CISCO-REPEATER-MIB

File: CISCO-REPEATER-MIB.mib (19533 bytes)

Imported modules

SNMPv2-SMI SNMPv2-CONF SNMPv2-TC
CISCO-SMI SNMP-REPEATER-MIB

Imported symbols

MODULE-IDENTITY OBJECT-TYPE NOTIFICATION-TYPE
Counter32 Gauge32 MODULE-COMPLIANCE
OBJECT-GROUP TruthValue TimeStamp
ciscoMgmt rptrPortEntry

Defined Types

CiscoRptrPortEntry  
SEQUENCE    
  ciscoRptrPortMDIStatus INTEGER
  ciscoRptrPortLinkTestEnabled TruthValue
  ciscoRptrPortLinkTestFailed TruthValue
  ciscoRptrPortAutoPolarityEnabled TruthValue
  ciscoRptrPortAutoPolarityCorrected TruthValue
  ciscoRptrPortSrcAddrCtrl TruthValue
  ciscoRptrPortAllowedSrcAddr OCTET STRING
  ciscoRptrPortAllowedSrcAddrStatus INTEGER
  ciscoRptrPortLastIllegalSrcAddr OCTET STRING
  ciscoRptrPortIllegalAddrTrapAcked INTEGER
  ciscoRptrPortIllegalAddrTrapEnabled TruthValue
  ciscoRptrPortIllegalAddrFirstHeard TimeStamp
  ciscoRptrPortIllegalAddrLastHeard TimeStamp
  ciscoRptrPortLastIllegalAddrCount Gauge32
  ciscoRptrPortIllegalAddrTotalCount Counter32

Defined Values

ciscoRptrMIB 1.3.6.1.4.1.9.9.22
Tok_String
MODULE-IDENTITY    

ciscoRptrMIBObjects 1.3.6.1.4.1.9.9.22.1
OBJECT IDENTIFIER    

ciscoRptrPortTable 1.3.6.1.4.1.9.9.22.1.1
Table of descriptive and status information about the ports.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    CiscoRptrPortEntry

ciscoRptrPortEntry 1.3.6.1.4.1.9.9.22.1.1.1
An entry in the table, containing information about a single port.
Status: current Access: not-accessible
OBJECT-TYPE    
  CiscoRptrPortEntry  

ciscoRptrPortMDIStatus 1.3.6.1.4.1.9.9.22.1.1.1.1
This object indicates the port's MDI/MDI-X switching status. The normal(1) status indicates the port is configured to be standard MDI as defined by the 10BaseT Standard for hub port (allowing for connection to a chained hub). The crossover(2) status indicates the port is configured to be in MDI-X mode (allowing for connection to a 10BaseT end node). The notSwitchable(3) status indicates the port is not switchable between MDI and MDI-X mode.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER normal(1), crossover(2), notSwitchable(3)  

ciscoRptrPortLinkTestEnabled 1.3.6.1.4.1.9.9.22.1.1.1.2
Specifies whether or not Link Integrity Test Function is enabled for the port as specified by the 10BaseT Standard. When the link test function is enabled, the absence of the Link Test pulses and receive data on the port will cause the port to go into a Link Fail state. In this state, the data transmission, data reception and collision detection functions are disabled until valid data or 4 consecutive Link Test pulses appear on RXD+/- pair of the port. With the Link Integrity Test Function disabled, the data driver, receiver and collision detection remain enabled irrespective of the presence or absence of data or Link Test pulses on the port.
Status: current Access: read-write
OBJECT-TYPE    
  TruthValue  

ciscoRptrPortLinkTestFailed 1.3.6.1.4.1.9.9.22.1.1.1.3
This object indicates the status of the Link Test function for the port. Set to false indicates valid data or 4 consecutive Link Test pulses have been detected on the port. Set to true indicates the failure of the Link Test function for the port. In the Link Test Fail state, data transmission, data reception and collision detection functions are disabled until valid data or 4 consecutive Link Test pulses appear on the RXD+/- pair of the port.
Status: current Access: read-only
OBJECT-TYPE    
  TruthValue  

