HUAWEI-MNGT-MIB: View SNMP OID List / Download MIB
VENDOR: HUAWEI
Home | MIB: HUAWEI-MNGT-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
hwCliUserMgmt | 1.3.6.1.4.1.2011.6.3.10 |
The MIB object implements the management of the CLI and NE users. |
||
hwCliUserParaTable | 1.3.6.1.4.1.2011.6.3.10.1 | no-access |
User parameter configuration table, which supports the functions of querying, adding, deleting and modifying a user. The index of this table is hwCliUserName. |
|
1.3.6.1.4.1.2011.6.3.10.1.1 | no-access |
User parameter configuration table, which supports the functions of querying, adding, deleting and modifying a user. The index of this entry is hwCliUserName. |
||
hwCliUserName | 1.3.6.1.4.1.2011.6.3.10.1.1.1 | octet string | no-access |
Name of the CLI user. The user name is case insensitive and the user name consists of 6-15 characters. The minimum length of the name can be configured by user. The range of the valid characters of the user name is 0x21- 0x7e and the user name cannot be 'all', 'online', 'index', or 'security'. |
hwCliUserPassword | 1.3.6.1.4.1.2011.6.3.10.1.1.2 | octet string | read-only |
Password of the CLI user. The user can directly modify the password of the CLI user and need not verify the original password of the CLI user. The user password consists of 16 characters, including at least one letter and one digit. The user password is not reported to the NMS and a null character string is returned when the user password is queried. |
hwCliUserLevel | 1.3.6.1.4.1.2011.6.3.10.1.1.3 | integer | read-only |
The levels of CLI users. Options: 1. common(1) -indicates the common user. 2. operator(2) -indicates the operator. 3. administrator(3) -indicates the administrator. 4. super(4) -indicates the super administrator. 5. guest(5) -indicates the guest user 6. custom(6) -indicates the custom user The higher the user level is, the more rights the user has. The user level must be bound to the user when the user is added. The super administrator cannot be added. Enumeration: 'administrator': 3, 'guest': 5, 'custom': 6, 'common': 1, 'operator': 2, 'super': 4. |
hwCliUserLogins | 1.3.6.1.4.1.2011.6.3.10.1.1.4 | integer32 | read-only |
The number of user login attempts in one time. The same user name can be used for login to the device repeatedly. For example, when two users log in to the device with the same name, the number of times of re-login is two. This object is used to define the number of times of re-login. When the number of times of re-login is changed to 0, the user is forbidden to log in to the device. |
hwCliUserDecr | 1.3.6.1.4.1.2011.6.3.10.1.1.5 | octet string | read-only |
Description of CLI user. You can add the basic information about the user, such as the email box, telephone number, or other contact information. |
hwCliUserRowStatus | 1.3.6.1.4.1.2011.6.3.10.1.1.6 | rowstatus | read-only |
Operation status of CLI user, the CLI user can be added, deleted and modified. The user level, number of times of re-login, user profile, available user password and user description must be bound to the user when the user is added. The online user cannot be deleted. createAndGo(4) is supplied to create a new instance of a conceptual row. destroy(6) is supplied to delete the instances associated with an existing conceptual row. |
hwCliUserprofile | 1.3.6.1.4.1.2011.6.3.10.1.1.7 | octet string | read-only |
The name of user profile that CLI user belongs to. |
hwCliUserAccessType | 1.3.6.1.4.1.2011.6.3.10.1.1.8 | integer | read-only |
The user can log in to the device through the following three modes. Options: 1. cli(1) -indicates CLI terminal. 2. oss(2) -indicates OSS terminal. 3. web(4) -indicates Web terminal. Enumeration: 'web': 4, 'oss': 2, 'cli': 1. |
hwCliUserTimeout | 1.3.6.1.4.1.2011.6.3.10.1.1.9 | integer32 | read-only |
This object is not used any longer. Login timeout duration of the user. If the CLI user performs no operation during a period, the user automatically quits the system. This object is used to query and set the login timeout duration. |
hwCliUserNameLastDays | 1.3.6.1.4.1.2011.6.3.10.1.1.10 | integer32 | read-only |
