881 lines
22 KiB
Plaintext
881 lines
22 KiB
Plaintext
|
-- This module defines enterprise MIBs DI Setting.
|
||
|
--
|
||
|
-- Copyright (c) 1999-2004, Juniper Networks, Inc.
|
||
|
-- All rights reserved.
|
||
|
|
||
|
NETSCREEN-IDS-MIB DEFINITIONS ::= BEGIN
|
||
|
|
||
|
IMPORTS
|
||
|
netscreenIDS
|
||
|
FROM NETSCREEN-SMI
|
||
|
Counter32, Integer32, MODULE-IDENTITY, OBJECT-TYPE
|
||
|
FROM SNMPv2-SMI
|
||
|
;
|
||
|
|
||
|
nsIdsProtect MODULE-IDENTITY
|
||
|
LAST-UPDATED "200405032022Z" -- May 03, 2004
|
||
|
ORGANIZATION
|
||
|
"Juniper Networks, Inc."
|
||
|
CONTACT-INFO
|
||
|
"Customer Support
|
||
|
|
||
|
1194 North Mathilda Avenue
|
||
|
Sunnyvale, California 94089-1206
|
||
|
USA
|
||
|
|
||
|
Tel: 1-800-638-8296
|
||
|
E-mail: customerservice@juniper.net
|
||
|
HTTP://www.juniper.net"
|
||
|
DESCRIPTION
|
||
|
"This module defines NetScreen private MIBs DI Setting."
|
||
|
REVISION "200405030000Z" -- May 03, 2004
|
||
|
DESCRIPTION
|
||
|
"Modified copyright and contact information"
|
||
|
REVISION "200403030000Z" -- March 03, 2004
|
||
|
DESCRIPTION
|
||
|
"Converted to SMIv2 by Longview Software"
|
||
|
REVISION "200204260000Z" -- April 26, 2002
|
||
|
DESCRIPTION
|
||
|
"Screen option on zone setting, add new screen option (Zhong
|
||
|
Wang)"
|
||
|
REVISION "200109280000Z" -- September 28, 2001
|
||
|
DESCRIPTION
|
||
|
"No Comment"
|
||
|
REVISION "200101080000Z" -- January 08, 2001
|
||
|
DESCRIPTION
|
||
|
"Creation Date"
|
||
|
::= { netscreenIDS 1 }
|
||
|
|
||
|
NsIdsAttkMonEntry ::= SEQUENCE
|
||
|
{
|
||
|
nsIdsAttkMonIfIdx Integer32,
|
||
|
nsIdsAttkMonVsys Integer32,
|
||
|
nsIdsAttkMonSynAttk Counter32,
|
||
|
nsIdsAttkMonTearDrop Counter32,
|
||
|
nsIdsAttkMonSrcRoute Counter32,
|
||
|
nsIdsAttkMonPingDeath Counter32,
|
||
|
nsIdsAttkMonAddrSpoof Counter32,
|
||
|
nsIdsAttkMonLand Counter32,
|
||
|
nsIdsAttkMonIcmpFlood Counter32,
|
||
|
nsIdsAttkMonUdpFlood Counter32,
|
||
|
nsIdsAttkMonWinnuke Counter32,
|
||
|
nsIdsAttkMonPortScan Counter32,
|
||
|
nsIdsAttkMonIpSweep Counter32,
|
||
|
nsAttkMonSynFrag Counter32,
|
||
|
nsAttkMonTcpNoFlag Counter32,
|
||
|
nsAttkMonIpUnknownProt Counter32,
|
||
|
nsAttkMonIpOptBad Counter32,
|
||
|
nsAttkMonIpOptRecord Counter32,
|
||
|
nsAttkMonIpOptTimestamp Counter32,
|
||
|
nsAttkMonIpOptSCHT Counter32,
|
||
|
nsAttkMonIpOptLSR Counter32,
|
||
|
nsAttkMonIpOptSSR Counter32,
|
||
|
nsAttkMonIpOptStream Counter32,
|
||
|
nsAttkMonIcmpFrag Counter32,
|
||
|
nsAttkMonIcmpLarge Counter32,
|
||
|
nsAttkMonTcpSynFin Counter32,
|
||
|
nsAttkMonTcpFinNoAck Counter32,
|
||
|
nsAttkMonHttpMalUrl Counter32,
|
||
|
nsAttkMonSessMalNum Counter32,
|
||
|
nsAttkMonSynAckAck Counter32,
|
||
|
nsAttkMonIpFrag Counter32,
|
||
|
nsIdsAttkMonIfInfo Integer32
|
