summaryrefslogtreecommitdiff
path: root/MIBS/screenos/NETSCREEN-IDS-MIB
diff options
context:
space:
mode:
authorDavid Leutgeb <david.leutgeb@mannundmouse.com>2023-12-05 12:25:34 +0100
committerDavid Leutgeb <david.leutgeb@mannundmouse.com>2023-12-05 12:25:34 +0100
commit98a672123c7872f6b9b75a9a2b6bb3aea504de6a (patch)
tree9b13bd7f563c3198047bd359195327cf28b3caf0 /MIBS/screenos/NETSCREEN-IDS-MIB
downloadmibs-main.tar.gz
mibs-main.zip
Initial commitHEADmain
Diffstat (limited to 'MIBS/screenos/NETSCREEN-IDS-MIB')
-rw-r--r--MIBS/screenos/NETSCREEN-IDS-MIB880
1 files changed, 880 insertions, 0 deletions
diff --git a/MIBS/screenos/NETSCREEN-IDS-MIB b/MIBS/screenos/NETSCREEN-IDS-MIB
new file mode 100644
index 0000000..9431c72
--- /dev/null
+++ b/MIBS/screenos/NETSCREEN-IDS-MIB
@@ -0,0 +1,880 @@
+-- This module defines enterprise MIBs DI Setting.
+--
+-- Copyright (c) 1999-2004, Juniper Networks, Inc.
+-- All rights reserved.
+
+NETSCREEN-IDS-MIB DEFINITIONS ::= BEGIN
+
+IMPORTS
+ netscreenIDS
+ FROM NETSCREEN-SMI
+ Counter32, Integer32, MODULE-IDENTITY, OBJECT-TYPE
+ FROM SNMPv2-SMI
+ ;
+
+nsIdsProtect MODULE-IDENTITY
+ LAST-UPDATED "200405032022Z" -- May 03, 2004
+ ORGANIZATION
+ "Juniper Networks, Inc."
+ CONTACT-INFO
+ "Customer Support
+
+ 1194 North Mathilda Avenue
+ Sunnyvale, California 94089-1206
+ USA
+
+ Tel: 1-800-638-8296
+ E-mail: customerservice@juniper.net
+ HTTP://www.juniper.net"
+ DESCRIPTION
+ "This module defines NetScreen private MIBs DI Setting."
+ REVISION "200405030000Z" -- May 03, 2004
+ DESCRIPTION
+ "Modified copyright and contact information"
+ REVISION "200403030000Z" -- March 03, 2004
+ DESCRIPTION
+ "Converted to SMIv2 by Longview Software"
+ REVISION "200204260000Z" -- April 26, 2002
+ DESCRIPTION
+ "Screen option on zone setting, add new screen option (Zhong
+ Wang)"
+ REVISION "200109280000Z" -- September 28, 2001
+ DESCRIPTION
+ "No Comment"
+ REVISION "200101080000Z" -- January 08, 2001
+ DESCRIPTION
+ "Creation Date"
+ ::= { netscreenIDS 1 }
+
+NsIdsAttkMonEntry ::= SEQUENCE
+{
+ nsIdsAttkMonIfIdx Integer32,
+ nsIdsAttkMonVsys Integer32,
+ nsIdsAttkMonSynAttk Counter32,
+ nsIdsAttkMonTearDrop Counter32,
+ nsIdsAttkMonSrcRoute Counter32,
+ nsIdsAttkMonPingDeath Counter32,
+ nsIdsAttkMonAddrSpoof Counter32,
+ nsIdsAttkMonLand Counter32,
+ nsIdsAttkMonIcmpFlood Counter32,
+ nsIdsAttkMonUdpFlood Counter32,
+ nsIdsAttkMonWinnuke Counter32,
+ nsIdsAttkMonPortScan Counter32,
+ nsIdsAttkMonIpSweep Counter32,
+ nsAttkMonSynFrag Counter32,
