HP-USER-AUTH: View SNMP OID List / Download MIB
VENDOR: HEWLETT-PACKARD
Home | MIB: HP-USER-AUTH | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
hpicfUsrAuthMIB | 1.3.6.1.4.1.11.2.14.11.5.1.19 |
This MIB module contains the definitions of Managed Objects for various subsystems that perform user authentication. The subsystems under control by this MIB are: WebAuth - Web-based login authentication MacAuth - MAC address-based authentication CLI Password - CLI-based login authentication |
||
hpicfUsrAuthNotifications | 1.3.6.1.4.1.11.2.14.11.5.1.19.0 | |||
hpicfUsrAuthCLIAuthFail | 1.3.6.1.4.1.11.2.14.11.5.1.19.0.1 |
This notification signifies that CLI password authentication has failed. Operational control of this notification is provided using hpicfUsrAuthCliNotifyEnable. Agents complying with hpicfUsrAuthCompliance6 always additionally include hpicfUsrAuthLastLoginStatus. They may include hpicfUsrAuthLastLoginNotifyAddrType and hpicfUsrAuthLastLoginNotifyAddr to identify the source of the login attempt. They may also include an instance of hpicfUsrAuthLastLoginGeneration. The hpicfUsrAuthLastLoginEntry index in this object may be used to retrieve other objects in the row that identify the target user of this login attempt. If this index is zero, then the login attempt was to an unknown username. The value of hpicfUsrAuthLastLoginGeneration supplied in the notification should be compared to the retrieved object value to ensure that the row has not changed since the notification was sent. |
||
hpicfUsrAuthPasswdChng | 1.3.6.1.4.1.11.2.14.11.5.1.19.0.2 |
An hpicfUsrAuthPasswdChng notification signifies that the manager password has been changed. The value of hpicfUsrAuthCLIPasswdSet can be used to determine whether the password has been set or cleared by this action. |
||
hpicfPortSecAuthFailure | 1.3.6.1.4.1.11.2.14.11.5.1.19.0.3 |
This notification indicates a failed Port Security (network access) authentication event. |
||
hpicfUsrAuthSystem | 1.3.6.1.4.1.11.2.14.11.5.1.19.1 | |||
hpicfUsrAuthWebAuthDhcpBaseAddress | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.1 | ipaddress | read-write |
For all ports running with web authentication enabled: Specifies the base address that should be used by the switch DHCP server for web-based authentication purposes. |
hpicfUsrAuthWebAuthDhcpMask | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.2 | ipaddress | read-write |
For all ports running with web authentication enabled: Specifies the subnet mask to be used in conjunction with the DHCP base address when servicing DHCP requests. Allowable mask range is 255.255.240.0 (20) to 255.255.255.0 (24). |
hpicfUsrAuthWebAuthDhcpLease | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.3 | integer32 | read-write |
For all ports running with web authentication enabled: Specifies the DHCP lease length in seconds. |
hpicfUsrAuthMacAuthAddrFormat | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.4 | integer | read-write |
For all ports running with MAC authentication enabled: Specifies the MAC address format to use in the RADIUS access-request, as follows: 'noDelimiter' - Sends MAC address in aabbccddeeff format 'singleDash' - Sends MAC address in aabbcc-ddeeff format 'multiDash' - Sends MAC address in aa-bb-cc-dd-ee-ff format 'multiColon' - Sends MAC address in aa:bb:cc:dd:ee:ff format 'noDelimiterUppercase' - Sends MAC address in AABBCCDDEEFF format 'singleDashUppercase' - Sends MAC address in AABBCC-DDEEFF format 'multiDashUppercase' - Sends MAC address in AA-BB-CC-DD-EE-FF format 'multiColonUppercase' - Sends MAC address in AA:BB:CC:DD:EE:FF format The default value is noDelimiter(1). Enumeration: 'singleDashUppercase': 6, 'multiColonUppercase': 8, 'multiColon': 4, 'multiDash': 3, 'noDelimiter': 1, 'noDelimiterUppercase': 5, 'singleDash': 2, 'multiDashUppercase': 7. |
hpicfUsrAuthCliNotifyEnable | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.5 | integer | read-write |
The operational status of hpicfUsrAuthCliAuthFail notifications. The default value is 1 (Enabled). A value of 2 represents Disabled. Writing this object requires authentication, such as provided by SNMPv3. Enumeration: 'disabled': 2, 'enabled': 1. |
hpicfUsrAuthCLIInterface | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.6 | integer | no-access |
The physical interface, network protocol, or other authentication type that is associated with this notification. Enumeration: 'sshPublicKey': 4, 'telnet': 2, 'portAccess': 6, 'other': 9, 'ssh': 3, 'serial': 1, 'webui': 5. |
hpicfUsrAuthCLIPasswdSet | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.7 | truthvalue | no-access |
Indicates whether the CLI manager password is set. 1 indicates True while 2 indicates False. |
hpicfUsrAuthCLIFailCnt | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.8 | integer32 | no-access |
The count of hpicfUsrAuthPasswdFail notifications sent by the hpicfUsrAuth entity to the SNMP entity. The actual count of notifications sent by SNMP may be lower due to rate limiting or configuration. |
hpicfUsrAuthCLIPwdNotifyCnt | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.9 | unsigned32 | no-access |
A count of CLI password change notifications sent from the Auth entity to the SNMP entity within the switch. This count may therefore differ from the count of notifications actually sent by the SNMP entity due to switch configuration (e.g., the value of hpicfUsrAuthNotifyEnable.) |
hpicfUsrAuthWMAFailCnt | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.10 | unsigned32 | no-access |
The count of hpicfPortSecAuthFailure notifications sent by the hpicfUsrAuth entity to the SNMP entity. The actual count of notifications sent by SNMP may be lower due to rate limiting or configuration. |
hpicfUsrAuthWMAFailMAC | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.11 | macaddress | no-access |
The MAC address supplied in the failed authentication request. |
hpicfUsrAuthWMAFailPort | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.12 | integer32 | no-access |
The port index of the failed authentication request. |
hpicfUsrAuthWMAFailVlan | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.13 | integer32 | no-access |
The VLAN ID associated with the failed authentication request. |
hpicfUsrAuthPortSecNotifyEnable | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.14 | integer | read-write |
