NETSCREEN-TRAP-MIB: View SNMP OID List / Download MIB
VENDOR: NETSCREEN TECHNOLOGIES
Home | MIB: NETSCREEN-TRAP-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
netscreenTrapHw | 1.3.6.1.4.1.3224.0.100 |
This trap indicates that some kind of hardware problem has occured. |
||
netscreenTrapFw | 1.3.6.1.4.1.3224.0.200 |
This trap indicates that some kind of firewall functions has been triggered. |
||
netscreenTrapSw | 1.3.6.1.4.1.3224.0.300 |
This trap indicates that some kind of software problem has occured. |
||
netscreenTrapTrf | 1.3.6.1.4.1.3224.0.400 |
This trap indicates that some kind of traffic conditions has been triggered. |
||
netscreenTrapVpn | 1.3.6.1.4.1.3224.0.500 |
This trap indicates that VPN tunnel status has occured. |
||
netscreenTrapNsrp | 1.3.6.1.4.1.3224.0.600 |
This trap indicates that NSRP status has occured. |
||
netscreenTrapGPRO | 1.3.6.1.4.1.3224.0.700 |
This trap indicates that some kind of Global PRO problems has occurred. |
||
netscreenTrapDrp | 1.3.6.1.4.1.3224.0.800 |
This trap indicates that Drp status has occured. |
||
netscreenTrapIFFailover | 1.3.6.1.4.1.3224.0.900 |
This trap indicates that interface fail over status has occured. |
||
netscreenTrapIDPAttack | 1.3.6.1.4.1.3224.0.1000 |
This trap indicates that IDP attack status has occured. |
||
netscreenTrapMibModule | 1.3.6.1.4.1.3224.2.0 |
Added new traps introduced in 6.3, which includes 3, 35, 39, 52, 53, 54, 66, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 94, 105, 110, 111, 112, 113, 114, 200, 201, 202, 203, 204, 226, 227, 228, 229, 230, 231, 426, 427, 442, 443, 554, 600, 601, 602, 701, 702, 703, 704, 804, 805, 806, 850 |
||
netscreenTrapType | 1.3.6.1.4.1.3224.2.1 | integer | no-access |
The integer value of the raised alarm type. Note that the type should be interpreted within a specific trap Enumeration: 'vpn-ikedos-attack': 113, 'vpn-ike': 26, 'sccp-alarm': 83, 'nsrp-vsd-req-hearbeat-2nd': 76, 'ids-ping-death': 409, 'winnuke': 4, 'tcp-sweep': 442, 'vpn-l2tp-tunnel-remove': 43, 'route-ospf-hello-flood': 202, 'ospf-nbrstatechange': 211, 'allocated-session-threshold': 51, 'isdn-alarm': 90, 'nsrp-trackip-failover': 64, 'ripng-flood': 227, 'route-ripng-update-flood': 228, 'bgp-alarm': 226, 'ospf-ifrxbadpacket': 217, 'spim-alarm': 602, 'session-threshold': 33, 'nsrp-rto-duplicated': 78, 'ospf-originatelsa': 221, 'ids-block-zip': 431, 'ids-port-scan': 404, 'rxbd-low-alarm': 39, 'ospf-flood': 206, 'mem-alloc-fail': 81, 'bad-ip-option': 415, 'vpn-ias-under-threshold': 49, 'attact-malicious-url': 32, 'vpn-ias-over-threshold': 48, 'traffic-min': 2, 'flow-sess-cache': 806, 'tcp-without-flag': 413, 'syn-frag-attack': 412, 'ids-ip-block-frag': 440, 'tcp-fin-no-ack': 438, 'ids-ip-spoofing': 408, 'rip-flood': 207, 'nsrp-trackip-success': 62, 'vpn-l2tp-call-remove-err': 46, 'cpu-limit-f2s-auto': 804, 'route-alarm': 205, 'nsrp-rto-up': 60, 'icmp-flood': 11, 'ssh-alarm': 34, 'ppp-no-ip-in-pool': 96, 'vpn-ias-too-many': 47, 