mibs/MIBS/screenos/NETSCREEN-IDS-MIB
2023-12-05 12:25:34 +01:00

881 lines
22 KiB
Plaintext

-- This module defines enterprise MIBs DI Setting.
--
-- Copyright (c) 1999-2004, Juniper Networks, Inc.
-- All rights reserved.
NETSCREEN-IDS-MIB DEFINITIONS ::= BEGIN
IMPORTS
netscreenIDS
FROM NETSCREEN-SMI
Counter32, Integer32, MODULE-IDENTITY, OBJECT-TYPE
FROM SNMPv2-SMI
;
nsIdsProtect MODULE-IDENTITY
LAST-UPDATED "200405032022Z" -- May 03, 2004
ORGANIZATION
"Juniper Networks, Inc."
CONTACT-INFO
"Customer Support
1194 North Mathilda Avenue
Sunnyvale, California 94089-1206
USA
Tel: 1-800-638-8296
E-mail: customerservice@juniper.net
HTTP://www.juniper.net"
DESCRIPTION
"This module defines NetScreen private MIBs DI Setting."
REVISION "200405030000Z" -- May 03, 2004
DESCRIPTION
"Modified copyright and contact information"
REVISION "200403030000Z" -- March 03, 2004
DESCRIPTION
"Converted to SMIv2 by Longview Software"
REVISION "200204260000Z" -- April 26, 2002
DESCRIPTION
"Screen option on zone setting, add new screen option (Zhong
Wang)"
REVISION "200109280000Z" -- September 28, 2001
DESCRIPTION
"No Comment"
REVISION "200101080000Z" -- January 08, 2001
DESCRIPTION
"Creation Date"
::= { netscreenIDS 1 }
NsIdsAttkMonEntry ::= SEQUENCE
{
nsIdsAttkMonIfIdx Integer32,
nsIdsAttkMonVsys Integer32,
nsIdsAttkMonSynAttk Counter32,
nsIdsAttkMonTearDrop Counter32,
nsIdsAttkMonSrcRoute Counter32,
nsIdsAttkMonPingDeath Counter32,
nsIdsAttkMonAddrSpoof Counter32,
nsIdsAttkMonLand Counter32,
nsIdsAttkMonIcmpFlood Counter32,
nsIdsAttkMonUdpFlood Counter32,
nsIdsAttkMonWinnuke Counter32,
nsIdsAttkMonPortScan Counter32,
nsIdsAttkMonIpSweep Counter32,
nsAttkMonSynFrag Counter32,
nsAttkMonTcpNoFlag Counter32,
nsAttkMonIpUnknownProt Counter32,
nsAttkMonIpOptBad Counter32,
nsAttkMonIpOptRecord Counter32,
nsAttkMonIpOptTimestamp Counter32,
nsAttkMonIpOptSCHT Counter32,
nsAttkMonIpOptLSR Counter32,
nsAttkMonIpOptSSR Counter32,
nsAttkMonIpOptStream Counter32,
nsAttkMonIcmpFrag Counter32,
nsAttkMonIcmpLarge Counter32,
nsAttkMonTcpSynFin Counter32,
nsAttkMonTcpFinNoAck Counter32,
nsAttkMonHttpMalUrl Counter32,
nsAttkMonSessMalNum Counter32,
nsAttkMonSynAckAck Counter32,
nsAttkMonIpFrag Counter32,
nsIdsAttkMonIfInfo Integer32
}
NsIdsProtectSetEntry ::= SEQUENCE
{
nsIdsProtectZoneIdx Integer32,
nsIdsDetectPingOfDeath INTEGER,
nsIdsDetectTearDrop INTEGER,
nsIdsDetectWinNuke INTEGER,
nsIdsFilterIpSrcRoute INTEGER,
nsIdsDetectPortScan INTEGER,
nsIdsDetectAddrSweep INTEGER,
nsIdsDetectLand INTEGER,
nsIdsBlockComponent INTEGER,
nsIdsDetectIpSpoof INTEGER,
nsIdsDetectSyn INTEGER,
nsIdsDetectIcmpFlood INTEGER,
nsIdsDetectUdpFlood INTEGER,
nsIdsDetectSynFrag INTEGER,
nsIdsDetectTcpNoFlag INTEGER,
nsIdsDetectIpUnknownProt INTEGER,
nsIdsDetectIpOptBad INTEGER,
nsIdsDetectIpOptRecord INTEGER,
nsIdsDetectIpOptTimestamp INTEGER,
nsIdsDetectIpOptSCHT INTEGER,
nsIdsDetectIpOptLSR INTEGER,
nsIdsDetectIpOptSSR INTEGER,
nsIdsDetectIpOptStream INTEGER,
nsIdsDetectIcmpFrag INTEGER,
nsIdsDetectIcmpLarge INTEGER,
nsIdsDetectTcpSynFin INTEGER,
nsIdsDetectTcpFinNoAck INTEGER,
nsIdsHttpMalUrl INTEGER,
nsIdsSessMalNum INTEGER,
