The table exposes the security policy entries. Security
devices/routers provide a network boundary with a single
point of entry and exit point, which allows the screening
and directing of traffic through the implementation of
access policies. The access policies can permit, deny,
encrypt, authenticate, prioirtize, schedule and monitor
the traffic flow through the firewall.
This table lists entries of policy. The number of policies
are given by jnxJsPolicyNumber.
Parsed from file mib-jnx-js-policy.txt
Company: None
Module: JUNIPER-JS-POLICY-MIB
The table exposes the security policy entries. Security
devices/routers provide a network boundary with a single
point of entry and exit point, which allows the screening
and directing of traffic through the implementation of
access policies. The access policies can permit, deny,
encrypt, authenticate, prioirtize, schedule and monitor
the traffic flow through the firewall.
This table lists entries of policy. The number of policies
are given by jnxJsPolicyNumber.
Parsed from file JUNIPER-JS-POLICY-MIB.mib
Module: JUNIPER-JS-POLICY-MIB
Vendor: Juniper Networks, Inc.
Module: JUNIPER-JS-POLICY-MIB
[Automatically extracted from oidview.com]
jnxJsPolicyTable OBJECT-TYPE SYNTAX SEQUENCE OF JnxJsPolicyEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table exposes the security policy entries. Security devices/routers provide a network boundary with a single point of entry and exit point, which allows the screening and directing of traffic through the implementation of access policies. The access policies can permit, deny, encrypt, authenticate, prioirtize, schedule and monitor the traffic flow through the firewall. This table lists entries of policy. The number of policies are given by jnxJsPolicyNumber." ::= { jnxJsPolicyObjects 2 }
jnxJsPolicyTable OBJECT-TYPE SYNTAX SEQUENCE OF JnxJsPolicyEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table exposes the security policy entries. Security devices/routers provide a network boundary with a single point of entry and exit point, which allows the screening and directing of traffic through the implementation of access policies. The access policies can permit, deny, encrypt, authenticate, prioirtize, schedule and monitor the traffic flow through the firewall. This table lists entries of policy. The number of policies are given by jnxJsPolicyNumber." ::= { jnxJsPolicyObjects 2 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.2636.3.39.1.4.1.1.2.1 | jnxJsPolicyEntry | 10 | 10 | An entry contains a security policy. The security policies are configured under from-zone, to-zone direction. Under a specific z… |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.2636.3.39.1.4.1.1.1 | jnxJsPolicyNumber | 1 | 1 | The number of policies (regardless of their current state) present on this system. |
1.3.6.1.4.1.2636.3.39.1.4.1.1.3 | jnxJsPolicyStatsTable | 1 | 15 | The table exposes the security policy statistics entries. These statistics can be enabled and disabled by configuration on a per … |