CISCO-UNIFIED-FIREWALL-MIB
File:
CISCO-UNIFIED-FIREWALL-MIB.mib (113279 bytes)
Imported modules
Imported symbols
Defined Types
CufwConnSummaryEntry |
|
SEQUENCE |
|
|
|
|
cufwConnProtocol |
CFWNetworkProtocol |
|
|
cufwConnNumAttempted |
Counter64 |
|
|
cufwConnNumSetupsAborted |
Counter64 |
|
|
cufwConnNumPolicyDeclined |
Counter64 |
|
|
cufwConnNumResDeclined |
Counter64 |
|
|
cufwConnNumHalfOpen |
Gauge32 |
|
|
cufwConnNumActive |
Gauge32 |
|
|
cufwConnNumAborted |
Counter64 |
|
|
cufwConnSetupRate1 |
Gauge32 |
|
|
cufwConnSetupRate5 |
Gauge32 |
|
CufwAppConnSummaryEntry |
|
SEQUENCE |
|
|
|
|
cufwAppConnProtocol |
CFWApplicationProtocol |
|
|
cufwAppConnNumAttempted |
Counter64 |
|
|
cufwAppConnNumSetupsAborted |
Counter64 |
|
|
cufwAppConnNumPolicyDeclined |
Counter64 |
|
|
cufwAppConnNumResDeclined |
Counter64 |
|
|
cufwAppConnNumHalfOpen |
Gauge32 |
|
|
cufwAppConnNumActive |
Gauge32 |
|
|
cufwAppConnNumAborted |
Counter64 |
|
|
cufwAppConnSetupRate1 |
Gauge32 |
|
|
cufwAppConnSetupRate5 |
Gauge32 |
|
CufwPolicyConnSummaryEntry |
|
SEQUENCE |
|
|
|
|
cufwPolConnPolicy |
CFWPolicy |
|
|
cufwPolConnPolicyTargetType |
CFWPolicyTargetType |
|
|
cufwPolConnPolicyTarget |
CFWPolicyTarget |
|
|
cufwPolConnProtocol |
CFWNetworkProtocol |
|
|
cufwPolConnNumAttempted |
Counter64 |
|
|
cufwPolConnNumSetupsAborted |
Counter64 |
|
|
cufwPolConnNumPolicyDeclined |
Counter64 |
|
|
cufwPolConnNumResDeclined |
Counter64 |
|
|
cufwPolConnNumHalfOpen |
Gauge32 |
|
|
cufwPolConnNumActive |
Gauge32 |
|
|
cufwPolConnNumAborted |
Counter64 |
|
CufwPolicyAppConnSummaryEntry |
|
SEQUENCE |
|
|
|
|
cufwPolAppConnPolicy |
CFWPolicy |
|
|
cufwPolAppConnPolicyTargetType |
CFWPolicyTargetType |
|
|
cufwPolAppConnPolicyTarget |
CFWPolicyTarget |
|
|
cufwPolAppConnProtocol |
CFWApplicationProtocol |
|
|
cufwPolAppConnNumAttempted |
Counter64 |
|
|
cufwPolAppConnNumSetupsAborted |
Counter64 |
|
|
cufwPolAppConnNumPolicyDeclined |
Counter64 |
|
|
cufwPolAppConnNumResDeclined |
Counter64 |
|
|
cufwPolAppConnNumHalfOpen |
Gauge32 |
|
|
cufwPolAppConnNumActive |
Gauge32 |
|
|
cufwPolAppConnNumAborted |
Counter64 |
|
CufwInspectionEntry |
|
SEQUENCE |
|
|
|
|
cufwInspectionPolicyName |
CFWPolicy |
|
|
cufwInspectionProtocol |
CFWApplicationProtocol |
|
|
cufwInspectionStatus |
TruthValue |
|
CufwUrlfServerEntry |
|
SEQUENCE |
|
|
|
|
cufwUrlfServerAddrType |
InetAddressType |
|
|
cufwUrlfServerAddress |
InetAddress |
|
|
cufwUrlfServerPort |
InetPortNumber |
|
|
cufwUrlfServerVendor |
CFWUrlfVendorId |
|
|
cufwUrlfServerStatus |
CFWUrlServerStatus |
|
|
cufwUrlfServerReqsNumProcessed |
Counter64 |
|
|
cufwUrlfServerReqsNumAllowed |
Counter64 |
|
|
cufwUrlfServerReqsNumDenied |
Counter64 |
|
|
cufwUrlfServerNumTimeouts |
Counter64 |
|
|
cufwUrlfServerNumRetries |
Counter64 |
|
|
cufwUrlfServerRespsNumReceived |
Counter64 |
|
|
cufwUrlfServerRespsNumLate |
Counter64 |
|
|
cufwUrlfServerAvgRespTime1 |
Gauge32 |
|
|
cufwUrlfServerAvgRespTime5 |
Gauge32 |
|
Defined Values
ciscoUnifiedFirewallMIB |
1.3.6.1.4.1.9.9.491 |
Overview of Cisco Firewall MIB
==============================
This MIB Module models status and performance
statistics pertaining to the common features supported
by Cisco firewall implementations. For each firewall
feature, capability (if applicable) and statistics are
defined. Supporting the configuration of firewall
features is outside the scope of this MIB.
Following are the major firewall features:
1) 'Stateful Packet Filtering'
Creating and maintaining the state of authorized
traffic flows dynamically to permit only
flows authorized by the policy is a mandatory
function of a firewall.
This MIB instruments the activity and memory
usage by this function.
2) 'Application Inspection'
This refers to the function of inspecting the
headers of layer 3 and layer 4 protocols and
creating dynamic entries in the connection
table for traffic flows spawned by an already
established traffic flow.
This MIB reflects the protocols that are being
inspected.
3) 'URL Filtering'
This refers to the function of facilitating
or restricting URL access requests through
the firewall by consulting either local policy
or that configured on a dedicated URL filtering
server.
This MIB instruments the URL filtering activity,
the status and activity of distinct URL filtering
servers configured on the firewall and the
impact of the performance of the URL filtering
servers on the latency and throughput of the
firewall.
