SECURITY-MANAGEMENT-MIB: View SNMP OID List / Download MIB
VENDOR: AVAYA COMMUNICATION
Home | MIB: SECURITY-MANAGEMENT-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
avayaSecurity | 1.3.6.1.4.1.6889.2.1.14 | |||
secMngModule | 1.3.6.1.4.1.6889.2.1.14.1 |
Defines MIB objects related to device secured management. |
||
secMode | 1.3.6.1.4.1.6889.2.1.14.1.1 | onofftype | read-only |
When the security mode flag = on - it indicates that device operates in secured mode, =off - in non-secured mode. Otherwize when the value retuned =Not relevant - secured mode is not supported in this device. |
secTcpSynCookies | 1.3.6.1.4.1.6889.2.1.14.1.2 | |||
secTcpSynCkiOpState | 1.3.6.1.4.1.6889.2.1.14.1.2.1 | onofftype | read-only |
Monitors the operational state of the TCP SYN cookies defense mechanism. The operational state of the SYN cookies can change only after a reset, if the configuration state was changed and the running configuration was saved to the startup configuration before the reset. Use secTcpSynCkiCfgState to monitor and change the SYN cookies configuration state. When the SYN cookies feature is turned on, it helps protect the local host from SYN attacks (a type of DoS attack). |
secTcpSynCkiCfgState | 1.3.6.1.4.1.6889.2.1.14.1.2.2 | onofftype | read-write |
Controls and monitors the configuration state of the TCP SYN cookies defense mechanism. The operational state of the SYN cookies can change only after reset, if the configuration state was changed and the running configuration was saved to the startup configuration before the reset. Use secTcpSynCkiOpState to monitor the SYN cookies operational state. When the SYN cookies feature is turned on, it helps protect the local host from SYN attacks (a type of DoS attack). |
secMngProtoTable | 1.3.6.1.4.1.6889.2.1.14.1.3 | no-access |
List of security management protocols supported in the device. |
|
1.3.6.1.4.1.6889.2.1.14.1.3.1 | no-access |
Description. |
||
secMngProtoId | 1.3.6.1.4.1.6889.2.1.14.1.3.1.1 | integer | read-only |
Index to the secMngProtoTable. The index can take one of the following values that correspond to supported management protocols scpConfigFiles(1), scpImageFiles(2), ssh(3), telnet(4), snmpv3(5), http(6), https(7), telnetClient(8), icmpRedirection(9), - icmp redirection service state icmp(10), - icmp services status recoveryPassword(11), - recovery password state sshClient(12), snmpv1(13), icmpEcho(14) - icmp service has been launched in EchoOnly mode tftp(16), dhcp(17), dnsResolver(18, scpClient(19), tftpClient(20), servicesTelnet(21), - reports telnet status on Services interface in G450 Missing entry indicates that corresponding protocol is not supported. Enumeration: 'scpClient': 19, 'recoveryPassword': 11, 'snmpv1': 13, 'ftpClient': 15, 'snmpv3': 5, 'tftpClient': 20, 'dnsRelay': 22, 'https': 7, 'dhcp': 17, 'scpConfigFiles': 1, 'telnetClient': 8, 'http': 6, 'telnetServices': 21, 'arpInspection': 23, 'icmpRedirection': 9, 'telnet': 4, 'scpImageFiles': 2, 'dnsResolver': 18, 'ssh': 3, 'icmp': 10, 'icmpEcho': 14, 'sshClient': 12, 'tftp': 16. |
secMngProtoStatus | 1.3.6.1.4.1.6889.2.1.14.1.3.1.2 | servicestatetype | read-only |
Portocol status. When the status is =on - it indicates that correpsonding protocol is up and running, =off - protocol is down. Otherwize when the value retuned =Not relevant - the protocol is not supported. |
secMngConformance | 1.3.6.1.4.1.6889.2.1.14.1.4 | |||
secMngGroups | 1.3.6.1.4.1.6889.2.1.14.1.4.1 | |||
secMngBasicGroup | 1.3.6.1.4.1.6889.2.1.14.1.4.1.1 |
Description. |
||
secMngCompliance | 1.3.6.1.4.1.6889.2.1.14.1.4.2 | |||
lsgLicManagement | 1.3.6.1.4.1.6889.2.1.14.1.5 |
