Reference record for OID 1.3.6.1.4.1.3224.2.1


parent
1.3.6.1.4.1.3224.2 (netscreenTrapInfo)
node code
1
node name
netscreenTrapType
dot oid
1.3.6.1.4.1.3224.2.1
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) netscreen(3224) netscreenTrapInfo(2) netscreenTrapType(1)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) netscreen(3224) netscreenTrapInfo(2) netscreenTrapType(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) netscreen(3224) netscreenTrapInfo(2) netscreenTrapType(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) netscreen(3224) netscreenTrapInfo(2) netscreenTrapType(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) netscreen(3224) netscreenTrapInfo(2) netscreenTrapType(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) netscreen(3224) netscreenTrapInfo(2) netscreenTrapType(1)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/netscreen/netscreenTrapInfo/netscreenTrapType
  • /iso/identified-organization/dod/internet/private/enterprises/netscreen/netscreenTrapInfo/netscreenTrapType
  • /iso/org/dod/internet/private/enterprise/netscreen/netscreenTrapInfo/netscreenTrapType
  • /iso/org/dod/internet/private/enterprises/netscreen/netscreenTrapInfo/netscreenTrapType
  • /iso/iso-identified-organization/dod/internet/private/enterprise/netscreen/netscreenTrapInfo/netscreenTrapType
  • /iso/iso-identified-organization/dod/internet/private/enterprises/netscreen/netscreenTrapInfo/netscreenTrapType
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/3224/2/1

    Description by mibdepot

    The integer value of the raised alarm type.
    Note that the type should be interpreted within a specific trap

    Parsed from file NS-TRAPS.mib.txt
    Company: None
    Module: NETSCREEN-TRAP-MIB

    Description by circitor

    The integer value of the raised alarm type. Note that the type
    should be interpreted within a specific trap

    Parsed from file NETSCREEN-TRAP-MIB.mib
    Module: NETSCREEN-TRAP-MIB

    Information by oid_info

    Vendor: NetScreen Technologies, Inc.
    Module: NETSCREEN-TRAP-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    netscreenTrapType OBJECT-TYPE SYNTAX INTEGER { user-auth-fail(3), winnuke(4), syn-attack(5), tear-drop(6), ping-death(7), ip-spoofing(8), ip-src-route(9), land(10), icmp-flood(11), udp-flood(12), illegal-cms-svr(13), url-block-srv(14), high-availibility(15), port-scan(16), addr-sweep(17), policy-deny(18), device-dead(19), low-memory(20), dns-srv-down(21), generic-HW-fail(22), lb-srv-down(23), log-full(24), x509(25), vpn-ike(26), admin(27), sme(28), dhcp(29), cpu-usage-high(30), vpn-tunnel-up(40), vpn-tunnel-down(41), nsrp-rto-up(60), nsrp-rto-down(61), nsrp-trackip-success(62), nsrp-trackip-failed(63), nsrp-trackip-failover(64), nsrp-vsd-init(70), nsrp-vsd-master(71), nsrp-vsd-pbackup(72), nsrp-vsd-backup(73), nsrp-vsd-ineligible(74), link-statechange(1000) } ACCESS not-accessible STATUS mandatory DESCRIPTION "The integer value of the raised alarm type. Note that the type should be interpreted within a specific trap" ::= { netscreenTrapInfo 1 }