Provides operational control of hpicfPortSecAuthFailure notification. When enabled (1), the notification will be sent. When disabled (2), the notification will not be sent. Setting this object requires authentication, such as provided by SNMPv3. Enumeration: 'disabled': 2, 'enabled': 1. |
hpicfUsrAuthPasswdNotifyEnable | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.15 | integer | read-write |
Provides operational control of hpicfUsrAuthPasswdChng notification. When enabled (1), the notification will be sent. When disabled (2), the notification will not be sent. Setting this object requires authentication, such as provided by SNMPv3. Enumeration: 'disabled': 2, 'enabled': 1. |
hpicfUsrAuthWMAEWAServerTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.16 | no-access |
A table of the Enhanced Web Auth servers. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.1.16.1 | no-access |
Addresses for an Enhanced Web Auth server. |
||
hpicfUsrAuthWMAeWAServerIndex | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.16.1.1 | integer32 | no-access |
Index into hpicfUsrAuthWMAEWAServerTable. |
hpicfUsrAuthWMAeWAServerIPAddressType | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.16.1.2 | inetaddresstype | read-only |
The type of Enhanced Web Auth Server Address. |
hpicfUsrAuthWMAeWAServerIPAddress | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.16.1.3 | inetaddress | read-only |
The IP address of the Enhanced Web Auth Server. If set to 0.0.0.0 or URL not configured no Enhanced Web Auth Server will run. |
hpicfUsrAuthWMAeWAServerPath | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.16.1.4 | octet string | read-only |
The Enhanced Web Auth Server Path for the location of the Enhanced Web Auth Pages. If not configured the default path will be used. |
hpicfUsrAUthWMAeWAServerRowStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.16.1.5 | rowstatus | read-only |
This marks the row as active/inactive. |
hpicfUsrAuthRedirectServerTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.17 | no-access |
A table of the authentication Redirect Servers. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.1.17.1 | no-access |
Attributes of an authentication Redirect Server. |
||
hpicfUsrAuthRedirectServerIndex | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.17.1.1 | integer32 | no-access |
Index into hpicfUsrAuthRedirectServerTable. |
hpicfUsrAuthRedirectServerURL | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.17.1.2 | octet string | read-only |
This object represents the authentication Redirect Server's complete URL for the location of the redirect server login or warning page. This value must begin with 'http://' or 'https://' and should include the DNS name, TCP port of the server if not 80 or SSL's 443, and the page path, if necessary. |
hpicfUsrAuthRedirectServerRowStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.17.1.3 | rowstatus | read-only |
This object indicates the status of this entry. Must NOT be active in order to modify some other column of this config entry. |
hpicfUsrAuthRedirectServerRestrictiveFilter | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.18 | integer | read-write |
If enabled, only the configured initial web page will be returned for all client requests. The enabled state would generally be used to simply display an informative warning message to failed macAuth clients. If disabled, all client/redirect-server http traffic will be permitted. Enumeration: 'disabled': 2, 'enabled': 1. |
hpicfUsrAuthRedirectServerClientTimeout | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.19 | integer32 | read-write |
The time (in seconds) that a client will be left in the unauthorized authentication redirection state before being removed from the state tables, temporarily suspending further client/redirect-server http traffic. After state table removal, client is free to initiate authentication. |
hpicfUsrAuthRedirectServerAuthFailureStats | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.20 | counter32 | read-only |
The total number of times clients fail authentication and initiate the authentication Redirect Server process since reboot. A single client can be counted multiple times. |
hpicfUsrAuthCacheCredTimeOut | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.21 | integer32 | read-write |
Specifies the time in seconds, that the switch should remove the credentials. Reauthentication should take place with in small amount of time. |
hpicfUsrAuthClientReauthenticateTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.22 | no-access |
A table containing configuration/control variables indexed by port and client MAC. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.1.22.1 | no-access |
The table entry provides the means by which a client on an authentication interface can be forced to reauthenticate. |
||
hpicfUsrAuthClientReauthenticateInterfaceIndex | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.22.1.1 | interfaceindex | no-access |
Index of client interfaces. |
hpicfUsrAuthClientReauthenticateMacAddress | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.22.1.2 | macaddress | no-access |
Specifies the MAC address of the client. |
hpicfUsrAuthClientReauthenticate | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.22.1.3 | truthvalue | read-write |
The reauthentication control for this client on this authentication interface. Setting this attribute TRUE forces this authenticated client to reauthenticate. That is, the client is deauthenticated and must transmit traffic in order to trigger reauthentication. Setting this attribute FALSE has no effect. |
hpicfUsrAuthMacAuthPassword | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.23 | octet string | read-write |
This object represents the secret password value used by all MAC auth clients. The default value of password is NULL. The password if set(non NULL) will be used instead of MAC address while constructing Radius request packet. The current maximum length of password is 16. |
hpicfUsrAuthWebAuthAccessDeniedMode | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.24 | integer | read-write |
Specifies the access denied mode that applies to the custom message embedded into the login failure page. The values: disabled (1) - the feature is disabled. custom (2) - use the string configured by administrator via CLI or SNMP. radius (3) - use the string in the 'reply-message' attribute of the received RADIUS response message. Enumeration: 'disabled': 1, 'radius': 3, 'custom': 2. |
hpicfUsrAuthWebAuthAccessDeniedMessage | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.25 | octet string | read-write |