Group of MIBs objects used for configuration/presentation of the License information generated by Avaya Remote Feature Activation (RFA) system. |
||
lsgLicMngTable | 1.3.6.1.4.1.6889.2.1.14.1.5.1 | no-access |
RFA based License management table. All elements are displaying the feature activation status. License activation controlled by the license file. The table is indexed by the license feature keyword assuming that the same keyword describing a feature cannot appear more than once per a license file. |
|
1.3.6.1.4.1.6889.2.1.14.1.5.1.1 | no-access |
Entry in lsgLicMngTable. |
||
lsgLicMngFeatureKeyword | 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.1 | octet string | read-only |
This table entry contains a features keyword. The feature keywords are text-based for example FEAT_VPN string. This field is used as a table index |
lsgLicMngFeatureType | 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.2 | integer | read-only |
License activation mechanism support two feature types * Boolean on-off feature * Features that describe quantities for example number of concurrent VPN peers Enumeration: 'quantifiableFeature': 2, 'onOffFeature': 1. |
lsgLicMngAdminStatus | 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.3 | onofftype | read-only |
An administration status shows the feature activation status - when set to On the feature is activated by the RFA licensing system. |
lsgLicMngOperStatus | 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.4 | onofftype | read-only |
The operation status shows the actual status of the corresponding feature - feature can be not operational enabled if for example device must be reset for feature to be activated or feature is not supported by a device. |
lsgLicMngCountedValue | 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.5 | unsigned32 | read-only |
For counted features, this entry shows the associated quantity |
lsgLicMngLastError | 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.6 | integer | read-only |
Shows feature error state Enumeration: 'licNoError': 2. |
lsgLicMngConformance | 1.3.6.1.4.1.6889.2.1.14.1.5.20 |
Description. |
||
lsgLicMngGroups | 1.3.6.1.4.1.6889.2.1.14.1.5.20.1 |
Description. |
||
lsgLicMngBasicGroup | 1.3.6.1.4.1.6889.2.1.14.1.5.20.1.1 |
Description. |
||
fips140 | 1.3.6.1.4.1.6889.2.1.14.1.6 |
Description. |
||
fipsEnhancedSecurityFlg | 1.3.6.1.4.1.6889.2.1.14.1.6.1 | onofftype | read-only |
enhanceSecurity flag reports operation of a product in enhance security mode. When running under enhanced security a product performs certain secure-related activities safely, closely matching FIPS-140-2 standard. However the flag doesn't necessary indicate that all device operations comply to FIPS approved mode as some of security activities might be controlled via different mechanisms for example manual configuration. Security policy/Crypto Office guidance documents shall be used as reference as for if this flag can be used as an evidence for operation in FIPS approved mode. The flag is read only and set via product CLI. |
avMssNotifications | 1.3.6.1.4.1.6889.2.1.14.1.7 |
Subtree hosting MSS notification traps |
||
avMssNotificationPrefix | 1.3.6.1.4.1.6889.2.1.14.1.7.0 |
Description. |
||
avMSSDenialOfService | 1.3.6.1.4.1.6889.2.1.14.1.7.0.1 |
The MSS notification sent on DoS attack |
||
avMSSNotificationRate | 1.3.6.1.4.1.6889.2.1.14.1.7.2 | integer | read-write |
Defines the rate of MSS notification report. MSS reports will be generated as per rate if the event group counter passes the threshold correspondingly. The rate units are given in seconds with minimum - 10 seconds maximum - 8 hours (60 * 60 * 8) |
avMSSVarbinds | 1.3.6.1.4.1.6889.2.1.14.1.7.4 |
Subtree of access-for-notify arguments to MSS notification varbinds list. |
