-- -- Copyright (C) 2000-2005 Webscreen Technology Ltd -- Copyright (C) 2005-2013 Webscreen Systems Ltd -- Copyright (C) 2013-2014 Juniper Networks, Inc. -- -- For a manager to use it, it must be copied to /usr/share/snmp/mibs as -- DDOSSECURE4-MIB.txt -- and MIBS must be defined as "+DDOSSECURE4-MIB" in the environment -- * ddossecure4 DDOSSECURE4-MIB DEFINITIONS ::= BEGIN IMPORTS MODULE-IDENTITY, OBJECT-TYPE, OBJECT-IDENTITY, NOTIFICATION-TYPE, enterprises, Gauge32, IpAddress, Integer32, Counter32, Counter64 FROM SNMPv2-SMI TEXTUAL-CONVENTION, DisplayString, TruthValue, TimeInterval, DateAndTime FROM SNMPv2-TC MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP FROM SNMPv2-CONF InetAddress, InetAddressType FROM INET-ADDRESS-MIB; ddossecure4MIB MODULE-IDENTITY LAST-UPDATED "201404250000Z" -- April 25, 2014 ORGANIZATION "Juniper Networks, Inc." CONTACT-INFO "postal: Juniper Technical Assistance Center Juniper Networks, Inc. 1194 N. Mathilda Avenue Sunnyvale, CA 94089 USA email: support@juniper.net" DESCRIPTION "The DDoS Secure MIB version 4." REVISION "201404250000Z" -- April 25, 2014 DESCRIPTION "Update variable names to reflect current naming" REVISION "201311010000Z" -- November 01, 2013 DESCRIPTION "We are now Juniper. Replace Webscreen with DDoS Secure as appropriate" REVISION "201202170000Z" -- February 17, 2012 DESCRIPTION "Fix confusion over bits and bytes." REVISION "201109260000Z" -- September 26, 2011 DESCRIPTION "Current revision for code releases 3.2.4-2 / 4.0.2-2 or later. Support for ipv4 and ipv6. Complete tree re-organization. This MIB replaces version 3." ::= { enterprises webscreen-technology(11068) products(1) 4 } jddsAppliance OBJECT IDENTIFIER ::= { ddossecure4MIB 4 } jddsPortal OBJECT IDENTIFIER ::= { ddossecure4MIB 5 } jddsProtected OBJECT IDENTIFIER ::= { ddossecure4MIB 6 } jddsGatewayInternet OBJECT IDENTIFIER ::= { ddossecure4MIB 7 } jddsGatewayProtected OBJECT IDENTIFIER ::= { ddossecure4MIB 8 } DefenseType ::= TEXTUAL-CONVENTION STATUS current DESCRIPTION "Type of Attack" SYNTAX INTEGER { bandWidth(1), flood(2), blockedProtocol(3), blockedState(4), ipAttack(5), tcpAttack(6), udpAttack(7), icmpAttack(8), otherIpAttack(9), fragmentAttack(10), badIpPacket(11), badTcpPacket(12), badUdpPacket(13), badIcmpPacket(14), badOtherIpPacket(15), overloadedProtectedIP(16) } Direction ::= TEXTUAL-CONVENTION STATUS current DESCRIPTION "Packet direction" SYNTAX INTEGER { outbound(1), inbound(2) } LocalIndex ::= TEXTUAL-CONVENTION DISPLAY-HINT "d" STATUS current DESCRIPTION "A unique value, greater than zero, for each entry." SYNTAX Integer32 (1..2147483647) -- ### Appliance settings ### apConfig OBJECT IDENTIFIER ::= { jddsAppliance 1 } apInterfaces OBJECT IDENTIFIER ::= { apConfig 1 } apManagement OBJECT IDENTIFIER ::= { apInterfaces 1 } apMgmtIfIpAddress OBJECT-TYPE SYNTAX IpAddress MAX-ACCESS read-only STATUS current DESCRIPTION "IP address of the appliance management interface" ::= { apManagement 1 } apMgmtIfNetmask OBJECT-TYPE SYNTAX IpAddress MAX-ACCESS read-only STATUS current DESCRIPTION "Netmask of the appliance management interface" ::= { apManagement 2 } apMgmtIfGwIpAddress OBJECT-TYPE SYNTAX IpAddress MAX-ACCESS read-only STATUS current DESCRIPTION "Gateway IP address of the appliance management interface" ::= { apManagement 3 } apMgmtIfLinkMode OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Speed and duplex of the appliance management interface" ::= { apManagement 4 } apMgmtIfLinkFC OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Flow Control configuration of the appliance management interface" ::= { apManagement 5 } apMgmtIfName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Underlying interface name of the appliance management interface" ::= { apManagement 6 } apInternet OBJECT IDENTIFIER ::= { apInterfaces 2 } apIntIfLinkMode OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Speed and duplex of the appliance internet interface" ::= { apInternet 1 } apIntIfLinkFC OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Flow Control configuration of the appliance internet interface" ::= { apInternet 2 } apIntIfName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Underlying interface name(s) of the appliance internet interface" ::= { apInternet 3 } apProtectedInterface OBJECT IDENTIFIER ::= { apInterfaces 3 } apProtIfLinkMode OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Speed and duplex of the appliance Protected Interface" ::= { apProtectedInterface 1 } apProtIfLinkFC OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Flow Control configuration of the appliance Protected Interface" ::= { apProtectedInterface 2 } apProtIfName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Underlying interface name(s) of the appliance Protected Interface" ::= { apProtectedInterface 3 } apDataShare OBJECT IDENTIFIER ::= { apInterfaces 4 } apDataIfIpAddress OBJECT-TYPE SYNTAX IpAddress MAX-ACCESS read-only STATUS current DESCRIPTION "IP address of the appliance data share interface" ::= { apDataShare 1 } apDataIfNetmask OBJECT-TYPE SYNTAX IpAddress MAX-ACCESS read-only STATUS current DESCRIPTION "Netmask of the appliance data share interface" ::= { apDataShare 2 } apDataIfLinkMode OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Speed and duplex of the appliance data share interface" ::= { apDataShare 3 } apDataIfLinkFC OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Flow Control configuration of the appliance data share interface" ::= { apDataShare 4 } apDataIfName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Underlying interface name of the appliance data share interface" ::= { apDataShare 5 } -- **** apAccess apAccess OBJECT IDENTIFIER ::= { apConfig 2 } apUserTable OBJECT-TYPE SYNTAX SEQUENCE OF ApUserEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of user entries with permission on appliance" ::= { apAccess 1 } apUserEntry OBJECT-TYPE SYNTAX ApUserEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row consisting of a record for a particular user" INDEX { apUserId } ::= { apUserTable 1 } ApUserEntry ::= SEQUENCE { apUserId LocalIndex, apUserName DisplayString, apUserPermissions DisplayString } apUserId OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique ID number for this user" ::= { apUserEntry 1 } apUserName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The name associated with this user" ::= { apUserEntry 2 } apUserPermissions OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The permissions associated with this user" ::= { apUserEntry 3 } -- ***** snmp apSnmpAccessIpList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma-separated list of IP addresses allowed to make SNMP queries" ::= { apAccess 3 } apHttpsAccessIpList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma-separated list of IP addresses allowed to connect via HTTPS" ::= { apAccess 4 } apSshAccessIpList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma-separated list of IP addresses allowed to connect via SSH" ::= { apAccess 5 } apLogging OBJECT IDENTIFIER ::= { apConfig 3 } apSyslogServer OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "ASCII comma-separated list of IP addresses to receive remote syslog for appliance logs" ::= { apLogging 1 } apSyslogFacility OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Syslog facility name for appliance logs" ::= { apLogging 2 } apSyslogPriority OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Syslog priority name for appliance logs" ::= { apLogging 3 } apWebtrendsServer OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "ASCII comma-separated list of IP addresses to receive remote webtrends logs" ::= { apLogging 4 } apWebtrendsFacility OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Webtrends facility name" ::= { apLogging 5 } apWebtrendsPriority OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Webtrends priority name" ::= { apLogging 6 } apCreateIncidentsThreshold OBJECT IDENTIFIER ::= { apLogging 7 } apBandwidthCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for bandwidth defense info" ::= { apCreateIncidentsThreshold 1 } apBandwidthCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for bandwidth defense info" ::= { apCreateIncidentsThreshold 2 } apFloodCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for flood defense info" ::= { apCreateIncidentsThreshold 3 } apFloodCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for flood defense info" ::= { apCreateIncidentsThreshold 4 } apBlockedProtoCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for blocked Protocol defense info" ::= { apCreateIncidentsThreshold 5 } apBlockedProtoCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for blocked Protocol defense info" ::= { apCreateIncidentsThreshold 6 } apBlockedStateCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for blocked state defense info" ::= { apCreateIncidentsThreshold 7 } apBlockedStateCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for blocked state defense info" ::= { apCreateIncidentsThreshold 8 } apIpAttackCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for IP Attack defense info" ::= { apCreateIncidentsThreshold 9 } apIpAttackCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for IP Attack defense info" ::= { apCreateIncidentsThreshold 10 } apTcpAttackCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for TCP Attack defense info" ::= { apCreateIncidentsThreshold 11 } apTcpAttackCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for TCP Attack defense info" ::= { apCreateIncidentsThreshold 12 } apUdpAttackCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for UDP Attack defense info" ::= { apCreateIncidentsThreshold 13 } apUdpAttackCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for UDP Attack defense info" ::= { apCreateIncidentsThreshold 14 } apIcmpAttackCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for ICMP Attack defense info" ::= { apCreateIncidentsThreshold 15 } apIcmpAttackCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for ICMP Attack defense info" ::= { apCreateIncidentsThreshold 16 } apOtherIpAttackCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for other IP Attack defense info" ::= { apCreateIncidentsThreshold 17 } apOtherIpAttackCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for other IP Attack defense info" ::= { apCreateIncidentsThreshold 18 } apFragAttackCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for fragment Attack defense info" ::= { apCreateIncidentsThreshold 19 } apFragAttackCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for fragment Attack defense info" ::= { apCreateIncidentsThreshold 20 } apBadIpCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for bad IP defense info" ::= { apCreateIncidentsThreshold 21 } apBadIpCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for bad IP defense info" ::= { apCreateIncidentsThreshold 22 } apBadTcpCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for bad TCP defense info" ::= { apCreateIncidentsThreshold 23 } apBadTcpCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for bad TCP defense info" ::= { apCreateIncidentsThreshold 24 } apBadUdpCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for bad UDP defense info" ::= { apCreateIncidentsThreshold 25 } apBadUdpCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for bad UDP defense info" ::= { apCreateIncidentsThreshold 26 } apBadIcmpCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for bad ICMP defense info" ::= { apCreateIncidentsThreshold 27 } apBadIcmpCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for bad ICMP defense info" ::= { apCreateIncidentsThreshold 28 } apBadOtherIpCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for bad other IP defense info" ::= { apCreateIncidentsThreshold 29 } apBadOtherIpCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for bad other IP defense info" ::= { apCreateIncidentsThreshold 30 } apOverloadedIpCreateThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold enabled on/off for overloaded protected IP info" ::= { apCreateIncidentsThreshold 31 } apOverloadedIpCreateThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Create Incident threshold rate for overloaded protected IP info" ::= { apCreateIncidentsThreshold 32 } apViewIncidentsThresholds OBJECT IDENTIFIER ::= { apLogging 8 } apBandwidthViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for bandwidth defense info" ::= { apViewIncidentsThresholds 1 } apBandwidthViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for bandwidth defense info" ::= { apViewIncidentsThresholds 2 } apFloodViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for flood defense info" ::= { apViewIncidentsThresholds 3 } apFloodViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for flood defense info" ::= { apViewIncidentsThresholds 4 } apBlockedProtoViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for blocked Protocol defense info" ::= { apViewIncidentsThresholds 5 } apBlockedProtoViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for blocked Protocol defense info" ::= { apViewIncidentsThresholds 6 } apBlockedStateViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for blocked state defense info" ::= { apViewIncidentsThresholds 7 } apBlockedStateViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for blocked state defense info" ::= { apViewIncidentsThresholds 8 } apIpAttackViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for IP Attack defense info" ::= { apViewIncidentsThresholds 9 } apIpAttackViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for IP Attack defense info" ::= { apViewIncidentsThresholds 10 } apTcpAttackViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for TCP Attack defense info" ::= { apViewIncidentsThresholds 11 } apTcpAttackViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for TCP Attack defense info" ::= { apViewIncidentsThresholds 12 } apUdpAttackViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for UDP Attack defense info" ::= { apViewIncidentsThresholds 13 } apUdpAttackViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for UDP Attack defense info" ::= { apViewIncidentsThresholds 14 } apIcmpAttackViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for ICMP Attack defense info" ::= { apViewIncidentsThresholds 15 } apIcmpAttackViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for ICMP Attack defense info" ::= { apViewIncidentsThresholds 16 } apOtherIpAttackViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for other IP Attack defense info" ::= { apViewIncidentsThresholds 17 } apOtherIpAttackViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for other IP Attack defense info" ::= { apViewIncidentsThresholds 18 } apFragAttackViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for fragment Attack defense info" ::= { apViewIncidentsThresholds 19 } apFragAttackViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for fragment Attack defense info" ::= { apViewIncidentsThresholds 20 } apBadIpViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for bad IP defense info" ::= { apViewIncidentsThresholds 21 } apBadIpViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for bad IP defense info" ::= { apViewIncidentsThresholds 22 } apBadTcpViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for bad TCP defense info" ::= { apViewIncidentsThresholds 23 } apBadTcpViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for bad TCP defense info" ::= { apViewIncidentsThresholds 24 } apBadUdpViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for bad UDP defense info" ::= { apViewIncidentsThresholds 25 } apBadUdpViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for bad UDP defense info" ::= { apViewIncidentsThresholds 26 } apBadIcmpViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for bad ICMP defense info" ::= { apViewIncidentsThresholds 27 } apBadIcmpViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for bad ICMP defense info" ::= { apViewIncidentsThresholds 28 } apBadOtherIpViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for bad other IP defense info" ::= { apViewIncidentsThresholds 29 } apBadOtherIpViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for bad other IP defense info" ::= { apViewIncidentsThresholds 30 } apOverloadedIpViewThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold enabled on/off for overloaded protected IP info" ::= { apViewIncidentsThresholds 31 } apOverloadedIpViewThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "View Incidents threshold rate for overloaded protected IP info" ::= { apViewIncidentsThresholds 32 } apWOffenderLogThreshold OBJECT IDENTIFIER ::= { apLogging 9 } apBandwidthOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for bandwidth defense info" ::= { apWOffenderLogThreshold 1 } apBandwidthOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for bandwidth defense info" ::= { apWOffenderLogThreshold 2 } apFloodOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for flood defense info" ::= { apWOffenderLogThreshold 3 } apFloodOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for flood defense info" ::= { apWOffenderLogThreshold 4 } apBlockedProtoOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for blocked Protocol defense info" ::= { apWOffenderLogThreshold 5 } apBlockedProtoOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for blocked Protocol defense info" ::= { apWOffenderLogThreshold 6 } apBlockedStateOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for blocked state defense info" ::= { apWOffenderLogThreshold 7 } apBlockedStateOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for blocked state defense info" ::= { apWOffenderLogThreshold 8 } apIpAttackOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for IP Attack defense info" ::= { apWOffenderLogThreshold 9 } apIpAttackOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for IP Attack defense info" ::= { apWOffenderLogThreshold 10 } apTcpAttackOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for TCP Attack defense info" ::= { apWOffenderLogThreshold 11 } apTcpAttackOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for TCP Attack defense info" ::= { apWOffenderLogThreshold 12 } apUdpAttackOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for UDP Attack defense info" ::= { apWOffenderLogThreshold 13 } apUdpAttackOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for UDP Attack defense info" ::= { apWOffenderLogThreshold 14 } apIcmpAttackOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for ICMP Attack defense info" ::= { apWOffenderLogThreshold 15 } apIcmpAttackOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for ICMP Attack defense info" ::= { apWOffenderLogThreshold 16 } apOtherIpAttackOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for other IP Attack defense info" ::= { apWOffenderLogThreshold 17 } apOtherIpAttackOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for other IP Attack defense info" ::= { apWOffenderLogThreshold 18 } apFragAttackOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for fragment Attack defense info" ::= { apWOffenderLogThreshold 19 } apFragAttackOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for fragment Attack defense info" ::= { apWOffenderLogThreshold 20 } apBadIpOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for bad IP defense info" ::= { apWOffenderLogThreshold 21 } apBadIpOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for bad IP defense info" ::= { apWOffenderLogThreshold 22 } apBadTcpOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for bad TCP defense info" ::= { apWOffenderLogThreshold 23 } apBadTcpOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for bad TCP defense info" ::= { apWOffenderLogThreshold 24 } apBadUdpOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for bad UDP defense info" ::= { apWOffenderLogThreshold 25 } apBadUdpOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for bad UDP defense info" ::= { apWOffenderLogThreshold 26 } apBadIcmpOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for bad ICMP defense info" ::= { apWOffenderLogThreshold 27 } apBadIcmpOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for bad ICMP defense info" ::= { apWOffenderLogThreshold 28 } apBadOtherIpOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Offenders logging threshold enabled on/off for bad other IP defense info" ::= { apWOffenderLogThreshold 29 } apBadOtherIpOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for bad other IP defense info" ::= { apWOffenderLogThreshold 30 } apOverloadedIpOffThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold enabled on/off for overloaded protected IP info" ::= { apWOffenderLogThreshold 31 } apOverloadedIpOffThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Worst Offenders logging threshold rate for overloaded protected IP info" ::= { apWOffenderLogThreshold 32 } apIncidentAlertThreshold OBJECT IDENTIFIER ::= { apLogging 10 } apBandwidthAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for bandwidth defense info" ::= { apIncidentAlertThreshold 1 } apBandwidthAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for bandwidth defense info" ::= { apIncidentAlertThreshold 2 } apFloodAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for flood defense info" ::= { apIncidentAlertThreshold 3 } apFloodAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for flood defense info" ::= { apIncidentAlertThreshold 4 } apBlockedProtoAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for blocked Protocol defense info" ::= { apIncidentAlertThreshold 5 } apBlockedProtoAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for blocked Protocol defense info" ::= { apIncidentAlertThreshold 6 } apBlockedStateAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for blocked state defense info" ::= { apIncidentAlertThreshold 7 } apBlockedStateAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for blocked state defense info" ::= { apIncidentAlertThreshold 8 } apIpAttackAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for IP Attack defense info" ::= { apIncidentAlertThreshold 9 } apIpAttackAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for IP Attack defense info" ::= { apIncidentAlertThreshold 10 } apTcpAttackAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for TCP Attack defense info" ::= { apIncidentAlertThreshold 11 } apTcpAttackAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for TCP Attack defense info" ::= { apIncidentAlertThreshold 12 } apUdpAttackAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for UDP Attack defense info" ::= { apIncidentAlertThreshold 13 } apUdpAttackAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for UDP Attack defense info" ::= { apIncidentAlertThreshold 14 } apIcmpAttackAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for ICMP Attack defense info" ::= { apIncidentAlertThreshold 15 } apIcmpAttackAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for ICMP Attack defense info" ::= { apIncidentAlertThreshold 16 } apOtherIpAttackAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for other IP Attack defense info" ::= { apIncidentAlertThreshold 17 } apOtherIpAttackAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for other IP Attack defense info" ::= { apIncidentAlertThreshold 18 } apFragAttackAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for fragment Attack defense info" ::= { apIncidentAlertThreshold 19 } apFragAttackAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for fragment Attack defense info" ::= { apIncidentAlertThreshold 20 } apBadIpAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for bad IP defense info" ::= { apIncidentAlertThreshold 21 } apBadIpAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for bad IP defense info" ::= { apIncidentAlertThreshold 22 } apBadTcpAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for bad TCP defense info" ::= { apIncidentAlertThreshold 23 } apBadTcpAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for bad TCP defense info" ::= { apIncidentAlertThreshold 24 } apBadUdpAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for bad UDP defense info" ::= { apIncidentAlertThreshold 25 } apBadUdpAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for bad UDP defense info" ::= { apIncidentAlertThreshold 26 } apBadIcmpAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for bad ICMP defense info" ::= { apIncidentAlertThreshold 27 } apBadIcmpAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for bad ICMP defense info" ::= { apIncidentAlertThreshold 28 } apBadOtherIpAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for bad other IP defense info" ::= { apIncidentAlertThreshold 29 } apBadOtherIpAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for bad other IP defense info" ::= { apIncidentAlertThreshold 30 } apOverloadedIpAlertThresh OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold enabled on/off for overloaded protected IP info" ::= { apIncidentAlertThreshold 31 } apOverloadedIpAlertThreshRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Incident Alert threshold rate for overloaded protected IP info" ::= { apIncidentAlertThreshold 32 } apMail OBJECT IDENTIFIER ::= { apConfig 4 } apMailServer OBJECT-TYPE SYNTAX IpAddress MAX-ACCESS read-only STATUS current DESCRIPTION "IP address of SMTP email server for appliance" ::= { apMail 1 } apMailFrom OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "eMail address appliance messages should appear to be from" ::= { apMail 2 } apMailSubject OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "eMail subject appliance messages should display (no longer used)" ::= { apMail 3 } apMailToList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Semicolon-separated list of recipients for appliance messages" ::= { apMail 4 } apMailDailyStats OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "True if daily statistics are to be mailed" ::= { apMail 5 } apMailAlerts OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "True if mail alerts are to be sent" ::= { apMail 6 } apMailAlertInterval OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Minimum interval between email alerts (in minutes)" ::= { apMail 7 } apDebugConfig OBJECT IDENTIFIER ::= { apConfig 5 } apDebugBandwidthFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging bandwidth Attacks" ::= { apDebugConfig 1 } apDebugFloodFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging floods" ::= { apDebugConfig 2 } apDebugBlockedProtocolFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging packets with Blocked Protocols" ::= { apDebugConfig 3 } apDebugBlockedStateFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging packets with Blocked States" ::= { apDebugConfig 4 } apDebugIpAttackFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging IP Attacks" ::= { apDebugConfig 5 } apDebugTcpAttackFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging TCP Attacks" ::= { apDebugConfig 6 } apDebugUdpAttackFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging UDP Attacks" ::= { apDebugConfig 7 } apDebugIcmpAttackFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging ICMP Attacks" ::= { apDebugConfig 8 } apDebugOtherIpAttackFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging other IP Protocol Attacks" ::= { apDebugConfig 9 } apDebugFragmentAttackFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging fragment Attacks" ::= { apDebugConfig 10 } apDebugBadIpPacketFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging bad IP packets" ::= { apDebugConfig 11 } apDebugBadTcpPacketFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging bad TCP packets" ::= { apDebugConfig 12 } apDebugBadUdpPacketFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging bad UDP packets" ::= { apDebugConfig 13 } apDebugBadIcmpFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging bad ICMP packets" ::= { apDebugConfig 14 } apDebugBadOtherIpFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging bad Other IP Protocol packets" ::= { apDebugConfig 15 } apDebugOverloadProtectedIpFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if logging stalled protected IPs" ::= { apDebugConfig 16 } apOperationMode OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Current operating mode of the DDoS Secure device" ::= { apConfig 6 } apNtpServerList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma-separated list of NTP servers for appliance" ::= { apConfig 7 } apTimeZone OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Time zone (as a string, e.g. Europe/London)" ::= { apConfig 8 } apProtectedIpNetwork OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "All the protected IP network(s) on the DDoS Secure Appliance" ::= { apConfig 9 } apSnmp OBJECT IDENTIFIER ::= { apConfig 10 } apSnmpRoCommunity OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Read-only community string" ::= { apSnmp 1 } apSnmpTrapCommunity OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Read-only community string" ::= { apSnmp 2 } apSnmpTrapIpAddressList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "ASCII comma-separated list of IP addresses to receive SNMP traps" ::= { apSnmp 3 } apAutoBlackList OBJECT IDENTIFIER ::= { apConfig 11 } apAutoblockEnable OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Enables autoblocking of clients when a worst offender exceeds the autoblockRate threshold" ::= { apAutoBlackList 1 } apAutoblockRateT1 OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Packet rate/sec above which worst offending clients (type 1) are autoblocked, if autoblocking is enabled" ::= { apAutoBlackList 2 } apAutoblockRateT2 OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Packet rate/sec above which worst offending clients (type 2) are autoblocked, if autoblocking is enabled" ::= { apAutoBlackList 3 } apProtectedIpAutodetect OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "If true, unconfigured IPs amd MACs are autodetected on the protected interface (and default protection parameters are applied)" ::= { apConfig 12 } apTrackIndeterminate OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "Track state on indeterminate addresses on protected interface" ::= { apConfig 13 } -- ### Protection configuration settings ### prConfigTable OBJECT-TYPE SYNTAX SEQUENCE OF PrConfigEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The configuration of each IP or MAC address protected by the DDoS Secure" ::= { jddsProtected 1 } prConfigEntry OBJECT-TYPE SYNTAX PrConfigEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The protection configuration for an individual address on the protected interface" INDEX { prConfigInetAddressType, prConfigInetAddress } ::= { prConfigTable 1 } PrConfigEntry ::= SEQUENCE { prConfigInetAddressType InetAddressType, prConfigInetAddress InetAddress, prHostName DisplayString, prTcpBacklog Gauge32, prMaxConnections Gauge32, prMaxConnectionRate Gauge32, prInFilterName DisplayString, prOutFilterName DisplayString, prSendTcpRejects TruthValue, prTrackSoap TruthValue, prOperationMode DisplayString, prMaxGets Gauge32, prFragsDisabled TruthValue } prConfigInetAddressType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS not-accessible STATUS current DESCRIPTION "The protected IP address type IPv4 or IPv6" ::= { prConfigEntry 1 } prConfigInetAddress OBJECT-TYPE SYNTAX InetAddress (SIZE (0..47)) MAX-ACCESS not-accessible STATUS current DESCRIPTION "The protected IP address" ::= { prConfigEntry 2 } prHostName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Host name associated with the protected IP" ::= { prConfigEntry 3 } prTcpBacklog OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max number of half-open TCP connections" ::= { prConfigEntry 4 } prMaxConnections OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max number of open TCP connections" ::= { prConfigEntry 5 } prMaxConnectionRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max rate of opening new TCP connections" ::= { prConfigEntry 6 } prInFilterName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Input filter name associated with the protected IP" ::= { prConfigEntry 7 } prOutFilterName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Output filter name associated with the protected IP" ::= { prConfigEntry 8 } prSendTcpRejects OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if TCP rejects are to be sent" ::= { prConfigEntry 9 } prTrackSoap OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if SOAP Headers are to be tracked" ::= { prConfigEntry 10 } prOperationMode OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Current operating mode of the protected IP" ::= { prConfigEntry 11 } prMaxGets OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max number of outstanding GET requests" ::= { prConfigEntry 12 } prFragsDisabled OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if packet fragmentation is not allowed" ::= { prConfigEntry 13 } -- ### Gateway internet-side settings ### gwInternetConfigTable OBJECT-TYPE SYNTAX SEQUENCE OF GwInternetConfigEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The configuration of each internet-side gateway protected by the DDoS Secure" ::= { jddsGatewayInternet 1 } gwInternetConfigEntry OBJECT-TYPE SYNTAX GwInternetConfigEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The configuration of an individual internet-side gateway" INDEX { gwInternetConfigIndex } ::= { gwInternetConfigTable 1 } GwInternetConfigEntry ::= SEQUENCE { gwInternetConfigIndex LocalIndex, gwInternetConfigMacAddress DisplayString, gwInternetConfigToSpeedBps Gauge32, gwInternetConfigToRatePps Gauge32 } gwInternetConfigIndex OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique gateway internet index" ::= { gwInternetConfigEntry 1 } gwInternetConfigMacAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "MAC address of the internet-side gateway" ::= { gwInternetConfigEntry 2 } gwInternetConfigToSpeedBps OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max speed to internet-side gateway allowed in bits/sec" ::= { gwInternetConfigEntry 3 } gwInternetConfigToRatePps OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max rate to internet-side gateway allowed in packets/sec" ::= { gwInternetConfigEntry 4 } -- ### Gateway protected-side settings ### gwProtectedConfigTable OBJECT-TYPE SYNTAX SEQUENCE OF GwProtectedConfigEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The configuration of each protected-side gateway protected by the DDoS Secure" ::= { jddsGatewayProtected 1 } gwProtectedConfigEntry OBJECT-TYPE SYNTAX GwProtectedConfigEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The configuration of an individual protected-side gateway" INDEX { gwProtectedConfigIndex } ::= { gwProtectedConfigTable 1 } GwProtectedConfigEntry ::= SEQUENCE { gwProtectedConfigIndex LocalIndex, gwProtectedConfigMacAddress DisplayString, gwProtectedConfigToSpeedBps Gauge32, gwProtectedConfigToRatePps Gauge32 } gwProtectedConfigIndex OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique protected-side gateway index" ::= { gwProtectedConfigEntry 1 } gwProtectedConfigMacAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "MAC address of the protected-side gateway" ::= { gwProtectedConfigEntry 2 } gwProtectedConfigToSpeedBps OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max speed to protected-side gateway allowed in bits/sec" ::= { gwProtectedConfigEntry 3 } gwProtectedConfigToRatePps OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Max speed to protected-side gateway allowed in packets/sec" ::= { gwProtectedConfigEntry 4 } apState OBJECT IDENTIFIER ::= { jddsAppliance 2 } apDefenseFlags OBJECT IDENTIFIER ::= { apState 1 } apBandwidth OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using bandwidth defense" ::= { apDefenseFlags 1 } apFlood OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using flood defense" ::= { apDefenseFlags 2 } apBlockedProtocol OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using blocked Protocol defense" ::= { apDefenseFlags 3 } apBlockedState OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using blocked state defense" ::= { apDefenseFlags 4 } apIpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using IP Attack defense" ::= { apDefenseFlags 5 } apTcpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using TCP Attack defense" ::= { apDefenseFlags 6 } apUdpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using UDP Attack defense" ::= { apDefenseFlags 7 } apIcmpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using ICMP Attack defense" ::= { apDefenseFlags 8 } apOtherIpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using other IP Attack defense" ::= { apDefenseFlags 9 } apFragAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using fragment Attack defense" ::= { apDefenseFlags 10 } apBadIp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using bad IP defense" ::= { apDefenseFlags 11 } apBadTcp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using bad TCP defense" ::= { apDefenseFlags 12 } apBadUdp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using bad UDP defense" ::= { apDefenseFlags 13 } apBadIcmp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using bad ICMP defense" ::= { apDefenseFlags 14 } apBadOtherIp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently using bad other IP defense" ::= { apDefenseFlags 15 } apOverloadedIp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if appliance is currently experiencing an overloaded protected IP" ::= { apDefenseFlags 16 } apTcpStates OBJECT IDENTIFIER ::= { apState 2 } apInSyn OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client connection requests inbound" ::= { apTcpStates 1 } apOutSyn OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client connection requests outbound" ::= { apTcpStates 2 } apInSynAck OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP responses to client connection requests inbound" ::= { apTcpStates 3 } apOutSynAck OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP responses to client connection requests outbound" ::= { apTcpStates 4 } apInSynSyn OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client and protected IP crossed SYNs on inbound connection" ::= { apTcpStates 5 } apOutSynSyn OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client and protected IP crossed SYNs on outbound connection" ::= { apTcpStates 6 } apInEst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client-protected IP connections established inbound" ::= { apTcpStates 7 } apOutEst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client-protected IP connections established outbound" ::= { apTcpStates 8 } apInFin1Src OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client FINs sent inbound" ::= { apTcpStates 9 } apOutFin1Src OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client FINs sent outbound" ::= { apTcpStates 10 } apInFin2Src OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP ACKed FINs inbound" ::= { apTcpStates 11 } apOutFin2Src OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP ACKed FINs outbound" ::= { apTcpStates 12 } apInFin3Src OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client and protected IP sent FINs inbound" ::= { apTcpStates 13 } apOutFin3Src OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client and protected IP sent FINs outbound" ::= { apTcpStates 14 } apInFinFin OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client and protected IP crossed un-ACKed FINs inbound" ::= { apTcpStates 15 } apOutFinFin OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client and protected IP crossed un-ACKed FINs outbound" ::= { apTcpStates 16 } apInFin1Dst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP FINs sent inbound" ::= { apTcpStates 17 } apOutFin1Dst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP FINs sent outbound" ::= { apTcpStates 18 } apInFin2Dst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP ACKed FINs inbound" ::= { apTcpStates 19 } apOutFin2Dst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: client ACKed FINs outbound" ::= { apTcpStates 20 } apInFin3Dst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP and client sent FINs inbound" ::= { apTcpStates 21 } apOutFin3Dst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP and client sent FINs outbound" ::= { apTcpStates 22 } apInCls OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: closed connections inbound" ::= { apTcpStates 23 } apOutCls OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: closed connections outbound" ::= { apTcpStates 24 } apInRst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: resets sent on inbound connection" ::= { apTcpStates 25 } apOutRst OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: resets sent on outbound connection" ::= { apTcpStates 26 } apInRstCls OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: resets sent on inbound connection" ::= { apTcpStates 27 } apOutRstCls OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: resets sent on outbound connection" ::= { apTcpStates 28 } apInUnknown OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: unknown states inbound" ::= { apTcpStates 29 } apOutUnknown OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: unknown states outbound" ::= { apTcpStates 30 } apInAck OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: three way handshake completed inbound" ::= { apTcpStates 31 } apOutAck OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: three way handshake completed outbound" ::= { apTcpStates 32 } apInPendAck OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP has not acknowledged any data inbound" ::= { apTcpStates 33 } apOutPendAck OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP has not acknowledged any data outbound" ::= { apTcpStates 34 } apInGet OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP in GET State" ::= { apTcpStates 35 } apOutGet OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: protected IP in GET State" ::= { apTcpStates 36 } apInGets OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: the number of established TCP sessions processing a GET" ::= { apTcpStates 37 } apOutGets OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "state tally: the number of established TCP sessions processing a GET" ::= { apTcpStates 38 } apInTotalBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input bits per second" ::= { apTcpStates 901 } apOutTotalBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of output bits per second" ::= { apTcpStates 902 } apInTotalPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average packets/sec traffic rate inbound since last restart or reset" ::= { apTcpStates 903 } apOutTotalPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average packets/sec traffic rate outbound since last restart or reset" ::= { apTcpStates 904 } apInSmallPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { apTcpStates 905 } apOutSmallPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { apTcpStates 906 } apInMediumPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { apTcpStates 907 } apOutMediumPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { apTcpStates 908 } apInLargePpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { apTcpStates 909 } apOutLargePpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { apTcpStates 910 } apInDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input bits Dropped per second" ::= { apTcpStates 911 } apOutDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of output bits Dropped per second" ::= { apTcpStates 912 } apInDroppedPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input packets Dropped per second" ::= { apTcpStates 913 } apOutDroppedPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of output packets Dropped per second" ::= { apTcpStates 914 } apInCharmDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound bits per second dropped by heuristic detection" ::= { apTcpStates 915 } apOutCharmDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound bits per second dropped by heuristic detection" ::= { apTcpStates 916 } apInFilteredBwthPercentAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound dropped bandwidth divided by the actual bandwidth" ::= { apTcpStates 917 } apOutFilteredBwthPercentAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound dropped bandwidth divided by the actual bandwidth" ::= { apTcpStates 918 } apInSynbacklogtallyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of partially open TCP connections inbound" ::= { apTcpStates 919 } apOutSynbacklogtallyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of partially open TCP connections outbound" ::= { apTcpStates 920 } apInConnectionAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound TCP connections" ::= { apTcpStates 921 } apOutConnectionAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound TCP connections" ::= { apTcpStates 922 } apInConnreqAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound TCP connection requests" ::= { apTcpStates 923 } apOutConnreqAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound TCP connection requests" ::= { apTcpStates 924 } apInActiveHttpGetsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound HTTP page requests being processed" ::= { apTcpStates 925 } apOutActiveHttpGetsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound HTTP page requests being processed" ::= { apTcpStates 926 } apInProtectBwthPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound protected bandwifth" ::= { apTcpStates 927 } apOutProtectBwthPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound protected bandwifth" ::= { apTcpStates 928 } apInFloodPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound packets causing flooding" ::= { apTcpStates 929 } apOutFloodPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound packets causing flooding" ::= { apTcpStates 930 } apInBlockedProtocolPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets dropped by filter " ::= { apTcpStates 931 } apOutBlockedProtocolPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets dropped by filter" ::= { apTcpStates 932 } apInBlockedStatePktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets dropped due to incorrect state" ::= { apTcpStates 933 } apOutBlockedStatePktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets dropped due to incorrect state" ::= { apTcpStates 934 } apInIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an IP Attack" ::= { apTcpStates 935 } apOutIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an IP Attack" ::= { apTcpStates 936 } apInTcpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a TCP Attack" ::= { apTcpStates 937 } apOutTcpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a TCP Attack" ::= { apTcpStates 938 } apInUdpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a UDP Attack" ::= { apTcpStates 939 } apOutUdpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a UDP Attack" ::= { apTcpStates 940 } apInIcmpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a ICMP Attack" ::= { apTcpStates 941 } apOutIcmpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a ICMP Attack" ::= { apTcpStates 942 } apInOtherIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an IP Attack using other protocols" ::= { apTcpStates 943 } apOutOtherIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an IP Attack using other protocols" ::= { apTcpStates 944 } apInFragmentAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an Fragmentation Attack" ::= { apTcpStates 945 } apOutFragmentAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an Fragmentation Attack" ::= { apTcpStates 946 } apInBadipPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets with malformed IP Headers" ::= { apTcpStates 947 } apOutBadipPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets with malformed IP Headers" ::= { apTcpStates 948 } apInBadTcpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets with bad TCP protocol/state" ::= { apTcpStates 949 } apOutBadTcpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets with bad TCP protocol/state" ::= { apTcpStates 950 } apInBadUdpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound UDP packets with malformed header or missing data" ::= { apTcpStates 951 } apOutBadUdpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound UDP packets with malformed header or missing data" ::= { apTcpStates 952 } apInBadIcmpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound ICMP packets with malformed header" ::= { apTcpStates 953 } apOutBadIcmpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound ICMP packets with malformed header" ::= { apTcpStates 954 } apInBadOtherIpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets of other protocol with malformed header" ::= { apTcpStates 955 } apOutBadOtherIpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets of other protocol with malformed header" ::= { apTcpStates 956 } apInOverloadedAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound packets overloading the protected IPs" ::= { apTcpStates 957 } apOutOverloadedAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound packets overloading the protected IPs" ::= { apTcpStates 958 } apInLatencyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound Latency" ::= { apTcpStates 959 } apOutLatencyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound Latency" ::= { apTcpStates 960 } apInSmallPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { apTcpStates 1001 } apOutSmallPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { apTcpStates 1002 } apInMediumPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { apTcpStates 1003 } apOutMediumPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { apTcpStates 1004 } apInLargePpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { apTcpStates 1005 } apOutLargePpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { apTcpStates 1006 } apInFilteredBwthPercentMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound dropped bandwidth divided by the actual bandwidth" ::= { apTcpStates 1007 } apOutFilteredBwthPercentMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound dropped bandwidth divided by the actual bandwidth" ::= { apTcpStates 1008 } apInSynbacklogtallyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of partially open TCP connections inbound" ::= { apTcpStates 1009 } apOutSynbacklogtallyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of partially open TCP connections outbound" ::= { apTcpStates 1010 } apInConnectionMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound TCP connections" ::= { apTcpStates 1011 } apOutConnectionMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound TCP connections" ::= { apTcpStates 1012 } apInConnreqMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound TCP connection requests" ::= { apTcpStates 1013 } apOutConnreqMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound TCP connection requests" ::= { apTcpStates 1014 } apInActiveHttpGetsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound HTTP page requests being processed" ::= { apTcpStates 1015 } apOutActiveHttpGetsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound HTTP page requests being processed" ::= { apTcpStates 1016 } apInProtectBwthPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound protected bandwifth" ::= { apTcpStates 1017 } apOutProtectBwthPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound protected bandwifth" ::= { apTcpStates 1018 } apInFloodPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound packets causing flooding" ::= { apTcpStates 1019 } apOutFloodPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound packets causing flooding" ::= { apTcpStates 1020 } apInBlockedProtocolPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets dropped by filter " ::= { apTcpStates 1021 } apOutBlockedProtocolPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets dropped by filter" ::= { apTcpStates 1022 } apInBlockedStatePktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets dropped due to incorrect state" ::= { apTcpStates 1023 } apOutBlockedStatePktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets dropped due to incorrect state" ::= { apTcpStates 1024 } apInIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an IP Attack" ::= { apTcpStates 1025 } apOutIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an IP Attack" ::= { apTcpStates 1026 } apInTcpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a TCP Attack" ::= { apTcpStates 1027 } apOutTcpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a TCP Attack" ::= { apTcpStates 1028 } apInUdpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a UDP Attack" ::= { apTcpStates 1029 } apOutUdpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a UDP Attack" ::= { apTcpStates 1030 } apInIcmpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a ICMP Attack" ::= { apTcpStates 1031 } apOutIcmpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a ICMP Attack" ::= { apTcpStates 1032 } apInOtherIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an IP Attack using other protocols" ::= { apTcpStates 1033 } apOutOtherIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an IP Attack using other protocols" ::= { apTcpStates 1034 } apInFragmentAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an Fragmentation Attack" ::= { apTcpStates 1035 } apOutFragmentAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an Fragmentation Attack" ::= { apTcpStates 1036 } apInBadipPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets with malformed IP Headers" ::= { apTcpStates 1037 } apOutBadipPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets with malformed IP Headers" ::= { apTcpStates 1038 } apInBadTcpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets with bad TCP protocol/state" ::= { apTcpStates 1039 } apOutBadTcpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets with bad TCP protocol/state" ::= { apTcpStates 1040 } apInBadUdpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound UDP packets with malformed header or missing data" ::= { apTcpStates 1041 } apOutBadUdpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound UDP packets with malformed header or missing data" ::= { apTcpStates 1042 } apInBadIcmpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound ICMP packets with malformed header" ::= { apTcpStates 1043 } apOutBadIcmpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound ICMP packets with malformed header" ::= { apTcpStates 1044 } apInBadOtherIpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets of other protocol with malformed header" ::= { apTcpStates 1045 } apOutBadOtherIpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets of other protocol with malformed header" ::= { apTcpStates 1046 } apInOverloadedMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound packets overloading the protected IPs" ::= { apTcpStates 1047 } apOutOverloadedMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound packets overloading the protected IPs" ::= { apTcpStates 1048 } apInLatencyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound Latency" ::= { apTcpStates 1049 } apOutLatencyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound Latency" ::= { apTcpStates 1050 } apIfStates OBJECT IDENTIFIER ::= { apState 3 } apMgmtIfLinkModeState OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Speed and duplex of the appliance management interface" ::= { apIfStates 1 } apIntIfLinkModeState OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Speed and duplex of the appliance internet interface" ::= { apIfStates 2 } apProtIfLinkModeState OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Speed and duplex of the appliance Protected Interface" ::= { apIfStates 3 } apMgmtIfLinkFCState OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Flow Control setting of the appliance management interface" ::= { apIfStates 4 } apIntIfLinkFCState OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Flow Control setting of the appliance internet interface" ::= { apIfStates 5 } apProtIfLinkFCState OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Flow Control setting of the appliance Protected Interface" ::= { apIfStates 6 } apHighAvailabilityInfo OBJECT IDENTIFIER ::= { apState 4 } apHaState OBJECT-TYPE SYNTAX INTEGER { unknown(1), probe(2), standby(3), active(4), cripple(5), standalone(6), activesec(7) } MAX-ACCESS read-only STATUS current DESCRIPTION "Current high availability state" ::= { apHighAvailabilityInfo 1 } apHaPartnerList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma-separated list of redundant (fail-over) partners" ::= { apHighAvailabilityInfo 2 } apHaPartnerTime OBJECT-TYPE SYNTAX TimeInterval MAX-ACCESS read-only STATUS current DESCRIPTION "Elapsed time since last redundant partner contact" ::= { apHighAvailabilityInfo 3 } apStalledFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure engine stalled" ::= { apState 5 } apOutputErrorIIFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure is having trouble transmitting packets over Internet Interface" ::= { apState 6 } apOutputErrorPIFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure is having trouble transmitting packet over Protected Interfaces" ::= { apState 7 } apOutputErrorMIFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure is having trouble transmitting packet over Management Interfaces" ::= { apState 8 } apNewConfigFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure configuration has just been updated" ::= { apState 9 } apNotLicensedFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has not yet been authorized for use" ::= { apState 10 } apMacTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal MAC table space is full" ::= { apState 11 } apProtectedTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal protected IP table space is full" ::= { apState 12 } apIncidentTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal incident table space is full" ::= { apState 13 } apTcpTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal TCP table space is full" ::= { apState 14 } apUdpTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal UDP table space is full" ::= { apState 15 } apIcmpTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal ICMP table space is full" ::= { apState 16 } apOtherIpTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal other IP table space is full" ::= { apState 17 } apFragTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal fragment table space is full" ::= { apState 18 } apFtpTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal ftp tracking table space is full" ::= { apState 19 } apBlockedTableFullFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's internal blocked ip table space is full" ::= { apState 20 } apShortCircuitFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has detected an external link between the Internet and Protected Interfaces" ::= { apState 21 } apInternetIfDisconnectedFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has detected that the Internet interface has been disconnected" ::= { apState 22 } apProtectedIfDisconnectedFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has detected that the Protected interface has been disconnected" ::= { apState 23 } apMgmtIfDisconnectedFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has detected that the Management interface has been disconnected" ::= { apState 24 } apUpgradingFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure is in the process of a software upgrade" ::= { apState 25 } apProtectedIfTrafficFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure detects traffic on the Protected interface while in Analyze-Tap mode" ::= { apState 26 } apRoutingLoopFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure detects apossible alternate network path around the appliance" ::= { apState 27 } apOfflineFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if the DDoS Secure engine is no longer running, a brief state during DDoS Secure restart sequence" ::= { apState 28 } apStateLearningFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure is in state learning mode" ::= { apState 29 } apSupportExpiredFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure's support period has expired" ::= { apState 30 } apSevereLoadingFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure detects that packets have been Dropped due to heavy loading" ::= { apState 31 } apMacMisconfiguredFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure detects that a ethernet address configured for one interface is detected on another interface" ::= { apState 32 } apIfMisconfiguredFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if the Internet and Protected interfaces are configured differently, and a Fail-Safe card is installed" ::= { apState 33 } apInternetIfLinkDownFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has detected that one of the links on the Internet interface has been disconnected" ::= { apState 34 } apProtectedIfLinkDownFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has detected that one of the links on the protected IP interface has been disconnected" ::= { apState 35 } apDatashareIfDisconnectedFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has detected that the Data Share interface has been disconnected" ::= { apState 36 } apDiskFailingFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has a disk failing" ::= { apState 37 } apPsuFailingFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has a PSU failing" ::= { apState 38 } apFanFailingFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has a Fan failing" ::= { apState 39 } apConfigXferFailFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if DDoS Secure has failed to transfer a confuguration" ::= { apState 40 } apMissingRequiredPartnerFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if a required partner is not active" ::= { apState 41 } apBgpMisconfiguredIpFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if BGP traffic detected to undefined protected IP" ::= { apState 42 } apStats OBJECT IDENTIFIER ::= { jddsAppliance 3 } apSessionTallies OBJECT IDENTIFIER ::= { apStats 1 } apInTcpConnTally OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Current number of established TCP sessions across appliance originated by an internet-side client" ::= { apSessionTallies 1 } apOutTcpConnTally OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Current number of established TCP sessions across appliance originated by a protected IPs" ::= { apSessionTallies 2 } apInSynBacklogTally OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Current number of half open (not yet established) TCP sessions originated by an internet-side client" ::= { apSessionTallies 3 } apUdpSessionTally OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Current number of UDP sessions across appliance" ::= { apSessionTallies 4 } apIcmpSessionTally OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Current number of ICMP sessions across appliance" ::= { apSessionTallies 5 } apOtherIpSessionTally OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Current number of other IP sessions across appliance" ::= { apSessionTallies 6 } apSummaryBytes OBJECT IDENTIFIER ::= { apStats 3 } apInTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes seen inbound by DDoS Secure" ::= { apSummaryBytes 1 } apOutTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes seen outbound by DDoS Secure" ::= { apSummaryBytes 2 } apInDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped inbound by DDoS Secure" ::= { apSummaryBytes 3 } apOutDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped outbound by DDoS Secure" ::= { apSummaryBytes 4 } apInCharmDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped inbound using CHARM heuristics" ::= { apSummaryBytes 5 } apOutCharmDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped outbound using CHARM heuristics" ::= { apSummaryBytes 6 } apSummaryPpsRates OBJECT IDENTIFIER ::= { apStats 4 } apInTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak aggregate packets/sec traffic rate inbound since last restart or reset" ::= { apSummaryPpsRates 1 } apOutTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak aggregate packets/sec traffic rate outbound since last restart or reset" ::= { apSummaryPpsRates 2 } apInDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak packets/sec Drop rate inbound by DDoS Secure since last restart or reset" ::= { apSummaryPpsRates 3 } apOutDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak packets/sec Drop rate outbound by DDoS Secure since last restart or reset" ::= { apSummaryPpsRates 4 } apSummaryBpsRates OBJECT IDENTIFIER ::= { apStats 5 } apInTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak aggregate bits per second traffic rate inbound since last restart or reset" ::= { apSummaryBpsRates 1 } apOutTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak aggregate bits per second traffic rate outbound since last restart or reset" ::= { apSummaryBpsRates 2 } apInDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak bits per second Drop rate inbound by DDoS Secure since last restart or reset" ::= { apSummaryBpsRates 3 } apOutDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak bits per second Drop rate outbound by DDoS Secure since last restart or reset" ::= { apSummaryBpsRates 4 } apInCharmDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak bits per second Drop rate inbound using CHARM heuristics since last restart or reset" ::= { apSummaryBpsRates 5 } apOutCharmDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak bits per second Drop rate outbound using CHARM heuristics since last restart or reset" ::= { apSummaryBpsRates 6 } apAttackPkts OBJECT IDENTIFIER ::= { apStats 6 } apInProtectBwthPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in protect bandwidth defense" ::= { apAttackPkts 1 } apOutProtectBwthPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in protect bandwidth defense" ::= { apAttackPkts 2 } apInFloodPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in flood defense" ::= { apAttackPkts 3 } apOutFloodPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in flood defense" ::= { apAttackPkts 4 } apInBlockedProtocolPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in blocked Protocol defense" ::= { apAttackPkts 5 } apOutBlockedProtocolPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in blocked Protocol defense" ::= { apAttackPkts 6 } apInBlockedStatePktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in blocked state defense" ::= { apAttackPkts 7 } apOutBlockedStatePktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in blocked state defense" ::= { apAttackPkts 8 } apInIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in IP Attack defense" ::= { apAttackPkts 9 } apOutIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in IP Attack defense" ::= { apAttackPkts 10 } apInTcpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in TCP Attack defense" ::= { apAttackPkts 11 } apOutTcpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in TCP Attack defense" ::= { apAttackPkts 12 } apInUdpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in UDP Attack defense" ::= { apAttackPkts 13 } apOutUdpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in UDP Attack defense" ::= { apAttackPkts 14 } apInIcmpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in ICMP Attack defense" ::= { apAttackPkts 15 } apOutIcmpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in ICMP Attack defense" ::= { apAttackPkts 16 } apInOtherIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in other IP Attack defense" ::= { apAttackPkts 17 } apOutOtherIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in other IP Attack defense" ::= { apAttackPkts 18 } apInFragmentAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in fragment Attack defense" ::= { apAttackPkts 19 } apOutFragmentAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in fragment Attack defense" ::= { apAttackPkts 20 } apInBadIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in bad IP defense" ::= { apAttackPkts 21 } apOutBadIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in bad IP defense" ::= { apAttackPkts 22 } apInBadTcpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in bad TCP defense" ::= { apAttackPkts 23 } apOutBadTcpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in bad TCP defense" ::= { apAttackPkts 24 } apInBadUdpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in bad UDP defense" ::= { apAttackPkts 25 } apOutBadUdpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in bad UDP defense" ::= { apAttackPkts 26 } apInBadIcmpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in bad ICMP defense" ::= { apAttackPkts 27 } apOutBadIcmpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in bad ICMP defense" ::= { apAttackPkts 28 } apInBadOtherIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified inbound in bad other IP defense" ::= { apAttackPkts 29 } apOutBadOtherIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of packets identified outbound in bad other IP defense" ::= { apAttackPkts 30 } apInTotalPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total packets/sec traffic rate inbound since last restart or reset" ::= { apAttackPkts 33 } apOutTotalPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total packets/sec traffic rate outbound since last restart or reset" ::= { apAttackPkts 34 } apInSmallPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { apAttackPkts 35 } apOutSmallPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { apAttackPkts 36 } apInMediumPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { apAttackPkts 37 } apOutMediumPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { apAttackPkts 38 } apInLargePpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { apAttackPkts 39 } apOutLargePpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { apAttackPkts 40 } apInDroppedPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input packets Dropped per second" ::= { apAttackPkts 43 } apOutDroppedPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output packets Dropped per second" ::= { apAttackPkts 44 } apInFilteredBwthPercentCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound dropped bandwidth divided by the actual bandwidth" ::= { apAttackPkts 45 } apOutFilteredBwthPercentCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound dropped bandwidth divided by the actual bandwidth" ::= { apAttackPkts 46 } apInConnreqCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of inbound TCP connection requests" ::= { apAttackPkts 47 } apOutConnreqCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of outbound TCP connection requests" ::= { apAttackPkts 48 } apInOverloadedCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of inbound packets overloading the protected IPs" ::= { apAttackPkts 49 } apOutOverloadedCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of outbound packets overloading the protected IPs" ::= { apAttackPkts 50 } apWorstOffenderTable OBJECT-TYPE SYNTAX SEQUENCE OF ApWorstOffenderEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of worst offender statistics" ::= { apStats 7 } apWorstOffenderEntry OBJECT-TYPE SYNTAX ApWorstOffenderEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row consisting of a worst offender for a given reason and their statistics" INDEX { apWorstOffenderInetAddressType, apWorstOffenderInetAddress, apWorstOffenderReason } ::= { apWorstOffenderTable 1 } ApWorstOffenderEntry ::= SEQUENCE { apWorstOffenderInetAddressType InetAddressType, apWorstOffenderInetAddress InetAddress, apWorstOffenderReason DefenseType, apWorstOffenderLastTime DateAndTime, apWorstOffenderCount Counter32 } apWorstOffenderInetAddressType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS not-accessible STATUS current DESCRIPTION "IP address type of the offender" ::= {apWorstOffenderEntry 1} apWorstOffenderInetAddress OBJECT-TYPE SYNTAX InetAddress (SIZE (0..47)) MAX-ACCESS not-accessible STATUS current DESCRIPTION "IP Address of offender" ::= {apWorstOffenderEntry 2} apWorstOffenderReason OBJECT-TYPE SYNTAX DefenseType MAX-ACCESS not-accessible STATUS current DESCRIPTION "Type of Attack" ::= {apWorstOffenderEntry 3} apWorstOffenderLastTime OBJECT-TYPE SYNTAX DateAndTime MAX-ACCESS read-only STATUS current DESCRIPTION "Time of latest Attack (of given type)" ::= {apWorstOffenderEntry 4} apWorstOffenderCount OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of offenses (of given type)" ::= {apWorstOffenderEntry 5} apLogFileTable OBJECT-TYPE SYNTAX SEQUENCE OF ApLogFileEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of log file entries" ::= { jddsAppliance 4 } apLogFileEntry OBJECT-TYPE SYNTAX ApLogFileEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row consisting of a record from a log file" INDEX { apLogFileRecordNumber } ::= { apLogFileTable 1 } ApLogFileEntry ::= SEQUENCE { apLogFileRecordNumber LocalIndex, apLogFileRecord DisplayString } apLogFileRecordNumber OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique log file record number" ::= { apLogFileEntry 1 } apLogFileRecord OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Specific log file entry" ::= { apLogFileEntry 2 } apIncidentTable OBJECT-TYPE SYNTAX SEQUENCE OF ApIncidentEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of incident entries" ::= { jddsAppliance 5 } apIncidentEntry OBJECT-TYPE SYNTAX ApIncidentEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row consisting of an incident record" INDEX { apIncidentYear, apIncidentMonth, apIncidentDay, apIncidentNumber } ::= {apIncidentTable 1 } ApIncidentEntry ::= SEQUENCE { apIncidentYear LocalIndex, apIncidentMonth LocalIndex, apIncidentDay LocalIndex, apIncidentNumber LocalIndex, apIncidentStart DateAndTime, apIncidentAddress DisplayString, apIncidentType DisplayString, apIncidentDirection Direction, apIncidentPeakRate Gauge32, apIncidentDropped Gauge32 } apIncidentYear OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record year" ::= {apIncidentEntry 1 } apIncidentMonth OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record month" ::= {apIncidentEntry 2 } apIncidentDay OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record day of month" ::= {apIncidentEntry 3 } apIncidentNumber OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique (for the day) incident record number" ::= {apIncidentEntry 4 } apIncidentStart OBJECT-TYPE SYNTAX DateAndTime MAX-ACCESS read-only STATUS current DESCRIPTION "Incident start time" ::= {apIncidentEntry 5 } apIncidentAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Appliance, Portal and Protected Incident IP or MAC address, This could be an outbound MAC incident" ::= {apIncidentEntry 6 } apIncidentType OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Incident defense type (and subtype)" ::= {apIncidentEntry 7 } apIncidentDirection OBJECT-TYPE SYNTAX Direction MAX-ACCESS read-only STATUS current DESCRIPTION "Incident direction" ::= {apIncidentEntry 8 } apIncidentPeakRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak packets/s during this incident" ::= {apIncidentEntry 9 } apIncidentDropped OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "No of packets Dropped as part of this incident" ::= {apIncidentEntry 10 } -- End of Appliance settings -- ** poStatsTable poStatsTable OBJECT-TYPE SYNTAX SEQUENCE OF PoStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of portal statistics" ::= { jddsPortal 3 } poStatsEntry OBJECT-TYPE SYNTAX PoStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row associated with a specific portal" INDEX { poStatsIndex } ::= { poStatsTable 1 } PoStatsEntry ::= SEQUENCE { poStatsIndex LocalIndex, poPortalName DisplayString, poInTotalBpsAvg Gauge32, poOutTotalBpsAvg Gauge32, poInTotalPpsAvg Gauge32, poOutTotalPpsAvg Gauge32, poInSmallPpsAvg Gauge32, poOutSmallPpsAvg Gauge32, poInMediumPpsAvg Gauge32, poOutMediumPpsAvg Gauge32, poInLargePpsAvg Gauge32, poOutLargePpsAvg Gauge32, poInDroppedBpsAvg Gauge32, poOutDroppedBpsAvg Gauge32, poInDroppedPpsAvg Gauge32, poOutDroppedPpsAvg Gauge32, poInCharmDroppedBpsAvg Gauge32, poOutCharmDroppedBpsAvg Gauge32, poInFilteredBwthPercentAvg Gauge32, poOutFilteredBwthPercentAvg Gauge32, poInSynbacklogtallyAvg Gauge32, poOutSynbacklogtallyAvg Gauge32, poInConnectionAvg Gauge32, poOutConnectionAvg Gauge32, poInConnreqAvg Gauge32, poOutConnreqAvg Gauge32, poInActiveHttpGetsAvg Gauge32, poOutActiveHttpGetsAvg Gauge32, poInProtectBwthPktsAvg Gauge32, poOutProtectBwthPktsAvg Gauge32, poInFloodPktsAvg Gauge32, poOutFloodPktsAvg Gauge32, poInBlockedProtocolPktsAvg Gauge32, poOutBlockedProtocolPktsAvg Gauge32, poInBlockedStatePktsAvg Gauge32, poOutBlockedStatePktsAvg Gauge32, poInIpAttackPktsAvg Gauge32, poOutIpAttackPktsAvg Gauge32, poInTcpAttackPktsAvg Gauge32, poOutTcpAttackPktsAvg Gauge32, poInUdpAttackPktsAvg Gauge32, poOutUdpAttackPktsAvg Gauge32, poInIcmpAttackPktsAvg Gauge32, poOutIcmpAttackPktsAvg Gauge32, poInOtherIpAttackPktsAvg Gauge32, poOutOtherIpAttackPktsAvg Gauge32, poInFragmentAttackPktsAvg Gauge32, poOutFragmentAttackPktsAvg Gauge32, poInBadipPktsAvg Gauge32, poOutBadipPktsAvg Gauge32, poInBadTcpPktsAvg Gauge32, poOutBadTcpPktsAvg Gauge32, poInBadUdpPktsAvg Gauge32, poOutBadUdpPktsAvg Gauge32, poInBadIcmpPktsAvg Gauge32, poOutBadIcmpPktsAvg Gauge32, poInBadOtherIpPktsAvg Gauge32, poOutBadOtherIpPktsAvg Gauge32, poInOverloadedAvg Gauge32, poOutOverloadedAvg Gauge32, poInLatencyAvg Gauge32, poOutLatencyAvg Gauge32, poInTotalBpsMax Gauge32, poOutTotalBpsMax Gauge32, poInTotalPpsMax Gauge32, poOutTotalPpsMax Gauge32, poInSmallPpsMax Gauge32, poOutSmallPpsMax Gauge32, poInMediumPpsMax Gauge32, poOutMediumPpsMax Gauge32, poInLargePpsMax Gauge32, poOutLargePpsMax Gauge32, poInDroppedBpsMax Gauge32, poOutDroppedBpsMax Gauge32, poInDroppedPpsMax Gauge32, poOutDroppedPpsMax Gauge32, poInCharmDroppedBpsMax Gauge32, poOutCharmDroppedBpsMax Gauge32, poInFilteredBwthPercentMax Gauge32, poOutFilteredBwthPercentMax Gauge32, poInSynbacklogtallyMax Gauge32, poOutSynbacklogtallyMax Gauge32, poInConnectionMax Gauge32, poOutConnectionMax Gauge32, poInConnreqMax Gauge32, poOutConnreqMax Gauge32, poInActiveHttpGetsMax Gauge32, poOutActiveHttpGetsMax Gauge32, poInProtectBwthPktsMax Gauge32, poOutProtectBwthPktsMax Gauge32, poInFloodPktsMax Gauge32, poOutFloodPktsMax Gauge32, poInBlockedProtocolPktsMax Gauge32, poOutBlockedProtocolPktsMax Gauge32, poInBlockedStatePktsMax Gauge32, poOutBlockedStatePktsMax Gauge32, poInIpAttackPktsMax Gauge32, poOutIpAttackPktsMax Gauge32, poInTcpAttackPktsMax Gauge32, poOutTcpAttackPktsMax Gauge32, poInUdpAttackPktsMax Gauge32, poOutUdpAttackPktsMax Gauge32, poInIcmpAttackPktsMax Gauge32, poOutIcmpAttackPktsMax Gauge32, poInOtherIpAttackPktsMax Gauge32, poOutOtherIpAttackPktsMax Gauge32, poInFragmentAttackPktsMax Gauge32, poOutFragmentAttackPktsMax Gauge32, poInBadipPktsMax Gauge32, poOutBadipPktsMax Gauge32, poInBadTcpPktsMax Gauge32, poOutBadTcpPktsMax Gauge32, poInBadUdpPktsMax Gauge32, poOutBadUdpPktsMax Gauge32, poInBadIcmpPktsMax Gauge32, poOutBadIcmpPktsMax Gauge32, poInBadOtherIpPktsMax Gauge32, poOutBadOtherIpPktsMax Gauge32, poInOverloadedMax Gauge32, poOutOverloadedMax Gauge32, poInLatencyMax Gauge32, poOutLatencyMax Gauge32, poInTotalBytesCnt Counter64, poOutTotalBytesCnt Counter64, poInDroppedBytesCnt Counter64, poOutDroppedBytesCnt Counter64, poInCharmDroppedBytesCnt Counter64, poOutCharmDroppedBytesCnt Counter64, poInTotalPpsCnt Counter32, poOutTotalPpsCnt Counter32, poInSmallPpsCnt Counter32, poOutSmallPpsCnt Counter32, poInMediumPpsCnt Counter32, poOutMediumPpsCnt Counter32, poInLargePpsCnt Counter32, poOutLargePpsCnt Counter32, poInDroppedPpsCnt Counter32, poOutDroppedPpsCnt Counter32, poInFilteredBwthPercentCnt Counter32, poOutFilteredBwthPercentCnt Counter32, poInConnreqCnt Counter32, poOutConnreqCnt Counter32 } poStatsIndex OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Index to Portal Statistics" ::= { poStatsEntry 1 } poPortalName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The name associated with this portal" ::= { poStatsEntry 2 } poInTotalBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input bits per second" ::= { poStatsEntry 901 } poOutTotalBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of output bits per second" ::= { poStatsEntry 902 } poInTotalPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average packets/sec traffic rate inbound since last restart or reset" ::= { poStatsEntry 903 } poOutTotalPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average packets/sec traffic rate outbound since last restart or reset" ::= { poStatsEntry 904 } poInSmallPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { poStatsEntry 905 } poOutSmallPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { poStatsEntry 906 } poInMediumPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { poStatsEntry 907 } poOutMediumPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { poStatsEntry 908 } poInLargePpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { poStatsEntry 909 } poOutLargePpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { poStatsEntry 910 } poInDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input bits Dropped per second" ::= { poStatsEntry 911 } poOutDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of output bits Dropped per second" ::= { poStatsEntry 912 } poInDroppedPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input packets Dropped per second" ::= { poStatsEntry 913 } poOutDroppedPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of output packets Dropped per second" ::= { poStatsEntry 914 } poInCharmDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound bits per second dropped by heuristic detection" ::= { poStatsEntry 915 } poOutCharmDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound bits per second dropped by heuristic detection" ::= { poStatsEntry 916 } poInFilteredBwthPercentAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound dropped bandwidth divided by the actual bandwidth" ::= { poStatsEntry 917 } poOutFilteredBwthPercentAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound dropped bandwidth divided by the actual bandwidth" ::= { poStatsEntry 918 } poInSynbacklogtallyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of partially open TCP connections inbound" ::= { poStatsEntry 919 } poOutSynbacklogtallyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of partially open TCP connections outbound" ::= { poStatsEntry 920 } poInConnectionAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound TCP connections" ::= { poStatsEntry 921 } poOutConnectionAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound TCP connections" ::= { poStatsEntry 922 } poInConnreqAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound TCP connection requests" ::= { poStatsEntry 923 } poOutConnreqAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound TCP connection requests" ::= { poStatsEntry 924 } poInActiveHttpGetsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound HTTP page requests being processed" ::= { poStatsEntry 925 } poOutActiveHttpGetsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound HTTP page requests being processed" ::= { poStatsEntry 926 } poInProtectBwthPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound protected bandwifth" ::= { poStatsEntry 927 } poOutProtectBwthPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound protected bandwifth" ::= { poStatsEntry 928 } poInFloodPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound packets causing flooding" ::= { poStatsEntry 929 } poOutFloodPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound packets causing flooding" ::= { poStatsEntry 930 } poInBlockedProtocolPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets dropped by filter " ::= { poStatsEntry 931 } poOutBlockedProtocolPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets dropped by filter" ::= { poStatsEntry 932 } poInBlockedStatePktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets dropped due to incorrect state" ::= { poStatsEntry 933 } poOutBlockedStatePktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets dropped due to incorrect state" ::= { poStatsEntry 934 } poInIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an IP Attack" ::= { poStatsEntry 935 } poOutIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an IP Attack" ::= { poStatsEntry 936 } poInTcpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a TCP Attack" ::= { poStatsEntry 937 } poOutTcpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a TCP Attack" ::= { poStatsEntry 938 } poInUdpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a UDP Attack" ::= { poStatsEntry 939 } poOutUdpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a UDP Attack" ::= { poStatsEntry 940 } poInIcmpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a ICMP Attack" ::= { poStatsEntry 941 } poOutIcmpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a ICMP Attack" ::= { poStatsEntry 942 } poInOtherIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an IP Attack using other protocols" ::= { poStatsEntry 943 } poOutOtherIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an IP Attack using other protocols" ::= { poStatsEntry 944 } poInFragmentAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an Fragmentation Attack" ::= { poStatsEntry 945 } poOutFragmentAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an Fragmentation Attack" ::= { poStatsEntry 946 } poInBadipPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets with malformed IP Headers" ::= { poStatsEntry 947 } poOutBadipPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets with malformed IP Headers" ::= { poStatsEntry 948 } poInBadTcpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets with bad TCP protocol/state" ::= { poStatsEntry 949 } poOutBadTcpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets with bad TCP protocol/state" ::= { poStatsEntry 950 } poInBadUdpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound UDP packets with malformed header or missing data" ::= { poStatsEntry 951 } poOutBadUdpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound UDP packets with malformed header or missing data" ::= { poStatsEntry 952 } poInBadIcmpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound ICMP packets with malformed header" ::= { poStatsEntry 953 } poOutBadIcmpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound ICMP packets with malformed header" ::= { poStatsEntry 954 } poInBadOtherIpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets of other protocol with malformed header" ::= { poStatsEntry 955 } poOutBadOtherIpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets of other protocol with malformed header" ::= { poStatsEntry 956 } poInOverloadedAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound packets overloading the protected IP" ::= { poStatsEntry 957 } poOutOverloadedAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound packets overloading the protected IP" ::= { poStatsEntry 958 } poInLatencyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound Latency" ::= { poStatsEntry 959 } poOutLatencyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound Latency" ::= { poStatsEntry 960 } poInTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of input bits per second" ::= { poStatsEntry 1001 } poOutTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of output bits per second" ::= { poStatsEntry 1002 } poInTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak packets/sec traffic rate inbound since last restart or reset" ::= { poStatsEntry 1003 } poOutTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak packets/sec traffic rate outbound since last restart or reset" ::= { poStatsEntry 1004 } poInSmallPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { poStatsEntry 1005 } poOutSmallPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { poStatsEntry 1006 } poInMediumPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1007 } poOutMediumPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1008 } poInLargePpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1009 } poOutLargePpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1010 } poInDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input bits Dropped per second" ::= { poStatsEntry 1011 } poOutDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of output bits Dropped per second" ::= { poStatsEntry 1012 } poInDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input packets Dropped per second" ::= { poStatsEntry 1013 } poOutDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of output packets Dropped per second" ::= { poStatsEntry 1014 } poInCharmDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound bits per second dropped by heuristic detection" ::= { poStatsEntry 1015 } poOutCharmDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound bits per second dropped by heuristic detection" ::= { poStatsEntry 1016 } poInFilteredBwthPercentMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound dropped bandwidth divided by the actual bandwidth" ::= { poStatsEntry 1017 } poOutFilteredBwthPercentMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound dropped bandwidth divided by the actual bandwidth" ::= { poStatsEntry 1018 } poInSynbacklogtallyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of partially open TCP connections inbound" ::= { poStatsEntry 1019 } poOutSynbacklogtallyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of partially open TCP connections outbound" ::= { poStatsEntry 1020 } poInConnectionMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound TCP connections" ::= { poStatsEntry 1021 } poOutConnectionMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound TCP connections" ::= { poStatsEntry 1022 } poInConnreqMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound TCP connection requests" ::= { poStatsEntry 1023 } poOutConnreqMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound TCP connection requests" ::= { poStatsEntry 1024 } poInActiveHttpGetsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound HTTP page requests being processed" ::= { poStatsEntry 1025 } poOutActiveHttpGetsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound HTTP page requests being processed" ::= { poStatsEntry 1026 } poInProtectBwthPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound protected bandwifth" ::= { poStatsEntry 1027 } poOutProtectBwthPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound protected bandwifth" ::= { poStatsEntry 1028 } poInFloodPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound packets causing flooding" ::= { poStatsEntry 1029 } poOutFloodPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound packets causing flooding" ::= { poStatsEntry 1030 } poInBlockedProtocolPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets dropped by filter " ::= { poStatsEntry 1031 } poOutBlockedProtocolPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets dropped by filter" ::= { poStatsEntry 1032 } poInBlockedStatePktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets dropped due to incorrect state" ::= { poStatsEntry 1033 } poOutBlockedStatePktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets dropped due to incorrect state" ::= { poStatsEntry 1034 } poInIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an IP Attack" ::= { poStatsEntry 1035 } poOutIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an IP Attack" ::= { poStatsEntry 1036 } poInTcpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a TCP Attack" ::= { poStatsEntry 1037 } poOutTcpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a TCP Attack" ::= { poStatsEntry 1038 } poInUdpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a UDP Attack" ::= { poStatsEntry 1039 } poOutUdpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a UDP Attack" ::= { poStatsEntry 1040 } poInIcmpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a ICMP Attack" ::= { poStatsEntry 1041 } poOutIcmpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a ICMP Attack" ::= { poStatsEntry 1042 } poInOtherIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an IP Attack using other protocols" ::= { poStatsEntry 1043 } poOutOtherIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an IP Attack using other protocols" ::= { poStatsEntry 1044 } poInFragmentAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an Fragmentation Attack" ::= { poStatsEntry 1045 } poOutFragmentAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an Fragmentation Attack" ::= { poStatsEntry 1046 } poInBadipPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets with malformed IP Headers" ::= { poStatsEntry 1047 } poOutBadipPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets with malformed IP Headers" ::= { poStatsEntry 1048 } poInBadTcpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets with bad TCP protocol/state" ::= { poStatsEntry 1049 } poOutBadTcpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets with bad TCP protocol/state" ::= { poStatsEntry 1050 } poInBadUdpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound UDP packets with malformed header or missing data" ::= { poStatsEntry 1051 } poOutBadUdpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound UDP packets with malformed header or missing data" ::= { poStatsEntry 1052 } poInBadIcmpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound ICMP packets with malformed header" ::= { poStatsEntry 1053 } poOutBadIcmpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound ICMP packets with malformed header" ::= { poStatsEntry 1054 } poInBadOtherIpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets of other protocol with malformed header" ::= { poStatsEntry 1055 } poOutBadOtherIpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets of other protocol with malformed header" ::= { poStatsEntry 1056 } poInOverloadedMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound packets overloading the protected IP" ::= { poStatsEntry 1057 } poOutOverloadedMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound packets overloading the protected IP" ::= { poStatsEntry 1058 } poInLatencyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound Latency" ::= { poStatsEntry 1059 } poOutLatencyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound Latency" ::= { poStatsEntry 1060 } poInTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes seen inbound by DDoS Secure" ::= { poStatsEntry 1101 } poOutTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes seen outbound by DDoS Secure" ::= { poStatsEntry 1102 } poInDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped inbound by DDoS Secure" ::= { poStatsEntry 1103 } poOutDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped outbound by DDoS Secure" ::= { poStatsEntry 1104 } poInCharmDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped inbound using CHARM heuristics" ::= { poStatsEntry 1105 } poOutCharmDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of bytes Dropped outbound using CHARM heuristics" ::= { poStatsEntry 1106 } poInTotalPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total packets/sec traffic rate inbound since last restart or reset" ::= { poStatsEntry 1109 } poOutTotalPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total packets/sec traffic rate outbound since last restart or reset" ::= { poStatsEntry 1110 } poInSmallPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { poStatsEntry 1111 } poOutSmallPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { poStatsEntry 1112 } poInMediumPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1113 } poOutMediumPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1114 } poInLargePpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1115 } poOutLargePpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { poStatsEntry 1116 } poInDroppedPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input packets Dropped per second" ::= { poStatsEntry 1119 } poOutDroppedPpsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output packets Dropped per second" ::= { poStatsEntry 1120 } poInFilteredBwthPercentCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total inbound dropped bandwidth divided by the actual bandwidth" ::= { poStatsEntry 1121 } poOutFilteredBwthPercentCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total outbound dropped bandwidth divided by the actual bandwidth" ::= { poStatsEntry 1122 } poInConnreqCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of inbound TCP connection requests" ::= { poStatsEntry 1123 } poOutConnreqCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of outbound TCP connection requests" ::= { poStatsEntry 1124 } poIncidentTable OBJECT-TYPE SYNTAX SEQUENCE OF PoIncidentEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of portal incident entries" ::= { jddsPortal 5 } poIncidentEntry OBJECT-TYPE SYNTAX PoIncidentEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row consisting of an incident record for a specific portal" INDEX { poIncidentYear, poIncidentMonth, poIncidentDay, poIncidentNumber} ::= {poIncidentTable 1 } PoIncidentEntry ::= SEQUENCE { poIncidentYear LocalIndex, poIncidentMonth LocalIndex, poIncidentDay LocalIndex, poIncidentNumber LocalIndex, poIncidentPortalName DisplayString, poIncidentStart DateAndTime, poIncidentAddress DisplayString, poIncidentType DisplayString, poIncidentDirection Direction, poIncidentPeakRate Gauge32, poIncidentDropped Gauge32 } poIncidentYear OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record year" ::= {poIncidentEntry 1 } poIncidentMonth OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record month" ::= {poIncidentEntry 2 } poIncidentDay OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record day of month" ::= {poIncidentEntry 3 } poIncidentNumber OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique (for the day) incident record number" ::= {poIncidentEntry 4 } poIncidentPortalName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "The name associated with this portal" ::= { poIncidentEntry 5 } poIncidentStart OBJECT-TYPE SYNTAX DateAndTime MAX-ACCESS read-only STATUS current DESCRIPTION "Incident start time" ::= {poIncidentEntry 6 } poIncidentAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Portal or Protected address affected by the incident. IP or MAC Address " ::= {poIncidentEntry 7 } poIncidentType OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Incident defense type (and subtype)" ::= {poIncidentEntry 8 } poIncidentDirection OBJECT-TYPE SYNTAX Direction MAX-ACCESS read-only STATUS current DESCRIPTION "Incident direction" ::= {poIncidentEntry 9 } poIncidentPeakRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak packets/s during this incident" ::= {poIncidentEntry 10 } poIncidentDropped OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "No of packets Dropped as part of this incident" ::= {poIncidentEntry 11 } -- ### Portal Filter settings ### poFiltersTable OBJECT-TYPE SYNTAX SEQUENCE OF PoFiltersEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of filter configurations" ::= { jddsPortal 6 } poFiltersEntry OBJECT-TYPE SYNTAX PoFiltersEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row associated with a specific portal filter" INDEX { poFilterIndex } ::= { poFiltersTable 1 } PoFiltersEntry ::= SEQUENCE { poFilterIndex LocalIndex, poFilterName DisplayString, poTcpPortsList DisplayString, poUdpPortsList DisplayString, poIcmpTypesList DisplayString, poIpProtocolsList DisplayString } poFilterIndex OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique filter index" ::= { poFiltersEntry 1 } poFilterName OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Identifying filter name" ::= { poFiltersEntry 2 } poTcpPortsList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma separated list of TCP ports to allow" ::= { poFiltersEntry 3 } poUdpPortsList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma separated list of UDP ports to allow" ::= { poFiltersEntry 4 } poIcmpTypesList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma separated list of ICMP types to allow" ::= { poFiltersEntry 5 } poIpProtocolsList OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Comma separated list of other IP Protocols to allow" ::= { poFiltersEntry 6 } -- ### protected IP Statistics ### -- ** prStatsTable prStatsTable OBJECT-TYPE SYNTAX SEQUENCE OF PrStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of protected IP statistics" ::= { jddsProtected 3 } prStatsEntry OBJECT-TYPE SYNTAX PrStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row associated with a specific protected IP" INDEX { prInetAddressType, prInetAddress } ::= { prStatsTable 1 } PrStatsEntry ::= SEQUENCE { prInetAddressType InetAddressType, prInetAddress InetAddress, prBandwidth TruthValue, prFlood TruthValue, prBlockedProtocol TruthValue, prBlockedState TruthValue, prIpAttack TruthValue, prTcpAttack TruthValue, prUdpAttack TruthValue, prIcmpAttack TruthValue, prOtherIpAttack TruthValue, prFragAttack TruthValue, prBadIp TruthValue, prBadTcp TruthValue, prBadUdp TruthValue, prBadIcmp TruthValue, prBadOtherIp TruthValue, prOverloaded TruthValue, prInSyn Gauge32, prOutSyn Gauge32, prInSynAck Gauge32, prOutSynAck Gauge32, prInSynSyn Gauge32, prOutSynSyn Gauge32, prInAck Gauge32, prOutAck Gauge32, prInPendAck Gauge32, prOutPendAck Gauge32, prInGet Gauge32, prOutGet Gauge32, prInEst Gauge32, prOutEst Gauge32, prInFin1Src Gauge32, prOutFin1Src Gauge32, prInFin2Src Gauge32, prOutFin2Src Gauge32, prInFin3Src Gauge32, prOutFin3Src Gauge32, prInFinFin Gauge32, prOutFinFin Gauge32, prInFin1Dst Gauge32, prOutFin1Dst Gauge32, prInFin2Dst Gauge32, prOutFin2Dst Gauge32, prInFin3Dst Gauge32, prOutFin3Dst Gauge32, prInCls Gauge32, prOutCls Gauge32, prInRst Gauge32, prOutRst Gauge32, prInRstCls Gauge32, prOutRstCls Gauge32, prInUnknown Gauge32, prOutUnknown Gauge32, prInGets Gauge32, prOutGets Gauge32, prOverloadedFlag TruthValue, prInTcpConnTally Counter32, prOutTcpConnTally Counter32, prInSynBacklogTally Counter32, prInTotalBytesCnt Counter64, prOutTotalBytesCnt Counter64, prInDroppedBytesCnt Counter64, prOutDroppedBytesCnt Counter64, prInCharmDroppedBytesCnt Counter64, prOutCharmDroppedBytesCnt Counter64, prInTotalPpsMax Gauge32, prOutTotalPpsMax Gauge32, prInDroppedPpsMax Gauge32, prOutDroppedPpsMax Gauge32, prInTotalBpsMax Gauge32, prOutTotalBpsMax Gauge32, prInDroppedBpsMax Gauge32, prOutDroppedBpsMax Gauge32, prInCharmDroppedBpsMax Gauge32, prOutCharmDroppedBpsMax Gauge32, prInProtectBwthPktsCnt Counter32, prOutProtectBwthPktsCnt Counter32, prInFloodPktsCnt Counter32, prOutFloodPktsCnt Counter32, prInBlockedProtocolPktsCnt Counter32, prOutBlockedProtocolPktsCnt Counter32, prInBlockedStatePktsCnt Counter32, prOutBlockedStatePktsCnt Counter32, prInIpAttackPktsCnt Counter32, prOutIpAttackPktsCnt Counter32, prInTcpAttackPktsCnt Counter32, prOutTcpAttackPktsCnt Counter32, prInUdpAttackPktsCnt Counter32, prOutUdpAttackPktsCnt Counter32, prInIcmpAttackPktsCnt Counter32, prOutIcmpAttackPktsCnt Counter32, prInOtherIpAttackPktsCnt Counter32, prOutOtherIpAttackPktsCnt Counter32, prInFragmentAttackPktsCnt Counter32, prOutFragmentAttackPktsCnt Counter32, prInBadIpPktsCnt Counter32, prOutBadIpPktsCnt Counter32, prInBadTcpPktsCnt Counter32, prOutBadTcpPktsCnt Counter32, prInBadUdpPktsCnt Counter32, prOutBadUdpPktsCnt Counter32, prInBadIcmpPktsCnt Counter32, prOutBadIcmpPktsCnt Counter32, prInBadOtherIpPktsCnt Counter32, prOutBadOtherIpPktsCnt Counter32, prInTotalBpsAvg Gauge32, prOutTotalBpsAvg Gauge32, prInTotalPpsAvg Gauge32, prOutTotalPpsAvg Gauge32, prInSmallPpsAvg Gauge32, prOutSmallPpsAvg Gauge32, prInMediumPpsAvg Gauge32, prOutMediumPpsAvg Gauge32, prInLargePpsAvg Gauge32, prOutLargePpsAvg Gauge32, prInDroppedBpsAvg Gauge32, prOutDroppedBpsAvg Gauge32, prInDroppedPpsAvg Gauge32, prOutDroppedPpsAvg Gauge32, prInCharmDroppedBpsAvg Gauge32, prOutCharmDroppedBpsAvg Gauge32, prInFilteredBwthPercentAvg Gauge32, prOutFilteredBwthPercentAvg Gauge32, prInSynbacklogtallyAvg Gauge32, prOutSynbacklogtallyAvg Gauge32, prInConnectionAvg Gauge32, prOutConnectionAvg Gauge32, prInConnreqAvg Gauge32, prOutConnreqAvg Gauge32, prInActiveHttpGetsAvg Gauge32, prOutActiveHttpGetsAvg Gauge32, prInProtectBwthPktsAvg Gauge32, prOutProtectBwthPktsAvg Gauge32, prInFloodPktsAvg Gauge32, prOutFloodPktsAvg Gauge32, prInBlockedProtocolPktsAvg Gauge32, prOutBlockedProtocolPktsAvg Gauge32, prInBlockedStatePktsAvg Gauge32, prOutBlockedStatePktsAvg Gauge32, prInIpAttackPktsAvg Gauge32, prOutIpAttackPktsAvg Gauge32, prInTcpAttackPktsAvg Gauge32, prOutTcpAttackPktsAvg Gauge32, prInUdpAttackPktsAvg Gauge32, prOutUdpAttackPktsAvg Gauge32, prInIcmpAttackPktsAvg Gauge32, prOutIcmpAttackPktsAvg Gauge32, prInOtherIpAttackPktsAvg Gauge32, prOutOtherIpAttackPktsAvg Gauge32, prInFragmentAttackPktsAvg Gauge32, prOutFragmentAttackPktsAvg Gauge32, prInBadipPktsAvg Gauge32, prOutBadipPktsAvg Gauge32, prInBadTcpPktsAvg Gauge32, prOutBadTcpPktsAvg Gauge32, prInBadUdpPktsAvg Gauge32, prOutBadUdpPktsAvg Gauge32, prInBadIcmpPktsAvg Gauge32, prOutBadIcmpPktsAvg Gauge32, prInBadOtherIpPktsAvg Gauge32, prOutBadOtherIpPktsAvg Gauge32, prInOverloadedAvg Gauge32, prOutOverloadedAvg Gauge32, prInLatencyAvg Gauge32, prOutLatencyAvg Gauge32, prInSmallPpsMax Gauge32, prOutSmallPpsMax Gauge32, prInMediumPpsMax Gauge32, prOutMediumPpsMax Gauge32, prInLargePpsMax Gauge32, prOutLargePpsMax Gauge32, prInFilteredBwthPercentMax Gauge32, prOutFilteredBwthPercentMax Gauge32, prInSynbacklogtallyMax Gauge32, prOutSynbacklogtallyMax Gauge32, prInConnectionMax Gauge32, prOutConnectionMax Gauge32, prInConnreqMax Gauge32, prOutConnreqMax Gauge32, prInActiveHttpGetsMax Gauge32, prOutActiveHttpGetsMax Gauge32, prInProtectBwthPktsMax Gauge32, prOutProtectBwthPktsMax Gauge32, prInFloodPktsMax Gauge32, prOutFloodPktsMax Gauge32, prInBlockedProtocolPktsMax Gauge32, prOutBlockedProtocolPktsMax Gauge32, prInBlockedStatePktsMax Gauge32, prOutBlockedStatePktsMax Gauge32, prInIpAttackPktsMax Gauge32, prOutIpAttackPktsMax Gauge32, prInTcpAttackPktsMax Gauge32, prOutTcpAttackPktsMax Gauge32, prInUdpAttackPktsMax Gauge32, prOutUdpAttackPktsMax Gauge32, prInIcmpAttackPktsMax Gauge32, prOutIcmpAttackPktsMax Gauge32, prInOtherIpAttackPktsMax Gauge32, prOutOtherIpAttackPktsMax Gauge32, prInFragmentAttackPktsMax Gauge32, prOutFragmentAttackPktsMax Gauge32, prInBadipPktsMax Gauge32, prOutBadipPktsMax Gauge32, prInBadTcpPktsMax Gauge32, prOutBadTcpPktsMax Gauge32, prInBadUdpPktsMax Gauge32, prOutBadUdpPktsMax Gauge32, prInBadIcmpPktsMax Gauge32, prOutBadIcmpPktsMax Gauge32, prInBadOtherIpPktsMax Gauge32, prOutBadOtherIpPktsMax Gauge32, prInOverloadedMax Gauge32, prOutOverloadedMax Gauge32, prInLatencyMax Gauge32, prOutLatencyMax Gauge32 } prInetAddressType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS not-accessible STATUS current DESCRIPTION "Type of IP address a specific protected IP" ::= { prStatsEntry 1 } prInetAddress OBJECT-TYPE SYNTAX InetAddress (SIZE (0..47)) MAX-ACCESS not-accessible STATUS current DESCRIPTION "IP address of a specific protected IP" ::= { prStatsEntry 2 } prBandwidth OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending bandwidth" ::= { prStatsEntry 101 } prFlood OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against floods" ::= { prStatsEntry 102 } prBlockedProtocol OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Connection floods" ::= { prStatsEntry 103 } prBlockedState OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Connection floods" ::= { prStatsEntry 104 } prIpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against IP Attack" ::= { prStatsEntry 105 } prTcpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against TCP Attack" ::= { prStatsEntry 106 } prUdpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against UDP Attack" ::= { prStatsEntry 107 } prIcmpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against ICMP Attack" ::= { prStatsEntry 108 } prOtherIpAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Other IP Protocol Attack" ::= { prStatsEntry 109 } prFragAttack OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Fragment Attack" ::= { prStatsEntry 110 } prBadIp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Bad IP packets" ::= { prStatsEntry 111 } prBadTcp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Bad TCP packets" ::= { prStatsEntry 112 } prBadUdp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Bad UDP packets" ::= { prStatsEntry 113 } prBadIcmp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Bad ICMP packets" ::= { prStatsEntry 114 } prBadOtherIp OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if defending against Bad other IP Protocol packets" ::= { prStatsEntry 115 } prOverloaded OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if protected IP is overloaded" ::= { prStatsEntry 116 } prInSyn OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 201 } prOutSyn OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 202 } prInSynAck OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 203 } prOutSynAck OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 204 } prInSynSyn OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 205 } prOutSynSyn OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 206 } prInAck OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 207 } prOutAck OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 208 } prInPendAck OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 209 } prOutPendAck OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 210 } prInGet OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 211 } prOutGet OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 212 } prInEst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 213 } prOutEst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 214 } prInFin1Src OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 215 } prOutFin1Src OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 216 } prInFin2Src OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 217 } prOutFin2Src OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 218 } prInFin3Src OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 219 } prOutFin3Src OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 220 } prInFinFin OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 221 } prOutFinFin OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 222 } prInFin1Dst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 223 } prOutFin1Dst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 224 } prInFin2Dst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 225 } prOutFin2Dst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 226 } prInFin3Dst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 227 } prOutFin3Dst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 228 } prInCls OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 229 } prOutCls OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 230 } prInRst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 231 } prOutRst OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 232 } prInRstCls OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 233 } prOutRstCls OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 234 } prInUnknown OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 235 } prOutUnknown OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of TCP connections in given state" ::= { prStatsEntry 236 } prInGets OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of inbound TCP connections to this protected IP processing GETS" ::= { prStatsEntry 237 } prOutGets OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Count of outbound TCP connections from this protected IP processing GETS" ::= { prStatsEntry 238 } prOverloadedFlag OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "TRUE if protected IP overloaded" ::= { prStatsEntry 301 } prInTcpConnTally OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of current TCP connections to protected IP originated by a client" ::= { prStatsEntry 401 } prOutTcpConnTally OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of current TCP connections to protected IP originated by the protected IP itself" ::= { prStatsEntry 402 } prInSynBacklogTally OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Current protected IP SYN backlog" ::= { prStatsEntry 403 } prInTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input bytes seen" ::= { prStatsEntry 501 } prOutTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output bytes seen" ::= { prStatsEntry 502 } prInDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input bytes Dropped" ::= { prStatsEntry 503 } prOutDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output bytes Dropped" ::= { prStatsEntry 504 } prInCharmDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input bytes Dropped through lack of charm" ::= { prStatsEntry 505 } prOutCharmDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output bytes Dropped through lack of charm" ::= { prStatsEntry 506 } prInTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input packets per second" ::= { prStatsEntry 601 } prOutTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output packets per second" ::= { prStatsEntry 602 } prInDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input packets Dropped per second" ::= { prStatsEntry 603 } prOutDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output packets Dropped per second" ::= { prStatsEntry 604 } prInTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input bits per second" ::= { prStatsEntry 701 } prOutTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output bits per second" ::= { prStatsEntry 702 } prInDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input bits Dropped per second" ::= { prStatsEntry 703 } prOutDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output bits Dropped per second" ::= { prStatsEntry 704 } prInCharmDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input bits Dropped per second through lack of charm" ::= { prStatsEntry 705 } prOutCharmDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output bits Dropped per second through lack of charm" ::= { prStatsEntry 706 } prInProtectBwthPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through bandwidth protection" ::= { prStatsEntry 801 } prOutProtectBwthPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through bandwidth protection" ::= { prStatsEntry 802 } prInFloodPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through flood protection" ::= { prStatsEntry 803 } prOutFloodPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through flood protection" ::= { prStatsEntry 804 } prInBlockedProtocolPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through blocked Protocol protection" ::= { prStatsEntry 805 } prOutBlockedProtocolPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through blocked Protocol protection" ::= { prStatsEntry 806 } prInBlockedStatePktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through blocked state protection" ::= { prStatsEntry 807 } prOutBlockedStatePktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through blocked state protection" ::= { prStatsEntry 808 } prInIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through IP Attack" ::= { prStatsEntry 809 } prOutIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through IP Attack" ::= { prStatsEntry 810 } prInTcpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through TCP Attack" ::= { prStatsEntry 811 } prOutTcpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through TCP Attack" ::= { prStatsEntry 812 } prInUdpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through UDP Attack" ::= { prStatsEntry 813 } prOutUdpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through UDP Attack" ::= { prStatsEntry 814 } prInIcmpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through ICMP Attack" ::= { prStatsEntry 815 } prOutIcmpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through ICMP Attack" ::= { prStatsEntry 816 } prInOtherIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through Other IP Protocol Attack" ::= { prStatsEntry 817 } prOutOtherIpAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through Other IP Protocol Attack" ::= { prStatsEntry 818 } prInFragmentAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through fragment Attack protection" ::= { prStatsEntry 819 } prOutFragmentAttackPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through fragment Attack protection" ::= { prStatsEntry 820 } prInBadIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through bad IP packet protection" ::= { prStatsEntry 821 } prOutBadIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through bad IP packet protection" ::= { prStatsEntry 822 } prInBadTcpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through bad TCP packet protection" ::= { prStatsEntry 823 } prOutBadTcpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through bad TCP packet protection" ::= { prStatsEntry 824 } prInBadUdpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through bad UDP packet protection" ::= { prStatsEntry 825 } prOutBadUdpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through bad UDP packet protection" ::= { prStatsEntry 826 } prInBadIcmpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through bad ICMP packet protection" ::= { prStatsEntry 827 } prOutBadIcmpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through bad ICMP packet protection" ::= { prStatsEntry 828 } prInBadOtherIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of input packets Dropped through bad Other IP Protocol packet protection" ::= { prStatsEntry 829 } prOutBadOtherIpPktsCnt OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Number of output packets Dropped through bad Other IP Protocol packet protection" ::= { prStatsEntry 830 } prInTotalBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input bits per second" ::= { prStatsEntry 901 } prOutTotalBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of output bits per second" ::= { prStatsEntry 902 } prInTotalPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average packets/sec traffic rate inbound since last restart or reset" ::= { prStatsEntry 903 } prOutTotalPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average packets/sec traffic rate outbound since last restart or reset" ::= { prStatsEntry 904 } prInSmallPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { prStatsEntry 905 } prOutSmallPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { prStatsEntry 906 } prInMediumPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { prStatsEntry 907 } prOutMediumPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { prStatsEntry 908 } prInLargePpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { prStatsEntry 909 } prOutLargePpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { prStatsEntry 910 } prInDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input bits Dropped per second" ::= { prStatsEntry 911 } prOutDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of output bits Dropped per second" ::= { prStatsEntry 912 } prInDroppedPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Average number of input packets Dropped per second" ::= { prStatsEntry 913 } prOutDroppedPpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of output packets Dropped per second" ::= { prStatsEntry 914 } prInCharmDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound bits per second dropped by heuristic detection" ::= { prStatsEntry 915 } prOutCharmDroppedBpsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound bits per second dropped by heuristic detection" ::= { prStatsEntry 916 } prInFilteredBwthPercentAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound dropped bandwidth divided by the actual bandwidth" ::= { prStatsEntry 917 } prOutFilteredBwthPercentAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound dropped bandwidth divided by the actual bandwidth" ::= { prStatsEntry 918 } prInSynbacklogtallyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of partially open TCP connections inbound" ::= { prStatsEntry 919 } prOutSynbacklogtallyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of partially open TCP connections outbound" ::= { prStatsEntry 920 } prInConnectionAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound TCP connections" ::= { prStatsEntry 921 } prOutConnectionAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound TCP connections" ::= { prStatsEntry 922 } prInConnreqAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound TCP connection requests" ::= { prStatsEntry 923 } prOutConnreqAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound TCP connection requests" ::= { prStatsEntry 924 } prInActiveHttpGetsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound HTTP page requests being processed" ::= { prStatsEntry 925 } prOutActiveHttpGetsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound HTTP page requests being processed" ::= { prStatsEntry 926 } prInProtectBwthPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound protected bandwifth" ::= { prStatsEntry 927 } prOutProtectBwthPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound protected bandwifth" ::= { prStatsEntry 928 } prInFloodPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound packets causing flooding" ::= { prStatsEntry 929 } prOutFloodPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound packets causing flooding" ::= { prStatsEntry 930 } prInBlockedProtocolPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets dropped by filter " ::= { prStatsEntry 931 } prOutBlockedProtocolPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets dropped by filter" ::= { prStatsEntry 932 } prInBlockedStatePktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets dropped due to incorrect state" ::= { prStatsEntry 933 } prOutBlockedStatePktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets dropped due to incorrect state" ::= { prStatsEntry 934 } prInIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an IP Attack" ::= { prStatsEntry 935 } prOutIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an IP Attack" ::= { prStatsEntry 936 } prInTcpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a TCP Attack" ::= { prStatsEntry 937 } prOutTcpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a TCP Attack" ::= { prStatsEntry 938 } prInUdpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a UDP Attack" ::= { prStatsEntry 939 } prOutUdpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a UDP Attack" ::= { prStatsEntry 940 } prInIcmpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in a ICMP Attack" ::= { prStatsEntry 941 } prOutIcmpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in a ICMP Attack" ::= { prStatsEntry 942 } prInOtherIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an IP Attack using other protocols" ::= { prStatsEntry 943 } prOutOtherIpAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an IP Attack using other protocols" ::= { prStatsEntry 944 } prInFragmentAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets in an Fragmentation Attack" ::= { prStatsEntry 945 } prOutFragmentAttackPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets in an Fragmentation Attack" ::= { prStatsEntry 946 } prInBadipPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets with malformed IP Headers" ::= { prStatsEntry 947 } prOutBadipPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets with malformed IP Headers" ::= { prStatsEntry 948 } prInBadTcpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets with bad TCP protocol/state" ::= { prStatsEntry 949 } prOutBadTcpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets with bad TCP protocol/state" ::= { prStatsEntry 950 } prInBadUdpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound UDP packets with malformed header or missing data" ::= { prStatsEntry 951 } prOutBadUdpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound UDP packets with malformed header or missing data" ::= { prStatsEntry 952 } prInBadIcmpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound ICMP packets with malformed header" ::= { prStatsEntry 953 } prOutBadIcmpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound ICMP packets with malformed header" ::= { prStatsEntry 954 } prInBadOtherIpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound IP packets of other protocol with malformed header" ::= { prStatsEntry 955 } prOutBadOtherIpPktsAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound IP packets of other protocol with malformed header" ::= { prStatsEntry 956 } prInOverloadedAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of inbound packets overloading the protected IP" ::= { prStatsEntry 957 } prOutOverloadedAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged number of outbound packets overloading the protected IP" ::= { prStatsEntry 958 } prInLatencyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged inbound Latency" ::= { prStatsEntry 959 } prOutLatencyAvg OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Averaged outbound Latency" ::= { prStatsEntry 960 } prInSmallPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { prStatsEntry 1001 } prOutSmallPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (256 bytes or less) per second processed. Dropped data is not included" ::= { prStatsEntry 1002 } prInMediumPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { prStatsEntry 1003 } prOutMediumPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included" ::= { prStatsEntry 1004 } prInLargePpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { prStatsEntry 1005 } prOutLargePpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound packets (greater than 1024 bytes) per second. Dropped data is not included" ::= { prStatsEntry 1006 } prInFilteredBwthPercentMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound dropped bandwidth divided by the actual bandwidth" ::= { prStatsEntry 1007 } prOutFilteredBwthPercentMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound dropped bandwidth divided by the actual bandwidth" ::= { prStatsEntry 1008 } prInSynbacklogtallyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of partially open TCP connections inbound" ::= { prStatsEntry 1009 } prOutSynbacklogtallyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of partially open TCP connections outbound" ::= { prStatsEntry 1010 } prInConnectionMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound TCP connections" ::= { prStatsEntry 1011 } prOutConnectionMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound TCP connections" ::= { prStatsEntry 1012 } prInConnreqMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound TCP connection requests" ::= { prStatsEntry 1013 } prOutConnreqMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound TCP connection requests" ::= { prStatsEntry 1014 } prInActiveHttpGetsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound HTTP page requests being processed" ::= { prStatsEntry 1015 } prOutActiveHttpGetsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound HTTP page requests being processed" ::= { prStatsEntry 1016 } prInProtectBwthPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound protected bandwifth" ::= { prStatsEntry 1017 } prOutProtectBwthPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound protected bandwifth" ::= { prStatsEntry 1018 } prInFloodPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound packets causing flooding" ::= { prStatsEntry 1019 } prOutFloodPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound packets causing flooding" ::= { prStatsEntry 1020 } prInBlockedProtocolPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets dropped by filter " ::= { prStatsEntry 1021 } prOutBlockedProtocolPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets dropped by filter" ::= { prStatsEntry 1022 } prInBlockedStatePktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets dropped due to incorrect state" ::= { prStatsEntry 1023 } prOutBlockedStatePktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets dropped due to incorrect state" ::= { prStatsEntry 1024 } prInIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an IP Attack" ::= { prStatsEntry 1025 } prOutIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an IP Attack" ::= { prStatsEntry 1026 } prInTcpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a TCP Attack" ::= { prStatsEntry 1027 } prOutTcpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a TCP Attack" ::= { prStatsEntry 1028 } prInUdpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a UDP Attack" ::= { prStatsEntry 1029 } prOutUdpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a UDP Attack" ::= { prStatsEntry 1030 } prInIcmpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in a ICMP Attack" ::= { prStatsEntry 1031 } prOutIcmpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in a ICMP Attack" ::= { prStatsEntry 1032 } prInOtherIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an IP Attack using other protocols" ::= { prStatsEntry 1033 } prOutOtherIpAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an IP Attack using other protocols" ::= { prStatsEntry 1034 } prInFragmentAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets in an Fragmentation Attack" ::= { prStatsEntry 1035 } prOutFragmentAttackPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets in an Fragmentation Attack" ::= { prStatsEntry 1036 } prInBadipPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets with malformed IP Headers" ::= { prStatsEntry 1037 } prOutBadipPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets with malformed IP Headers" ::= { prStatsEntry 1038 } prInBadTcpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets with bad TCP protocol/state" ::= { prStatsEntry 1039 } prOutBadTcpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets with bad TCP protocol/state" ::= { prStatsEntry 1040 } prInBadUdpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound UDP packets with malformed header or missing data" ::= { prStatsEntry 1041 } prOutBadUdpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound UDP packets with malformed header or missing data" ::= { prStatsEntry 1042 } prInBadIcmpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound ICMP packets with malformed header" ::= { prStatsEntry 1043 } prOutBadIcmpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound ICMP packets with malformed header" ::= { prStatsEntry 1044 } prInBadOtherIpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound IP packets of other protocol with malformed header" ::= { prStatsEntry 1045 } prOutBadOtherIpPktsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound IP packets of other protocol with malformed header" ::= { prStatsEntry 1046 } prInOverloadedMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of inbound packets overloading the protected IP" ::= { prStatsEntry 1047 } prOutOverloadedMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak number of outbound packets overloading the protected IP" ::= { prStatsEntry 1048 } prInLatencyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak inbound Latency" ::= { prStatsEntry 1049 } prOutLatencyMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak outbound Latency" ::= { prStatsEntry 1050 } -- end of protected IP status section -- ### protected IP Incident section prIncidentTable OBJECT-TYPE SYNTAX SEQUENCE OF PrIncidentEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of portal incident entries" ::= { jddsProtected 5 } prIncidentEntry OBJECT-TYPE SYNTAX PrIncidentEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row consisting of an incident record" INDEX { prIncidentYear, prIncidentMonth, prIncidentDay, prIncidentNumber, prIncidentInetAddressType, prIncidentInetAddress} ::= {prIncidentTable 1 } PrIncidentEntry ::= SEQUENCE { prIncidentYear LocalIndex, prIncidentMonth LocalIndex, prIncidentDay LocalIndex, prIncidentNumber LocalIndex, prIncidentInetAddressType InetAddressType, prIncidentInetAddress InetAddress, prIncidentStart DateAndTime, prIncidentAddress DisplayString, prIncidentType DisplayString, prIncidentDirection Direction, prIncidentPeakRate Gauge32, prIncidentDropped Gauge32 } prIncidentYear OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record year" ::= { prIncidentEntry 1 } prIncidentMonth OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record month" ::= { prIncidentEntry 2 } prIncidentDay OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Incident record day of month" ::= { prIncidentEntry 3 } prIncidentNumber OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique (for the day) incident record number" ::= { prIncidentEntry 4 } prIncidentInetAddressType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS not-accessible STATUS current DESCRIPTION "Type of IP address a specific protected IP" ::= { prIncidentEntry 5 } prIncidentInetAddress OBJECT-TYPE SYNTAX InetAddress (SIZE (0..47)) MAX-ACCESS not-accessible STATUS current DESCRIPTION "IP address of a specific protected IP" ::= { prIncidentEntry 6 } prIncidentStart OBJECT-TYPE SYNTAX DateAndTime MAX-ACCESS read-only STATUS current DESCRIPTION "Incident start time" ::= { prIncidentEntry 7 } prIncidentAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Incident protected IP IP or MAC address" ::= { prIncidentEntry 8 } prIncidentType OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "Incident defense type (and subtype)" ::= { prIncidentEntry 9 } prIncidentDirection OBJECT-TYPE SYNTAX Direction MAX-ACCESS read-only STATUS current DESCRIPTION "Incident direction" ::= { prIncidentEntry 10 } prIncidentPeakRate OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Peak packets/s during this incident" ::= { prIncidentEntry 11 } prIncidentDropped OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "No of packets Dropped as part of this incident" ::= { prIncidentEntry 12 } -- ### end of protected IP incident section ### -- ### Gateway statistics ### gwInternetStatsTable OBJECT-TYPE SYNTAX SEQUENCE OF GwInternetStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of internet-side gateway statistics" ::= { jddsGatewayInternet 3 } gwInternetStatsEntry OBJECT-TYPE SYNTAX GwInternetStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row associated with a specific gateway" INDEX { gwInternetStatsIndex } ::= { gwInternetStatsTable 1 } GwInternetStatsEntry ::= SEQUENCE { gwInternetStatsIndex LocalIndex, gwInternetMacAddress DisplayString, gwInternetIpAddress DisplayString, gwInternetInTotalBytesCnt Counter64, gwInternetOutTotalBytesCnt Counter64, gwInternetInDroppedBytesCnt Counter64, gwInternetOutDroppedBytesCnt Counter64, gwInternetInTotalPpsMax Gauge32, gwInternetOutTotalPpsMax Gauge32, gwInternetInDroppedPpsMax Gauge32, gwInternetOutDroppedPpsMax Gauge32, gwInternetInTotalBpsMax Gauge32, gwInternetOutTotalBpsMax Gauge32, gwInternetInDroppedBpsMax Gauge32, gwInternetOutDroppedBpsMax Gauge32 } gwInternetStatsIndex OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique gw internet index" ::= { gwInternetStatsEntry 1 } gwInternetMacAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "MAC address of a specific protected internet-side gateway" ::= { gwInternetStatsEntry 2 } gwInternetIpAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "IP address of a specific protected internet-side gateway" ::= { gwInternetStatsEntry 3 } gwInternetInTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input bytes seen" ::= { gwInternetStatsEntry 101 } gwInternetOutTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output bytes seen" ::= { gwInternetStatsEntry 102 } gwInternetInDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input bytes Dropped" ::= { gwInternetStatsEntry 103 } gwInternetOutDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output bytes Dropped" ::= { gwInternetStatsEntry 104 } gwInternetInTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input packets per second" ::= { gwInternetStatsEntry 201 } gwInternetOutTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output packets per second" ::= { gwInternetStatsEntry 202 } gwInternetInDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input packets Dropped per second" ::= { gwInternetStatsEntry 203 } gwInternetOutDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output packets Dropped per second" ::= { gwInternetStatsEntry 204 } gwInternetInTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input bits per second" ::= { gwInternetStatsEntry 301 } gwInternetOutTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output bits per second" ::= { gwInternetStatsEntry 302 } gwInternetInDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input bits Dropped per second" ::= { gwInternetStatsEntry 303 } gwInternetOutDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output bits Dropped per second" ::= { gwInternetStatsEntry 304 } gwProtectedStatsTable OBJECT-TYPE SYNTAX SEQUENCE OF GwProtectedStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "Table of protected-side gateway statistics" ::= { jddsGatewayProtected 3 } gwProtectedStatsEntry OBJECT-TYPE SYNTAX GwProtectedStatsEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A row associated with a specific