Text of the access denied message that will be embedded into the custom web auth login failure page. This message will only be used when the access denied mode is set to 'custom'. It can take up to 250 characters |
hpicfUsrAuthMacAuthUsrNumberCnt | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.26 | counter32 | read-only |
This object specifies the total number of authenticated clients currently present in the switch. This does not include the clients which are under process of authentication. |
hpicfUsrAuthLastLoginNotifyStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.27 | integer | no-access |
The status of the failed login attempt. successful(1) is not currently used. failed(2) indicates a regular failure that did not cause user lockout. failedLockOut(3) indicates a failure that caused user lockout. lockedOut(4) indicates that the user was locked out before the attempt was made. tableFull(5) indicates lockout due to a full lockout table, likely an indication of a serious attack. Enumeration: 'successful': 1, 'unknown': 0, 'tableFull': 5, 'failedLockOut': 3, 'failed': 2, 'lockedOut': 4. |
hpicfUsrAuthLastLoginNotifyAddrType | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.28 | inetaddresstype | no-access |
The type of IP address from which the user's most recent login attempt occurred. Unknown(0) indicates the console. |
hpicfUsrAuthLastLoginNotifyAddr | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.29 | inetaddress | no-access |
The IP address from which the user's most recent login attempt occurred. |
hpicfUsrAuthUseLLDPData | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.30 | truthvalue | read-write |
Enable or disable LLDP data inclusion in client authentication, which, in addition to using the source MAC address of incoming packets, also uses client information in the LLDP payload to authenticate clients. |
hpicfUsrAuthMacAuthPasswordEncrypted | 1.3.6.1.4.1.11.2.14.11.5.1.19.1.31 | octet string | read-write |
This object represents the encrypted format of password value stored in the object hpicfUsrAuthMacAuthPassword. This object may only be read or written when hpSwitchAuthenticationEncryptCredentialsMethod is set to a value other than none(0). This object should only be written with an encrypted key. |
hpicfUsrAuthPorts | 1.3.6.1.4.1.11.2.14.11.5.1.19.2 | |||
hpicfUsrAuthPortTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.2.1 | no-access |
A table of system level information about Web- MAC-based authentication for each port in the switch. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.2.1.1 | no-access |
The port number, operational mode and reauthentication control for each switch port. |
||
hpicfUsrAuthPortNumber | 1.3.6.1.4.1.11.2.14.11.5.1.19.2.1.1.1 | interfaceindex | no-access |
The port number associated with this switch port. |
hpicfUsrAuthWebAuthAdminStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.2.1.1.2 | truthvalue | read-write |
Setting this attribute TRUE enables web-based authentication services. A value of FALSE disabled web-based authentication. This attribute cannot be set TRUE concurrently with hpicfUsrAuthMacAuthAdminStatus. |
hpicfUsrAuthMacAuthAdminStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.2.1.1.3 | truthvalue | read-write |
Setting this attribute TRUE enables MAC-based authentication services. A value of FALSE disabled MAC-based authentication. This attribute cannot be set TRUE concurrently with hpicfUsrAuthWebAuthAdminStatus. |
hpicfUsrAuthPortReauthenticate | 1.3.6.1.4.1.11.2.14.11.5.1.19.2.1.1.4 | truthvalue | read-write |
The reauthentication control for this port. Setting this attribute TRUE forces all authenticated clients to reauthenticate themselves. Setting this attribute FALSE has no effect. This attribute always returns FALSE when read. |
hpicfUsrAuthLMAAdminStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.2.1.1.5 | truthvalue | read-write |
Setting this attribute TRUE enables Local MAC-based authentication services. A value of FALSE disabled MAC-based authentication. This attribute cannot be set TRUE concurrently with hpicfUsrAuthWebAuthAdminStatus. |
hpicfUsrAuthLLDPBypassAdminStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.2.1.1.6 | truthvalue | read-write |
Setting this attribute as TRUE enables lldp-bypass authentication. A value of FALSE disables lldp-bypass authentication. This attribute cannot be set to TRUE concurrently with MAC lockdown, MACsec, Trunk, Distributed Trunking and mesh port features. The lldp-bypass feature is limited only for Aruba-APs that send special LLDP TLVs. |
hpicfUsrAuthWebAuthConfig | 1.3.6.1.4.1.11.2.14.11.5.1.19.3 | |||
hpicfUsrAuthWebAuthConfigTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1 | no-access |
A table that contains the configuration objects for Web-based Authentication associated with each port. An entry appears in this table for each port that may authenticate access to itself. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1 | no-access |
The configuration information for Web-based authentication. |
||
hpicfUsrAuthWebAuthClientLimit | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.1 | integer32 | read-write |
The maximum number of authenticated clients to allow on the port. |
hpicfUsrAuthWebAuthClientMoves | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.2 | integer | read-write |
Specifies whether client may roam across ports under web authentication control. Setting this attribute 'enabled'allows authenticated clients to roam to other ports under web authentication control (that also have this attribute set to 'enabled') without requiring a reauthentication. Setting this attribute 'disabled' disallows authenticated clients from roaming to other ports (regardless of that port's attribute value). The client has to reauthenticate, if it attempts to roam. Enumeration: 'disabled': 1, 'enabled': 2. |
hpicfUsrAuthWebAuthSSLState | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.3 | integer | read-write |
Specifies whether web-based authentication should use an SSL connection (i.e. https://) to switch to collect client credentials. Note: A valid certificate must be configured on switch before SSL connections are enabled. Enumeration: 'disabled': 1, 'enabled': 2. |
hpicfUsrAuthWebAuthRedirectUrl | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.4 | octet string | read-write |