'nsrp-vsd-pbackup': 72, 'dot1x-alarm': 105, 'tcp-sess-mal-num': 427, 'mcore-alarm': 601, 'av-csp-alarm': 52, 'mlfr-alarm': 85, 'ospf-virtifstatechange': 210, 'port-scan': 16, 'ospf-virtiftxretransmit': 220, 'nsrp-vsd-master': 71, 'sec-potential-voilation': 805, 'apppry-alarm': 54, 'pbr-alarm': 229, 'dhcp': 29, 'sme': 28, 'lb-srv-down': 23, 'vpn-l2tp-call-remove': 45, 'ids-block-activex': 434, 'route-rip-update-flood': 204, 'ids-icmp-ping-id-zero': 441, 'vpn-ikeid-enum-attack': 111, 'trackip-status': 66, 'mgcp-reinit': 84, 'ids-icmp-flood': 401, 'tcp-mal-url': 426, 'di-heap-create-fail': 80, 'ospf-maxagelsa': 222, 'ip-conflict': 31, 'ospf-virtnbrstatechange': 212, 'interface-backup': 91, 'vpn-ias-ike-error': 50, 'ospf-ifstatechange': 225, 'audit-storage': 35, 'ids-block-jar': 432, 'ospf-lsdboverflow': 223, 'admin': 27, 'url-block-srv': 14, 'ping-death': 7, 'sm-down': 701, 'ospf-txretransmit': 219, 'nsrp-trackip-failed': 63, 'cpu-limit-s2f-forced': 800, 'vpn-tunnel-down': 41, 'nsrp-vsd-init': 70, 'illegal-cms-svr': 13, 'ospfv3-alarm': 231, 'vpn-replay-attack': 42, 'ids-component': 400, 'ip-addr-event': 101, 'interface-failure': 94, 'ospf-ifauthfailure': 215, 'route-sys-entry-ex': 200, 'cpu-usage-high': 30, 'syn-attack': 5, 'low-memory': 20, 'generic-HW-fail': 22, 'cpu-limit-f2s-forced': 802, 'ospf-virtifrxbadpacket': 218, 'tear-drop': 6, 'route-vr-entry-ex': 201, 'cisco-hdlc-alarm': 87, 'log-full': 24, 'cpu-limit-f2s-timeout': 803, 'dns-srv-down': 21, 'ids-addr-sweep': 405, 'vpn-ias-radius-error': 110, 'ids-ip-source-route': 410, 'ids-land': 411, 'vpn-softlimit-reached': 112, 'av-scan-mgr': 554, 'ospf-lsdbapproachingoverflow': 224, 'bgp-established': 208, 'ids-block-exe': 433, 'ids-udp-flood': 402, 'ids-syn': 407, 'tcp-syn-fin': 437, 'fr-alarm': 86, 'nsrp-rto-down': 61, 'vrrp-status-alarm': 82, 'nsrp-inconsistent-configuration': 65, 'cpu-limit-s2f-auto': 801, 'nsrp-vsd-ineligible': 74, 'dip-util-raise': 102, 'ppp-no-ip-cfg': 95, 'nsrp-vsd-backup': 73, 'ids-winnuke': 403, 'sm-overload': 703, 'ids-tear-drop': 406, 'udp-sweep': 443, 'vpn-tunnel-up': 40, 'route-ospf-lsa-flood': 203, 'vpn-acvpn-profile-error': 114, 'ospf-virtifconfigerror': 214, 'ospf-ifconfigerror': 213, 'dst-ip-session-limit': 430, 'high-availability': 15, 'ip-src-route': 9, 'traffic-sec': 1, 'nhrp-alarm': 230, 'vsys-session-limit': 850, 'sm-packet-drop': 702, 'h323-alarm': 89, 'ospf-virtifauthfailure': 216, 'icmp-fragment': 435, 'vpn-l2tp-tunnel-remove-err': 44, 'bgp-backwardtransition': 209, 'too-large-icmp': 436, 'x509': 25, 'usb-device-operation': 93, 'sm-cpu-unresponsive': 704, 'av-alarm': 53, 'ids-tcp-syn-ack-ack': 439, 'udp-flood': 12, 'nsrp-vsd-inoperable': 75, 'pppow-alarm': 88, 'dip-util-clear': 103, 'ip-dup-master': 79, 'land': 10, 'nsrp-vsd-reply-2nd': 77, 'unknow-ip-packet': 414, 'addr-sweep': 17, 'wan-card-function': 92, 'ip-spoofing': 8. |
netscreenTrapDesc | 1.3.6.1.4.1.3224.2.3 | displaystring | no-access |
The textual description of the alarm |