JUNIPER-SECURE-ACCESS-PORT-MIB: View SNMP OID List / Download MIB
VENDOR: JUNIPER
Home | MIB: JUNIPER-SECURE-ACCESS-PORT-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
jnxExSecureAccessPortMIB | 1.3.6.1.4.1.2636.3.40.1.2.1 |
This is Juniper Networks' implementation of enterprise specific MIB for configuration of Secure Access Port feature. DHCP Snooping and Dynamic ARP Inspection are mechanisms to provide per interface security capabilities. This MIB Module is also used to control some layer 2 functions like MAC limiting. It also supports IP Source Guard, Mac Source Guard and Storm Control features. |
||
jnxSecAccessPortMIBNotifications | 1.3.6.1.4.1.2636.3.40.1.2.1.0 | |||
jnxSecAccessdsRateLimitCrossed | 1.3.6.1.4.1.2636.3.40.1.2.1.0.1 |
A jnxdsRateLimitCrossed notification is generated when the number of DHCP packets from an untrusted interface exceeds jnxSecAccessdsIfRateLimit. |
||
jnxSecAccessIfMacLimitExceeded | 1.3.6.1.4.1.2636.3.40.1.2.1.0.2 |
Notification is sent when the number of MAC addresses learnt by the interface has crossed the limit of MAC addresses(jnxSecAccessIfMacLimit) and if MAC Limit Exceeded Action(jnxSecAccessIfMacLimitExceed) is drop or alarm or shutdown. |
||
jnxStormEventNotification | 1.3.6.1.4.1.2636.3.40.1.2.1.0.3 |
Notification is sent when the traffic in the interface exceeds rising threshold(jnxStormCtlRisingThreshold). |
||
jnxSecAccessPortMIBObjects | 1.3.6.1.4.1.2636.3.40.1.2.1.1 | |||
jnxSecAccessPortVlanTable | 1.3.6.1.4.1.2636.3.40.1.2.1.1.1 | no-access |
A table provides the mechanism to control DHCP Snooping and Dynamic ARP Inspection per VLAN. When a VLAN is created in a device supporting this table, a corresponding entry will be added to this table. |
|
1.3.6.1.4.1.2636.3.40.1.2.1.1.1.1 | no-access |
A row instance contains whether DHCP Snooping and Dynamic ARP Inspection at each existing VLAN is enabled or disabled. |
||
jnxSecAccessVlanName | 1.3.6.1.4.1.2636.3.40.1.2.1.1.1.1.1 | displaystring | no-access |
This object indicates the VLAN name on which Dhcp Snooping feature and Dynamic ARP Inspection is enabled. |
jnxSecAccessVlanDhcpSnoopStatus | 1.3.6.1.4.1.2636.3.40.1.2.1.1.1.1.2 | truthvalue | read-only |
This object indicates whether Dhcp Snooping is enabled in this VLAN. If this object is 'true', Dhcp Snooping is enabled in the specified VLAN. If this object is 'false', Dhcp Snooping is disabled in the specified VLAN. |
jnxSecAccessVlanDAIStatus | 1.3.6.1.4.1.2636.3.40.1.2.1.1.1.1.3 | truthvalue | read-only |
This object indicates whether Dynamic ARP Inspection is enabled in this VLAN. If this object is 'true', Dynamic ARP Inspection is enabled. If this object is 'false', Dynamic ARP Inspection is disabled. |
jnxSecAccessPortIfTable | 1.3.6.1.4.1.2636.3.40.1.2.1.1.2 | no-access |
The table contains the trust state and rate limit of each interface for DHCP Snooping purpose. The table also contains information on MAC address limit feature for each interface capable of this feature. This table also specifies whether IP source guard and MAC source guard are enabled on each interface. |
|
1.3.6.1.4.1.2636.3.40.1.2.1.1.2.1 | no-access |
A table entry contains the trust state and rate limit of an interface, MAC address limit for that Interface. It also contains the action to be undertaken if MAC address limit is exceeded. A table entry specifies whether IP source guard and MAC source guard are enabled on the specified interface. |
||
jnxSecAccessdsIfTrustState | 1.3.6.1.4.1.2636.3.40.1.2.1.1.2.1.1 | truthvalue | read-only |
This object indicates whether the interface is trusted for DHCP Snooping purpose. If this object is 'true', the interface is trusted. DHCP packets coming to this interface will be forwarded without checking. If this object is 'false', the interface is not trusted. DHCP packets coming to this interface will be subjected to DHCP checks. |