4) 'Proxy Authentication'
This refers to the function of authenticating
and/or authorizing users on behalf of servers
on the secure side of the firewall. This operation
could affect the throughput of the firewall.
The MIB objects pertaining to Proxy Authentication
will be defined in a subsequent revision of this
MIB.
5) 'Transparent Mode Operation'
A firewall could operate as a bridge and yet
filter traffic based on layer 3-layer 7 control
and payload information. Operating in this mode
makes it easy to implement a firewall without
fragmenting existing subnets. Another advantage
of this mode of operation is enhanced security.
This MIB instruments the status, activity,
and performance of the firewall in this mode.
Please note that to fully manage a firewall
operating in this mode, the firewall must also
support the bridge MIB (BRIDGE-MIB).
6) 'Advanced Application Inspection and Control'
This function is also termed 'Application
Firewall' and pertains to inspecting payload and
headers of application traffic to make sure the
traffic flows conform to the configured security
policy.
Monitoring this function entails identifying the
security alerts generated by this function and
measuring the impact on firewall performance by
this task. Application Firewall will be
instrumented in a separate MIB dedicated for the
function.
7) 'Failover' or 'Redundancy'
Redundancy configuration is essential for business
critical firewalls.
Instrumenting this function entails reflecting
the configuration of redundancy and identifying
failover events.
The MIB objects pertaining to Proxy Authentication
will be defined in a subsequent revision of this
MIB.
The management information for each firewall feature
is defined in a distinct module compliance unit. The
compliance units corresponding to basic features of
firewalls are defined as mandatory.
Acronyms
========
Following are definitions of some terms used in this
module. Please refer to the module conformance for a
glossary of feature-specific terms.
`Firewall'
A firewall is a set of related programs,
implemented on a host or a network device, that
protects the resources of a private network from
users from other networks. Common firewalling
functions include stateful packet filtering,
proxy authentication of users on behalf of
applications on the secure side of the firewall,
URL access control, inspection of payload of
traffic streams to determine security threats.
`Layer2 Firewall' or 'Transparent Firewall'
A firewall device that operates as a bridge
while performing firewalling function.
`Connection'
The record in the firewall of a traffic strean
that has been authorized to flow through the
firewall.
`Half Open Connection'
For a connection oriented protocol: a connection
that has not reached the established on both the
sides of the connection.
For a connection-less protocol: the connection
corresponding to a traffic stream where traffic
flow has occurred (since the establishment of the
connection entry) only on one direction.
`Embryonic Connection'
The connection entry corresponding to an
application layer protocol in which the signaling
channel has been established while the setup of
the data channel is underway.
`Policy'
An element of firewall configuration that
identifies the access rights to a resource by a
traffic source. An example of a policy is an
Access Control Rule.
`Policy Target'
An entity to which a policy is applied so that
the action corresponding to the policy is taken
only on traffic streams associated with the
entity. An example of a policy target is an
interface.
`URL Filtering Server'
A server which is employed by the firewall to
enforce URL access policies.
`Protocol Data Unit' or PDU
An instance of the unit of information using which
a protocol operates is called the Protocol Data
Unit or the PDU of the protocol.
`Deep Packet Inspection'
The task of examining the contents of the payloads
of one or more layer 7 application protocols
with a view to enforcing the local security
policies termed 'Deep Packet Inspection'.
`Advanced Application Inspection and Control'
An entity that performs deep packet inspection
of layer 7 application protocol data units is
termed an 'Application Firewall'.
|
MODULE-IDENTITY |
|
|
|
cufwConnGlobalNumAttempted |
1.3.6.1.4.1.9.9.491.1.1.1.1 |
Connection Statistics Aggregation
Connection 1 +-----------+
------------->| |-------> Global Connection Summary
Connection 2 | |
------------->| |
Connection 3 | |
------------->| First |------------> ConnSummary
| Level | (i.e, L-3/4 Protocol
Connection 4 |Aggregation| Connection Summary)
------------->| |
. | |
. | |---------------> PolicyConnSummary
Connection N | | (i.e, L-3/4 Policy Target based
------------->| | Protocol Connection Summary)
+-----------+
+-----------+
L-3/4 Protocol | |
Connection Summary | |
------------------>| |---------> AppConnSummary
| | (i.e, L-7 Protocol
| Second | Connection Summary)
|---Level---|
L-3/4 Policy Target |Aggregation|
based Protocol | |
Connection Summary | |
------------------>| |---------------> PolicyAppConnSummary
| | (i.e, L-7 Policy Target based
| | Protocol Connection Summary)
+-----------+
Specifically, the object
'cufwConnGlobalNumAttempted' models
the number of connections which are attempted to
be set up through the firewall.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnGlobalNumSetupsAborted |
1.3.6.1.4.1.9.9.491.1.1.1.2 |
The number of connection setup attempts that
were aborted before the connection could proceed
to completion. The counter includes setup
attempts aborted by the firewall as well as
those aborted by the initiator and/or the
responder(s) of/to the connection setup attempt.
Consequently, this value subsumes the values of
objects 'cufwConnGlobalNumPolicyDeclined' and
'cufwConnGlobalNumResDeclined'.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnGlobalNumPolicyDeclined |
1.3.6.1.4.1.9.9.491.1.1.1.3 |
The number of connections which were attempted to
be setup but which were declined due to reasons of
security policy.
This includes the connections that failed
authentication.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnGlobalNumResDeclined |
1.3.6.1.4.1.9.9.491.1.1.1.4 |
The number of connections which were attempted to
be setup but which were declined due to
non-availability of required resources.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnGlobalNumHalfOpen |
1.3.6.1.4.1.9.9.491.1.1.1.5 |
The number of connections which are in the process
of being setup but which have not yet reached the
established state in the connection table.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnGlobalNumActive |
1.3.6.1.4.1.9.9.491.1.1.1.6 |
The number of connections which are currently active.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnGlobalNumExpired |
1.3.6.1.4.1.9.9.491.1.1.1.7 |
The number of connections which were active but
which were since normally terminated.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnGlobalNumAborted |
1.3.6.1.4.1.9.9.491.1.1.1.8 |
The number of connections which were active but
which were aborted by the firewall due to reasons
of policy or resource rationing.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnGlobalNumEmbryonic |
1.3.6.1.4.1.9.9.491.1.1.1.9 |
The number of embryonic application layer connections
(that is, connections in which the signaling channel
has been established while the data channel is awaiting
setup).
