mirror of
https://github.com/librenms/librenms.git
synced 2024-10-07 16:52:45 +00:00
* Extract DiscoveryItem and move some things to better places. Extract model class Fix up model construction. I have problem with construction... Makeshift model working. Switch constructor to factory. discover() and create() Support legacy discovery. Remove uneeded custom pollers Remove netonix custom detection as we try ucd on all os now. Add a few yaml procs. Fix a couple things. More processor discovery conversions Move Calix e7 to standard hrProcessorLoad, but it doesn't fully implement the HR-MIB, move things around to make it work. Add a few yaml procs. Fix a couple things. Correct some stupid mib stuff. Move more, drop php 5.3 Add netscaler which uses string indexes. Port fiberhome to yaml and use skip_values More conversions. BroadcomProcessorUsage Trait Serveriron and Ironware share some mibs. Create a common abstract os for them. Add yaml support for mib specification in each data entry Make legacy discover_processor() set 0 for hrDeviceIndex Untangle Dell switch OS processors Use use shared OS for groups if they don't have a specific group. fix silly mib mistake Make index optional Move HR and UCD to Traits and out of Processor. * forgot to update the fortiswitch index * Make sgos and avaya-ers match the old index. * fix comware test data * fix merge errors * fix dsm and remove pointless empty modules * file not found exception is in the wrong place. * Updated processor development docs
881 lines
22 KiB
Plaintext
881 lines
22 KiB
Plaintext
-- This module defines enterprise MIBs DI Setting.
|
|
--
|
|
-- Copyright (c) 1999-2004, Juniper Networks, Inc.
|
|
-- All rights reserved.
|
|
|
|
NETSCREEN-IDS-MIB DEFINITIONS ::= BEGIN
|
|
|
|
IMPORTS
|
|
netscreenIDS
|
|
FROM NETSCREEN-SMI
|
|
Counter32, Integer32, MODULE-IDENTITY, OBJECT-TYPE
|
|
FROM SNMPv2-SMI
|
|
;
|
|
|
|
nsIdsProtect MODULE-IDENTITY
|
|
LAST-UPDATED "200405032022Z" -- May 03, 2004
|
|
ORGANIZATION
|
|
"Juniper Networks, Inc."
|
|
CONTACT-INFO
|
|
"Customer Support
|
|
|
|
1194 North Mathilda Avenue
|
|
Sunnyvale, California 94089-1206
|
|
USA
|
|
|
|
Tel: 1-800-638-8296
|
|
E-mail: customerservice@juniper.net
|
|
HTTP://www.juniper.net"
|
|
DESCRIPTION
|
|
"This module defines NetScreen private MIBs DI Setting."
|
|
REVISION "200405030000Z" -- May 03, 2004
|
|
DESCRIPTION
|
|
"Modified copyright and contact information"
|
|
REVISION "200403030000Z" -- March 03, 2004
|
|
DESCRIPTION
|
|
"Converted to SMIv2 by Longview Software"
|
|
REVISION "200204260000Z" -- April 26, 2002
|
|
DESCRIPTION
|
|
"Screen option on zone setting, add new screen option (Zhong
|
|
Wang)"
|
|
REVISION "200109280000Z" -- September 28, 2001
|
|
DESCRIPTION
|
|
"No Comment"
|
|
REVISION "200101080000Z" -- January 08, 2001
|
|
DESCRIPTION
|
|
"Creation Date"
|
|
::= { netscreenIDS 1 }
|
|
|
|
NsIdsAttkMonEntry ::= SEQUENCE
|
|
{
|
|
nsIdsAttkMonIfIdx Integer32,
|
|
nsIdsAttkMonVsys Integer32,
|
|
nsIdsAttkMonSynAttk Counter32,
|
|
nsIdsAttkMonTearDrop Counter32,
