-- ============================================================================
-- Copyright (c) 2004-2022 New H3C Tech. Co., Ltd. All rights reserved.
--
-- Description: The purpose of this MIB file is to provide the definition of
--              the portatk trap.
-- Reference:
-- Version: V1.0
-- History:
-- V1.0 2022-09-02
--   Initial version, created by shaojunjun
-- ============================================================================
HH3C-PORTATK-TRAP-MIB DEFINITIONS ::= BEGIN

IMPORTS
        hh3cCommon
    FROM HH3C-OID-MIB
        DisplayString
    FROM SNMPv2-TC
        OBJECT-TYPE, MODULE-IDENTITY, NOTIFICATION-TYPE
    FROM SNMPv2-SMI;

-- Node definitions
hh3cPortAtkTrap MODULE-IDENTITY
    LAST-UPDATED "202209011800Z"        -- Sep 2, 2022 at 18:00 GMT
    ORGANIZATION
        "New H3C Technologies Co., Ltd."
    CONTACT-INFO
        "Platform Team New H3C Technologies Co., Ltd.
         Hai-Dian District Beijing P.R. China
         http://www.h3c.com
         Zip: 100085"
    DESCRIPTION
        "This MIB file defines the port attack trap warning feature only."
    REVISION "202209011800Z"
    DESCRIPTION
        "The initial version of this MIB file."
    ::= { hh3cCommon 250}

-- hh3cPortAtkTrapPacket
hh3cPortAtkTrapPacket OBJECT IDENTIFIER ::= { hh3cPortAtkTrap 0 }

hh3cPortAtkTrapPtkAlarm NOTIFICATION-TYPE
    OBJECTS
        {
            hh3cPortAtkTrapPacketIf,
            hh3cPortAtkTrapPacketType
        }
    STATUS      current
    DESCRIPTION
         "If the protocol packet sending rate on a port exceeded the rate limit,
          a trap message is generated and sent to the remote monitoring device."
    ::= { hh3cPortAtkTrapPacket 1 }

hh3cPortAtkTrapPtkResume NOTIFICATION-TYPE
    OBJECTS
        {
            hh3cPortAtkTrapPacketIf,
            hh3cPortAtkTrapPacketType
        }
    STATUS      current
    DESCRIPTION
        "If the protocol packet sending rate on a port dropped below the rate limit,
        a trap message is generated and sent to the remote monitoring device."
    ::= { hh3cPortAtkTrapPacket 2 }

hh3cPortAtkTrapPtkObjs OBJECT IDENTIFIER  ::= { hh3cPortAtkTrap 1 }

hh3cPortAtkTrapPacketIf OBJECT-TYPE
    SYNTAX      DisplayString(SIZE (0..255))
    MAX-ACCESS  accessible-for-notify
    STATUS      current
    DESCRIPTION
        "Interface that received the protocol packets."
    ::= { hh3cPortAtkTrapPtkObjs 1}

