, fc00::/7)&lt;br /&gt;
* &#039;&#039;&#039;link_speed_difference&#039;&#039;&#039;: This is the absolute difference between the speeds of both interface of a link in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;mac_count&#039;&#039;&#039;: The number of different MAC addresses for the corresponding IP address.&lt;br /&gt;
* &#039;&#039;&#039;max_jitter&#039;&#039;&#039;: The max jitter value for a Profinet device in % in a given timespan.&lt;br /&gt;
* &#039;&#039;&#039;mos&#039;&#039;&#039;: The average MOS quality value of the call, using the minimum of both call sides.&lt;br /&gt;
* &#039;&#039;&#039;new_connections&#039;&#039;&#039;: The amount of newly created connections (TCP and UDP) for the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;not_in_order&#039;&#039;&#039;: Count of not in order packets for IEC104 connection. The sequence number could be too high, too low or repeated.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate&#039;&#039;&#039;: The packet rate in packets per second on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate_increase&#039;&#039;&#039;: The packet rate increase in % during the configured timespan compared to the average packet rate of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;percent_loss&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;:  The percentage of RTP packet loss for the call, accounting packets from both directions.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The percentage of RTP packet loss for the given timespan, accounting packets from both directions of the RTP connection.&lt;br /&gt;
** &#039;&#039;IEC104: Traffic for IEC104 connections&#039;&#039;: The percentage of IEC104 packet loss for the given timespan, accounting packets from both directions of the IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;percent_transmissions&#039;&#039;&#039;: The amount of TCP retransmission as a percentage of the total bytes.&lt;br /&gt;
* &#039;&#039;&#039;port_range&#039;&#039;&#039;: The TCP or UDP port. Can be also a range, e.g. 80,443,8443-8445&lt;br /&gt;
* &#039;&#039;&#039;pppoe_discovery_packets&#039;&#039;&#039;: The number of PPPoE discovery packets seen during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;response_time&#039;&#039;&#039;: The response time of IEC104 ACT requests and ACTCON replies.&lt;br /&gt;
* &#039;&#039;&#039;retransmission_ratio&#039;&#039;&#039;: The TCP retransmission ratio seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;since_start_time&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;MAC: New L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when a new Layer-7 protocol for the MAC address appeared.&lt;br /&gt;
** &#039;&#039;MAC: New MAC address&#039;&#039;:  This is the number of seconds after packet processing start when the MAC address appeared. This is useful to only report new MAC address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local IP address&#039;&#039;: This is the number of seconds after packet processing start when the IP address appeared. This is useful to only report new IP address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when the Layer-7 protocol for the IP address appeared.&lt;br /&gt;
** &#039;&#039;Global: Connection start&#039;&#039;: This is the number of seconds after packet processing start when the connection hast been started. This is useful to only report new connections after some learning time.&lt;br /&gt;
* &#039;&#039;&#039;status&#039;&#039;&#039;: The call status code (a three digit number, like 200 for Success)&lt;br /&gt;
* &#039;&#039;&#039;tcp_handshake_time&#039;&#039;&#039;: The TCP handshake time.&lt;br /&gt;
* &#039;&#039;&#039;tcp_fin_packets&#039;&#039;&#039;: The number of TCP FIN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_rst_packets&#039;&#039;&#039;: The number of TCP RST packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_syn_packets&#039;&#039;&#039;: The number of TCP SYN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput&#039;&#039;&#039;: The throughput bandwidth in bit/s on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput_increase&#039;&#039;&#039;: The throughput bandwidth increase in % during the configured timespan compared to the average throughput of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;time_offset&#039;&#039;&#039;: The time offset between the local time and the timestamp seen in the PTP packet.&lt;br /&gt;
* &#039;&#039;&#039;time_since_first_unanswered_request&#039;&#039;&#039;: This is the time span between when the trigger is checked and the first DNS request that has not been answered by the DNS server.&lt;br /&gt;
* &#039;&#039;&#039;time_since_last_mac&#039;&#039;&#039;: This is the number of seconds between changed MAC addresses. If, for examples, dynamic IP assignment is used, changing MAC addresses is normal so the test can be limited to only a certain amount of time.&lt;br /&gt;
* &#039;&#039;&#039;tls_alert_level&#039;&#039;&#039;: The alert level of a TLS alert packet. Can be &#039;fatal&#039;, &#039;warning&#039; or &#039;unknown&#039;. A fatal alert will be sent if e.g. TLS handshake failed and connection shall be closed.&lt;br /&gt;
* &#039;&#039;&#039;total_bytes&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of bytes seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of bytes seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_bytes&#039;&#039;&#039;: The number of bytes seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_bytes&#039;&#039;&#039;: The number of bytes seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;total_packets&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of packets seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of packets seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_packets&#039;&#039;&#039;: The number of packets seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_packets&#039;&#039;&#039;: The number of packets seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;ttl_change&#039;&#039;&#039;: Whether TTL or hop limit has changed.&lt;br /&gt;
* &#039;&#039;&#039;type&#039;&#039;&#039;: The type of PPPoE discovery packet (PADI, PADO, PADR, PADS, PADT or any).&lt;br /&gt;
* &#039;&#039;&#039;used_size&#039;&#039;&#039;: The percentage of the ring buffer that needs to be filled.&lt;br /&gt;
* &#039;&#039;&#039;used_tls_version&#039;&#039;&#039;: The TLS version (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3)&lt;br /&gt;
* &#039;&#039;&#039;window_below_mss&#039;&#039;&#039;: Whether the smallest announced TCP window was below the TCP MSS value. An additional offset is available, to check whether window was smaller than MSS + x bytes.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of packets with a TCP window of 0 for both directions of the flow.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of zero window packets seen in the configured timespan.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings ===&lt;br /&gt;
It is possible to automatically capture traffic for occurred incidents. These global settings control where capture files are stored and the capturing itself can be enabled for each rule separately.&lt;br /&gt;
&lt;br /&gt;
The incident capture feature requires an active packet ring buffer since the packets are extracted from the buffer at the end of the incident period.&lt;br /&gt;
&lt;br /&gt;
Available settings:&lt;br /&gt;
&lt;br /&gt;
* Capture cooldown period: For each rule a cooldown period prevents multiple captures from happening in fast succession. By default, new captures happen firstly after 5 seconds, but any other value of at least 1 second can be configured. The cooldown is applied to each rule separately, but for each individual rule it does not matter if the same or a different entity triggers an incident. The incident is still reported within the cooldown period, but no additional capture is started.&lt;br /&gt;
* Storage device: Select the storage device where the captures should be stored on.&lt;br /&gt;
* Storage directory: Enter the directory where capture files should be stored or leave empty to use the top level directory.&lt;br /&gt;
* Select packet ring buffer to capture from: if multiple ring buffer cluster are in use, you can select which ring buffer to use for extraction.&lt;br /&gt;
* Capture profile: A capture profile can be configured to apply packet truncation rules to the capture file. If unset, the complete packets are captured (if the ring buffer uses separate truncation rules, truncated packets might still be within the capture file).&lt;br /&gt;
&lt;br /&gt;
== Time Profiles ==&lt;br /&gt;
Incident rules can be active configured to be active in configured time spans (time profiles).&lt;br /&gt;
&lt;br /&gt;
Every time profile allows the user to define one or more time spans per day of the week in which a rule should be active. After saving the user is able select the time profile when editing the rule.&lt;br /&gt;
&lt;br /&gt;
Notes: Overlapping time spans will be merged. The earliest a time span is allowed to start is 0 and the latest end is 24, minutes are not allowed. The rule is not active for a day if there is no time span defined for the day.&lt;br /&gt;
&lt;br /&gt;
== Channel configuration ==&lt;br /&gt;
[[File:Incidents channels.png|thumb|600x600px|Channel configuration]]&lt;br /&gt;
Incidents can be reported on different channels. The configuration allows to add new channels so they can be selected in the rule configuration described above.&lt;br /&gt;
&lt;br /&gt;
Each channel can be of type:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;email&#039;&#039;&#039; Incidents will be sent to the email address configured in the [[Global settings]].&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;kafka&#039;&#039;&#039; The incidents are sent to a topic on the configured Apache Kafka server. The message is the same as for syslog.&lt;br /&gt;
* Bootstrap Server: hostname/ip:port of a Kafka Broker or multiple Brokers separated by comma&lt;br /&gt;
* Protocol: Plaintext (no authentication, no encryption), SASL Paintext (Plain authentication, no encryption), SASL SSL (Plain authentication, TLS/SSL encryption)&lt;br /&gt;
* Ignore TLS Certificate: Ignore the TLS Certificate of the Brokers (only SASL SSL)&lt;br /&gt;
* Username: Broker Login (only SASL)&lt;br /&gt;
* Password: Broker Login (only SASL)&lt;br /&gt;
* Topic: The name of the topic into which the Incidents are sent.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;snmp_trap&#039;&#039;&#039; Incidents will be sent to the configured SNMP trap receiver. A MIB file with the Allegro Network Multimeter SNMP trap definitions is available for download in the channel configuration dialog.&lt;br /&gt;
* Version: Supported SNMP version of the trap receiver (SNMP v2c or SNMP v3)&lt;br /&gt;
* Trap receiver (manager) hostname/IP: The trap receiver hostname or IP address&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v2c&#039;&#039;:&lt;br /&gt;
* Community name: SNMP community name expected by the trap receiver&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v3&#039;&#039;:&lt;br /&gt;
* Authentication protocol: Protocol for authenticated messages (MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512)&lt;br /&gt;
* Authentication password: Pass phrase for authenticated messages&lt;br /&gt;
* Privacy protocol: Protocol for message encryption (AES, DES)&lt;br /&gt;
* Privacy password: Pass phrase for message encryption&lt;br /&gt;
* Security name: Security name for authenticated SNMP messages&lt;br /&gt;
* Security level: Security level for SNMP messages (noAuthNoPriv, authNoPriv, authPriv)&lt;br /&gt;
* Engine ID: Authoritative (security) engineID (hexadecimal number)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;syslog&#039;&#039;&#039; Incidents will be sent to the configured syslog server via TCP on any TCP or UDP port.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Incidents add channel.png|thumb|alt=|none|Adding a new channel]]&lt;br /&gt;
Each channel also uses a minimum severity setting, so only incidents are reported which are of at least that severity.&lt;br /&gt;
&lt;br /&gt;
Each channel can be configured to only handle incidents from live traffic or from replayed traffic.&lt;br /&gt;
&lt;br /&gt;
Some incidents cannot be configured via rules and you can choose to get those incidents also via email by enabling the settings at the lower part of the settings page.&lt;br /&gt;
&lt;br /&gt;
== Other settings ==&lt;br /&gt;
&lt;br /&gt;
=== Interface burst incident ===&lt;br /&gt;
[[File:Incidents others.png|thumb|600x600px|Other incidents]]&lt;br /&gt;
Burst incidents with milli-second resolution can be generated when the interface throughput exceeds a configurable threshold. The incident contains a graph of traffic for that interface with some data points before and after the threshold has been exceeded depending on the measurement interval. A PCAP link for capturing from the packet ring buffer is shown. For further investigation of that incident, the button &amp;quot;Use as global time range&amp;quot; can be used to set the global range to the start and end of the incident graph (at least 5 seconds) so that all modules of the Allegro Network Multimeter show that time span.&lt;br /&gt;
&lt;br /&gt;
The incident generation can be configured in the &amp;quot;Other settings&amp;quot; tab as follows:&lt;br /&gt;
* &#039;&#039;&#039;Report &amp;quot;throughput threshold exceeded&amp;quot; with severity&#039;&#039;&#039;: report an incident with the selected severity level if the throughput of any network interface exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput threshold (Mbit/s)&#039;&#039;&#039;: The threshold is configured in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;How long throughput must be above threshold to generate incident (in milliseconds)&#039;&#039;&#039;: The throughput must exceed the threshold for this duration in order to generate the incident. If set to zero (default) the incident is generated immediately after the threshold has been exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput cool-down period between two incidents in milliseconds&#039;&#039;&#039;: Defines the time after an incident where no new incident is generated even if the threshold is exceeded. If this period is passed, throughput incidents could be generated again.&lt;br /&gt;
Since each burst incidents stores the high resolution traffic graph, this feature uses a significant amount of memory. The actual amount is shown below and also depends on the maximum number of incidents configured in the section below.&lt;br /&gt;
&lt;br /&gt;
=== Generic incident settings ===&lt;br /&gt;
This section allows to modify generic settings regarding the incident feature:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum number of stored incidents&#039;&#039;&#039;: This value defines how many incidents are stored before old incidents are removed.  Increasing this value also increased the amount of memory reserved for this feature.&amp;lt;br&amp;gt;The corresponding value for the active setting is shown below, changing the configuration value requires a restart of the packet processing to take affect.&lt;br /&gt;
&lt;br /&gt;
== Occured incidents ==&lt;br /&gt;
This page shows up to the last incidents occurred on the system. The table can be filtered for specific severity levels, as well as for specific trigger sources by selecting the trigger from the drop down menu.&lt;br /&gt;
[[File:Incidents list filter.png|thumb|600x600px|Filter incidents by severity or trigger]]&lt;br /&gt;
The list can also be filtered for the subject of the incident.&lt;br /&gt;
&lt;br /&gt;
Individual incidents can be viewed in detail by clicking on the subject. The details page shows detailed information including links to the relevant measurement page.&lt;br /&gt;
&lt;br /&gt;
Incidents can be deleted individually by clicking on the delete button next to the incident, or all incidents can be deleted by clicking on the button on the top right of the page.&lt;br /&gt;
&lt;br /&gt;
The number of incidents available in this view is limited by a configurable number (firmware &amp;lt;4.1 was limited to 1000), the configuration as available in the &amp;quot;Other settings&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
== Statistics about incident rules ==&lt;br /&gt;
[[File:Incidents stats.png|thumb|600x600px|Statistics about rules]]&lt;br /&gt;
This page shows graphs about how often each rule has been hit both in absolute numbers as well as relatively to how often the rule has been checked.&lt;br /&gt;
&lt;br /&gt;
== Incident list per measurement modules ==&lt;br /&gt;
Since incidents are triggered by different measurement modules (as indicate by the prefix of the trigger name, like the mac or ip module), the list of incidents from that specific module can also be seen in the corresponding tab of the measurement module for quicker access. This per-module view only lists those incidents coming from that module, all other potential incidents are hidden and must be accessed in their corresponding module page, or in the global view in the &amp;quot;Generic -&amp;gt; Incident&amp;quot; menu.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
Some technical limitations apply:&lt;br /&gt;
&lt;br /&gt;
* continuously checked triggers like &amp;quot;IP traffic&amp;quot; are only evaluated if there was at least one packet in the corresponding time interval. Therefore, rules check for zero packet count or throughput will never match.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Path_measurement&amp;diff=4813</id>
		<title>Path measurement</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Path_measurement&amp;diff=4813"/>
		<updated>2024-07-24T15:34:55Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Two-Way-Latency */ language improvements&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Path measurement ==&lt;br /&gt;
&lt;br /&gt;
The path measurement module allows to passively measure the packet loss and latency between two Allegro Network Multimeter installations.  &lt;br /&gt;
&lt;br /&gt;
For example, a network connection (line/link) between the main office and a remote office can be analyzed by installing one Allegro Network Multimeter at the main office and another Allegro Network Multimeter at the remote office.  &lt;br /&gt;
&lt;br /&gt;
Only network traffic (packets) passing through both Allegro Network Multimeters can be analyzed. The packet loss and two-way-latency thereof is measured and shown in graphs. &lt;br /&gt;
&lt;br /&gt;
The time synchronization setting (e.g. NTP/PTP or OFF) should be the same on both devices for the best results.&lt;br /&gt;
&lt;br /&gt;
It is also possible to use a single device to measure the traffic delay/losses between two different [[Virtual Link Group functionality|virtual link groups]]. In this mode, the primary device is used as a client too.&lt;br /&gt;
&lt;br /&gt;
Two pcap capture files can be compared to do an offline path measurement with previously captured files in two different locations.&lt;br /&gt;
&lt;br /&gt;
=== Live analysis ===&lt;br /&gt;
In live analysis mode, the packets are either gathered from the local device and a configured remote Allegro Network Multimeter, or from two different sources on the same local devices (different interfaces, different VLAN tags, or similar parameters available through virtual link group configuration).&lt;br /&gt;
&lt;br /&gt;
=== PCAP analysis ===&lt;br /&gt;
In PCAP mode, two PCAP files are processed the matching packets are used to determine the delay and possible loss between both files. For best results, the file should be recorded on the same device (by running two captures simultaneously from different sources), or from two devices with good time synchronization. &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The main device captures packet meta data from the remote (or client) device which takes only a fraction of the total traffic. Approximately 5% additional bandwidth is required for this capture connection. So for fully loaded 100 Mbit/s connection to the remote location an additional load of ~5 Mbit/s is required to get packet information to the main device.&lt;br /&gt;
&lt;br /&gt;
The measurement connection can be a separate line or can be run over the line that is measured, the capture connection will be automatically ignored for the measurement.&lt;br /&gt;
&lt;br /&gt;
The measurement module must be configured with a maximum packet delay.  This delay describes the amount of time the main device waits for packet information to arrive from the remote device. The delay must be large enough to cover the actual latency of the connection and delay of the capture connection. Typical values are between 2 and 5 seconds. Larger values requires more memory to buffer packet meta data so very large values might only be selectable on larger Multimeter devices (Allegro 1000 or greater).&lt;br /&gt;
== Configuration live measurement ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-           &lt;br /&gt;
|[[File:Ap-mm-path-measurement-1.png|600px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Settings ===&lt;br /&gt;
&lt;br /&gt;
* Enable analysis: This will disable or enable the path measurement feature. When disabled, no additional memory is used. When enabled, memory for the packet buffer is used which cannot be used for other analyzing modules thus reducing the maximum time the device can go back in time.&lt;br /&gt;
Primary device settings:&lt;br /&gt;
* Description of this main device: This field is only used for informational purposes to identify the main device. It can be freely chosen, for example to the location the device is installed. This field can also be left empty to use the default name &#039;&#039;&#039;main&#039;&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Primary device VLG filter:&#039;&#039;&#039; It is possible to limit the amount of data analyzed by any configured virtual link group. Often, the primary device is located at a central network point and thus sees a lot of traffic that is not actually going to the remote device. The algorithm will automatically take this into account, but using a filter will reduce the processing overhead as well as the amount of data that needs to be buffered.&lt;br /&gt;
&lt;br /&gt;
The following &#039;&#039;&#039;Client device&#039;&#039;&#039; configuration section configures the access to the remote device:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Device to use&#039;&#039;&#039;: To use a remote device for path measurement, you first need to add that device as a remote device to the list of [[Multi-device settings]]. It does not matter if the device is active or not.  You can select the device from the list of known multi-devices. You can also select the primary device as a client to analyze the traffic between two different virtual link groups.&lt;br /&gt;
* &#039;&#039;&#039;Device description&#039;&#039;&#039;: Similar to the description of the main device, this field is for informational purpose only and has no other effect than helping identifying the remote device in the statistics. Usually the location of the remote device is entered.&lt;br /&gt;
* &#039;&#039;&#039;Client device VLG filter&#039;&#039;&#039;: The traffic used for comparison at the main device can be filtered to any virtual link group defined at the client device. There are two main purposes for this setting:&lt;br /&gt;
*# reduce the amount of data required to be transferred to the main device. The path measurement only considers connections seen on both devices, but the client device of course cannot know if any connection it sees also is visible on the main device. If only traffic of a specific virtual link group (VLG) actually reaches the main device, using this filter can reduce the amount of data transferred and later dismissed.&lt;br /&gt;
*# filter duplicate traffic: If, for some reason, traffic is seen multiple times, it can create wrong results as the number of occurrences differs from main to client devices. A VLG filter can fix this problem by only considering one part of the total traffic.&lt;br /&gt;
&lt;br /&gt;
Measurement settings:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum packet delay&#039;&#039;&#039;: This field describes the maximum amount of seconds to wait for packet information from the remote device.&lt;br /&gt;
: It basically means that the main devices waits for this number of seconds before deciding if a packet has been lost or not. If the data from the remote device arrives before those number of seconds, the path measurement can account the packet loss, if any and the two-way latency. This value must be at least as large as the worst-case latency between both measurement sites.&lt;br /&gt;
: Usually 3 seconds are more than enough but when the network in between can have a very long delay, you can increase the value. This will, however, use more main memory for the packet buffer.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum original packet rate:&#039;&#039;&#039; This field defines the maximum packet rate that is to be expected. It directly defines the necessary amount of memory for storing packet information for the defined packet delay. The field can be left empty (or zero) to use the maximum supported packet rate of the device. This value usually only has to be adjusted if the debug information about &amp;quot;Packets processed too early&amp;quot; is non-zero which indicates that the packet rate exceeded the assumed packet rate limit.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ignore IP identification field&#039;&#039;&#039;: This option can be enabled if the IP identification field in the IPv4 header is modified by some component in the network. Often it remains constant for a single packet so this option should be left disabled as it will also increase the chance of reporting duplicate packets. But if you notice symmetrical packet loss you can enable this option to see if this helps.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Ignore VLAN tags for connection matching&#039;&#039;&#039;: The path measurement only calculate loss and latency for connections seen on both devices. Usually the connection ID takes the IP pairs, port ports and possible VLAN tags into account. If a VLAN is different on both machines for the some connection, then this option must be enabled to be able to correlate the connection and calculate correct statistics.&lt;br /&gt;
* &#039;&#039;&#039;Account latency also per IP connection&#039;&#039;&#039;: Enabling this option will let the path measurement also store the latency for each individual IP connection, which of course increases the memory usage.&lt;br /&gt;
* &#039;&#039;&#039;Enable NAT mode&#039;&#039;&#039; (Firmware &amp;gt;= 4.3): This feature will enable support for Network-Address-Translation setup (typical for firewalls or internet uplink routers).&lt;br /&gt;
** &#039;&#039;&#039;Internal NAT subnet/mask:&#039;&#039;&#039; This value describes the internal IP addresses that gets translated into an external IP address. An example value is &amp;quot;192.168.1.0/24&amp;quot; if all internal devices uses IP addresses in the range 192.168.1.0-192.168.1.255.&lt;br /&gt;
** &#039;&#039;&#039;NAT-side internal subnet/mask:&#039;&#039;&#039; This value defines the external IP address. It can also be an IP subnet (for example, if multiple external IP addresses are used). An example value is &amp;quot;10.1.2.3&amp;quot; if the NAT router is using the external IP 10.1.2.3 and all its internal clients are visible under this IP.&lt;br /&gt;
** &#039;&#039;&#039;Account unmatched flows:&#039;&#039;&#039; This option allows to monitor also connections there are not seen on the other measurement side. This is useful to see blocked connections in firewall setups.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum packet length for lost packets PCAP&#039;&#039;&#039;: If a lost packet capture is running this setting configures the packet length for these packets. Keep this number as low as possible for optimal memory consumption. Each packet will be stored in memory until it is either confirmed by the client device (considered as not lost) or the maximum packet delay is over and the packet is considered lost and written to the PCAP.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Threshold for high latency packets PCAP&#039;&#039;&#039;: This is the threshold for a high latency PCAP. This is applied for single device measurement only. Packets with a larger time difference in their configured VLGs as this threshold can be captured. The latency value must not be larger than the maximum packet delay.&lt;br /&gt;
&lt;br /&gt;
