Detect malicious session connection.
Parsed from file NS-IDS.mib.txt
Company: None
Module: NETSCREEN-IDS-MIB
Detect malicious session connection.
Parsed from file NETSCREEN-IDS-MIB.mib
Module: NETSCREEN-IDS-MIB
Vendor: NetScreen Technologies, Inc.
Module: NETSCREEN-IDS-MIB
[Automatically extracted from oidview.com]
nsAttkMonSessMalNum OBJECT-TYPE SYNTAX Counter ACCESS read-only STATUS mandatory DESCRIPTION "Detect malicious session connection." ::= { nsIdsAttkMonEntry 29 }
nsAttkMonSessMalNum OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "Detect malicious session connection." ::= { nsIdsAttkMonEntry 29 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.3224.3.2.1.1 | nsIdsAttkMonIfIdx | 0 | 0 | unique interface id. |
1.3.6.1.4.1.3224.3.2.1.2 | nsIdsAttkMonVsys | 0 | 0 | according NetScreen's concepts. each interface belongs to one virtual system. This attribute displays the virtual system name an… |
1.3.6.1.4.1.3224.3.2.1.3 | nsIdsAttkMonSynAttk | 0 | 0 | sync attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.4 | nsIdsAttkMonTearDrop | 0 | 0 | tear drop attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.5 | nsIdsAttkMonSrcRoute | 0 | 0 | source route option attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.6 | nsIdsAttkMonPingDeath | 0 | 0 | ping of death attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.7 | nsIdsAttkMonAddrSpoof | 0 | 0 | address spoofing attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.8 | nsIdsAttkMonLand | 0 | 0 | land attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.9 | nsIdsAttkMonIcmpFlood | 0 | 0 | icmp flood attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.10 | nsIdsAttkMonUdpFlood | 0 | 0 | udp flood attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.11 | nsIdsAttkMonWinnuke | 0 | 0 | weired netbios attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.12 | nsIdsAttkMonPortScan | 0 | 0 | port scan attempt attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.13 | nsIdsAttkMonIpSweep | 0 | 0 | address sweep attemp attack packet counter. |
1.3.6.1.4.1.3224.3.2.1.14 | nsAttkMonSynFrag | 0 | 0 | Detect SYN fragment |
1.3.6.1.4.1.3224.3.2.1.15 | nsAttkMonTcpNoFlag | 0 | 0 | Detect TCP without flag set. |
1.3.6.1.4.1.3224.3.2.1.16 | nsAttkMonIpUnknownProt | 0 | 0 | Detect Unknown protocol IP packet. |
1.3.6.1.4.1.3224.3.2.1.17 | nsAttkMonIpOptBad | 0 | 0 | Detect IP bad option. |
1.3.6.1.4.1.3224.3.2.1.18 | nsAttkMonIpOptRecord | 0 | 0 | Detect IP record option. |
1.3.6.1.4.1.3224.3.2.1.19 | nsAttkMonIpOptTimestamp | 0 | 0 | Detect IP timestamp option. |
1.3.6.1.4.1.3224.3.2.1.20 | nsAttkMonIpOptSCHT | 0 | 0 | Detect IP security option. |
1.3.6.1.4.1.3224.3.2.1.21 | nsAttkMonIpOptLSR | 0 | 0 | Detect Loose source route. |
1.3.6.1.4.1.3224.3.2.1.22 | nsAttkMonIpOptSSR | 0 | 0 | Detect strict source route. |
1.3.6.1.4.1.3224.3.2.1.23 | nsAttkMonIpOptStream | 0 | 0 | Detect IP stream option. |
1.3.6.1.4.1.3224.3.2.1.24 | nsAttkMonIcmpFrag | 0 | 0 | Detect ICMP fragment. |
1.3.6.1.4.1.3224.3.2.1.25 | nsAttkMonIcmpLarge | 0 | 0 | Detect large ICMP packet. |
1.3.6.1.4.1.3224.3.2.1.26 | nsAttkMonTcpSynFin | 0 | 0 | Detect TCP syn fin both set. |
1.3.6.1.4.1.3224.3.2.1.27 | nsAttkMonTcpFinNoAck | 0 | 0 | Detect TCP fin set without ack bit set. |
1.3.6.1.4.1.3224.3.2.1.28 | nsAttkMonHttpMalUrl | 0 | 0 | Detect malicious URL. |
1.3.6.1.4.1.3224.3.2.1.30 | nsAttkMonSynAckAck | 0 | 0 | Detect SYN ACK ACK attack. |
1.3.6.1.4.1.3224.3.2.1.31 | nsAttkMonIpFrag | 0 | 0 | Block IP fragment packet. |
1.3.6.1.4.1.3224.3.2.1.32 | nsIdsAttkMonIfInfo | 0 | 0 | Internal id assigned to this interface. Stays persistent across resets. |