ONEACCESS-AAA-MIB: View SNMP OID List / Download MIB
VENDOR: ONEACCESS
Home | MIB: ONEACCESS-AAA-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
oacAAAConfigMIB | 1.3.6.1.4.1.13191.1.100.690 |
Fixed the issues related to octet string range |
||
oacAAAConfig | 1.3.6.1.4.1.13191.10.3.4.10 | |||
oacAAAConfigObjects | 1.3.6.1.4.1.13191.10.3.4.10.1 | |||
oacAAARadiusServerConfigTable | 1.3.6.1.4.1.13191.10.3.4.10.1.1 | no-access |
Configuring Radius Server: For the device to authenticate with an radius server database, the following parameters have to be configured. The cli command for adding a radius server details is radius-server |
|
1.3.6.1.4.1.13191.10.3.4.10.1.1.1 | no-access |
The Radius Server config entry will hold the details of one radius servers configured for the client to send the requests for authentication. This table is indexed on oacAAARadiusServrInfo which can be either an ipaddress or hostname of the Radius Server. |
||
oacAAARadiusServerInfo | 1.3.6.1.4.1.13191.10.3.4.10.1.1.1.1 | displaystring | read-only |
The Info can be an : A.B.C.D IPv4 host address A.B.C.D Ipv4 subnet hostname Hostname. |
oacAAARadiusServerPort | 1.3.6.1.4.1.13191.10.3.4.10.1.1.1.2 | integer | read-only |
The default server port to which radius client will connect to a radius server is 1812. But the user can always specify the port to which the client should connect when contacting the configured radius server. |
oacAAARadiusServerSharedKey | 1.3.6.1.4.1.13191.10.3.4.10.1.1.1.3 | octet string | read-only |
Pre shared key between the radius client and server. |
oacAAARadiusServerRetries | 1.3.6.1.4.1.13191.10.3.4.10.1.1.1.4 | integer | read-only |
The Client can do the configured number of retries to this radius server before moving to the next radius server. The default number of retries is 3. |
oacAAARadiusServerTimeout | 1.3.6.1.4.1.13191.10.3.4.10.1.1.1.5 | integer | read-only |
The nummber of seconds to wait before to call a timeout. The default value is 3 seconds. |
oacAAARadiusServerInterface | 1.3.6.1.4.1.13191.10.3.4.10.1.1.1.6 | interfaceindex | read-only |
The interface for this device to use to contact the radius server for auth requests. It is identified by the ifIndex. Each interface/unit is identified by an ifIndex. |
oacAAARadiusServerRowStatus | 1.3.6.1.4.1.13191.10.3.4.10.1.1.1.7 | rowstatus | read-only |
The Row status for an entry in the oacAAARadiusServerConfigTable. |
oacAAARadiusConfigAccPort | 1.3.6.1.4.1.13191.10.3.4.10.1.2 | integer | read-write |
Set the port for Radius accouting. reset or deletion of this value is not possible the port value can only be modified. |
oacAAATacacsServerConfigTable | 1.3.6.1.4.1.13191.10.3.4.10.1.3 | no-access |
Configuring Tacacs client: The cli to add tacacs server info for the tacacs client is tacacs-server |
|
1.3.6.1.4.1.13191.10.3.4.10.1.3.1 | no-access |
An entry holds the information per tacacs server configured. the entry is uniquely identified/indexed by the oacAAATacacsServerInfo which can be either the IPv4 address or an hostname. |
||
oacAAATacacsServerInfo | 1.3.6.1.4.1.13191.10.3.4.10.1.3.1.1 | displaystring | read-only |
The Info can be an : A.B.C.D IPv4 host address A.B.C.D Ipv4 subnet hostname Hostname. |
oacAAATacacsServerPort | 1.3.6.1.4.1.13191.10.3.4.10.1.3.1.2 | integer | read-only |
The default for an tacacs client to connect to tacacs server is 49. But this can vary depending on the server configuration. Hence when a tacacs server is added the port on which this server is running has to be specified. |
oacAAATacacsServerSharedKey | 1.3.6.1.4.1.13191.10.3.4.10.1.3.1.3 | octet string | read-only |
The shared key will be used to authenticate a tacacs client with the tacacs server. This has key is different from the user authentication keys. |
oacAAATacacsServerTimeout | 1.3.6.1.4.1.13191.10.3.4.10.1.3.1.4 | integer | read-only |
The default timeout value for an client to wait for a response from the tacacs server is set to 3 seconds. but this can be modified by setting a value. |
oacAAATacacsServerInterface | 1.3.6.1.4.1.13191.10.3.4.10.1.3.1.5 | interfaceindex | read-only |
The interface which this tacacs client should use to contact the configured tacacs server. The interface is identified by the ifIndex. |
oacAAATacacsServerRowStatus | 1.3.6.1.4.1.13191.10.3.4.10.1.3.1.6 | rowstatus | read-only |
The Rowstatus for this entry. |
oacAAATacacsConfigUseUsername | 1.3.6.1.4.1.13191.10.3.4.10.1.4 | truthvalue | read-write |
usage of user name for authentication for enable command. |
oacAAAAuthenticationServerConfigTable | 1.3.6.1.4.1.13191.10.3.4.10.1.5 | no-access |
AAA configuration on OneOS The AAA servers can be configured to either authenticate user login or authenticate enable commands for a given user. OneOS can either use all radius servers or all tacas servers or a group of configured radius servers or a group of configured tacacs servers or only the local database. By default if a radius/tacacs servers are configured, ONEOS will use the AAA servers in the order in which they are configured. The following commands are available to configure the AAA servers. aaa authentication login {default|console|network} { |
