G6-DHCP-MIB: View SNMP OID List / Download MIB
VENDOR: MICROSENS
Home | MIB: G6-DHCP-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
protocol | 1.3.6.1.4.1.3181.10.6.2 |
Microsens private MIB for Generation 6 Ethernet Switches |
||
dhcp | 1.3.6.1.4.1.3181.10.6.2.49 | |||
dhcpEnableDhcpRelay | 1.3.6.1.4.1.3181.10.6.2.49.1 | integer | read-write |
General enable of dhcp relay function. Enumeration: 'disabled': 0, 'enabled': 1. |
dhcpEnableDhcpSnooping | 1.3.6.1.4.1.3181.10.6.2.49.2 | integer | read-write |
General enable of dhcp snooping function. Enumeration: 'disabled': 0, 'enabled': 1. |
dhcpEnablePppoeSnooping | 1.3.6.1.4.1.3181.10.6.2.49.3 | integer | read-write |
General enable of PPPoE snooping also known as PPPoE Intermediate Agent function. Enumeration: 'disabled': 0, 'enabled': 1. |
dhcpEnableArpInspection | 1.3.6.1.4.1.3181.10.6.2.49.4 | integer | read-write |
General enable of arp inspection function. Enumeration: 'disabled': 0, 'enabled': 1. |
dhcpUnblockPort | 1.3.6.1.4.1.3181.10.6.2.49.5 | displaystring | read-write |
This function may be used to unblock a port that has been set to blocking state due to DHCP flooding or due to ARP storm detection. The shorthand port format like 1 for 1/1 may be used. Syntax examples: dhcp.unblock_port = 1/2,1/5 or dhcp.unblock_port = 1/1-1/4. Also the syntax .. = 0-5 to unblock the first 6 ports is supported. |
dhcpClearSnoopingTable | 1.3.6.1.4.1.3181.10.6.2.49.6 | displaystring | read-write |
This function may be used to clear the content of the DHCP snooping table. |
relayConfigTable | 1.3.6.1.4.1.3181.10.6.2.49.7 | no-access |
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor. |
|
1.3.6.1.4.1.3181.10.6.2.49.7.1 | no-access | |||
relayConfigIndex | 1.3.6.1.4.1.3181.10.6.2.49.7.1.1 | integer | no-access |
Automatically generated |
relayConfigDhcpServerAddress | 1.3.6.1.4.1.3181.10.6.2.49.7.1.2 | displaystring | read-write |
Defines host address or network address where the dhcp server(s) resides. Also known as ip_helper_address. |
relayConfigRemoteIdSource | 1.3.6.1.4.1.3181.10.6.2.49.7.1.3 | integer | read-write |
Defines how the switch is identified when DHCP option 82 is used. (Suboption2) Enumeration: 'macAddress': 1, 'hostname': 0, 'portAlias': 4, 'userDefined': 3, 'sysName': 2. |
relayConfigCustomRemoteId | 1.3.6.1.4.1.3181.10.6.2.49.7.1.4 | displaystring | read-write |
This remote id is used for option 82 when 'remote_id_source' is set to USER_DEFINED. |
relayConfigCircuitIdSource | 1.3.6.1.4.1.3181.10.6.2.49.7.1.5 | integer | read-write |
Defines how the ports are identified when option 82 is used. (Suboption1) Enumeration: 'snmpPortId': 0, 'slotPortId': 1, 'portAlias': 2, 'ipSlotPortVlan': 3. |
relayPortConfigTable | 1.3.6.1.4.1.3181.10.6.2.49.8 | no-access |
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor. |
|
1.3.6.1.4.1.3181.10.6.2.49.8.1 | no-access | |||
relayPortConfigPortIndex | 1.3.6.1.4.1.3181.10.6.2.49.8.1.1 | integer | no-access |
Automatically generated |
relayPortConfigEnableDhcpRelay | 1.3.6.1.4.1.3181.10.6.2.49.8.1.2 | integer | read-write |
