TELDAT-TRAP-TCP-MIB: View SNMP OID List / Download MIB
VENDOR: TELDAT, S.A.
Home | MIB: TELDAT-TRAP-TCP-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
tcpTrapsMIB | 1.3.6.1.4.1.2007.1.4.12 |
This Module Information Base file is defined for managing received SNMP notifications generated by the TCP event subsystem. |
||
tcpEventsGroup | 1.3.6.1.4.1.2007.1.4.12.1 | |||
tcpEventObjects1 | 1.3.6.1.4.1.2007.1.4.12.1.1 |
Event TCP.1 Checksum failed because received packet checksum is not equal to the calculated checksum. |
||
tcp1_tcp_checksum | 1.3.6.1.4.1.2007.1.4.12.1.1.1 | integer32 | no-access |
Parameter 'tcp_checksum' in event TCP.1 |
tcpEventObjects2 | 1.3.6.1.4.1.2007.1.4.12.1.2 |
Event TCP.2 TCP has received a packet with an invalid tcp port number. |
||
tcp2_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.2.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.2 |
tcp2_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.2.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.2 |
tcp2_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.2.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.2 |
tcp2_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.2.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.2 |
tcpEventObjects3 | 1.3.6.1.4.1.2007.1.4.12.1.3 |
Event TCP.3 Active open was successful and we are notifying application of the open. |
||
tcp3_local_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.3.1 | ipaddress | no-access |
Parameter 'local_ip_address' in event TCP.3 |
tcp3_local_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.3.2 | integer32 | no-access |
Parameter 'local_tcp_port' in event TCP.3 |
tcp3_remote_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.3.3 | ipaddress | no-access |
Parameter 'remote_ip_address' in event TCP.3 |
tcp3_remote_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.3.4 | integer32 | no-access |
Parameter 'remote_tcp_port' in event TCP.3 |
tcpEventObjects4 | 1.3.6.1.4.1.2007.1.4.12.1.4 |
Event TCP.4 TCP has received an illegal SYN packet, so kill the connection. |
||
tcp4_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.4.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.4 |
tcp4_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.4.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.4 |
tcp4_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.4.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.4 |
tcp4_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.4.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.4 |
tcpEventObjects5 | 1.3.6.1.4.1.2007.1.4.12.1.5 |
Event TCP.5 Debug string. |
||
tcp5_debug_string | 1.3.6.1.4.1.2007.1.4.12.1.5.1 | displaystring | no-access |
Parameter 'debug_string' in event TCP.5 |
tcpEventObjects6 | 1.3.6.1.4.1.2007.1.4.12.1.6 |
Event TCP.6 TCP has received an invalid packet when MD5 authentication is active, so drop packet. |
||
tcp6_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.6.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.6 |
tcp6_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.6.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.6 |
tcp6_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.6.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.6 |
tcp6_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.6.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.6 |
tcp6_reason | 1.3.6.1.4.1.2007.1.4.12.1.6.5 | displaystring | no-access |
Parameter 'reason' in event TCP.6 |
tcpEventObjects7 | 1.3.6.1.4.1.2007.1.4.12.1.7 |
Event TCP.7 TCP has rejected a segment. Reject codes are as follows: Reject codes: 1 - Seg len = 0, Rcv win > 0, seqnum < tcb_ack or seqnum >= winend 2 - Seg len = 0, Rcv win = 0, seqnum != tcb_ack 3 - Seg len > 0, Rcv win > 0, inend < tcb_ack or seqnum >= winend 4 - Seg len > 0, Rcv win = 0. Note: we only ACK if the segment received was a non RST segment. |
||
tcp7_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.7.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.7 |
tcp7_source_port | 1.3.6.1.4.1.2007.1.4.12.1.7.2 | integer32 | no-access |
Parameter 'source_port' in event TCP.7 |
tcp7_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.7.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.7 |
tcp7_destination_port | 1.3.6.1.4.1.2007.1.4.12.1.7.4 | integer32 | no-access |
Parameter 'destination_port' in event TCP.7 |
tcp7_reject_code | 1.3.6.1.4.1.2007.1.4.12.1.7.5 | integer32 | no-access |
Parameter 'reject_code' in event TCP.7 |
tcpEventObjects8 | 1.3.6.1.4.1.2007.1.4.12.1.8 |
Event TCP.8 TCP has received an old segment that has already been consumed by the application, so send ACK in response. |
||
tcp8_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.8.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.8 |
tcp8_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.8.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.8 |
tcp8_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.8.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.8 |
tcp8_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.8.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.8 |
tcp8_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.8.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.8 |
tcpEventObjects9 | 1.3.6.1.4.1.2007.1.4.12.1.9 |
Event TCP.9 TCP has received a RST while in LISTEN state; just ignore packet. |
||
tcp9_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.9.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.9 |
tcp9_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.9.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.9 |
tcp9_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.9.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.9 |
tcp9_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.9.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.9 |
tcp9_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.9.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.9 |
tcpEventObjects10 | 1.3.6.1.4.1.2007.1.4.12.1.10 |
Event TCP.10 TCP has received a RST while in SYN_RECEIVED or SYN_SENT states; drop packet and return to LISTEN state. |
||
tcp10_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.10.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.10 |
tcp10_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.10.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.10 |
tcp10_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.10.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.10 |
tcp10_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.10.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.10 |
tcp10_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.10.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.10 |
tcpEventObjects11 | 1.3.6.1.4.1.2007.1.4.12.1.11 |
Event TCP.11 TCP has received a RST; abort connection. |
||
tcp11_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.11.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.11 |
tcp11_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.11.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.11 |
tcp11_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.11.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.11 |
tcp11_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.11.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.11 |
tcp11_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.11.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.11 |
tcpEventObjects12 | 1.3.6.1.4.1.2007.1.4.12.1.12 |
Event TCP.12 TCP has stopped processing the packet because there is no ACK present in the packet. |
||
tcp12_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.12.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.12 |