ciscoRptrPortAutoPolarityEnabled 1.3.6.1.4.1.9.9.22.1.1.1.4
Specifies whether or not the Automatic Receiver Polarity Reversal is enabled for the port. This feature provides the ability to invert the polarity of the signals appearing at the RXD+/- pair of the port prior to re-transmission if the polarity of the received signal is reversed (such as in the case of wiring error).
Status: current Access: read-write
OBJECT-TYPE    
  TruthValue  

ciscoRptrPortAutoPolarityCorrected 1.3.6.1.4.1.9.9.22.1.1.1.5
This object indicates the status of the Automatic Receiver Polarity Reversal for the port. Set to true indicates the polarity of the port has been detected as reversed and is corrected. Set to false indicates the polarity for the port as having correct polarity.
Status: current Access: read-only
OBJECT-TYPE    
  TruthValue  

ciscoRptrPortSrcAddrCtrl 1.3.6.1.4.1.9.9.22.1.1.1.6
Specifies whether or not the Source Address Control feature is enabled for the port. This feature provides the ability to control which device's specific MAC address is allowed access to the network. If the management entity specified an address via ciscoRptrPortAllowedSrcAddr, only the device with the configured MAC address is allowed access to the network. If the management entity does not specified an address, the allowed source address is learned from the last source address if valid; otherwise, the allowed source address is learned from the MAC address of the first valid packet detected on the port. When another MAC address other than the allowed source address is detected on the port, the port is partitioned. WARNING: Configuring Source Address Control feature on the port which is used for management can cause the management entity to lose access to the agent if the management's source address does not match the allowed source address.
Status: current Access: read-write
OBJECT-TYPE    
  TruthValue  

ciscoRptrPortAllowedSrcAddr 1.3.6.1.4.1.9.9.22.1.1.1.7
For write access, this object is the allowed source address that is to be configured for source address control feature for the port. For read access, if no allowed source address was specifically specified by the manager, the agent shall return the learned address to control. Otherwise, the specified allowed source address is returned if configured by management entity.
Status: current Access: read-write
OBJECT-TYPE    
  OCTET STRING Size(0|6)  

ciscoRptrPortAllowedSrcAddrStatus 1.3.6.1.4.1.9.9.22.1.1.1.8
This object indicates the status of ciscoRptrPortAllowedSrcAddr for the port. allowedSrcAddrConfig(1) status indicates that the allowed source address was explicitly configured by management entity. The allowedSrcAddrLearn(2) status indicates that the allowed source address was learned for the port. The allowedSrcAddrUndefined(3) status indicates that currently there is no restriction on the source address for the port.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER allowedSrcAddrConfig(1), allowedSrcAddrLearn(2), allowedSrcAddrUndefined(3)  

ciscoRptrPortLastIllegalSrcAddr 1.3.6.1.4.1.9.9.22.1.1.1.9
This object is the last illegal source address which caused this port to be partitioned. If the port is never partitioned due to Source Address Control, the agent shall return a string of length zero.
Status: current Access: read-only
OBJECT-TYPE    
  OCTET STRING Size(0|6)  

ciscoRptrPortIllegalAddrTrapAcked 1.3.6.1.4.1.9.9.22.1.1.1.10
Specifies whether an acknowledgment is sent by an NMS to indicate that an illegal source address trap was received. acked : Set by a NMS to acknowledge reception of an illegal source address. When this flag is set, no more trap will be sent for the port. no-acked-sending: Set by the SNMP agent to indicate that it is sending a trap to one or more NMSs. The trap is sent based upon the trap algorithm specified by ciscoRptrTrapAlgorithm. no-acked-no-sending: Set by the SNMP agent when there is no trap to be sent or the trap was already sent out.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER acked(1), no-acked-sending(2), no-acked-no-sending(3)  

ciscoRptrPortIllegalAddrTrapEnabled 1.3.6.1.4.1.9.9.22.1.1.1.11
Specifies whether or not to send the illegal source address trap for the port. When it is enabled, one or more illegal source address traps will be generated if there is a mismatch of source address. Traps are sent based on the algorithm specified by ciscoRptrTrapAlgorithm defined in the GLOBAL section. When it is disabled, no traps are sent.
Status: current Access: read-write
OBJECT-TYPE    
  TruthValue  