Service life of the user name. The hwCliUserNameLastDays value of -1 indicates the username expired. |
hwCliUserPwdLastDays | 1.3.6.1.4.1.2011.6.3.10.1.1.11 | integer32 | read-only |
Service life of the user password. The hwCliUserPwdLastDays value of -1 indicates the user password expired. |
hwCliClientTable | 1.3.6.1.4.1.2011.6.3.10.2 | no-access |
CLI online user information table, which can be used to force an online user to go offline. The table cannot be created and deleted. The table supports only the functions of querying the user terminal status and forcing an online user to go offline. The index of this table is hwCliClientID. |
|
1.3.6.1.4.1.2011.6.3.10.2.1 | no-access |
CLI online user information table, which can be used to force an online user to go offline. The table cannot be created and deleted. The table supports only the functions of querying the user terminal status and forcing an online user to go offline. The index of this entry is hwCliClientID. |
||
hwCliClientID | 1.3.6.1.4.1.2011.6.3.10.2.1.1 | integer32 | no-access |
Client ID(1..255). Index object, this ID is allocated by device. |
hwCliClientUserName | 1.3.6.1.4.1.2011.6.3.10.2.1.2 | octet string | read-only |
User name of client. |
hwCliClientType | 1.3.6.1.4.1.2011.6.3.10.2.1.3 | integer | read-only |
Type of client. The modes of login to the client are as follows: Options: 1. serial(1) -indicates serial port. 2. telnet(2) -indicates telnet. 3. proxy(3) -indicates proxy. 4. ssh(4) -indicates ssh. Enumeration: 'serial': 1, 'proxy': 3, 'telnet': 2, 'ssh': 4. |
hwCliClientIp | 1.3.6.1.4.1.2011.6.3.10.2.1.4 | ipaddress | read-only |
The IP address of client. |
hwCliClientLoginTime | 1.3.6.1.4.1.2011.6.3.10.2.1.5 | dateandtime | read-only |
The login time of client. |
hwCliClientAdminStatus | 1.3.6.1.4.1.2011.6.3.10.2.1.6 | integer | read-write |
Admin status of client, can disconnect client. Options: 1. disconnect(1) -indicates the user who logs in to the system in the modes except serial port mode can be forced to go offline when the object value is set to disconnect(1). 2. connect(-1) -indicates the user is online. Enumeration: 'disconnect': 1, 'connect': -1. |
hwCliUserIdleTimeOut | 1.3.6.1.4.1.2011.6.3.10.2.1.7 | integer32 | read-write |
This object is not used any longer.Idleness timeout duration of the online user. When the online user is idle for a period longer than the preset time, the online user automatically quits the system. This object is used to set the timeout duration. |
hwCliSysCmdTable | 1.3.6.1.4.1.2011.6.3.10.3 | |||
hwCliUserManualUnlock | 1.3.6.1.4.1.2011.6.3.10.3.2 | octet string | read-write |
Unlock users manually. Enter the user name to unlock the user. |
hwCliUserDeclarSwitch | 1.3.6.1.4.1.2011.6.3.10.3.3 | integer | read-write |
The object specifies whether show the declaration after users login successfully. Options: 1. show(1) -indicates that show the declaration after users login successfully. 2. not-show(2) -indicates that does not show the declaration after users login successfully. Enumeration: 'show': 1, 'not-show': 2. |
hwCliIPManualUnlock | 1.3.6.1.4.1.2011.6.3.10.3.4 | ipaddress | read-write |
Unlock IP manually. Enter the IP address of the user to unlock the user who uses the IP address to log in to the device. |
hwTelnetMaxSessionNum | 1.3.6.1.4.1.2011.6.3.10.4 | integer32 | read-write |
The max number of simultaneous telnet sessions. This object is used to set the maximum number of users who can log in to the system through telnet at a time. If the current number of users is equal to the maximum number, the rest users cannot log in to the system through telnet. |
hwCliUserProfileParaTable | 1.3.6.1.4.1.2011.6.3.10.5 | no-access |
User profile management table, which is used to query, modify, add and delete the user profile. The user profile is a set of public user attributes, including the user name and password validity period, permitted earliest time of login, and permitted latest time of login. The MIB supports the functions of querying and setting the values of the preceding parameters. A user needs to be created based on a user profile. In this case, the new user inherits the preceding parameter values in the user profile. The index of this table is hwCliUserProfileName. The index value is the user profile name, it uniquely identifies the user profile. By default, four system profiles exist in the system. The names of the four system profiles are as follows: root, admin, operator and commonuser. |
