BIANCA-BRICK-IP-OLDACCESS-MIB: View SNMP OID List / Download MIB
VENDOR: BINTEC COMMUNICATIONS GMBH
Home | MIB: BIANCA-BRICK-IP-OLDACCESS-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
org | 1.3 | |||
dod | 1.3.6 | |||
internet | 1.3.6.1 | |||
private | 1.3.6.1.4 | |||
enterprises | 1.3.6.1.4.1 | |||
bintec | 1.3.6.1.4.1.272 | |||
bibo | 1.3.6.1.4.1.272.4 | |||
biboipold | 1.3.6.1.4.1.272.4.5 | |||
ipAllowTable | 1.3.6.1.4.1.272.4.5.1 | no-access |
The ipAllowTable defines all allowed IP packets. Each entry describes a subset of IP Packets, which are allowed to be processed. The overall set of allowed IP packets is the union of all subsets that are described in this table. If at least one entry is defined in the ipAllowTable, only IP datagrams which are allowed by the ipAllowTable are processed by the BRICK. All other packets are refused. Please note that the ipDenyTable overwrites the ipAllowTable. IP datagrams specified in the ipDenyTable are always refused, even if they are allowed by the ipAllowTable. Creating entries: Entries are created by setting the ipAllowProtocolMode and ipAllowSrcIfIndexMode objects in one operation (on one command line). Deleting entries: Entries are deleted by setting the ipAllowProtocolMode object to 'delete'. |
|
1.3.6.1.4.1.272.4.5.1.1 | no-access | |||
ipAllowProtocolMode | 1.3.6.1.4.1.272.4.5.1.1.1 | integer | no-access |
Specifies whether or not the protocol field of the IP datagram header should be used to determine if the datagram belongs to the subset of the entry. dont-verify(1) = don't check the protocol field; verify(2) = check the protocol field; delete(3) = delete the entry from the table Enumeration: 'verify': 2, 'dont-verify': 1, 'delete': 3. |
ipAllowProtocol | 1.3.6.1.4.1.272.4.5.1.1.2 | integer | no-access |
If the ipAllowProtocolMode is set to 'verify', this object specifies the protocol of IP datagrams belonging to the subset described by this entry. Otherwise, this field has no meaning. Enumeration: 'udp': 17, 'ggp': 3, 'ospf': 89, 'egp': 8, 'hmp': 20, 'tcp': 6, 'xns-idp': 22, 'icmp': 1, 'pup': 12, 'rdp': 27. |
ipAllowSrcIfIndexMode | 1.3.6.1.4.1.272.4.5.1.1.3 | integer | no-access |
This object specifies whether or not the originating interface of the IP datagram should be checked to determine whether a datagram belongs to the subset. Enumeration: 'verify': 2, 'dont-verify': 1. |
ipAllowSrcIfIndex | 1.3.6.1.4.1.272.4.5.1.1.4 | integer | no-access |
If ipAllowSrcIfIndexMode is set to 'verify', then this object specifies the ifIndex of the datagrams belonging to the subset defined by this entry. |
ipAllowSrcAddr | 1.3.6.1.4.1.272.4.5.1.1.5 | ipaddress | no-access |
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry. |
ipAllowSrcMask | 1.3.6.1.4.1.272.4.5.1.1.6 | ipaddress | no-access |
This object specifies the set of IP addresses of data grams that belong to the subset defined by this entry. |
ipAllowSrcPortMode | 1.3.6.1.4.1.272.4.5.1.1.7 | integer | no-access |
This object specifies the range of source port numbers of IP datagrams belonging to the subset. ignore(1) = All ports: 0 ..65535; specific(2) = a specific port number i.e. ipAllowScrPort; clients(3) = clientports: 1024 .. 4999, 32768..65535; server(4) = server ports: 0..1023 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6. |
ipAllowSrcPort | 1.3.6.1.4.1.272.4.5.1.1.8 | integer | no-access |
If ipAllowSrcPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used. |
ipAllowDstAddr | 1.3.6.1.4.1.272.4.5.1.1.9 | ipaddress | no-access |
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry. |
ipAllowDstMask | 1.3.6.1.4.1.272.4.5.1.1.10 | ipaddress | no-access |
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry. |
ipAllowDstPortMode | 1.3.6.1.4.1.272.4.5.1.1.11 | integer | no-access |
This object specifies the range of destination port numbers of IP datagrams belonging to the subset. ignore(1) = All ports: 0..65535; specific(2) = a specific port number i.e. ipAllowDstPort; clients(3) = client ports: 1024..4999, 32768..65535; server(4) = server ports. 0..1023, 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6. |
ipAllowDstPort | 1.3.6.1.4.1.272.4.5.1.1.12 | integer | no-access |
If ipAllowDstPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used. |
ipAllowSrcPortRange | 1.3.6.1.4.1.272.4.5.1.1.13 | integer | no-access |
This object can be used together with ipAllowSrcPort to apply the rule to a port range, instead of a single port. When ipAllowSrcPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipAllowSrcPort to ipAllowSrcPortRange. When this object is set to -1, the rule applies only to port ipAllowSrcPort. |
ipAllowDstPortRange | 1.3.6.1.4.1.272.4.5.1.1.14 | integer | no-access |