When enabled incoming DHCP requests are redirected to the dhcp server or network specified in 'dhcp.relay_config' Enumeration: 'disabled': 0, 'enabled': 1. |
relayPortConfigEnableOption82 | 1.3.6.1.4.1.3181.10.6.2.49.8.1.3 | integer | read-write |
When enabled incoming DHCP requests are modified in 'dhcp.relay_config' Enumeration: 'disabled': 0, 'enabled': 1. |
snoopingPortConfigTable | 1.3.6.1.4.1.3181.10.6.2.49.9 | no-access |
This configures the DHCP snooping function. DHCP snooping acts like a DHCP firewall between access and link ports. When enabled it ensures that for untrusted ports only DHCP requests are accepted. This prevents malicious users from injecting fake DHCP frames and thus invalid IP addresses. |
|
1.3.6.1.4.1.3181.10.6.2.49.9.1 | no-access | |||
snoopingPortConfigPortIndex | 1.3.6.1.4.1.3181.10.6.2.49.9.1.1 | integer | no-access |
Automatically generated |
snoopingPortConfigEnableDhcpSnooping | 1.3.6.1.4.1.3181.10.6.2.49.9.1.2 | integer | read-write |
This enables the DHCP snooping function per port. Enumeration: 'disabled': 0, 'enabled': 1. |
snoopingPortConfigDhcpFiltering | 1.3.6.1.4.1.3181.10.6.2.49.9.1.3 | integer | read-write |
DHCP filtering prevents DHCP responses being injected from a local access port. It acts like a DHCP firewall between access and link ports. Enumeration: 'disabled': 0, 'dropAndEvent': 1, 'blockAndEvent': 2. |
snoopingPortConfigSnoopingTrust | 1.3.6.1.4.1.3181.10.6.2.49.9.1.4 | integer | read-write |
DHCP responses are only accepted when they ingress on a trusted port. Typically these are the link ports. AUTO uses the port role and declares all up or downlink ports as trusted. Enumeration: 'auto': 0, 'untrusted': 1, 'trusted': 2. |
snoopingPortConfigAcceptIngressOption82 | 1.3.6.1.4.1.3181.10.6.2.49.9.1.5 | integer | read-write |
Normally incoming DHCP request incoming with Option 82 set will be discarded. When enabled then this check is ignored. Enumeration: 'disabled': 0, 'enabled': 1. |
snoopingPortConfigMacAddressVerification | 1.3.6.1.4.1.3181.10.6.2.49.9.1.6 | integer | read-write |
When a packet is received on an untrusted interface, and the source MAC address and the DHCP client MAC address do not match and this feature is enabled, the packet is dropped. Enumeration: 'disabled': 0, 'enabled': 1. |
snoopingPortConfigDhcpRateLimiting | 1.3.6.1.4.1.3181.10.6.2.49.9.1.7 | integer32 | read-write |
Defines how many DHCP request are accepted per second. When the limit is reached, DHCP flooding is assumed and the port is blocked. The value 0 disables the rate limit check. |
snoopingPortConfigClearSnoopingStatistics | 1.3.6.1.4.1.3181.10.6.2.49.9.1.8 | displaystring | read-write |
Reset all DHCP related statistics and reason. The snooping binding table is not affected. |
pppoeConfigTable | 1.3.6.1.4.1.3181.10.6.2.49.10 | no-access |
This table defines the general parameter for PPPoE Intermediate Agent feature. |
|
1.3.6.1.4.1.3181.10.6.2.49.10.1 | no-access | |||
pppoeConfigIndex | 1.3.6.1.4.1.3181.10.6.2.49.10.1.1 | integer | no-access |
Automatically generated |
pppoeConfigVendorId | 1.3.6.1.4.1.3181.10.6.2.49.10.1.2 | unsigned32 | read-write |
Vendor identification that this device adds to a PPPoE request before forwarding it to the server. |