|
|
nsIdsAttkMonSrcRoute Counter32,
|
|
nsIdsAttkMonPingDeath Counter32,
|
|
nsIdsAttkMonAddrSpoof Counter32,
|
|
nsIdsAttkMonLand Counter32,
|
|
nsIdsAttkMonIcmpFlood Counter32,
|
|
nsIdsAttkMonUdpFlood Counter32,
|
|
nsIdsAttkMonWinnuke Counter32,
|
|
nsIdsAttkMonPortScan Counter32,
|
|
nsIdsAttkMonIpSweep Counter32,
|
|
nsAttkMonSynFrag Counter32,
|
|
nsAttkMonTcpNoFlag Counter32,
|
|
nsAttkMonIpUnknownProt Counter32,
|
|
nsAttkMonIpOptBad Counter32,
|
|
nsAttkMonIpOptRecord Counter32,
|
|
nsAttkMonIpOptTimestamp Counter32,
|
|
nsAttkMonIpOptSCHT Counter32,
|
|
nsAttkMonIpOptLSR Counter32,
|
|
nsAttkMonIpOptSSR Counter32,
|
|
nsAttkMonIpOptStream Counter32,
|
|
nsAttkMonIcmpFrag Counter32,
|
|
nsAttkMonIcmpLarge Counter32,
|
|
nsAttkMonTcpSynFin Counter32,
|
|
nsAttkMonTcpFinNoAck Counter32,
|
|
nsAttkMonHttpMalUrl Counter32,
|
|
nsAttkMonSessMalNum Counter32,
|
|
nsAttkMonSynAckAck Counter32,
|
|
nsAttkMonIpFrag Counter32,
|
|
nsIdsAttkMonIfInfo Integer32
|
|
}
|
|
|
|
NsIdsProtectSetEntry ::= SEQUENCE
|
|
{
|
|
nsIdsProtectZoneIdx Integer32,
|
|
nsIdsDetectPingOfDeath INTEGER,
|
|
nsIdsDetectTearDrop INTEGER,
|
|
nsIdsDetectWinNuke INTEGER,
|
|
nsIdsFilterIpSrcRoute INTEGER,
|
|
nsIdsDetectPortScan INTEGER,
|
|
nsIdsDetectAddrSweep INTEGER,
|
|
nsIdsDetectLand INTEGER,
|
|
nsIdsBlockComponent INTEGER,
|
|
nsIdsDetectIpSpoof INTEGER,
|
|
nsIdsDetectSyn INTEGER,
|
|
nsIdsDetectIcmpFlood INTEGER,
|
|
nsIdsDetectUdpFlood INTEGER,
|
|
nsIdsDetectSynFrag INTEGER,
|
|
nsIdsDetectTcpNoFlag INTEGER,
|
|
nsIdsDetectIpUnknownProt INTEGER,
|
|
nsIdsDetectIpOptBad INTEGER,
|
|
nsIdsDetectIpOptRecord INTEGER,
|
|
nsIdsDetectIpOptTimestamp INTEGER,
|
|
nsIdsDetectIpOptSCHT INTEGER,
|
|
nsIdsDetectIpOptLSR INTEGER,
|
|
nsIdsDetectIpOptSSR INTEGER,
|
|
nsIdsDetectIpOptStream INTEGER,
|
|
nsIdsDetectIcmpFrag INTEGER,
|
|
nsIdsDetectIcmpLarge INTEGER,
|
|
nsIdsDetectTcpSynFin INTEGER,
|
|
nsIdsDetectTcpFinNoAck INTEGER,
|
|
nsIdsHttpMalUrl INTEGER,
|
|
nsIdsSessMalNum INTEGER,
|
|
nsIdsDetectSynAckAck INTEGER,
|
|
nsIdsDetectIpFrag INTEGER
|
|
}
|
|
|
|
NsIdsProtectThreshEntry ::= SEQUENCE
|
|
{
|
|
nsIdsProtectThreshZoneIdx Integer32,
|
|
nsIdsSynAttackThresh Integer32,
|
|
nsIdsSynAttackTimeout Integer32,
|
|
nsIdsSynAttackAlmTh Integer32,
|
|
nsIdsSynAttackQueSize Integer32,
|
|
nsIdsSynAttackAgeTime Integer32,
|
|
nsIdsIcmpFloodThresh Integer32,
|
|
nsIdsUdpFloodThresh Integer32,
|
|
nsIdsPortScanThresh Integer32,
|
|
nsIdsIpSweepThresh Integer32,
|
|
nsIdsSynAckAckThres Integer32
|
|
}
|
|
|
|
nsIdsProtectSetTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF NsIdsProtectSetEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"NetScreen ScreenOS can allow DI protection on each of
|
|
NetScreen device's physical interface. This table collects the
|
|
DI protection configuration on each physical interface."
|
|
::= { nsIdsProtect 1 }
|
|
|
|
nsIdsProtectSetEntry OBJECT-TYPE
|
|
SYNTAX NsIdsProtectSetEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Hold the DI setting attribute."
