1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
|
-- This module defines enterprise MIBs for Policy Monitoring
--
-- Copyright (c) 1999-2004, Juniper Networks, Inc.
-- All rights reserved.
NETSCREEN-POLICY-MIB DEFINITIONS ::= BEGIN
IMPORTS
netscreenPolicy
FROM NETSCREEN-SMI
Counter32, Integer32, MODULE-IDENTITY, OBJECT-TYPE
FROM SNMPv2-SMI
DisplayString
FROM SNMPv2-TC
;
netscreenPolicyMibModule MODULE-IDENTITY
LAST-UPDATED "200405032022Z" -- May 03, 2004
ORGANIZATION
"Juniper Networks, Inc."
CONTACT-INFO
"Customer Support
1194 North Mathilda Avenue
Sunnyvale, California 94089-1206
USA
Tel: 1-800-638-8296
E-mail: customerservice@juniper.net
HTTP://www.juniper.net"
DESCRIPTION
"This module defines NetScreen private MIBs for Policy
Monitoring"
REVISION "200405030000Z" -- May 03, 2004
DESCRIPTION
"Modified copyright and contact information"
REVISION "200403030000Z" -- March 03, 2004
DESCRIPTION
"Converted to SMIv2 by Longview Software"
REVISION "200308130000Z" -- August 13, 2003
DESCRIPTION
"No Comment"
REVISION "200105140000Z" -- May 14, 2001
DESCRIPTION
"Creation Date"
::= { netscreenPolicy 0 }
NsPlyEntry ::= SEQUENCE
{
nsPlyId Integer32,
nsPlyVsys Integer32,
nsPlySrcZone DisplayString,
nsPlyDstZone DisplayString,
nsPlySrcAddr DisplayString,
nsPlyDstAddr DisplayString,
nsPlyService INTEGER,
nsPlyAction INTEGER,
nsPlyNat INTEGER,
nsPlyFixPort INTEGER,
nsPlyDipId Integer32,
nsPlyVpnTunnel DisplayString,
nsPlyL2tpTunnel DisplayString,
nsPlyAuth INTEGER,
nsPlyLogEnable INTEGER,
nsPlyCountEnable INTEGER,
nsPlyAlarmBPS Integer32,
nsPlyAlarmBPM Integer32,
nsPlySchedule DisplayString,
nsPlyTrafficShapeEnable INTEGER,
nsPlyTrafficPriority INTEGER,
nsPlyDSEnable INTEGER,
nsPlyActiveStatus INTEGER,
nsPlyName DisplayString,
nsPlyServiceName DisplayString
}
NsPlyMonEntry ::= SEQUENCE
{
nsPlyMonId Integer32,
nsPlyMonVsys Integer32,
nsPlyMonPackPerSec Integer32,
nsPlyMonPackPerMin Integer32,
nsPlyMonTotalPacket Counter32,
nsPlyMonBytePerSec Integer32,
nsPlyMonBytePerMin Integer32,
nsPlyMonTotalByte Counter32,
nsPlyMonSessionPerSec Integer32,
nsPlyMonSessionPerMin Integer32,
nsPlyMonTotalSession Counter32
}
nsPlyTable OBJECT-TYPE
SYNTAX SEQUENCE OF NsPlyEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"A firewall provides a network boundary with a single point of
entry and exit-a choke point.You can screen and direct all that
traffic through the implementation of a set of access policies.
Access policies allow you to permit, deny, encrypt,
authenticate, prioritize, schedule, and monitor the traffic
attemption to cross your firewall. This table collects all the
policy configuration information existing in NetScreen
Device."
::= { netscreenPolicy 1 }
-- applicable only to release before 6.3
--nsPlyEntry OBJECT-TYPE
-- SYNTAX NsPlyEntry
-- MAX-ACCESS not-accessible
-- STATUS current
-- DESCRIPTION
-- "Each entry in the nsPlyTable holds a set of configuration
-- parameters associatied with an instance of policy."
-- INDEX
-- { nsPlyId, nsPlyVsys }
-- ::= { nsPlyTable 1 }
-- applicable since 6.3 release, for pr439626
nsPlyEntry OBJECT-TYPE
SYNTAX NsPlyEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Each entry in the nsPlyTable holds a set of configuration
parameters associatied with an instance of policy."