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnGlobalConnSetupRate1 |
1.3.6.1.4.1.9.9.491.1.1.1.10 |
The averaged number of connections which the firewall
establishing per second, averaged over the last 60
seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnGlobalConnSetupRate5 |
1.3.6.1.4.1.9.9.491.1.1.1.11 |
The averaged number of connections which the firewall
establishing per second, averaged over the last 300
seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnGlobalNumRemoteAccess |
1.3.6.1.4.1.9.9.491.1.1.1.12 |
The number of active connections which correspond
to remote access applications. Specifically, the
protocol for which the connection is established
must be one of PPP, PPTP, L2TP or remote access IPsec
(IPsec connections employing extended authentication).
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnResMemoryUsage |
1.3.6.1.4.1.9.9.491.1.1.2.1 |
The amount of memory occupied by all structures
required to maintain the state of all connections
which are either being established or are active.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnResActiveConnMemoryUsage |
1.3.6.1.4.1.9.9.491.1.1.2.2 |
The amount of memory occupied by all structures
required to maintain the state of all active
connections.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnResHOConnMemoryUsage |
1.3.6.1.4.1.9.9.491.1.1.2.3 |
The amount of memory occupied by all structures
required to maintain the state of all half
open connections.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnResEmbrConnMemoryUsage |
1.3.6.1.4.1.9.9.491.1.1.2.4 |
The amount of memory occupied by all structures
required to maintain the state of all embryonic
connections.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnReptAppStats |
1.3.6.1.4.1.9.9.491.1.1.3.1 |
Setting this object to 'true' enables the MIB to
report connection activity statistics pertaining
to application protocols.
If this object is set to 'false', the agent
should stop updating the objects defined in this
module pertaining to application protocols.
Application monitoring could be a resource intensive
operation. It is expected that the administrators
would use this control to disable application
monitoring when the performance of the firewall is
degrading.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwConnSummaryTable |
1.3.6.1.4.1.9.9.491.1.1.4.1 |
This table summarizes the connection activity on
the firewall per layer3-layer 4 protocol instance.
Each entry in the table lists the connection
summary of a distinct network protocol.
For instance, the conceptual row corresponding to the
index
cufwConnProtocol = fwpTcp
yields the summary of TCP connection activity on the
firewall since its reboot.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CufwConnSummaryEntry |
|
cufwConnSummaryEntry |
1.3.6.1.4.1.9.9.491.1.1.4.1.1 |
Each entry contains the summary of connection
activity for a layer3-layer4 network protocol.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CufwConnSummaryEntry |
|
|
cufwConnProtocol |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.1 |
The (L3-L4) protocol for which this conceptual
row summarizes the connection activity on the
managed entity.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWNetworkProtocol |
|
|
cufwConnNumAttempted |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.2 |
The number of connections attempted since the last
reboot of the firewall, corresponding to the protocol
denoted by 'cufwConnProtocol'.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnNumSetupsAborted |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.3 |
The number of connection setup attempts,
corresponding to the protocol denoted by
'cufwConnProtocol', that were aborted before the
connection could proceed to completion. The
counter includes setup attempts aborted by the
firewall as well as those aborted by the initiator
and/or the responder(s) of/to the connection setup
attempt.
Consequently, this value subsumes the values of
objects 'cufwConnNumPolicyDeclined' and
'cufwConnNumResDeclined'.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnNumPolicyDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.4 |
The number of connection attempts that were declined
due to security policy, corresponding to the protocol
denoted by 'cufwConnProtocol'.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnNumResDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.5 |
The number of connection attempts that were declined
due to resource unavailability, corresponding to the
protocol denoted by 'cufwConnProtocol'.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnNumHalfOpen |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.6 |
The number of connections that are currently in the
process of being established, corresponding to the
protocol denoted by 'cufwConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnNumActive |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.7 |
The number of connections that are currently active,
corresponding to the protocol denoted by
'cufwConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnNumAborted |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.8 |
The number of connections that were abnormally
terminated after successful establishment,
corresponding to the protocol denoted by
'cufwConnProtocol'.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwConnSetupRate1 |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.9 |
The connection setup rate averaged over the last
60 seconds corresponding to the protocol denoted by
'cufwConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwConnSetupRate5 |
1.3.6.1.4.1.9.9.491.1.1.4.1.1.10 |
The connection setup rate averaged over the last
300 seconds corresponding to the protocol denoted by
'cufwConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwAppConnSummaryTable |
1.3.6.1.4.1.9.9.491.1.1.4.2 |
This table lists the summary of firewall
connections pertaining to Layer 7 protocols,
catalogued by distinct application protocols.
Each entry in the table lists the connection
summary corresponding to a distinct application
protocol.
For instance, to obtain the connection summary
for SMTP on the firewall since the last reboot
of the device, use the conceptual row
corresponding to
cufwAppConnProtocol = fwApSmtp
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CufwAppConnSummaryEntry |
|
cufwAppConnSummaryEntry |
1.3.6.1.4.1.9.9.491.1.1.4.2.1 |
Each entry contains the summary of connection
activity for a distinct layer 7 protocol identified
by the index element 'cufwAppConnProtocol'.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CufwAppConnSummaryEntry |
|
|
cufwAppConnProtocol |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.1 |
The layer7 protocol for which this conceptual
row summarizes the connection activity for this
firewall.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWApplicationProtocol |
|
|
cufwAppConnNumAttempted |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.2 |
The number of connections attempted since the last
reboot of the firewall, corresponding to the protocol
denoted by 'cufwAppConnProtocol'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAppConnNumSetupsAborted |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.3 |
The number of connection setup attempts,
corresponding to the protocol denoted by
'cufwAppConnProtocol', that were aborted before
the connection could proceed to completion. The
counter includes setup attempts aborted by the
firewall as well as those aborted by the initiator
and/or the responder(s) of/to the connection setup
attempt.
