Initial commit
This commit is contained in:
419
MIBS/allied/AT-DOS-MIB
Normal file
419
MIBS/allied/AT-DOS-MIB
Normal file
@ -0,0 +1,419 @@
|
||||
--
|
||||
-- at-dos.mib
|
||||
-- MIB generated by MG-SOFT Visual MIB Builder Version 3.0 Build 285
|
||||
-- Wednesday, May 07, 2008 at 15:39:48
|
||||
--
|
||||
|
||||
AT-DOS-MIB DEFINITIONS ::= BEGIN
|
||||
|
||||
IMPORTS
|
||||
modules
|
||||
FROM AT-SMI-MIB
|
||||
IpAddress, Counter32, BITS, OBJECT-TYPE, MODULE-IDENTITY,
|
||||
NOTIFICATION-TYPE
|
||||
FROM SNMPv2-SMI
|
||||
TruthValue
|
||||
FROM SNMPv2-TC;
|
||||
|
||||
|
||||
-- ============================================================================
|
||||
-- AT-DOS.MIB, Allied Telesis enterprise MIB: Denial of Service defense
|
||||
--
|
||||
-- Copyright (c) 2008 by Allied Telesis, Inc.
|
||||
-- All rights reserved.
|
||||
--
|
||||
-- ============================================================================
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143
|
||||
dosDefense MODULE-IDENTITY
|
||||
LAST-UPDATED "200804291125Z" -- April 29, 2008 at 11:25 GMT
|
||||
ORGANIZATION
|
||||
"Allied Telesis, Inc"
|
||||
CONTACT-INFO
|
||||
"http://www.alliedtelesis.com"
|
||||
DESCRIPTION
|
||||
"The Denial of Service defense MIB for managing
|
||||
defenses against denial of service attacks.
|
||||
"
|
||||
::= { modules 143 }
|
||||
--
|
||||
--
|
||||
-- -- -----------------------------------
|
||||
-- -- Global Settings
|
||||
-- -- -----------------------------------
|
||||
|
||||
|
||||
|
||||
--
|
||||
-- Node definitions
|
||||
--
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.1
|
||||
dosDefenseStatus OBJECT-TYPE
|
||||
SYNTAX INTEGER
|
||||
{
|
||||
enabled(1),
|
||||
disabled(2)
|
||||
}
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"Whether or not the DoS defense module is
|
||||
currently enabled"
|
||||
::= { dosDefense 1 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.2
|
||||
dosDefenseDebugMode OBJECT-TYPE
|
||||
SYNTAX BITS
|
||||
{
|
||||
none(0),
|
||||
packet(1),
|
||||
attack(2),
|
||||
packet/attack(3),
|
||||
diagnostics(4),
|
||||
packet/diagnostics(5),
|
||||
attack/diagnostics(6),
|
||||
packet/attack/diagnostics(7)
|
||||
}
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The debugging options enabled for DoS defense. Output goes
|
||||
to the asynchronous port or telnet session that enabled
|
||||
debugging.
|
||||
|
||||
The bit 'None(0)' indicates that no debugging is enabled.
|
||||
|
||||
The bit 'Attack(1)' indicates that information about the
|
||||
start and finish of attacks is displayed.
|
||||
|
||||
The bit 'Packet(2)' indicates that a hexadecimal dump of
|
||||
the IP header of all suspect packets is displayed.
|
||||
|
||||
The bit 'Diagnostics(3)' indicates that additional
|
||||
debugging and diagnostic messages may be displayed."
|
||||
::= { dosDefense 2 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.3
|
||||
dosDefenseNumDebugPackets OBJECT-TYPE
|
||||
SYNTAX INTEGER { continuous(0) }
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"When packet debugging is enabled, this is the maximum
|
||||
number of packets that will be displayed before debugging
|
||||
is automatically disabled. A value of 0 means no limit
|
||||
(i.e. continuous)."
|
||||
::= { dosDefense 3 }
|
||||
|
||||
|
||||
-- ----------------------------------------------------------
|
||||
-- The DoS Defense Table
|
||||
--
|
||||
-- Each row of the table contains the configuration for the
|
||||
-- defense against one attack type on one port.
|
||||
-- ----------------------------------------------------------
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4
|
||||
dosDefenseTable OBJECT-TYPE
|
||||
SYNTAX SEQUENCE OF DosDefenseEntry
|
||||
MAX-ACCESS not-accessible
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"A table of configuration and status information for
|
||||
each defense configured on a port."
|
||||
::= { dosDefense 4 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1
|
||||
dosDefenseEntry OBJECT-TYPE
|
||||
SYNTAX DosDefenseEntry
|
||||
MAX-ACCESS not-accessible
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The configuration and status of the defense against
|
||||
a single attack type on a single port."
