nsPlyActiveStatus
NETSCREEN-POLICY-MIB ·
.1.3.6.1.4.1.3224.10.1.1.23
Object
column
Enumeration
Show the status of one policy entry.
Context
- MIB
- NETSCREEN-POLICY-MIB
- OID
.1.3.6.1.4.1.3224.10.1.1.23- Type
- column
- Access
- readonly
- Status
- current
- Parent
- nsPlyEntry
- Table
- nsPlyTable
- Siblings
- 24
Syntax
Enumeration
Values & Constraints
Enumerated Values
0 | inactive |
1 | inuse |
2 | hidden |
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| nsPlyId Each policy is identified by a unique policy ID. | column | Integer32 | .1.3.6.1.4.1.3224.10.1.1.1 |
| nsPlyFixPort When in policy-based NAT, the new secure address can come from
either a Dynamic IP or from a Mapped IP. This object indicates
if poliy-based NAT uses fix port when working on NAT… | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.10 |
| nsPlyDipId This object indicates the Dynamic ID chosen for NAT policy. | column | SNMPv2-SMIInteger32 | .1.3.6.1.4.1.3224.10.1.1.11 |
| nsPlyVpnTunnel VPN tunnel this access policy applies to. | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.12 |
| nsPlyL2tpTunnel L2TP tunnel this access policy applies to. | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.13 |
| nsPlyAuth This object indicates the selecting this option requires the
user at the source address to authenticate his/her identiry by
supplying a user name and password before traffic is al… | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.14 |
| nsPlyLogEnable When you enable logging in an access policy, the NetScreen
device logs all connections to which that paticular access
policy applies. | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.15 |
| nsPlyCountEnable When you enable counting in an access plicy, the NetScreen
device counts the total number of bytes of traffic to which
this access policy applies and records the informaiton in
hi… | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.16 |
| nsPlyAlarmBPS User can set a threshold that triggers an alarm when the
traffic permitted by the access policy exceeds a specified
number of bytes per second. | column | SNMPv2-SMIInteger32 | .1.3.6.1.4.1.3224.10.1.1.17 |
| nsPlyAlarmBPM User can set a threshold that triggers an alarm when the
traffic permitted by the access policy exceeds a specified
number of bytes per Minute. | column | SNMPv2-SMIInteger32 | .1.3.6.1.4.1.3224.10.1.1.18 |
| nsPlySchedule By associating a schedule to an access policy, you can
determine when the access policy is in effect. | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.19 |
| nsPlyVsys Vitural system's name this polic entry belongs to. | column | Integer32 | .1.3.6.1.4.1.3224.10.1.1.2 |
| nsPlyTrafficShapeEnable User can set parameters for the control and shaping of traffic
for each access policy. | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.20 |
| nsPlyTrafficPriority Traffic priority for this policy. | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.21 |
| nsPlyDSEnable Differentiated Services is a system for tagging traffic at a
position within a hierarchy of priority. | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.22 |
| nsPlyName policy name (optional) | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.24 |
| nsPlyServiceName Sevices name that identify application protocols using
layer 4 information such as standard and accepted TCP and UDP
port numbers for application services like Telnet, FTP, SMTP
… | column | SNMPv2-TCDisplayString | .1.3.6.1.4.1.3224.10.1.1.25 |
| nsPlySrcZone Traffic through a firewall means that traffic flows from one
security zone to another. This object describes the source zone
name traffic flow passes. | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.3 |
| nsPlyDstZone Traffic through a firewall means that traffic flows from one
security zone to another. This object describes the destination
zone name traffic flow passes. | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.4 |
| nsPlySrcAddr Addresses are objects that identify network devices such as
hosts and networks by their location in relation to the
firwall on which security zone.To create an access policy for
… | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.5 |
| nsPlyDstAddr Addresses are objects that identify network devices such as
hosts and networks by their location in relation to the
firwall-on which security zone.To create an access policy for
… | column | OctetString | .1.3.6.1.4.1.3224.10.1.1.6 |
| nsPlyService Sevices are objects that identify application protocols using
layer 4 information such as standard and accepted TCP and UDP
port numbers for application services like Telnet, FTP… | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.7 |
| nsPlyAction Actions objects that describe what the firewall does to the
traffic it receives. Permit allows the packet to pass the
firewall. Deny blocks the packet from traversing the firewall… | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.8 |
| nsPlyNat You can apply NAT at the interface level or at the policy
level. With policy-based NAT, you can translate the source
address on either incoming or outging network and VPN traffic… | column | Enumeration | .1.3.6.1.4.1.3224.10.1.1.9 |