tcp12_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.12.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.12 |
tcp12_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.12.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.12 |
tcp12_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.12.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.12 |
tcp12_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.12.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.12 |
tcpEventObjects13 | 1.3.6.1.4.1.2007.1.4.12.1.13 |
Event TCP.13 Stop processing the segment because it contains acknowledgement for data not yet sent. |
||
tcp13_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.13.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.13 |
tcp13_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.13.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.13 |
tcp13_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.13.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.13 |
tcp13_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.13.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.13 |
tcp13_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.13.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.13 |
tcp13_ack_num | 1.3.6.1.4.1.2007.1.4.12.1.13.6 | integer32 | no-access |
Parameter 'ack_num' in event TCP.13 |
tcpEventObjects14 | 1.3.6.1.4.1.2007.1.4.12.1.14 |
Event TCP.14 TCP has received a FIN while in ESTABLISHED state; when all data has been received, send FIN|ACK. |
||
tcp14_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.14.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.14 |
tcp14_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.14.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.14 |
tcp14_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.14.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.14 |
tcp14_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.14.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.14 |
tcp14_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.14.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.14 |
tcpEventObjects15 | 1.3.6.1.4.1.2007.1.4.12.1.15 |
Event TCP.15 TCP has received a segment with PSH bit set. |
||
tcp15_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.15.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.15 |
tcp15_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.15.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.15 |
tcp15_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.15.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.15 |
tcp15_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.15.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.15 |
tcp15_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.15.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.15 |
tcpEventObjects16 | 1.3.6.1.4.1.2007.1.4.12.1.16 |
Event TCP.16 TCP has received a valid segment while in SYNRCVD state; enter ESTABLISHED state and notify application of the open. |
||
tcp16_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.16.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.16 |
tcp16_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.16.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.16 |
tcp16_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.16.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.16 |
tcp16_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.16.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.16 |
tcp16_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.16.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.16 |
tcpEventObjects17 | 1.3.6.1.4.1.2007.1.4.12.1.17 |
Event TCP.17 TCP has received a FIN while in the LISTEN state, so we send RST to the other side. |
||
tcp17_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.17.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.17 |
tcp17_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.17.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.17 |
tcp17_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.17.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.17 |
tcp17_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.17.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.17 |
tcp17_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.17.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.17 |
tcpEventObjects18 | 1.3.6.1.4.1.2007.1.4.12.1.18 |
Event TCP.18 TCP has received an out of order packet; this creates a hole in the receive buffer. |
||
tcp18_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.18.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.18 |
tcp18_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.18.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.18 |
tcp18_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.18.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.18 |
tcp18_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.18.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.18 |
tcp18_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.18.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.18 |
tcpEventObjects19 | 1.3.6.1.4.1.2007.1.4.12.1.19 |
Event TCP.19 TCP has received an out of order packet; this creates a hole in the receive buffer. |
||
tcp19_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.19.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.19 |
tcp19_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.19.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.19 |
tcp19_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.19.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.19 |
tcp19_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.19.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.19 |
tcp19_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.19.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.19 |
tcpEventObjects20 | 1.3.6.1.4.1.2007.1.4.12.1.20 |
Event TCP.20 TCP has received a packet that partially fills the beginning of a hole. |
||
tcp20_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.20.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.20 |
tcp20_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.20.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.20 |
tcp20_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.20.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.20 |
tcp20_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.20.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.20 |
tcp20_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.20.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.20 |
tcpEventObjects21 | 1.3.6.1.4.1.2007.1.4.12.1.21 |
Event TCP.21 TCP has received a packet that partially fills the end of a hole. |
||
tcp21_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.21.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.21 |
tcp21_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.21.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.21 |
tcp21_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.21.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.21 |
tcp21_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.21.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.21 |
tcp21_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.21.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.21 |
tcpEventObjects22 | 1.3.6.1.4.1.2007.1.4.12.1.22 |
Event TCP.22 TCP has received a packet that completely fills a hole. |
||
tcp22_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.22.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.22 |
tcp22_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.22.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.22 |