|
|
INDEX
|
|
{ nsIdsProtectZoneIdx }
|
|
::= { nsIdsProtectSetTable 1 }
|
|
|
|
nsIdsProtectZoneIdx OBJECT-TYPE
|
|
SYNTAX Integer32 (0..2147483647)
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"unique zone id."
|
|
::= { nsIdsProtectSetEntry 1 }
|
|
|
|
nsIdsDetectPingOfDeath OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Ping of Death."
|
|
::= { nsIdsProtectSetEntry 2 }
|
|
|
|
nsIdsDetectTearDrop OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Tear Drop Attack."
|
|
::= { nsIdsProtectSetEntry 3 }
|
|
|
|
nsIdsDetectWinNuke OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Win Nuke Attack."
|
|
::= { nsIdsProtectSetEntry 4 }
|
|
|
|
nsIdsFilterIpSrcRoute OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Filter IP Source Route Option attack."
|
|
::= { nsIdsProtectSetEntry 5 }
|
|
|
|
nsIdsDetectPortScan OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Port Scan Death attack."
|
|
::= { nsIdsProtectSetEntry 6 }
|
|
|
|
nsIdsDetectAddrSweep OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Address Sweep Attack."
|
|
::= { nsIdsProtectSetEntry 7 }
|
|
|
|
nsIdsDetectLand OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Land Attack."
|
|
::= { nsIdsProtectSetEntry 8 }
|
|
|
|
nsIdsBlockComponent OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Block Java/ActiveX/ZIP/EXE Component."
|
|
::= { nsIdsProtectSetEntry 9 }
|
|
|
|
nsIdsDetectIpSpoof OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP Spoofing attack."
|
|
::= { nsIdsProtectSetEntry 10 }
|
|
|
|
nsIdsDetectSyn OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect SYN attack."
|
|
::= { nsIdsProtectSetEntry 11 }
|
|
|
|
nsIdsDetectIcmpFlood OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect ICMP Flood attack."
|
|
::= { nsIdsProtectSetEntry 12 }
|
|
|
|
nsIdsDetectUdpFlood OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect UDP Flood attack."
|
|
::= { nsIdsProtectSetEntry 13 }
|
|
|
|
nsIdsDetectSynFrag OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect SYN fragment"
|
|
::= { nsIdsProtectSetEntry 14 }
|
|
|
|
nsIdsDetectTcpNoFlag OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect TCP without flag set."
|
|
::= { nsIdsProtectSetEntry 15 }
|
|
|
|
nsIdsDetectIpUnknownProt OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Unknown protocol IP packet."
|
|
::= { nsIdsProtectSetEntry 16 }
|
|
|
|
nsIdsDetectIpOptBad OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP bad option."
|
|
::= { nsIdsProtectSetEntry 17 }
|
|
|
|
nsIdsDetectIpOptRecord OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP record option."
|
|
::= { nsIdsProtectSetEntry 18 }
|
|
|
|
nsIdsDetectIpOptTimestamp OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP timestamp option."
|
|
::= { nsIdsProtectSetEntry 19 }
|
|
|
|
nsIdsDetectIpOptSCHT OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP security option."
|
|
::= { nsIdsProtectSetEntry 20 }
|
|
|
|
nsIdsDetectIpOptLSR OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Loose source route."
|
|
::= { nsIdsProtectSetEntry 21 }
|
|
|
|
nsIdsDetectIpOptSSR OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect strict source route."
|
|
::= { nsIdsProtectSetEntry 22 }
|
|
|
|
nsIdsDetectIpOptStream OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP stream option."
|
|
::= { nsIdsProtectSetEntry 23 }
|
|
|
|
nsIdsDetectIcmpFrag OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect ICMP fragment."
|
|
::= { nsIdsProtectSetEntry 24 }
|
|
|
|
nsIdsDetectIcmpLarge OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect large ICMP packet."
|
|
::= { nsIdsProtectSetEntry 25 }
|
|
|
|
nsIdsDetectTcpSynFin OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect TCP syn fin both set."
|
|
::= { nsIdsProtectSetEntry 26 }
|
|
|
|
nsIdsDetectTcpFinNoAck OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect TCP fin set without ack bit set."
|
|
::= { nsIdsProtectSetEntry 27 }
|
|
|
|
nsIdsHttpMalUrl OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect malicious URL."
|
|
::= { nsIdsProtectSetEntry 28 }
|
|
|
|
nsIdsSessMalNum OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect malicious session connection."