+ nsAttkMonTcpNoFlag Counter32,
+ nsAttkMonIpUnknownProt Counter32,
+ nsAttkMonIpOptBad Counter32,
+ nsAttkMonIpOptRecord Counter32,
+ nsAttkMonIpOptTimestamp Counter32,
+ nsAttkMonIpOptSCHT Counter32,
+ nsAttkMonIpOptLSR Counter32,
+ nsAttkMonIpOptSSR Counter32,
+ nsAttkMonIpOptStream Counter32,
+ nsAttkMonIcmpFrag Counter32,
+ nsAttkMonIcmpLarge Counter32,
+ nsAttkMonTcpSynFin Counter32,
+ nsAttkMonTcpFinNoAck Counter32,
+ nsAttkMonHttpMalUrl Counter32,
+ nsAttkMonSessMalNum Counter32,
+ nsAttkMonSynAckAck Counter32,
+ nsAttkMonIpFrag Counter32,
+ nsIdsAttkMonIfInfo Integer32
+}
+
+NsIdsProtectSetEntry ::= SEQUENCE
+{
+ nsIdsProtectZoneIdx Integer32,
+ nsIdsDetectPingOfDeath INTEGER,
+ nsIdsDetectTearDrop INTEGER,
+ nsIdsDetectWinNuke INTEGER,
+ nsIdsFilterIpSrcRoute INTEGER,
+ nsIdsDetectPortScan INTEGER,
+ nsIdsDetectAddrSweep INTEGER,
+ nsIdsDetectLand INTEGER,
+ nsIdsBlockComponent INTEGER,
+ nsIdsDetectIpSpoof INTEGER,
+ nsIdsDetectSyn INTEGER,
+ nsIdsDetectIcmpFlood INTEGER,
+ nsIdsDetectUdpFlood INTEGER,
+ nsIdsDetectSynFrag INTEGER,
+ nsIdsDetectTcpNoFlag INTEGER,
+ nsIdsDetectIpUnknownProt INTEGER,
+ nsIdsDetectIpOptBad INTEGER,
+ nsIdsDetectIpOptRecord INTEGER,
+ nsIdsDetectIpOptTimestamp INTEGER,
+ nsIdsDetectIpOptSCHT INTEGER,
+ nsIdsDetectIpOptLSR INTEGER,
+ nsIdsDetectIpOptSSR INTEGER,
+ nsIdsDetectIpOptStream INTEGER,
+ nsIdsDetectIcmpFrag INTEGER,
+ nsIdsDetectIcmpLarge INTEGER,
+ nsIdsDetectTcpSynFin INTEGER,
+ nsIdsDetectTcpFinNoAck INTEGER,
+ nsIdsHttpMalUrl INTEGER,
+ nsIdsSessMalNum INTEGER,
+ nsIdsDetectSynAckAck INTEGER,
+ nsIdsDetectIpFrag INTEGER
+}
+
+NsIdsProtectThreshEntry ::= SEQUENCE
+{
+ nsIdsProtectThreshZoneIdx Integer32,
+ nsIdsSynAttackThresh Integer32,
+ nsIdsSynAttackTimeout Integer32,
+ nsIdsSynAttackAlmTh Integer32,
+ nsIdsSynAttackQueSize Integer32,
+ nsIdsSynAttackAgeTime Integer32,
+ nsIdsIcmpFloodThresh Integer32,
+ nsIdsUdpFloodThresh Integer32,
+ nsIdsPortScanThresh Integer32,
+ nsIdsIpSweepThresh Integer32,
+ nsIdsSynAckAckThres Integer32
+}
+
+nsIdsProtectSetTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF NsIdsProtectSetEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "NetScreen ScreenOS can allow DI protection on each of
+ NetScreen device's physical interface. This table collects the
+ DI protection configuration on each physical interface."
+ ::= { nsIdsProtect 1 }
+
+nsIdsProtectSetEntry OBJECT-TYPE
+ SYNTAX NsIdsProtectSetEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "Hold the DI setting attribute."
