G6-DHCP-MIB

File: G6-DHCP-MIB.mib (23332 bytes)

Imported modules

SNMPv2-SMI SNMPv2-TC MICROSENS-G6-MIB

Imported symbols

MODULE-IDENTITY OBJECT-TYPE Integer32
Unsigned32 Counter32 enterprises
NOTIFICATION-TYPE DisplayString MacAddress
g6

Defined Types

RelayConfigEntry  
SEQUENCE    
  relayConfigIndex INTEGER
  relayConfigDhcpServerAddress DisplayString
  relayConfigRemoteIdSource INTEGER
  relayConfigCustomRemoteId DisplayString
  relayConfigCircuitIdSource INTEGER

RelayPortConfigEntry  
SEQUENCE    
  relayPortConfigPortIndex INTEGER
  relayPortConfigEnableDhcpRelay INTEGER
  relayPortConfigEnableOption82 INTEGER

SnoopingPortConfigEntry  
SEQUENCE    
  snoopingPortConfigPortIndex INTEGER
  snoopingPortConfigEnableDhcpSnooping INTEGER
  snoopingPortConfigDhcpFiltering INTEGER
  snoopingPortConfigSnoopingTrust INTEGER
  snoopingPortConfigAcceptIngressOption82 INTEGER
  snoopingPortConfigMacAddressVerification INTEGER
  snoopingPortConfigDhcpRateLimiting Integer32
  snoopingPortConfigClearSnoopingStatistics DisplayString

PppoeConfigEntry  
SEQUENCE    
  pppoeConfigIndex INTEGER
  pppoeConfigVendorId Unsigned32
  pppoeConfigRemoteIdSource INTEGER
  pppoeConfigCustomRemoteId DisplayString
  pppoeConfigCircuitIdSource INTEGER

PppoePortConfigEntry  
SEQUENCE    
  pppoePortConfigPortIndex INTEGER
  pppoePortConfigEnablePppoeSnooping INTEGER

ArpInspectionPortConfigEntry  
SEQUENCE    
  arpInspectionPortConfigPortIndex INTEGER
  arpInspectionPortConfigEnableArpInspection INTEGER
  arpInspectionPortConfigArpRateLimiting Integer32
  arpInspectionPortConfigInspectionDatabase INTEGER
  arpInspectionPortConfigArpAclName DisplayString
  arpInspectionPortConfigAclDefaultLogic INTEGER
  arpInspectionPortConfigSourceMacValidation INTEGER
  arpInspectionPortConfigDestMacValidation INTEGER
  arpInspectionPortConfigIpRangeValidation INTEGER

SnoopingStatisticsEntry  
SEQUENCE    
  snoopingStatisticsPortIndex INTEGER
  snoopingStatisticsTrustMode INTEGER
  snoopingStatisticsNumberOfDhcpProcessed Unsigned32
  snoopingStatisticsNumberOfDhcpDropped Unsigned32
  snoopingStatisticsLastDropReason INTEGER

SnoopingTableEntry  
SEQUENCE    
  snoopingTableIndex INTEGER
  snoopingTableMac MacAddress
  snoopingTableIp OCTET STRING
  snoopingTablePort Integer32
  snoopingTableVlan Integer32
  snoopingTableLastUpdated DisplayString
  snoopingTableLastUpdatedEpoch Unsigned32
  snoopingTableLeaseTime Counter32

Defined Values

protocol 1.3.6.1.4.1.3181.10.6.2
Microsens private MIB for Generation 6 Ethernet Switches
MODULE-IDENTITY    

dhcp 1.3.6.1.4.1.3181.10.6.2.49
OBJECT IDENTIFIER    

dhcpEnableDhcpRelay 1.3.6.1.4.1.3181.10.6.2.49.1
General enable of dhcp relay function.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

dhcpEnableDhcpSnooping 1.3.6.1.4.1.3181.10.6.2.49.2
General enable of dhcp snooping function.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

dhcpEnablePppoeSnooping 1.3.6.1.4.1.3181.10.6.2.49.3
General enable of PPPoE snooping also known as PPPoE Intermediate Agent function.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

dhcpEnableArpInspection 1.3.6.1.4.1.3181.10.6.2.49.4
General enable of arp inspection function.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