|
1.3.6.1.4.1.2011.6.3.10.5.1 | no-access |
User profile management table, which is used to query, modify, add and delete the user profile. The user profile is a set of public user attributes, including the user name and password validity period, permitted earliest time of login, and permitted latest time of login. The MIB supports the functions of querying and setting the values of the preceding parameters. A user needs to be created based on a user profile. In this case, the new user inherits the preceding parameter values in the user profile. The index of this entry is hwCliUserProfileName. The index value is the user profile name, it uniquely identifies the user profile. By default, four system profiles exist in the system. The names of the four system profiles are as follows: root, admin, operator and commonuser. |
||
hwCliUserProfileName | 1.3.6.1.4.1.2011.6.3.10.5.1.1 | octet string | no-access |
The name of the user profile. The name of the new profile must be different from the names of the system profiles. The profile name consists of 1-15 characters. |
hwCliUserNameAvailableInterval | 1.3.6.1.4.1.2011.6.3.10.5.1.4 | unsigned32 | read-only |
Validity period of user name. For example, if the validity period of the user name is 10, it indicates that the user name cannot be used for login after ten days since it is created. In addition, a message is displayed indicating that the user name expires, that is, the validity period of the user name times out. 0 indicates that the user name is valid forever. Range: 0-999 Default: 0 Unit: day |
hwCliUserPwdAvailableInterval | 1.3.6.1.4.1.2011.6.3.10.5.1.5 | unsigned32 | read-only |
Validity period of user password. For example, if the validity period of the user password is 10, it indicates that the user password cannot be used for login after ten days since it is created. In addition, a message is displayed indicating that the user password expires, that is, the validity period of the user password times out. 0 indicates that the user password is valid forever. Range: 0-999 Default: 0 Unit: day |
hwCliUserLoginTime | 1.3.6.1.4.1.2011.6.3.10.5.1.6 | octet string | read-only |
Permitted earliest time of login. The user can log in to the system at any time between 00:00 and 23:59. |
hwCliUserLogoutTime | 1.3.6.1.4.1.2011.6.3.10.5.1.7 | octet string | read-only |
Permitted latest time of login. The user can log in to the system at the time from the permitted earliest time to the permitted latest time. In other periods, the user cannot log in to the system. |
hwCliUserProfileRowStatus | 1.3.6.1.4.1.2011.6.3.10.5.1.10 | rowstatus | read-only |
This object is used to operate the user profile. The system profile cannot be modified or deleted. When a user is bound with the user profile, the user profile cannot be modified or deleted. The parameter settings of the user profile can be queried through the user profile name. In addition, the information about the system profile can be queried. createAndGo(4) is supplied to create a new instance of a conceptual row. destroy(6) is supplied to delete the instances associated with an existing conceptual row. |
hwCliSysPara | 1.3.6.1.4.1.2011.6.3.10.6 | |||
hwCliSyslockInterval | 1.3.6.1.4.1.2011.6.3.10.6.1 | integer32 | read-write |
The time interval of user locked. When the number of times of login failure reaches the preset value for locking, the user is locked. This object is used to query and set the locking duration. Unit: minute DEFVAL { 15 } |
hwCliSyslockCondition | 1.3.6.1.4.1.2011.6.3.10.6.2 | integer32 | read-write |
The times of login failure. This object is used to query and set the times of login failure. When the number of login failure reaches the preset value, the user is locked. DEFVAL { 3 } |
hwCliSysLoginModifyPwd | 1.3.6.1.4.1.2011.6.3.10.6.3 | integer | read-write |