tcp22_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.22.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.22 |
tcp22_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.22.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.22 |
tcp22_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.22.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.22 |
tcpEventObjects23 | 1.3.6.1.4.1.2007.1.4.12.1.23 |
Event TCP.23 TCP has received a packet that is too big to fit into the remaining space in the receive buffer. |
||
tcp23_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.23.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.23 |
tcp23_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.23.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.23 |
tcp23_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.23.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.23 |
tcp23_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.23.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.23 |
tcp23_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.23.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.23 |
tcpEventObjects24 | 1.3.6.1.4.1.2007.1.4.12.1.24 |
Event TCP.24 TCP processing FIN while not in SYNRCVD|ESTAB state. |
||
tcp24_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.24.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.24 |
tcp24_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.24.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.24 |
tcp24_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.24.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.24 |
tcp24_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.24.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.24 |
tcp24_state | 1.3.6.1.4.1.2007.1.4.12.1.24.5 | integer32 | no-access |
Parameter 'state' in event TCP.24 |
tcpEventObjects25 | 1.3.6.1.4.1.2007.1.4.12.1.25 |
Event TCP.25 TCP processing FIN while in SYNRCVD|ESTAB state. |
||
tcp25_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.25.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.25 |
tcp25_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.25.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.25 |
tcp25_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.25.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.25 |
tcp25_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.25.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.25 |
tcpEventObjects26 | 1.3.6.1.4.1.2007.1.4.12.1.26 |
Event TCP.26 Application posts a read specifying a timeout value. If not all the requested data has been received within a timeout period, a timer fires, and whatever is in the receive buffer is given to the application. |
||
tcp26_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.26.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.26 |
tcp26_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.26.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.26 |
tcp26_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.26.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.26 |
tcp26_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.26.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.26 |
tcpEventObjects27 | 1.3.6.1.4.1.2007.1.4.12.1.27 |
Event TCP.27 The other side has been deaf and mute, and the the foreign window seems to have been closed illegally; send a RST. |
||
tcp27_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.27.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.27 |
tcp27_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.27.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.27 |
tcp27_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.27.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.27 |
tcp27_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.27.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.27 |
tcpEventObjects28 | 1.3.6.1.4.1.2007.1.4.12.1.28 |
Event TCP.28 State of the connection has transitioned to SYN-RECEIVED state as a result of either an active open or a passive open. |
||
tcp28_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.28.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.28 |
tcp28_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.28.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.28 |
tcp28_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.28.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.28 |
tcp28_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.28.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.28 |
tcpEventObjects29 | 1.3.6.1.4.1.2007.1.4.12.1.29 |
Event TCP.29 State of the connection has transitioned to ESTABLISHED state as a result of either an active open or a passive open. |
||
tcp29_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.29.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.29 |
tcp29_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.29.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.29 |
tcp29_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.29.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.29 |
tcp29_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.29.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.29 |
tcpEventObjects30 | 1.3.6.1.4.1.2007.1.4.12.1.30 |
Event TCP.30 TCP has received a packet. |
||
tcp30_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.30.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.30 |
tcp30_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.30.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.30 |
tcp30_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.30.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.30 |
tcp30_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.30.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.30 |
tcp30_flags | 1.3.6.1.4.1.2007.1.4.12.1.30.5 | displaystring | no-access |
Parameter 'flags' in event TCP.30 |
tcp30_sequence | 1.3.6.1.4.1.2007.1.4.12.1.30.6 | integer32 | no-access |
Parameter 'sequence' in event TCP.30 |
tcp30_acknowledge | 1.3.6.1.4.1.2007.1.4.12.1.30.7 | integer32 | no-access |
Parameter 'acknowledge' in event TCP.30 |
tcp30_window | 1.3.6.1.4.1.2007.1.4.12.1.30.8 | integer32 | no-access |
Parameter 'window' in event TCP.30 |
tcp30_length | 1.3.6.1.4.1.2007.1.4.12.1.30.9 | integer32 | no-access |
Parameter 'length' in event TCP.30 |
tcpEventObjects31 | 1.3.6.1.4.1.2007.1.4.12.1.31 |
Event TCP.31 Valid data in receive buffer has been handed to the application for further processing. |
||
tcp31_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.31.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.31 |
tcp31_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.31.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.31 |
tcp31_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.31.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.31 |
tcp31_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.31.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.31 |
tcp31_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.31.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.31 |
tcp31_length | 1.3.6.1.4.1.2007.1.4.12.1.31.6 | integer32 | no-access |
Parameter 'length' in event TCP.31 |
tcpEventObjects32 | 1.3.6.1.4.1.2007.1.4.12.1.32 |
Event TCP.32 We have retransmitted a frame an excessive number of times. If the application has closed the connection already, just abort. Else, notify the application that there is a problem. |
||
tcp32_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.32.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.32 |
tcp32_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.32.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.32 |