||
|
}
|
||
|
|
||
|
NsIdsProtectSetEntry ::= SEQUENCE
|
||
|
{
|
||
|
nsIdsProtectZoneIdx Integer32,
|
||
|
nsIdsDetectPingOfDeath INTEGER,
|
||
|
nsIdsDetectTearDrop INTEGER,
|
||
|
nsIdsDetectWinNuke INTEGER,
|
||
|
nsIdsFilterIpSrcRoute INTEGER,
|
||
|
nsIdsDetectPortScan INTEGER,
|
||
|
nsIdsDetectAddrSweep INTEGER,
|
||
|
nsIdsDetectLand INTEGER,
|
||
|
nsIdsBlockComponent INTEGER,
|
||
|
nsIdsDetectIpSpoof INTEGER,
|
||
|
nsIdsDetectSyn INTEGER,
|
||
|
nsIdsDetectIcmpFlood INTEGER,
|
||
|
nsIdsDetectUdpFlood INTEGER,
|
||
|
nsIdsDetectSynFrag INTEGER,
|
||
|
nsIdsDetectTcpNoFlag INTEGER,
|
||
|
nsIdsDetectIpUnknownProt INTEGER,
|
||
|
nsIdsDetectIpOptBad INTEGER,
|
||
|
nsIdsDetectIpOptRecord INTEGER,
|
||
|
nsIdsDetectIpOptTimestamp INTEGER,
|
||
|
nsIdsDetectIpOptSCHT INTEGER,
|
||
|
nsIdsDetectIpOptLSR INTEGER,
|
||
|
nsIdsDetectIpOptSSR INTEGER,
|
||
|
nsIdsDetectIpOptStream INTEGER,
|
||
|
nsIdsDetectIcmpFrag INTEGER,
|
||
|
nsIdsDetectIcmpLarge INTEGER,
|
||
|
nsIdsDetectTcpSynFin INTEGER,
|
||
|
nsIdsDetectTcpFinNoAck INTEGER,
|
||
|
nsIdsHttpMalUrl INTEGER,
|
||
|
nsIdsSessMalNum INTEGER,
|
||
|
nsIdsDetectSynAckAck INTEGER,
|
||
|
nsIdsDetectIpFrag INTEGER
|
||
|
}
|
||
|
|
||
|
NsIdsProtectThreshEntry ::= SEQUENCE
|
||
|
{
|
||
|
nsIdsProtectThreshZoneIdx Integer32,
|
||
|
nsIdsSynAttackThresh Integer32,
|
||
|
nsIdsSynAttackTimeout Integer32,
|
||
|
nsIdsSynAttackAlmTh Integer32,
|
||
|
nsIdsSynAttackQueSize Integer32,
|
||
|
nsIdsSynAttackAgeTime Integer32,
|
||
|
nsIdsIcmpFloodThresh Integer32,
|
||
|
nsIdsUdpFloodThresh Integer32,
|
||
|
nsIdsPortScanThresh Integer32,
|
||
|
nsIdsIpSweepThresh Integer32,
|
||
|
nsIdsSynAckAckThres Integer32
|
||
|
}
|
||
|
|
||
|
nsIdsProtectSetTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF NsIdsProtectSetEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"NetScreen ScreenOS can allow DI protection on each of
|
||
|
NetScreen device's physical interface. This table collects the
|
||
|
DI protection configuration on each physical interface."
|
||
|
::= { nsIdsProtect 1 }
|
||
|
|
||
|
nsIdsProtectSetEntry OBJECT-TYPE
|
||
|
SYNTAX NsIdsProtectSetEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Hold the DI setting attribute."
|
||
|
INDEX
|
||
|
{ nsIdsProtectZoneIdx }
|
||
|
::= { nsIdsProtectSetTable 1 }
|
||
|
|
||
|
nsIdsProtectZoneIdx OBJECT-TYPE
|
||
|
SYNTAX Integer32 (0..2147483647)
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"unique zone id."
|
||
|
::= { nsIdsProtectSetEntry 1 }
|
||
|
|
||
|
nsIdsDetectPingOfDeath OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Ping of Death."
|
||
|
::= { nsIdsProtectSetEntry 2 }
|
||
|
|
||
|
nsIdsDetectTearDrop OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Tear Drop Attack."