Specifies the URL, to which an authenticated client should be redirected, after successful authentication. |
hpicfUsrAuthWebAuthQuietPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.5 | integer32 | read-write |
Specifies the time, in seconds, that the switch should refrain from reattempting an authentication request for a client whose credentials were rejected. |
hpicfUsrAuthWebAuthServerTimeout | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.6 | integer32 | read-write |
Specifies the time, in seconds, that the switch should wait for an authentication reply to return before considering it as timed out. |
hpicfUsrAuthWebAuthServerMaxReq | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.7 | integer32 | read-write |
Specifies the number of authentication requests that must time out before failing authentication. |
hpicfUsrAuthWebAuthMaxRetries | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.8 | integer32 | read-write |
Specifies the number of authentication requests that must fail (i.e. invalid credentials) before failing authentication. |
hpicfUsrAuthWebAuthLogoffPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.9 | integer32 | read-write |
Specifies the period, in seconds, at which an authenticated client will be considered unauthenticated for a lack of activity (i.e. traffic originating from client). |
hpicfUsrAuthWebAuthReAuthPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.10 | integer32 | read-write |
Specifies the period, in seconds, at which an authenticated client must reauthenticate. A value of 0 signifies that an authenticated client will never have to reauthenticate. When hpSwitchAutzUserRoleEnabled is true, this value will be superseded by the value of hpSwitchAutzUserRoleReauthPeriod from the client's assigned role. |
hpicfUsrAuthWebAuthAuthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.11 | vlanindex | read-write |
Specifies the port VID (PVID) that should be used for an authenticated client. When hpSwitchAutzUserRoleEnabled is true, this value may be superseded by the value of hpSwitchAutzUserRoleVlanId or hpSwitchAutzUserRoleVlanName from the client's assigned role. |
hpicfUsrAuthWebAuthUnauthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.12 | vlanindex | read-write |
Specifies the port VID (PVID) that should be used for an unauthenticated client. When hpSwitchAutzUserRoleEnabled is true, this value may be superseded by the value of hpSwitchAutzUserRoleVlanId or hpSwitchAutzUserRoleVlanName from the role identified by hpSwitchAutzUserRoleInitialRoleName. |
hpicfUsrAuthWebAuthCacheCredentials | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.13 | integer | read-write |
Specifies whether to cache client credentials or not. Setting this variable 'enabled' allows to cache authenticated clients credentials. Setting this variable 'disabled' disallows to cache authenticated clients credentials. Enumeration: 'disabled': 1, 'enabled': 2. |
hpicfUsrAuthWebAuthCachedReauthPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.1.1.14 | unsigned32 | read-write |
The value indicates the period in seconds, during which cached reauthentication is allowed on the port. If value is zero then the period of cached reauthentication is unlimited. |
hpicfUsrAuthWebAuthClientReauthenticateTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.2 | no-access |
A table containing WebAuth configuration/control variables indexed by port and client MAC. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.3.2.1 | no-access |
The table entry provides the means by which a WebAuth client on an authentication interface can be forced to reauthenticate. |
||
hpicfUsrAuthWebAuthClientReauthenticateInterfaceIndex | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.2.1.1 | interfaceindex | no-access |
Index of WebAuth client interfaces. |
hpicfUsrAuthWebAuthClientReauthenticateMacAddress | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.2.1.2 | macaddress | no-access |
Specifies the MAC address of the client. |
hpicfUsrAuthWebAuthClientReauthenticate | 1.3.6.1.4.1.11.2.14.11.5.1.19.3.2.1.3 | truthvalue | read-write |
The reauthentication control for this client on this authentication interface. Setting this attribute TRUE forces this authenticated WebAuth client to reauthenticate. That is, the client is deauthenticated and must transmit traffic in order to trigger reauthentication. Setting this attribute FALSE has no effect. |
hpicfUsrAuthMacAuthConfig | 1.3.6.1.4.1.11.2.14.11.5.1.19.4 | |||
hpicfUsrAuthMacAuthConfigTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1 | no-access |
A table that contains the configuration objects for Mac-based Authentication associated with each port. An entry appears in this table for each port that may authenticate access to itself. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1 | no-access |
The configuration information for Mac-based authentication. |
||
hpicfUsrAuthMacAuthClientLimit | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.1 | integer32 | read-write |
The maximum number of authenticated clients to allow on the port. |
hpicfUsrAuthMacAuthClientMoves | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.2 | integer | read-write |
Specifies whether client may roam across ports under web authentication control. Setting this attribute 'enabled'allows authenticated clients to roam to other ports under web authentication control (that also have this attribute set to 'enabled') without requiring a reauthentication. Setting this attribute 'disabled' disallows authenticated clients from roaming to other ports (regardless of that port's attribute value). The client has to reauthenticate, if it attempts to roam. Enumeration: 'disabled': 1, 'enabled': 2. |
hpicfUsrAuthMacAuthQuietPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.3 | integer32 | read-write |
Specifies the time, in seconds, that the switch should refrain from reattempting an authentication request for a client whose credentials were rejected. |
hpicfUsrAuthMacAuthServerTimeout | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.4 | integer32 | read-write |
Specifies the time, in seconds, that the switch should wait for an authentication reply to return before considering it as timed out. |
hpicfUsrAuthMacAuthServerMaxReq | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.5 | integer32 | read-write |
Specifies the number of authentication requests that must time out before failing authentication. |
hpicfUsrAuthMacAuthLogoffPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.6 | integer32 | read-write |