The settings must be saved but to actually take effect, a restart of the packet processing is necessary. If this step is required, a notification will tell so at the bottom of the page under &#039;&#039;&#039;Required actions&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Parameters currently in use ===&lt;br /&gt;
&lt;br /&gt;
This section shows the current state of the measurement engine. The engine might be inactive even if the feature is enabled. Usually a restart is required to actually make it active. If active, the current packet delay is shown. It might be different from the selected value in the configuration above, but if so a note appears that a restart is required.&lt;br /&gt;
&lt;br /&gt;
=== Required actions ===&lt;br /&gt;
&lt;br /&gt;
An info box appears if the a restart of the packet processing is required. The shown link leads to the page &#039;&#039;&#039;Settings → Administration&#039;&#039;&#039; where the restart can be triggered. The device itself does not need to be rebooted, only the packet processing must be restarted which usually takes only a few seconds.&lt;br /&gt;
&lt;br /&gt;
== Configuration PCAP measurement ==&lt;br /&gt;
[[File:Path-measurement-pcap-settings.png|border|660x660px]]&lt;br /&gt;
&lt;br /&gt;
The path measurement can also be done based on two capture files created from two different network locations. The separate configuration tab &amp;quot;Configuration PCAP Analysis&amp;quot;  allows to select two files from attached storage devices.&lt;br /&gt;
&lt;br /&gt;
The files are replayed based on the packet time stamps within each file, in chronological order. Matching packets are only recognized if they are within the maximum packet delay. If the difference of the timestamps is larger, a time-delta adjustment value can be entered which will be added to the timestamp of the client packets. Negative values are possible as well to be able to adjust the time in both directions. If the time difference is too large, a lot of packet loss are reported, or even a &amp;quot;network setup problem&amp;quot; note is shown in the overview tab. If the time delta between both files is not known, a test run can be enabled to calculate the approximate difference. When both files are fully processed in this test run, the result is shown in the overview tab and this value can be used for the actual analysis. &lt;br /&gt;
&lt;br /&gt;
The settings are similar to the live measurement. VLG filter can be applied to both files, but an option also allows to disable the use of the configured virtual link groups, or use separate groups for each file. In contrast to live mode, a VLG does not need to be used to differentiate traffic since it is clear from the selected file which one is the primary traffic and which one is the client traffic. But of course VLG can be used to filter out traffic that should not be part of the analysis.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Measurement settings&amp;quot; contains all settings from the live measurement plus three options only applicable in PCAP mode.&lt;br /&gt;
&lt;br /&gt;
* Virtual link group mode: Select to either use:&lt;br /&gt;
** Use global VLG settings: Use the VLG configuration configured globally on this device.&lt;br /&gt;
** Use separate VLG per file: Create a temporary VLG for each file so all statistics can be accessed for each individual file regardless of the configuration of the regular virtual link groups.&lt;br /&gt;
** Disable use of VLGs: Disable all VLG configurations and use one common view of all data.&lt;br /&gt;
* Run analysis in main memory: The analysis requires a relatively large amount of memory depending on the setting values for packet delay and packet rate. In live mode, this data is always kept in main memory for performance reasons, but in PCAP mode the data  is stored on a local storage device by default. This is slower but does not require a lot of additional memory reserved, especially when parallel pcap analysis is enabled.&lt;br /&gt;
* Storage device to use: If a storage device is available, the first one is selected by default. Otherwise the system disc is used to store the packet comparison information. The approximate amount of storage space required is shown below the selection box.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;IMPORTANT NOTE 1:&amp;lt;/u&amp;gt; The configuration values for packet rate and packet delay can be adjusted to reflect the actual parameters of the given PCAP files. The values are in relation to packet time of the PCAP files, not real time. So the packet rate does not correlate with the actual processing speed (which might be higher or lower than the packet rate within the PCAP files). The packet rate should be adjusted if the debug value &amp;quot;Packets processed too early&amp;quot; is non-zero. The default packet delay is set to 1 second to reduce the amount of memory required but should be adjusted to the expected maximum delay within the PCAP recording.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;IMPORTANT NOTE 2:&amp;lt;/u&amp;gt; If time stamp adjustment is used, all time stamps from the client file are adjusted which affects the analysis, but also the capture of these packets. So when doing a capture from that client file data, the packet time stamps are no longer the original timestamps but adjusted by the configured time delta.&lt;br /&gt;
&lt;br /&gt;
== Measurement statistics ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-           &lt;br /&gt;
|[[File:Ap-mm-path-measurement-2.png|600px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Measurement ===&lt;br /&gt;
The &#039;&#039;&#039;measurement&#039;&#039;&#039; tab show the real-time results of the ongoing measurement.&lt;br /&gt;
At the top the current state of the measurement engine and the remote connection is shown. &lt;br /&gt;
The measurement status can be &#039;&#039;&#039;not running&#039;&#039;&#039; if it is disabled, &#039;&#039;&#039;warming up&#039;&#039;&#039; if the engine waits for synchronization with remote device, and &#039;&#039;&#039;running&#039;&#039;&#039; if it actually measures data.&lt;br /&gt;
The &#039;&#039;&#039;remote client status&#039;&#039;&#039; indicates if the connection to the remote device is established. &lt;br /&gt;
Since the packet information are gathered real regular capturing from the remote device, the capture connection is visible in the capture section of the remote device and might be stopped there. &lt;br /&gt;
If the measurement connection is stopped or stopped working for other reasons (remote device unavailable, etc), the status box will turn red and a button appears to reconnect to the remote device. &lt;br /&gt;
If the reconnect fails, an error message appears with detailed information what was going wrong.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; Typical errors are:&#039;&#039;&#039;&lt;br /&gt;
*remote device inaccessible (are the IP and port settings correct?)&lt;br /&gt;
* authentication error (invalid credentials?) When both boxes are green, the measurement is running and the four graphs show the real-time results.&lt;br /&gt;
* Insufficient memory: Usually may only appear in PCAP analysis mode indicating that the values for packet delay and packet rate are too large. Either reduce the values or use a larger storage devices capable of storing the required data (amount shown in the configuration section)&lt;br /&gt;
&lt;br /&gt;
==== Two-Way-Latency ====&lt;br /&gt;
&lt;br /&gt;
The first graph shows the latency measured from the main device to the remote device and back. &lt;br /&gt;
It cannot (due to asynchronous local time sources) measure the one-way latency of a single packet but only the duration of packets going in both directions.&lt;br /&gt;
Example: Assume a packet A is seen from main to remote device and another packet B is seen from remote to main device.&lt;br /&gt;
The time difference when packet A is seen on main and on remote device plus the time difference of packet B being seen on remote and main device is taken into account to determine the two-way latency. Packet A and packet B do not need to be related in any way.&lt;br /&gt;
If traffic is going only in one direction, the measurement will not show any time result (even though packet loss is still visible).&lt;br /&gt;
For each second, the average, minimum, and maximum two-way-latency is accounted and shown in the graph. &lt;br /&gt;
To the left of the graph the statistics for the visible time range is shown, changing the zoom level or time interval will update the values accordingly.&lt;br /&gt;
&lt;br /&gt;
==== One-Way-Latency ====&lt;br /&gt;
If the path measurement is used on a single device (by selecting the primary device as client device too), the one-way latency is shown for each direction instead of the two-way-latency. PCAP buttons are available for a capture of high latency packets that exceeds the configured threshold.&lt;br /&gt;
&lt;br /&gt;
==== Lost packets ====&lt;br /&gt;
&lt;br /&gt;
The second and third graph show the number of lost packets in each direction. Lost packets are only accounted for connections that have been seen on both devices.&lt;br /&gt;
&lt;br /&gt;
Depending on the installation point and routing setup, connections might be not be routed to the second device on purpose. These connections are not accounted as loss on the other device. &lt;br /&gt;
&lt;br /&gt;
The second graph accounts all packets that have been seen on the remote device, but are missed on the main device. That means that those packets got loss on its way to the main device.&lt;br /&gt;
&lt;br /&gt;
Accordingly, the third graph accounts all packets that have been seen on the main device, but are missed on the remote device. An additional counter &amp;quot;&#039;&#039;&#039;Client packet drop due to overload&#039;&#039;&#039;&amp;quot; indicates if some packets could not have been captured on the client device so they are missing for comparison at the main device.  If this value is not zero, those packets are accounted as packet loss even though it might not be actually losses. For correct measurements, make sure the graph for remote packet drops is never non-zero. These drops may happen due to several reasons:&lt;br /&gt;
&lt;br /&gt;
A capture button for lost packets is available for capturing packets seen on main device but considered as lost on the remote device. The capture is available for live mode only, i.e. if a time interval is selected in the Allegro Network Multimeter it will be ignored. When starting the capture, the path measurement engine will store all packets on the main device with the configured length and write them after the packet delay timeout into the PCAP. Only packets of the main device are considered (packets lost on main device but seen on remote device will &#039;&#039;&#039;not&#039;&#039;&#039; be captured). For a single device measurement between different VLGs the lost packets PCAP buttons are available for both directions (main to remote or remote to main).&lt;br /&gt;
&lt;br /&gt;
#System capture overload: If multiple captures are running in parallel, the CPU might be overloaded. Check the &#039;&#039;&#039;All&#039;&#039;&#039; tab in the Capture page to see how many captures are running.  In best case there is only the one capturing connection to the main device.&lt;br /&gt;
#The capturing connection is encrypted with SSL. The small Allegro 200 has a limited encryption capacity so for large traffic this can be a bottleneck. The only solution is to use a more powerful Allegro Network Multimeter.&lt;br /&gt;
#Capture drops can also occur if the network connection is not capable of transferring the data fast enough. Rule of thumb is that approximately 5% of the total traffic is used for the measurement connection. For example, if the traffic is 500 MBit/s, the measurement requires ~25 MBit/s of bandwidth on the management port.&lt;br /&gt;
&lt;br /&gt;
==== Monitored packet rate ====&lt;br /&gt;
The fourth graph shows all packets that are monitored for the path measurement. This will cover all connections that have been seen on both devices.&lt;br /&gt;
&lt;br /&gt;
==== NAT collision packet rate ====&lt;br /&gt;
This graph shows the number of packets per second that appeared in connections with colliding IP addresses/ports in NAT setups. This happens if matching packets are seen on both sides for more than two connections (the internal and the external connection). Since this is only relevant for matching packets within the defined timeout, it may help to reduce the timeout if possible.&lt;br /&gt;
&lt;br /&gt;
=== IP addresses ===&lt;br /&gt;
&lt;br /&gt;
The second tab shows packet loss information for each pair of [[Common table columns#IP|IP addresses]]. This statistic covers all IP connections that has been seen on both measurement sides. The table shows the number of packets that have been counted for each communication pair. Additionally the number of packets seen on the main device and the corresponding packet loss is shown. The same statistics are shown for the client device too. You can click on the IP address to go to the detailed statistics of the IP module to check which kind of traffic was happening for that IP. Two graphs are shown for each IP pair which shows the packet loss for both direction on one graph and the total packets in the second graph.&lt;br /&gt;
There is also a capture button to capture traffic for the IP pair.  The captured traffic is only the traffic seen on the main device, it will not contain any packet from the client device as the main device does not have the packet data information available. To capture traffic from the client device, you have to go to the web interface of the client device and start a capture on that device.&lt;br /&gt;
&lt;br /&gt;
The IP pair table also show the two-way latencies for the traffic of each IP pair, if the corresponding toggle is selected above the table. In single-device mode, also the one-way latency is shown.&lt;br /&gt;
&lt;br /&gt;
For each IP, there is also a link to the IP connections. If enabled, each individual IP connection also stores the latencies for more detailed view.&lt;br /&gt;
&lt;br /&gt;
==== Switching graph modes ====&lt;br /&gt;
&lt;br /&gt;
The toggle buttons above the graphs allow to switch the graph modes from absolute values to relative values. This setting will show the lost packets in relation to the total (monitored) traffic.  The second option allows to show Mbit/s throughput instead of the packet rate.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
There are some limitations about the path measurement:&lt;br /&gt;
&lt;br /&gt;
# Due to technical reasons, large clock adjustments cannot be filtered out. So in such cases, a very large two-way-latency is measured. Both devices need not be time synchronized per se, however, considerable time differentiation must be avoided. This means that time synchronization (e.g. NTP/PTP) should either be enabled or disabled on both devices for best results. Clock differentiation miss-measurements are however one-time events, and will not lead to false values for the following packets.&lt;br /&gt;
# The maximum supported packet size for the path measurement is currently 2048 bytes. Larger packets are truncated for the measurement.&lt;br /&gt;
# WAN optimizer and similar devices which rewrite some of the traffic are not supported either. If packet data is changed (like modifying the TCP header, adding TCP options, etc) the flow will account packet loss on both sides as the original packets are not seen on the other side. If the device in between also modifies the IP addresses or ports, the flows will be accounted as unmonitored.&lt;br /&gt;
# The global setting for the packet length accounting should be set to the same value on both devices. Otherwise identical packets might be considered different because of different length and the bandwidth information will be inconsistent.&lt;br /&gt;
# (Only firmware &amp;lt; 4.3): NAT setups and different VLAN combinations on main and client are not supported at the moment. Such flows will be accounted as unmonitored flows in the debug view.&lt;br /&gt;
&lt;br /&gt;
== Typical use cases==&lt;br /&gt;
&lt;br /&gt;
See [[Analyze connections between remote sites]] to get a detailed overview of use cases and device setup.&lt;br /&gt;
&lt;br /&gt;
==  Debug information ==&lt;br /&gt;
&lt;br /&gt;
The debug information tab shows additional statistics which are usually only relevant for identifying problems in the path measurement, either program errors or test setup errors.&lt;br /&gt;
&lt;br /&gt;
#&#039;&#039;&#039;Monitored flows seen on both devices:&#039;&#039;&#039;The monitored flows describes all IPv4 and IPv6 connections that have been seen on both devices and are used for calculating the latency and packet loss. Only this traffic can be considered for the actual measurement. In a working setup, the value must be non-zero.&lt;br /&gt;
#&#039;&#039;&#039;Flows seen on both devices without matching packets:&#039;&#039;&#039; If a flow is seen on both devices but not a single packet matches on both sides, it indicates a potential network setup problem. This probably means the packet is somehow modified by a device in between both measurement points. This setup is not supported. Usually this value should be zero. Small non-zero values can be ok, if the first number of monitored flows is much larger.&lt;br /&gt;
#&#039;&#039;&#039;Unmonitored flows seen only on &#039;&#039;main&#039;&#039;:&#039;&#039;&#039; This counter shows the number of IP connections that are only visible at the main device. It means that for those connections no matching client packet has been received. If the main device also sees network traffic that is not routed to the client device, this value can be non-zero.&lt;br /&gt;
#&#039;&#039;&#039;Unmonitored flows seen only on &#039;&#039;client&#039;&#039;&#039;&#039;&#039;: This is the same counter as for the main device, but counting the connections on the client device that have not been seen on the main. Again, if the client device sees traffic that is not routed to the main, it is fine to see non-zero values here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Possible problematic scenarios:&lt;br /&gt;
&lt;br /&gt;
* There is a device between main and client that modifies the traffic (like a WAN optimizer): You will notice a larger value for counter 2 (flow without matching packets),almost zero value for counter 1 (flows seen on both devices).&lt;br /&gt;
&lt;br /&gt;
* There is a device between main and client that changes ports and IP addresses (a NAT): &lt;br /&gt;
&lt;br /&gt;
You will notice almost zero values for counter 1 and 2, but high values for counter 3 and 4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Both scenarios are not supported by the path measurement.  &lt;br /&gt;
&lt;br /&gt;
Please adjust the test setup to disable any device modifying the network as described above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows the following counters for the main and remote device:&lt;br /&gt;
&lt;br /&gt;
#The counter about packets seen on all devices measures the total amount of packets monitored and considered for the analysis.&lt;br /&gt;
#The packets seen only on one devices indicates how much packets are lost on the other devices.&lt;br /&gt;
#Duplicated packets: This counter includes packets that are duplicated or have the same checksum. It is valid to see non-zero values here. Some protocols like broadcast actually do not differ in the payload so the packet checksum will be identical. If those packets appear within the packet delay time window, it is accounted as a duplicate to the previous one.&lt;br /&gt;
#Failed to process on main device: This counter indicates that packets from the client have been discarded due to overload of the main device. The main device was not fast enough to process client packets. This usually means the local packet rate (at the main device) is too high. &lt;br /&gt;
# Ignored on main device: These packets are ignored because the flow is unknown to the main devices. This happens when the packet checksum is received from the client but no connection information for that packet is known by the main device. This value should always be zero. Otherwise it means that the number of active flows is too high.&lt;br /&gt;
#Packets processed too early: This counter covers packets that packets could not be stored long enough to hit the configured packet delay limit.  This happens when the packet rate is higher than the supported packet rate of the main device.&lt;br /&gt;
#NAT collision packets: This counter counts all packets that are seen on both sides for multiple connections so the Network Address Translation could not be reversed for connection tracking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below the table, two graphs showing time drift information are visible. &lt;br /&gt;
The first graph shows the &#039;&#039;&#039;packet delay&#039;&#039;&#039;. It is the time between a matching packet from the main device and the client. &lt;br /&gt;
This value describes for how long the main device needed to wait to get a matching packet from the client. &lt;br /&gt;
This value should always be much lower than the maximum packet delay configured in the path measurement configuration. &lt;br /&gt;
The value cannot be larger than the maximum as then packets can no longer be matched. If the value keeps reaching the maximum, two problems are possible:&lt;br /&gt;
&lt;br /&gt;
#The delay between main device and client is large due to generic network delay. For example, if a high-latency connection is used for path measurement, it can even take a few seconds for a packet info to arrive. Configure a larger maximum packet delay.&lt;br /&gt;
#The bandwidth of the connection from the client (the client’s upload speed) is too small to satisfy the requirement for the checksum connection. This problem can be identified if even increasing the maximum packet delay does not help. If the bandwidth is too small, the packet will hit the maximum delay for any value configured, it will just take a little longer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this case try to use an alternative network connection to connect to the client device.&lt;br /&gt;
&lt;br /&gt;
The second graph shows the time drift between the main device and client device. &lt;br /&gt;
Usually there will always be a drift between the clocks of both devices (if they are not synchronized by some mean). Even large drifts (hours, days, etc) are typically not a problem as the two-way latency zero-out the drift. &lt;br /&gt;
But if the drift increased dramatically (like multiple seconds) constantly over a large period of time, it usually indicates a bandwidth overload just like the first graph.&lt;br /&gt;
&lt;br /&gt;
== FAQ ==&lt;br /&gt;
# What does the note &#039;&#039;&#039;Network setup problem detected: Packet modification or complete loss&#039;&#039;&#039; means?&lt;br /&gt;
#:This message box appears if flows have been identified for which not a single packet could be seen on both sides. Usually this means that there is some device in between both measurement points that modifies the packet. This can be WAN optimizer which rewrite TCP connection for improved network performance. Such setup is not supported.&lt;br /&gt;
#: It can also mean that some other packet field is modified at some point in the network. One field that is known for modification is the IP identification field in the IPv4 header. For this case an additional option can be enabled to ignore this field.&lt;br /&gt;
#: When using the PCAP analysis mode, this error can also appear if the files are not time synchronized. In this case, a time adjustment value must be entered to synchronize both files. A test run can be used to calculate a possible value.&lt;br /&gt;
# What does the note &#039;&#039;&#039;VLAN tag mismatch detected for matching packets on main device and client&#039;&#039;&#039; means?&lt;br /&gt;
#:This message indicates that matching packets have been seen on both devices but the used VLAN tag is different. Depending on the measurement setup, this may indicate an error as for connection matching the IP addresses, ports, and VLAN tags are used unless the option to ignore the VLAN tag is enabled. Therefore, the identical packets will be accounted for two different connections often resulting in shown packet loss.&lt;br /&gt;
#: Often, the recommended solution is to enable the configuration option &#039;&#039;&#039;Ignore VLAN tags for connection matching&#039;&#039;&#039;.&lt;br /&gt;
# What kind of packet information is used to determine latency and packet loss?&lt;br /&gt;
#:Both measurement devices calculate checksums starting from the layer 3 packet data to compare packet information on both sides.  This means for IPv4 and IPv6 traffic, the Ethernet header including possible VLAN tags is ignored. For non-IP traffic, the complete layer 2 packet is used so this traffic can only be analyzed in switched networks.&lt;br /&gt;
# What can I do if I think the packet loss is wrong?&lt;br /&gt;
#: Often, incorrect loss is reported because there is some kind of packet modification that is not support. See the list of limitations above if any of those apply to your setup. Also, try the configuration options to ignore some packet fields to see if that makes any difference.&lt;br /&gt;
#: You can contact [[Reaching Allegro Support|our support]] and if possible provide a small capture from both network sides that cover the same traffic. This will help us to find the reason for the shown packet loss.&lt;br /&gt;
# How can I distinguish between real packet loss and reported packet loss due to packet modifications?&lt;br /&gt;
#: Packet loss is reported when a packet checksum does not match any other checksum reported by the other side within the configured maximum packet delay timeout. Reasons for such an event are&lt;br /&gt;
## Actual loss&lt;br /&gt;
##: The packet have been seen on one side but not the other. In this event the loss graph is usually different between the main device and remote device.&lt;br /&gt;
## Packet modification&lt;br /&gt;
##: Some component modifies the packet in some way. Since such a modification is usually done in both direction (sender and receiver), the packet loss is visible on both sides. Therefore the loss graph is symmetrical.&lt;br /&gt;
## Overloaded management connection&lt;br /&gt;
##: The management connection is used to get packet checksum from the remote device. If the connection is not fast enough to transmit the checksum within the configured maximum packet delay time, the packets are then reported as loss.&lt;br /&gt;
##: This can be verified by looking at the debug graph &#039;&#039;&#039;Packet delay between local and remote packets&#039;&#039;&#039;. In this event, the time will always be at the top limit that is the maximum packet delay time.&lt;br /&gt;
## Temporary network failure&lt;br /&gt;
##: In this event the packets are really lost on both directions so the loss graph may also look similar. However, since no packet can be transmitted to the other side, you will also see no entries in the two-way-latency graph.&lt;br /&gt;
# How is the two-way latency calculated?&lt;br /&gt;
#:The system monitors individual IP connections and stores the time difference between the occurrence of the same checksum on both the main and client devices. Since this time difference contains the unknown time drift between both systems, it cannot be used directly as a latency value. Instead, the system waits until a packet from the opposite direction has been seen on both systems. Both time differences for direction A-&amp;gt;B and B-&amp;gt;A build the actual two-way latency. Since both packets may not be directly related, it is not directly comparable with a round-trip time. It gives however an accurate view on how long data took transmitting back and forth during each individual time segment.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Live_filtering_of_tables&amp;diff=4761</id>