tcp32_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.32.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.32 |
tcp32_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.32.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.32 |
tcpEventObjects33 | 1.3.6.1.4.1.2007.1.4.12.1.33 |
Event TCP.33 Send a control segment to either ack a segment or send special control segments like FIN or RST. |
||
tcp33_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.33.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.33 |
tcp33_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.33.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.33 |
tcp33_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.33.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.33 |
tcp33_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.33.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.33 |
tcp33_flags | 1.3.6.1.4.1.2007.1.4.12.1.33.5 | displaystring | no-access |
Parameter 'flags' in event TCP.33 |
tcp33_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.33.6 | integer32 | no-access |
Parameter 'seq_num' in event TCP.33 |
tcp33_ack_num | 1.3.6.1.4.1.2007.1.4.12.1.33.7 | integer32 | no-access |
Parameter 'ack_num' in event TCP.33 |
tcp33_window | 1.3.6.1.4.1.2007.1.4.12.1.33.8 | integer32 | no-access |
Parameter 'window' in event TCP.33 |
tcpEventObjects34 | 1.3.6.1.4.1.2007.1.4.12.1.34 |
Event TCP.34 We have failed to receive a valid ACK for transmitted data, so retransmit the data. |
||
tcp34_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.34.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.34 |
tcp34_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.34.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.34 |
tcp34_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.34.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.34 |
tcp34_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.34.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.34 |
tcp34_flags | 1.3.6.1.4.1.2007.1.4.12.1.34.5 | displaystring | no-access |
Parameter 'flags' in event TCP.34 |
tcp34_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.34.6 | integer32 | no-access |
Parameter 'seq_num' in event TCP.34 |
tcp34_ack_num | 1.3.6.1.4.1.2007.1.4.12.1.34.7 | integer32 | no-access |
Parameter 'ack_num' in event TCP.34 |
tcp34_window | 1.3.6.1.4.1.2007.1.4.12.1.34.8 | integer32 | no-access |
Parameter 'window' in event TCP.34 |
tcp34_length | 1.3.6.1.4.1.2007.1.4.12.1.34.9 | integer32 | no-access |
Parameter 'length' in event TCP.34 |
tcpEventObjects35 | 1.3.6.1.4.1.2007.1.4.12.1.35 |
Event TCP.35 Transmit data. |
||
tcp35_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.35.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.35 |
tcp35_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.35.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.35 |
tcp35_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.35.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.35 |
tcp35_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.35.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.35 |
tcp35_flags | 1.3.6.1.4.1.2007.1.4.12.1.35.5 | displaystring | no-access |
Parameter 'flags' in event TCP.35 |
tcp35_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.35.6 | integer32 | no-access |
Parameter 'seq_num' in event TCP.35 |
tcp35_ack_num | 1.3.6.1.4.1.2007.1.4.12.1.35.7 | integer32 | no-access |
Parameter 'ack_num' in event TCP.35 |
tcp35_window | 1.3.6.1.4.1.2007.1.4.12.1.35.8 | integer32 | no-access |
Parameter 'window' in event TCP.35 |
tcp35_length | 1.3.6.1.4.1.2007.1.4.12.1.35.9 | integer32 | no-access |
Parameter 'length' in event TCP.35 |
tcpEventObjects36 | 1.3.6.1.4.1.2007.1.4.12.1.36 |
Event TCP.36 An unsupported option is present in the options field of a SYN packet. |
||
tcp36_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.36.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.36 |
tcp36_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.36.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.36 |
tcp36_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.36.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.36 |
tcp36_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.36.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.36 |
tcp36_option | 1.3.6.1.4.1.2007.1.4.12.1.36.5 | integer32 | no-access |
Parameter 'option' in event TCP.36 |
tcpEventObjects38 | 1.3.6.1.4.1.2007.1.4.12.1.38 |
Event TCP.38 Reject the segment, and send a RST to the other side for receiving a segment with the incorrect acknowledgement while in the SYNRCVD state. Until a correct acknowledgement is received, we cannot progress into the ESTABLISHED state. |
||
tcp38_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.38.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.38 |
tcp38_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.38.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.38 |
tcp38_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.38.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.38 |
tcp38_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.38.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.38 |
tcp38_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.38.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.38 |
tcpEventObjects39 | 1.3.6.1.4.1.2007.1.4.12.1.39 |
Event TCP.39 TCP has received an ACK while in the LISTEN state; this does not make any sense because we have not yet sent any data, so nothing should be ACKed. As a result, we send a RST. |
||
tcp39_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.39.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.39 |
tcp39_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.39.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.39 |
tcp39_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.39.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.39 |
tcp39_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.39.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.39 |
tcp39_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.39.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.39 |
tcpEventObjects40 | 1.3.6.1.4.1.2007.1.4.12.1.40 |
Event TCP.40 TCP is sending a RESET segment to the other side. |
||
tcp40_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.40.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.40 |
tcp40_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.40.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.40 |
tcp40_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.40.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.40 |
tcp40_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.40.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.40 |
tcp40_flags | 1.3.6.1.4.1.2007.1.4.12.1.40.5 | displaystring | no-access |
Parameter 'flags' in event TCP.40 |
tcp40_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.40.6 | integer32 | no-access |
Parameter 'seq_num' in event TCP.40 |
tcp40_ack_num | 1.3.6.1.4.1.2007.1.4.12.1.40.7 | integer32 | no-access |
Parameter 'ack_num' in event TCP.40 |
tcpEventObjects41 | 1.3.6.1.4.1.2007.1.4.12.1.41 |
Event TCP.41 TCP connection is closed - notifying the application. |
||
tcp41_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.41.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.41 |
tcp41_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.41.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.41 |
tcp41_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.41.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.41 |
tcp41_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.41.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.41 |
