/opennms-base-assembly/src/main/filtered/etc/events/Netscreen.events.xml
https://github.com/ajakubo1/opennms · XML · 1720 lines · 1698 code · 20 blank · 2 comment · 0 complexity · c764ec0c78fca72fc0c52eddf575272e MD5 · raw file
- <events xmlns="http://xmlns.opennms.org/xsd/eventconf">
- <!-- Start of auto generated data from MIB: NETSCREEN-TRAP-MIB -->
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>100</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapHw</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapHw</event-label>
- <descr>
- <p>This trap indicates that some kind of hardware problem has
- occured.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapHw trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>200</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapFw</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapFw</event-label>
- <descr>
- <p>This trap indicates that some kind of firewall functions has
- been triggered.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapFw trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>300</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapSw</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapSw</event-label>
- <descr>
- <p>This trap indicates that some kind of software problem has
- occured.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapSw trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>400</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapTrf</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapTrf</event-label>
- <descr>
- <p>This trap indicates that some kind of traffic conditions has
- been triggered.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapTrf trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>500</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapVpn</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapVpn</event-label>
- <descr>
- <p>This trap indicates that VPN tunnel status has occured.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapVpn trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>600</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapNsrp</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapNsrp</event-label>
- <descr>
- <p>This trap indicates that NSRP status has occured.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapNsrp trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>700</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapGPRO</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapGPRO</event-label>
- <descr>
- <p>This trap indicates that some kind of Global PRO problems has
- occurred.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapGPRO trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>800</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapDrp</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapDrp</event-label>
- <descr>
- <p>This trap indicates that Drp status has occured.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapDrp trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>900</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapIFFailover</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapIFFailover</event-label>
- <descr>
- <p>This trap indicates that interface fail over status has
- occured.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapIFFailover trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <event>
- <mask>
- <maskelement>
- <mename>id</mename>
- <mevalue>.1.3.6.1.4.1.3224</mevalue>
- </maskelement>
- <maskelement>
- <mename>generic</mename>
- <mevalue>6</mevalue>
- </maskelement>
- <maskelement>
- <mename>specific</mename>
- <mevalue>1000</mevalue>
- </maskelement>
- </mask>
