Returns BADTIME error code if value of bad timestamp in
TSIG is detected in an incoming packet.
Parsed from file CISCO-DNS-SERVER-MIB.mib
Module: CISCO-DNS-SERVER-MIB
Returns BADTIME error code if value of bad timestamp in
TSIG is detected in an incoming packet.
Returns BADTIME error code if value of bad timestamp in
TSIG is detected in an incoming packet.
Parsed from file CISCO-DNS-SERVER-MIB.my.txt
Company: None
Module: CISCO-DNS-SERVER-MIB
Returns BADTIME error code if value of bad timestamp in
TSIG is detected in an incoming packet.
cDnsSecurityDetecTsigBadTimes OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Returns BADTIME error code if value of bad timestamp in TSIG is detected in an incoming packet." ::= { cDnsSecurityStats 2 }
cDnsSecurityDetecTsigBadTimes OBJECT-TYPE SYNTAX Counter ACCESS read-only STATUS mandatory DESCRIPTION "Returns BADTIME error code if value of bad timestamp in TSIG is detected in an incoming packet." ::= { cDnsSecurityStats 2 }
Vendor: Cisco
Module: CISCO-DNS-SERVER-MIB
[Automatically extracted from oidview.com]
cDnsSecurityDetecTsigBadTimes OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Returns BADTIME error code if value of bad timestamp in TSIG is detected in an incoming packet." ::= { cDnsSecurityStats 2 }
cDnsSecurityDetecTsigBadTimes OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Returns BADTIME error code if value of bad timestamp in TSIG is detected in an incoming packet." ::= { cDnsSecurityStats 2 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.9.9.405.1.6.2.0 | cDnsSecurityDetecTsigBadTimes | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.9.9.405.1.6.1 | cDnsSecurityRcvdTsigPackets | 1 | 1 | Total number of packets with a TSIG RR that are processed. |
1.3.6.1.4.1.9.9.405.1.6.3 | cDnsSecurityDetectTsigBadKeys | 1 | 1 | Returns BADKEY error code if value of bad keyname in TSIG is detected in an incoming packet. |
1.3.6.1.4.1.9.9.405.1.6.4 | cDnsSecurityDetectTsigBadSigs | 1 | 1 | Returns BADSIG error code if value of bad signature in TSIG is detected in an incoming packet. |
1.3.6.1.4.1.9.9.405.1.6.5 | cDnsSecurityRcvdTsigBadTimes | 1 | 1 | Total number of BADTIME errors received after sending a TSIG. |
1.3.6.1.4.1.9.9.405.1.6.6 | cDnsSecurityRcvdTsigBadKeys | 1 | 1 | Total number of BADKEY errors received after sending a TSIG. |
1.3.6.1.4.1.9.9.405.1.6.7 | cDnsSecurityRcvdTsigBadSigs | 1 | 1 | Total number of BADSIG errors received after sending a TSIG. |
1.3.6.1.4.1.9.9.405.1.6.8 | cDnsSecurityUnauthXferReqs | 1 | 1 | Total number of ACL authorization failures if zone transfer restriction has been enabled. |
1.3.6.1.4.1.9.9.405.1.6.9 | cDnsSecurityUnauthUpdateReqs | 1 | 1 | Total number of updates which result in ACL authorization failure, or which target zones which do not support updates. |
1.3.6.1.4.1.9.9.405.1.6.10 | cDnsSecurityRestrictQueryAcls | 1 | 1 | Total number of queries to be restricted by the DNS server through the global or zone Access Control List. |