Specifies the period, in seconds, at which an authenticated client will be considered unauthenticated for a lack of activity (i.e. traffic originating from client). |
hpicfUsrAuthMacAuthReAuthPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.7 | integer32 | read-write |
Specifies the period, in seconds, at which an authenticated client must reauthenticate. A value of 0 signifies that an authenticated client will never have to reauthenticate. When hpSwitchAutzUserRoleEnabled is true, this value will be superseded by the value of hpSwitchAutzUserRoleReauthPeriod from the client's assigned role. |
hpicfUsrAuthMacAuthAuthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.8 | vlanindex | read-write |
Specifies the port VID (PVID) that should be used for an authenticated client. When hpSwitchAutzUserRoleEnabled is true, this value may be superseded by the value of hpSwitchAutzUserRoleVlanId or hpSwitchAutzUserRoleVlanName from the client's assigned role. |
hpicfUsrAuthMacAuthUnauthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.9 | vlanindex | read-write |
Specifies the port VID (PVID) that should be used for an unauthenticated client. When hpSwitchAutzUserRoleEnabled is true, this value may be superseded by the value of hpSwitchAutzUserRoleVlanId or hpSwitchAutzUserRoleVlanName from the role identified by hpSwitchAutzUserRoleInitialRoleName. |
hpicfUsrAuthMacAuthCachedReauthPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.10 | unsigned32 | read-write |
The value indicates the period in seconds, during which cached reauthentication is allowed on the port. If value is zero then the period of cached reauthentication is unlimited. |
hpicfUsrAuthMacAuthUnAuthPeriod | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.11 | integer32 | read-write |
Specifies the period, in seconds, at which an authenticated client must reauthenticate. A value of 0 signifies that an authenticated client will never have to reauthenticate. |
hpicfUsrAuthMacAuthMode | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.12 | integer | read-only |
This object provides information about the authentication mode of a specific port performing MAC authentication. In 'userBased' mode, the port performing MAC authentication will authenticate every client coming in the port; the port will change into 'portBased' mode when a client is authenticated on the port and is authorized to open its connecting switch port to all other clients (i.e., its client account on the RADIUS server is configured with VSA 'HP-Port-Auth-Mode-MA'). A port in portBased MAC authentication mode will grant access for any client coming in the port. Enumeration: 'userBased': 1, 'portBased': 2. |
hpicfUsrAuthMacPin | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.13 | truthvalue | read-write |
Enables MAC-Pinning on this port. Setting this attribute TRUE pins the authenticated MAC addresses to the Mac address table. Authenticated clients will not be de-authenticated even when clients are inactive throughout the logoff period. |
hpicfMacAuthRetainUnauthClients | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.1.1.14 | truthvalue | read-write |
Setting this attribute TRUE(1) allows access to Mac-based unauthorized clients by placing the port in unauthorized VLAN during reauthentication. |
hpicfUsrAuthMacAuthClientReauthenticateTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.2 | no-access |
A table containing macAuth configuration/control variables indexed by port and client MAC. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.4.2.1 | no-access |
The table entry provides the means by which a macAuth client on an authentication interface can be forced to reauthenticate. |
||
hpicfUsrAuthMacAuthClientReauthenticateInterfaceIndex | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.2.1.1 | interfaceindex | no-access |
Index of macAuth client interfaces. |
hpicfUsrAuthMacAuthClientReauthenticateMacAddress | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.2.1.2 | macaddress | no-access |
Specifies the MAC address of the client. |
hpicfUsrAuthMacAuthClientReauthenticate | 1.3.6.1.4.1.11.2.14.11.5.1.19.4.2.1.3 | truthvalue | read-write |
The reauthentication control for this client on this authentication interface. Setting this attribute TRUE forces this authenticated macAuth client to reauthenticate. That is, the client is deauthenticated and must transmit traffic in order to trigger reauthentication. Setting this attribute FALSE has no effect. |
hpicfUsrAuthWebAuthStats | 1.3.6.1.4.1.11.2.14.11.5.1.19.5 | |||
hpicfUsrAuthWebAuthSessionStatsTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1 | no-access |
A table that contains session statistic objects for each client (i.e. user) attempting to authenticate to a port with Web-authentication enabled. An entry appears in this table for each port in the switch. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1 | no-access |
The session statistics information for a port with Web-based authentication enabled. This shows the current values being collected for active sessions. |
||
hpicfUsrAuthWebAuthSessionMacAddr | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.1 | macaddress | read-only |
Specifies the MAC address of the client. |
hpicfUsrAuthWebAuthSessionName | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.2 | snmpadminstring | read-only |
Specifies the username of the client. |
hpicfUsrAuthWebAuthSessionState | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.3 | integer | read-only |
Specifies the state of the client as follows: 'authenticated' - authenticated client 'unauthenticated' - unauthenticated client, waiting for credentials 'authenticating' - credentials have been sent for verification, waiting for response 'authReqRejectNoVlan' - credentials invalid; client does not have access to unauthenticated VLAN 'authReqRejectUnauthVlan' - credentials invalid; client does have access to unauthenticated VLAN 'authReqTimeoutNoVlan' - credentials could not be verified; client is still unauthenticated and does not have access to unauthenticated VLAN 'authReqTimeoutUnauthVlan' - credentials could not be verified; client is still unauthenticated, but has access to unauthenticated VLAN 'initialRole' - client is assigned the initial role 'initialRoleFailed' - initial role could not be applied; client does not have access to the network 'criticalAuth - client is authenticated on critical VLAN 'openAUth - client is authenticated on open auth VLAN Enumeration: 'authReqTimeoutUnauthVlan': 7, 'authenticated': 1, 'authReqTimeoutNoVlan': 6, 'authReqRejectNoVlan': 4, 'unauthenticated': 2, 'initialRoleFailed': 9, 'initialRole': 8, 'criticalAuth': 10, 'authReqRejectUnauthVlan': 5, 'openAuth': 11, 'authenticating': 3. |
