TELDAT-TRAP-BSPF-MIB: View SNMP OID List / Download MIB
VENDOR: TELDAT, S.A.
Home | MIB: TELDAT-TRAP-BSPF-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
bspfTrapsMIB | 1.3.6.1.4.1.2007.1.4.194 |
This Module Information Base file is defined for managing received SNMP notifications generated by the BSPF event subsystem. |
||
bspfEventsGroup | 1.3.6.1.4.1.2007.1.4.194.1 | |||
bspfEventObjects1 | 1.3.6.1.4.1.2007.1.4.194.1.1 |
Event BSPF.1 Bridge has detected an incoming packet whose destination matches a spoofed MAC address. |
||
bspf1_src_mac | 1.3.6.1.4.1.2007.1.4.194.1.1.1 | displaystring | no-access |
Parameter 'src-mac' in event BSPF.1 |
bspf1_src_port | 1.3.6.1.4.1.2007.1.4.194.1.1.2 | integer32 | no-access |
Parameter 'src-port' in event BSPF.1 |
bspf1_dst_mac | 1.3.6.1.4.1.2007.1.4.194.1.1.3 | displaystring | no-access |
Parameter 'dst-mac' in event BSPF.1 |
bspf1_dst_port | 1.3.6.1.4.1.2007.1.4.194.1.1.4 | integer32 | no-access |
Parameter 'dst-port' in event BSPF.1 |
bspf1_protocol | 1.3.6.1.4.1.2007.1.4.194.1.1.5 | integer32 | no-access |
Parameter 'protocol' in event BSPF.1 |
bspf1_interface | 1.3.6.1.4.1.2007.1.4.194.1.1.6 | displaystring | no-access |
Parameter 'interface' in event BSPF.1 |
bspfEventObjects2 | 1.3.6.1.4.1.2007.1.4.194.1.2 |
Event BSPF.2 Bridge has intercepted an incoming packet destined for a spoofed MAC. If its protocol is IP, the destination ip address does not match the one spoofed. If it is ARP, the operation code must be request. |
||
bspf2_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.2.1 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.2 |
bspf2_protocol | 1.3.6.1.4.1.2007.1.4.194.1.2.2 | integer32 | no-access |
Parameter 'protocol' in event BSPF.2 |
bspf2_interface | 1.3.6.1.4.1.2007.1.4.194.1.2.3 | displaystring | no-access |
Parameter 'interface' in event BSPF.2 |
bspfEventObjects3 | 1.3.6.1.4.1.2007.1.4.194.1.3 |
Event BSPF.3 The MAC address associated with a spoofed address has been updated. |
||
bspf3_mac_addr | 1.3.6.1.4.1.2007.1.4.194.1.3.1 | displaystring | no-access |
Parameter 'mac-addr' in event BSPF.3 |
bspf3_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.3.2 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.3 |
bspf3_interface | 1.3.6.1.4.1.2007.1.4.194.1.3.3 | displaystring | no-access |
Parameter 'interface' in event BSPF.3 |
bspfEventObjects4 | 1.3.6.1.4.1.2007.1.4.194.1.4 |
Event BSPF.4 The port associated with a spoofed address has been updated. |
||
bspf4_port | 1.3.6.1.4.1.2007.1.4.194.1.4.1 | integer32 | no-access |
Parameter 'port' in event BSPF.4 |
bspf4_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.4.2 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.4 |
bspf4_interface | 1.3.6.1.4.1.2007.1.4.194.1.4.3 | displaystring | no-access |
Parameter 'interface' in event BSPF.4 |
bspfEventObjects5 | 1.3.6.1.4.1.2007.1.4.194.1.5 |
Event BSPF.5 Bridge-spoofing sends an ARP packet periodically requesting the MAC address associated with every spoofed address configured. |
||
bspf5_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.5.1 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.5 |
bspf5_interface | 1.3.6.1.4.1.2007.1.4.194.1.5.2 | displaystring | no-access |
Parameter 'interface' in event BSPF.5 |
bspfEventObjects6 | 1.3.6.1.4.1.2007.1.4.194.1.6 |
Event BSPF.6 Bridge-spoofing broadcasts an ARP gratuitous packet after changing the MAC address associated with a configured spoofed address. |
||
bspf6_mac_addr | 1.3.6.1.4.1.2007.1.4.194.1.6.1 | displaystring | no-access |
Parameter 'mac-addr' in event BSPF.6 |
bspf6_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.6.2 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.6 |
bspf6_interface | 1.3.6.1.4.1.2007.1.4.194.1.6.3 | displaystring | no-access |
Parameter 'interface' in event BSPF.6 |
bspfEventObjects7 | 1.3.6.1.4.1.2007.1.4.194.1.7 |
Event BSPF.7 Received an ARP request packet asking for a spoofed configured address. |
||
bspf7_mac_addr | 1.3.6.1.4.1.2007.1.4.194.1.7.1 | displaystring | no-access |
Parameter 'mac-addr' in event BSPF.7 |
bspf7_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.7.2 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.7 |
bspf7_interface | 1.3.6.1.4.1.2007.1.4.194.1.7.3 | displaystring | no-access |
Parameter 'interface' in event BSPF.7 |
bspfEventObjects8 | 1.3.6.1.4.1.2007.1.4.194.1.8 |
Event BSPF.8 Sent a reply to an ARP request asking for a spoofed configured address. |
||
bspf8_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.8.1 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.8 |