		<title>Live filtering of tables</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Live_filtering_of_tables&amp;diff=4761"/>
		<updated>2024-04-26T09:12:14Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Available keywords */ add tds.loginack.tdsversion keyword&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== General ==&lt;br /&gt;
Multiple measuring statistics show all entries in tables with different columns for all measured values, which can be sorted individually. &lt;br /&gt;
&lt;br /&gt;
Since often there are a lot of entries, the Allegro Network Multimeter allows for filtering those tables to quickly find the relevant information.&lt;br /&gt;
&lt;br /&gt;
All search text areas show a hint about for what kind of information the table can be filtered. Once entered, the table is updated immediately while still updating the measured values for the visible entries. &lt;br /&gt;
&lt;br /&gt;
This live filtering allows for viewing live data only for the entries that are currently important for the investigation of a network problem.&lt;br /&gt;
&lt;br /&gt;
== Single word matching == &lt;br /&gt;
It is always possible the enter a single word for filtering. &lt;br /&gt;
&lt;br /&gt;
In this case the Allegro Network Multimeter will match any possible field for the given text.&lt;br /&gt;
&lt;br /&gt;
For instance, in the IP statistics, the IP will be matched if a number representation is entered, with an optional subnet mask length (1.2.3.4/8). &lt;br /&gt;
&lt;br /&gt;
The known alternative names are also matched, so it is possible to enter a host name and the list will show only those entries which contain the string in the DHCP name, DNS name, HTTP name, or any other name field.&lt;br /&gt;
&lt;br /&gt;
== Complex filter expressions == &lt;br /&gt;
Some tables allow for using more complex expressions for flexible live filtering. &lt;br /&gt;
&lt;br /&gt;
The support of filter expressions is indicated by the hint text in the search area, which informs that the entered string must start with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
In this mode it is possible to enter expressions in the form of &#039;&#039;&#039;keyword == value&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The keyword depends on the actual context of the search field, often &#039;&#039;&#039;name&#039;&#039;&#039;, &#039;&#039;&#039;ip&#039;&#039;&#039;, or &#039;&#039;&#039;packets&#039;&#039;&#039; is possible. &lt;br /&gt;
&lt;br /&gt;
The web interface will give hints about all possible keywords in the current context which usually directly correlate with the available columns.&lt;br /&gt;
&lt;br /&gt;
Also, the comparison operator can be &#039;&#039;&#039;==&#039;&#039;&#039; or &#039;&#039;&#039;!=&#039;&#039;&#039; for equal or unequal compare, but for numbers &#039;&#039;&#039;&amp;lt;&#039;&#039;&#039;, &#039;&#039;&#039;&amp;gt;=&#039;&#039;&#039;, etc can be used too.&lt;br /&gt;
&lt;br /&gt;
Multiple expressions can be combined with boolean operators &#039;&#039;&#039;and&#039;&#039;&#039; or &#039;&#039;&#039;or&#039;&#039;&#039; (or equivalent &#039;&#039;&#039;&amp;amp;&amp;amp;&#039;&#039;&#039; / &#039;&#039;&#039;||&#039;&#039;&#039;). Also, parentheses can be used to enter even more complex expressions.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
# Show all IPs with at least 100 packets, that have been active within the last minute:&lt;br /&gt;
#: &amp;lt;code&amp;gt;(packets &amp;gt; 100 and lasttime &amp;lt; 60)&amp;lt;/code&amp;gt;&lt;br /&gt;
# Show all IPs that showed up not more than 24 hours ago and have an associated name of alice or bob:&lt;br /&gt;
#: &amp;lt;code&amp;gt;( (firsttime &amp;lt; 86400 and ( name == alice or name == bob ))&amp;lt;/code&amp;gt;&lt;br /&gt;
#: 86400 is the number of seconds in 24 hours (24 * 60 * 60)&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
 &lt;br /&gt;
* It is possible to enter values in quotes if they contain reserved characters used for the expressions (&amp;lt;,=,&amp;amp;,(, etc).&lt;br /&gt;
* Under the search text area, the interface will show all valid values for the last element entered in the expression.&lt;br /&gt;
* A green check mark indicates if the entered expression has been successfully parsed.&lt;br /&gt;
&lt;br /&gt;
== Available keywords ==&lt;br /&gt;
&lt;br /&gt;
The available keywords vary depending on the web interface section.&lt;br /&gt;
&lt;br /&gt;
The web interface will always show the available keywords in the specific context. The following table contains all keywords:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Keyword !! Description  &lt;br /&gt;
|-           &lt;br /&gt;
|name || any name information (DNS, DHCP, SSL, HTTP, custom names, etc)&lt;br /&gt;
|-           &lt;br /&gt;
|name.dns || DNS name information only for IPs and IP connections&lt;br /&gt;
|-&lt;br /&gt;
|category ||the category of a custom name&lt;br /&gt;
|-&lt;br /&gt;
|ip ||the IP address of the client or server side&lt;br /&gt;
|-&lt;br /&gt;
|ipgroup ||  the name(s) of the matching IP groups if configured&lt;br /&gt;
|-&lt;br /&gt;
|clientip || the IP address of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverip || the IP address of the server&lt;br /&gt;
|-&lt;br /&gt;
|packets || the number of packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|rxpackets ||  the number of received packets&lt;br /&gt;
|-&lt;br /&gt;
|txpackets ||  the number of transmitted packets&lt;br /&gt;
|-&lt;br /&gt;
|clientpackets ||  the number of packets sent by the client&lt;br /&gt;
|-&lt;br /&gt;
|serverpackets ||  the number of packets sent by the server&lt;br /&gt;
|-&lt;br /&gt;
|bytes || the number of bytes (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|rxbytes ||  the number of received bytes&lt;br /&gt;
|-&lt;br /&gt;
|txbytes || the number of transmitted bytes&lt;br /&gt;
|-&lt;br /&gt;
|clientbytes ||  the number of bytes sent by the client&lt;br /&gt;
|-&lt;br /&gt;
|serverbytes ||  the number of bytes sent by the server&lt;br /&gt;
|-&lt;br /&gt;
|pps ||  the packets per second value&lt;br /&gt;
|-&lt;br /&gt;
|rxpps||the received packets per second value&lt;br /&gt;
|-&lt;br /&gt;
|txpps|| the transmitted packets per second value&lt;br /&gt;
|-&lt;br /&gt;
| bps ||the bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|rxbps ||the received bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|txbps||the transmitted bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|firsttime||the time of the first activity&lt;br /&gt;
|-&lt;br /&gt;
|lasttime || the time of the last activity&lt;br /&gt;
|-&lt;br /&gt;
|tcppackets||the number of TCP packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|udppackets|| the number of UDP packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|tcppayload||the amount of bytes processed as TCP payload&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetrans||the amount of payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransRx||the amount of received payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransTx||the amount of transmitted payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
| tcpRetransClient||the amount of client payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransServer ||the amount of server payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|mac||the MAC address of the client or server&lt;br /&gt;
|-&lt;br /&gt;
|port||the layer 4 port of the client or server (a number or range)&lt;br /&gt;
|-&lt;br /&gt;
|clientport||the layer 4 port of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverport||the layer 4 port of the server&lt;br /&gt;
|-&lt;br /&gt;
|l4protocol|| the layer 4 protocol name (tcp, udp, icmp, etc)&lt;br /&gt;
|-&lt;br /&gt;
|l7protocol||the layer 7 protocol name (http, dns, etc)&lt;br /&gt;
|-&lt;br /&gt;
|tcpend ||the ending reason of a TCP connection (open, fin, rst, timeout)&lt;br /&gt;
|-&lt;br /&gt;
|tcpstate ||the state of a TCP connection (valid, invalid, unknown)&lt;br /&gt;
|-&lt;br /&gt;
|tcpclienthandshake||the TCP handshake time in milliseconds for the client (time to answer the server&#039;s syn packet)&lt;br /&gt;
|-&lt;br /&gt;
|tcpserverhandshake||the TCP handshake time in milliseconds for the server (time to answer the client&#039;s syn packet)&lt;br /&gt;
|-&lt;br /&gt;
|tcpdataresponseavg||the average TCP data response time in milliseconds of the connection&lt;br /&gt;
|-&lt;br /&gt;
|tcpdataresponsemax||the max TCP data response time in milliseconds of the connection (any direction)&lt;br /&gt;
|-&lt;br /&gt;
|httpresponse ||the HTTP response time for a request&lt;br /&gt;
|-&lt;br /&gt;
|httpstatus||the HTTP status code of the response&lt;br /&gt;
|-&lt;br /&gt;
|sslhandshake||the SSL handshake time (time for the server to answer the SSL setup)&lt;br /&gt;
|-&lt;br /&gt;
|packetratio||the client/server packet ratio as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| vlan ||the VLAN tag (a tag or &#039;none&#039;), both outer and inner VLAN will be considered&lt;br /&gt;
|-&lt;br /&gt;
|outervlan||the outer VLAN tag (a tag or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
| innervlan||the inner VLAN tag (a tag or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|interface||the interface ID (a number or a range)&lt;br /&gt;
|-&lt;br /&gt;
|validconnections||the number of valid TCP connections&lt;br /&gt;
|-&lt;br /&gt;
|invalidconnections|| the number of invalid TCP connections&lt;br /&gt;
|-&lt;br /&gt;
| profinetFrameId||the number of a Profinet frame ID&lt;br /&gt;
|-&lt;br /&gt;
| minCallerJitter||the minimum jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| avgCallerJitter|| the average jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| maxCallerJitter||the maximum jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| minCalleeJitter|| the minimum jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCalleeJitter ||the average jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCalleeJitter||the maximum jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minJitter ||the minimum jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| avgJitter || the average jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxJitter||the maximum jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minCallerMos||the minimum MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCallerMos ||the average MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCallerMos||the maximum MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minCalleeMos ||the minimum MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCalleeMos || the average MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCalleeMos||the maximum MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| minMos||the minimum MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgMos||the average MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxMos||the maximum MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minClientJitter ||the minimum jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxClientJitter ||the maximum jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgClientJitter ||the average jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minServerJitter ||the minimum jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxServerJitter||the maximum jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgServerJitter||the average jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|statusCode||the number of a status code&lt;br /&gt;
|-&lt;br /&gt;
|mpls||the MPLS label (a label or &#039;none&#039;), both outer and inner MPLS label will be considered&lt;br /&gt;
|-&lt;br /&gt;
| outermpls||the outer MPLS label (a label or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|innermpls|| the inner MPLS label (a label or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|qos||Filter for presence or absence of QoS. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|qosIpDscp||the DSCP value in the IP header&lt;br /&gt;
|-&lt;br /&gt;
|qosMplsTc|| the traffic class value in the outermost MPLS label stack entry&lt;br /&gt;
|-&lt;br /&gt;
|qosVlanPcp||the priority code point in the outermost VLAN tag&lt;br /&gt;
|-&lt;br /&gt;
|usedCipherSuite||the negotiated SSL/TLS cipher suite name&lt;br /&gt;
|-&lt;br /&gt;
|usedTlsVersion&lt;br /&gt;
|the negotiated SSL/TLS version&lt;br /&gt;
|-&lt;br /&gt;
|pppoeSessionId||the PPPoE session ID (in hexadecimal or decimal representation)&lt;br /&gt;
|-&lt;br /&gt;
|mtu||the MTU value in bytes&lt;br /&gt;
|-&lt;br /&gt;
|rxMtu ||the MTU value of the RX direction in bytes&lt;br /&gt;
|-&lt;br /&gt;
|txMtu||the MTU value of the TX direction in bytes&lt;br /&gt;
|-&lt;br /&gt;
|clientMtu||the MTU value of the sent direction of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|serverMtu||the MTU value of the sent direction of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|callId|| the string value of a SIP call ID or similar identifier (e.g. P-Palladion-ID)&lt;br /&gt;
|-&lt;br /&gt;
| dnsresponse|| the DNS response time (for DNS connections)&lt;br /&gt;
|-&lt;br /&gt;
| dnsstatus||matches DNS response status (either a DNS reply code, e.g, 0 for success, or noanswer for unanswered DNS connections&lt;br /&gt;
|-&lt;br /&gt;
|dnsname||the requested DNS name&lt;br /&gt;
|-&lt;br /&gt;
|callerRtpPacketLoss || the amount of lost packets of the RTP flow of the caller&lt;br /&gt;
|-&lt;br /&gt;
| calleeRtpPacketLoss||the amount of lost packets of the RTP flow of the callee&lt;br /&gt;
|-&lt;br /&gt;
| rtpPacketLoss || the amount of lost packets of the RTP flow of the caller or callee&lt;br /&gt;
|-&lt;br /&gt;
| clientRtpPacketLoss ||the amount of lost packets of the RTP flow of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverRtpPacketLoss||the amount of lost packets of the RTP flow of the server&lt;br /&gt;
|-&lt;br /&gt;
|callerRtpJitterBufferExceeded || the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the caller&lt;br /&gt;
|-&lt;br /&gt;
| calleeRtpJitterBufferExceeded||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the callee&lt;br /&gt;
|-&lt;br /&gt;
| rtpJitterBufferExceeded || the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the caller or callee&lt;br /&gt;
|-&lt;br /&gt;
| clientRtpJitterBufferExceeded ||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverRtpJitterBufferExceeded||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the server&lt;br /&gt;
|-&lt;br /&gt;
| callerRtpPayloadType||the payload type of the RTP flow of the caller as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|calleeRtpPayloadType|| the payload type of the RTP flow of the callee as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|rtpPayloadType||the payload type of the RTP flow of the caller or callee as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|duration, sipDuration ||the duration of a connection or a SIP call, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|callerDuration|| the duration of a SIP call of the caller, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|calleeDuration||the duration of a SIP call of the callee, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|diffRtpSipDuration||the difference between the duration of a SIP call and its RTP connection, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|sipQos||Filter for presence or absence of QoS in SIP calls. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|sipQosIpDscp||the DSCP value in the IP header of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
| sipQosMplsTc|| the traffic class value in the outermost MPLS label stack entry of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
|sipQosVlanPcp||the priority code point in the outermost VLAN tag of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQos||Filter for presence or absence of QoS in RTP streams. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosIpDscp ||the DSCP value in the IP header of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosMplsTc||the traffic class value in the outermost MPLS label stack entry of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosVlanPcp||the priority code point in the outermost VLAN tag of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindow || the number of TCP zero window packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowRx||the number of TCP zero window packets in RX direction&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowTx|| the number of TCP zero window packets in TX direction&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowClient||the number of TCP zero window packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowServer ||the number of TCP zero window packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSize||the value of the announced TCP window size in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSizeClient||the value of the announced TCP window size of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSizeServer|| the value of the announced TCP window size of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSize|| the smallest announced TCP window in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSizeClient|| the smallest announced TCP window of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSizeServer|| the smallest announced TCP window of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScale&lt;br /&gt;
|the value of the announced TCP window scale&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScaleClient&lt;br /&gt;
|the value of the announced TCP window scale of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScaleServer&lt;br /&gt;
|the value of the announced TCP window scale of the server&lt;br /&gt;
|-&lt;br /&gt;
| tcpUsedWindowSize||the value of the actual used TCP window in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpUsedWindowSizeClient||the value of the actual used TCP window of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
| tcpUsedWindowSizeServer||the value of the actual used TCP window of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSyn||the number of TCP SYN packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynClient||the number of TCP SYN packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynServer||the number of TCP SYN packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynRx||the number of received TCP SYN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynTx||the number of transmitted TCP SYN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAck||the number of TCP SYN-ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckClient||the number of TCP SYN-ACK packets of the client&lt;br /&gt;
|-&lt;br /&gt;
| tcpSynAckServer||the number of TCP SYN-ACK packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckRx||the number of received TCP SYN-ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckTx||the number of transmitted TCP SYN-ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpRst||the number of TCP RST packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstClient||the number of TCP RST packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstServer ||the number of TCP RST packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstRx||the number of received TCP RST packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstTx||the number of transmitted TCP RST packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpFin || the number of TCP FIN packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinClient||the number of TCP FIN packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinServer||the number of TCP FIN packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinRx||the number of received TCP FIN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinTx||the number of transmitted TCP FIN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAck || the number of TCP DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckClient||the number of TCP DUP ACK packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckServer||the number of TCP DUP ACK packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckRx||the number of received TCP DUP ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckTx||the number of transmitted TCP DUP ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpMissedData||the estimated amount of TCP bytes to not see&lt;br /&gt;
|-&lt;br /&gt;
|traceroute||the IP or host name of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tracerouteHostname||the host name of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tracerouteIp||the IP of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tlsAlert||the description of TLS alert messages (see RFC8446 section 6 for a full list)&lt;br /&gt;
|-&lt;br /&gt;
|tlsAlertLevel||the TLS alert level (can be warning, fatal or unknown)&lt;br /&gt;
|-&lt;br /&gt;
|supportedTlsVersion&lt;br /&gt;
|the announced TLS version&lt;br /&gt;
|-&lt;br /&gt;
|supportedCipherSuite&lt;br /&gt;
| the announced SSL/TLS cipher suite name&lt;br /&gt;
|-&lt;br /&gt;
|spi||IPSec SPI (security parameter index), a number in hexadecimal or decimal representation&lt;br /&gt;
|-&lt;br /&gt;
|number||The phone number of the caller or callee of a SIP call. Extracted from &#039;From&#039;, &#039;To&#039;, &#039;Contact&#039;, &#039;P-Asserted-Identity&#039;, or &#039;P-Preferred-Identity&#039; field or request URI.&lt;br /&gt;
|-&lt;br /&gt;
|callerNumber||The phone number of the caller of a SIP call. Extracted from &#039;From&#039; field.&lt;br /&gt;
|-&lt;br /&gt;
|calleeNumber||The phone number of the callee of a SIP call. Extracted from &#039;To&#039; field.&lt;br /&gt;
|-&lt;br /&gt;
|packetTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max). This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|callerPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the caller. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|calleePacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the callee. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|clientPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the client. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|serverPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the server. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|serverMaxPacketLossBurst || The longest RTP packet loss in a row of the server.&lt;br /&gt;
|-&lt;br /&gt;
|clientMaxPacketLossBurst || The longest RTP packet loss in a row of the client.&lt;br /&gt;
|-&lt;br /&gt;
|callerMaxPacketLossBurst || The longest RTP packet loss in a row of the caller.&lt;br /&gt;
|-&lt;br /&gt;
|calleeMaxPacketLossBurst || The longest RTP packet loss in a row of the callee.&lt;br /&gt;
|-&lt;br /&gt;
|maxPacketLossBurst || The longest RTP packet loss in a row of either client/server or caller/callee.&lt;br /&gt;
|-&lt;br /&gt;
|peerRole || The peer role. Could be either client or server.&lt;br /&gt;
|-&lt;br /&gt;
|ssrc || The RTP synchronization source value of either client or server. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|clientSsrc || The RTP synchronization source value of the client. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|serverSsrc || The RTP synchronization source value of the server. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|callerSsrc || The RTP synchronization source value of the caller. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|calleeSsrc || The RTP synchronization source value of the callee. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|peers || The amount of peers of an IP address.&lt;br /&gt;
|-&lt;br /&gt;
|sipCallerIp || The IP address of the SIP caller, usually the sender of SIP Invite packet.&lt;br /&gt;
|-&lt;br /&gt;
|sipCalleeIp || The IP address of the SIP callee, usually the receiver of SIP Invite packet.&lt;br /&gt;
|-&lt;br /&gt;
|minTtl || The min value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|maxTtl || The max value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|avgTtl || The avg value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|}&lt;br /&gt;
There are some additional keywords to support some limited set of wireshark compatible filter expressions:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Keyword&lt;br /&gt;
!Description&lt;br /&gt;
!Available in firmware version&lt;br /&gt;
|-&lt;br /&gt;
|ip.addr&lt;br /&gt;
|the IPv4 address (either source or destination)&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
| ip.src&lt;br /&gt;
| the IPv4 source address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ip.dst&lt;br /&gt;
|the IPv4 destination address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.addr&lt;br /&gt;
|the IPv6 address (either source or destination)&lt;br /&gt;
| 3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.src&lt;br /&gt;
|the IPv6 source address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.dst&lt;br /&gt;
|the IPv6 destination address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.port&lt;br /&gt;
|the source or destination port of a TCP connection&lt;br /&gt;
| 3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.srcport&lt;br /&gt;
|the source port of a TCP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.dstport&lt;br /&gt;
|the destination port of a TCP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.port&lt;br /&gt;
|the source or destination port of a UDP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.srcport&lt;br /&gt;
|the source port of a UDP connection&lt;br /&gt;
| 3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.dstport&lt;br /&gt;
|the destination port of a UDP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|smb.shareName&lt;br /&gt;
|the Name of the smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.connectionEncrypted&lt;br /&gt;
|if the connection between a client and a server is encrypted (possible values are: &amp;quot;encrypted&amp;quot; and &amp;quot;unencrypted&amp;quot;&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.negotiationState&lt;br /&gt;
|the negotiation state of a connection&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.successfulConnects / smb.failedConnects&lt;br /&gt;
|number of successful/failed connects to a smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.successfulDisconnects / smb.failedDisconnects&lt;br /&gt;
|number of successful/failed disconnects to a smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialect&lt;br /&gt;
|the used dialects of a smb server&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialectReq&lt;br /&gt;
|the dialects requested by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialectUsed&lt;br /&gt;
|the dialects used by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedOpens / smb.successfulOpens&lt;br /&gt;
|the number of successful/failed opens of a file by a client of a file&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedOpens / smb.successfulOpens&lt;br /&gt;
|the number of successful/failed opens of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedCloses / smb.successfulCloses&lt;br /&gt;
|the number of successful/failed closes of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedDeletes / smb.successfulDeletes&lt;br /&gt;
|the number of successful/failed deletes of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.firstOpen / smb.lastOpen&lt;br /&gt;
|time since the first/last open&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.lastClose&lt;br /&gt;
|time since the file got closed the last time&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.lastDelete&lt;br /&gt;
|time since  the file got deleted the last time&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.bytesWritten / smb.bytesRead&lt;br /&gt;
|the number of bytes written to/read from the file&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
| icmp.pingLatencyMin&lt;br /&gt;
| the ping latency (min) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.pingLatencyAvg&lt;br /&gt;
| the ping latency (average) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.pingLatencyMax&lt;br /&gt;
| the ping latency (max) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.requests&lt;br /&gt;
| the number of ICMP ping requests of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.replies&lt;br /&gt;