- <uei>uei.opennms.org/vendor/netscreen/traps/netscreenTrapIDPAttack</uei>
- <event-label>NETSCREEN-TRAP-MIB defined trap event: netscreenTrapIDPAttack</event-label>
- <descr>
- <p>This trap indicates that IDP attack status has occured.</p><table>
- <tr><td><b>
- netscreenTrapType</b></td><td>
- %parm[#1]%;</td><td><p>
- traffic-sec(1)
- traffic-min(2)
- user-auth-fail(3)
- winnuke(4)
- syn-attack(5)
- tear-drop(6)
- ping-death(7)
- ip-spoofing(8)
- ip-src-route(9)
- land(10)
- icmp-flood(11)
- udp-flood(12)
- illegal-cms-svr(13)
- url-block-srv(14)
- high-availibility(15)
- port-scan(16)
- addr-sweep(17)
- policy-deny(18)
- device-dead(19)
- low-memory(20)
- dns-srv-down(21)
- generic-HW-fail(22)
- lb-srv-down(23)
- log-full(24)
- x509(25)
- vpn-ike(26)
- admin(27)
- sme(28)
- dhcp(29)
- cpu-usage-high(30)
- ip-conflict(31)
- attact-malicious-url(32)
- session-threshold(33)
- ssh-alarm(34)
- vpn-tunnel-up(40)
- vpn-tunnel-down(41)
- vpn-replay-attack(42)
- vpn-l2tp-tunnel-remove(43)
- vpn-l2tp-tunnel-remove-err(44)
- vpn-l2tp-call-remove(45)
- vpn-l2tp-call-remove-err(46)
- vpn-ias-too-many(47)
- vpn-ias-over-threshold(48)
- vpn-ias-under-threshold(49)
- vpn-ias-ike-error(50)
- allocated-session-threshold(51)
- nsrp-rto-up(60)
- nsrp-rto-down(61)
- nsrp-trackip-success(62)
- nsrp-trackip-failed(63)
- nsrp-trackip-failover(64)
- nsrp-inconsistent-configuration(65)
- nsrp-vsd-init(70)
- nsrp-vsd-master(71)
- nsrp-vsd-pbackup(72)
- nsrp-vsd-backup(73)
- nsrp-vsd-ineligible(74)
- nsrp-vsd-inoperable(75)
- nsrp-vsd-req-hearbeat-2nd(76)
- nsrp-vsd-reply-2nd(77)
- nsrp-rto-duplicated(78)
- dc-fail-reconnect-mc(79)
- mc-fail-reconnect-db(80)
- dc-fail-init(81)
- mc-fail-init(82)
- unknown-connect-attempt-dc(83)
- dc-reinit(84)
- mc-reinit(85)
- dc-fail-auth(86)
- dc-mc-version-unmatch(87)
- dc-log-full(88)
- device-connect-dc(89)
- device-disconnect-dc(90)
- usb-device-operation(93)
- ppp-no-ip-cfg(95)
- ppp-no-ip-in-pool(96)
- ipv6-conflict(101)
- dip-util-raise(102)
- dip-util-clear(103)
- route-alarm(205)
- ospf-flood(206)
- rip-flood(207)
- bgp-established(208)
- bgp-backwardtransition(209)
- ospf-virtifstatechange(210)
- ospf-nbrstatechange(211)
- ospf-virtnbrstatechange(212)
- ospf-ifconfigerror(213)
- ospf-virtifconfigerror(214)
- ospf-ifauthfailure(215)
- ospf-virtifauthfailure(216)
- ospf-ifrxbadpacket(217)
- ospf-virtifrxbadpacket(218)
- ospf-txretransmit(219)
- ospf-virtiftxretransmit(220)
- ospf-originatelsa(221)
- ospf-maxagelsa(222)
- ospf-lsdboverflow(223)
- ospf-lsdbapproachingoverflow(224)
- ospf-ifstatechange(225)
- ids-component(400)
- ids-icmp-flood(401)
- ids-udp-flood(402)
- ids-winnuke(403)
- ids-port-scan(404)
- ids-addr-sweep(405)
- ids-tear-drop(406)
- ids-syn(407)
- ids-ip-spoofing(408)
- ids-ping-death(409)
- ids-ip-source-route(410)
- ids-land(411)
- syn-frag-attack(412)
- tcp-without-flag(413)
- unknow-ip-packet(414)
- bad-ip-option(415)
- dst-ip-session-limit(430)
- ids-block-zip(431)
- ids-block-jar(432)
- ids-block-exe(433)
- ids-block-activex(434)
- icmp-fragment(435)
- too-large-icmp(436)
- tcp-syn-fin(437)
- tcp-fin-no-ack(438)
- ids-tcp-syn-ack-ack(439)
- ids-ip-block-frag(440)
- ids-icmp-ping-id-zero(441)
- av-scan-mgr(554)
- cpu-limit-s2f-forced(800)
- cpu-limit-s2f-auto(801)
- cpu-limit-f2s-forced(802)
- cpu-limit-f2s-timeout(803)
- cpu-limit-f2s-auto(804)
- link-statechange(1000)
- </p></td></tr>
- <tr><td><b>
- netscreenTrapDesc</b></td><td>
- %parm[#2]%;</td><td><p></p></td></tr></table>
- </descr>
- <logmsg dest='logndisplay'><p>
- netscreenTrapIDPAttack trap received
- netscreenTrapType=%parm[#1]%
- netscreenTrapDesc=%parm[#2]%</p>
- </logmsg>
- <severity>Indeterminate</severity>
- </event>
- <!-- End of auto generated data from MIB: NETSCREEN-TRAP-MIB -->
- </events>