|
||||
INDEX { dosDefensePort, dosDefenseAttackType }
|
||||
::= { dosDefenseTable 1 }
|
||||
|
||||
|
||||
DosDefenseEntry ::=
|
||||
SEQUENCE {
|
||||
dosDefensePort
|
||||
INTEGER,
|
||||
dosDefenseAttackType
|
||||
INTEGER,
|
||||
dosDefenseDefenseStatus
|
||||
INTEGER,
|
||||
dosDefenseThreshold
|
||||
INTEGER,
|
||||
dosDefenseBlockTime
|
||||
INTEGER,
|
||||
dosDefenseMirroring
|
||||
TruthValue,
|
||||
dosDefensePortType
|
||||
INTEGER,
|
||||
dosDefenseSubnetAddress
|
||||
IpAddress,
|
||||
dosDefenseSubnetMask
|
||||
IpAddress,
|
||||
dosDefenseAttackState
|
||||
INTEGER,
|
||||
dosDefenseAttackCount
|
||||
Counter32,
|
||||
dosDefenseRemainingBlockTime
|
||||
INTEGER
|
||||
}
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.1
|
||||
dosDefensePort OBJECT-TYPE
|
||||
SYNTAX INTEGER (1..1023)
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The port index on which the defense is configured."
|
||||
::= { dosDefenseEntry 1 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.2
|
||||
dosDefenseAttackType OBJECT-TYPE
|
||||
SYNTAX INTEGER
|
||||
{
|
||||
synFlood(1),
|
||||
pingOfDeath(2),
|
||||
smurf(3),
|
||||
ipOptions(4),
|
||||
land(5),
|
||||
teardrop(6),
|
||||
none(7)
|
||||
}
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The type of attack this defense protects against."
|
||||
::= { dosDefenseEntry 2 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.3
|
||||
dosDefenseDefenseStatus OBJECT-TYPE
|
||||
SYNTAX INTEGER
|
||||
{
|
||||
enabled(1),
|
||||
disabled(2),
|
||||
set(3)
|
||||
}
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"Whether or not this attack is currently enabled
|
||||
on this port."
|
||||
::= { dosDefenseEntry 3 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.4
|
||||
dosDefenseThreshold OBJECT-TYPE
|
||||
SYNTAX INTEGER (0..1023)
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The threshold, in packets per second, at which an
|
||||
attack is deemed to be in progress.
|
||||
|
||||
If dosDefenseAttackType is SYNFlood(1), a value of 0 means
|
||||
no threshold has been set and the default thresholds apply.
|
||||
An attack is suspected when the SYN:ACK ratio exceeds 2:1
|
||||
above 20 packets per second, in any one-second interval.
|
||||
An attack is in progress when the SYN:ACK ratio exceeds 3:1
|
||||
above 20 packets per second, in any one-second interval, or
|
||||
an attack is suspected more than once within a
|
||||
dosDefenseBlockTime interval.
|
||||
|
||||
If dosDefenseAttackType is Smurf(3), a value of 0 means
|
||||
the filter will block all broadcast ICMP requests.
|
||||
A threshold greater than 0 will block after that number of
|
||||
ICMP requests are received in a 1 second interval."
|
||||
::= { dosDefenseEntry 4 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.5
|
||||
dosDefenseBlockTime OBJECT-TYPE
|
||||
SYNTAX INTEGER (1..65535)
|
||||
UNITS "seconds"
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The time, in seconds, that must elapse after the last
|
||||
malicious packet is seen, before an attack is deemed
|
||||
to have finished and the port stops blocking traffic.
|
||||
|
||||
If dosDefenseAttackType is SYNFlood(1), it is also
|
||||
the maximum time an attack is suspected before it
|
||||
returns to a state of no attack."
|
||||
::= { dosDefenseEntry 5 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.6
|
||||
dosDefenseMirroring OBJECT-TYPE
|
||||
SYNTAX TruthValue
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"Whether or not suspect traffic received by this port
|
||||
is copied to the pre-configured mirror port."
|
||||
::= { dosDefenseEntry 6 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.7
|
||||
dosDefensePortType OBJECT-TYPE
|
||||
SYNTAX INTEGER
|
||||
{
|
||||
notApplicable(0),
|
||||
client(1),
|
||||
gateway(2)
|
||||
}
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"If dosDefenseAttackType is Land(6), the type of port.
|
||||
For other values of dosDefenseAttackType, this object
|
||||
returns notapplicable(0).
