ALCATEL-IND1-AAA-MIB: View SNMP OID List / Download MIB

VENDOR: ALCATEL


 Home MIB: ALCATEL-IND1-AAA-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 alcatelIND1AAAMIB 1.3.6.1.4.1.6486.800.1.2.1.15.1
     alcatelIND1AAAMIBObjects 1.3.6.1.4.1.6486.800.1.2.1.15.1.1
Branch For Authentication, Authorization, and Accounting (AAA) Subsystem Managed Objects.
         aaaServerMIB 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1
             aaaServerTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1
This table shows current configuration for each AAA server.
                 aaaServerEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1
An AAA server configuration identified by its protocol and its index. An entry is created/removed when a server is defined or undefined with IOS configuration commands via CLI or by issuing appropriate sets to this table using snmp.
                     aaasName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.1
Name of the server. This name is given by the operator to refer the server.
                     aaasProtocol 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.2
Protocol used with the server: radius(1) - RADIUS ldap(2) - LDAP ace(3) - ACE tacacs(4) - TACACS+
                     aaasHostName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.3
DNS name of the server host.
                     aaasIpAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.4
IP address of the server host.
                     aaasHostName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.5
DNS name of the backup server host.
                     aaasIpAddress2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.6
IP address of the backup server host.
                     aaasRetries 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.7
Number of retries the switch makes to the server to authenticate a user before trying the next backup server. The default value is 3.
                     aaasTimout 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.8
Time-out for server replies to authentication requests. The default value is 2.
                     aaasRadKey 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.9
The shared secret is a string of characters known to the switch and to the RADIUS server, but it is not sent out over the network. The secret can be any text string and must be configured here as well as on the server. The secret is stored encrypted using a two way algorithm.
                     aaasRadAuthPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.10
For RADIUS server only. Port number for authentication request; the host is not used for authentication if set to 0. The default value is 1645.
                     aaasRadAcctPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.11
For RADIUS server only. Port number for accounting request; the host is not used for authentication if set to 0. The default value is 1646.
                     aaasLdapPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.12
For LDAP server only. Port number for LDAP server host.
                     aaasLdapDn 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.13
For LDAP server only. the super user dn, i.e., the administrative distinguished name recognized by the LDAP-enabled directory servers (e.g., cn=manager)
                     aaasLdapPasswd 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.14
For LDAP server only. the super user password, i.e., the administrative password recognized by LDAP-enabled directory servers (e.g., secret). The secret is stored encrypted using a two way algorithm.
                     aaasLdapSearchBase 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.15
For LDAP server only. Search base recognized by LDAP-enabled directory servers (e.g.,o=company, c=US).
                     aaasLdapServType 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.16
For LDAP server only. Directory server type used in LDAP Authentication: ns(0) - non significant value generic(1) - Generic Schema netscape(2) - Netscape Directory Server novell(3) - Novell NDS sun(4) - Sun Directory Services microsoft(5) - Microsoft Active Directory
                     aaasLdapEnableSsl 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.17
Only for LDAP server. Specify if the connection between the swtich and the LDAP server use a SSL session.
                     aaasAceClear 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.18
Only for ACE server. The ACE/Server generates a secrets that it sends to clients for authentication. While you cannot configure the secret on the switch, you can clear it. To clear the current ACE/Server secret, set this OID. After clearing the secret on the switch, you must also clear the secret from the ACE server.
                     aaasRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.19
The status of this table entry.
                     aaasTacacsKey 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.20
The shared secret is a string of characters known to the switch and to the TACACS+ server, but it is not sent out over the network. The secret can be any text string and must be configured here as well as on the server. The secret is stored encrypted using a two way algorithm.
                     aaasTacacsPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.21
For TACACS+ server only. Port number for LDAP server host.
                     aaasHttpPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.22
For HTTP server only. Port number for LDAP server host.
                     aaasHttpDirectory 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.23
For HTTP server only. A combination of directory tree and filename where the CRL can be found.
                     aaasHttpProxyHostName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.24
For HTTP server only. DNS name of the proxy server.
                     aaasHttpProxyIpAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.25
For HTTP server only. IP address of the proxy server.
                     aaasHttpProxyPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.26
For HTTP server only. Port number for HTTP proxy server.
                     aaasVrfName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.27
Name of the VRF that the server is on. This VRF name is valid only when the server type is RADIUS. (aaasProtocol = 1 (Radius).
                     aaasRadMacAddrCase 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.28
Only for Radius Server. This Attribute contains a text string which identifies the case of the Mac Address Authentication.
                     aaasRadNasPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.29
Only for Radius Server. This Attribute contains a text string which identifies the port of the NAS which is authenticating the user.
                     aaasRadNasPortId 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.30
Only for Radius Server. This Attribute contains a text string which identifies the port of the NAS which is authenticating the user.
                     aaasRadNasPortType 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.31
Only for Radius Server. It indicates the type of the physical port of the NAS which is authenticating the user.
                     aaasRadMacAddrFormat 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.32
This Attribute shall set Mac-address-format to uppercase or lowercase. By default the format will be uppercase.