|
||
|
::= { nsIdsProtectSetEntry 3 }
|
||
|
|
||
|
nsIdsDetectWinNuke OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Win Nuke Attack."
|
||
|
::= { nsIdsProtectSetEntry 4 }
|
||
|
|
||
|
nsIdsFilterIpSrcRoute OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Filter IP Source Route Option attack."
|
||
|
::= { nsIdsProtectSetEntry 5 }
|
||
|
|
||
|
nsIdsDetectPortScan OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Port Scan Death attack."
|
||
|
::= { nsIdsProtectSetEntry 6 }
|
||
|
|
||
|
nsIdsDetectAddrSweep OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Address Sweep Attack."
|
||
|
::= { nsIdsProtectSetEntry 7 }
|
||
|
|
||
|
nsIdsDetectLand OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Land Attack."
|
||
|
::= { nsIdsProtectSetEntry 8 }
|
||
|
|
||
|
nsIdsBlockComponent OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Block Java/ActiveX/ZIP/EXE Component."
|
||
|
::= { nsIdsProtectSetEntry 9 }
|
||
|
|
||
|
nsIdsDetectIpSpoof OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP Spoofing attack."
|
||
|
::= { nsIdsProtectSetEntry 10 }
|
||
|
|
||
|
nsIdsDetectSyn OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect SYN attack."
|
||
|
::= { nsIdsProtectSetEntry 11 }
|
||
|
|
||
|
nsIdsDetectIcmpFlood OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect ICMP Flood attack."
|
||
|
::= { nsIdsProtectSetEntry 12 }
|
||
|
|
||
|
nsIdsDetectUdpFlood OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect UDP Flood attack."
|
||
|
::= { nsIdsProtectSetEntry 13 }
|
||
|
|
||
|
nsIdsDetectSynFrag OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect SYN fragment"
|
||
|
::= { nsIdsProtectSetEntry 14 }
|
||
|
|
||
|
nsIdsDetectTcpNoFlag OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect TCP without flag set."
|
||
|
::= { nsIdsProtectSetEntry 15 }
|
||
|
|
||
|
nsIdsDetectIpUnknownProt OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Unknown protocol IP packet."
|
||
|
::= { nsIdsProtectSetEntry 16 }
|
||
|
|
||
|
nsIdsDetectIpOptBad OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP bad option."
|
||
|
::= { nsIdsProtectSetEntry 17 }
|
||
|
|
||
|
nsIdsDetectIpOptRecord OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP record option."
|
||
|
::= { nsIdsProtectSetEntry 18 }
|
||
|
|
||
|
nsIdsDetectIpOptTimestamp OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP timestamp option."
|
||
|
::= { nsIdsProtectSetEntry 19 }
|
||
|
|
||
|
nsIdsDetectIpOptSCHT OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP security option."
|
||
|
::= { nsIdsProtectSetEntry 20 }
|
||
|
|
||
|
nsIdsDetectIpOptLSR OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Loose source route."
|
||
|
::= { nsIdsProtectSetEntry 21 }
|
||
|
|
||
|
nsIdsDetectIpOptSSR OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect strict source route."
|
||
|
::= { nsIdsProtectSetEntry 22 }
|
||
|
|
||
|
nsIdsDetectIpOptStream OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP stream option."
|
||
|
::= { nsIdsProtectSetEntry 23 }
|
||
|
|
||
|
nsIdsDetectIcmpFrag OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect ICMP fragment."
|
||
|
::= { nsIdsProtectSetEntry 24 }
|
||
|
|
||
|
nsIdsDetectIcmpLarge OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect large ICMP packet."
|
||
|
::= { nsIdsProtectSetEntry 25 }
|
||
|
|
||
|
nsIdsDetectTcpSynFin OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect TCP syn fin both set."
|
||
|
::= { nsIdsProtectSetEntry 26 }
|
||
|
|
||
|
nsIdsDetectTcpFinNoAck OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect TCP fin set without ack bit set."
|
||
|
::= { nsIdsProtectSetEntry 27 }
|
||
|
|
||
|
nsIdsHttpMalUrl OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect malicious URL."
|
||
|
::= { nsIdsProtectSetEntry 28 }
|
||
|
|
||
|
nsIdsSessMalNum OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect malicious session connection."
|
||
|
::= { nsIdsProtectSetEntry 29 }
|
||
|
|
||
|
nsIdsDetectSynAckAck OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect SYN ACK ACK DoS."
