BIANCA-BRICK-TACACSP-MIB: View SNMP OID List / Download MIB

VENDOR: BINTEC COMMUNICATIONS GMBH


 Home MIB: BIANCA-BRICK-TACACSP-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 bintec 1.3.6.1.4.1.272
         bintecsec 1.3.6.1.4.1.272.254
                 tacacsp 1.3.6.1.4.1.272.254.13
                       tacacspServerTable 1.3.6.1.4.1.272.254.13.1 no-access
                           tacacspServerEntry 1.3.6.1.4.1.272.254.13.1.1 no-access
                               tacacspSrvPriority 1.3.6.1.4.1.272.254.13.1.1.1 integer read-write
The TACACS+ server with the lowest priority is the first used for an TACACS+ AAA request. If there is no response or the access was denied (in the non-authoritave case only, see also tacacspSrvPolicy) the TACACS+ server with the next lowest priority will be used. The default value is 0.
                               tacacspSrvAddress 1.3.6.1.4.1.272.254.13.1.1.2 ipaddress read-write
The TACACS+ server IP address.
                               tacacspSrvTcpPort 1.3.6.1.4.1.272.254.13.1.1.3 integer read-only
The Login Host Protocol (TACACS) TCP port assigned by the IANA.
                               tacacspSrvSecret 1.3.6.1.4.1.272.254.13.1.1.4 displaystring read-write
The shared secret between the TACACS+ server and the NAS (encryption key in the TACACS+ server's configuration file).
                               tacacspSrvTimeout 1.3.6.1.4.1.272.254.13.1.1.5 integer read-write
The amount of seconds waiting for an outstanding TACACS+ response. Default is three seconds.
                               tacacspSrvAdminStatus 1.3.6.1.4.1.272.254.13.1.1.7 integer read-write
The administrative status of this TACACS+ server entry, if set to up(1) the associated server will be used for authentication, authorization and accounting according the priority (see tacacspSrvPriority) and the current operational status (see tacacspSrvOperStatus). Otherwise this entry will not be considered for TACACS+ AAA requests. Enumeration: 'down': 2, 'up': 1, 'delete': 3.
                               tacacspSrvOperStatus 1.3.6.1.4.1.272.254.13.1.1.8 integer read-only
The operational status of this TACACS+ server entry, the status blocked will be set after a failed TACACS+ request. If set to blocked(2) or down(3) this entry will not be considered for TACACS+ AAA requests. Enumeration: 'down': 3, 'up': 1, 'blocked': 2.
                               tacacspSrvPolicy 1.3.6.1.4.1.272.254.13.1.1.9 integer read-write
If set to authoritative(1), a negative answer to a request will be accepted. This is not necessarily true when set to non-authoritative(2), where the next TACACS+ server will be asked until there is finally an authoritative(1) server configured. Enumeration: 'authoritative': 1, 'non-authoritative': 2.
                               tacacspSrvEncrMode 1.3.6.1.4.1.272.254.13.1.1.10 integer read-write
If set to encrypt(1) the TACACS+ packet will be MD5 encrypted. Otherwise - if set to cleartext(2) - the packet and therefore all related information will be send unencrypted. This mode is intended for testing but not recommended for normal use. Enumeration: 'cleartext': 2, 'encrypt': 1.
                               tacacspSrvMultiSession 1.3.6.1.4.1.272.254.13.1.1.11 integer read-write
If enabled(1) multiple TACACS+ sessions (subsequent TACACS+ requests) may be supported simultaneously over a single TCP connection. If multiple sessions are not being multiplexed over a single TCP connection, a new connection will be opened for each TACACS+ session and closed at the end of that session. Enumeration: 'disabled': 2, 'enabled': 1.
                               tacacspSrvPppAuth 1.3.6.1.4.1.272.254.13.1.1.13 integer read-write
Enables the PPP authentication for the associated TACACS+ server. Enumeration: 'disabled': 1, 'enabled': 2.
                               tacacspSrvLoginAuth 1.3.6.1.4.1.272.254.13.1.1.14 integer read-write
Enables the login authentication (shell) for the associated TACACS+ server. Enumeration: 'disabled': 1, 'enabled': 2.
                               tacacspSrvAccounting 1.3.6.1.4.1.272.254.13.1.1.15 integer read-write
Enables the TACACS+ accounting for the associated TACACS+ server. Enumeration: 'disabled': 1, 'enabled': 2.
                               tacacspSrvBlockTimeout 1.3.6.1.4.1.272.254.13.1.1.16 integer read-write
Timeout in seconds for the blocked status (see also tacacspSrvOperStatus), if expired, the operational status is set to up(1) or down(3) according the the current tacacspSrvAdminStatus. When set to zero, the operational status is never set to blocked.
                               tacacspSrvAuthentNoResp 1.3.6.1.4.1.272.254.13.1.1.17 integer read-write
Possible actions for the client when no response from servers : - allowing the connection to the router by local login pwd (2) - or stop the negociation (3). Enumeration: 'connection-forbidden': 3, 'connection-bydefault': 1, 'connection-bylocalloginpwd': 2.
                               tacacspSrvAuthentNegResp 1.3.6.1.4.1.272.254.13.1.1.18 integer read-write
Possible actions for the client when negative response : from servers. - allowing the connection to the router by local login pwd (2) - or stop the negociation (3). Enumeration: 'connection-forbidden': 3, 'connection-bydefault': 1, 'connection-bylocalloginpwd': 2.
                               tacacspSrvPrivLvlOnLogin 1.3.6.1.4.1.272.254.13.1.1.19 integer read-write
Configurable TACACS+ privilege level assigned after successful authentication procedure. This user-specific privilege level is needed for the subsequent command authorization request(s). Note that the user is free to change that initial privilege level via the 'enab' command, provided that it's enabled on the TACACS+ server. If set to -1, this parameter will be ignored.