                     aaasRadUniqueAcctSessionId 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.33
Getting command based Accounting Session_ID
                     aaasRadMacAddrCaseStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.34
To enable/disable mac-address case feature
                     aaasRadServerStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.35
The current status of the configured server
                     aaasRadHealthstatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.36
To Enable/Disable Radius-Health-Check feature
                     aaasRadPollInterval 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.37
To set polling value for each radius server
                     aaasRadFailoverStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.38
To enable/disable failover for radius server
                     aaasRadUser 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.39
Username for Radius server
                     aaasRadPasswd 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.40
Password for radius server
                     aaaRadServerPrimaryStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.41
The status of primary server
                     aaaRadServerBackupStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.1.1.42
The status of backup server
             aaaTacacsServerCmdAuthorization 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.2
Getting command based authorization from theTACACS+ server
             aaaTacacsServerWaitTime 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.1.3
This object indicates the value of wait time from the TACACS+ server
         aaaAuthAcctMIB 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2
             aaaAuthVlanTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1
This table allow to display and modify the configuration of the authentication servers for the authenticated vlans.
                 aaaAuthVlanEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1
There can be one or several entries in this table. In case of single authority, all vlan are authenticated by the same set of servers, the aaatvVlan index is then equal to 0. In case of multiple authorities, each authenticated vlan has its own list of servers.
                     aaatvVlan 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1.1
It indicate the vlan number authenticated by the servers. The value (0) means that all vlan are authenticated by the same servers (single mode configuration).
                     aaatvName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1.2
Name of the server. It corresponds to an index value of the aaaServerTable An Ace server can not be used in front hand.
                     aaatvName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1.3
Name of the server. It corresponds to an index value of the aaaServerTable An Ace server can not be used in front hand.
                     aaatvName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1.4
Name of the server. It corresponds to an index value of the aaaServerTable An Ace server can not be used in front hand.
                     aaatvName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1.5
Name of the server. It corresponds to an index value of the aaaServerTable An Ace server can not be used in front hand.
                     aaatvRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1.6
The status of this table entry.
                     aaatvCertificate 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.1.1.7
use of x509 user certificate during the HTTPs session establisment. noCertificate(0)- no user certificate is required, certificateOnly(1) - the DN from the certifiicate is used to access to the authorization data of the user certificateWithPassword(2) - the user must execute a log-in procedure with user name and password after his certificate validation
             aaaAuthSATable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2
This table allow to display and modify the configuration of the authentication servers for the switch accesses.
                 aaaAuthSAEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1
A switch access authentication entry is specified by the type of access.
                     aaatsInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.1
Type of connection that must be authenticated default(1) -define the default authentication method for console, telnet, ftp, snmp , http and ssh. If the operator interface is not especially configured the default value is applied to this interface.
                     aaatsName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.2
Name of the server. Special value local correspond to the local database. Other name correspond to an index value of the aaaServerTable snmp entry can only use ldap server and local database.
                     aaatsName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.3
Name of a server used if the precedent is not accessible. Special value local correspond to the local database. Other name correspond to an index value of the aaaServerTable snmp entry can only use ldap server and local database.
                     aaatsName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.4
Name of a server used if the precedent is not accessible. Special value local correspond to the local database. Other name correspond to an index value of the aaaServerTable snmp entry can only use ldap server and local database.
                     aaatsName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.5
Name of a server used if the precedent is not accessible. Special value local correspond to the local database. Other name correspond to an index value of the aaaServerTable snmp entry can only use ldap server and local database.
                     aaatsName5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.6
Name of a server used if the precedent is not accessible. Special value local correspond to the local database. Other name correspond to an index value of the aaaServerTable snmp entry can only use ldap server and local database.
                     aaatsRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.7
The status of this table entry.
                     aaatsCertificate 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.2.1.8
use of x509 user certificate during the HTTPs session establisment. noCertificate(0)- no user certificate is required, certificateOnly(1) - the DN from the certifiicate is used to access to the authorization data of the user certificateWithPassword(2) - the user must execute a log-in procedure with user name and password after his certificate validation
             aaaAcctVlanTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3
This table allows to display and configure the accounting servers for authenticated Vlans.
                 aaaAcctVlanEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3.1
There can be one or several entries in this table. In case of single authority, accounting information for all vlans are sent to the same set of servers, the aaatVlan index is then equal to 0. In case of multiple authorities, each authenticated vlan has its own list of servers.
                     aaacvVlan 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3.1.1
Current vlan number. The value (0) for avlan interface means that all authenticated vlans use the same servers for authentication.
                     aaacvName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3.1.2
Name of the server. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacvName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3.1.3
Name of a server used if the precedent is not accessible. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacvName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3.1.4
Name of a server used if the precedent is not accessible. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacvName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3.1.5
Name of a server used if the precedent is not accessible. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacvRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.3.1.6
The status of this table entry.
             aaaAcctSATable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4
This table shows current configuration for Switch access accounting.
                 aaaAcctSAEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1
Accounting configuration for switch access.
                     aaacsInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.1
For now, accounting for console, telnet, ftp, http, snmp, ssh are stored in the same set of servers, the index is always (1).
                     aaacsName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.2
Name of the server. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacsName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.3
Name of a server used if the precedent is not accessible. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacsName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.4
Name of a server used if the precedent is not accessible. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacsName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.5
Name of a server used if the precedent is not accessible. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
                     aaacsRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.6
The status of this table entry.
                     aaaAccountingSessionIdStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.7
Getting command based Accounting Session_ID
                     aaacsName5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.4.1.8
Name of a server used if the precedent is not accessible. Special value local correspond to the local log. Other name correspond to an index value of the aaaServerTable An Ace server can not be used for accounting.
             aaaAuth8021xTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5
This table shows current configuration for 802.1X authentication.
                 aaaAuth8021xEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1
configuration for 802.1X authentication.
                     aaatxInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.1
For now, the index is always (1).
                     aaatxName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.2
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaatxName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.3
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaatxName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.4
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaatxName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.5
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaatxOpen 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.6
Type of port openning after authentication. If open-global(1) the port treats packet with unknown MAC addresses like an un-authenticated port. If open-unique(2), the port drops incomming packet with unknown MAC addresses.
                     aaatxRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.7
The status of this table entry.
                     aaatxName5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.5.1.8
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
             aaaAcct8021xTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6
This table shows current configuration for 802.1X accounting.
                 aaaAcct8021xEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1
Configuration for 802.1X accounting.
                     aaacxInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1.1
For now, the index is always (1).
                     aaacxName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1.2
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaacxName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1.3
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaacxName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1.4
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaacxName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1.5
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaacxRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1.6
The status of this table entry.
                     aaacxName5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.6.1.7
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
             aaaPkiTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7
This table shows current configuration for PKI.
                 aaaPkiEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1
Configuration for PKI.
                     aaatpInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1.1
For now, the index is always (1).
                     aaatpName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1.2
Name of the server contening the CRL. It corresponds to an index value of the aaaServerTable
                     aaatpName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1.3
Name of the server contening the CRL. It corresponds to an index value of the aaaServerTable
                     aaatpName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1.4
Name of the server contening the CRL. It corresponds to an index value of the aaaServerTable
                     aaatpName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1.5
Name of the server contening the CRL. It corresponds to an index value of the aaaServerTable
                     aaatpLevel 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1.6
level of control to do on the user certificate. certificate means that there is a valid chain of certificate between the user certificate and a root certificate known by the switch. The root certificates are managed using specific pki commands. All certificates are valid and well signed. not-revoked means that using CRL or other ways configuring using pki commands the non-revocation of the certificate is checked. repository means that after the precedent control, there is a binary comparison of the certificate on the server and the one received during the authorization (instantaneous revocation possible) This verification is only possible when the access handler is configured with certificateOnly
                     aaatpRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.7.1.7
The status of this table entry.
             aaaAuthMACTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8
This table shows current configuration for non-suplicant ( MAC based ) authentication.
                 aaaAuthMACEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1
configuration for MAC based authentication.
                     aaaMacInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1.1
For now, the index is always (1).
                     aaaMacSrvrName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1.2
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaaMacSrvrName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1.3
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaaMacSrvrName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1.4
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaaMacSrvrName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1.5
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                     aaaMacSrvrRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1.6
The status of this table entry.
                     aaaMacSrvrName5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.8.1.7
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
             aaaAcctCmdTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9
This table stores the commands that will be logged during an accounting session. This feature is valid only for Tacacs+ accounting
                 aaaAcctCmdEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1
Tacacs+ Accounting configuration for executed commands.
                     aaacmdInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1.1
For now, accounting for console, telnet, ftp, http, snmp, ssh are stored in the same set of servers, the index is always (1).
                     aaacmdSrvName1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1.2
Name of the Tacacs+ server. Other name correspond to an index value of the aaaServerTable
                     aaacmdSrvName2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1.3
Name of the Tacacs+ server used if the precedent is not accessible. Other name correspond to an index value of the aaaServerTable
                     aaacmdSrvName3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1.4
Name of the Tacacs+ server used if the precedent is not accessible. Other name correspond to an index value of the aaaServerTable
                     aaacmdSrvName4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1.5
Name of the Tacacs+ server used if the precedent is not accessible. Other name correspond to an index value of the aaaServerTable
                     aaacmdRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1.6
The status of this table entry.
                     aaacmdSrvName5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.9.1.7
Name of the Tacacs+ server used if the precedent is not accessible. Other name correspond to an index value of the aaaServerTable
             aaaAcctMACTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10
This table shows current configuration for MAC accounting.
                   aaaAcctMACEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1
Configuration for MAC accounting.
                       aaaAcctSvrInterface 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1.1
For now, the index is always (1).
                       aaaAcctSvr1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1.2
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                       aaaAcctSvr2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1.3
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                       aaaAcctSvr3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1.4
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                       aaaAcctSvr4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1.5
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
                       aaaAcctSvrRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1.6
The status of this table entry.
                       aaaAcctSvr5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.2.10.1.7
Name of the server. It corresponds to an index value of the aaaServerTable Only RADIUS server can be used in front hand.
         aaaUserMIB 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3
             aaaUserTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1
This table shows current configuration for the local user database.
                 aaaUserEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1
An user configuration identified by its user name.
                     aaauUserName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.1
Name of the user.
                     aaauPassword 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.2
Password of the user. For get response the password in encoded in a one way method. This makes the password readable by noone.