+ INDEX
+ { nsIdsProtectZoneIdx }
+ ::= { nsIdsProtectSetTable 1 }
+
+nsIdsProtectZoneIdx OBJECT-TYPE
+ SYNTAX Integer32 (0..2147483647)
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "unique zone id."
+ ::= { nsIdsProtectSetEntry 1 }
+
+nsIdsDetectPingOfDeath OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Ping of Death."
+ ::= { nsIdsProtectSetEntry 2 }
+
+nsIdsDetectTearDrop OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Tear Drop Attack."
+ ::= { nsIdsProtectSetEntry 3 }
+
+nsIdsDetectWinNuke OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Win Nuke Attack."
+ ::= { nsIdsProtectSetEntry 4 }
+
+nsIdsFilterIpSrcRoute OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Filter IP Source Route Option attack."
+ ::= { nsIdsProtectSetEntry 5 }
+
+nsIdsDetectPortScan OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Port Scan Death attack."
+ ::= { nsIdsProtectSetEntry 6 }
+
+nsIdsDetectAddrSweep OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Address Sweep Attack."
+ ::= { nsIdsProtectSetEntry 7 }
+
+nsIdsDetectLand OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Land Attack."
+ ::= { nsIdsProtectSetEntry 8 }
+
+nsIdsBlockComponent OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Block Java/ActiveX/ZIP/EXE Component."
+ ::= { nsIdsProtectSetEntry 9 }
+
+nsIdsDetectIpSpoof OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP Spoofing attack."
+ ::= { nsIdsProtectSetEntry 10 }
+
+nsIdsDetectSyn OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect SYN attack."
+ ::= { nsIdsProtectSetEntry 11 }
+
+nsIdsDetectIcmpFlood OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect ICMP Flood attack."
+ ::= { nsIdsProtectSetEntry 12 }
+
+nsIdsDetectUdpFlood OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect UDP Flood attack."
+ ::= { nsIdsProtectSetEntry 13 }
+
+nsIdsDetectSynFrag OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect SYN fragment"
+ ::= { nsIdsProtectSetEntry 14 }
+
+nsIdsDetectTcpNoFlag OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect TCP without flag set."
+ ::= { nsIdsProtectSetEntry 15 }
+
+nsIdsDetectIpUnknownProt OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Unknown protocol IP packet."
+ ::= { nsIdsProtectSetEntry 16 }
+
+nsIdsDetectIpOptBad OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP bad option."
+ ::= { nsIdsProtectSetEntry 17 }
+
+nsIdsDetectIpOptRecord OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP record option."
+ ::= { nsIdsProtectSetEntry 18 }
+
+nsIdsDetectIpOptTimestamp OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP timestamp option."
+ ::= { nsIdsProtectSetEntry 19 }
+
+nsIdsDetectIpOptSCHT OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP security option."
+ ::= { nsIdsProtectSetEntry 20 }
+
+nsIdsDetectIpOptLSR OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Loose source route."
+ ::= { nsIdsProtectSetEntry 21 }
+
+nsIdsDetectIpOptSSR OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect strict source route."
+ ::= { nsIdsProtectSetEntry 22 }
+
+nsIdsDetectIpOptStream OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP stream option."
+ ::= { nsIdsProtectSetEntry 23 }
+
+nsIdsDetectIcmpFrag OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect ICMP fragment."
+ ::= { nsIdsProtectSetEntry 24 }
+
+nsIdsDetectIcmpLarge OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect large ICMP packet."
+ ::= { nsIdsProtectSetEntry 25 }
+
+nsIdsDetectTcpSynFin OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect TCP syn fin both set."
+ ::= { nsIdsProtectSetEntry 26 }
+
+nsIdsDetectTcpFinNoAck OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect TCP fin set without ack bit set."
+ ::= { nsIdsProtectSetEntry 27 }
+
+nsIdsHttpMalUrl OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect malicious URL."
+ ::= { nsIdsProtectSetEntry 28 }
+
+nsIdsSessMalNum OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect malicious session connection."