INDEX
{ nsPlyVsys, nsPlyId }
::= { nsPlyTable 1 }
nsPlyId OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Each policy is identified by a unique policy ID."
::= { nsPlyEntry 1 }
nsPlyVsys OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Vitural system's name this polic entry belongs to."
::= { nsPlyEntry 2 }
nsPlySrcZone OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Traffic through a firewall means that traffic flows from one
security zone to another. This object describes the source zone
name traffic flow passes."
::= { nsPlyEntry 3 }
nsPlyDstZone OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Traffic through a firewall means that traffic flows from one
security zone to another. This object describes the destination
zone name traffic flow passes."
::= { nsPlyEntry 4 }
nsPlySrcAddr OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Addresses are objects that identify network devices such as
hosts and networks by their location in relation to the
firwall on which security zone.To create an access policy for
specific addresses, you must first create entries for the
relevant hosts and networks in the address book.Source IP
address indicates the address in source zone, 0.0.0.0 means any
address."
::= { nsPlyEntry 5 }
nsPlyDstAddr OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Addresses are objects that identify network devices such as
hosts and networks by their location in relation to the
firwall-on which security zone.To create an access policy for
specific addresses, you must first create entries for the
relevant hosts and networks in the address book.Source IP
address indicates the address in destination zone, 0.0.0.0
means any address."
::= { nsPlyEntry 6 }
nsPlyService OBJECT-TYPE
SYNTAX INTEGER {
any(0),
aol(1),
bgp(2),
dpcp-relay(3),
dns(4),
finger(5),
ftp(6),
ftp-get(7),
ftp-put(8),
gopher(9),
h323(10),
http(11),
https(12),
icmp-info(13),
icmp-timestamp(14),
ike(15),
imap(16),
internet-locator-service(17),
irc(18),
l2tp(19),
ldap(20),
mail(21),
netmeeting(22),
nfs(23),
nntp(24),
ns-global(25),
ns-global-pro(26),
ntp(27),
ospf(28),
pc-anywhere(29),
ping(30),
pop3(31),
pptp(32),
real-media(33),
rip(34),
rlogin(35),
snmp(36),
ssh(37),
syslog(38),
talk(39),
tcp-any(40),
telnet(41),
tftp(42),
traceroute(43),
udp-any(44),
uucp(45),
vdo-live(46),
wais(47),
winframe(48),
x-windows(49),
other(50)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Sevices are objects that identify application protocols using
layer 4 information such as standard and accepted TCP and UDP
port numbers for application services like Telnet, FTP, SMTP
and HTTP. This object indicates all the traffic service type
this policy allows. 'Any' means all this policy allows all
service go through. 'Other' could be a configured service or
not in the list. See nsPlyServiceName for service name."
::= { nsPlyEntry 7 }
nsPlyAction OBJECT-TYPE
SYNTAX INTEGER {
deny(0),
permit(1),
tunnel(2)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Actions objects that describe what the firewall does to the
traffic it receives. Permit allows the packet to pass the
firewall. Deny blocks the packet from traversing the firewall.
Tunnel encapsulates outgoing IP packets and decapsulates
incoming IP packets."
::= { nsPlyEntry 8 }
nsPlyNat OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"You can apply NAT at the interface level or at the policy
level. With policy-based NAT, you can translate the source
address on either incoming or outging network and VPN traffic.
This object indicates if this is a policy-based NAT."
::= { nsPlyEntry 9 }
nsPlyFixPort OBJECT-TYPE
SYNTAX INTEGER {
no(0),
yes(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"When in policy-based NAT, the new secure address can come from
either a Dynamic IP or from a Mapped IP. This object indicates
if poliy-based NAT uses fix port when working on NAT mode."
::= { nsPlyEntry 10 }
nsPlyDipId OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates the Dynamic ID chosen for NAT policy."
::= { nsPlyEntry 11 }
nsPlyVpnTunnel OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"VPN tunnel this access policy applies to."
::= { nsPlyEntry 12 }
nsPlyL2tpTunnel OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"L2TP tunnel this access policy applies to."
::= { nsPlyEntry 13 }
nsPlyAuth OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates the selecting this option requires the
user at the source address to authenticate his/her identiry by
supplying a user name and password before traffic is allowed to
graverw the firewall or enter the VPN tunnel."