nsIdsDetectSynAckAck INTEGER,
nsIdsDetectIpFrag INTEGER
}
NsIdsProtectThreshEntry ::= SEQUENCE
{
nsIdsProtectThreshZoneIdx Integer32,
nsIdsSynAttackThresh Integer32,
nsIdsSynAttackTimeout Integer32,
nsIdsSynAttackAlmTh Integer32,
nsIdsSynAttackQueSize Integer32,
nsIdsSynAttackAgeTime Integer32,
nsIdsIcmpFloodThresh Integer32,
nsIdsUdpFloodThresh Integer32,
nsIdsPortScanThresh Integer32,
nsIdsIpSweepThresh Integer32,
nsIdsSynAckAckThres Integer32
}
nsIdsProtectSetTable OBJECT-TYPE
SYNTAX SEQUENCE OF NsIdsProtectSetEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"NetScreen ScreenOS can allow DI protection on each of
NetScreen device's physical interface. This table collects the
DI protection configuration on each physical interface."
::= { nsIdsProtect 1 }
nsIdsProtectSetEntry OBJECT-TYPE
SYNTAX NsIdsProtectSetEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Hold the DI setting attribute."
INDEX
{ nsIdsProtectZoneIdx }
::= { nsIdsProtectSetTable 1 }
nsIdsProtectZoneIdx OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"unique zone id."
::= { nsIdsProtectSetEntry 1 }
nsIdsDetectPingOfDeath OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Ping of Death."
::= { nsIdsProtectSetEntry 2 }
nsIdsDetectTearDrop OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Tear Drop Attack."
::= { nsIdsProtectSetEntry 3 }
nsIdsDetectWinNuke OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Win Nuke Attack."
::= { nsIdsProtectSetEntry 4 }
nsIdsFilterIpSrcRoute OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Filter IP Source Route Option attack."
::= { nsIdsProtectSetEntry 5 }
nsIdsDetectPortScan OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Port Scan Death attack."
::= { nsIdsProtectSetEntry 6 }
nsIdsDetectAddrSweep OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Address Sweep Attack."
::= { nsIdsProtectSetEntry 7 }
nsIdsDetectLand OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Land Attack."
::= { nsIdsProtectSetEntry 8 }
nsIdsBlockComponent OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Block Java/ActiveX/ZIP/EXE Component."
::= { nsIdsProtectSetEntry 9 }
nsIdsDetectIpSpoof OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP Spoofing attack."
::= { nsIdsProtectSetEntry 10 }
nsIdsDetectSyn OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect SYN attack."
::= { nsIdsProtectSetEntry 11 }
nsIdsDetectIcmpFlood OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect ICMP Flood attack."
::= { nsIdsProtectSetEntry 12 }
nsIdsDetectUdpFlood OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect UDP Flood attack."
::= { nsIdsProtectSetEntry 13 }
nsIdsDetectSynFrag OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect SYN fragment"
::= { nsIdsProtectSetEntry 14 }
nsIdsDetectTcpNoFlag OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect TCP without flag set."
::= { nsIdsProtectSetEntry 15 }
nsIdsDetectIpUnknownProt OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Unknown protocol IP packet."
::= { nsIdsProtectSetEntry 16 }
nsIdsDetectIpOptBad OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP bad option."
