cufwAaicGlobalNumBadPortRange 1.3.6.1.4.1.9.9.491.1.5.1.3

Number of application protocol units that attempted to advertise illegal port ranges for secondary connections. An example of such an occurrence would be a passive FTP connection, where the server advertises a disallowed port range for data connection. For this MIB to be implemented, the managed firewall must be implementing deep packet inspection of application traffic payloads. This value is accumulated from the last reboot of the firewall.

Informations

Access Type
readonly

Parent

1.3.6.1.4.1.9.9.491.1.5.1 cufwAaicGlobals