12302 lines
318 KiB
Plaintext
12302 lines
318 KiB
Plaintext
--
|
|
-- Copyright (C) 2000-2005 Webscreen Technology Ltd
|
|
-- Copyright (C) 2005-2013 Webscreen Systems Ltd
|
|
-- Copyright (C) 2013-2014 Juniper Networks, Inc.
|
|
--
|
|
-- For a manager to use it, it must be copied to /usr/share/snmp/mibs as
|
|
-- DDOSSECURE4-MIB.txt
|
|
-- and MIBS must be defined as "+DDOSSECURE4-MIB" in the environment
|
|
|
|
-- * ddossecure4
|
|
|
|
DDOSSECURE4-MIB DEFINITIONS ::= BEGIN
|
|
|
|
IMPORTS
|
|
MODULE-IDENTITY, OBJECT-TYPE, OBJECT-IDENTITY, NOTIFICATION-TYPE,
|
|
enterprises, Gauge32, IpAddress, Integer32, Counter32, Counter64
|
|
FROM SNMPv2-SMI
|
|
|
|
TEXTUAL-CONVENTION, DisplayString,
|
|
TruthValue, TimeInterval, DateAndTime
|
|
FROM SNMPv2-TC
|
|
|
|
MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP
|
|
FROM SNMPv2-CONF
|
|
|
|
InetAddress, InetAddressType
|
|
FROM INET-ADDRESS-MIB;
|
|
|
|
ddossecure4MIB MODULE-IDENTITY
|
|
LAST-UPDATED
|
|
"201404250000Z" -- April 25, 2014
|
|
ORGANIZATION
|
|
"Juniper Networks, Inc."
|
|
CONTACT-INFO
|
|
"postal: Juniper Technical Assistance Center
|
|
Juniper Networks, Inc.
|
|
1194 N. Mathilda Avenue
|
|
Sunnyvale, CA 94089
|
|
USA
|
|
email: support@juniper.net"
|
|
DESCRIPTION
|
|
"The DDoS Secure MIB version 4."
|
|
REVISION
|
|
"201404250000Z" -- April 25, 2014
|
|
DESCRIPTION
|
|
"Update variable names to reflect current naming"
|
|
REVISION
|
|
"201311010000Z" -- November 01, 2013
|
|
DESCRIPTION
|
|
"We are now Juniper. Replace Webscreen with DDoS Secure as appropriate"
|
|
REVISION
|
|
"201202170000Z" -- February 17, 2012
|
|
DESCRIPTION
|
|
"Fix confusion over bits and bytes."
|
|
REVISION
|
|
"201109260000Z" -- September 26, 2011
|
|
DESCRIPTION
|
|
"Current revision for code releases 3.2.4-2 / 4.0.2-2 or later.
|
|
Support for ipv4 and ipv6.
|
|
Complete tree re-organization.
|
|
This MIB replaces version 3."
|
|
::= { enterprises webscreen-technology(11068) products(1) 4 }
|
|
|
|
jddsAppliance OBJECT IDENTIFIER ::= { ddossecure4MIB 4 }
|
|
|
|
jddsPortal OBJECT IDENTIFIER ::= { ddossecure4MIB 5 }
|
|
|
|
jddsProtected OBJECT IDENTIFIER ::= { ddossecure4MIB 6 }
|
|
|
|
jddsGatewayInternet OBJECT IDENTIFIER ::= { ddossecure4MIB 7 }
|
|
|
|
jddsGatewayProtected OBJECT IDENTIFIER ::= { ddossecure4MIB 8 }
|
|
|
|
DefenseType ::= TEXTUAL-CONVENTION
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Type of Attack"
|
|
SYNTAX INTEGER {
|
|
bandWidth(1),
|
|
flood(2),
|
|
blockedProtocol(3),
|
|
blockedState(4),
|
|
ipAttack(5),
|
|
tcpAttack(6),
|
|
udpAttack(7),
|
|
icmpAttack(8),
|
|
otherIpAttack(9),
|
|
fragmentAttack(10),
|
|
badIpPacket(11),
|
|
badTcpPacket(12),
|
|
badUdpPacket(13),
|
|
badIcmpPacket(14),
|
|
badOtherIpPacket(15),
|
|
overloadedProtectedIP(16)
|
|
}
|
|
|
|
Direction ::= TEXTUAL-CONVENTION
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Packet direction"
|
|
SYNTAX INTEGER {
|
|
outbound(1),
|
|
inbound(2)
|
|
}
|
|
|
|
LocalIndex ::= TEXTUAL-CONVENTION
|
|
DISPLAY-HINT "d"
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A unique value, greater than zero, for each entry."
|
|
SYNTAX Integer32 (1..2147483647)
|
|
|
|
|
|
-- ### Appliance settings ###
|
|
|
|
|
|
apConfig OBJECT IDENTIFIER ::= { jddsAppliance 1 }
|
|
|
|
|
|
apInterfaces OBJECT IDENTIFIER ::= { apConfig 1 }
|
|
|
|
|
|
apManagement OBJECT IDENTIFIER ::= { apInterfaces 1 }
|
|
|
|
apMgmtIfIpAddress OBJECT-TYPE
|
|
SYNTAX IpAddress
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address of the appliance management interface"
|
|
::= { apManagement 1 }
|
|
|
|
apMgmtIfNetmask OBJECT-TYPE
|
|
SYNTAX IpAddress
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Netmask of the appliance management interface"
|
|
::= { apManagement 2 }
|
|
|
|
apMgmtIfGwIpAddress OBJECT-TYPE
|
|
SYNTAX IpAddress
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Gateway IP address of the appliance management interface"
|
|
::= { apManagement 3 }
|
|
|
|
apMgmtIfLinkMode OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Speed and duplex of the appliance management interface"
|
|
::= { apManagement 4 }
|
|
|
|
apMgmtIfLinkFC OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Flow Control configuration of the appliance management interface"
|
|
::= { apManagement 5 }
|
|
|
|
apMgmtIfName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Underlying interface name of the appliance management interface"
|
|
::= { apManagement 6 }
|
|
|
|
|
|
apInternet OBJECT IDENTIFIER ::= { apInterfaces 2 }
|
|
|
|
apIntIfLinkMode OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Speed and duplex of the appliance internet interface"
|
|
::= { apInternet 1 }
|
|
|
|
apIntIfLinkFC OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Flow Control configuration of the appliance internet interface"
|
|
::= { apInternet 2 }
|
|
|
|
apIntIfName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Underlying interface name(s) of the appliance internet interface"
|
|
::= { apInternet 3 }
|
|
|
|
|
|
apProtectedInterface OBJECT IDENTIFIER ::= { apInterfaces 3 }
|
|
|
|
apProtIfLinkMode OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Speed and duplex of the appliance Protected Interface"
|
|
::= { apProtectedInterface 1 }
|
|
|
|
apProtIfLinkFC OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Flow Control configuration of the appliance Protected Interface"
|
|
::= { apProtectedInterface 2 }
|
|
|
|
apProtIfName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Underlying interface name(s) of the appliance Protected Interface"
|
|
::= { apProtectedInterface 3 }
|
|
|
|
|
|
apDataShare OBJECT IDENTIFIER ::= { apInterfaces 4 }
|
|
|
|
apDataIfIpAddress OBJECT-TYPE
|
|
SYNTAX IpAddress
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address of the appliance data share interface"
|
|
::= { apDataShare 1 }
|
|
|
|
apDataIfNetmask OBJECT-TYPE
|
|
SYNTAX IpAddress
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Netmask of the appliance data share interface"
|
|
::= { apDataShare 2 }
|
|
|
|
apDataIfLinkMode OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Speed and duplex of the appliance data share interface"
|
|
::= { apDataShare 3 }
|
|
|
|
apDataIfLinkFC OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Flow Control configuration of the appliance data share interface"
|
|
::= { apDataShare 4 }
|
|
|
|
apDataIfName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Underlying interface name of the appliance data share interface"
|
|
::= { apDataShare 5 }
|
|
|
|
|
|
-- **** apAccess
|
|
|
|
|
|
apAccess OBJECT IDENTIFIER ::= { apConfig 2 }
|
|
|
|
apUserTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF ApUserEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of user entries with permission on appliance"
|
|
::= { apAccess 1 }
|
|
|
|
apUserEntry OBJECT-TYPE
|
|
SYNTAX ApUserEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row consisting of a record for a particular user"
|
|
INDEX { apUserId }
|
|
::= { apUserTable 1 }
|
|
|
|
ApUserEntry ::= SEQUENCE {
|
|
apUserId LocalIndex,
|
|
apUserName DisplayString,
|
|
apUserPermissions DisplayString
|
|
}
|
|
|
|
apUserId OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique ID number for this user"
|
|
::= { apUserEntry 1 }
|
|
|
|
apUserName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The name associated with this user"
|
|
::= { apUserEntry 2 }
|
|
|
|
apUserPermissions OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The permissions associated with this user"
|
|
::= { apUserEntry 3 }
|
|
|
|
-- ***** snmp
|
|
|
|
apSnmpAccessIpList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma-separated list of IP addresses allowed to make SNMP queries"
|
|
::= { apAccess 3 }
|
|
|
|
apHttpsAccessIpList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma-separated list of IP addresses allowed to connect via HTTPS"
|
|
::= { apAccess 4 }
|
|
|
|
apSshAccessIpList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma-separated list of IP addresses allowed to connect via SSH"
|
|
::= { apAccess 5 }
|
|
|
|
|
|
apLogging OBJECT IDENTIFIER ::= { apConfig 3 }
|
|
|
|
apSyslogServer OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ASCII comma-separated list of IP addresses to receive remote syslog for appliance logs"
|
|
::= { apLogging 1 }
|
|
|
|
apSyslogFacility OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Syslog facility name for appliance logs"
|
|
::= { apLogging 2 }
|
|
|
|
apSyslogPriority OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Syslog priority name for appliance logs"
|
|
::= { apLogging 3 }
|
|
|
|
apWebtrendsServer OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ASCII comma-separated list of IP addresses to receive remote webtrends logs"
|
|
::= { apLogging 4 }
|
|
|
|
apWebtrendsFacility OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Webtrends facility name"
|
|
::= { apLogging 5 }
|
|
|
|
apWebtrendsPriority OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Webtrends priority name"
|
|
::= { apLogging 6 }
|
|
|
|
|
|
apCreateIncidentsThreshold OBJECT IDENTIFIER ::= { apLogging 7 }
|
|
|
|
apBandwidthCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for bandwidth defense info"
|
|
::= { apCreateIncidentsThreshold 1 }
|
|
|
|
apBandwidthCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for bandwidth defense info"
|
|
::= { apCreateIncidentsThreshold 2 }
|
|
|
|
apFloodCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for flood defense info"
|
|
::= { apCreateIncidentsThreshold 3 }
|
|
|
|
apFloodCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for flood defense info"
|
|
::= { apCreateIncidentsThreshold 4 }
|
|
|
|
apBlockedProtoCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for blocked Protocol defense info"
|
|
::= { apCreateIncidentsThreshold 5 }
|
|
|
|
apBlockedProtoCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for blocked Protocol defense info"
|
|
::= { apCreateIncidentsThreshold 6 }
|
|
|
|
apBlockedStateCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for blocked state defense info"
|
|
::= { apCreateIncidentsThreshold 7 }
|
|
|
|
apBlockedStateCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for blocked state defense info"
|
|
::= { apCreateIncidentsThreshold 8 }
|
|
|
|
apIpAttackCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for IP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 9 }
|
|
|
|
apIpAttackCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for IP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 10 }
|
|
|
|
apTcpAttackCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for TCP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 11 }
|
|
|
|
apTcpAttackCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for TCP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 12 }
|
|
|
|
apUdpAttackCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for UDP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 13 }
|
|
|
|
apUdpAttackCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for UDP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 14 }
|
|
|
|
apIcmpAttackCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for ICMP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 15 }
|
|
|
|
apIcmpAttackCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for ICMP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 16 }
|
|
|
|
apOtherIpAttackCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for other IP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 17 }
|
|
|
|
apOtherIpAttackCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for other IP Attack defense info"
|
|
::= { apCreateIncidentsThreshold 18 }
|
|
|
|
apFragAttackCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for fragment Attack defense info"
|
|
::= { apCreateIncidentsThreshold 19 }
|
|
|
|
apFragAttackCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for fragment Attack defense info"
|
|
::= { apCreateIncidentsThreshold 20 }
|
|
|
|
apBadIpCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for bad IP defense info"
|
|
::= { apCreateIncidentsThreshold 21 }
|
|
|
|
apBadIpCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for bad IP defense info"
|
|
::= { apCreateIncidentsThreshold 22 }
|
|
|
|
apBadTcpCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for bad TCP defense info"
|
|
::= { apCreateIncidentsThreshold 23 }
|
|
|
|
apBadTcpCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for bad TCP defense info"
|
|
::= { apCreateIncidentsThreshold 24 }
|
|
|
|
apBadUdpCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for bad UDP defense info"
|
|
::= { apCreateIncidentsThreshold 25 }
|
|
|
|
apBadUdpCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for bad UDP defense info"
|
|
::= { apCreateIncidentsThreshold 26 }
|
|
|
|
apBadIcmpCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for bad ICMP defense info"
|
|
::= { apCreateIncidentsThreshold 27 }
|
|
|
|
apBadIcmpCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for bad ICMP defense info"
|
|
::= { apCreateIncidentsThreshold 28 }
|
|
|
|
apBadOtherIpCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for bad other IP defense info"
|
|
::= { apCreateIncidentsThreshold 29 }
|
|
|
|
apBadOtherIpCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for bad other IP defense info"
|
|
::= { apCreateIncidentsThreshold 30 }
|
|
|
|
apOverloadedIpCreateThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold enabled on/off for overloaded protected IP info"
|
|
::= { apCreateIncidentsThreshold 31 }
|
|
|
|
apOverloadedIpCreateThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Create Incident threshold rate for overloaded protected IP info"
|
|
::= { apCreateIncidentsThreshold 32 }
|
|
|
|
|
|
apViewIncidentsThresholds OBJECT IDENTIFIER ::= { apLogging 8 }
|
|
|
|
apBandwidthViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for bandwidth defense info"
|
|
::= { apViewIncidentsThresholds 1 }
|
|
|
|
apBandwidthViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for bandwidth defense info"
|
|
::= { apViewIncidentsThresholds 2 }
|
|
|
|
apFloodViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for flood defense info"
|
|
::= { apViewIncidentsThresholds 3 }
|
|
|
|
apFloodViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for flood defense info"
|
|
::= { apViewIncidentsThresholds 4 }
|
|
|
|
apBlockedProtoViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for blocked Protocol defense info"
|
|
::= { apViewIncidentsThresholds 5 }
|
|
|
|
apBlockedProtoViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for blocked Protocol defense info"
|
|
::= { apViewIncidentsThresholds 6 }
|
|
|
|
apBlockedStateViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for blocked state defense info"
|
|
::= { apViewIncidentsThresholds 7 }
|
|
|
|
apBlockedStateViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for blocked state defense info"
|
|
::= { apViewIncidentsThresholds 8 }
|
|
|
|
apIpAttackViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for IP Attack defense info"
|
|
::= { apViewIncidentsThresholds 9 }
|
|
|
|
apIpAttackViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for IP Attack defense info"
|
|
::= { apViewIncidentsThresholds 10 }
|
|
|
|
apTcpAttackViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for TCP Attack defense info"
|
|
::= { apViewIncidentsThresholds 11 }
|
|
|
|
apTcpAttackViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for TCP Attack defense info"
|
|
::= { apViewIncidentsThresholds 12 }
|
|
|
|
apUdpAttackViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for UDP Attack defense info"
|
|
::= { apViewIncidentsThresholds 13 }
|
|
|
|
apUdpAttackViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for UDP Attack defense info"
|
|
::= { apViewIncidentsThresholds 14 }
|
|
|
|
apIcmpAttackViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for ICMP Attack defense info"
|
|
::= { apViewIncidentsThresholds 15 }
|
|
|
|
apIcmpAttackViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for ICMP Attack defense info"
|
|
::= { apViewIncidentsThresholds 16 }
|
|
|
|
apOtherIpAttackViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for other IP Attack defense info"
|
|
::= { apViewIncidentsThresholds 17 }
|
|
|
|
apOtherIpAttackViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for other IP Attack defense info"
|
|
::= { apViewIncidentsThresholds 18 }
|
|
|
|
apFragAttackViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for fragment Attack defense info"
|
|
::= { apViewIncidentsThresholds 19 }
|
|
|
|
apFragAttackViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for fragment Attack defense info"
|
|
::= { apViewIncidentsThresholds 20 }
|
|
|
|
apBadIpViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for bad IP defense info"
|
|
::= { apViewIncidentsThresholds 21 }
|
|
|
|
apBadIpViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for bad IP defense info"
|
|
::= { apViewIncidentsThresholds 22 }
|
|
|
|
apBadTcpViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for bad TCP defense info"
|
|
::= { apViewIncidentsThresholds 23 }
|
|
|
|
apBadTcpViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for bad TCP defense info"
|
|
::= { apViewIncidentsThresholds 24 }
|
|
|
|
apBadUdpViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for bad UDP defense info"
|
|
::= { apViewIncidentsThresholds 25 }
|
|
|
|
apBadUdpViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for bad UDP defense info"
|
|
::= { apViewIncidentsThresholds 26 }
|
|
|
|
apBadIcmpViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for bad ICMP defense info"
|
|
::= { apViewIncidentsThresholds 27 }
|
|
|
|
apBadIcmpViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for bad ICMP defense info"
|
|
::= { apViewIncidentsThresholds 28 }
|
|
|
|
apBadOtherIpViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for bad other IP defense info"
|
|
::= { apViewIncidentsThresholds 29 }
|
|
|
|
apBadOtherIpViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for bad other IP defense info"
|
|
::= { apViewIncidentsThresholds 30 }
|
|
|
|
apOverloadedIpViewThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold enabled on/off for overloaded protected IP info"
|
|
::= { apViewIncidentsThresholds 31 }
|
|
|
|
apOverloadedIpViewThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"View Incidents threshold rate for overloaded protected IP info"
|
|
::= { apViewIncidentsThresholds 32 }
|
|
|
|
|
|
apWOffenderLogThreshold OBJECT IDENTIFIER ::= { apLogging 9 }
|
|
|
|
apBandwidthOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for bandwidth defense info"
|
|
::= { apWOffenderLogThreshold 1 }
|
|
|
|
apBandwidthOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for bandwidth defense info"
|
|
::= { apWOffenderLogThreshold 2 }
|
|
|
|
apFloodOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for flood defense info"
|
|
::= { apWOffenderLogThreshold 3 }
|
|
|
|
apFloodOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for flood defense info"
|
|
::= { apWOffenderLogThreshold 4 }
|
|
|
|
apBlockedProtoOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for blocked Protocol defense info"
|
|
::= { apWOffenderLogThreshold 5 }
|
|
|
|
apBlockedProtoOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for blocked Protocol defense info"
|
|
::= { apWOffenderLogThreshold 6 }
|
|
|
|
apBlockedStateOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for blocked state defense info"
|
|
::= { apWOffenderLogThreshold 7 }
|
|
|
|
apBlockedStateOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for blocked state defense info"
|
|
::= { apWOffenderLogThreshold 8 }
|
|
|
|
apIpAttackOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for IP Attack defense info"
|
|
::= { apWOffenderLogThreshold 9 }
|
|
|
|
apIpAttackOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for IP Attack defense info"
|
|
::= { apWOffenderLogThreshold 10 }
|
|
|
|
apTcpAttackOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for TCP Attack defense info"
|
|
::= { apWOffenderLogThreshold 11 }
|
|
|
|
apTcpAttackOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for TCP Attack defense info"
|
|
::= { apWOffenderLogThreshold 12 }
|
|
|
|
apUdpAttackOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for UDP Attack defense info"
|
|
::= { apWOffenderLogThreshold 13 }
|
|
|
|
apUdpAttackOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for UDP Attack defense info"
|
|
::= { apWOffenderLogThreshold 14 }
|
|
|
|
apIcmpAttackOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for ICMP Attack defense info"
|
|
::= { apWOffenderLogThreshold 15 }
|
|
|
|
apIcmpAttackOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for ICMP Attack defense info"
|
|
::= { apWOffenderLogThreshold 16 }
|
|
|
|
apOtherIpAttackOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for other IP Attack defense info"
|
|
::= { apWOffenderLogThreshold 17 }
|
|
|
|
apOtherIpAttackOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for other IP Attack defense info"
|
|
::= { apWOffenderLogThreshold 18 }
|
|
|
|
apFragAttackOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for fragment Attack defense info"
|
|
::= { apWOffenderLogThreshold 19 }
|
|
|
|
apFragAttackOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for fragment Attack defense info"
|
|
::= { apWOffenderLogThreshold 20 }
|
|
|
|
apBadIpOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for bad IP defense info"
|
|
::= { apWOffenderLogThreshold 21 }
|
|
|
|
apBadIpOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for bad IP defense info"
|
|
::= { apWOffenderLogThreshold 22 }
|
|
|
|
apBadTcpOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for bad TCP defense info"
|
|
::= { apWOffenderLogThreshold 23 }
|
|
|
|
apBadTcpOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for bad TCP defense info"
|
|
::= { apWOffenderLogThreshold 24 }
|
|
|
|
apBadUdpOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for bad UDP defense info"
|
|
::= { apWOffenderLogThreshold 25 }
|
|
|
|
apBadUdpOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for bad UDP defense info"
|
|
::= { apWOffenderLogThreshold 26 }
|
|
|
|
apBadIcmpOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for bad ICMP defense info"
|
|
::= { apWOffenderLogThreshold 27 }
|
|
|
|
apBadIcmpOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for bad ICMP defense info"
|
|
::= { apWOffenderLogThreshold 28 }
|
|
|
|
apBadOtherIpOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Offenders logging threshold enabled on/off for bad other IP defense info"
|
|
::= { apWOffenderLogThreshold 29 }
|
|
|
|
apBadOtherIpOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for bad other IP defense info"
|
|
::= { apWOffenderLogThreshold 30 }
|
|
|
|
apOverloadedIpOffThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold enabled on/off for overloaded protected IP info"
|
|
::= { apWOffenderLogThreshold 31 }
|
|
|
|
apOverloadedIpOffThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Worst Offenders logging threshold rate for overloaded protected IP info"
|
|
::= { apWOffenderLogThreshold 32 }
|
|
|
|
|
|
apIncidentAlertThreshold OBJECT IDENTIFIER ::= { apLogging 10 }
|
|
|
|
apBandwidthAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for bandwidth defense info"
|
|
::= { apIncidentAlertThreshold 1 }
|
|
|
|
apBandwidthAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for bandwidth defense info"
|
|
::= { apIncidentAlertThreshold 2 }
|
|
|
|
apFloodAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for flood defense info"
|
|
::= { apIncidentAlertThreshold 3 }
|
|
|
|
apFloodAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for flood defense info"
|
|
::= { apIncidentAlertThreshold 4 }
|
|
|
|
apBlockedProtoAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for blocked Protocol defense info"
|
|
::= { apIncidentAlertThreshold 5 }
|
|
|
|
apBlockedProtoAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for blocked Protocol defense info"
|
|
::= { apIncidentAlertThreshold 6 }
|
|
|
|
apBlockedStateAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for blocked state defense info"
|
|
::= { apIncidentAlertThreshold 7 }
|
|
|
|
apBlockedStateAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for blocked state defense info"
|
|
::= { apIncidentAlertThreshold 8 }
|
|
|
|
apIpAttackAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for IP Attack defense info"
|
|
::= { apIncidentAlertThreshold 9 }
|
|
|
|
apIpAttackAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for IP Attack defense info"
|
|
::= { apIncidentAlertThreshold 10 }
|
|
|
|
apTcpAttackAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for TCP Attack defense info"
|
|
::= { apIncidentAlertThreshold 11 }
|
|
|
|
apTcpAttackAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for TCP Attack defense info"
|
|
::= { apIncidentAlertThreshold 12 }
|
|
|
|
apUdpAttackAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for UDP Attack defense info"
|
|
::= { apIncidentAlertThreshold 13 }
|
|
|
|
apUdpAttackAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for UDP Attack defense info"
|
|
::= { apIncidentAlertThreshold 14 }
|
|
|
|
apIcmpAttackAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for ICMP Attack defense info"
|
|
::= { apIncidentAlertThreshold 15 }
|
|
|
|
apIcmpAttackAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for ICMP Attack defense info"
|
|
::= { apIncidentAlertThreshold 16 }
|
|
|
|
apOtherIpAttackAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for other IP Attack defense info"
|
|
::= { apIncidentAlertThreshold 17 }
|
|
|
|
apOtherIpAttackAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for other IP Attack defense info"
|
|
::= { apIncidentAlertThreshold 18 }
|
|
|
|
apFragAttackAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for fragment Attack defense info"
|
|
::= { apIncidentAlertThreshold 19 }
|
|
|
|
apFragAttackAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for fragment Attack defense info"
|
|
::= { apIncidentAlertThreshold 20 }
|
|
|
|
apBadIpAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for bad IP defense info"
|
|
::= { apIncidentAlertThreshold 21 }
|
|
|
|
apBadIpAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for bad IP defense info"
|
|
::= { apIncidentAlertThreshold 22 }
|
|
|
|
apBadTcpAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for bad TCP defense info"
|
|
::= { apIncidentAlertThreshold 23 }
|
|
|
|
apBadTcpAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for bad TCP defense info"
|
|
::= { apIncidentAlertThreshold 24 }
|
|
|
|
apBadUdpAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for bad UDP defense info"
|
|
::= { apIncidentAlertThreshold 25 }
|
|
|
|
apBadUdpAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for bad UDP defense info"
|
|
::= { apIncidentAlertThreshold 26 }
|
|
|
|
apBadIcmpAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for bad ICMP defense info"
|
|
::= { apIncidentAlertThreshold 27 }
|
|
|
|
apBadIcmpAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for bad ICMP defense info"
|
|
::= { apIncidentAlertThreshold 28 }
|
|
|
|
apBadOtherIpAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for bad other IP defense info"
|
|
::= { apIncidentAlertThreshold 29 }
|
|
|
|
apBadOtherIpAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for bad other IP defense info"
|
|
::= { apIncidentAlertThreshold 30 }
|
|
|
|
apOverloadedIpAlertThresh OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold enabled on/off for overloaded protected IP info"
|
|
::= { apIncidentAlertThreshold 31 }
|
|
|
|
apOverloadedIpAlertThreshRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident Alert threshold rate for overloaded protected IP info"
|
|
::= { apIncidentAlertThreshold 32 }
|
|
|
|
apMail OBJECT IDENTIFIER ::= { apConfig 4 }
|
|
|
|
apMailServer OBJECT-TYPE
|
|
SYNTAX IpAddress
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address of SMTP email server for appliance"
|
|
::= { apMail 1 }
|
|
|
|
apMailFrom OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"eMail address appliance messages should appear to be from"
|
|
::= { apMail 2 }
|
|
|
|
apMailSubject OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"eMail subject appliance messages should display (no longer used)"
|
|
::= { apMail 3 }
|
|
|
|
apMailToList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Semicolon-separated list of recipients for appliance messages"
|
|
::= { apMail 4 }
|
|
|
|
apMailDailyStats OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"True if daily statistics are to be mailed"
|
|
::= { apMail 5 }
|
|
|
|
apMailAlerts OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"True if mail alerts are to be sent"
|
|
::= { apMail 6 }
|
|
|
|
apMailAlertInterval OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Minimum interval between email alerts (in minutes)"
|
|
::= { apMail 7 }
|
|
|
|
|
|
apDebugConfig OBJECT IDENTIFIER ::= { apConfig 5 }
|
|
|
|
apDebugBandwidthFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging bandwidth Attacks"
|
|
::= { apDebugConfig 1 }
|
|
|
|
apDebugFloodFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging floods"
|
|
::= { apDebugConfig 2 }
|
|
|
|
apDebugBlockedProtocolFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging packets with Blocked Protocols"
|
|
::= { apDebugConfig 3 }
|
|
|
|
apDebugBlockedStateFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging packets with Blocked States"
|
|
::= { apDebugConfig 4 }
|
|
|
|
apDebugIpAttackFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging IP Attacks"
|
|
::= { apDebugConfig 5 }
|
|
|
|
apDebugTcpAttackFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging TCP Attacks"
|
|
::= { apDebugConfig 6 }
|
|
|
|
apDebugUdpAttackFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging UDP Attacks"
|
|
::= { apDebugConfig 7 }
|
|
|
|
apDebugIcmpAttackFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging ICMP Attacks"
|
|
::= { apDebugConfig 8 }
|
|
|
|
apDebugOtherIpAttackFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging other IP Protocol Attacks"
|
|
::= { apDebugConfig 9 }
|
|
|
|
apDebugFragmentAttackFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging fragment Attacks"
|
|
::= { apDebugConfig 10 }
|
|
|
|
apDebugBadIpPacketFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging bad IP packets"
|
|
::= { apDebugConfig 11 }
|
|
|
|
apDebugBadTcpPacketFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging bad TCP packets"
|
|
::= { apDebugConfig 12 }
|
|
|
|
apDebugBadUdpPacketFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging bad UDP packets"
|
|
::= { apDebugConfig 13 }
|
|
|
|
apDebugBadIcmpFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging bad ICMP packets"
|
|
::= { apDebugConfig 14 }
|
|
|
|
apDebugBadOtherIpFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging bad Other IP Protocol packets"
|
|
::= { apDebugConfig 15 }
|
|
|
|
apDebugOverloadProtectedIpFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if logging stalled protected IPs"
|
|
::= { apDebugConfig 16 }
|
|
|
|
apOperationMode OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current operating mode of the DDoS Secure device"
|
|
::= { apConfig 6 }
|
|
|
|
apNtpServerList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma-separated list of NTP servers for appliance"
|
|
::= { apConfig 7 }
|
|
|
|
apTimeZone OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Time zone (as a string, e.g. Europe/London)"
|
|
::= { apConfig 8 }
|
|
|
|
apProtectedIpNetwork OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"All the protected IP network(s) on the DDoS Secure Appliance"
|
|
::= { apConfig 9 }
|
|
|
|
apSnmp OBJECT IDENTIFIER ::= { apConfig 10 }
|
|
|
|
apSnmpRoCommunity OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Read-only community string"
|
|
::= { apSnmp 1 }
|
|
|
|
apSnmpTrapCommunity OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Read-only community string"
|
|
::= { apSnmp 2 }
|
|
|
|
apSnmpTrapIpAddressList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ASCII comma-separated list of IP addresses to receive SNMP traps"
|
|
::= { apSnmp 3 }
|
|
|
|
apAutoBlackList OBJECT IDENTIFIER ::= { apConfig 11 }
|
|
|
|
apAutoblockEnable OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Enables autoblocking of clients when a worst offender
|
|
exceeds the autoblockRate threshold"
|
|
::= { apAutoBlackList 1 }
|
|
|
|
apAutoblockRateT1 OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Packet rate/sec above which worst offending clients (type 1) are autoblocked,
