Number of application protocol units that attempted
to advertise illegal port ranges for secondary
connections. An example of such an occurrence
would be a passive FTP connection, where the
server advertises a disallowed port range for data
connection.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
application traffic payloads.
This value is accumulated from the last reboot of
the firewall.
Parsed from file CISCO-UNIFIED-FIREWALL-MIB.mib
Module: CISCO-UNIFIED-FIREWALL-MIB
Number of application protocol units that attempted
to advertise illegal port ranges for secondary
connections. An example of such an occurrence
would be a passive FTP connection, where the
server advertises a disallowed port range for data
connection.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
application traffic payloads.
This value is accumulated from the last reboot of
the firewall.
Number of application protocol units that attempted
to advertise illegal port ranges for secondary
connections. An example of such an occurrence
would be a passive FTP connection, where the
server advertises a disallowed port range for data
connection.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
application traffic payloads.
This value is accumulated from the last reboot of
the firewall.
Parsed from file CISCO-UNIFIED-FIREWALL-MIB.my.txt
Company: None
Module: CISCO-UNIFIED-FIREWALL-MIB
Number of application protocol units that attempted
to advertise illegal port ranges for secondary
connections. An example of such an occurrence
would be a passive FTP connection, where the
server advertises a disallowed port range for data
connection.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
application traffic payloads.
This value is accumulated from the last reboot of
the firewall.
cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter64 UNITS "Protocol Data Units" MAX-ACCESS read-only STATUS current DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall. " ::= { cufwAaicGlobals 3}
cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter ACCESS read-only STATUS mandatory DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall." ::= { cufwAaicGlobals 3 }
Vendor: Cisco
Module: CISCO-UNIFIED-FIREWALL-MIB
[Automatically extracted from oidview.com]
cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter64 UNITS "Protocol Data Units" MAX-ACCESS read-only STATUS current DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall. " ::= { cufwAaicGlobals 3}
cufwAaicGlobalNumBadPortRange OBJECT-TYPE SYNTAX Counter64 UNITS "Protocol Data Units" MAX-ACCESS read-only STATUS current DESCRIPTION "Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall. " ::= { cufwAaicGlobals 3}
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.9.9.491.1.5.1.3.0 | cufwAaicGlobalNumBadPortRange | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.9.9.491.1.5.1.1 | cufwAaicGlobalNumBadProtocolOps | 1 | 1 | 'Protocol Operation' is the application protocol specific operation that the PDU is intended to perform. An example of 'protocol … |
1.3.6.1.4.1.9.9.491.1.5.1.2 | cufwAaicGlobalNumBadPDUSize | 1 | 1 | This MIB object records the number of application protocol data units (PDU) that had either an invalid header size or an invalid … |