| the number of ICMP ping replies of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| ip.ttl.min / max / avg&lt;br /&gt;
| the min / max / avg TTL value of an IPv4&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| ipv6.hlim.min / max / avg&lt;br /&gt;
| the min / max / avg hop limit value of an IPv6&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| tds.loginack.tdsversion&lt;br /&gt;
| the used TDS version as negotiated during the login process&lt;br /&gt;
|4.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Wireshark filter syntax==&lt;br /&gt;
Wireshark uses a filter syntax that is not directly compatible to the filter syntax in the Allegro Network Multimeter as it is more strict regarding the expression and also supports many packet header related fields.&lt;br /&gt;
&lt;br /&gt;
However, Wireshark conversion filters for IPV4, IPV6, TCP, and UDP can be used directly:&lt;br /&gt;
&lt;br /&gt;
*Example: The filter &amp;quot;(ip.addr eq 1.2.3.4 and ip.addr eq 2.3.4.5) and (tcp.port eq 80 and tcp.port eq 1234)&amp;quot; is a valid filter expression. The corresponding native expression is:  &amp;quot;ip == 1.2.3.4 and ip == 2.3.4.5 and port == 80 and port == 1234 and l4protocol == TCP&amp;quot; (the last part about the l4protocol can be left out since most of the time there is only one connection matching the port portion).&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4760</id>
		<title>Measurement modules</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4760"/>
		<updated>2024-04-26T08:57:39Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* L7 - Application Layer */ add entries for IEC 61850 and TDS modules&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter provides a number of network measurement modules for different use cases. Here&lt;br /&gt;
you can find a list of modules and a short description and see the specific module for detailed documentation. &lt;br /&gt;
&lt;br /&gt;
== Generic modules ==&lt;br /&gt;
&lt;br /&gt;
* [[Capture_module|Capture module]]&lt;br /&gt;
:The Capture module lists all running captures which were started interactively in any other module. &lt;br /&gt;
:It also allows for starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
* [[Path_measurement|Path measurement]]&lt;br /&gt;
:This module allows you to measure packet loss and latency between two Allegro Network Multimeter installations.&lt;br /&gt;
&lt;br /&gt;
* [[Packet_ring_buffer|Packet ring buffer]]&lt;br /&gt;
:The packet ring buffer feature allows you to create a buffer of fixed size on an external storage device to which all processed packets will be recorded. If the fixed size buffer is full, the oldest packets in the buffer will be replaced with new packets in a round-robin fashion.&lt;br /&gt;
&lt;br /&gt;
* [[PCAP#Pcap_analysis_module|Pcap analysis module]]&lt;br /&gt;
:The Pcap analysis module allows for the analysis of Pcap files by sending them to the appliance. After analyzing a Pcap, the web interface displays all the metadata as if the packets are live traffic at the time of the Pcap recording.&lt;br /&gt;
&lt;br /&gt;
* [[Incidents#Incidents_module|Incidents module]]&lt;br /&gt;
:The Incidents module allows for notifications to be created when specific network incidents are detected.&lt;br /&gt;
&lt;br /&gt;
== L2 - WiFi ==&lt;br /&gt;
&lt;br /&gt;
* [[WiFi module]]&lt;br /&gt;
:This module analyse wireless frames forwarded by access points.&lt;br /&gt;
&lt;br /&gt;
== L2 - Ethernet Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[MAC_module|MAC module]]&lt;br /&gt;
:The MAC module gathers information about all captured MAC addresses, including the protocols used, traffic, communication peers and MAC/IP mappings.&lt;br /&gt;
&lt;br /&gt;
* [[QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags VLAN PCP and MPLS TC on Layer 2 (and IP DSCP on Layer 3).&lt;br /&gt;
&lt;br /&gt;
* [[Packet_size_module|Packet size module]]&lt;br /&gt;
:The packet size module accounts the size of all packets (Layer 2 with CRC) and shows packet size distribution.&lt;br /&gt;
&lt;br /&gt;
* [[ARP_module|ARP module]]&lt;br /&gt;
:The ARP module monitors ARP packets for tracking MAC addresses and announced IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[VLAN_module|VLAN module]]&lt;br /&gt;
:The VLAN module accounts traffic per VLAN tag seen on the network.&lt;br /&gt;
&lt;br /&gt;
* [[MAC_protocols_module|MAC protocols module]]&lt;br /&gt;
:The MAC protocols module accounts traffic of all different MAC protocols.&lt;br /&gt;
&lt;br /&gt;
* [[STP_module|STP module]]&lt;br /&gt;
:The stp module analyzes STP traffic and shows a history of the identified root Bridges with their configurations.&lt;br /&gt;
&lt;br /&gt;
* [[MPLS_module|MPLS module]]&lt;br /&gt;
:The MPLS module displays information about all identified MPLS labels (single label and double-stacked).&lt;br /&gt;
&lt;br /&gt;
* [[LLDP_module|LLDP module]]&lt;br /&gt;
:The LLDP module extracts information from LLDP (Link Layer Discovery Protocol) messages and correlates this information to the respective MAC and IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[PPPoE module]]&lt;br /&gt;
:The PPPoE module displays all PPPoE sessions and traffic within a specific session.&lt;br /&gt;
&lt;br /&gt;
* [[Burst_analysis|Burst analysis]]&lt;br /&gt;
:The Burst analysis module measures throughput per interface or MAC address and displays utilization graphs for fast burst recognition.&lt;br /&gt;
&lt;br /&gt;
== L3 - IP Layer ==&lt;br /&gt;
* [[IP_module|IP module]]&lt;br /&gt;
:The IP module gathers information about all captured IPv4 and IPv6 addresses including the protocol used, traffic, communication peers, and connections.&lt;br /&gt;
&lt;br /&gt;
* [[IP_groups|IP groups]]&lt;br /&gt;
:The IP groups module gathers information for groups of IP addresses. Any IP subnet can be configured to be used as a group.&lt;br /&gt;
&lt;br /&gt;
* [[IP_pairs|IP pairs]]&lt;br /&gt;
:The IP pairs module shows traffic information between pairs of IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[QoS_module|QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags for IP DSCP on Layer 3 and VLAN PCP (and MPLS TC on Layer 2).&lt;br /&gt;
&lt;br /&gt;
* [[Geolocation_statistics|Geolocation statistics]]&lt;br /&gt;
:The Allegro Network Multimeter uses a geolocation library to identify the IP addresses of individual countries. The country information is shown in other modules; however, this web page lists all countries and their corresponding amount of traffic. It also shows detailed statistics per country including all IP addresses seen for that country.&lt;br /&gt;
&lt;br /&gt;
* [[DHCP_module|DHCP module]]&lt;br /&gt;
:The DHCP module tracks requests and responses for dynamic IP assignments in networks.&lt;br /&gt;
&lt;br /&gt;
* [[DNS_module|DNS module]]&lt;br /&gt;
:DNS name resolving is handled passively by processing all DNS requests and responses captured by the system. &lt;br /&gt;
:This module lists all IP addresses and names known by the system. This information is used by other modules to look up names.&lt;br /&gt;
&lt;br /&gt;
* [[NetBIOS_module|NetBIOS module]]&lt;br /&gt;
:The NetBIOS module monitors NetBIOS packets for tracking announced host names for IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[ICMP_module|ICMP module]]&lt;br /&gt;
:The ICMP module shows information about ICMP traffic and specific packet types.&lt;br /&gt;
&lt;br /&gt;
* [[Multicast_statistics|Multicast statistics]]&lt;br /&gt;
:The multicast module analyzes IGMP traffic and displays detailed information on multicast groups and members.&lt;br /&gt;
&lt;br /&gt;
== L4 - Transport Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[Connections_module|Connections module]]&lt;br /&gt;
:The Connections module provides access to a list of connections of all IPs aggregated together based on selected sort and filter parameters.&lt;br /&gt;
&lt;br /&gt;
* [[TCP_module|TCP module]]&lt;br /&gt;
:The TCP module measures the TCP handshake time for connection setup. It allows you to identify slow responding servers in a network.&lt;br /&gt;
&lt;br /&gt;
* [[Layer_4_server_ports_module|Layer 4 server ports module]]&lt;br /&gt;
:The Layer 4 server ports module measures traffic per TCP and UDP server port.&lt;br /&gt;
&lt;br /&gt;
* [[IPSec_module|IPSec module]]&lt;br /&gt;
:The IPSec module shows information about IPSec ESP traffic and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
== L7 - Application Layer ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[SSL_module|SSL module]]&lt;br /&gt;
:The SSL module keeps track of SSL server names and common names in SSL/TLS encrypted traffic. It enables you to get the name resolved even if no DNS has been seen.&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_module|HTTP module]]&lt;br /&gt;
:The HTTP module keeps track of HTTP host names requested in HTTP connections. It allows you to get the name resolved even if no DNS has been seen and to see which virtual host is handled by a given server.&lt;br /&gt;
&lt;br /&gt;
* [[L7_module|L7 module]]&lt;br /&gt;
:The L7 module gathers information about all supported Layer 7 protocols. This includes information on how much traffic was seen for each protocol for each IPv4 and IPv6 address.&lt;br /&gt;
&lt;br /&gt;
* [[Response_time_analysis|Response time analysis]]&lt;br /&gt;
:The response-time analysis module allows you to define your own protocol request and response pattern and measure the response time and request/response loss.&lt;br /&gt;
&lt;br /&gt;
* [[SMB_statistics|SMB statistics]]&lt;br /&gt;
:The SMB module gathers information about all SMB servers handling unencrypted traffic. It shows which shares have been accessed and which files in those shares have been read or written to, together with detailed statistics per file.&lt;br /&gt;
&lt;br /&gt;
* [[SIP_module|SIP module]]&lt;br /&gt;
:The SIP statistics includes all SIP calls and their associated metadata.&lt;br /&gt;
&lt;br /&gt;
* [[NTP_module|NTP module]]&lt;br /&gt;
:The NTP module shows detailed information about Network Time Protocol servers selected and their corresponding network clients.&lt;br /&gt;
&lt;br /&gt;
* [[PTP_module|PTP module]]&lt;br /&gt;
:The PTP module stores the PTP members and their associated metadata like the PTP version.&lt;br /&gt;
&lt;br /&gt;
* [[Profinet_module|Profinet module]]&lt;br /&gt;
:The Profinet module analyzes Profinet RT cyclic and acyclic traffic and displays details on all devices and their communication relationships.&lt;br /&gt;
&lt;br /&gt;
* [[OPC-UA_module|OPC-UA module]]&lt;br /&gt;
:The OPC-UA module displays information about OPC-UA binary protocol traffic and performs response-time measurement.&lt;br /&gt;
&lt;br /&gt;
* [[Fix_module|FIX module]]&lt;br /&gt;
:The FIX module shows information about &#039;&#039;&#039;F&#039;&#039;&#039;inancial &#039;&#039;&#039;I&#039;&#039;&#039;nformation e&#039;&#039;&#039;X&#039;&#039;&#039;change traffic.&lt;br /&gt;
&lt;br /&gt;
* [[IEC_60870-5-104_module|IEC 60870-5-104 module]]&lt;br /&gt;
:The IEC 60870-5-104 module shows information about IEC 60870-5-104 traffic, sequence counter correctness and response times.&lt;br /&gt;
&lt;br /&gt;
* [[IEC61850_module|IEC 61850 module]]&lt;br /&gt;
:The IEC 61850 module analyzes &#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent (GOOSE) and IEC 61850 Sampled Values traffic and shows information about the different traffic types and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
* [[TDS_module|TDS module]]&lt;br /&gt;
:The TDS module analyzes MS-SQL &#039;&#039;&#039;T&#039;&#039;&#039;abular &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;S&#039;&#039;&#039;tream traffic and shows the protocol traffic, response times and the recognized negotiated protocol version.&lt;br /&gt;
&lt;br /&gt;
* [[TETRA_module|TETRA module]]&lt;br /&gt;
:The TETRA module shows detailed information about &#039;&#039;&#039;Te&#039;&#039;&#039;rrestrial &#039;&#039;&#039;T&#039;&#039;&#039;runked &#039;&#039;&#039;Ra&#039;&#039;&#039;dio traffic.&lt;br /&gt;
&lt;br /&gt;
* [[QUIC module]]&lt;br /&gt;
:The QUIC Analysis Module provides comprehensive insights into &#039;&#039;&#039;Q&#039;&#039;&#039;uick &#039;&#039;&#039;U&#039;&#039;&#039;DP &#039;&#039;&#039;I&#039;&#039;&#039;nternet &#039;&#039;&#039;C&#039;&#039;&#039;onnections traffic.&lt;br /&gt;
&lt;br /&gt;
* [[RTP_statistics|RTP statistics]]&lt;br /&gt;
:The RTP module shows detailed information about RTP codecs used.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=TDS_module&amp;diff=4758</id>
		<title>TDS module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=TDS_module&amp;diff=4758"/>
		<updated>2024-04-22T13:06:28Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Create TDS module description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The TDS module shows information about TDS (Tabular Data Stream) traffic, used for database connections with Microsoft SQL Servers. Detected connections between clients and SQL servers are shown.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
[[File: TDS_connections.png|thumb|TDS connections common columns]]&lt;br /&gt;
All TDS connections with their client and server IPs and ports are shown together with the recognized TDS version. If the &#039;&#039;Timing&#039;&#039; toggle is activated, the start and end time, as well as the duration of the connection will be visible. Common traffic counters for total packets and bytes, as well as traffic rate counters for packets per second and bit per second can be selected with the &#039;&#039;Counters&#039;&#039; toggle. The connection quality can be evaluated in the TCP specific columns: the &#039;&#039;Response times&#039;&#039; toggle enables the view of TCP handshake time separated for client and server, as well as maximum and average response times. Retransmissions (in byte and as a percentage of the total traffic), missed bytes and duplicated ACK-packets are shown when the &#039;&#039;TCP Retransmissions&#039;&#039; toggle is enabled.&lt;br /&gt;
&lt;br /&gt;
When enabled, graphs for bitrate and packet rate (individually selectable) are shown. The TDS traffic of each connection can be captured using the PCAP download button.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:TDS_connections.png&amp;diff=4757</id>
		<title>File:TDS connections.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:TDS_connections.png&amp;diff=4757"/>
		<updated>2024-04-22T12:32:52Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: MS-SQL TDS connections page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
MS-SQL TDS connections page&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4723</id>
		<title>Incidents</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=4723"/>
		<updated>2024-04-04T16:50:03Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Configuration of incident rules */ Revert section name to &amp;#039;Rule configuration&amp;#039; since it is used by manual button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:Incidents_list.png|alt=|none|thumb|800x800px|Incident page]]&lt;br /&gt;
Incidents are used to alarm the user when configured network events occur, usually for traffic based rules, but also for system-specific events. These notifications can be viewed in the web GUI and may also be delivered on various notification channels. Repeating incidents are counted as such and the time of the first and last occurrence of an incident is remembered. This feature can be disabled for some incidents. What makes an incident unique depends on the type of incident. &lt;br /&gt;
&lt;br /&gt;
The incident feature allows to define rules which are checked on the configured trigger point, like when a connection ends, a SIP call ends, or for checks on ongoing traffic. When such a trigger hits, configurable traffic attributes will be checked and if all attributes of a rule match, an incident is created.&lt;br /&gt;
&lt;br /&gt;
Occurred incidents can be seen in the web interface, additionally reporting via the following notification channels is possible:&lt;br /&gt;
* email&lt;br /&gt;
* Apache Kafka&lt;br /&gt;
* SNMP trap&lt;br /&gt;
* syslog&lt;br /&gt;
&lt;br /&gt;
The first occurrence of a medium or high severity incident will also trigger a status notification which is visible at the top right of the web GUI.&lt;br /&gt;
&lt;br /&gt;
A configurable number of incidents will be remembered by the system and if the limit is exceeded the oldest incidents will be discarded [fixed number of 1000 incidents in firmware &amp;lt; 4.1].&lt;br /&gt;
&lt;br /&gt;
== Rule configuration ==&lt;br /&gt;
[[File:Incidents rules.png|thumb|600x600px|Rule configuration]]&lt;br /&gt;
Incident rules can be defined in the &amp;quot;Configuration of incident rules&amp;quot; tab in the menu &amp;quot;Generic -&amp;gt; Incidents&amp;quot;. All changes to the rule configuration will only take effect after saving the current configuration by clicking on the save button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
The page shows a table containing the existing rules and their configuration.&lt;br /&gt;
&lt;br /&gt;
Each existing rule can be modified by clicking on the pencil symbol, or deleted by clicking on the &amp;quot;minus&amp;quot; symbol.&lt;br /&gt;
&lt;br /&gt;
New rules can be added by clicking on the &amp;quot;Add rule&amp;quot; button. A dialog appears allowing for configuration of the rule. The same dialog is used when modifying an existing rule.&lt;br /&gt;
&lt;br /&gt;
=== Add/modify a rule ===&lt;br /&gt;
[[File:Incidents add rule.png|thumb|600x600px|Add rule dialog]]&lt;br /&gt;
A rule is defined by the following settings:&lt;br /&gt;
&lt;br /&gt;
* Rule name: This is an arbitrary text describing the purpose of the rule. This text is shown in the incident list and email/Kafka/SNMP trap/syslog ouptut.&lt;br /&gt;
* Severity: three different severity values &amp;quot;low&amp;quot;, &amp;quot;medium&amp;quot;, and &amp;quot;high&amp;quot; can be used to group more important and less important incidents. Reporting channels can be configured to only report incidents of a minimum severity level.  A rule can also be disabled by choosing the severity level &amp;quot;disabled&amp;quot;. It will not be evaluated and can be enabled later at will.&lt;br /&gt;
* Trigger: The trigger defines when a rule is evaluated. For each available trigger, a description is shown next to it giving more details about the trigger.  Some triggers are evaluated at a very specific time, like when a VoIP call ends, or are evaluated regularly like for throughput triggers of IP traffic which can be configured to be checked periodically.  See list below for a detailed description of the available triggers.&lt;br /&gt;
* Attributes: Attributes are used to make actual comparison of expected values vs. actual values.&lt;br /&gt;
** Each trigger has a different set of attributes which can be checked for, and some triggers don&#039;t need to have an attribute at all.  See list below for a detailed description of the available attributes&lt;br /&gt;
** Up to four attributes can be added by clicking on the &amp;quot;Add attribute&amp;quot; button.&lt;br /&gt;
** Multiple attributes must all match at the same time to let the rule create an incident.&lt;br /&gt;
** Each attribute can be compared to a specific value, so that the actual value is lower, equal, or greater than a defined value.&lt;br /&gt;
** Some attributes have an additional parameter, like a time span which defines how the attribute value is calculated.&lt;br /&gt;
* Virtual link group: The rule can be limited to a selected [[Virtual Link Group functionality|virtual link group]] or to be applied for any group.  Some triggers cannot be limited to a virtual link group so the configuration will be hidden.&lt;br /&gt;
* IP filter: Depending on the selected trigger, the rule can be limited to a specific IP address. The IP filter can also be an IP subnet in the format IP/mask-length (Example: 10.0.0.0/8)&lt;br /&gt;
* IP group: Depending on the selected trigger, the rule can be applied to an IP group instead of an individual IP address.&lt;br /&gt;
* Virtual link group, IP and IP filter can also be used inversely by using the != comparator&lt;br /&gt;
* Report channel: Incidents are always visible in the web interface, but can also be reported via multiple channels which can be configured separately in the tab &amp;quot;Configuration of notification channels&amp;quot;.  Up to ten channels can be selected so that the incident for this rule is reported on each channel.  Also, no channel can be configured so the incident is only accessible on the web interface.&lt;br /&gt;
* Aggregation of recurring Incidents: Incidents are aggregated by default. This means the table only shows the number of incidents of the type and the timestamps of the first and the last  incident. This can be disabled for most of the incidents, so that you are able to see every indent of the incident-type.&lt;br /&gt;
* Time Profiles: You are able to set a profile which defines the active time of an incident rule.&lt;br /&gt;
* Traffic capturing: If supported by the trigger, the rule can be configured to capture the network traffic triggering the rule, including some extra time before and after the incident.&lt;br /&gt;
** Possible options:&lt;br /&gt;
*** Disabled: capturing is disabled for this rule&lt;br /&gt;
*** Live traffic: capturing happens only for live network traffic&lt;br /&gt;
*** Replay traffic: capturing happens only for replayed network traffic (from PCAP files)&lt;br /&gt;
*** Always: capturing happens in all traffic processing types.&lt;br /&gt;
** Extra capture time: configure the number of seconds before the start of the incident and after the end of the incident.&lt;br /&gt;
*** If a time span parameter is used for attributes, the capture time includes this time duration as well.&lt;br /&gt;
** The traffic is automatically filtered to only contain the traffic that actually triggered the rule, i.e., an IP address or an IP group for IP rules.&lt;br /&gt;
&lt;br /&gt;
=== Available triggers ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Trigger name&lt;br /&gt;
!Description&lt;br /&gt;
!Attributes&lt;br /&gt;
!Attribute usage&lt;br /&gt;
|-&lt;br /&gt;
|ARP: MAC change for an IP&amp;lt;br&amp;gt;&lt;br /&gt;
(arp_ip_mac_changed)&lt;br /&gt;
|This trigger is checked on an ARP response and MAC address changed for a requested IP.&lt;br /&gt;
|time_since_last_mac&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server is not responding&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_not_responding)&lt;br /&gt;
|This trigger is checked when a DNS server is not responding for some time. A server is considered unresponsive when more than 3 requests to the DNS server went unanswered for a period of more than 5 seconds. Such a server must have answered at least two requests previously.&lt;br /&gt;
|time_since_first_unanswered_request&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server response error&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_response_error)&lt;br /&gt;
|This trigger is checked when a DNS server responds a configured error of type format error, server failure or non-existing domain&lt;br /&gt;
|error_type&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(global_new_connection)&lt;br /&gt;
|This trigger is checked continuously at connection start. It can be used to report new connections with a certain layer 4 protocol and a given port range.&lt;br /&gt;
|l4_protocol, port_range, since_start_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: GPS synchronization status change&amp;lt;br&amp;gt;&lt;br /&gt;
(global_gps_sync_status_change)&lt;br /&gt;
|This trigger is checked when the GPS clock synchronization status changes.&lt;br /&gt;
|gps_sync_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Number of connections&amp;lt;br&amp;gt;&lt;br /&gt;
(global_connections)&lt;br /&gt;
|This trigger is checked continuously whether the amount of newly created connections exceeds a threshold. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|new_connections&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Regular expressions&amp;lt;br&amp;gt;&lt;br /&gt;
(global_regex_match)&lt;br /&gt;
|This trigger allows to configure a list of regular expressions and is checked for each packet whose L7 data matches one of the regular expressions in the list. Since there are no attributes associated with this trigger, this effectively means that any packet which matches one of the regular expressions will result in an incident. The incident also contains information about which connection this packet belongs to as well as which of the regular expressions matches the packet.&lt;br /&gt;
|&lt;br /&gt;
|no attributes are available for this trigger&lt;br /&gt;
|-&lt;br /&gt;
|Global: Ring buffer&amp;lt;br&amp;gt;&lt;br /&gt;
(global_ring_buffer)&lt;br /&gt;
|This trigger is checked continuously to report changes in the ring buffer.&lt;br /&gt;
|used_size, bytes_captured, bytes_dropped&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_change)&lt;br /&gt;
|This trigger is checked when the speed of an interfaces changes.&lt;br /&gt;
|interface_speed&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed mismatch for an interface pair&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_mismatch)&lt;br /&gt;
|This trigger is checked when the status or speed of an interfaces changes and mismatches the speed of corresponding interface of a link.&lt;br /&gt;
|link_speed_difference&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Status change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_status_change)&lt;br /&gt;
|This trigger is checked when the status of an interfaces changes.&lt;br /&gt;
|interface_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(global_traffic)&lt;br /&gt;
|This trigger is checked continuously for the total traffic of the device. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Response times&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_response_times)&lt;br /&gt;
|This trigger is checked whenever an IEC104 ACTCON reply for an ACT has been seen.&lt;br /&gt;
|response_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_traffic)&lt;br /&gt;
|This trigger is checked continuously for each IEC104 connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|percent_loss, absolute_loss, not_in_order&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection end&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_end)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow ended.&lt;br /&gt;
|total_packets, total_bytes, tcp_handshake_time, percent_retransmissions, zero_window_packets, duration, l7_protocol&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_start)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow starts.&lt;br /&gt;
|new_connections, geolocation&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Local IP with multiple MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_local_ip_multiple_macs)&lt;br /&gt;
|This trigger is checked on each new flow of a local IP address and more than one MAC address uses this IP.&lt;br /&gt;
|mac_count&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New local IP address&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_local_ip)&lt;br /&gt;
|This trigger is checked once for each new IP belonging to a private network address range.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_l7_protocol)&lt;br /&gt;
|This trigger is checked once for each new l7 protocol used by an IP.&lt;br /&gt;
|since_start_time, local_ip, l7_protocol&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: TCP handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_tcp_handshake)&lt;br /&gt;
|This trigger is checked after successful TCP handshake or at connection end if handshake failed.&lt;br /&gt;
|handshake_time, server_handshake_time, client_handshake_time, handshake_failed&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Traffic on IP addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active IP or IP group. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase, total_packets, total_bytes, retransmission_ratio, zero_window_packets, tcp_syn_packets, tcp_fin_packets, tcp_rst_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: TTL change&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_ttl_change)&lt;br /&gt;
