NETSCREEN-TRAP-MIB: View SNMP OID List / Download MIB

VENDOR: NETSCREEN TECHNOLOGIES


 Home MIB: NETSCREEN-TRAP-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 netscreenTrapHw 1.3.6.1.4.1.3224.0.100
This trap indicates that some kind of hardware problem has occured.
 netscreenTrapFw 1.3.6.1.4.1.3224.0.200
This trap indicates that some kind of firewall functions has been triggered.
 netscreenTrapSw 1.3.6.1.4.1.3224.0.300
This trap indicates that some kind of software problem has occured.
 netscreenTrapTrf 1.3.6.1.4.1.3224.0.400
This trap indicates that some kind of traffic conditions has been triggered.
 netscreenTrapVpn 1.3.6.1.4.1.3224.0.500
This trap indicates that VPN tunnel status has occured.
 netscreenTrapNsrp 1.3.6.1.4.1.3224.0.600
This trap indicates that NSRP status has occured.
 netscreenTrapGPRO 1.3.6.1.4.1.3224.0.700
This trap indicates that some kind of Global PRO problems has occurred.
 netscreenTrapDrp 1.3.6.1.4.1.3224.0.800
This trap indicates that Drp status has occured.
 netscreenTrapIFFailover 1.3.6.1.4.1.3224.0.900
This trap indicates that interface fail over status has occured.
 netscreenTrapIDPAttack 1.3.6.1.4.1.3224.0.1000
This trap indicates that IDP attack status has occured.
 netscreenTrapMibModule 1.3.6.1.4.1.3224.2.0
Added new traps introduced in 6.3, which includes 3, 35, 39, 52, 53, 54, 66, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 94, 105, 110, 111, 112, 113, 114, 200, 201, 202, 203, 204, 226, 227, 228, 229, 230, 231, 426, 427, 442, 443, 554, 600, 601, 602, 701, 702, 703, 704, 804, 805, 806, 850
 netscreenTrapType 1.3.6.1.4.1.3224.2.1 integer no-access
The integer value of the raised alarm type. Note that the type should be interpreted within a specific trap Enumeration: 'vpn-ikedos-attack': 113, 'vpn-ike': 26, 'sccp-alarm': 83, 'nsrp-vsd-req-hearbeat-2nd': 76, 'ids-ping-death': 409, 'winnuke': 4, 'tcp-sweep': 442, 'vpn-l2tp-tunnel-remove': 43, 'route-ospf-hello-flood': 202, 'ospf-nbrstatechange': 211, 'allocated-session-threshold': 51, 'isdn-alarm': 90, 'nsrp-trackip-failover': 64, 'ripng-flood': 227, 'route-ripng-update-flood': 228, 'bgp-alarm': 226, 'ospf-ifrxbadpacket': 217, 'spim-alarm': 602, 'session-threshold': 33, 'nsrp-rto-duplicated': 78, 'ospf-originatelsa': 221, 'ids-block-zip': 431, 'ids-port-scan': 404, 'rxbd-low-alarm': 39, 'ospf-flood': 206, 'mem-alloc-fail': 81, 'bad-ip-option': 415, 'vpn-ias-under-threshold': 49, 'attact-malicious-url': 32, 'vpn-ias-over-threshold': 48, 'traffic-min': 2, 'flow-sess-cache': 806, 'tcp-without-flag': 413, 'syn-frag-attack': 412, 'ids-ip-block-frag': 440, 'tcp-fin-no-ack': 438, 'ids-ip-spoofing': 408, 'rip-flood': 207, 'nsrp-trackip-success': 62, 'vpn-l2tp-call-remove-err': 46, 'cpu-limit-f2s-auto': 804, 'route-alarm': 205, 'nsrp-rto-up': 60, 'icmp-flood': 11, 'ssh-alarm': 34, 'ppp-no-ip-in-pool': 96, 'vpn-ias-too-many': 47, 'nsrp-vsd-pbackup': 72, 'dot1x-alarm': 105, 