NETSCREEN-TRAP-MIB

File: NETSCREEN-TRAP-MIB.mib (17666 bytes)

Imported modules

NETSCREEN-SMI SNMPv2-SMI SNMPv2-TC

Imported symbols

netscreenTrap netscreenTrapInfo MODULE-IDENTITY
NOTIFICATION-TYPE OBJECT-TYPE DisplayString

Defined Values

netscreenTrapMibModule 1.3.6.1.4.1.3224.2.0
Added new traps introduced in 6.3, which includes 3, 35, 39, 52, 53, 54, 66, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 94, 105, 110, 111, 112, 113, 114, 200, 201, 202, 203, 204, 226, 227, 228, 229, 230, 231, 426, 427, 442, 443, 554, 600, 601, 602, 701, 702, 703, 704, 804, 805, 806, 850
MODULE-IDENTITY    

netscreenTrapHw 1.3.6.1.4.1.3224.0.100
This trap indicates that some kind of hardware problem has occured.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapFw 1.3.6.1.4.1.3224.0.200
This trap indicates that some kind of firewall functions has been triggered.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapSw 1.3.6.1.4.1.3224.0.300
This trap indicates that some kind of software problem has occured.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapTrf 1.3.6.1.4.1.3224.0.400
This trap indicates that some kind of traffic conditions has been triggered.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapVpn 1.3.6.1.4.1.3224.0.500
This trap indicates that VPN tunnel status has occured.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapNsrp 1.3.6.1.4.1.3224.0.600
This trap indicates that NSRP status has occured.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapGPRO 1.3.6.1.4.1.3224.0.700
This trap indicates that some kind of Global PRO problems has occurred.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapDrp 1.3.6.1.4.1.3224.0.800
This trap indicates that Drp status has occured.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapIFFailover 1.3.6.1.4.1.3224.0.900
This trap indicates that interface fail over status has occured.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapIDPAttack 1.3.6.1.4.1.3224.0.1000
This trap indicates that IDP attack status has occured.
Status: current Access: read-only
NOTIFICATION-TYPE    

netscreenTrapType 1.3.6.1.4.1.3224.2.1
The integer value of the raised alarm type. Note that the type should be interpreted within a specific trap
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  INTEGER traffic-sec(1), traffic-min(2), winnuke(4), syn-attack(5), tear-drop(6), ping-death(7), ip-spoofing(8), ip-src-route(9), land(10), icmp-flood(11), udp-flood(12), illegal-cms-svr(13), url-block-srv(14), high-availability(15), port-scan(16), addr-sweep(17), low-memory(20), dns-srv-down(21), generic-HW-fail(22), lb-srv-down(23), log-full(24), x509(25), vpn-ike(26), admin(27), sme(28), dhcp(29), cpu-usage-high(30), ip-conflict(31), attact-malicious-url(32), session-threshold(33), ssh-alarm(34), audit-storage(35), rxbd-low-alarm(39), vpn-tunnel-up(40), vpn-tunnel-down(41), vpn-replay-attack(42), vpn-l2tp-tunnel-remove(43), vpn-l2tp-tunnel-remove-err(44), vpn-l2tp-call-remove(45), vpn-l2tp-call-remove-err(46), vpn-ias-too-many(47), vpn-ias-over-threshold(48), vpn-ias-under-threshold(49), vpn-ias-ike-error(50), allocated-session-threshold(51), av-csp-alarm(52), av-alarm(53), apppry-alarm(54), nsrp-rto-up(60), nsrp-rto-down(61), nsrp-trackip-success(62), nsrp-trackip-failed(63), nsrp-trackip-failover(64), nsrp-inconsistent-configuration(65), trackip-status(66), nsrp-vsd-init(70), nsrp-vsd-master(71), nsrp-vsd-pbackup(72), nsrp-vsd-backup(73), nsrp-vsd-ineligible(74), nsrp-vsd-inoperable(75), nsrp-vsd-req-hearbeat-2nd(76), nsrp-vsd-reply-2nd(77), nsrp-rto-duplicated(78), ip-dup-master(79), di-heap-create-fail(80), mem-alloc-fail(81), vrrp-status-alarm(82), sccp-alarm(83), mgcp-reinit(84), mlfr-alarm(85), fr-alarm(86), cisco-hdlc-alarm(87), pppow-alarm(88), h323-alarm(89), isdn-alarm(90), interface-backup(91), wan-card-function(92), usb-device-operation(93), interface-failure(94), ppp-no-ip-cfg(95), ppp-no-ip-in-pool(96), ip-addr-event(101), dip-util-raise(102), dip-util-clear(103), dot1x-alarm(105), vpn-ias-radius-error(110), vpn-ikeid-enum-attack(111), vpn-softlimit-reached(112), vpn-ikedos-attack(113), vpn-acvpn-profile-error(114), route-sys-entry-ex(200), route-vr-entry-ex(201), route-ospf-hello-flood(202), route-ospf-lsa-flood(203), route-rip-update-flood(204), route-alarm(205), ospf-flood(206), rip-flood(207), bgp-established(208), bgp-backwardtransition(209), ospf-virtifstatechange(210), ospf-nbrstatechange(211), ospf-virtnbrstatechange(212), ospf-ifconfigerror(213), ospf-virtifconfigerror(214), ospf-ifauthfailure(215), ospf-virtifauthfailure(216), ospf-ifrxbadpacket(217), ospf-virtifrxbadpacket(218), ospf-txretransmit(219), ospf-virtiftxretransmit(220), ospf-originatelsa(221), ospf-maxagelsa(222), ospf-lsdboverflow(223), ospf-lsdbapproachingoverflow(224), ospf-ifstatechange(225), bgp-alarm(226), ripng-flood(227), route-ripng-update-flood(228), pbr-alarm(229), nhrp-alarm(230), ospfv3-alarm(231), ids-component(400), ids-icmp-flood(401), ids-udp-flood(402), ids-winnuke(403), ids-port-scan(404), ids-addr-sweep(405), ids-tear-drop(406), ids-syn(407), ids-ip-spoofing(408), ids-ping-death(409), ids-ip-source-route(410), ids-land(411), syn-frag-attack(412), tcp-without-flag(413), unknow-ip-packet(414), bad-ip-option(415), tcp-mal-url(426), tcp-sess-mal-num(427), dst-ip-session-limit(430), ids-block-zip(431), ids-block-jar(432), ids-block-exe(433), ids-block-activex(434), icmp-fragment(435), too-large-icmp(436), tcp-syn-fin(437), tcp-fin-no-ack(438), ids-tcp-syn-ack-ack(439), ids-ip-block-frag(440), ids-icmp-ping-id-zero(441), tcp-sweep(442), udp-sweep(443), av-scan-mgr(554), mcore-alarm(601), spim-alarm(602), sm-down(701), sm-packet-drop(702), sm-overload(703), sm-cpu-unresponsive(704), cpu-limit-s2f-forced(800), cpu-limit-s2f-auto(801), cpu-limit-f2s-forced(802), cpu-limit-f2s-timeout(803), cpu-limit-f2s-auto(804), sec-potential-voilation(805), flow-sess-cache(806), vsys-session-limit(850)  

netscreenTrapDesc 1.3.6.1.4.1.3224.2.3
The textual description of the alarm
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  DisplayString Size(0..255)