pppoeConfigRemoteIdSource | 1.3.6.1.4.1.3181.10.6.2.49.10.1.3 | integer | read-write |
The remote id identifies the client that requests a PPPoE connection. Enumeration: 'macAddress': 1, 'hostname': 0, 'portAlias': 4, 'userDefined': 3, 'sysName': 2. |
pppoeConfigCustomRemoteId | 1.3.6.1.4.1.3181.10.6.2.49.10.1.4 | displaystring | read-write |
This field is only used in a PPPoE request when the remote_id_source is set to USER_DEFINED. |
pppoeConfigCircuitIdSource | 1.3.6.1.4.1.3181.10.6.2.49.10.1.5 | integer | read-write |
This field defines how the port on which a PPPoE request comes in is identified. Enumeration: 'snmpPortId': 0, 'slotPortId': 1, 'portAlias': 2, 'ipSlotPortVlan': 3. |
pppoePortConfigTable | 1.3.6.1.4.1.3181.10.6.2.49.11 | no-access |
This table permits port specific enable of the PPPoE Intermediate Agent feature. |
|
1.3.6.1.4.1.3181.10.6.2.49.11.1 | no-access | |||
pppoePortConfigPortIndex | 1.3.6.1.4.1.3181.10.6.2.49.11.1.1 | integer | no-access |
Automatically generated |
pppoePortConfigEnablePppoeSnooping | 1.3.6.1.4.1.3181.10.6.2.49.11.1.2 | integer | read-write |
Enables PPPoE intermediate agent function also known as PPPoE Snooping for this port. Also observe the general enable parameter for PPPoE. Enumeration: 'disabled': 0, 'enabled': 1. |
arpInspectionPortConfigTable | 1.3.6.1.4.1.3181.10.6.2.49.12 | no-access |
This table defines the parameter for Dynamic ARP Inspection per port. These features should generally be used with untrusted ports. |
|
1.3.6.1.4.1.3181.10.6.2.49.12.1 | no-access | |||
arpInspectionPortConfigPortIndex | 1.3.6.1.4.1.3181.10.6.2.49.12.1.1 | integer | no-access |
Automatically generated |
arpInspectionPortConfigEnableArpInspection | 1.3.6.1.4.1.3181.10.6.2.49.12.1.2 | integer | read-write |
Generally enables Dynamic ARP Inspection. The details need to be configured per VLAN in separate table. This feature helps preventing from man-in-the-middle attacks to the network. Enumeration: 'disabled': 0, 'enabled': 1. |
arpInspectionPortConfigArpRateLimiting | 1.3.6.1.4.1.3181.10.6.2.49.12.1.3 | integer32 | read-write |
Defines how many ARP request are accepted per second. When the limit is reached, a DOS attack is assumed and the port is shut down. The value 0 disables the rate limit check. |
arpInspectionPortConfigInspectionDatabase | 1.3.6.1.4.1.3181.10.6.2.49.12.1.4 | integer | read-write |
When set to another value than NONE, the MAC-IP relationship of the incoming ARPs is verified against the selected table. This ensures that only valid MACs enter the network. Enumeration: 'dhcp': 1, 'none': 0, 'arpAcl': 2, 'both': 3. |
arpInspectionPortConfigArpAclName | 1.3.6.1.4.1.3181.10.6.2.49.12.1.5 | displaystring | read-write |
Name of the ACL (access control list) which declares which IP/MAC relations are acceptible. Note: ACLs are configured under Management.ACL. Several ACL may be specified with a comma separated list. Example acl1, otherlist |
arpInspectionPortConfigAclDefaultLogic | 1.3.6.1.4.1.3181.10.6.2.49.12.1.6 | integer | read-write |