The flag of whether the password need to be changed in the case of first login. Options: 1. enable(1) -indicates that the password needs to be changed for the first login. 2. disable(2) -indicates that the password need not be changed for the first login. DEFVAL { disable } Enumeration: 'enable': 1, 'disable': 2. |
hwCliSysLockType | 1.3.6.1.4.1.2011.6.3.10.6.4 | integer | read-write |
Lock type. When the number of times of repeated login failure exceeds the preset value, the system automatically locks the user. This object is used to set the locking type. Options: 1. none(0) -indicates that the user need not be locked. 2. user(1) -indicates that the user name is locked. When the user logs in to the system with the user name again, 'The user has been locked and you cannot log on.' message is displayed. 3. ip(2) -indicates that the IP address with which the user logs in to the system is locked. When the user logs in to the system with the IP address again, the 'The IP address has been locked and you cannot log on.' message is displayed. 4. all(3) -indicates that both the user name and the IP address are locked. DEFVAL { none } Enumeration: 'ip': 2, 'none': 0, 'user': 1, 'all': 3. |
hwCliSysSecurityMode | 1.3.6.1.4.1.2011.6.3.10.6.5 | integer | read-write |
The object specifies whether security mode is enable. Options: 1. enable(1) -indicates that the security administrator, whose name is security, can log in to the system. 2. disable(2) -indicates that the rights of user root are separated and are assigned to user security. User security can perform the querying operation and the operations corresponding to the rights separated from the rights of user root. That is, when the security mode switch is enabled(1), certain operations that can be performed by user bestmonitoringtools.com originally cannot be performed by user bestmonitoringtools.com but by user security. When the security mode is set to disable(2), the rights of user root and user security are combined and all the rights are owned by user bestmonitoringtools.com. In this case, user security cannot log in to the system. DEFVAL { disable } Enumeration: 'enable': 1, 'disable': 2. |
hwCliAuthenDefaultDomainName | 1.3.6.1.4.1.2011.6.3.10.6.6 | octet string | read-write |
Domain name in the AAA authentication mode. When the value is null, it indicates that the authentication mode is local mode. If the AAA authentication mode is set successfully, the system changes to the AAA authentication mode. |
hwSNMPUserTable | 1.3.6.1.4.1.2011.6.3.10.7 | no-access |
NMS user management table, which supports the login and logout of the NMS user and the function of querying the information about the online NMS user. The index of this table is hwSNMPUserID. The index value is the user ID. |
|
1.3.6.1.4.1.2011.6.3.10.7.1 | no-access |
NMS user management table, which supports the login and logout of the NMS user and the function of querying the information about the online NMS user. The index of this entry is hwSNMPUserID. The index value is the user ID. |
||
hwSNMPUserID | 1.3.6.1.4.1.2011.6.3.10.7.1.1 | integer32 | no-access |
SNMP user ID(1..8) and index object. The value that the device returns to the NMS, which uniquely identifies a user. |
hwSNMPUserName | 1.3.6.1.4.1.2011.6.3.10.7.1.2 | octet string | read-write |
Name of the SNMP user. |
hwSNMPUserAdminStatus | 1.3.6.1.4.1.2011.6.3.10.7.1.3 | integer | read-write |
SNMP user admin status(1:logon,2:logoff). Visual local craft terminal (LCT). Options: 1. logon(1) -indicates that the user can be set to go online. 2. logoff(2) -indicates that the user can be set to go offline. The user needs to be bound with the hwSNMPUserType object when the user is set to go online. Enumeration: 'logoff': 2, 'logon': 1. |
hwSNMPUserType | 1.3.6.1.4.1.2011.6.3.10.7.1.4 | integer | read-write |
SNMP user type(1:lct). Options: 1.lct(1) -indicates that visual LCT, which is an NMS user type. Enumeration: 'lct': 1. |
hwSNMPUserIP | 1.3.6.1.4.1.2011.6.3.10.7.1.5 | ipaddress | read-only |
IP address that SNMP user use. |
hwMngtUserAlarmTrapsVbOids | 1.3.6.1.4.1.2011.6.3.10.8 | |||
hwUserAdminStatus | 1.3.6.1.4.1.2011.6.3.10.8.1 | integer | no-access |