+ ::= { nsIdsProtectSetEntry 29 }
+
+nsIdsDetectSynAckAck OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect SYN ACK ACK DoS."
+ ::= { nsIdsProtectSetEntry 30 }
+
+nsIdsDetectIpFrag OBJECT-TYPE
+ SYNTAX INTEGER {
+ disable(0),
+ enabled(1)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Block IP fragment packet."
+ ::= { nsIdsProtectSetEntry 31 }
+
+nsIdsProtectThreshTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF NsIdsProtectThreshEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "NetScreen ScreenOS can allow DI protection on each of
+ NetScreen device's physical interface. This table collects the
+ DI protection configuration on each physical interface."
+ ::= { nsIdsProtect 2 }
+
+nsIdsProtectThreshEntry OBJECT-TYPE
+ SYNTAX NsIdsProtectThreshEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "Hold the DI setting attribute."
+ INDEX
+ { nsIdsProtectThreshZoneIdx }
+ ::= { nsIdsProtectThreshTable 1 }
+
+nsIdsProtectThreshZoneIdx OBJECT-TYPE
+ SYNTAX Integer32 (0..2147483647)
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "unique zone id."
+ ::= { nsIdsProtectThreshEntry 1 }
+
+nsIdsSynAttackThresh OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "SYN attack threshold."
+ ::= { nsIdsProtectThreshEntry 2 }
+
+nsIdsSynAttackTimeout OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "SYN attack timeout."
+ ::= { nsIdsProtectThreshEntry 3 }
+
+nsIdsSynAttackAlmTh OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "SYN attack alarm threshold."
+ ::= { nsIdsProtectThreshEntry 4 }
+
+nsIdsSynAttackQueSize OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "SYN attack queue size."
+ ::= { nsIdsProtectThreshEntry 5 }
+
+nsIdsSynAttackAgeTime OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "SYN flood age time."
+ ::= { nsIdsProtectThreshEntry 6 }
+
+nsIdsIcmpFloodThresh OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "ICMP attack alarm threshold."
+ ::= { nsIdsProtectThreshEntry 7 }
+
+nsIdsUdpFloodThresh OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "UDP attack alarm threshold."
+ ::= { nsIdsProtectThreshEntry 8 }
+
+nsIdsPortScanThresh OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "ICMP attack alarm threshold."
+ ::= { nsIdsProtectThreshEntry 9 }
+
+nsIdsIpSweepThresh OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "UDP attack alarm threshold."
+ ::= { nsIdsProtectThreshEntry 10 }
+
+nsIdsSynAckAckThres OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "SYN ack ack alarm threshold."
+ ::= { nsIdsProtectThreshEntry 11 }
+
+nsIdsAttkMonTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF NsIdsAttkMonEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The table monitors the intrusion attack attemps amount to
+ NetScreen Device."
+ ::= { netscreenIDS 2 }
+
+nsIdsAttkMonEntry OBJECT-TYPE
+ SYNTAX NsIdsAttkMonEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry containing intrusion attack couters."
+ INDEX
+ { nsIdsAttkMonIfIdx }
+ ::= { nsIdsAttkMonTable 1 }
+
+nsIdsAttkMonIfIdx OBJECT-TYPE
+ SYNTAX Integer32 (0..2147483647)
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "unique interface id."
+ ::= { nsIdsAttkMonEntry 1 }
+
+nsIdsAttkMonVsys OBJECT-TYPE
+ SYNTAX Integer32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "according NetScreen's concepts. each interface belongs to one
+ virtual system. This attribute displays the virtual system name
+ an interface belongs to."
+ ::= { nsIdsAttkMonEntry 2 }
+
+nsIdsAttkMonSynAttk OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "sync attack packet counter."
+ ::= { nsIdsAttkMonEntry 3 }
+
+nsIdsAttkMonTearDrop OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "tear drop attack packet counter."
+ ::= { nsIdsAttkMonEntry 4 }
+
+nsIdsAttkMonSrcRoute OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "source route option attack packet counter."
