NETSCREEN-POLICY-MIB: View SNMP OID List / Download MIB

VENDOR: NETSCREEN TECHNOLOGIES


 Home MIB: NETSCREEN-POLICY-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 netscreenPolicyMibModule 1.3.6.1.4.1.3224.10.0
This module defines NetScreen private MIBs for Policy Monitoring
 nsPlyTable 1.3.6.1.4.1.3224.10.1 no-access
A firewall provides a network boundary with a single point of entry and exit-a choke point.You can screen and direct all that traffic through the implementation of a set of access policies. Access policies allow you to permit, deny, encrypt, authenticate, prioritize, schedule, and monitor the traffic attemption to cross your firewall. This table collects all the policy configuration information existing in NetScreen Device.
     nsPlyEntry 1.3.6.1.4.1.3224.10.1.1 no-access
Each entry in the nsPlyTable holds a set of configuration parameters associatied with an instance of policy.
         nsPlyId 1.3.6.1.4.1.3224.10.1.1.1 integer32 read-only
Each policy is identified by a unique policy ID.
         nsPlyVsys 1.3.6.1.4.1.3224.10.1.1.2 integer32 read-only
Vitural system's name this polic entry belongs to.
         nsPlySrcZone 1.3.6.1.4.1.3224.10.1.1.3 displaystring read-only
Traffic through a firewall means that traffic flows from one security zone to another. This object describes the source zone name traffic flow passes.
         nsPlyDstZone 1.3.6.1.4.1.3224.10.1.1.4 displaystring read-only
Traffic through a firewall means that traffic flows from one security zone to another. This object describes the destination zone name traffic flow passes.
         nsPlySrcAddr 1.3.6.1.4.1.3224.10.1.1.5 displaystring read-only
Addresses are objects that identify network devices such as hosts and networks by their location in relation to the firwall on which security zone.To create an access policy for specific addresses, you must first create entries for the relevant hosts and networks in the address book.Source IP address indicates the address in source zone, 0.0.0.0 means any address.
         nsPlyDstAddr 1.3.6.1.4.1.3224.10.1.1.6 displaystring read-only
Addresses are objects that identify network devices such as hosts and networks by their location in relation to the firwall-on which security zone.To create an access policy for specific addresses, you must first create entries for the relevant hosts and networks in the address book.Source IP address indicates the address in destination zone, 0.0.0.0 means any address.
         nsPlyService 1.3.6.1.4.1.3224.10.1.1.7 integer read-only
Sevices are objects that identify application protocols using layer 4 information such as standard and accepted TCP and UDP port numbers for application services like Telnet, FTP, SMTP and HTTP. This object indicates all the traffic service type this policy allows. 'Any' means all this policy allows all service go through. 'Other' could be a configured service or not in the list. See nsPlyServiceName for service name. Enumeration: 'ns-global-pro': 26, 'tcp-any': 40, 'ping': 30, 'gopher': 9, 'h323': 10, 'syslog': 38, 'ftp-get': 7, 'traceroute': 43, 'any': 0, 'dpcp-relay': 3, 'ftp': 6, 'uucp': 45, 'snmp': 36, 'internet-locator-service': 17, 'imap': 16, 'other': 50, 'finger': 5, 'https': 12, 'ldap': 20, 'mail': 21, 'irc': 18, 'nntp': 24, 'real-media': 33, 'http': 11, 'l2tp': 19, 'ns-global': 25, 'ftp-put': 8, 'pptp': 32, 'ntp': 27, 'aol': 1, 'telnet': 41, 'winframe': 48, 'pop3': 31, 'pc-anywhere': 29, 'rip': 34, 'ike': 15, 'wais': 47, 'icmp-info': 13, 'icmp-timestamp': 14, 'dns': 4, 'x-windows': 49, 'rlogin': 35, 'vdo-live': 46, 'bgp': 2, 'udp-any': 44, 'nfs': 23, 'talk': 39, 'tftp': 42, 'ospf': 28, 'netmeeting': 22, 'ssh': 37.
         nsPlyAction 1.3.6.1.4.1.3224.10.1.1.8 integer read-only
Actions objects that describe what the firewall does to the traffic it receives. Permit allows the packet to pass the firewall. Deny blocks the packet from traversing the firewall. Tunnel encapsulates outgoing IP packets and decapsulates incoming IP packets. Enumeration: 'tunnel': 2, 'deny': 0, 'permit': 1.
         nsPlyNat 1.3.6.1.4.1.3224.10.1.1.9 integer read-only
You can apply NAT at the interface level or at the policy level. With policy-based NAT, you can translate the source address on either incoming or outging network and VPN traffic. This object indicates if this is a policy-based NAT. Enumeration: 'disable': 0, 'enabled': 1.
         nsPlyFixPort 1.3.6.1.4.1.3224.10.1.1.10 integer read-only
When in policy-based NAT, the new secure address can come from either a Dynamic IP or from a Mapped IP. This object indicates if poliy-based NAT uses fix port when working on NAT mode. Enumeration: 'yes': 1, 'no': 0.
         nsPlyDipId 1.3.6.1.4.1.3224.10.1.1.11 integer32 read-only
This object indicates the Dynamic ID chosen for NAT policy.
