Enterasys Security Router X-PeditionTM User Manual page 28

Enterasys security router user's guide
Table of Contents

Advertisement

DOS Attacks Blocked Counters........................................................................................................B-12
DOS Attacks Blocked Table .............................................................................................................B-12
VPN MIB Tables ...........................................................................................................................................B-12
etsysVpnIkePeer Table ....................................................................................................................B-13
etsysVpnIkePeerProposals Table ....................................................................................................B-13
etsysVpnIkeProposal Table ..............................................................................................................B-14
etsysVpnIpsecPolicy Table...............................................................................................................B-14
etsysVpnIntfPolicy Table ..................................................................................................................B-14
etsysVpnIpsecPolicyRule Table .......................................................................................................B-15
etsysVpnIpsecPolProposals Table ...................................................................................................B-15
etsysVpnIpsecProposal Table ..........................................................................................................B-16
etsysVpnIpsecPropTransforms Table ..............................................................................................B-16
etsysVpnAhTransform Table ............................................................................................................B-16
etsysVpnEspTransform Table ..........................................................................................................B-17
etsysVpnIpcompTransform Table.....................................................................................................B-17
ipCidrRouteTable for Static Routes ..............................................................................................................B-18
Host Resources MIB Objects .......................................................................................................................B-18
Enterasys Configuration Management MIB ..................................................................................................B-19
Enterasys Configuration Change MIB ..........................................................................................................B-20
Enterasys SNMP Persistence MIB ...............................................................................................................B-21
Enterasys Syslog Client MIB ........................................................................................................................B-22
xxvi

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Security Router X-PeditionTM and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

X-pedition xsr

Table of Contents