|
|
if autoblocking is enabled"
|
|
::= { apAutoBlackList 2 }
|
|
|
|
apAutoblockRateT2 OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Packet rate/sec above which worst offending clients (type 2) are autoblocked,
|
|
if autoblocking is enabled"
|
|
::= { apAutoBlackList 3 }
|
|
|
|
apProtectedIpAutodetect OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"If true, unconfigured IPs amd MACs are autodetected on the protected interface
|
|
(and default protection parameters are applied)"
|
|
::= { apConfig 12 }
|
|
|
|
apTrackIndeterminate OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Track state on indeterminate addresses on protected interface"
|
|
::= { apConfig 13 }
|
|
|
|
-- ### Protection configuration settings ###
|
|
|
|
prConfigTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF PrConfigEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The configuration of each IP or MAC address
|
|
protected by the DDoS Secure"
|
|
::= { jddsProtected 1 }
|
|
|
|
prConfigEntry OBJECT-TYPE
|
|
SYNTAX PrConfigEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The protection configuration for an individual address on the protected interface"
|
|
INDEX { prConfigInetAddressType, prConfigInetAddress }
|
|
::= { prConfigTable 1 }
|
|
|
|
PrConfigEntry ::= SEQUENCE {
|
|
prConfigInetAddressType
|
|
InetAddressType,
|
|
prConfigInetAddress
|
|
InetAddress,
|
|
prHostName
|
|
DisplayString,
|
|
prTcpBacklog
|
|
Gauge32,
|
|
prMaxConnections
|
|
Gauge32,
|
|
prMaxConnectionRate
|
|
Gauge32,
|
|
prInFilterName
|
|
DisplayString,
|
|
prOutFilterName
|
|
DisplayString,
|
|
prSendTcpRejects
|
|
TruthValue,
|
|
prTrackSoap
|
|
TruthValue,
|
|
prOperationMode
|
|
DisplayString,
|
|
prMaxGets
|
|
Gauge32,
|
|
prFragsDisabled
|
|
TruthValue
|
|
}
|
|
|
|
prConfigInetAddressType OBJECT-TYPE
|
|
SYNTAX InetAddressType
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The protected IP address type IPv4 or IPv6"
|
|
::= { prConfigEntry 1 }
|
|
|
|
prConfigInetAddress OBJECT-TYPE
|
|
SYNTAX InetAddress (SIZE (0..47))
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The protected IP address"
|
|
::= { prConfigEntry 2 }
|
|
|
|
prHostName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Host name associated with the protected IP"
|
|
::= { prConfigEntry 3 }
|
|
|
|
prTcpBacklog OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max number of half-open TCP connections"
|
|
::= { prConfigEntry 4 }
|
|
|
|
prMaxConnections OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max number of open TCP connections"
|
|
::= { prConfigEntry 5 }
|
|
|
|
prMaxConnectionRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max rate of opening new TCP connections"
|
|
::= { prConfigEntry 6 }
|
|
|
|
prInFilterName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Input filter name associated with the protected IP"
|
|
::= { prConfigEntry 7 }
|
|
|
|
prOutFilterName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Output filter name associated with the protected IP"
|
|
::= { prConfigEntry 8 }
|
|
|
|
prSendTcpRejects OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if TCP rejects are to be sent"
|
|
::= { prConfigEntry 9 }
|
|
|
|
prTrackSoap OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if SOAP Headers are to be tracked"
|
|
::= { prConfigEntry 10 }
|
|
|
|
prOperationMode OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current operating mode of the protected IP"
|
|
::= { prConfigEntry 11 }
|
|
|
|
prMaxGets OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max number of outstanding GET requests"
|
|
::= { prConfigEntry 12 }
|
|
|
|
prFragsDisabled OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if packet fragmentation is not allowed"
|
|
::= { prConfigEntry 13 }
|
|
|
|
|
|
-- ### Gateway internet-side settings ###
|
|
|
|
gwInternetConfigTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF GwInternetConfigEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The configuration of each internet-side gateway
|
|
protected by the DDoS Secure"
|
|
::= { jddsGatewayInternet 1 }
|
|
|
|
gwInternetConfigEntry OBJECT-TYPE
|
|
SYNTAX GwInternetConfigEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The configuration of an individual internet-side gateway"
|
|
INDEX { gwInternetConfigIndex }
|
|
::= { gwInternetConfigTable 1 }
|
|
|
|
GwInternetConfigEntry ::= SEQUENCE {
|
|
gwInternetConfigIndex
|
|
LocalIndex,
|
|
gwInternetConfigMacAddress
|
|
DisplayString,
|
|
gwInternetConfigToSpeedBps
|
|
Gauge32,
|
|
gwInternetConfigToRatePps
|
|
Gauge32
|
|
}
|
|
|
|
gwInternetConfigIndex OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique gateway internet index"
|
|
::= { gwInternetConfigEntry 1 }
|
|
|
|
gwInternetConfigMacAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"MAC address of the internet-side gateway"
|
|
::= { gwInternetConfigEntry 2 }
|
|
|
|
gwInternetConfigToSpeedBps OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max speed to internet-side gateway allowed in bits/sec"
|
|
::= { gwInternetConfigEntry 3 }
|
|
|
|
gwInternetConfigToRatePps OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max rate to internet-side gateway allowed in packets/sec"
|
|
::= { gwInternetConfigEntry 4 }
|
|
|
|
|
|
-- ### Gateway protected-side settings ###
|
|
|
|
gwProtectedConfigTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF GwProtectedConfigEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The configuration of each protected-side gateway
|
|
protected by the DDoS Secure"
|
|
::= { jddsGatewayProtected 1 }
|
|
|
|
gwProtectedConfigEntry OBJECT-TYPE
|
|
SYNTAX GwProtectedConfigEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The configuration of an individual protected-side gateway"
|
|
INDEX { gwProtectedConfigIndex }
|
|
::= { gwProtectedConfigTable 1 }
|
|
|
|
GwProtectedConfigEntry ::= SEQUENCE {
|
|
gwProtectedConfigIndex
|
|
LocalIndex,
|
|
gwProtectedConfigMacAddress
|
|
DisplayString,
|
|
gwProtectedConfigToSpeedBps
|
|
Gauge32,
|
|
gwProtectedConfigToRatePps
|
|
Gauge32
|
|
}
|
|
|
|
gwProtectedConfigIndex OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique protected-side gateway index"
|
|
::= { gwProtectedConfigEntry 1 }
|
|
|
|
gwProtectedConfigMacAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"MAC address of the protected-side gateway"
|
|
::= { gwProtectedConfigEntry 2 }
|
|
|
|
gwProtectedConfigToSpeedBps OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max speed to protected-side gateway allowed in bits/sec"
|
|
::= { gwProtectedConfigEntry 3 }
|
|
|
|
gwProtectedConfigToRatePps OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Max speed to protected-side gateway allowed in packets/sec"
|
|
::= { gwProtectedConfigEntry 4 }
|
|
|
|
|
|
apState OBJECT IDENTIFIER ::= { jddsAppliance 2 }
|
|
|
|
apDefenseFlags OBJECT IDENTIFIER ::= { apState 1 }
|
|
|
|
apBandwidth OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using bandwidth defense"
|
|
::= { apDefenseFlags 1 }
|
|
|
|
apFlood OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using flood defense"
|
|
::= { apDefenseFlags 2 }
|
|
|
|
apBlockedProtocol OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using blocked Protocol defense"
|
|
::= { apDefenseFlags 3 }
|
|
|
|
apBlockedState OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using blocked state defense"
|
|
::= { apDefenseFlags 4 }
|
|
|
|
apIpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using IP Attack defense"
|
|
::= { apDefenseFlags 5 }
|
|
|
|
apTcpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using TCP Attack defense"
|
|
::= { apDefenseFlags 6 }
|
|
|
|
apUdpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using UDP Attack defense"
|
|
::= { apDefenseFlags 7 }
|
|
|
|
apIcmpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using ICMP Attack defense"
|
|
::= { apDefenseFlags 8 }
|
|
|
|
apOtherIpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using other IP Attack defense"
|
|
::= { apDefenseFlags 9 }
|
|
|
|
apFragAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using fragment Attack defense"
|
|
::= { apDefenseFlags 10 }
|
|
|
|
apBadIp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using bad IP defense"
|
|
::= { apDefenseFlags 11 }
|
|
|
|
apBadTcp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using bad TCP defense"
|
|
::= { apDefenseFlags 12 }
|
|
|
|
apBadUdp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using bad UDP defense"
|
|
::= { apDefenseFlags 13 }
|
|
|
|
apBadIcmp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using bad ICMP defense"
|
|
::= { apDefenseFlags 14 }
|
|
|
|
apBadOtherIp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently using bad other IP defense"
|
|
::= { apDefenseFlags 15 }
|
|
|
|
apOverloadedIp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if appliance is currently experiencing an overloaded protected IP"
|
|
::= { apDefenseFlags 16 }
|
|
|
|
apTcpStates OBJECT IDENTIFIER ::= { apState 2 }
|
|
|
|
apInSyn OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client connection requests inbound"
|
|
::= { apTcpStates 1 }
|
|
|
|
apOutSyn OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client connection requests outbound"
|
|
::= { apTcpStates 2 }
|
|
|
|
apInSynAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP responses to client connection requests inbound"
|
|
::= { apTcpStates 3 }
|
|
|
|
apOutSynAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP responses to client connection requests outbound"
|
|
::= { apTcpStates 4 }
|
|
|
|
apInSynSyn OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client and protected IP crossed SYNs on inbound connection"
|
|
::= { apTcpStates 5 }
|
|
|
|
apOutSynSyn OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client and protected IP crossed SYNs on outbound connection"
|
|
::= { apTcpStates 6 }
|
|
|
|
apInEst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client-protected IP connections established inbound"
|
|
::= { apTcpStates 7 }
|
|
|
|
apOutEst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client-protected IP connections established outbound"
|
|
::= { apTcpStates 8 }
|
|
|
|
apInFin1Src OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client FINs sent inbound"
|
|
::= { apTcpStates 9 }
|
|
|
|
apOutFin1Src OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client FINs sent outbound"
|
|
::= { apTcpStates 10 }
|
|
|
|
apInFin2Src OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP ACKed FINs inbound"
|
|
::= { apTcpStates 11 }
|
|
|
|
apOutFin2Src OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP ACKed FINs outbound"
|
|
::= { apTcpStates 12 }
|
|
|
|
apInFin3Src OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client and protected IP sent FINs inbound"
|
|
::= { apTcpStates 13 }
|
|
|
|
apOutFin3Src OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client and protected IP sent FINs outbound"
|
|
::= { apTcpStates 14 }
|
|
|
|
apInFinFin OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client and protected IP crossed un-ACKed FINs inbound"
|
|
::= { apTcpStates 15 }
|
|
|
|
apOutFinFin OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client and protected IP crossed un-ACKed FINs outbound"
|
|
::= { apTcpStates 16 }
|
|
|
|
apInFin1Dst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP FINs sent inbound"
|
|
::= { apTcpStates 17 }
|
|
|
|
apOutFin1Dst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP FINs sent outbound"
|
|
::= { apTcpStates 18 }
|
|
|
|
apInFin2Dst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP ACKed FINs inbound"
|
|
::= { apTcpStates 19 }
|
|
|
|
apOutFin2Dst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: client ACKed FINs outbound"
|
|
::= { apTcpStates 20 }
|
|
|
|
apInFin3Dst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP and client sent FINs inbound"
|
|
::= { apTcpStates 21 }
|
|
|
|
apOutFin3Dst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP and client sent FINs outbound"
|
|
::= { apTcpStates 22 }
|
|
|
|
apInCls OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: closed connections inbound"
|
|
::= { apTcpStates 23 }
|
|
|
|
apOutCls OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: closed connections outbound"
|
|
::= { apTcpStates 24 }
|
|
|
|
apInRst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: resets sent on inbound connection"
|
|
::= { apTcpStates 25 }
|
|
|
|
apOutRst OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: resets sent on outbound connection"
|
|
::= { apTcpStates 26 }
|
|
|
|
apInRstCls OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: resets sent on inbound connection"
|
|
::= { apTcpStates 27 }
|
|
|
|
apOutRstCls OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: resets sent on outbound connection"
|
|
::= { apTcpStates 28 }
|
|
|
|
apInUnknown OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: unknown states inbound"
|
|
::= { apTcpStates 29 }
|
|
|
|
apOutUnknown OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: unknown states outbound"
|
|
::= { apTcpStates 30 }
|
|
|
|
apInAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: three way handshake completed inbound"
|
|
::= { apTcpStates 31 }
|
|
|
|
apOutAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: three way handshake completed outbound"
|
|
::= { apTcpStates 32 }
|
|
|
|
apInPendAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP has not acknowledged any data inbound"
|
|
::= { apTcpStates 33 }
|
|
|
|
apOutPendAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP has not acknowledged any data outbound"
|
|
::= { apTcpStates 34 }
|
|
|
|
apInGet OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP in GET State"
|
|
::= { apTcpStates 35 }
|
|
|
|
apOutGet OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: protected IP in GET State"
|
|
::= { apTcpStates 36 }
|
|
|
|
apInGets OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: the number of established TCP sessions processing a GET"
|
|
::= { apTcpStates 37 }
|
|
|
|
apOutGets OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"state tally: the number of established TCP sessions processing a GET"
|
|
::= { apTcpStates 38 }
|
|
|
|
apInTotalBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input bits per second"
|
|
::= { apTcpStates 901 }
|
|
|
|
apOutTotalBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of output bits per second"
|
|
::= { apTcpStates 902 }
|
|
|
|
apInTotalPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average packets/sec traffic rate inbound since last restart or reset"
|
|
::= { apTcpStates 903 }
|
|
|
|
apOutTotalPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average packets/sec traffic rate outbound since last restart or reset"
|
|
::= { apTcpStates 904 }
|
|
|
|
apInSmallPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { apTcpStates 905 }
|
|
|
|
apOutSmallPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { apTcpStates 906 }
|
|
|
|
apInMediumPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 907 }
|
|
|
|
apOutMediumPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 908 }
|
|
|
|
apInLargePpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 909 }
|
|
|
|
apOutLargePpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 910 }
|
|
|
|
apInDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input bits Dropped per second"
|
|
::= { apTcpStates 911 }
|
|
|
|
apOutDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of output bits Dropped per second"
|
|
::= { apTcpStates 912 }
|
|
|
|
apInDroppedPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input packets Dropped per second"
|
|
::= { apTcpStates 913 }
|
|
|
|
apOutDroppedPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of output packets Dropped per second"
|
|
::= { apTcpStates 914 }
|
|
|
|
apInCharmDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound bits per second dropped by heuristic detection"
|
|
::= { apTcpStates 915 }
|
|
|
|
apOutCharmDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound bits per second dropped by heuristic detection"
|
|
::= { apTcpStates 916 }
|
|
|
|
apInFilteredBwthPercentAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { apTcpStates 917 }
|
|
|
|
apOutFilteredBwthPercentAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { apTcpStates 918 }
|
|
|
|
apInSynbacklogtallyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of partially open TCP connections inbound"
|
|
::= { apTcpStates 919 }
|
|
|
|
apOutSynbacklogtallyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of partially open TCP connections outbound"
|
|
::= { apTcpStates 920 }
|
|
|
|
apInConnectionAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound TCP connections"
|
|
::= { apTcpStates 921 }
|
|
|
|
apOutConnectionAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound TCP connections"
|
|
::= { apTcpStates 922 }
|
|
|
|
apInConnreqAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound TCP connection requests"
|
|
::= { apTcpStates 923 }
|
|
|
|
apOutConnreqAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound TCP connection requests"
|
|
::= { apTcpStates 924 }
|
|
|
|
apInActiveHttpGetsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound HTTP page requests being processed"
|
|
::= { apTcpStates 925 }
|
|
|
|
apOutActiveHttpGetsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound HTTP page requests being processed"
|
|
::= { apTcpStates 926 }
|
|
|
|
apInProtectBwthPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound protected bandwifth"
|
|
::= { apTcpStates 927 }
|
|
|
|
apOutProtectBwthPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound protected bandwifth"
|
|
::= { apTcpStates 928 }
|
|
|
|
apInFloodPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound packets causing flooding"
|
|
::= { apTcpStates 929 }
|
|
|
|
apOutFloodPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound packets causing flooding"
|
|
::= { apTcpStates 930 }
|
|
|
|
apInBlockedProtocolPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets dropped by filter "
|
|
::= { apTcpStates 931 }
|
|
|
|
apOutBlockedProtocolPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets dropped by filter"
|
|
::= { apTcpStates 932 }
|
|
|
|
apInBlockedStatePktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets dropped due to incorrect state"
|
|
::= { apTcpStates 933 }
|
|
|
|
apOutBlockedStatePktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets dropped due to incorrect state"
|
|
::= { apTcpStates 934 }
|
|
|
|
apInIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an IP Attack"
|
|
::= { apTcpStates 935 }
|
|
|
|
apOutIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an IP Attack"
|
|
::= { apTcpStates 936 }
|
|
|
|
apInTcpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a TCP Attack"
|
|
::= { apTcpStates 937 }
|
|
|
|
apOutTcpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a TCP Attack"
|
|
::= { apTcpStates 938 }
|
|
|
|
apInUdpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a UDP Attack"
|
|
::= { apTcpStates 939 }
|
|
|
|
apOutUdpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a UDP Attack"
|
|
::= { apTcpStates 940 }
|
|
|
|
apInIcmpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a ICMP Attack"
|
|
::= { apTcpStates 941 }
|
|
|
|
apOutIcmpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a ICMP Attack"
|
|
::= { apTcpStates 942 }
|
|
|
|
apInOtherIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an IP Attack using other protocols"
|
|
::= { apTcpStates 943 }
|
|
|
|
apOutOtherIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an IP Attack using other protocols"
|
|
::= { apTcpStates 944 }
|
|
|
|
apInFragmentAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an Fragmentation Attack"
|
|
::= { apTcpStates 945 }
|
|
|
|
apOutFragmentAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an Fragmentation Attack"
|
|
::= { apTcpStates 946 }
|
|
|
|
apInBadipPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets with malformed IP Headers"
|
|
::= { apTcpStates 947 }
|
|
|
|
apOutBadipPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets with malformed IP Headers"
|
|
::= { apTcpStates 948 }
|
|
|
|
apInBadTcpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets with bad TCP protocol/state"
|
|
::= { apTcpStates 949 }
|
|
|
|
apOutBadTcpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets with bad TCP protocol/state"
|
|
::= { apTcpStates 950 }
|
|
|
|
apInBadUdpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound UDP packets with malformed header or missing data"
|
|
::= { apTcpStates 951 }
|
|
|
|
apOutBadUdpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound UDP packets with malformed header or missing data"
|
|
::= { apTcpStates 952 }
|
|
|
|
apInBadIcmpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound ICMP packets with malformed header"
|
|
::= { apTcpStates 953 }
|
|
|
|
apOutBadIcmpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound ICMP packets with malformed header"
|
|
::= { apTcpStates 954 }
|
|
|
|
apInBadOtherIpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets of other protocol with malformed header"
|
|
::= { apTcpStates 955 }
|
|
|
|
apOutBadOtherIpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets of other protocol with malformed header"
|
|
::= { apTcpStates 956 }
|
|
|
|
apInOverloadedAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound packets overloading the protected IPs"
|
|
::= { apTcpStates 957 }
|
|
|
|
apOutOverloadedAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound packets overloading the protected IPs"
|
|
::= { apTcpStates 958 }
|
|
|
|
apInLatencyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound Latency"
|
|
::= { apTcpStates 959 }
|
|
|
|
apOutLatencyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound Latency"
|
|
::= { apTcpStates 960 }
|
|
|
|
apInSmallPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { apTcpStates 1001 }
|
|
|
|
apOutSmallPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { apTcpStates 1002 }
|
|
|
|
apInMediumPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 1003 }
|
|
|
|
apOutMediumPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 1004 }
|
|
|
|
apInLargePpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 1005 }
|
|
|
|
apOutLargePpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { apTcpStates 1006 }
|
|
|
|
apInFilteredBwthPercentMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { apTcpStates 1007 }
|
|
|
|
apOutFilteredBwthPercentMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { apTcpStates 1008 }
|
|
|
|
apInSynbacklogtallyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of partially open TCP connections inbound"
|
|
::= { apTcpStates 1009 }
|
|
|
|
apOutSynbacklogtallyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of partially open TCP connections outbound"
|
|
::= { apTcpStates 1010 }
|
|
|
|
apInConnectionMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound TCP connections"
|
|
::= { apTcpStates 1011 }
|
|
|
|
apOutConnectionMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound TCP connections"
|
|
::= { apTcpStates 1012 }
|
|
|
|
apInConnreqMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound TCP connection requests"
|
|
::= { apTcpStates 1013 }
|
|
|
|
apOutConnreqMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound TCP connection requests"
|
|
::= { apTcpStates 1014 }
|
|
|
|
apInActiveHttpGetsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound HTTP page requests being processed"
|
|
::= { apTcpStates 1015 }
|
|
|
|
apOutActiveHttpGetsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound HTTP page requests being processed"
|
|
::= { apTcpStates 1016 }
|
|
|
|
apInProtectBwthPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound protected bandwifth"
|
|
::= { apTcpStates 1017 }
|
|
|
|
apOutProtectBwthPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound protected bandwifth"
|
|
::= { apTcpStates 1018 }
|
|
|
|
apInFloodPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound packets causing flooding"
|
|
::= { apTcpStates 1019 }
|
|
|
|
apOutFloodPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound packets causing flooding"
|
|
::= { apTcpStates 1020 }
|
|
|
|
apInBlockedProtocolPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets dropped by filter "
|
|
::= { apTcpStates 1021 }
|
|
|
|
apOutBlockedProtocolPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets dropped by filter"
|
|
::= { apTcpStates 1022 }
|
|
|
|
apInBlockedStatePktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets dropped due to incorrect state"
|
|
::= { apTcpStates 1023 }
|
|
|
|
apOutBlockedStatePktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets dropped due to incorrect state"
|
|
::= { apTcpStates 1024 }
|
|
|
|
apInIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an IP Attack"
|
|
::= { apTcpStates 1025 }
|
|
|
|
apOutIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an IP Attack"
|
|
::= { apTcpStates 1026 }
|
|
|
|
apInTcpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a TCP Attack"
|
|
::= { apTcpStates 1027 }
|
|
|
|
apOutTcpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a TCP Attack"
|
|
::= { apTcpStates 1028 }
|
|
|
|
apInUdpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a UDP Attack"
|
|
::= { apTcpStates 1029 }
|
|
|
|
apOutUdpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a UDP Attack"
|
|
::= { apTcpStates 1030 }
|
|
|
|
apInIcmpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a ICMP Attack"
|
|
::= { apTcpStates 1031 }
|
|
|
|
apOutIcmpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a ICMP Attack"
|
|
::= { apTcpStates 1032 }
|
|
|
|
apInOtherIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an IP Attack using other protocols"
|
|
::= { apTcpStates 1033 }
|
|
|
|
apOutOtherIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an IP Attack using other protocols"
|
|
::= { apTcpStates 1034 }
|
|
|
|
apInFragmentAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an Fragmentation Attack"
|
|
::= { apTcpStates 1035 }
|
|
|
|
apOutFragmentAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an Fragmentation Attack"
|
|
::= { apTcpStates 1036 }
|
|
|
|
apInBadipPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets with malformed IP Headers"
|
|
::= { apTcpStates 1037 }
|
|
|
|
apOutBadipPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets with malformed IP Headers"
|
|
::= { apTcpStates 1038 }
|
|
|
|
apInBadTcpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets with bad TCP protocol/state"
|
|
::= { apTcpStates 1039 }
|
|
|
|
apOutBadTcpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets with bad TCP protocol/state"
|
|
::= { apTcpStates 1040 }
|
|
|
|
apInBadUdpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound UDP packets with malformed header or missing data"
|
|
::= { apTcpStates 1041 }
|
|
|
|
apOutBadUdpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound UDP packets with malformed header or missing data"
|
|
::= { apTcpStates 1042 }
|
|
|
|
apInBadIcmpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound ICMP packets with malformed header"
|
|
::= { apTcpStates 1043 }
|
|
|
|
apOutBadIcmpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound ICMP packets with malformed header"
|
|
::= { apTcpStates 1044 }
|
|
|
|
apInBadOtherIpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets of other protocol with malformed header"
|
|
::= { apTcpStates 1045 }
|
|
|
|
apOutBadOtherIpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets of other protocol with malformed header"
|
|
::= { apTcpStates 1046 }
|
|
|
|
apInOverloadedMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound packets overloading the protected IPs"
|
|
::= { apTcpStates 1047 }
|
|
|
|
apOutOverloadedMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound packets overloading the protected IPs"
|
|
::= { apTcpStates 1048 }
|
|
|
|
apInLatencyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound Latency"
|
|
::= { apTcpStates 1049 }
|
|
|
|
apOutLatencyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound Latency"
|
|
::= { apTcpStates 1050 }
|
|
|
|
apIfStates OBJECT IDENTIFIER ::= { apState 3 }
|
|
|
|
apMgmtIfLinkModeState OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Speed and duplex of the appliance management interface"
|
|
::= { apIfStates 1 }
|
|
|
|
apIntIfLinkModeState OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Speed and duplex of the appliance internet interface"
|
|
::= { apIfStates 2 }
|
|
|
|
apProtIfLinkModeState OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Speed and duplex of the appliance Protected Interface"
|
|
::= { apIfStates 3 }
|
|
|
|
apMgmtIfLinkFCState OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Flow Control setting of the appliance management interface"
|
|
::= { apIfStates 4 }
|
|
|
|
apIntIfLinkFCState OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Flow Control setting of the appliance internet interface"
|
|
::= { apIfStates 5 }
|
|
|
|
apProtIfLinkFCState OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Flow Control setting of the appliance Protected Interface"
|
|
::= { apIfStates 6 }
|
|
|
|
|
|
apHighAvailabilityInfo OBJECT IDENTIFIER ::= { apState 4 }
|
|
|
|
apHaState OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
unknown(1),
|
|
probe(2),
|
|
standby(3),
|
|
active(4),
|
|
cripple(5),
|
|
standalone(6),
|
|
activesec(7)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current high availability state"
|
|
::= { apHighAvailabilityInfo 1 }
|
|
|
|
apHaPartnerList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma-separated list of redundant (fail-over) partners"
|
|
::= { apHighAvailabilityInfo 2 }
|
|
|
|
apHaPartnerTime OBJECT-TYPE
|
|
SYNTAX TimeInterval
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Elapsed time since last redundant partner contact"
|
|
::= { apHighAvailabilityInfo 3 }
|
|
|
|
apStalledFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure engine stalled"
|
|
::= { apState 5 }
|
|
|
|
apOutputErrorIIFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure is having trouble transmitting packets over Internet Interface"
|
|
::= { apState 6 }
|
|
|
|
apOutputErrorPIFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure is having trouble transmitting packet over Protected Interfaces"
|
|
::= { apState 7 }
|
|
|
|
apOutputErrorMIFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure is having trouble transmitting packet over Management Interfaces"
|
|
::= { apState 8 }
|
|
|
|
apNewConfigFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure configuration has just been updated"
|
|
::= { apState 9 }
|
|
|
|
apNotLicensedFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has not yet been authorized for use"
|
|
::= { apState 10 }
|
|
|
|
apMacTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal MAC table space is full"
|
|
::= { apState 11 }
|
|
|
|
apProtectedTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal protected IP table space is full"
|
|
::= { apState 12 }
|
|
|
|
apIncidentTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal incident table space is full"
|
|
::= { apState 13 }
|
|
|
|
apTcpTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal TCP table space is full"
|
|
::= { apState 14 }
|
|
|
|
apUdpTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal UDP table space is full"
|
|
::= { apState 15 }
|
|
|
|
apIcmpTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal ICMP table space is full"
|
|
::= { apState 16 }
|
|
|
|
apOtherIpTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal other IP table space is full"
|
|
::= { apState 17 }
|
|
|
|
apFragTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal fragment table space is full"
|
|
::= { apState 18 }
|
|
|
|
apFtpTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal ftp tracking table space is full"
|
|
::= { apState 19 }
|
|
|
|
apBlockedTableFullFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's internal blocked ip table space is full"
|
|
::= { apState 20 }
|
|
|
|
apShortCircuitFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has detected an external link between
|
|
the Internet and Protected Interfaces"
|
|
::= { apState 21 }
|
|
|
|
apInternetIfDisconnectedFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has detected that the Internet interface
|
|
has been disconnected"
|
|
::= { apState 22 }
|
|
|
|
apProtectedIfDisconnectedFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has detected that the Protected interface
|
|
has been disconnected"
|
|
