TPT-NGFW-POLICY-MIB: View SNMP OID List / Download MIB

VENDOR: TIPPINGPOINT TECHNOLOGIES


 Home MIB: TPT-NGFW-POLICY-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
     tptNgfwPolicyGroup 1.3.6.1.4.1.10734.3.9.1.1.7
Policy group consisting of firewall, IPS, Reputation, and Quarantine information.
     tptNgfwPolicyNotificationGroup 1.3.6.1.4.1.10734.3.9.1.1.8
Notification sent from TippingPoint Next-generation Firewall rules and inspection profiles.
     tptNgfwPolicyCompl 1.3.6.1.4.1.10734.3.9.1.2.4
Compliance for TippingPoint Next-generation Firewall policies.
 tptNgfwPolicy 1.3.6.1.4.1.10734.3.9.2.4
Policy information and notifications for TippingPoint Next-Generation Firewall products. This includes Firewall rules, IPS, Reputation profiles, Quarantine. Copyright (C) 2016 Trend Micro Incorporated. All Rights Reserved. Trend Micro makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Trend Micro shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated into another language without the prior written consent of Trend Micro. The information is provided 'as is' without warranty of any kind and is subject to change without notice. The only warranties for Trend Micro products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Trend Micro shall not be liable for technical or editorial errors or omissions contained herein. TippingPoint(R), the TippingPoint logo, and Digital Vaccine(R) are registered trademarks of Trend Micro. All other company and product names may be trademarks of their respective holders. All rights reserved. This document contains confidential information, trade secrets or both, which are the property of Trend Micro. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from Trend Micro or one of its subsidiaries. All other company and product names may be trademarks of their respective holders.
     tptNgfwPolicyNotify 1.3.6.1.4.1.10734.3.9.3.0.10
A notification sent when a firewall rule, IPS, Reputation, or Quarantine profile detects a network event of interest.
     tptNgfwPolicyNotifyTime 1.3.6.1.4.1.10734.3.9.3.1.20 dateandtime no-access
The time when the firewall detected a network event and generated this policy notification.
     tptNgfwPolicyNotifyEventSource 1.3.6.1.4.1.10734.3.9.3.1.21 eventsource no-access
The policy component (Firewall, IPS, Reputation, Quarantine) that detected a network event and generated this notification.
     tptNgfwPolicyNotifyEventType 1.3.6.1.4.1.10734.3.9.3.1.22 firewalleventtype no-access
If the notify event was generated by the firewall, this object indicates what type of event was detected.
     tptNgfwPolicyNotifyEventSeverity 1.3.6.1.4.1.10734.3.9.3.1.23 eventseverity no-access
The severity of the detected network event.
     tptNgfwPolicyNotifyCorrelationId 1.3.6.1.4.1.10734.3.9.3.1.24 snmpadminstring no-access
A 128-bit identifier in decimal format. This ID is used to correlate firewall events. For example, a firewall session started and ended notification will have the same correlation ID.
     tptNgfwPolicyNotifyActionType 1.3.6.1.4.1.10734.3.9.3.1.25 actiontype no-access
The type of action taken on network traffic matching a firewall rule or inspection profile.
     tptNgfwPolicyNotifyAction 1.3.6.1.4.1.10734.3.9.3.1.26 snmpadminstring no-access
This object provides additional description of a firewall action. For example, when a quarantine action occurs, this object details if the action was to place traffic in or out of quarantine.
     tptNgfwPolicyNotifyActionSetName 1.3.6.1.4.1.10734.3.9.3.1.27 snmpadminstring no-access
The action set name associated with the firewall rule that detected an event.
     tptNgfwPolicyNotifyRuleName 1.3.6.1.4.1.10734.3.9.3.1.28 snmpadminstring no-access
The firewall rule name that has generated the notification.
     tptNgfwPolicyNotifyInInterface 1.3.6.1.4.1.10734.3.9.3.1.29 snmpadminstring no-access
The interface name that is receiving the traffic that triggered a firewall action.
     tptNgfwPolicyNotifyOutInterface 1.3.6.1.4.1.10734.3.9.3.1.30 snmpadminstring no-access
The interface name sending the suspect traffic.
     tptNgfwPolicyNotifySrcIpAddrType 1.3.6.1.4.1.10734.3.9.3.1.31 inetaddresstype no-access
The IP address type of the network traffic source.
     tptNgfwPolicyNotifySrcIpAddr 1.3.6.1.4.1.10734.3.9.3.1.32 inetaddress no-access
The source IP address generating the network traffic that has triggered a firewall action.
     tptNgfwPolicyNotifySrcPort 1.3.6.1.4.1.10734.3.9.3.1.33 unsigned32 no-access
The source port generating the network traffic.
     tptNgfwPolicyNotifySrcTransIpAddr 1.3.6.1.4.1.10734.3.9.3.1.34 inetaddress no-access
The translated (NAT) source IP address.
