G6-ACCESS-MIB: View SNMP OID List / Download MIB
VENDOR: MICROSENS
Home | MIB: G6-ACCESS-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
management | 1.3.6.1.4.1.3181.10.6.3 |
Microsens private MIB for Generation 6 Ethernet Switches |
||
access | 1.3.6.1.4.1.3181.10.6.3.76 | |||
accessAuthenticationMode | 1.3.6.1.4.1.3181.10.6.3.76.1 | integer | read-write |
This parameter defines against which database incoming user and password are verified. Enumeration: 'localThenTacacs': 3, 'tacacsThenLocal': 6, 'tacacs': 4, 'radius': 2, 'radiusThenLocal': 5, 'local': 0, 'localThenRadius': 1. |
userTable | 1.3.6.1.4.1.3181.10.6.3.76.2 | no-access | ||
1.3.6.1.4.1.3181.10.6.3.76.2.1 | no-access | |||
userIndex | 1.3.6.1.4.1.3181.10.6.3.76.2.1.1 | integer | no-access |
Automatically generated |
userName | 1.3.6.1.4.1.3181.10.6.3.76.2.1.2 | displaystring | read-write |
Unique name used to login to the system regardless of the management interface used. At least 3 character are required. |
userAssociatedGroups | 1.3.6.1.4.1.3181.10.6.3.76.2.1.3 | displaystring | read-write |
A user must be part of a group and inherits the rights of the groups and their views. |
userGeneralAccessRights | 1.3.6.1.4.1.3181.10.6.3.76.2.1.4 | integer | read-write |
Limited access rights here overrule rights granted by the associated groups and their views. Use NO_ACCESS to temporarily suspend a user account. Enumeration: 'readWrite': 2, 'readOnly': 1, 'noAccess': 0. |
userEnableTelnetAccess | 1.3.6.1.4.1.3181.10.6.3.76.2.1.5 | integer | read-write |
Permit CLI user access via insecure telnet session or via local serial port. Enumeration: 'disabled': 0, 'enabled': 1. |
userEnableSshAccess | 1.3.6.1.4.1.3181.10.6.3.76.2.1.6 | integer | read-write |
Permit CLI user access via secure shell. Enumeration: 'disabled': 0, 'enabled': 1. |
userEnableWebAccess | 1.3.6.1.4.1.3181.10.6.3.76.2.1.7 | integer | read-write |
Permit user access via the web interface. Enumeration: 'disabled': 0, 'enabled': 1. |
userEnableSnmpAccess | 1.3.6.1.4.1.3181.10.6.3.76.2.1.8 | integer | read-write |
Permit user access via SNMP of any version. Additionally use SNMP settings to restrict to only secure SNMP v3 if desired. Enumeration: 'disabled': 0, 'enabled': 1. |
userEnableNmpAccess | 1.3.6.1.4.1.3181.10.6.3.76.2.1.9 | integer | read-write |
Permit user access via the nmp network management application. Enumeration: 'disabled': 0, 'enabled': 1. |
userEnableFtpAccess | 1.3.6.1.4.1.3181.10.6.3.76.2.1.10 | integer | read-write |
Permit ftp access for file transfers. Enumeration: 'disabled': 0, 'enabled': 1. |
userEnterPassword | 1.3.6.1.4.1.3181.10.6.3.76.2.1.11 | displaystring | read-write |
Set a new authentication password which replaces the previous one. This password applies to all user access methods except SNMP. For SNMP v3 a separate set of passwords is used. Note: trailing spaces or multiple spaces in the password are automatically removed. |
userEncryptedAuthPassword | 1.3.6.1.4.1.3181.10.6.3.76.2.1.12 | displaystring | read-write | |
userSnmpV3SecurityLevel | 1.3.6.1.4.1.3181.10.6.3.76.2.1.13 | integer | read-write |
Defines if login authorization and/or privacy are used. Enumeration: 'noAuthNoPriv': 0, 'authPriv': 2, 'authNoPriv': 1. |
userSnmpV3AuthAlgorithm | 1.3.6.1.4.1.3181.10.6.3.76.2.1.14 | integer | read-write |
Defines with which algorithm the authorization key is created and decoded. Enumeration: 'noAuthentication': 0, 'sha': 2, 'md5': 1. |
userSnmpV3PrivacyAlgorithm | 1.3.6.1.4.1.3181.10.6.3.76.2.1.15 | integer | read-write |
Defines which encryption method is used security level includes privacy. Enumeration: 'noPrivacy': 0, 'des': 1, 'aes': 2. |
userEnterSnmpV3AuthPassword | 1.3.6.1.4.1.3181.10.6.3.76.2.1.16 | displaystring | read-write |