|This trigger is checked continuously for each active IP.&lt;br /&gt;
|ttl_change&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|LACP: Status change of a channel&amp;lt;br&amp;gt;&lt;br /&gt;
(lacp_channel_status_change)&lt;br /&gt;
|This trigger is checked when the status of a LACP port channel changes.&lt;br /&gt;
|channel_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_l7_protocol)&lt;br /&gt;
|This trigger is checked when a unicast MAC address uses a l7 protocol for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New MAC address&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_address)&lt;br /&gt;
|This trigger is checked once when a new unicast MAC address appears for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: Traffic on MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active MAC address. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|broadcast_packet_rate&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE: PPPoE Discovery traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(pppoe_discovery_traffic)&lt;br /&gt;
|This trigger is checked continuously for PPPoE discovery traffic. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|pppoe_discovery_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Profinet: Traffic of Profinet devices&amp;lt;br&amp;gt;&lt;br /&gt;
(profinet_traffic)&lt;br /&gt;
|This trigger is checked continuously for Profinet traffic. For max jitter, the update interval is defined by the timespan parameter of the attributes. All other attributes will be checked upon event.&lt;br /&gt;
|alarms_low, alarms_high, errors, frames_lost, frames_repeated, frames_wrong_sequence, max_jitter&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PTP: Timestamp packet&amp;lt;br&amp;gt;&lt;br /&gt;
(ptp_timestamp_packet)&lt;br /&gt;
|This trigger is checked when a PTP packet containing a valid timestamp is seen.&lt;br /&gt;
|time_offset&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|QOS: Traffic on QoS classes&amp;lt;br&amp;gt;&lt;br /&gt;
(qos_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active QoS class. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|RTP: Traffic for RTP connections&amp;lt;br&amp;gt;&lt;br /&gt;
(rtp_traffic)&lt;br /&gt;
|This trigger is checked continuously for traffic of each RTP connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|jitter, percent_loss&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SIP: Call end&amp;lt;br&amp;gt;&lt;br /&gt;
(sip_call_end)&lt;br /&gt;
|This trigger is checked when a SIP call ended.&lt;br /&gt;
|duration, status, mos, percent_loss, jitter, total_packets, total_bytes, total_caller_packets, total_callee_packets, total_caller_bytes, total_callee_bytes&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SMB: SMB1 negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(smb_v1_negotiation)&lt;br /&gt;
|This trigger is executed at the beginning of each SMB connection and checks whether insecure SMB1 has been negotiated.&lt;br /&gt;
|&lt;br /&gt;
|none&lt;br /&gt;
|-&lt;br /&gt;
|SSL: Handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ssl_handshake)&lt;br /&gt;
|This trigger is checked during handshake of each SSL connection.&lt;br /&gt;
|certificate_expires, tls_alert_level&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SSL: SSL/TLS version negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(tls_version)&lt;br /&gt;
|This trigger is checked during version negotiation at handshake of each SSL connection.&lt;br /&gt;
|used_tls_version&lt;br /&gt;
|mandatory&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Special trigger properties ====&lt;br /&gt;
Some triggers are checked continuously every configured time span period, so the incidents are generated differently than for fixed event specific triggers like a call end.&lt;br /&gt;
&lt;br /&gt;
# Repeating incidents:  The following triggers will be evaluated every configured time span and will be re-issued whenever the configured attributes match.&lt;br /&gt;
## ip_traffic&lt;br /&gt;
## mac_traffic&lt;br /&gt;
## qos_traffic&lt;br /&gt;
## rtp_traffic&lt;br /&gt;
# Start/stop incidents:  The following triggers are reported once the configured attributes match and for a second time when the attributes no longer match.&lt;br /&gt;
## global_traffic&lt;br /&gt;
&lt;br /&gt;
So for repeating incidents you will get repeated incidents for the same attribute every time span. For example, if an IP address has traffic of 100 Mbit/s for 2 minutes and a rule checks for more than 50 Mbit/s over 30 seconds, the rule will hit 4 times. There will be one incident which will contain the exact number of repetitions for reference.&lt;br /&gt;
&lt;br /&gt;
For start/stop incidents, you will only see two rule hits and the incident description will state the start and stop time.&lt;br /&gt;
&lt;br /&gt;
=== Available attributes ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;absolute_loss&#039;&#039;&#039;: Count of lost packets for IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;alarms_low&#039;&#039;&#039;, &#039;&#039;&#039;alarms_high&#039;&#039;&#039;: Whether an low/high alarm occurred for a Profinet device.&lt;br /&gt;
* &#039;&#039;&#039;broadcast_packet_rate&#039;&#039;&#039;: The attribute is the number of packets per second on average over the configured timespan for MAC broadcast packets.&lt;br /&gt;
* &#039;&#039;&#039;bytes_captured&#039;&#039;&#039;: The amount of bytes captured by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;bytes_dropped&#039;&#039;&#039;: The amount of bytes dropped by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;certificate_expires&#039;&#039;&#039;: This is the number of days until the certificate expires. If the certificate is already expired, the value is &amp;lt;= 0.&lt;br /&gt;
* &#039;&#039;&#039;channel_status&#039;&#039;&#039;: 0 means that the LACP port channel is not synchronized, 1 means that the LACP port channel is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;duration&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The time between first and last packet of the flow.&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The call duration.&lt;br /&gt;
* &#039;&#039;&#039;errors&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;Profinet: Traffic of Profinet devices: Whether errors occured.&lt;br /&gt;
* &#039;&#039;&#039;error_type&#039;&#039;&#039;: equal or not equal to:&lt;br /&gt;
** Format Error: DNS responds a format error.&lt;br /&gt;
** Non-existent Domain: DNS could not find queried domain name.&lt;br /&gt;
** Server Failure: DNS responds server failure.&lt;br /&gt;
* &#039;&#039;&#039;frames_lost&#039;&#039;&#039;, &#039;&#039;&#039;frames_repeated&#039;&#039;&#039;, &#039;&#039;&#039;frames_wrong_sequence&#039;&#039;&#039;: Whether Profinet frames have been seen with problems in sequence. For loss the count of lost frames is calculated.&lt;br /&gt;
* &#039;&#039;&#039;geolocation&#039;&#039;&#039;: checks if a country is part of the connection&lt;br /&gt;
** &#039;&#039;&#039;Direction&#039;&#039;&#039;: The direction of traffic&lt;br /&gt;
*** &#039;&#039;from&#039;&#039;: Traffic is coming &#039;&#039;from the&#039;&#039; specified country&lt;br /&gt;
*** &#039;&#039;to&#039;&#039;: Traffic is going &#039;&#039;to&#039;&#039; the specified country&lt;br /&gt;
*** &#039;&#039;any:&#039;&#039; The specified country is on either side of the connection, or on neither side if the inequality is selected.&lt;br /&gt;
* &#039;&#039;&#039;gps_sync_status&#039;&#039;&#039;: 0 means that the GPS clock in not synchronized, 1 means that the GPS clock is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;handshake_failed&#039;&#039;&#039;: Whether TCP handshake failed, i.e. one packet of SYN, SYN-ACK, ACK sequence is missing. If no handshake is seen at all but data (e.g. Allegro was started in the middle of a connection), no incident is generated.&lt;br /&gt;
* &#039;&#039;&#039;handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet and the ACK packet for the SYN/ACK packet of the server.&lt;br /&gt;
** &#039;&#039;&#039;client_handshake_time&#039;&#039;&#039;: The TCP handshake time between the SYN/ACK packet of the server and the ACK packet of the client.&lt;br /&gt;
** &#039;&#039;&#039;server_handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet of the client and the SYN/ACK packet of the server.&lt;br /&gt;
* &#039;&#039;&#039;interface_speed&#039;&#039;&#039;: The current speed of the interface in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;interface_status&#039;&#039;&#039;: 0 means interface is down, 1 means interface is up.&lt;br /&gt;
* &#039;&#039;&#039;jitter&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The average jitter of the call, using the maximum value of both call sides.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The average jitter of the RTP connection for the given timespan, using the maximum value of both directions.&lt;br /&gt;
* &#039;&#039;&#039;l4_protocol&#039;&#039;&#039;: The layer 4 protocol. Can be TCP, UDP or other.&lt;br /&gt;
* &#039;&#039;&#039;l7_protocol&#039;&#039;&#039;: The layer 7 protocol short name. Can also be a list, e.g. &amp;quot;HTTP, SSH, DHCP&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;local_ip&#039;&#039;&#039;: Whether the IP is local (10/8, 172.16/12, 192.168/16, 169.254/16, fe80::/10, fc00::/7)&lt;br /&gt;
* &#039;&#039;&#039;link_speed_difference&#039;&#039;&#039;: This is the absolute difference between the speeds of both interface of a link in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;mac_count&#039;&#039;&#039;: The number of different MAC addresses for the corresponding IP address.&lt;br /&gt;
* &#039;&#039;&#039;max_jitter&#039;&#039;&#039;: The max jitter value for a Profinet device in % in a given timespan.&lt;br /&gt;
* &#039;&#039;&#039;mos&#039;&#039;&#039;: The average MOS quality value of the call, using the minimum of both call sides.&lt;br /&gt;
* &#039;&#039;&#039;new_connections&#039;&#039;&#039;: The amount of newly created connections (TCP and UDP) for the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;not_in_order&#039;&#039;&#039;: Count of not in order packets for IEC104 connection. The sequence number could be too high, too low or repeated.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate&#039;&#039;&#039;: The packet rate in packets per second on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate_increase&#039;&#039;&#039;: The packet rate increase in % during the configured timespan compared to the average packet rate of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;percent_loss&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;:  The percentage of RTP packet loss for the call, accounting packets from both directions.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The percentage of RTP packet loss for the given timespan, accounting packets from both directions of the RTP connection.&lt;br /&gt;
** &#039;&#039;IEC104: Traffic for IEC104 connections&#039;&#039;: The percentage of IEC104 packet loss for the given timespan, accounting packets from both directions of the IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;percent_transmissions&#039;&#039;&#039;: The amount of TCP retransmission as a percentage of the total bytes.&lt;br /&gt;
* &#039;&#039;&#039;port_range&#039;&#039;&#039;: The TCP or UDP port. Can be also a range, e.g. 80,443,8443-8445&lt;br /&gt;
* &#039;&#039;&#039;pppoe_discovery_packets&#039;&#039;&#039;: The number of PPPoE discovery packets seen during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;response_time&#039;&#039;&#039;: The response time of IEC104 ACT requests and ACTCON replies.&lt;br /&gt;
* &#039;&#039;&#039;retransmission_ratio&#039;&#039;&#039;: The TCP retransmission ratio seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;since_start_time&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;MAC: New L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when a new Layer-7 protocol for the MAC address appeared.&lt;br /&gt;
** &#039;&#039;MAC: New MAC address&#039;&#039;:  This is the number of seconds after packet processing start when the MAC address appeared. This is useful to only report new MAC address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local IP address&#039;&#039;: This is the number of seconds after packet processing start when the IP address appeared. This is useful to only report new IP address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when the Layer-7 protocol for the IP address appeared.&lt;br /&gt;
** &#039;&#039;Global: Connection start&#039;&#039;: This is the number of seconds after packet processing start when the connection hast been started. This is useful to only report new connections after some learning time.&lt;br /&gt;
* &#039;&#039;&#039;status&#039;&#039;&#039;: The call status code (a three digit number, like 200 for Success)&lt;br /&gt;
* &#039;&#039;&#039;tcp_handshake_time&#039;&#039;&#039;: The TCP handshake time.&lt;br /&gt;
* &#039;&#039;&#039;tcp_fin_packets&#039;&#039;&#039;: The number of TCP FIN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_rst_packets&#039;&#039;&#039;: The number of TCP RST packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_syn_packets&#039;&#039;&#039;: The number of TCP SYN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput&#039;&#039;&#039;: The throughput bandwidth in bit/s on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput_increase&#039;&#039;&#039;: The throughput bandwidth increase in % during the configured timespan compared to the average throughput of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;time_offset&#039;&#039;&#039;: The time offset between the local time and the timestamp seen in the PTP packet.&lt;br /&gt;
* &#039;&#039;&#039;time_since_first_unanswered_request&#039;&#039;&#039;: This is the time span between when the trigger is checked and the first DNS request that has not been answered by the DNS server.&lt;br /&gt;
* &#039;&#039;&#039;time_since_last_mac&#039;&#039;&#039;: This is the number of seconds between changed MAC addresses. If, for examples, dynamic IP assignment is used, changing MAC addresses is normal so the test can be limited to only a certain amount of time.&lt;br /&gt;
* &#039;&#039;&#039;tls_alert_level&#039;&#039;&#039;: The alert level of a TLS alert packet. Can be &#039;fatal&#039;, &#039;warning&#039; or &#039;unknown&#039;. A fatal alert will be sent if e.g. TLS handshake failed and connection shall be closed.&lt;br /&gt;
* &#039;&#039;&#039;total_bytes&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of bytes seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of bytes seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_bytes&#039;&#039;&#039;: The number of bytes seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_bytes&#039;&#039;&#039;: The number of bytes seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;total_packets&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of packets seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of packets seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_packets&#039;&#039;&#039;: The number of packets seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_packets&#039;&#039;&#039;: The number of packets seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;ttl_change&#039;&#039;&#039;: Whether TTL or hop limit has changed.&lt;br /&gt;
* &#039;&#039;&#039;type&#039;&#039;&#039;: The type of PPPoE discovery packet (PADI, PADO, PADR, PADS, PADT or any).&lt;br /&gt;
* &#039;&#039;&#039;used_size&#039;&#039;&#039;: The percentage of the ring buffer that needs to be filled.&lt;br /&gt;
* &#039;&#039;&#039;used_tls_version&#039;&#039;&#039;: The TLS version (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3)&lt;br /&gt;
* &#039;&#039;&#039;window_below_mss&#039;&#039;&#039;: Whether the smallest announced TCP window was below the TCP MSS value. An additional offset is available, to check whether window was smaller than MSS + x bytes.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of packets with a TCP window of 0 for both directions of the flow.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of zero window packets seen in the configured timespan.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings ===&lt;br /&gt;
It is possible to automatically capture traffic for occurred incidents. These global settings control where capture files are stored and the capturing itself can be enabled for each rule separately.&lt;br /&gt;
&lt;br /&gt;
The incident capture feature requires an active packet ring buffer since the packets are extracted from the buffer at the end of the incident period.&lt;br /&gt;
&lt;br /&gt;
Available settings:&lt;br /&gt;
&lt;br /&gt;
* Capture cooldown period: For each rule a cooldown period prevents multiple captures from happening in fast succession. By default, new captures happen firstly after 5 seconds, but any other value of at least 1 second can be configured. The cooldown is applied to each rule separately, but for each individual rule it does not matter if the same or a different entity triggers an incident. The incident is still reported within the cooldown period, but no additional capture is started.&lt;br /&gt;
* Storage device: Select the storage device where the captures should be stored on.&lt;br /&gt;
* Storage directory: Enter the directory where capture files should be stored or leave empty to use the top level directory.&lt;br /&gt;
* Select packet ring buffer to capture from: if multiple ring buffer cluster are in use, you can select which ring buffer to use for extraction.&lt;br /&gt;
* Capture profile: A capture profile can be configured to apply packet truncation rules to the capture file. If unset, the complete packets are captured (if the ring buffer uses separate truncation rules, truncated packets might still be within the capture file).&lt;br /&gt;
&lt;br /&gt;
== Time Profiles ==&lt;br /&gt;
Incident rules can be active configured to be active in configured time spans (time profiles).&lt;br /&gt;
&lt;br /&gt;
Every time profile allows the user to define one or more time spans per day of the week in which a rule should be active. After saving the user is able select the time profile when editing the rule.&lt;br /&gt;
&lt;br /&gt;
Notes: Overlapping time spans will be merged. The earliest a time span is allowed to start is 0 and the latest end is 24, minutes are not allowed. The rule is not active for a day if there is no time span defined for the day.&lt;br /&gt;
&lt;br /&gt;
== Channel configuration ==&lt;br /&gt;
[[File:Incidents channels.png|thumb|600x600px|Channel configuration]]&lt;br /&gt;
Incidents can be reported on different channels. The configuration allows to add new channels so they can be selected in the rule configuration described above.&lt;br /&gt;
&lt;br /&gt;
Each channel can be of type:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;email&#039;&#039;&#039; Incidents will be sent to the email address configured in the [[Global settings]].&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;kafka&#039;&#039;&#039; The incidents are sent to a topic on the configured Apache Kafka server. The message is the same as for syslog.&lt;br /&gt;
* Bootstrap Server: hostname/ip:port of a Kafka Broker or multiple Brokers separated by comma&lt;br /&gt;
* Protocol: Plaintext (no authentication, no encryption), SASL Paintext (Plain authentication, no encryption), SASL SSL (Plain authentication, TLS/SSL encryption)&lt;br /&gt;
* Ignore TLS Certificate: Ignore the TLS Certificate of the Brokers (only SASL SSL)&lt;br /&gt;
* Username: Broker Login (only SASL)&lt;br /&gt;
* Password: Broker Login (only SASL)&lt;br /&gt;
* Topic: The name of the topic into which the Incidents are sent.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;snmp_trap&#039;&#039;&#039; Incidents will be sent to the configured SNMP trap receiver. A MIB file with the Allegro Network Multimeter SNMP trap definitions is available for download in the channel configuration dialog.&lt;br /&gt;
* Version: Supported SNMP version of the trap receiver (SNMP v2c or SNMP v3)&lt;br /&gt;
* Trap receiver (manager) hostname/IP: The trap receiver hostname or IP address&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v2c&#039;&#039;:&lt;br /&gt;
* Community name: SNMP community name expected by the trap receiver&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v3&#039;&#039;:&lt;br /&gt;
* Authentication protocol: Protocol for authenticated messages (MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512)&lt;br /&gt;
* Authentication password: Pass phrase for authenticated messages&lt;br /&gt;
* Privacy protocol: Protocol for message encryption (AES, DES)&lt;br /&gt;
* Privacy password: Pass phrase for message encryption&lt;br /&gt;
* Security name: Security name for authenticated SNMP messages&lt;br /&gt;
* Security level: Security level for SNMP messages (noAuthNoPriv, authNoPriv, authPriv)&lt;br /&gt;
* Engine ID: Authoritative (security) engineID (hexadecimal number)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;syslog&#039;&#039;&#039; Incidents will be sent to the configured syslog server via TCP on any TCP or UDP port.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Incidents add channel.png|thumb|alt=|none|Adding a new channel]]&lt;br /&gt;
Each channel also uses a minimum severity setting, so only incidents are reported which are of at least that severity.&lt;br /&gt;
&lt;br /&gt;
Each channel can be configured to only handle incidents from live traffic or from replayed traffic.&lt;br /&gt;
&lt;br /&gt;
Some incidents cannot be configured via rules and you can choose to get those incidents also via email by enabling the settings at the lower part of the settings page.&lt;br /&gt;
&lt;br /&gt;
== Other settings ==&lt;br /&gt;
&lt;br /&gt;
=== Interface burst incident ===&lt;br /&gt;
[[File:Incidents others.png|thumb|600x600px|Other incidents]]&lt;br /&gt;
Burst incidents with milli-second resolution can be generated when the interface throughput exceeds a configurable threshold. The incident contains a graph of traffic for that interface with some data points before and after the threshold has been exceeded depending on the measurement interval. A PCAP link for capturing from the packet ring buffer is shown. For further investigation of that incident, the button &amp;quot;Use as global time range&amp;quot; can be used to set the global range to the start and end of the incident graph (at least 5 seconds) so that all modules of the Allegro Network Multimeter show that time span.&lt;br /&gt;
&lt;br /&gt;
The incident generation can be configured in the &amp;quot;Other settings&amp;quot; tab as follows:&lt;br /&gt;
* &#039;&#039;&#039;Report &amp;quot;throughput threshold exceeded&amp;quot; with severity&#039;&#039;&#039;: report an incident with the selected severity level if the throughput of any network interface exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput threshold (Mbit/s)&#039;&#039;&#039;: The threshold is configured in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;How long throughput must be above threshold to generate incident (in milliseconds)&#039;&#039;&#039;: The throughput must exceed the threshold for this duration in order to generate the incident. If set to zero (default) the incident is generated immediately after the threshold has been exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput cool-down period between two incidents in milliseconds&#039;&#039;&#039;: Defines the time after an incident where no new incident is generated even if the threshold is exceeded. If this period is passed, throughput incidents could be generated again.&lt;br /&gt;
Since each burst incidents stores the high resolution traffic graph, this feature uses a significant amount of memory. The actual amount is shown below and also depends on the maximum number of incidents configured in the section below.&lt;br /&gt;
&lt;br /&gt;
=== Generic incident settings ===&lt;br /&gt;
This section allows to modify generic settings regarding the incident feature:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum number of stored incidents&#039;&#039;&#039;: This value defines how many incidents are stored before old incidents are removed.  Increasing this value also increased the amount of memory reserved for this feature.&amp;lt;br&amp;gt;The corresponding value for the active setting is shown below, changing the configuration value requires a restart of the packet processing to take affect.&lt;br /&gt;
&lt;br /&gt;
== Occured incidents ==&lt;br /&gt;
This page shows up to the last incidents occurred on the system. The table can be filtered for specific severity levels, as well as for specific trigger sources by selecting the trigger from the drop down menu.&lt;br /&gt;
[[File:Incidents list filter.png|thumb|600x600px|Filter incidents by severity or trigger]]&lt;br /&gt;
The list can also be filtered for the subject of the incident.&lt;br /&gt;
&lt;br /&gt;
Individual incidents can be viewed in detail by clicking on the subject. The details page shows detailed information including links to the relevant measurement page.&lt;br /&gt;
&lt;br /&gt;
Incidents can be deleted individually by clicking on the delete button next to the incident, or all incidents can be deleted by clicking on the button on the top right of the page.&lt;br /&gt;
&lt;br /&gt;
The number of incidents available in this view is limited by a configurable number (firmware &amp;lt;4.1 was limited to 1000), the configuration as available in the &amp;quot;Other settings&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
== Statistics about incident rules ==&lt;br /&gt;
[[File:Incidents stats.png|thumb|600x600px|Statistics about rules]]&lt;br /&gt;
This page shows graphs about how often each rule has been hit both in absolute numbers as well as relatively to how often the rule has been checked.&lt;br /&gt;
&lt;br /&gt;
== Incident list per measurement modules ==&lt;br /&gt;
Since incidents are triggered by different measurement modules (as indicate by the prefix of the trigger name, like the mac or ip module), the list of incidents from that specific module can also be seen in the corresponding tab of the measurement module for quicker access. This per-module view only lists those incidents coming from that module, all other potential incidents are hidden and must be accessed in their corresponding module page, or in the global view in the &amp;quot;Generic -&amp;gt; Incident&amp;quot; menu.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
Some technical limitations apply:&lt;br /&gt;
&lt;br /&gt;
* continuously checked triggers like &amp;quot;IP traffic&amp;quot; are only evaluated if there was at least one packet in the corresponding time interval. Therefore, rules check for zero packet count or throughput will never match.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Public_limited_statistics&amp;diff=4707</id>
		<title>Public limited statistics</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Public_limited_statistics&amp;diff=4707"/>
		<updated>2024-03-11T10:55:48Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* General information */ Typo fixes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The public statistics access allows to see some selected, based statistics without the need to login.&lt;br /&gt;
&lt;br /&gt;
For data privacy reasons, this feature must be enable first in the [[Remote access and export]] settings, and all data visible does not contain any user-related information. The available information are described below.&lt;br /&gt;
&lt;br /&gt;
== General information ==&lt;br /&gt;
The start page /public contains a simple list of available statistics, described in detail below.&lt;br /&gt;
&lt;br /&gt;
All URLs can be extended by the following two options to adjust the statistics:&lt;br /&gt;
&lt;br /&gt;
* timespan: sets the amount of time displayed in graphs. It defaults to 1 minute.&lt;br /&gt;
** The value is either seconds, minutes or hours, depending on the suffix.&lt;br /&gt;
** Examples:&lt;br /&gt;
*** timespan=120  This selects 120 seconds or 2 minutes for the timespan.&lt;br /&gt;
*** timespan=60m  This selects 60 minutes or 1 hour.&lt;br /&gt;
*** timespan=24h  This selects 24 hours or 1 day.&lt;br /&gt;
* update: sets the number of seconds between data updates. It defaults to one update every second.&lt;br /&gt;
