NETSCREEN-POLICY-MIB: View SNMP OID List / Download MIB
VENDOR: NETSCREEN TECHNOLOGIES
Home | MIB: NETSCREEN-POLICY-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
netscreenPolicyMibModule | 1.3.6.1.4.1.3224.10.0 |
This module defines NetScreen private MIBs for Policy Monitoring |
||
nsPlyTable | 1.3.6.1.4.1.3224.10.1 | no-access |
A firewall provides a network boundary with a single point of entry and exit-a choke point.You can screen and direct all that traffic through the implementation of a set of access policies. Access policies allow you to permit, deny, encrypt, authenticate, prioritize, schedule, and monitor the traffic attemption to cross your firewall. This table collects all the policy configuration information existing in NetScreen Device. |
|
1.3.6.1.4.1.3224.10.1.1 | no-access |
Each entry in the nsPlyTable holds a set of configuration parameters associatied with an instance of policy. |
||
nsPlyId | 1.3.6.1.4.1.3224.10.1.1.1 | integer32 | read-only |
Each policy is identified by a unique policy ID. |
nsPlyVsys | 1.3.6.1.4.1.3224.10.1.1.2 | integer32 | read-only |
Vitural system's name this polic entry belongs to. |
nsPlySrcZone | 1.3.6.1.4.1.3224.10.1.1.3 | displaystring | read-only |
Traffic through a firewall means that traffic flows from one security zone to another. This object describes the source zone name traffic flow passes. |
nsPlyDstZone | 1.3.6.1.4.1.3224.10.1.1.4 | displaystring | read-only |
Traffic through a firewall means that traffic flows from one security zone to another. This object describes the destination zone name traffic flow passes. |
nsPlySrcAddr | 1.3.6.1.4.1.3224.10.1.1.5 | displaystring | read-only |
Addresses are objects that identify network devices such as hosts and networks by their location in relation to the firwall on which security zone.To create an access policy for specific addresses, you must first create entries for the relevant hosts and networks in the address book.Source IP address indicates the address in source zone, 0.0.0.0 means any address. |
nsPlyDstAddr | 1.3.6.1.4.1.3224.10.1.1.6 | displaystring | read-only |
Addresses are objects that identify network devices such as hosts and networks by their location in relation to the firwall-on which security zone.To create an access policy for specific addresses, you must first create entries for the relevant hosts and networks in the address book.Source IP address indicates the address in destination zone, 0.0.0.0 means any address. |
nsPlyService | 1.3.6.1.4.1.3224.10.1.1.7 | integer | read-only |
Sevices are objects that identify application protocols using layer 4 information such as standard and accepted TCP and UDP port numbers for application services like Telnet, FTP, SMTP and HTTP. This object indicates all the traffic service type this policy allows. 'Any' means all this policy allows all service go through. 'Other' could be a configured service or not in the list. See nsPlyServiceName for service name. Enumeration: 'ns-global-pro': 26, 'tcp-any': 40, 'ping': 30, 'gopher': 9, 'h323': 10, 'syslog': 38, 'ftp-get': 7, 'traceroute': 43, 'any': 0, 'dpcp-relay': 3, 'ftp': 6, 'uucp': 45, 'snmp': 36, 'internet-locator-service': 17, 'imap': 16, 'other': 50, 'finger': 5, 'https': 12, 'ldap': 20, 'mail': 21, 'irc': 18, 'nntp': 24, 'real-media': 33, 'http': 11, 'l2tp': 19, 'ns-global': 25, 'ftp-put': 8, 'pptp': 32, 'ntp': 27, 'aol': 1, 'telnet': 41, 'winframe': 48, 'pop3': 31, 'pc-anywhere': 29, 'rip': 34, 'ike': 15, 'wais': 47, 'icmp-info': 13, 'icmp-timestamp': 14, 'dns': 4, 'x-windows': 49, 'rlogin': 35, 'vdo-live': 46, 'bgp': 2, 'udp-any': 44, 'nfs': 23, 'talk': 39, 'tftp': 42, 'ospf': 28, 'netmeeting': 22, 'ssh': 37. |
nsPlyAction | 1.3.6.1.4.1.3224.10.1.1.8 | integer | read-only |
Actions objects that describe what the firewall does to the traffic it receives. Permit allows the packet to pass the firewall. Deny blocks the packet from traversing the firewall. Tunnel encapsulates outgoing IP packets and decapsulates incoming IP packets. Enumeration: 'tunnel': 2, 'deny': 0, 'permit': 1. |
nsPlyNat | 1.3.6.1.4.1.3224.10.1.1.9 | integer | read-only |
You can apply NAT at the interface level or at the policy level. With policy-based NAT, you can translate the source address on either incoming or outging network and VPN traffic. This object indicates if this is a policy-based NAT. Enumeration: 'disable': 0, 'enabled': 1. |
nsPlyFixPort | 1.3.6.1.4.1.3224.10.1.1.10 | integer | read-only |
When in policy-based NAT, the new secure address can come from either a Dynamic IP or from a Mapped IP. This object indicates if poliy-based NAT uses fix port when working on NAT mode. Enumeration: 'yes': 1, 'no': 0. |
