LANCOM Reference Manual LCOS 3.50 Chapter 8: Firewall
134
Firewall
SNMP: Generic trap = enterpriseSpecific (6)
SNMP: Specific trap = 26 (0x1A)
SNMP: Time stamp = 1442 (0x5A2)
System descriptor
SNMP: OID = 1.3.6.1.2.1.1.1.0 1.
SNMP: String Value = LANCOM Business 6021 2.80.0001 /
23.09.2002 8699.000.036
Device string
SNMP: OID = 1.3.6.1.2.1.1.5.0 2. System-Name
SNMP: String Value = LANCOM Business 6021
Time stamp
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.2.1 3.
SNMP: String Value = 9/23/2002 17:56:57
Source address
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.3.1 3.
SNMP: IP Address = 10.0.0.37
Destination address
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.4.1 4.
SNMP: IP Address = 192.168.200.10
Protocol (6 = TCP)
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.5.1 5.
SNMP: Integer Value = 6 (0x6) TCP
Source port
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.6.1 6.
SNMP: Integer Value = 4353 (0x1101)
Destination port
(80 = HTTP)
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.7.1 7.
SNMP: Integer Value = 80 (0x50)
Name of the filter
rule
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.8.1 8.
SNMP: String Value = BLOCKHTTP
This trap and all different in the LANCOM generated traps are sent to
all manually configured trap receivers, just like to each registered
LANmonitor, which can evaluate this and possibly all other traps.
8.3.6 Strategies for Firewall settingsFirewalls are the interface between networks, and they restrict to a smaller or
larger extent an unhindered data exchange. Thus Firewalls have opposite
objectives than networks, although they are a part of them: networks should
connect workstations, Firewalls should prevent the connection.