Consequently, this value subsumes the values of
objects 'cufwAppConnNumPolicyDeclined' and
'cufwAppConnNumResDeclined'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAppConnNumPolicyDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.4 |
The number of connection attempts that were declined
due to security policy, corresponding to the protocol
denoted by 'cufwAppConnProtocol'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAppConnNumResDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.5 |
The number of connection attempts that were declined
due to resource unavailability, corresponding to the
protocol denoted by 'cufwAppConnProtocol'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAppConnNumHalfOpen |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.6 |
The number of connections that are currently in the
process of being established, corresponding to the
protocol denoted by 'cufwAppConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwAppConnNumActive |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.7 |
The number of connections that are currently active,
corresponding to the protocol denoted by
'cufwAppConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwAppConnNumAborted |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.8 |
The number of connections that were terminated by the
firewall successful establishment, corresponding
to the protocol denoted by 'cufwAppConnProtocol'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAppConnSetupRate1 |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.9 |
The connection setup rate averaged over the last
60 seconds corresponding to the protocol denoted by
'cufwAppConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwAppConnSetupRate5 |
1.3.6.1.4.1.9.9.491.1.1.4.2.1.10 |
The connection setup rate averaged over the last
300 seconds corresponding to the protocol denoted by
'cufwAppConnProtocol'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwPolicyConnSummaryTable |
1.3.6.1.4.1.9.9.491.1.1.4.3 |
This table lists the summary of firewall
connections for layer3-layer 4 protocols catalogued
on a per policy basis.
Each entry in the table lists the connection summary of
a distinct network protocol, configured on the specified
policy on the firewall, and pertaining to a specified
target to which the policy is currently applied.
If a policy is bound to a target, it would have one
or more entries in this table. If the policy is
detached from the target, all entries corresponding
to the association between the policy and the target
are elminated from this table.
Although the information is indexed by policy targets
as well, one may aggregate the connection summary for
a specific policy across all the target to which the
policy is currently applied by setting
cufwConnPolicyTargetType = 'targetAll'
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CufwPolicyConnSummaryEntry |
|
cufwPolicyConnSummaryEntry |
1.3.6.1.4.1.9.9.491.1.1.4.3.1 |
Each entry contains the summary of connection
activity for a specific protocol in a specific
policy applied to the specified policy target.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CufwPolicyConnSummaryEntry |
|
|
cufwPolConnPolicy |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.1 |
The identity of the firewall policy for which
this conceptual row contains the connection
activity summary.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWPolicy |
|
|
cufwPolConnPolicyTargetType |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.2 |
The type of the entity to which the firewall policy
'cufwPolConnPolicy' has been applied. This could be
an interface type (most commonly), the type of another
object or a group of objects defined in the firewall
configuration.
When this object is set to 'targetALL', the value of
index object cufwConnPolicyTarget is ignored.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWPolicyTargetType |
|
|
cufwPolConnPolicyTarget |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.3 |
The identity of the entity to which the firewall
policy 'cufwPolConnPolicy' is applied. This could be an
interface object (most commonly), another object or
group of objects defined in the firewall configuration.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWPolicyTarget |
Size(0..128) |
|
cufwPolConnProtocol |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.4 |
The (L3-L4) protocol corresponding to which this
conceptual row summarizes the connection activity
on the firewall.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWNetworkProtocol |
|
|
cufwPolConnNumAttempted |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.5 |
The number of connections attempted since the last
reboot of the firewall, corresponding to the protocol
denoted by 'cufwPolConnProtocol', in the policy
'cufwPolConnPolicy' applied to the entity identified
by 'cufwPolConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolConnNumSetupsAborted |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.6 |
The number of connection setup attempts,
corresponding to the protocol denoted by
'cufwPolConnProtocol', associated with the policy
'cufwPolConnPolicy' applied to the entity
identified by 'cufwPolConnPolicyTarget',
that were aborted before the connection could
proceed to completion. The counter includes
setup attempts aborted by the firewall as well
as those aborted by the initiator and/or the
responder(s) of/to the connection setup attempt.
Consequently, this value subsumes the values of
objects 'cufwPolConnNumPolicyDeclined' and
'cufwPolConnNumResDeclined'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolConnNumPolicyDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.7 |
The number of connection attempts that were declined
due to security policy, corresponding to the protocol
denoted by 'cufwPolConnProtocol', in the policy
'cufwPolConnPolicy' applied to the entity identified by
'cufwPolConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolConnNumResDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.8 |
The number of connection attempts that were declined
due to resource unavailability, corresponding to the
protocol denoted by 'cufwPolConnProtocol', in the policy
'cufwPolConnPolicy' applied to the entity identified by
'cufwPolConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolConnNumHalfOpen |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.9 |
The number of connections that are currently in the
process of being established, corresponding to the
protocol denoted by 'cufwPolConnProtocol', in the
policy 'cufwPolConnPolicy' applied to the entity
identified by 'cufwPolConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwPolConnNumActive |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.10 |
The number of connections that are currently active,
corresponding to the protocol denoted by
'cufwPolConnProtocol', in the policy
'cufwPolConnPolicy' applied to the entity identified
by 'cufwPolConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwPolConnNumAborted |
1.3.6.1.4.1.9.9.491.1.1.4.3.1.11 |
The number of connections that were abnormally
terminated after successful establishment, corresponding
to the protocol denoted by 'cufwPolConnProtocol',
in the policy 'cufwPolConnPolicy' applied to the entity
identified by 'cufwPolConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolicyAppConnSummaryTable |
1.3.6.1.4.1.9.9.491.1.1.4.4 |
This table lists the summary of firewall
connections pertaining to Layer 7 protocols,
catalogued on a per policy basis
Each entry in the table lists the connection
summary of a distinct application protocol,
configured on the specified policy on the firewall,
and pertaining to a specified target to which the
policy has been applied.
If a policy is bound to a target, it would have one
or more entries in this table. If the policy is
detached from the target, all entries corresponding
to the association between the policy and the target
are elminated from this table.
