JUNIPER-LSYSSP-NATCONEBIND-MIB

JUNIPER-LSYSSP-NATCONEBIND-MIB Download

MIBs list

This module defines the NAT-cone-bind-specific MIB for Juniper Enterprise Logical-System (LSYS) security profiles. Juniper documentation is recommended as the reference. The LSYS security profile provides various static and dynamic resource management by observing resource quota limits. Security NAT-cone-bind resource is the focus in this MIB.

With the IPHost SNMP tool, you can monitor any SNMP objects of the JUNIPER-LSYSSP-NATCONEBIND-MIB.

OID list for JUNIPER-LSYSSP-NATCONEBIND-MIB

jnxLsysSpNATconebindTable
LSYSPROFILE NAT-cone-bind objects for NAT-cone-bind resource consumption per LSYS.
jnxLsysSpNATconebindEntry
An entry in NAT-cone-bind resource table.
jnxLsysSpNATconebindLsysName
The name of the logical system for which NAT-cone-bind resource information is retrieved.
jnxLsysSpNATconebindProfileName
The security profile name string for the LSYS.
jnxLsysSpNATconebindUsage
The current resource usage count for the LSYS.
jnxLsysSpNATconebindReserved
The reserved resource count for the LSYS.
jnxLsysSpNATconebindMaximum
The maximum allowed resource usage count for the LSYS.
jnxLsysSpNATconebindUsedAmount
The NAT-cone-bind resource consumption over all LSYS.
jnxLsysSpNATconebindMaxQuota
The NAT-cone-bind resource maximum quota for the whole device for all LSYS.
jnxLsysSpNATconebindAvailableAmount
The NAT-cone-bind resource available in the whole device.
jnxLsysSpNATconebindHeaviestUsage
The most amount of NAT-cone-bind resource consumed of a LSYS.
jnxLsysSpNATconebindHeaviestUser
The LSYS name that consume the most NAT-cone-bind resource.
jnxLsysSpNATconebindLightestUsage
The least amount of NAT-cone-bind resource consumed of a LSYS.
jnxLsysSpNATconebindLightestUser
The LSYS name that consume the least NAT-cone-bind resource.

Download IPHost Network Monitor (500 monitors for 30 days, 50 monitors free forever) to start monitoring network devices right now. Witn IPHost SNMP monitor you can monitor network performance, audit network usage, detect network faults, or inappropriate access. The IPHost's SNMP monitor can communicate and interact with any SNMP-enabled device.

MIBs list