'tcp-sess-mal-num': 427, 'mcore-alarm': 601, 'av-csp-alarm': 52, 'mlfr-alarm': 85, 'ospf-virtifstatechange': 210, 'port-scan': 16, 'ospf-virtiftxretransmit': 220, 'nsrp-vsd-master': 71, 'sec-potential-voilation': 805, 'apppry-alarm': 54, 'pbr-alarm': 229, 'dhcp': 29, 'sme': 28, 'lb-srv-down': 23, 'vpn-l2tp-call-remove': 45, 'ids-block-activex': 434, 'route-rip-update-flood': 204, 'ids-icmp-ping-id-zero': 441, 'vpn-ikeid-enum-attack': 111, 'trackip-status': 66, 'mgcp-reinit': 84, 'ids-icmp-flood': 401, 'tcp-mal-url': 426, 'di-heap-create-fail': 80, 'ospf-maxagelsa': 222, 'ip-conflict': 31, 'ospf-virtnbrstatechange': 212, 'interface-backup': 91, 'vpn-ias-ike-error': 50, 'ospf-ifstatechange': 225, 'audit-storage': 35, 'ids-block-jar': 432, 'ospf-lsdboverflow': 223, 'admin': 27, 'url-block-srv': 14, 'ping-death': 7, 'sm-down': 701, 'ospf-txretransmit': 219, 'nsrp-trackip-failed': 63, 'cpu-limit-s2f-forced': 800, 'vpn-tunnel-down': 41, 'nsrp-vsd-init': 70, 'illegal-cms-svr': 13, 'ospfv3-alarm': 231, 'vpn-replay-attack': 42, 'ids-component': 400, 'ip-addr-event': 101, 'interface-failure': 94, 'ospf-ifauthfailure': 215, 'route-sys-entry-ex': 200, 'cpu-usage-high': 30, 'syn-attack': 5, 'low-memory': 20, 'generic-HW-fail': 22, 'cpu-limit-f2s-forced': 802, 'ospf-virtifrxbadpacket': 218, 'tear-drop': 6, 'route-vr-entry-ex': 201, 'cisco-hdlc-alarm': 87, 'log-full': 24, 'cpu-limit-f2s-timeout': 803, 'dns-srv-down': 21, 'ids-addr-sweep': 405, 'vpn-ias-radius-error': 110, 'ids-ip-source-route': 410, 'ids-land': 411, 'vpn-softlimit-reached': 112, 'av-scan-mgr': 554, 'ospf-lsdbapproachingoverflow': 224, 'bgp-established': 208, 'ids-block-exe': 433, 'ids-udp-flood': 402, 'ids-syn': 407, 'tcp-syn-fin': 437, 'fr-alarm': 86, 'nsrp-rto-down': 61, 'vrrp-status-alarm': 82, 'nsrp-inconsistent-configuration': 65, 'cpu-limit-s2f-auto': 801, 'nsrp-vsd-ineligible': 74, 'dip-util-raise': 102, 'ppp-no-ip-cfg': 95, 'nsrp-vsd-backup': 73, 'ids-winnuke': 403, 'sm-overload': 703, 'ids-tear-drop': 406, 'udp-sweep': 443, 'vpn-tunnel-up': 40, 'route-ospf-lsa-flood': 203, 'vpn-acvpn-profile-error': 114, 'ospf-virtifconfigerror': 214, 'ospf-ifconfigerror': 213, 'dst-ip-session-limit': 430, 'high-availability': 15, 'ip-src-route': 9, 'traffic-sec': 1, 'nhrp-alarm': 230, 'vsys-session-limit': 850, 'sm-packet-drop': 702, 'h323-alarm': 89, 'ospf-virtifauthfailure': 216, 'icmp-fragment': 435, 'vpn-l2tp-tunnel-remove-err': 44, 'bgp-backwardtransition': 209, 'too-large-icmp': 436, 'x509': 25, 'usb-device-operation': 93, 'sm-cpu-unresponsive': 704, 'av-alarm': 53, 'ids-tcp-syn-ack-ack': 439, 'udp-flood': 12, 'nsrp-vsd-inoperable': 75, 'pppow-alarm': 88, 'dip-util-clear': 103, 'ip-dup-master': 79, 'land': 10, 'nsrp-vsd-reply-2nd': 77, 'unknow-ip-packet': 414, 'addr-sweep': 17, 'wan-card-function': 92, 'ip-spoofing': 8.
 netscreenTrapDesc 1.3.6.1.4.1.3224.2.3 displaystring no-access
The textual description of the alarm