TPT-NGFW-LOGGING-MIB: View SNMP OID List / Download MIB

VENDOR: TIPPINGPOINT TECHNOLOGIES


 Home MIB: TPT-NGFW-LOGGING-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
     tptNgfwLoggingGroup 1.3.6.1.4.1.10734.3.9.1.1.9
Logging group consisting of system, audit, and VPN log objects.
     tptNgfwLoggingNotificationGroup 1.3.6.1.4.1.10734.3.9.1.1.10
NGFW Logging notifications.
     tptNgfwLoggingCompl 1.3.6.1.4.1.10734.3.9.1.2.3
Compliance for TippingPoint Next-generation Firewall logging MIB.
 tptNgfwLogging 1.3.6.1.4.1.10734.3.9.2.5
Logging information and notifications for TippingPoint Next-Generation Firewall products. Copyright (C) 2016 Trend Micro Incorporated. All Rights Reserved. Trend Micro makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Trend Micro shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated into another language without the prior written consent of Trend Micro. The information is provided 'as is' without warranty of any kind and is subject to change without notice. The only warranties for Trend Micro products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Trend Micro shall not be liable for technical or editorial errors or omissions contained herein. TippingPoint(R), the TippingPoint logo, and Digital Vaccine(R) are registered trademarks of Trend Micro. All other company and product names may be trademarks of their respective holders. All rights reserved. This document contains confidential information, trade secrets or both, which are the property of Trend Micro. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from Trend Micro or one of its subsidiaries. All other company and product names may be trademarks of their respective holders.
     tptNgfwSysLogNotify 1.3.6.1.4.1.10734.3.9.3.0.15
System log notification.
     tptNgfwAuditLogNotify 1.3.6.1.4.1.10734.3.9.3.0.16
Audit-log notification.
     tptNgfwVpnLogNotify 1.3.6.1.4.1.10734.3.9.3.0.17
A notification for VPN log information.
     tptNgfwLogNotifyTime 1.3.6.1.4.1.10734.3.9.3.1.60 dateandtime no-access
The date and time when the entry was logged.
     tptNgfwLogNotifyHost 1.3.6.1.4.1.10734.3.9.3.1.61 snmpadminstring no-access
The host name that generated the system log.
     tptNgfwLogNotifySource 1.3.6.1.4.1.10734.3.9.3.1.62 snmpadminstring no-access
The component that generated the system log.
     tptNgfwLogNotifySeverity 1.3.6.1.4.1.10734.3.9.3.1.63 severity no-access
The severity of the logged event.
     tptNgfwLogNotifyText 1.3.6.1.4.1.10734.3.9.3.1.64 snmpadminstring no-access
The full log text.
     tptNgfwAuditLogNotifyAccess 1.3.6.1.4.1.10734.3.9.3.1.65 unsigned32 no-access
The access level of the user initiating the audit check and generating the log. This is a bit field with the following mapping: 0x0 - normal 0x1 - operator 0x4 - administrator 0x8 - super-user
     tptNgfwAuditLogNotifyType 1.3.6.1.4.1.10734.3.9.3.1.66 snmpadminstring no-access
The interface source of the audit log action.
     tptNgfwAuditLogNotifyIpAddrType 1.3.6.1.4.1.10734.3.9.3.1.67 inetaddresstype no-access
The type of IP address from which the user connected.
     tptNgfwAuditLogNotifyIpAddr 1.3.6.1.4.1.10734.3.9.3.1.68 inetaddress no-access
The IP address from which the user connected.
     tptNgfwAuditLogNotifyCategory 1.3.6.1.4.1.10734.3.9.3.1.69 auditlogcategory no-access
The functional area where the audit log was generated.
     tptNgfwAuditLogNotifyResult 1.3.6.1.4.1.10734.3.9.3.1.70 auditlogresult no-access
The result, pass or fail, of an audit check.
     tptNgfwAuditLogNotifyUser 1.3.6.1.4.1.10734.3.9.3.1.71 snmpadminstring no-access
The user initiating the audit check and generating the log.
     tptNgfwAuditLogNotifyMessage 1.3.6.1.4.1.10734.3.9.3.1.72 snmpadminstring no-access
A description of what configuration change was attempted (and possibly succeeded) by the user.