nsPlyDipId | 1.3.6.1.4.1.3224.10.1.1.11 | integer32 | read-only |
This object indicates the Dynamic ID chosen for NAT policy. |
nsPlyVpnTunnel | 1.3.6.1.4.1.3224.10.1.1.12 | displaystring | read-only |
VPN tunnel this access policy applies to. |
nsPlyL2tpTunnel | 1.3.6.1.4.1.3224.10.1.1.13 | displaystring | read-only |
L2TP tunnel this access policy applies to. |
nsPlyAuth | 1.3.6.1.4.1.3224.10.1.1.14 | integer | read-only |
This object indicates the selecting this option requires the user at the source address to authenticate his/her identiry by supplying a user name and password before traffic is allowed to graverw the firewall or enter the VPN tunnel. Enumeration: 'disable': 0, 'enabled': 1. |
nsPlyLogEnable | 1.3.6.1.4.1.3224.10.1.1.15 | integer | read-only |
When you enable logging in an access policy, the NetScreen device logs all connections to which that paticular access policy applies. Enumeration: 'disable': 0, 'enabled': 1. |
nsPlyCountEnable | 1.3.6.1.4.1.3224.10.1.1.16 | integer | read-only |
When you enable counting in an access plicy, the NetScreen device counts the total number of bytes of traffic to which this access policy applies and records the informaiton in historical graphs. Enumeration: 'disable': 0, 'enabled': 1. |
nsPlyAlarmBPS | 1.3.6.1.4.1.3224.10.1.1.17 | integer32 | read-only |
User can set a threshold that triggers an alarm when the traffic permitted by the access policy exceeds a specified number of bytes per second. |
nsPlyAlarmBPM | 1.3.6.1.4.1.3224.10.1.1.18 | integer32 | read-only |
User can set a threshold that triggers an alarm when the traffic permitted by the access policy exceeds a specified number of bytes per Minute. |
nsPlySchedule | 1.3.6.1.4.1.3224.10.1.1.19 | displaystring | read-only |
By associating a schedule to an access policy, you can determine when the access policy is in effect. |
nsPlyTrafficShapeEnable | 1.3.6.1.4.1.3224.10.1.1.20 | integer | read-only |
User can set parameters for the control and shaping of traffic for each access policy. Enumeration: 'on': 1, 'off': 0. |
nsPlyTrafficPriority | 1.3.6.1.4.1.3224.10.1.1.21 | integer | read-only |
Traffic priority for this policy. Enumeration: 'priority4th': 3, 'priority3rd': 2, 'priority6th': 5, 'priority5th': 4, 'priority2nd': 1, 'high': 0, 'priorityLow': 7, 'priority7th': 6. |
nsPlyDSEnable | 1.3.6.1.4.1.3224.10.1.1.22 | integer | read-only |
Differentiated Services is a system for tagging traffic at a position within a hierarchy of priority. Enumeration: 'disable': 0, 'enabled': 1. |
nsPlyActiveStatus | 1.3.6.1.4.1.3224.10.1.1.23 | integer | read-only |
Show the status of one policy entry. Enumeration: 'hidden': 2, 'inactive': 0, 'inuse': 1. |
nsPlyName | 1.3.6.1.4.1.3224.10.1.1.24 | displaystring | read-only |
policy name (optional) |
nsPlyServiceName | 1.3.6.1.4.1.3224.10.1.1.25 | displaystring | read-only |
Sevices name that identify application protocols using layer 4 information such as standard and accepted TCP and UDP port numbers for application services like Telnet, FTP, SMTP and HTTP. This object indicates all the traffic service type this policy allows. 'Any' means all this policy allows all service go through. |
nsPlyMonTable | 1.3.6.1.4.1.3224.10.2 | no-access |
traffic information for the policy-based traffic. |
|
1.3.6.1.4.1.3224.10.2.1 | no-access |
An entry holds a set of traffic counters of a specific policy. |
||
nsPlyMonId | 1.3.6.1.4.1.3224.10.2.1.1 | integer32 | read-only |
Policy Id, also used as index in this table |
nsPlyMonVsys | 1.3.6.1.4.1.3224.10.2.1.2 | integer32 | read-only |
vsys this policy belongs to |
nsPlyMonPackPerSec | 1.3.6.1.4.1.3224.10.2.1.3 | integer32 | read-only |
Packets go through this policy per second |
nsPlyMonPackPerMin | 1.3.6.1.4.1.3224.10.2.1.4 | integer32 | read-only |
Packets go through this policy per minute |
nsPlyMonTotalPacket | 1.3.6.1.4.1.3224.10.2.1.5 | counter32 | read-only |
total packets go through this policy |
nsPlyMonBytePerSec | 1.3.6.1.4.1.3224.10.2.1.6 | integer32 | read-only |
Bytes go through this policy per second |
nsPlyMonBytePerMin | 1.3.6.1.4.1.3224.10.2.1.7 | integer32 | read-only |
Bytes go through this policy per minute |
nsPlyMonTotalByte | 1.3.6.1.4.1.3224.10.2.1.8 | counter32 | read-only |
Total bytes go through this policy |
nsPlyMonSessionPerSec | 1.3.6.1.4.1.3224.10.2.1.9 | integer32 | read-only |
Sessions go through this policy per second |
nsPlyMonSessionPerMin | 1.3.6.1.4.1.3224.10.2.1.10 | integer32 | read-only |
Sessions go through this policy per minute |
nsPlyMonTotalSession | 1.3.6.1.4.1.3224.10.2.1.11 | counter32 | read-only |
Total Sessions go through this policy |