Defines which action is taken when none of the ACL records matches. Default is deny which blocks the ARP. Enumeration: 'deny': 0, 'permit': 1. |
arpInspectionPortConfigSourceMacValidation | 1.3.6.1.4.1.3181.10.6.2.49.12.1.7 | integer | read-write |
Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. Packets with different MAC addresses are dropped. Enumeration: 'disabled': 0, 'enabled': 1. |
arpInspectionPortConfigDestMacValidation | 1.3.6.1.4.1.3181.10.6.2.49.12.1.8 | integer | read-write |
Checks the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. Packets with different MAC addresses are dropped. Enumeration: 'disabled': 0, 'enabled': 1. |
arpInspectionPortConfigIpRangeValidation | 1.3.6.1.4.1.3181.10.6.2.49.12.1.9 | integer | read-write |
Checks ARP for invalid addresses. Invalid addresses include 0.0.0.0, 255.255.255.255, and all IP multicast and loopback addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP addresses are checked only in ARP responses. Enumeration: 'disabled': 0, 'enabled': 1. |
snoopingStatisticsTable | 1.3.6.1.4.1.3181.10.6.2.49.100 | no-access |
Statistics indicating activity of DHCP snooping. |
|
1.3.6.1.4.1.3181.10.6.2.49.100.1 | no-access | |||
snoopingStatisticsPortIndex | 1.3.6.1.4.1.3181.10.6.2.49.100.1.1 | integer | no-access |
Automatically generated |
snoopingStatisticsTrustMode | 1.3.6.1.4.1.3181.10.6.2.49.100.1.2 | integer | read-only |
Reflects the determined trust mode. Enumeration: 'untrusted': 1, 'trusted': 2, 'undecided': 0. |
snoopingStatisticsNumberOfDhcpProcessed | 1.3.6.1.4.1.3181.10.6.2.49.100.1.3 | unsigned32 | read-only |
Counts the number of dhcp messages processed. |
snoopingStatisticsNumberOfDhcpDropped | 1.3.6.1.4.1.3181.10.6.2.49.100.1.4 | unsigned32 | read-only |
Counts the number of dhcp messages dropped. |
snoopingStatisticsLastDropReason | 1.3.6.1.4.1.3181.10.6.2.49.100.1.5 | integer | read-only |
Enumeration: 'dhcpServerSpoofed': 2, 'ok': 0, 'bindingMismatch': 4, 'illegalRelayAgent': 3, 'illegalDhcpServer': 1, 'flooding': 5. |
snoopingTableTable | 1.3.6.1.4.1.3181.10.6.2.49.101 | no-access |
This table lists the MAC-IP bindings of the untrusted ports (only) as discovered through DHCP snooping. |
|
1.3.6.1.4.1.3181.10.6.2.49.101.1 | no-access | |||
snoopingTableIndex | 1.3.6.1.4.1.3181.10.6.2.49.101.1.1 | integer | no-access |
Automatically generated |
snoopingTableMac | 1.3.6.1.4.1.3181.10.6.2.49.101.1.2 | macaddress | read-only |
MAC address entry |
snoopingTableIp | 1.3.6.1.4.1.3181.10.6.2.49.101.1.3 | octet string | read-only |
IP address associated with this MAC. |
snoopingTablePort | 1.3.6.1.4.1.3181.10.6.2.49.101.1.4 | integer32 | read-only |
Port number for MAC address |
snoopingTableVlan | 1.3.6.1.4.1.3181.10.6.2.49.101.1.5 | integer32 | read-only |
if non zero this MAC is part of this VLAN. |
snoopingTableLastUpdated | 1.3.6.1.4.1.3181.10.6.2.49.101.1.6 | displaystring | read-only |
Time stamp when this record was written |
snoopingTableLastUpdatedEpoch | 1.3.6.1.4.1.3181.10.6.2.49.101.1.7 | unsigned32 | read-only |
Time stamp in alternate format |
snoopingTableLeaseTime | 1.3.6.1.4.1.3181.10.6.2.49.101.1.8 | counter32 | read-only |
Lease time as reported by DHCP server |