42-2
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 42 Monitoring the Security Appliance
Using SNMP
Table 42-1
SNMP MIB and Trap Support
MIB or Trap Support
Description
SNMP core traps
The adaptive security appliance sends the following SNMP core traps:
•
authentication—An SNMP request fails because the NMS did not
authenticate with the correct community string.
•
linkup—An interface has transitioned to the “up” state.
•
linkdown—An interface is down, for example, if you removed the
nameif
command.
•
coldstart—The adaptive security appliance is running after a reload.
MIB-II
The adaptive security appliance supports browsing of the following
groups and tables:
•
system
IF-MIB
The adaptive security appliance supports browsing of the following
tables:
•
ifTable
•
ifXTable
RFC1213-MIB
The adaptive security appliance supports browsing of the following table:
•
ip.ipAddrTable
SNMPv2-MIB
The adaptive security appliance supports browsing the following:
•
snmp
ENTITY-MIB
The adaptive security appliance supports browsing of the following
groups and tables:
•
entPhysicalTable
•
entLogicalTable
The adaptive security appliance supports browsing of the following traps:
•
config-change
•
fru-insert
•
fru-remove
CISCO-IPSEC-FLOW-MONITOR-MIB
The adaptive security appliance supports browsing of the MIB.
The adaptive security appliance supports browsing of the following traps:
•
start
•
stop
CISCO-REMOTE-ACCESS-MONITOR-MIB
The adaptive security appliance supports browsing of the MIB.
The adaptive security appliance supports browsing of the following traps:
•
session-threshold-exceeded
CISCO-CRYPTO-ACCELERATOR-MIB
The adaptive security appliance supports browsing of the MIB.
ALTIGA-GLOBAL-REG
The adaptive security appliance supports browsing of the MIB.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......