Observium_CE/mibs/hh3c/HH3C-PORTATK-TRAP-MIB

252 lines
6.7 KiB
Plaintext

-- ============================================================================
-- Copyright (c) 2004-2022 New H3C Tech. Co., Ltd. All rights reserved.
--
-- Description: The purpose of this MIB file is to provide the definition of
-- the portatk trap.
-- Reference:
-- Version: V1.0
-- History:
-- V1.0 2022-09-02
-- Initial version, created by shaojunjun
-- ============================================================================
HH3C-PORTATK-TRAP-MIB DEFINITIONS ::= BEGIN
IMPORTS
hh3cCommon
FROM HH3C-OID-MIB
DisplayString
FROM SNMPv2-TC
OBJECT-TYPE, MODULE-IDENTITY, NOTIFICATION-TYPE
FROM SNMPv2-SMI;
-- Node definitions
hh3cPortAtkTrap MODULE-IDENTITY
LAST-UPDATED "202209011800Z" -- Sep 2, 2022 at 18:00 GMT
ORGANIZATION
"New H3C Technologies Co., Ltd."
CONTACT-INFO
"Platform Team New H3C Technologies Co., Ltd.
Hai-Dian District Beijing P.R. China
http://www.h3c.com
Zip: 100085"
DESCRIPTION
"This MIB file defines the port attack trap warning feature only."
REVISION "202209011800Z"
DESCRIPTION
"The initial version of this MIB file."
::= { hh3cCommon 250}
-- hh3cPortAtkTrapPacket
hh3cPortAtkTrapPacket OBJECT IDENTIFIER ::= { hh3cPortAtkTrap 0 }
hh3cPortAtkTrapPtkAlarm NOTIFICATION-TYPE
OBJECTS
{
hh3cPortAtkTrapPacketIf,
hh3cPortAtkTrapPacketType
}
STATUS current
DESCRIPTION
"If the protocol packet sending rate on a port exceeded the rate limit,
a trap message is generated and sent to the remote monitoring device."
::= { hh3cPortAtkTrapPacket 1 }
hh3cPortAtkTrapPtkResume NOTIFICATION-TYPE
OBJECTS
{
hh3cPortAtkTrapPacketIf,
hh3cPortAtkTrapPacketType
}
STATUS current
DESCRIPTION
"If the protocol packet sending rate on a port dropped below the rate limit,
a trap message is generated and sent to the remote monitoring device."
::= { hh3cPortAtkTrapPacket 2 }
hh3cPortAtkTrapPtkObjs OBJECT IDENTIFIER ::= { hh3cPortAtkTrap 1 }
hh3cPortAtkTrapPacketIf OBJECT-TYPE
SYNTAX DisplayString(SIZE (0..255))
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Interface that received the protocol packets."
::= { hh3cPortAtkTrapPtkObjs 1}
hh3cPortAtkTrapPacketType OBJECT-TYPE
SYNTAX INTEGER
{
isis(1),
esis(2),
clnp(3),
vrrp(4),
unknownIpv4Mc(5),
unknownIpv6Mc(6),
ipv4McastRip(7),
ipv4BcastRip(8),
mcastNtp(9),
bcastNtp(10),
ipv4McastOspfDip5(11),
ipv4McastOspfDip6(12),
ipv4UcastOspf(13),
ipv4McastPim(14),
ipv4UcastPim(15),
ipv4Igmp(16),
ucastLdp(17),
ipv6McastPim(18),
ipv6UcastPim(19),
ipv6Mld(20),
ipv6Ripng(21),
ipv6UcastOspfv3(22),
ipv6McastOspfv3Dip5(23),
ipv6McastOspfv3Dip6(24),
ipv6Ldp(25),
ipv6Vrrp(26),
rrpp(27),
ipv4Autorp(28),
dot1x(29),
stp(30),
lacp(31),
gvrp(32),
hgmp(33),
ucastBgp(34),
ucastIcmp(35),
ucastTtl(36),
ucastIpOption(37),
ipv6Bgp(38),
ipv6NdPass(39),
ipv6NdDest(40),
lldp(41),
dldp(42),
bpduTunnelDmac3(43),
bpduTunnelDmac0(44),
bpduTunnelDmac1(45),
bpduTunnelDmac2(46),
msdp(47),
telnetSsh(48),
httpHttps(49),
snmp(50),
smlk(51),
dot1ag(52),
cdp(53),
acsei(54),
ucastNtp(55),
md(56),
ipv4UcDhcp(57),
ipv4UcOspfTtl(58),
ipv4UcPimTtl(59),
ipv6Icmp(60),
gmrp(61),
pvst(62),
oam(63),
hgmpBc(64),
eapolBridgemac(65),
wpiBridgemac(66),
cfdBridgemac(67),
hgmpBridgemac(68),
acseiBridgemac(69),
ipv6DhcpUcClient(70),
ipv6DhcpUcRelay(71),
l2Stationmove(72),
icmpRdm(73),
ipv6CpudstCar(74),
ptp(75),
fcoeFipUc(76),
fcoeToCpu(77),
ipv6UcastRtrenum(78),
ipv6McastRtrenum(79),
ipv6UcastNtp(80),
ipv6McastNtp(81),
trillAllisis(82),
drcp(83),
rlinkHigh(84),
rlinkMiddle(85),
vdp(86),
ipv4McastCbt(87),
arp(88),
arpReply(89),
ipv6Ttl(90),
ipv6Ping(91),
snapCis(92),
macBasevlan(93),
trillStp(94),
routeToCpuMask(95),
spbm(96),
ipv6IpOption(97),
ipv4UcBgpTtl(98),
dhcpClient(99),
dhcpServer(100),
dhcpRelayClient(101),
dhcpRelayServer(102),
ipv6Dhcp(103),
ipv6DhcpClient(104),
ipv6DhcpServer(105),
ipv6DhcpRelayServer(106),
bfdEcho(107),
bfdCtrl(108),
bfdMultihop(109),
bfdIntfCtrl(110),
lspPing(111),
loopbackDetection(112),
loopTest(113),
ipv6TelnetSsh(114),
mplsRsvp(115),
rrppFd(116),
ptpUdp(117),
ofpMiss(118),
ofpMatch(119),
ofpDevconfTtl(120),
ofpMacipMiss(121),
ftpCtrl(122),
vxlanUdp(123),
capwap(124),
rlinkextNormal(125),
rlinkextMiddle(126),
rlinkextHigh(127),
ipv4Siph225(128),
ipv4Siph245(129),
typeErps(130),
esmc(131),
rlinkNormal(132),
onvifv4(133),
onvifv6(134),
ipv4Sip(135),
twamp(136),
pppoe(137),
ipv6RaGuard(138),
tcpToCpuLow(139),
ipv4BcmpServer(140),
wlanAcToCpu(141),
lwappAcToCpu(142),
smartmcUc(143),
smartmcBc(144),
rlinkLow(145),
drniUdp(146),
sipSnooping(147),
douPsg(148),
h323Snooping(149),
mdns(150),
erps(151),
sadp(152),
dhcpProtectionClient(153),
dhcpProtectionServer(154),
bfdMultihopVxlan(155),
rarp(156),
inof(157),
inofMobile(158),
ipv6UcBgpTtl(159),
ipv4McastOspf5High(160),
ipv4McastOspf6High(161),
ipv6Drcp(162),
l2ptusr(163),
rarpReply(164)
}
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Type of the protocol packets received on the port."
::= { hh3cPortAtkTrapPtkObjs 2}
END