HH3C-AFC-MIB: View SNMP OID List / Download MIB

VENDOR: H3C


 Home MIB: HH3C-AFC-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 hh3cAFC 1.3.6.1.4.1.25506.2.85
This MIB is to provide the definition of Abnormal Flow Clean system.
       hh3cAFCLeaf 1.3.6.1.4.1.25506.2.85.1
           hh3cDDosAttackTargetIP 1.3.6.1.4.1.25506.2.85.1.1 ipaddress no-access
This shows the victim of a DDos attack. The IP Address is in the list of protected IP address.
           hh3cDDosAttackType 1.3.6.1.4.1.25506.2.85.1.2 integer no-access
This shows the attack type which the victim is sufferd. Enumeration: 'snmpabnormal': 41, 'fragflood': 24, 'sessionstreamalarm': 30, 'cc': 43, 'ackabnormal': 42, 'tftpabnormal': 34, 'ipfragabnormal': 33, 'tcpabnormal': 32, 'appstreamalarm': 29, 'pingofdeath': 13, 'telnetabnormal': 37, 'fraggle': 3, 'scan': 27, 'winnuke': 4, 'teardrop': 14, 'icmpflood': 6, 'tracert': 11, 'routerecord': 20, 'httpabnormal': 36, 'ftpabnormal': 38, 'sourceroute': 19, 'dnsabnormal': 35, 'otherabnormal': 1024, 'smtpabnormal': 39, 'land': 1, 'tcpflag': 12, 'ipfragment': 15, 'icmpunreachable': 9, 'icmpredirect': 8, 'synflood': 5, 'largeicmp': 18, 'pop3abnormal': 40, 'smurf': 2, 'udpflood': 7.
           hh3cDDosAttackPolicy 1.3.6.1.4.1.25506.2.85.1.3 octet string no-access
This shows the policy name which detects the DDos Attack.
           hh3cDDosAttackThreshold 1.3.6.1.4.1.25506.2.85.1.4 integer32 no-access
This shows the policy threshold in the DDos Attack.
           hh3cDDosAttackSpeed 1.3.6.1.4.1.25506.2.85.1.5 integer32 no-access
This shows the rate of policy in the DDos Attack.
       hh3cAFCNotify 1.3.6.1.4.1.25506.2.85.2
           hh3cAFCNotifyPrefix 1.3.6.1.4.1.25506.2.85.2.0
               hh3cDDosAttackStart 1.3.6.1.4.1.25506.2.85.2.0.1
This trap is sent when a DDos attack on specific IP is detected. The IP address of the victim is the first object. The exact type of the attack is the second object. The policy name which detects the attack is the third object. The threshold of the attack is the 4th object. The speed of the attack is the 5th object.
               hh3cDDosAttackEnd 1.3.6.1.4.1.25506.2.85.2.0.2
This trap is sent when a DDos Attack end. The IP address of the victim is the very object.