protected IP side gateway" INDEX { gwProtectedIndex } ::= { gwProtectedStatsTable 1 } GwProtectedStatsEntry ::= SEQUENCE { gwProtectedIndex LocalIndex, gwProtectedMacAddress DisplayString, gwProtectedIpAddress DisplayString, gwProtectedInTotalBytesCnt Counter64, gwProtectedOutTotalBytesCnt Counter64, gwProtectedInDroppedBytesCnt Counter64, gwProtectedOutDroppedBytesCnt Counter64, gwProtectedInTotalPpsMax Gauge32, gwProtectedOutTotalPpsMax Gauge32, gwProtectedInDroppedPpsMax Gauge32, gwProtectedOutDroppedPpsMax Gauge32, gwProtectedInTotalBpsMax Gauge32, gwProtectedOutTotalBpsMax Gauge32, gwProtectedInDroppedBpsMax Gauge32, gwProtectedOutDroppedBpsMax Gauge32 } gwProtectedIndex OBJECT-TYPE SYNTAX LocalIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "Unique protected gateway index" ::= { gwProtectedStatsEntry 1 } gwProtectedMacAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "MAC address of a specific protected-side gateway" ::= { gwProtectedStatsEntry 2 } gwProtectedIpAddress OBJECT-TYPE SYNTAX DisplayString MAX-ACCESS read-only STATUS current DESCRIPTION "IP address of a specific protected-side gateway" ::= { gwProtectedStatsEntry 3 } gwProtectedInTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input bytes seen" ::= { gwProtectedStatsEntry 101 } gwProtectedOutTotalBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output bytes seen" ::= { gwProtectedStatsEntry 102 } gwProtectedInDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of input bytes Dropped" ::= { gwProtectedStatsEntry 103 } gwProtectedOutDroppedBytesCnt OBJECT-TYPE SYNTAX Counter64 MAX-ACCESS read-only STATUS current DESCRIPTION "Total number of output bytes Dropped" ::= { gwProtectedStatsEntry 104 } gwProtectedInTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input packets per second" ::= { gwProtectedStatsEntry 201 } gwProtectedOutTotalPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output packets per second" ::= { gwProtectedStatsEntry 202 } gwProtectedInDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input packets Dropped per second" ::= { gwProtectedStatsEntry 203 } gwProtectedOutDroppedPpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output packets Dropped per second" ::= { gwProtectedStatsEntry 204 } gwProtectedInTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input bits per second" ::= { gwProtectedStatsEntry 301 } gwProtectedOutTotalBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output bits per second" ::= { gwProtectedStatsEntry 302 } gwProtectedInDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of input bits Dropped per second" ::= { gwProtectedStatsEntry 303 } gwProtectedOutDroppedBpsMax OBJECT-TYPE SYNTAX Gauge32 MAX-ACCESS read-only STATUS current DESCRIPTION "Maximum number of output bits Dropped per second" ::= { gwProtectedStatsEntry 304 } -- End of Gateway statistics ddossecureEvents OBJECT-IDENTITY STATUS current DESCRIPTION "Definition point for DDoS Secure notifications" ::= {ddossecure4MIB 0} prBandwidthLimitOn NOTIFICATION-TYPE OBJECTS { prHostName, prBandwidth } STATUS current DESCRIPTION "Rate limiting traffic by bandwidth. Tracked by protected IP / portal." ::= {ddossecureEvents 2011} prBandwidthLimitOff NOTIFICATION-TYPE OBJECTS { prHostName, prBandwidth } STATUS current DESCRIPTION "No longer rate limiting traffic by bandwidth." ::= {ddossecureEvents 2012} prPacketLimitOn NOTIFICATION-TYPE OBJECTS { prHostName, prFlood } STATUS current DESCRIPTION "Rate limiting traffic by packet rate." ::= {ddossecureEvents 2021} prPacketLimitOff NOTIFICATION-TYPE OBJECTS { prHostName, prFlood } STATUS current DESCRIPTION "No longer rate limiting traffic by packet rate." ::= {ddossecureEvents 2022} prBlockedProtocolBlackListIpOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping traffic not expressly permitted. Tracked by protected IP." ::= {ddossecureEvents 2031} prBlockedProtocolBlackListIpOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping traffic not expressly permitted." ::= {ddossecureEvents 2032} prBlockedProtocolIcmpTypeOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping traffic not expressly permitted. Tracked by protected IP." ::= {ddossecureEvents 2041} prBlockedProtocolIcmpTypeOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping traffic not expressly permitted." ::= {ddossecureEvents 2042} prBlockedProtocolPortOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping traffic not expressly permitted. Tracked by protected IP." ::= {ddossecureEvents 2051} prBlockedProtocolPortOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping traffic not expressly permitted." ::= {ddossecureEvents 2052} prBlockedProtocolOtherOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping traffic not expressly permitted. Tracked by protected IP." ::= {ddossecureEvents 2061} prBlockedProtocolOtherOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping traffic not expressly permitted." ::= {ddossecureEvents 2062} prUnknownSessionIcmpRespOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "Dropping TCP traffic that is out of state. Tracked by protected IP." ::= {ddossecureEvents 2081} prUnknownSessionIcmpRespOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "No longer Dropping TCP traffic that is out of state." ::= {ddossecureEvents 2082} prUnknownSessionIcmpDiagRespOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "Dropping TCP traffic that is out of state. Tracked by protected IP." ::= {ddossecureEvents 2091} prUnknownSessionIcmpDiagRespOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "No longer Dropping TCP traffic that is out of state." ::= {ddossecureEvents 2092} prUnknownSessionNoStateOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "Dropping TCP traffic that is out of state. Tracked by protected IP." ::= {ddossecureEvents 2101} prUnknownSessionNoStateOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "No longer Dropping TCP traffic that is out of state." ::= {ddossecureEvents 2102} prUnknownSessionInvalidStateOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "Dropping TCP traffic that is out of state. Tracked by protected IP." ::= {ddossecureEvents 2111} prUnknownSessionInvalidStateOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "No longer Dropping TCP traffic that is out of state." ::= {ddossecureEvents 2112} prTcpAttackRstOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2121} prTcpAttackRstOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets causing stress." ::= {ddossecureEvents 2122} prIpAttackLandOn NOTIFICATION-TYPE OBJECTS { prHostName, prIpAttack } STATUS current DESCRIPTION "Dropping IP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2131} prIpAttackLandOff NOTIFICATION-TYPE OBJECTS { prHostName, prIpAttack } STATUS current DESCRIPTION "No longer Dropping IP packets causing stress." ::= {ddossecureEvents 2132} prTcpAttackSynAckToOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2141} prTcpAttackSynAckToOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets causing stress." ::= {ddossecureEvents 2142} prBlockedProtocolCountryOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "This IP address is part of a blocked country or network" ::= {ddossecureEvents 2151} prBlockedProtocolCountryOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "This IP address is no longer part of a blocked country or network." ::= {ddossecureEvents 2152} prTcpAttackSynFloodOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Receiving SYN packets at a rate higher than it can handle. Tracked by protected IP." ::= {ddossecureEvents 2161} prTcpAttackSynFloodOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer receiving a SYN flood." ::= {ddossecureEvents 2162} prTcpAttackConnFloodOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Reached concurrent connection configured limit. Tracked by protected IP." ::= {ddossecureEvents 2171} prTcpAttackConnFloodOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer above the concurrent connection configured limit" ::= {ddossecureEvents 2172} prTcpAttackTableFullOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Internal state table for TCP connections is full. Tracked by protected IP." ::= {ddossecureEvents 2181} prTcpAttackTableFullOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Internal state table for TCP connections is no longer full." ::= {ddossecureEvents 2182} prBadTcpFastAckOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "Identical ACKs repeated at a rate greater than 10 per second. Tracked by protected IP." ::= {ddossecureEvents 2191} prBadTcpFastAckOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "No longer seeing identical ACKs repeated at a rate greater than 10 per second. Tracked by protected IP." ::= {ddossecureEvents 2192} prTcpAttackHttpFloodOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "The protected IP has reached its concurrent GET/HEAD configured limit. Tracked by protected IP." ::= {ddossecureEvents 2201} prTcpAttackHttpFloodOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropped below the concurrent GET/HEAD configured limit." ::= {ddossecureEvents 2202} prUdpAttackTableFullOn NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "Internal state table for UDP connections is full. Tracked by protected IP." ::= {ddossecureEvents 2211} prUdpAttackTableFullOff NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "Internal state table for UDP connections is no longer full." ::= {ddossecureEvents 2212} prTcpAttackHttpTimeoutOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No response to a GET or HEAD request in a timely manner. Tracked by protected IP." ::= {ddossecureEvents 2231} prTcpAttackHttpTimeoutOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "protected IP is now responding to a GET or HEAD request in a timely manner." ::= {ddossecureEvents 2232} prIcmpAttackRepeatsOn NOTIFICATION-TYPE OBJECTS { prHostName, prIcmpAttack } STATUS current DESCRIPTION "Dropping ICMP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2241} prIcmpAttackRepeatsOff NOTIFICATION-TYPE OBJECTS { prHostName, prIcmpAttack } STATUS current DESCRIPTION "No longer Dropping ICMP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2242} prIcmpAttackTableFullOn NOTIFICATION-TYPE OBJECTS { prHostName, prIcmpAttack } STATUS current DESCRIPTION "Dropping ICMP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2251} prIcmpAttackTableFullOff NOTIFICATION-TYPE OBJECTS { prHostName, prIcmpAttack } STATUS current DESCRIPTION "No longer Dropping ICMP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2252} prOtherIpAttackTableFullOn NOTIFICATION-TYPE OBJECTS { prHostName, prOtherIpAttack } STATUS current DESCRIPTION "Dropping Other IP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2271} prOtherIpAttackTableFullOff NOTIFICATION-TYPE OBJECTS { prHostName, prOtherIpAttack } STATUS current DESCRIPTION "No longer Dropping Other IP packets causing stress." ::= {ddossecureEvents 2272} prFragAttackPingOfDeathOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Assembled packet are longer than 65535 bytes. Tracked by protected IP." ::= {ddossecureEvents 2291} prFragAttackPingOfDeathOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress, Assembled packet are less than 65535 bytes. Tracked by protected IP." ::= {ddossecureEvents 2292} prFragAttackHeadOverlayOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Tracked by protected IP." ::= {ddossecureEvents 2301} prFragAttackHeadOverlayOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress. Tracked by protected IP." ::= {ddossecureEvents 2302} prFragAttackTableFullOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Internal state table for fragments is full. Tracked by protected IP." ::= {ddossecureEvents 2311} prFragAttackTableFullOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress, Internal state table for fragments is no longer full. Tracked by protected IP." ::= {ddossecureEvents 2312} prFragAttackSmallSizeOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Initial TCP fragment is smaller than header. Tracked by protected IP." ::= {ddossecureEvents 2321} prFragAttackSmallSizeOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress, Header is within Initial TCP fragment size. Tracked by protected IP." ::= {ddossecureEvents 2322} prFragAttackNoFragsAllowedOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Fragmentation has been disabled in the Filter. Tracked by protected IP." ::= {ddossecureEvents 2331} prFragAttackNoFragsAllowedOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress, Fragmentation has been reenabled in the Filter. Tracked by protected IP." ::= {ddossecureEvents 2332} prBadIpSrcAddrOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "Dropping IP packets that do not match RFCs. Invalid Source Address. Tracked by protected IP." ::= {ddossecureEvents 2341} prBadIpSrcAddrOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "No longer Dropping IP packets that do not match RFCs. Source Address now valid" ::= {ddossecureEvents 2342} prBadIpHeaderOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "Dropping IP packets that do not match RFCs. Header malformed. Tracked by protected IP." ::= {ddossecureEvents 2351} prBadIpHeaderOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "No longer Dropping IP packets that do not match RFCs. Header no longer malformed." ::= {ddossecureEvents 2352} prBadIpOptionOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "Dropping IP packets that do not match RFCs. Invalid option field or field length. Tracked by protected IP." ::= {ddossecureEvents 2361} prBadIpOptionOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "No longer Dropping IP packets that do not match RFCs. Option field or field length now valid." ::= {ddossecureEvents 2362} prBadIpSizeOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "Dropping IP packets that do not match RFCs. Invalid length field. Tracked by protected IP." ::= {ddossecureEvents 2371} prBadIpSizeOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "No longer Dropping IP packets that do not match RFCs. Length field now valid." ::= {ddossecureEvents 2372} prBlockedProtocolTmpBlackListOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping IP packets that have been temporarily black-listed. Tracked by protected IP." ::= {ddossecureEvents 2381} prBlockedProtocolTmpBlackListOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping IP packets that have been temporarily black-listed." ::= {ddossecureEvents 2382} prBadTcpFlagsOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "Dropping TCP packets that do not match RFCs. Invalid TCP flag combinations. Tracked by protected IP." ::= {ddossecureEvents 2391} prBadTcpFlagsOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "No longer Dropping TCP packets that do not match RFCs. TCP flag combinations now valid." ::= {ddossecureEvents 2392} prBadTcpMalformedOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "Dropping TCP packets that do not match RFCs. Format of TCP Header invalid. Tracked by protected IP." ::= {ddossecureEvents 2401} prBadTcpMalformedOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "No longer Dropping TCP packets that do not match RFCs. Format of TCP Header now valid." ::= {ddossecureEvents 2402} prBadTcpOptionOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "Dropping TCP packets that do not match RFCs. Invalid TCP option field. Tracked by protected IP." ::= {ddossecureEvents 2411} prBadTcpOptionOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "No longer Dropping TCP packets that do not match RFCs. TCP option field now valid." ::= {ddossecureEvents 2412} prBlockedProtocolDnsOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping DNS requests that have been black-listed. Tracked by protected IP." ::= {ddossecureEvents 2421} prBlockedProtocolDnsOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping DNS requests that have been black-listed." ::= {ddossecureEvents 2422} prBadUdpNoDataOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadUdp } STATUS current DESCRIPTION "Dropping UDP packets that do not match RFCs. UDP packet contains no data. Tracked by protected IP." ::= {ddossecureEvents 2431} prBadUdpNoDataOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadUdp } STATUS current DESCRIPTION "No longer Dropping UDP packets that do not match RFCs. UDP packet now contain data." ::= {ddossecureEvents 2432} prBadUdpMalformedOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadUdp } STATUS current DESCRIPTION "Dropping UDP packets that do not match RFCs. UDP header malformed. Tracked by protected IP." ::= {ddossecureEvents 2441} prBadUdpMalformedOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadUdp } STATUS current DESCRIPTION "No longer Dropping UDP packets that do not match RFCs. UDP header no longer malformed." ::= {ddossecureEvents 2442} prBlockedProtocolAsOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping AS requests that have been black-listed. Tracked by protected IP." ::= {ddossecureEvents 2451} prBlockedProtocolAsOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping AS requests that have been black-listed." ::= {ddossecureEvents 2452} ptTcpAttackHttpRateFloodOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets causing stress. HTTP requests rate exceeds configured threshold. Tracked by protected IP." ::= {ddossecureEvents 2461} ptTcpAttackHttpRateFloodOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets causing stress. HTTP requests rate now below configured threshold." ::= {ddossecureEvents 2462} prBadIcmpMalformedOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIcmp } STATUS current DESCRIPTION "Dropping ICMP packets that do not match RFCs. ICMP header malformed (length, options etc). Tracked by protected IP." ::= {ddossecureEvents 2471} prBadIcmpMalformedOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIcmp } STATUS current DESCRIPTION "No longer Dropping ICMP packets that do not match RFCs. ICMP header no longer malformed." ::= {ddossecureEvents 2472} prBlockedProtocolUrlOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping URL requests that have been black-listed. Tracked by protected IP." ::= {ddossecureEvents 2481} prBlockedProtocolUrlOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping URL requests that have been black-listed." ::= {ddossecureEvents 2482} prBadOtherIpProtocolOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "Dropping Other IP packets that do not match RFCs. Invalid IP protocol number. Tracked by protected IP." ::= {ddossecureEvents 2501} prBadOtherIpProtocolOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "No longer Dropping Other IP packets that do not match RFCs. IP protocol number now valid." ::= {ddossecureEvents 2502} prBadOtherIpLengthOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "Dropping Other IP packets that do not match RFCs. IP packet too short to contain IP Protocol header. Tracked by protected IP." ::= {ddossecureEvents 2511} prBadOtherIpLengthOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "No longer Dropping Other IP packets that do not match RFCs. IP packet no longer too short to contain IP Protocol header." ::= {ddossecureEvents 2512} prTcpAttackHttpIncompleteOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "Reporting incomplete HTTP requests. Tracked by protected IP." ::= {ddossecureEvents 2521} prTcpAttackHttpIncompleteOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "No longer Reporting incomplete HTTP requests." ::= {ddossecureEvents 2522} prOverloadedStallOn NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "Detected overloaded protected IP. The protected IP has stopped responding to anything. Tracked by protected IP." ::= {ddossecureEvents 2531} prOverloadedStallOff NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "No longer detected overloaded protected IP. The protected IP is now responding." ::= {ddossecureEvents 2532} prFragAttackTimeOutOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Fragments taking too long. Tracked by protected IP." ::= {ddossecureEvents 2541} prFragAttackTimeOutOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress, Fragments no longer timing out. Tracked by protected IP." ::= {ddossecureEvents 2542} prFragAttackRepeatsOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Fragment Repeats. Tracked by protected IP." ::= {ddossecureEvents 2551} prFragAttackRepeatsOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress, Fragment no longer Repeats. Tracked by protected IP." ::= {ddossecureEvents 2552} prFragAttackBadLengthOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Invalid fragment length in IP header. Tracked by protected IP." ::= {ddossecureEvents 2561} prFragAttackBadLengthOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress, Fragment length in IP header now valid. Tracked by protected IP." ::= {ddossecureEvents 2562} prOverloadedBacklogOn NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "The protected IP cannot keep up with new TCP connections and is not responding to some SYN requests. Tracked by protected IP." ::= {ddossecureEvents 2681} prOverloadedBacklogOff NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "No longer detected overloaded protected IP." ::= {ddossecureEvents 2682} prBlockedProtocolAddressOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Blocking protocol as Destination of inbound IP packet, or source of outbound IP packet is not a protected IP address. Tracked by protected IP." ::= {ddossecureEvents 2691} prBlockedProtocolAddressOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "no longer blocking packets not containing protected IP address." ::= {ddossecureEvents 2692} prTcpAttackNoDataOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2701} prTcpAttackNoDataOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets causing stress. " ::= {ddossecureEvents 2702} prTcpAttackNoServerDataOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 2711} prTcpAttackNoServerDataOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets causing stress. " ::= {ddossecureEvents 2712} prTcpAttackConnRateFloodOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets as the protected IP is receiving connection requests at a rate higher than it is configured for. Tracked by protected IP." ::= {ddossecureEvents 2721} prTcpAttackConnRateFloodOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets as the protected IP is receiving connection requests at or below the configured rate." ::= {ddossecureEvents 2722} prOverloadedThreadsOn NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "Detected overloaded protected IP. The protected IP is not acknowledging data requests. Tracked by protected IP." ::= {ddossecureEvents 2731} prOverloadedThreadsOff NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "No longer detected overloaded protected IP. The protected IP is now acknowledging data requests." ::= {ddossecureEvents 2732} prBadIpReflectedRouteOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "Dropping IP packets that do not match RFCs. Same packet seen both sides of DDoS Secure. Tracked by protected IP." ::= {ddossecureEvents 2741} prBadIpReflectedRouteOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "No longer Dropping IP packets that do not match RFCs. No longer seeing same packet on both sides of DDoS Secure." ::= {ddossecureEvents 2742} prTcpAttackPortScanOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets as the protected IP is receiving connection requests at a rate higher than it is configured for. Tracked by protected IP." ::= {ddossecureEvents 2771} prTcpAttackPortScanOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets as the protected IP is receiving connection requests at or below the configured rate." ::= {ddossecureEvents 2772} prTcpAttackSmallWindowOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets as the protected IP is receiving connection requests at a rate higher than it is configured for. Tracked by protected IP." ::= {ddossecureEvents 2781} prTcpAttackSmallWindowOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets as the protected IP is receiving connection requests at or below the configured rate." ::= {ddossecureEvents 2782} prTcpAttackClientAbortOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets as client aborted connection after request. Tracked by protected IP." ::= {ddossecureEvents 2791} prTcpAttackClientAbortOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer dropping TCP packets as client aborted connection after request." ::= {ddossecureEvents 2792} prBlockedProtocolSipOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping SIP requests that have been black-listed. Tracked by protected IP." ::= {ddossecureEvents 2811} prBlockedProtocolSipOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping SIP requests that have been black-listed." ::= {ddossecureEvents 2812} prTcpAttackUrlRateLimitOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Rate Limiting URL requests. Tracked by protected IP." ::= {ddossecureEvents 2821} prTcpAttackUrlRateLimitOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Rate Limiting URL requests." ::= {ddossecureEvents 2822} prUdpAttackDnsRateLimitOn NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "Rate Limiting DNS requests. Tracked by protected IP." ::= {ddossecureEvents 2831} prUdpAttackDnsRateLimitOff NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "No longer Rate Limiting DNS requests." ::= {ddossecureEvents 2832} prUdpAttackSipRateLimitOn NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "Rate Limiting SIP requests. Tracked by protected IP." ::= {ddossecureEvents 2841} prUdpAttackSipRateLimitOff NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "No longer Rate Limiting SIP requests." ::= {ddossecureEvents 2842} prBadTcpChecksumOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "Dropping TCP packets that do not match RFCs. Invalid Checksum. Tracked by protected IP." ::= {ddossecureEvents 2851} prBadTcpChecksumOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "No longer Dropping TCP packets that do not match RFCs. Checksum now valid." ::= {ddossecureEvents 2852} prTcpAttackHttpFormatOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping HTTP packets that do not match RFCs. Invalid Format. Tracked by protected IP." ::= {ddossecureEvents 2861} prTcpAttackHttpFormatOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "No longer Dropping HTTP packets that do not match RFCs. Format now valid." ::= {ddossecureEvents 2862} prUnknownSessionReflectiveOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "Dropping unknown traffic that is out of state. Tracked by protected IP." ::= {ddossecureEvents 2871} prUnknownSessionReflectiveOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "No longer Dropping unknown traffic that is out of state." ::= {ddossecureEvents 2872} prBandwidthOn NOTIFICATION-TYPE OBJECTS { prHostName, prBandwidth } STATUS current DESCRIPTION "Rate limiting traffic by bandwidth. Tracked by protected IP / portal." ::= {ddossecureEvents 1011} prBandwidthOff NOTIFICATION-TYPE OBJECTS { prHostName, prBandwidth } STATUS current DESCRIPTION "No longer rate limiting traffic by bandwidth." ::= {ddossecureEvents 1012} prFloodOn NOTIFICATION-TYPE OBJECTS { prHostName, prFlood } STATUS current DESCRIPTION "Rate limiting traffic by packet rate." ::= {ddossecureEvents 1021} prFloodOff NOTIFICATION-TYPE OBJECTS { prHostName, prFlood } STATUS current DESCRIPTION "No longer rate limiting traffic by packet rate." ::= {ddossecureEvents 