jnxSecAccessdsIfRateLimit | 1.3.6.1.4.1.2636.3.40.1.2.1.1.2.1.2 | unsigned32 | read-only |
This object indicates rate limit value for DHCP Snooping purpose. If the value of this object is 0, no rate limit is applied for DHCP traffic at this interface. |
jnxSecAccessIfMacLimit | 1.3.6.1.4.1.2636.3.40.1.2.1.1.2.1.3 | unsigned32 | read-only |
This object specifies the threshold limit for the number of MAC address entries on this interface. When the instance value of this object is set to 0, no threshold limit will be applied for this interfacew and the corresponding instance value of jnxIfMacLimitExceedAction of the same row has no effect. |
jnxSecAccessIfMacLimitExceed | 1.3.6.1.4.1.2636.3.40.1.2.1.1.2.1.4 | jnxmaclimitexceededaction | read-only |
This object specifies the action to be taken by the system for this interface while the number of MAC addresses has exceeded the value of jnxIfMacLimit. This object value is only effective when the corresponding instance value of jnxIfMacLimit is not set to 0. |
jnxSecAccessIfIpSrcGuardStatus | 1.3.6.1.4.1.2636.3.40.1.2.1.1.2.1.5 | truthvalue | read-only |
This object indicates whether IP Source Guard is enabled on the specified interface. If this object is 'true', then IP Source Guard is enabled on the specified interface. If this object is 'false', then IP Source Guard is disabled on the specified interface. |
jnxSecAccessIfMacSrcGuardStatus | 1.3.6.1.4.1.2636.3.40.1.2.1.1.2.1.6 | truthvalue | read-only |
This object indicates whether Mac Source Guard is enabled on the specified interface. If this object is 'true', then Mac Source Guard is enabled on the specified interface. If this object is 'false', then IP Source Guard is disabled on the specified interface. |
jnxStormCtlTable | 1.3.6.1.4.1.2636.3.40.1.2.1.1.3 | no-access |
Storm control monitors each type of traffic level on an interface. If traffic level exceeds the threshold value(rising threshold), switch will drop all packets of that type until traffic level drops to the threshold level (falling threshold). If traffic rate for a particular type exceeds the rising threshold, action will be taken to shutdown or add configured filter on the port. This table describes the traffic type for each interface, the rising threshold, falling threshold and the action to be taken if the traffic exceeds the rising threshold. |
|
1.3.6.1.4.1.2636.3.40.1.2.1.1.3.1 | no-access |
An entry contains the interface index,traffic type for the interface, the rising threshold, falling threshold and the action to be taken if the traffic exceeds the rising threshold. |
||
jnxStormCtlIfTrafficType | 1.3.6.1.4.1.2636.3.40.1.2.1.1.3.1.1 | integer | no-access |
This object specifies the traffic type on the particular interface. Value 1 specifies that it is broadcast traffic, value 2 specifies that it is multicast traffic and value 3 specifies that it is unicast traffic. Enumeration: 'broadcast': 1, 'unicast': 3, 'multicast': 2. |
jnxStormCtlRisingThreshold | 1.3.6.1.4.1.2636.3.40.1.2.1.1.3.1.2 | integer32 | read-only |
This object specifies the rising threshold value in packets per second. The storm control action is occurs when the traffic exceeds this threshold value. |
jnxStormCtlFallingThreshold | 1.3.6.1.4.1.2636.3.40.1.2.1.1.3.1.3 | integer32 | read-only |
This object specifies the falling threshold value in packets per second. The storm control action ceases when the traffic drops to this threshold value. |
jnxStormCtlAction | 1.3.6.1.4.1.2636.3.40.1.2.1.1.3.1.4 | integer | read-only |
This object specifies the action to be taken, when traffic exceeds rising threshold value. Value 1 specifies that the action taken is to shutdown the port. Value 2 specifies that the action taken is to apply a policy filter on the interface for the given packet type. Default is to shutdown(1) the port. Enumeration: 'filter': 2, 'shutdown': 1. |