** Examples:&lt;br /&gt;
*** update=60  updates the data once per minute&lt;br /&gt;
List of available URLs:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!URL&lt;br /&gt;
!content&lt;br /&gt;
|-&lt;br /&gt;
|/public&lt;br /&gt;
|Basic entry page&lt;br /&gt;
|-&lt;br /&gt;
|/public/interfaces&lt;br /&gt;
|Interface statistics&lt;br /&gt;
|-&lt;br /&gt;
|/public/voip&lt;br /&gt;
|Voice over IP statistics&lt;br /&gt;
|-&lt;br /&gt;
|/public/topiptraffic&lt;br /&gt;
|Top 10 amount of IP traffic&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Interface statistics ==&lt;br /&gt;
The URL &amp;quot;/public/interfaces&amp;quot; shows the current throughput of each active interfaces.&lt;br /&gt;
&lt;br /&gt;
For details, log in and go to [[Interface statistics]].&lt;br /&gt;
&lt;br /&gt;
== VoIP statistics ==&lt;br /&gt;
The URL &amp;quot;/public/voip&amp;quot; shows the current throughput for SIP and RTP protocol, and the error codes for SIP requests.&lt;br /&gt;
&lt;br /&gt;
To see more details, log in and go to [[SIP module]].&lt;br /&gt;
&lt;br /&gt;
== Top IP traffic ==&lt;br /&gt;
The URL &amp;quot;/public/topiptraffic&amp;quot; shows two pie charts with the top amount of traffic in the last timespan. For data privacy reasons, only the amount is visible, not the actual IP addresses. To get detailed information, log in and go to [[IP module#Top IP statistics|IP module]].&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Interactive_graph_features&amp;diff=4702</id>
		<title>Interactive graph features</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Interactive_graph_features&amp;diff=4702"/>
		<updated>2024-03-01T14:26:05Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: language improvements&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter uses a graphical representation of&lt;br /&gt;
the historic data in many places. Uses include packet and byte counter&lt;br /&gt;
over time for IP addresses, MAC addresses, individual connections,&lt;br /&gt;
peers, etc. Response time graphs are also used to display the response&lt;br /&gt;
times of different services such as HTTP, SSL, and others.&lt;br /&gt;
&lt;br /&gt;
Those graphs can be interactively manipulated to make exploring&lt;br /&gt;
historic data easy. The following mouse commands are available:&lt;br /&gt;
&lt;br /&gt;
* Left mouse click: zooms into the clicked position&lt;br /&gt;
* Mouse selection with left mouse button: zoom into selected interval&lt;br /&gt;
:[[File:Zoom-in.png|1000px|none]]&lt;br /&gt;
* Right mouse click: zooms out of the clicked position&lt;br /&gt;
:[[File:Zoom-out.png|1000px|none]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Holding the Shift key allows more interactive features:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Shift + left mouse click: zooms into the clicked position&lt;br /&gt;
* Shift + mouse wheel up: zooms into the clicked position&lt;br /&gt;
:[[File:Zoom-in+shift.png|1000px|none]]&lt;br /&gt;
* Shift + right mouse click: zooms out of the clicked position&lt;br /&gt;
* Shift + mouse wheel down: zooms out of the clicked position&lt;br /&gt;
:[[File:Zoom-out+shift.png|1000px|none]]&lt;br /&gt;
* Shift + mouse drag: move graph to dragged direction without zooming (also known as panning)&lt;br /&gt;
:[[File:Diagramm-Move-nach.png|1000px|none]]&lt;br /&gt;
&lt;br /&gt;
These interactive features make it easier to explore past network&lt;br /&gt;
events in contrast to manually selecting a specific time frame via the&lt;br /&gt;
upper right control buttons.&lt;br /&gt;
&lt;br /&gt;
The [[Back-in-Time_functionality|Back-in-Time functionality]] pages contains additional information about&lt;br /&gt;
restrictions of selecting a specific interval.&lt;br /&gt;
&lt;br /&gt;
Each individual graph can also be viewed in a detailed view spanning&lt;br /&gt;
the whole window by clicking on the the magnifying glass icon on the&lt;br /&gt;
right hand side of the graph. This will open a window containing only&lt;br /&gt;
this graph. The detail level is also increased by a factor of 4 to&lt;br /&gt;
show more data points. All interactive features like selecting an&lt;br /&gt;
interval or dragging the graph are still available.&lt;br /&gt;
&lt;br /&gt;
Beneath the magnifying glass icon there is also an icon which opens a&lt;br /&gt;
drop down menu containing additional information about the&lt;br /&gt;
graph. First, there is a help button to this manual entry for easier&lt;br /&gt;
access. Second, the graph stepping is shown which describes the time&lt;br /&gt;
difference between each data point. Depending on the zoom level and&lt;br /&gt;
the age of the data the stepping is chosen automatically. For older&lt;br /&gt;
data, the graph resolution is reduced to save memory and make data&lt;br /&gt;
available for a longer time but this also means the detail level is&lt;br /&gt;
reduced. The stepping gives a hint how detailed the information&lt;br /&gt;
are. If you zoom in but the stepping remains the same, it basically&lt;br /&gt;
means that there is no more detailed data available. If multiple data sources are drawn in a single graph (like multiple IP address graphs), the graph resolution might be different for each data row so the minimum and maximum graph resolution is shown in this case.&lt;br /&gt;
&lt;br /&gt;
It is possible to modify the graph resolution in the [[Global_settings#Graph_detail_settings|Graph detail settings]].&lt;br /&gt;
&lt;br /&gt;
== Additional graph settings ==&lt;br /&gt;
&lt;br /&gt;
The drop down menu beneath the magnifying glass also contains entries&lt;br /&gt;
to change the graph style from four different styles:&lt;br /&gt;
&lt;br /&gt;
* Filled: This is the default style which draws lines for each data set and fills the area underneath for better readability.&lt;br /&gt;
* Regular lines: This style uses just lines for each data set.&lt;br /&gt;
* Thick lines: This style draws thicker lines.&lt;br /&gt;
* Stacked: This style uses filled areas and stacks each data set on another.&lt;br /&gt;
&lt;br /&gt;
The settings are stored per user and changing a setting for one graph changes the settings for all other graphs automatically.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Remote_access_and_export&amp;diff=4697</id>
		<title>Remote access and export</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Remote_access_and_export&amp;diff=4697"/>
		<updated>2024-02-27T15:28:52Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* SFTP */ Typo fixes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Statistics Export ==&lt;br /&gt;
&lt;br /&gt;
See [[Statistics Export via POST]] for details about exporting the measurement data via HTTP POST requests.&lt;br /&gt;
== Influx Export ==&lt;br /&gt;
&lt;br /&gt;
See [[Statistics Export via InfluxDB]] for details about exporting the measurement data via InfluxDB.&lt;br /&gt;
&lt;br /&gt;
== SSH port forwarding ==&lt;br /&gt;
&lt;br /&gt;
This option allows to use an external SSH server as an proxy to access the device. Via port forwarding the client PC accesses the SSH proxy which forwards the traffic to the actual Allegro Network Multimeter. See [[Self-hosted_SSH_Proxy]] for detailed information how to set up such a server.&lt;br /&gt;
&lt;br /&gt;
== Allegro Remote Service ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Remote Service is similar to the SSH Port Forwarding feature, but the SSH server is provided by Allegro Packets as a public service. Traffic through is proxy is still end-to-end encrypted via your SSL certificate so the data is only accessible to you.&lt;br /&gt;
&lt;br /&gt;
See [[Using the Allegro Remote Service]] for detailed information.&lt;br /&gt;
&lt;br /&gt;
== SNMP ==&lt;br /&gt;
&lt;br /&gt;
See [[SNMP]] for details about SNMP support.&lt;br /&gt;
&lt;br /&gt;
== Pcap export via SFTP ==&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Allegro Network Multimeter&#039;&#039;&#039; allows the export of captured pcaps via SFTP.&lt;br /&gt;
pcap files can be stored in an upload queue and be automatically uploaded to a remote host once a day.&lt;br /&gt;
&lt;br /&gt;
This feature only works if a disk is attached to the device.&lt;br /&gt;
&lt;br /&gt;
When &#039;&#039;PCAP Export via SFTP&#039;&#039; is enabled, a new checkbox &#039;&#039;Save to SFTP export directory&#039;&#039; is added to the capture dialogue. If checked, the pcap will be stored to a special upload directory.&lt;br /&gt;
&lt;br /&gt;
In the configuration view, it is possible to see the files in the upload queue anddelete them or trigger an immediate upload.&lt;br /&gt;
&lt;br /&gt;
SFTP export allows SFTP authentication via public key or via password. The public key is printed at the top of the configuration view. For public key authentication, the password field in the SFTP connection parameters can be left empty.&lt;br /&gt;
&lt;br /&gt;
A &amp;quot;Test upload&amp;quot; button uploads a file &#039;&#039;&#039;allegro-upload-test.txt&#039;&#039;&#039; into the configured&lt;br /&gt;
target directory on the remote host.&lt;br /&gt;
&lt;br /&gt;
Uploaded files are deleted from the storage device after successful upload.&lt;br /&gt;
&lt;br /&gt;
The upload can also be triggered manually via the web frontend or an REST API call:&lt;br /&gt;
 Method: POST&lt;br /&gt;
 URL: /API/system/sftp-export&lt;br /&gt;
 Payload: { uploadNow: true }&lt;br /&gt;
Uploads are executed sequentially so it is safe to call the API with already running uploads.&lt;br /&gt;
&lt;br /&gt;
Limitation: There should be no running capture to the SFTP export as it would be uploaded incompletely.&lt;br /&gt;
&lt;br /&gt;
== Public statistics ==&lt;br /&gt;
The option allows to enable a public access to some basic statistics, useful for basic system monitoring.&lt;br /&gt;
&lt;br /&gt;
If enabled, the system can be accessed with the URL &amp;quot;/public&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The &#039;Notes&#039; text-box can be used to set some text which is displayed at the top of each public statistics page.&lt;br /&gt;
&lt;br /&gt;
Read [[Public limited statistics]] for details about the kind of information that are available under the public URL.&lt;br /&gt;
&lt;br /&gt;
== Zabbix agent ==&lt;br /&gt;
This module allows to run a Zabbix agent on the Allegro Network Multimeter so that it can be easily monitored from a Zabbix server.&lt;br /&gt;
&lt;br /&gt;
When enabled, the Zabbix agent will listen for connections on the default TCP port 10050.&lt;br /&gt;
&lt;br /&gt;
By default any address can connect to the Zabbix agent but in the &#039;Allowed servers&#039; field a commas-separated list of servers can be provided. This limits access to the Zabbix agent by only allowing connections from listed Zabbix servers.&lt;br /&gt;
&lt;br /&gt;
A Zabbix template can be downloaded using the &#039;Allegro Zabbix template&#039; link. When this template is imported on a Zabbix server it then can be used to quickly set up useful items and triggers for monitoring an Allegro Network Multimeter. This also includes several Allegro-specific items like the processing load and memory usage, the IP count, MAC count and connection count as well as the data storage duration.&lt;br /&gt;
==SFTP==&lt;br /&gt;
The storage can be accessed via SFTP.&lt;br /&gt;
&lt;br /&gt;
The server is off by default and has to be turned on in &#039;Settings&#039; &amp;gt; &#039;Remote access and Statistics Export&#039; &amp;gt; &#039;SFTP Server&#039;.&lt;br /&gt;
&lt;br /&gt;
Authentication is possible via a SSH key or the same credentials as of the web interface.&lt;br /&gt;
&lt;br /&gt;
Only the user with the role &#039;admin&#039; or users with storage permissions are allowed to access the storage via SFTP.&lt;br /&gt;
&lt;br /&gt;
The SSH key is configurable on a user basis in the user settings.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=User_Management&amp;diff=4694</id>
		<title>User Management</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=User_Management&amp;diff=4694"/>
		<updated>2024-02-27T14:12:08Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Password Policy */ language improvements&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The user management page allows managing users which can use the Allegro Network Multimeter. It is possible to:&lt;br /&gt;
&lt;br /&gt;
* Create new local users or configure login via LDAP or TACACS+&lt;br /&gt;
* Edit user parameters&lt;br /&gt;
** Change the password&lt;br /&gt;
** Use two-factor authentication with time-based one-time password (TOTP) algorithm. When this option is enabled, a QR code is displayed that needs to be scanned by a TOTP generator (e.g. FreeOTP or Google Authenticator). The Allegro Network Multimeter and the TOTP generator will generate a one-time password independently which needs to be given at login. Both devices need to be time synchronized (e.g. via NTP).&lt;br /&gt;
** Modify user roles (and therefore permissions and restrictions)&lt;br /&gt;
** Adjust user session timeout/time out in minutes&lt;br /&gt;
&lt;br /&gt;
* Disable users&lt;br /&gt;
: Disabled users are not able to login, but their settings are kept.&lt;br /&gt;
&lt;br /&gt;
* Forget Third Party (LDAP or Tacacs+) users (since firmware version 4.1)&lt;br /&gt;
** This removes the user settings and Two Factor Authentication Settings from the Multimeter&lt;br /&gt;
&lt;br /&gt;
* Delete users.&lt;br /&gt;
&lt;br /&gt;
:Notes:&lt;br /&gt;
:* It is not possible to delete or disable the admin account.&lt;br /&gt;
:* It is not possible to delete or disable the currently logged in user.&lt;br /&gt;
&lt;br /&gt;
== Roles before v4.2 ==&lt;br /&gt;
Multiple roles can be defined per user to allow different permissions.&lt;br /&gt;
&lt;br /&gt;
Only users with the &#039;&#039;&#039;admin&#039;&#039;&#039; role can:&lt;br /&gt;
&lt;br /&gt;
* change system settings&lt;br /&gt;
* manage users&lt;br /&gt;
* configure storage settings&lt;br /&gt;
* use webdav&lt;br /&gt;
&lt;br /&gt;
Roles can be created or deleted (except for the &#039;&#039;&#039;admin&#039;&#039;&#039; role). A role may have several permissions. Permissions are categorized in live view, replay view and 4-eyes authorization. For each category there is a list of permissions that are granted by this role. E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
Following pre defined roles exist:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;admin&#039;&#039;&#039;: with version 4.1 the admin role became editable. Per default this role has all permissions without restrictions.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;users&#039;&#039;&#039;: Users with this role can see all measurement data, but they are not able to change settings.&lt;br /&gt;
*&#039;&#039;&#039;capture&#039;&#039;&#039;: Users with this role are able to start traffic captures.&lt;br /&gt;
*&#039;&#039;&#039;replay-user&#039;&#039;&#039;:  Users can only view measurement data from replay slots (replay of ring buffer or pcap files). The user cannot see live data.&lt;br /&gt;
*&#039;&#039;&#039;restart-analysis&#039;&#039;&#039;: Users can restart already running ring buffer analyses, for example with different start and end time parameters. This is useful if the &#039;&#039;&#039;admin&#039;&#039;&#039; user wants to select which and when a ring buffer should be analyzed but still letting &#039;&#039;&#039;replay-user&#039;&#039;&#039;s to restart the analysis in case they want use a smaller time interval for faster/more detailed analysis.&lt;br /&gt;
*&#039;&#039;&#039;api-pcap-4-eyes-authorization&#039;&#039;&#039;: This role requires an authorization for performing a PCAP from another user with the &#039;&#039;&#039;pcap&#039;&#039;&#039; permission in any of the three categories. In the PCAP dialog a dropdown field is displayed where the user needs to select the other user who should grant the capture. The other user will get a popup dialog for granting or denying the PCAP download.&lt;br /&gt;
*&#039;&#039;&#039;api-voip-4-eyes-authorization&#039;&#039;&#039;: This role requires an authorization for accessing SIP or RTP statistics pages from another user with the &#039;&#039;&#039;sip&#039;&#039;&#039; or &#039;&#039;&#039;rtp&#039;&#039;&#039; (before the version 4.1 this was the voip permission) permissions in a category. On the page that requires authorization an indicator is displayed where the user needs to select the other user who should grant access to that page. The other user will get a popup dialog for granting or denying the access.&lt;br /&gt;
&lt;br /&gt;
These roles can be combined. For example, a user with the &#039;&#039;&#039;replay-user&#039;&#039;&#039; and &#039;&#039;&#039;capture&#039;&#039;&#039; role can only see replay data and can capture traffic from this data, but they cannot capture live data.&lt;br /&gt;
&lt;br /&gt;
== Permissions before v4.2 ==&lt;br /&gt;
Permissions are categorized in live view, replay view and 4-eyes authorization. &lt;br /&gt;
&lt;br /&gt;
For each category there is a list of permissions that are granted by this role. &lt;br /&gt;
&lt;br /&gt;
E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
Following permissions exist:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;all&#039;&#039;&#039;: All permissions are granted. This contains all other permissions mentioned below.&lt;br /&gt;
* &#039;&#039;&#039;pcap&#039;&#039;&#039;: Captures and Webshark access is permitted.&lt;br /&gt;
* &#039;&#039;&#039;voip&#039;&#039;&#039;: Access to SIP and RTP statistics is permitted. (With version 4.1 this was split into the permissions rtp and sip)&lt;br /&gt;
* &#039;&#039;&#039;other&#039;&#039;&#039;: Access to everything else.&lt;br /&gt;
* &#039;&#039;&#039;restart-analysis&#039;&#039;&#039;: Allows restarting ring buffer analysis&lt;br /&gt;
* &#039;&#039;&#039;pcap-analysis&#039;&#039;&#039;: Allows starting and stopping a PCAP analysis.&lt;br /&gt;
With version 4.1 there is an additional permission setting restricting the capture functionality. To use this feature a restricting profile  has to be set in the capture profile settings.&lt;br /&gt;
&lt;br /&gt;
== Roles after v4.2 ==&lt;br /&gt;
Multiple roles can be defined per user to allow for different permissions and some restrictions.&lt;br /&gt;
&lt;br /&gt;
Per default there are the following 5 roles which are meant to be combined, cannot be deleted but are all changeable:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Role&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|admin&lt;br /&gt;
|This role has all permissions and no restrictions per default. The admin user has this role by default.&lt;br /&gt;
|-&lt;br /&gt;
|user&lt;br /&gt;
|This role can see the traffic in any views but is not allowed to capture data or change settings.&lt;br /&gt;
|-&lt;br /&gt;
|replay-user&lt;br /&gt;
|This role is only able to see the traffic in the replay view (e.g. when analyzing a pcap).&lt;br /&gt;
|-&lt;br /&gt;
|capture&lt;br /&gt;
|This role is only allowed to capture traffic in any view.&lt;br /&gt;
|-&lt;br /&gt;
|restart-analysis&lt;br /&gt;
|This role is allowed to restart the processing in any view (e.g. restarting the processing of live traffic and restarting pcap-replays).&lt;br /&gt;
|}&lt;br /&gt;
Roles can be created or deleted (except for the &#039;&#039;&#039;default&#039;&#039;&#039; roles). A role may have several permissions. &lt;br /&gt;
&lt;br /&gt;
== Permissions after v4.2 ==&lt;br /&gt;
Permissions are categorized in live view, replay view and 4-eyes authorization. For each category there is a list of permissions that are granted by this role. E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
There are administrative permissions for the settings and other features (like the incidents) and traffic permissions for the measurement data.&lt;br /&gt;
&lt;br /&gt;
=== Administrative Permissions ===&lt;br /&gt;
The administrative permissions are for different resources like the settings and other features like incidents, reports and more.&lt;br /&gt;
&lt;br /&gt;
Users are able to do &#039;&#039;&#039;actions&#039;&#039;&#039; which are &#039;&#039;&#039;read&#039;&#039;&#039;, &#039;&#039;&#039;update&#039;&#039;&#039; and &#039;&#039;&#039;delete&#039;&#039;&#039;. If the user is only allowed to &#039;&#039;&#039;read&#039;&#039;&#039;, they can only see the active settings but cannot change them.&lt;br /&gt;
&lt;br /&gt;
If they are allowed to &#039;&#039;&#039;update&#039;&#039;&#039;, the user is allowed to update the setting (like changing the permissions of a user or creating a report) but are not allowed to delete.&lt;br /&gt;
&lt;br /&gt;
With the &#039;&#039;&#039;delete&#039;&#039;&#039; action the user is also allowed to delete things.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;all&#039;&#039;&#039; action includes all three other actions.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Resource&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|administration&lt;br /&gt;
|Settings to restart the multimeter, processing or other settings which are in the administration menu.&lt;br /&gt;
|-&lt;br /&gt;
|analysis-profile-settings&lt;br /&gt;
|Settings for the analysis profiles.&lt;br /&gt;
|-&lt;br /&gt;
|analysis-settings&lt;br /&gt;
|Settings which control how you analyze traffic, like the global or module settings.&lt;br /&gt;
|-&lt;br /&gt;
|capture-profile-settings&lt;br /&gt;
|Settings for the capture profiles.&lt;br /&gt;
|-&lt;br /&gt;
|incidents&lt;br /&gt;
|Incidents and Incident settings.&lt;br /&gt;
|-&lt;br /&gt;
|ingress-filter&lt;br /&gt;
|Ingress filter settings.&lt;br /&gt;
|-&lt;br /&gt;
|multi-device&lt;br /&gt;
|Multi-Device Settings.&lt;br /&gt;
|-&lt;br /&gt;
|name-and-lookup&lt;br /&gt;
|Name and look-up settings which are under the settings menu, more info can be found here: [[Names and look-ups]].&lt;br /&gt;
|-&lt;br /&gt;
|remote-export-settings&lt;br /&gt;
|Remote access and export settings.&lt;br /&gt;
|-&lt;br /&gt;
|reports&lt;br /&gt;
|Reports and report settings.&lt;br /&gt;
|-&lt;br /&gt;
|storage&lt;br /&gt;
|Access to storage devices and saved files.&lt;br /&gt;
|-&lt;br /&gt;
|storage-settings&lt;br /&gt;
|Storage settings, like sftp server, activating disks etc.&lt;br /&gt;
|-&lt;br /&gt;
|system-events&lt;br /&gt;
|Access to and settings for the system events log&lt;br /&gt;
|-&lt;br /&gt;
|user-management&lt;br /&gt;
|User management settings which includes users, roles, active sessions etc.&lt;br /&gt;
|-&lt;br /&gt;
|vlg-settings&lt;br /&gt;
|Virtual link group settings. (Everyone is able to read names but more access can be limited here)&lt;br /&gt;
|-&lt;br /&gt;
|wifi-settings&lt;br /&gt;
|Settings for the wifi-module.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Traffic Permissions ===&lt;br /&gt;
The traffic permissions are split into four different views: &#039;&#039;&#039;Live&#039;&#039;&#039;, &#039;&#039;&#039;Replay&#039;&#039;&#039;, &#039;&#039;&#039;Requires 4 eyes&#039;&#039;&#039; and &#039;&#039;&#039;Grants 4 eyes&#039;&#039;&#039;. The &#039;&#039;&#039;any&#039;&#039;&#039; view includes &#039;&#039;&#039;Live&#039;&#039;&#039; and &#039;&#039;&#039;Replay&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The Resources are &#039;&#039;&#039;traffic&#039;&#039;&#039; (which includes all traffic except SIP- and RTP-traffic), &#039;&#039;&#039;SIP&#039;&#039;&#039;-Traffic, &#039;&#039;&#039;RTP&#039;&#039;&#039;-Traffic, &#039;&#039;&#039;capture&#039;&#039;&#039; (for capturing live and replay traffic) and &#039;&#039;&#039;restart&#039;&#039;&#039; (for restarting the live traffic processing or the replay).&lt;br /&gt;
&lt;br /&gt;
For &#039;&#039;&#039;SIP&#039;&#039;&#039;- and &#039;&#039;&#039;RTP&#039;&#039;&#039;-traffic and &#039;&#039;&#039;capturing&#039;&#039;&#039; traffic it is possible to require the approval of another person by checking the &#039;&#039;&#039;Requires 4 Eyes&#039;&#039;&#039; for that resource.&lt;br /&gt;
&lt;br /&gt;
The user which approves the action needs to have the &#039;&#039;&#039;Grants 4 Eyes&#039;&#039;&#039; for the Resource.&lt;br /&gt;
&lt;br /&gt;
There is an additional permission setting restricting the capture functionality. &lt;br /&gt;
&lt;br /&gt;
To use this feature a restricting profile  has to be set in the capture profile settings.&lt;br /&gt;
&lt;br /&gt;
== Password Policy ==&lt;br /&gt;
With version 4.2 the tab &#039;&#039;&#039;Settings&#039;&#039;&#039; with the settings for Password Policies was added. By enabling this settings an additional check will be carried out, scoring the new password by complexity and requiring a score of at least 3 out of 4.&lt;br /&gt;
&lt;br /&gt;
By declaring special words like the company- or team-name the scoring-algorithm will score passwords with these words worse.&lt;br /&gt;
&lt;br /&gt;
== LDAP users ==&lt;br /&gt;
In the LDAP user tab, it is possible to define an LDAP or Active Directory source for user management. LDAP users are only an addition to the locally defined users. Locally defined users take precedence over LDAP users.&lt;br /&gt;
&lt;br /&gt;
The values required depend on the setup of the LDAP server.&lt;br /&gt;
&lt;br /&gt;
The user filter requires a &#039;&#039;&#039;%s&#039;&#039;&#039; as a placeholder for the username.&lt;br /&gt;
&lt;br /&gt;
The group filter requires either &#039;&#039;&#039;%s&#039;&#039;&#039; as a placeholder for the username, or any &#039;&#039;&#039;${value}&#039;&#039;&#039; attribute of the user. The special value &#039;&#039;&#039;${DN}&#039;&#039;&#039; references the distinguished name of the user.&lt;br /&gt;
&lt;br /&gt;
In the &#039;&#039;&#039;Allegro MM users group&#039;&#039;&#039; and &#039;&#039;&#039;Allegro MM admins group&#039;&#039;&#039;, a comma-separated list of the common name of the groups is given. If the user is in any of the groups, they are allowed to log in. If the user is in one of the admins group, they are treated as an administrator.&lt;br /&gt;
&lt;br /&gt;
At the moment, only the roles &#039;&#039;&#039;admin&#039;&#039;&#039; and &#039;&#039;&#039;user&#039;&#039;&#039; can be used for LDAP access.&lt;br /&gt;
&lt;br /&gt;
Example for a simple LDAP setup involving only the username:&lt;br /&gt;
&lt;br /&gt;
 User filter : (uid=%s)&lt;br /&gt;
 Group filter : (memberUid=%s)&lt;br /&gt;
 User group : allegro-mm-users&lt;br /&gt;
 Admin group :  allegro-mm-admins&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Active Directory&#039;&#039;&#039; ====&lt;br /&gt;
For Active Directory, the distinguished name (&#039;${DN}&#039;) is used in the group filter:&lt;br /&gt;
 User filter : (&amp;amp;(sAMAccountName=%s)(objectCategory=person)(objectClass=user)(!sAMAccountType=805306370)(!userAccountControl:1.2.840.113556.1.4.803:=2))&lt;br /&gt;
 Group filter : (&amp;amp;(member=${DN})(objectClass=group))&lt;br /&gt;
 User group : allegro-mm-users&lt;br /&gt;
 Admin group : allegro-mm-admins&lt;br /&gt;
A more complex group filter, using pre-filtering groups for performance reasons in large directories with lots of groups:&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member=${DN})(objectClass=group)(|(cn=allegro-mm-users)(cn=allegro-mm-admins)))&lt;br /&gt;
&lt;br /&gt;
For recursive group membership resolution, the following group filter can be used (but might be slower):&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member:1.2.840.113556.1.4.1941:=${DN})(objectClass=group)(|(cn=allegro-mm-users)(cn=allegro-mm-admins)))&lt;br /&gt;
&lt;br /&gt;
Depending on the setup, it is also possible to filter groups by distinguished name:&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member:1.2.840.113556.1.4.1941:=${DN})(objectClass=group)(|(distinguishedName:=CN=allegro-mm-users,OU=Groups,DC=example,DC=com)(distinguishedName:=CN=allegro-mm-admins,OU=Groups,DC=example,DC=com)))&lt;br /&gt;
&lt;br /&gt;
== TACACS+ users ==&lt;br /&gt;