tcpEventObjects42 | 1.3.6.1.4.1.2007.1.4.12.1.42 |
Event TCP.42 Freeing the TCB block associated with the TCP connection that has closed. |
||
tcp42_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.42.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.42 |
tcp42_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.42.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.42 |
tcp42_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.42.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.42 |
tcp42_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.42.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.42 |
tcpEventObjects43 | 1.3.6.1.4.1.2007.1.4.12.1.43 |
Event TCP.43 TCP has received a segment with data that has already been consumed by the application. |
||
tcp43_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.43.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.43 |
tcp43_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.43.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.43 |
tcp43_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.43.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.43 |
tcp43_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.43.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.43 |
tcp43_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.43.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.43 |
tcpEventObjects44 | 1.3.6.1.4.1.2007.1.4.12.1.44 |
Event TCP.44 Idle timer fires for TCP connection. |
||
tcp44_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.44.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.44 |
tcp44_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.44.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.44 |
tcp44_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.44.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.44 |
tcp44_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.44.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.44 |
tcpEventObjects45 | 1.3.6.1.4.1.2007.1.4.12.1.45 |
Event TCP.45 Retransmit timer fires for TCP connection. |
||
tcp45_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.45.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.45 |
tcp45_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.45.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.45 |
tcp45_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.45.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.45 |
tcp45_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.45.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.45 |
tcpEventObjects46 | 1.3.6.1.4.1.2007.1.4.12.1.46 |
Event TCP.46 State of tcp connection has transitioned from ESTABLISHED to FINWAIT - send FIN, and now waiting for FIN-ACK to arrive. |
||
tcp46_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.46.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.46 |
tcp46_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.46.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.46 |
tcp46_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.46.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.46 |
tcp46_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.46.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.46 |
tcpEventObjects47 | 1.3.6.1.4.1.2007.1.4.12.1.47 |
Event TCP.47 State of tcp connection has transitioned to CLOSED. |
||
tcp47_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.47.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.47 |
tcp47_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.47.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.47 |
tcp47_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.47.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.47 |
tcp47_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.47.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.47 |
tcpEventObjects48 | 1.3.6.1.4.1.2007.1.4.12.1.48 |
Event TCP.48 TCP connection is CLOSING due to application requesting a CLOSE. After the window shrinks to zero, discard any packets received. This is based on the half-duplex TCP close sequence. |
||
tcp48_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.48.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.48 |
tcp48_source_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.48.2 | integer32 | no-access |
Parameter 'source_tcp_port' in event TCP.48 |
tcp48_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.48.3 | ipaddress | no-access |
Parameter 'destination_ip_address' in event TCP.48 |
tcp48_destination_tcp_port | 1.3.6.1.4.1.2007.1.4.12.1.48.4 | integer32 | no-access |
Parameter 'destination_tcp_port' in event TCP.48 |
tcpEventObjects49 | 1.3.6.1.4.1.2007.1.4.12.1.49 |
Event TCP.49 The other side has send an old ACK with zero data length - we treat this as a NACK. |
||
tcp49_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.49.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.49 |
tcp49_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.49.2 | integer32 | no-access |
Parameter 'destination_ip_address' in event TCP.49 |
tcp49_tcp_src_port | 1.3.6.1.4.1.2007.1.4.12.1.49.3 | ipaddress | no-access |
Parameter 'tcp_src_port' in event TCP.49 |
tcp49_tcp_dst_port | 1.3.6.1.4.1.2007.1.4.12.1.49.4 | integer32 | no-access |
Parameter 'tcp_dst_port' in event TCP.49 |
tcpEventObjects50 | 1.3.6.1.4.1.2007.1.4.12.1.50 |
Event TCP.50 The other side has acknowledged the keep alive packet. The keep alive packet is sent if keep alive is enabled on this TCP connection, and the connection has been idle. |
||
tcp50_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.50.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.50 |
tcp50_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.50.2 | integer32 | no-access |
Parameter 'destination_ip_address' in event TCP.50 |
tcp50_tcp_src_port | 1.3.6.1.4.1.2007.1.4.12.1.50.3 | ipaddress | no-access |
Parameter 'tcp_src_port' in event TCP.50 |
tcp50_tcp_dst_port | 1.3.6.1.4.1.2007.1.4.12.1.50.4 | integer32 | no-access |
Parameter 'tcp_dst_port' in event TCP.50 |
tcpEventObjects51 | 1.3.6.1.4.1.2007.1.4.12.1.51 |
Event TCP.51 The local window advertised is zero. The application is not draining the TCP receive buffer fast enough. |
||
tcp51_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.51.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.51 |
tcp51_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.51.2 | integer32 | no-access |
Parameter 'destination_ip_address' in event TCP.51 |
tcp51_tcp_src_port | 1.3.6.1.4.1.2007.1.4.12.1.51.3 | ipaddress | no-access |
Parameter 'tcp_src_port' in event TCP.51 |
tcp51_tcp_dst_port | 1.3.6.1.4.1.2007.1.4.12.1.51.4 | integer32 | no-access |
Parameter 'tcp_dst_port' in event TCP.51 |
tcpEventObjects52 | 1.3.6.1.4.1.2007.1.4.12.1.52 |
Event TCP.52 The TCP connection is closing, and we sent a FIN. |
||
tcp52_source_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.52.1 | ipaddress | no-access |
Parameter 'source_ip_address' in event TCP.52 |
tcp52_destination_ip_address | 1.3.6.1.4.1.2007.1.4.12.1.52.2 | integer32 | no-access |
Parameter 'destination_ip_address' in event TCP.52 |
tcp52_tcp_src_port | 1.3.6.1.4.1.2007.1.4.12.1.52.3 | ipaddress | no-access |
Parameter 'tcp_src_port' in event TCP.52 |
tcp52_tcp_dst_port | 1.3.6.1.4.1.2007.1.4.12.1.52.4 | integer32 | no-access |
Parameter 'tcp_dst_port' in event TCP.52 |
tcp52_seq_num | 1.3.6.1.4.1.2007.1.4.12.1.52.5 | integer32 | no-access |
Parameter 'seq_num' in event TCP.52 |
tcp52_ack_num | 1.3.6.1.4.1.2007.1.4.12.1.52.6 | integer32 | no-access |
Parameter 'ack_num' in event TCP.52 |
tcpEventObjects54 | 1.3.6.1.4.1.2007.1.4.12.1.54 |