Although the information is indexed by policy targets
as well, one may aggregate the connection summary for
a specific policy across all the target to which the
policy is currently applied by setting
cufwAppConnPolicyTargetType = 'targetALL'
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CufwPolicyAppConnSummaryEntry |
|
cufwPolicyAppConnSummaryEntry |
1.3.6.1.4.1.9.9.491.1.1.4.4.1 |
Each entry contains the summary of connection
activity for a specific layer 7 protocol in a
specific policy applied to the specified policy
target.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CufwPolicyAppConnSummaryEntry |
|
|
cufwPolAppConnPolicy |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.1 |
The identity of the firewall policy for which
this conceptual row contains the connection
activity summary.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWPolicy |
|
|
cufwPolAppConnPolicyTargetType |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.2 |
The type of the entity to which the firewall policy
'cufwPolAppConnPolicy' has been applied. This could be
an interface type (most commonly), the type of another
object or a group of objects defined in the firewall
configuration.
When this object is set to 'targetALL', the value of
index object cufwAppConnPolicyTarget is ignored.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWPolicyTargetType |
|
|
cufwPolAppConnPolicyTarget |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.3 |
The identity of the entity to which the firewall
policy 'cufwPolAppProtocol' refers. This could be an
interface object (most commonly), another object or
group of objects defined in the firewall configuration.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWPolicyTarget |
Size(0..128) |
|
cufwPolAppConnProtocol |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.4 |
The layer7 protocol for which this conceptual
row summarizes the connection activity for this
firewall.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWApplicationProtocol |
|
|
cufwPolAppConnNumAttempted |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.5 |
The number of connections attempted since the last
reboot of the firewall, corresponding to the protocol
denoted by 'cufwPolAppConnProtocol', in the policy
'cufwPolAppConnPolicy' applied to the entity identified
by 'cufwPolAppConnPolicyTarget'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolAppConnNumSetupsAborted |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.6 |
The number of connection setup attempts,
corresponding to the protocol denoted by
'cufwPolAppConnProtocol', associated with the policy
'cufwPolAppConnPolicy' applied to the entity
identified by 'cufwPolAppConnPolicyTarget',
that were aborted before the connections could
proceed to completion. The counter includes setup
attempts aborted by the firewall as well as those
aborted by the initiator and/or the responder(s)
of/to the connection setup attempt.
Consequently, this value subsumes the values of
objects 'cufwPolAppConnNumPolicyDeclined' and
'cufwPolAppConnNumResDeclined'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolAppConnNumPolicyDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.7 |
The number of connection attempts that were declined
due to security policy, corresponding to the protocol
denoted by 'cufwPolAppConnProtocol', in the policy
'cufwPolAppConnPolicy' applied to the entity identified
by 'cufwPolAppConnPolicyTarget'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolAppConnNumResDeclined |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.8 |
The number of connection attempts that were declined
due to resource unavailability, corresponding to the
protocol denoted by 'cufwPolAppConnProtocol', in the
policy 'cufwPolAppConnPolicy' applied to the entity
identified by 'cufwPolAppConnPolicyTarget'.
This value is accumulated from the last reboot of
the firewall subject to the control exercised by
cufwConnReptAppStats.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwPolAppConnNumHalfOpen |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.9 |
The number of connections that are currently in the
process of being established, corresponding to the
protocol
denoted by 'cufwPolAppConnProtocol', in the policy
'cufwPolAppConnPolicy' applied to the entity identified
by 'cufwPolAppConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwPolAppConnNumActive |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.10 |
The number of connections that are currently active,
corresponding to the protocol denoted by
'cufwPolAppConnProtocol', in the policy
'cufwPolAppConnPolicy' applied to the entity identified
by 'cufwPolAppConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwPolAppConnNumAborted |
1.3.6.1.4.1.9.9.491.1.1.4.4.1.11 |
The number of connections that were abnormally
terminated after successful establishment, corresponding
to the protocol denoted by 'cufwPolAppConnProtocol', in
the policy 'cufwPolAppConnPolicy' applied to the entity
identified by 'cufwPolAppConnPolicyTarget'.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAIAuditTrailEnabled |
1.3.6.1.4.1.9.9.491.1.2.1 |
The value identifies if audit trail in application
inspection has been globally enabled or disabled.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwAIAlertEnabled |
1.3.6.1.4.1.9.9.491.1.2.2 |
The value identifies if application inspection alerts
have been globally enabled or disabled.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwInspectionTable |
1.3.6.1.4.1.9.9.491.1.2.3 |
This table identifies if an application protocol has
been configured for inspection and if so, the name of
the firewall policy or the inspection configuration
that configures the specified protocol for inspection.
The table also identifies if the specified protocol is
actively being inspected.
This table may be used by an administrator to quickly
identify if a protocol is being subjected to application
inspection by the managed firewall.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CufwInspectionEntry |
|
cufwInspectionEntry |
1.3.6.1.4.1.9.9.491.1.2.3.1 |
Each entry contains the configuration of
a specific application inspection element.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CufwInspectionEntry |
|
|
cufwInspectionPolicyName |
1.3.6.1.4.1.9.9.491.1.2.3.1.1 |
The name of the policy that configures the device
inspect the protocol specified by
'cufwInspectionProtocol'.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CFWPolicy |
Size(0..128) |
|
cufwInspectionStatus |
1.3.6.1.4.1.9.9.491.1.2.3.1.3 |
This MIB object identifies if the directive to inspect
the protocol specified by 'cufwInspectionProtocol' by
the policy corresponding to this conceptual row is
enabled or disabled.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwUrlfFunctionEnabled |
1.3.6.1.4.1.9.9.491.1.3.1.1 |
URL Filtering Operation
_________
2.2 Request | |
|---------->| Server |
| | |
_________ __|_ |_________|
| |<--(5. Response )---| | 3. Response |
| | | |<-------------|
| Client |---(1. Request )--->|FW |
|_________| |____|<--------------|
| 4. URLF Resp ____|______
| | |
|------------>|URLF Server|
2.1 URLF Req |___________|
1) Client sends a Request containing a URL to the Server
2.1) FW extracts the URL from the Request and sends it to
URL Filtering Server (or Verifies the URL locally)
2.2) FW also forwards the original Request from the Client to
the Server
3) Any Responses from the Server received before receiving
a response from URLF Server are cached by the FW
4) URLF Response indicates whether the URL access should be
allowed or denied
5) If the URLF Response allows the URL, FW forwards the
URL Access responses from the Server to the Client
6) If the URLF Response indicates that the URL access should be
denied, FW drops all the cached URL responses and forces the
connection between the Client and the Server to be terminated
Specifically, the object cufwUrlfFunctionEnabled
indicates if the URL filtering function
is enabled.
