apDebugConfig
DDOSSECURE4-MIB ·
.1.3.6.1.4.1.11068.1.4.4.1.5
Object
node
No description available.
Context
- MIB
- DDOSSECURE4-MIB
- OID
.1.3.6.1.4.1.11068.1.4.4.1.5- Type
- node
- Parent
- apConfig
- Siblings
- 12
- Children
- 16
Syntax
No syntax metadata recorded.
Values & Constraints
No enumerated values or constraints recorded.
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| apInterfaces | node | - | .1.3.6.1.4.1.11068.1.4.4.1.1 |
| apSnmp | node | - | .1.3.6.1.4.1.11068.1.4.4.1.10 |
| apAutoBlackList | node | - | .1.3.6.1.4.1.11068.1.4.4.1.11 |
| apProtectedIpAutodetect If true, unconfigured IPs amd MACs are autodetected on the protected interface
(and default protection parameters are applied) | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.12 |
| apTrackIndeterminate Track state on indeterminate addresses on protected interface | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.13 |
| apAccess | node | - | .1.3.6.1.4.1.11068.1.4.4.1.2 |
| apLogging | node | - | .1.3.6.1.4.1.11068.1.4.4.1.3 |
| apMail | node | - | .1.3.6.1.4.1.11068.1.4.4.1.4 |
| apOperationMode Current operating mode of the DDoS Secure device | scalar | SNMPv2-TCDisplayString | .1.3.6.1.4.1.11068.1.4.4.1.6 |
| apNtpServerList Comma-separated list of NTP servers for appliance | scalar | SNMPv2-TCDisplayString | .1.3.6.1.4.1.11068.1.4.4.1.7 |
| apTimeZone Time zone (as a string, e.g. Europe/London) | scalar | SNMPv2-TCDisplayString | .1.3.6.1.4.1.11068.1.4.4.1.8 |
| apProtectedIpNetwork All the protected IP network(s) on the DDoS Secure Appliance | scalar | SNMPv2-TCDisplayString | .1.3.6.1.4.1.11068.1.4.4.1.9 |
Child Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| apDebugBandwidthFlag TRUE if logging bandwidth Attacks | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.1 |
| apDebugFragmentAttackFlag TRUE if logging fragment Attacks | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.10 |
| apDebugBadIpPacketFlag TRUE if logging bad IP packets | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.11 |
| apDebugBadTcpPacketFlag TRUE if logging bad TCP packets | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.12 |
| apDebugBadUdpPacketFlag TRUE if logging bad UDP packets | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.13 |
| apDebugBadIcmpFlag TRUE if logging bad ICMP packets | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.14 |
| apDebugBadOtherIpFlag TRUE if logging bad Other IP Protocol packets | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.15 |
| apDebugOverloadProtectedIpFlag TRUE if logging stalled protected IPs | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.16 |
| apDebugFloodFlag TRUE if logging floods | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.2 |
| apDebugBlockedProtocolFlag TRUE if logging packets with Blocked Protocols | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.3 |
| apDebugBlockedStateFlag TRUE if logging packets with Blocked States | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.4 |
| apDebugIpAttackFlag TRUE if logging IP Attacks | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.5 |
| apDebugTcpAttackFlag TRUE if logging TCP Attacks | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.6 |
| apDebugUdpAttackFlag TRUE if logging UDP Attacks | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.7 |
| apDebugIcmpAttackFlag TRUE if logging ICMP Attacks | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.8 |
| apDebugOtherIpAttackFlag TRUE if logging other IP Protocol Attacks | scalar | SNMPv2-TCTruthValue | .1.3.6.1.4.1.11068.1.4.4.1.5.9 |