NETSCREEN-TRAP-MIB

File: NETSCREEN-TRAP-MIB.mib (17666 bytes)

Imported modules

NETSCREEN-SMI SNMPv2-SMI SNMPv2-TC

Imported symbols

netscreenTrap netscreenTrapInfo MODULE-IDENTITY
NOTIFICATION-TYPE OBJECT-TYPE DisplayString

Defined Values

netscreenTrapMibModule 1.3.6.1.4.1.3224.2.0
Added new traps introduced in 6.3, which includes 3, 35, 39, 52, 53, 54, 66, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 94, 105, 110, 111, 112, 113, 114, 200, 201, 202, 203, 204, 226, 227, 228, 229, 230, 231, 426, 427, 442, 443, 554, 600, 601, 602, 701, 702, 703, 704, 804, 805, 806, 850
MODULE-IDENTITY    

netscreenTrapHw 1.3.6.1.4.1.3224.0.100
This trap indicates that some kind of hardware problem has occured.
NOTIFICATION-TYPE    

netscreenTrapFw 1.3.6.1.4.1.3224.0.200
This trap indicates that some kind of firewall functions has been triggered.
NOTIFICATION-TYPE    

netscreenTrapSw 1.3.6.1.4.1.3224.0.300
This trap indicates that some kind of software problem has occured.
NOTIFICATION-TYPE    

netscreenTrapTrf 1.3.6.1.4.1.3224.0.400
This trap indicates that some kind of traffic conditions has been triggered.
NOTIFICATION-TYPE    

netscreenTrapVpn 1.3.6.1.4.1.3224.0.500
This trap indicates that VPN tunnel status has occured.
NOTIFICATION-TYPE    

netscreenTrapNsrp 1.3.6.1.4.1.3224.0.600
This trap indicates that NSRP status has occured.
NOTIFICATION-TYPE    

netscreenTrapGPRO 1.3.6.1.4.1.3224.0.700
This trap indicates that some kind of Global PRO problems has occurred.
NOTIFICATION-TYPE    

netscreenTrapDrp 1.3.6.1.4.1.3224.0.800
This trap indicates that Drp status has occured.
NOTIFICATION-TYPE    

netscreenTrapIFFailover 1.3.6.1.4.1.3224.0.900
This trap indicates that interface fail over status has occured.
NOTIFICATION-TYPE    

netscreenTrapIDPAttack 1.3.6.1.4.1.3224.0.1000
This trap indicates that IDP attack status has occured.
NOTIFICATION-TYPE    