bspf8_src_mac | 1.3.6.1.4.1.2007.1.4.194.1.8.2 | displaystring | no-access |
Parameter 'src-mac' in event BSPF.8 |
bspf8_dst_mac | 1.3.6.1.4.1.2007.1.4.194.1.8.3 | displaystring | no-access |
Parameter 'dst-mac' in event BSPF.8 |
bspf8_interface | 1.3.6.1.4.1.2007.1.4.194.1.8.4 | displaystring | no-access |
Parameter 'interface' in event BSPF.8 |
bspfEventObjects9 | 1.3.6.1.4.1.2007.1.4.194.1.9 |
Event BSPF.9 A bridge must be defined before a spoofing ip address can be configured. |
||
bspf9_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.9.1 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.9 |
bspf9_interface | 1.3.6.1.4.1.2007.1.4.194.1.9.2 | displaystring | no-access |
Parameter 'interface' in event BSPF.9 |
bspfEventObjects10 | 1.3.6.1.4.1.2007.1.4.194.1.10 |
Event BSPF.10 There is no enough free memory to configure a new spoofing ip address. |
||
bspf10_spoof_addr | 1.3.6.1.4.1.2007.1.4.194.1.10.1 | ipaddress | no-access |
Parameter 'spoof-addr' in event BSPF.10 |
bspf10_interface | 1.3.6.1.4.1.2007.1.4.194.1.10.2 | displaystring | no-access |
Parameter 'interface' in event BSPF.10 |
bspfNotifications | 1.3.6.1.4.1.2007.1.4.194.2 | |||
bspfNotificationsPrefix | 1.3.6.1.4.1.2007.1.4.194.2.0 | |||
bspfNotification1 | 1.3.6.1.4.1.2007.1.4.194.2.0.1 |
Notification of Event BSPF.1 Message: 'Packet from $1 port $2 to $3 port $4 protocol 0x$5, interface $6' Parameters list: $1: bspf1-src-mac $2: bspf1-src-port $3: bspf1-dst-mac $4: bspf1-dst-port $5: bspf1-protocol $6: bspf1-interface Bridge has detected an incoming packet whose destination matches a spoofed MAC address. |
||
bspfNotification2 | 1.3.6.1.4.1.2007.1.4.194.2.0.2 |
Notification of Event BSPF.2 Message: 'Packet intercepted, spoofed address $1 protocol 0x$2, interface $3' Parameters list: $1: bspf2-spoof-addr $2: bspf2-protocol $3: bspf2-interface Bridge has intercepted an incoming packet destined for a spoofed MAC. If its protocol is IP, the destination ip address does not match the one spoofed. If it is ARP, the operation code must be request. |
||
bspfNotification3 | 1.3.6.1.4.1.2007.1.4.194.2.0.3 |
Notification of Event BSPF.3 Message: 'New MAC $1 learned, spoofed address $2, interface $3' Parameters list: $1: bspf3-mac-addr $2: bspf3-spoof-addr $3: bspf3-interface The MAC address associated with a spoofed address has been updated. |
||
bspfNotification4 | 1.3.6.1.4.1.2007.1.4.194.2.0.4 |
Notification of Event BSPF.4 Message: 'New port $1 learned, spoofed address $2, interface $3' Parameters list: $1: bspf4-port $2: bspf4-spoof-addr $3: bspf4-interface The port associated with a spoofed address has been updated. |
||
bspfNotification5 | 1.3.6.1.4.1.2007.1.4.194.2.0.5 |
Notification of Event BSPF.5 Message: 'Discovering MAC and port associated with spoofed address $1, interface $2' Parameters list: $1: bspf5-spoof-addr $2: bspf5-interface Bridge-spoofing sends an ARP packet periodically requesting the MAC address associated with every spoofed address configured. |
||
bspfNotification6 | 1.3.6.1.4.1.2007.1.4.194.2.0.6 |
Notification of Event BSPF.6 Message: 'Broadcasting new MAC $1 associated with spoofed address $2, interface $3' Parameters list: $1: bspf6-mac-addr $2: bspf6-spoof-addr $3: bspf6-interface Bridge-spoofing broadcasts an ARP gratuitous packet after changing the MAC address associated with a configured spoofed address. |
||
bspfNotification7 | 1.3.6.1.4.1.2007.1.4.194.2.0.7 |
Notification of Event BSPF.7 Message: 'ARP request from MAC $1 for spoofed address $2, interface $3' Parameters list: $1: bspf7-mac-addr $2: bspf7-spoof-addr $3: bspf7-interface Received an ARP request packet asking for a spoofed configured address. |
||
bspfNotification8 | 1.3.6.1.4.1.2007.1.4.194.2.0.8 |
Notification of Event BSPF.8 Message: 'ARP reply for address $1 is MAC $2, destination MAC $3, interface $4' Parameters list: $1: bspf8-spoof-addr $2: bspf8-src-mac $3: bspf8-dst-mac $4: bspf8-interface Sent a reply to an ARP request asking for a spoofed configured address. |
||
bspfNotification9 | 1.3.6.1.4.1.2007.1.4.194.2.0.9 |
Notification of Event BSPF.9 Message: 'Error adding address $1, bridge must be enabled, interface $2' Parameters list: $1: bspf9-spoof-addr $2: bspf9-interface A bridge must be defined before a spoofing ip address can be configured. |
||
bspfNotification10 | 1.3.6.1.4.1.2007.1.4.194.2.0.10 |
Notification of Event BSPF.10 Message: 'Error adding address $1, out of memory, interface $2' Parameters list: $1: bspf10-spoof-addr $2: bspf10-interface There is no enough free memory to configure a new spoofing ip address. |