The Status of the user login. Options: 1. logon(0) -indicates that the user goes online. 2. logoff(1) -indicates that the user goes offline. 3. logonfail(2) -indicates that the user login fails. Enumeration: 'logon': 0, 'logoff': 1, 'logonfail': 2. |
hwUserLogMode | 1.3.6.1.4.1.2011.6.3.10.8.2 | integer | no-access |
The modes of login to the client. Options: 1. serial(0) -serial mode. 2. clipry(1) -clipry mode. 3. telnet(2) -telnet mode. 4. ssh(3) -ssh mode. 5. web(4) -web mode. 6. xml(5) -xml mode. 7. nms(6) -nms mode. 8. omci(7) -omci mode. 9. lct(8) -lct mode. Enumeration: 'xml': 5, 'web': 4, 'lct': 8, 'clipry': 1, 'omci': 7, 'nms': 6, 'telnet': 2, 'ssh': 3, 'serial': 0. |
hwUserLogType | 1.3.6.1.4.1.2011.6.3.10.8.3 | integer | no-access |
Types of the user log. Currently, the logs are classified into two types. Options: 1. operating(0) -indicates the operating log. 2. security(1) -indicates the security log. Enumeration: 'security': 1, 'operating': 0. |
hwMngtUserTraps | 1.3.6.1.4.1.2011.6.3.10.9 | |||
hwMngtUserCommonTraps | 1.3.6.1.4.1.2011.6.3.10.9.1 | |||
hwMngtUserAlarmTraps | 1.3.6.1.4.1.2011.6.3.10.9.2 | |||
hwMngtUserAlarmTrapsPrefix | 1.3.6.1.4.1.2011.6.3.10.9.2.0 | |||
hwUserLogWillFullTrap | 1.3.6.1.4.1.2011.6.3.10.9.2.0.1 |
This trap message is reported when the system log database will be full. |
||
hwMngtUserLockedTrap | 1.3.6.1.4.1.2011.6.3.10.9.2.0.2 |
This trap message is reported when the managing user of the equipment is locked. |
||
hwMngtUserStateChangeTrap | 1.3.6.1.4.1.2011.6.3.10.9.2.0.3 |
This trap message is reported when the maintenance user's state changes. |
||
hwMngtUserNameWillExpireTrap | 1.3.6.1.4.1.2011.6.3.10.9.2.0.4 |
This trap message is reported when the user name will expire soon. |
||
hwMngtUserPasswordWillExpireTrap | 1.3.6.1.4.1.2011.6.3.10.9.2.0.5 |
This trap message is reported when the user password will expire soon. |
||
hwCliConsolePara | 1.3.6.1.4.1.2011.6.3.10.10 | |||
hwCliConsoleSwitch | 1.3.6.1.4.1.2011.6.3.10.10.1 | integer | read-write |
Enable/disable management serial port. Options: 1. enable(1) -indicates that the serial port is in the open state and the serial port is available. 2. disable(2) -indicates that the serial port is in the shutdown state and the serial port is unavailable. Enumeration: 'enable': 1, 'disable': 2. |
hwModemCallbackMngt | 1.3.6.1.4.1.2011.6.3.10.11 | |||
hwModemCallbackSwitch | 1.3.6.1.4.1.2011.6.3.10.11.1 | integer | read-write |
The object specifies whether callback function is enable. Options: 1. enable(1) -indicates that the callback function is enable. 2. disable(2) -indicates that the callback function is disable. Default: disable(2) Enumeration: 'enable': 1, 'disable': 2. |
hwModemCallbackMngtTable | 1.3.6.1.4.1.2011.6.3.10.11.2 | no-access |
The callback security configuration table. This table is used to manage the callback telephone numbers and passwords. The index of this table is hwModemCallbackIndex. |
|
1.3.6.1.4.1.2011.6.3.10.11.2.1 | no-access |
The callback security configuration table. This table is used to manage the callback telephone numbers and passwords. The index of this entry is hwModemCallbackIndex. |
||
hwModemTelNumber | 1.3.6.1.4.1.2011.6.3.10.11.2.1.1 | displaystring | no-access |
Telephone number |
hwModemPassword | 1.3.6.1.4.1.2011.6.3.10.11.2.1.2 | displaystring | read-write |
User password. The password must be cipher encrypted by MD5, it consists of 16 characters. |
hwModemCallbackRowStatus | 1.3.6.1.4.1.2011.6.3.10.11.2.1.3 | rowstatus | read-only |
Operation user configration of the modem callback function, the user configration can be added and deleted. The user telephone number and password must be bound when the user is added. The exist telephone number or password cannot be added. createAndGo(4) is supplied to create a new instance of a conceptual row. destroy(6) is supplied to delete the instances associated with an existing conceptual row. |
hwSysManFirewall | 1.3.6.1.4.1.2011.6.3.12 | |||
hwFirewallSwitchTable | 1.3.6.1.4.1.2011.6.3.12.1 | no-access |
Firewall switch table, which supports the functions of querying, enabling and disabling the protocol-type firewall switch. The index of this table is hwFirewallProtocolType. |
