WESTERMO-SW6-FIREWALL-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
4
Rows
4
Columns
44
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1 · 1 row entry · 12 columns
Firewall port forward rules table.
cfgFwNatPortForwardTableEntry entry .1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1
Firewall port forward rules table entry.
Indexes
cfgFwNatPrtFwdIndex
Column Syntax OID
cfgFwNatPrtFwdIndex
Entry index of port forward table.
Integer32
Constraints:
range: 0-255
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.1
cfgFwNatPrtFwdEnabled
Disable or enable the rule.

Applies to AP and STA.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.2
cfgFwNatPrtFwdInterface
Name of the network interface on which the rule applies.

Defines on which interface traffic is comming in. Groups of
interfaces can be matched by adding the character '+' at the end.
E.g. eth+ to match th…
OctetStringr/w
Constraints:
range: 1-255
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.3
cfgFwNatPrtFwdProtocol
Choose which IP protocol the rule matches.

Allowed protocols are:

* **any(0):** Any ip protocol.
* **udp(1):** Only UDP protocol.
* **tcp(2):** Only TCP protocol.
* **udptcp(3):** UDP and T…
Enumerationr/w
Enumerated Values:
0any
1udp
2tcp
3udptcp
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.4
cfgFwNatPrtFwdSourceAddress
Source address to match.

This can be a specific ip address or a range in CIDR notation. Set
to 0.0.0.0/0 to match all inbound traffic. Set to 172.17.29.7/32 to
match the specific IP 172.17.29.7 You can us…
OctetStringr/w
Constraints:
range: 9-19
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.5
cfgFwNatPrtFwdSourcePortStart
Source start port to match.

Specify the port or start of a port range from which a connection
originates. Can only be used with TCP, UDP or TCP/UDP. Leave this
on -1 to disable. You can use ! to invert th…
OctetStringr/w
Constraints:
range: 1-6
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.6
cfgFwNatPrtFwdSourcePortEnd
Destination end port to match.

When matching multiple port, this value is the end of the range.
Set to -1 if no range is to be matched. Can only be used with TCP,
UDP or TCP/UDP.

**Notice:*…
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.7
cfgFwNatPrtFwdDestinationAddress
Destination address to redirect.

This can be a specific ip address or a range in CIDR notation.
Set to 0.0.0.0/0 to match all inbound traffic on the interface
specified in cfgFwNatPrtFwdInterface. You can…
OctetStringr/w
Constraints:
range: 9-19
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.8
cfgFwNatPrtFwdDestinationPortStart
Destination start port to redirect.

Specify the port or start of a port range for the destination.
You can use ! to invert the sense of the rule: E.g. !80. When used
in a range, the inversion applies to t…
OctetStringr/w
Constraints:
range: 1-20
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.9
cfgFwNatPrtFwdDestinationPortEnd
Destination end port to redirect.

When forwarding multiple port, this value is the end of the range.
Set to -1 if no range is forwarded. Can only be used with TCP, UDP
or TCP/UDP.

Applies t…
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.10
cfgFwNatPrtFwdRedirectDestinationAddress
Redirect traffic to this redirection destination address.

Applies to AP and STA.
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.11
cfgFwNatPrtFwdRedirectDestinationPort
Redirect traffic to this destination port.

Can only be used with TCP, UDP or TCP/UDP.

Applies to AP and STA.
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.2.1.1.12
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2 · 1 row entry · 12 columns
Firewall outbound NAT rules table.
cfgFwNatOutboundTableEntry entry .1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1
Firewall outbound NAT rules table entry.
Indexes
cfgFwNatOutIndex
Column Syntax OID
cfgFwNatOutIndex
Entry index of Table.
Integer32
Constraints:
range: 0-255
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.1
cfgFwNatOutEnabled
Disable or enable the rule.

Applies to AP and STA.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.2
cfgFwNatOutInterface
Name of the network interface on which the rule applies.