|
|
::= { nsIdsProtectSetEntry 29 }
|
|
|
|
nsIdsDetectSynAckAck OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect SYN ACK ACK DoS."
|
|
::= { nsIdsProtectSetEntry 30 }
|
|
|
|
nsIdsDetectIpFrag OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
disable(0),
|
|
enabled(1)
|
|
}
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Block IP fragment packet."
|
|
::= { nsIdsProtectSetEntry 31 }
|
|
|
|
nsIdsProtectThreshTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF NsIdsProtectThreshEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"NetScreen ScreenOS can allow DI protection on each of
|
|
NetScreen device's physical interface. This table collects the
|
|
DI protection configuration on each physical interface."
|
|
::= { nsIdsProtect 2 }
|
|
|
|
nsIdsProtectThreshEntry OBJECT-TYPE
|
|
SYNTAX NsIdsProtectThreshEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Hold the DI setting attribute."
|
|
INDEX
|
|
{ nsIdsProtectThreshZoneIdx }
|
|
::= { nsIdsProtectThreshTable 1 }
|
|
|
|
nsIdsProtectThreshZoneIdx OBJECT-TYPE
|
|
SYNTAX Integer32 (0..2147483647)
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"unique zone id."
|
|
::= { nsIdsProtectThreshEntry 1 }
|
|
|
|
nsIdsSynAttackThresh OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"SYN attack threshold."
|
|
::= { nsIdsProtectThreshEntry 2 }
|
|
|
|
nsIdsSynAttackTimeout OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"SYN attack timeout."
|
|
::= { nsIdsProtectThreshEntry 3 }
|
|
|
|
nsIdsSynAttackAlmTh OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"SYN attack alarm threshold."
|
|
::= { nsIdsProtectThreshEntry 4 }
|
|
|
|
nsIdsSynAttackQueSize OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"SYN attack queue size."
|
|
::= { nsIdsProtectThreshEntry 5 }
|
|
|
|
nsIdsSynAttackAgeTime OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"SYN flood age time."
|
|
::= { nsIdsProtectThreshEntry 6 }
|
|
|
|
nsIdsIcmpFloodThresh OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ICMP attack alarm threshold."
|
|
::= { nsIdsProtectThreshEntry 7 }
|
|
|
|
nsIdsUdpFloodThresh OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"UDP attack alarm threshold."
|
|
::= { nsIdsProtectThreshEntry 8 }
|
|
|
|
nsIdsPortScanThresh OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ICMP attack alarm threshold."
|
|
::= { nsIdsProtectThreshEntry 9 }
|
|
|
|
nsIdsIpSweepThresh OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"UDP attack alarm threshold."
|
|
::= { nsIdsProtectThreshEntry 10 }
|
|
|
|
nsIdsSynAckAckThres OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"SYN ack ack alarm threshold."
|
|
::= { nsIdsProtectThreshEntry 11 }
|
|
|
|
nsIdsAttkMonTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF NsIdsAttkMonEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The table monitors the intrusion attack attemps amount to
|
|
NetScreen Device."
|
|
::= { netscreenIDS 2 }
|
|
|
|
nsIdsAttkMonEntry OBJECT-TYPE
|
|
SYNTAX NsIdsAttkMonEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"An entry containing intrusion attack couters."
|
|
INDEX
|
|
{ nsIdsAttkMonIfIdx }
|
|
::= { nsIdsAttkMonTable 1 }
|
|
|
|
nsIdsAttkMonIfIdx OBJECT-TYPE
|
|
SYNTAX Integer32 (0..2147483647)
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"unique interface id."
|
|
::= { nsIdsAttkMonEntry 1 }
|
|
|
|
nsIdsAttkMonVsys OBJECT-TYPE
|
|
SYNTAX Integer32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"according NetScreen's concepts. each interface belongs to one
|
|
virtual system. This attribute displays the virtual system name
|
|
an interface belongs to."
|
|
::= { nsIdsAttkMonEntry 2 }
|
|
|
|
nsIdsAttkMonSynAttk OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"sync attack packet counter."
|
|
::= { nsIdsAttkMonEntry 3 }
|
|
|
|
nsIdsAttkMonTearDrop OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"tear drop attack packet counter."
|
|
::= { nsIdsAttkMonEntry 4 }
|
|
|
|
nsIdsAttkMonSrcRoute OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"source route option attack packet counter."