hh3cPortAtkTrapPacketType OBJECT-TYPE
    SYNTAX INTEGER
    {
        isis(1),
        esis(2),
        clnp(3),
        vrrp(4),
        unknownIpv4Mc(5),
        unknownIpv6Mc(6),
        ipv4McastRip(7),
        ipv4BcastRip(8),
        mcastNtp(9),
        bcastNtp(10),
        ipv4McastOspfDip5(11),
        ipv4McastOspfDip6(12),
        ipv4UcastOspf(13),
        ipv4McastPim(14),
        ipv4UcastPim(15),
        ipv4Igmp(16),
        ucastLdp(17),
        ipv6McastPim(18),
        ipv6UcastPim(19),
        ipv6Mld(20),
        ipv6Ripng(21),
        ipv6UcastOspfv3(22),
        ipv6McastOspfv3Dip5(23),
        ipv6McastOspfv3Dip6(24),
        ipv6Ldp(25),
        ipv6Vrrp(26),
        rrpp(27),
        ipv4Autorp(28),
        dot1x(29),
        stp(30),
        lacp(31),
        gvrp(32),
        hgmp(33),
        ucastBgp(34),
        ucastIcmp(35),
        ucastTtl(36),
        ucastIpOption(37),
        ipv6Bgp(38),
        ipv6NdPass(39),
        ipv6NdDest(40),
        lldp(41),
        dldp(42),
        bpduTunnelDmac3(43),
        bpduTunnelDmac0(44),
        bpduTunnelDmac1(45),
        bpduTunnelDmac2(46),
        msdp(47),
        telnetSsh(48),
        httpHttps(49),
        snmp(50),
        smlk(51),
        dot1ag(52),
        cdp(53),
        acsei(54),
        ucastNtp(55),
        md(56),
        ipv4UcDhcp(57),
        ipv4UcOspfTtl(58),
        ipv4UcPimTtl(59),
        ipv6Icmp(60),
        gmrp(61),
        pvst(62),
        oam(63),
        hgmpBc(64),
        eapolBridgemac(65),
        wpiBridgemac(66),
        cfdBridgemac(67),
        hgmpBridgemac(68),
        acseiBridgemac(69),
        ipv6DhcpUcClient(70),
        ipv6DhcpUcRelay(71),
        l2Stationmove(72),
        icmpRdm(73),
        ipv6CpudstCar(74),
        ptp(75),
        fcoeFipUc(76),
        fcoeToCpu(77),
        ipv6UcastRtrenum(78),
        ipv6McastRtrenum(79),
        ipv6UcastNtp(80),
        ipv6McastNtp(81),
        trillAllisis(82),
        drcp(83),
        rlinkHigh(84),
        rlinkMiddle(85),
        vdp(86),
        ipv4McastCbt(87),
        arp(88),
        arpReply(89),
        ipv6Ttl(90),
        ipv6Ping(91),
        snapCis(92),
        macBasevlan(93),
        trillStp(94),
        routeToCpuMask(95),
        spbm(96),
        ipv6IpOption(97),
        ipv4UcBgpTtl(98),
        dhcpClient(99),
        dhcpServer(100),
        dhcpRelayClient(101),
        dhcpRelayServer(102),
        ipv6Dhcp(103),
        ipv6DhcpClient(104),
        ipv6DhcpServer(105),
        ipv6DhcpRelayServer(106),
        bfdEcho(107),
        bfdCtrl(108),
        bfdMultihop(109),
        bfdIntfCtrl(110),
        lspPing(111),
        loopbackDetection(112),
        loopTest(113),
        ipv6TelnetSsh(114),
        mplsRsvp(115),
        rrppFd(116),
        ptpUdp(117),
        ofpMiss(118),
        ofpMatch(119),
        ofpDevconfTtl(120),
        ofpMacipMiss(121),
        ftpCtrl(122),
        vxlanUdp(123),
        capwap(124),
        rlinkextNormal(125),
        rlinkextMiddle(126),
        rlinkextHigh(127),
        ipv4Siph225(128),
        ipv4Siph245(129),
        typeErps(130),
        esmc(131),
        rlinkNormal(132),
        onvifv4(133),
        onvifv6(134),
        ipv4Sip(135),
        twamp(136),
        pppoe(137),
        ipv6RaGuard(138),
        tcpToCpuLow(139),
        ipv4BcmpServer(140),
        wlanAcToCpu(141),
        lwappAcToCpu(142),
        smartmcUc(143),
        smartmcBc(144),
        rlinkLow(145),
        drniUdp(146),
        sipSnooping(147),
        douPsg(148),
        h323Snooping(149),
        mdns(150),
        erps(151),
        sadp(152),
        dhcpProtectionClient(153),
        dhcpProtectionServer(154),
        bfdMultihopVxlan(155),
        rarp(156),
        inof(157),
        inofMobile(158),
        ipv6UcBgpTtl(159),
        ipv4McastOspf5High(160),
        ipv4McastOspf6High(161),
        ipv6Drcp(162),
        l2ptusr(163),
        rarpReply(164)
    }
    MAX-ACCESS  accessible-for-notify
    STATUS      current
    DESCRIPTION
        "Type of the protocol packets received on the port."
    ::= { hh3cPortAtkTrapPtkObjs 2}

END