     tptNgfwPolicyNotifySrcTransPort 1.3.6.1.4.1.10734.3.9.3.1.35 unsigned32 no-access
The translated (NAT) source port.
     tptNgfwPolicyNotifyDestIpAddrType 1.3.6.1.4.1.10734.3.9.3.1.36 inetaddresstype no-access
The destination IP address type.
     tptNgfwPolicyNotifyDestIpAddr 1.3.6.1.4.1.10734.3.9.3.1.37 inetaddress no-access
The source IP address receiving network traffic that triggered a firewall action.
     tptNgfwPolicyNotifyDestPort 1.3.6.1.4.1.10734.3.9.3.1.38 unsigned32 no-access
The source port receiving the network traffic.
     tptNgfwPolicyNotifyDestTransIpAddr 1.3.6.1.4.1.10734.3.9.3.1.39 inetaddress no-access
The translated (NAT) destination IP address.
     tptNgfwPolicyNotifyDestTransPort 1.3.6.1.4.1.10734.3.9.3.1.40 unsigned32 no-access
The translated (NAT) destination port.
     tptNgfwPolicyNotifyProtocol 1.3.6.1.4.1.10734.3.9.3.1.41 snmpadminstring no-access
The transport protocol of the suspect traffic.
     tptNgfwPolicyNotifyApplicationName 1.3.6.1.4.1.10734.3.9.3.1.42 snmpadminstring no-access
The application name generating network traffic that has triggered a firewall rule.
     tptNgfwPolicyNotifyUserName 1.3.6.1.4.1.10734.3.9.3.1.43 snmpadminstring no-access
The user name, if available, that is responsible for generating network traffic triggering a firewall action.
     tptNgfwPolicyNotifyBytesIn 1.3.6.1.4.1.10734.3.9.3.1.44 counter64 no-access
Source to destination bytes.
     tptNgfwPolicyNotifyBytesOut 1.3.6.1.4.1.10734.3.9.3.1.45 counter64 no-access
Destination to source bytes.
     tptNgfwPolicyNotifyStartTimeSec 1.3.6.1.4.1.10734.3.9.3.1.46 counter64 no-access
The time, in seconds, from EPOC (January 1, 1970 00:00:00) when the event was detected.
     tptNgfwPolicyNotifyStartTimeNano 1.3.6.1.4.1.10734.3.9.3.1.47 counter64 no-access
The fractional time, in nanoseconds, when the event was detected.
     tptNgfwPolicyNotifyRateLimit 1.3.6.1.4.1.10734.3.9.3.1.48 counter64 no-access
The rate-limit, in kbps, of the action set associated with this notification.
     tptNgfwPolicyNotifyPktTraceVer 1.3.6.1.4.1.10734.3.9.3.1.49 packettraceversion no-access
The packet trace version.
     tptNgfwPolicyNotifyPktTraceId 1.3.6.1.4.1.10734.3.9.3.1.50 unsigned32 no-access
The bucket identifier for a packet trace.
     tptNgfwPolicyNotifyPktTraceBegin 1.3.6.1.4.1.10734.3.9.3.1.51 unsigned32 no-access
The starting sequence number for a packet trace.
     tptNgfwPolicyNotifyPktTraceEnd 1.3.6.1.4.1.10734.3.9.3.1.52 unsigned32 no-access
The ending sequence number for a packet trace.
     tptNgfwPolicyNotifyFilterName 1.3.6.1.4.1.10734.3.9.3.1.53 snmpadminstring no-access
The descriptive name of the filter maching the data stream.
     tptNgfwPolicyNotifyProfileName 1.3.6.1.4.1.10734.3.9.3.1.54 snmpadminstring no-access
Profile name.
     tptNgfwPolicyNotifyPolicyName 1.3.6.1.4.1.10734.3.9.3.1.55 snmpadminstring no-access
The firewall policy name that matched network traffic and caused the firewall to take an action.
     tptNgfwPolicyNotifyVlanId 1.3.6.1.4.1.10734.3.9.3.1.56 snmpadminstring no-access
The VLAN tag that the network traffic occured on.
     tptNgfwPolicyNotifyHitCount 1.3.6.1.4.1.10734.3.9.3.1.57 counter64 no-access
Hit count. The number of times, the firewall detected a particulare event as defined by a rule or inspection profile.
     tptNgfwPolicyNotifyMsgParams 1.3.6.1.4.1.10734.3.9.3.1.58 snmpadminstring no-access
A string containing parameters (separated by vertical bars) matching the Message in the Digital Vaccine (the XML tag is Message).
     tptNgfwPolicyNotifyPeriod 1.3.6.1.4.1.10734.3.9.3.1.59 unsigned32 no-access
The aggregation period, in minutes, when the condition is frist detected and this notification sent.