|
1.3.6.1.4.1.2011.6.3.12.1.1 | no-access |
Firewall switch table, which supports the functions of querying, enabling and disabling the protocol-type firewall switch. The index of this entry is hwFirewallProtocolType. |
||
hwFirewallProtocolType | 1.3.6.1.4.1.2011.6.3.12.1.1.1 | integer | no-access |
Index object, index of the hwFirewallSwitchTable object. Options: 1.telnet(1) -indicates that the firewall protocols is telnet. 2.ssh(2) -indicates that the firewall protocols is ssh. 3.snmp(3) -indicates that the firewall protocols is snmp. Enumeration: 'snmp': 3, 'ssh': 2, 'telnet': 1. |
hwFirewallSwitch | 1.3.6.1.4.1.2011.6.3.12.1.1.2 | integer | read-write |
Firewall switch. Options: 1. enable(1) -indicates that when the device needs to control the protocol used to access the device, this command can be executed to enable(1) the firewall switch of the protocol. After the firewall switch of the protocol is enabled(1), the device can control the operator who accesses the device with the protocol and reject the access of the operator whose IP address is not in the permitted address segment. 2. disable(2)-indicates that if the operator is already online, the device forces the operator to go offline. The firewall switch can be disabled when the firewall switch mode is set to disable(2). After the firewall switch is disabled(2), the device does not control the operator who accesses the device with the protocol. By default, the firewall in the system is in the disabled state. Enumeration: 'enable': 1, 'disable': 2. |
hwAccessIpTable | 1.3.6.1.4.1.2011.6.3.12.2 | no-access |
Access IP table, which supports the functions of querying, adding and deleting the access IP table of a specified protocol. The access IP table is used to configure the address segments of the accessible devices under the specified protocol. This can prevent the invalid users from logging in to the device, that is, the operators whose IP addresses are not in the address segments and access protocols do not meet the requirements cannot access the device. The indexes of this table are hwFirewallProtocolType and hwAccessIpStartAddr. For the hwFirewallProtocolType object, refer to hwFirewallSwitchTable. hwAccessIpTable is used for configuring a list of accessible IP addresses. The IP address list takes effect only when the protocol corresponding to hwFirewallSwitchTable is enabled. |
|
1.3.6.1.4.1.2011.6.3.12.2.1 | no-access |
Access IP table, which supports the functions of querying, adding and deleting the access IP table of a specified protocol. The access IP table is used to configure the address segments of the accessible devices under the specified protocol. This can prevent the invalid users from logging in to the device, that is, the operators whose IP addresses are not in the address segments and access protocols do not meet the requirements cannot access the device. The indexes of this entry are hwFirewallProtocolType and hwAccessIpStartAddr. For the hwFirewallProtocolType object, refer to hwFirewallSwitchTable. hwAccessIpTable is used for configuring a list of accessible IP addresses. The IP address list takes effect only when the protocol corresponding to hwFirewallSwitchTable is enabled. |
||
hwAccessIpStartAddr | 1.3.6.1.4.1.2011.6.3.12.2.1.1 | ipaddress | no-access |
Start IP address of one record in access Ip table. The IP address in the new record of the table must be valid, that is, the IP address is not a class 0 address or class D address. The record in which the start address is the same as the existing one cannot be added to the table. |
hwAccessIpEndAddr | 1.3.6.1.4.1.2011.6.3.12.2.1.2 | ipaddress | read-only |
End IP address of one record in access Ip table. The new IP address must be valid, that is, the IP address is not a class 0 address or class D address. The record in which the end address is smaller than the start address cannot be added and each protocol supports a maximum of 10 IP addresses. |
hwAccessIpRowStatus | 1.3.6.1.4.1.2011.6.3.12.2.1.3 | rowstatus | read-only |