::= { apState 23 }
|
|
|
|
apMgmtIfDisconnectedFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has detected that the Management interface
|
|
has been disconnected"
|
|
::= { apState 24 }
|
|
|
|
apUpgradingFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure is in the process of a software upgrade"
|
|
::= { apState 25 }
|
|
|
|
apProtectedIfTrafficFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure detects traffic on the Protected interface
|
|
while in Analyze-Tap mode"
|
|
::= { apState 26 }
|
|
|
|
apRoutingLoopFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure detects apossible alternate network path
|
|
around the appliance"
|
|
::= { apState 27 }
|
|
|
|
apOfflineFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if the DDoS Secure engine is no longer running, a brief
|
|
state during DDoS Secure restart sequence"
|
|
::= { apState 28 }
|
|
|
|
apStateLearningFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure is in state learning mode"
|
|
::= { apState 29 }
|
|
|
|
apSupportExpiredFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure's support period has expired"
|
|
::= { apState 30 }
|
|
|
|
apSevereLoadingFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure detects that packets have been Dropped due
|
|
to heavy loading"
|
|
::= { apState 31 }
|
|
|
|
apMacMisconfiguredFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure detects that a ethernet address configured
|
|
for one interface is detected on another interface"
|
|
::= { apState 32 }
|
|
|
|
apIfMisconfiguredFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if the Internet and Protected interfaces are configured
|
|
differently, and a Fail-Safe card is installed"
|
|
::= { apState 33 }
|
|
|
|
apInternetIfLinkDownFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has detected that one of the links on the Internet interface
|
|
has been disconnected"
|
|
::= { apState 34 }
|
|
|
|
apProtectedIfLinkDownFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has detected that one of the links on the protected IP interface
|
|
has been disconnected"
|
|
::= { apState 35 }
|
|
|
|
apDatashareIfDisconnectedFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has detected that the Data Share interface
|
|
has been disconnected"
|
|
::= { apState 36 }
|
|
|
|
apDiskFailingFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has a disk failing"
|
|
::= { apState 37 }
|
|
|
|
apPsuFailingFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has a PSU failing"
|
|
::= { apState 38 }
|
|
|
|
apFanFailingFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has a Fan failing"
|
|
::= { apState 39 }
|
|
|
|
apConfigXferFailFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if DDoS Secure has failed to transfer a confuguration"
|
|
::= { apState 40 }
|
|
|
|
apMissingRequiredPartnerFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if a required partner is not active"
|
|
::= { apState 41 }
|
|
|
|
apBgpMisconfiguredIpFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if BGP traffic detected to undefined protected IP"
|
|
::= { apState 42 }
|
|
|
|
|
|
apStats OBJECT IDENTIFIER ::= { jddsAppliance 3 }
|
|
|
|
|
|
apSessionTallies OBJECT IDENTIFIER ::= { apStats 1 }
|
|
|
|
apInTcpConnTally OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current number of established TCP sessions across appliance originated by an internet-side client"
|
|
::= { apSessionTallies 1 }
|
|
|
|
apOutTcpConnTally OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current number of established TCP sessions across appliance originated by a protected IPs"
|
|
::= { apSessionTallies 2 }
|
|
|
|
apInSynBacklogTally OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current number of half open (not yet established) TCP sessions originated by an internet-side client"
|
|
::= { apSessionTallies 3 }
|
|
|
|
apUdpSessionTally OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current number of UDP sessions across appliance"
|
|
::= { apSessionTallies 4 }
|
|
|
|
apIcmpSessionTally OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current number of ICMP sessions across appliance"
|
|
::= { apSessionTallies 5 }
|
|
|
|
apOtherIpSessionTally OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current number of other IP sessions across appliance"
|
|
::= { apSessionTallies 6 }
|
|
|
|
|
|
apSummaryBytes OBJECT IDENTIFIER ::= { apStats 3 }
|
|
|
|
apInTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes seen inbound by DDoS Secure"
|
|
::= { apSummaryBytes 1 }
|
|
|
|
apOutTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes seen outbound by DDoS Secure"
|
|
::= { apSummaryBytes 2 }
|
|
|
|
apInDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped inbound by DDoS Secure"
|
|
::= { apSummaryBytes 3 }
|
|
|
|
apOutDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped outbound by DDoS Secure"
|
|
::= { apSummaryBytes 4 }
|
|
|
|
apInCharmDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped inbound using CHARM heuristics"
|
|
::= { apSummaryBytes 5 }
|
|
|
|
apOutCharmDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped outbound using CHARM heuristics"
|
|
::= { apSummaryBytes 6 }
|
|
|
|
|
|
apSummaryPpsRates OBJECT IDENTIFIER ::= { apStats 4 }
|
|
|
|
apInTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak aggregate packets/sec traffic rate inbound since last
|
|
restart or reset"
|
|
::= { apSummaryPpsRates 1 }
|
|
|
|
apOutTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak aggregate packets/sec traffic rate outbound since last
|
|
restart or reset"
|
|
::= { apSummaryPpsRates 2 }
|
|
|
|
apInDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak packets/sec Drop rate inbound by DDoS Secure since last
|
|
restart or reset"
|
|
::= { apSummaryPpsRates 3 }
|
|
|
|
apOutDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak packets/sec Drop rate outbound by DDoS Secure since last
|
|
restart or reset"
|
|
::= { apSummaryPpsRates 4 }
|
|
|
|
|
|
apSummaryBpsRates OBJECT IDENTIFIER ::= { apStats 5 }
|
|
|
|
apInTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak aggregate bits per second traffic rate inbound since last
|
|
restart or reset"
|
|
::= { apSummaryBpsRates 1 }
|
|
|
|
apOutTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak aggregate bits per second traffic rate outbound since last
|
|
restart or reset"
|
|
::= { apSummaryBpsRates 2 }
|
|
|
|
apInDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak bits per second Drop rate inbound by DDoS Secure since last
|
|
restart or reset"
|
|
::= { apSummaryBpsRates 3 }
|
|
|
|
apOutDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak bits per second Drop rate outbound by DDoS Secure since last
|
|
restart or reset"
|
|
::= { apSummaryBpsRates 4 }
|
|
|
|
apInCharmDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak bits per second Drop rate inbound using CHARM heuristics since
|
|
last restart or reset"
|
|
::= { apSummaryBpsRates 5 }
|
|
|
|
apOutCharmDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak bits per second Drop rate outbound using CHARM heuristics since
|
|
last restart or reset"
|
|
::= { apSummaryBpsRates 6 }
|
|
|
|
|
|
apAttackPkts OBJECT IDENTIFIER ::= { apStats 6 }
|
|
|
|
apInProtectBwthPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in protect bandwidth defense"
|
|
::= { apAttackPkts 1 }
|
|
|
|
apOutProtectBwthPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in protect bandwidth defense"
|
|
::= { apAttackPkts 2 }
|
|
|
|
apInFloodPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in flood defense"
|
|
::= { apAttackPkts 3 }
|
|
|
|
apOutFloodPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in flood defense"
|
|
::= { apAttackPkts 4 }
|
|
|
|
apInBlockedProtocolPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in blocked Protocol defense"
|
|
::= { apAttackPkts 5 }
|
|
|
|
apOutBlockedProtocolPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in blocked Protocol defense"
|
|
::= { apAttackPkts 6 }
|
|
|
|
apInBlockedStatePktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in blocked state defense"
|
|
::= { apAttackPkts 7 }
|
|
|
|
apOutBlockedStatePktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in blocked state defense"
|
|
::= { apAttackPkts 8 }
|
|
|
|
apInIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in IP Attack defense"
|
|
::= { apAttackPkts 9 }
|
|
|
|
apOutIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in IP Attack defense"
|
|
::= { apAttackPkts 10 }
|
|
|
|
apInTcpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in TCP Attack defense"
|
|
::= { apAttackPkts 11 }
|
|
|
|
apOutTcpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in TCP Attack defense"
|
|
::= { apAttackPkts 12 }
|
|
|
|
apInUdpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in UDP Attack defense"
|
|
::= { apAttackPkts 13 }
|
|
|
|
apOutUdpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in UDP Attack defense"
|
|
::= { apAttackPkts 14 }
|
|
|
|
apInIcmpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in ICMP Attack defense"
|
|
::= { apAttackPkts 15 }
|
|
|
|
apOutIcmpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in ICMP Attack defense"
|
|
::= { apAttackPkts 16 }
|
|
|
|
apInOtherIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in other IP Attack defense"
|
|
::= { apAttackPkts 17 }
|
|
|
|
apOutOtherIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in other IP Attack defense"
|
|
::= { apAttackPkts 18 }
|
|
|
|
apInFragmentAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in fragment Attack defense"
|
|
::= { apAttackPkts 19 }
|
|
|
|
apOutFragmentAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in fragment Attack defense"
|
|
::= { apAttackPkts 20 }
|
|
|
|
apInBadIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in bad IP defense"
|
|
::= { apAttackPkts 21 }
|
|
|
|
apOutBadIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in bad IP defense"
|
|
::= { apAttackPkts 22 }
|
|
|
|
apInBadTcpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in bad TCP defense"
|
|
::= { apAttackPkts 23 }
|
|
|
|
apOutBadTcpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in bad TCP defense"
|
|
::= { apAttackPkts 24 }
|
|
|
|
apInBadUdpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in bad UDP defense"
|
|
::= { apAttackPkts 25 }
|
|
|
|
apOutBadUdpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in bad UDP defense"
|
|
::= { apAttackPkts 26 }
|
|
|
|
apInBadIcmpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in bad ICMP defense"
|
|
::= { apAttackPkts 27 }
|
|
|
|
apOutBadIcmpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in bad ICMP defense"
|
|
::= { apAttackPkts 28 }
|
|
|
|
apInBadOtherIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified inbound in bad other IP defense"
|
|
::= { apAttackPkts 29 }
|
|
|
|
apOutBadOtherIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of packets identified outbound in bad other IP defense"
|
|
::= { apAttackPkts 30 }
|
|
|
|
apInTotalPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total packets/sec traffic rate inbound since last restart or reset"
|
|
::= { apAttackPkts 33 }
|
|
|
|
apOutTotalPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total packets/sec traffic rate outbound since last
|
|
restart or reset"
|
|
::= { apAttackPkts 34 }
|
|
|
|
apInSmallPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { apAttackPkts 35 }
|
|
|
|
apOutSmallPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { apAttackPkts 36 }
|
|
|
|
apInMediumPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { apAttackPkts 37 }
|
|
|
|
apOutMediumPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { apAttackPkts 38 }
|
|
|
|
apInLargePpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { apAttackPkts 39 }
|
|
|
|
apOutLargePpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { apAttackPkts 40 }
|
|
|
|
apInDroppedPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input packets Dropped per second"
|
|
::= { apAttackPkts 43 }
|
|
|
|
apOutDroppedPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output packets Dropped per second"
|
|
::= { apAttackPkts 44 }
|
|
|
|
apInFilteredBwthPercentCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { apAttackPkts 45 }
|
|
|
|
apOutFilteredBwthPercentCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { apAttackPkts 46 }
|
|
|
|
apInConnreqCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of inbound TCP connection requests"
|
|
::= { apAttackPkts 47 }
|
|
|
|
apOutConnreqCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of outbound TCP connection requests"
|
|
::= { apAttackPkts 48 }
|
|
|
|
apInOverloadedCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of inbound packets overloading the protected IPs"
|
|
::= { apAttackPkts 49 }
|
|
|
|
apOutOverloadedCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of outbound packets overloading the protected IPs"
|
|
::= { apAttackPkts 50 }
|
|
|
|
apWorstOffenderTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF ApWorstOffenderEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of worst offender statistics"
|
|
::= { apStats 7 }
|
|
|
|
apWorstOffenderEntry OBJECT-TYPE
|
|
SYNTAX ApWorstOffenderEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row consisting of a worst offender for a given reason and their statistics"
|
|
INDEX { apWorstOffenderInetAddressType, apWorstOffenderInetAddress, apWorstOffenderReason }
|
|
::= { apWorstOffenderTable 1 }
|
|
|
|
ApWorstOffenderEntry ::= SEQUENCE {
|
|
apWorstOffenderInetAddressType
|
|
InetAddressType,
|
|
apWorstOffenderInetAddress
|
|
InetAddress,
|
|
apWorstOffenderReason
|
|
DefenseType,
|
|
apWorstOffenderLastTime
|
|
DateAndTime,
|
|
apWorstOffenderCount
|
|
Counter32
|
|
}
|
|
|
|
apWorstOffenderInetAddressType OBJECT-TYPE
|
|
SYNTAX InetAddressType
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address type of the offender"
|
|
::= {apWorstOffenderEntry 1}
|
|
|
|
|
|
apWorstOffenderInetAddress OBJECT-TYPE
|
|
SYNTAX InetAddress (SIZE (0..47))
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP Address of offender"
|
|
::= {apWorstOffenderEntry 2}
|
|
|
|
apWorstOffenderReason OBJECT-TYPE
|
|
SYNTAX DefenseType
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Type of Attack"
|
|
::= {apWorstOffenderEntry 3}
|
|
|
|
apWorstOffenderLastTime OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Time of latest Attack (of given type)"
|
|
::= {apWorstOffenderEntry 4}
|
|
|
|
apWorstOffenderCount OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of offenses (of given type)"
|
|
::= {apWorstOffenderEntry 5}
|
|
|
|
apLogFileTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF ApLogFileEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of log file entries"
|
|
::= { jddsAppliance 4 }
|
|
|
|
apLogFileEntry OBJECT-TYPE
|
|
SYNTAX ApLogFileEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row consisting of a record from a log file"
|
|
INDEX { apLogFileRecordNumber }
|
|
::= { apLogFileTable 1 }
|
|
|
|
ApLogFileEntry ::= SEQUENCE {
|
|
apLogFileRecordNumber
|
|
LocalIndex,
|
|
apLogFileRecord
|
|
DisplayString
|
|
}
|
|
|
|
apLogFileRecordNumber OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique log file record number"
|
|
::= { apLogFileEntry 1 }
|
|
|
|
apLogFileRecord OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Specific log file entry"
|
|
::= { apLogFileEntry 2 }
|
|
|
|
apIncidentTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF ApIncidentEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of incident entries"
|
|
::= { jddsAppliance 5 }
|
|
|
|
apIncidentEntry OBJECT-TYPE
|
|
SYNTAX ApIncidentEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row consisting of an incident record"
|
|
INDEX { apIncidentYear,
|
|
apIncidentMonth,
|
|
apIncidentDay,
|
|
apIncidentNumber }
|
|
::= {apIncidentTable 1 }
|
|
|
|
ApIncidentEntry ::= SEQUENCE {
|
|
apIncidentYear
|
|
LocalIndex,
|
|
apIncidentMonth
|
|
LocalIndex,
|
|
apIncidentDay
|
|
LocalIndex,
|
|
apIncidentNumber
|
|
LocalIndex,
|
|
apIncidentStart
|
|
DateAndTime,
|
|
apIncidentAddress
|
|
DisplayString,
|
|
apIncidentType
|
|
DisplayString,
|
|
apIncidentDirection
|
|
Direction,
|
|
apIncidentPeakRate
|
|
Gauge32,
|
|
apIncidentDropped
|
|
Gauge32
|
|
}
|
|
|
|
apIncidentYear OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record year"
|
|
::= {apIncidentEntry 1 }
|
|
|
|
apIncidentMonth OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record month"
|
|
::= {apIncidentEntry 2 }
|
|
|
|
apIncidentDay OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record day of month"
|
|
::= {apIncidentEntry 3 }
|
|
|
|
apIncidentNumber OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique (for the day) incident record number"
|
|
::= {apIncidentEntry 4 }
|
|
|
|
apIncidentStart OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident start time"
|
|
::= {apIncidentEntry 5 }
|
|
|
|
apIncidentAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Appliance, Portal and Protected Incident IP or MAC address, This could be an outbound MAC incident"
|
|
::= {apIncidentEntry 6 }
|
|
|
|
apIncidentType OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident defense type (and subtype)"
|
|
::= {apIncidentEntry 7 }
|
|
|
|
apIncidentDirection OBJECT-TYPE
|
|
SYNTAX Direction
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident direction"
|
|
::= {apIncidentEntry 8 }
|
|
|
|
apIncidentPeakRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak packets/s during this incident"
|
|
::= {apIncidentEntry 9 }
|
|
|
|
apIncidentDropped OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No of packets Dropped as part of this incident"
|
|
::= {apIncidentEntry 10 }
|
|
|
|
-- End of Appliance settings
|
|
|
|
|
|
-- ** poStatsTable
|
|
poStatsTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF PoStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of portal statistics"
|
|
::= { jddsPortal 3 }
|
|
|
|
poStatsEntry OBJECT-TYPE
|
|
SYNTAX PoStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row associated with a specific portal"
|
|
INDEX { poStatsIndex }
|
|
::= { poStatsTable 1 }
|
|
|
|
PoStatsEntry ::= SEQUENCE {
|
|
poStatsIndex
|
|
LocalIndex,
|
|
poPortalName
|
|
DisplayString,
|
|
poInTotalBpsAvg
|
|
Gauge32,
|
|
poOutTotalBpsAvg
|
|
Gauge32,
|
|
poInTotalPpsAvg
|
|
Gauge32,
|
|
poOutTotalPpsAvg
|
|
Gauge32,
|
|
poInSmallPpsAvg
|
|
Gauge32,
|
|
poOutSmallPpsAvg
|
|
Gauge32,
|
|
poInMediumPpsAvg
|
|
Gauge32,
|
|
poOutMediumPpsAvg
|
|
Gauge32,
|
|
poInLargePpsAvg
|
|
Gauge32,
|
|
poOutLargePpsAvg
|
|
Gauge32,
|
|
poInDroppedBpsAvg
|
|
Gauge32,
|
|
poOutDroppedBpsAvg
|
|
Gauge32,
|
|
poInDroppedPpsAvg
|
|
Gauge32,
|
|
poOutDroppedPpsAvg
|
|
Gauge32,
|
|
poInCharmDroppedBpsAvg
|
|
Gauge32,
|
|
poOutCharmDroppedBpsAvg
|
|
Gauge32,
|
|
poInFilteredBwthPercentAvg
|
|
Gauge32,
|
|
poOutFilteredBwthPercentAvg
|
|
Gauge32,
|
|
poInSynbacklogtallyAvg
|
|
Gauge32,
|
|
poOutSynbacklogtallyAvg
|
|
Gauge32,
|
|
poInConnectionAvg
|
|
Gauge32,
|
|
poOutConnectionAvg
|
|
Gauge32,
|
|
poInConnreqAvg
|
|
Gauge32,
|
|
poOutConnreqAvg
|
|
Gauge32,
|
|
poInActiveHttpGetsAvg
|
|
Gauge32,
|
|
poOutActiveHttpGetsAvg
|
|
Gauge32,
|
|
poInProtectBwthPktsAvg
|
|
Gauge32,
|
|
poOutProtectBwthPktsAvg
|
|
Gauge32,
|
|
poInFloodPktsAvg
|
|
Gauge32,
|
|
poOutFloodPktsAvg
|
|
Gauge32,
|
|
poInBlockedProtocolPktsAvg
|
|
Gauge32,
|
|
poOutBlockedProtocolPktsAvg
|
|
Gauge32,
|
|
poInBlockedStatePktsAvg
|
|
Gauge32,
|
|
poOutBlockedStatePktsAvg
|
|
Gauge32,
|
|
poInIpAttackPktsAvg
|
|
Gauge32,
|
|
poOutIpAttackPktsAvg
|
|
Gauge32,
|
|
poInTcpAttackPktsAvg
|
|
Gauge32,
|
|
poOutTcpAttackPktsAvg
|
|
Gauge32,
|
|
poInUdpAttackPktsAvg
|
|
Gauge32,
|
|
poOutUdpAttackPktsAvg
|
|
Gauge32,
|
|
poInIcmpAttackPktsAvg
|
|
Gauge32,
|
|
poOutIcmpAttackPktsAvg
|
|
Gauge32,
|
|
poInOtherIpAttackPktsAvg
|
|
Gauge32,
|
|
poOutOtherIpAttackPktsAvg
|
|
Gauge32,
|
|
poInFragmentAttackPktsAvg
|
|
Gauge32,
|
|
poOutFragmentAttackPktsAvg
|
|
Gauge32,
|
|
poInBadipPktsAvg
|
|
Gauge32,
|
|
poOutBadipPktsAvg
|
|
Gauge32,
|
|
poInBadTcpPktsAvg
|
|
Gauge32,
|
|
poOutBadTcpPktsAvg
|
|
Gauge32,
|
|
poInBadUdpPktsAvg
|
|
Gauge32,
|
|
poOutBadUdpPktsAvg
|
|
Gauge32,
|
|
poInBadIcmpPktsAvg
|
|
Gauge32,
|
|
poOutBadIcmpPktsAvg
|
|
Gauge32,
|
|
poInBadOtherIpPktsAvg
|
|
Gauge32,
|
|
poOutBadOtherIpPktsAvg
|
|
Gauge32,
|
|
poInOverloadedAvg
|
|
Gauge32,
|
|
poOutOverloadedAvg
|
|
Gauge32,
|
|
poInLatencyAvg
|
|
Gauge32,
|
|
poOutLatencyAvg
|
|
Gauge32,
|
|
poInTotalBpsMax
|
|
Gauge32,
|
|
poOutTotalBpsMax
|
|
Gauge32,
|
|
poInTotalPpsMax
|
|
Gauge32,
|
|
poOutTotalPpsMax
|
|
Gauge32,
|
|
poInSmallPpsMax
|
|
Gauge32,
|
|
poOutSmallPpsMax
|
|
Gauge32,
|
|
poInMediumPpsMax
|
|
Gauge32,
|
|
poOutMediumPpsMax
|
|
Gauge32,
|
|
poInLargePpsMax
|
|
Gauge32,
|
|
poOutLargePpsMax
|
|
Gauge32,
|
|
poInDroppedBpsMax
|
|
Gauge32,
|
|
poOutDroppedBpsMax
|
|
Gauge32,
|
|
poInDroppedPpsMax
|
|
Gauge32,
|
|
poOutDroppedPpsMax
|
|
Gauge32,
|
|
poInCharmDroppedBpsMax
|
|
Gauge32,
|
|
poOutCharmDroppedBpsMax
|
|
Gauge32,
|
|
poInFilteredBwthPercentMax
|
|
Gauge32,
|
|
poOutFilteredBwthPercentMax
|
|
Gauge32,
|
|
poInSynbacklogtallyMax
|
|
Gauge32,
|
|
poOutSynbacklogtallyMax
|
|
Gauge32,
|
|
poInConnectionMax
|
|
Gauge32,
|
|
poOutConnectionMax
|
|
Gauge32,
|
|
poInConnreqMax
|
|
Gauge32,
|
|
poOutConnreqMax
|
|
Gauge32,
|
|
poInActiveHttpGetsMax
|
|
Gauge32,
|
|
poOutActiveHttpGetsMax
|
|
Gauge32,
|
|
poInProtectBwthPktsMax
|
|
Gauge32,
|
|
poOutProtectBwthPktsMax
|
|
Gauge32,
|
|
poInFloodPktsMax
|
|
Gauge32,
|
|
poOutFloodPktsMax
|
|
Gauge32,
|
|
poInBlockedProtocolPktsMax
|
|
Gauge32,
|
|
poOutBlockedProtocolPktsMax
|
|
Gauge32,
|
|
poInBlockedStatePktsMax
|
|
Gauge32,
|
|
poOutBlockedStatePktsMax
|
|
Gauge32,
|
|
poInIpAttackPktsMax
|
|
Gauge32,
|
|
poOutIpAttackPktsMax
|
|
Gauge32,
|
|
poInTcpAttackPktsMax
|
|
Gauge32,
|
|
poOutTcpAttackPktsMax
|
|
Gauge32,
|
|
poInUdpAttackPktsMax
|
|
Gauge32,
|
|
poOutUdpAttackPktsMax
|
|
Gauge32,
|
|
poInIcmpAttackPktsMax
|
|
Gauge32,
|
|
poOutIcmpAttackPktsMax
|
|
Gauge32,
|
|
poInOtherIpAttackPktsMax
|
|
Gauge32,
|
|
poOutOtherIpAttackPktsMax
|
|
Gauge32,
|
|
poInFragmentAttackPktsMax
|
|
Gauge32,
|
|
poOutFragmentAttackPktsMax
|
|
Gauge32,
|
|
poInBadipPktsMax
|
|
Gauge32,
|
|
poOutBadipPktsMax
|
|
Gauge32,
|
|
poInBadTcpPktsMax
|
|
Gauge32,
|
|
poOutBadTcpPktsMax
|
|
Gauge32,
|
|
poInBadUdpPktsMax
|
|
Gauge32,
|
|
poOutBadUdpPktsMax
|
|
Gauge32,
|
|
poInBadIcmpPktsMax
|
|
Gauge32,
|
|
poOutBadIcmpPktsMax
|
|
Gauge32,
|
|
poInBadOtherIpPktsMax
|
|
Gauge32,
|
|
poOutBadOtherIpPktsMax
|
|
Gauge32,
|
|
poInOverloadedMax
|
|
Gauge32,
|
|
poOutOverloadedMax
|
|
Gauge32,
|
|
poInLatencyMax
|
|
Gauge32,
|
|
poOutLatencyMax
|
|
Gauge32,
|
|
poInTotalBytesCnt
|
|
Counter64,
|
|
poOutTotalBytesCnt
|
|
Counter64,
|
|
poInDroppedBytesCnt
|
|
Counter64,
|
|
poOutDroppedBytesCnt
|
|
Counter64,
|
|
poInCharmDroppedBytesCnt
|
|
Counter64,
|
|
poOutCharmDroppedBytesCnt
|
|
Counter64,
|
|
poInTotalPpsCnt
|
|
Counter32,
|
|
poOutTotalPpsCnt
|
|
Counter32,
|
|
poInSmallPpsCnt
|
|
Counter32,
|
|
poOutSmallPpsCnt
|
|
Counter32,
|
|
poInMediumPpsCnt
|
|
Counter32,
|
|
poOutMediumPpsCnt
|
|
Counter32,
|
|
poInLargePpsCnt
|
|
Counter32,
|
|
poOutLargePpsCnt
|
|
Counter32,
|
|
poInDroppedPpsCnt
|
|
Counter32,
|
|
poOutDroppedPpsCnt
|
|
Counter32,
|
|
poInFilteredBwthPercentCnt
|
|
Counter32,
|
|
poOutFilteredBwthPercentCnt
|
|
Counter32,
|
|
poInConnreqCnt
|
|
Counter32,
|
|
poOutConnreqCnt
|
|
Counter32
|
|
}
|
|
|
|
poStatsIndex OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Index to Portal Statistics"
|
|
::= { poStatsEntry 1 }
|
|
|
|
poPortalName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The name associated with this portal"
|
|
::= { poStatsEntry 2 }
|
|
|
|
poInTotalBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input bits per second"
|
|
::= { poStatsEntry 901 }
|
|
|
|
poOutTotalBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of output bits per second"
|
|
::= { poStatsEntry 902 }
|
|
|
|
poInTotalPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average packets/sec traffic rate inbound since last restart or reset"
|
|
::= { poStatsEntry 903 }
|
|
|
|
poOutTotalPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average packets/sec traffic rate outbound since last restart or reset"
|
|
::= { poStatsEntry 904 }
|
|
|
|
poInSmallPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { poStatsEntry 905 }
|
|
|
|
poOutSmallPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { poStatsEntry 906 }
|
|
|
|
poInMediumPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 907 }
|
|
|
|
poOutMediumPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 908 }
|
|
|
|
poInLargePpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 909 }
|
|
|
|
poOutLargePpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 910 }
|
|
|
|
poInDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input bits Dropped per second"
|
|
::= { poStatsEntry 911 }
|
|
|
|
poOutDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of output bits Dropped per second"
|
|
::= { poStatsEntry 912 }
|
|
|
|
poInDroppedPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input packets Dropped per second"
|
|
::= { poStatsEntry 913 }
|
|
|
|
poOutDroppedPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of output packets Dropped per second"
|
|
::= { poStatsEntry 914 }
|
|
|
|
poInCharmDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound bits per second dropped by heuristic detection"
|
|
::= { poStatsEntry 915 }
|
|
|
|
poOutCharmDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound bits per second dropped by heuristic detection"
|
|
::= { poStatsEntry 916 }
|
|
|
|
poInFilteredBwthPercentAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { poStatsEntry 917 }
|
|
|
|
poOutFilteredBwthPercentAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { poStatsEntry 918 }
|
|
|
|
poInSynbacklogtallyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of partially open TCP connections inbound"
|
|
::= { poStatsEntry 919 }
|
|
|
|
poOutSynbacklogtallyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of partially open TCP connections outbound"
|
|
::= { poStatsEntry 920 }
|
|
|
|
poInConnectionAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound TCP connections"
|
|
::= { poStatsEntry 921 }
|
|
|
|
poOutConnectionAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound TCP connections"
|
|
::= { poStatsEntry 922 }
|
|
|
|
poInConnreqAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound TCP connection requests"
|
|
::= { poStatsEntry 923 }
|
|
|
|
poOutConnreqAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound TCP connection requests"
|
|
::= { poStatsEntry 924 }
|
|
|
|
poInActiveHttpGetsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound HTTP page requests being processed"
|
|
::= { poStatsEntry 925 }
|
|
|
|
poOutActiveHttpGetsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound HTTP page requests being processed"
|
|
::= { poStatsEntry 926 }
|
|
|
|
poInProtectBwthPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound protected bandwifth"
|
|
::= { poStatsEntry 927 }
|
|
|
|
poOutProtectBwthPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound protected bandwifth"
|
|
::= { poStatsEntry 928 }
|
|
|
|
poInFloodPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound packets causing flooding"
|
|
::= { poStatsEntry 929 }
|
|
|
|
poOutFloodPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound packets causing flooding"
|
|
::= { poStatsEntry 930 }
|
|
|
|
poInBlockedProtocolPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets dropped by filter "
|
|
::= { poStatsEntry 931 }
|
|
|
|
poOutBlockedProtocolPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets dropped by filter"
|
|
::= { poStatsEntry 932 }
|
|
|
|
poInBlockedStatePktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets dropped due to incorrect state"
|
|
::= { poStatsEntry 933 }
|
|
|
|
poOutBlockedStatePktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets dropped due to incorrect state"
|
|
::= { poStatsEntry 934 }
|
|
|
|
poInIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an IP Attack"
|
|
::= { poStatsEntry 935 }
|
|
|
|
poOutIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an IP Attack"
|
|
::= { poStatsEntry 936 }
|
|
|
|
poInTcpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a TCP Attack"
|
|
::= { poStatsEntry 937 }
|
|
|
|
poOutTcpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a TCP Attack"
|
|
::= { poStatsEntry 938 }
|
|
|
|
poInUdpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a UDP Attack"
|
|
::= { poStatsEntry 939 }
|
|
|
|
poOutUdpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a UDP Attack"
|
|
::= { poStatsEntry 940 }
|
|
|
|
poInIcmpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a ICMP Attack"
|
|
::= { poStatsEntry 941 }
|
|
|
|
poOutIcmpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a ICMP Attack"
|
|
::= { poStatsEntry 942 }
|
|
|
|
poInOtherIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an IP Attack using other protocols"
|
|
::= { poStatsEntry 943 }
|
|
|
|
poOutOtherIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an IP Attack using other protocols"
|
|
::= { poStatsEntry 944 }
|
|
|
|
poInFragmentAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an Fragmentation Attack"
|
|
::= { poStatsEntry 945 }
|
|
|
|
poOutFragmentAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an Fragmentation Attack"
|
|
::= { poStatsEntry 946 }
|
|
|
|
poInBadipPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets with malformed IP Headers"
|
|
::= { poStatsEntry 947 }
|
|
|
|
poOutBadipPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets with malformed IP Headers"
|
|
::= { poStatsEntry 948 }
|
|
|
|
poInBadTcpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets with bad TCP protocol/state"
|
|
::= { poStatsEntry 949 }
|
|
|
|
poOutBadTcpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets with bad TCP protocol/state"
|
|
::= { poStatsEntry 950 }
|
|
|
|
poInBadUdpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound UDP packets with malformed header or missing data"
|
|
::= { poStatsEntry 951 }
|
|
|
|
poOutBadUdpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound UDP packets with malformed header or missing data"
|
|
::= { poStatsEntry 952 }
|
|
|
|
poInBadIcmpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound ICMP packets with malformed header"
|
|
::= { poStatsEntry 953 }
|
|
|
|
poOutBadIcmpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound ICMP packets with malformed header"
|
|
::= { poStatsEntry 954 }
|
|
|
|
poInBadOtherIpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets of other protocol with malformed header"
|
|
::= { poStatsEntry 955 }
|
|
|
|
poOutBadOtherIpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets of other protocol with malformed header"
|
|
::= { poStatsEntry 956 }
|
|
|
|
poInOverloadedAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound packets overloading the protected IP"
|
|
::= { poStatsEntry 957 }
|
|
|
|
poOutOverloadedAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound packets overloading the protected IP"
|
|
::= { poStatsEntry 958 }
|
|
|
|
poInLatencyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound Latency"
|
|
::= { poStatsEntry 959 }
|
|
|
|
poOutLatencyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound Latency"
|
|
::= { poStatsEntry 960 }
|
|
|
|
poInTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of input bits per second"
|
|
::= { poStatsEntry 1001 }
|
|
|
|
poOutTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of output bits per second"
|
|
::= { poStatsEntry 1002 }
|
|
|
|
poInTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak packets/sec traffic rate inbound since last restart or reset"
|
|
::= { poStatsEntry 1003 }
|
|
|
|
poOutTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak packets/sec traffic rate outbound since last
|
|
restart or reset"
|
|
::= { poStatsEntry 1004 }
|
|
|
|
poInSmallPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { poStatsEntry 1005 }
|
|
|
|
poOutSmallPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { poStatsEntry 1006 }
|
|
|
|
poInMediumPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1007 }
|
|
|
|
poOutMediumPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1008 }
|
|
|
|
poInLargePpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1009 }
|
|
|
|
poOutLargePpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1010 }
|
|
|
|
poInDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input bits Dropped per second"