|
|
::= { nsIdsAttkMonEntry 5 }
|
|
|
|
nsIdsAttkMonPingDeath OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ping of death attack packet counter."
|
|
::= { nsIdsAttkMonEntry 6 }
|
|
|
|
nsIdsAttkMonAddrSpoof OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"address spoofing attack packet counter."
|
|
::= { nsIdsAttkMonEntry 7 }
|
|
|
|
nsIdsAttkMonLand OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"land attack packet counter."
|
|
::= { nsIdsAttkMonEntry 8 }
|
|
|
|
nsIdsAttkMonIcmpFlood OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"ICMP flood attack packet counter."
|
|
::= { nsIdsAttkMonEntry 9 }
|
|
|
|
nsIdsAttkMonUdpFlood OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"udp flood attack packet counter."
|
|
::= { nsIdsAttkMonEntry 10 }
|
|
|
|
nsIdsAttkMonWinnuke OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"weired netbios attack packet counter."
|
|
::= { nsIdsAttkMonEntry 11 }
|
|
|
|
nsIdsAttkMonPortScan OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"port scan attempt attack packet counter."
|
|
::= { nsIdsAttkMonEntry 12 }
|
|
|
|
nsIdsAttkMonIpSweep OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"address sweep attemp attack packet counter."
|
|
::= { nsIdsAttkMonEntry 13 }
|
|
|
|
nsAttkMonSynFrag OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect SYN fragment"
|
|
::= { nsIdsAttkMonEntry 14 }
|
|
|
|
nsAttkMonTcpNoFlag OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect TCP without flag set."
|
|
::= { nsIdsAttkMonEntry 15 }
|
|
|
|
nsAttkMonIpUnknownProt OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Unknown protocol IP packet."
|
|
::= { nsIdsAttkMonEntry 16 }
|
|
|
|
nsAttkMonIpOptBad OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP bad option."
|
|
::= { nsIdsAttkMonEntry 17 }
|
|
|
|
nsAttkMonIpOptRecord OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP record option."
|
|
::= { nsIdsAttkMonEntry 18 }
|
|
|
|
nsAttkMonIpOptTimestamp OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP timestamp option."
|
|
::= { nsIdsAttkMonEntry 19 }
|
|
|
|
nsAttkMonIpOptSCHT OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP security option."
|
|
::= { nsIdsAttkMonEntry 20 }
|
|
|
|
nsAttkMonIpOptLSR OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect Loose source route."
|
|
::= { nsIdsAttkMonEntry 21 }
|
|
|
|
nsAttkMonIpOptSSR OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect strict source route."
|
|
::= { nsIdsAttkMonEntry 22 }
|
|
|
|
nsAttkMonIpOptStream OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect IP stream option."
|
|
::= { nsIdsAttkMonEntry 23 }
|
|
|
|
nsAttkMonIcmpFrag OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect ICMP fragment."
|
|
::= { nsIdsAttkMonEntry 24 }
|
|
|
|
nsAttkMonIcmpLarge OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect large ICMP packet."
|
|
::= { nsIdsAttkMonEntry 25 }
|
|
|
|
nsAttkMonTcpSynFin OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect TCP syn fin both set."
|
|
::= { nsIdsAttkMonEntry 26 }
|
|
|
|
nsAttkMonTcpFinNoAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect TCP fin set without ack bit set."
|
|
::= { nsIdsAttkMonEntry 27 }
|
|
|
|
nsAttkMonHttpMalUrl OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect malicious URL."
|
|
::= { nsIdsAttkMonEntry 28 }
|
|
|
|
nsAttkMonSessMalNum OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect malicious session connection."
|
|
::= { nsIdsAttkMonEntry 29 }
|
|
|
|
nsAttkMonSynAckAck OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Detect SYN ACK ACK attack."
|
|
::= { nsIdsAttkMonEntry 30 }
|
|
|
|
nsAttkMonIpFrag OBJECT-TYPE
|
|
SYNTAX Counter32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Block IP fragment packet."
|
|
::= { nsIdsAttkMonEntry 31 }
|
|
|
|
nsIdsAttkMonIfInfo OBJECT-TYPE
|
|
SYNTAX Integer32 (0..2147483647)
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Internal id assigned to this interface. Stays persistent across resets."
|
|
::= { nsIdsAttkMonEntry 32 }
|
|
|
|
END
|
|
|
|
|