JUNIPER-LSYSSP-NATSRCRULE-MIB Download
This module defines the NAT-source-rule-specific MIB for
Juniper Enterprise Logical-System (LSYS) security profiles.
Juniper documentation is recommended as the reference.
The LSYS security profile provides various static and dynamic
resource management by observing resource quota limits.
Security NAT-source-rule resource is the focus in this MIB.
With the IPHost SNMP tool, you can monitor any SNMP objects of the
JUNIPER-LSYSSP-NATSRCRULE-MIB.
OID list for JUNIPER-LSYSSP-NATSRCRULE-MIB
- jnxLsysSpNATsrcruleTable
- LSYSPROFILE NAT-source-rule objects for NAT-source-rule resource consumption per LSYS.
- jnxLsysSpNATsrcruleEntry
- An entry in NAT-source-rule resource table.
- jnxLsysSpNATsrcruleLsysName
- The name of the logical system for which NAT-source-rule resource information is retrieved.
- jnxLsysSpNATsrcruleProfileName
- The security profile name string for the LSYS.
- jnxLsysSpNATsrcruleUsage
- The current resource usage count for the LSYS.
- jnxLsysSpNATsrcruleReserved
- The reserved resource count for the LSYS.
- jnxLsysSpNATsrcruleMaximum
- The maximum allowed resource usage count for the LSYS.
- jnxLsysSpNATsrcruleUsedAmount
- The NAT-source-rule resource consumption over all LSYS.
- jnxLsysSpNATsrcruleMaxQuota
- The NAT-source-rule resource maximum quota for the whole device for all LSYS.
- jnxLsysSpNATsrcruleAvailableAmount
- The NAT-source-rule resource available in the whole device.
- jnxLsysSpNATsrcruleHeaviestUsage
- The most amount of NAT-source-rule resource consumed of a LSYS.
- jnxLsysSpNATsrcruleHeaviestUser
- The LSYS name that consume the most NAT-source-rule resource.
- jnxLsysSpNATsrcruleLightestUsage
- The least amount of NAT-source-rule resource consumed of a LSYS.
- jnxLsysSpNATsrcruleLightestUser
- The LSYS name that consume the least NAT-source-rule resource.
Download IPHost Network Monitor (500 monitors for 30 days, 50 monitors free forever) to start monitoring network devices right now.
Witn IPHost SNMP monitor you can monitor network performance, audit network usage, detect network faults, or inappropriate access.
The IPHost's SNMP monitor can communicate and interact with any SNMP-enabled device.