Set a new SNMP v3 authentication password. This parameter only is required when SNMP v3 is used. This value correlates to the authorization key. No spaces are permitted and at least 8 character are required. |
userEncryptedSnmpAuthPassword | 1.3.6.1.4.1.3181.10.6.3.76.2.1.17 | displaystring | read-write | |
userEnterSnmpV3PrivacyPassword | 1.3.6.1.4.1.3181.10.6.3.76.2.1.18 | displaystring | read-write |
Set a new encryption password. This parameter only is required when SNMP v3 user based privacy is used. If left empty, the SNMP v3 authentication password is also used for SNMP v3 privacy. No spaces are permitted and at least 8 character are required. IMPORTANT: This password must be different to the authentication password ! |
userEncryptedSnmpPrivacyPassword | 1.3.6.1.4.1.3181.10.6.3.76.2.1.19 | displaystring | read-write | |
groupTable | 1.3.6.1.4.1.3181.10.6.3.76.3 | no-access | ||
1.3.6.1.4.1.3181.10.6.3.76.3.1 | no-access | |||
groupIndex | 1.3.6.1.4.1.3181.10.6.3.76.3.1.1 | integer | no-access |
Automatically generated |
groupName | 1.3.6.1.4.1.3181.10.6.3.76.3.1.2 | displaystring | read-write |
Enter a unique and descriptive name that identifies the group. At least 3 character are required. |
groupAssociatedViews | 1.3.6.1.4.1.3181.10.6.3.76.3.1.3 | displaystring | read-write |
A list which may point to one or several views that make up this group. |
viewTable | 1.3.6.1.4.1.3181.10.6.3.76.4 | no-access | ||
1.3.6.1.4.1.3181.10.6.3.76.4.1 | no-access | |||
viewIndex | 1.3.6.1.4.1.3181.10.6.3.76.4.1.1 | integer | no-access |
Automatically generated |
viewName | 1.3.6.1.4.1.3181.10.6.3.76.4.1.2 | displaystring | read-write |
Enter a unique and descriptive name that identifies the view. At least 3 character are required. |
viewAssociatedPattern | 1.3.6.1.4.1.3181.10.6.3.76.4.1.3 | displaystring | read-write |
A list which may point to one or several pattern that make up this view. |
patternTable | 1.3.6.1.4.1.3181.10.6.3.76.5 | no-access | ||
1.3.6.1.4.1.3181.10.6.3.76.5.1 | no-access | |||
patternIndex | 1.3.6.1.4.1.3181.10.6.3.76.5.1.1 | integer | no-access |
Automatically generated |
patternName | 1.3.6.1.4.1.3181.10.6.3.76.5.1.2 | displaystring | read-write |
Enter a unique and descriptive name that identifies the pattern. At least 3 character are required. |
patternDotstring | 1.3.6.1.4.1.3181.10.6.3.76.5.1.3 | displaystring | read-write |
A dotstring or partical dotstring can be defined here. Example: device.port |
patternAccessRights | 1.3.6.1.4.1.3181.10.6.3.76.5.1.4 | integer | read-write |
This defines in which way the dotstring is to be treated. Enumeration: 'readWrite': 2, 'readOnly': 1, 'noAccess': 0. |
radiusTable | 1.3.6.1.4.1.3181.10.6.3.76.6 | no-access | ||
1.3.6.1.4.1.3181.10.6.3.76.6.1 | no-access | |||
radiusIndex | 1.3.6.1.4.1.3181.10.6.3.76.6.1.1 | integer | no-access |
Automatically generated |
radiusPrimaryAuthServerName | 1.3.6.1.4.1.3181.10.6.3.76.6.1.2 | displaystring | read-write |
Symbolic name of the RADIUS server used for authentication. |
radiusFallbackAuthServerName | 1.3.6.1.4.1.3181.10.6.3.76.6.1.3 | displaystring | read-write |
Symbolic name of the RADIUS server used for authentication if the primary server is down. Leave empty when no fallback is required. |
tacacsTable | 1.3.6.1.4.1.3181.10.6.3.76.7 | no-access | ||
1.3.6.1.4.1.3181.10.6.3.76.7.1 | no-access | |||
tacacsIndex | 1.3.6.1.4.1.3181.10.6.3.76.7.1.1 | integer | no-access |
Automatically generated |
tacacsPrimaryAuthServerName | 1.3.6.1.4.1.3181.10.6.3.76.7.1.2 | displaystring | read-write |
Symbolic name of the TACACS+ server used for authentication. |
tacacsFallbackAuthServerName | 1.3.6.1.4.1.3181.10.6.3.76.7.1.3 | displaystring | read-write |
Symbolic name of the TACACS+ server used for authentication if the primary server is down. Leave empty when no fallback is required. |
tacacsPrivilegeLevel0User | 1.3.6.1.4.1.3181.10.6.3.76.7.1.4 | displaystring | read-write |
