CISCO-REPEATER-MIB: View SNMP OID List / Download MIB
VENDOR: CISCO
Home | MIB: CISCO-REPEATER-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
ciscoRptrMIB | 1.3.6.1.4.1.9.9.22 | |||
ciscoRptrMIBObjects | 1.3.6.1.4.1.9.9.22.1 | |||
ciscoRptrPortTable | 1.3.6.1.4.1.9.9.22.1.1 | no-access |
Table of descriptive and status information about the ports. |
|
1.3.6.1.4.1.9.9.22.1.1.1 | no-access |
An entry in the table, containing information about a single port. |
||
ciscoRptrPortMDIStatus | 1.3.6.1.4.1.9.9.22.1.1.1.1 | integer | read-only |
This object indicates the port's MDI/MDI-X switching status. The normal(1) status indicates the port is configured to be standard MDI as defined by the 10BaseT Standard for hub port (allowing for connection to a chained hub). The crossover(2) status indicates the port is configured to be in MDI-X mode (allowing for connection to a 10BaseT end node). The notSwitchable(3) status indicates the port is not switchable between MDI and MDI-X mode. Enumeration: 'notSwitchable': 3, 'crossover': 2, 'normal': 1. |
ciscoRptrPortLinkTestEnabled | 1.3.6.1.4.1.9.9.22.1.1.1.2 | truthvalue | read-write |
Specifies whether or not Link Integrity Test Function is enabled for the port as specified by the 10BaseT Standard. When the link test function is enabled, the absence of the Link Test pulses and receive data on the port will cause the port to go into a Link Fail state. In this state, the data transmission, data reception and collision detection functions are disabled until valid data or 4 consecutive Link Test pulses appear on RXD+/- pair of the port. With the Link Integrity Test Function disabled, the data driver, receiver and collision detection remain enabled irrespective of the presence or absence of data or Link Test pulses on the port. |
ciscoRptrPortLinkTestFailed | 1.3.6.1.4.1.9.9.22.1.1.1.3 | truthvalue | read-only |
This object indicates the status of the Link Test function for the port. Set to false indicates valid data or 4 consecutive Link Test pulses have been detected on the port. Set to true indicates the failure of the Link Test function for the port. In the Link Test Fail state, data transmission, data reception and collision detection functions are disabled until valid data or 4 consecutive Link Test pulses appear on the RXD+/- pair of the port. |
ciscoRptrPortAutoPolarityEnabled | 1.3.6.1.4.1.9.9.22.1.1.1.4 | truthvalue | read-write |
Specifies whether or not the Automatic Receiver Polarity Reversal is enabled for the port. This feature provides the ability to invert the polarity of the signals appearing at the RXD+/- pair of the port prior to re-transmission if the polarity of the received signal is reversed (such as in the case of wiring error). |
ciscoRptrPortAutoPolarityCorrected | 1.3.6.1.4.1.9.9.22.1.1.1.5 | truthvalue | read-only |
This object indicates the status of the Automatic Receiver Polarity Reversal for the port. Set to true indicates the polarity of the port has been detected as reversed and is corrected. Set to false indicates the polarity for the port as having correct polarity. |
ciscoRptrPortSrcAddrCtrl | 1.3.6.1.4.1.9.9.22.1.1.1.6 | truthvalue | read-write |
Specifies whether or not the Source Address Control feature is enabled for the port. This feature provides the ability to control which device's specific MAC address is allowed access to the network. If the management entity specified an address via ciscoRptrPortAllowedSrcAddr, only the device with the configured MAC address is allowed access to the network. If the management entity does not specified an address, the allowed source address is learned from the last source address if valid; otherwise, the allowed source address is learned from the MAC address of the first valid packet detected on the port. When another MAC address other than the allowed source address is detected on the port, the port is partitioned. WARNING: Configuring Source Address Control feature on the port which is used for management can cause the management entity to lose access to the agent if the management's source address does not match the allowed source address. |
ciscoRptrPortAllowedSrcAddr | 1.3.6.1.4.1.9.9.22.1.1.1.7 | octet string | read-write |
For write access, this object is the allowed source address that is to be configured for source address control feature for the port. For read access, if no allowed source address was specifically specified by the manager, the agent shall return the learned address to control. Otherwise, the specified allowed source address is returned if configured by management entity. |
ciscoRptrPortAllowedSrcAddrStatus | 1.3.6.1.4.1.9.9.22.1.1.1.8 | integer | read-only |