dhcpUnblockPort 1.3.6.1.4.1.3181.10.6.2.49.5
This function may be used to unblock a port that has been set to blocking state due to DHCP flooding or due to ARP storm detection. The shorthand port format like 1 for 1/1 may be used. Syntax examples: dhcp.unblock_port = 1/2,1/5 or dhcp.unblock_port = 1/1-1/4. Also the syntax .. = 0-5 to unblock the first 6 ports is supported.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString  

dhcpClearSnoopingTable 1.3.6.1.4.1.3181.10.6.2.49.6
This function may be used to clear the content of the DHCP snooping table.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString  

relayConfigTable 1.3.6.1.4.1.3181.10.6.2.49.7
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    RelayConfigEntry

relayConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.7.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  RelayConfigEntry  

relayConfigIndex 1.3.6.1.4.1.3181.10.6.2.49.7.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0  

relayConfigDhcpServerAddress 1.3.6.1.4.1.3181.10.6.2.49.7.1.2
Defines host address or network address where the dhcp server(s) resides. Also known as ip_helper_address.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString  

relayConfigRemoteIdSource 1.3.6.1.4.1.3181.10.6.2.49.7.1.3
Defines how the switch is identified when DHCP option 82 is used. (Suboption2)
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER hostname(0), macAddress(1), sysName(2), userDefined(3), portAlias(4)  

relayConfigCustomRemoteId 1.3.6.1.4.1.3181.10.6.2.49.7.1.4
This remote id is used for option 82 when 'remote_id_source' is set to USER_DEFINED.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString  

relayConfigCircuitIdSource 1.3.6.1.4.1.3181.10.6.2.49.7.1.5
Defines how the ports are identified when option 82 is used. (Suboption1)
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER snmpPortId(0), slotPortId(1), portAlias(2), ipSlotPortVlan(3)  

relayPortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.8
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    RelayPortConfigEntry

relayPortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.8.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  RelayPortConfigEntry  

relayPortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.8.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0..31  

relayPortConfigEnableDhcpRelay 1.3.6.1.4.1.3181.10.6.2.49.8.1.2
When enabled incoming DHCP requests are redirected to the dhcp server or network specified in 'dhcp.relay_config'
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

relayPortConfigEnableOption82 1.3.6.1.4.1.3181.10.6.2.49.8.1.3
When enabled incoming DHCP requests are modified in 'dhcp.relay_config'
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

snoopingPortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.9
This configures the DHCP snooping function. DHCP snooping acts like a DHCP firewall between access and link ports. When enabled it ensures that for untrusted ports only DHCP requests are accepted. This prevents malicious users from injecting fake DHCP frames and thus invalid IP addresses.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    SnoopingPortConfigEntry

snoopingPortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.9.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  SnoopingPortConfigEntry  

snoopingPortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.9.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0..31  

snoopingPortConfigEnableDhcpSnooping 1.3.6.1.4.1.3181.10.6.2.49.9.1.2
This enables the DHCP snooping function per port.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

snoopingPortConfigDhcpFiltering 1.3.6.1.4.1.3181.10.6.2.49.9.1.3
DHCP filtering prevents DHCP responses being injected from a local access port. It acts like a DHCP firewall between access and link ports.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), dropAndEvent(1), blockAndEvent(2)  

snoopingPortConfigSnoopingTrust 1.3.6.1.4.1.3181.10.6.2.49.9.1.4
DHCP responses are only accepted when they ingress on a trusted port. Typically these are the link ports. AUTO uses the port role and declares all up or downlink ports as trusted.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER auto(0), untrusted(1), trusted(2)  

snoopingPortConfigAcceptIngressOption82 1.3.6.1.4.1.3181.10.6.2.49.9.1.5
Normally incoming DHCP request incoming with Option 82 set will be discarded. When enabled then this check is ignored.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

snoopingPortConfigMacAddressVerification 1.3.6.1.4.1.3181.10.6.2.49.9.1.6
When a packet is received on an untrusted interface, and the source MAC address and the DHCP client MAC address do not match and this feature is enabled, the packet is dropped.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