                     aaauReadRight1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.3
Specifies the families that the user can execute with read right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, the user is allowed to run commands of this family.First part of the bitmask.If the value is not specified, the value configured for the default user is taken
                     aaauReadRight2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.4
Specifies the families that the user can execute with read right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, the user is allowed to run commands of this family.Second part of the bitmask.If the value is not specified, the value configured for the default user is taken
                     aaauWriteRight1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.5
Specifies the families that the user can execute with write right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, the user is allowed to run commands of this family. First part of the bitmask.If the value is not specified, the value configured for the default user is taken
                     aaauWriteRight2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.6
Specifies the families that the user can execute with write right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, the user is allowed to run commands of this family. Second part of the bitmask.If the value is not specified, the value configured for the default user is taken
                     aaauProfile 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.7
Specifies the profile number. A profile number in the user account database represents the geographic privilege. This number points to an entry in the table of the user profiles.
                     aaauSnmpLevel 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.8
Specifies if the user is authorized to use SNMP and if yes its security level. no(1) - Not authorized to use SNMP. noauth(2) - SNMPv1,SNMPv2c or SNMPv3 without authentication. sha(3) - SNMPv3 with SHA authentication and no encryption. md5(4) - SNMPv3 with MD5 authentication and no encryption. sha-des(5) - SNMPv3 with SHA authentication and encryption. md5-des(6) - SNMPv3 with MD5 authentication and encryption. shaAes(7) - SNMPv3 with SHA authentication and Aes encryption. shaAes192(8) - SNMPv3 with SHA authentication and Aes192 encryption. shaAes256(9) - SNMPv3 with SHA authentication and Aes256 encryption. sha3Des(10) - SNMPv3 with SHA authentication and 3Des encryption. sha224(11) - SNMPv3 with SHA224 authentication and no encryption. sha256(12) - SNMPv3 with SHA256 authentication and no encryption. sha224Aes(13) - SNMPv3 with SHA224 authentication and Aes encryption. sha224Aes192(14) - SNMPv3 with SHA224 authentication and Aes192 encryption. sha224Aes256(15) - SNMPv3 with SHA224 authentication and Aes256 encryption. sha2243Des(16) - SNMPv3 with SHA224 authentication and 3Des encryption. sha256Aes(17) - SNMPv3 with SHA256 authentication and Aes encryption. sha256Aes192(18) - SNMPv3 with SHA256 authentication and Aes192 encryption. sha256Aes256(19) - SNMPv3 with SHA256 authentication and Aes256 encryption. sha2563Des(20) - SNMPv3 with SHA256 authentication and 3Des encryption. If the value is not specified, the value configured for the default user is taken
                     aaauSnmpAuthKey 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.9
Authentication key of the user. The key is encoded in a two way method. The encryption key is deducted from this key.
                     aaauRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.10
The status of this table entry.
                     aaauOldPassword 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.11
Internal use
                     aaauEndUserProfile 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.12
Specifies the END user profile name.
                     aaauPasswordExpirationDate 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.13
The local time of when the password would be expired. This date will be reset once the value of aaaAsaDefaultPasswordExpirationInDays is updated. Only the following format is valid: mm/dd/yyyy hh:mm where mm - month (1-12) dd - day (1-31) yyyy - year (2000-2050) hh - hour (1-24) mm - minute (1-59) Password will not be expired if set to empty string
                     aaauPasswordExpirationInMinute 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.14
Number of minutes from now till the password expiration time. Setting this object will update aaauPasswordExpirationDate. If -1, password will not be expired. If 0, password has been expired.
                     aaauPasswordAllowModifyDate 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.15
The local time of when the password can be start to be modified. This date will be reset once the value of aaauPasswordAllowModifyDate is updated. Only the following format is valid: mm/dd/yyyy hh:mm where mm - month (1-12) dd - day (1-31) yyyy - year (2000-2050) hh - hour (1-24) mm - minute (1-59) Password will not be expired if set to empty string
                     aaauPasswordLockoutEnable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.16
Indicate whether this account is locked out.
                     aaauBadAtempts 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.17
Number bad password attempts in the observation window.
                     aaauSnmpOnly 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.18
Enable or disable User SNMP only restriction
                     aaauSnmpPrivPassword 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.3.1.1.19
Privacy Password of the user. For get response the password in encoded in a one way method. This makes the password readable by none.
         aaaAuthenticatedUserTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4
Provide the list of users currently authenticated into the switch for bridging purpose.
             aaaAuthenticatedUserEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4.1
An entry in the AaaAuthenticatedUserTable.
                 aaaaMacAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4.1.1
Mac address of the users device.
                 aaaaUserName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4.1.2
Login name of the user.
                 aaaaSlot 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4.1.3
Slot number on which user is connected.
                 aaaaPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4.1.4
Port number on which the user is connected.
                 aaaaVlan 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4.1.5
Vlan number on which the user is authenticated.
                 aaaaDrop 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.4.1.6
Allow to remove a Mac address from a Vlan. The corresponding user is logged out of the network.
         aaaAvlanConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.5
             aaaAvlanDnsName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.5.1
Dns name used to get the authentication Web page when authenticating using http.
             aaaAvlanDhcpDefGateway 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.5.2
IP address that is used as the DHCP gateway address before the user get authenticated.It specifies the subnet into which a client receives its IP address prior to authentication
             aaaAvlanDefaultTraffic 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.5.3
Enable the traffic in the default vlan prior to authentication if the value is true
             aaaAvlanPortBound 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.5.4
Associate a MAC address to a specific Vlan on an authenticated port (printers, ...)