|
|
::= { poStatsEntry 1011 }
|
|
|
|
poOutDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of output bits Dropped per second"
|
|
::= { poStatsEntry 1012 }
|
|
|
|
poInDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input packets Dropped per second"
|
|
::= { poStatsEntry 1013 }
|
|
|
|
poOutDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of output packets Dropped per second"
|
|
::= { poStatsEntry 1014 }
|
|
|
|
poInCharmDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound bits per second dropped by heuristic detection"
|
|
::= { poStatsEntry 1015 }
|
|
|
|
poOutCharmDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound bits per second dropped by heuristic detection"
|
|
::= { poStatsEntry 1016 }
|
|
|
|
poInFilteredBwthPercentMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { poStatsEntry 1017 }
|
|
|
|
poOutFilteredBwthPercentMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { poStatsEntry 1018 }
|
|
|
|
poInSynbacklogtallyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of partially open TCP connections inbound"
|
|
::= { poStatsEntry 1019 }
|
|
|
|
poOutSynbacklogtallyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of partially open TCP connections outbound"
|
|
::= { poStatsEntry 1020 }
|
|
|
|
poInConnectionMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound TCP connections"
|
|
::= { poStatsEntry 1021 }
|
|
|
|
poOutConnectionMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound TCP connections"
|
|
::= { poStatsEntry 1022 }
|
|
|
|
poInConnreqMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound TCP connection requests"
|
|
::= { poStatsEntry 1023 }
|
|
|
|
poOutConnreqMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound TCP connection requests"
|
|
::= { poStatsEntry 1024 }
|
|
|
|
poInActiveHttpGetsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound HTTP page requests being processed"
|
|
::= { poStatsEntry 1025 }
|
|
|
|
poOutActiveHttpGetsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound HTTP page requests being processed"
|
|
::= { poStatsEntry 1026 }
|
|
|
|
poInProtectBwthPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound protected bandwifth"
|
|
::= { poStatsEntry 1027 }
|
|
|
|
poOutProtectBwthPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound protected bandwifth"
|
|
::= { poStatsEntry 1028 }
|
|
|
|
poInFloodPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound packets causing flooding"
|
|
::= { poStatsEntry 1029 }
|
|
|
|
poOutFloodPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound packets causing flooding"
|
|
::= { poStatsEntry 1030 }
|
|
|
|
poInBlockedProtocolPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets dropped by filter "
|
|
::= { poStatsEntry 1031 }
|
|
|
|
poOutBlockedProtocolPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets dropped by filter"
|
|
::= { poStatsEntry 1032 }
|
|
|
|
poInBlockedStatePktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets dropped due to incorrect state"
|
|
::= { poStatsEntry 1033 }
|
|
|
|
poOutBlockedStatePktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets dropped due to incorrect state"
|
|
::= { poStatsEntry 1034 }
|
|
|
|
poInIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an IP Attack"
|
|
::= { poStatsEntry 1035 }
|
|
|
|
poOutIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an IP Attack"
|
|
::= { poStatsEntry 1036 }
|
|
|
|
poInTcpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a TCP Attack"
|
|
::= { poStatsEntry 1037 }
|
|
|
|
poOutTcpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a TCP Attack"
|
|
::= { poStatsEntry 1038 }
|
|
|
|
poInUdpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a UDP Attack"
|
|
::= { poStatsEntry 1039 }
|
|
|
|
poOutUdpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a UDP Attack"
|
|
::= { poStatsEntry 1040 }
|
|
|
|
poInIcmpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a ICMP Attack"
|
|
::= { poStatsEntry 1041 }
|
|
|
|
poOutIcmpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a ICMP Attack"
|
|
::= { poStatsEntry 1042 }
|
|
|
|
poInOtherIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an IP Attack using other protocols"
|
|
::= { poStatsEntry 1043 }
|
|
|
|
poOutOtherIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an IP Attack using other protocols"
|
|
::= { poStatsEntry 1044 }
|
|
|
|
poInFragmentAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an Fragmentation Attack"
|
|
::= { poStatsEntry 1045 }
|
|
|
|
poOutFragmentAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an Fragmentation Attack"
|
|
::= { poStatsEntry 1046 }
|
|
|
|
poInBadipPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets with malformed IP Headers"
|
|
::= { poStatsEntry 1047 }
|
|
|
|
poOutBadipPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets with malformed IP Headers"
|
|
::= { poStatsEntry 1048 }
|
|
|
|
poInBadTcpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets with bad TCP protocol/state"
|
|
::= { poStatsEntry 1049 }
|
|
|
|
poOutBadTcpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets with bad TCP protocol/state"
|
|
::= { poStatsEntry 1050 }
|
|
|
|
poInBadUdpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound UDP packets with malformed header or missing data"
|
|
::= { poStatsEntry 1051 }
|
|
|
|
poOutBadUdpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound UDP packets with malformed header or missing data"
|
|
::= { poStatsEntry 1052 }
|
|
|
|
poInBadIcmpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound ICMP packets with malformed header"
|
|
::= { poStatsEntry 1053 }
|
|
|
|
poOutBadIcmpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound ICMP packets with malformed header"
|
|
::= { poStatsEntry 1054 }
|
|
|
|
poInBadOtherIpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets of other protocol with malformed header"
|
|
::= { poStatsEntry 1055 }
|
|
|
|
poOutBadOtherIpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets of other protocol with malformed header"
|
|
::= { poStatsEntry 1056 }
|
|
|
|
poInOverloadedMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound packets overloading the protected IP"
|
|
::= { poStatsEntry 1057 }
|
|
|
|
poOutOverloadedMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound packets overloading the protected IP"
|
|
::= { poStatsEntry 1058 }
|
|
|
|
poInLatencyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound Latency"
|
|
::= { poStatsEntry 1059 }
|
|
|
|
poOutLatencyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound Latency"
|
|
::= { poStatsEntry 1060 }
|
|
|
|
poInTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes seen inbound by DDoS Secure"
|
|
::= { poStatsEntry 1101 }
|
|
|
|
poOutTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes seen outbound by DDoS Secure"
|
|
::= { poStatsEntry 1102 }
|
|
|
|
poInDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped inbound by DDoS Secure"
|
|
::= { poStatsEntry 1103 }
|
|
|
|
poOutDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped outbound by DDoS Secure"
|
|
::= { poStatsEntry 1104 }
|
|
|
|
poInCharmDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped inbound using CHARM heuristics"
|
|
::= { poStatsEntry 1105 }
|
|
|
|
poOutCharmDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of bytes Dropped outbound using CHARM heuristics"
|
|
::= { poStatsEntry 1106 }
|
|
|
|
poInTotalPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total packets/sec traffic rate inbound since last restart or reset"
|
|
::= { poStatsEntry 1109 }
|
|
|
|
poOutTotalPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total packets/sec traffic rate outbound since last
|
|
restart or reset"
|
|
::= { poStatsEntry 1110 }
|
|
|
|
poInSmallPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { poStatsEntry 1111 }
|
|
|
|
poOutSmallPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { poStatsEntry 1112 }
|
|
|
|
poInMediumPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1113 }
|
|
|
|
poOutMediumPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1114 }
|
|
|
|
poInLargePpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1115 }
|
|
|
|
poOutLargePpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { poStatsEntry 1116 }
|
|
|
|
poInDroppedPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input packets Dropped per second"
|
|
::= { poStatsEntry 1119 }
|
|
|
|
poOutDroppedPpsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output packets Dropped per second"
|
|
::= { poStatsEntry 1120 }
|
|
|
|
poInFilteredBwthPercentCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { poStatsEntry 1121 }
|
|
|
|
poOutFilteredBwthPercentCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { poStatsEntry 1122 }
|
|
|
|
poInConnreqCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of inbound TCP connection requests"
|
|
::= { poStatsEntry 1123 }
|
|
|
|
poOutConnreqCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of outbound TCP connection requests"
|
|
::= { poStatsEntry 1124 }
|
|
|
|
poIncidentTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF PoIncidentEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of portal incident entries"
|
|
::= { jddsPortal 5 }
|
|
|
|
poIncidentEntry OBJECT-TYPE
|
|
SYNTAX PoIncidentEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row consisting of an incident record for a specific portal"
|
|
INDEX { poIncidentYear,
|
|
poIncidentMonth,
|
|
poIncidentDay,
|
|
poIncidentNumber}
|
|
::= {poIncidentTable 1 }
|
|
|
|
PoIncidentEntry ::= SEQUENCE {
|
|
poIncidentYear
|
|
LocalIndex,
|
|
poIncidentMonth
|
|
LocalIndex,
|
|
poIncidentDay
|
|
LocalIndex,
|
|
poIncidentNumber
|
|
LocalIndex,
|
|
poIncidentPortalName
|
|
DisplayString,
|
|
poIncidentStart
|
|
DateAndTime,
|
|
poIncidentAddress
|
|
DisplayString,
|
|
poIncidentType
|
|
DisplayString,
|
|
poIncidentDirection
|
|
Direction,
|
|
poIncidentPeakRate
|
|
Gauge32,
|
|
poIncidentDropped
|
|
Gauge32
|
|
}
|
|
|
|
poIncidentYear OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record year"
|
|
::= {poIncidentEntry 1 }
|
|
|
|
poIncidentMonth OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record month"
|
|
::= {poIncidentEntry 2 }
|
|
|
|
poIncidentDay OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record day of month"
|
|
::= {poIncidentEntry 3 }
|
|
|
|
poIncidentNumber OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique (for the day) incident record number"
|
|
::= {poIncidentEntry 4 }
|
|
|
|
poIncidentPortalName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The name associated with this portal"
|
|
::= { poIncidentEntry 5 }
|
|
|
|
poIncidentStart OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident start time"
|
|
::= {poIncidentEntry 6 }
|
|
|
|
poIncidentAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Portal or Protected address affected by the incident. IP or MAC Address "
|
|
::= {poIncidentEntry 7 }
|
|
|
|
poIncidentType OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident defense type (and subtype)"
|
|
::= {poIncidentEntry 8 }
|
|
|
|
poIncidentDirection OBJECT-TYPE
|
|
SYNTAX Direction
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident direction"
|
|
::= {poIncidentEntry 9 }
|
|
|
|
poIncidentPeakRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak packets/s during this incident"
|
|
::= {poIncidentEntry 10 }
|
|
|
|
poIncidentDropped OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No of packets Dropped as part of this incident"
|
|
::= {poIncidentEntry 11 }
|
|
|
|
|
|
-- ### Portal Filter settings ###
|
|
|
|
poFiltersTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF PoFiltersEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of filter configurations"
|
|
::= { jddsPortal 6 }
|
|
|
|
poFiltersEntry OBJECT-TYPE
|
|
SYNTAX PoFiltersEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row associated with a specific portal filter"
|
|
INDEX { poFilterIndex }
|
|
::= { poFiltersTable 1 }
|
|
|
|
PoFiltersEntry ::= SEQUENCE {
|
|
poFilterIndex
|
|
LocalIndex,
|
|
poFilterName
|
|
DisplayString,
|
|
poTcpPortsList
|
|
DisplayString,
|
|
poUdpPortsList
|
|
DisplayString,
|
|
poIcmpTypesList
|
|
DisplayString,
|
|
poIpProtocolsList
|
|
DisplayString
|
|
}
|
|
|
|
poFilterIndex OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique filter index"
|
|
::= { poFiltersEntry 1 }
|
|
|
|
poFilterName OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Identifying filter name"
|
|
::= { poFiltersEntry 2 }
|
|
|
|
poTcpPortsList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma separated list of TCP ports to allow"
|
|
::= { poFiltersEntry 3 }
|
|
|
|
poUdpPortsList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma separated list of UDP ports to allow"
|
|
::= { poFiltersEntry 4 }
|
|
|
|
poIcmpTypesList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma separated list of ICMP types to allow"
|
|
::= { poFiltersEntry 5 }
|
|
|
|
poIpProtocolsList OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Comma separated list of other IP Protocols to allow"
|
|
::= { poFiltersEntry 6 }
|
|
|
|
-- ### protected IP Statistics ###
|
|
|
|
-- ** prStatsTable
|
|
prStatsTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF PrStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of protected IP statistics"
|
|
::= { jddsProtected 3 }
|
|
|
|
|
|
prStatsEntry OBJECT-TYPE
|
|
SYNTAX PrStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row associated with a specific protected IP"
|
|
INDEX { prInetAddressType,
|
|
prInetAddress }
|
|
::= { prStatsTable 1 }
|
|
|
|
PrStatsEntry ::= SEQUENCE {
|
|
prInetAddressType
|
|
InetAddressType,
|
|
prInetAddress
|
|
InetAddress,
|
|
prBandwidth
|
|
TruthValue,
|
|
prFlood
|
|
TruthValue,
|
|
prBlockedProtocol
|
|
TruthValue,
|
|
prBlockedState
|
|
TruthValue,
|
|
prIpAttack
|
|
TruthValue,
|
|
prTcpAttack
|
|
TruthValue,
|
|
prUdpAttack
|
|
TruthValue,
|
|
prIcmpAttack
|
|
TruthValue,
|
|
prOtherIpAttack
|
|
TruthValue,
|
|
prFragAttack
|
|
TruthValue,
|
|
prBadIp
|
|
TruthValue,
|
|
prBadTcp
|
|
TruthValue,
|
|
prBadUdp
|
|
TruthValue,
|
|
prBadIcmp
|
|
TruthValue,
|
|
prBadOtherIp
|
|
TruthValue,
|
|
prOverloaded
|
|
TruthValue,
|
|
prInSyn
|
|
Gauge32,
|
|
prOutSyn
|
|
Gauge32,
|
|
prInSynAck
|
|
Gauge32,
|
|
prOutSynAck
|
|
Gauge32,
|
|
prInSynSyn
|
|
Gauge32,
|
|
prOutSynSyn
|
|
Gauge32,
|
|
prInAck
|
|
Gauge32,
|
|
prOutAck
|
|
Gauge32,
|
|
prInPendAck
|
|
Gauge32,
|
|
prOutPendAck
|
|
Gauge32,
|
|
prInGet
|
|
Gauge32,
|
|
prOutGet
|
|
Gauge32,
|
|
prInEst
|
|
Gauge32,
|
|
prOutEst
|
|
Gauge32,
|
|
prInFin1Src
|
|
Gauge32,
|
|
prOutFin1Src
|
|
Gauge32,
|
|
prInFin2Src
|
|
Gauge32,
|
|
prOutFin2Src
|
|
Gauge32,
|
|
prInFin3Src
|
|
Gauge32,
|
|
prOutFin3Src
|
|
Gauge32,
|
|
prInFinFin
|
|
Gauge32,
|
|
prOutFinFin
|
|
Gauge32,
|
|
prInFin1Dst
|
|
Gauge32,
|
|
prOutFin1Dst
|
|
Gauge32,
|
|
prInFin2Dst
|
|
Gauge32,
|
|
prOutFin2Dst
|
|
Gauge32,
|
|
prInFin3Dst
|
|
Gauge32,
|
|
prOutFin3Dst
|
|
Gauge32,
|
|
prInCls
|
|
Gauge32,
|
|
prOutCls
|
|
Gauge32,
|
|
prInRst
|
|
Gauge32,
|
|
prOutRst
|
|
Gauge32,
|
|
prInRstCls
|
|
Gauge32,
|
|
prOutRstCls
|
|
Gauge32,
|
|
prInUnknown
|
|
Gauge32,
|
|
prOutUnknown
|
|
Gauge32,
|
|
prInGets
|
|
Gauge32,
|
|
prOutGets
|
|
Gauge32,
|
|
prOverloadedFlag
|
|
TruthValue,
|
|
prInTcpConnTally
|
|
Counter32,
|
|
prOutTcpConnTally
|
|
Counter32,
|
|
prInSynBacklogTally
|
|
Counter32,
|
|
prInTotalBytesCnt
|
|
Counter64,
|
|
prOutTotalBytesCnt
|
|
Counter64,
|
|
prInDroppedBytesCnt
|
|
Counter64,
|
|
prOutDroppedBytesCnt
|
|
Counter64,
|
|
prInCharmDroppedBytesCnt
|
|
Counter64,
|
|
prOutCharmDroppedBytesCnt
|
|
Counter64,
|
|
prInTotalPpsMax
|
|
Gauge32,
|
|
prOutTotalPpsMax
|
|
Gauge32,
|
|
prInDroppedPpsMax
|
|
Gauge32,
|
|
prOutDroppedPpsMax
|
|
Gauge32,
|
|
prInTotalBpsMax
|
|
Gauge32,
|
|
prOutTotalBpsMax
|
|
Gauge32,
|
|
prInDroppedBpsMax
|
|
Gauge32,
|
|
prOutDroppedBpsMax
|
|
Gauge32,
|
|
prInCharmDroppedBpsMax
|
|
Gauge32,
|
|
prOutCharmDroppedBpsMax
|
|
Gauge32,
|
|
prInProtectBwthPktsCnt
|
|
Counter32,
|
|
prOutProtectBwthPktsCnt
|
|
Counter32,
|
|
prInFloodPktsCnt
|
|
Counter32,
|
|
prOutFloodPktsCnt
|
|
Counter32,
|
|
prInBlockedProtocolPktsCnt
|
|
Counter32,
|
|
prOutBlockedProtocolPktsCnt
|
|
Counter32,
|
|
prInBlockedStatePktsCnt
|
|
Counter32,
|
|
prOutBlockedStatePktsCnt
|
|
Counter32,
|
|
prInIpAttackPktsCnt
|
|
Counter32,
|
|
prOutIpAttackPktsCnt
|
|
Counter32,
|
|
prInTcpAttackPktsCnt
|
|
Counter32,
|
|
prOutTcpAttackPktsCnt
|
|
Counter32,
|
|
prInUdpAttackPktsCnt
|
|
Counter32,
|
|
prOutUdpAttackPktsCnt
|
|
Counter32,
|
|
prInIcmpAttackPktsCnt
|
|
Counter32,
|
|
prOutIcmpAttackPktsCnt
|
|
Counter32,
|
|
prInOtherIpAttackPktsCnt
|
|
Counter32,
|
|
prOutOtherIpAttackPktsCnt
|
|
Counter32,
|
|
prInFragmentAttackPktsCnt
|
|
Counter32,
|
|
prOutFragmentAttackPktsCnt
|
|
Counter32,
|
|
prInBadIpPktsCnt
|
|
Counter32,
|
|
prOutBadIpPktsCnt
|
|
Counter32,
|
|
prInBadTcpPktsCnt
|
|
Counter32,
|
|
prOutBadTcpPktsCnt
|
|
Counter32,
|
|
prInBadUdpPktsCnt
|
|
Counter32,
|
|
prOutBadUdpPktsCnt
|
|
Counter32,
|
|
prInBadIcmpPktsCnt
|
|
Counter32,
|
|
prOutBadIcmpPktsCnt
|
|
Counter32,
|
|
prInBadOtherIpPktsCnt
|
|
Counter32,
|
|
prOutBadOtherIpPktsCnt
|
|
Counter32,
|
|
prInTotalBpsAvg
|
|
Gauge32,
|
|
prOutTotalBpsAvg
|
|
Gauge32,
|
|
prInTotalPpsAvg
|
|
Gauge32,
|
|
prOutTotalPpsAvg
|
|
Gauge32,
|
|
prInSmallPpsAvg
|
|
Gauge32,
|
|
prOutSmallPpsAvg
|
|
Gauge32,
|
|
prInMediumPpsAvg
|
|
Gauge32,
|
|
prOutMediumPpsAvg
|
|
Gauge32,
|
|
prInLargePpsAvg
|
|
Gauge32,
|
|
prOutLargePpsAvg
|
|
Gauge32,
|
|
prInDroppedBpsAvg
|
|
Gauge32,
|
|
prOutDroppedBpsAvg
|
|
Gauge32,
|
|
prInDroppedPpsAvg
|
|
Gauge32,
|
|
prOutDroppedPpsAvg
|
|
Gauge32,
|
|
prInCharmDroppedBpsAvg
|
|
Gauge32,
|
|
prOutCharmDroppedBpsAvg
|
|
Gauge32,
|
|
prInFilteredBwthPercentAvg
|
|
Gauge32,
|
|
prOutFilteredBwthPercentAvg
|
|
Gauge32,
|
|
prInSynbacklogtallyAvg
|
|
Gauge32,
|
|
prOutSynbacklogtallyAvg
|
|
Gauge32,
|
|
prInConnectionAvg
|
|
Gauge32,
|
|
prOutConnectionAvg
|
|
Gauge32,
|
|
prInConnreqAvg
|
|
Gauge32,
|
|
prOutConnreqAvg
|
|
Gauge32,
|
|
prInActiveHttpGetsAvg
|
|
Gauge32,
|
|
prOutActiveHttpGetsAvg
|
|
Gauge32,
|
|
prInProtectBwthPktsAvg
|
|
Gauge32,
|
|
prOutProtectBwthPktsAvg
|
|
Gauge32,
|
|
prInFloodPktsAvg
|
|
Gauge32,
|
|
prOutFloodPktsAvg
|
|
Gauge32,
|
|
prInBlockedProtocolPktsAvg
|
|
Gauge32,
|
|
prOutBlockedProtocolPktsAvg
|
|
Gauge32,
|
|
prInBlockedStatePktsAvg
|
|
Gauge32,
|
|
prOutBlockedStatePktsAvg
|
|
Gauge32,
|
|
prInIpAttackPktsAvg
|
|
Gauge32,
|
|
prOutIpAttackPktsAvg
|
|
Gauge32,
|
|
prInTcpAttackPktsAvg
|
|
Gauge32,
|
|
prOutTcpAttackPktsAvg
|
|
Gauge32,
|
|
prInUdpAttackPktsAvg
|
|
Gauge32,
|
|
prOutUdpAttackPktsAvg
|
|
Gauge32,
|
|
prInIcmpAttackPktsAvg
|
|
Gauge32,
|
|
prOutIcmpAttackPktsAvg
|
|
Gauge32,
|
|
prInOtherIpAttackPktsAvg
|
|
Gauge32,
|
|
prOutOtherIpAttackPktsAvg
|
|
Gauge32,
|
|
prInFragmentAttackPktsAvg
|
|
Gauge32,
|
|
prOutFragmentAttackPktsAvg
|
|
Gauge32,
|
|
prInBadipPktsAvg
|
|
Gauge32,
|
|
prOutBadipPktsAvg
|
|
Gauge32,
|
|
prInBadTcpPktsAvg
|
|
Gauge32,
|
|
prOutBadTcpPktsAvg
|
|
Gauge32,
|
|
prInBadUdpPktsAvg
|
|
Gauge32,
|
|
prOutBadUdpPktsAvg
|
|
Gauge32,
|
|
prInBadIcmpPktsAvg
|
|
Gauge32,
|
|
prOutBadIcmpPktsAvg
|
|
Gauge32,
|
|
prInBadOtherIpPktsAvg
|
|
Gauge32,
|
|
prOutBadOtherIpPktsAvg
|
|
Gauge32,
|
|
prInOverloadedAvg
|
|
Gauge32,
|
|
prOutOverloadedAvg
|
|
Gauge32,
|
|
prInLatencyAvg
|
|
Gauge32,
|
|
prOutLatencyAvg
|
|
Gauge32,
|
|
prInSmallPpsMax
|
|
Gauge32,
|
|
prOutSmallPpsMax
|
|
Gauge32,
|
|
prInMediumPpsMax
|
|
Gauge32,
|
|
prOutMediumPpsMax
|
|
Gauge32,
|
|
prInLargePpsMax
|
|
Gauge32,
|
|
prOutLargePpsMax
|
|
Gauge32,
|
|
prInFilteredBwthPercentMax
|
|
Gauge32,
|
|
prOutFilteredBwthPercentMax
|
|
Gauge32,
|
|
prInSynbacklogtallyMax
|
|
Gauge32,
|
|
prOutSynbacklogtallyMax
|
|
Gauge32,
|
|
prInConnectionMax
|
|
Gauge32,
|
|
prOutConnectionMax
|
|
Gauge32,
|
|
prInConnreqMax
|
|
Gauge32,
|
|
prOutConnreqMax
|
|
Gauge32,
|
|
prInActiveHttpGetsMax
|
|
Gauge32,
|
|
prOutActiveHttpGetsMax
|
|
Gauge32,
|
|
prInProtectBwthPktsMax
|
|
Gauge32,
|
|
prOutProtectBwthPktsMax
|
|
Gauge32,
|
|
prInFloodPktsMax
|
|
Gauge32,
|
|
prOutFloodPktsMax
|
|
Gauge32,
|
|
prInBlockedProtocolPktsMax
|
|
Gauge32,
|
|
prOutBlockedProtocolPktsMax
|
|
Gauge32,
|
|
prInBlockedStatePktsMax
|
|
Gauge32,
|
|
prOutBlockedStatePktsMax
|
|
Gauge32,
|
|
prInIpAttackPktsMax
|
|
Gauge32,
|
|
prOutIpAttackPktsMax
|
|
Gauge32,
|
|
prInTcpAttackPktsMax
|
|
Gauge32,
|
|
prOutTcpAttackPktsMax
|
|
Gauge32,
|
|
prInUdpAttackPktsMax
|
|
Gauge32,
|
|
prOutUdpAttackPktsMax
|
|
Gauge32,
|
|
prInIcmpAttackPktsMax
|
|
Gauge32,
|
|
prOutIcmpAttackPktsMax
|
|
Gauge32,
|
|
prInOtherIpAttackPktsMax
|
|
Gauge32,
|
|
prOutOtherIpAttackPktsMax
|
|
Gauge32,
|
|
prInFragmentAttackPktsMax
|
|
Gauge32,
|
|
prOutFragmentAttackPktsMax
|
|
Gauge32,
|
|
prInBadipPktsMax
|
|
Gauge32,
|
|
prOutBadipPktsMax
|
|
Gauge32,
|
|
prInBadTcpPktsMax
|
|
Gauge32,
|
|
prOutBadTcpPktsMax
|
|
Gauge32,
|
|
prInBadUdpPktsMax
|
|
Gauge32,
|
|
prOutBadUdpPktsMax
|
|
Gauge32,
|
|
prInBadIcmpPktsMax
|
|
Gauge32,
|
|
prOutBadIcmpPktsMax
|
|
Gauge32,
|
|
prInBadOtherIpPktsMax
|
|
Gauge32,
|
|
prOutBadOtherIpPktsMax
|
|
Gauge32,
|
|
prInOverloadedMax
|
|
Gauge32,
|
|
prOutOverloadedMax
|
|
Gauge32,
|
|
prInLatencyMax
|
|
Gauge32,
|
|
prOutLatencyMax
|
|
Gauge32
|
|
}
|
|
|
|
|
|
prInetAddressType OBJECT-TYPE
|
|
SYNTAX InetAddressType
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Type of IP address a specific protected IP"
|
|
::= { prStatsEntry 1 }
|
|
|
|
prInetAddress OBJECT-TYPE
|
|
SYNTAX InetAddress (SIZE (0..47))
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address of a specific protected IP"
|
|
::= { prStatsEntry 2 }
|
|
|
|
prBandwidth OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending bandwidth"
|
|
::= { prStatsEntry 101 }
|
|
|
|
prFlood OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against floods"
|
|
::= { prStatsEntry 102 }
|
|
|
|
prBlockedProtocol OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Connection floods"
|
|
::= { prStatsEntry 103 }
|
|
|
|
prBlockedState OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Connection floods"
|
|
::= { prStatsEntry 104 }
|
|
|
|
prIpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against IP Attack"
|
|
::= { prStatsEntry 105 }
|
|
|
|
prTcpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against TCP Attack"
|
|
::= { prStatsEntry 106 }
|
|
|
|
prUdpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against UDP Attack"
|
|
::= { prStatsEntry 107 }
|
|
|
|
prIcmpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against ICMP Attack"
|
|
::= { prStatsEntry 108 }
|
|
|
|
prOtherIpAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Other IP Protocol Attack"
|
|
::= { prStatsEntry 109 }
|
|
|
|
prFragAttack OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Fragment Attack"
|
|
::= { prStatsEntry 110 }
|
|
|
|
prBadIp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Bad IP packets"
|
|
::= { prStatsEntry 111 }
|
|
|
|
prBadTcp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Bad TCP packets"
|
|
::= { prStatsEntry 112 }
|
|
|
|
prBadUdp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Bad UDP packets"
|
|
::= { prStatsEntry 113 }
|
|
|
|
prBadIcmp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Bad ICMP packets"
|
|
::= { prStatsEntry 114 }
|
|
|
|
prBadOtherIp OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if defending against Bad other IP Protocol packets"
|
|
::= { prStatsEntry 115 }
|
|
|
|
prOverloaded OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if protected IP is overloaded"
|
|
::= { prStatsEntry 116 }
|
|
|
|
prInSyn OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 201 }
|
|
|
|
prOutSyn OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 202 }
|
|
|
|
prInSynAck OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 203 }
|
|
|
|
prOutSynAck OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 204 }
|
|
|
|
prInSynSyn OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 205 }
|
|
|
|
prOutSynSyn OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 206 }
|
|
|
|
prInAck OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 207 }
|
|
|
|
prOutAck OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 208 }
|
|
|
|
prInPendAck OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 209 }
|
|
|
|
prOutPendAck OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 210 }
|
|
|
|
prInGet OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 211 }
|
|
|
|
prOutGet OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 212 }
|
|
|
|
prInEst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 213 }
|
|
|
|
prOutEst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 214 }
|
|
|
|
prInFin1Src OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 215 }
|
|
|
|
prOutFin1Src OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 216 }
|
|
|
|
prInFin2Src OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 217 }
|
|
|
|
prOutFin2Src OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 218 }
|
|
|
|
prInFin3Src OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 219 }
|
|
|
|
prOutFin3Src OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 220 }
|
|
|
|
prInFinFin OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 221 }
|
|
|
|
prOutFinFin OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 222 }
|
|
|
|
prInFin1Dst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 223 }
|
|
|
|
prOutFin1Dst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 224 }
|
|
|
|
prInFin2Dst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 225 }
|
|
|
|
prOutFin2Dst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 226 }
|
|
|
|
prInFin3Dst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 227 }
|
|
|
|
prOutFin3Dst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 228 }
|
|
|
|
prInCls OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 229 }
|
|
|
|
prOutCls OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 230 }
|
|
|
|
prInRst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 231 }
|
|
|
|
prOutRst OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 232 }
|
|
|
|
prInRstCls OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 233 }
|
|
|
|
prOutRstCls OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 234 }
|
|
|
|
prInUnknown OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 235 }
|
|
|
|
prOutUnknown OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of TCP connections in given state"
|
|
::= { prStatsEntry 236 }
|
|
|
|
prInGets OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of inbound TCP connections to this protected IP processing GETS"
|
|
::= { prStatsEntry 237 }
|
|
|
|
prOutGets OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Count of outbound TCP connections from this protected IP processing GETS"
|
|
::= { prStatsEntry 238 }
|
|
|
|
prOverloadedFlag OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TRUE if protected IP overloaded"
|
|
::= { prStatsEntry 301 }
|
|
|
|
prInTcpConnTally OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of current TCP connections to protected IP originated by a client"
|
|
::= { prStatsEntry 401 }
|
|
|
|
prOutTcpConnTally OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of current TCP connections to protected IP originated by the protected IP itself"
|
|
::= { prStatsEntry 402 }
|
|
|
|
prInSynBacklogTally OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current protected IP SYN backlog"
|
|
::= { prStatsEntry 403 }
|
|
|
|
prInTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input bytes seen"
|
|
::= { prStatsEntry 501 }
|
|
|
|
prOutTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output bytes seen"
|
|
::= { prStatsEntry 502 }
|
|
|
|
prInDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input bytes Dropped"
|
|
::= { prStatsEntry 503 }
|
|
|
|
prOutDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output bytes Dropped"
|
|
::= { prStatsEntry 504 }
|
|
|
|
prInCharmDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input bytes Dropped through lack of charm"
|
|
::= { prStatsEntry 505 }
|
|
|
|
prOutCharmDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output bytes Dropped through lack of charm"
|
|
::= { prStatsEntry 506 }
|
|
|
|
prInTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input packets per second"
|
|
::= { prStatsEntry 601 }
|
|
|
|
prOutTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output packets per second"
|
|
::= { prStatsEntry 602 }
|
|
|
|
prInDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input packets Dropped per second"
|
|
::= { prStatsEntry 603 }
|
|
|
|
prOutDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output packets Dropped per second"
|
|
::= { prStatsEntry 604 }
|
|
|
|
prInTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input bits per second"
|
|
::= { prStatsEntry 701 }
|
|
|
|
prOutTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output bits per second"
|
|
::= { prStatsEntry 702 }
|
|
|
|
prInDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input bits Dropped per second"
|
|
::= { prStatsEntry 703 }
|
|
|
|
prOutDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output bits Dropped per second"
|
|
::= { prStatsEntry 704 }
|
|
|
|
prInCharmDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input bits Dropped per second through lack of charm"
|
|
::= { prStatsEntry 705 }
|
|
|
|
prOutCharmDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output bits Dropped per second through lack of charm"
|
|
::= { prStatsEntry 706 }
|
|
|
|
prInProtectBwthPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through bandwidth protection"
|
|
::= { prStatsEntry 801 }
|
|
|
|
prOutProtectBwthPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through bandwidth protection"
|
|
::= { prStatsEntry 802 }
|
|
|
|
prInFloodPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through flood protection"
|
|
::= { prStatsEntry 803 }
|
|
|
|
prOutFloodPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through flood protection"
|
|
::= { prStatsEntry 804 }
|
|
|
|
prInBlockedProtocolPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through blocked Protocol protection"
|
|
::= { prStatsEntry 805 }
|
|
|
|
prOutBlockedProtocolPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through blocked Protocol protection"
|
|
::= { prStatsEntry 806 }
|
|
|
|
prInBlockedStatePktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through blocked state protection"
|
|
::= { prStatsEntry 807 }
|
|
|
|
prOutBlockedStatePktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through blocked state protection"
|
|
::= { prStatsEntry 808 }
|
|
|
|
prInIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through IP Attack"
|
|
::= { prStatsEntry 809 }
|
|
|
|
prOutIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through IP Attack"
|
|
::= { prStatsEntry 810 }
|
|
|
|
prInTcpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through TCP Attack"
|
|
::= { prStatsEntry 811 }
|
|
|
|
prOutTcpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through TCP Attack"
|
|
::= { prStatsEntry 812 }
|
|
|
|
prInUdpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through UDP Attack"
|
|
::= { prStatsEntry 813 }
|
|
|
|
prOutUdpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through UDP Attack"
|
|
::= { prStatsEntry 814 }
|
|
|
|
prInIcmpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through ICMP Attack"
|
|
::= { prStatsEntry 815 }
|
|
|
|
prOutIcmpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through ICMP Attack"
|
|
::= { prStatsEntry 816 }
|
|
|
|
prInOtherIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through Other IP Protocol Attack"
|
|
::= { prStatsEntry 817 }
|
|
|
|
prOutOtherIpAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through Other IP Protocol Attack"
|
|
::= { prStatsEntry 818 }
|
|
|
|
prInFragmentAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through fragment Attack protection"
|
|
::= { prStatsEntry 819 }
|
|
|
|
prOutFragmentAttackPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through fragment Attack protection"
|
|
::= { prStatsEntry 820 }
|
|
|
|
prInBadIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through bad IP packet protection"
|
|
::= { prStatsEntry 821 }
|
|
|
|
prOutBadIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through bad IP packet protection"
|
|
::= { prStatsEntry 822 }
|
|
|
|
prInBadTcpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through bad TCP packet protection"
|
|
::= { prStatsEntry 823 }
|
|
|
|
prOutBadTcpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through bad TCP packet protection"
|
|
::= { prStatsEntry 824 }
|
|
|
|
prInBadUdpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through bad UDP packet protection"
|
|
::= { prStatsEntry 825 }
|
|
|
|
prOutBadUdpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through bad UDP packet protection"
|
|
::= { prStatsEntry 826 }
|
|
|
|
prInBadIcmpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through bad ICMP packet protection"
|
|
::= { prStatsEntry 827 }
|
|
|
|
prOutBadIcmpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through bad ICMP packet protection"
|
|
::= { prStatsEntry 828 }
|
|
|
|
prInBadOtherIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of input packets Dropped through bad Other IP Protocol packet protection"
|
|
::= { prStatsEntry 829 }
|
|
|
|
prOutBadOtherIpPktsCnt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Number of output packets Dropped through bad Other IP Protocol packet protection"
|
|
::= { prStatsEntry 830 }
|
|
|
|
prInTotalBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input bits per second"
|
|
::= { prStatsEntry 901 }
|
|
|
|
prOutTotalBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of output bits per second"
|
|
::= { prStatsEntry 902 }
|
|
|
|
prInTotalPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average packets/sec traffic rate inbound since last restart or reset"
|
|
::= { prStatsEntry 903 }
|
|
|
|
prOutTotalPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average packets/sec traffic rate outbound since last restart or reset"
|
|
::= { prStatsEntry 904 }
|
|
|
|
prInSmallPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { prStatsEntry 905 }
|
|
|
|
prOutSmallPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { prStatsEntry 906 }
|
|
|
|
prInMediumPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 907 }
|
|
|
|
prOutMediumPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 908 }
|
|
|
|
prInLargePpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 909 }
|
|
|
|
prOutLargePpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 910 }
|
|
|
|
prInDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input bits Dropped per second"
|
|
::= { prStatsEntry 911 }
|
|
|
|
prOutDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of output bits Dropped per second"
|
|
::= { prStatsEntry 912 }
|
|
|
|
prInDroppedPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Average number of input packets Dropped per second"
|
|
::= { prStatsEntry 913 }
|
|
|
|
prOutDroppedPpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of output packets Dropped per second"
|
|
::= { prStatsEntry 914 }
|
|
|
|
prInCharmDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound bits per second dropped by heuristic detection"
|
|
::= { prStatsEntry 915 }
|
|
|
|
prOutCharmDroppedBpsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound bits per second dropped by heuristic detection"
|
|
::= { prStatsEntry 916 }
|
|
|
|
prInFilteredBwthPercentAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { prStatsEntry 917 }
|
|
|
|
prOutFilteredBwthPercentAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { prStatsEntry 918 }
|
|
|
|
prInSynbacklogtallyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of partially open TCP connections inbound"
|
|
::= { prStatsEntry 919 }
|
|
|
|
prOutSynbacklogtallyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of partially open TCP connections outbound"
|
|
::= { prStatsEntry 920 }
|
|
|
|
prInConnectionAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound TCP connections"
|
|
::= { prStatsEntry 921 }
|
|
|
|
prOutConnectionAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound TCP connections"
|
|
::= { prStatsEntry 922 }
|
|
|
|
prInConnreqAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound TCP connection requests"
|
|
::= { prStatsEntry 923 }
|
|
|
|
prOutConnreqAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound TCP connection requests"
|
|
::= { prStatsEntry 924 }
|
|
|
|
prInActiveHttpGetsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound HTTP page requests being processed"
|
|
::= { prStatsEntry 925 }
|
|
|
|
prOutActiveHttpGetsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound HTTP page requests being processed"
|
|
::= { prStatsEntry 926 }
|
|
|
|
prInProtectBwthPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound protected bandwifth"
|
|
::= { prStatsEntry 927 }
|
|
|
|
prOutProtectBwthPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound protected bandwifth"
|
|
::= { prStatsEntry 928 }
|
|
|
|
prInFloodPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound packets causing flooding"
|
|
::= { prStatsEntry 929 }
|
|
|
|
prOutFloodPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound packets causing flooding"
|
|
::= { prStatsEntry 930 }
|
|
|
|
prInBlockedProtocolPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets dropped by filter "
|
|
::= { prStatsEntry 931 }
|
|
|
|
prOutBlockedProtocolPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets dropped by filter"
|
|
::= { prStatsEntry 932 }
|
|
|
|
prInBlockedStatePktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets dropped due to incorrect state"
|
|
::= { prStatsEntry 933 }
|
|
|
|
prOutBlockedStatePktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets dropped due to incorrect state"
|
|
::= { prStatsEntry 934 }
|
|
|
|
prInIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an IP Attack"
|
|
::= { prStatsEntry 935 }
|
|
|
|
prOutIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an IP Attack"
|
|
::= { prStatsEntry 936 }
|
|
|
|
prInTcpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a TCP Attack"
|
|
::= { prStatsEntry 937 }
|
|
|
|
prOutTcpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a TCP Attack"
|
|
::= { prStatsEntry 938 }
|
|
|
|
prInUdpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a UDP Attack"
|
|
::= { prStatsEntry 939 }
|
|
|
|
prOutUdpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a UDP Attack"
|
|
::= { prStatsEntry 940 }
|
|
|
|
prInIcmpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in a ICMP Attack"
|
|
::= { prStatsEntry 941 }
|
|
|
|
prOutIcmpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in a ICMP Attack"
|
|
::= { prStatsEntry 942 }
|
|
|
|
prInOtherIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an IP Attack using other protocols"
|
|
::= { prStatsEntry 943 }
|
|
|
|
prOutOtherIpAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an IP Attack using other protocols"
|
|
::= { prStatsEntry 944 }
|
|
|
|
prInFragmentAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets in an Fragmentation Attack"
|
|
::= { prStatsEntry 945 }
|
|
|
|
prOutFragmentAttackPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets in an Fragmentation Attack"
|
|
::= { prStatsEntry 946 }
|
|
|
|
prInBadipPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets with malformed IP Headers"
|
|
::= { prStatsEntry 947 }
|
|
|
|
prOutBadipPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets with malformed IP Headers"
|
|
::= { prStatsEntry 948 }
|
|
|
|
prInBadTcpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets with bad TCP protocol/state"
|
|
::= { prStatsEntry 949 }
|
|
|
|
prOutBadTcpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets with bad TCP protocol/state"
|
|
::= { prStatsEntry 950 }
|
|
|
|
prInBadUdpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound UDP packets with malformed header or missing data"
|
|
::= { prStatsEntry 951 }
|
|
|
|
prOutBadUdpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound UDP packets with malformed header or missing data"
|
|
::= { prStatsEntry 952 }
|
|
|
|
prInBadIcmpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound ICMP packets with malformed header"
|
|
::= { prStatsEntry 953 }
|
|
|
|
prOutBadIcmpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound ICMP packets with malformed header"
|
|
::= { prStatsEntry 954 }
|
|
|
|
prInBadOtherIpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound IP packets of other protocol with malformed header"
|
|
::= { prStatsEntry 955 }
|
|
|
|
prOutBadOtherIpPktsAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound IP packets of other protocol with malformed header"
|
|
::= { prStatsEntry 956 }
|
|
|
|
prInOverloadedAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of inbound packets overloading the protected IP"
|
|
::= { prStatsEntry 957 }
|
|
|
|
prOutOverloadedAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged number of outbound packets overloading the protected IP"
|
|
::= { prStatsEntry 958 }
|
|
|
|
prInLatencyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged inbound Latency"
|
|
::= { prStatsEntry 959 }
|
|
|
|
prOutLatencyAvg OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Averaged outbound Latency"
|
|
::= { prStatsEntry 960 }
|
|
|
|
prInSmallPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { prStatsEntry 1001 }
|
|
|
|
prOutSmallPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (256 bytes or less) per second processed. Dropped data is not included"
|
|
::= { prStatsEntry 1002 }
|
|
|
|
prInMediumPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 1003 }
|
|
|
|
prOutMediumPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (1024 bytes or less, but greater than 256 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 1004 }
|
|
|
|
prInLargePpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 1005 }
|
|
|
|
prOutLargePpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound packets (greater than 1024 bytes) per second. Dropped data is not included"
|
|
::= { prStatsEntry 1006 }
|
|
|
|
prInFilteredBwthPercentMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { prStatsEntry 1007 }
|
|
|
|
prOutFilteredBwthPercentMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound dropped bandwidth divided by the actual bandwidth"
|
|
::= { prStatsEntry 1008 }
|
|
|
|
prInSynbacklogtallyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of partially open TCP connections inbound"
|
|
::= { prStatsEntry 1009 }
|
|
|
|
prOutSynbacklogtallyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of partially open TCP connections outbound"
|
|
::= { prStatsEntry 1010 }
|
|
|
|
prInConnectionMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound TCP connections"
|
|
::= { prStatsEntry 1011 }
|
|
|
|
prOutConnectionMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound TCP connections"
|
|
::= { prStatsEntry 1012 }
|
|
|
|
prInConnreqMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound TCP connection requests"
|
|
::= { prStatsEntry 1013 }
|
|
|
|
prOutConnreqMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound TCP connection requests"
|
|
::= { prStatsEntry 1014 }
|
|
|
|
prInActiveHttpGetsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound HTTP page requests being processed"
|
|
::= { prStatsEntry 1015 }
|
|
|
|
prOutActiveHttpGetsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound HTTP page requests being processed"
|
|
::= { prStatsEntry 1016 }
|
|
|
|
prInProtectBwthPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound protected bandwifth"
|
|
::= { prStatsEntry 1017 }
|
|
|
|
prOutProtectBwthPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound protected bandwifth"
|
|
::= { prStatsEntry 1018 }
|
|
|
|
prInFloodPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound packets causing flooding"
|
|
::= { prStatsEntry 1019 }
|
|
|
|
prOutFloodPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound packets causing flooding"
|
|
::= { prStatsEntry 1020 }
|
|
|
|
prInBlockedProtocolPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets dropped by filter "
|
|
::= { prStatsEntry 1021 }
|
|
|
|
prOutBlockedProtocolPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets dropped by filter"
|
|
::= { prStatsEntry 1022 }
|
|
|
|
prInBlockedStatePktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets dropped due to incorrect state"
|
|
::= { prStatsEntry 1023 }
|
|
|
|
prOutBlockedStatePktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets dropped due to incorrect state"
|
|
::= { prStatsEntry 1024 }
|
|
|
|
prInIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an IP Attack"
|
|
::= { prStatsEntry 1025 }
|
|
|
|
prOutIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an IP Attack"
|
|
::= { prStatsEntry 1026 }
|
|
|
|
prInTcpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a TCP Attack"
|
|
::= { prStatsEntry 1027 }
|
|
|
|
prOutTcpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a TCP Attack"
|
|
::= { prStatsEntry 1028 }
|
|
|
|
prInUdpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a UDP Attack"
|
|
::= { prStatsEntry 1029 }
|
|
|
|
prOutUdpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a UDP Attack"
|
|
::= { prStatsEntry 1030 }
|
|
|
|
prInIcmpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in a ICMP Attack"
|
|
::= { prStatsEntry 1031 }
|
|
|
|
prOutIcmpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in a ICMP Attack"
|
|
::= { prStatsEntry 1032 }
|
|
|
|
prInOtherIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an IP Attack using other protocols"
|
|
::= { prStatsEntry 1033 }
|
|
|
|
prOutOtherIpAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an IP Attack using other protocols"
|
|
::= { prStatsEntry 1034 }
|
|
|
|
prInFragmentAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets in an Fragmentation Attack"
|
|
::= { prStatsEntry 1035 }
|
|
|
|
prOutFragmentAttackPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets in an Fragmentation Attack"
|
|
::= { prStatsEntry 1036 }
|
|
|
|
prInBadipPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets with malformed IP Headers"
|
|
::= { prStatsEntry 1037 }
|
|
|
|
prOutBadipPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets with malformed IP Headers"
|
|
::= { prStatsEntry 1038 }
|
|
|
|
prInBadTcpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets with bad TCP protocol/state"
|
|
::= { prStatsEntry 1039 }
|
|
|
|
prOutBadTcpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets with bad TCP protocol/state"
|
|
::= { prStatsEntry 1040 }
|
|
|
|
prInBadUdpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound UDP packets with malformed header or missing data"
|
|
::= { prStatsEntry 1041 }
|
|
|
|
prOutBadUdpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound UDP packets with malformed header or missing data"
|
|
::= { prStatsEntry 1042 }
|
|
|
|
prInBadIcmpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound ICMP packets with malformed header"
|
|
::= { prStatsEntry 1043 }
|
|
|
|
prOutBadIcmpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound ICMP packets with malformed header"
|
|
::= { prStatsEntry 1044 }
|
|
|
|
prInBadOtherIpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound IP packets of other protocol with malformed header"
|
|
::= { prStatsEntry 1045 }
|
|
|
|
prOutBadOtherIpPktsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound IP packets of other protocol with malformed header"
|
|
::= { prStatsEntry 1046 }
|
|
|
|
prInOverloadedMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of inbound packets overloading the protected IP"
|
|
::= { prStatsEntry 1047 }
|
|
|
|
prOutOverloadedMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak number of outbound packets overloading the protected IP"
|
|
::= { prStatsEntry 1048 }
|
|
|
|
prInLatencyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak inbound Latency"
|
|
::= { prStatsEntry 1049 }
|
|
|
|
prOutLatencyMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak outbound Latency"
|
|
::= { prStatsEntry 1050 }
|
|
|
|
-- end of protected IP status section
|
|
|
|
-- ### protected IP Incident section
|
|
|
|
prIncidentTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF PrIncidentEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of portal incident entries"
|
|
::= { jddsProtected 5 }
|
|
|
|
prIncidentEntry OBJECT-TYPE
|
|
SYNTAX PrIncidentEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row consisting of an incident record"
|
|
INDEX { prIncidentYear,
|
|
prIncidentMonth,
|
|
prIncidentDay,
|
|
prIncidentNumber,
|
|
prIncidentInetAddressType,
|
|
prIncidentInetAddress}
|
|
::= {prIncidentTable 1 }
|
|
|
|
PrIncidentEntry ::= SEQUENCE {
|
|
prIncidentYear
|
|
LocalIndex,
|
|
prIncidentMonth
|
|
LocalIndex,
|
|
prIncidentDay
|
|
LocalIndex,
|
|
prIncidentNumber
|
|
LocalIndex,
|
|
prIncidentInetAddressType
|
|
InetAddressType,
|
|
prIncidentInetAddress
|
|
InetAddress,
|
|
prIncidentStart
|
|
DateAndTime,
|
|
prIncidentAddress
|
|
DisplayString,
|
|
prIncidentType
|
|
DisplayString,
|
|
prIncidentDirection
|
|
Direction,
|
|
prIncidentPeakRate
|
|
Gauge32,
|
|
prIncidentDropped
|
|
Gauge32
|
|
}
|
|
|
|
prIncidentYear OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record year"
|
|
::= { prIncidentEntry 1 }
|
|
|
|
prIncidentMonth OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record month"
|
|
::= { prIncidentEntry 2 }
|
|
|
|
prIncidentDay OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident record day of month"
|
|
::= { prIncidentEntry 3 }
|
|
|
|
prIncidentNumber OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique (for the day) incident record number"
|
|
::= { prIncidentEntry 4 }
|
|
|
|
prIncidentInetAddressType OBJECT-TYPE
|
|
SYNTAX InetAddressType
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Type of IP address a specific protected IP"
|
|
::= { prIncidentEntry 5 }
|
|
|
|
prIncidentInetAddress OBJECT-TYPE
|
|
SYNTAX InetAddress (SIZE (0..47))
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address of a specific protected IP"
|
|
::= { prIncidentEntry 6 }
|
|
|
|
prIncidentStart OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident start time"
|
|
::= { prIncidentEntry 7 }
|
|
|
|
prIncidentAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident protected IP IP or MAC address"
|
|
::= { prIncidentEntry 8 }
|
|
|
|
prIncidentType OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident defense type (and subtype)"
|
|
::= { prIncidentEntry 9 }
|
|
|
|
prIncidentDirection OBJECT-TYPE
|
|
SYNTAX Direction
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident direction"
|
|
::= { prIncidentEntry 10 }
|
|
|
|
prIncidentPeakRate OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Peak packets/s during this incident"
|
|
::= { prIncidentEntry 11 }
|
|
|
|
prIncidentDropped OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No of packets Dropped as part of this incident"
|
|
::= { prIncidentEntry 12 }
|
|
|
|
-- ### end of protected IP incident section ###
|
|
|
|
|
|
-- ### Gateway statistics ###
|
|
|
|
gwInternetStatsTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF GwInternetStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of internet-side gateway statistics"
|
|
::= { jddsGatewayInternet 3 }
|
|
|
|
gwInternetStatsEntry OBJECT-TYPE
|
|
SYNTAX GwInternetStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row associated with a specific gateway"
|
|
INDEX { gwInternetStatsIndex }
|
|
::= { gwInternetStatsTable 1 }
|
|
|
|
GwInternetStatsEntry ::= SEQUENCE {
|
|
gwInternetStatsIndex
|
|
LocalIndex,
|
|
gwInternetMacAddress
|
|
DisplayString,
|
|
gwInternetIpAddress
|
|
DisplayString,
|
|
gwInternetInTotalBytesCnt
|
|
Counter64,
|
|
gwInternetOutTotalBytesCnt
|
|
Counter64,
|
|
gwInternetInDroppedBytesCnt
|
|
Counter64,
|
|
gwInternetOutDroppedBytesCnt
|
|
Counter64,
|
|
gwInternetInTotalPpsMax
|
|
Gauge32,
|
|
gwInternetOutTotalPpsMax
|
|
Gauge32,
|
|
gwInternetInDroppedPpsMax
|
|
Gauge32,
|
|
gwInternetOutDroppedPpsMax
|
|
Gauge32,
|
|
gwInternetInTotalBpsMax
|
|
Gauge32,
|
|
gwInternetOutTotalBpsMax
|
|
Gauge32,
|
|
gwInternetInDroppedBpsMax
|
|
Gauge32,
|
|
gwInternetOutDroppedBpsMax
|
|
Gauge32
|
|
}
|
|
|
|
gwInternetStatsIndex OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique gw internet index"
|
|
::= { gwInternetStatsEntry 1 }
|
|
|
|
gwInternetMacAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"MAC address of a specific protected internet-side gateway"
|
|
::= { gwInternetStatsEntry 2 }
|
|
|
|
gwInternetIpAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address of a specific protected internet-side gateway"
|
|
::= { gwInternetStatsEntry 3 }
|
|
|
|
gwInternetInTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input bytes seen"
|
|
::= { gwInternetStatsEntry 101 }
|
|
|
|
gwInternetOutTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output bytes seen"
|
|
::= { gwInternetStatsEntry 102 }
|
|
|
|
gwInternetInDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input bytes Dropped"
|
|
::= { gwInternetStatsEntry 103 }
|
|
|
|
gwInternetOutDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output bytes Dropped"
|
|
::= { gwInternetStatsEntry 104 }
|
|
|
|
gwInternetInTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input packets per second"
|
|
::= { gwInternetStatsEntry 201 }
|
|
|
|
gwInternetOutTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output packets per second"
|
|
::= { gwInternetStatsEntry 202 }
|
|
|
|
gwInternetInDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input packets Dropped per second"
|
|
::= { gwInternetStatsEntry 203 }
|
|
|
|
gwInternetOutDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output packets Dropped per second"
|
|
::= { gwInternetStatsEntry 204 }
|
|
|
|
gwInternetInTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input bits per second"
|
|
::= { gwInternetStatsEntry 301 }
|
|
|
|
gwInternetOutTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output bits per second"
|
|
::= { gwInternetStatsEntry 302 }
|
|
|
|
gwInternetInDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input bits Dropped per second"
|
|
::= { gwInternetStatsEntry 303 }
|
|
|
|
gwInternetOutDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output bits Dropped per second"
|
|
::= { gwInternetStatsEntry 304 }
|
|
|
|
gwProtectedStatsTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF GwProtectedStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Table of protected-side gateway statistics"
|
|
::= { jddsGatewayProtected 3 }
|
|
|
|
gwProtectedStatsEntry OBJECT-TYPE
|
|
SYNTAX GwProtectedStatsEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A row associated with a specific protected IP side gateway"
|
|
INDEX { gwProtectedIndex }
|
|
::= { gwProtectedStatsTable 1 }
|
|
|
|
GwProtectedStatsEntry ::= SEQUENCE {
|
|
gwProtectedIndex
|
|
LocalIndex,
|
|
gwProtectedMacAddress
|
|
DisplayString,
|
|
gwProtectedIpAddress
|
|
DisplayString,
|
|
gwProtectedInTotalBytesCnt
|
|
Counter64,
|
|
gwProtectedOutTotalBytesCnt
|
|
Counter64,
|
|
gwProtectedInDroppedBytesCnt
|
|
Counter64,
|
|
gwProtectedOutDroppedBytesCnt
|
|
Counter64,
|
|
gwProtectedInTotalPpsMax
|
|
Gauge32,
|
|
gwProtectedOutTotalPpsMax
|
|
Gauge32,
|
|
gwProtectedInDroppedPpsMax
|
|
Gauge32,
|
|
gwProtectedOutDroppedPpsMax
|
|
Gauge32,
|
|
gwProtectedInTotalBpsMax
|
|
Gauge32,
|
|
gwProtectedOutTotalBpsMax
|
|
Gauge32,
|
|
gwProtectedInDroppedBpsMax
|
|
Gauge32,
|
|
gwProtectedOutDroppedBpsMax
|
|
Gauge32
|
|
}
|
|
|
|
gwProtectedIndex OBJECT-TYPE
|
|
SYNTAX LocalIndex
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unique protected gateway index"
|
|
::= { gwProtectedStatsEntry 1 }
|
|
|
|
gwProtectedMacAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"MAC address of a specific protected-side gateway"
|
|
::= { gwProtectedStatsEntry 2 }
|
|
|
|
gwProtectedIpAddress OBJECT-TYPE
|
|
SYNTAX DisplayString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"IP address of a specific protected-side gateway"
|
|
::= { gwProtectedStatsEntry 3 }
|
|
|
|
gwProtectedInTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input bytes seen"
|
|
::= { gwProtectedStatsEntry 101 }
|
|
|
|
gwProtectedOutTotalBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output bytes seen"
|
|
::= { gwProtectedStatsEntry 102 }
|
|
|
|
gwProtectedInDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of input bytes Dropped"
|
|
::= { gwProtectedStatsEntry 103 }
|
|
|
|
gwProtectedOutDroppedBytesCnt OBJECT-TYPE
|
|
SYNTAX Counter64
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Total number of output bytes Dropped"
|
|
::= { gwProtectedStatsEntry 104 }
|
|
|
|
gwProtectedInTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input packets per second"
|
|
::= { gwProtectedStatsEntry 201 }
|
|
|
|
gwProtectedOutTotalPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output packets per second"
|
|
::= { gwProtectedStatsEntry 202 }
|
|
|
|
gwProtectedInDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input packets Dropped per second"
|
|
::= { gwProtectedStatsEntry 203 }
|
|
|
|
gwProtectedOutDroppedPpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output packets Dropped per second"
|
|
::= { gwProtectedStatsEntry 204 }
|
|
|
|
gwProtectedInTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input bits per second"
|
|
::= { gwProtectedStatsEntry 301 }
|
|
|
|
gwProtectedOutTotalBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output bits per second"
|
|
::= { gwProtectedStatsEntry 302 }
|
|
|
|
gwProtectedInDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of input bits Dropped per second"
|
|
::= { gwProtectedStatsEntry 303 }
|
|
|
|
gwProtectedOutDroppedBpsMax OBJECT-TYPE
|
|
SYNTAX Gauge32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Maximum number of output bits Dropped per second"
|
|
::= { gwProtectedStatsEntry 304 }
|
|
|
|
|
|
-- End of Gateway statistics
|
|
|
|
ddossecureEvents OBJECT-IDENTITY
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Definition point for DDoS Secure notifications"
|
|
::= {ddossecure4MIB 0}
|
|
|
|
prBandwidthLimitOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBandwidth }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Rate limiting traffic by bandwidth. Tracked by protected IP / portal."
|
|
::= {ddossecureEvents 2011}
|
|
|
|
prBandwidthLimitOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBandwidth }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer rate limiting traffic by bandwidth."
|
|
::= {ddossecureEvents 2012}
|
|
|
|
prPacketLimitOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFlood }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Rate limiting traffic by packet rate."
|
|
::= {ddossecureEvents 2021}
|
|
|
|
prPacketLimitOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFlood }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer rate limiting traffic by packet rate."
|
|
::= {ddossecureEvents 2022}
|
|
|
|
prBlockedProtocolBlackListIpOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping traffic not expressly permitted. Tracked by protected IP."
|
|
::= {ddossecureEvents 2031}
|
|
|
|
prBlockedProtocolBlackListIpOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping traffic not expressly permitted."
|
|
::= {ddossecureEvents 2032}
|
|
|
|
prBlockedProtocolIcmpTypeOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping traffic not expressly permitted. Tracked by protected IP."
|
|
::= {ddossecureEvents 2041}
|
|
|
|
prBlockedProtocolIcmpTypeOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping traffic not expressly permitted."
|
|
::= {ddossecureEvents 2042}
|
|
|
|
prBlockedProtocolPortOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping traffic not expressly permitted. Tracked by protected IP."
|
|
::= {ddossecureEvents 2051}
|
|
|
|
prBlockedProtocolPortOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping traffic not expressly permitted."
|
|
::= {ddossecureEvents 2052}
|
|
|
|
prBlockedProtocolOtherOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping traffic not expressly permitted. Tracked by protected IP."
|
|
::= {ddossecureEvents 2061}
|
|
|
|
prBlockedProtocolOtherOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping traffic not expressly permitted."
|
|
::= {ddossecureEvents 2062}
|
|
|
|
prUnknownSessionIcmpRespOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP traffic that is out of state. Tracked by protected IP."
|
|
::= {ddossecureEvents 2081}
|
|
|
|
prUnknownSessionIcmpRespOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP traffic that is out of state."
|
|
::= {ddossecureEvents 2082}
|
|
|
|
prUnknownSessionIcmpDiagRespOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP traffic that is out of state. Tracked by protected IP."
|
|
::= {ddossecureEvents 2091}
|
|
|
|
prUnknownSessionIcmpDiagRespOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP traffic that is out of state."
|
|
::= {ddossecureEvents 2092}
|
|
|
|
prUnknownSessionNoStateOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP traffic that is out of state. Tracked by protected IP."
|
|
::= {ddossecureEvents 2101}
|
|
|
|
prUnknownSessionNoStateOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP traffic that is out of state."
|
|
::= {ddossecureEvents 2102}
|
|
|
|
prUnknownSessionInvalidStateOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP traffic that is out of state. Tracked by protected IP."
|
|
::= {ddossecureEvents 2111}
|
|
|
|
prUnknownSessionInvalidStateOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP traffic that is out of state."
|
|
::= {ddossecureEvents 2112}
|
|
|
|
prTcpAttackRstOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2121}
|
|
|
|
prTcpAttackRstOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets causing stress."
|
|
::= {ddossecureEvents 2122}
|
|
|
|
prIpAttackLandOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2131}
|
|
|
|
prIpAttackLandOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets causing stress."
|
|
::= {ddossecureEvents 2132}
|
|
|
|
prTcpAttackSynAckToOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2141}
|
|
|
|
prTcpAttackSynAckToOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets causing stress."
|
|
::= {ddossecureEvents 2142}
|
|
|
|
prBlockedProtocolCountryOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"This IP address is part of a blocked country or network"
|
|
::= {ddossecureEvents 2151}
|
|
|
|
prBlockedProtocolCountryOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"This IP address is no longer part of a blocked country or network."
|
|
::= {ddossecureEvents 2152}
|
|
|
|
prTcpAttackSynFloodOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Receiving SYN packets at a rate higher than it can handle. Tracked by protected IP."
|
|
::= {ddossecureEvents 2161}
|
|
|
|
prTcpAttackSynFloodOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer receiving a SYN flood."
|
|
::= {ddossecureEvents 2162}
|
|
|
|
prTcpAttackConnFloodOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Reached concurrent connection configured limit. Tracked by protected IP."
|
|
::= {ddossecureEvents 2171}
|
|
|
|
prTcpAttackConnFloodOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer above the concurrent connection configured limit"
|
|
::= {ddossecureEvents 2172}
|
|
|
|
prTcpAttackTableFullOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Internal state table for TCP connections is full. Tracked by protected IP."
|
|
::= {ddossecureEvents 2181}
|
|
|
|
prTcpAttackTableFullOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Internal state table for TCP connections is no longer full."
|
|
::= {ddossecureEvents 2182}
|
|
|
|
prBadTcpFastAckOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Identical ACKs repeated at a rate greater than 10 per second. Tracked by protected IP."
|
|
::= {ddossecureEvents 2191}
|
|
|
|
prBadTcpFastAckOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer seeing identical ACKs repeated at a rate greater than 10 per second. Tracked by protected IP."
|
|
::= {ddossecureEvents 2192}
|
|
|
|
prTcpAttackHttpFloodOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The protected IP has reached its concurrent GET/HEAD configured limit. Tracked by protected IP."
|
|
::= {ddossecureEvents 2201}
|
|
|
|
prTcpAttackHttpFloodOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropped below the concurrent GET/HEAD configured limit."
|
|
::= {ddossecureEvents 2202}
|
|
|
|
prUdpAttackTableFullOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Internal state table for UDP connections is full. Tracked by protected IP."
|
|
::= {ddossecureEvents 2211}
|
|
|
|
prUdpAttackTableFullOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Internal state table for UDP connections is no longer full."
|
|
::= {ddossecureEvents 2212}
|
|
|
|
prTcpAttackHttpTimeoutOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No response to a GET or HEAD request in a timely manner. Tracked by protected IP."