||
avMSSVarbindsDoSType | 1.3.6.1.4.1.6889.2.1.14.1.7.4.1 | integer | no-access |
Enumeration of DoS attacks Enumeration: 'avMSSDoSICMPReflectAttack': 3, 'avMSSDoSMalformedARPs': 1, 'avMSSDoSUknownPort': 4, 'avMSSDoSUrgTCPOption': 5, 'avMSSUserDefinedDoSAttack100': 100, 'avMSSUserDefinedDoSAttack102': 102, 'avMSSUserDefinedDoSAttack104': 104, 'avMSSUserDefinedDoSAttack103': 103, 'avMSSDoSFraggleAttack': 9, 'avMSSDoSMalFragmentIP': 10, 'avMSSSpoofedIP': 11, 'avMSSunAuthenticatedAccess': 13, 'avMSSUnknownL4Protocol': 12, 'avMSSUserDefinedDoSAttack101': 101, 'avMSSDoSSmurfAttack': 8, 'avMSSDoSMalformedIP': 6, 'avMSSDoSLandAttack': 2, 'avMSSDoSSynFlood': 7, 'avMSSUserDefinedDoSAttack105': 105. |
avMSSVarbindsDescription | 1.3.6.1.4.1.6889.2.1.14.1.7.4.2 | displaystring | no-access |
Textual description of the DoS event |
avMSSVarbindsSrcAddr | 1.3.6.1.4.1.6889.2.1.14.1.7.4.3 | ipaddress | no-access |
Source IP address in IP header. Set to 0.0.0.0 if address is unknown |
avMSSVarbindsDstAddr | 1.3.6.1.4.1.6889.2.1.14.1.7.4.4 | ipaddress | no-access |
Destination IP address in IP header. Set to 0.0.0.0 if address is unknown |
avMSSVarbindsDstPort | 1.3.6.1.4.1.6889.2.1.14.1.7.4.5 | integer | no-access |
Destination port number in IP header. 0 if port is not applicable or unknown |
avMSSVarbindsIpProtocol | 1.3.6.1.4.1.6889.2.1.14.1.7.4.6 | integer | no-access |
The protocol field in IP header |
avMSSVarbindsCount | 1.3.6.1.4.1.6889.2.1.14.1.7.4.7 | counter64 | no-access |
Counted number of events that occur in a given period for a corresponding class of security violations (DoS, not authorized access, etc). |
avMSSVarbindsSrcMACAddr | 1.3.6.1.4.1.6889.2.1.14.1.7.4.8 | physaddress | no-access |
Source Physical address (MAC) of a packet identified as a packet carrying DoS payload. Set to 00:00:00:00:00:00 when phyicial address is not supported or unknown to the system |
avMSSgroup | 1.3.6.1.4.1.6889.2.1.14.1.8 |
Description. |
||
mssNotificationGroup | 1.3.6.1.4.1.6889.2.1.14.1.9 |
Description. |
||
secMngNotifications | 1.3.6.1.4.1.6889.2.1.14.1.10 |
Description. |
||
secMngNotificationsPrefix | 1.3.6.1.4.1.6889.2.1.14.1.10.0 |
Description. |
||
avConfigurationEncKeyMismatchFault | 1.3.6.1.4.1.6889.2.1.14.1.10.0.1 |
Encryption keys mismatch error. Configuration download operation is aborted |
||
avConfigurationMasterKeyChange | 1.3.6.1.4.1.6889.2.1.14.1.10.0.2 |
Configuration Master key was changed |
||
avPasswordToExpireAlert | 1.3.6.1.4.1.6889.2.1.14.1.10.0.3 |
User password is about to expire in n days |
||
avUnAuthAccessEvent | 1.3.6.1.4.1.6889.2.1.14.1.10.0.200 |
Notification on unauthorized login attempts. o For CLI and SNMP login failures: Both SNMP SSH and WEB management interfaces shall identify situation and alert. The reported information should include wrong user name, host name and IP address of remote host. Passwords is not reported because of the possibility to reveal password. o For pre-shared-key (PSK) authentication failure in IKE: * lntUnauthUserName - - In IKE AM: the ID sent by the remote peer in the ID payload. - In IKE MM: the ID associated with the remote peer IP in the running configuration. * avUnauthInetAddressType and avUnauthInetAddress - represents the source IP of the packet sent by the remote peer. * avUnauthProtocol - lntIKEAccess(500) |
||
avAccountLockoutEvent | 1.3.6.1.4.1.6889.2.1.14.1.10.0.201 |
After configurable number of failed attempts to authenticate a user, device penalized by locking them out for a pre-specified amount of time. |
||
avIPv6AddressDuplicationEvent | 1.3.6.1.4.1.6889.2.1.14.1.10.0.202 |