hpicfUsrAuthWebAuthSessionStateTime | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.4 | unsigned32 | read-only |
The duration, in seconds, a client has spent in the state specified by hpicfUsrAuthSessionState. |
hpicfUsrAuthWebAuthSessionAuthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.5 | vlanindex | read-only |
Specifies the PVID that the authenticated client is utilizing. If client is unauthenticated, this object has no meaning. |
hpicfUsrAuthWebAuthSessionUnauthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.6 | vlanindex | read-only |
Specifies the PVID that the unauthenticated client is utilizing. If client is authenticated, this object has no meaning. |
hpicfUsrAuthWebAuthSessionTimeout | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.7 | unsigned32 | read-only |
Specifies the RADIUS Server set session timeout for reauthentication of the user. When ST = 0, user gets reauthenticated at reauth-period secs, ST < 60 it is set to 60 secs and then user is reauthenticated, ST > 60 user is reauthenticated at ST secs. |
hpicfUsrAuthWebAuthSessionRole | 1.3.6.1.4.1.11.2.14.11.5.1.19.5.1.1.8 | hpautzuserrolename | read-only |
When hpSwitchAutzUserRoleEnabled is true, specifies the user role of the client. |
hpicfUsrAuthMacAuthStats | 1.3.6.1.4.1.11.2.14.11.5.1.19.6 | |||
hpicfUsrAuthMacAuthSessionStatsTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1 | no-access |
A table that contains session statistic objects for each client (i.e. user) attempting to authenticate to a port with MAC-authentication enabled. An entry appears in this table for each port in the switch. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1 | no-access |
The session statistics information for a port with Mac-based authentication enabled. This shows the current values being collected for active sessions. |
||
hpicfUsrAuthMacAuthSessionMacAddr | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.1 | macaddress | read-only |
Specifies the MAC address of the client. |
hpicfUsrAuthMacAuthSessionState | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.2 | integer | read-only |
Specifies the state of the client as follows: 'authenticated' - authenticated client 'unauthenticated' - unauthenticated client, waiting for credentials 'authenticating' - credentials have been sent for verification, waiting for response 'authReqRejectNoVlan' - credentials invalid; client does not have access to unauthenticated VLAN 'authReqRejectUnauthVlan - credentials invalid; client does have access to unauthenticated VLAN 'authReqTimeoutNoVlan' - credentials could not be verified; client is still unauthenticated and does not have access to unauthenticated VLAN 'authReqTimeoutUnauthVlan' - credentials could not be verified; client is still unauthenticated, but has access to unauthenticated VLAN 'initialRole' - client is assigned the initial role 'initialRoleFailed' - initial role could not be applied; client does not have access to the network 'criticalAuth - client is authenticated on critical VLAN 'openAUth - client is authenticated on open auth VLAN Enumeration: 'authReqTimeoutUnauthVlan': 7, 'authenticated': 1, 'authReqTimeoutNoVlan': 6, 'authReqRejectNoVlan': 4, 'unauthenticated': 2, 'initialRoleFailed': 9, 'initialRole': 8, 'criticalAuth': 10, 'authReqRejectUnauthVlan': 5, 'openAuth': 11, 'authenticating': 3. |
hpicfUsrAuthMacAuthSessionStateTime | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.3 | unsigned32 | read-only |
The duration, in seconds, a client has spent in the state specified by hpicfUsrAuthSessionState. |
hpicfUsrAuthMacAuthSessionAuthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.4 | vlanindex | read-only |
Specifies the PVID that the authenticated client is utilizing. If client is unauthenticated, this object has no meaning. |
hpicfUsrAuthMacAuthSessionUnauthVid | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.5 | vlanindex | read-only |
Specifies the PVID that the unauthenticated client is utilizing. If client is authenticated, this object has no meaning. |
hpicfUsrAuthMacAuthSessionTimeout | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.6 | unsigned32 | read-only |
Specifies the RADIUS Server set session timeout for reauthentication of the user. When ST = 0, user gets reauthenticated at reauth-period secs, ST < 60 it is set to 60 secs and then user is reauthenticated, ST > 60 user is reauthenticated at ST secs. |
hpicfUsrAuthMacAuthSessionUsrNumberCnt | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.7 | counter32 | read-only |
This object Specifies the number of authenticated client currently present on this port. This does not include the clients which are under process of authentication. |
hpicfUsrAuthMacAuthSessionName | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.8 | snmpadminstring | read-only |
Specifies the username of the client. |
hpicfUsrAuthMacAuthSessionRole | 1.3.6.1.4.1.11.2.14.11.5.1.19.6.1.1.9 | hpautzuserrolename | read-only |
When hpSwitchAutzUserRoleEnabled is true, specifies the user role of the client. |
hpicfUsrAuthConformance | 1.3.6.1.4.1.11.2.14.11.5.1.19.7 | |||
hpicfUsrAuthGroups | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2 | |||
hpicfUsrAuthSystemGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.1 |
A collection of objects providing system information about, and control over, Web- and MAC-based authentication. |
||
hpicfUsrAuthPortsGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.2 |
A collection of objects providing system level information about Web and MAC based authentication for each port in the switch. |
||
hpicfUsrAuthWebAuthConfigGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.3 |
A collection of objects providing configuration objects for Web-based authentication associated with each port. |
||
hpicfUsrAuthMacAuthConfigGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.4 |
A collection of objects providing configuration objects for MAC-based authentication associated with each port. |
||
hpicfUsrAuthWebAuthSessionStatsGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.5 |
A collection of objects providing statistics about current sessions for Web-based authentication. |
