TIARA-PACKETFILTER-MIB: View SNMP OID List / Download MIB

VENDOR: TASMAN NETWORKS


 Home MIB: TIARA-PACKETFILTER-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 tiaraPacketFilterMib 1.3.6.1.4.1.3174.2.51
The MIB module to describe Tiara's Packet Filter MIB
       filterRuleClearCounters 1.3.6.1.4.1.3174.2.51.1 displaystring read-write
This variable is used to clear counters for a given Rule Set Name or All the counters. Whenever a set on this variable is done , the value given by the manager will be interpreted as the filter rule set name for which the counters will be cleared. As a special case if 'all' is the value of this variable then counters corresponding to all the filter rule set names will be cleared.
       filterNameIndexTable 1.3.6.1.4.1.3174.2.51.2 no-access
This Table maintains a mapping of filter name and Filter Index
           filterNameIndexEntry 1.3.6.1.4.1.3174.2.51.2.1 no-access
An entry in the filterRuleNameIndexTable
               filterEntryName 1.3.6.1.4.1.3174.2.51.2.1.1 displaystring read-only
A unique name for the filter rule
               filterNameIndex 1.3.6.1.4.1.3174.2.51.2.1.2 integer32 no-access
A unique identifier for the filter rule
               filterEntryRowStatus 1.3.6.1.4.1.3174.2.51.2.1.3 rowstatus read-only
Used to add or delete a row in the table
       filterRuleAssignTable 1.3.6.1.4.1.3174.2.51.3 no-access
FilterRuleAssign Table
           filterRuleAssignTableEntry 1.3.6.1.4.1.3174.2.51.3.1 no-access
An entry in the filterRuleName Table
               filterRuleSetNameIn 1.3.6.1.4.1.3174.2.51.3.1.1 displaystring read-only
Rule Set Name for IN coming Direction
               filterRuleSetNameOut 1.3.6.1.4.1.3174.2.51.3.1.2 displaystring read-only
Rule Set Name for OUT going Direction
               filterRuleAssignTableRowStatus 1.3.6.1.4.1.3174.2.51.3.1.3 rowstatus read-only
Used to Add or Delete a Row in the table
       filterRuleSetTable 1.3.6.1.4.1.3174.2.51.4 no-access
Filter Rule SetTable
           filterRuleSetTableEntry 1.3.6.1.4.1.3174.2.51.4.1 no-access
An entry in the Filter Rule Table
               filterRuleSetLineNo 1.3.6.1.4.1.3174.2.51.4.1.1 integer32 no-access
Line Number where the Rule has to be inserted or an invalid number (0XFFFF) when a row has to be appeded
               filterRuleName 1.3.6.1.4.1.3174.2.51.4.1.2 displaystring read-only
A unique name for the filter rule
               filterRuleSetAction 1.3.6.1.4.1.3174.2.51.4.1.3 integer read-only
Specifies Action to be taken by the filter when a match occurs to corresponding filter rule Enumeration: 'deny': 2, 'reject': 3, 'permit': 1.
               filterRuleSetProtocolType 1.3.6.1.4.1.3174.2.51.4.1.4 integer read-only
where protocol type ip will have value Enumeration: 'ip': 0, 'udp': 17, 'icmp': 1, 'tcp': 6.
               filterRuleSetSrcIpAddr 1.3.6.1.4.1.3174.2.51.4.1.5 ipaddress read-only
Number of the Source Network
               filterRuleSetSrcMask 1.3.6.1.4.1.3174.2.51.4.1.6 ipaddress read-only
Wild card Address to be applied to source Address
               filterRuleSetDestIpAddr 1.3.6.1.4.1.3174.2.51.4.1.7 ipaddress read-only
Number of the Destination Network
               filterRuleSetDestMask 1.3.6.1.4.1.3174.2.51.4.1.8 ipaddress read-only
Wild card Address to be applied to destination Address
               filterRuleSetPrecedence 1.3.6.1.4.1.3174.2.51.4.1.9 integer32 read-only
Ip address precedence feild can be used to filter packets
               filterRuleSetTos 1.3.6.1.4.1.3174.2.51.4.1.10 integer32 read-only
Ip header TOS feild can be used to filter the packets
               filterRuleSetIcmpType 1.3.6.1.4.1.3174.2.51.4.1.11 integer32 read-only
ICMP message type can be used to filter the packets
               filterRuleSetIcmpCode 1.3.6.1.4.1.3174.2.51.4.1.12 integer32 read-only
ICMP message Code can be used to filter the packets
               filterRuleSetSrcPortOne 1.3.6.1.4.1.3174.2.51.4.1.13 integer32 read-only
Source Port 1
               filterRuleSetSrcPortTwo 1.3.6.1.4.1.3174.2.51.4.1.14 integer32 read-only
Source Port 2
               filterRuleSetDestPortOne 1.3.6.1.4.1.3174.2.51.4.1.15 integer32 read-only
Destination Port 1
               filterRuleSetDestPortTwo 1.3.6.1.4.1.3174.2.51.4.1.16 integer32 read-only
Destination Port 2
               filterRuleSetSrcRelationBetnPorts 1.3.6.1.4.1.3174.2.51.4.1.17 integer read-only
relation between the Source port Enumeration: 'none': 8, 'notequalto': 2, 'lessthanorequalto': 5, 'greaterthanorequalto': 6, 'equalto': 1, 'range': 7, 'lessthan': 3, 'greaterthan': 4.