|
|
::= {ddossecureEvents 2231}
|
|
|
|
prTcpAttackHttpTimeoutOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"protected IP is now responding to a GET or HEAD request in a timely manner."
|
|
::= {ddossecureEvents 2232}
|
|
|
|
prIcmpAttackRepeatsOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIcmpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping ICMP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2241}
|
|
|
|
prIcmpAttackRepeatsOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIcmpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping ICMP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2242}
|
|
|
|
prIcmpAttackTableFullOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIcmpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping ICMP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2251}
|
|
|
|
prIcmpAttackTableFullOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIcmpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping ICMP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2252}
|
|
|
|
prOtherIpAttackTableFullOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOtherIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping Other IP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2271}
|
|
|
|
prOtherIpAttackTableFullOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOtherIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping Other IP packets causing stress."
|
|
::= {ddossecureEvents 2272}
|
|
|
|
prFragAttackPingOfDeathOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Assembled packet are longer than 65535 bytes. Tracked by protected IP."
|
|
::= {ddossecureEvents 2291}
|
|
|
|
prFragAttackPingOfDeathOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress, Assembled packet are less than 65535 bytes. Tracked by protected IP."
|
|
::= {ddossecureEvents 2292}
|
|
|
|
prFragAttackHeadOverlayOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2301}
|
|
|
|
prFragAttackHeadOverlayOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2302}
|
|
|
|
prFragAttackTableFullOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Internal state table for fragments is full. Tracked by protected IP."
|
|
::= {ddossecureEvents 2311}
|
|
|
|
prFragAttackTableFullOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress, Internal state table for fragments is no longer full. Tracked by protected IP."
|
|
::= {ddossecureEvents 2312}
|
|
|
|
prFragAttackSmallSizeOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Initial TCP fragment is smaller than header. Tracked by protected IP."
|
|
::= {ddossecureEvents 2321}
|
|
|
|
prFragAttackSmallSizeOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress, Header is within Initial TCP fragment size. Tracked by protected IP."
|
|
::= {ddossecureEvents 2322}
|
|
|
|
prFragAttackNoFragsAllowedOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Fragmentation has been disabled in the Filter. Tracked by protected IP."
|
|
::= {ddossecureEvents 2331}
|
|
|
|
prFragAttackNoFragsAllowedOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress, Fragmentation has been reenabled in the Filter. Tracked by protected IP."
|
|
::= {ddossecureEvents 2332}
|
|
|
|
prBadIpSrcAddrOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets that do not match RFCs. Invalid Source Address. Tracked by protected IP."
|
|
::= {ddossecureEvents 2341}
|
|
|
|
prBadIpSrcAddrOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets that do not match RFCs. Source Address now valid"
|
|
::= {ddossecureEvents 2342}
|
|
|
|
prBadIpHeaderOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets that do not match RFCs. Header malformed. Tracked by protected IP."
|
|
::= {ddossecureEvents 2351}
|
|
|
|
prBadIpHeaderOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets that do not match RFCs. Header no longer malformed."
|
|
::= {ddossecureEvents 2352}
|
|
|
|
prBadIpOptionOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets that do not match RFCs. Invalid option field or field length. Tracked by protected IP."
|
|
::= {ddossecureEvents 2361}
|
|
|
|
prBadIpOptionOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets that do not match RFCs. Option field or field length now valid."
|
|
::= {ddossecureEvents 2362}
|
|
|
|
prBadIpSizeOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets that do not match RFCs. Invalid length field. Tracked by protected IP."
|
|
::= {ddossecureEvents 2371}
|
|
|
|
prBadIpSizeOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets that do not match RFCs. Length field now valid."
|
|
::= {ddossecureEvents 2372}
|
|
|
|
prBlockedProtocolTmpBlackListOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets that have been temporarily black-listed. Tracked by protected IP."
|
|
::= {ddossecureEvents 2381}
|
|
|
|
prBlockedProtocolTmpBlackListOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets that have been temporarily black-listed."
|
|
::= {ddossecureEvents 2382}
|
|
|
|
prBadTcpFlagsOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets that do not match RFCs. Invalid TCP flag combinations. Tracked by protected IP."
|
|
::= {ddossecureEvents 2391}
|
|
|
|
prBadTcpFlagsOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets that do not match RFCs. TCP flag combinations now valid."
|
|
::= {ddossecureEvents 2392}
|
|
|
|
prBadTcpMalformedOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets that do not match RFCs. Format of TCP Header invalid. Tracked by protected IP."
|
|
::= {ddossecureEvents 2401}
|
|
|
|
prBadTcpMalformedOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets that do not match RFCs. Format of TCP Header now valid."
|
|
::= {ddossecureEvents 2402}
|
|
|
|
prBadTcpOptionOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets that do not match RFCs. Invalid TCP option field. Tracked by protected IP."
|
|
::= {ddossecureEvents 2411}
|
|
|
|
prBadTcpOptionOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets that do not match RFCs. TCP option field now valid."
|
|
::= {ddossecureEvents 2412}
|
|
|
|
prBlockedProtocolDnsOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping DNS requests that have been black-listed. Tracked by protected IP."
|
|
::= {ddossecureEvents 2421}
|
|
|
|
prBlockedProtocolDnsOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping DNS requests that have been black-listed."
|
|
::= {ddossecureEvents 2422}
|
|
|
|
prBadUdpNoDataOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadUdp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping UDP packets that do not match RFCs. UDP packet contains no data. Tracked by protected IP."
|
|
::= {ddossecureEvents 2431}
|
|
|
|
prBadUdpNoDataOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadUdp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping UDP packets that do not match RFCs. UDP packet now contain data."
|
|
::= {ddossecureEvents 2432}
|
|
|
|
prBadUdpMalformedOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadUdp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping UDP packets that do not match RFCs. UDP header malformed. Tracked by protected IP."
|
|
::= {ddossecureEvents 2441}
|
|
|
|
prBadUdpMalformedOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadUdp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping UDP packets that do not match RFCs. UDP header no longer malformed."
|
|
::= {ddossecureEvents 2442}
|
|
|
|
prBlockedProtocolAsOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping AS requests that have been black-listed. Tracked by protected IP."
|
|
::= {ddossecureEvents 2451}
|
|
|
|
prBlockedProtocolAsOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping AS requests that have been black-listed."
|
|
::= {ddossecureEvents 2452}
|
|
|
|
ptTcpAttackHttpRateFloodOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets causing stress. HTTP requests rate exceeds configured threshold. Tracked by protected IP."
|
|
::= {ddossecureEvents 2461}
|
|
|
|
ptTcpAttackHttpRateFloodOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets causing stress. HTTP requests rate now below configured threshold."
|
|
::= {ddossecureEvents 2462}
|
|
|
|
prBadIcmpMalformedOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIcmp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping ICMP packets that do not match RFCs. ICMP header malformed (length, options etc). Tracked by protected IP."
|
|
::= {ddossecureEvents 2471}
|
|
|
|
prBadIcmpMalformedOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIcmp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping ICMP packets that do not match RFCs. ICMP header no longer malformed."
|
|
::= {ddossecureEvents 2472}
|
|
|
|
prBlockedProtocolUrlOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping URL requests that have been black-listed. Tracked by protected IP."
|
|
::= {ddossecureEvents 2481}
|
|
|
|
prBlockedProtocolUrlOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping URL requests that have been black-listed."
|
|
::= {ddossecureEvents 2482}
|
|
|
|
prBadOtherIpProtocolOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping Other IP packets that do not match RFCs. Invalid IP protocol number. Tracked by protected IP."
|
|
::= {ddossecureEvents 2501}
|
|
|
|
prBadOtherIpProtocolOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping Other IP packets that do not match RFCs. IP protocol number now valid."
|
|
::= {ddossecureEvents 2502}
|
|
|
|
prBadOtherIpLengthOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping Other IP packets that do not match RFCs. IP packet too short to contain IP Protocol header. Tracked by protected IP."
|
|
::= {ddossecureEvents 2511}
|
|
|
|
prBadOtherIpLengthOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping Other IP packets that do not match RFCs. IP packet no longer too short to contain IP Protocol header."
|
|
::= {ddossecureEvents 2512}
|
|
|
|
prTcpAttackHttpIncompleteOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Reporting incomplete HTTP requests. Tracked by protected IP."
|
|
::= {ddossecureEvents 2521}
|
|
|
|
prTcpAttackHttpIncompleteOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Reporting incomplete HTTP requests."
|
|
::= {ddossecureEvents 2522}
|
|
|
|
prOverloadedStallOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detected overloaded protected IP. The protected IP has stopped responding to anything. Tracked by protected IP."
|
|
::= {ddossecureEvents 2531}
|
|
|
|
prOverloadedStallOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer detected overloaded protected IP. The protected IP is now responding."
|
|
::= {ddossecureEvents 2532}
|
|
|
|
prFragAttackTimeOutOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Fragments taking too long. Tracked by protected IP."
|
|
::= {ddossecureEvents 2541}
|
|
|
|
prFragAttackTimeOutOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress, Fragments no longer timing out. Tracked by protected IP."
|
|
::= {ddossecureEvents 2542}
|
|
|
|
prFragAttackRepeatsOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Fragment Repeats. Tracked by protected IP."
|
|
::= {ddossecureEvents 2551}
|
|
|
|
prFragAttackRepeatsOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress, Fragment no longer Repeats. Tracked by protected IP."
|
|
::= {ddossecureEvents 2552}
|
|
|
|
prFragAttackBadLengthOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Invalid fragment length in IP header. Tracked by protected IP."
|
|
::= {ddossecureEvents 2561}
|
|
|
|
prFragAttackBadLengthOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress, Fragment length in IP header now valid. Tracked by protected IP."
|
|
::= {ddossecureEvents 2562}
|
|
|
|
prOverloadedBacklogOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The protected IP cannot keep up with new TCP connections and is not responding to some SYN requests. Tracked by protected IP."
|
|
::= {ddossecureEvents 2681}
|
|
|
|
prOverloadedBacklogOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer detected overloaded protected IP."
|
|
::= {ddossecureEvents 2682}
|
|
|
|
prBlockedProtocolAddressOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Blocking protocol as Destination of inbound IP packet, or source of outbound IP packet is not a protected IP address. Tracked by protected IP."
|
|
::= {ddossecureEvents 2691}
|
|
|
|
prBlockedProtocolAddressOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"no longer blocking packets not containing protected IP address."
|
|
::= {ddossecureEvents 2692}
|
|
|
|
prTcpAttackNoDataOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2701}
|
|
|
|
prTcpAttackNoDataOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets causing stress. "
|
|
::= {ddossecureEvents 2702}
|
|
|
|
prTcpAttackNoServerDataOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 2711}
|
|
|
|
prTcpAttackNoServerDataOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets causing stress. "
|
|
::= {ddossecureEvents 2712}
|
|
|
|
prTcpAttackConnRateFloodOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets as the protected IP is receiving connection requests at a rate higher than it is configured for. Tracked by protected IP."
|
|
::= {ddossecureEvents 2721}
|
|
|
|
prTcpAttackConnRateFloodOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets as the protected IP is receiving connection requests at or below the configured rate."
|
|
::= {ddossecureEvents 2722}
|
|
|
|
prOverloadedThreadsOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detected overloaded protected IP. The protected IP is not acknowledging data requests. Tracked by protected IP."
|
|
::= {ddossecureEvents 2731}
|
|
|
|
prOverloadedThreadsOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer detected overloaded protected IP. The protected IP is now acknowledging data requests."
|
|
::= {ddossecureEvents 2732}
|
|
|
|
prBadIpReflectedRouteOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets that do not match RFCs. Same packet seen both sides of DDoS Secure. Tracked by protected IP."
|
|
::= {ddossecureEvents 2741}
|
|
|
|
prBadIpReflectedRouteOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets that do not match RFCs. No longer seeing same packet on both sides of DDoS Secure."
|
|
::= {ddossecureEvents 2742}
|
|
|
|
prTcpAttackPortScanOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets as the protected IP is receiving connection requests at a rate higher than it is configured for. Tracked by protected IP."
|
|
::= {ddossecureEvents 2771}
|
|
|
|
prTcpAttackPortScanOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets as the protected IP is receiving connection requests at or below the configured rate."
|
|
::= {ddossecureEvents 2772}
|
|
|
|
prTcpAttackSmallWindowOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets as the protected IP is receiving connection requests at a rate higher than it is configured for. Tracked by protected IP."
|
|
::= {ddossecureEvents 2781}
|
|
|
|
prTcpAttackSmallWindowOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets as the protected IP is receiving connection requests at or below the configured rate."
|
|
::= {ddossecureEvents 2782}
|
|
|
|
prTcpAttackClientAbortOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets as client aborted connection after request. Tracked by protected IP."
|
|
::= {ddossecureEvents 2791}
|
|
|
|
prTcpAttackClientAbortOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer dropping TCP packets as client aborted connection after request."
|
|
::= {ddossecureEvents 2792}
|
|
|
|
prBlockedProtocolSipOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping SIP requests that have been black-listed. Tracked by protected IP."
|
|
::= {ddossecureEvents 2811}
|
|
|
|
prBlockedProtocolSipOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping SIP requests that have been black-listed."
|
|
::= {ddossecureEvents 2812}
|
|
|
|
prTcpAttackUrlRateLimitOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Rate Limiting URL requests. Tracked by protected IP."
|
|
::= {ddossecureEvents 2821}
|
|
|
|
prTcpAttackUrlRateLimitOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Rate Limiting URL requests."
|
|
::= {ddossecureEvents 2822}
|
|
|
|
prUdpAttackDnsRateLimitOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Rate Limiting DNS requests. Tracked by protected IP."
|
|
::= {ddossecureEvents 2831}
|
|
|
|
prUdpAttackDnsRateLimitOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Rate Limiting DNS requests."
|
|
::= {ddossecureEvents 2832}
|
|
|
|
prUdpAttackSipRateLimitOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Rate Limiting SIP requests. Tracked by protected IP."
|
|
::= {ddossecureEvents 2841}
|
|
|
|
prUdpAttackSipRateLimitOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Rate Limiting SIP requests."
|
|
::= {ddossecureEvents 2842}
|
|
|
|
prBadTcpChecksumOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets that do not match RFCs. Invalid Checksum. Tracked by protected IP."
|
|
::= {ddossecureEvents 2851}
|
|
|
|
prBadTcpChecksumOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets that do not match RFCs. Checksum now valid."
|
|
::= {ddossecureEvents 2852}
|
|
|
|
prTcpAttackHttpFormatOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping HTTP packets that do not match RFCs. Invalid Format. Tracked by protected IP."
|
|
::= {ddossecureEvents 2861}
|
|
|
|
prTcpAttackHttpFormatOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping HTTP packets that do not match RFCs. Format now valid."
|
|
::= {ddossecureEvents 2862}
|
|
|
|
prUnknownSessionReflectiveOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping unknown traffic that is out of state. Tracked by protected IP."
|
|
::= {ddossecureEvents 2871}
|
|
|
|
prUnknownSessionReflectiveOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping unknown traffic that is out of state."
|
|
::= {ddossecureEvents 2872}
|
|
|
|
|
|
prBandwidthOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBandwidth }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Rate limiting traffic by bandwidth. Tracked by protected IP / portal."
|
|
::= {ddossecureEvents 1011}
|
|
|
|
prBandwidthOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBandwidth }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer rate limiting traffic by bandwidth."
|
|
::= {ddossecureEvents 1012}
|
|
|
|
prFloodOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFlood }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Rate limiting traffic by packet rate."
|
|
::= {ddossecureEvents 1021}
|
|
|
|
prFloodOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFlood }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer rate limiting traffic by packet rate."
|
|
::= {ddossecureEvents 1022}
|
|
|
|
prBlockedProtocolOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping traffic not expressly permitted. Tracked by protected IP."
|
|
::= {ddossecureEvents 1031}
|
|
|
|
prBlockedProtocolOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedProtocol }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping traffic not expressly permitted."
|
|
::= {ddossecureEvents 1032}
|
|
|
|
prBlockedStateOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP traffic that is out of state. Tracked by protected IP."
|
|
::= {ddossecureEvents 1041}
|
|
|
|
prBlockedStateOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBlockedState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP traffic that is out of state."
|
|
::= {ddossecureEvents 1042}
|
|
|
|
prIpAttackOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1051}
|
|
|
|
prIpAttackOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets causing stress."
|
|
::= {ddossecureEvents 1052}
|
|
|
|
prTcpAttackOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1061}
|
|
|
|
prTcpAttackOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prTcpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP packets causing stress."
|
|
::= {ddossecureEvents 1062}
|
|
|
|
prUdpAttackOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping UDP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1071}
|
|
|
|
prUdpAttackOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prUdpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping UDP packets causing stress."
|
|
::= {ddossecureEvents 1072}
|
|
|
|
prIcmpAttackOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIcmpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping ICMP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1081}
|
|
|
|
prIcmpAttackOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prIcmpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping ICMP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1082}
|
|
|
|
prOtherIpAttackOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOtherIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping Other IP packets causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1091}
|
|
|
|
prOtherIpAttackOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOtherIpAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping Other IP packets causing stress."
|
|
::= {ddossecureEvents 1092}
|
|
|
|
prFragAttackOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1101}
|
|
|
|
prFragAttackOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prFragAttack }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping packet fragments that are causing stress. Tracked by protected IP."
|
|
::= {ddossecureEvents 1102}
|
|
|
|
prBadIpOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping IP packets that do not match RFCs. Tracked by protected IP."
|
|
::= {ddossecureEvents 1111}
|
|
|
|
prBadIpOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping IP packets that do not match RFCs."
|
|
::= {ddossecureEvents 1112}
|
|
|
|
prBadTcpOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping TCP Packets that do not match RFCs. Tracked by protected IP."
|
|
::= {ddossecureEvents 1121}
|
|
|
|
prBadTcpOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadTcp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping TCP Packets that do not match RFCs. Tracked by protected IP."
|
|
::= {ddossecureEvents 1122}
|
|
|
|
prBadUdpOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadUdp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping UDP packets that do not match RFCs. Tracked by protected IP."
|
|
::= {ddossecureEvents 1131}
|
|
|
|
prBadUdpOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadUdp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping UDP packets that do not match RFCs."
|
|
::= {ddossecureEvents 1132}
|
|
|
|
prBadIcmpOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIcmp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping ICMP packets that do not match RFCs. Tracked by protected IP."
|
|
::= {ddossecureEvents 1141}
|
|
|
|
prBadIcmpOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadIcmp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping ICMP packets that do not match RFCs."
|
|
::= {ddossecureEvents 1142}
|
|
|
|
prBadOtherIpOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Dropping Other IP packets that do not match RFCs. Tracked by protected IP."
|
|
::= {ddossecureEvents 1151}
|
|
|
|
prBadOtherIpOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prBadOtherIp }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer Dropping Other IP packets that do not match RFCs."
|
|
::= {ddossecureEvents 1152}
|
|
|
|
prOverloadedOn NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detected overloaded protected IP. Tracked by protected IP."
|
|
::= {ddossecureEvents 1161}
|
|
|
|
prOverloadedOff NOTIFICATION-TYPE
|
|
OBJECTS { prHostName, prOverloaded }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No longer detected overloaded protected IP."
|
|
::= {ddossecureEvents 1162}
|
|
|
|
apHaStateMode NOTIFICATION-TYPE
|
|
OBJECTS { apHaState }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Current High Availability state."
|
|
::= {ddossecureEvents 2000}
|
|
|
|
apOutputErrorIIFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorIIFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is having trouble transmitting packets on the Internet Interface. This could be because a downstream link is saturated, or a duplex speed mismatch."
|
|
::= {ddossecureEvents 3011}
|
|
|
|
apOutputErrorIIFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorIIFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure has stopped having trouble transmitting packets on the Internet Interface."
|
|
::= {ddossecureEvents 3012}
|
|
|
|
apOutputErrorPIFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorPIFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is having trouble transmitting packets on the Protected Interface. This could be because a downstream link is saturated, or a duplex speed mismatch."
|
|
::= {ddossecureEvents 3021}
|
|
|
|
apOutputErrorPIFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorPIFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure has stopped having trouble transmitting packets on the Protected Interface."
|
|
::= {ddossecureEvents 3022}
|
|
|
|
apOutputErrorMIFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorMIFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is having trouble transmitting packets on the Management Interface. This could be because a downstream link is saturated, or a duplex speed mismatch."
|
|
::= {ddossecureEvents 3031}
|
|
|
|
apOutputErrorMIFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorMIFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure has stopped having trouble transmitting packets on the Management Interface."
|
|
::= {ddossecureEvents 3032}
|
|
|
|
apNewConfigFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apNewConfigFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is processing a new configuration."
|
|
::= {ddossecureEvents 3041}
|
|
|
|
apNewConfigFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apNewConfigFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure has finished processing a new configuration."
|
|
::= {ddossecureEvents 3042}
|
|
|
|
apNotLicensedFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apNotLicensedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is not licensed."
|
|
::= {ddossecureEvents 3051}
|
|
|
|
apNotLicensedFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apNotLicensedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is now licensed."
|
|
::= {ddossecureEvents 3052}
|
|
|
|
apMacTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apMacTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Mac Address table is full."
|
|
::= {ddossecureEvents 3061}
|
|
|
|
apMacTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apMacTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Mac Address table is no longer full."
|
|
::= {ddossecureEvents 3062}
|
|
|
|
apProtectedTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"protected IP table is full."
|
|
::= {ddossecureEvents 3071}
|
|
|
|
apProtectedTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"protected IP table is no longer full."
|
|
::= {ddossecureEvents 3072}
|
|
|
|
apIncidentTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apIncidentTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident table is full."
|
|
::= {ddossecureEvents 3081}
|
|
|
|
apIncidentTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apIncidentTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Incident table is no longer full."
|
|
::= {ddossecureEvents 3082}
|
|
|
|
apTcpTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apTcpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TCP table is full."
|
|
::= {ddossecureEvents 3091}
|
|
|
|
apTcpTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apTcpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"TCP table is no longer full."
|
|
::= {ddossecureEvents 3092}
|
|
|
|
apUdpTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apUdpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"UDP table is full."
|
|
::= {ddossecureEvents 3101}
|
|
|
|
apUdpTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apUdpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"UDP table is no longer full."
|
|
::= {ddossecureEvents 3102}
|
|
|
|
apIcmpTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apIcmpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ICMP table is full."
|
|
::= {ddossecureEvents 3111}
|
|
|
|
apIcmpTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apIcmpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ICMP table is no longer full."
|
|
::= {ddossecureEvents 3112}
|
|
|
|
apOtherIpTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apOtherIpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Other IP table is full."
|
|
::= {ddossecureEvents 3121}
|
|
|
|
apOtherIpTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apOtherIpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Other IP table is no longer full."
|
|
::= {ddossecureEvents 3122}
|
|
|
|
apFragTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apFragTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Fragment table is full."
|
|
::= {ddossecureEvents 3131}
|
|
|
|
apFragTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apFragTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Fragment table is no longer full."
|
|
::= {ddossecureEvents 3132}
|
|
|
|
apFtpTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apFtpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"FTP ftp table is full."
|
|
::= {ddossecureEvents 3141}
|
|
|
|
apFtpTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apFtpTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"FTP ftp table is no longer full."
|
|
::= {ddossecureEvents 3142}
|
|
|
|
apBlockedTableFullFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apBlockedTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Blocked IP table is full."
|
|
::= {ddossecureEvents 3151}
|
|
|
|
apBlockedTableFullFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apBlockedTableFullFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Blocked IP table is no longer full."
|
|
::= {ddossecureEvents 3152}
|
|
|
|
apShortCircuitFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apShortCircuitFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Traffic is bypassing DDoS Secure (Source MAC address is seen on both sides of the DDoS Secure)."
|
|
::= {ddossecureEvents 3161}
|
|
|
|
apShortCircuitFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apShortCircuitFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Traffic is no longer bypassing DDoS Secure."
|
|
::= {ddossecureEvents 3162}
|
|
|
|
apInternetIfDisconnectedFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apInternetIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Internet interface is not connected."
|
|
::= {ddossecureEvents 3171}
|
|
|
|
apInternetIfDisconnectedFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apInternetIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Internet interface is now connected."
|
|
::= {ddossecureEvents 3172}
|
|
|
|
apProtectedIfDisconnectedFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Protected Interface is not connected."
|
|
::= {ddossecureEvents 3181}
|
|
|
|
apProtectedIfDisconnectedFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Protected Interface is now connected."
|
|
::= {ddossecureEvents 3182}
|
|
|
|
apMgmtIfDisconnectedFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apMgmtIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Management interface is not connected."
|
|
::= {ddossecureEvents 3191}
|
|
|
|
apMgmtIfDisconnectedFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apMgmtIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Management interface is now connected."
|
|
::= {ddossecureEvents 3192}
|
|
|
|
apUpgradingFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apUpgradingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure software is being upgraded."
|
|
::= {ddossecureEvents 3201}
|
|
|
|
apUpgradingFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apUpgradingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure software upgrade finished."
|
|
::= {ddossecureEvents 3202}
|
|
|
|
apProtectedIfTrafficFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfTrafficFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unexpected traffic seen on Protected Interface in TAP mode."
|
|
::= {ddossecureEvents 3211}
|
|
|
|
apProtectedIfTrafficFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfTrafficFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Unexpected traffic no longer seen on Protected Interface in TAP mode."
|
|
::= {ddossecureEvents 3212}
|
|
|
|
apRoutingLoopFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apRoutingLoopFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Routing Loop detected."
|
|
::= {ddossecureEvents 3221}
|
|
|
|
apRoutingLoopFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apRoutingLoopFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Routing Loop no longer detected."
|
|
::= {ddossecureEvents 3222}
|
|
|
|
apOfflineFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apOfflineFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is Offline."
|
|
::= {ddossecureEvents 3231}
|
|
|
|
apOfflineFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apOfflineFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is no longer Offline."
|
|
::= {ddossecureEvents 3232}
|
|
|
|
apStateLearningFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apStateLearningFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is in State learning phase."
|
|
::= {ddossecureEvents 3241}
|
|
|
|
apStateLearningFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apStateLearningFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"DDoS Secure is no longer in State learning phase."
|
|
::= {ddossecureEvents 3242}
|
|
|
|
apSupportExpiredFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apSupportExpiredFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Support License has expired."
|
|
::= {ddossecureEvents 3251}
|
|
|
|
apSupportExpiredFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apSupportExpiredFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Support License is now valid."
|
|
::= {ddossecureEvents 3252}
|
|
|
|
apSevereLoadingFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apSevereLoadingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Appliance is severely loaded."
|
|
::= {ddossecureEvents 3261}
|
|
|
|
apSevereLoadingFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apSevereLoadingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Appliance is no longer severely loaded."
|
|
::= {ddossecureEvents 3262}
|
|
|
|
apMacMisconfiguredFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apMacMisconfiguredFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"MAC address is configured for one side of the DDoS Secure, but seen on the other side."
|
|
::= {ddossecureEvents 3271}
|
|
|
|
apMacMisconfiguredFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apMacMisconfiguredFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"No MACaddresses misconfigured."
|
|
::= {ddossecureEvents 3272}
|
|
|
|
apIfMisconfiguredFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apIfMisconfiguredFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Protected and Internet speeds are not configured identically. Bypass cards only."
|
|
::= {ddossecureEvents 3281}
|
|
|
|
apIfMisconfiguredFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apIfMisconfiguredFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Protected and Internet speeds are configured identically. Bypass cards only."
|
|
::= {ddossecureEvents 3282}
|
|
|
|
apInternetIfLinkDownFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apInternetIfLinkDownFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"One or more Internet sub-links are down."
|
|
::= {ddossecureEvents 3291}
|
|
|
|
apInternetIfLinkDownFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apInternetIfLinkDownFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"All Internet sub-links are up."
|
|
::= {ddossecureEvents 3292}
|
|
|
|
apProtectedIfLinkDownFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfLinkDownFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"One or more Protected sub-links are down."
|
|
::= {ddossecureEvents 3301}
|
|
|
|
apProtectedIfLinkDownFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfLinkDownFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"All Protected sub-links are up."
|
|
::= {ddossecureEvents 3302}
|
|
|
|
apDatashareIfDisconnectedFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apDatashareIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Data Share interface is not connected."
|
|
::= {ddossecureEvents 3311}
|
|
|
|
apDatashareIfDisconnectedFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apDatashareIfDisconnectedFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Data Share interface is now connected."
|
|
::= {ddossecureEvents 3312}
|
|
|
|
apDiskFailingOn NOTIFICATION-TYPE
|
|
OBJECTS { apDiskFailingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A disk is failing."
|
|
::= {ddossecureEvents 3321}
|
|
|
|
apDiskFailingOff NOTIFICATION-TYPE
|
|
OBJECTS { apDiskFailingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Disk failure no longer detected."
|
|
::= {ddossecureEvents 3322}
|
|
|
|
apPsuFailingFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apPsuFailingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A Power Supply Unit is failing."
|
|
::= {ddossecureEvents 3331}
|
|
|
|
apPsuFailingFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apPsuFailingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A Power Supply Unit is no longer failing."
|
|
::= {ddossecureEvents 3332}
|
|
|
|
apFanFailingFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apFanFailingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A Fan is failing."
|
|
::= {ddossecureEvents 3341}
|
|
|
|
apFanFailingFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apFanFailingFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A Fan is no longer failing."
|
|
::= {ddossecureEvents 3342}
|
|
|
|
apConfigXferFailFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apConfigXferFailFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Configuration Transfer failed."
|
|
::= {ddossecureEvents 3351}
|
|
|
|
apConfigXferFailFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apConfigXferFailFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Configuration Transfer failed report finished."
|
|
::= {ddossecureEvents 3352}
|
|
|
|
apMissingRequiredPartnerFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apMissingRequiredPartnerFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Missing Required Partner found."
|
|
::= {ddossecureEvents 3361}
|
|
|
|
apMissingRequiredPartnerFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apMissingRequiredPartnerFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"All Required Partners active."
|
|
::= {ddossecureEvents 3362}
|
|
|
|
apBgpMisconfiguredIpFlagOn NOTIFICATION-TYPE
|
|
OBJECTS { apBgpMisconfiguredIpFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"BGP traffic detected to undefined protected IP"
|
|
::= {ddossecureEvents 3371}
|
|
|
|
apBgpMisconfiguredIpFlagOff NOTIFICATION-TYPE
|
|
OBJECTS { apBgpMisconfiguredIpFlag }
|
|
STATUS current
|
|
DESCRIPTION
|
|
"BGP traffic no longer detected to undefined protected IP"
|
|
::= {ddossecureEvents 3372}
|
|
|
|
|
|
-- Old definitions
|
|
|
|
apOutputErrorIIEvent NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorIIFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure is having trouble transmitting packets on the Internet Interface. This could be because a downstream link is saturated, or a duplex speed mismatch."
|
|
::= {ddossecureEvents 1}
|
|
|
|
apOutputErrorPIEvent NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorPIFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure is having trouble transmitting packets on the Protected Interface. This could be because a downstream link is saturated, or a duplex speed mismatch."
|
|
::= {ddossecureEvents 2}
|
|
|
|
apOutputErrorMIEvent NOTIFICATION-TYPE
|
|
OBJECTS { apOutputErrorMIFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure is having trouble transmitting packets on the Management Interface. This could be because a downstream link is saturated, or a duplex speed mismatch."