snoopingPortConfigDhcpRateLimiting 1.3.6.1.4.1.3181.10.6.2.49.9.1.7
Defines how many DHCP request are accepted per second. When the limit is reached, DHCP flooding is assumed and the port is blocked. The value 0 disables the rate limit check.
Status: current Access: read-write
OBJECT-TYPE    
  Integer32 0..255  

snoopingPortConfigClearSnoopingStatistics 1.3.6.1.4.1.3181.10.6.2.49.9.1.8
Reset all DHCP related statistics and reason. The snooping binding table is not affected.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString  

pppoeConfigTable 1.3.6.1.4.1.3181.10.6.2.49.10
This table defines the general parameter for PPPoE Intermediate Agent feature.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    PppoeConfigEntry

pppoeConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.10.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  PppoeConfigEntry  

pppoeConfigIndex 1.3.6.1.4.1.3181.10.6.2.49.10.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0  

pppoeConfigVendorId 1.3.6.1.4.1.3181.10.6.2.49.10.1.2
Vendor identification that this device adds to a PPPoE request before forwarding it to the server.
Status: current Access: read-write
OBJECT-TYPE    
  Unsigned32  

pppoeConfigRemoteIdSource 1.3.6.1.4.1.3181.10.6.2.49.10.1.3
The remote id identifies the client that requests a PPPoE connection.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER hostname(0), macAddress(1), sysName(2), userDefined(3), portAlias(4)  

pppoeConfigCustomRemoteId 1.3.6.1.4.1.3181.10.6.2.49.10.1.4
This field is only used in a PPPoE request when the remote_id_source is set to USER_DEFINED.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString  

pppoeConfigCircuitIdSource 1.3.6.1.4.1.3181.10.6.2.49.10.1.5
This field defines how the port on which a PPPoE request comes in is identified.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER snmpPortId(0), slotPortId(1), portAlias(2), ipSlotPortVlan(3)  

pppoePortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.11
This table permits port specific enable of the PPPoE Intermediate Agent feature.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    PppoePortConfigEntry

pppoePortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.11.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  PppoePortConfigEntry  

pppoePortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.11.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0..31  

pppoePortConfigEnablePppoeSnooping 1.3.6.1.4.1.3181.10.6.2.49.11.1.2
Enables PPPoE intermediate agent function also known as PPPoE Snooping for this port. Also observe the general enable parameter for PPPoE.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

arpInspectionPortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.12
This table defines the parameter for Dynamic ARP Inspection per port. These features should generally be used with untrusted ports.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    ArpInspectionPortConfigEntry

arpInspectionPortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.12.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  ArpInspectionPortConfigEntry  

arpInspectionPortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.12.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0..31  

arpInspectionPortConfigEnableArpInspection 1.3.6.1.4.1.3181.10.6.2.49.12.1.2
Generally enables Dynamic ARP Inspection. The details need to be configured per VLAN in separate table. This feature helps preventing from man-in-the-middle attacks to the network.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

arpInspectionPortConfigArpRateLimiting 1.3.6.1.4.1.3181.10.6.2.49.12.1.3
Defines how many ARP request are accepted per second. When the limit is reached, a DOS attack is assumed and the port is shut down. The value 0 disables the rate limit check.
Status: current Access: read-write
OBJECT-TYPE    
  Integer32 0..255  

arpInspectionPortConfigInspectionDatabase 1.3.6.1.4.1.3181.10.6.2.49.12.1.4
When set to another value than NONE, the MAC-IP relationship of the incoming ARPs is verified against the selected table. This ensures that only valid MACs enter the network.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER none(0), dhcp(1), arpAcl(2), both(3)  

arpInspectionPortConfigArpAclName 1.3.6.1.4.1.3181.10.6.2.49.12.1.5
Name of the ACL (access control list) which declares which IP/MAC relations are acceptible. Note: ACLs are configured under Management.ACL. Several ACL may be specified with a comma separated list. Example acl1, otherlist
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString  

arpInspectionPortConfigAclDefaultLogic 1.3.6.1.4.1.3181.10.6.2.49.12.1.6
Defines which action is taken when none of the ACL records matches. Default is deny which blocks the ARP.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER deny(0), permit(1)  