This object indicates the status of ciscoRptrPortAllowedSrcAddr for the port. allowedSrcAddrConfig(1) status indicates that the allowed source address was explicitly configured by management entity. The allowedSrcAddrLearn(2) status indicates that the allowed source address was learned for the port. The allowedSrcAddrUndefined(3) status indicates that currently there is no restriction on the source address for the port. Enumeration: 'allowedSrcAddrConfig': 1, 'allowedSrcAddrLearn': 2, 'allowedSrcAddrUndefined': 3. |
ciscoRptrPortLastIllegalSrcAddr | 1.3.6.1.4.1.9.9.22.1.1.1.9 | octet string | read-only |
This object is the last illegal source address which caused this port to be partitioned. If the port is never partitioned due to Source Address Control, the agent shall return a string of length zero. |
ciscoRptrPortIllegalAddrTrapAcked | 1.3.6.1.4.1.9.9.22.1.1.1.10 | integer | read-write |
Specifies whether an acknowledgment is sent by an NMS to indicate that an illegal source address trap was received. acked : Set by a NMS to acknowledge reception of an illegal source address. When this flag is set, no more trap will be sent for the port. no-acked-sending: Set by the SNMP agent to indicate that it is sending a trap to one or more NMSs. The trap is sent based upon the trap algorithm specified by ciscoRptrTrapAlgorithm. no-acked-no-sending: Set by the SNMP agent when there is no trap to be sent or the trap was already sent out. Enumeration: 'no-acked-no-sending': 3, 'no-acked-sending': 2, 'acked': 1. |
ciscoRptrPortIllegalAddrTrapEnabled | 1.3.6.1.4.1.9.9.22.1.1.1.11 | truthvalue | read-write |
Specifies whether or not to send the illegal source address trap for the port. When it is enabled, one or more illegal source address traps will be generated if there is a mismatch of source address. Traps are sent based on the algorithm specified by ciscoRptrTrapAlgorithm defined in the GLOBAL section. When it is disabled, no traps are sent. |
ciscoRptrPortIllegalAddrFirstHeard | 1.3.6.1.4.1.9.9.22.1.1.1.12 | timestamp | read-only |
This is the time stamp for the very first time when the current illegal source address was detected on the port. The time stamp is given by the value of MIB-II's sysUpTime at which this occurrence happens. If no illegal source address is heard on the port, this value is set to 0. |
ciscoRptrPortIllegalAddrLastHeard | 1.3.6.1.4.1.9.9.22.1.1.1.13 | timestamp | read-only |
This is the time stamp for the last time when the current illegal source address was detected on the port. The time stamp is given by the value of MIB-II's sysUpTime at which occurrence happens. If no illegal source address was never occurred, this value is set to 0. |
ciscoRptrPortLastIllegalAddrCount | 1.3.6.1.4.1.9.9.22.1.1.1.14 | gauge32 | read-only |
This is the count of consecutive occurrences of the last illegal source address on the port. When illegal address is detected, this count will be incremented about every minute. |
ciscoRptrPortIllegalAddrTotalCount | 1.3.6.1.4.1.9.9.22.1.1.1.15 | counter32 | read-only |
This is the total count of all cccurences of any illegal source addresses heard on the port since start-up. Note: Illegal source addresses may be different, may be the same. This counter is a *total* count from this port. |
ciscoRptrMIBglobal | 1.3.6.1.4.1.9.9.22.1.2 | |||
ciscoRptrTrapAlgorithm | 1.3.6.1.4.1.9.9.22.1.2.1 | integer | read-write |
Specifies how often trap(s) will be sent by the SNMP agent. once - The trap is only sent once. decay - The same trap is sent multiple times at approximately exponential decaying rate. e.g. 1st trap is sent immediately, 2nd trap is at 1 minute, 3rd trap is at 2 minutes, 4th trap is at 4 minutes, and so on. The rate is capped at about 32 minutes. NOTE : Decaying rate is used to avoid overflood the NMS. Enumeration: 'decay': 2, 'once': 1. |
ciscoRptrMIBConformance | 1.3.6.1.4.1.9.9.22.2 | |||
ciscoRptrMIBCompliances | 1.3.6.1.4.1.9.9.22.2.1 | |||
ciscoRptrMIBCompliance | 1.3.6.1.4.1.9.9.22.2.1.1 |
The compliance statement for entities which implement the cisco Repeater MIB |
||
ciscoRptrMIBComplianceV11R01 | 1.3.6.1.4.1.9.9.22.2.1.2 |
The compliance statement for entities which implement the cisco Repeater MIB |
||
ciscoRptrMIBGroups | 1.3.6.1.4.1.9.9.22.2.2 | |||
ciscoRptrMIBGroup | 1.3.6.1.4.1.9.9.22.2.2.1 |
A collection of objects providing repeater ability. |
||
ciscoRptrMIBPortGroupV11R01 | 1.3.6.1.4.1.9.9.22.2.2.2 |
A collection of objects for managing a repeater port. |
||
ciscoRptrMIBGlobalsGroup | 1.3.6.1.4.1.9.9.22.2.2.3 |
A collection of objects apply to all repeater ports. |
||
ciscoRptrMIBTrapPrefix | 1.3.6.1.4.1.9.9.22.3 | |||
ciscoRptrMIBTraps | 1.3.6.1.4.1.9.9.22.3.0 | |||
ciscoRptrIllegalSrcAddrTrap | 1.3.6.1.4.1.9.9.22.3.0.1 |
When the illegal MAC source address violation is detected, the port is partitioned for one minute. In addition, this trap notification is generated. Note: rptrPortGroupIndex, and rptrPortIndex are the instances of ciscoRptrPortLastIllegalSrcAddr. |