    Information by circitor

    netscreenTrapType OBJECT-TYPE SYNTAX INTEGER { traffic-sec(1), traffic-min(2), winnuke(4), syn-attack(5), tear-drop(6), ping-death(7), ip-spoofing(8), ip-src-route(9), land(10), icmp-flood(11), udp-flood(12), illegal-cms-svr(13), url-block-srv(14), high-availability(15), port-scan(16), addr-sweep(17), low-memory(20), dns-srv-down(21), generic-HW-fail(22), lb-srv-down(23), log-full(24), x509(25), vpn-ike(26), admin(27), sme(28), dhcp(29), cpu-usage-high(30), ip-conflict(31), attact-malicious-url(32), session-threshold(33), ssh-alarm(34), audit-storage(35), rxbd-low-alarm(39), vpn-tunnel-up(40), vpn-tunnel-down(41), vpn-replay-attack(42), vpn-l2tp-tunnel-remove(43), vpn-l2tp-tunnel-remove-err(44), vpn-l2tp-call-remove(45), vpn-l2tp-call-remove-err(46), vpn-ias-too-many(47), vpn-ias-over-threshold(48), vpn-ias-under-threshold(49), vpn-ias-ike-error(50), allocated-session-threshold(51), av-csp-alarm(52), av-alarm(53), apppry-alarm(54), nsrp-rto-up(60), nsrp-rto-down(61), nsrp-trackip-success(62), nsrp-trackip-failed(63), nsrp-trackip-failover(64), nsrp-inconsistent-configuration(65), trackip-status(66), nsrp-vsd-init(70), nsrp-vsd-master(71), nsrp-vsd-pbackup(72), nsrp-vsd-backup(73), nsrp-vsd-ineligible(74), nsrp-vsd-inoperable(75), nsrp-vsd-req-hearbeat-2nd(76), nsrp-vsd-reply-2nd(77), nsrp-rto-duplicated(78), ip-dup-master(79), di-heap-create-fail(80), mem-alloc-fail(81), vrrp-status-alarm(82), sccp-alarm(83), mgcp-reinit(84), mlfr-alarm(85), fr-alarm(86), cisco-hdlc-alarm(87), pppow-alarm(88), h323-alarm(89), isdn-alarm(90), interface-backup(91), wan-card-function(92), usb-device-operation(93), interface-failure(94), ppp-no-ip-cfg(95), ppp-no-ip-in-pool(96), ip-addr-event(101), dip-util-raise(102), dip-util-clear(103), dot1x-alarm(105), vpn-ias-radius-error(110), vpn-ikeid-enum-attack(111), vpn-softlimit-reached(112), vpn-ikedos-attack(113), vpn-acvpn-profile-error(114), route-sys-entry-ex(200), route-vr-entry-ex(201), route-ospf-hello-flood(202), route-ospf-lsa-flood(203), route-rip-update-flood(204), route-alarm(205), ospf-flood(206), rip-flood(207), bgp-established(208), bgp-backwardtransition(209), ospf-virtifstatechange(210), ospf-nbrstatechange(211), ospf-virtnbrstatechange(212), ospf-ifconfigerror(213), ospf-virtifconfigerror(214), ospf-ifauthfailure(215), ospf-virtifauthfailure(216), ospf-ifrxbadpacket(217), ospf-virtifrxbadpacket(218), ospf-txretransmit(219), ospf-virtiftxretransmit(220), ospf-originatelsa(221), ospf-maxagelsa(222), ospf-lsdboverflow(223), ospf-lsdbapproachingoverflow(224), ospf-ifstatechange(225), bgp-alarm(226), ripng-flood(227), route-ripng-update-flood(228), pbr-alarm(229), nhrp-alarm(230), ospfv3-alarm(231), ids-component(400), ids-icmp-flood(401), ids-udp-flood(402), ids-winnuke(403), ids-port-scan(404), ids-addr-sweep(405), ids-tear-drop(406), ids-syn(407), ids-ip-spoofing(408), ids-ping-death(409), ids-ip-source-route(410), ids-land(411), syn-frag-attack(412), tcp-without-flag(413), unknow-ip-packet(414), bad-ip-option(415), tcp-mal-url(426), tcp-sess-mal-num(427), dst-ip-session-limit(430), ids-block-zip(431), ids-block-jar(432), ids-block-exe(433), ids-block-activex(434), icmp-fragment(435), too-large-icmp(436), tcp-syn-fin(437), tcp-fin-no-ack(438), ids-tcp-syn-ack-ack(439), ids-ip-block-frag(440), ids-icmp-ping-id-zero(441), tcp-sweep(442), udp-sweep(443), av-scan-mgr(554), mcore-alarm(601), spim-alarm(602), sm-down(701), sm-packet-drop(702), sm-overload(703), sm-cpu-unresponsive(704), cpu-limit-s2f-forced(800), cpu-limit-s2f-auto(801), cpu-limit-f2s-forced(802), cpu-limit-f2s-timeout(803), cpu-limit-f2s-auto(804), sec-potential-voilation(805), flow-sess-cache(806), vsys-session-limit(850) } MAX-ACCESS accessible-for-notify STATUS current DESCRIPTION "The integer value of the raised alarm type. Note that the type should be interpreted within a specific trap" ::= { netscreenTrapInfo 1 }

    Children (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.3224.2.1.0 netscreenTrapType 0 0 None

    Brothers (2)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.3224.2.0 netscreenTrapMibModule 0 0 Added new traps introduced in 6.3, which includes
    3, 35, 39, 52, 53, 54, 66, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91,…
    1.3.6.1.4.1.3224.2.3 netscreenTrapDesc 1 1 The textual description of the alarm