The trap is generated whenever there is a detection of IPv6 address (link-local or global IPv6 address) duplication as part of DAD. |
||
secMngVarbinds | 1.3.6.1.4.1.6889.2.1.14.1.10.1 |
Notify only varbinds used for notifications in secMngNotifications group |
||
secMngNumOfDays2Expire | 1.3.6.1.4.1.6889.2.1.14.1.10.1.1 | unsigned32 | no-access |
Description. |
avUnauthUserName | 1.3.6.1.4.1.6889.2.1.14.1.10.1.3 | octet string | no-access |
The name of the user who's attempt to access device was identified as unauthorized. |
avUnauthProtocol | 1.3.6.1.4.1.6889.2.1.14.1.10.1.5 | integer | no-access |
The management protocol employed for the unauthorized access - avSSHAccess(22) -- SSH protocol avTELNETAccess(23), --Telnet protocol avHTTPAccess(80), -- HTTP protocol avSNMPAccess(161), -- SNMP protocol avHTTPSAccess(443), -- HTTPS protocol over TLS sockets avIKEAccess(500), -- IKE protocol - PSK authentication failure avRASAccess(6889), -- RAS access over dial-up connection avConsoleAccess(6890), -- Access from the Console port avPPPAccess(6891) -- Access to PPP over modem Enumeration: 'avHTTPAccess': 80, 'avHTTPSAccess': 443, 'avRASAccess': 6889, 'avSNMPAccess': 161, 'avIKEAccess': 500, 'avPPPAccess': 6891, 'avTELNETAccess': 23, 'avSSHAccess': 22, 'avConsoleAccess': 6890. |
avUnauthInetAddressType | 1.3.6.1.4.1.6889.2.1.14.1.10.1.9 | inetaddresstype | no-access |
The Inet Address Type of access violating station |
avUnauthInetAddress | 1.3.6.1.4.1.6889.2.1.14.1.10.1.10 | inetaddress | no-access |
The Inet Address of access violating station |
avDuplicatedInetAddressType | 1.3.6.1.4.1.6889.2.1.14.1.10.1.11 | inetaddresstype | no-access |
The duplicated Inet Address Type. |
avDuplicatedInetAddress | 1.3.6.1.4.1.6889.2.1.14.1.10.1.12 | inetaddress | no-access |
The duplicated Inet Address. |
avDuplicatedMACAddress | 1.3.6.1.4.1.6889.2.1.14.1.10.1.13 | physaddress | no-access |
The MAC address of the station that claims to be configured with the duplicated IPv6 address. |
avMngNotificationCompliance | 1.3.6.1.4.1.6889.2.1.14.1.10.2 |
Description. |
||
secMngNotificationGroup | 1.3.6.1.4.1.6889.2.1.14.1.11 |
Description. |
||
avASGAuthenticationFiles | 1.3.6.1.4.1.6889.2.1.14.1.12 |
Info on authentication file(s) installed in a product |
||
avASGAuthFileHeader | 1.3.6.1.4.1.6889.2.1.14.1.12.3 |
The information on Authentication File stored in ASG AF file header |
||
avASGAuthFileAFID | 1.3.6.1.4.1.6889.2.1.14.1.12.3.1 | displaystring | read-only |
The productID value ascociated with the Authentication File (format 7xxxxxxxxx) |
avASGAuthFileGenDate | 1.3.6.1.4.1.6889.2.1.14.1.12.3.2 | displaystring | read-only |
Date of Authentication file generation (format YYYY/MM/DD) |
avASGAuthFileGenTime | 1.3.6.1.4.1.6889.2.1.14.1.12.3.3 | displaystring | read-only |
A 8-character string in US short locale time (format= HH:MM:SS) |
avASGAuthFileRelease | 1.3.6.1.4.1.6889.2.1.14.1.12.3.4 | displaystring | read-only |
Major software release the AF file was generated for |
avASGNotifications | 1.3.6.1.4.1.6889.2.1.14.1.12.3.5 |
Description. |
||
avASGNotificationsPrefix | 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0 |
Description. |
||
avASGAFDownloadSuccess | 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0.1 |
AF download successfully accomplished |
||
avASGAFDownloadFailure | 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0.2 |
AF download Failed |
||
avASGAuthFileGroup | 1.3.6.1.4.1.6889.2.1.14.1.12.1000 |
Description. |
||
avASGAuthFileNotificationGroup | 1.3.6.1.4.1.6889.2.1.14.1.12.1001 |
ASG authentictation File Notification Group |
||
avSecLocalDateAndTime | 1.3.6.1.4.1.6889.2.1.14.1.13 | dateandtime | read-write |
Setting the Local current RTC date and time, when not registered with CM |