HH3C-DHCPSNOOP-MIB: View SNMP OID List / Download MIB
VENDOR: H3C
Home | MIB: HH3C-DHCPSNOOP-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
hh3cDhcpSnoop | 1.3.6.1.4.1.25506.2.36 |
The private MIB file includes the DHCP Snooping profile. |
||
hh3cDhcpSnoopMibObject | 1.3.6.1.4.1.25506.2.36.1 | |||
hh3cDhcpSnoopEnable | 1.3.6.1.4.1.25506.2.36.1.1 | integer | read-write |
DHCP Snooping status (enable or disable). Enumeration: 'enable': 1, 'disable': 2. |
hh3cDhcpSnoopTable | 1.3.6.1.4.1.25506.2.36.1.2 | no-access |
The table containing information of DHCP clients listened by DHCP snooping and it's enabled or disabled by setting hh3cDhcpSnoopEnable node. |
|
1.3.6.1.4.1.25506.2.36.1.2.1 | no-access |
An entry containing information of DHCP clients. |
||
hh3cDhcpSnoopClientIpAddressType | 1.3.6.1.4.1.25506.2.36.1.2.1.1 | inetaddresstype | no-access |
DHCP clients' IP addresses type (IPv4 or IPv6). |
hh3cDhcpSnoopClientIpAddress | 1.3.6.1.4.1.25506.2.36.1.2.1.2 | inetaddress | no-access |
DHCP clients' IP addresses collected by DHCP snooping. |
hh3cDhcpSnoopClientMacAddress | 1.3.6.1.4.1.25506.2.36.1.2.1.3 | macaddress | read-only |
DHCP clients' MAC addresses collected by DHCP snooping. |
hh3cDhcpSnoopClientProperty | 1.3.6.1.4.1.25506.2.36.1.2.1.4 | integer | read-only |
Method of getting IP addresses collected by DHCP snooping. Enumeration: 'dynamic': 2, 'static': 1. |
hh3cDhcpSnoopClientUnitNum | 1.3.6.1.4.1.25506.2.36.1.2.1.5 | integer | read-only |
IRF (Intelligent Resilient Fabric) unit number via whom the clients get their IP addresses. The value 0 means this device does not support IRF. |
hh3cDhcpSnoopTrustTable | 1.3.6.1.4.1.25506.2.36.1.3 | no-access |
A table is used to configure and monitor port trusted status. |
|
1.3.6.1.4.1.25506.2.36.1.3.1 | no-access |
An entry containing information about trusted status of ports. |
||
hh3cDhcpSnoopTrustStatus | 1.3.6.1.4.1.25506.2.36.1.3.1.1 | integer | read-write |
Trusted status of current port which supports both get and set operation. Enumeration: 'untrusted': 0, 'trusted': 1. |
hh3cDhcpSnoopVlanTable | 1.3.6.1.4.1.25506.2.36.1.4 | no-access |
A table is used to configure and monitor DHCP Snooping status of VLANs. |
|
1.3.6.1.4.1.25506.2.36.1.4.1 | no-access |
The entry information about hh3cDhcpSnoopVlanTable. |
||
hh3cDhcpSnoopVlanIndex | 1.3.6.1.4.1.25506.2.36.1.4.1.1 | integer32 | no-access |
Current VLAN index. |
hh3cDhcpSnoopVlanEnable | 1.3.6.1.4.1.25506.2.36.1.4.1.2 | truthvalue | read-write |
DHCP Snooping status of current VLAN. |
hh3cDhcpSnoopTraps | 1.3.6.1.4.1.25506.2.36.2 | |||
hh3cDhcpSnoopTrapsPrefix | 1.3.6.1.4.1.25506.2.36.2.0 | |||
hh3cDhcpSnoopSpoofServerDetected | 1.3.6.1.4.1.25506.2.36.2.0.1 |
To detect unauthorized DHCP servers on a network, the DHCP snooping device sends DHCP-DISCOVER messages through its downstream port (which is connected to the DHCP clients). If any response (DHCP-OFFER message) is received from the downstream port, an unauthorized DHCP server is considered present, and then the device sends a trap. With unauthorized DHCP server detection enabled, the interface sends a DHCP-DISCOVER message to detect unauthorized DHCP servers on the network. If this interface receives a DHCP-OFFER message, the DHCP server which sent it is considered unauthorized. |
||
hh3cDhcpSnoopTrapsObject | 1.3.6.1.4.1.25506.2.36.2.1 | |||
hh3cDhcpSnoopSpoofServerMac | 1.3.6.1.4.1.25506.2.36.2.1.1 | macaddress | no-access |
MAC address of the spoofing server and it is derived from link-layer header of offer packet. If the offer packet is relayed by dhcp relay entity, it may be the MAC address of relay entity. |
hh3cDhcpSnoopSpoofServerIP | 1.3.6.1.4.1.25506.2.36.2.1.2 | ipaddress | no-access |
IP address of the spoofing server and it is derived from IP header of offer packet. A tricksy host may send offer packet use other host's address, so this address can not always be trust. |