|
1.3.6.1.4.1.13191.10.3.4.10.1.5.1 | no-access |
An entry will define how a login/enable from console or network will use which group of servers of either radius or tacacs. Each entry is uniquly identified by an dual index. |
||
oacAAAAuthenticationFeature | 1.3.6.1.4.1.13191.10.3.4.10.1.5.1.1 | integer | read-only |
A user can login to the device and just monitor. A user can configure the device when he enters the enabled mode. The device will challenge an user for authentication when ever he enters and enabled command. Enumeration: 'login': 1, 'enable': 2. |
oacAAAAuthenticationReqSrc | 1.3.6.1.4.1.13191.10.3.4.10.1.5.1.2 | integer | read-only |
The user can access the device either thru the default mode or from the console or from the network like ssh and telnet. Enumeration: 'default': 1, 'console': 2, 'network': 3. |
oacAAAAuthenticationSvrType | 1.3.6.1.4.1.13191.10.3.4.10.1.5.1.3 | octet string | read-only |
The authentication servers can be either a group of radius serves or a group of tacacs servers or all radius servers or all tacacs server. |
oacAAAAuthenticationServerRowStatus | 1.3.6.1.4.1.13191.10.3.4.10.1.5.1.4 | rowstatus | read-only |
The Row status for this entry. |
oacAAAAuthenticationConfigBannerSeqTable | 1.3.6.1.4.1.13191.10.3.4.10.1.6 | no-access |
This table holds upto 40 banner messages used in authentication |
|
1.3.6.1.4.1.13191.10.3.4.10.1.6.1 | no-access |
Each entry will hold one banner string |
||
oacAAAAuthenticationBannerSequence | 1.3.6.1.4.1.13191.10.3.4.10.1.6.1.1 | integer | read-only |
The maximum number of strings that can be stored are 40. |
oacAAAAuthenticationBannerString | 1.3.6.1.4.1.13191.10.3.4.10.1.6.1.2 | octet string | read-only |
banner test is a set of string maximum upto 255 characters. |
oacAAAAuthenticationBannerSeqRowStatus | 1.3.6.1.4.1.13191.10.3.4.10.1.6.1.3 | rowstatus | read-only |
The row status of this entry |
oacAAAGroupServerConfigTable | 1.3.6.1.4.1.13191.10.3.4.10.1.7 | no-access |
Configuring AAA Group Servers: The cli command to configure a group of servers aaa group server { radius | tacacs } |
|
1.3.6.1.4.1.13191.10.3.4.10.1.7.1 | no-access |
A group server entry will hold information about an configured radius or tacacs server to which group it belongs to. |
||
oacAAAServerGroupName | 1.3.6.1.4.1.13191.10.3.4.10.1.7.1.1 | displaystring | read-only |
The group name which is the index for each entry. |
oacAAAServerGroupType | 1.3.6.1.4.1.13191.10.3.4.10.1.7.1.2 | integer | read-only |
Only server of type defined above can be added to this group. all the servers can be either of type radius or type tacacs. Enumeration: 'tacacs': 2, 'radius': 1. |
oacAAAServerGroupServerInfo | 1.3.6.1.4.1.13191.10.3.4.10.1.7.1.3 | displaystring | read-only |
This object will hold the inforamtion about the server, which can be an IPv4 Address or an Hostname. |
oacAAAServerGroupRowStatus | 1.3.6.1.4.1.13191.10.3.4.10.1.7.1.4 | rowstatus | read-only |
The row status for this entry. |
oacAAAAuthorizationConfigCmdLevelDefTacacs | 1.3.6.1.4.1.13191.10.3.4.10.1.8 | integer | read-write |
To enable AAA authorization for a given privilege level |
oacAAAAccCmdsConfigTable | 1.3.6.1.4.1.13191.10.3.4.10.1.9 | no-access |
This table provides the information for AAA accounting commands. SNMP table for the above command will be 1) access level of the command INTEGER 0-15 2) tacacs+ group OCTET STRING default all. |
|
1.3.6.1.4.1.13191.10.3.4.10.1.9.1 | no-access |
each entry will define an access level and the tacacs group name. |
||
oacAAAAccCmdAccessLevel | 1.3.6.1.4.1.13191.10.3.4.10.1.9.1.1 | integer | read-only |
The command access level for which accounting has to be done. |
oacAAAAccTacacsGroupName | 1.3.6.1.4.1.13191.10.3.4.10.1.9.1.2 | displaystring | read-only |
The group of servers that can be used to perform accounting for a given command access level. |
oacAAAAccCmdsRowStatus | 1.3.6.1.4.1.13191.10.3.4.10.1.9.1.3 | rowstatus | read-only |
The row status for this entry. |
oacAAAAccConfigExecStartStop | 1.3.6.1.4.1.13191.10.3.4.10.1.10 | octet string | read-write |
Set EXEC accounting and the method is default, to use start-stop record accounting notice. Uses TACACS+ server for accounting. |
oacAAAAccConfigSystemStartStop | 1.3.6.1.4.1.13191.10.3.4.10.1.11 | octet string | read-write |
Set System accounting and the method is default, to use start-stop record accounting notice. Uses TACACS+ server for accounting. |
oacAAAConfigConformance | 1.3.6.1.4.1.13191.10.3.4.10.2 | |||
oacAAAConfigGroups | 1.3.6.1.4.1.13191.10.3.4.10.2.1 | |||
oacAAAConfigGroup | 1.3.6.1.4.1.13191.10.3.4.10.2.1.1 |
Group of AAA objects |
||
oacAAACompls | 1.3.6.1.4.1.13191.10.3.4.10.2.2 |