|
||||
|
||||
A device connected to a client(1) port should have an IP
|
||||
address in the local subnet, and be the original source or
|
||||
ultimate destination of packets transiting the network.
|
||||
Incoming packets should have a source address in the local
|
||||
subnet. Outgoing packets should have a destination address
|
||||
in the local subnet.
|
||||
|
||||
A gateway(2) port is connected directly to a gateway device
|
||||
attached to external networks. Apart from a small number of
|
||||
packets from the gateway device itself, all packets arriving
|
||||
at the gateway port should be from other subnets. Incoming
|
||||
packets should have a source address not in the local
|
||||
subnet. Outgoing packets should have a destination address
|
||||
not in the local subnet."
|
||||
::= { dosDefenseEntry 7 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.8
|
||||
dosDefenseSubnetAddress OBJECT-TYPE
|
||||
SYNTAX IpAddress
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"If dosDefenseAttackType is Smurf(3), the subnet address
|
||||
is used to determine the local broadcast address.
|
||||
|
||||
If dosDefenseAttackType is Land(6), the subnet address
|
||||
used to determine which addresses are local or remote.
|
||||
|
||||
For other values of dosDefenseAttackType, this object
|
||||
returns 0.0.0.0."
|
||||
::= { dosDefenseEntry 8 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.9
|
||||
dosDefenseSubnetMask OBJECT-TYPE
|
||||
SYNTAX IpAddress
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"If dosDefenseAttackType is Smurf(3), the subnet mask
|
||||
is used to determine the local broadcast address.
|
||||
|
||||
If dosDefenseAttackType is Land(6), the subnet mask
|
||||
used to determine which addresses are local or remote.
|
||||
|
||||
For other values of dosDefenseAttackType, this object
|
||||
returns 0.0.0.0."
|
||||
::= { dosDefenseEntry 9 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.10
|
||||
dosDefenseAttackState OBJECT-TYPE
|
||||
SYNTAX INTEGER
|
||||
{
|
||||
none(0),
|
||||
suspected(1),
|
||||
inProgress(2)
|
||||
}
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"Whether or not an attack is currently in progress on the
|
||||
port.
|
||||
|
||||
None(0) means no attack is in progress.
|
||||
|
||||
If dosDefenseAttackType is SYNFlood(1), Suspected(1)
|
||||
means a SYN Flood attack is suspected. A threshold has
|
||||
not been set, and the default threshold of a SYN:ACK
|
||||
ratio of 2:1 above 20 packets per second has been
|
||||
reached.
|
||||
|
||||
If dosDefenseAttackType is PingOfDeath(2), Teardrop(5)
|
||||
or Land(6), Suspected means that some suspect packets
|
||||
have been received but have not yet been analysed to
|
||||
determine if an attack exists.
|
||||
|
||||
InProgress(2) means an attack is in progress."
|
||||
::= { dosDefenseEntry 10 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.11
|
||||
dosDefenseAttackCount OBJECT-TYPE
|
||||
SYNTAX Counter32
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The number of attacks (attacked seconds) detected
|
||||
on this port."
|
||||
::= { dosDefenseEntry 11 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.4.1.12
|
||||
dosDefenseRemainingBlockTime OBJECT-TYPE
|
||||
SYNTAX INTEGER (0..65535)
|
||||
UNITS "seconds"
|
||||
MAX-ACCESS read-only
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"The time remaining"
|
||||
::= { dosDefenseEntry 12 }
|
||||
|
||||
|
||||
-- -------------------------------------------
|
||||
-- DoS Attack Start and End traps
|
||||
-- -------------------------------------------
|
||||
--
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.5
|
||||
dosDefenseTraps OBJECT IDENTIFIER::= { dosDefense 5 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.5.1
|
||||
dosDefenseAttackStart NOTIFICATION-TYPE
|
||||
OBJECTS { dosDefensePort, dosDefenseAttackType }
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"Triggered when an attack is detected on a port."
|
||||
::= { dosDefenseTraps 1 }
|
||||
|
||||
|
||||
-- 1.3.6.1.4.1.207.8.4.4.4.143.5.2
|
||||
dosDefenseAttackEnd NOTIFICATION-TYPE
|
||||
OBJECTS { dosDefensePort, dosDefenseAttackType }
|
||||
STATUS current
|
||||
DESCRIPTION
|
||||
"Triggered when an attack is finished on a port.
|
||||
|
||||
This occurs after an attack packet has not been
|
||||
seen for a complete BlockTime period."
|
||||
::= { dosDefenseTraps 2 }
|
||||
|
||||
|
||||
|
||||
END
|
||||
|
||||
--
|
||||
-- at-dos.mib
|
||||
--
|
Reference in New Issue
Block a user