1022} prBlockedProtocolOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "Dropping traffic not expressly permitted. Tracked by protected IP." ::= {ddossecureEvents 1031} prBlockedProtocolOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedProtocol } STATUS current DESCRIPTION "No longer Dropping traffic not expressly permitted." ::= {ddossecureEvents 1032} prBlockedStateOn NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "Dropping TCP traffic that is out of state. Tracked by protected IP." ::= {ddossecureEvents 1041} prBlockedStateOff NOTIFICATION-TYPE OBJECTS { prHostName, prBlockedState } STATUS current DESCRIPTION "No longer Dropping TCP traffic that is out of state." ::= {ddossecureEvents 1042} prIpAttackOn NOTIFICATION-TYPE OBJECTS { prHostName, prIpAttack } STATUS current DESCRIPTION "Dropping IP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 1051} prIpAttackOff NOTIFICATION-TYPE OBJECTS { prHostName, prIpAttack } STATUS current DESCRIPTION "No longer Dropping IP packets causing stress." ::= {ddossecureEvents 1052} prTcpAttackOn NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "Dropping TCP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 1061} prTcpAttackOff NOTIFICATION-TYPE OBJECTS { prHostName, prTcpAttack } STATUS current DESCRIPTION "No longer Dropping TCP packets causing stress." ::= {ddossecureEvents 1062} prUdpAttackOn NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "Dropping UDP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 1071} prUdpAttackOff NOTIFICATION-TYPE OBJECTS { prHostName, prUdpAttack } STATUS current DESCRIPTION "No longer Dropping UDP packets causing stress." ::= {ddossecureEvents 1072} prIcmpAttackOn NOTIFICATION-TYPE OBJECTS { prHostName, prIcmpAttack } STATUS current DESCRIPTION "Dropping ICMP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 1081} prIcmpAttackOff NOTIFICATION-TYPE OBJECTS { prHostName, prIcmpAttack } STATUS current DESCRIPTION "No longer Dropping ICMP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 1082} prOtherIpAttackOn NOTIFICATION-TYPE OBJECTS { prHostName, prOtherIpAttack } STATUS current DESCRIPTION "Dropping Other IP packets causing stress. Tracked by protected IP." ::= {ddossecureEvents 1091} prOtherIpAttackOff NOTIFICATION-TYPE OBJECTS { prHostName, prOtherIpAttack } STATUS current DESCRIPTION "No longer Dropping Other IP packets causing stress." ::= {ddossecureEvents 1092} prFragAttackOn NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "Dropping packet fragments that are causing stress. Tracked by protected IP." ::= {ddossecureEvents 1101} prFragAttackOff NOTIFICATION-TYPE OBJECTS { prHostName, prFragAttack } STATUS current DESCRIPTION "No longer Dropping packet fragments that are causing stress. Tracked by protected IP." ::= {ddossecureEvents 1102} prBadIpOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "Dropping IP packets that do not match RFCs. Tracked by protected IP." ::= {ddossecureEvents 1111} prBadIpOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIp } STATUS current DESCRIPTION "No longer Dropping IP packets that do not match RFCs." ::= {ddossecureEvents 1112} prBadTcpOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "Dropping TCP Packets that do not match RFCs. Tracked by protected IP." ::= {ddossecureEvents 1121} prBadTcpOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadTcp } STATUS current DESCRIPTION "No longer Dropping TCP Packets that do not match RFCs. Tracked by protected IP." ::= {ddossecureEvents 1122} prBadUdpOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadUdp } STATUS current DESCRIPTION "Dropping UDP packets that do not match RFCs. Tracked by protected IP." ::= {ddossecureEvents 1131} prBadUdpOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadUdp } STATUS current DESCRIPTION "No longer Dropping UDP packets that do not match RFCs." ::= {ddossecureEvents 1132} prBadIcmpOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadIcmp } STATUS current DESCRIPTION "Dropping ICMP packets that do not match RFCs. Tracked by protected IP." ::= {ddossecureEvents 1141} prBadIcmpOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadIcmp } STATUS current DESCRIPTION "No longer Dropping ICMP packets that do not match RFCs." ::= {ddossecureEvents 1142} prBadOtherIpOn NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "Dropping Other IP packets that do not match RFCs. Tracked by protected IP." ::= {ddossecureEvents 1151} prBadOtherIpOff NOTIFICATION-TYPE OBJECTS { prHostName, prBadOtherIp } STATUS current DESCRIPTION "No longer Dropping Other IP packets that do not match RFCs." ::= {ddossecureEvents 1152} prOverloadedOn NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "Detected overloaded protected IP. Tracked by protected IP." ::= {ddossecureEvents 1161} prOverloadedOff NOTIFICATION-TYPE OBJECTS { prHostName, prOverloaded } STATUS current DESCRIPTION "No longer detected overloaded protected IP." ::= {ddossecureEvents 1162} apHaStateMode NOTIFICATION-TYPE OBJECTS { apHaState } STATUS current DESCRIPTION "Current High Availability state." ::= {ddossecureEvents 2000} apOutputErrorIIFlagOn NOTIFICATION-TYPE OBJECTS { apOutputErrorIIFlag } STATUS current DESCRIPTION "DDoS Secure is having trouble transmitting packets on the Internet Interface. This could be because a downstream link is saturated, or a duplex speed mismatch." ::= {ddossecureEvents 3011} apOutputErrorIIFlagOff NOTIFICATION-TYPE OBJECTS { apOutputErrorIIFlag } STATUS current DESCRIPTION "DDoS Secure has stopped having trouble transmitting packets on the Internet Interface." ::= {ddossecureEvents 3012} apOutputErrorPIFlagOn NOTIFICATION-TYPE OBJECTS { apOutputErrorPIFlag } STATUS current DESCRIPTION "DDoS Secure is having trouble transmitting packets on the Protected Interface. This could be because a downstream link is saturated, or a duplex speed mismatch." ::= {ddossecureEvents 3021} apOutputErrorPIFlagOff NOTIFICATION-TYPE OBJECTS { apOutputErrorPIFlag } STATUS current DESCRIPTION "DDoS Secure has stopped having trouble transmitting packets on the Protected Interface." ::= {ddossecureEvents 3022} apOutputErrorMIFlagOn NOTIFICATION-TYPE OBJECTS { apOutputErrorMIFlag } STATUS current DESCRIPTION "DDoS Secure is having trouble transmitting packets on the Management Interface. This could be because a downstream link is saturated, or a duplex speed mismatch." ::= {ddossecureEvents 3031} apOutputErrorMIFlagOff NOTIFICATION-TYPE OBJECTS { apOutputErrorMIFlag } STATUS current DESCRIPTION "DDoS Secure has stopped having trouble transmitting packets on the Management Interface." ::= {ddossecureEvents 3032} apNewConfigFlagOn NOTIFICATION-TYPE OBJECTS { apNewConfigFlag } STATUS current DESCRIPTION "DDoS Secure is processing a new configuration." ::= {ddossecureEvents 3041} apNewConfigFlagOff NOTIFICATION-TYPE OBJECTS { apNewConfigFlag } STATUS current DESCRIPTION "DDoS Secure has finished processing a new configuration." ::= {ddossecureEvents 3042} apNotLicensedFlagOn NOTIFICATION-TYPE OBJECTS { apNotLicensedFlag } STATUS current DESCRIPTION "DDoS Secure is not licensed." ::= {ddossecureEvents 3051} apNotLicensedFlagOff NOTIFICATION-TYPE OBJECTS { apNotLicensedFlag } STATUS current DESCRIPTION "DDoS Secure is now licensed." ::= {ddossecureEvents 3052} apMacTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apMacTableFullFlag } STATUS current DESCRIPTION "Mac Address table is full." ::= {ddossecureEvents 3061} apMacTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apMacTableFullFlag } STATUS current DESCRIPTION "Mac Address table is no longer full." ::= {ddossecureEvents 3062} apProtectedTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apProtectedTableFullFlag } STATUS current DESCRIPTION "protected IP table is full." ::= {ddossecureEvents 3071} apProtectedTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apProtectedTableFullFlag } STATUS current DESCRIPTION "protected IP table is no longer full." ::= {ddossecureEvents 3072} apIncidentTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apIncidentTableFullFlag } STATUS current DESCRIPTION "Incident table is full." ::= {ddossecureEvents 3081} apIncidentTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apIncidentTableFullFlag } STATUS current DESCRIPTION "Incident table is no longer full." ::= {ddossecureEvents 3082} apTcpTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apTcpTableFullFlag } STATUS current DESCRIPTION "TCP table is full." ::= {ddossecureEvents 3091} apTcpTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apTcpTableFullFlag } STATUS current DESCRIPTION "TCP table is no longer full." ::= {ddossecureEvents 3092} apUdpTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apUdpTableFullFlag } STATUS current DESCRIPTION "UDP table is full." ::= {ddossecureEvents 3101} apUdpTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apUdpTableFullFlag } STATUS current DESCRIPTION "UDP table is no longer full." ::= {ddossecureEvents 3102} apIcmpTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apIcmpTableFullFlag } STATUS current DESCRIPTION "ICMP table is full." ::= {ddossecureEvents 3111} apIcmpTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apIcmpTableFullFlag } STATUS current DESCRIPTION "ICMP table is no longer full." ::= {ddossecureEvents 3112} apOtherIpTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apOtherIpTableFullFlag } STATUS current DESCRIPTION "Other IP table is full." ::= {ddossecureEvents 3121} apOtherIpTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apOtherIpTableFullFlag } STATUS current DESCRIPTION "Other IP table is no longer full." ::= {ddossecureEvents 3122} apFragTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apFragTableFullFlag } STATUS current DESCRIPTION "Fragment table is full." ::= {ddossecureEvents 3131} apFragTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apFragTableFullFlag } STATUS current DESCRIPTION "Fragment table is no longer full." ::= {ddossecureEvents 3132} apFtpTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apFtpTableFullFlag } STATUS current DESCRIPTION "FTP ftp table is full." ::= {ddossecureEvents 3141} apFtpTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apFtpTableFullFlag } STATUS current DESCRIPTION "FTP ftp table is no longer full." ::= {ddossecureEvents 3142} apBlockedTableFullFlagOn NOTIFICATION-TYPE OBJECTS { apBlockedTableFullFlag } STATUS current DESCRIPTION "Blocked IP table is full." ::= {ddossecureEvents 3151} apBlockedTableFullFlagOff NOTIFICATION-TYPE OBJECTS { apBlockedTableFullFlag } STATUS current DESCRIPTION "Blocked IP table is no longer full." ::= {ddossecureEvents 3152} apShortCircuitFlagOn NOTIFICATION-TYPE OBJECTS { apShortCircuitFlag } STATUS current DESCRIPTION "Traffic is bypassing DDoS Secure (Source MAC address is seen on both sides of the DDoS Secure)." ::= {ddossecureEvents 3161} apShortCircuitFlagOff NOTIFICATION-TYPE OBJECTS { apShortCircuitFlag } STATUS current DESCRIPTION "Traffic is no longer bypassing DDoS Secure." ::= {ddossecureEvents 3162} apInternetIfDisconnectedFlagOn NOTIFICATION-TYPE OBJECTS { apInternetIfDisconnectedFlag } STATUS current DESCRIPTION "Internet interface is not connected." ::= {ddossecureEvents 3171} apInternetIfDisconnectedFlagOff NOTIFICATION-TYPE OBJECTS { apInternetIfDisconnectedFlag } STATUS current DESCRIPTION "Internet interface is now connected." ::= {ddossecureEvents 3172} apProtectedIfDisconnectedFlagOn NOTIFICATION-TYPE OBJECTS { apProtectedIfDisconnectedFlag } STATUS current DESCRIPTION "Protected Interface is not connected." ::= {ddossecureEvents 3181} apProtectedIfDisconnectedFlagOff NOTIFICATION-TYPE OBJECTS { apProtectedIfDisconnectedFlag } STATUS current DESCRIPTION "Protected Interface is now connected." ::= {ddossecureEvents 3182} apMgmtIfDisconnectedFlagOn NOTIFICATION-TYPE OBJECTS { apMgmtIfDisconnectedFlag } STATUS current DESCRIPTION "Management interface is not connected." ::= {ddossecureEvents 3191} apMgmtIfDisconnectedFlagOff NOTIFICATION-TYPE OBJECTS { apMgmtIfDisconnectedFlag } STATUS current DESCRIPTION "Management interface is now connected." ::= {ddossecureEvents 3192} apUpgradingFlagOn NOTIFICATION-TYPE OBJECTS { apUpgradingFlag } STATUS current DESCRIPTION "DDoS Secure software is being upgraded." ::= {ddossecureEvents 3201} apUpgradingFlagOff NOTIFICATION-TYPE OBJECTS { apUpgradingFlag } STATUS current DESCRIPTION "DDoS Secure software upgrade finished." ::= {ddossecureEvents 3202} apProtectedIfTrafficFlagOn NOTIFICATION-TYPE OBJECTS { apProtectedIfTrafficFlag } STATUS current DESCRIPTION "Unexpected traffic seen on Protected Interface in TAP mode." ::= {ddossecureEvents 3211} apProtectedIfTrafficFlagOff NOTIFICATION-TYPE OBJECTS { apProtectedIfTrafficFlag } STATUS current DESCRIPTION "Unexpected traffic no longer seen on Protected Interface in TAP mode." ::= {ddossecureEvents 3212} apRoutingLoopFlagOn NOTIFICATION-TYPE OBJECTS { apRoutingLoopFlag } STATUS current DESCRIPTION "Routing Loop detected." ::= {ddossecureEvents 3221} apRoutingLoopFlagOff NOTIFICATION-TYPE OBJECTS { apRoutingLoopFlag } STATUS current DESCRIPTION "Routing Loop no longer detected." ::= {ddossecureEvents 3222} apOfflineFlagOn NOTIFICATION-TYPE OBJECTS { apOfflineFlag } STATUS current DESCRIPTION "DDoS Secure is Offline." ::= {ddossecureEvents 3231} apOfflineFlagOff NOTIFICATION-TYPE OBJECTS { apOfflineFlag } STATUS current DESCRIPTION "DDoS Secure is no longer Offline." ::= {ddossecureEvents 3232} apStateLearningFlagOn NOTIFICATION-TYPE OBJECTS { apStateLearningFlag } STATUS current DESCRIPTION "DDoS Secure is in State learning phase." ::= {ddossecureEvents 3241} apStateLearningFlagOff NOTIFICATION-TYPE OBJECTS { apStateLearningFlag } STATUS current DESCRIPTION "DDoS Secure is no longer in State learning phase." ::= {ddossecureEvents 3242} apSupportExpiredFlagOn NOTIFICATION-TYPE OBJECTS { apSupportExpiredFlag } STATUS current DESCRIPTION "Support License has expired." ::= {ddossecureEvents 3251} apSupportExpiredFlagOff NOTIFICATION-TYPE OBJECTS { apSupportExpiredFlag } STATUS current DESCRIPTION "Support License is now valid." ::= {ddossecureEvents 3252} apSevereLoadingFlagOn NOTIFICATION-TYPE OBJECTS { apSevereLoadingFlag } STATUS current DESCRIPTION "Appliance is severely loaded." ::= {ddossecureEvents 3261} apSevereLoadingFlagOff NOTIFICATION-TYPE OBJECTS { apSevereLoadingFlag } STATUS current DESCRIPTION "Appliance is no longer severely loaded." ::= {ddossecureEvents 3262} apMacMisconfiguredFlagOn NOTIFICATION-TYPE OBJECTS { apMacMisconfiguredFlag } STATUS current DESCRIPTION "MAC address is configured for one side of the DDoS Secure, but seen on the other side." ::= {ddossecureEvents 3271} apMacMisconfiguredFlagOff NOTIFICATION-TYPE OBJECTS { apMacMisconfiguredFlag } STATUS current DESCRIPTION "No MACaddresses misconfigured." ::= {ddossecureEvents 3272} apIfMisconfiguredFlagOn NOTIFICATION-TYPE OBJECTS { apIfMisconfiguredFlag } STATUS current DESCRIPTION "Protected and Internet speeds are not configured identically. Bypass cards only." ::= {ddossecureEvents 3281} apIfMisconfiguredFlagOff NOTIFICATION-TYPE OBJECTS { apIfMisconfiguredFlag } STATUS current DESCRIPTION "Protected and Internet speeds are configured identically. Bypass cards only." ::= {ddossecureEvents 3282} apInternetIfLinkDownFlagOn NOTIFICATION-TYPE OBJECTS { apInternetIfLinkDownFlag } STATUS current DESCRIPTION "One or more Internet sub-links are down." ::= {ddossecureEvents 3291} apInternetIfLinkDownFlagOff NOTIFICATION-TYPE OBJECTS { apInternetIfLinkDownFlag } STATUS current DESCRIPTION "All Internet sub-links are up." ::= {ddossecureEvents 3292} apProtectedIfLinkDownFlagOn NOTIFICATION-TYPE OBJECTS { apProtectedIfLinkDownFlag } STATUS current DESCRIPTION "One or more Protected sub-links are down." ::= {ddossecureEvents 3301} apProtectedIfLinkDownFlagOff NOTIFICATION-TYPE OBJECTS { apProtectedIfLinkDownFlag } STATUS current DESCRIPTION "All Protected sub-links are up." ::= {ddossecureEvents 3302} apDatashareIfDisconnectedFlagOn NOTIFICATION-TYPE OBJECTS { apDatashareIfDisconnectedFlag } STATUS current DESCRIPTION "Data Share interface is not connected." ::= {ddossecureEvents 3311} apDatashareIfDisconnectedFlagOff NOTIFICATION-TYPE OBJECTS { apDatashareIfDisconnectedFlag } STATUS current DESCRIPTION "Data Share interface is now connected." ::= {ddossecureEvents 3312} apDiskFailingOn NOTIFICATION-TYPE OBJECTS { apDiskFailingFlag } STATUS current DESCRIPTION "A disk is failing." ::= {ddossecureEvents 3321} apDiskFailingOff NOTIFICATION-TYPE OBJECTS { apDiskFailingFlag } STATUS current DESCRIPTION "Disk failure no longer detected." ::= {ddossecureEvents 3322} apPsuFailingFlagOn NOTIFICATION-TYPE OBJECTS { apPsuFailingFlag } STATUS current DESCRIPTION "A Power Supply Unit is failing." ::= {ddossecureEvents 3331} apPsuFailingFlagOff NOTIFICATION-TYPE OBJECTS { apPsuFailingFlag } STATUS current DESCRIPTION "A Power Supply Unit is no longer failing." ::= {ddossecureEvents 3332} apFanFailingFlagOn NOTIFICATION-TYPE OBJECTS { apFanFailingFlag } STATUS current DESCRIPTION "A Fan is failing." ::= {ddossecureEvents 3341} apFanFailingFlagOff NOTIFICATION-TYPE OBJECTS { apFanFailingFlag } STATUS current DESCRIPTION "A Fan is no longer failing." ::= {ddossecureEvents 3342} apConfigXferFailFlagOn NOTIFICATION-TYPE OBJECTS { apConfigXferFailFlag } STATUS current DESCRIPTION "Configuration Transfer failed." ::= {ddossecureEvents 3351} apConfigXferFailFlagOff NOTIFICATION-TYPE OBJECTS { apConfigXferFailFlag } STATUS current DESCRIPTION "Configuration Transfer failed report finished." ::= {ddossecureEvents 3352} apMissingRequiredPartnerFlagOn NOTIFICATION-TYPE OBJECTS { apMissingRequiredPartnerFlag } STATUS current DESCRIPTION "Missing Required Partner found." ::= {ddossecureEvents 3361} apMissingRequiredPartnerFlagOff NOTIFICATION-TYPE OBJECTS { apMissingRequiredPartnerFlag } STATUS current DESCRIPTION "All Required Partners active." ::= {ddossecureEvents 3362} apBgpMisconfiguredIpFlagOn NOTIFICATION-TYPE OBJECTS { apBgpMisconfiguredIpFlag } STATUS current DESCRIPTION "BGP traffic detected to undefined protected IP" ::= {ddossecureEvents 3371} apBgpMisconfiguredIpFlagOff NOTIFICATION-TYPE OBJECTS { apBgpMisconfiguredIpFlag } STATUS current DESCRIPTION "BGP traffic no longer detected to undefined protected IP" ::= {ddossecureEvents 3372} -- Old definitions apOutputErrorIIEvent NOTIFICATION-TYPE OBJECTS { apOutputErrorIIFlag } STATUS deprecated DESCRIPTION "DDoS Secure is having trouble transmitting packets on the Internet Interface. This could be because a downstream link is saturated, or a duplex speed mismatch." ::= {ddossecureEvents 1} apOutputErrorPIEvent NOTIFICATION-TYPE OBJECTS { apOutputErrorPIFlag } STATUS deprecated DESCRIPTION "DDoS Secure is having trouble transmitting packets on the Protected Interface. This could be because a downstream link is saturated, or a duplex speed mismatch." ::= {ddossecureEvents 2} apOutputErrorMIEvent NOTIFICATION-TYPE OBJECTS { apOutputErrorMIFlag } STATUS deprecated DESCRIPTION "DDoS Secure is having trouble transmitting packets on the Management Interface. This could be because a downstream link is saturated, or a duplex speed mismatch." ::= {ddossecureEvents 3} apNewConfigEvent NOTIFICATION-TYPE OBJECTS { apNewConfigFlag } STATUS deprecated DESCRIPTION "DDoS Secure is processing a new configuration" ::= {ddossecureEvents 4} apNotLicensedEvent NOTIFICATION-TYPE OBJECTS { apNotLicensedFlag } STATUS deprecated DESCRIPTION "DDoS Secure is not licensed" ::= {ddossecureEvents 5} apMacTableFullEvent NOTIFICATION-TYPE OBJECTS { apMacTableFullFlag } STATUS deprecated DESCRIPTION "Mac Address table is full" ::= {ddossecureEvents 6} apProtectedTableFullEvent NOTIFICATION-TYPE OBJECTS { apProtectedTableFullFlag } STATUS deprecated DESCRIPTION "Protected IP table is full" ::= {ddossecureEvents 7} apIncidentTableFullEvent NOTIFICATION-TYPE OBJECTS { apIncidentTableFullFlag } STATUS deprecated DESCRIPTION "Incident table is full" ::= {ddossecureEvents 8} apTcpTableFullEvent NOTIFICATION-TYPE OBJECTS { apTcpTableFullFlag } STATUS deprecated DESCRIPTION "TCP table is full" ::= {ddossecureEvents 9} apUdpTableFullEvent NOTIFICATION-TYPE OBJECTS { apUdpTableFullFlag } STATUS deprecated DESCRIPTION "UDP table is full" ::= {ddossecureEvents 10} apIcmpTableFullEvent NOTIFICATION-TYPE OBJECTS { apIcmpTableFullFlag } STATUS deprecated DESCRIPTION "ICMP table is full" ::= {ddossecureEvents 11} apOtherIpTableFullEvent NOTIFICATION-TYPE OBJECTS { apOtherIpTableFullFlag } STATUS deprecated DESCRIPTION "Other IP table is full" ::= {ddossecureEvents 12} apFragTableFullEvent NOTIFICATION-TYPE OBJECTS { apFragTableFullFlag } STATUS deprecated DESCRIPTION "Fragment table is full" ::= {ddossecureEvents 13} apFtpTableFullEvent NOTIFICATION-TYPE OBJECTS { apFtpTableFullFlag } STATUS deprecated DESCRIPTION "FTP ftp table is full" ::= {ddossecureEvents 14} apBlockedTableFullEvent NOTIFICATION-TYPE OBJECTS { apBlockedTableFullFlag } STATUS deprecated DESCRIPTION "Blocked IP table is full" ::= {ddossecureEvents 15} apShortCircuitEvent NOTIFICATION-TYPE OBJECTS { apShortCircuitFlag } STATUS deprecated DESCRIPTION "Seeing same source MAC address both sides of the DDoS Secure" ::= {ddossecureEvents 16} apInternetIfDisconnectedEvent NOTIFICATION-TYPE OBJECTS { apInternetIfDisconnectedFlag } STATUS deprecated DESCRIPTION "Internet interface is not connected" ::= {ddossecureEvents 17} apProtectedIfDisconnectedEvent NOTIFICATION-TYPE OBJECTS { apProtectedIfDisconnectedFlag } STATUS deprecated DESCRIPTION "Protected Interface is not connected" ::= {ddossecureEvents 18} apMgmtIfDisconnectedEvent NOTIFICATION-TYPE OBJECTS { apMgmtIfDisconnectedFlag } STATUS deprecated DESCRIPTION "Management interface is not connected" ::= {ddossecureEvents 19} apUpgradingEvent NOTIFICATION-TYPE OBJECTS { apUpgradingFlag } STATUS deprecated DESCRIPTION "DDoS Secure software is being upgraded" ::= {ddossecureEvents 20} apProtectedIfTrafficEvent NOTIFICATION-TYPE OBJECTS { apProtectedIfTrafficFlag } STATUS deprecated DESCRIPTION "Unexpected traffic seen on Protected Interface in TAP mode" ::= {ddossecureEvents 21} apRoutingLoopEvent NOTIFICATION-TYPE OBJECTS { apRoutingLoopFlag } STATUS deprecated DESCRIPTION "Routing Loop detected" ::= {ddossecureEvents 22} apOfflineEvent NOTIFICATION-TYPE OBJECTS { apOfflineFlag } STATUS deprecated DESCRIPTION "DDoS Secure is Offline" ::= {ddossecureEvents 23} apStateLearningEvent NOTIFICATION-TYPE OBJECTS { apStateLearningFlag } STATUS deprecated DESCRIPTION "DDoS Secure is State learning" ::= {ddossecureEvents 24} apSupportExpiredEvent NOTIFICATION-TYPE OBJECTS { apSupportExpiredFlag } STATUS deprecated DESCRIPTION "Support License has expired" ::= {ddossecureEvents 25} apSevereLoadingEvent NOTIFICATION-TYPE OBJECTS { apSevereLoadingFlag } STATUS deprecated DESCRIPTION "Appliance is severely loaded" ::= {ddossecureEvents 26} apMacMisconfiguredEvent NOTIFICATION-TYPE OBJECTS { apMacMisconfiguredFlag } STATUS deprecated DESCRIPTION "MAC address configured for wrong side of DDoS Secure" ::= {ddossecureEvents 27} apIfMisconfiguredEvent NOTIFICATION-TYPE OBJECTS { apIfMisconfiguredFlag } STATUS deprecated DESCRIPTION "Protected / Internet interface speed mismatch" ::= {ddossecureEvents 28} apInternetIfLinkDownEvent NOTIFICATION-TYPE OBJECTS { apInternetIfLinkDownFlag } STATUS deprecated DESCRIPTION "One or more Internet sub-links are down" ::= {ddossecureEvents 29} apProtectedIfLinkDownEvent NOTIFICATION-TYPE OBJECTS { apProtectedIfLinkDownFlag } STATUS deprecated DESCRIPTION "One or more Protected sub-links are down" ::= {ddossecureEvents 30} apDatashareIfDisconnectedEvent NOTIFICATION-TYPE OBJECTS { apDatashareIfDisconnectedFlag } STATUS deprecated DESCRIPTION "Data Share interface is not connected" ::= {ddossecureEvents 31} apHaStateEvent NOTIFICATION-TYPE OBJECTS { apHaState } STATUS deprecated DESCRIPTION "Current High Availability state" ::= {ddossecureEvents 35} prBandwidthEvent NOTIFICATION-TYPE OBJECTS { prBandwidth } STATUS deprecated DESCRIPTION "Rate limiting traffic by bandwidth" ::= {ddossecureEvents 40} prFloodEvent NOTIFICATION-TYPE OBJECTS { prFlood } STATUS deprecated DESCRIPTION "Rate limiting traffic by packet rate" ::= {ddossecureEvents 41} prBlockedProtocolEvent NOTIFICATION-TYPE OBJECTS { prBlockedProtocol } STATUS deprecated DESCRIPTION "Dropping traffic not expressly permitted" ::= {ddossecureEvents 42} prBlockedStateEvent NOTIFICATION-TYPE OBJECTS { prBlockedState } STATUS deprecated DESCRIPTION "Dropping TCP traffic that is out of state" ::= {ddossecureEvents 43} prIpAttackEvent NOTIFICATION-TYPE OBJECTS { prIpAttack } STATUS deprecated DESCRIPTION "Dropping IP packets causing stress" ::= {ddossecureEvents 44} prTcpAttackEvent NOTIFICATION-TYPE OBJECTS { prTcpAttack } STATUS deprecated DESCRIPTION "Dropping TCP packets causing stress" ::= {ddossecureEvents 45} prUdpAttackEvent NOTIFICATION-TYPE OBJECTS { prUdpAttack } STATUS deprecated DESCRIPTION "Dropping UDP packets causing stress" ::= {ddossecureEvents 46} prIcmpAttackEvent NOTIFICATION-TYPE OBJECTS { prIcmpAttack } STATUS deprecated DESCRIPTION "Dropping ICMP packets causing stress" ::= {ddossecureEvents 47} prOtherIpAttackEvent NOTIFICATION-TYPE OBJECTS { prOtherIpAttack } STATUS deprecated DESCRIPTION "Dropping Other IP packets causing stress" ::= {ddossecureEvents 48} prFragAttackEvent NOTIFICATION-TYPE OBJECTS { prFragAttack } STATUS deprecated DESCRIPTION "Dropping packet fragments that are causing stress" ::= {ddossecureEvents 49} prBadIpEvent NOTIFICATION-TYPE OBJECTS { prBadIp } STATUS deprecated DESCRIPTION "Dropping IP packets that do not match RFCs" ::= {ddossecureEvents 50} prBadTcpEvent NOTIFICATION-TYPE OBJECTS { prBadTcp } STATUS deprecated DESCRIPTION "Dropping TCP Packets that do not match RFCs" ::= {ddossecureEvents 51} prBadUdpEvent NOTIFICATION-TYPE OBJECTS { prBadUdp } STATUS deprecated DESCRIPTION "Dropping UDP packets that do not match RFCs" ::= {ddossecureEvents 52} prBadIcmpEvent NOTIFICATION-TYPE OBJECTS { prBadIcmp } STATUS deprecated DESCRIPTION "Dropping ICMP packets that do not match RFCs" ::= {ddossecureEvents 53} prBadOtherIpEvent NOTIFICATION-TYPE OBJECTS { prBadOtherIp } STATUS deprecated DESCRIPTION "Dropping Other IP packets that do not match RFCs" ::= {ddossecureEvents 54} prOverloadedEvent NOTIFICATION-TYPE OBJECTS { prOverloaded } STATUS deprecated DESCRIPTION "Detected overloaded protected IP" ::= {ddossecureEvents 55} -- Conformance information ddossecure4MIBConformance OBJECT IDENTIFIER ::= { ddossecure4MIB 9 } ddossecure4MIBCompliances OBJECT IDENTIFIER ::= { ddossecure4MIBConformance 1 } ddossecure4MIBGroups OBJECT IDENTIFIER ::= { ddossecure4MIBConformance 2 } ddossecure4MIBCompliance MODULE-COMPLIANCE STATUS current DESCRIPTION "Compliance Statement" MODULE MANDATORY-GROUPS { apCfgGroup, gwGroup, apIncidentGroup, apDebugGroup, apGroup, poGroup, prGroup, prCfgGroup, gwCfgGroup, apEventObjectGroup, apRatesGroup, poFilterCfgGroup, apLinkStatusGroup, apLogGroup, apHaCfgGroup, prNotificationGroup } ::= { ddossecure4MIBCompliances 1 } ddossecure4MIBComplianceDep MODULE-COMPLIANCE STATUS deprecated DESCRIPTION "Compliance Statement" MODULE MANDATORY-GROUPS { deprecatedNotificationGroup } ::= { ddossecure4MIBCompliances 2 } -- units of conformance apCfgGroup OBJECT-GROUP OBJECTS { apMgmtIfIpAddress, apMgmtIfNetmask, apMgmtIfGwIpAddress, apMgmtIfLinkMode, apMgmtIfLinkFC, apMgmtIfName, apIntIfLinkMode, apIntIfLinkFC, apIntIfName, apProtIfLinkMode, apProtIfLinkFC, apProtIfName, apDataIfIpAddress, apDataIfNetmask, apDataIfLinkMode, apDataIfLinkFC, apDataIfName, apUserName, apUserPermissions, apSnmpRoCommunity, apSnmpTrapCommunity, apSnmpTrapIpAddressList, apSnmpAccessIpList, apHttpsAccessIpList, apSshAccessIpList, apSyslogServer, apSyslogFacility, apSyslogPriority, apWebtrendsServer, apWebtrendsFacility, apWebtrendsPriority, apMailServer, apMailFrom, apMailSubject, apMailToList, apMailDailyStats, apMailAlerts, apMailAlertInterval, apOperationMode, apNtpServerList, apTimeZone, apProtectedIpNetwork, apAutoblockEnable, apAutoblockRateT1, apProtectedIpAutodetect, apTrackIndeterminate, apAutoblockRateT2 } STATUS current DESCRIPTION "Appliance Configuration Group." ::= { ddossecure4MIBGroups 1 } gwGroup OBJECT-GROUP OBJECTS { gwInternetMacAddress, gwInternetIpAddress, gwInternetInTotalBytesCnt, gwInternetOutTotalBytesCnt, gwInternetInDroppedBytesCnt, gwInternetOutDroppedBytesCnt, gwInternetInTotalPpsMax, gwInternetOutTotalPpsMax, gwInternetInDroppedPpsMax, gwInternetOutDroppedPpsMax, gwInternetInTotalBpsMax, gwInternetOutTotalBpsMax, gwInternetInDroppedBpsMax, gwInternetOutDroppedBpsMax, gwProtectedMacAddress, gwProtectedIpAddress, gwProtectedInTotalBytesCnt, gwProtectedOutTotalBytesCnt, gwProtectedInDroppedBytesCnt, gwProtectedOutDroppedBytesCnt, gwProtectedInTotalPpsMax, gwProtectedOutTotalPpsMax, gwProtectedInDroppedPpsMax, gwProtectedOutDroppedPpsMax, gwProtectedInTotalBpsMax, gwProtectedOutTotalBpsMax, gwProtectedInDroppedBpsMax, gwProtectedOutDroppedBpsMax } STATUS current DESCRIPTION "Gateway Statistics Group." ::= { ddossecure4MIBGroups 2 } apIncidentGroup OBJECT-GROUP OBJECTS { apBandwidthCreateThresh, apBandwidthCreateThreshRate, apFloodCreateThresh, apFloodCreateThreshRate, apBlockedProtoCreateThresh, apBlockedProtoCreateThreshRate, apBlockedStateCreateThresh, apBlockedStateCreateThreshRate, apIpAttackCreateThresh, apIpAttackCreateThreshRate, apTcpAttackCreateThresh, apTcpAttackCreateThreshRate, apUdpAttackCreateThresh, apUdpAttackCreateThreshRate, apIcmpAttackCreateThresh, apIcmpAttackCreateThreshRate, apOtherIpAttackCreateThresh, apOtherIpAttackCreateThreshRate, apFragAttackCreateThresh, apFragAttackCreateThreshRate, apBadIpCreateThresh, apBadIpCreateThreshRate, apBadTcpCreateThresh, apBadTcpCreateThreshRate, apBadUdpCreateThresh, apBadUdpCreateThreshRate, apBadIcmpCreateThresh, apBadIcmpCreateThreshRate, apBadOtherIpCreateThresh, apBadOtherIpCreateThreshRate, apOverloadedIpCreateThresh, apOverloadedIpCreateThreshRate, apBandwidthViewThresh, apBandwidthViewThreshRate, apFloodViewThresh, apFloodViewThreshRate, apBlockedProtoViewThresh, apBlockedProtoViewThreshRate, apBlockedStateViewThresh, apBlockedStateViewThreshRate, apIpAttackViewThresh, apIpAttackViewThreshRate, apTcpAttackViewThresh, apTcpAttackViewThreshRate, apUdpAttackViewThresh, apUdpAttackViewThreshRate, apIcmpAttackViewThresh, apIcmpAttackViewThreshRate, apOtherIpAttackViewThresh, apOtherIpAttackViewThreshRate, apFragAttackViewThresh, apFragAttackViewThreshRate, apBadIpViewThresh, apBadIpViewThreshRate, apBadTcpViewThresh, apBadTcpViewThreshRate, apBadUdpViewThresh, apBadUdpViewThreshRate, apBadIcmpViewThresh, apBadIcmpViewThreshRate, apBadOtherIpViewThresh, apBadOtherIpViewThreshRate, apOverloadedIpViewThresh, apOverloadedIpViewThreshRate, apBandwidthOffThresh, apBandwidthOffThreshRate, apFloodOffThresh, apFloodOffThreshRate, apBlockedProtoOffThresh, apBlockedProtoOffThreshRate, apBlockedStateOffThresh, apBlockedStateOffThreshRate, apIpAttackOffThresh, apIpAttackOffThreshRate, apTcpAttackOffThresh, apTcpAttackOffThreshRate, apUdpAttackOffThresh, apUdpAttackOffThreshRate, apIcmpAttackOffThresh, apIcmpAttackOffThreshRate, apOtherIpAttackOffThresh, apOtherIpAttackOffThreshRate, apFragAttackOffThresh, apFragAttackOffThreshRate, apBadIpOffThresh, apBadIpOffThreshRate, apBadTcpOffThresh, apBadTcpOffThreshRate, apBadUdpOffThresh, apBadUdpOffThreshRate, apBadIcmpOffThresh, apBadIcmpOffThreshRate, apBadOtherIpOffThresh, apBadOtherIpOffThreshRate, apOverloadedIpOffThresh, apOverloadedIpOffThreshRate, apBandwidthAlertThresh, apBandwidthAlertThreshRate, apFloodAlertThresh, apFloodAlertThreshRate, apBlockedProtoAlertThresh, apBlockedProtoAlertThreshRate, apBlockedStateAlertThresh, apBlockedStateAlertThreshRate, apIpAttackAlertThresh, apIpAttackAlertThreshRate, apTcpAttackAlertThresh, apTcpAttackAlertThreshRate, apUdpAttackAlertThresh, apUdpAttackAlertThreshRate, apIcmpAttackAlertThresh, apIcmpAttackAlertThreshRate, apOtherIpAttackAlertThresh, apOtherIpAttackAlertThreshRate, apFragAttackAlertThresh, apFragAttackAlertThreshRate, apBadIpAlertThresh, apBadIpAlertThreshRate, apBadTcpAlertThresh, apBadTcpAlertThreshRate, apBadUdpAlertThresh, apBadUdpAlertThreshRate, apBadIcmpAlertThresh, apBadIcmpAlertThreshRate, apBadOtherIpAlertThresh, apBadOtherIpAlertThreshRate, apOverloadedIpAlertThresh, apOverloadedIpAlertThreshRate } STATUS current DESCRIPTION "Appliance Threshold Configuration Group." ::= { ddossecure4MIBGroups 3 } apDebugGroup OBJECT-GROUP OBJECTS { apDebugBandwidthFlag, apDebugFloodFlag, apDebugBlockedProtocolFlag, apDebugBlockedStateFlag, apDebugIpAttackFlag, apDebugTcpAttackFlag, apDebugUdpAttackFlag, apDebugIcmpAttackFlag, apDebugOtherIpAttackFlag, apDebugFragmentAttackFlag, apDebugBadIpPacketFlag, apDebugBadTcpPacketFlag, apDebugBadUdpPacketFlag, apDebugBadIcmpFlag, apDebugBadOtherIpFlag, apDebugOverloadProtectedIpFlag } STATUS current DESCRIPTION "Appliance Logging Debug Group." ::= { ddossecure4MIBGroups 4 } apGroup OBJECT-GROUP OBJECTS { apBandwidth, apFlood, apBlockedProtocol, apBlockedState, apIpAttack, apTcpAttack, apUdpAttack, apIcmpAttack, apOtherIpAttack, apFragAttack, apBadIp, apBadTcp, apBadUdp, apBadIcmp, apBadOtherIp, apOverloadedIp, apInSyn, apOutSyn, apInSynAck, apOutSynAck, apInSynSyn, apOutSynSyn, apInEst, apOutEst, apInFin1Src, apOutFin1Src, apInFin2Src, apOutFin2Src, apInFin3Src, apOutFin3Src, apInFinFin, apOutFinFin, apInFin1Dst, apOutFin1Dst, apInFin2Dst, apOutFin2Dst, apInFin3Dst, apOutFin3Dst, apInCls, apOutCls, apInRst, apOutRst, apInRstCls, apOutRstCls, apInUnknown, apOutUnknown, apInAck, apOutAck, apInPendAck, apOutPendAck, apInGet, apOutGet, apInGets, apOutGets, apInTotalBpsAvg, apOutTotalBpsAvg, apInTotalPpsAvg, apOutTotalPpsAvg, apInSmallPpsAvg, apOutSmallPpsAvg, apInMediumPpsAvg, apOutMediumPpsAvg, apInLargePpsAvg, apOutLargePpsAvg, apInDroppedBpsAvg, apOutDroppedBpsAvg, apInDroppedPpsAvg, apOutDroppedPpsAvg, apInCharmDroppedBpsAvg, apOutCharmDroppedBpsAvg, apInFilteredBwthPercentAvg, apOutFilteredBwthPercentAvg, apInSynbacklogtallyAvg, apOutSynbacklogtallyAvg, apInConnectionAvg, apOutConnectionAvg, apInConnreqAvg, apOutConnreqAvg, apInActiveHttpGetsAvg, apOutActiveHttpGetsAvg, apInProtectBwthPktsAvg, apOutProtectBwthPktsAvg, apInFloodPktsAvg, apOutFloodPktsAvg, apInBlockedProtocolPktsAvg, apOutBlockedProtocolPktsAvg, apInBlockedStatePktsAvg, apOutBlockedStatePktsAvg, apInIpAttackPktsAvg, apOutIpAttackPktsAvg, apInTcpAttackPktsAvg, apOutTcpAttackPktsAvg, apInUdpAttackPktsAvg, apOutUdpAttackPktsAvg, apInIcmpAttackPktsAvg, apOutIcmpAttackPktsAvg, apInOtherIpAttackPktsAvg, apOutOtherIpAttackPktsAvg, apInFragmentAttackPktsAvg, apOutFragmentAttackPktsAvg, apInBadipPktsAvg, apOutBadipPktsAvg, apInBadTcpPktsAvg, apOutBadTcpPktsAvg, apInBadUdpPktsAvg, apOutBadUdpPktsAvg, apInBadIcmpPktsAvg, apOutBadIcmpPktsAvg, apInBadOtherIpPktsAvg, apOutBadOtherIpPktsAvg, apInOverloadedAvg, apOutOverloadedAvg, apInLatencyAvg, apOutLatencyAvg, apInSmallPpsMax, apOutSmallPpsMax, apInMediumPpsMax, apOutMediumPpsMax, apInLargePpsMax, apOutLargePpsMax, apInCharmDroppedBpsMax, apOutCharmDroppedBpsMax, apInFilteredBwthPercentMax, apOutFilteredBwthPercentMax, apInSynbacklogtallyMax, apOutSynbacklogtallyMax, apInConnectionMax, apOutConnectionMax, apInConnreqMax, apOutConnreqMax, apInActiveHttpGetsMax, apOutActiveHttpGetsMax, apInProtectBwthPktsMax, apOutProtectBwthPktsMax, apInFloodPktsMax, apOutFloodPktsMax, apInBlockedProtocolPktsMax, apOutBlockedProtocolPktsMax, apInBlockedStatePktsMax, apOutBlockedStatePktsMax, apInIpAttackPktsMax, apOutIpAttackPktsMax, apInTcpAttackPktsMax, apOutTcpAttackPktsMax, apInUdpAttackPktsMax, apOutUdpAttackPktsMax, apInIcmpAttackPktsMax, apOutIcmpAttackPktsMax, apInOtherIpAttackPktsMax, apOutOtherIpAttackPktsMax, apInFragmentAttackPktsMax, apOutFragmentAttackPktsMax, apInBadipPktsMax, apOutBadipPktsMax, apInBadTcpPktsMax, apOutBadTcpPktsMax, apInBadUdpPktsMax, apOutBadUdpPktsMax, apInBadIcmpPktsMax, apOutBadIcmpPktsMax, apInBadOtherIpPktsMax, apOutBadOtherIpPktsMax, apInOverloadedMax, apOutOverloadedMax, apInLatencyMax, apOutLatencyMax, apStalledFlag, apOfflineFlag, apInTcpConnTally, apOutTcpConnTally, apInSynBacklogTally, apUdpSessionTally, apIcmpSessionTally, apOtherIpSessionTally, apIncidentStart, apIncidentAddress, apIncidentType, apIncidentDirection, apIncidentPeakRate, apIncidentDropped } STATUS current DESCRIPTION "Appliance Statistics Group." ::= { ddossecure4MIBGroups 5 } prGroup OBJECT-GROUP OBJECTS { prBandwidth, prFlood, prBlockedProtocol, prBlockedState, prIpAttack, prTcpAttack, prUdpAttack, prIcmpAttack, prOtherIpAttack, prFragAttack, prBadIp, prBadTcp, prBadUdp, prBadIcmp, prBadOtherIp, prOverloaded, prInSyn, prOutSyn, prInSynAck, prOutSynAck, prInSynSyn, prOutSynSyn, prInEst, prOutEst, prInFin1Src, prOutFin1Src, prInFin2Src, prOutFin2Src, prInFin3Src, prOutFin3Src, prInFinFin, prOutFinFin, prInFin1Dst, prOutFin1Dst, prInFin2Dst, prOutFin2Dst, prInFin3Dst, prOutFin3Dst, prInCls, prOutCls, prInRst, prOutRst, prInRstCls, prOutRstCls, prInUnknown, prOutUnknown, prInAck, prOutAck, prInPendAck, prOutPendAck, prInGet, prOutGet, prInGets, prOutGets, prOverloadedFlag, prInTcpConnTally, prOutTcpConnTally, prInSynBacklogTally, prInTotalBytesCnt, prOutTotalBytesCnt, prInDroppedBytesCnt, prOutDroppedBytesCnt, prInCharmDroppedBytesCnt, prOutCharmDroppedBytesCnt, prInTotalPpsMax, prOutTotalPpsMax, prInDroppedPpsMax, prOutDroppedPpsMax, prInTotalBpsMax, prOutTotalBpsMax, prInDroppedBpsMax, prOutDroppedBpsMax, prInCharmDroppedBpsMax, prOutCharmDroppedBpsMax, prInProtectBwthPktsCnt, prOutProtectBwthPktsCnt, prInFloodPktsCnt, prOutFloodPktsCnt, prInBlockedProtocolPktsCnt, prOutBlockedProtocolPktsCnt, prInBlockedStatePktsCnt, prOutBlockedStatePktsCnt, prInIpAttackPktsCnt, prOutIpAttackPktsCnt, prInTcpAttackPktsCnt, prOutTcpAttackPktsCnt, prInUdpAttackPktsCnt, prOutUdpAttackPktsCnt, prInIcmpAttackPktsCnt, prOutIcmpAttackPktsCnt, prInOtherIpAttackPktsCnt, prOutOtherIpAttackPktsCnt, prInFragmentAttackPktsCnt, prOutFragmentAttackPktsCnt, prInBadIpPktsCnt, prOutBadIpPktsCnt, prInBadTcpPktsCnt, prOutBadTcpPktsCnt, prInBadUdpPktsCnt, prOutBadUdpPktsCnt, prInBadIcmpPktsCnt, prOutBadIcmpPktsCnt, prInBadOtherIpPktsCnt, prOutBadOtherIpPktsCnt, prInTotalBpsAvg, prOutTotalBpsAvg, prInTotalPpsAvg, prOutTotalPpsAvg, prInSmallPpsAvg, prOutSmallPpsAvg, prInMediumPpsAvg, prOutMediumPpsAvg, prInLargePpsAvg, prOutLargePpsAvg, prInDroppedBpsAvg, prOutDroppedBpsAvg, prInDroppedPpsAvg, prOutDroppedPpsAvg, prInCharmDroppedBpsAvg, prOutCharmDroppedBpsAvg, prInFilteredBwthPercentAvg, prOutFilteredBwthPercentAvg, prInSynbacklogtallyAvg, prOutSynbacklogtallyAvg, prInConnectionAvg, prOutConnectionAvg, prInConnreqAvg, prOutConnreqAvg, prInActiveHttpGetsAvg, prOutActiveHttpGetsAvg, prInProtectBwthPktsAvg, prOutProtectBwthPktsAvg, prInFloodPktsAvg, prOutFloodPktsAvg, prInBlockedProtocolPktsAvg, prOutBlockedProtocolPktsAvg, prInBlockedStatePktsAvg, prOutBlockedStatePktsAvg, prInIpAttackPktsAvg, prOutIpAttackPktsAvg, prInTcpAttackPktsAvg, prOutTcpAttackPktsAvg, prInUdpAttackPktsAvg, prOutUdpAttackPktsAvg, prInIcmpAttackPktsAvg, prOutIcmpAttackPktsAvg, prInOtherIpAttackPktsAvg, prOutOtherIpAttackPktsAvg, prInFragmentAttackPktsAvg, prOutFragmentAttackPktsAvg, prInBadipPktsAvg, prOutBadipPktsAvg, prInBadTcpPktsAvg, prOutBadTcpPktsAvg, prInBadUdpPktsAvg, prOutBadUdpPktsAvg, prInBadIcmpPktsAvg, prOutBadIcmpPktsAvg, prInBadOtherIpPktsAvg, prOutBadOtherIpPktsAvg, prInOverloadedAvg, prOutOverloadedAvg, prInLatencyAvg, prOutLatencyAvg, prInTotalBpsMax, prOutTotalBpsMax, prInTotalPpsMax, prOutTotalPpsMax, prInSmallPpsMax, prOutSmallPpsMax, prInMediumPpsMax, prOutMediumPpsMax, prInLargePpsMax, prOutLargePpsMax, prInDroppedBpsMax, prOutDroppedBpsMax, prInDroppedPpsMax, prOutDroppedPpsMax, prInCharmDroppedBpsMax, prOutCharmDroppedBpsMax, prInFilteredBwthPercentMax, prOutFilteredBwthPercentMax, prInSynbacklogtallyMax, prOutSynbacklogtallyMax, prInConnectionMax, prOutConnectionMax, prInConnreqMax, prOutConnreqMax, prInActiveHttpGetsMax, prOutActiveHttpGetsMax, prInProtectBwthPktsMax, prOutProtectBwthPktsMax, prInFloodPktsMax, prOutFloodPktsMax, prInBlockedProtocolPktsMax, prOutBlockedProtocolPktsMax, prInBlockedStatePktsMax, prOutBlockedStatePktsMax, prInIpAttackPktsMax, prOutIpAttackPktsMax, prInTcpAttackPktsMax, prOutTcpAttackPktsMax, prInUdpAttackPktsMax, prOutUdpAttackPktsMax, prInIcmpAttackPktsMax, prOutIcmpAttackPktsMax, prInOtherIpAttackPktsMax, prOutOtherIpAttackPktsMax, prInFragmentAttackPktsMax, prOutFragmentAttackPktsMax, prInBadipPktsMax, prOutBadipPktsMax, prInBadTcpPktsMax, prOutBadTcpPktsMax, prInBadUdpPktsMax, prOutBadUdpPktsMax, prInBadIcmpPktsMax, prOutBadIcmpPktsMax, prInBadOtherIpPktsMax, prOutBadOtherIpPktsMax, prInOverloadedMax, prOutOverloadedMax, prInLatencyMax, prOutLatencyMax, prIncidentStart, prIncidentAddress, prIncidentType, prIncidentDirection, prIncidentPeakRate, prIncidentDropped } STATUS current DESCRIPTION "Protected Statistics Group." ::= { ddossecure4MIBGroups 6 } prCfgGroup OBJECT-GROUP OBJECTS { prHostName, prTcpBacklog, prMaxConnections, prMaxConnectionRate, prInFilterName, prOutFilterName, prSendTcpRejects, prTrackSoap, prOperationMode, prMaxGets, prFragsDisabled } STATUS current DESCRIPTION "protected IP Configuration Group." ::= { ddossecure4MIBGroups 7 } gwCfgGroup OBJECT-GROUP OBJECTS { gwInternetConfigMacAddress, gwInternetConfigToSpeedBps, gwInternetConfigToRatePps, gwProtectedConfigMacAddress, gwProtectedConfigToSpeedBps, gwProtectedConfigToRatePps } STATUS current DESCRIPTION "Gateway Configuration Group." ::= { ddossecure4MIBGroups 8 } apEventObjectGroup OBJECT-GROUP OBJECTS { apOutputErrorIIFlag, apOutputErrorPIFlag, apOutputErrorMIFlag, apNewConfigFlag, apNotLicensedFlag, apMacTableFullFlag, apProtectedTableFullFlag, apIncidentTableFullFlag, apTcpTableFullFlag, apUdpTableFullFlag, apIcmpTableFullFlag, apOtherIpTableFullFlag, apFragTableFullFlag, apFtpTableFullFlag, apBlockedTableFullFlag, apShortCircuitFlag, apInternetIfDisconnectedFlag, apProtectedIfDisconnectedFlag, apMgmtIfDisconnectedFlag, apUpgradingFlag, apProtectedIfTrafficFlag, apRoutingLoopFlag, apStateLearningFlag, apSupportExpiredFlag, apSevereLoadingFlag, apMacMisconfiguredFlag, apIfMisconfiguredFlag, apInternetIfLinkDownFlag, apProtectedIfLinkDownFlag, apDatashareIfDisconnectedFlag, apDiskFailingFlag, apPsuFailingFlag, apFanFailingFlag, apConfigXferFailFlag, apMissingRequiredPartnerFlag, apBgpMisconfiguredIpFlag } STATUS current DESCRIPTION "Appliance State Flag Group." ::= { ddossecure4MIBGroups 9 } apRatesGroup OBJECT-GROUP OBJECTS { apInTotalBytesCnt, apOutTotalBytesCnt, apInDroppedBytesCnt, apOutDroppedBytesCnt, apInCharmDroppedBytesCnt, apOutCharmDroppedBytesCnt, apInTotalPpsMax, apOutTotalPpsMax, apInDroppedPpsMax, apOutDroppedPpsMax, apInTotalBpsMax, apOutTotalBpsMax, apInDroppedBpsMax, apOutDroppedBpsMax, apInCharmDroppedBpsMax, apOutCharmDroppedBpsMax, apInProtectBwthPktsCnt, apOutProtectBwthPktsCnt, apInFloodPktsCnt, apOutFloodPktsCnt, apInBlockedProtocolPktsCnt, apOutBlockedProtocolPktsCnt, apInBlockedStatePktsCnt, apOutBlockedStatePktsCnt, apInIpAttackPktsCnt, apOutIpAttackPktsCnt, apInTcpAttackPktsCnt, apOutTcpAttackPktsCnt, apInUdpAttackPktsCnt, apOutUdpAttackPktsCnt, apInIcmpAttackPktsCnt, apOutIcmpAttackPktsCnt, apInOtherIpAttackPktsCnt, apOutOtherIpAttackPktsCnt, apInFragmentAttackPktsCnt, apOutFragmentAttackPktsCnt, apInBadIpPktsCnt, apOutBadIpPktsCnt, apInBadTcpPktsCnt, apOutBadTcpPktsCnt, apInBadUdpPktsCnt, apOutBadUdpPktsCnt, apInBadIcmpPktsCnt, apOutBadIcmpPktsCnt, apInBadOtherIpPktsCnt, apOutBadOtherIpPktsCnt, apInTotalBytesCnt, apOutTotalBytesCnt, apInTotalPpsCnt, apOutTotalPpsCnt, apInSmallPpsCnt, apOutSmallPpsCnt, apInMediumPpsCnt, apOutMediumPpsCnt, apInLargePpsCnt, apOutLargePpsCnt, apInDroppedBytesCnt, apOutDroppedBytesCnt, apInDroppedPpsCnt, apOutDroppedPpsCnt, apInFilteredBwthPercentCnt, apOutFilteredBwthPercentCnt, apInConnreqCnt, apOutConnreqCnt, apInOverloadedCnt, apOutOverloadedCnt } STATUS current DESCRIPTION "Configuration Group." ::= { ddossecure4MIBGroups 10 } poFilterCfgGroup OBJECT-GROUP OBJECTS { poFilterName, poTcpPortsList, poUdpPortsList, poIcmpTypesList, poIpProtocolsList } STATUS current DESCRIPTION "Configuration Group." ::= { ddossecure4MIBGroups 11 } apLinkStatusGroup OBJECT-GROUP OBJECTS { apMgmtIfLinkModeState, apIntIfLinkModeState, apMgmtIfLinkFCState, apIntIfLinkFCState, apProtIfLinkModeState, apProtIfLinkFCState } STATUS current DESCRIPTION "Configuration Group." ::= { ddossecure4MIBGroups 12 } apLogGroup OBJECT-GROUP OBJECTS { apWorstOffenderLastTime, apWorstOffenderCount, apLogFileRecord } STATUS current DESCRIPTION "Configuration Group." ::= { ddossecure4MIBGroups 13 } apHaCfgGroup OBJECT-GROUP OBJECTS { apHaState, apHaPartnerList, apHaPartnerTime } STATUS current DESCRIPTION "Configuration Group." ::= { ddossecure4MIBGroups 14 } poGroup OBJECT-GROUP OBJECTS { poPortalName, poInTotalBpsAvg, poOutTotalBpsAvg, poInTotalPpsAvg, poOutTotalPpsAvg, poInSmallPpsAvg, poOutSmallPpsAvg, poInMediumPpsAvg, poOutMediumPpsAvg, poInLargePpsAvg, poOutLargePpsAvg, poInDroppedBpsAvg, poOutDroppedBpsAvg, poInDroppedPpsAvg, poOutDroppedPpsAvg, poInCharmDroppedBpsAvg, poOutCharmDroppedBpsAvg, poInFilteredBwthPercentAvg, poOutFilteredBwthPercentAvg, poInSynbacklogtallyAvg, poOutSynbacklogtallyAvg, poInConnectionAvg, poOutConnectionAvg, poInConnreqAvg, poOutConnreqAvg, poInActiveHttpGetsAvg, poOutActiveHttpGetsAvg, poInProtectBwthPktsAvg, poOutProtectBwthPktsAvg, poInFloodPktsAvg, poOutFloodPktsAvg, poInBlockedProtocolPktsAvg, poOutBlockedProtocolPktsAvg, poInBlockedStatePktsAvg, poOutBlockedStatePktsAvg, poInIpAttackPktsAvg, poOutIpAttackPktsAvg, poInTcpAttackPktsAvg, poOutTcpAttackPktsAvg, poInUdpAttackPktsAvg, poOutUdpAttackPktsAvg, poInIcmpAttackPktsAvg, poOutIcmpAttackPktsAvg, poInOtherIpAttackPktsAvg, poOutOtherIpAttackPktsAvg, poInFragmentAttackPktsAvg, poOutFragmentAttackPktsAvg, poInBadipPktsAvg, poOutBadipPktsAvg, poInBadTcpPktsAvg, poOutBadTcpPktsAvg, poInBadUdpPktsAvg, poOutBadUdpPktsAvg, poInBadIcmpPktsAvg, poOutBadIcmpPktsAvg, poInBadOtherIpPktsAvg, poOutBadOtherIpPktsAvg, poInOverloadedAvg, poOutOverloadedAvg, poInLatencyAvg, poOutLatencyAvg, poInTotalBpsMax, poOutTotalBpsMax, poInTotalPpsMax, poOutTotalPpsMax, poInSmallPpsMax, poOutSmallPpsMax, poInMediumPpsMax, poOutMediumPpsMax, poInLargePpsMax, poOutLargePpsMax, poInDroppedBpsMax, poOutDroppedBpsMax, poInDroppedPpsMax, poOutDroppedPpsMax, poInCharmDroppedBpsMax, poOutCharmDroppedBpsMax, poInFilteredBwthPercentMax, poOutFilteredBwthPercentMax, poInSynbacklogtallyMax, poOutSynbacklogtallyMax, poInConnectionMax, poOutConnectionMax, poInConnreqMax, poOutConnreqMax, poInActiveHttpGetsMax, poOutActiveHttpGetsMax, poInProtectBwthPktsMax, poOutProtectBwthPktsMax, poInFloodPktsMax, poOutFloodPktsMax, poInBlockedProtocolPktsMax, poOutBlockedProtocolPktsMax, poInBlockedStatePktsMax, poOutBlockedStatePktsMax, poInIpAttackPktsMax, poOutIpAttackPktsMax, poInTcpAttackPktsMax, poOutTcpAttackPktsMax, poInUdpAttackPktsMax, poOutUdpAttackPktsMax, poInIcmpAttackPktsMax, poOutIcmpAttackPktsMax, poInOtherIpAttackPktsMax, poOutOtherIpAttackPktsMax, poInFragmentAttackPktsMax, poOutFragmentAttackPktsMax, poInBadipPktsMax, poOutBadipPktsMax, poInBadTcpPktsMax, poOutBadTcpPktsMax, poInBadUdpPktsMax, poOutBadUdpPktsMax, poInBadIcmpPktsMax, poOutBadIcmpPktsMax, poInBadOtherIpPktsMax, poOutBadOtherIpPktsMax, poInOverloadedMax, poOutOverloadedMax, poInLatencyMax, poOutLatencyMax, poInTotalBytesCnt, poOutTotalBytesCnt, poInDroppedBytesCnt, poOutDroppedBytesCnt, poInCharmDroppedBytesCnt, poOutCharmDroppedBytesCnt, poInTotalPpsCnt, poOutTotalPpsCnt, poInSmallPpsCnt, poOutSmallPpsCnt, poInMediumPpsCnt, poOutMediumPpsCnt, poInLargePpsCnt, poOutLargePpsCnt, poInDroppedPpsCnt, poOutDroppedPpsCnt, poInFilteredBwthPercentCnt, poOutFilteredBwthPercentCnt, poInConnreqCnt, poOutConnreqCnt, poIncidentPortalName, poIncidentStart, poIncidentAddress, poIncidentType, poIncidentDirection, poIncidentPeakRate, poIncidentDropped } STATUS current DESCRIPTION "Configuration Group." ::= { ddossecure4MIBGroups 15 } prNotificationGroup NOTIFICATION-GROUP NOTIFICATIONS { prBandwidthOn, prBandwidthOff, prFloodOn, prFloodOff, prBlockedProtocolOn, prBlockedProtocolOff, prBlockedStateOn, prBlockedStateOff, prIpAttackOn, prIpAttackOff, prTcpAttackOn, prTcpAttackOff, prUdpAttackOn, prUdpAttackOff, prIcmpAttackOn, prIcmpAttackOff, prOtherIpAttackOn, prOtherIpAttackOff, prFragAttackOn, prFragAttackOff, prBadIpOn, prBadIpOff, prBadTcpOn, prBadTcpOff, prBadUdpOn, prBadUdpOff, prBadIcmpOn, prBadIcmpOff, prBadOtherIpOn, prBadOtherIpOff, prOverloadedOn, prOverloadedOff, apHaStateMode, apOutputErrorIIFlagOn, apOutputErrorIIFlagOff, apOutputErrorPIFlagOn, apOutputErrorPIFlagOff, apOutputErrorMIFlagOn, apOutputErrorMIFlagOff, apNewConfigFlagOn, apNewConfigFlagOff, apNotLicensedFlagOn, apNotLicensedFlagOff, apMacTableFullFlagOn, apMacTableFullFlagOff, apProtectedTableFullFlagOn, apProtectedTableFullFlagOff, apIncidentTableFullFlagOn, apIncidentTableFullFlagOff, apTcpTableFullFlagOn, apTcpTableFullFlagOff, apUdpTableFullFlagOn, apUdpTableFullFlagOff, apIcmpTableFullFlagOn, apIcmpTableFullFlagOff, apOtherIpTableFullFlagOn, apOtherIpTableFullFlagOff, apFragTableFullFlagOn, apFragTableFullFlagOff, apFtpTableFullFlagOn, apFtpTableFullFlagOff, apBlockedTableFullFlagOn, apBlockedTableFullFlagOff, apShortCircuitFlagOn, apShortCircuitFlagOff, apInternetIfDisconnectedFlagOn, apInternetIfDisconnectedFlagOff, apProtectedIfDisconnectedFlagOn, apProtectedIfDisconnectedFlagOff, apMgmtIfDisconnectedFlagOn, apMgmtIfDisconnectedFlagOff, apUpgradingFlagOn, apUpgradingFlagOff, apProtectedIfTrafficFlagOn, apProtectedIfTrafficFlagOff, apRoutingLoopFlagOn, apRoutingLoopFlagOff, apOfflineFlagOn, apOfflineFlagOff, apStateLearningFlagOn, apStateLearningFlagOff, apSupportExpiredFlagOn, apSupportExpiredFlagOff, apSevereLoadingFlagOn, apSevereLoadingFlagOff, apMacMisconfiguredFlagOn, apMacMisconfiguredFlagOff, apIfMisconfiguredFlagOn, apIfMisconfiguredFlagOff, apInternetIfLinkDownFlagOn, apInternetIfLinkDownFlagOff, apProtectedIfLinkDownFlagOn, apProtectedIfLinkDownFlagOff, apDatashareIfDisconnectedFlagOn, apDatashareIfDisconnectedFlagOff, apDiskFailingOn, apDiskFailingOff, apPsuFailingFlagOn, apPsuFailingFlagOff, apFanFailingFlagOn, apFanFailingFlagOff, apConfigXferFailFlagOn, apConfigXferFailFlagOff, apMissingRequiredPartnerFlagOn, apMissingRequiredPartnerFlagOff, apBgpMisconfiguredIpFlagOn, apBgpMisconfiguredIpFlagOff, prBandwidthLimitOn, prBandwidthLimitOff, prPacketLimitOn, prPacketLimitOff, prBlockedProtocolBlackListIpOn, prBlockedProtocolBlackListIpOff, prBlockedProtocolIcmpTypeOn, prBlockedProtocolIcmpTypeOff, prBlockedProtocolPortOn, prBlockedProtocolPortOff, prBlockedProtocolOtherOn, prBlockedProtocolOtherOff, prUnknownSessionIcmpRespOn, prUnknownSessionIcmpRespOff, prUnknownSessionIcmpDiagRespOn, prUnknownSessionIcmpDiagRespOff, prUnknownSessionNoStateOn, prUnknownSessionNoStateOff, prUnknownSessionInvalidStateOn, prUnknownSessionInvalidStateOff, prTcpAttackRstOn, prTcpAttackRstOff, prIpAttackLandOn, prIpAttackLandOff, prTcpAttackSynAckToOn, prTcpAttackSynAckToOff, prBlockedProtocolCountryOn, prBlockedProtocolCountryOff, prTcpAttackSynFloodOn, prTcpAttackSynFloodOff, prTcpAttackConnFloodOn, prTcpAttackConnFloodOff, prTcpAttackTableFullOn, prTcpAttackTableFullOff, prBadTcpFastAckOn, prBadTcpFastAckOff, prTcpAttackHttpFloodOn, prTcpAttackHttpFloodOff, prUdpAttackTableFullOn, prUdpAttackTableFullOff, prTcpAttackHttpTimeoutOn, prTcpAttackHttpTimeoutOff, prIcmpAttackRepeatsOn, prIcmpAttackRepeatsOff, prIcmpAttackTableFullOn, prIcmpAttackTableFullOff, prOtherIpAttackTableFullOn, prOtherIpAttackTableFullOff, prFragAttackPingOfDeathOn, prFragAttackPingOfDeathOff, prFragAttackHeadOverlayOn, prFragAttackHeadOverlayOff, prFragAttackTableFullOn, prFragAttackTableFullOff, prFragAttackSmallSizeOn, prFragAttackSmallSizeOff, prFragAttackNoFragsAllowedOn, prFragAttackNoFragsAllowedOff, prBadIpSrcAddrOn, prBadIpSrcAddrOff, prBadIpHeaderOn, prBadIpHeaderOff, prBadIpOptionOn, prBadIpOptionOff, prBadIpSizeOn, prBadIpSizeOff, prBlockedProtocolTmpBlackListOn, prBlockedProtocolTmpBlackListOff, prBadTcpFlagsOn, prBadTcpFlagsOff, prBadTcpMalformedOn, prBadTcpMalformedOff, prBadTcpOptionOn, prBadTcpOptionOff, prBlockedProtocolDnsOn, prBlockedProtocolDnsOff, prBadUdpNoDataOn, prBadUdpNoDataOff, prBadUdpMalformedOn, prBadUdpMalformedOff, prBlockedProtocolAsOn, prBlockedProtocolAsOff, ptTcpAttackHttpRateFloodOn, ptTcpAttackHttpRateFloodOff, prBadIcmpMalformedOn, prBadIcmpMalformedOff, prBlockedProtocolUrlOn, prBlockedProtocolUrlOff, prBadOtherIpProtocolOn, prBadOtherIpProtocolOff, prBadOtherIpLengthOn, prBadOtherIpLengthOff, prTcpAttackHttpIncompleteOn, prTcpAttackHttpIncompleteOff, prOverloadedStallOn, prOverloadedStallOff, prFragAttackTimeOutOn, prFragAttackTimeOutOff, prFragAttackRepeatsOn, prFragAttackRepeatsOff, prFragAttackBadLengthOn, prFragAttackBadLengthOff, prOverloadedBacklogOn, prOverloadedBacklogOff, prBlockedProtocolAddressOn, prBlockedProtocolAddressOff, prTcpAttackNoDataOn, prTcpAttackNoDataOff, prTcpAttackNoServerDataOn, prTcpAttackNoServerDataOff, prTcpAttackConnRateFloodOn, prTcpAttackConnRateFloodOff, prOverloadedThreadsOn, prOverloadedThreadsOff, prBadIpReflectedRouteOn, prBadIpReflectedRouteOff, prTcpAttackPortScanOn, prTcpAttackPortScanOff, prTcpAttackSmallWindowOn, prTcpAttackSmallWindowOff, prTcpAttackClientAbortOn, prTcpAttackClientAbortOff, prBlockedProtocolSipOn, prBlockedProtocolSipOff, prTcpAttackUrlRateLimitOn, prTcpAttackUrlRateLimitOff, prUdpAttackDnsRateLimitOn, prUdpAttackDnsRateLimitOff, prUdpAttackSipRateLimitOn, prUdpAttackSipRateLimitOff, prBadTcpChecksumOn, prBadTcpChecksumOff, prTcpAttackHttpFormatOn, prTcpAttackHttpFormatOff, prUnknownSessionReflectiveOn, prUnknownSessionReflectiveOff } STATUS current DESCRIPTION "Notification Group." ::= { ddossecure4MIBGroups 100 } deprecatedNotificationGroup NOTIFICATION-GROUP NOTIFICATIONS { apOutputErrorIIEvent, apOutputErrorPIEvent, apOutputErrorMIEvent, apNewConfigEvent, apNotLicensedEvent, apMacTableFullEvent, apProtectedTableFullEvent, apIncidentTableFullEvent, apTcpTableFullEvent, apUdpTableFullEvent, apIcmpTableFullEvent, apOtherIpTableFullEvent, apFragTableFullEvent, apFtpTableFullEvent, apBlockedTableFullEvent, apShortCircuitEvent, apInternetIfDisconnectedEvent, apProtectedIfDisconnectedEvent, apMgmtIfDisconnectedEvent, apUpgradingEvent, apProtectedIfTrafficEvent, apRoutingLoopEvent, apOfflineEvent, apStateLearningEvent, apSupportExpiredEvent, apSevereLoadingEvent, apMacMisconfiguredEvent, apIfMisconfiguredEvent, apInternetIfLinkDownEvent, apProtectedIfLinkDownEvent, apDatashareIfDisconnectedEvent, apHaStateEvent, prBandwidthEvent, prFloodEvent, prBlockedProtocolEvent, prBlockedStateEvent, prIpAttackEvent, prTcpAttackEvent, prUdpAttackEvent, prIcmpAttackEvent, prOtherIpAttackEvent, prFragAttackEvent, prBadIpEvent, prBadTcpEvent, prBadUdpEvent, prBadIcmpEvent, prBadOtherIpEvent, prOverloadedEvent } STATUS deprecated DESCRIPTION "Notification Group." ::= { ddossecure4MIBGroups 101 } END