Operation status of row. The specified protocol type and the start and end addresses in the start address permitting table can be modified. createAndGo(4) is supplied to create a new instance of a conceptual row. destroy(6) is supplied to delete the instances associated with an existing conceptual row. |
hwRefuseIpTable | 1.3.6.1.4.1.2011.6.3.12.3 | no-access |
Refuse IP table. The table is used to configure the address segment (under a specified protocol) with which the user cannot access the device. This can prevent the invalid users from logging in to the device. After address segment is configured in the table, the operators with the IP addresses in the address segment cannot access the device. The indexes of this table are hwFirewallProtocolType and hwRefuseIpStartAddr. For the hwFirewallProtocolType object, refer to hwFirewallSwitchTable. hwRefuseIpTable is used for configuring a list of prohibited IP addresses. The IP address list takes effect only when the protocol corresponding to hwFirewallSwitchTable is enabled. |
|
1.3.6.1.4.1.2011.6.3.12.3.1 | no-access |
Refuse IP table. The table is used to configure the address segment (under a specified protocol) with which the user cannot access the device. This can prevent the invalid users from logging in to the device. After address segment is configured in the table, the operators with the IP addresses in the address segment cannot access the device. The indexes of this entry are hwFirewallProtocolType and hwRefuseIpStartAddr. For the hwFirewallProtocolType object, refer to hwFirewallSwitchTable. hwRefuseIpTable is used for configuring a list of prohibited IP addresses. The IP address list takes effect only when the protocol corresponding to hwFirewallSwitchTable is enabled. |
||
hwRefuseIpStartAddr | 1.3.6.1.4.1.2011.6.3.12.3.1.1 | ipaddress | no-access |
Start IP address of one record in refuse Ip table. The IP address in the new record of the table must be valid, that is, the IP address is neither a class 0 address nor class D address. The record in which the start address is the same as the existing one cannot be added to the table. |
hwRefuseIpEndAddr | 1.3.6.1.4.1.2011.6.3.12.3.1.2 | ipaddress | read-only |
End IP address of one record in refuse Ip table. The IP address in the new record of the table must be valid, that is, the IP address is not a class 0 address or class D address. The record in which the end address is smaller than the start address cannot be added and each protocol supports a maximum of 10 IP addresses. |
hwRefuseIpRowStatus | 1.3.6.1.4.1.2011.6.3.12.3.1.3 | rowstatus | read-only |
Operation status of row. The specified protocol type and the start and end addresses in the start address rejecting table can be modified. createAndGo(4) is supplied to create a new instance of a conceptual row. destroy(6) is supplied to delete the instances associated with an existing conceptual row. |
hwSysManSourceInterface | 1.3.6.1.4.1.2011.6.3.19 | |||
hwSysManSourceInterfaceTable | 1.3.6.1.4.1.2011.6.3.19.1 | no-access |
Sys man source interface table. The table is used to configure the source interfaces under the protocols such as SNMP trap, TFTP, FTP, SFTP, Telnet, Ping and Tracert. The addresses of the meth and VLANIF interfaces can be used as the source addresses from which the system sends packets. The system uses the bound interface address as the source address to send the protocol packet. The index of this table is hwSysManProtocolType. |
|
1.3.6.1.4.1.2011.6.3.19.1.1 | no-access |
Sys man source interface table. The table is used to configure the source interfaces under the protocols such as SNMP trap, TFTP, FTP, SFTP, Telnet, Ping and Tracert. The addresses of the meth and VLANIF interfaces can be used as the source addresses from which the system sends packets. The system uses the bound interface address as the source address to send the protocol packet. The index of this entry is hwSysManProtocolType. |
||
hwSysManProtocolType | 1.3.6.1.4.1.2011.6.3.19.1.1.1 | integer | read-only |