This object can be used together with ipAllowDstPort to apply the rule to a port range, instead of a single port. When ipAllowDstPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipAllowDstPort to ipAllowDstPortRange. When this object is set to -1, the rule applies only to port ipAllowDstPort. |
ipDenyTable | 1.3.6.1.4.1.272.4.5.2 | no-access |
The ipDenyTable defines all IP packets to be denied. Each entry describes a subset of IP Packets, which are denied processing. The overall set of denied IP packets is the union of all subsets that are described in this table. The ipDenyTable overwrites the ipAllowTable. IP datagrams specified in the ipDenyTable are always refused, even if they are allowed by the ipAllowTable. Creating entries: Entries are created by setting the ipDenyProtocolMode and ipDenySrcIfIndexMode objects in one operation (i.e. on one command line). Deleting entries: Entries are deleted by setting the ipDenyProtocolMode object to 'delete'. |
|
1.3.6.1.4.1.272.4.5.2.1 | no-access | |||
ipDenyProtocolMode | 1.3.6.1.4.1.272.4.5.2.1.1 | integer | no-access |
Specifies whether or not the protocol field of the IP datagram header should be used to determine if the datagram belongs to the subset of this entry. dont-verify(1) = don't check the protocol field; verify(2) = check the protocol field; delete(3) = delete the entry from the table Enumeration: 'verify': 2, 'dont-verify': 1, 'delete': 3. |
ipDenyProtocol | 1.3.6.1.4.1.272.4.5.2.1.2 | integer | no-access |
If the ipDenyProtocolMode is set to 'verify', this object specifies the protocol of IP datagrams belonging to the subset described by this entry. Otherwise, this field has no meaning. Enumeration: 'udp': 17, 'ggp': 3, 'ospf': 89, 'egp': 8, 'hmp': 20, 'tcp': 6, 'xns-idp': 22, 'icmp': 1, 'pup': 12, 'rdp': 27. |
ipDenySrcIfIndexMode | 1.3.6.1.4.1.272.4.5.2.1.3 | integer | no-access |
This object specifies whether or not the originating interface of the IP datagram should be checked to determine whether a datagram belongs to this subset. Enumeration: 'verify': 2, 'dont-verify': 1. |
ipDenySrcIfIndex | 1.3.6.1.4.1.272.4.5.2.1.4 | integer | no-access |
If ipDenySrcIfIndexMode is set to 'verify', then this object specifies the ifIndex of the datagrams belonging to the subset defined by this entry. |
ipDenySrcAddr | 1.3.6.1.4.1.272.4.5.2.1.5 | ipaddress | no-access |
If ipDenySrcIfIndexMode is set to 'verify', then this object specifies the ifIndex of the datagrams belonging to the subset defined by this entry. |
ipDenySrcMask | 1.3.6.1.4.1.272.4.5.2.1.6 | ipaddress | no-access |
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry. |
ipDenySrcPortMode | 1.3.6.1.4.1.272.4.5.2.1.7 | integer | no-access |
This object specifies the range of source port numbers of IP datagrams belonging to this subset. ignore(1) = All ports: 0..65535; specific(2) = a specific port number i.e. ipAllowDstPort; clients(3) = client ports: 1024..4999, 32768..65535; server(4) = server ports. 0..1023, 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6. |
ipDenySrcPort | 1.3.6.1.4.1.272.4.5.2.1.8 | integer | no-access |
If ipDenySrcPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used. |
ipDenyDstAddr | 1.3.6.1.4.1.272.4.5.2.1.9 | ipaddress | no-access |
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry. |
ipDenyDstMask | 1.3.6.1.4.1.272.4.5.2.1.10 | ipaddress | no-access |
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry. |
ipDenyDstPortMode | 1.3.6.1.4.1.272.4.5.2.1.11 | integer | no-access |
This object specifies the range of destination port numbers of IP datagrams belonging to the subset. ignore(1) = All ports: 0..65535; specific(2) = a specific port number i.e. ipAllowDstPort; clients(3) = client ports: 1024..4999, 32768..65535; server(4) = server ports. 0..1023, 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6. |
ipDenyDstPort | 1.3.6.1.4.1.272.4.5.2.1.12 | integer | no-access |
If ipDenyDstPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used. |
ipDenySrcPortRange | 1.3.6.1.4.1.272.4.5.2.1.13 | integer | no-access |
This object can be used together with ipDenySrcPort to apply the rule to a port range, instead of a single port. When ipDenySrcPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipDenySrcPort to ipDenySrcPortRange. When this object is set to -1, the rule applies only to port ipDenySrcPort. |
ipDenyDstPortRange | 1.3.6.1.4.1.272.4.5.2.1.14 | integer | no-access |
This object can be used together with ipDenyDstPort to apply the rule to a port range, instead of a single port. When ipDenyDstPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipDenyDstPort to ipDenyDstPortRange. When this object is set to -1, the rule applies only to port ipDenyDstPort. |