ENTERASYS-8021X-REKEYING-MIB: View SNMP OID List / Download MIB

VENDOR: ENTERASYS NETWORKS


 Home MIB: ENTERASYS-8021X-REKEYING-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 etsys8021xRekeyingMIB 1.3.6.1.4.1.5624.1.2.17
This MIB module defines a portion of the SNMP enterprise MIBs under Enterasys Networks' enterprise OID pertaining to IEEE 802.1x authentication. This MIB is designed to supplement and be used in connection with the standard IEEE 802.1x MIB. It provides configuration controls for Enterasys Networks' rapid rekeying feature -- a feature that enhances wireless LAN security by changing the network's radio keys on a regular basis.
       etsysDot1xRekeyingObjects 1.3.6.1.4.1.5624.1.2.17.1
           etsysDot1xRekeyBaseBranch 1.3.6.1.4.1.5624.1.2.17.1.1
               etsysDot1xRekeyConfigTable 1.3.6.1.4.1.5624.1.2.17.1.1.1 no-access
A table that contains encryption-key-related configuration objects for ports on which Authenticator PAEs can run.
                   etsysDot1xRekeyConfigEntry 1.3.6.1.4.1.5624.1.2.17.1.1.1.1 no-access
Each conceptual row holds encryption key configuration information for the Authenticator PAEs associated with one port.
                       etsysDot1xRekeyEnabled 1.3.6.1.4.1.5624.1.2.17.1.1.1.1.1 truthvalue read-write
Determines how an access point selects radio encryption keys. If the selected port/Authenticator PAE does not support the EAPOL-Key feature (e.g., because radio keys are not applicable to Ethernet ports), this object's value will be FALSE and attempts to write TRUE will fail. Normally, if radio keys are present, the manager enters them into the access point through some manual process. The manager or the users may also need to configure the keys into each laptop (access points can distribute the keys automatically to 802.1x EAP-TLS clients). However laptops get keys, the keys remain static until somebody goes to the trouble of changing them. If the keys stay unchanged for long periods, this can make it easier for a determined attacker to launch a cryptographic attack. When rapid rekeying is enabled, an access point ignores its manually-set keys. It generates pseudo-random keys on a periodic basis, using IEEE 802.1x key distribution to deliver the keys to new and current clients. Do not enable rapid rekeying unless ALL of your clients support IEEE 802.1x and an authentication method (e.g., EAP-TLS) that supports key distribution. Before enabling rapid rekeying, make sure that you have set 'dot1xAuthKeyTxEnabled' to TRUE. Changing the keys without telling any of the clients about the changes is not a very useful mode of operation.
                       etsysDot1xRekeyPeriod 1.3.6.1.4.1.5624.1.2.17.1.1.1.1.2 unsigned32 read-write
When rapid rekeying (periodic changing of radio keys) is enabled, the value of this object determines the period, in seconds, between key changes.
                       etsysDot1xRekeyLength 1.3.6.1.4.1.5624.1.2.17.1.1.1.1.3 integer read-write
Determines the number of bits/bytes used in the encryption keys. Currently supports either 128-bit (16-octet) encryption keys or 40-bit (5-octet) encryption keys. Enumeration: 'keylen128': 2, 'keylen40': 1.
                       etsysDot1xRekeyAsymmetric 1.3.6.1.4.1.5624.1.2.17.1.1.1.1.4 truthvalue read-write
Determines the association between the supplicant and authenticator transmit keys. If true(1), the authenticator and supplicant will use different encryption keys in order to transmit data. If false(2), the authenticator and supplicant will use a single key pattern to encrypt the transmitted data.
                       etsysDot1xRekeyPairwise 1.3.6.1.4.1.5624.1.2.17.1.1.1.1.5 truthvalue read-write
Determines whether Rapid Rekeying tumbles Pairwise keys (when it is enabled, and the radio card supports them). If true(1), it indicates that the access point should tumble both Pairwise and Group keys. If false(2), it indicates that the access point should tumble only Group keys.
       etsysDot1xRekeyingConformance 1.3.6.1.4.1.5624.1.2.17.2
           etsysDot1xRekeyingGroups 1.3.6.1.4.1.5624.1.2.17.2.1
               etsysDot1xRekeyingBaseGroup 1.3.6.1.4.1.5624.1.2.17.2.1.1
A collection of objects providing rekeying configuration information about a port on which Authenticator PAEs can run.
               etsysDot1xRekeyingPairwiseGroup 1.3.6.1.4.1.5624.1.2.17.2.1.2
A collection of objects providing rekeying configuration information related to Pairwise keys.
           etsysDot1xRekeyingCompliances 1.3.6.1.4.1.5624.1.2.17.2.2
               etsysDot1xRekeyingCompliance 1.3.6.1.4.1.5624.1.2.17.2.2.1
The compliance statement for devices that support the Enterasys IEEE 802.1x extensions MIB.