A3COM-HUAWEI-DHCPSNOOP-MIB

File: A3COM-HUAWEI-DHCPSNOOP-MIB.mib (9849 bytes)

Imported modules

SNMPv2-TC SNMPv2-SMI RFC1213-MIB
A3COM-HUAWEI-LswVLAN-MIB INET-ADDRESS-MIB A3COM-HUAWEI-OID-MIB

Imported symbols

RowStatus MacAddress MODULE-IDENTITY
OBJECT-TYPE IpAddress Integer32
Counter64 ifIndex hwdot1qVlanIndex
InetAddressType InetAddress h3cCommon
TruthValue

Defined Types

H3cDhcpSnoopEntry  
SEQUENCE    
  h3cDhcpSnoopClientIpAddressType InetAddressType
  h3cDhcpSnoopClientIpAddress InetAddress
  h3cDhcpSnoopClientMacAddress MacAddress
  h3cDhcpSnoopClientProperty INTEGER
  h3cDhcpSnoopClientUnitNum INTEGER

H3cDhcpSnoopTrustEntry  
SEQUENCE    
  h3cDhcpSnoopTrustStatus INTEGER

H3cDhcpSnoopVlanEntry  
SEQUENCE    
  h3cDhcpSnoopVlanIndex Integer32
  h3cDhcpSnoopVlanEnable TruthValue

Defined Values

h3cDhcpSnoop 1.3.6.1.4.1.43.45.1.10.2.36
The private mib file includes the DHCP Snooping profile.
MODULE-IDENTITY    

h3cDhcpSnoopMibObject 1.3.6.1.4.1.43.45.1.10.2.36.1
OBJECT IDENTIFIER    

h3cDhcpSnoopEnable 1.3.6.1.4.1.43.45.1.10.2.36.1.1
DHCP Snooping status (enable or disable).
OBJECT-TYPE    
  INTEGER enable(1), disable(2)  

h3cDhcpSnoopTable 1.3.6.1.4.1.43.45.1.10.2.36.1.2
The table containing information of DHCP clients listened by DHCP snooping and it's enabled or disabled by setting h3cDhcpSnoopEnable node.
OBJECT-TYPE    
  SEQUENCE OF  
    H3cDhcpSnoopEntry

h3cDhcpSnoopEntry 1.3.6.1.4.1.43.45.1.10.2.36.1.2.1
An entry containing information of DHCP clients.
OBJECT-TYPE    
  H3cDhcpSnoopEntry  

h3cDhcpSnoopClientIpAddressType 1.3.6.1.4.1.43.45.1.10.2.36.1.2.1.1
DHCP clients' IP addresses type (IPv4 or IPv6).
OBJECT-TYPE    
  InetAddressType  

h3cDhcpSnoopClientIpAddress 1.3.6.1.4.1.43.45.1.10.2.36.1.2.1.2
DHCP clients' IP addresses collected by DHCP snooping.
OBJECT-TYPE    
  InetAddress  

h3cDhcpSnoopClientMacAddress 1.3.6.1.4.1.43.45.1.10.2.36.1.2.1.3
DHCP clients' MAC addresses collected by DHCP snooping.
OBJECT-TYPE    
  MacAddress  

h3cDhcpSnoopClientProperty 1.3.6.1.4.1.43.45.1.10.2.36.1.2.1.4
Method of getting IP addresses collected by DHCP snooping.
OBJECT-TYPE    
  INTEGER static(1), dynamic(2)  

h3cDhcpSnoopClientUnitNum 1.3.6.1.4.1.43.45.1.10.2.36.1.2.1.5
IRF (Intelligent Resilient Fabric) unit number via whom the clients get their IP addresses. The value 0 means this device does not support IRF.
OBJECT-TYPE    
  INTEGER  

h3cDhcpSnoopTrustTable 1.3.6.1.4.1.43.45.1.10.2.36.1.3
A table is used to configure and monitor port trusted status.
OBJECT-TYPE    
  SEQUENCE OF  
    H3cDhcpSnoopTrustEntry

h3cDhcpSnoopTrustEntry 1.3.6.1.4.1.43.45.1.10.2.36.1.3.1
An entry containing information about trusted status of ports.
OBJECT-TYPE    
  H3cDhcpSnoopTrustEntry  

h3cDhcpSnoopTrustStatus 1.3.6.1.4.1.43.45.1.10.2.36.1.3.1.1
Trusted status of current port which supports both get and set operation.
OBJECT-TYPE    
  INTEGER untrusted(0), trusted(1)  

h3cDhcpSnoopVlanTable 1.3.6.1.4.1.43.45.1.10.2.36.1.4
A table is used to configure and monitor DHCP Snooping status of VLANs.
OBJECT-TYPE    
  SEQUENCE OF  
    H3cDhcpSnoopVlanEntry

h3cDhcpSnoopVlanEntry 1.3.6.1.4.1.43.45.1.10.2.36.1.4.1
The entry information about h3cDhcpSnoopVlanTable.
OBJECT-TYPE    
  H3cDhcpSnoopVlanEntry  

h3cDhcpSnoopVlanIndex 1.3.6.1.4.1.43.45.1.10.2.36.1.4.1.1
Current VLAN index.
OBJECT-TYPE    
  Integer32 0..2147483647  

h3cDhcpSnoopVlanEnable 1.3.6.1.4.1.43.45.1.10.2.36.1.4.1.2
DHCP Snooping status of current VLAN.
OBJECT-TYPE    
  TruthValue  

h3cDhcpSnoopTraps 1.3.6.1.4.1.43.45.1.10.2.36.2
OBJECT IDENTIFIER    

h3cDhcpSnoopTrapsPrefix 1.3.6.1.4.1.43.45.1.10.2.36.2.0
OBJECT IDENTIFIER    

h3cDhcpSnoopTrapsObject 1.3.6.1.4.1.43.45.1.10.2.36.2.1
OBJECT IDENTIFIER    

h3cDhcpSnoopSpoofServerMac 1.3.6.1.4.1.43.45.1.10.2.36.2.1.1
MAC address of the spoofing server and it is derived from link-layer header of offer packet. If the offer packet is relayed by dhcp relay entity, it may be the MAC address of relay entity.
OBJECT-TYPE    
  MacAddress  

h3cDhcpSnoopSpoofServerIP 1.3.6.1.4.1.43.45.1.10.2.36.2.1.2
IP address of the spoofing server and it is derived from IP header of offer packet. A tricksy host may send offer packet use other host's address, so this address can not always be trust.
OBJECT-TYPE    
  IpAddress  

h3cDhcpSnoopSpoofServerDetected 1.3.6.1.4.1.43.45.1.10.2.36.2.0.1
To detect unauthorized DHCP servers on a network, the DHCP snooping device sends DHCP-DISCOVER messages through its downstream port (which is connected to the DHCP clients). If any response (DHCP-OFFER message) is received from the downstream port, an unauthorized DHCP server is considered present, and then the device sends a trap. With unauthorized DHCP server detection enabled, the interface sends a DHCP-DISCOVER message to detect unauthorized DHCP servers on the network. If this interface receives a DHCP-OFFER message, the DHCP server which sent it is considered unauthorized.
NOTIFICATION-TYPE