In the TACACS+ user tab, it is possible to define a TACACS+ server for user management. TACACS+ users are only an addition to the locally defined users. Locally defined users take precedence over TACACS+ users. If both TACACS+ and LDAP are configured, LDAP will be queried first.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Authorization service name&#039;&#039;&#039; defines the TACACS+ service (defined on the TACACS+ server) which is queried in the authorization request.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Authorization group key&#039;&#039;&#039; defines the attribute of the attribute-value pair (AVP) returned in the authroization request, which lists the groups of the user. Theses groups (as defined in the TACACS+ server) can be mapped to roles as defined by the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
==== Example ====&lt;br /&gt;
Lets assume the TACACS+ server is configured to have a service &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;. For this service, it returns the groups of the user as attribute &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;groups&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;. The user groups defined on the TACACS+ server have the names &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro-admins&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;, &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro-users&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039; or &#039;&#039;&#039;allegro-replay&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;.&lt;br /&gt;
&lt;br /&gt;
This would require the following settings on the Allegro Network Multimeter:&lt;br /&gt;
&lt;br /&gt;
 Authorization service name : allegro&lt;br /&gt;
 Authorization group key : groups&lt;br /&gt;
 Group mapping :&lt;br /&gt;
   admin : allegro-admins&lt;br /&gt;
   user : allegro-users&lt;br /&gt;
   replay-user : allegro-replay&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=User_Management&amp;diff=4693</id>
		<title>User Management</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=User_Management&amp;diff=4693"/>
		<updated>2024-02-27T14:10:06Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Administrative Permissions */ typo fixes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The user management page allows managing users which can use the Allegro Network Multimeter. It is possible to:&lt;br /&gt;
&lt;br /&gt;
* Create new local users or configure login via LDAP or TACACS+&lt;br /&gt;
* Edit user parameters&lt;br /&gt;
** Change the password&lt;br /&gt;
** Use two-factor authentication with time-based one-time password (TOTP) algorithm. When this option is enabled, a QR code is displayed that needs to be scanned by a TOTP generator (e.g. FreeOTP or Google Authenticator). The Allegro Network Multimeter and the TOTP generator will generate a one-time password independently which needs to be given at login. Both devices need to be time synchronized (e.g. via NTP).&lt;br /&gt;
** Modify user roles (and therefore permissions and restrictions)&lt;br /&gt;
** Adjust user session timeout/time out in minutes&lt;br /&gt;
&lt;br /&gt;
* Disable users&lt;br /&gt;
: Disabled users are not able to login, but their settings are kept.&lt;br /&gt;
&lt;br /&gt;
* Forget Third Party (LDAP or Tacacs+) users (since firmware version 4.1)&lt;br /&gt;
** This removes the user settings and Two Factor Authentication Settings from the Multimeter&lt;br /&gt;
&lt;br /&gt;
* Delete users.&lt;br /&gt;
&lt;br /&gt;
:Notes:&lt;br /&gt;
:* It is not possible to delete or disable the admin account.&lt;br /&gt;
:* It is not possible to delete or disable the currently logged in user.&lt;br /&gt;
&lt;br /&gt;
== Roles before v4.2 ==&lt;br /&gt;
Multiple roles can be defined per user to allow different permissions.&lt;br /&gt;
&lt;br /&gt;
Only users with the &#039;&#039;&#039;admin&#039;&#039;&#039; role can:&lt;br /&gt;
&lt;br /&gt;
* change system settings&lt;br /&gt;
* manage users&lt;br /&gt;
* configure storage settings&lt;br /&gt;
* use webdav&lt;br /&gt;
&lt;br /&gt;
Roles can be created or deleted (except for the &#039;&#039;&#039;admin&#039;&#039;&#039; role). A role may have several permissions. Permissions are categorized in live view, replay view and 4-eyes authorization. For each category there is a list of permissions that are granted by this role. E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
Following pre defined roles exist:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;admin&#039;&#039;&#039;: with version 4.1 the admin role became editable. Per default this role has all permissions without restrictions.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;users&#039;&#039;&#039;: Users with this role can see all measurement data, but they are not able to change settings.&lt;br /&gt;
*&#039;&#039;&#039;capture&#039;&#039;&#039;: Users with this role are able to start traffic captures.&lt;br /&gt;
*&#039;&#039;&#039;replay-user&#039;&#039;&#039;:  Users can only view measurement data from replay slots (replay of ring buffer or pcap files). The user cannot see live data.&lt;br /&gt;
*&#039;&#039;&#039;restart-analysis&#039;&#039;&#039;: Users can restart already running ring buffer analyses, for example with different start and end time parameters. This is useful if the &#039;&#039;&#039;admin&#039;&#039;&#039; user wants to select which and when a ring buffer should be analyzed but still letting &#039;&#039;&#039;replay-user&#039;&#039;&#039;s to restart the analysis in case they want use a smaller time interval for faster/more detailed analysis.&lt;br /&gt;
*&#039;&#039;&#039;api-pcap-4-eyes-authorization&#039;&#039;&#039;: This role requires an authorization for performing a PCAP from another user with the &#039;&#039;&#039;pcap&#039;&#039;&#039; permission in any of the three categories. In the PCAP dialog a dropdown field is displayed where the user needs to select the other user who should grant the capture. The other user will get a popup dialog for granting or denying the PCAP download.&lt;br /&gt;
*&#039;&#039;&#039;api-voip-4-eyes-authorization&#039;&#039;&#039;: This role requires an authorization for accessing SIP or RTP statistics pages from another user with the &#039;&#039;&#039;sip&#039;&#039;&#039; or &#039;&#039;&#039;rtp&#039;&#039;&#039; (before the version 4.1 this was the voip permission) permissions in a category. On the page that requires authorization an indicator is displayed where the user needs to select the other user who should grant access to that page. The other user will get a popup dialog for granting or denying the access.&lt;br /&gt;
&lt;br /&gt;
These roles can be combined. For example, a user with the &#039;&#039;&#039;replay-user&#039;&#039;&#039; and &#039;&#039;&#039;capture&#039;&#039;&#039; role can only see replay data and can capture traffic from this data, but they cannot capture live data.&lt;br /&gt;
&lt;br /&gt;
== Permissions before v4.2 ==&lt;br /&gt;
Permissions are categorized in live view, replay view and 4-eyes authorization. &lt;br /&gt;
&lt;br /&gt;
For each category there is a list of permissions that are granted by this role. &lt;br /&gt;
&lt;br /&gt;
E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
Following permissions exist:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;all&#039;&#039;&#039;: All permissions are granted. This contains all other permissions mentioned below.&lt;br /&gt;
* &#039;&#039;&#039;pcap&#039;&#039;&#039;: Captures and Webshark access is permitted.&lt;br /&gt;
* &#039;&#039;&#039;voip&#039;&#039;&#039;: Access to SIP and RTP statistics is permitted. (With version 4.1 this was split into the permissions rtp and sip)&lt;br /&gt;
* &#039;&#039;&#039;other&#039;&#039;&#039;: Access to everything else.&lt;br /&gt;
* &#039;&#039;&#039;restart-analysis&#039;&#039;&#039;: Allows restarting ring buffer analysis&lt;br /&gt;
* &#039;&#039;&#039;pcap-analysis&#039;&#039;&#039;: Allows starting and stopping a PCAP analysis.&lt;br /&gt;
With version 4.1 there is an additional permission setting restricting the capture functionality. To use this feature a restricting profile  has to be set in the capture profile settings.&lt;br /&gt;
&lt;br /&gt;
== Roles after v4.2 ==&lt;br /&gt;
Multiple roles can be defined per user to allow for different permissions and some restrictions.&lt;br /&gt;
&lt;br /&gt;
Per default there are the following 5 roles which are meant to be combined, cannot be deleted but are all changeable:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Role&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|admin&lt;br /&gt;
|This role has all permissions and no restrictions per default. The admin user has this role by default.&lt;br /&gt;
|-&lt;br /&gt;
|user&lt;br /&gt;
|This role can see the traffic in any views but is not allowed to capture data or change settings.&lt;br /&gt;
|-&lt;br /&gt;
|replay-user&lt;br /&gt;
|This role is only able to see the traffic in the replay view (e.g. when analyzing a pcap).&lt;br /&gt;
|-&lt;br /&gt;
|capture&lt;br /&gt;
|This role is only allowed to capture traffic in any view.&lt;br /&gt;
|-&lt;br /&gt;
|restart-analysis&lt;br /&gt;
|This role is allowed to restart the processing in any view (e.g. restarting the processing of live traffic and restarting pcap-replays).&lt;br /&gt;
|}&lt;br /&gt;
Roles can be created or deleted (except for the &#039;&#039;&#039;default&#039;&#039;&#039; roles). A role may have several permissions. &lt;br /&gt;
&lt;br /&gt;
== Permissions after v4.2 ==&lt;br /&gt;
Permissions are categorized in live view, replay view and 4-eyes authorization. For each category there is a list of permissions that are granted by this role. E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
There are administrative permissions for the settings and other features (like the incidents) and traffic permissions for the measurement data.&lt;br /&gt;
&lt;br /&gt;
=== Administrative Permissions ===&lt;br /&gt;
The administrative permissions are for different resources like the settings and other features like incidents, reports and more.&lt;br /&gt;
&lt;br /&gt;
Users are able to do &#039;&#039;&#039;actions&#039;&#039;&#039; which are &#039;&#039;&#039;read&#039;&#039;&#039;, &#039;&#039;&#039;update&#039;&#039;&#039; and &#039;&#039;&#039;delete&#039;&#039;&#039;. If the user is only allowed to &#039;&#039;&#039;read&#039;&#039;&#039;, they can only see the active settings but cannot change them.&lt;br /&gt;
&lt;br /&gt;
If they are allowed to &#039;&#039;&#039;update&#039;&#039;&#039;, the user is allowed to update the setting (like changing the permissions of a user or creating a report) but are not allowed to delete.&lt;br /&gt;
&lt;br /&gt;
With the &#039;&#039;&#039;delete&#039;&#039;&#039; action the user is also allowed to delete things.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;all&#039;&#039;&#039; action includes all three other actions.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Resource&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|administration&lt;br /&gt;
|Settings to restart the multimeter, processing or other settings which are in the administration menu.&lt;br /&gt;
|-&lt;br /&gt;
|analysis-profile-settings&lt;br /&gt;
|Settings for the analysis profiles.&lt;br /&gt;
|-&lt;br /&gt;
|analysis-settings&lt;br /&gt;
|Settings which control how you analyze traffic, like the global or module settings.&lt;br /&gt;
|-&lt;br /&gt;
|capture-profile-settings&lt;br /&gt;
|Settings for the capture profiles.&lt;br /&gt;
|-&lt;br /&gt;
|incidents&lt;br /&gt;
|Incidents and Incident settings.&lt;br /&gt;
|-&lt;br /&gt;
|ingress-filter&lt;br /&gt;
|Ingress filter settings.&lt;br /&gt;
|-&lt;br /&gt;
|multi-device&lt;br /&gt;
|Multi-Device Settings.&lt;br /&gt;
|-&lt;br /&gt;
|name-and-lookup&lt;br /&gt;
|Name and look-up settings which are under the settings menu, more info can be found here: [[Names and look-ups]].&lt;br /&gt;
|-&lt;br /&gt;
|remote-export-settings&lt;br /&gt;
|Remote access and export settings.&lt;br /&gt;
|-&lt;br /&gt;
|reports&lt;br /&gt;
|Reports and report settings.&lt;br /&gt;
|-&lt;br /&gt;
|storage&lt;br /&gt;
|Access to storage devices and saved files.&lt;br /&gt;
|-&lt;br /&gt;
|storage-settings&lt;br /&gt;
|Storage settings, like sftp server, activating disks etc.&lt;br /&gt;
|-&lt;br /&gt;
|system-events&lt;br /&gt;
|Access to and settings for the system events log&lt;br /&gt;
|-&lt;br /&gt;
|user-management&lt;br /&gt;
|User management settings which includes users, roles, active sessions etc.&lt;br /&gt;
|-&lt;br /&gt;
|vlg-settings&lt;br /&gt;
|Virtual link group settings. (Everyone is able to read names but more access can be limited here)&lt;br /&gt;
|-&lt;br /&gt;
|wifi-settings&lt;br /&gt;
|Settings for the wifi-module.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Traffic Permissions ===&lt;br /&gt;
The traffic permissions are split into four different views: &#039;&#039;&#039;Live&#039;&#039;&#039;, &#039;&#039;&#039;Replay&#039;&#039;&#039;, &#039;&#039;&#039;Requires 4 eyes&#039;&#039;&#039; and &#039;&#039;&#039;Grants 4 eyes&#039;&#039;&#039;. The &#039;&#039;&#039;any&#039;&#039;&#039; view includes &#039;&#039;&#039;Live&#039;&#039;&#039; and &#039;&#039;&#039;Replay&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The Resources are &#039;&#039;&#039;traffic&#039;&#039;&#039; (which includes all traffic except SIP- and RTP-traffic), &#039;&#039;&#039;SIP&#039;&#039;&#039;-Traffic, &#039;&#039;&#039;RTP&#039;&#039;&#039;-Traffic, &#039;&#039;&#039;capture&#039;&#039;&#039; (for capturing live and replay traffic) and &#039;&#039;&#039;restart&#039;&#039;&#039; (for restarting the live traffic processing or the replay).&lt;br /&gt;
&lt;br /&gt;
For &#039;&#039;&#039;SIP&#039;&#039;&#039;- and &#039;&#039;&#039;RTP&#039;&#039;&#039;-traffic and &#039;&#039;&#039;capturing&#039;&#039;&#039; traffic it is possible to require the approval of another person by checking the &#039;&#039;&#039;Requires 4 Eyes&#039;&#039;&#039; for that resource.&lt;br /&gt;
&lt;br /&gt;
The user which approves the action needs to have the &#039;&#039;&#039;Grants 4 Eyes&#039;&#039;&#039; for the Resource.&lt;br /&gt;
&lt;br /&gt;
There is an additional permission setting restricting the capture functionality. &lt;br /&gt;
&lt;br /&gt;
To use this feature a restricting profile  has to be set in the capture profile settings.&lt;br /&gt;
&lt;br /&gt;
== Password Policy ==&lt;br /&gt;
With version 4.2 The Tab &#039;&#039;&#039;Settings&#039;&#039;&#039; with the settings for Password Policies was added. By enabling this settings an additional check will be carried out, scoring the new password by complexity and requiring a score of 3 out of 4.&lt;br /&gt;
&lt;br /&gt;
By declaring special words like the company- or team-name the scoring-algorithm will score passwords with these words worse.&lt;br /&gt;
&lt;br /&gt;
== LDAP users ==&lt;br /&gt;
In the LDAP user tab, it is possible to define an LDAP or Active Directory source for user management. LDAP users are only an addition to the locally defined users. Locally defined users take precedence over LDAP users.&lt;br /&gt;
&lt;br /&gt;
The values required depend on the setup of the LDAP server.&lt;br /&gt;
&lt;br /&gt;
The user filter requires a &#039;&#039;&#039;%s&#039;&#039;&#039; as a placeholder for the username.&lt;br /&gt;
&lt;br /&gt;
The group filter requires either &#039;&#039;&#039;%s&#039;&#039;&#039; as a placeholder for the username, or any &#039;&#039;&#039;${value}&#039;&#039;&#039; attribute of the user. The special value &#039;&#039;&#039;${DN}&#039;&#039;&#039; references the distinguished name of the user.&lt;br /&gt;
&lt;br /&gt;
In the &#039;&#039;&#039;Allegro MM users group&#039;&#039;&#039; and &#039;&#039;&#039;Allegro MM admins group&#039;&#039;&#039;, a comma-separated list of the common name of the groups is given. If the user is in any of the groups, they are allowed to log in. If the user is in one of the admins group, they are treated as an administrator.&lt;br /&gt;
&lt;br /&gt;
At the moment, only the roles &#039;&#039;&#039;admin&#039;&#039;&#039; and &#039;&#039;&#039;user&#039;&#039;&#039; can be used for LDAP access.&lt;br /&gt;
&lt;br /&gt;
Example for a simple LDAP setup involving only the username:&lt;br /&gt;
&lt;br /&gt;
 User filter : (uid=%s)&lt;br /&gt;
 Group filter : (memberUid=%s)&lt;br /&gt;
 User group : allegro-mm-users&lt;br /&gt;
 Admin group :  allegro-mm-admins&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Active Directory&#039;&#039;&#039; ====&lt;br /&gt;
For Active Directory, the distinguished name (&#039;${DN}&#039;) is used in the group filter:&lt;br /&gt;
 User filter : (&amp;amp;(sAMAccountName=%s)(objectCategory=person)(objectClass=user)(!sAMAccountType=805306370)(!userAccountControl:1.2.840.113556.1.4.803:=2))&lt;br /&gt;
 Group filter : (&amp;amp;(member=${DN})(objectClass=group))&lt;br /&gt;
 User group : allegro-mm-users&lt;br /&gt;
 Admin group : allegro-mm-admins&lt;br /&gt;
A more complex group filter, using pre-filtering groups for performance reasons in large directories with lots of groups:&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member=${DN})(objectClass=group)(|(cn=allegro-mm-users)(cn=allegro-mm-admins)))&lt;br /&gt;
&lt;br /&gt;
For recursive group membership resolution, the following group filter can be used (but might be slower):&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member:1.2.840.113556.1.4.1941:=${DN})(objectClass=group)(|(cn=allegro-mm-users)(cn=allegro-mm-admins)))&lt;br /&gt;
&lt;br /&gt;
Depending on the setup, it is also possible to filter groups by distinguished name:&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member:1.2.840.113556.1.4.1941:=${DN})(objectClass=group)(|(distinguishedName:=CN=allegro-mm-users,OU=Groups,DC=example,DC=com)(distinguishedName:=CN=allegro-mm-admins,OU=Groups,DC=example,DC=com)))&lt;br /&gt;
&lt;br /&gt;
== TACACS+ users ==&lt;br /&gt;
In the TACACS+ user tab, it is possible to define a TACACS+ server for user management. TACACS+ users are only an addition to the locally defined users. Locally defined users take precedence over TACACS+ users. If both TACACS+ and LDAP are configured, LDAP will be queried first.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Authorization service name&#039;&#039;&#039; defines the TACACS+ service (defined on the TACACS+ server) which is queried in the authorization request.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Authorization group key&#039;&#039;&#039; defines the attribute of the attribute-value pair (AVP) returned in the authroization request, which lists the groups of the user. Theses groups (as defined in the TACACS+ server) can be mapped to roles as defined by the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
==== Example ====&lt;br /&gt;
Lets assume the TACACS+ server is configured to have a service &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;. For this service, it returns the groups of the user as attribute &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;groups&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;. The user groups defined on the TACACS+ server have the names &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro-admins&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;, &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro-users&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039; or &#039;&#039;&#039;allegro-replay&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;.&lt;br /&gt;
&lt;br /&gt;
This would require the following settings on the Allegro Network Multimeter:&lt;br /&gt;
&lt;br /&gt;
 Authorization service name : allegro&lt;br /&gt;
 Authorization group key : groups&lt;br /&gt;
 Group mapping :&lt;br /&gt;
   admin : allegro-admins&lt;br /&gt;
   user : allegro-users&lt;br /&gt;
   replay-user : allegro-replay&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=User_Management&amp;diff=4692</id>
		<title>User Management</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=User_Management&amp;diff=4692"/>
		<updated>2024-02-27T13:59:43Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Roles after v4.2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The user management page allows managing users which can use the Allegro Network Multimeter. It is possible to:&lt;br /&gt;
&lt;br /&gt;
* Create new local users or configure login via LDAP or TACACS+&lt;br /&gt;
* Edit user parameters&lt;br /&gt;
** Change the password&lt;br /&gt;
** Use two-factor authentication with time-based one-time password (TOTP) algorithm. When this option is enabled, a QR code is displayed that needs to be scanned by a TOTP generator (e.g. FreeOTP or Google Authenticator). The Allegro Network Multimeter and the TOTP generator will generate a one-time password independently which needs to be given at login. Both devices need to be time synchronized (e.g. via NTP).&lt;br /&gt;
** Modify user roles (and therefore permissions and restrictions)&lt;br /&gt;
** Adjust user session timeout/time out in minutes&lt;br /&gt;
&lt;br /&gt;
* Disable users&lt;br /&gt;
: Disabled users are not able to login, but their settings are kept.&lt;br /&gt;
&lt;br /&gt;
* Forget Third Party (LDAP or Tacacs+) users (since firmware version 4.1)&lt;br /&gt;
** This removes the user settings and Two Factor Authentication Settings from the Multimeter&lt;br /&gt;
&lt;br /&gt;
* Delete users.&lt;br /&gt;
&lt;br /&gt;
:Notes:&lt;br /&gt;
:* It is not possible to delete or disable the admin account.&lt;br /&gt;
:* It is not possible to delete or disable the currently logged in user.&lt;br /&gt;
&lt;br /&gt;
== Roles before v4.2 ==&lt;br /&gt;
Multiple roles can be defined per user to allow different permissions.&lt;br /&gt;
&lt;br /&gt;
Only users with the &#039;&#039;&#039;admin&#039;&#039;&#039; role can:&lt;br /&gt;
&lt;br /&gt;
* change system settings&lt;br /&gt;
* manage users&lt;br /&gt;
* configure storage settings&lt;br /&gt;
* use webdav&lt;br /&gt;
&lt;br /&gt;
Roles can be created or deleted (except for the &#039;&#039;&#039;admin&#039;&#039;&#039; role). A role may have several permissions. Permissions are categorized in live view, replay view and 4-eyes authorization. For each category there is a list of permissions that are granted by this role. E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
Following pre defined roles exist:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;admin&#039;&#039;&#039;: with version 4.1 the admin role became editable. Per default this role has all permissions without restrictions.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;users&#039;&#039;&#039;: Users with this role can see all measurement data, but they are not able to change settings.&lt;br /&gt;
*&#039;&#039;&#039;capture&#039;&#039;&#039;: Users with this role are able to start traffic captures.&lt;br /&gt;
*&#039;&#039;&#039;replay-user&#039;&#039;&#039;:  Users can only view measurement data from replay slots (replay of ring buffer or pcap files). The user cannot see live data.&lt;br /&gt;
*&#039;&#039;&#039;restart-analysis&#039;&#039;&#039;: Users can restart already running ring buffer analyses, for example with different start and end time parameters. This is useful if the &#039;&#039;&#039;admin&#039;&#039;&#039; user wants to select which and when a ring buffer should be analyzed but still letting &#039;&#039;&#039;replay-user&#039;&#039;&#039;s to restart the analysis in case they want use a smaller time interval for faster/more detailed analysis.&lt;br /&gt;
*&#039;&#039;&#039;api-pcap-4-eyes-authorization&#039;&#039;&#039;: This role requires an authorization for performing a PCAP from another user with the &#039;&#039;&#039;pcap&#039;&#039;&#039; permission in any of the three categories. In the PCAP dialog a dropdown field is displayed where the user needs to select the other user who should grant the capture. The other user will get a popup dialog for granting or denying the PCAP download.&lt;br /&gt;
*&#039;&#039;&#039;api-voip-4-eyes-authorization&#039;&#039;&#039;: This role requires an authorization for accessing SIP or RTP statistics pages from another user with the &#039;&#039;&#039;sip&#039;&#039;&#039; or &#039;&#039;&#039;rtp&#039;&#039;&#039; (before the version 4.1 this was the voip permission) permissions in a category. On the page that requires authorization an indicator is displayed where the user needs to select the other user who should grant access to that page. The other user will get a popup dialog for granting or denying the access.&lt;br /&gt;
&lt;br /&gt;
These roles can be combined. For example, a user with the &#039;&#039;&#039;replay-user&#039;&#039;&#039; and &#039;&#039;&#039;capture&#039;&#039;&#039; role can only see replay data and can capture traffic from this data, but they cannot capture live data.&lt;br /&gt;
&lt;br /&gt;
== Permissions before v4.2 ==&lt;br /&gt;
Permissions are categorized in live view, replay view and 4-eyes authorization. &lt;br /&gt;
&lt;br /&gt;
For each category there is a list of permissions that are granted by this role. &lt;br /&gt;
&lt;br /&gt;
E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
Following permissions exist:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;all&#039;&#039;&#039;: All permissions are granted. This contains all other permissions mentioned below.&lt;br /&gt;
* &#039;&#039;&#039;pcap&#039;&#039;&#039;: Captures and Webshark access is permitted.&lt;br /&gt;
* &#039;&#039;&#039;voip&#039;&#039;&#039;: Access to SIP and RTP statistics is permitted. (With version 4.1 this was split into the permissions rtp and sip)&lt;br /&gt;
* &#039;&#039;&#039;other&#039;&#039;&#039;: Access to everything else.&lt;br /&gt;
* &#039;&#039;&#039;restart-analysis&#039;&#039;&#039;: Allows restarting ring buffer analysis&lt;br /&gt;
* &#039;&#039;&#039;pcap-analysis&#039;&#039;&#039;: Allows starting and stopping a PCAP analysis.&lt;br /&gt;
With version 4.1 there is an additional permission setting restricting the capture functionality. To use this feature a restricting profile  has to be set in the capture profile settings.&lt;br /&gt;
&lt;br /&gt;
== Roles after v4.2 ==&lt;br /&gt;
Multiple roles can be defined per user to allow for different permissions and some restrictions.&lt;br /&gt;
&lt;br /&gt;
Per default there are the following 5 roles which are meant to be combined, cannot be deleted but are all changeable:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Role&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|admin&lt;br /&gt;
|This role has all permissions and no restrictions per default. The admin user has this role by default.&lt;br /&gt;
|-&lt;br /&gt;
|user&lt;br /&gt;
|This role can see the traffic in any views but is not allowed to capture data or change settings.&lt;br /&gt;
|-&lt;br /&gt;
|replay-user&lt;br /&gt;
|This role is only able to see the traffic in the replay view (e.g. when analyzing a pcap).&lt;br /&gt;
|-&lt;br /&gt;
|capture&lt;br /&gt;
|This role is only allowed to capture traffic in any view.&lt;br /&gt;
|-&lt;br /&gt;
|restart-analysis&lt;br /&gt;
|This role is allowed to restart the processing in any view (e.g. restarting the processing of live traffic and restarting pcap-replays).&lt;br /&gt;
|}&lt;br /&gt;
Roles can be created or deleted (except for the &#039;&#039;&#039;default&#039;&#039;&#039; roles). A role may have several permissions. &lt;br /&gt;
&lt;br /&gt;
== Permissions after v4.2 ==&lt;br /&gt;
Permissions are categorized in live view, replay view and 4-eyes authorization. For each category there is a list of permissions that are granted by this role. E.g. if only the permission &#039;pcap&#039; is selected in live view, the role only allows performing capturing in the corresponding view.&lt;br /&gt;
&lt;br /&gt;
There are administrative permissions for the settings and other features (like the incidents) and traffic permissions for the measurement data.&lt;br /&gt;
&lt;br /&gt;
=== Administrative Permissions ===&lt;br /&gt;
The administrative permissions are for different resources like the settings and other features like incidents, reports and more.&lt;br /&gt;
&lt;br /&gt;
User are able to do &#039;&#039;&#039;actions&#039;&#039;&#039; which are &#039;&#039;&#039;read&#039;&#039;&#039;, &#039;&#039;&#039;update&#039;&#039;&#039; and &#039;&#039;&#039;delete&#039;&#039;&#039;. If the user is only allowed to &#039;&#039;&#039;read&#039;&#039;&#039;, they can only see the active settings but cannot change them.&lt;br /&gt;
&lt;br /&gt;
If they are allowed to &#039;&#039;&#039;update&#039;&#039;&#039;, the user is allowed to update the setting (like changing the permissions of a user or creating a report) but are not allowed to delete.&lt;br /&gt;