|
||
|
::= { nsIdsProtectSetEntry 30 }
|
||
|
|
||
|
nsIdsDetectIpFrag OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
disable(0),
|
||
|
enabled(1)
|
||
|
}
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Block IP fragment packet."
|
||
|
::= { nsIdsProtectSetEntry 31 }
|
||
|
|
||
|
nsIdsProtectThreshTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF NsIdsProtectThreshEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"NetScreen ScreenOS can allow DI protection on each of
|
||
|
NetScreen device's physical interface. This table collects the
|
||
|
DI protection configuration on each physical interface."
|
||
|
::= { nsIdsProtect 2 }
|
||
|
|
||
|
nsIdsProtectThreshEntry OBJECT-TYPE
|
||
|
SYNTAX NsIdsProtectThreshEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Hold the DI setting attribute."
|
||
|
INDEX
|
||
|
{ nsIdsProtectThreshZoneIdx }
|
||
|
::= { nsIdsProtectThreshTable 1 }
|
||
|
|
||
|
nsIdsProtectThreshZoneIdx OBJECT-TYPE
|
||
|
SYNTAX Integer32 (0..2147483647)
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"unique zone id."
|
||
|
::= { nsIdsProtectThreshEntry 1 }
|
||
|
|
||
|
nsIdsSynAttackThresh OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SYN attack threshold."
|
||
|
::= { nsIdsProtectThreshEntry 2 }
|
||
|
|
||
|
nsIdsSynAttackTimeout OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SYN attack timeout."
|
||
|
::= { nsIdsProtectThreshEntry 3 }
|
||
|
|
||
|
nsIdsSynAttackAlmTh OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SYN attack alarm threshold."
|
||
|
::= { nsIdsProtectThreshEntry 4 }
|
||
|
|
||
|
nsIdsSynAttackQueSize OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SYN attack queue size."
|
||
|
::= { nsIdsProtectThreshEntry 5 }
|
||
|
|
||
|
nsIdsSynAttackAgeTime OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SYN flood age time."
|
||
|
::= { nsIdsProtectThreshEntry 6 }
|
||
|
|
||
|
nsIdsIcmpFloodThresh OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"ICMP attack alarm threshold."
|
||
|
::= { nsIdsProtectThreshEntry 7 }
|
||
|
|
||
|
nsIdsUdpFloodThresh OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"UDP attack alarm threshold."
|
||
|
::= { nsIdsProtectThreshEntry 8 }
|
||
|
|
||
|
nsIdsPortScanThresh OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"ICMP attack alarm threshold."
|
||
|
::= { nsIdsProtectThreshEntry 9 }
|
||
|
|
||
|
nsIdsIpSweepThresh OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"UDP attack alarm threshold."
|
||
|
::= { nsIdsProtectThreshEntry 10 }
|
||
|
|
||
|
nsIdsSynAckAckThres OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SYN ack ack alarm threshold."
|
||
|
::= { nsIdsProtectThreshEntry 11 }
|
||
|
|
||
|
nsIdsAttkMonTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF NsIdsAttkMonEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The table monitors the intrusion attack attemps amount to
|
||
|
NetScreen Device."
|
||
|
::= { netscreenIDS 2 }
|
||
|
|
||
|
nsIdsAttkMonEntry OBJECT-TYPE
|
||
|
SYNTAX NsIdsAttkMonEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"An entry containing intrusion attack couters."
|
||
|
INDEX
|
||
|
{ nsIdsAttkMonIfIdx }
|
||
|
::= { nsIdsAttkMonTable 1 }
|
||
|
|
||
|
nsIdsAttkMonIfIdx OBJECT-TYPE
|
||
|
SYNTAX Integer32 (0..2147483647)
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"unique interface id."
|
||
|
::= { nsIdsAttkMonEntry 1 }
|
||
|
|
||
|
nsIdsAttkMonVsys OBJECT-TYPE
|
||
|
SYNTAX Integer32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"according NetScreen's concepts. each interface belongs to one
|
||
|
virtual system. This attribute displays the virtual system name
|
||
|
an interface belongs to."