||
hpicfUsrAuthMacAuthSessionStatsGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.6 |
A collection of objects providing statistics about current sessions for MAC-based authentication. |
||
hpicfUsrAuthWebAuthConfigGroup1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.7 |
A collection of objects providing configuration objects for Web-based authentication associated with each port. |
||
hpicfUsrAuthMacAuthConfigGroup1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.8 |
A collection of objects providing configuration objects for MAC-based authentication associated with each port. |
||
hpicfUsrAuthMacAuthConfigGroup2 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.9 |
A collection of objects providing configuration objects for MAC-based authentication associated with each port. |
||
hpicfUsrAuthRedirectServerGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.10 |
A collection of objects for authentication Redirect Server. |
||
hpicfUsrAuthWMAeWAServerGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.11 |
A collection of objects for Enhanced Web Auth servers. |
||
hpicfUsrAuthClientReauthenticateGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.12 |
A collection of objects for Reauthentication settings . |
||
hpicfUsrAuthMacAuthSessionStatsGroup1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.13 |
A collection of objects providing RADIUS server set session timeout for MAC-based user reauthentication. |
||
hpicfUsrAuthWebAuthSessionStatsGroup1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.14 |
A collection of objects providing RADIUS server set session timeout for Web-based user reauthentication. |
||
hpicfUsrAuthLastLoginGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.15 |
A collection of objects for viewing the most recent logins to the switch by users, and for deleting the table. |
||
hpicfUsrAuthPortsGroup1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.16 |
A collection of objects providing system level information about Web and MAC based authentication for each port in the switch. |
||
hpicfUsrAuthCaptivePortalGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.17 |
A collection of objects providing configuration for the captive portal feature. |
||
hpicfUsrAuthCaptivePortalProfileGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.18 |
A collection of objects providing configuration for captive portal profiles. |
||
hpicfUsrAuthWebAuthSessionStatsGroup2 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.19 |
A collection of objects providing statistics about current sessions for Web-based authentication. |
||
hpicfUsrAuthMacAuthSessionStatsGroup2 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.20 |
A collection of objects providing statistics about current sessions for MAC-based authentication. |
||
hpicfUsrAuthPortsGroup2 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.21 |
A collection of objects providing system level information about Web and MAC based authentication for each port in the switch. |
||
hpicfUsrAuthMacAuthConfigGroup3 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.2.22 |
A collection of objects providing configuration objects for MAC-based authentication associated with each port. |
||
hpicfUsrAuthCompliances | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4 | |||
hpicfUsrAuthCompliance | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.1 |
********* THIS COMPLIANCE IS DEPRECATED ********* The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.2 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance2 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.3 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance3 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.4 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance4 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.5 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance5 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.6 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance6 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.7 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance7 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.8 |
The compliance statement for device support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance8 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.9 |
The compliance statement for device support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance9 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.10 |
The compliance statement for device support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance10 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.11 |
The compliance statement for device support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance11 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.12 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance12 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.13 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance13 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.14 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance14 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.15 |
The compliance statement for device support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance15 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.16 |
The compliance statement for devices support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthCompliance16 | 1.3.6.1.4.1.11.2.14.11.5.1.19.7.4.17 |
The compliance statement for device support of HP-USER-AUTH MIB. |
||
hpicfUsrAuthNotifyConformance | 1.3.6.1.4.1.11.2.14.11.5.1.19.8 | |||
hpicfUsrAuthNotificationGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.8.1 |
A group of authorization notifications. |
||
hpicfNotifcationConfigDataGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.8.2 |
A group of notification data and configuration objects. |
||
hpicfNotificationConfigDataGroup1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.8.3 |
A group of notification data and configuration objects. |
||
hpicfUsrAuthMacGlobalConformance | 1.3.6.1.4.1.11.2.14.11.5.1.19.9 | |||
hpicfUsrAuthMacGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.9.1 |
A group of Mac auth global configuration objects. |
||
hpicfUsrAuthMacGroup1 | 1.3.6.1.4.1.11.2.14.11.5.1.19.9.2 |
A group of Mac auth global configuration objects. |
||