|
|
::= {ddossecureEvents 3}
|
|
|
|
apNewConfigEvent NOTIFICATION-TYPE
|
|
OBJECTS { apNewConfigFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure is processing a new configuration"
|
|
::= {ddossecureEvents 4}
|
|
|
|
apNotLicensedEvent NOTIFICATION-TYPE
|
|
OBJECTS { apNotLicensedFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure is not licensed"
|
|
::= {ddossecureEvents 5}
|
|
|
|
apMacTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apMacTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Mac Address table is full"
|
|
::= {ddossecureEvents 6}
|
|
|
|
apProtectedTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Protected IP table is full"
|
|
::= {ddossecureEvents 7}
|
|
|
|
apIncidentTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apIncidentTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Incident table is full"
|
|
::= {ddossecureEvents 8}
|
|
|
|
apTcpTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apTcpTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"TCP table is full"
|
|
::= {ddossecureEvents 9}
|
|
|
|
apUdpTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apUdpTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"UDP table is full"
|
|
::= {ddossecureEvents 10}
|
|
|
|
apIcmpTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apIcmpTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"ICMP table is full"
|
|
::= {ddossecureEvents 11}
|
|
|
|
apOtherIpTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apOtherIpTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Other IP table is full"
|
|
::= {ddossecureEvents 12}
|
|
|
|
apFragTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apFragTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Fragment table is full"
|
|
::= {ddossecureEvents 13}
|
|
|
|
apFtpTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apFtpTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"FTP ftp table is full"
|
|
::= {ddossecureEvents 14}
|
|
|
|
apBlockedTableFullEvent NOTIFICATION-TYPE
|
|
OBJECTS { apBlockedTableFullFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Blocked IP table is full"
|
|
::= {ddossecureEvents 15}
|
|
|
|
apShortCircuitEvent NOTIFICATION-TYPE
|
|
OBJECTS { apShortCircuitFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Seeing same source MAC address both sides of the DDoS Secure"
|
|
::= {ddossecureEvents 16}
|
|
|
|
apInternetIfDisconnectedEvent NOTIFICATION-TYPE
|
|
OBJECTS { apInternetIfDisconnectedFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Internet interface is not connected"
|
|
::= {ddossecureEvents 17}
|
|
|
|
apProtectedIfDisconnectedEvent NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfDisconnectedFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Protected Interface is not connected"
|
|
::= {ddossecureEvents 18}
|
|
|
|
apMgmtIfDisconnectedEvent NOTIFICATION-TYPE
|
|
OBJECTS { apMgmtIfDisconnectedFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Management interface is not connected"
|
|
::= {ddossecureEvents 19}
|
|
|
|
apUpgradingEvent NOTIFICATION-TYPE
|
|
OBJECTS { apUpgradingFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure software is being upgraded"
|
|
::= {ddossecureEvents 20}
|
|
|
|
apProtectedIfTrafficEvent NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfTrafficFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Unexpected traffic seen on Protected Interface in TAP mode"
|
|
::= {ddossecureEvents 21}
|
|
|
|
apRoutingLoopEvent NOTIFICATION-TYPE
|
|
OBJECTS { apRoutingLoopFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Routing Loop detected"
|
|
::= {ddossecureEvents 22}
|
|
|
|
apOfflineEvent NOTIFICATION-TYPE
|
|
OBJECTS { apOfflineFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure is Offline"
|
|
::= {ddossecureEvents 23}
|
|
|
|
apStateLearningEvent NOTIFICATION-TYPE
|
|
OBJECTS { apStateLearningFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"DDoS Secure is State learning"
|
|
::= {ddossecureEvents 24}
|
|
|
|
apSupportExpiredEvent NOTIFICATION-TYPE
|
|
OBJECTS { apSupportExpiredFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Support License has expired"
|
|
::= {ddossecureEvents 25}
|
|
|
|
apSevereLoadingEvent NOTIFICATION-TYPE
|
|
OBJECTS { apSevereLoadingFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Appliance is severely loaded"
|
|
::= {ddossecureEvents 26}
|
|
|
|
apMacMisconfiguredEvent NOTIFICATION-TYPE
|
|
OBJECTS { apMacMisconfiguredFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"MAC address configured for wrong side of DDoS Secure"
|
|
::= {ddossecureEvents 27}
|
|
|
|
apIfMisconfiguredEvent NOTIFICATION-TYPE
|
|
OBJECTS { apIfMisconfiguredFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Protected / Internet interface speed mismatch"
|
|
::= {ddossecureEvents 28}
|
|
|
|
apInternetIfLinkDownEvent NOTIFICATION-TYPE
|
|
OBJECTS { apInternetIfLinkDownFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"One or more Internet sub-links are down"
|
|
::= {ddossecureEvents 29}
|
|
|
|
apProtectedIfLinkDownEvent NOTIFICATION-TYPE
|
|
OBJECTS { apProtectedIfLinkDownFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"One or more Protected sub-links are down"
|
|
::= {ddossecureEvents 30}
|
|
|
|
apDatashareIfDisconnectedEvent NOTIFICATION-TYPE
|
|
OBJECTS { apDatashareIfDisconnectedFlag }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Data Share interface is not connected"
|
|
::= {ddossecureEvents 31}
|
|
|
|
apHaStateEvent NOTIFICATION-TYPE
|
|
OBJECTS { apHaState }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Current High Availability state"
|
|
::= {ddossecureEvents 35}
|
|
|
|
prBandwidthEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBandwidth }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Rate limiting traffic by bandwidth"
|
|
::= {ddossecureEvents 40}
|
|
|
|
prFloodEvent NOTIFICATION-TYPE
|
|
OBJECTS { prFlood }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Rate limiting traffic by packet rate"
|
|
::= {ddossecureEvents 41}
|
|
|
|
prBlockedProtocolEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBlockedProtocol }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping traffic not expressly permitted"
|
|
::= {ddossecureEvents 42}
|
|
|
|
prBlockedStateEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBlockedState }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping TCP traffic that is out of state"
|
|
::= {ddossecureEvents 43}
|
|
|
|
prIpAttackEvent NOTIFICATION-TYPE
|
|
OBJECTS { prIpAttack }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping IP packets causing stress"
|
|
::= {ddossecureEvents 44}
|
|
|
|
prTcpAttackEvent NOTIFICATION-TYPE
|
|
OBJECTS { prTcpAttack }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping TCP packets causing stress"
|
|
::= {ddossecureEvents 45}
|
|
|
|
prUdpAttackEvent NOTIFICATION-TYPE
|
|
OBJECTS { prUdpAttack }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping UDP packets causing stress"
|
|
::= {ddossecureEvents 46}
|
|
|
|
prIcmpAttackEvent NOTIFICATION-TYPE
|
|
OBJECTS { prIcmpAttack }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping ICMP packets causing stress"
|
|
::= {ddossecureEvents 47}
|
|
|
|
prOtherIpAttackEvent NOTIFICATION-TYPE
|
|
OBJECTS { prOtherIpAttack }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping Other IP packets causing stress"
|
|
::= {ddossecureEvents 48}
|
|
|
|
prFragAttackEvent NOTIFICATION-TYPE
|
|
OBJECTS { prFragAttack }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping packet fragments that are causing stress"
|
|
::= {ddossecureEvents 49}
|
|
|
|
prBadIpEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBadIp }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping IP packets that do not match RFCs"
|
|
::= {ddossecureEvents 50}
|
|
|
|
prBadTcpEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBadTcp }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping TCP Packets that do not match RFCs"
|
|
::= {ddossecureEvents 51}
|
|
|
|
prBadUdpEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBadUdp }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping UDP packets that do not match RFCs"
|
|
::= {ddossecureEvents 52}
|
|
|
|
prBadIcmpEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBadIcmp }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping ICMP packets that do not match RFCs"
|
|
::= {ddossecureEvents 53}
|
|
|
|
prBadOtherIpEvent NOTIFICATION-TYPE
|
|
OBJECTS { prBadOtherIp }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Dropping Other IP packets that do not match RFCs"
|
|
::= {ddossecureEvents 54}
|
|
|
|
prOverloadedEvent NOTIFICATION-TYPE
|
|
OBJECTS { prOverloaded }
|
|
STATUS deprecated
|
|
DESCRIPTION
|
|
"Detected overloaded protected IP"
|
|
::= {ddossecureEvents 55}
|
|
|
|
-- Conformance information
|
|
|
|
ddossecure4MIBConformance OBJECT IDENTIFIER ::= { ddossecure4MIB 9 }
|
|
|
|
ddossecure4MIBCompliances OBJECT IDENTIFIER ::= { ddossecure4MIBConformance 1 }
|
|
ddossecure4MIBGroups OBJECT IDENTIFIER ::= { ddossecure4MIBConformance 2 }
|
|
|
|
|
|
ddossecure4MIBCompliance MODULE-COMPLIANCE
|
|
|
|
STATUS current
|
|
DESCRIPTION "Compliance Statement"
|
|
MODULE
|
|
MANDATORY-GROUPS {
|
|
apCfgGroup,
|
|
gwGroup,
|
|
apIncidentGroup,
|
|
apDebugGroup,
|
|
apGroup,
|
|
poGroup,
|
|
prGroup,
|
|
prCfgGroup,
|
|
gwCfgGroup,
|
|
apEventObjectGroup,
|
|
apRatesGroup,
|
|
poFilterCfgGroup,
|
|
apLinkStatusGroup,
|
|
apLogGroup,
|
|
apHaCfgGroup,
|
|
prNotificationGroup
|
|
}
|
|
|
|
::= { ddossecure4MIBCompliances 1 }
|
|
|
|
ddossecure4MIBComplianceDep MODULE-COMPLIANCE
|
|
|
|
STATUS deprecated
|
|
DESCRIPTION "Compliance Statement"
|
|
MODULE
|
|
MANDATORY-GROUPS {
|
|
deprecatedNotificationGroup
|
|
}
|
|
|
|
::= { ddossecure4MIBCompliances 2 }
|
|
|
|
|
|
-- units of conformance
|
|
|
|
apCfgGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apMgmtIfIpAddress,
|
|
apMgmtIfNetmask,
|
|
apMgmtIfGwIpAddress,
|
|
apMgmtIfLinkMode,
|
|
apMgmtIfLinkFC,
|
|
apMgmtIfName,
|
|
apIntIfLinkMode,
|
|
apIntIfLinkFC,
|
|
apIntIfName,
|
|
apProtIfLinkMode,
|
|
apProtIfLinkFC,
|
|
apProtIfName,
|
|
apDataIfIpAddress,
|
|
apDataIfNetmask,
|
|
apDataIfLinkMode,
|
|
apDataIfLinkFC,
|
|
apDataIfName,
|
|
apUserName,
|
|
apUserPermissions,
|
|
apSnmpRoCommunity,
|
|
apSnmpTrapCommunity,
|
|
apSnmpTrapIpAddressList,
|
|
apSnmpAccessIpList,
|
|
apHttpsAccessIpList,
|
|
apSshAccessIpList,
|
|
apSyslogServer,
|
|
apSyslogFacility,
|
|
apSyslogPriority,
|
|
apWebtrendsServer,
|
|
apWebtrendsFacility,
|
|
apWebtrendsPriority,
|
|
apMailServer,
|
|
apMailFrom,
|
|
apMailSubject,
|
|
apMailToList,
|
|
apMailDailyStats,
|
|
apMailAlerts,
|
|
apMailAlertInterval,
|
|
apOperationMode,
|
|
apNtpServerList,
|
|
apTimeZone,
|
|
apProtectedIpNetwork,
|
|
apAutoblockEnable,
|
|
apAutoblockRateT1,
|
|
apProtectedIpAutodetect,
|
|
apTrackIndeterminate,
|
|
apAutoblockRateT2
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Appliance Configuration Group."
|
|
::= { ddossecure4MIBGroups 1 }
|
|
|
|
gwGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
gwInternetMacAddress,
|
|
gwInternetIpAddress,
|
|
gwInternetInTotalBytesCnt,
|
|
gwInternetOutTotalBytesCnt,
|
|
gwInternetInDroppedBytesCnt,
|
|
gwInternetOutDroppedBytesCnt,
|
|
gwInternetInTotalPpsMax,
|
|
gwInternetOutTotalPpsMax,
|
|
gwInternetInDroppedPpsMax,
|
|
gwInternetOutDroppedPpsMax,
|
|
gwInternetInTotalBpsMax,
|
|
gwInternetOutTotalBpsMax,
|
|
gwInternetInDroppedBpsMax,
|
|
gwInternetOutDroppedBpsMax,
|
|
gwProtectedMacAddress,
|
|
gwProtectedIpAddress,
|
|
gwProtectedInTotalBytesCnt,
|
|
gwProtectedOutTotalBytesCnt,
|
|
gwProtectedInDroppedBytesCnt,
|
|
gwProtectedOutDroppedBytesCnt,
|
|
gwProtectedInTotalPpsMax,
|
|
gwProtectedOutTotalPpsMax,
|
|
gwProtectedInDroppedPpsMax,
|
|
gwProtectedOutDroppedPpsMax,
|
|
gwProtectedInTotalBpsMax,
|
|
gwProtectedOutTotalBpsMax,
|
|
gwProtectedInDroppedBpsMax,
|
|
gwProtectedOutDroppedBpsMax
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Gateway Statistics Group."
|
|
::= { ddossecure4MIBGroups 2 }
|
|
|
|
apIncidentGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apBandwidthCreateThresh,
|
|
apBandwidthCreateThreshRate,
|
|
apFloodCreateThresh,
|
|
apFloodCreateThreshRate,
|
|
apBlockedProtoCreateThresh,
|
|
apBlockedProtoCreateThreshRate,
|
|
apBlockedStateCreateThresh,
|
|
apBlockedStateCreateThreshRate,
|
|
apIpAttackCreateThresh,
|
|
apIpAttackCreateThreshRate,
|
|
apTcpAttackCreateThresh,
|
|
apTcpAttackCreateThreshRate,
|
|
apUdpAttackCreateThresh,
|
|
apUdpAttackCreateThreshRate,
|
|
apIcmpAttackCreateThresh,
|
|
apIcmpAttackCreateThreshRate,
|
|
apOtherIpAttackCreateThresh,
|
|
apOtherIpAttackCreateThreshRate,
|
|
apFragAttackCreateThresh,
|
|
apFragAttackCreateThreshRate,
|
|
apBadIpCreateThresh,
|
|
apBadIpCreateThreshRate,
|
|
apBadTcpCreateThresh,
|
|
apBadTcpCreateThreshRate,
|
|
apBadUdpCreateThresh,
|
|
apBadUdpCreateThreshRate,
|
|
apBadIcmpCreateThresh,
|
|
apBadIcmpCreateThreshRate,
|
|
apBadOtherIpCreateThresh,
|
|
apBadOtherIpCreateThreshRate,
|
|
apOverloadedIpCreateThresh,
|
|
apOverloadedIpCreateThreshRate,
|
|
apBandwidthViewThresh,
|
|
apBandwidthViewThreshRate,
|
|
apFloodViewThresh,
|
|
apFloodViewThreshRate,
|
|
apBlockedProtoViewThresh,
|
|
apBlockedProtoViewThreshRate,
|
|
apBlockedStateViewThresh,
|
|
apBlockedStateViewThreshRate,
|
|
apIpAttackViewThresh,
|
|
apIpAttackViewThreshRate,
|
|
apTcpAttackViewThresh,
|
|
apTcpAttackViewThreshRate,
|
|
apUdpAttackViewThresh,
|
|
apUdpAttackViewThreshRate,
|
|
apIcmpAttackViewThresh,
|
|
apIcmpAttackViewThreshRate,
|
|
apOtherIpAttackViewThresh,
|
|
apOtherIpAttackViewThreshRate,
|
|
apFragAttackViewThresh,
|
|
apFragAttackViewThreshRate,
|
|
apBadIpViewThresh,
|
|
apBadIpViewThreshRate,
|
|
apBadTcpViewThresh,
|
|
apBadTcpViewThreshRate,
|
|
apBadUdpViewThresh,
|
|
apBadUdpViewThreshRate,
|
|
apBadIcmpViewThresh,
|
|
apBadIcmpViewThreshRate,
|
|
apBadOtherIpViewThresh,
|
|
apBadOtherIpViewThreshRate,
|
|
apOverloadedIpViewThresh,
|
|
apOverloadedIpViewThreshRate,
|
|
apBandwidthOffThresh,
|
|
apBandwidthOffThreshRate,
|
|
apFloodOffThresh,
|
|
apFloodOffThreshRate,
|
|
apBlockedProtoOffThresh,
|
|
apBlockedProtoOffThreshRate,
|
|
apBlockedStateOffThresh,
|
|
apBlockedStateOffThreshRate,
|
|
apIpAttackOffThresh,
|
|
apIpAttackOffThreshRate,
|
|
apTcpAttackOffThresh,
|
|
apTcpAttackOffThreshRate,
|
|
apUdpAttackOffThresh,
|
|
apUdpAttackOffThreshRate,
|
|
apIcmpAttackOffThresh,
|
|
apIcmpAttackOffThreshRate,
|
|
apOtherIpAttackOffThresh,
|
|
apOtherIpAttackOffThreshRate,
|
|
apFragAttackOffThresh,
|
|
apFragAttackOffThreshRate,
|
|
apBadIpOffThresh,
|
|
apBadIpOffThreshRate,
|
|
apBadTcpOffThresh,
|
|
apBadTcpOffThreshRate,
|
|
apBadUdpOffThresh,
|
|
apBadUdpOffThreshRate,
|
|
apBadIcmpOffThresh,
|
|
apBadIcmpOffThreshRate,
|
|
apBadOtherIpOffThresh,
|
|
apBadOtherIpOffThreshRate,
|
|
apOverloadedIpOffThresh,
|
|
apOverloadedIpOffThreshRate,
|
|
apBandwidthAlertThresh,
|
|
apBandwidthAlertThreshRate,
|
|
apFloodAlertThresh,
|
|
apFloodAlertThreshRate,
|
|
apBlockedProtoAlertThresh,
|
|
apBlockedProtoAlertThreshRate,
|
|
apBlockedStateAlertThresh,
|
|
apBlockedStateAlertThreshRate,
|
|
apIpAttackAlertThresh,
|
|
apIpAttackAlertThreshRate,
|
|
apTcpAttackAlertThresh,
|
|
apTcpAttackAlertThreshRate,
|
|
apUdpAttackAlertThresh,
|
|
apUdpAttackAlertThreshRate,
|
|
apIcmpAttackAlertThresh,
|
|
apIcmpAttackAlertThreshRate,
|
|
apOtherIpAttackAlertThresh,
|
|
apOtherIpAttackAlertThreshRate,
|
|
apFragAttackAlertThresh,
|
|
apFragAttackAlertThreshRate,
|
|
apBadIpAlertThresh,
|
|
apBadIpAlertThreshRate,
|
|
apBadTcpAlertThresh,
|
|
apBadTcpAlertThreshRate,
|
|
apBadUdpAlertThresh,
|
|
apBadUdpAlertThreshRate,
|
|
apBadIcmpAlertThresh,
|
|
apBadIcmpAlertThreshRate,
|
|
apBadOtherIpAlertThresh,
|
|
apBadOtherIpAlertThreshRate,
|
|
apOverloadedIpAlertThresh,
|
|
apOverloadedIpAlertThreshRate
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Appliance Threshold Configuration Group."
|
|
::= { ddossecure4MIBGroups 3 }
|
|
|
|
apDebugGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apDebugBandwidthFlag,
|
|
apDebugFloodFlag,
|
|
apDebugBlockedProtocolFlag,
|
|
apDebugBlockedStateFlag,
|
|
apDebugIpAttackFlag,
|
|
apDebugTcpAttackFlag,
|
|
apDebugUdpAttackFlag,
|
|
apDebugIcmpAttackFlag,
|
|
apDebugOtherIpAttackFlag,
|
|
apDebugFragmentAttackFlag,
|
|
apDebugBadIpPacketFlag,
|
|
apDebugBadTcpPacketFlag,
|
|
apDebugBadUdpPacketFlag,
|
|
apDebugBadIcmpFlag,
|
|
apDebugBadOtherIpFlag,
|
|
apDebugOverloadProtectedIpFlag
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Appliance Logging Debug Group."
|
|
::= { ddossecure4MIBGroups 4 }
|
|
|
|
apGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apBandwidth,
|
|
apFlood,
|
|
apBlockedProtocol,
|
|
apBlockedState,
|
|
apIpAttack,
|
|
apTcpAttack,
|
|
apUdpAttack,
|
|
apIcmpAttack,
|
|
apOtherIpAttack,
|
|
apFragAttack,
|
|
apBadIp,
|
|
apBadTcp,
|
|
apBadUdp,
|
|
apBadIcmp,
|
|
apBadOtherIp,
|
|
apOverloadedIp,
|
|
apInSyn,
|
|
apOutSyn,
|
|
apInSynAck,
|
|
apOutSynAck,
|
|
apInSynSyn,
|
|
apOutSynSyn,
|
|
apInEst,
|
|
apOutEst,
|
|
apInFin1Src,
|
|
apOutFin1Src,
|
|
apInFin2Src,
|
|
apOutFin2Src,
|
|
apInFin3Src,
|
|
apOutFin3Src,
|
|
apInFinFin,
|
|
apOutFinFin,
|
|
apInFin1Dst,
|
|
apOutFin1Dst,
|
|
apInFin2Dst,
|
|
apOutFin2Dst,
|
|
apInFin3Dst,
|
|
apOutFin3Dst,
|
|
apInCls,
|
|
apOutCls,
|
|
apInRst,
|
|
apOutRst,
|
|
apInRstCls,
|
|
apOutRstCls,
|
|
apInUnknown,
|
|
apOutUnknown,
|
|
apInAck,
|
|
apOutAck,
|
|
apInPendAck,
|
|
apOutPendAck,
|
|
apInGet,
|
|
apOutGet,
|
|
apInGets,
|
|
apOutGets,
|
|
apInTotalBpsAvg,
|
|
apOutTotalBpsAvg,
|
|
apInTotalPpsAvg,
|
|
apOutTotalPpsAvg,
|
|
apInSmallPpsAvg,
|
|
apOutSmallPpsAvg,
|
|
apInMediumPpsAvg,
|
|
apOutMediumPpsAvg,
|
|
apInLargePpsAvg,
|
|
apOutLargePpsAvg,
|
|
apInDroppedBpsAvg,
|
|
apOutDroppedBpsAvg,
|
|
apInDroppedPpsAvg,
|
|
apOutDroppedPpsAvg,
|
|
apInCharmDroppedBpsAvg,
|
|
apOutCharmDroppedBpsAvg,
|
|
apInFilteredBwthPercentAvg,
|
|
apOutFilteredBwthPercentAvg,
|
|
apInSynbacklogtallyAvg,
|
|
apOutSynbacklogtallyAvg,
|
|
apInConnectionAvg,
|
|
apOutConnectionAvg,
|
|
apInConnreqAvg,
|
|
apOutConnreqAvg,
|
|
apInActiveHttpGetsAvg,
|
|
apOutActiveHttpGetsAvg,
|
|
apInProtectBwthPktsAvg,
|
|
apOutProtectBwthPktsAvg,
|
|
apInFloodPktsAvg,
|
|
apOutFloodPktsAvg,
|
|
apInBlockedProtocolPktsAvg,
|
|
apOutBlockedProtocolPktsAvg,
|
|
apInBlockedStatePktsAvg,
|
|
apOutBlockedStatePktsAvg,
|
|
apInIpAttackPktsAvg,
|
|
apOutIpAttackPktsAvg,
|
|
apInTcpAttackPktsAvg,
|
|
apOutTcpAttackPktsAvg,
|
|
apInUdpAttackPktsAvg,
|
|
apOutUdpAttackPktsAvg,
|
|
apInIcmpAttackPktsAvg,
|
|
apOutIcmpAttackPktsAvg,
|
|
apInOtherIpAttackPktsAvg,
|
|
apOutOtherIpAttackPktsAvg,
|
|
apInFragmentAttackPktsAvg,
|
|
apOutFragmentAttackPktsAvg,
|
|
apInBadipPktsAvg,
|
|
apOutBadipPktsAvg,
|
|
apInBadTcpPktsAvg,
|
|
apOutBadTcpPktsAvg,
|
|
apInBadUdpPktsAvg,
|
|
apOutBadUdpPktsAvg,
|
|
apInBadIcmpPktsAvg,
|
|
apOutBadIcmpPktsAvg,
|
|
apInBadOtherIpPktsAvg,
|
|
apOutBadOtherIpPktsAvg,
|
|
apInOverloadedAvg,
|
|
apOutOverloadedAvg,
|
|
apInLatencyAvg,
|
|
apOutLatencyAvg,
|
|
apInSmallPpsMax,
|
|
apOutSmallPpsMax,
|
|
apInMediumPpsMax,
|
|
apOutMediumPpsMax,
|
|
apInLargePpsMax,
|
|
apOutLargePpsMax,
|
|
apInCharmDroppedBpsMax,
|
|
apOutCharmDroppedBpsMax,
|
|
apInFilteredBwthPercentMax,
|
|
apOutFilteredBwthPercentMax,
|
|
apInSynbacklogtallyMax,
|
|
apOutSynbacklogtallyMax,
|
|
apInConnectionMax,
|
|
apOutConnectionMax,
|
|
apInConnreqMax,
|
|
apOutConnreqMax,
|
|
apInActiveHttpGetsMax,
|
|
apOutActiveHttpGetsMax,
|
|
apInProtectBwthPktsMax,
|
|
apOutProtectBwthPktsMax,
|
|
apInFloodPktsMax,
|
|
apOutFloodPktsMax,
|
|
apInBlockedProtocolPktsMax,
|
|
apOutBlockedProtocolPktsMax,
|
|
apInBlockedStatePktsMax,
|
|
apOutBlockedStatePktsMax,
|
|
apInIpAttackPktsMax,
|
|
apOutIpAttackPktsMax,
|
|
apInTcpAttackPktsMax,
|
|
apOutTcpAttackPktsMax,
|
|
apInUdpAttackPktsMax,
|
|
apOutUdpAttackPktsMax,
|
|
apInIcmpAttackPktsMax,
|
|
apOutIcmpAttackPktsMax,
|
|
apInOtherIpAttackPktsMax,
|
|
apOutOtherIpAttackPktsMax,
|
|
apInFragmentAttackPktsMax,
|
|
apOutFragmentAttackPktsMax,
|
|
apInBadipPktsMax,
|
|
apOutBadipPktsMax,
|
|
apInBadTcpPktsMax,
|
|
apOutBadTcpPktsMax,
|
|
apInBadUdpPktsMax,
|
|
apOutBadUdpPktsMax,
|
|
apInBadIcmpPktsMax,
|
|
apOutBadIcmpPktsMax,
|
|
apInBadOtherIpPktsMax,
|
|
apOutBadOtherIpPktsMax,
|
|
apInOverloadedMax,
|
|
apOutOverloadedMax,
|
|
apInLatencyMax,
|
|
apOutLatencyMax,
|
|
apStalledFlag,
|
|
apOfflineFlag,
|
|
apInTcpConnTally,
|
|
apOutTcpConnTally,
|
|
apInSynBacklogTally,
|
|
apUdpSessionTally,
|
|
apIcmpSessionTally,
|
|
apOtherIpSessionTally,
|
|
apIncidentStart,
|
|
apIncidentAddress,
|
|
apIncidentType,
|
|
apIncidentDirection,
|
|
apIncidentPeakRate,
|
|
apIncidentDropped
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Appliance Statistics Group."
|
|
::= { ddossecure4MIBGroups 5 }
|
|
|
|
prGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
prBandwidth,
|
|
prFlood,
|
|
prBlockedProtocol,
|
|
prBlockedState,
|
|
prIpAttack,
|
|
prTcpAttack,
|
|
prUdpAttack,
|
|
prIcmpAttack,
|
|
prOtherIpAttack,
|
|
prFragAttack,
|
|
prBadIp,
|
|
prBadTcp,
|
|
prBadUdp,
|
|
prBadIcmp,
|
|
prBadOtherIp,
|
|
prOverloaded,
|
|
prInSyn,
|
|
prOutSyn,
|
|
prInSynAck,
|
|
prOutSynAck,
|
|
prInSynSyn,
|
|
prOutSynSyn,
|
|
prInEst,
|
|
prOutEst,
|
|
prInFin1Src,
|
|
prOutFin1Src,
|
|
prInFin2Src,
|
|
prOutFin2Src,
|
|
prInFin3Src,
|
|
prOutFin3Src,
|
|
prInFinFin,
|
|
prOutFinFin,
|
|
prInFin1Dst,
|
|
prOutFin1Dst,
|
|
prInFin2Dst,
|
|
prOutFin2Dst,
|
|
prInFin3Dst,
|
|
prOutFin3Dst,
|
|
prInCls,
|
|
prOutCls,
|
|
prInRst,
|
|
prOutRst,
|
|
prInRstCls,
|
|
prOutRstCls,
|
|
prInUnknown,
|
|
prOutUnknown,
|
|
prInAck,
|
|
prOutAck,
|
|
prInPendAck,
|
|
prOutPendAck,
|
|
prInGet,
|
|
prOutGet,
|
|
prInGets,
|
|
prOutGets,
|
|
prOverloadedFlag,
|
|
prInTcpConnTally,
|
|
prOutTcpConnTally,
|
|
prInSynBacklogTally,
|
|
prInTotalBytesCnt,
|
|
prOutTotalBytesCnt,
|
|
prInDroppedBytesCnt,
|
|
prOutDroppedBytesCnt,
|
|
prInCharmDroppedBytesCnt,
|
|
prOutCharmDroppedBytesCnt,
|
|
prInTotalPpsMax,
|
|
prOutTotalPpsMax,
|
|
prInDroppedPpsMax,
|
|
prOutDroppedPpsMax,
|
|
prInTotalBpsMax,
|
|
prOutTotalBpsMax,
|
|
prInDroppedBpsMax,
|
|
prOutDroppedBpsMax,
|
|
prInCharmDroppedBpsMax,
|
|
prOutCharmDroppedBpsMax,
|
|
prInProtectBwthPktsCnt,
|
|
prOutProtectBwthPktsCnt,
|
|
prInFloodPktsCnt,
|
|
prOutFloodPktsCnt,
|
|
prInBlockedProtocolPktsCnt,
|
|
prOutBlockedProtocolPktsCnt,
|
|
prInBlockedStatePktsCnt,
|
|
prOutBlockedStatePktsCnt,
|
|
prInIpAttackPktsCnt,
|
|
prOutIpAttackPktsCnt,
|
|
prInTcpAttackPktsCnt,
|
|
prOutTcpAttackPktsCnt,
|
|
prInUdpAttackPktsCnt,
|
|
prOutUdpAttackPktsCnt,
|
|
prInIcmpAttackPktsCnt,
|
|
prOutIcmpAttackPktsCnt,
|
|
prInOtherIpAttackPktsCnt,
|
|
prOutOtherIpAttackPktsCnt,
|
|
prInFragmentAttackPktsCnt,
|
|
prOutFragmentAttackPktsCnt,
|
|
prInBadIpPktsCnt,
|
|
prOutBadIpPktsCnt,
|
|
prInBadTcpPktsCnt,
|
|
prOutBadTcpPktsCnt,
|
|
prInBadUdpPktsCnt,
|
|
prOutBadUdpPktsCnt,
|
|
prInBadIcmpPktsCnt,
|
|
prOutBadIcmpPktsCnt,
|
|
prInBadOtherIpPktsCnt,
|
|
prOutBadOtherIpPktsCnt,
|
|
prInTotalBpsAvg,
|
|
prOutTotalBpsAvg,
|
|
prInTotalPpsAvg,
|
|
prOutTotalPpsAvg,
|
|
prInSmallPpsAvg,
|
|
prOutSmallPpsAvg,
|
|
prInMediumPpsAvg,
|
|
prOutMediumPpsAvg,
|
|
prInLargePpsAvg,
|
|
prOutLargePpsAvg,
|
|
prInDroppedBpsAvg,
|
|
prOutDroppedBpsAvg,
|
|
prInDroppedPpsAvg,
|
|
prOutDroppedPpsAvg,
|
|
prInCharmDroppedBpsAvg,
|
|
prOutCharmDroppedBpsAvg,
|
|
prInFilteredBwthPercentAvg,
|
|
prOutFilteredBwthPercentAvg,
|
|
prInSynbacklogtallyAvg,
|
|
prOutSynbacklogtallyAvg,
|
|
prInConnectionAvg,
|
|
prOutConnectionAvg,
|
|
prInConnreqAvg,
|
|
prOutConnreqAvg,
|
|
prInActiveHttpGetsAvg,
|
|
prOutActiveHttpGetsAvg,
|
|
prInProtectBwthPktsAvg,
|
|
prOutProtectBwthPktsAvg,
|
|
prInFloodPktsAvg,
|
|
prOutFloodPktsAvg,
|
|
prInBlockedProtocolPktsAvg,
|
|
prOutBlockedProtocolPktsAvg,
|
|
prInBlockedStatePktsAvg,
|
|
prOutBlockedStatePktsAvg,
|
|
prInIpAttackPktsAvg,
|
|
prOutIpAttackPktsAvg,
|
|
prInTcpAttackPktsAvg,
|
|
prOutTcpAttackPktsAvg,
|
|
prInUdpAttackPktsAvg,
|
|
prOutUdpAttackPktsAvg,
|
|
prInIcmpAttackPktsAvg,
|
|
prOutIcmpAttackPktsAvg,
|
|
prInOtherIpAttackPktsAvg,
|
|
prOutOtherIpAttackPktsAvg,
|
|
prInFragmentAttackPktsAvg,
|
|
prOutFragmentAttackPktsAvg,
|
|
prInBadipPktsAvg,
|
|
prOutBadipPktsAvg,
|
|
prInBadTcpPktsAvg,
|
|
prOutBadTcpPktsAvg,
|
|
prInBadUdpPktsAvg,
|
|
prOutBadUdpPktsAvg,
|
|
prInBadIcmpPktsAvg,
|
|
prOutBadIcmpPktsAvg,
|
|
prInBadOtherIpPktsAvg,
|
|
prOutBadOtherIpPktsAvg,
|
|
prInOverloadedAvg,
|
|
prOutOverloadedAvg,
|
|
prInLatencyAvg,
|
|
prOutLatencyAvg,
|
|
prInTotalBpsMax,
|
|
prOutTotalBpsMax,
|
|
prInTotalPpsMax,
|
|
prOutTotalPpsMax,
|
|
prInSmallPpsMax,
|
|
prOutSmallPpsMax,
|
|
prInMediumPpsMax,
|
|
prOutMediumPpsMax,
|
|
prInLargePpsMax,
|
|
prOutLargePpsMax,
|
|
prInDroppedBpsMax,
|
|
prOutDroppedBpsMax,
|
|
prInDroppedPpsMax,
|
|
prOutDroppedPpsMax,
|
|
prInCharmDroppedBpsMax,
|
|
prOutCharmDroppedBpsMax,
|
|
prInFilteredBwthPercentMax,
|
|
prOutFilteredBwthPercentMax,
|
|
prInSynbacklogtallyMax,
|
|
prOutSynbacklogtallyMax,
|
|
prInConnectionMax,
|
|
prOutConnectionMax,
|
|
prInConnreqMax,
|
|
prOutConnreqMax,
|
|
prInActiveHttpGetsMax,
|
|
prOutActiveHttpGetsMax,
|
|
prInProtectBwthPktsMax,
|
|
prOutProtectBwthPktsMax,
|
|
prInFloodPktsMax,
|
|
prOutFloodPktsMax,
|
|
prInBlockedProtocolPktsMax,
|
|
prOutBlockedProtocolPktsMax,
|
|
prInBlockedStatePktsMax,
|
|
prOutBlockedStatePktsMax,
|
|
prInIpAttackPktsMax,
|
|
prOutIpAttackPktsMax,
|
|
prInTcpAttackPktsMax,
|
|
prOutTcpAttackPktsMax,
|
|
prInUdpAttackPktsMax,
|
|
prOutUdpAttackPktsMax,
|
|
prInIcmpAttackPktsMax,
|
|
prOutIcmpAttackPktsMax,
|
|
prInOtherIpAttackPktsMax,
|
|
prOutOtherIpAttackPktsMax,
|
|
prInFragmentAttackPktsMax,
|
|
prOutFragmentAttackPktsMax,
|
|
prInBadipPktsMax,
|
|
prOutBadipPktsMax,
|
|
prInBadTcpPktsMax,
|
|
prOutBadTcpPktsMax,
|
|
prInBadUdpPktsMax,
|
|
prOutBadUdpPktsMax,
|
|
prInBadIcmpPktsMax,
|
|
prOutBadIcmpPktsMax,
|
|
prInBadOtherIpPktsMax,
|
|
prOutBadOtherIpPktsMax,
|
|
prInOverloadedMax,
|
|
prOutOverloadedMax,
|
|
prInLatencyMax,
|
|
prOutLatencyMax,
|
|
prIncidentStart,
|
|
prIncidentAddress,
|
|
prIncidentType,
|
|
prIncidentDirection,
|
|
prIncidentPeakRate,
|
|
prIncidentDropped
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Protected Statistics Group."
