DOS-PREV-MIB: View SNMP OID List / Download MIB

VENDOR: D-LINK


 Home MIB: DOS-PREV-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 swDoSMgmtMIB 1.3.6.1.4.1.171.12.59
The MIB module for configuring the DoS prevention settings of the device.
       swDoSCtrl 1.3.6.1.4.1.171.12.59.1
           swDoSTrapLog 1.3.6.1.4.1.171.12.59.1.1 integer read-write
This object indicates the status of the DoS prevention trap log. Enumeration: 'enable': 1, 'other': 3, 'disable': 2.
           swDoSClearCounters 1.3.6.1.4.1.171.12.59.1.2 integer read-write
This object clears the DoS prevention frame counters. Enumeration: 'all': 8, 'tracert-attack': 22, 'ping-death-attack': 16, 'winnuke-attack': 23, 'tcp-null-scan': 4, 'fraggle-attack': 11, 'icmp-unreachable-attack': 13, 'tcp-syn-srcport-less-1024': 7, 'tcp-tiny-frag-attack': 20, 'tcp-over-mac-mcbc': 18, 'other': 9, 'land-attack': 1, 'tcp-flag-synrst': 17, 'ip-route-record-attac': 14, 'tcp-syn-with-data': 19, 'arp-mac-sa-mismatch': 10, 'ip-source-route-attack': 15, 'tcp-synfin': 6, 'smurf-attack': 3, 'tcp-xmascan': 5, 'blat-attack': 2, 'icmp-redirect-attack': 12, 'tcpudp-port-zero': 21.
           swDoSCtrlTable 1.3.6.1.4.1.171.12.59.1.3 no-access
A table that holds the DoS prevention settings of the device.
               swDoSCtrlEntry 1.3.6.1.4.1.171.12.59.1.3.1 no-access
A list of DoS prevention settings of the device.
                   swDoSCtrlType 1.3.6.1.4.1.171.12.59.1.3.1.1 integer read-only
This object indicates the DoS prevention type. Enumeration: 'smurf-attack': 3, 'tcpudp-port-zero': 21, 'icmp-unreachable-attack': 13, 'blat-attack': 2, 'arp-mac-sa-mismatch': 10, 'tcp-syn-with-data': 19, 'tcp-syn-srcport-less-1024': 7, 'tcp-xmascan': 5, 'ip-source-route-attack': 15, 'tcp-over-mac-mcbc': 18, 'ip-route-record-attac': 14, 'tcp-synfin': 6, 'ping-death-attack': 16, 'winnuke-attack': 23, 'tcp-tiny-frag-attack': 20, 'tracert-attack': 22, 'land-attack': 1, 'icmp-redirect-attack': 12, 'tcp-flag-synrst': 17, 'tcp-null-scan': 4, 'fraggle-attack': 11.
                   swDoSCtrlState 1.3.6.1.4.1.171.12.59.1.3.1.2 integer read-write
This object indicates the status of the DoS prevention type. Enumeration: 'enable': 1, 'disable': 2.
                   swDoSCtrlActionType 1.3.6.1.4.1.171.12.59.1.3.1.3 integer read-write
This object indicates the action for the DoS prevention type. If this object is set to 'mirror' and swDoSCtrlState is set to 'enable', the configuration will not take effect until a valid mirror port is specified. If mirror port is not valid the behavior will be the same as 'drop' Enumeration: 'drop': 1, 'mirror': 2.
                   swDoSCtrlMirrorPort 1.3.6.1.4.1.171.12.59.1.3.1.4 integer read-write
This object indicates the port to which the attack packet will be forwarded. A value of 0 means that the DoS prevention action type is either not set to 'mirror'. or the 'mirror' DoS action is not active. When swDoSCtrlActionType is set to 'mirror' with swDoSCtrlState set to 'enable', setting this value to a valid port number will activate the 'mirror' DoS action.
                   swDoSCtrlMirrorPriority 1.3.6.1.4.1.171.12.59.1.3.1.5 integer read-write
This object configures the priority of the detected packet. Valid priority values are from 0 to 7. The value 8 indicates that there will be no change in the priority of the DoS attack packet as it is forwarded to the mirror port. A valid mirror port must first be specified in order to set this value.
                   swDoSCtrlMirrorRxRate 1.3.6.1.4.1.171.12.59.1.3.1.6 integer read-write
This object indicates the rate of reception of DoS attack packets. The valid values are 64 to 1024000. A value of 0 indicates that the rate has no limit. The default value is 0. A valid mirror port must first be specified in order to set this value.
                   swDoSCtrlFrameCount 1.3.6.1.4.1.171.12.59.1.3.1.7 integer read-only
This object indicates the number of frames detected under the DoS prevention type. A valid mirror port must first be specified in order to set this value.
           swDoSTrapState 1.3.6.1.4.1.171.12.59.1.4 integer read-write
This object indicates the status of the DoS prevention trap. Enumeration: 'disabled': 2, 'enabled': 1.
           swDoSLogState 1.3.6.1.4.1.171.12.59.1.5 integer read-write
This object indicates the status of the DoS prevention log. Enumeration: 'disabled': 2, 'enabled': 1.
           swDoSFunctionVersion 1.3.6.1.4.1.171.12.59.1.6 displaystring read-only
This object indicates the function version.
       swDoSNotify 1.3.6.1.4.1.171.12.59.4
           swDoSNotifyPrefix 1.3.6.1.4.1.171.12.59.4.0
               swDoSAttackDetected 1.3.6.1.4.1.171.12.59.4.0.1
This trap is sent when the specific DoS packet is received and trap is enabled.
           swDoSNotifyVarBindings 1.3.6.1.4.1.171.12.59.4.1
               swDoSNotifyVarIpAddr 1.3.6.1.4.1.171.12.59.4.1.1 ipaddress no-access
If the DoS packet is from the end station, represent the IP address of attacker; otherwise represent the router's IP
               swDoSNotifyVarPortNumber 1.3.6.1.4.1.171.12.59.4.1.2 displaystring no-access
This object indicates the attacked portNum with a string, For example, if the device is in standalone mode, and the port number is 23, the string should be 23. If the device is in stack mode, and the unit ID is 2, and the port number is 3, the string should be 2:3.