ciscoRptrPortIllegalAddrFirstHeard 1.3.6.1.4.1.9.9.22.1.1.1.12
This is the time stamp for the very first time when the current illegal source address was detected on the port. The time stamp is given by the value of MIB-II's sysUpTime at which this occurrence happens. If no illegal source address is heard on the port, this value is set to 0.
Status: current Access: read-only
OBJECT-TYPE    
  TimeStamp  

ciscoRptrPortIllegalAddrLastHeard 1.3.6.1.4.1.9.9.22.1.1.1.13
This is the time stamp for the last time when the current illegal source address was detected on the port. The time stamp is given by the value of MIB-II's sysUpTime at which occurrence happens. If no illegal source address was never occurred, this value is set to 0.
Status: current Access: read-only
OBJECT-TYPE    
  TimeStamp  

ciscoRptrPortLastIllegalAddrCount 1.3.6.1.4.1.9.9.22.1.1.1.14
This is the count of consecutive occurrences of the last illegal source address on the port. When illegal address is detected, this count will be incremented about every minute.
Status: current Access: read-only
OBJECT-TYPE    
  Gauge32  

ciscoRptrPortIllegalAddrTotalCount 1.3.6.1.4.1.9.9.22.1.1.1.15
This is the total count of all cccurences of any illegal source addresses heard on the port since start-up. Note: Illegal source addresses may be different, may be the same. This counter is a *total* count from this port.
Status: current Access: read-only
OBJECT-TYPE    
  Counter32  

ciscoRptrMIBglobal 1.3.6.1.4.1.9.9.22.1.2
OBJECT IDENTIFIER    

ciscoRptrTrapAlgorithm 1.3.6.1.4.1.9.9.22.1.2.1
Specifies how often trap(s) will be sent by the SNMP agent. once - The trap is only sent once. decay - The same trap is sent multiple times at approximately exponential decaying rate. e.g. 1st trap is sent immediately, 2nd trap is at 1 minute, 3rd trap is at 2 minutes, 4th trap is at 4 minutes, and so on. The rate is capped at about 32 minutes. NOTE : Decaying rate is used to avoid overflood the NMS.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER once(1), decay(2)  

ciscoRptrMIBTrapPrefix 1.3.6.1.4.1.9.9.22.3
OBJECT IDENTIFIER    

ciscoRptrMIBTraps 1.3.6.1.4.1.9.9.22.3.0
OBJECT IDENTIFIER    

ciscoRptrIllegalSrcAddrTrap 1.3.6.1.4.1.9.9.22.3.0.1
When the illegal MAC source address violation is detected, the port is partitioned for one minute. In addition, this trap notification is generated. Note: rptrPortGroupIndex, and rptrPortIndex are the instances of ciscoRptrPortLastIllegalSrcAddr.
Status: current Access: read-write
NOTIFICATION-TYPE    

ciscoRptrMIBConformance 1.3.6.1.4.1.9.9.22.2
OBJECT IDENTIFIER    

ciscoRptrMIBCompliances 1.3.6.1.4.1.9.9.22.2.1
OBJECT IDENTIFIER    

ciscoRptrMIBGroups 1.3.6.1.4.1.9.9.22.2.2
OBJECT IDENTIFIER    

ciscoRptrMIBCompliance 1.3.6.1.4.1.9.9.22.2.1.1
The compliance statement for entities which implement the cisco Repeater MIB
Status: obsolete Access: read-write
MODULE-COMPLIANCE    

ciscoRptrMIBComplianceV11R01 1.3.6.1.4.1.9.9.22.2.1.2
The compliance statement for entities which implement the cisco Repeater MIB
Status: current Access: read-write
MODULE-COMPLIANCE    

ciscoRptrMIBGroup 1.3.6.1.4.1.9.9.22.2.2.1
A collection of objects providing repeater ability.
Status: obsolete Access: read-write
OBJECT-GROUP    

ciscoRptrMIBPortGroupV11R01 1.3.6.1.4.1.9.9.22.2.2.2
A collection of objects for managing a repeater port.
Status: current Access: read-write
OBJECT-GROUP    

ciscoRptrMIBGlobalsGroup 1.3.6.1.4.1.9.9.22.2.2.3
A collection of objects apply to all repeater ports.
Status: current Access: read-write
OBJECT-GROUP