Reference record for OID 1.3.6.1.4.1.9.9.491.1.5.1.3



parent
1.3.6.1.4.1.9.9.491.1.5.1 (cufwAaicGlobals)
node code
3
node name
cufwAaicGlobalNumBadPortRange
dot oid
1.3.6.1.4.1.9.9.491.1.5.1.3
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoUnifiedFirewallMIB(491) ciscoUnifiedFirewallMIBObjects(1) cuFwAaicGrp(5) cufwAaicGlobals(1) cufwAaicGlobalNumBadPortRange(3)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoUnifiedFirewallMIB(491) ciscoUnifiedFirewallMIBObjects(1) cuFwAaicGrp(5) cufwAaicGlobals(1) cufwAaicGlobalNumBadPortRange(3)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoUnifiedFirewallMIB(491) ciscoUnifiedFirewallMIBObjects(1) cuFwAaicGrp(5) cufwAaicGlobals(1) cufwAaicGlobalNumBadPortRange(3)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoUnifiedFirewallMIB(491) ciscoUnifiedFirewallMIBObjects(1) cuFwAaicGrp(5) cufwAaicGlobals(1) cufwAaicGlobalNumBadPortRange(3)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoUnifiedFirewallMIB(491) ciscoUnifiedFirewallMIBObjects(1) cuFwAaicGrp(5) cufwAaicGlobals(1) cufwAaicGlobalNumBadPortRange(3)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoUnifiedFirewallMIB(491) ciscoUnifiedFirewallMIBObjects(1) cuFwAaicGrp(5) cufwAaicGlobals(1) cufwAaicGlobalNumBadPortRange(3)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoUnifiedFirewallMIB/ciscoUnifiedFirewallMIBObjects/cuFwAaicGrp/cufwAaicGlobals/cufwAaicGlobalNumBadPortRange
  • /iso/identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoUnifiedFirewallMIB/ciscoUnifiedFirewallMIBObjects/cuFwAaicGrp/cufwAaicGlobals/cufwAaicGlobalNumBadPortRange
  • /iso/org/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoUnifiedFirewallMIB/ciscoUnifiedFirewallMIBObjects/cuFwAaicGrp/cufwAaicGlobals/cufwAaicGlobalNumBadPortRange
  • /iso/org/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoUnifiedFirewallMIB/ciscoUnifiedFirewallMIBObjects/cuFwAaicGrp/cufwAaicGlobals/cufwAaicGlobalNumBadPortRange
  • /iso/iso-identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoUnifiedFirewallMIB/ciscoUnifiedFirewallMIBObjects/cuFwAaicGrp/cufwAaicGlobals/cufwAaicGlobalNumBadPortRange
  • /iso/iso-identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoUnifiedFirewallMIB/ciscoUnifiedFirewallMIBObjects/cuFwAaicGrp/cufwAaicGlobals/cufwAaicGlobalNumBadPortRange
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/9/9/491/1/5/1/3

    Description by circitor

    Number of application protocol units that attempted
    to advertise illegal port ranges for secondary
    connections. An example of such an occurrence
    would be a passive FTP connection, where the
    server advertises a disallowed port range for data
    connection.

    For this MIB to be implemented, the managed firewall
    must be implementing deep packet inspection of
    application traffic payloads.

    This value is accumulated from the last reboot of
    the firewall.

    Parsed from file CISCO-UNIFIED-FIREWALL-MIB.mib
    Module: CISCO-UNIFIED-FIREWALL-MIB

    Description by cisco_v1

    Number of application protocol units that attempted
    to advertise illegal port ranges for secondary
    connections. An example of such an occurrence
    would be a passive FTP connection, where the
    server advertises a disallowed port range for data
    connection.

    For this MIB to be implemented, the managed firewall
    must be implementing deep packet inspection of
    application traffic payloads.

    This value is accumulated from the last reboot of
    the firewall.

    Description by mibdepot

    Number of application protocol units that attempted
    to advertise illegal port ranges for secondary
    connections. An example of such an occurrence
    would be a passive FTP connection, where the
    server advertises a disallowed port range for data
    connection.

    For this MIB to be implemented, the managed firewall
    must be implementing deep packet inspection of
    application traffic payloads.

    This value is accumulated from the last reboot of
    the firewall.

    Parsed from file CISCO-UNIFIED-FIREWALL-MIB.my.txt
    Company: None
    Module: CISCO-UNIFIED-FIREWALL-MIB

    Description by cisco

    Number of application protocol units that attempted
    to advertise illegal port ranges for secondary
    connections. An example of such an occurrence
    would be a passive FTP connection, where the
    server advertises a disallowed port range for data
    connection.

    For this MIB to be implemented, the managed firewall
    must be implementing deep packet inspection of
    application traffic payloads.

    This value is accumulated from the last reboot of
    the firewall.

    Information by circitor

    cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter64 UNITS "Protocol Data Units" MAX-ACCESS read-only STATUS current DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall. " ::= { cufwAaicGlobals 3}

    Information by cisco_v1

    cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter ACCESS read-only STATUS mandatory DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall." ::= { cufwAaicGlobals 3 }

    Information by oid_info

    Vendor: Cisco
    Module: CISCO-UNIFIED-FIREWALL-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter64 UNITS "Protocol Data Units" MAX-ACCESS read-only STATUS current DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall. " ::= { cufwAaicGlobals 3}

    Information by cisco

    cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter64 UNITS "Protocol Data Units" MAX-ACCESS read-only STATUS current DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall. " ::= { cufwAaicGlobals 3}

    First Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Greg Satz

    Current Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Cisco Systems, Inc.

    Children (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.9.9.491.1.5.1.3.0 cufwAaicGlobalNumBadPortRange 0 0 None

    Brothers (2)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.9.9.491.1.5.1.1 cufwAaicGlobalNumBadProtocolOps 1 1 'Protocol Operation' is the application protocol
    specific operation that the PDU is intended to
    perform. An example of 'protocol …
    1.3.6.1.4.1.9.9.491.1.5.1.2 cufwAaicGlobalNumBadPDUSize 1 1 This MIB object records the number of application
    protocol data units (PDU) that had either an invalid
    header size or an invalid …