|
||
|
::= { nsIdsAttkMonEntry 2 }
|
||
|
|
||
|
nsIdsAttkMonSynAttk OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"sync attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 3 }
|
||
|
|
||
|
nsIdsAttkMonTearDrop OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"tear drop attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 4 }
|
||
|
|
||
|
nsIdsAttkMonSrcRoute OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"source route option attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 5 }
|
||
|
|
||
|
nsIdsAttkMonPingDeath OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"ping of death attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 6 }
|
||
|
|
||
|
nsIdsAttkMonAddrSpoof OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"address spoofing attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 7 }
|
||
|
|
||
|
nsIdsAttkMonLand OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"land attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 8 }
|
||
|
|
||
|
nsIdsAttkMonIcmpFlood OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"ICMP flood attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 9 }
|
||
|
|
||
|
nsIdsAttkMonUdpFlood OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"udp flood attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 10 }
|
||
|
|
||
|
nsIdsAttkMonWinnuke OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"weired netbios attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 11 }
|
||
|
|
||
|
nsIdsAttkMonPortScan OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"port scan attempt attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 12 }
|
||
|
|
||
|
nsIdsAttkMonIpSweep OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"address sweep attemp attack packet counter."
|
||
|
::= { nsIdsAttkMonEntry 13 }
|
||
|
|
||
|
nsAttkMonSynFrag OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect SYN fragment"
|
||
|
::= { nsIdsAttkMonEntry 14 }
|
||
|
|
||
|
nsAttkMonTcpNoFlag OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect TCP without flag set."
|
||
|
::= { nsIdsAttkMonEntry 15 }
|
||
|
|
||
|
nsAttkMonIpUnknownProt OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Unknown protocol IP packet."
|
||
|
::= { nsIdsAttkMonEntry 16 }
|
||
|
|
||
|
nsAttkMonIpOptBad OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP bad option."
|
||
|
::= { nsIdsAttkMonEntry 17 }
|
||
|
|
||
|
nsAttkMonIpOptRecord OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP record option."
|
||
|
::= { nsIdsAttkMonEntry 18 }
|
||
|
|
||
|
nsAttkMonIpOptTimestamp OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP timestamp option."
|
||
|
::= { nsIdsAttkMonEntry 19 }
|
||
|
|
||
|
nsAttkMonIpOptSCHT OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP security option."
|
||
|
::= { nsIdsAttkMonEntry 20 }
|
||
|
|
||
|
nsAttkMonIpOptLSR OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect Loose source route."
|
||
|
::= { nsIdsAttkMonEntry 21 }
|
||
|
|
||
|
nsAttkMonIpOptSSR OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect strict source route."
|
||
|
::= { nsIdsAttkMonEntry 22 }
|
||
|
|
||
|
nsAttkMonIpOptStream OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect IP stream option."
|
||
|
::= { nsIdsAttkMonEntry 23 }
|
||
|
|
||
|
nsAttkMonIcmpFrag OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect ICMP fragment."
|
||
|
::= { nsIdsAttkMonEntry 24 }
|
||
|
|
||
|
nsAttkMonIcmpLarge OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect large ICMP packet."
|
||
|
::= { nsIdsAttkMonEntry 25 }
|
||
|
|
||
|
nsAttkMonTcpSynFin OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect TCP syn fin both set."
|
||
|
::= { nsIdsAttkMonEntry 26 }
|
||
|
|
||
|
nsAttkMonTcpFinNoAck OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect TCP fin set without ack bit set."
|
||
|
::= { nsIdsAttkMonEntry 27 }
|
||
|
|
||
|
nsAttkMonHttpMalUrl OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect malicious URL."
|
||
|
::= { nsIdsAttkMonEntry 28 }
|
||
|
|
||
|
nsAttkMonSessMalNum OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect malicious session connection."
|
||
|
::= { nsIdsAttkMonEntry 29 }
|
||
|
|
||
|
nsAttkMonSynAckAck OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Detect SYN ACK ACK attack."
|
||
|
::= { nsIdsAttkMonEntry 30 }
|
||
|
|
||
|
nsAttkMonIpFrag OBJECT-TYPE
|
||
|
SYNTAX Counter32
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Block IP fragment packet."
|
||
|
::= { nsIdsAttkMonEntry 31 }
|
||
|
|
||
|
nsIdsAttkMonIfInfo OBJECT-TYPE
|
||
|
SYNTAX Integer32 (0..2147483647)
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Internal id assigned to this interface. Stays persistent across resets."
|
||
|
::= { nsIdsAttkMonEntry 32 }
|
||
|
|
||
|
END
|
||
|
|
||
|
|