Fortinet black logo

Hyperscale Firewall Guide

Hyperscale firewall SNMP MIB and trap fields

Hyperscale firewall SNMP MIB and trap fields

IP pool MIB and trap fields

You can use the following MIB fields to get hyperscale firewall IP pool information:

FgFwIppStatsEntry ::= SEQUENCE {  
    ...
    fgFwIppStatsFlags         DisplayString, 
    fgFwIppStatsGroupName     DisplayString, 
    fgFwIppStatsBlockSize     Gauge32, 
    fgFwIppStatsPortStart     InetPortNumber, 
    fgFwIppStatsPortEnd       InetPortNumber, 
    fgFwIppStatsStartClientIP IpAddress, 
    fgFwIppStatsEndClientIP   IpAddress, 
    fgFwIppStatsRscTCP        Gauge32, 
    fgFwIppStatsRscUDP        Gauge32, 
    fgFwIppStatsUsedRscTCP    Gauge32, 
    fgFwIppStatsUsedRscUDP    Gauge32, 
    fgFwIppStatsPercentageTCP Gauge32, 
    fgFwIppStatsPercentageUDP Gauge32 
}  

The following SNMP trap is also available for IP pool utilization:

fgTrapPoolUsage NOTIFICATION-TYPE 
    OBJECTS     { fnSysSerial, sysName, fgFwIppTrapType, fgFwIppStatsName, fgFwIppStatsGroupName, fgFwTrapPoolUtilization, fgFwIppTrapPoolProto }  
    STATUS      current 
    DESCRIPTION 
        "A trap for ippool." 
    ::= { fgTrapPrefix 1401 }  

Hyperscale firewall policy MIB fields

You can use the following MIB fields to send SNMP queries for hyperscale firewall policy information. These MIB fields support IPv4 and IPv6 hyperscale firewall policies and are available from the latest FORTINET-FORTIGATE-MIB.mib.

Path: FORTINET-FORTIGATE-MIB:fortinet.fnFortiGateMib.fgFirewall.fgFwPolicies.fgFwPolTables
OID: 1.3.6.1.4.1.12356.101.5.1.2

Index

MIB field

Description

.3

fgFwHsPolStatsTable

IPv4 hyperscale firewall policy statistics table.

.3.1

fgFwHsPolStatsEntry

IPv4 hyperscale firewall policy statistics entry.

.3.1.1

fgFwHsPolID

IPv4 hyperscale firewall policy ID.

.3.1.2

fgFwHsPolPktCount

IPv4 hyperscale firewall policy packet count.

.3.1.3

fgFwHsPolByteCount

IPv4 hyperscale firewall policy byte count.

.3.1.4

fgFwHsPolLastUsed

The last date and time the Ipv4 hyperscale firewall policy was used to start a session.

.4

fgFwHsPol6StatsTable

IPv6 hyperscale firewall policy stats table.

.4.1

fgFwHsPol6StatsEntry

IPv6 hyperscale firewall policy statistics entry.

.4.1.1

fgFwHsPol6ID

IPv6 hyperscale firewall statisticsID.

.4.1.2

fgFwHsPol6PktCount

IPv6 hyperscale firewall policy packet count.

.4.1.3

fgFwHsPol6ByteCount

IPv6 hyperscale firewall policy byte count.

.4.1.4

fgFwHsPol6LastUsed

The last date and time the IPv6 hyperscale firewall policy was used to start a session.

Queries of these fields follow the convention .oid.<vdom-id>.<policy-id>

Example SNMP query for IPv4 hyperscale firewall policy statistics:

$ snmpwalk -v2c -c public <ip-address> 1.3.6.1.4.1.12356.101.5.1.2.3.1

Example SNMP query for IPv6 hyperscale firewall policy statistics:

$ snmpwalk -v2c -c public <ip-address> 1.3.6.1.4.1.12356.101.5.1.2.4.1

Hyperscale firewall SNMP MIB and trap fields

IP pool MIB and trap fields

You can use the following MIB fields to get hyperscale firewall IP pool information:

FgFwIppStatsEntry ::= SEQUENCE {  
    ...
    fgFwIppStatsFlags         DisplayString, 
    fgFwIppStatsGroupName     DisplayString, 
    fgFwIppStatsBlockSize     Gauge32, 
    fgFwIppStatsPortStart     InetPortNumber, 
    fgFwIppStatsPortEnd       InetPortNumber, 
    fgFwIppStatsStartClientIP IpAddress, 
    fgFwIppStatsEndClientIP   IpAddress, 
    fgFwIppStatsRscTCP        Gauge32, 
    fgFwIppStatsRscUDP        Gauge32, 
    fgFwIppStatsUsedRscTCP    Gauge32, 
    fgFwIppStatsUsedRscUDP    Gauge32, 
    fgFwIppStatsPercentageTCP Gauge32, 
    fgFwIppStatsPercentageUDP Gauge32 
}  

The following SNMP trap is also available for IP pool utilization:

fgTrapPoolUsage NOTIFICATION-TYPE 
    OBJECTS     { fnSysSerial, sysName, fgFwIppTrapType, fgFwIppStatsName, fgFwIppStatsGroupName, fgFwTrapPoolUtilization, fgFwIppTrapPoolProto }  
    STATUS      current 
    DESCRIPTION 
        "A trap for ippool." 
    ::= { fgTrapPrefix 1401 }  

Hyperscale firewall policy MIB fields

You can use the following MIB fields to send SNMP queries for hyperscale firewall policy information. These MIB fields support IPv4 and IPv6 hyperscale firewall policies and are available from the latest FORTINET-FORTIGATE-MIB.mib.

Path: FORTINET-FORTIGATE-MIB:fortinet.fnFortiGateMib.fgFirewall.fgFwPolicies.fgFwPolTables
OID: 1.3.6.1.4.1.12356.101.5.1.2

Index

MIB field

Description

.3

fgFwHsPolStatsTable

IPv4 hyperscale firewall policy statistics table.

.3.1

fgFwHsPolStatsEntry

IPv4 hyperscale firewall policy statistics entry.

.3.1.1

fgFwHsPolID

IPv4 hyperscale firewall policy ID.

.3.1.2

fgFwHsPolPktCount

IPv4 hyperscale firewall policy packet count.

.3.1.3

fgFwHsPolByteCount

IPv4 hyperscale firewall policy byte count.

.3.1.4

fgFwHsPolLastUsed

The last date and time the Ipv4 hyperscale firewall policy was used to start a session.

.4

fgFwHsPol6StatsTable

IPv6 hyperscale firewall policy stats table.

.4.1

fgFwHsPol6StatsEntry

IPv6 hyperscale firewall policy statistics entry.

.4.1.1

fgFwHsPol6ID

IPv6 hyperscale firewall statisticsID.

.4.1.2

fgFwHsPol6PktCount

IPv6 hyperscale firewall policy packet count.

.4.1.3

fgFwHsPol6ByteCount

IPv6 hyperscale firewall policy byte count.

.4.1.4

fgFwHsPol6LastUsed

The last date and time the IPv6 hyperscale firewall policy was used to start a session.

Queries of these fields follow the convention .oid.<vdom-id>.<policy-id>

Example SNMP query for IPv4 hyperscale firewall policy statistics:

$ snmpwalk -v2c -c public <ip-address> 1.3.6.1.4.1.12356.101.5.1.2.3.1

Example SNMP query for IPv6 hyperscale firewall policy statistics:

$ snmpwalk -v2c -c public <ip-address> 1.3.6.1.4.1.12356.101.5.1.2.4.1