|
|
::= { ddossecure4MIBGroups 6 }
|
|
|
|
prCfgGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
prHostName,
|
|
prTcpBacklog,
|
|
prMaxConnections,
|
|
prMaxConnectionRate,
|
|
prInFilterName,
|
|
prOutFilterName,
|
|
prSendTcpRejects,
|
|
prTrackSoap,
|
|
prOperationMode,
|
|
prMaxGets,
|
|
prFragsDisabled
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "protected IP Configuration Group."
|
|
::= { ddossecure4MIBGroups 7 }
|
|
|
|
gwCfgGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
gwInternetConfigMacAddress,
|
|
gwInternetConfigToSpeedBps,
|
|
gwInternetConfigToRatePps,
|
|
gwProtectedConfigMacAddress,
|
|
gwProtectedConfigToSpeedBps,
|
|
gwProtectedConfigToRatePps
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Gateway Configuration Group."
|
|
::= { ddossecure4MIBGroups 8 }
|
|
|
|
apEventObjectGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apOutputErrorIIFlag,
|
|
apOutputErrorPIFlag,
|
|
apOutputErrorMIFlag,
|
|
apNewConfigFlag,
|
|
apNotLicensedFlag,
|
|
apMacTableFullFlag,
|
|
apProtectedTableFullFlag,
|
|
apIncidentTableFullFlag,
|
|
apTcpTableFullFlag,
|
|
apUdpTableFullFlag,
|
|
apIcmpTableFullFlag,
|
|
apOtherIpTableFullFlag,
|
|
apFragTableFullFlag,
|
|
apFtpTableFullFlag,
|
|
apBlockedTableFullFlag,
|
|
apShortCircuitFlag,
|
|
apInternetIfDisconnectedFlag,
|
|
apProtectedIfDisconnectedFlag,
|
|
apMgmtIfDisconnectedFlag,
|
|
apUpgradingFlag,
|
|
apProtectedIfTrafficFlag,
|
|
apRoutingLoopFlag,
|
|
apStateLearningFlag,
|
|
apSupportExpiredFlag,
|
|
apSevereLoadingFlag,
|
|
apMacMisconfiguredFlag,
|
|
apIfMisconfiguredFlag,
|
|
apInternetIfLinkDownFlag,
|
|
apProtectedIfLinkDownFlag,
|
|
apDatashareIfDisconnectedFlag,
|
|
apDiskFailingFlag,
|
|
apPsuFailingFlag,
|
|
apFanFailingFlag,
|
|
apConfigXferFailFlag,
|
|
apMissingRequiredPartnerFlag,
|
|
apBgpMisconfiguredIpFlag
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Appliance State Flag Group."
|
|
::= { ddossecure4MIBGroups 9 }
|
|
|
|
apRatesGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apInTotalBytesCnt,
|
|
apOutTotalBytesCnt,
|
|
apInDroppedBytesCnt,
|
|
apOutDroppedBytesCnt,
|
|
apInCharmDroppedBytesCnt,
|
|
apOutCharmDroppedBytesCnt,
|
|
apInTotalPpsMax,
|
|
apOutTotalPpsMax,
|
|
apInDroppedPpsMax,
|
|
apOutDroppedPpsMax,
|
|
apInTotalBpsMax,
|
|
apOutTotalBpsMax,
|
|
apInDroppedBpsMax,
|
|
apOutDroppedBpsMax,
|
|
apInCharmDroppedBpsMax,
|
|
apOutCharmDroppedBpsMax,
|
|
apInProtectBwthPktsCnt,
|
|
apOutProtectBwthPktsCnt,
|
|
apInFloodPktsCnt,
|
|
apOutFloodPktsCnt,
|
|
apInBlockedProtocolPktsCnt,
|
|
apOutBlockedProtocolPktsCnt,
|
|
apInBlockedStatePktsCnt,
|
|
apOutBlockedStatePktsCnt,
|
|
apInIpAttackPktsCnt,
|
|
apOutIpAttackPktsCnt,
|
|
apInTcpAttackPktsCnt,
|
|
apOutTcpAttackPktsCnt,
|
|
apInUdpAttackPktsCnt,
|
|
apOutUdpAttackPktsCnt,
|
|
apInIcmpAttackPktsCnt,
|
|
apOutIcmpAttackPktsCnt,
|
|
apInOtherIpAttackPktsCnt,
|
|
apOutOtherIpAttackPktsCnt,
|
|
apInFragmentAttackPktsCnt,
|
|
apOutFragmentAttackPktsCnt,
|
|
apInBadIpPktsCnt,
|
|
apOutBadIpPktsCnt,
|
|
apInBadTcpPktsCnt,
|
|
apOutBadTcpPktsCnt,
|
|
apInBadUdpPktsCnt,
|
|
apOutBadUdpPktsCnt,
|
|
apInBadIcmpPktsCnt,
|
|
apOutBadIcmpPktsCnt,
|
|
apInBadOtherIpPktsCnt,
|
|
apOutBadOtherIpPktsCnt,
|
|
apInTotalBytesCnt,
|
|
apOutTotalBytesCnt,
|
|
apInTotalPpsCnt,
|
|
apOutTotalPpsCnt,
|
|
apInSmallPpsCnt,
|
|
apOutSmallPpsCnt,
|
|
apInMediumPpsCnt,
|
|
apOutMediumPpsCnt,
|
|
apInLargePpsCnt,
|
|
apOutLargePpsCnt,
|
|
apInDroppedBytesCnt,
|
|
apOutDroppedBytesCnt,
|
|
apInDroppedPpsCnt,
|
|
apOutDroppedPpsCnt,
|
|
apInFilteredBwthPercentCnt,
|
|
apOutFilteredBwthPercentCnt,
|
|
apInConnreqCnt,
|
|
apOutConnreqCnt,
|
|
apInOverloadedCnt,
|
|
apOutOverloadedCnt
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Configuration Group."
|
|
::= { ddossecure4MIBGroups 10 }
|
|
|
|
poFilterCfgGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
poFilterName,
|
|
poTcpPortsList,
|
|
poUdpPortsList,
|
|
poIcmpTypesList,
|
|
poIpProtocolsList
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Configuration Group."
|
|
::= { ddossecure4MIBGroups 11 }
|
|
|
|
apLinkStatusGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apMgmtIfLinkModeState,
|
|
apIntIfLinkModeState,
|
|
apMgmtIfLinkFCState,
|
|
apIntIfLinkFCState,
|
|
apProtIfLinkModeState,
|
|
apProtIfLinkFCState
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Configuration Group."
|
|
::= { ddossecure4MIBGroups 12 }
|
|
|
|
apLogGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apWorstOffenderLastTime,
|
|
apWorstOffenderCount,
|
|
apLogFileRecord
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Configuration Group."
|
|
::= { ddossecure4MIBGroups 13 }
|
|
|
|
apHaCfgGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
apHaState,
|
|
apHaPartnerList,
|
|
apHaPartnerTime
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Configuration Group."
|
|
::= { ddossecure4MIBGroups 14 }
|
|
|
|
poGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
poPortalName,
|
|
poInTotalBpsAvg,
|
|
poOutTotalBpsAvg,
|
|
poInTotalPpsAvg,
|
|
poOutTotalPpsAvg,
|
|
poInSmallPpsAvg,
|
|
poOutSmallPpsAvg,
|
|
poInMediumPpsAvg,
|
|
poOutMediumPpsAvg,
|
|
poInLargePpsAvg,
|
|
poOutLargePpsAvg,
|
|
poInDroppedBpsAvg,
|
|
poOutDroppedBpsAvg,
|
|
poInDroppedPpsAvg,
|
|
poOutDroppedPpsAvg,
|
|
poInCharmDroppedBpsAvg,
|
|
poOutCharmDroppedBpsAvg,
|
|
poInFilteredBwthPercentAvg,
|
|
poOutFilteredBwthPercentAvg,
|
|
poInSynbacklogtallyAvg,
|
|
poOutSynbacklogtallyAvg,
|
|
poInConnectionAvg,
|
|
poOutConnectionAvg,
|
|
poInConnreqAvg,
|
|
poOutConnreqAvg,
|
|
poInActiveHttpGetsAvg,
|
|
poOutActiveHttpGetsAvg,
|
|
poInProtectBwthPktsAvg,
|
|
poOutProtectBwthPktsAvg,
|
|
poInFloodPktsAvg,
|
|
poOutFloodPktsAvg,
|
|
poInBlockedProtocolPktsAvg,
|
|
poOutBlockedProtocolPktsAvg,
|
|
poInBlockedStatePktsAvg,
|
|
poOutBlockedStatePktsAvg,
|
|
poInIpAttackPktsAvg,
|
|
poOutIpAttackPktsAvg,
|
|
poInTcpAttackPktsAvg,
|
|
poOutTcpAttackPktsAvg,
|
|
poInUdpAttackPktsAvg,
|
|
poOutUdpAttackPktsAvg,
|
|
poInIcmpAttackPktsAvg,
|
|
poOutIcmpAttackPktsAvg,
|
|
poInOtherIpAttackPktsAvg,
|
|
poOutOtherIpAttackPktsAvg,
|
|
poInFragmentAttackPktsAvg,
|
|
poOutFragmentAttackPktsAvg,
|
|
poInBadipPktsAvg,
|
|
poOutBadipPktsAvg,
|
|
poInBadTcpPktsAvg,
|
|
poOutBadTcpPktsAvg,
|
|
poInBadUdpPktsAvg,
|
|
poOutBadUdpPktsAvg,
|
|
poInBadIcmpPktsAvg,
|
|
poOutBadIcmpPktsAvg,
|
|
poInBadOtherIpPktsAvg,
|
|
poOutBadOtherIpPktsAvg,
|
|
poInOverloadedAvg,
|
|
poOutOverloadedAvg,
|
|
poInLatencyAvg,
|
|
poOutLatencyAvg,
|
|
poInTotalBpsMax,
|
|
poOutTotalBpsMax,
|
|
poInTotalPpsMax,
|
|
poOutTotalPpsMax,
|
|
poInSmallPpsMax,
|
|
poOutSmallPpsMax,
|
|
poInMediumPpsMax,
|
|
poOutMediumPpsMax,
|
|
poInLargePpsMax,
|
|
poOutLargePpsMax,
|
|
poInDroppedBpsMax,
|
|
poOutDroppedBpsMax,
|
|
poInDroppedPpsMax,
|
|
poOutDroppedPpsMax,
|
|
poInCharmDroppedBpsMax,
|
|
poOutCharmDroppedBpsMax,
|
|
poInFilteredBwthPercentMax,
|
|
poOutFilteredBwthPercentMax,
|
|
poInSynbacklogtallyMax,
|
|
poOutSynbacklogtallyMax,
|
|
poInConnectionMax,
|
|
poOutConnectionMax,
|
|
poInConnreqMax,
|
|
poOutConnreqMax,
|
|
poInActiveHttpGetsMax,
|
|
poOutActiveHttpGetsMax,
|
|
poInProtectBwthPktsMax,
|
|
poOutProtectBwthPktsMax,
|
|
poInFloodPktsMax,
|
|
poOutFloodPktsMax,
|
|
poInBlockedProtocolPktsMax,
|
|
poOutBlockedProtocolPktsMax,
|
|
poInBlockedStatePktsMax,
|
|
poOutBlockedStatePktsMax,
|
|
poInIpAttackPktsMax,
|
|
poOutIpAttackPktsMax,
|
|
poInTcpAttackPktsMax,
|
|
poOutTcpAttackPktsMax,
|
|
poInUdpAttackPktsMax,
|
|
poOutUdpAttackPktsMax,
|
|
poInIcmpAttackPktsMax,
|
|
poOutIcmpAttackPktsMax,
|
|
poInOtherIpAttackPktsMax,
|
|
poOutOtherIpAttackPktsMax,
|
|
poInFragmentAttackPktsMax,
|
|
poOutFragmentAttackPktsMax,
|
|
poInBadipPktsMax,
|
|
poOutBadipPktsMax,
|
|
poInBadTcpPktsMax,
|
|
poOutBadTcpPktsMax,
|
|
poInBadUdpPktsMax,
|
|
poOutBadUdpPktsMax,
|
|
poInBadIcmpPktsMax,
|
|
poOutBadIcmpPktsMax,
|
|
poInBadOtherIpPktsMax,
|
|
poOutBadOtherIpPktsMax,
|
|
poInOverloadedMax,
|
|
poOutOverloadedMax,
|
|
poInLatencyMax,
|
|
poOutLatencyMax,
|
|
poInTotalBytesCnt,
|
|
poOutTotalBytesCnt,
|
|
poInDroppedBytesCnt,
|
|
poOutDroppedBytesCnt,
|
|
poInCharmDroppedBytesCnt,
|
|
poOutCharmDroppedBytesCnt,
|
|
poInTotalPpsCnt,
|
|
poOutTotalPpsCnt,
|
|
poInSmallPpsCnt,
|
|
poOutSmallPpsCnt,
|
|
poInMediumPpsCnt,
|
|
poOutMediumPpsCnt,
|
|
poInLargePpsCnt,
|
|
poOutLargePpsCnt,
|
|
poInDroppedPpsCnt,
|
|
poOutDroppedPpsCnt,
|
|
poInFilteredBwthPercentCnt,
|
|
poOutFilteredBwthPercentCnt,
|
|
poInConnreqCnt,
|
|
poOutConnreqCnt,
|
|
poIncidentPortalName,
|
|
poIncidentStart,
|
|
poIncidentAddress,
|
|
poIncidentType,
|
|
poIncidentDirection,
|
|
poIncidentPeakRate,
|
|
poIncidentDropped
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Configuration Group."
|
|
::= { ddossecure4MIBGroups 15 }
|
|
|
|
prNotificationGroup NOTIFICATION-GROUP
|
|
NOTIFICATIONS {
|
|
prBandwidthOn,
|
|
prBandwidthOff,
|
|
prFloodOn,
|
|
prFloodOff,
|
|
prBlockedProtocolOn,
|
|
prBlockedProtocolOff,
|
|
prBlockedStateOn,
|
|
prBlockedStateOff,
|
|
prIpAttackOn,
|
|
prIpAttackOff,
|
|
prTcpAttackOn,
|
|
prTcpAttackOff,
|
|
prUdpAttackOn,
|
|
prUdpAttackOff,
|
|
prIcmpAttackOn,
|
|
prIcmpAttackOff,
|
|
prOtherIpAttackOn,
|
|
prOtherIpAttackOff,
|
|
prFragAttackOn,
|
|
prFragAttackOff,
|
|
prBadIpOn,
|
|
prBadIpOff,
|
|
prBadTcpOn,
|
|
prBadTcpOff,
|
|
prBadUdpOn,
|
|
prBadUdpOff,
|
|
prBadIcmpOn,
|
|
prBadIcmpOff,
|
|
prBadOtherIpOn,
|
|
prBadOtherIpOff,
|
|
prOverloadedOn,
|
|
prOverloadedOff,
|
|
apHaStateMode,
|
|
apOutputErrorIIFlagOn,
|
|
apOutputErrorIIFlagOff,
|
|
apOutputErrorPIFlagOn,
|
|
apOutputErrorPIFlagOff,
|
|
apOutputErrorMIFlagOn,
|
|
apOutputErrorMIFlagOff,
|
|
apNewConfigFlagOn,
|
|
apNewConfigFlagOff,
|
|
apNotLicensedFlagOn,
|
|
apNotLicensedFlagOff,
|
|
apMacTableFullFlagOn,
|
|
apMacTableFullFlagOff,
|
|
apProtectedTableFullFlagOn,
|
|
apProtectedTableFullFlagOff,
|
|
apIncidentTableFullFlagOn,
|
|
apIncidentTableFullFlagOff,
|
|
apTcpTableFullFlagOn,
|
|
apTcpTableFullFlagOff,
|
|
apUdpTableFullFlagOn,
|
|
apUdpTableFullFlagOff,
|
|
apIcmpTableFullFlagOn,
|
|
apIcmpTableFullFlagOff,
|
|
apOtherIpTableFullFlagOn,
|
|
apOtherIpTableFullFlagOff,
|
|
apFragTableFullFlagOn,
|
|
apFragTableFullFlagOff,
|
|
apFtpTableFullFlagOn,
|
|
apFtpTableFullFlagOff,
|
|
apBlockedTableFullFlagOn,
|
|
apBlockedTableFullFlagOff,
|
|
apShortCircuitFlagOn,
|
|
apShortCircuitFlagOff,
|
|
apInternetIfDisconnectedFlagOn,
|
|
apInternetIfDisconnectedFlagOff,
|
|
apProtectedIfDisconnectedFlagOn,
|
|
apProtectedIfDisconnectedFlagOff,
|
|
apMgmtIfDisconnectedFlagOn,
|
|
apMgmtIfDisconnectedFlagOff,
|
|
apUpgradingFlagOn,
|
|
apUpgradingFlagOff,
|
|
apProtectedIfTrafficFlagOn,
|
|
apProtectedIfTrafficFlagOff,
|
|
apRoutingLoopFlagOn,
|
|
apRoutingLoopFlagOff,
|
|
apOfflineFlagOn,
|
|
apOfflineFlagOff,
|
|
apStateLearningFlagOn,
|
|
apStateLearningFlagOff,
|
|
apSupportExpiredFlagOn,
|
|
apSupportExpiredFlagOff,
|
|
apSevereLoadingFlagOn,
|
|
apSevereLoadingFlagOff,
|
|
apMacMisconfiguredFlagOn,
|
|
apMacMisconfiguredFlagOff,
|
|
apIfMisconfiguredFlagOn,
|
|
apIfMisconfiguredFlagOff,
|
|
apInternetIfLinkDownFlagOn,
|
|
apInternetIfLinkDownFlagOff,
|
|
apProtectedIfLinkDownFlagOn,
|
|
apProtectedIfLinkDownFlagOff,
|
|
apDatashareIfDisconnectedFlagOn,
|
|
apDatashareIfDisconnectedFlagOff,
|
|
apDiskFailingOn,
|
|
apDiskFailingOff,
|
|
apPsuFailingFlagOn,
|
|
apPsuFailingFlagOff,
|
|
apFanFailingFlagOn,
|
|
apFanFailingFlagOff,
|
|
apConfigXferFailFlagOn,
|
|
apConfigXferFailFlagOff,
|
|
apMissingRequiredPartnerFlagOn,
|
|
apMissingRequiredPartnerFlagOff,
|
|
apBgpMisconfiguredIpFlagOn,
|
|
apBgpMisconfiguredIpFlagOff,
|
|
prBandwidthLimitOn,
|
|
prBandwidthLimitOff,
|
|
prPacketLimitOn,
|
|
prPacketLimitOff,
|
|
prBlockedProtocolBlackListIpOn,
|
|
prBlockedProtocolBlackListIpOff,
|
|
prBlockedProtocolIcmpTypeOn,
|
|
prBlockedProtocolIcmpTypeOff,
|
|
prBlockedProtocolPortOn,
|
|
prBlockedProtocolPortOff,
|
|
prBlockedProtocolOtherOn,
|
|
prBlockedProtocolOtherOff,
|
|
prUnknownSessionIcmpRespOn,
|
|
prUnknownSessionIcmpRespOff,
|
|
prUnknownSessionIcmpDiagRespOn,
|
|
prUnknownSessionIcmpDiagRespOff,
|
|
prUnknownSessionNoStateOn,
|
|
prUnknownSessionNoStateOff,
|
|
prUnknownSessionInvalidStateOn,
|
|
prUnknownSessionInvalidStateOff,
|
|
prTcpAttackRstOn,
|
|
prTcpAttackRstOff,
|
|
prIpAttackLandOn,
|
|
prIpAttackLandOff,
|
|
prTcpAttackSynAckToOn,
|
|
prTcpAttackSynAckToOff,
|
|
prBlockedProtocolCountryOn,
|
|
prBlockedProtocolCountryOff,
|
|
prTcpAttackSynFloodOn,
|
|
prTcpAttackSynFloodOff,
|
|
prTcpAttackConnFloodOn,
|
|
prTcpAttackConnFloodOff,
|
|
prTcpAttackTableFullOn,
|
|
prTcpAttackTableFullOff,
|
|
prBadTcpFastAckOn,
|
|
prBadTcpFastAckOff,
|
|
prTcpAttackHttpFloodOn,
|
|
prTcpAttackHttpFloodOff,
|
|
prUdpAttackTableFullOn,
|
|
prUdpAttackTableFullOff,
|
|
prTcpAttackHttpTimeoutOn,
|
|
prTcpAttackHttpTimeoutOff,
|
|
prIcmpAttackRepeatsOn,
|
|
prIcmpAttackRepeatsOff,
|
|
prIcmpAttackTableFullOn,
|
|
prIcmpAttackTableFullOff,
|
|
prOtherIpAttackTableFullOn,
|
|
prOtherIpAttackTableFullOff,
|
|
prFragAttackPingOfDeathOn,
|
|
prFragAttackPingOfDeathOff,
|
|
prFragAttackHeadOverlayOn,
|
|
prFragAttackHeadOverlayOff,
|
|
prFragAttackTableFullOn,
|
|
prFragAttackTableFullOff,
|
|
prFragAttackSmallSizeOn,
|
|
prFragAttackSmallSizeOff,
|
|
prFragAttackNoFragsAllowedOn,
|
|
prFragAttackNoFragsAllowedOff,
|
|
prBadIpSrcAddrOn,
|
|
prBadIpSrcAddrOff,
|
|
prBadIpHeaderOn,
|
|
prBadIpHeaderOff,
|
|
prBadIpOptionOn,
|
|
prBadIpOptionOff,
|
|
prBadIpSizeOn,
|
|
prBadIpSizeOff,
|
|
prBlockedProtocolTmpBlackListOn,
|
|
prBlockedProtocolTmpBlackListOff,
|
|
prBadTcpFlagsOn,
|
|
prBadTcpFlagsOff,
|
|
prBadTcpMalformedOn,
|
|
prBadTcpMalformedOff,
|
|
prBadTcpOptionOn,
|
|
prBadTcpOptionOff,
|
|
prBlockedProtocolDnsOn,
|
|
prBlockedProtocolDnsOff,
|
|
prBadUdpNoDataOn,
|
|
prBadUdpNoDataOff,
|
|
prBadUdpMalformedOn,
|
|
prBadUdpMalformedOff,
|
|
prBlockedProtocolAsOn,
|
|
prBlockedProtocolAsOff,
|
|
ptTcpAttackHttpRateFloodOn,
|
|
ptTcpAttackHttpRateFloodOff,
|
|
prBadIcmpMalformedOn,
|
|
prBadIcmpMalformedOff,
|
|
prBlockedProtocolUrlOn,
|
|
prBlockedProtocolUrlOff,
|
|
prBadOtherIpProtocolOn,
|
|
prBadOtherIpProtocolOff,
|
|
prBadOtherIpLengthOn,
|
|
prBadOtherIpLengthOff,
|
|
prTcpAttackHttpIncompleteOn,
|
|
prTcpAttackHttpIncompleteOff,
|
|
prOverloadedStallOn,
|
|
prOverloadedStallOff,
|
|
prFragAttackTimeOutOn,
|
|
prFragAttackTimeOutOff,
|
|
prFragAttackRepeatsOn,
|
|
prFragAttackRepeatsOff,
|
|
prFragAttackBadLengthOn,
|
|
prFragAttackBadLengthOff,
|
|
prOverloadedBacklogOn,
|
|
prOverloadedBacklogOff,
|
|
prBlockedProtocolAddressOn,
|
|
prBlockedProtocolAddressOff,
|
|
prTcpAttackNoDataOn,
|
|
prTcpAttackNoDataOff,
|
|
prTcpAttackNoServerDataOn,
|
|
prTcpAttackNoServerDataOff,
|
|
prTcpAttackConnRateFloodOn,
|
|
prTcpAttackConnRateFloodOff,
|
|
prOverloadedThreadsOn,
|
|
prOverloadedThreadsOff,
|
|
prBadIpReflectedRouteOn,
|
|
prBadIpReflectedRouteOff,
|
|
prTcpAttackPortScanOn,
|
|
prTcpAttackPortScanOff,
|
|
prTcpAttackSmallWindowOn,
|
|
prTcpAttackSmallWindowOff,
|
|
prTcpAttackClientAbortOn,
|
|
prTcpAttackClientAbortOff,
|
|
prBlockedProtocolSipOn,
|
|
prBlockedProtocolSipOff,
|
|
prTcpAttackUrlRateLimitOn,
|
|
prTcpAttackUrlRateLimitOff,
|
|
prUdpAttackDnsRateLimitOn,
|
|
prUdpAttackDnsRateLimitOff,
|
|
prUdpAttackSipRateLimitOn,
|
|
prUdpAttackSipRateLimitOff,
|
|
prBadTcpChecksumOn,
|
|
prBadTcpChecksumOff,
|
|
prTcpAttackHttpFormatOn,
|
|
prTcpAttackHttpFormatOff,
|
|
prUnknownSessionReflectiveOn,
|
|
prUnknownSessionReflectiveOff
|
|
}
|
|
STATUS current
|
|
DESCRIPTION "Notification Group."
|
|
::= { ddossecure4MIBGroups 100 }
|
|
|
|
deprecatedNotificationGroup NOTIFICATION-GROUP
|
|
NOTIFICATIONS {
|
|
apOutputErrorIIEvent,
|
|
apOutputErrorPIEvent,
|
|
apOutputErrorMIEvent,
|
|
apNewConfigEvent,
|
|
apNotLicensedEvent,
|
|
apMacTableFullEvent,
|
|
apProtectedTableFullEvent,
|
|
apIncidentTableFullEvent,
|
|
apTcpTableFullEvent,
|
|
apUdpTableFullEvent,
|
|
apIcmpTableFullEvent,
|
|
apOtherIpTableFullEvent,
|
|
apFragTableFullEvent,
|
|
apFtpTableFullEvent,
|
|
apBlockedTableFullEvent,
|
|
apShortCircuitEvent,
|
|
apInternetIfDisconnectedEvent,
|
|
apProtectedIfDisconnectedEvent,
|
|
apMgmtIfDisconnectedEvent,
|
|
apUpgradingEvent,
|
|
apProtectedIfTrafficEvent,
|
|
apRoutingLoopEvent,
|
|
apOfflineEvent,
|
|
apStateLearningEvent,
|
|
apSupportExpiredEvent,
|
|
apSevereLoadingEvent,
|
|
apMacMisconfiguredEvent,
|
|
apIfMisconfiguredEvent,
|
|
apInternetIfLinkDownEvent,
|
|
apProtectedIfLinkDownEvent,
|
|
apDatashareIfDisconnectedEvent,
|
|
apHaStateEvent,
|
|
prBandwidthEvent,
|
|
prFloodEvent,
|
|
prBlockedProtocolEvent,
|
|
prBlockedStateEvent,
|
|
prIpAttackEvent,
|
|
prTcpAttackEvent,
|
|
prUdpAttackEvent,
|
|
prIcmpAttackEvent,
|
|
prOtherIpAttackEvent,
|
|
prFragAttackEvent,
|
|
prBadIpEvent,
|
|
prBadTcpEvent,
|
|
prBadUdpEvent,
|
|
prBadIcmpEvent,
|
|
prBadOtherIpEvent,
|
|
prOverloadedEvent
|
|
}
|
|
STATUS deprecated
|
|
DESCRIPTION "Notification Group."
|
|
::= { ddossecure4MIBGroups 101 }
|
|
|
|
END
|