Event TCP.54 The transmit buffer size requested for a TCP connection is too large to be allocated by the system. TCP has selected in its place the largest chunk size available in the system. |
||
tcp54_requested_amount | 1.3.6.1.4.1.2007.1.4.12.1.54.1 | integer32 | no-access |
Parameter 'requested_amount' in event TCP.54 |
tcp54_clipped_amount | 1.3.6.1.4.1.2007.1.4.12.1.54.2 | integer32 | no-access |
Parameter 'clipped_amount' in event TCP.54 |
tcpEventObjects55 | 1.3.6.1.4.1.2007.1.4.12.1.55 |
Event TCP.55 The receive buffer size requested for a TCP connection is too large to be allocated by the system. TCP has selected in its place the largest chunk size available in the system. |
||
tcp55_requested_amount | 1.3.6.1.4.1.2007.1.4.12.1.55.1 | integer32 | no-access |
Parameter 'requested_amount' in event TCP.55 |
tcp55_clipped_amount | 1.3.6.1.4.1.2007.1.4.12.1.55.2 | integer32 | no-access |
Parameter 'clipped_amount' in event TCP.55 |
tcpNotifications | 1.3.6.1.4.1.2007.1.4.12.2 | |||
tcpNotificationsPrefix | 1.3.6.1.4.1.2007.1.4.12.2.0 | |||
tcpNotification1 | 1.3.6.1.4.1.2007.1.4.12.2.0.1 |
Notification of Event TCP.1 Message: 'packet checksum failed received packet checksum is $1 and calculated checksum is $2' Parameters list: $1: tcp1_tcp_checksum $2: tcp1_tcp_checksum Checksum failed because received packet checksum is not equal to the calculated checksum. |
||
tcpNotification2 | 1.3.6.1.4.1.2007.1.4.12.2.0.2 |
Notification of Event TCP.2 Message: '$1:$2 -> $3:$4 received packet with no tcp connection' Parameters list: $1: tcp2_source_ip_address $2: tcp2_source_tcp_port $3: tcp2_destination_ip_address $4: tcp2_destination_tcp_port TCP has received a packet with an invalid tcp port number. |
||
tcpNotification3 | 1.3.6.1.4.1.2007.1.4.12.2.0.3 |
Notification of Event TCP.3 Message: '$1:$2 -- $3:$4 TCP active open successful' Parameters list: $1: tcp3_local_ip_address $2: tcp3_local_tcp_port $3: tcp3_remote_ip_address $4: tcp3_remote_tcp_port Active open was successful and we are notifying application of the open. |
||
tcpNotification4 | 1.3.6.1.4.1.2007.1.4.12.2.0.4 |
Notification of Event TCP.4 Message: '$1:$2 -> $3:$4 received invalid SYN packet, kill connection' Parameters list: $1: tcp4_source_ip_address $2: tcp4_source_tcp_port $3: tcp4_destination_ip_address $4: tcp4_destination_tcp_port TCP has received an illegal SYN packet, so kill the connection. |
||
tcpNotification5 | 1.3.6.1.4.1.2007.1.4.12.2.0.5 |
Notification of Event TCP.5 Message: '$1' Parameters list: $1: tcp5_debug_string Debug string. |
||
tcpNotification6 | 1.3.6.1.4.1.2007.1.4.12.2.0.6 |
Notification of Event TCP.6 Message: '$1:$2 -> $3:$4 MD5 authentication failed, reason: $5' Parameters list: $1: tcp6_source_ip_address $2: tcp6_source_tcp_port $3: tcp6_destination_ip_address $4: tcp6_destination_tcp_port $5: tcp6_reason TCP has received an invalid packet when MD5 authentication is active, so drop packet. |
||
tcpNotification7 | 1.3.6.1.4.1.2007.1.4.12.2.0.7 |
Notification of Event TCP.7 Message: '$1:$2 -> $3:$4 dropped segment, reason $5, send a valid ACK in response' Parameters list: $1: tcp7_source_ip_address $2: tcp7_source_port $3: tcp7_destination_ip_address $4: tcp7_destination_port $5: tcp7_reject_code TCP has rejected a segment. Reject codes are as follows: Reject codes: 1 - Seg len = 0, Rcv win > 0, seqnum < tcb_ack or seqnum >= winend 2 - Seg len = 0, Rcv win = 0, seqnum != tcb_ack 3 - Seg len > 0, Rcv win > 0, inend < tcb_ack or seqnum >= winend 4 - Seg len > 0, Rcv win = 0. Note: we only ACK if the segment received was a non RST segment. |
||
tcpNotification8 | 1.3.6.1.4.1.2007.1.4.12.2.0.8 |
Notification of Event TCP.8 Message: '$1:$2 -> $3:$4 received old duplicate packet, sequence number $5, send ACK in response' Parameters list: $1: tcp8_source_ip_address $2: tcp8_source_tcp_port $3: tcp8_destination_ip_address $4: tcp8_destination_tcp_port $5: tcp8_seq_num TCP has received an old segment that has already been consumed by the application, so send ACK in response. |
||
tcpNotification9 | 1.3.6.1.4.1.2007.1.4.12.2.0.9 |
Notification of Event TCP.9 Message: '$1:$2 -> $3:$4 received RST, sequence number $5; LISTEN state, drop segment' Parameters list: $1: tcp9_source_ip_address $2: tcp9_source_tcp_port $3: tcp9_destination_ip_address $4: tcp9_destination_tcp_port $5: tcp9_seq_num TCP has received a RST while in LISTEN state; just ignore packet. |
||
tcpNotification10 | 1.3.6.1.4.1.2007.1.4.12.2.0.10 |
Notification of Event TCP.10 Message: '$1:$2 -> $3:$4 received RST, sequence number $5; SYN_RECEIVED or SYN_SENT states, drop segment and return to LISTEN state' Parameters list: $1: tcp10_source_ip_address $2: tcp10_source_tcp_port $3: tcp10_destination_ip_address $4: tcp10_destination_tcp_port $5: tcp10_seq_num TCP has received a RST while in SYN_RECEIVED or SYN_SENT states; drop packet and return to LISTEN state. |
||
tcpNotification11 | 1.3.6.1.4.1.2007.1.4.12.2.0.11 |
Notification of Event TCP.11 Message: '$1:$2 -> $3:$4 received RST, sequence number $5; drop segment and abort connection' Parameters list: $1: tcp11_source_ip_address $2: tcp11_source_tcp_port $3: tcp11_destination_ip_address $4: tcp11_destination_tcp_port $5: tcp11_seq_num TCP has received a RST; abort connection. |
||
tcpNotification12 | 1.3.6.1.4.1.2007.1.4.12.2.0.12 |
Notification of Event TCP.12 Message: '$1:$2 -> $3:$4 drop segment, sequence number $5; NO ACK is present' Parameters list: $1: tcp12_source_ip_address $2: tcp12_source_tcp_port $3: tcp12_destination_ip_address $4: tcp12_destination_tcp_port $5: tcp12_seq_num TCP has stopped processing the packet because there is no ACK present in the packet. |
||
tcpNotification13 | 1.3.6.1.4.1.2007.1.4.12.2.0.13 |
Notification of Event TCP.13 Message: '$1:$2 -> $3:$4 drop segment, sequence number $5, acknowledge number $6, received invalid ACK' Parameters list: $1: tcp13_source_ip_address $2: tcp13_source_tcp_port $3: tcp13_destination_ip_address $4: tcp13_destination_tcp_port $5: tcp13_seq_num $6: tcp13_ack_num Stop processing the segment because it contains acknowledgement for data not yet sent. |
||
tcpNotification14 | 1.3.6.1.4.1.2007.1.4.12.2.0.14 |
Notification of Event TCP.14 Message: '$1:$2 -> $3:$4 received FIN, sequence number $5; ESTABLISHED state,' Parameters list: $1: tcp14_source_ip_address $2: tcp14_source_tcp_port $3: tcp14_destination_ip_address $4: tcp14_destination_tcp_port $5: tcp14_seq_num TCP has received a FIN while in ESTABLISHED state; when all data has been received, send FIN|ACK. |
||
tcpNotification15 | 1.3.6.1.4.1.2007.1.4.12.2.0.15 |
Notification of Event TCP.15 Message: '$1:$2 -> $3:$4 received segment with PSH bit set, sequence number $5' Parameters list: $1: tcp15_source_ip_address $2: tcp15_source_tcp_port $3: tcp15_destination_ip_address $4: tcp15_destination_tcp_port $5: tcp15_seq_num TCP has received a segment with PSH bit set. |
||
tcpNotification16 | 1.3.6.1.4.1.2007.1.4.12.2.0.16 |
Notification of Event TCP.16 Message: '$1:$2 -> $3:$4 received valid segment, sequence number $5; SYNRCVD state, enter ESTABLISHED state' Parameters list: $1: tcp16_source_ip_address $2: tcp16_source_tcp_port $3: tcp16_destination_ip_address $4: tcp16_destination_tcp_port $5: tcp16_seq_num TCP has received a valid segment while in SYNRCVD state; enter ESTABLISHED state and notify application of the open. |
||
tcpNotification17 | 1.3.6.1.4.1.2007.1.4.12.2.0.17 |
Notification of Event TCP.17 Message: '$1:$2 -> $3:$4 received FIN, sequence number $5; LISTEN state, send RST' Parameters list: $1: tcp17_source_ip_address $2: tcp17_source_tcp_port $3: tcp17_destination_ip_address $4: tcp17_destination_tcp_port $5: tcp17_seq_num TCP has received a FIN while in the LISTEN state, so we send RST to the other side. |
||
tcpNotification18 | 1.3.6.1.4.1.2007.1.4.12.2.0.18 |