&lt;br /&gt;
With the &#039;&#039;&#039;delete&#039;&#039;&#039; action the user is also allowed to delete things.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;all&#039;&#039;&#039; action includes all three other actions.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Resource&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|administration&lt;br /&gt;
|Settings to restart the multimeter, processing or other settings which are in the administration menu.&lt;br /&gt;
|-&lt;br /&gt;
|analysis-profile-settins&lt;br /&gt;
|Settings for the analysis profiles.&lt;br /&gt;
|-&lt;br /&gt;
|analysis-settings&lt;br /&gt;
|Settings which control how you analyze traffic, like the global or module settings.&lt;br /&gt;
|-&lt;br /&gt;
|capture-profile-settings&lt;br /&gt;
|Settings for the capture profiles.&lt;br /&gt;
|-&lt;br /&gt;
|incidents&lt;br /&gt;
|Incidents and Incident settings.&lt;br /&gt;
|-&lt;br /&gt;
|ingress-filter&lt;br /&gt;
|Ingress filter settings.&lt;br /&gt;
|-&lt;br /&gt;
|multi-device&lt;br /&gt;
|Multi-Device Settings.&lt;br /&gt;
|-&lt;br /&gt;
|name-and-lookup&lt;br /&gt;
|Name and look-up settings which are under the settings menu, more info can be found here: [[Names and look-ups]].&lt;br /&gt;
|-&lt;br /&gt;
|remote-export-settings&lt;br /&gt;
|Remote access and export settings.&lt;br /&gt;
|-&lt;br /&gt;
|reports&lt;br /&gt;
|Reports and report settings.&lt;br /&gt;
|-&lt;br /&gt;
|storage&lt;br /&gt;
|Access to storage devices and saved files.&lt;br /&gt;
|-&lt;br /&gt;
|storage-settings&lt;br /&gt;
|Storage settings, like sftp server, activating disks etc.&lt;br /&gt;
|-&lt;br /&gt;
|system-events&lt;br /&gt;
|Access to and settings for the system events log&lt;br /&gt;
|-&lt;br /&gt;
|user-management&lt;br /&gt;
|User management settings which includes users, roles, active sessions etc.&lt;br /&gt;
|-&lt;br /&gt;
|vlg-settings&lt;br /&gt;
|Virtual link group settings. (Everyone is able to read names but more access can be limited here)&lt;br /&gt;
|-&lt;br /&gt;
|wifi-settings&lt;br /&gt;
|Settings for the wifi-module.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Traffic Permissions ===&lt;br /&gt;
The traffic permissions are split into four different views: &#039;&#039;&#039;Live&#039;&#039;&#039;, &#039;&#039;&#039;Replay&#039;&#039;&#039;, &#039;&#039;&#039;Requires 4 eyes&#039;&#039;&#039; and &#039;&#039;&#039;Grants 4 eyes&#039;&#039;&#039;. The &#039;&#039;&#039;any&#039;&#039;&#039; view includes &#039;&#039;&#039;Live&#039;&#039;&#039; and &#039;&#039;&#039;Replay&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The Resources are &#039;&#039;&#039;traffic&#039;&#039;&#039; (which includes all traffic except SIP- and RTP-traffic), &#039;&#039;&#039;SIP&#039;&#039;&#039;-Traffic, &#039;&#039;&#039;RTP&#039;&#039;&#039;-Traffic, &#039;&#039;&#039;capture&#039;&#039;&#039; (for capturing live and replay traffic) and &#039;&#039;&#039;restart&#039;&#039;&#039; (for restarting the live traffic processing or the replay).&lt;br /&gt;
&lt;br /&gt;
For &#039;&#039;&#039;SIP&#039;&#039;&#039;- and &#039;&#039;&#039;RTP&#039;&#039;&#039;-traffic and &#039;&#039;&#039;capturing&#039;&#039;&#039; traffic it is possible to require the approval of another person by checking the &#039;&#039;&#039;Requires 4 Eyes&#039;&#039;&#039; for that resource.&lt;br /&gt;
&lt;br /&gt;
The user which approves the action has to has the &#039;&#039;&#039;Grants 4 Eyes&#039;&#039;&#039; for the Resource.&lt;br /&gt;
&lt;br /&gt;
There is an additional permission setting restricting the capture functionality. &lt;br /&gt;
&lt;br /&gt;
To use this feature a restricting profile  has to be set in the capture profile settings.&lt;br /&gt;
&lt;br /&gt;
== Password Policy ==&lt;br /&gt;
With version 4.2 The Tab &#039;&#039;&#039;Settings&#039;&#039;&#039; with the settings for Password Policies was added. By enabling this settings an additional check will be carried out, scoring the new password by complexity and requiring a score of 3 out of 4.&lt;br /&gt;
&lt;br /&gt;
By declaring special words like the company- or team-name the scoring-algorithm will score passwords with these words worse.&lt;br /&gt;
&lt;br /&gt;
== LDAP users ==&lt;br /&gt;
In the LDAP user tab, it is possible to define an LDAP or Active Directory source for user management. LDAP users are only an addition to the locally defined users. Locally defined users take precedence over LDAP users.&lt;br /&gt;
&lt;br /&gt;
The values required depend on the setup of the LDAP server.&lt;br /&gt;
&lt;br /&gt;
The user filter requires a &#039;&#039;&#039;%s&#039;&#039;&#039; as a placeholder for the username.&lt;br /&gt;
&lt;br /&gt;
The group filter requires either &#039;&#039;&#039;%s&#039;&#039;&#039; as a placeholder for the username, or any &#039;&#039;&#039;${value}&#039;&#039;&#039; attribute of the user. The special value &#039;&#039;&#039;${DN}&#039;&#039;&#039; references the distinguished name of the user.&lt;br /&gt;
&lt;br /&gt;
In the &#039;&#039;&#039;Allegro MM users group&#039;&#039;&#039; and &#039;&#039;&#039;Allegro MM admins group&#039;&#039;&#039;, a comma-separated list of the common name of the groups is given. If the user is in any of the groups, they are allowed to log in. If the user is in one of the admins group, they are treated as an administrator.&lt;br /&gt;
&lt;br /&gt;
At the moment, only the roles &#039;&#039;&#039;admin&#039;&#039;&#039; and &#039;&#039;&#039;user&#039;&#039;&#039; can be used for LDAP access.&lt;br /&gt;
&lt;br /&gt;
Example for a simple LDAP setup involving only the username:&lt;br /&gt;
&lt;br /&gt;
 User filter : (uid=%s)&lt;br /&gt;
 Group filter : (memberUid=%s)&lt;br /&gt;
 User group : allegro-mm-users&lt;br /&gt;
 Admin group :  allegro-mm-admins&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Active Directory&#039;&#039;&#039; ====&lt;br /&gt;
For Active Directory, the distinguished name (&#039;${DN}&#039;) is used in the group filter:&lt;br /&gt;
 User filter : (&amp;amp;(sAMAccountName=%s)(objectCategory=person)(objectClass=user)(!sAMAccountType=805306370)(!userAccountControl:1.2.840.113556.1.4.803:=2))&lt;br /&gt;
 Group filter : (&amp;amp;(member=${DN})(objectClass=group))&lt;br /&gt;
 User group : allegro-mm-users&lt;br /&gt;
 Admin group : allegro-mm-admins&lt;br /&gt;
A more complex group filter, using pre-filtering groups for performance reasons in large directories with lots of groups:&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member=${DN})(objectClass=group)(|(cn=allegro-mm-users)(cn=allegro-mm-admins)))&lt;br /&gt;
&lt;br /&gt;
For recursive group membership resolution, the following group filter can be used (but might be slower):&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member:1.2.840.113556.1.4.1941:=${DN})(objectClass=group)(|(cn=allegro-mm-users)(cn=allegro-mm-admins)))&lt;br /&gt;
&lt;br /&gt;
Depending on the setup, it is also possible to filter groups by distinguished name:&lt;br /&gt;
&lt;br /&gt;
 Group filter : (&amp;amp;(member:1.2.840.113556.1.4.1941:=${DN})(objectClass=group)(|(distinguishedName:=CN=allegro-mm-users,OU=Groups,DC=example,DC=com)(distinguishedName:=CN=allegro-mm-admins,OU=Groups,DC=example,DC=com)))&lt;br /&gt;
&lt;br /&gt;
== TACACS+ users ==&lt;br /&gt;
In the TACACS+ user tab, it is possible to define a TACACS+ server for user management. TACACS+ users are only an addition to the locally defined users. Locally defined users take precedence over TACACS+ users. If both TACACS+ and LDAP are configured, LDAP will be queried first.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Authorization service name&#039;&#039;&#039; defines the TACACS+ service (defined on the TACACS+ server) which is queried in the authorization request.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Authorization group key&#039;&#039;&#039; defines the attribute of the attribute-value pair (AVP) returned in the authroization request, which lists the groups of the user. Theses groups (as defined in the TACACS+ server) can be mapped to roles as defined by the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
==== Example ====&lt;br /&gt;
Lets assume the TACACS+ server is configured to have a service &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;. For this service, it returns the groups of the user as attribute &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;groups&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;. The user groups defined on the TACACS+ server have the names &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro-admins&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;, &#039;&amp;lt;nowiki/&amp;gt;&#039;&#039;allegro-users&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039; or &#039;&#039;&#039;allegro-replay&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039;.&lt;br /&gt;
&lt;br /&gt;
This would require the following settings on the Allegro Network Multimeter:&lt;br /&gt;
&lt;br /&gt;
 Authorization service name : allegro&lt;br /&gt;
 Authorization group key : groups&lt;br /&gt;
 Group mapping :&lt;br /&gt;
   admin : allegro-admins&lt;br /&gt;
   user : allegro-users&lt;br /&gt;
   replay-user : allegro-replay&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=User_Profile_Settings&amp;diff=4691</id>
		<title>User Profile Settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=User_Profile_Settings&amp;diff=4691"/>
		<updated>2024-02-27T13:34:05Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: clean-up and reordering&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The user profile is accessible at the top right button.&lt;br /&gt;
&lt;br /&gt;
The drop down menu allows to change the web site language, to log out, and to access the profile settings.&lt;br /&gt;
&lt;br /&gt;
Each user can have different settings.&lt;br /&gt;
&lt;br /&gt;
== User settings ==&lt;br /&gt;
The following user settings are available:&lt;br /&gt;
&lt;br /&gt;
* Use offline manual: if enabled, the manual buttons will link to a local copy of this wiki manual.&lt;br /&gt;
* Detail level of displayed graphs: This option allows to configure the displayed graph details. Higher levels use more data points for plotting.&lt;br /&gt;
** Advantage: Graphs are more detailed, especially for longer time periods&lt;br /&gt;
** Disadvantages:&lt;br /&gt;
*** The web interfaces uses more bandwidth when updating the statistics.&lt;br /&gt;
*** The web browser uses more processing time for rendering the graphs.&lt;br /&gt;
** Note: This settings only affects the graph rendering in the web interface. The available number of data points depend on the settings for the [[Global settings#Graph detail settings|graph resolution]], and some other traffic related factors, like activity of an IP address. So the chosen detail level might not always be available.&lt;br /&gt;
** Additional bandwidth requirements for web interface in comparison to the lowest level:&lt;br /&gt;
*** level low: +50% data transferred&lt;br /&gt;
*** level medium: +100% data transferred&lt;br /&gt;
*** level high: +200% data transferred&lt;br /&gt;
*** level ultra: +300% data transferred&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Example bandwidth usage for the initial dashboard:&lt;br /&gt;
!Detail level&lt;br /&gt;
!Top users dashboard data transfer&lt;br /&gt;
|-&lt;br /&gt;
|lowest&lt;br /&gt;
|350-400 kbit/s&lt;br /&gt;
|-&lt;br /&gt;
| low&lt;br /&gt;
|530-570 kbit/s&lt;br /&gt;
|-&lt;br /&gt;
| medium&lt;br /&gt;
|700-880 kbit/s&lt;br /&gt;
|-&lt;br /&gt;
| high&lt;br /&gt;
|1 MBit/s-1.4 MBit/s&lt;br /&gt;
|-&lt;br /&gt;
|ultra&lt;br /&gt;
|2 MBit/s&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Change password ===&lt;br /&gt;
The password of the current user can be changed by entering the current password and the new password.&lt;br /&gt;
&lt;br /&gt;
=== Two Factor Authentication ===&lt;br /&gt;
Two-factor authentication with time-based one-time password (TOTP) algorithm can be used. When this option is enabled, a QR code is displayed that needs to be scanned by a TOTP generator (e.g. FreeOTP or Google Authenticator). The Allegro Network Multimeter and the TOTP generator will generate a one-time password independently which needs to be given at login. Both devices needs to be time synchronized (e.g. via NTP). &lt;br /&gt;
&lt;br /&gt;
Starting from version 4.1 this is also possible for administrators and third-party accounts. &lt;br /&gt;
&lt;br /&gt;
=== Permissions ===&lt;br /&gt;
Users are able to see their own permissions.&lt;br /&gt;
&lt;br /&gt;
=== API Token ===&lt;br /&gt;
API Token can be created with either the same or less permissions than the user creating them has got.&lt;br /&gt;
&lt;br /&gt;
These tokens can be used for accessing the API of the multi-device or for adding the device as Remote Multimeter in the [[Multi-device settings]].&lt;br /&gt;
&lt;br /&gt;
=== SSH Keys ===&lt;br /&gt;
SSH Keys can be used to access the internal SFTP server of the multimeter.&lt;br /&gt;
&lt;br /&gt;
=== Reset stored settings ===&lt;br /&gt;
Many context specific settings are stored in the user session automatically, such as filter expressions, number of elements per table page, etc. Those settings can be cleared by clicking on the corresponding button.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4680</id>
		<title>IEC61850 module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4680"/>
		<updated>2024-02-19T14:57:23Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Use screenshots of devices and connections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IEC 61850 module shows information about communication protocols for intelligent electronic devices at electrical substations. These currently supported protocols are:&lt;br /&gt;
&lt;br /&gt;
* GOOSE (&#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent)&lt;br /&gt;
* Sampled Values&lt;br /&gt;
&lt;br /&gt;
The recognized data is transferred as payload of OSI-Layer 2 packets (optionally with VLAN tags). For GOOSE (in &#039;&#039;&#039;P&#039;&#039;&#039;rotocol &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - PDU) and Sampled Values (in &#039;&#039;&#039;A&#039;&#039;&#039;pplication &#039;&#039;&#039;S&#039;&#039;&#039;ervice &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - ASDU) data units, sequence counters are used to allow reordering the received packets and detecting lost packets.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:IEC61850 dashboard.png|thumb|IEC&amp;amp;nbsp;61850 overview]]&lt;br /&gt;
Information about all recognized IEC&amp;amp;nbsp;61850 packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of each IEC&amp;amp;nbsp;61850 protocol on the overall traffic.&lt;br /&gt;
&lt;br /&gt;
For each of the protocols, measures of packets and data (accumulated and as per second rate), provide an impression of the used network capacity. Problems in the packet sequence are available as counters for expected packets (according to seen sequence numbers), lost packets (expected sequence number missing), repeated packets (sequence number seen multiple times). A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
&lt;br /&gt;
[[File:IEC61850 devices.png|thumb|IEC&amp;amp;nbsp;61850 devices]]&lt;br /&gt;
All devices sending or receiving IEC&amp;amp;nbsp;61850 traffic are shown with their MAC address and the detected protocol. Besides packet counts and data rates of the protocol, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
&lt;br /&gt;
* general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific device and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown devices to the specific needs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
&lt;br /&gt;
[[File:IEC61850 connections.png|thumb|IEC&amp;amp;nbsp;61850 connections]]&lt;br /&gt;
All connections containing IEC&amp;amp;nbsp;61850 traffic are shown with their two communication partners&#039; MAC address and the detected protocol. Besides packet counts, data rates and time of last detected activity, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
*general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific connection and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown connections to the specific needs.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:IEC61850_devices.png&amp;diff=4679</id>
		<title>File:IEC61850 devices.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:IEC61850_devices.png&amp;diff=4679"/>
		<updated>2024-02-19T14:49:53Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:IEC61850_connections.png&amp;diff=4678</id>
		<title>File:IEC61850 connections.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:IEC61850_connections.png&amp;diff=4678"/>
		<updated>2024-02-19T14:47:33Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:IEC61850_dashboard.png&amp;diff=4669</id>
		<title>File:IEC61850 dashboard.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:IEC61850_dashboard.png&amp;diff=4669"/>
		<updated>2024-02-13T09:49:38Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut uploaded a new version of File:IEC61850 dashboard.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IEC 61850 module overview page&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4660</id>
		<title>IEC61850 module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4660"/>
		<updated>2024-02-05T13:05:43Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: /* Overview */ add overview screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IEC 61850 module shows information about communication protocols for intelligent electronic devices at electrical substations. These currently supported protocols are:&lt;br /&gt;
&lt;br /&gt;
* GOOSE (&#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent)&lt;br /&gt;
* Sampled Values&lt;br /&gt;
&lt;br /&gt;
The recognized data is transferred as payload of OSI-Layer 2 packets (optionally with VLAN tags). For GOOSE (in &#039;&#039;&#039;P&#039;&#039;&#039;rotocol &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - PDU) and Sampled Values (in &#039;&#039;&#039;A&#039;&#039;&#039;pplication &#039;&#039;&#039;S&#039;&#039;&#039;ervice &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - ASDU) data units, sequence counters are used to allow reordering the received packets and detecting lost packets.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:IEC61850 dashboard.png|thumb|IEC&amp;amp;nbsp;61850 overview]]&lt;br /&gt;
Information about all recognized IEC&amp;amp;nbsp;61850 packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of each IEC&amp;amp;nbsp;61850 protocol on the overall traffic.&lt;br /&gt;
&lt;br /&gt;
For each of the protocols, measures of packets and data (accumulated and as per second rate), provide an impression of the used network capacity. Problems in the packet sequence are available as counters for expected packets (according to seen sequence numbers), lost packets (expected sequence number missing), repeated packets (sequence number seen multiple times). A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
All devices sending or receiving IEC&amp;amp;nbsp;61850 traffic are shown with their MAC address and the detected protocol. Besides packet counts and data rates of the protocol, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
&lt;br /&gt;
* general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific device and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown devices to the specific needs.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
All connections containing IEC&amp;amp;nbsp;61850 traffic are shown with their two communication partners&#039; MAC address and the detected protocol. Besides packet counts, data rates and time of last detected activity, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
*general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific connection and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown connections to the specific needs.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:IEC61850_dashboard.png&amp;diff=4659</id>
		<title>File:IEC61850 dashboard.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:IEC61850_dashboard.png&amp;diff=4659"/>
		<updated>2024-02-05T13:02:45Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: IEC 61850 module overview page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IEC 61850 module overview page&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4658</id>
		<title>IEC61850 module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4658"/>
		<updated>2024-02-05T12:59:13Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Connections tab description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IEC 61850 module shows information about communication protocols for intelligent electronic devices at electrical substations. These currently supported protocols are:&lt;br /&gt;
&lt;br /&gt;
* GOOSE (&#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent)&lt;br /&gt;
* Sampled Values&lt;br /&gt;
&lt;br /&gt;
The recognized data is transferred as payload of OSI-Layer 2 packets (optionally with VLAN tags). For GOOSE (in &#039;&#039;&#039;P&#039;&#039;&#039;rotocol &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - PDU) and Sampled Values (in &#039;&#039;&#039;A&#039;&#039;&#039;pplication &#039;&#039;&#039;S&#039;&#039;&#039;ervice &#039;&#039;&#039;D&#039;&#039;&#039;ata &#039;&#039;&#039;U&#039;&#039;&#039;nit - ASDU) data units, sequence counters are used to allow reordering the received packets and detecting lost packets.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
Information about all recognized IEC&amp;amp;nbsp;61850 packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of each IEC&amp;amp;nbsp;61850 protocol on the overall traffic.&lt;br /&gt;
&lt;br /&gt;
For each of the protocols, measures of packets and data (accumulated and as per second rate), provide an impression of the used network capacity. Problems in the packet sequence are available as counters for expected packets (according to seen sequence numbers), lost packets (expected sequence number missing), repeated packets (sequence number seen multiple times). A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
All devices sending or receiving IEC&amp;amp;nbsp;61850 traffic are shown with their MAC address and the detected protocol. Besides packet counts and data rates of the protocol, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
&lt;br /&gt;
* general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific device and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown devices to the specific needs.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;br /&gt;
All connections containing IEC&amp;amp;nbsp;61850 traffic are shown with their two communication partners&#039; MAC address and the detected protocol. Besides packet counts, data rates and time of last detected activity, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
*general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific connection and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown connections to the specific needs.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4655</id>
		<title>IEC61850 module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4655"/>
		<updated>2024-01-31T17:20:49Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Overview and Devices section text&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IEC 61850 module shows information about communication protocols for intelligent electronic devices at electrical substations. These currently supported protocols are:&lt;br /&gt;
&lt;br /&gt;
* GOOSE (&#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent)&lt;br /&gt;
* Sampled Values&lt;br /&gt;
&lt;br /&gt;
The recognized data is transferred as payload of OSI-Layer 2 packets (optionally with VLAN tags). For GOOSE and Sampled Values data units, sequence counters are used to allow reordering the received packets and detecting lost packets.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
Information about all recognized IEC&amp;amp;nbsp;61850 packets are shown as values and graphs to give a quick overview. Global traffic can be shown in the traffic graph to see the share of each IEC&amp;amp;nbsp;61850 protocol on the overall traffic.&lt;br /&gt;
&lt;br /&gt;
For each of the protocols, measures of packets and data (accumulated and as per second rate), provide an impression of the used network capacity. Problems in the packet sequence are available as counters for expected packets (according to seen sequence numbers), lost packets (expected sequence number missing), repeated packets (sequence number seen multiple times). A PCAP download button allows capturing that traffic.&lt;br /&gt;
&lt;br /&gt;
== Devices ==&lt;br /&gt;
All devices sending or receiving IEC&amp;amp;nbsp;61850 traffic are show with their MAC address and the detected protocol. Besides packet counts and data rates of the protocol, quality measures like expected, lost and repeated data units/packets are shown. For having a quick overview, multiple graphs can be shown simultaneously for:&lt;br /&gt;
&lt;br /&gt;
* general IEC&amp;amp;nbsp;61850 traffic rate&lt;br /&gt;
* GOOSE packet rate rate&lt;br /&gt;
* Sampled Values data unit rate&lt;br /&gt;
&lt;br /&gt;
The traffic for the specific device and protocol can be captured using the PCAP download button.&lt;br /&gt;
&lt;br /&gt;
A complex filter for the shown row values can be used to limit the shown devices to the specific needs.&lt;br /&gt;
&lt;br /&gt;
== Connections ==&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=GOOSE_module&amp;diff=4654</id>
		<title>GOOSE module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=GOOSE_module&amp;diff=4654"/>
		<updated>2024-01-31T15:10:23Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut moved page GOOSE module to IEC61850 module: Module got renamed during development&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[IEC61850 module]]&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4653</id>
		<title>IEC61850 module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4653"/>
		<updated>2024-01-31T15:10:23Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut moved page GOOSE module to IEC61850 module: Module got renamed during development&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The GOOSE module shows information about GOOSE (&#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent) traffic.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4601</id>
		<title>IEC61850 module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IEC61850_module&amp;diff=4601"/>
		<updated>2023-12-15T11:14:35Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Initial page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The GOOSE module shows information about GOOSE (&#039;&#039;&#039;G&#039;&#039;&#039;eneric &#039;&#039;&#039;O&#039;&#039;&#039;bject &#039;&#039;&#039;O&#039;&#039;&#039;riented &#039;&#039;&#039;S&#039;&#039;&#039;ubstation &#039;&#039;&#039;E&#039;&#039;&#039;vent) traffic.&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Sip_calls.png&amp;diff=4588</id>
		<title>File:Sip calls.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Sip_calls.png&amp;diff=4588"/>
		<updated>2023-12-07T16:19:11Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut uploaded a new version of File:Sip calls.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sip calls&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Voip_Call_details_screen.png&amp;diff=4587</id>
		<title>File:Voip Call details screen.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Voip_Call_details_screen.png&amp;diff=4587"/>
		<updated>2023-12-07T16:16:15Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut uploaded a new version of File:Voip Call details screen.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Voip Call details screen&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Voip_Call_analysis.png&amp;diff=4586</id>
		<title>File:Voip Call analysis.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Voip_Call_analysis.png&amp;diff=4586"/>
		<updated>2023-12-07T16:16:04Z</updated>

		<summary type="html">&lt;p&gt;Hartmut: Hartmut uploaded a new version of File:Voip Call analysis.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Voip Call analysis&lt;/div&gt;</summary>
		<author><name>Hartmut</name></author>
	</entry>
</feed>