source IP address in the violating packet
Parsed from file ExtremeXOS_12.0.2.25_MIB-24.txt
Company: extreme
Module: EXTREME-IP-SECURITY-MIB
Child arc 0 is used to translate between SNMPv1 and SNMPv2 notification parameters as explained in IETF RFC 2576, section 3.
esAnomalySrcIpAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS accessible-for-notify STATUS current DESCRIPTION "source IP address in the violating packet" ::= { extremeIpSecurityAnomalyTraps 7 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.1916.1.34.2.7.0 | esAnomalySrcIpAddr | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.1916.1.34.2.0 | extremeIpSecurityAnomalyTrapsPrefix | 5 | 5 | None |
1.3.6.1.4.1.1916.1.34.2.1 | esAnomalyPortIfIndex | 1 | 1 | The ifIndex of the port on which the violating packet was received. |
1.3.6.1.4.1.1916.1.34.2.2 | esAnomalyVlanIfIndex | 1 | 1 | The ifIndex of the VLAN on which the violating packet was received. |
1.3.6.1.4.1.1916.1.34.2.3 | esAnomalyVlanDescr | 1 | 1 | The description(name) of the VLAN on which the violating packet was received. |
1.3.6.1.4.1.1916.1.34.2.4 | esAnomalySrcMacAddress | 1 | 1 | Source MAC address in the violating packet |
1.3.6.1.4.1.1916.1.34.2.5 | esAnomalyDestMacAddress | 1 | 1 | Destination MAC address in the violating packet |
1.3.6.1.4.1.1916.1.34.2.6 | esAnomalySrcIpAddrType | 1 | 1 | source IP address type: ipv4 or ipv6 |
1.3.6.1.4.1.1916.1.34.2.8 | esAnomalyDestIpAddrType | 1 | 1 | destination IP address type: ipv4 or ipv6 |
1.3.6.1.4.1.1916.1.34.2.9 | esAnomalyDestIpAddr | 1 | 1 | destination IP address in the violating packet |
1.3.6.1.4.1.1916.1.34.2.10 | esAnomalyIpProto | 1 | 1 | IP protocol in the violating packet |
1.3.6.1.4.1.1916.1.34.2.11 | esAnomalySrcL4Port | 1 | 1 | tcp/udp source port number in the violating packet |
1.3.6.1.4.1.1916.1.34.2.12 | esAnomalyDestL4Port | 1 | 1 | tcp/udp destination port in the violating packet |
1.3.6.1.4.1.1916.1.34.2.13 | esAnomalyTcpFlag | 1 | 1 | TCP flags in the violating packet |
1.3.6.1.4.1.1916.1.34.2.14 | esAnomalyTcpSeq | 1 | 1 | TCP sequence number in the violating packet |
1.3.6.1.4.1.1916.1.34.2.15 | esAnomalyTcpHdrSize | 1 | 1 | TCP Header size in the violating packet |
1.3.6.1.4.1.1916.1.34.2.16 | esAnomalyTcpFlagReason | 1 | 1 | TCP flag anomaly reason code |
1.3.6.1.4.1.1916.1.34.2.17 | esAnomalyIcmpReason | 1 | 1 | ICMP anomaly reason code |
1.3.6.1.4.1.1916.1.34.2.18 | esAnomalyVlanTag | 1 | 1 | the vlan tag in the violating packet |
1.3.6.1.4.1.1916.1.34.2.19 | esAnomalyTcpFragmentReason | 1 | 1 | TCP fragment anomaly reason code |