Notification of Event TCP.18 Message: '$1:$2 -> $3:$4 received an out of order segment, sequence number $5; hole created at end of receive buffer seq num $6 to $7' Parameters list: $1: tcp18_source_ip_address $2: tcp18_source_tcp_port $3: tcp18_destination_ip_address $4: tcp18_destination_tcp_port $5: tcp18_seq_num $6: tcp18_seq_num $7: tcp18_seq_num TCP has received an out of order packet; this creates a hole in the receive buffer. |
||
tcpNotification19 | 1.3.6.1.4.1.2007.1.4.12.2.0.19 |
Notification of Event TCP.19 Message: '$1:$2 -> $3:$4 received an out of order segment, sequence number $5; hole created at end of receive buffer seq num $6 to $7' Parameters list: $1: tcp19_source_ip_address $2: tcp19_source_tcp_port $3: tcp19_destination_ip_address $4: tcp19_destination_tcp_port $5: tcp19_seq_num $6: tcp19_seq_num $7: tcp19_seq_num TCP has received an out of order packet; this creates a hole in the receive buffer. |
||
tcpNotification20 | 1.3.6.1.4.1.2007.1.4.12.2.0.20 |
Notification of Event TCP.20 Message: '$1:$2 -> $3:$4 received segment, sequence number $5; partially fills the beginning of a hole $6 to $7' Parameters list: $1: tcp20_source_ip_address $2: tcp20_source_tcp_port $3: tcp20_destination_ip_address $4: tcp20_destination_tcp_port $5: tcp20_seq_num $6: tcp20_seq_num $7: tcp20_seq_num TCP has received a packet that partially fills the beginning of a hole. |
||
tcpNotification21 | 1.3.6.1.4.1.2007.1.4.12.2.0.21 |
Notification of Event TCP.21 Message: '$1:$2 -> $3:$4 received segment, sequence number $5; partially fills the end of a hole $6 to $7' Parameters list: $1: tcp21_source_ip_address $2: tcp21_source_tcp_port $3: tcp21_destination_ip_address $4: tcp21_destination_tcp_port $5: tcp21_seq_num $6: tcp21_seq_num $7: tcp21_seq_num TCP has received a packet that partially fills the end of a hole. |
||
tcpNotification22 | 1.3.6.1.4.1.2007.1.4.12.2.0.22 |
Notification of Event TCP.22 Message: '$1:$2 -> $3:$4 received segment, sequence number $5; completely fills a hole, removing hole $6 to $7' Parameters list: $1: tcp22_source_ip_address $2: tcp22_source_tcp_port $3: tcp22_destination_ip_address $4: tcp22_destination_tcp_port $5: tcp22_seq_num $6: tcp22_seq_num $7: tcp22_seq_num TCP has received a packet that completely fills a hole. |
||
tcpNotification23 | 1.3.6.1.4.1.2007.1.4.12.2.0.23 |
Notification of Event TCP.23 Message: '$1:$2 -> $3:$4 drop segment, sequence number $5; segment too big for receive buffer' Parameters list: $1: tcp23_source_ip_address $2: tcp23_source_tcp_port $3: tcp23_destination_ip_address $4: tcp23_destination_tcp_port $5: tcp23_seq_num TCP has received a packet that is too big to fit into the remaining space in the receive buffer. |
||
tcpNotification24 | 1.3.6.1.4.1.2007.1.4.12.2.0.24 |
Notification of Event TCP.24 Message: '$1:$2 -- $3:$4 process a received FIN; current state $5 is not SYNRCVD|ESTAB, so do nothing' Parameters list: $1: tcp24_source_ip_address $2: tcp24_source_tcp_port $3: tcp24_destination_ip_address $4: tcp24_destination_tcp_port $5: tcp24_state TCP processing FIN while not in SYNRCVD|ESTAB state. |
||
tcpNotification25 | 1.3.6.1.4.1.2007.1.4.12.2.0.25 |
Notification of Event TCP.25 Message: '$1:$2 -- $3:$4 process a received FIN; current state is SYNRCVD|ESTAB' Parameters list: $1: tcp25_source_ip_address $2: tcp25_source_tcp_port $3: tcp25_destination_ip_address $4: tcp25_destination_tcp_port TCP processing FIN while in SYNRCVD|ESTAB state. |
||
tcpNotification26 | 1.3.6.1.4.1.2007.1.4.12.2.0.26 |
Notification of Event TCP.26 Message: '$1:$2 -- $3:$4 application posted receive timeout has fired' Parameters list: $1: tcp26_source_ip_address $2: tcp26_source_tcp_port $3: tcp26_destination_ip_address $4: tcp26_destination_tcp_port Application posts a read specifying a timeout value. If not all the requested data has been received within a timeout period, a timer fires, and whatever is in the receive buffer is given to the application. |
||
tcpNotification27 | 1.3.6.1.4.1.2007.1.4.12.2.0.27 |
Notification of Event TCP.27 Message: '$1:$2 -- $3:$4 foreign port closed the advertised window illegally' Parameters list: $1: tcp27_source_ip_address $2: tcp27_source_tcp_port $3: tcp27_destination_ip_address $4: tcp27_destination_tcp_port The other side has been deaf and mute, and the the foreign window seems to have been closed illegally; send a RST. |
||
tcpNotification28 | 1.3.6.1.4.1.2007.1.4.12.2.0.28 |
Notification of Event TCP.28 Message: '$1:$2 -- $3:$4 state of TCP connection transitioned to SYN-RECEIVED state' Parameters list: $1: tcp28_source_ip_address $2: tcp28_source_tcp_port $3: tcp28_destination_ip_address $4: tcp28_destination_tcp_port State of the connection has transitioned to SYN-RECEIVED state as a result of either an active open or a passive open. |
||
tcpNotification29 | 1.3.6.1.4.1.2007.1.4.12.2.0.29 |
Notification of Event TCP.29 Message: '$1:$2 -- $3:$4 state of TCP connection transitioned to ESTABLISHED state' Parameters list: $1: tcp29_source_ip_address $2: tcp29_source_tcp_port $3: tcp29_destination_ip_address $4: tcp29_destination_tcp_port State of the connection has transitioned to ESTABLISHED state as a result of either an active open or a passive open. |
||
tcpNotification30 | 1.3.6.1.4.1.2007.1.4.12.2.0.30 |
Notification of Event TCP.30 Message: '$1:$2 -> $3:$4 received TCP packet with flags [$5] sequence $6 acknowledge $7 window $8 length $9' Parameters list: $1: tcp30_source_ip_address $2: tcp30_source_tcp_port $3: tcp30_destination_ip_address $4: tcp30_destination_tcp_port $5: tcp30_flags $6: tcp30_sequence $7: tcp30_acknowledge $8: tcp30_window $9: tcp30_length TCP has received a packet. |
||
tcpNotification31 | 1.3.6.1.4.1.2007.1.4.12.2.0.31 |
Notification of Event TCP.31 Message: '$1:$2 -> $3:$4 data with sequence number $5 length $6 given to application' Parameters list: $1: tcp31_source_ip_address $2: tcp31_source_tcp_port $3: tcp31_destination_ip_address $4: tcp31_destination_tcp_port $5: tcp31_seq_num $6: tcp31_length Valid data in receive buffer has been handed to the application for further processing. |
||
tcpNotification32 | 1.3.6.1.4.1.2007.1.4.12.2.0.32 |
Notification of Event TCP.32 Message: '$1:$2 -> $3:$4 excessive number of retries has occurred' Parameters list: $1: tcp32_source_ip_address $2: tcp32_source_tcp_port $3: tcp32_destination_ip_address $4: tcp32_destination_tcp_port We have retransmitted a frame an excessive number of times. If the application has closed the connection already, just abort. Else, notify the application that there is a problem. |
||
tcpNotification33 | 1.3.6.1.4.1.2007.1.4.12.2.0.33 |
Notification of Event TCP.33 Message: '$1:$2 -> $3:$4 send control segment with flags [$5] sequence number $6, acknowledge number $7 and window $8' Parameters list: $1: tcp33_source_ip_address $2: tcp33_source_tcp_port $3: tcp33_destination_ip_address $4: tcp33_destination_tcp_port $5: tcp33_flags $6: tcp33_seq_num $7: tcp33_ack_num $8: tcp33_window Send a control segment to either ack a segment or send special control segments like FIN or RST. |
||
tcpNotification34 | 1.3.6.1.4.1.2007.1.4.12.2.0.34 |
Notification of Event TCP.34 Message: '$1:$2 -> $3:$4 retransmit data with flags [$5] sequence number $6 ack number $7 window $8 and length $9' Parameters list: $1: tcp34_source_ip_address $2: tcp34_source_tcp_port $3: tcp34_destination_ip_address $4: tcp34_destination_tcp_port $5: tcp34_flags $6: tcp34_seq_num $7: tcp34_ack_num $8: tcp34_window $9: tcp34_length We have failed to receive a valid ACK for transmitted data, so retransmit the data. |
||
tcpNotification35 | 1.3.6.1.4.1.2007.1.4.12.2.0.35 |
