MX-NFW-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
2
Rows
2
Columns
27
.0.2250.1.200 · 1 row entry · 11 columns
Network Rules Status
          
This table shows the network rules applied in the firewall.
networkRulesStatusEntry entry .0.2250.1.200.1
A row in table Network Rules Status.
Indexes
networkRulesStatusPriority
Column Syntax OID
networkRulesStatusPriority
Rule Priority

Unique identifier of the row in the table.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.2250.1.200.1.100
networkRulesStatusSourceAddress
Source Address

Source address[/mask] criteria an incoming packet must have to
match this rule.

An empty string matches any address.
OctetString .0.2250.1.200.1.200
networkRulesStatusSourcePort
Source Port

Source port[-port] criteria an incoming packet must have to
match this rule.

MinPort-MaxPort specifies a port range.

An empty string means that no filtering is ap…
OctetString .0.2250.1.200.1.300
networkRulesStatusDestinationAddress
Destination Address

Destination address[/mask] criteria an incoming packet must
have to match this rule.

An empty string matches any address.
OctetString .0.2250.1.200.1.400
networkRulesStatusDestinationPort
Destination Port

Destination port[-port] criteria an incoming packet must have
to match this rule.

MinPort-MaxPort specifies a port range.

An empty string means that no filte…
OctetString .0.2250.1.200.1.500
networkRulesStatusProtocol
Protocol

Protocol criteria an incoming packet must have to match this
rule.

The protocol can be one of the following:

* All: Match packets using any protocols.
* Tcp: Onl…
Enumeration
Enumerated Values:
100all
200tcp
300udp
400icmp
.0.2250.1.200.1.600
networkRulesStatusConnectionState
Connection State

Connection state associated with the incoming packet.

The connection state can be one of the following:

* All: Match packets in any state.
* New: Match p…
Enumeration
Enumerated Values:
100all
200new
300establishedOrRelated
.0.2250.1.200.1.650
networkRulesStatusBlacklistEnable
Blacklist Enable

Indicates if blacklisting is enabled for this rule.

* Enable: When a packet establishing a connection matches
this rule, the action is executed and the source IP addr…
MX-TCMxEnableState
Textual Convention: MX-TCMxEnableState Enumeration
Type Values:
0disable
1enable
.0.2250.1.200.1.660
networkRulesStatusRateLimitValue
Rate Limit Value

Number of packets allowed to match this rule from a single
source IP address within a certain time period.
Unsigned32
Constraints:
range: 1-5000
.0.2250.1.200.1.670
networkRulesStatusRateLimitTimePeriod
Rate Limit Time Period

The time period on which to base the rate limit. This period is
expressed in seconds.

Ex.: a RateLimitValue of 10 and a RateLimitTimePeriod of 60
means a limit of 10 …
Unsigned32
Constraints:
range: 1-86400
.0.2250.1.200.1.680
networkRulesStatusAction
Action

Action taken when this rule matches a packet.

Action can be one of the following:

* Accept: Let the packet through.
* Reject: Send back an ICMP port unreachable in…
Enumeration
Enumerated Values:
100accept
200reject
300drop
400rateLimitPerSource
.0.2250.1.200.1.700
.0.2250.1.600 · 1 row entry · 16 columns
Network Rules
          
This table shows the configured network rules for the
firewall.
networkRulesEntry entry .0.2250.1.600.1
A row in table Network Rules.
Indexes
networkRulesPriority
Column Syntax OID
networkRulesPriority
Rule Priority

Unique identifier of the row in the table.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.0.2250.1.600.1.100
networkRulesActivation
Activation

Activates this rule.

* Enable: This rule is active in the firewall.
* Disable: This rule is not in the firewall.
MX-TCMxEnableStater/w
Textual Convention: MX-TCMxEnableState Enumeration
Type Values:
0disable
1enable
.0.2250.1.600.1.200
networkRulesSourceAddress
Source Address

Source address of the incoming packet using the following
format: address[/mask] or network interface name/.

Address can be either a network IP address (using /mask) or one
o…
OctetStringr/w
Constraints:
range: 0-51
.0.2250.1.600.1.300
networkRulesSourcePort
Source Port

Source port of the incoming packet using the following format:
port[-port].

MinPort-MaxPort specifies a port range.

The default empty string means that no filteri…
OctetStringr/w
Constraints:
range: 0-11
.0.2250.1.600.1.400
networkRulesDestinationAddress
Destination Address

Destination address of the incoming packet using the following
format: address[/mask] or network interface name/.

The address can either be a network IP address (using /…
OctetStringr/w
Constraints:
range: 0-51
.0.2250.1.600.1.500
networkRulesDestinationPort
Destination Port

Destination port of the incoming packet using the following
format: port[-port].

MinPort-MaxPort specifies a port range.

The default empty string means that …
OctetStringr/w
Constraints:
range: 0-11
.0.2250.1.600.1.600
networkRulesProtocol
Protocol

Protocol of the incoming packet.

The protocol can be one of the following:

* All: Match packets using any protocols.
* Tcp: Only match TCP packets.
* Udp: Only…
Enumerationr/w
Enumerated Values:
100all
200tcp
300udp
400icmp
.0.2250.1.600.1.700
networkRulesBlacklistEnable
Blacklist Enable

Indicates if blacklisting is enabled for this rule.

* Enable: When a packet establishing a connection matches
this rule, the action is executed and the source IP addr…
MX-TCMxEnableStater/w
Textual Convention: MX-TCMxEnableState Enumeration
Type Values:
0disable
1enable
.0.2250.1.600.1.720
networkRulesRateLimitValue
Rate Limit Value

Number of packets allowed to match this rule from a single
source IP address within a certain time period.
Unsigned32r/w
Constraints:
range: 1-5000
.0.2250.1.600.1.730
networkRulesRateLimitTimePeriod
Rate Limit Time Period

The time period on which to base the rate limit. This period is
expressed in seconds.

Ex.: a RateLimitValue of 10 and a RateLimitTimePeriod of 60
means a limit of 10 …
Unsigned32r/w
Constraints:
range: 1-86400
.0.2250.1.600.1.740
networkRulesConnectionState
Connection State

Connection state associated with the incoming packet.

The connection state can be one of the following:

* All: Match packets in any state.
* New: Match p…
Enumerationr/w
Enumerated Values:
100all
200new
300establishedOrRelated
.0.2250.1.600.1.750
networkRulesAction
Action

Action taken when this rule matches a packet.

Action can be one of the following:

* Accept: Let the packet through.
* Reject: Send back an ICMP port unreachable in…
Enumerationr/w
Enumerated Values:
100accept
200reject
300drop
400rateLimitPerSource
.0.2250.1.600.1.800
networkRulesUp
Up

Moves the current row upwards.
Enumerationr/w
Enumerated Values:
0noOp
10up
.0.2250.1.600.1.900
networkRulesDown
Down

Moves the current row downwards.
Enumerationr/w
Enumerated Values:
0noOp
10down
.0.2250.1.600.1.1000
networkRulesInsert
Insert

Inserts a new row before this row.
Enumerationr/w
Enumerated Values:
0noOp
10insert
.0.2250.1.600.1.1100
networkRulesDelete
Delete

Deletes this row.
Enumerationr/w
Enumerated Values:
0noOp
10delete
.0.2250.1.600.1.1200