This maps TACACS+ privilege levels to internal access model. Level 0 is lowest privilege level. Make sure the name entered here exists as local user name. |
tacacsPrivilegeLevel1User | 1.3.6.1.4.1.3181.10.6.3.76.7.1.5 | displaystring | read-write |
This maps TACACS+ privilege levels to internal access model. Level 1 is a basic privilege level. Make sure the name entered here exists as local user name. |
tacacsPrivilegeLevel15User | 1.3.6.1.4.1.3181.10.6.3.76.7.1.6 | displaystring | read-write |
This maps TACACS+ privilege levels to internal access model. Level 15 is higest privilege level and would usually be mapped to the admin user. |
restrictionsTable | 1.3.6.1.4.1.3181.10.6.3.76.8 | no-access |
This table may be used to restrict access to the management system. Be careful not to lock your self out. |
|
1.3.6.1.4.1.3181.10.6.3.76.8.1 | no-access | |||
restrictionsIndex | 1.3.6.1.4.1.3181.10.6.3.76.8.1.1 | integer | no-access |
Automatically generated |
restrictionsName | 1.3.6.1.4.1.3181.10.6.3.76.8.1.2 | displaystring | read-write |
Enter a unique and descriptive name that identifies the ip_address. At least 3 character are required. |
restrictionsMode | 1.3.6.1.4.1.3181.10.6.3.76.8.1.3 | integer | read-write |
The associated ip address may be permitted or denied. Use UNUSED to temporarily suspend an entry. Enumeration: 'unused': 0, 'deny': 2, 'permit': 1. |
restrictionsIpAddress | 1.3.6.1.4.1.3181.10.6.3.76.8.1.4 | displaystring | read-write |
Enter an IP address or address range which is denied or permitted. For example, to describe a range of IP addresses from 192.168.0.1 to 192.168.255.255 you use: 192.168.0.0/16. Where 16 describes the number of bits in the IP address that are used for comparison (here192.168). |
accessNumberOfLogins | 1.3.6.1.4.1.3181.10.6.3.76.100 | unsigned32 | read-only |
This value is incremented for each successful login. |
loginStatusTable | 1.3.6.1.4.1.3181.10.6.3.76.101 | no-access |
This table displays data which are read from the inserted SFPs. |
|
1.3.6.1.4.1.3181.10.6.3.76.101.1 | no-access | |||
loginStatusIndex | 1.3.6.1.4.1.3181.10.6.3.76.101.1.1 | integer | no-access |
Automatically generated |
loginStatusState | 1.3.6.1.4.1.3181.10.6.3.76.101.1.2 | integer | read-only |
Indicates if this login record displays a currently active login or a history entry of a previous login which is logged off by now. Enumeration: 'unused': 0, 'loggedOff': 1, 'activeLogin': 2. |
loginStatusUserName | 1.3.6.1.4.1.3181.10.6.3.76.101.1.3 | displaystring | read-only |
User name for which this record applies. |
loginStatusAuthName | 1.3.6.1.4.1.3181.10.6.3.76.101.1.4 | displaystring | read-only |
Authorization name which maps to the local user names to define the actual access rights. For local authentication this value mirrors the user name. When RADIUS authentication is used, this reflects the name provided by the RADIUS server. |
loginStatusLoginId | 1.3.6.1.4.1.3181.10.6.3.76.101.1.5 | unsigned32 | read-only |
Unique value to reference this login operation |
loginStatusLoginTimeStamp | 1.3.6.1.4.1.3181.10.6.3.76.101.1.6 | displaystring | read-only |
Indicated the time when this user has connected to this service. |
loginStatusLoginEpoch | 1.3.6.1.4.1.3181.10.6.3.76.101.1.7 | unsigned32 | read-only |
Login time stamp in Linux time since the epoch format. |
loginStatusConnectTime | 1.3.6.1.4.1.3181.10.6.3.76.101.1.8 | counter32 | read-only |
Indicated since how long the connection is established. For logged off entries this indicates the connect time of entry. |
loginStatusService | 1.3.6.1.4.1.3181.10.6.3.76.101.1.9 | displaystring | read-only |
Displays which service was used to perform the login. |
loginStatusRemoteHost | 1.3.6.1.4.1.3181.10.6.3.76.101.1.10 | displaystring | read-only |
Displays from which remote host the login was performed. Details depend on the chosen interface. |