Actions objects that describe what the firewall does to the traffic it receives.
Permit allows the packet to pass the firewall.
Deny blocks the packet from traversing the firewall.
Tunnel encapsulates outgoing IP packets and decapsulates incoming IP packets.
Parsed from file NS-POLICY.mib.txt
Company: None
Module: NETSCREEN-POLICY-MIB
Actions objects that describe what the firewall does to the
traffic it receives. Permit allows the packet to pass the
firewall. Deny blocks the packet from traversing the firewall.
Tunnel encapsulates outgoing IP packets and decapsulates
incoming IP packets.
Parsed from file NETSCREEN-POLICY-MIB.mib
Module: NETSCREEN-POLICY-MIB
Vendor: NetScreen Technologies, Inc.
Module: NETSCREEN-POLICY-MIB
[Automatically extracted from oidview.com]
nsPlyAction OBJECT-TYPE SYNTAX INTEGER { deny(0), permit(1), tunnel(2) } ACCESS read-only STATUS mandatory DESCRIPTION "Actions objects that describe what the firewall does to the traffic it receives. Permit allows the packet to pass the firewall. Deny blocks the packet from traversing the firewall. Tunnel encapsulates outgoing IP packets and decapsulates incoming IP packets." ::= { nsPlyEntry 8 }
nsPlyAction OBJECT-TYPE SYNTAX INTEGER { deny(0), permit(1), tunnel(2) } MAX-ACCESS read-only STATUS current DESCRIPTION "Actions objects that describe what the firewall does to the traffic it receives. Permit allows the packet to pass the firewall. Deny blocks the packet from traversing the firewall. Tunnel encapsulates outgoing IP packets and decapsulates incoming IP packets." ::= { nsPlyEntry 8 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.3224.10.1.1.1 | nsPlyId | 0 | 0 | Each policy is identified by a unique policy ID. |
1.3.6.1.4.1.3224.10.1.1.2 | nsPlyVsys | 0 | 0 | Vitural system's name this polic entry belongs to. |
1.3.6.1.4.1.3224.10.1.1.3 | nsPlySrcZone | 0 | 0 | Traffic through a firewall means that traffic flows from one security zone to another. This object describes the source zone name… |
1.3.6.1.4.1.3224.10.1.1.4 | nsPlyDstZone | 0 | 0 | Traffic through a firewall means that traffic flows from one security zone to another. This object describes the destination zone… |
1.3.6.1.4.1.3224.10.1.1.5 | nsPlySrcAddr | 0 | 0 | Addresses are objects that identify network devices such as hosts and networks by their location in relation to the firwall on w… |
1.3.6.1.4.1.3224.10.1.1.6 | nsPlyDstAddr | 0 | 0 | Addresses are objects that identify network devices such as hosts and networks by their location in relation to the firwall-on w… |
1.3.6.1.4.1.3224.10.1.1.7 | nsPlyService | 0 | 0 | Sevices are objects that identify application protocols using layer 4 information such as standard and accepted TCP and UDP port… |
1.3.6.1.4.1.3224.10.1.1.9 | nsPlyNat | 0 | 0 | You can apply NAT at the interface level or at the policy level. With policy-based NAT, you can translate the source address on … |
1.3.6.1.4.1.3224.10.1.1.10 | nsPlyFixPort | 0 | 0 | When in policy-based NAT, the new secure address can come from either a Dynamic IP or from a Mapped IP. This object indicates if… |
1.3.6.1.4.1.3224.10.1.1.11 | nsPlyDipId | 0 | 0 | This object indicates the Dynamic ID chosen for NAT policy. |
1.3.6.1.4.1.3224.10.1.1.12 | nsPlyVpnTunnel | 0 | 0 | VPN tunnel this access policy applies to. |
1.3.6.1.4.1.3224.10.1.1.13 | nsPlyL2tpTunnel | 0 | 0 | L2TP tunnel this access policy applies to. |
1.3.6.1.4.1.3224.10.1.1.14 | nsPlyAuth | 0 | 0 | This objec indicates the selecting this option requires the user at the source address to authenticate his/her identiry by suppl… |
1.3.6.1.4.1.3224.10.1.1.15 | nsPlyLogEnable | 0 | 0 | When you enable logging in an access policy, the NetScreen device logs all connections to which that paticular access policy app… |
1.3.6.1.4.1.3224.10.1.1.16 | nsPlyCountEnable | 0 | 0 | When you enable counting in an access plicy, the NetScreen device counts the total number of bytes of traffic to which this acce… |
1.3.6.1.4.1.3224.10.1.1.17 | nsPlyAlarmBPS | 0 | 0 | User can set a threshold that triggers an alarm when the traffic permitted by the access policy exceeds a specified number of by… |
1.3.6.1.4.1.3224.10.1.1.18 | nsPlyAlarmBPM | 0 | 0 | User can set a threshold that triggers an alarm when the traffic permitted by the access policy exceeds a specified number of by… |
1.3.6.1.4.1.3224.10.1.1.19 | nsPlySchedule | 0 | 0 | By associating a schedule to an access policy, you can determine when the access policy is in effect. |
1.3.6.1.4.1.3224.10.1.1.20 | nsPlyTrafficShapeEnable | 0 | 0 | User can set parameters for the control and shaping of traffic for each access policy. |
1.3.6.1.4.1.3224.10.1.1.21 | nsPlyTrafficPriority | 0 | 0 | Traffic priority for this policy. |
1.3.6.1.4.1.3224.10.1.1.22 | nsPlyDSEnable | 0 | 0 | Differentiated Services is a system for tagging traffic at a position within a hierarchy of priority. |
1.3.6.1.4.1.3224.10.1.1.23 | nsPlyActiveStatus | 0 | 0 | Show the status of one policy entry. |
1.3.6.1.4.1.3224.10.1.1.24 | nsPlyName | 0 | 0 | policy name (optional) |
1.3.6.1.4.1.3224.10.1.1.25 | nsPlyServiceName | 0 | 0 | Sevices name that identify application protocols using layer 4 information such as standard and accepted TCP and UDP port number… |