AD | Application | AWS | Azure | Cloud | Database | Enterprise | Environmental | Event Log | File System | IoT | IT Service | Network/System | Infra | Performance | Protocol | SaaS | Security | Service Level | Storage | Linux | VMware | VoIP | Web | Wireless | SNMP

Crumbtrail

MonitorTools.com » Technical documentation » SNMP » MIB » Wellfleet » Wellfleet-NML-MIB » Objects

Wellfleet-NML-MIB.mib object view, vendor Wellfleet

Introduction

Most network devices and programs ship with so-called MIB files to describe the parameters and meanings (i.e.: friendly names) which are available for monitoring via SNMP.
ActiveXperts Network Monitor 2024 can import vendor-specific MIB files, so it can be used to monitor specific OID's (Object Identifiers). This way, you can monitor your devices, computers, etc. by selecting your relevant OID's by name.

ActiveXperts Network Monitor 2024 can import MIB file Wellfleet-NML-MIB and use it to monitor vendor specific OID's.

Wellfleet-NML-MIB file content

Object view of Wellfleet-NML-MIB:

Scalar Object
wfNmlBaseEntry .1.3.6.1.4.1.18.3.5.1.1.5.2.1
An entry in the NML Base table
wfNmlTrafficFilterEntry .1.3.6.1.4.1.18.3.5.1.1.5.3.1
An entry in wfNmlTrafficFilterTable.
Tabular Object
wfNmlCircuit .1.3.6.1.4.1.18.3.5.1.1.5.2.1.3
Circuit being used
wfNmlDelete .1.3.6.1.4.1.18.3.5.1.1.5.2.1.1
Create/Delete parameter
wfNmlDisable .1.3.6.1.4.1.18.3.5.1.1.5.2.1.2
Enable/Disable parameter
wfNmlAddSecurityHeader .1.3.6.1.4.1.18.3.5.1.1.5.2.1.4
Indicates if Security header should be added and verified or just verified on egress of this circuit
wfNmlSAIDType .1.3.6.1.4.1.18.3.5.1.1.5.2.1.5
Type of SAID to be used. Group or individual
wfNmlSAIDValue .1.3.6.1.4.1.18.3.5.1.1.5.2.1.6
Indicates value for Group or Individual SAID
wfNmlCUGValue .1.3.6.1.4.1.18.3.5.1.1.5.2.1.7
Indicates Closed User Group id to be placed in MDF field of frame
wfNmlCUGDrop .1.3.6.1.4.1.18.3.5.1.1.5.2.1.8
Indicates action to perfrom if security search of table fails
wfNmlCUGPacketsDropped .1.3.6.1.4.1.18.3.5.1.1.5.2.1.9
Indicates packets dropped for security check
wfNmlTrafficFilterCircuit .1.3.6.1.4.1.18.3.5.1.1.5.3.1.7
The ID of the Bridge Circuit to which the filter is applied.
wfNmlTrafficFilterRuleNumber .1.3.6.1.4.1.18.3.5.1.1.5.3.1.8
ID for the rule.
wfNmlTrafficFilterFragment .1.3.6.1.4.1.18.3.5.1.1.5.3.1.9
Fragment number - for large rules.
wfNmlTrafficFilterCreate .1.3.6.1.4.1.18.3.5.1.1.5.3.1.1
Defines the existence of the traffic filter rule: created - traffic filter exists delete - traffic filter does not exist and can be deleted.
wfNmlTrafficFilterEnable .1.3.6.1.4.1.18.3.5.1.1.5.3.1.2
Defines whether or not the traffic filter rule should be used: enabled - activate the rule. disabled - inactivate the rule.
wfNmlTrafficFilterStatus .1.3.6.1.4.1.18.3.5.1.1.5.3.1.3
Defines the current status of the traffic filter: inactive - the rule is not in use. active - the rule is being used. error - the application detected an error in the rule.
wfNmlTrafficFilterCounter .1.3.6.1.4.1.18.3.5.1.1.5.3.1.4
The number of received packets that have matched this rule.
wfNmlTrafficFilterDefinition .1.3.6.1.4.1.18.3.5.1.1.5.3.1.5
The filter rule definition.
wfNmlTrafficFilterReserved .1.3.6.1.4.1.18.3.5.1.1.5.3.1.6
Reserved field.
wfNmlTrafficFilterName .1.3.6.1.4.1.18.3.5.1.1.5.3.1.10
name of the rule number
Table
wfNmlBaseTable .1.3.6.1.4.1.18.3.5.1.1.5.2
NML Base record - Contains NML Configuration parameters
wfNmlTrafficFilterTable .1.3.6.1.4.1.18.3.5.1.1.5.3
Native mode Lan Traffic Filters
Object Identifier
wfBrNativeModeLan .1.3.6.1.4.1.18.3.5.1.1.5