::= { nsIdsProtectSetEntry 17 }
nsIdsDetectIpOptRecord OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP record option."
::= { nsIdsProtectSetEntry 18 }
nsIdsDetectIpOptTimestamp OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP timestamp option."
::= { nsIdsProtectSetEntry 19 }
nsIdsDetectIpOptSCHT OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP security option."
::= { nsIdsProtectSetEntry 20 }
nsIdsDetectIpOptLSR OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Loose source route."
::= { nsIdsProtectSetEntry 21 }
nsIdsDetectIpOptSSR OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect strict source route."
::= { nsIdsProtectSetEntry 22 }
nsIdsDetectIpOptStream OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP stream option."
::= { nsIdsProtectSetEntry 23 }
nsIdsDetectIcmpFrag OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect ICMP fragment."
::= { nsIdsProtectSetEntry 24 }
nsIdsDetectIcmpLarge OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect large ICMP packet."
::= { nsIdsProtectSetEntry 25 }
nsIdsDetectTcpSynFin OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect TCP syn fin both set."
::= { nsIdsProtectSetEntry 26 }
nsIdsDetectTcpFinNoAck OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect TCP fin set without ack bit set."
::= { nsIdsProtectSetEntry 27 }
nsIdsHttpMalUrl OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect malicious URL."
::= { nsIdsProtectSetEntry 28 }
nsIdsSessMalNum OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect malicious session connection."
::= { nsIdsProtectSetEntry 29 }
nsIdsDetectSynAckAck OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect SYN ACK ACK DoS."
::= { nsIdsProtectSetEntry 30 }
nsIdsDetectIpFrag OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Block IP fragment packet."
::= { nsIdsProtectSetEntry 31 }
nsIdsProtectThreshTable OBJECT-TYPE
SYNTAX SEQUENCE OF NsIdsProtectThreshEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"NetScreen ScreenOS can allow DI protection on each of
NetScreen device's physical interface. This table collects the
DI protection configuration on each physical interface."
::= { nsIdsProtect 2 }
nsIdsProtectThreshEntry OBJECT-TYPE
SYNTAX NsIdsProtectThreshEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Hold the DI setting attribute."
INDEX
{ nsIdsProtectThreshZoneIdx }
::= { nsIdsProtectThreshTable 1 }
nsIdsProtectThreshZoneIdx OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"unique zone id."
::= { nsIdsProtectThreshEntry 1 }
nsIdsSynAttackThresh OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"SYN attack threshold."
::= { nsIdsProtectThreshEntry 2 }
nsIdsSynAttackTimeout OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"SYN attack timeout."
::= { nsIdsProtectThreshEntry 3 }
nsIdsSynAttackAlmTh OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"SYN attack alarm threshold."
::= { nsIdsProtectThreshEntry 4 }
nsIdsSynAttackQueSize OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"SYN attack queue size."
::= { nsIdsProtectThreshEntry 5 }
nsIdsSynAttackAgeTime OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"SYN flood age time."
::= { nsIdsProtectThreshEntry 6 }
nsIdsIcmpFloodThresh OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"ICMP attack alarm threshold."
::= { nsIdsProtectThreshEntry 7 }
nsIdsUdpFloodThresh OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"UDP attack alarm threshold."
::= { nsIdsProtectThreshEntry 8 }
nsIdsPortScanThresh OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"ICMP attack alarm threshold."
::= { nsIdsProtectThreshEntry 9 }
nsIdsIpSweepThresh OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"UDP attack alarm threshold."
::= { nsIdsProtectThreshEntry 10 }
nsIdsSynAckAckThres OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"SYN ack ack alarm threshold."
::= { nsIdsProtectThreshEntry 11 }
nsIdsAttkMonTable OBJECT-TYPE
SYNTAX SEQUENCE OF NsIdsAttkMonEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"The table monitors the intrusion attack attemps amount to
NetScreen Device."
::= { netscreenIDS 2 }
nsIdsAttkMonEntry OBJECT-TYPE
SYNTAX NsIdsAttkMonEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"An entry containing intrusion attack couters."
