DOS Attacks Blocked Counters

B-12

DOS Attacks Blocked Table

B-12

VPN MIB Tables

B-12

etsysVpnIkePeer Table

B-13

etsysVpnIkePeerProposals Table

B-13

etsysVpnIkeProposal Table

B-14

etsysVpnIpsecPolicy Table

B-14

etsysVpnIntfPolicy Table

B-14

etsysVpnIpsecPolicyRule Table

B-15

etsysVpnIpsecPolProposals Table

B-15

etsysVpnIpsecProposal Table

B-16

etsysVpnIpsecPropTransforms Table

B-16

etsysVpnAhTransform Table

B-16

etsysVpnEspTransform Table

B-17

etsysVpnIpcompTransform Table

B-17

ipCidrRouteTable for Static Routes

B-18

Host Resources MIB Objects

B-18

Enterasys Configuration Management MIB

B-19

Enterasys Configuration Change MIB

B-20

Enterasys SNMP Persistence MIB

B-21

Enterasys Syslog Client MIB

B-22

xxvi

Page 28
Image 28
Enterasys Networks X-PeditionTM manual DOS Attacks Blocked Counters DOS Attacks Blocked Table