             aaaAvlanLanguage 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.5.5
Force to read the language specific file for HTTP AVLAN (label.txt)
         aaaAsaConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6
             aaaAsaPasswordSizeMin 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.1
Minimum number of digits of the passwords ( nominator aaauPassword).
             aaaAsaDefaultPasswordExpirationInDays 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.2
Default password expiration time in days to be applied to all users. Updating this object will reset aaauPasswordExpirationDate. Password expiration will not be enforced if set to 0.
             aaaAsaPasswordContainUserName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.3
Indicate whether check password contains username or not.
             aaaAsaPasswordMinUpperCase 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.4
Minimum number of English uppercase characters required for password. 0 is disable
             aaaAsaPasswordMinLowerCase 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.5
Minimum number of English lowercase characters required for password 0 is disable.
             aaaAsaPasswordMinDigit 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.6
Minimum number of base-10 digits required for password. 0 is disable
             aaaAsaPasswordMinNonAlphan 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.7
Minimum number of non-alphanumeric required for password. 0 is disable
             aaaAsaPasswordHistory 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.8
Password history feature will prevent users from repeatedly using the same password. 0 is disable
             aaaAsaPasswordMinAge 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.9
The password cant be modified in these days. 0 is disable
             aaaAsaLockoutWindow 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.10
The window of time in which the system increments the bad logon count.(minutes) 0 is disable
             aaaAsaLockoutDuration 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.11
The amount of time that an account is locked due to the aaauLockoutThreshold being exceeded.(minutes) 0 is disable
             aaaAsaLockoutThreshold 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.12
The number of invalid logon attempts that are permitted before the account is locked out. 0 is disable
             aaaAsaROUserPingTrtEnable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.13
Global user config to allow/deny ping and traceroute cmds for read-only user. 0 - disable 1 - enable
             aaaAsaAccessPolicyAdminConsoleOnly 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.14
Enable or disable AdminUser console only restriction
             aaaAsaCertPassword 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.15
Password to be used for reading certificate
             aaaAsaAccessMode 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.16
Globally sets the access mode as enhanced or default. 0 - default 1 - enhanced
             aaaAsaIpLockoutThreshold 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.17
This object indicates the value of the threshold for failed login attempts from an IP address after which the IP address will be banned from switch access
             aaaSwitchAccessMgmtStationState 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.6.18
Enable or disable Management station in Enhanced mode
         aaaAvlanAddressTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.7
Vlan authenticated IP address Table
             aaaAvlanAddressEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.7.1
Vlan authenticated IP address entry
                 aaaAvlanId 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.7.1.1
Vlan Id corresponding to the authenticated IP address
                 aaaAvlanIpAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.7.1.2
Authenticated IP address for this vlan id
         aaaUserNetProfileTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8
User Network Profile Table
             aaaUserNetProfileEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1
User Network Profile entry
                 aaaUserNetProfileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.1
The name of this profile.
                 aaaUserNetProfileVlanID 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.2
The VLAN id for this profile.
                 aaaUserNetProfileRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.3
The status of this table entry.
                 aaaUserNetProfileHICflag 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.4
The flag to indicate if HIC is enabled (1) or disabled (2).
                 aaaUserNetProfileQosPolicyListName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.5
The name of the QoS Policy List name that will be used if this User Network Profile is applied for a given device along with aaaUserNetProfileVlanID.
                 aaaUserNetProfileMaxIngressBw 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.6
Maximum Ingress Bandwidth (Kbits/sec) allowed for traffic associated to this profile. If -1, specifies Not Applicable Bandwidth means Ingress Bw will not be applied.
                 aaaUserNetProfileMaxEgressBw 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.7
Maximum Egress Bandwidth (Kbits/sec) allowed for traffic associated to this profile. If -1, specifies Not Applicable Bandwidth means Egress Bw will not be applied.
                 aaaUserNetProfileMaxDefaultDepth 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.8
Maximum Default Depth (Kbits/sec) associated to Bandwidth. If -1, specifies Not Applicable Depth.For depth value of -1 and 0 default optimal depth will be applied, otherwise BW will be applied with depth specified
                 aaaUserNetworkProfileRedirectUrl 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.8.1.9
The redirection url is used to re-direct to the Clearpass page for the BYOD feature.
         aaaRadAgentConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.9
The Agent Config Information 1 -- Default(Loopback0 or closest IP) 2 -- Non Loopback0 3 -- Interface IP Specified by User This object has been obsoleted. Use the alaIpManagedIntfEntry objects in AlcatelIND1Ip.mib
         aaaRadAgentIP 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.10
The Agent IP Address in Radius Packets. This object has been obsoleted. Use the alaIpManagedIntfEntry objects in AlcatelIND1Ip.mib
         aaaHicConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11
               aaaHicSvrTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1
This table shows current configuration for each HIC server.
                   aaaHicSvrEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1
A HIC server configuration.
                       aaaHicSvrName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.1
Name of the server. This name is given by the operator to refer the server.
                       aaaHicSvrIpAddr 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.2
IP address of the server host.
                       aaaHicSvrPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.3
For HIC server only. Port number for HIC request
                       aaaHicSvrKey 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.4
The shared secret is a string of characters known to the switch and to the HIC server. It is used to compute the digest to preserve the integrity between the HIC server and the AoS Switch. The secret is stored encrypted using a two way algorithm.
                       aaaHicSvrRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.5
The status of this table entry.