               filterRuleSetDestRelationBetnPorts 1.3.6.1.4.1.3174.2.51.4.1.18 integer read-only
relation between the Destination ports Enumeration: 'none': 8, 'notequalto': 2, 'lessthanorequalto': 5, 'greaterthanorequalto': 6, 'equalto': 1, 'range': 7, 'lessthan': 3, 'greaterthan': 4.
               filterRuleSetTcpFlags 1.3.6.1.4.1.3174.2.51.4.1.19 bits read-only
TCP flags can be used to filter the packets Bits: 'psh': 3, 'urg': 5, 'ack': 4, 'syn': 1, 'estaslished': 6, 'rst': 2, 'fin': 0.
               filterRuleSetLogAction 1.3.6.1.4.1.3174.2.51.4.1.20 truthvalue read-only
When a rule match occurs a logging message about the packet which the match occured the entry will be logged
               filterRuleSetConfigure 1.3.6.1.4.1.3174.2.51.4.1.21 integer read-only
This variable is used to append or insert a given filter rule to the filter rule set. If 'insert' is the command the linenumber at which the rule is inserted should be available in filterRuleSetLineNumber.'If command is 'add' then the line number should contain the invalid value (OxFFFF). Incase of 'add' to know the line number at which the filter rule was added the manager should do a SNMP walk Enumeration: 'insert': 2, 'add': 1.
               filterRuleSetTableRowStatus 1.3.6.1.4.1.3174.2.51.4.1.22 rowstatus read-only
Used to Add or Delete a Row in the table
       filterRuleStatsTable 1.3.6.1.4.1.3174.2.51.5 no-access
Filter Rule Statistics Table
           filterRuleStatsTableEntry 1.3.6.1.4.1.3174.2.51.5.1 no-access
An entry in the Filter Rule Statistics Table
               filterRuleStatsInBoundPermittedPkts 1.3.6.1.4.1.3174.2.51.5.1.1 counter32 read-only
Number of InBound Permitted Packets
               filterRuleStatsInBoundDeniedPkts 1.3.6.1.4.1.3174.2.51.5.1.2 counter32 read-only
Number of InBound Denied Packets
               filterRuleStatsInBoundUnMatchedPkts 1.3.6.1.4.1.3174.2.51.5.1.3 counter32 read-only
Number of InBound UnMatched Packets
               filterRuleStatsOutBoundPermittedPkts 1.3.6.1.4.1.3174.2.51.5.1.4 counter32 read-only
Number of OutBound Permitted Packets
               filterRuleStatsOutBoundDeniedPkts 1.3.6.1.4.1.3174.2.51.5.1.5 counter32 read-only
Number of OutBound Denied Packets
               filterRuleStatsOutBoundUnMatchedPkts 1.3.6.1.4.1.3174.2.51.5.1.6 counter32 read-only
Number of OutBound UnMatched Packets
               filterRuleStatsNonIpInBoundPkts 1.3.6.1.4.1.3174.2.51.5.1.7 counter32 read-only
Number of Non Ip InBound Packets
               filterRuleStatsNonIpOutBoundPkts 1.3.6.1.4.1.3174.2.51.5.1.8 counter32 read-only
Number of Non Ip OutBound Packets
               filterRuleStatsBadIpInBoundPkts 1.3.6.1.4.1.3174.2.51.5.1.9 counter32 read-only
Number of Bad Non Ip InBound Packets
               filterRuleStatsBadIpOutBoundPkts 1.3.6.1.4.1.3174.2.51.5.1.10 counter32 read-only
Number of Bad Non Ip OutBound Packets