RADLAN-SECSD-MIB: View SNMP OID List / Download MIB
VENDOR: RND
Home | MIB: RADLAN-SECSD-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
rlSecSd | 1.3.6.1.4.1.89.209 |
The private MIB module definition for Security Sensitive Data (SSD), contains the MIB tables and scalars to manage the access through the different management channels as CLI, WEB and others, for sensitive data as user names and passwords in system. |
||
rlSecSdRulesTable | 1.3.6.1.4.1.89.209.1 | no-access |
The table holding the Security Sensitive Data access rules per: user name / user level and management channel. Allow to add/edit/remove Security Sensitive Data rules. |
|
1.3.6.1.4.1.89.209.1.1 | no-access |
An entry in the rlSecSdRulesTable. |
||
rlSecSdRuleUser | 1.3.6.1.4.1.89.209.1.1.1 | rlsecsdruleusertype | read-write |
Contains the Rule user type as described in RlSecSdRuleUserType. |
rlSecSdRuleUserName | 1.3.6.1.4.1.89.209.1.1.2 | displaystring | read-write |
Contains the Rule user name when rlSecSdRuleUser value is user-name, Otherwise it contains an empty string |
rlSecSdRuleChannel | 1.3.6.1.4.1.89.209.1.1.3 | rlsecsdchanneltype | read-write |
Contains the Rule management channel type as described in RlSecSdChannelType. secure-xml-snmp and insecure-xml-snmp management channels have no include-encrypted capability thus their rlSecSdRulePermitRead and rlSecSdRuleRead can have only RlSecSdAccessType values of exclude or include-decrypted. |
rlSecSdRuleRead | 1.3.6.1.4.1.89.209.1.1.4 | rlsecsdaccesstype | read-write |
Contains the Rule default read access level as described in RlSecSdAccessType, must be lower or equal access from rlSecSdRulePermitRead |
rlSecSdRulePermitRead | 1.3.6.1.4.1.89.209.1.1.5 | rlsecsdpermitaccesstype | read-write |
Contains the Rule maximum permission access level as described in RlSecSdPermitAccessType. |
rlSecSdRuleIsDefault | 1.3.6.1.4.1.89.209.1.1.6 | truthvalue | read-only |
true - Rule has created by the by the system. false - Rule has created by the user. |
rlSecSdRuleOwner | 1.3.6.1.4.1.89.209.1.1.7 | rlsecsdruleownertype | read-write |
Contains the current Rule ownership as defined in RlSecSdRuleOwnerType. when rlSecSdRuleIsDefault is true, rlSecSdRuleOwner allowed to change default rule to user rule and vice versa. |
rlSecSdRuleStatus | 1.3.6.1.4.1.89.209.1.1.8 | rowstatus | read-write |
The status of a table entry. It is used to Add/Edit/Delete an entry from this table. |
rlSecSdMngSessionsTable | 1.3.6.1.4.1.89.209.2 | no-access |
The table holding Security Sensitive Data management sessions. Allowing to get management channel, user name, user level. |
|
1.3.6.1.4.1.89.209.2.2 | no-access |
An entry in the rlSecSdMngSessionsTable. |
||
rlSecSdMngSessionId | 1.3.6.1.4.1.89.209.2.2.1 | integer | read-only |
Contains the Security Sensitive Data management session identifier, rlSecSdCurrentSessionId is used to get the current management session identifier |
rlSecSdMngSessionUserLevel | 1.3.6.1.4.1.89.209.2.2.2 | integer | read-only |
Contains the Security Sensitive Data management session user access level. |
rlSecSdMngSessionUserName | 1.3.6.1.4.1.89.209.2.2.3 | displaystring | read-write |
Contains the Security Sensitive Data management session user name. |
rlSecSdMngSessionChannel | 1.3.6.1.4.1.89.209.2.2.4 | rlsecsdchanneltype | read-only |
Contains the Security Sensitive Data management session channel type as described in RlSecSdChannelType. |
rlSecSdSessionControl | 1.3.6.1.4.1.89.209.3 | rlsecsdsessionaccesstype | read-write |
Action scalar which set the default read access of Security Sensitive Data. Affect only on session which from this scalar is configured. Scalar Get value is the default-display/read of the session which from this scalar is retrieved. |
rlSecSdCurrentSessionId | 1.3.6.1.4.1.89.209.4 | integer | read-only |
Get the current SSD management channel identifier, used to get information from rlSecSdMngSessionsTable. |
rlSecSdPassPhrase | 1.3.6.1.4.1.89.209.5 | displaystring | read-write |
Set the passphrase for the SSD encryptyption / decryption key. on set, passphrase is in plain text format. on get, passphrase is encrypted. |
rlSecSdFilePassphraseControl | 1.3.6.1.4.1.89.209.6 | integer | read-write |
File Passphrase control provides an additional level of protection on passphrase and configurations. restricted - a device restricts its passphrase from being inserted into a configuration file. unrestricted - (default) a device will include its passphrase when creating a configuration file. Enumeration: 'restricted': 1, 'unrestricted': 2. |
rlSecSdFileIntegrityControl | 1.3.6.1.4.1.89.209.7 | integer | read-write |
File integrity control provides a validation of configuration file. enable - Validate the configuration file digest when downloading the file to startup configuration. disable - Do not validate. Enumeration: 'enable': 1, 'disable': 2. |
rlSecSdConfigurationFileSsdDigest | 1.3.6.1.4.1.89.209.8 | displaystring | read-write |
SSD block in configuration file integrity digest, auxiliary action scalar for internal system using during configuration download. |
rlSecSdConfigurationFileDigest | 1.3.6.1.4.1.89.209.9 | displaystring | read-write |
SSD configuration file integrity digest, auxiliary action scalar for internal system using during configuration download. |
rlSecSdFileIndicator | 1.3.6.1.4.1.89.209.10 | displaystring | read-write |
Retrieve configuration file SSD indicator. set value: configuration file name. get value: Exclude, Encrypted, Plaintext |