arpInspectionPortConfigSourceMacValidation 1.3.6.1.4.1.3181.10.6.2.49.12.1.7
Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. Packets with different MAC addresses are dropped.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

arpInspectionPortConfigDestMacValidation 1.3.6.1.4.1.3181.10.6.2.49.12.1.8
Checks the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. Packets with different MAC addresses are dropped.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

arpInspectionPortConfigIpRangeValidation 1.3.6.1.4.1.3181.10.6.2.49.12.1.9
Checks ARP for invalid addresses. Invalid addresses include 0.0.0.0, 255.255.255.255, and all IP multicast and loopback addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP addresses are checked only in ARP responses.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER disabled(0), enabled(1)  

snoopingStatisticsTable 1.3.6.1.4.1.3181.10.6.2.49.100
Statistics indicating activity of DHCP snooping.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    SnoopingStatisticsEntry

snoopingStatisticsEntry 1.3.6.1.4.1.3181.10.6.2.49.100.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  SnoopingStatisticsEntry  

snoopingStatisticsPortIndex 1.3.6.1.4.1.3181.10.6.2.49.100.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0..31  

snoopingStatisticsTrustMode 1.3.6.1.4.1.3181.10.6.2.49.100.1.2
Reflects the determined trust mode.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER undecided(0), untrusted(1), trusted(2)  

snoopingStatisticsNumberOfDhcpProcessed 1.3.6.1.4.1.3181.10.6.2.49.100.1.3
Counts the number of dhcp messages processed.
Status: current Access: read-only
OBJECT-TYPE    
  Unsigned32  

snoopingStatisticsNumberOfDhcpDropped 1.3.6.1.4.1.3181.10.6.2.49.100.1.4
Counts the number of dhcp messages dropped.
Status: current Access: read-only
OBJECT-TYPE    
  Unsigned32  

snoopingStatisticsLastDropReason 1.3.6.1.4.1.3181.10.6.2.49.100.1.5
Tok_String
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER ok(0), illegalDhcpServer(1), dhcpServerSpoofed(2), illegalRelayAgent(3), bindingMismatch(4), flooding(5)  

snoopingTableTable 1.3.6.1.4.1.3181.10.6.2.49.101
This table lists the MAC-IP bindings of the untrusted ports (only) as discovered through DHCP snooping.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    SnoopingTableEntry

snoopingTableEntry 1.3.6.1.4.1.3181.10.6.2.49.101.1
Tok_String
Status: current Access: not-accessible
OBJECT-TYPE    
  SnoopingTableEntry  

snoopingTableIndex 1.3.6.1.4.1.3181.10.6.2.49.101.1.1
Automatically generated
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER 0..255  

snoopingTableMac 1.3.6.1.4.1.3181.10.6.2.49.101.1.2
MAC address entry
Status: current Access: read-only
OBJECT-TYPE    
  MacAddress  

snoopingTableIp 1.3.6.1.4.1.3181.10.6.2.49.101.1.3
IP address associated with this MAC.
Status: current Access: read-only
OBJECT-TYPE    
  OCTET STRING Size(0..20)  

snoopingTablePort 1.3.6.1.4.1.3181.10.6.2.49.101.1.4
Port number for MAC address
Status: current Access: read-only
OBJECT-TYPE    
  Integer32 0..65535  

snoopingTableVlan 1.3.6.1.4.1.3181.10.6.2.49.101.1.5
if non zero this MAC is part of this VLAN.
Status: current Access: read-only
OBJECT-TYPE    
  Integer32 0..65535  

snoopingTableLastUpdated 1.3.6.1.4.1.3181.10.6.2.49.101.1.6
Time stamp when this record was written
Status: current Access: read-only
OBJECT-TYPE    
  DisplayString  

snoopingTableLastUpdatedEpoch 1.3.6.1.4.1.3181.10.6.2.49.101.1.7
Time stamp in alternate format
Status: current Access: read-only
OBJECT-TYPE    
  Unsigned32  

snoopingTableLeaseTime 1.3.6.1.4.1.3181.10.6.2.49.101.1.8
Lease time as reported by DHCP server
Status: current Access: read-only
OBJECT-TYPE    
  Counter32