hpicfUsrAuthWebAuthAccessDeniedConformance | 1.3.6.1.4.1.11.2.14.11.5.1.19.10 | |||
hpicfUsrAuthWebAuthAccessDeniedGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.10.1 |
A group of web-auth access denied configuration objects. |
||
hpicfUsrAuthMacAuthUsrNumberConformance | 1.3.6.1.4.1.11.2.14.11.5.1.19.11 | |||
hpicfUsrAuthMacAuthUsrNumberGroup | 1.3.6.1.4.1.11.2.14.11.5.1.19.11.1 |
Number of Mac authenticated client objects in the switch and port. |
||
hpicfUsrAuthLastLogin | 1.3.6.1.4.1.11.2.14.11.5.1.19.12 | |||
hpicfUsrAuthLastLoginCurrentGeneration | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.1 | unsigned32 | read-only |
The current generation number of the rows in hpicfUsrAuthLastLoginTable. To obtain a consistent table view, first read this object, then enumerate the table (reading hpicfUsrAuthLastLoginGeneration last), discarding any rows with hpicfUsrAuthLastLoginGeneration greater than this value. |
hpicfUsrAuthLastLoginTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2 | no-access |
This table records, per-username, the most recent login and login attempts. A record is created by the switch upon the first successful login to a username, and updated upon each subsequent login or login attempt. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1 | no-access |
User last login table entry. |
||
hpicfUsrAuthLastLoginIndex | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.1 | unsigned32 | no-access |
The index value which uniquely identifies a row in the user last-login table. |
hpicfUsrAuthLastLoginName | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.2 | displaystring | read-only |
The user's login name. |
hpicfUsrAuthLastLoginPrivilege | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.3 | integer | read-only |
The privilege level assigned to the user at the most recent login. Enumeration: 'operator': 1, 'superuser': 3, 'manager': 2. |
hpicfUsrAuthLastLoginSuccTime | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.4 | dateandtime | read-only |
The time of the user's most recent successful login. |
hpicfUsrAuthLastLoginSuccAddrType | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.5 | inetaddresstype | read-only |
The type of IP address from which the user's most recent successful login occurred. Unknown(0) indicates a console login. |
hpicfUsrAuthLastLoginSuccAddr | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.6 | inetaddress | read-only |
The IP address from which the user's most recent successful login occurred. |
hpicfUsrAuthLastLoginUnsuccTime | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.7 | dateandtime | read-only |
The time of the user's most recent unsuccessful login attempt. This will be zero length if there have been no unsuccessful login attempts since the most recent successful login. |
hpicfUsrAuthLastLoginUnsuccCount | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.8 | counter32 | read-only |
The count of the user's unsuccessful login attempts since the most recent successful login. This counter is reset to zero whenever hpicfUsrAuthLastLoginSuccTime changes. |
hpicfUsrAuthLastLoginGeneration | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.2.1.9 | unsigned32 | read-only |
The generation number of the objects in this row. This object should be tested after reading other objects in a row to ensure it has not changed from hpicfUsrAuthLastLoginCurrentGeneration, or from the value of hpicfUsrAuthLastLoginGeneration sent in an hpicfUsrAuthCLIAuthFail notification. |
hpicfUsrAuthLastLoginDeleteAll | 1.3.6.1.4.1.11.2.14.11.5.1.19.12.3 | truthvalue | read-write |
When set to true(1), all rows of the last-login table are deleted. Always reads as false(2). |
hpicfUsrAuthCaptivePortal | 1.3.6.1.4.1.11.2.14.11.5.1.19.13 | |||
hpicfUsrAuthCaptivePortalConfig | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.1 | |||
hpicfUsrAuthCaptivePortalConfigEnabled | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.1.1 | truthvalue | read-write |
Enable redirection to a captive portal server for additional client authentication. When enabled, clients will be redirected to a captive portal server for further authentication when the RADIUS response includes a redirect URL. |
hpicfUsrAuthCaptivePortalUrlHashKey | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.1.2 | octet string | read-write |
A shared secret used by the captive portal server to validate a redirected request. A read of this object always returns an empty string. |
hpicfUsrAuthCaptivePortalUrlHashKeyEncrypted | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.1.3 | octet string | read-write |
The encrypted form of the shared secret used by the captive portal server to validate a redirected request. This object should only be written with an encrypted password previously read from a compatible HP Networking device. |
hpicfUsrAuthCaptivePortalProfileTable | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.2 | no-access |
This table consists of the captive portal profiles configured on the switch. The size of this table is implementation specific. |
|
1.3.6.1.4.1.11.2.14.11.5.1.19.13.2.1 | no-access |
A captive portal profile table entry. |
||
hpicfUsrAuthCaptivePortalProfileName | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.2.1.1 | octet string | no-access |
The name of this profile. All printable ASCII characters are allowed except '.', ' ', and '~'. |
hpicfUsrAuthCaptivePortalProfileRowStatus | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.2.1.2 | rowstatus | read-only |
The Row Status of this entry. To create a new entry, send an SNMP SET request with a RowStatus of 'createAndGo'. active - the entry is ready to use. notInService - not valid for this table. notReady - the entry is not fully configured. createAndGo - create a new entry. createAndWait - not valid for this table. delete - delete the entry. Entries of hpicfUsrAuthCaptivePortalProfileType 'predefined' cannot be deleted. |
hpicfUsrAuthCaptivePortalProfileType | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.2.1.3 | integer | read-only |
Indicates whether the corresponding profile is predefined or custom. Predefined profiles cannot be modified or deleted. Enumeration: 'predefined': 1, 'custom': 2. |
hpicfUsrAuthCaptivePortalProfileRedirectUrl | 1.3.6.1.4.1.11.2.14.11.5.1.19.13.2.1.4 | octet string | read-only |
The URL of the captive portal the user is redirected to for authentication. An empty value indicates the URL will be sent via the RADIUS VSA: HPE-CAPTIVE-PORTAL-URL(24) |