JUNIPER-JS-AUTH-MIB: View SNMP OID List / Download MIB

VENDOR: JUNIPER


 Home MIB: JUNIPER-JS-AUTH-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 jnxJsAuthMIB 1.3.6.1.4.1.2636.3.39.1.2.1
Firewall and security features restrict the accessing of protected resources (ideally on different zones) behind a firewall based on their source ip and other credentials. This module defines the objects pertain to access authentication.
     jnxJsAuthNotifications 1.3.6.1.4.1.2636.3.39.1.2.1.0
         jnxJsFwAuthFailure 1.3.6.1.4.1.2636.3.39.1.2.1.0.1
A firewall user authentication status trap signifies whether a user using the pass-through firewall authentication mechanism has been rejected due to reason specified in the trap. jnxJsFwAuthUserName is the user. jnxClientIPAddress is the ip address the user came from. jnxJsFwAuthServiceDesc specifies the application by which the authentication was performed. jnxJsFwAuthReason indicates the reason for failure.
         jnxJsFwAuthServiceUp 1.3.6.1.4.1.2636.3.39.1.2.1.0.2
Firewall user authentication service has started.
         jnxJsFwAuthServiceDown 1.3.6.1.4.1.2636.3.39.1.2.1.0.3
Firewall user authentication service has stopped.
         jnxJsFwAuthCapacityExceeded 1.3.6.1.4.1.2636.3.39.1.2.1.0.4
Firewall user authentication maximum capacity has been exceeded. jnxJsFwAuthTotalUsers indicates the total number of users being authenticated. And it has exceeds the maximum allowable users.
     jnxJsAuthObjects 1.3.6.1.4.1.2636.3.39.1.2.1.1
         jnxJsFwAuthStats 1.3.6.1.4.1.2636.3.39.1.2.1.1.1
             jnxJsFwAuthNumPendingUsers 1.3.6.1.4.1.2636.3.39.1.2.1.1.1.1 counter64 read-only
Number of users currently waiting to be authenticated by the firewall user authentication mechanism.
             jnxJsFwAuthNumSuccUsers 1.3.6.1.4.1.2636.3.39.1.2.1.1.1.2 counter64 read-only
Number of users currently allowed access by the firewall user authentication mechanism.
             jnxJsFwAuthNumFailedUsers 1.3.6.1.4.1.2636.3.39.1.2.1.1.1.3 counter64 read-only
Number of users currently failed to be authenticated by the firewall user authentication mechanism.
             jnxJsFwAuthTotalUsers 1.3.6.1.4.1.2636.3.39.1.2.1.1.1.4 counter64 read-only
Total number of users that are accessing or attempting to access resources managed by the firewall user authentication mechanism.
         jnxJsAuthTrapVars 1.3.6.1.4.1.2636.3.39.1.2.1.1.2
             jnxJsFwAuthUserName 1.3.6.1.4.1.2636.3.39.1.2.1.1.2.1 displaystring no-access
The name of the user who is attempting or has been authenticated.
             jnxJsFwAuthServiceDesc 1.3.6.1.4.1.2636.3.39.1.2.1.1.2.2 displaystring no-access
The service or application name that the enthentication is performed for: telnet, ftp, http.
             jnxJsFwAuthReason 1.3.6.1.4.1.2636.3.39.1.2.1.1.2.3 displaystring no-access
The reason for the trap being generated: authentication failure due to: timeout, invalid password, invalid username, etc.
             jnxJsFwAuthClientIpAddr 1.3.6.1.4.1.2636.3.39.1.2.1.1.2.4 ipaddress no-access
The authentication client's IP Address.