When this MIB object contains the value 'false',
the firewall device will not perform URL filtering
function, even if it contains configuration pertaining
to other aspects of URL filtering.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwUrlfRequestsNumProcessed |
1.3.6.1.4.1.9.9.491.1.3.1.2 |
The number of URL access requests processed by
this firewall.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfRequestsProcRate1 |
1.3.6.1.4.1.9.9.491.1.3.1.3 |
The number of URL access requests processed per
seconds by this firewall averaged over the last 60
seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfRequestsProcRate5 |
1.3.6.1.4.1.9.9.491.1.3.1.4 |
The number of URL access requests processed per second
by this firewall averaged over the last 300 seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfRequestsNumAllowed |
1.3.6.1.4.1.9.9.491.1.3.1.5 |
The number of URL access requests allowed by
this firewall, due to a directive from a URL
filtering server or a static policy configured on
the firewall.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfRequestsNumDenied |
1.3.6.1.4.1.9.9.491.1.3.1.6 |
The number of URL access requests declined by
this firewall, due to a directive from a URL
filtering server, a static policy configured on
the firewall, due to resource constraints or
any other reason.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfRequestsDeniedRate1 |
1.3.6.1.4.1.9.9.491.1.3.1.7 |
The rate at which URL access requests were denied
by this firewall, due to a directive from a URL
filtering server, a static policy configured on
the firewall, due to resource constraints or
any other reason, averaged over the last 60 seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfRequestsDeniedRate5 |
1.3.6.1.4.1.9.9.491.1.3.1.8 |
The rate at which URL access requests were denied
by this firewall, due to a directive from a URL
filtering server, a static policy configured on
the firewall, due to resource constraints or
any other reason, averaged over the last 300 seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfRequestsNumCacheAllowed |
1.3.6.1.4.1.9.9.491.1.3.1.9 |
The number of URL access requests allowed by
the firewall because of a cached entry holding the
result from a previous URL access request that was
handled either by a URLF Server or exclusive domain
configuration.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfRequestsNumCacheDenied |
1.3.6.1.4.1.9.9.491.1.3.1.10 |
The number of URL access requests denied by
the firewall because of a cached entry holding the
result from a previous URL access request that was
handled either by a URLF Server or exclusive domain
configuration.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfAllowModeReqNumAllowed |
1.3.6.1.4.1.9.9.491.1.3.1.11 |
The number of URL access requests that were allowed
by the firewall when the URL filtering server was not
available.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfAllowModeReqNumDenied |
1.3.6.1.4.1.9.9.491.1.3.1.12 |
The number of URL access requests that were declined
by the firewall when the URL filtering server was not
available.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfRequestsNumResDropped |
1.3.6.1.4.1.9.9.491.1.3.1.13 |
The number of incoming URL access requests that
were dropped by the firewall because of resource
constraints.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfRequestsResDropRate1 |
1.3.6.1.4.1.9.9.491.1.3.1.14 |
The rate at which incoming URL access requests
were dropped by the firewall because of resource
constraints, averaged over the last 60 seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfRequestsResDropRate5 |
1.3.6.1.4.1.9.9.491.1.3.1.15 |
The rate at which incoming URL access requests
were dropped by the firewall because of resource
constraints, averaged over the last 300 seconds.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfNumServerTimeouts |
1.3.6.1.4.1.9.9.491.1.3.1.16 |
The number of times the firewall failed to receive
a response from the configured URL filtering servers
for a request to authorize a URL access request.
This is equal to the number of times a firewall removed
a URL access request from the queue of pending requests
because no response was received from the URL filtering
server(s).
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfNumServerRetries |
1.3.6.1.4.1.9.9.491.1.3.1.17 |
The number of URL access authorization requests
re-sent by the firewall to the URL Filtering Servers
because a response was not received within the
configured time interval.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfResponsesNumLate |
1.3.6.1.4.1.9.9.491.1.3.1.18 |
The number of responses from URL filtering servers
which were received after the original URL access
request was removed from the queue of pending
requests.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfUrlAccRespsNumResDropped |
1.3.6.1.4.1.9.9.491.1.3.1.19 |
The number of transport packets constituting responses
to URL access requests that were dropped by the firewall
due to resource constraints waiting for a response from
the filtering server.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfResTotalRequestCacheSize |
1.3.6.1.4.1.9.9.491.1.3.2.1 |
The amount of memory occupied by all the caches
used in the firewall to cache pending URL access
requests.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfResTotalRespCacheSize |
1.3.6.1.4.1.9.9.491.1.3.2.2 |
The amount of memory occupied by all the caches
used in the firewall to cache responses for URL
requests received from servers while awaiting a
response from URL filter server.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfServerTable |
1.3.6.1.4.1.9.9.491.1.3.3.1 |
This table lists the URL filtering servers
configured on the managed device and their
performance statistics.
This table is not meant as a device to
configure URL filtering servers.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CufwUrlfServerEntry |
|
cufwUrlfServerEntry |
1.3.6.1.4.1.9.9.491.1.3.3.1.1 |
Each entry contains the configuration of
a specific URL filtering server.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CufwUrlfServerEntry |
|
|
cufwUrlfServerAddress |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.2 |
The value of the IP address of the URL filtering
server.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
InetAddress |
|
|
cufwUrlfServerPort |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.3 |
The value of the port at which the URL filtering
server listens for incoming requests.
|
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
InetPortNumber |
|
|
cufwUrlfServerStatus |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.5 |
The status of the URL filtering server
corresponding to this conceptual row.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
CFWUrlServerStatus |
|
|
cufwUrlfServerReqsNumProcessed |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.6 |
The number of URL access requests forwarded by
the managed firewall device to the URL filtering
server corresponding to this conceptual row.