         nsPlyVpnTunnel 1.3.6.1.4.1.3224.10.1.1.12 displaystring read-only
VPN tunnel this access policy applies to.
         nsPlyL2tpTunnel 1.3.6.1.4.1.3224.10.1.1.13 displaystring read-only
L2TP tunnel this access policy applies to.
         nsPlyAuth 1.3.6.1.4.1.3224.10.1.1.14 integer read-only
This object indicates the selecting this option requires the user at the source address to authenticate his/her identiry by supplying a user name and password before traffic is allowed to graverw the firewall or enter the VPN tunnel. Enumeration: 'disable': 0, 'enabled': 1.
         nsPlyLogEnable 1.3.6.1.4.1.3224.10.1.1.15 integer read-only
When you enable logging in an access policy, the NetScreen device logs all connections to which that paticular access policy applies. Enumeration: 'disable': 0, 'enabled': 1.
         nsPlyCountEnable 1.3.6.1.4.1.3224.10.1.1.16 integer read-only
When you enable counting in an access plicy, the NetScreen device counts the total number of bytes of traffic to which this access policy applies and records the informaiton in historical graphs. Enumeration: 'disable': 0, 'enabled': 1.
         nsPlyAlarmBPS 1.3.6.1.4.1.3224.10.1.1.17 integer32 read-only
User can set a threshold that triggers an alarm when the traffic permitted by the access policy exceeds a specified number of bytes per second.
         nsPlyAlarmBPM 1.3.6.1.4.1.3224.10.1.1.18 integer32 read-only
User can set a threshold that triggers an alarm when the traffic permitted by the access policy exceeds a specified number of bytes per Minute.
         nsPlySchedule 1.3.6.1.4.1.3224.10.1.1.19 displaystring read-only
By associating a schedule to an access policy, you can determine when the access policy is in effect.
         nsPlyTrafficShapeEnable 1.3.6.1.4.1.3224.10.1.1.20 integer read-only
User can set parameters for the control and shaping of traffic for each access policy. Enumeration: 'on': 1, 'off': 0.
         nsPlyTrafficPriority 1.3.6.1.4.1.3224.10.1.1.21 integer read-only
Traffic priority for this policy. Enumeration: 'priority4th': 3, 'priority3rd': 2, 'priority6th': 5, 'priority5th': 4, 'priority2nd': 1, 'high': 0, 'priorityLow': 7, 'priority7th': 6.
         nsPlyDSEnable 1.3.6.1.4.1.3224.10.1.1.22 integer read-only
Differentiated Services is a system for tagging traffic at a position within a hierarchy of priority. Enumeration: 'disable': 0, 'enabled': 1.
         nsPlyActiveStatus 1.3.6.1.4.1.3224.10.1.1.23 integer read-only
Show the status of one policy entry. Enumeration: 'hidden': 2, 'inactive': 0, 'inuse': 1.
         nsPlyName 1.3.6.1.4.1.3224.10.1.1.24 displaystring read-only
policy name (optional)
         nsPlyServiceName 1.3.6.1.4.1.3224.10.1.1.25 displaystring read-only
Sevices name that identify application protocols using layer 4 information such as standard and accepted TCP and UDP port numbers for application services like Telnet, FTP, SMTP and HTTP. This object indicates all the traffic service type this policy allows. 'Any' means all this policy allows all service go through.
 nsPlyMonTable 1.3.6.1.4.1.3224.10.2 no-access
traffic information for the policy-based traffic.
     nsPlyMonEntry 1.3.6.1.4.1.3224.10.2.1 no-access
An entry holds a set of traffic counters of a specific policy.
         nsPlyMonId 1.3.6.1.4.1.3224.10.2.1.1 integer32 read-only
Policy Id, also used as index in this table
         nsPlyMonVsys 1.3.6.1.4.1.3224.10.2.1.2 integer32 read-only
vsys this policy belongs to
         nsPlyMonPackPerSec 1.3.6.1.4.1.3224.10.2.1.3 integer32 read-only
Packets go through this policy per second
         nsPlyMonPackPerMin 1.3.6.1.4.1.3224.10.2.1.4 integer32 read-only
Packets go through this policy per minute
         nsPlyMonTotalPacket 1.3.6.1.4.1.3224.10.2.1.5 counter32 read-only
total packets go through this policy
         nsPlyMonBytePerSec 1.3.6.1.4.1.3224.10.2.1.6 integer32 read-only
Bytes go through this policy per second
         nsPlyMonBytePerMin 1.3.6.1.4.1.3224.10.2.1.7 integer32 read-only
Bytes go through this policy per minute
         nsPlyMonTotalByte 1.3.6.1.4.1.3224.10.2.1.8 counter32 read-only
Total bytes go through this policy
         nsPlyMonSessionPerSec 1.3.6.1.4.1.3224.10.2.1.9 integer32 read-only
Sessions go through this policy per second
         nsPlyMonSessionPerMin 1.3.6.1.4.1.3224.10.2.1.10 integer32 read-only
Sessions go through this policy per minute
         nsPlyMonTotalSession 1.3.6.1.4.1.3224.10.2.1.11 counter32 read-only
Total Sessions go through this policy