                       aaaHicSvrStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.6
HIC server status.
                       aaaHicSvrRole 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.7
Role of the server either primary or backup
                       aaaHicSvrConnection 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.1.1.8
The server connection specifies the current mode of the server either active or inactive.
               aaaHicAllowedTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.2
This table contains the list of allowed/exception IP Addresses the the HIC hosts allowed to access during HIC. Those are the IP addresses of the Remediation/Patch servers, and the Web Agent Download server.
                   aaaHicAllowedEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.2.1
A Remediation server configuration.
                       aaaHicAllowedName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.2.1.1
Name of the server. This name is given by the operator to refer the server.
                       aaaHicAllowedIpAddr 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.2.1.2
IP address of the allowed entry.
                       aaaHicAllowedIpMask 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.2.1.3
IP Mask of the allowed entry.
                       aaaHicAllowedRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.2.1.4
The status of this table entry.
               aaaHicOverrideTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.3
This table shows list of MAC addresses that overrides the existing HIC status.
                   aaaHicOverrideEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.3.1
HIC MAC override list configuration.
                       aaaHicOverrideMac 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.3.1.1
Static MAC address index to each override entry.
                       aaaHicOverrideStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.3.1.2
Overriding status of each static MAC address.
                       aaaHicOverrideRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.3.1.3
The status of this table entry.
               aaaHicHostTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.4
This table shows list of HIC Hosts and their active HIC status.
                   aaaHicHostEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.4.1
HIC Host status information.
                       aaaHicHostMac 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.4.1.1
Static MAC address index to each override entry.
                       aaaHicHostStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.4.1.2
HIC status of each HIC Host.
               aaaHicConfigInfo 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5
                   aaaHicStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.1
HIC Status. The HIC server has to be configured before HIC can be enabled.
                   aaaHicAllowed1Name 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.2
Name of the rem server. This name is given by the operator to refer the remediation server.
                   aaaHicAllowed2Name 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.3
Name of the rem server. This name is given by the operator to refer the alternate remediation server.
                   aaaHicAllowed3Name 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.4
Name of the rem server. This name is given by the operator to refer the alternate remediation server.
                   aaaHicAllowed4Name 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.5
Name of the rem server. This name is given by the operator to refer the alternate remediation server.
                   aaaHicWebAgentDownloadUrl 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.6
The URL for web agent download.
                   aaaHicCustomHttpProxyPort 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.7
The custom HTTP port for QoS to intercept the hosts initial HTTP request.
                   aaaHicBgPollInterval 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.8
Background-poll-interval provides time frequency in seconds for background polling packets.
                   aaaHicSvrFailMode 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.11.5.9
The server-failure-mode specifies the policy to be followed in case both the servers are not reachable, value can be either passthrough or hold
         aaaUNPIpNetRuleTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.12
A list of IP network address rules. This is used to match the InetAddress of a packet to a User Network Profile entry.
               aaaUNPIpNetRuleEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.12.1
An IP network address rule entry.
                   aaaUNPIpNetRuleAddrType 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.12.1.1
The IP network address type used for VLAN classification. For now Only IPv4 is supported.
                   aaaUNPIpNetRuleAddr 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.12.1.2
The IP network address used for VLAN classification. Only IPv4 is supported.
                   aaaUNPIpNetRuleMask 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.12.1.3
The IP network mask applying to the IP network address.
                   aaaUNPIpNetRuleProfileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.12.1.4
The profile name in the User Network Profile Table to be applied.
                   aaaUNPIpNetRuleRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.12.1.5
Row Status for creating/deleting rules.
         aaaUNPMacRuleTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.13
A list of MAC address rules. This is used to match the MAC Address of a packet to a User Network Profile entry
               aaaUNPMacRuleEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.13.1
A MAC rule entry.
                   aaaUNPMacRuleAddr 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.13.1.1
The MAC address used for VLAN classification.
                   aaaUNPMacRuleProfileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.13.1.2
The profile name in the User Network Profile Table to be applied.
                   aaaUNPMacRuleRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.13.1.3
Row Status for creating/deleting rules.
         aaaUNPMacRangeRuleTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.14
A list of MAC range rules. This is used to match the MAC Address Range of a packet to a User Network Profile entry.
               aaaUNPMacRangeRuleEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.14.1
A MAC range rule entry.
                   aaaUNPMacRangeRuleLoAddr 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.14.1.1
The lower bound of MAC address range used for VLAN classification.
                   aaaUNPMacRangeRuleHiAddr 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.14.1.2
The upper bound of MAC address range used for VLAN classification.
                   aaaUNPMacRangeRuleProfileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.14.1.3
The profile name in the User Network Profile Table to be applied.
                   aaaUNPMacRangeRuleRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.14.1.4
Row Status for creating/deleting rules.
         aaaHicSvrDownUnpMapTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.15
This table shows current configuration for HIC server down UNP mapping.
               aaaHicSvrDownUnpMapEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.15.1
A HIC server down UNP configuration.
                   aaaHicSvrDownUnpName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.15.1.1
The profile name which needs to be modified when the HIC server is down.
                   aaaHicSvrDownMappedUnpName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.15.1.2
The target UNP profile name to which the host needs to be moved when the HIC server is down.
                   aaaHicSvrDownUnpRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.15.1.3
Row Status for creating/deleting UNP mapping.
         aaaRedirectConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16
               aaaRedirectServerTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1
This table is used to configure ClearPass redirect server name with its Ip address and url list.
                   aaaRedirectServerEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1
Redirect server configuration.
                       aaaRedirectServerName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.1
The name of the ClearPass redirect server name.
                       aaaRedirectServerIpAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.2
The Ip Address for the clearpass rediret server for BYOD feature.
                       aaaRedirectServerUrl1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.3
The redirect URL configured on the server. Maximum it can accept 5 URLs.
                       aaaRedirectServerUrl2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.4
The redirect URL configured on the server. Maximum it can accept 5 URLs.
                       aaaRedirectServerUrl3 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.5
The redirect URL configured on the server. Maximum it can accept 5 URLs.
                       aaaRedirectServerUrl4 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.6
The redirect URL configured on the server. Maximum it can accept 5 URLs.
                       aaaRedirectServerUrl5 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.7
The redirect URL configured on the server. Maximum it can accept 5 URLs.
                       aaaRedirectSvrConfigRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.1.1.8
The Rowstatus of the Redirect Server Entry.
               aaaRedirectUrlConfigTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.2
This table is used to configure redirect URLs for the redirection to happen.
                   aaaRedirectURLEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.2.1
Redirect URL configuration.Maximum 5 entries can be allowed
                       aaaRedirectServerUrlName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.2.1.1
The name of the redirect URL.At maximum 5 redirect URLS can be allowed per switch.
                       aaaRedirectServerUrl 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.2.1.2
The URL where the redirect should happen. At maximum 5 URLS can be allowed per switch.
                       aaaRedirectServerRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.2.1.3
The RowStatus of the table entry.
               aaaRedirectGlobalConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.3
                   aaaRedirectPauseTimerConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.3.1
This is used to configure the pause timer value. Default value is 0.
                   aaaPortBounceConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.3.2
This command is used to globally enable/disable port bounce config in switch.
               aaaPortBounceInterfaceTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.4
A table to list port bounce status in slot/port basis.
                   aaaPortBounceInterfaceEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.4.1
Entries for aaa port bounce slot/port status.
                       aaaPortBouncePortSlot 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.4.1.1
The physical slot number to enable/disable port bounce.
                       aaaPortBounceIF 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.4.1.2
The interface number of the switch.
                       aaaPortBounceStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.4.1.3
Enabling/Disabling Port bounce in slot/port basis.
               aaaBYODWhiteListTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.5
This table is used to configure the BYOD white list IP address.
                   aaaBYODWhiteListEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.5.1
BYOD White List IP configuration.
                       aaaBYODWhiteListIPAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.5.1.1
The Ip Address added as a whitelist entry.
                       aaaBYODWhiteListIPMask 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.5.1.2
The IP network mask applying to the whitelist IP address.
                       aaaBYODWhiteListRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.16.5.1.3
The RowStatus of the table entry.
         aaaSwitchAccessConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17
               aaaSwitchAccessMgmtStationTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.1
This table is used to configure SwitchAccess management stations Ip address.
                   aaaSwitchAccessMgmtStationEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.1.1
SwitchAccessManagementStation configuration.
                       aaaSwitchAccessMgmtStationIpAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.1.1.1
The Ip Address for the SwitchAccess management station
                       aaaSwitchAccessMgmtStationIpAddressMask 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.1.1.2
The Ip Address mask for the SwitchAccess management station
                       aaaSwitchAccessMgmtStationRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.1.1.3
The Rowstatus of the AaaSwitchAccessMgmtStationEntry. 0 (allowed) 1 (blocked).
               aaaSwitchAccessBannedIpTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.2
This table is used to retrieve the Banned Ip address.
                   aaaSwitchAccessBannedIpEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.2.1
SwitchAccessManagementStation configuration.
                       aaaSwitchAccessBannedIpAddress 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.2.1.1
To see the list of ip addresses which are banned
                       aaaSwitchAccessBannedIpRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.2.1.2
The Rowstatus of the AaaSwitchAccessBannedIpEntry. 1 - active. 0 - inactive.
               aaaSwitchAccessPrivMaskTable 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3
This table is used to create the read write permissions for the each session.
                   aaaSwitchAccessPrivMaskEntry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3.1
Priv mask configuration identified by the access type
                       aaaSwitchAccessType 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3.1.1
Name of the access type
                       aaaSwitchAccessReadRight1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3.1.2
Specifies the families through the access type can execute with read right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, through the access type the user is allowed to run commands of this family.First part of the bitmask.If the value is not specified, the value configured for the default.
                       aaaSwitchAccessReadRight2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3.1.3
Specifies the families through the access type can execute with read right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, through the access type the user is allowed to run commands of this family.First part of the bitmask.If the value is not specified, the value configured for the default.
                       aaaSwitchAccessWriteRight1 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3.1.4
Specifies the families through the access type can execute with read right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, through the access type the user is allowed to run commands of this family.First part of the bitmask.If the value is not specified, the value configured for the default.
                       aaaSwitchAccessWriteRight2 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3.1.5
Specifies the families through the access type can execute with read right. Each bit of the 32-bit integer mask represents a commands family number. When the family bit is set, through the access type the user is allowed to run commands of this family.First part of the bitmask.If the value is not specified, the value configured for the default.
                       aaaSwitchAccessPrivMaskRowStatus 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.17.3.1.6
The status of this table entry.
         alaAaaTlsConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18
               alaAaaTlsBaseConfig 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.1
                   alaAaaTlsCaFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.1.1
Name of the CA bundle file (in PEM format) stored in /flash/switch directory.
                   alaAaaTlsCrlFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.1.2
Name of the CRL file (in PEM format) stored in /flash/switch directory.
                   alaAaaTlsKeyFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.1.3
Name of the rsa key file stored in /flash/switch directory.
                   alaAaaTlsCertFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.1.4
Name of the certificate to be verified stored in /flash/switch directory.
               alaAaaTlsSelfSignedCert 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2
                   alaAaaTlsSelfSignedCertFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.1
Name of the self-signed certificate file stored in /flash/switch directory.
                   alaAaaTlsSelfSignedCertKeyFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.2
Name of the key file file stored in /flash/switch directory.
                   alaAaaTlsSelfSignedCertValidPeriod 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.3
The valid period in days of certificate.
                   alaAaaTlsSelfSignedCertCommonName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.4
The certificate common name.
                   alaAaaTlsSelfSignedCertOrgName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.5
The certificate organization name .
                   alaAaaTlsSelfSignedCertOrgUnit 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.6
The certificate organization unit.
                   alaAaaTlsSelfSignedCertLocality 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.7
Locality of the certificate organization.
                   alaAaaTlsSelfSignedCertState 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.8
The state of certificate organization.
                   alaAaaTlsSelfSignedCertCountry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.9
The country of certificate organization.
                   alaAaaTlsSelfSignedCertAction 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.2.10
Create/delete self-signed certificate stored in /flash/switch directory.
               alaAaaTlsCsr 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3
                   alaAaaTlsCsrFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.1
The domain name of csr file stored in /flash/switch directory.
                   alaAaaTlsCsrKeyFileName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.2
Name of key file stored in /flash/switch directory.
                   alaAaaTlsCsrCommonName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.3
The csr common name.
                   alaAaaTlsCsrOrgName 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.4
The csr organization name .
                   alaAaaTlsCsrOrgUnit 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.5
The csr organization unit.
                   alaAaaTlsCsrLocality 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.6
Locality of the certificate organization.
                   alaAaaTlsCsrState 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.7
The state of certificate organization.
                   alaAaaTlsCsrCountry 1.3.6.1.4.1.6486.800.1.2.1.15.1.1.18.3.8
The country of certificate organization.
     alcatelIND1AAAMIBConformance 1.3.6.1.4.1.6486.800.1.2.1.15.1.2
Branch For Authentication, Authorization, and Accounting (AAA) Subsystem Conformance Information.
         alcatelIND1AAAMIBGroups 1.3.6.1.4.1.6486.800.1.2.1.15.1.2.1
Branch For Authentication, Authorization, and Accounting (AAA) Subsystem Units Of Conformance.
         alcatelIND1AAAMIBCompliances 1.3.6.1.4.1.6486.800.1.2.1.15.1.2.2
Branch For Authentication, Authorization, and Accounting (AAA) Subsystem Compliance Statements.
 alaAaaTrapsDesc 1.3.6.1.4.1.6486.800.1.3.2.21.1
     alaAaaTrapsDescRoot 1.3.6.1.4.1.6486.800.1.3.2.21.1.0
 alaAaaTrapsObj 1.3.6.1.4.1.6486.800.1.3.2.21.2
     aaaHSvrIpAddress 1.3.6.1.4.1.6486.800.1.3.2.21.2.1
HIC/Rem/WebDL servers IP address.
     aaaHSvrCurrIpAddress 1.3.6.1.4.1.6486.800.1.3.2.21.2.2
Current active HIC servers IP address.
     aaaHSvrRole 1.3.6.1.4.1.6486.800.1.3.2.21.2.3
HIC servers Role.
     aaaHSvrName 1.3.6.1.4.1.6486.800.1.3.2.21.2.4
HIC servers Name.
 alaAaaAuthTrapsDesc 1.3.6.1.4.1.6486.800.1.3.2.21.3
     alaAaaAuthTrapsDescRoot 1.3.6.1.4.1.6486.800.1.3.2.21.3.0
 alaAaaAuthTrapsObj 1.3.6.1.4.1.6486.800.1.3.2.21.4
     aaaAuthSysName 1.3.6.1.4.1.6486.800.1.3.2.21.4.1
System name
     aaaAuthIpAddress 1.3.6.1.4.1.6486.800.1.3.2.21.4.2
This is the IP-address with which authentication request is sent. It is the IP-Address of the switch
     aaaAuthPort 1.3.6.1.4.1.6486.800.1.3.2.21.4.3
This the port-ID, which is filled in Auth-request.
     aaaAuthUserName 1.3.6.1.4.1.6486.800.1.3.2.21.4.4
user-name string.
     aaaAuthType 1.3.6.1.4.1.6486.800.1.3.2.21.4.5
Type of authentication which took place.
     aaaAuthFailureReason 1.3.6.1.4.1.6486.800.1.3.2.21.4.6
Failure reason for which authentication failed.
 alaAaaRadiusTrapsDesc 1.3.6.1.4.1.6486.800.1.3.2.21.5
     alaAaaRadiusTrapsDescRoot 1.3.6.1.4.1.6486.800.1.3.2.21.5.0