Matches traffic leaving on this interface. Needs to be set to an
interface name if you are using DHCP. Set to -1 if you don't know
on which interfa…
OctetStringr/w
Constraints:
range: 1-255
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.3
cfgFwNatOutProtocol
Choose which IP protocol the rule matches.

Allowed protocols are:

* **any(0):** Any ip protocol.
* **udp(1):** Only UDP protocol.
* **tcp(2):** Only TCP protocol.
* **udptcp(3):** UDP and T…
Enumerationr/w
Enumerated Values:
0any
1udp
2tcp
3udptcp
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.4
cfgFwNatOutSourceAddress
Source address to match.

This can be a specific ip address or a range in CIDR notation. Set
to 0.0.0.0/0 to match all inbound traffic. Set to 172.17.29.7/32 to
match the specific IP 172.17.29.7. You can u…
OctetStringr/w
Constraints:
range: 9-19
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.5
cfgFwNatOutSourcePortStart
Source start port to match.

Specify the port or start of a port range from which a connection
originates. Can only be used with TCP, UDP or TCP/UDP. Leave this
on -1 to disable. You can use ! to invert th…
OctetStringr/w
Constraints:
range: 1-6
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.6
cfgFwNatOutSourcePortEnd
Destination end port to match.

When matching multiple port, this value is the end of the range.
Set to -1 if no range is to be matched. Can only be used with TCP,
UDP or TCP/UDP.

**Note:** …
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.7
cfgFwNatOutDestinationAddress
Destination address to match.

This can be a specific ip address or a range in CIDR notation. Set
to 0.0.0.0/0 to match all outbound traffic on the interface
specified in cfgFwNatOutInterface. You can use …
OctetStringr/w
Constraints:
range: 9-19
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.8
cfgFwNatOutDestinationPortStart
Destination start port to match.

Specify the port or start of a port range for the destination. Can
only be used with TCP, UDP or TCP/UDP. You can use ! to invert the
sense of the rule: E.g. !80. When use…
OctetStringr/w
Constraints:
range: 1-6
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.9
cfgFwNatOutDestinationPortEnd
Destination end port to match.

When forwarding multiple port, this value is the end of the range.
Set to -1 if no range is forwarded. Can only be used with TCP, UDP
or TCP/UDP.

**Note:** Us…
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.10
cfgFwNatOutSourceRewriteAddress
Set the address with which outbound traffic shall be rewritten.

In case you are using DHCP leave this on 0.0.0.0.

**Note:** If you are not rewriting the source to a specific
aliases you can…
SNMPv2-SMIIpAddressr/w
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.11
cfgFwNatOutSourceRewritePort
Set the source-port with which outbound traffic shall be rewritten.

Can only be used with TCP, UDP or TCP/UDP. Set to -1 to disable
source port rewrite.

**Note:** Usually you want this disa…
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.2.2.1.12
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3 · 1 row entry · 7 columns
L2 IP Filter
cfgFwL2IpFilterTableEntry entry .1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1
L2 IP Filter
Indexes
cfgFwL2IpFltrIndex
Column Syntax OID
cfgFwL2IpFltrIndex
Entry index of Table
Integer32
Constraints:
range: 0-63
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1.1
cfgFwL2IpFltrEnabled
Rule disabled or enabled.

Applies to AP and STA.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1.2
cfgFwL2IpFltrBridge
Bridge on which the rule will be applied.

Applies to AP and STA.
Integer32r/w
Constraints:
range: -1-255
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1.3
cfgFwL2IpFltrAction
Action to perform.

Applies to AP and STA.
Enumerationr/w
Enumerated Values:
0accept
1drop
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1.4
cfgFwL2IpFltrPriority
Filter priority

When multiple rules match, the rule with the highest priority will
be applied.

**NOTE:** When multiple matching rules with the same priority exist,
the rule which was first …
SNMPv2-SMIInteger32r/w
Textual Convention: SNMPv2-SMIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1.5
cfgFwL2IpFltrSource
Filter source

The source network/IP on which the rule matches (CIDR notation).

