G6-ACL-MIB: View SNMP OID List / Download MIB

VENDOR: MICROSENS


 Home MIB: G6-ACL-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 management 1.3.6.1.4.1.3181.10.6.3
Microsens private MIB for Generation 6 Ethernet Switches
     acl 1.3.6.1.4.1.3181.10.6.3.51
           aclEnableAclFiltering 1.3.6.1.4.1.3181.10.6.3.51.1 integer read-write
General enable of access control list operation. Note that this function need only be enabled when port filtering is used. For wifi, dhcp or arp inspection function this enable parameter is meaningless.. Enumeration: 'disabled': 0, 'enabled': 1.
           activeFilterPortConfigTable 1.3.6.1.4.1.3181.10.6.3.51.2 no-access
This table defines the parameter for access control of incoming data.
               activeFilterPortConfigEntry 1.3.6.1.4.1.3181.10.6.3.51.2.1 no-access
                   activeFilterPortConfigPortIndex 1.3.6.1.4.1.3181.10.6.3.51.2.1.1 integer no-access
Automatically generated
                   activeFilterPortConfigEnableAclFiltering 1.3.6.1.4.1.3181.10.6.3.51.2.1.2 integer read-write
Generally enables access control checking for this particular port. The details need to be configured in the list and rules tables. Enumeration: 'disabled': 0, 'enabled': 1.
                   activeFilterPortConfigAclListName 1.3.6.1.4.1.3181.10.6.3.51.2.1.3 displaystring read-write
Name of the ACL (access control list) which apply to this port. Several ACL lists may be specified with a comma separated list. Example acl1, otherlist
           listTable 1.3.6.1.4.1.3181.10.6.3.51.3 no-access
This table is used to combine and group individual rules for easier reference.
               listEntry 1.3.6.1.4.1.3181.10.6.3.51.3.1 no-access
                   listIndex 1.3.6.1.4.1.3181.10.6.3.51.3.1.1 integer no-access
Automatically generated
                   listName 1.3.6.1.4.1.3181.10.6.3.51.3.1.2 displaystring read-write
Unique name to reference this entry and to remember whose MAC address is entered.
                   listDescription 1.3.6.1.4.1.3181.10.6.3.51.3.1.3 displaystring read-write
Enter any information required to remember what this rule is intended to do.
                   listRules 1.3.6.1.4.1.3181.10.6.3.51.3.1.4 displaystring read-write
Contains the names of rules that apply to this list separated by commas. Please beware of typing errors. Example: rule1,rule2,other_rule
           rulesTable 1.3.6.1.4.1.3181.10.6.3.51.4 no-access
For filtering of incoming data this table defines the filter rules. The same table also applies to arp inspection. In this use this table statically defines valid MAC/IP/VLAN relationships.
               rulesEntry 1.3.6.1.4.1.3181.10.6.3.51.4.1 no-access
                   rulesIndex 1.3.6.1.4.1.3181.10.6.3.51.4.1.1 integer no-access
Automatically generated
                   rulesName 1.3.6.1.4.1.3181.10.6.3.51.4.1.2 displaystring read-write
Unique name to reference this entry and to remember whose MAC address is entered.
                   rulesDescription 1.3.6.1.4.1.3181.10.6.3.51.4.1.3 displaystring read-write
Enter any information required to remember what this rule is intended to do.
                   rulesMode 1.3.6.1.4.1.3181.10.6.3.51.4.1.4 integer read-write
Use UNUSED to temporarily suspend an entry. Use ACCEPT when the matched entry should be treated as valid. Use DENY when a matched entry should be treated as invalid match. Enumeration: 'unused': 0, 'deny': 2, 'permit': 1.
                   rulesEtherType 1.3.6.1.4.1.3181.10.6.3.51.4.1.5 integer32 read-write
Use 2048 to match IPv4 (0x800), 34525 to match IPv6 (0x86DD). A value of 0 ignores this field. The field is also ignored for ARP inspection rules.
                   rulesProtocol 1.3.6.1.4.1.3181.10.6.3.51.4.1.6 integer32 read-write
Use 6 to specifiy tcp, 17 for udp, etc. Use to ignore the protocol field. This field is also ignored for arp inspection rules.
                   rulesVlanId 1.3.6.1.4.1.3181.10.6.3.51.4.1.7 integer32 read-write
VLAN ID for which this entry is valid. A value of 0 ignores this field.
                   rulesSourceMac 1.3.6.1.4.1.3181.10.6.3.51.4.1.8 macaddress read-write
MAC address entry.
                   rulesSourceIp 1.3.6.1.4.1.3181.10.6.3.51.4.1.9 octet string read-write
IP address associated with the given MAC.
                   rulesSourceMask 1.3.6.1.4.1.3181.10.6.3.51.4.1.10 octet string read-write
The mask my be used to create a valid address range.
                   rulesSourcePort 1.3.6.1.4.1.3181.10.6.3.51.4.1.11 integer32 read-write
May be used to specify a specific udp/tcp port. A value of 0 ignores this field. The field is also ignored for ARP inspection rules.
                   rulesDestinationMac 1.3.6.1.4.1.3181.10.6.3.51.4.1.12 macaddress read-write
MAC address entry. This field is ignored for ARP inspection rules.
                   rulesDestinationIp 1.3.6.1.4.1.3181.10.6.3.51.4.1.13 octet string read-write
IP address associated with the given MAC. This field is ignored for ARP inspection rules.
                   rulesDestinationMask 1.3.6.1.4.1.3181.10.6.3.51.4.1.14 octet string read-write
The mask my be used to create a valid address range. This field is ignored for ARP inspection rules.
                   rulesDestinationPort 1.3.6.1.4.1.3181.10.6.3.51.4.1.15 integer32 read-write
May be used to specify a specific udp/tcp port. A value of 0 ignores this field. The field is also ignored for ARP inspection rules.