Dos attacks blocked counters, Dos attacks blocked table, Vpn mib tables – Enterasys Networks Security Router X-PeditionTM User Manual

Page 454

Advertising
background image

VPN MIB Tables

B-12 XSR SNMP Proprietary and Associated Standard MIBs

DOS Attacks Blocked Counters

These elements reflect the DOS attack summaries stored in the firewall.

DOS Attacks Blocked Table

These elements reflect the hits against DOS attack types recognized by the firewall.

VPN MIB Tables

The XSR supports the following VPN tables, whose fields are described in the following pages:

etsysVpnIkePeerTable

etsysVpnIkePeerProposalsTable

etsysVpnIkeProposalTable

etsysVpnIpsecPolicyTable

etsysVpnIntfPolicyTable

etsysVpnIpsecPolicyRuleTable

etsysVpnIpsecPolProposalsTable

etsysFWAuthAddressIPVersion

This entry’s IP version number which determines the size and format of the IP Address
object.

etsysFWAuthAddressIPAddress

The authenticated IP address.

etsysFWAuthAddressGroupName

The authentication group name to which this authenticated address entry belongs.

etsysFWAuthAddressIdleTime

The interval in seconds that this address has been idle.

Table B-27 Authenticated Addresses Table (continued)

Field

Description

Table B-28 DOS Attacks Blocked

Field

Description

etsysFWDoSBlockedNumEntries

The current total number of entries in the DOS attacks blocked table.

etsysFWDoSBlockedLastChange

The date and time of the last change to the DOS attacks blocked table.

Table B-29 DOS Attacks Blocked Table

Field

Description

etsysFWDoSAttackName

The name of this kind of DOS attack.

etsysFWDoSSrcIPVersion

The IP version, it determines the size and format of the IP address object.

etsysFWDoSSrcIPAddress

The IP address on which this attack was last blocked.

etsysFWDoSAttackTime

The date and time of the last blocked attack.

etsysFWDoSBlockedAttacks

The sum of times this DOS attack has been blocked since the last restart of the XSR.

Advertising