hm2DynFwRowStatus
HM2-FW-MIB ·
.1.3.6.1.4.1.248.11.79.1.2.2.1.1.11
Object
This is a standard row status value: - active(1): The rule is active. Note that until committed, the rule will not be applied. - notInService(2): The rule is inactive because of user action. - notReady(3): The rule is inactive because of agent action. - createAndGo(4): Create the rule with default parameters activated. - createAndWait(5): Create the rule inactive. - destroy(6): Delete the rule. You cannot delete a rule with interface mappings to it.
Context
- MIB
- HM2-FW-MIB
- OID
.1.3.6.1.4.1.248.11.79.1.2.2.1.1.11- Type
- column
- Access
- readwrite
- Status
- current
- Parent
- hm2DynFwRuleEntry
- Table
- hm2DynFwRuleTable
- Siblings
- 11
Values & Constraints
Type Values
1 | active |
2 | notInService |
3 | notReady |
4 | createAndGo |
5 | createAndWait |
6 | destroy |
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| hm2DynFwRuleIndex Rule index of this dynamic firewall rule | column | Integer32 | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.1 |
| hm2DynFwTrap Set to true if application of this rule shall send a trap. | column | SNMPv2-TCTruthValue | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.10 |
| hm2DynFwDescription User defined textual description related to this rule. | column | OctetString | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.12 |
| hm2DynFwSourceAddress The source address of the packet to filter. Allowed formats are:
- keyword 'any'
- single address ('10.0.0.1')
- CIDR address range ('10.0.0.0/8')
- netobject ('$name') | column | OctetString | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.2 |
| hm2DynFwSourcePort The source port of the packet to filter. Allowed formats are:
- keyword 'any'
- single port ('10')
- port range with first and last port separated by hyphen
('10-15')
- comma s… | column | OctetString | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.3 |
| hm2DynFwTargetAddress The destination address of the packet to filter. Allowed formats are:
- keyword 'any'
- single address ('10.0.0.1')
- CIDR address range ('10.0.0.0/8')
- netobject ('$name') | column | OctetString | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.4 |
| hm2DynFwTargetPort The destination port of the packet to filter. Allowed formats are:
- keyword 'any'
- single port ('10')
- port range with first and last port separated by hyphen
('10-15')
- co… | column | OctetString | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.5 |
| hm2DynFwProto The IP protocol (RFC 791) for protocol-independent
filtering. The following values are currently
supported:
o icmp(1): internet control message protocol (RFC 792)
o igmp(2): int… | column | Enumeration | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.6 |
| hm2DynFwRuleParams Additional parameters to this rule as string.
A parameter has the syntax:
<param>=<val>
Parameters are separated by a comma.
If more than one value is given for a param… | column | OctetString | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.7 |
| hm2DynFwAction The action of the corresponding rule:
o accept(1): Packets matching this rule are accepted and will
be forwarded
o drop(2): Packets matching this rule will be silently
disca… | column | Enumeration | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.8 |
| hm2DynFwLog Set to true if application of this rule shall be logged | column | SNMPv2-TCTruthValue | .1.3.6.1.4.1.248.11.79.1.2.2.1.1.9 |