netscreenTrapType 1.3.6.1.4.1.3224.2.1
The integer value of the raised alarm type. Note that the type should be interpreted within a specific trap
OBJECT-TYPE    
  INTEGER traffic-sec(1), traffic-min(2), winnuke(4), syn-attack(5), tear-drop(6), ping-death(7), ip-spoofing(8), ip-src-route(9), land(10), icmp-flood(11), udp-flood(12), illegal-cms-svr(13), url-block-srv(14), high-availability(15), port-scan(16), addr-sweep(17), low-memory(20), dns-srv-down(21), generic-HW-fail(22), lb-srv-down(23), log-full(24), x509(25), vpn-ike(26), admin(27), sme(28), dhcp(29), cpu-usage-high(30), ip-conflict(31), attact-malicious-url(32), session-threshold(33), ssh-alarm(34), audit-storage(35), rxbd-low-alarm(39), vpn-tunnel-up(40), vpn-tunnel-down(41), vpn-replay-attack(42), vpn-l2tp-tunnel-remove(43), vpn-l2tp-tunnel-remove-err(44), vpn-l2tp-call-remove(45), vpn-l2tp-call-remove-err(46), vpn-ias-too-many(47), vpn-ias-over-threshold(48), vpn-ias-under-threshold(49), vpn-ias-ike-error(50), allocated-session-threshold(51), av-csp-alarm(52), av-alarm(53), apppry-alarm(54), nsrp-rto-up(60), nsrp-rto-down(61), nsrp-trackip-success(62), nsrp-trackip-failed(63), nsrp-trackip-failover(64), nsrp-inconsistent-configuration(65), trackip-status(66), nsrp-vsd-init(70), nsrp-vsd-master(71), nsrp-vsd-pbackup(72), nsrp-vsd-backup(73), nsrp-vsd-ineligible(74), nsrp-vsd-inoperable(75), nsrp-vsd-req-hearbeat-2nd(76), nsrp-vsd-reply-2nd(77), nsrp-rto-duplicated(78), ip-dup-master(79), di-heap-create-fail(80), mem-alloc-fail(81), vrrp-status-alarm(82), sccp-alarm(83), mgcp-reinit(84), mlfr-alarm(85), fr-alarm(86), cisco-hdlc-alarm(87), pppow-alarm(88), h323-alarm(89), isdn-alarm(90), interface-backup(91), wan-card-function(92), usb-device-operation(93), interface-failure(94), ppp-no-ip-cfg(95), ppp-no-ip-in-pool(96), ip-addr-event(101), dip-util-raise(102), dip-util-clear(103), dot1x-alarm(105), vpn-ias-radius-error(110), vpn-ikeid-enum-attack(111), vpn-softlimit-reached(112), vpn-ikedos-attack(113), vpn-acvpn-profile-error(114), route-sys-entry-ex(200), route-vr-entry-ex(201), route-ospf-hello-flood(202), route-ospf-lsa-flood(203), route-rip-update-flood(204), route-alarm(205), ospf-flood(206), rip-flood(207), bgp-established(208), bgp-backwardtransition(209), ospf-virtifstatechange(210), ospf-nbrstatechange(211), ospf-virtnbrstatechange(212), ospf-ifconfigerror(213), ospf-virtifconfigerror(214), ospf-ifauthfailure(215), ospf-virtifauthfailure(216), ospf-ifrxbadpacket(217), ospf-virtifrxbadpacket(218), ospf-txretransmit(219), ospf-virtiftxretransmit(220), ospf-originatelsa(221), ospf-maxagelsa(222), ospf-lsdboverflow(223), ospf-lsdbapproachingoverflow(224), ospf-ifstatechange(225), bgp-alarm(226), ripng-flood(227), route-ripng-update-flood(228), pbr-alarm(229), nhrp-alarm(230), ospfv3-alarm(231), ids-component(400), ids-icmp-flood(401), ids-udp-flood(402), ids-winnuke(403), ids-port-scan(404), ids-addr-sweep(405), ids-tear-drop(406), ids-syn(407), ids-ip-spoofing(408), ids-ping-death(409), ids-ip-source-route(410), ids-land(411), syn-frag-attack(412), tcp-without-flag(413), unknow-ip-packet(414), bad-ip-option(415), tcp-mal-url(426), tcp-sess-mal-num(427), dst-ip-session-limit(430), ids-block-zip(431), ids-block-jar(432), ids-block-exe(433), ids-block-activex(434), icmp-fragment(435), too-large-icmp(436), tcp-syn-fin(437), tcp-fin-no-ack(438), ids-tcp-syn-ack-ack(439), ids-ip-block-frag(440), ids-icmp-ping-id-zero(441), tcp-sweep(442), udp-sweep(443), av-scan-mgr(554), mcore-alarm(601), spim-alarm(602), sm-down(701), sm-packet-drop(702), sm-overload(703), sm-cpu-unresponsive(704), cpu-limit-s2f-forced(800), cpu-limit-s2f-auto(801), cpu-limit-f2s-forced(802), cpu-limit-f2s-timeout(803), cpu-limit-f2s-auto(804), sec-potential-voilation(805), flow-sess-cache(806), vsys-session-limit(850)  

netscreenTrapDesc 1.3.6.1.4.1.3224.2.3
The textual description of the alarm
OBJECT-TYPE    
  DisplayString Size(0..255)