This value is counted from the last reboot of
the managed device.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfServerReqsNumAllowed |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.7 |
The number of URL access requests allowed by the
URL filtering server corresponding to this conceptual
row. This counter does not include late responses.
This value is counted from the last reboot of
the managed device.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfServerReqsNumDenied |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.8 |
The number of URL access requests denied by the
URL filtering server corresponding to this conceptual
row. This counter does not include late responses.
This value is counted from the last reboot of
the managed device.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfServerNumTimeouts |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.9 |
The number of times the firewall failed to receive
a response from the URL filtering server corresponding
to this conceptual row, for a request to authorize a
URL access request.
This is equal to the number of times a firewall removed
a URL access request from the queue of pending requests
because no response was received from the URL filtering
server.
This value is accumulated from the last reboot of the
firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfServerNumRetries |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.10 |
The number of URL access authorization requests
re-sent by the firewall to the URL Filtering Server
corresponding to this conceptual row, because a response
was not received within the configured time interval
from the server.
This value is counted from the last reboot of
the managed device.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfServerRespsNumReceived |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.11 |
The number of URL access responses received by the
firewall from the URL filtering server corresponding
to this conceptual row. This counter does not include
late responses.
This value is counted from the last reboot of
the managed device.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfServerRespsNumLate |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.12 |
The number of URL access responses received by
the managed firewall from the URL filtering server
corresponding to this conceptual row after the
original URL access request was removed from the
queue of pending requests.
This value is counted from the last reboot of
the managed device.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwUrlfServerAvgRespTime1 |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.13 |
The average round-trip response time of the
URL filtering server computed over the last
60 seconds.
A value of zero indicates that there was
insufficient data to compute this value over the
last time interval.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwUrlfServerAvgRespTime5 |
1.3.6.1.4.1.9.9.491.1.3.3.1.1.14 |
The average round-trip response time of the
URL filtering server computed over the last
300 seconds.
A value of zero indicates that there was
insufficient data to compute this value over the
last time interval.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwAaicGlobalNumBadProtocolOps |
1.3.6.1.4.1.9.9.491.1.5.1.1 |
'Protocol Operation' is the application protocol
specific operation that the PDU is intended to
perform. An example of 'protocol operation' is the
HELO command of SMTP protocol.
This MIB object records the number of application
protocol data units that contained a protocol operation
which was disallowed by the local security policy.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
application traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicGlobalNumBadPDUSize |
1.3.6.1.4.1.9.9.491.1.5.1.2 |
This MIB object records the number of application
protocol data units (PDU) that had either an invalid
header size or an invalid payload size, as determined
by the local security policy.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
application traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicGlobalNumBadPortRange |
1.3.6.1.4.1.9.9.491.1.5.1.3 |
Number of application protocol units that attempted
to advertise illegal port ranges for secondary
connections. An example of such an occurrence
would be a passive FTP connection, where the
server advertises a disallowed port range for data
connection.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
application traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicHttpNumBadProtocolOps |
1.3.6.1.4.1.9.9.491.1.5.2.1.1 |
The number of PDUs corresponding to HTTP protocol
which were detected to be containing HTTP protocol
methods which are disallowed by the local security
policy.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
HTTP traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicHttpNumBadPDUSize |
1.3.6.1.4.1.9.9.491.1.5.2.1.2 |
The number of PDUs corresponding to HTTP protocol
that had either an invalid header size or an invalid
payload size, as determined by the local security
policy.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
HTTP traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicHttpNumTunneledConns |
1.3.6.1.4.1.9.9.491.1.5.2.1.3 |
The number of connections corresponding to HTTP
protocol which were detected to be tunneling other
application traffic streams. An instance of this
would be InstantMessenger traffic running on HTTP.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
HTTP traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicHttpNumLargeURIs |
1.3.6.1.4.1.9.9.491.1.5.2.1.4 |
The number of PDUs corresponding to HTTP protocol
which were detected to be containing a URI of
size not permitted by the local security policy.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
HTTP traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicHttpNumBadContent |
1.3.6.1.4.1.9.9.491.1.5.2.1.5 |
The number of PDUs corresponding to HTTP protocol
which were detected to be containing content whose
type disallowed by the local security policy.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
HTTP traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicHttpNumMismatchContent |
1.3.6.1.4.1.9.9.491.1.5.2.1.6 |
The number of PDUs corresponding to HTTP protocol
which were detected to be containing content whose
type was different from the content type specified
in the header of the PDU.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
HTTP traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwAaicHttpNumDoubleEncodedPkts |
1.3.6.1.4.1.9.9.491.1.5.2.1.7 |
The number of PDUs corresponding to HTTP protocol
which were detected to be containing double encoding.
Double encoding is a mechanism to obfuscate content
in which a encoded data is re-encoded so as to evade
deep packet inspections.
For this MIB to be implemented, the managed firewall
must be implementing deep packet inspection of
HTTP traffic payloads.
This value is accumulated from the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwL2GlobalEnableStealthMode |
1.3.6.1.4.1.9.9.491.1.6.1.1 |
The value indicates if the firewall is operating
in transparent (layer 2) mode or not.
When operating in transparent mode, the firewall
operates as a bridge while performing firewalling
functions.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwL2GlobalArpCacheSize |
1.3.6.1.4.1.9.9.491.1.6.1.2 |
The value indicates the configured maximum size of
the ARP cache used for management traffic.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Integer32 |
1..2147483647 |
|
cufwL2GlobalEnableArpInspection |
1.3.6.1.4.1.9.9.491.1.6.1.3 |
The value indicates if ARP inspection, which is a
security feature, is enabled globally on the
managed firewall.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwL2GlobalNumArpRequests |
1.3.6.1.4.1.9.9.491.1.6.1.5 |
The number of ARP requests issued by the transparent
firewall to resolve a destination IP address.
This counter is accumulated since the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwL2GlobalNumIcmpRequests |
1.3.6.1.4.1.9.9.491.1.6.1.6 |
The number of ICMP traceroute requests issued by the
transparent firewall to resolve a destination IP
address.
This counter is accumulated since the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwL2GlobalNumFloods |
1.3.6.1.4.1.9.9.491.1.6.1.7 |
The number of times the firewall floods a frame to be
forwarded to the egress interfaces because the
destination MAC address is missing in the bridge table.