::= { nsPlyEntry 14 }
nsPlyLogEnable OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"When you enable logging in an access policy, the NetScreen
device logs all connections to which that paticular access
policy applies."
::= { nsPlyEntry 15 }
nsPlyCountEnable OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"When you enable counting in an access plicy, the NetScreen
device counts the total number of bytes of traffic to which
this access policy applies and records the informaiton in
historical graphs."
::= { nsPlyEntry 16 }
nsPlyAlarmBPS OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"User can set a threshold that triggers an alarm when the
traffic permitted by the access policy exceeds a specified
number of bytes per second."
::= { nsPlyEntry 17 }
nsPlyAlarmBPM OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"User can set a threshold that triggers an alarm when the
traffic permitted by the access policy exceeds a specified
number of bytes per Minute."
::= { nsPlyEntry 18 }
nsPlySchedule OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"By associating a schedule to an access policy, you can
determine when the access policy is in effect."
::= { nsPlyEntry 19 }
nsPlyTrafficShapeEnable OBJECT-TYPE
SYNTAX INTEGER {
off(0),
on(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"User can set parameters for the control and shaping of traffic
for each access policy."
::= { nsPlyEntry 20 }
nsPlyTrafficPriority OBJECT-TYPE
SYNTAX INTEGER {
high(0),
priority2nd(1),
priority3rd(2),
priority4th(3),
priority5th(4),
priority6th(5),
priority7th(6),
priorityLow(7)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Traffic priority for this policy."
::= { nsPlyEntry 21 }
nsPlyDSEnable OBJECT-TYPE
SYNTAX INTEGER {
disable(0),
enabled(1)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Differentiated Services is a system for tagging traffic at a
position within a hierarchy of priority."
::= { nsPlyEntry 22 }
nsPlyActiveStatus OBJECT-TYPE
SYNTAX INTEGER {
inactive(0),
inuse(1),
hidden(2)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Show the status of one policy entry."
::= { nsPlyEntry 23 }
nsPlyName OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..32))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"policy name (optional)"
::= { nsPlyEntry 24 }
nsPlyServiceName OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Sevices name that identify application protocols using
layer 4 information such as standard and accepted TCP and UDP
port numbers for application services like Telnet, FTP, SMTP
and HTTP. This object indicates all the traffic service type
this policy allows. 'Any' means all this policy allows all
service go through."
::= { nsPlyEntry 25 }
nsPlyMonTable OBJECT-TYPE
SYNTAX SEQUENCE OF NsPlyMonEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"traffic information for the policy-based traffic."
::= { netscreenPolicy 2 }
nsPlyMonEntry OBJECT-TYPE
SYNTAX NsPlyMonEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"An entry holds a set of traffic counters of a specific
policy."
INDEX
{ nsPlyMonId, nsPlyMonVsys }
::= { nsPlyMonTable 1 }
nsPlyMonId OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Policy Id, also used as index in this table"
::= { nsPlyMonEntry 1 }
nsPlyMonVsys OBJECT-TYPE
SYNTAX Integer32 (0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"vsys this policy belongs to"
::= { nsPlyMonEntry 2 }
nsPlyMonPackPerSec OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Packets go through this policy per second"
::= { nsPlyMonEntry 3 }
nsPlyMonPackPerMin OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Packets go through this policy per minute"
::= { nsPlyMonEntry 4 }
nsPlyMonTotalPacket OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"total packets go through this policy"
::= { nsPlyMonEntry 5 }
nsPlyMonBytePerSec OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Bytes go through this policy per second"
::= { nsPlyMonEntry 6 }
nsPlyMonBytePerMin OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Bytes go through this policy per minute"
::= { nsPlyMonEntry 7 }
nsPlyMonTotalByte OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Total bytes go through this policy"
::= { nsPlyMonEntry 8 }
nsPlyMonSessionPerSec OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Sessions go through this policy per second"
::= { nsPlyMonEntry 9 }
nsPlyMonSessionPerMin OBJECT-TYPE
SYNTAX Integer32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Sessions go through this policy per minute"
::= { nsPlyMonEntry 10 }
nsPlyMonTotalSession OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Total Sessions go through this policy"
::= { nsPlyMonEntry 11 }
END
|