Application-layer packet type. Options: 1. trap(1) -indicates the trap packet. 2. syslog(2) -indicates the syslog packet. 3. tftp(3) -indicates the tftp packet. 4. ftp(4) -indicates the ftp packet. 5. sftp(5) -indicates the sftp packet. 6. telnet(6) -indicates the telnet packet. 7. ping(7) -indicates the ping packet. 8. tracert(8) -indicates the tracert packet. 9. license(9) -indicates the license packet. 10.stelnet(10)-indicates the stelnet packet. Enumeration: 'ftp': 4, 'tracert': 8, 'license': 9, 'stelnet': 10, 'ping': 7, 'telnet': 6, 'sftp': 5, 'syslog': 2, 'trap': 1, 'tftp': 3. |
hwSourceInterfaceType | 1.3.6.1.4.1.2011.6.3.19.1.1.2 | integer | read-write |
Source interface type, which is used with the interface number to determine the interface from which packets are sent. Options: 1. auto(1) -indicates the function of automatically searching for the source interface according to the route. 2. loopback(2) -indicates the loopback interface. 3. meth(3) -indicates the meth interface. 4. vlanif(4) -indicates the vlanif interface. Enumeration: 'auto': 1, 'meth': 3, 'vlanif': 4, 'loopback': 2. |
hwSourceInterfaceNumber | 1.3.6.1.4.1.2011.6.3.19.1.1.3 | integer32 | read-write |
Source interface number, which is the interface number under the source interface type object and is used with the interface type to determine the interface from which packets are sent. The hwSourceInterfaceNumber value of -1 indicates the source interface is not configured. |
hwConfigLock | 1.3.6.1.4.1.2011.6.3.23 | |||
hwOldConfigLockState | 1.3.6.1.4.1.2011.6.3.23.1 | integer | read-only |
This object is used to query the current configuration locking status. Options: 1. locked(1) -indicates that the configuration right is locked, other users can perform only the querying operation. In this case, the configuration operations between users are incompatible. 2. unlocked(2)-indicates that the configuration right is unlocked, other users can perform operations normally. Enumeration: 'locked': 1, 'unlocked': 2. |
hwOldConfigUnlockInterval | 1.3.6.1.4.1.2011.6.3.23.2 | integer32 | read-write |
This object is not used any longer.The interval to automatically unlock config: 1 to 255 minutes. After the user performs the configuration locking operation, the user can manually or automatically unlock the configuration. If the user does not manually unlock the configuration, the configuration is unlocked automatically after a period. This object is used to query and configure the automatic unlocking duration. By default, the automatic unlocking duration is five minutes. Unit: minute EFVAL { 5 } |
hwOldConfigLockUserType | 1.3.6.1.4.1.2011.6.3.23.3 | integer | read-only |
The configuration locking operator can log in to the system in the following six modes: Options: 1. nooperation(-1)-no operation. 2. nms(1) -nms mode. 3. series(2)-series mode. 4. telnet(3)-telnet mode. 5. web(4) -web mode. 6. xml(5) -xml mode. Enumeration: 'xml': 5, 'web': 4, 'nms': 1, 'series': 2, 'telnet': 3, 'nooperation': -1. |
hwOldConfigLockUserName | 1.3.6.1.4.1.2011.6.3.23.4 | octet string | read-only |
Name of the configuration locking operator. |
hwOldConfigLockUserIPAddr | 1.3.6.1.4.1.2011.6.3.23.5 | ipaddress | read-only |
IP address of the operator who locks the configuration. |
hwOldConfigLockOperate | 1.3.6.1.4.1.2011.6.3.23.6 | integer | read-write |
The operation to lock or unlock the config. Options: 1.lock(1)-When the data is configured, to prevent other users from modifying or deleting the configured data, the configuration right can be locked (the configuration right mode is set to lock(1)) before the data configuration. After the configuration right is locked, only the super user can run the config unlock interval command to change the locking duration and the other users can perform only the querying operation. 2.unlock(2)-After the data configuration is complete, the locked system needs to be unlocked (the configuration right mode needs to be set to unlock(2)). After the system is unlocked, the system allows the other users to perform the configuration operation.If the current system configuration is locked by one user, the user can automatically unlocks the system configuration. The super user and the NMS user can unlock the system configuration forcibly and the other users cannot unlock the system configuration. This object is used to perform the locking or unlocking operation. Enumeration: 'lock': 1, 'unlock': 2. |