This counter is accumulated since the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwL2GlobalNumDrops |
1.3.6.1.4.1.9.9.491.1.6.1.8 |
The number of times the firewall dropped an incoming
frame because the destination MAC address is missing
in the bridge table.
This counter is accumulated since the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwL2GlobalArpOverflowRate5 |
1.3.6.1.4.1.9.9.491.1.6.1.9 |
The number of times an existing entry from the ARP
cache had to be ejected in order to insert a new entry
in the last 300 seconds.
This counter is accumulated since the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Gauge32 |
|
|
cufwL2GlobalNumBadArpResponses |
1.3.6.1.4.1.9.9.491.1.6.1.10 |
The number of malformed ARP responses received by the
firewall in trying to resolve the MAC address of the
destination IP address in an incoming frame.
This counter is accumulated since the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwL2GlobalNumSpoofedArpResps |
1.3.6.1.4.1.9.9.491.1.6.1.11 |
The number of spoofed ARP responses received by the
firewall. Such an event would occur when the firewall
encounters an ARP response mapping an IP address to
a different MAC Address from the one present in the
local ARP cache.
This counter is accumulated since the last reboot of
the firewall.
|
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Counter64 |
|
|
cufwCntlUrlfServerStatusChange |
1.3.6.1.4.1.9.9.491.1.7.1 |
This object defines the administrative state of
sending the SNMP notification to signal the election
of a new primary URL filtering server by this
firewall.
Such a change could occur either as a result of
the current primary server becoming unavailable or
as a result of explicit management action in
nominating a filtering server the primary server.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cufwCntlL2StaticMacAddressMoved |
1.3.6.1.4.1.9.9.491.1.7.2 |
This object defines the administrative state of
sending the SNMP notification to signal the move
of a statically configured MAC address to a new
port.
Such a change could occur either as a result of physical
move of the device with the MAC Address to the new port
or due to MAC address spoofing.
|
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
ciscoUFwUrlfServerStateChange |
1.3.6.1.4.1.9.9.491.0.1 |
This notification is generated when the firewall
elects a new primary URL filtering server from
the existing set of configured servers.
Such a change could occur either as a result of
the current primary server becoming unavailable or
as a result of explicit management action in
nominating a filtering server the primary server.
The notification is issued just before the change
occurs. Consequently, the varbinds identify the
attributes corresponding to the old primary server.
This notification is issued if and only if the
object 'cufwCntlUrlfServerStatusChange' has been
set to 'true'.
|
Status: current |
Access: read-write |
NOTIFICATION-TYPE |
|
|
|
ciscoUFwL2StaticMacAddressMoved |
1.3.6.1.4.1.9.9.491.0.2 |
This notification is generated when the firewall
detects the move of a static MAC address to a new
port.
Such a change could occur either as a result of
physical move of the device with the MAC Address
to the new port, due to management action of
relocating the MAC address at the new location or
due to MAC address spoofing.
The varbinds identify the new location (port) of
the MAC Address and its status at the new location.
This notification is issued if and only if the
object 'cufwCntlL2StaticMacAddressMoved' has been
set to 'true'.
|
Status: current |
Access: read-write |
NOTIFICATION-TYPE |
|
|
|
ciscoUniFirewallMIBCompliance |
1.3.6.1.4.1.9.9.491.2.1.1 |
The compliance statement for SNMP entities
the Cisco Firewall MIB.
|
Status: current |
Access: read-write |
MODULE-COMPLIANCE |
|
|
|
ciscoFwConnectionGroup |
1.3.6.1.4.1.9.9.491.2.2.1 |
This group contains the MIB objects required to
instrument the firewall stateful connection activity.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwConnResourceUsageGroup |
1.3.6.1.4.1.9.9.491.2.2.2 |
This group contains the MIB objects required to
instrument the resource usage of the stateful packet
filtering feature of the managed firewall.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwPolicyConnectionGroup |
1.3.6.1.4.1.9.9.491.2.2.3 |
This group contains the MIB objects required to
instrument policy based summary of firewall connection
activity.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwApplInspectionGroup |
1.3.6.1.4.1.9.9.491.2.2.4 |
This group contains the MIB objects required to
instrument the firewall Application Inspection
function.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwUrlFilterGroup |
1.3.6.1.4.1.9.9.491.2.2.5 |
This group contains the MIB objects required to
instrument the firewall URL filtering function.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwUrlFilterResourceGroup |
1.3.6.1.4.1.9.9.491.2.2.6 |
This group contains the MIB objects required to
instrument the resource usage of the URL filtering
feature of the managed firewall.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwTransparentFwGroup |
1.3.6.1.4.1.9.9.491.2.2.7 |
This group contains the MIB objects required to
instrument the transparent mode (or layer 2) operation
of a firewall.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwNotificationsGroup |
1.3.6.1.4.1.9.9.491.2.2.8 |
This group contains notifications defined
in the Cisco Firewall MIB pertaining to
basic firewall operations.
Presently, the list include a notification
pertaining to URL filtering alone.
|
Status: current |
Access: read-write |
NOTIFICATION-GROUP |
|
|
|
ciscoFwTransparentNotifGroup |
1.3.6.1.4.1.9.9.491.2.2.9 |
This group contains the notifications that signal
security critical events pertaining to the
transparent mode operation of the firewall.
|
Status: current |
Access: read-write |
NOTIFICATION-GROUP |
|
|
|
ciscoFwBasicAaicGroup |
1.3.6.1.4.1.9.9.491.2.2.10 |
This group contains the MIB objects required to
instrument the basic elements of Advanced Application
Inspection and Control (AAIC).
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwAaicHttpGroup |
1.3.6.1.4.1.9.9.491.2.2.11 |
This group defines statistics pertaining to deep
packet inspection of HTTP payloads.
A firewall that implements this group must implement
the group 'ciscoFwBasicAaicGroup'.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
ciscoFwMibReportingControlGroup |
1.3.6.1.4.1.9.9.491.2.2.12 |
This group contains the MIB objects that allow
the administrator to control the granularity of
objects reported by the agent.
|
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|