extremeIpSecurityAnomalyTcpFlagViolation
EXTREME-IP-SECURITY-MIB ·
.1.3.6.1.4.1.1916.1.34.2.0.3
Object
notification
For ports on which the protocol anomaly protection TCP flags features has been enabled, this trap will be generated when a TCP packet received on that port if 1) (TCP flag SYN is set) and (its TCP source port < 1024). OR 2) (TCP flag == 0) and (TCP seq # == 0). OR 3) (TCP flag FIN/URG/PSH bits sre set) and (TCP seq # == 0). OR 4) Both TCP iflag SYN and FIN are set
Context
- MIB
- EXTREME-IP-SECURITY-MIB
- OID
.1.3.6.1.4.1.1916.1.34.2.0.3- Type
- notification
- Status
- current
- Parent
- extremeIpSecurityAnomalyTrapsPrefix
- Siblings
- 4
Syntax
No syntax metadata recorded.
Values & Constraints
No enumerated values or constraints recorded.
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| extremeIpSecurityAnomalyIpViolation For ports on which the protocol anomaly protection IP
features has been enabled, this trap will be generated when a packet
received on that port if the packet's source IP == des… | notification | - | .1.3.6.1.4.1.1916.1.34.2.0.1 |
| extremeIpSecurityAnomalyL4PortViolation For ports on which the protocol anomaly protection L4port
features has been enabled, this trap will be generated when a packet
received on that port if
1) the packet is a TCP o… | notification | - | .1.3.6.1.4.1.1916.1.34.2.0.2 |
| extremeIpSecurityAnomalyTcpFragmentViolation For ports on which the protocol anomaly protection TCP fragment
features has been enabled, this trap will be generated when a packet
received on that port if
1) the packet is a… | notification | - | .1.3.6.1.4.1.1916.1.34.2.0.4 |
| extremeIpSecurityAnomalyIcmpViolation For ports on which the protocol anomaly protection ICMP
features has been enabled, this trap will be generated when an ICMP
packet received on that port if
1) the size of ICMP … | notification | - | .1.3.6.1.4.1.1916.1.34.2.0.5 |
Notification Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| esAnomalyPortIfIndex The ifIndex of the port on which the violating packet was received. | scalar | SNMPv2-SMIInteger32 | .1.3.6.1.4.1.1916.1.34.2.1 |
| esAnomalyVlanIfIndex The ifIndex of the VLAN on which the violating packet was received. | scalar | SNMPv2-SMIInteger32 | .1.3.6.1.4.1.1916.1.34.2.2 |
| esAnomalyVlanDescr The description(name) of the VLAN on which the violating packet was received. | scalar | OctetString | .1.3.6.1.4.1.1916.1.34.2.3 |
| esAnomalySrcMacAddress Source MAC address in the violating packet | scalar | SNMPv2-TCMacAddress | .1.3.6.1.4.1.1916.1.34.2.4 |
| esAnomalyDestMacAddress Destination MAC address in the violating packet | scalar | SNMPv2-TCMacAddress | .1.3.6.1.4.1.1916.1.34.2.5 |
| esAnomalyVlanTag the vlan tag in the violating packet | scalar | VlanTag | .1.3.6.1.4.1.1916.1.34.2.18 |
| esAnomalySrcIpAddrType source IP address type: ipv4 or ipv6 | scalar | INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.1916.1.34.2.6 |
| esAnomalySrcIpAddr source IP address in the violating packet | scalar | INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.1916.1.34.2.7 |
| esAnomalyDestIpAddrType destination IP address type: ipv4 or ipv6 | scalar | INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.1916.1.34.2.8 |
| esAnomalyDestIpAddr destination IP address in the violating packet | scalar | INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.1916.1.34.2.9 |
| esAnomalySrcL4Port tcp/udp source port number in the violating packet | scalar | INET-ADDRESS-MIBInetPortNumber | .1.3.6.1.4.1.1916.1.34.2.11 |
| esAnomalyDestL4Port tcp/udp destination port in the violating packet | scalar | INET-ADDRESS-MIBInetPortNumber | .1.3.6.1.4.1.1916.1.34.2.12 |
| esAnomalyTcpFlagReason TCP flag anomaly reason code | scalar | TcpFlagAnomalyReason | .1.3.6.1.4.1.1916.1.34.2.16 |
| esAnomalyTcpFlag TCP flags in the violating packet | scalar | HexOctet | .1.3.6.1.4.1.1916.1.34.2.13 |
| esAnomalyTcpSeq TCP sequence number in the violating packet | scalar | SNMPv2-SMIInteger32 | .1.3.6.1.4.1.1916.1.34.2.14 |