ATTACK-MIB: View SNMP OID List / Download MIB

VENDOR: CACHEFLOW INC.


 Home MIB: ATTACK-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 deviceAttackMIB 1.3.6.1.4.1.3417.2.3
The Attack-MIB is used to monitor possible protocol attacks by hackers.
     deviceAttackMIBObjects 1.3.6.1.4.1.3417.2.3.1
         deviceAttackValues 1.3.6.1.4.1.3417.2.3.1.1
             deviceAttackTable 1.3.6.1.4.1.3417.2.3.1.1.1 no-access
This table lists the various attacks that are detected.
                 deviceAttackEntry 1.3.6.1.4.1.3417.2.3.1.1.1.1 no-access
A deviceAttack entry describes the present state of an attack.
                     deviceAttackIndex 1.3.6.1.4.1.3417.2.3.1.1.1.1.1 integer no-access
An arbitrary value which uniquely identifies an attack.
                     deviceAttackName 1.3.6.1.4.1.3417.2.3.1.1.1.1.2 displaystring read-only
The textual name of the attack i.e. SYN Flood.
                     deviceAttackStatus 1.3.6.1.4.1.3417.2.3.1.1.1.1.3 attackstatus read-only
no-attack(1) not under attack, under-attack(2) attack in progress. The default start-up value is no-attack(1).
                     deviceAttackTime 1.3.6.1.4.1.3417.2.3.1.1.1.1.4 timestamp read-only
value of 'sysUpTime.0' at the time of the attack.
     deviceAttackMIBNotifications 1.3.6.1.4.1.3417.2.3.2
         deviceAttackMIBNotificationsPrefix 1.3.6.1.4.1.3417.2.3.2.0
             deviceAttackTrap 1.3.6.1.4.1.3417.2.3.2.0.1
At the start of an attack a notification is generated with 'deviceAttackStatus = under-attack(2)'. At the end of an attack a notification is generated with 'deviceAttackStatus = no-attack(1)'.