+ ::= { nsIdsAttkMonEntry 5 }
+
+nsIdsAttkMonPingDeath OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "ping of death attack packet counter."
+ ::= { nsIdsAttkMonEntry 6 }
+
+nsIdsAttkMonAddrSpoof OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "address spoofing attack packet counter."
+ ::= { nsIdsAttkMonEntry 7 }
+
+nsIdsAttkMonLand OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "land attack packet counter."
+ ::= { nsIdsAttkMonEntry 8 }
+
+nsIdsAttkMonIcmpFlood OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "ICMP flood attack packet counter."
+ ::= { nsIdsAttkMonEntry 9 }
+
+nsIdsAttkMonUdpFlood OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "udp flood attack packet counter."
+ ::= { nsIdsAttkMonEntry 10 }
+
+nsIdsAttkMonWinnuke OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "weired netbios attack packet counter."
+ ::= { nsIdsAttkMonEntry 11 }
+
+nsIdsAttkMonPortScan OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "port scan attempt attack packet counter."
+ ::= { nsIdsAttkMonEntry 12 }
+
+nsIdsAttkMonIpSweep OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "address sweep attemp attack packet counter."
+ ::= { nsIdsAttkMonEntry 13 }
+
+nsAttkMonSynFrag OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect SYN fragment"
+ ::= { nsIdsAttkMonEntry 14 }
+
+nsAttkMonTcpNoFlag OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect TCP without flag set."
+ ::= { nsIdsAttkMonEntry 15 }
+
+nsAttkMonIpUnknownProt OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Unknown protocol IP packet."
+ ::= { nsIdsAttkMonEntry 16 }
+
+nsAttkMonIpOptBad OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP bad option."
+ ::= { nsIdsAttkMonEntry 17 }
+
+nsAttkMonIpOptRecord OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP record option."
+ ::= { nsIdsAttkMonEntry 18 }
+
+nsAttkMonIpOptTimestamp OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP timestamp option."
+ ::= { nsIdsAttkMonEntry 19 }
+
+nsAttkMonIpOptSCHT OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP security option."
+ ::= { nsIdsAttkMonEntry 20 }
+
+nsAttkMonIpOptLSR OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect Loose source route."
+ ::= { nsIdsAttkMonEntry 21 }
+
+nsAttkMonIpOptSSR OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect strict source route."
+ ::= { nsIdsAttkMonEntry 22 }
+
+nsAttkMonIpOptStream OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect IP stream option."
+ ::= { nsIdsAttkMonEntry 23 }
+
+nsAttkMonIcmpFrag OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect ICMP fragment."
+ ::= { nsIdsAttkMonEntry 24 }
+
+nsAttkMonIcmpLarge OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect large ICMP packet."
+ ::= { nsIdsAttkMonEntry 25 }
+
+nsAttkMonTcpSynFin OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect TCP syn fin both set."
+ ::= { nsIdsAttkMonEntry 26 }
+
+nsAttkMonTcpFinNoAck OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect TCP fin set without ack bit set."
+ ::= { nsIdsAttkMonEntry 27 }
+
+nsAttkMonHttpMalUrl OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect malicious URL."
+ ::= { nsIdsAttkMonEntry 28 }
+
+nsAttkMonSessMalNum OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect malicious session connection."
+ ::= { nsIdsAttkMonEntry 29 }
+
+nsAttkMonSynAckAck OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Detect SYN ACK ACK attack."
+ ::= { nsIdsAttkMonEntry 30 }
+
+nsAttkMonIpFrag OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Block IP fragment packet."
+ ::= { nsIdsAttkMonEntry 31 }
+
+nsIdsAttkMonIfInfo OBJECT-TYPE
+ SYNTAX Integer32 (0..2147483647)
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "Internal id assigned to this interface. Stays persistent across resets."
+ ::= { nsIdsAttkMonEntry 32 }
+
+END
+
+