Applies to AP and STA.
OctetStringr/w
Constraints:
range: 9-19
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1.6
cfgFwL2IpFltrDestination
Filter destination

The destination network/IP on which the rule matches (CIDR notation).

Applies to AP and STA.
OctetStringr/w
Constraints:
range: 9-19
.1.3.6.1.4.1.16177.1.400.2.1.1.3.3.1.7
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10 · 1 row entry · 13 columns
Firewall filter rules table.
cfgFwFilterRulesTableEntry entry .1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1
Firewall filter rules table entry.
Indexes
cfgFwNatOutIndex
Column Syntax OID
cfgFwFltRIndex
Entry index of Table.
Integer32
Constraints:
range: 0-255
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.1
cfgFwFltREnabled
Disable or enable the rule.

Applies to AP and STA.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.2
cfgFwFltRChain
Action to be performed.

Applies to AP and STA.
Enumerationr/w
Enumerated Values:
0none
1input
2forward
3output
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.3
cfgFwFltRAction
Action to be performed.

Applies to AP and STA.
Enumerationr/w
Enumerated Values:
0drop
1accept
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.4
cfgFwFltRInputInterface
Name of the input interface to match.

Groups of interfaces can be matched by adding the character '+' at
the end. E.g. eth+ to match the interfaces eth0, eth1 and eth2.
To match all interfaces use the cha…
OctetStringr/w
Constraints:
range: 1-16
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.5
cfgFwFltROutputInterface
Name of the output interface to match.

Groups of interfaces can be matched by adding the character '+' at
the end. E.g. eth+ to match the interfaces eth0, eth1 and eth2.
To match all interfaces use the ch…
OctetStringr/w
Constraints:
range: 1-16
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.6
cfgFwFltRProtocol
Choose which IP protocol the rule matches.

For a list of the currently existing protocols see:
https://en.wikipedia.org/wiki/List_of_IP_protocol_numbers
Some examples are:

* **any(0)**: Mat…
Integer32r/w
Constraints:
range: 0-255
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.7
cfgFwFltRSourceAddress
Source address to match.

This can be a specific ip address or a range in CIDR notation.
Set to 0.0.0.0/0 to match all sources.
Set to 172.17.29.7/32 to match the specific IP 172.17.29.7.
You can use ! to …
OctetStringr/w
Constraints:
range: 1-20
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.8
cfgFwFltRSourcePortStart
Source start port to match.

Specify the port or start of a port range from which a connection
originates.
Can only be used with tcp or udp.
You can use ! to invert the sense of the rule: E.g. !80.
When us…
OctetStringr/w
Constraints:
range: 1-20
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.9
cfgFwFltRSourcePortEnd
Source end port to match.

When matching multiple ports, this value is the end of the range.
Can only be used with tcp or udp.

Set to -1 when no range is to be matched.

Applie…
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.10
cfgFwFltRDestinationAddress
Destination address to match.

This can be a specific ip address or a range in CIDR notation.
Set to 0.0.0.0/0 to match all destinations.
Set to 172.17.29.7/32 to match the specific IP 172.17.29.7.
You can…
OctetStringr/w
Constraints:
range: 1-20
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.11
cfgFwFltRDestinationPortStart
Destination start port to match.

Specify the port or start of a port range to which a connection is
going.
Can only be used with tcp or udp.
You can use ! to invert the sense of the rule: E.g. !80.
When u…
OctetStringr/w
Constraints:
range: 1-20
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.12
cfgFwFltRDestinationPortEnd
Destination end port to match.

When matching multiple ports, this value is the end of the range.
Can only be used with tcp or udp.

Set to -1 when no range is to be matched.

A…
Integer32r/w
Constraints:
range: -1-65535
.1.3.6.1.4.1.16177.1.400.2.1.1.4.10.1.13