Notification of Event TCP.35 Message: '$1:$2 -> $3:$4 transmit data with flags [$5] sequence number $6 ack number $7 window $8 and length $9' Parameters list: $1: tcp35_source_ip_address $2: tcp35_source_tcp_port $3: tcp35_destination_ip_address $4: tcp35_destination_tcp_port $5: tcp35_flags $6: tcp35_seq_num $7: tcp35_ack_num $8: tcp35_window $9: tcp35_length Transmit data. |
||
tcpNotification36 | 1.3.6.1.4.1.2007.1.4.12.2.0.36 |
Notification of Event TCP.36 Message: '$1:$2 -> $3:$4 illegal option $5 received in SYN segment' Parameters list: $1: tcp36_source_ip_address $2: tcp36_source_tcp_port $3: tcp36_destination_ip_address $4: tcp36_destination_tcp_port $5: tcp36_option An unsupported option is present in the options field of a SYN packet. |
||
tcpNotification37 | 1.3.6.1.4.1.2007.1.4.12.2.0.37 |
Notification of Event TCP.37 Message: '---' Reserved for possible future use. |
||
tcpNotification38 | 1.3.6.1.4.1.2007.1.4.12.2.0.38 |
Notification of Event TCP.38 Message: '$1:$2 -> $3:$4 reject segment with sequence number $5; bad ACK in segment while in SYNRCVD state, send RST' Parameters list: $1: tcp38_source_ip_address $2: tcp38_source_tcp_port $3: tcp38_destination_ip_address $4: tcp38_destination_tcp_port $5: tcp38_seq_num Reject the segment, and send a RST to the other side for receiving a segment with the incorrect acknowledgement while in the SYNRCVD state. Until a correct acknowledgement is received, we cannot progress into the ESTABLISHED state. |
||
tcpNotification39 | 1.3.6.1.4.1.2007.1.4.12.2.0.39 |
Notification of Event TCP.39 Message: '$1:$2 -> $3:$4 received ACK segment, sequence number $5; while in LISTEN state, send RST' Parameters list: $1: tcp39_source_ip_address $2: tcp39_source_tcp_port $3: tcp39_destination_ip_address $4: tcp39_destination_tcp_port $5: tcp39_seq_num TCP has received an ACK while in the LISTEN state; this does not make any sense because we have not yet sent any data, so nothing should be ACKed. As a result, we send a RST. |
||
tcpNotification40 | 1.3.6.1.4.1.2007.1.4.12.2.0.40 |
Notification of Event TCP.40 Message: '$1:$2 -> $3:$4 sending TCP RESET with flags [$5] sequence number $6 acknowledge $7' Parameters list: $1: tcp40_source_ip_address $2: tcp40_source_tcp_port $3: tcp40_destination_ip_address $4: tcp40_destination_tcp_port $5: tcp40_flags $6: tcp40_seq_num $7: tcp40_ack_num TCP is sending a RESET segment to the other side. |
||
tcpNotification41 | 1.3.6.1.4.1.2007.1.4.12.2.0.41 |
Notification of Event TCP.41 Message: '$1:$2 -- $3:$4 TCP connection closed' Parameters list: $1: tcp41_source_ip_address $2: tcp41_source_tcp_port $3: tcp41_destination_ip_address $4: tcp41_destination_tcp_port TCP connection is closed - notifying the application. |
||
tcpNotification42 | 1.3.6.1.4.1.2007.1.4.12.2.0.42 |
Notification of Event TCP.42 Message: '$1:$2 -- $3:$4 freeing tcb block' Parameters list: $1: tcp42_source_ip_address $2: tcp42_source_tcp_port $3: tcp42_destination_ip_address $4: tcp42_destination_tcp_port Freeing the TCB block associated with the TCP connection that has closed. |
||
tcpNotification43 | 1.3.6.1.4.1.2007.1.4.12.2.0.43 |
Notification of Event TCP.43 Message: '$1:$2 -> $3:$4 overlap allowed in packet with sequence number $5' Parameters list: $1: tcp43_source_ip_address $2: tcp43_source_tcp_port $3: tcp43_destination_ip_address $4: tcp43_destination_tcp_port $5: tcp43_seq_num TCP has received a segment with data that has already been consumed by the application. |
||
tcpNotification44 | 1.3.6.1.4.1.2007.1.4.12.2.0.44 |
Notification of Event TCP.44 Message: '$1:$2 -> $3:$4 Idle timer fires for connection' Parameters list: $1: tcp44_source_ip_address $2: tcp44_source_tcp_port $3: tcp44_destination_ip_address $4: tcp44_destination_tcp_port Idle timer fires for TCP connection. |
||
tcpNotification45 | 1.3.6.1.4.1.2007.1.4.12.2.0.45 |
Notification of Event TCP.45 Message: '$1:$2 -> $3:$4 Retransmit timer fires for connection' Parameters list: $1: tcp45_source_ip_address $2: tcp45_source_tcp_port $3: tcp45_destination_ip_address $4: tcp45_destination_tcp_port Retransmit timer fires for TCP connection. |
||
tcpNotification46 | 1.3.6.1.4.1.2007.1.4.12.2.0.46 |
Notification of Event TCP.46 Message: '$1:$2 -- $3:$4 State transitioned from ESTABLISHED to FINWAIT' Parameters list: $1: tcp46_source_ip_address $2: tcp46_source_tcp_port $3: tcp46_destination_ip_address $4: tcp46_destination_tcp_port State of tcp connection has transitioned from ESTABLISHED to FINWAIT - send FIN, and now waiting for FIN-ACK to arrive. |
||
tcpNotification47 | 1.3.6.1.4.1.2007.1.4.12.2.0.47 |
Notification of Event TCP.47 Message: '$1:$2 -- $3:$4 State transitioned to CLOSED' Parameters list: $1: tcp47_source_ip_address $2: tcp47_source_tcp_port $3: tcp47_destination_ip_address $4: tcp47_destination_tcp_port State of tcp connection has transitioned to CLOSED. |
||
tcpNotification48 | 1.3.6.1.4.1.2007.1.4.12.2.0.48 |
Notification of Event TCP.48 Message: '$1:$2 -> $3:$4 Received data after CLOSE was issued, and window is zero, send RST' Parameters list: $1: tcp48_source_ip_address $2: tcp48_source_tcp_port $3: tcp48_destination_ip_address $4: tcp48_destination_tcp_port TCP connection is CLOSING due to application requesting a CLOSE. After the window shrinks to zero, discard any packets received. This is based on the half-duplex TCP close sequence. |
||
tcpNotification49 | 1.3.6.1.4.1.2007.1.4.12.2.0.49 |
Notification of Event TCP.49 Message: '$1:$2 -> $3:$4 Received NACK' Parameters list: $1: tcp49_source_ip_address $2: tcp49_destination_ip_address $3: tcp49_tcp_src_port $4: tcp49_tcp_dst_port The other side has send an old ACK with zero data length - we treat this as a NACK. |
||
tcpNotification50 | 1.3.6.1.4.1.2007.1.4.12.2.0.50 |
Notification of Event TCP.50 Message: '$1:$2 -> $3:$4 Received Acknowledge for the keep alive packet sent' Parameters list: $1: tcp50_source_ip_address $2: tcp50_destination_ip_address $3: tcp50_tcp_src_port $4: tcp50_tcp_dst_port The other side has acknowledged the keep alive packet. The keep alive packet is sent if keep alive is enabled on this TCP connection, and the connection has been idle. |
||
tcpNotification51 | 1.3.6.1.4.1.2007.1.4.12.2.0.51 |
Notification of Event TCP.51 Message: '$1:$2 -> $3:$4 Local window zero' Parameters list: $1: tcp51_source_ip_address $2: tcp51_destination_ip_address $3: tcp51_tcp_src_port $4: tcp51_tcp_dst_port The local window advertised is zero. The application is not draining the TCP receive buffer fast enough. |
||
tcpNotification52 | 1.3.6.1.4.1.2007.1.4.12.2.0.52 |
Notification of Event TCP.52 Message: '$1:$2 -> $3:$4 send FIN sequence number $5, acknowledge number $6' Parameters list: $1: tcp52_source_ip_address $2: tcp52_destination_ip_address $3: tcp52_tcp_src_port $4: tcp52_tcp_dst_port $5: tcp52_seq_num $6: tcp52_ack_num The TCP connection is closing, and we sent a FIN. |
||
tcpNotification53 | 1.3.6.1.4.1.2007.1.4.12.2.0.53 |
Notification of Event TCP.53 Message: 'get buf failed - cannot send packet' The router is running out of iorbs, getbuf failed, so we cannot send a packet. |
||
tcpNotification54 | 1.3.6.1.4.1.2007.1.4.12.2.0.54 |
Notification of Event TCP.54 Message: 'transmit buffer too large for listen/open ($1), clipped to ($2)' Parameters list: $1: tcp54_requested_amount $2: tcp54_clipped_amount The transmit buffer size requested for a TCP connection is too large to be allocated by the system. TCP has selected in its place the largest chunk size available in the system. |
||
tcpNotification55 | 1.3.6.1.4.1.2007.1.4.12.2.0.55 |
Notification of Event TCP.55 Message: 'receive buffer too large for listen/open ($1), clipped to ($2)' Parameters list: $1: tcp55_requested_amount $2: tcp55_clipped_amount The receive buffer size requested for a TCP connection is too large to be allocated by the system. TCP has selected in its place the largest chunk size available in the system. |