INDEX
{ nsIdsAttkMonIfIdx }
::= { nsIdsAttkMonTable 1 }
nsIdsAttkMonIfIdx OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"unique interface id."
::= { nsIdsAttkMonEntry 1 }
nsIdsAttkMonVsys OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"according NetScreen's concepts. each interface belongs to one
virtual system. This attribute displays the virtual system name
an interface belongs to."
::= { nsIdsAttkMonEntry 2 }
nsIdsAttkMonSynAttk OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"sync attack packet counter."
::= { nsIdsAttkMonEntry 3 }
nsIdsAttkMonTearDrop OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"tear drop attack packet counter."
::= { nsIdsAttkMonEntry 4 }
nsIdsAttkMonSrcRoute OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"source route option attack packet counter."
::= { nsIdsAttkMonEntry 5 }
nsIdsAttkMonPingDeath OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"ping of death attack packet counter."
::= { nsIdsAttkMonEntry 6 }
nsIdsAttkMonAddrSpoof OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"address spoofing attack packet counter."
::= { nsIdsAttkMonEntry 7 }
nsIdsAttkMonLand OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"land attack packet counter."
::= { nsIdsAttkMonEntry 8 }
nsIdsAttkMonIcmpFlood OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"ICMP flood attack packet counter."
::= { nsIdsAttkMonEntry 9 }
nsIdsAttkMonUdpFlood OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"udp flood attack packet counter."
::= { nsIdsAttkMonEntry 10 }
nsIdsAttkMonWinnuke OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"weired netbios attack packet counter."
::= { nsIdsAttkMonEntry 11 }
nsIdsAttkMonPortScan OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"port scan attempt attack packet counter."
::= { nsIdsAttkMonEntry 12 }
nsIdsAttkMonIpSweep OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"address sweep attemp attack packet counter."
::= { nsIdsAttkMonEntry 13 }
nsAttkMonSynFrag OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect SYN fragment"
::= { nsIdsAttkMonEntry 14 }
nsAttkMonTcpNoFlag OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect TCP without flag set."
::= { nsIdsAttkMonEntry 15 }
nsAttkMonIpUnknownProt OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Unknown protocol IP packet."
::= { nsIdsAttkMonEntry 16 }
nsAttkMonIpOptBad OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP bad option."
::= { nsIdsAttkMonEntry 17 }
nsAttkMonIpOptRecord OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP record option."
::= { nsIdsAttkMonEntry 18 }
nsAttkMonIpOptTimestamp OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP timestamp option."
::= { nsIdsAttkMonEntry 19 }
nsAttkMonIpOptSCHT OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP security option."
::= { nsIdsAttkMonEntry 20 }
nsAttkMonIpOptLSR OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect Loose source route."
::= { nsIdsAttkMonEntry 21 }
nsAttkMonIpOptSSR OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect strict source route."
::= { nsIdsAttkMonEntry 22 }
nsAttkMonIpOptStream OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect IP stream option."
::= { nsIdsAttkMonEntry 23 }
nsAttkMonIcmpFrag OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect ICMP fragment."
::= { nsIdsAttkMonEntry 24 }
nsAttkMonIcmpLarge OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect large ICMP packet."
::= { nsIdsAttkMonEntry 25 }
nsAttkMonTcpSynFin OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect TCP syn fin both set."
::= { nsIdsAttkMonEntry 26 }
nsAttkMonTcpFinNoAck OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect TCP fin set without ack bit set."
::= { nsIdsAttkMonEntry 27 }
nsAttkMonHttpMalUrl OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect malicious URL."
::= { nsIdsAttkMonEntry 28 }
nsAttkMonSessMalNum OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect malicious session connection."
::= { nsIdsAttkMonEntry 29 }
nsAttkMonSynAckAck OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Detect SYN ACK ACK attack."
::= { nsIdsAttkMonEntry 30 }
nsAttkMonIpFrag OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Block IP fragment packet."
::= { nsIdsAttkMonEntry 31 }
nsIdsAttkMonIfInfo OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Internal id assigned to this interface. Stays persistent across resets."
::= { nsIdsAttkMonEntry 32 }
END