AT-DHCPSN-MIB: View SNMP OID List / Download MIB
VENDOR: ALLIED TELESIS
Home | MIB: AT-DHCPSN-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
atDhcpsn | 1.3.6.1.4.1.207.8.4.4.4.537 |
Added two more violation types for DHCP Snooping. |
||
atDhcpsnEvents | 1.3.6.1.4.1.207.8.4.4.4.537.0 | |||
atDhcpsnTrap | 1.3.6.1.4.1.207.8.4.4.4.537.0.1 |
DHCP Snooping violation trap. |
||
atArpsecTrap | 1.3.6.1.4.1.207.8.4.4.4.537.0.2 |
DHCP Snooping ARP Security violation trap. |
||
atDhcpsnVariablesTable | 1.3.6.1.4.1.207.8.4.4.4.537.1 | no-access |
This table contains rows of DHCP Snooping information. |
|
1.3.6.1.4.1.207.8.4.4.4.537.1.1 | no-access |
A set of parameters that describe the DHCP Snooping features. |
||
atDhcpsnIfIndex | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.1 | integer | read-only |
Ifindex of the port that the packet was received on. |
atDhcpsnVid | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.2 | integer | read-only |
VLAN ID of the port that the packet was received on. |
atDhcpsnSmac | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.3 | displaystring | read-only |
Source MAC address of the packet that caused the trap. |
atDhcpsnOpcode | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.4 | integer | read-only |
Opcode value of the BOOTP packet that caused the trap. Only bootpRequest(1) or bootpReply(2) is valid. Enumeration: 'bootpReply': 2, 'bootpRequest': 1. |
atDhcpsnCiaddr | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.5 | ipaddress | read-only |
Ciaddr value of the BOOTP packet that caused the trap. |
atDhcpsnYiaddr | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.6 | ipaddress | read-only |
Yiaddr value of the BOOTP packet that caused the trap. |
atDhcpsnGiaddr | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.7 | ipaddress | read-only |
Giaddr value of the BOOTP packet that caused the trap. |
atDhcpsnSiaddr | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.8 | ipaddress | read-only |
Siaddr value of the BOOTP packet that caused the trap. |
atDhcpsnChaddr | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.9 | displaystring | read-only |
Chaddr value of the BOOTP packet that caused the trap. |
atDhcpsnVioType | 1.3.6.1.4.1.207.8.4.4.4.537.1.1.10 | integer | read-only |
The reason that the trap was generated. invalidBootp(1) indicates that the received BOOTP packet was invalid. For example, it is neither BootpRequest nor BootpReply. invalidDhcpAck(2) indicates that the received DHCP ACK was invalid. invalidDhcpRelDec(3) indicates the DHCP Release or Decline was invalid. invalidIp(4) indicates that the received IP packet was invalid. maxBindExceeded(5) indicates that if the entry was added, the maximum bindings configured for the port would be exceeded. opt82InsertErr(6) indicates that the insertion of Option 82 failed. opt82RxInvalid(7) indicates that the received Option 82 information was invalid. opt82RxUntrusted(8) indicates that Option 82 information was received on an untrusted port. opt82TxUntrusted(9) indicates that Option 82 would have been transmitted out an untrusted port. replyRxUntrusted(10) indicates that a BOOTP Reply was received on an untrusted port. srcMacChaddrMismatch(11) indicates that the source MAC address of the packet did not match the BOOTP CHADDR of the packet. staticEntryExisted(12) indicates that the static entry to be added already exists. dbAddErr(13) indicates that adding an entry to the database failed. Enumeration: 'dbAddErr': 13, 'opt82TxUntrusted': 9, 'opt82RxInvalid': 7, 'srcMacChaddrMismatch': 11, 'opt82RxUntrusted': 8, 'opt82InsertErr': 6, 'invalidBootp': 1, 'replyRxUntrusted': 10, 'invalidIp': 4, 'invalidDhcpRelDec': 3, 'invalidDhcpAck': 2, 'staticEntryExisted': 12, 'maxBindExceeded': 5. |
atArpsecVariablesTable | 1.3.6.1.4.1.207.8.4.4.4.537.2 | no-access |
This table contains rows of DHCP Snooping ARP Security information. |
|
1.3.6.1.4.1.207.8.4.4.4.537.2.1 | no-access |
A set of parameters that describe the DHCP Snooping ARP Security features. |
||
atArpsecIfIndex | 1.3.6.1.4.1.207.8.4.4.4.537.2.1.1 | integer | read-only |
Ifindex of the port that the ARP packet was received on. |
atArpsecClientIP | 1.3.6.1.4.1.207.8.4.4.4.537.2.1.2 | ipaddress | read-only |
Source IP address of the ARP packet. |
atArpsecSrcMac | 1.3.6.1.4.1.207.8.4.4.4.537.2.1.3 | displaystring | read-only |
Source MAC address of the ARP packet. |
atArpsecVid | 1.3.6.1.4.1.207.8.4.4.4.537.2.1.4 | integer | read-only |
VLAN ID of the port that the ARP packet was received on. |
atArpsecVioType | 1.3.6.1.4.1.207.8.4.4.4.537.2.1.5 | integer | read-only |
The reason that the trap was generated. srcIpNotFound(1) indicates that the Sender IP address of the ARP packet was not found in the DHCP Snooping database. badVLAN(2) indicates that the VLAN of the DHCP Snooping binding entry associated with the Sender IP address of the ARP packet does not match the VLAN that the ARP packet was received on. badPort(3) indicates that the port of the DHCP Snooping binding entry associated with the Sender IP address of the ARP packet does not match the port that the ARP packet was received on. srcIpNotAllocated(4) indicates that the CHADDR of the DHCP Snooping binding entry associated with the Sender IP address of the ARP packet does not match the Source MAC and/or the ARP source MAC of the ARP packet. Enumeration: 'srcIpNotFound': 1, 'srcIpNotAllocated': 4, 'badPort': 3, 'badVLAN': 2. |