CISCO-WDS-IDS-MIB

File: CISCO-WDS-IDS-MIB.mib (14425 bytes)

Imported modules

SNMPv2-SMI SNMPv2-CONF SNMP-FRAMEWORK-MIB
SNMPv2-TC CISCO-SMI

Imported symbols

MODULE-IDENTITY OBJECT-TYPE Unsigned32
Integer32 MODULE-COMPLIANCE OBJECT-GROUP
SnmpAdminString MacAddress TimeStamp
ciscoMgmt

Defined Types

CiscoWdsIdsMacSpoofEntry  
SEQUENCE    
  ciscoWdsIdsMacSpoofStaMacAddress MacAddress
  ciscoWdsIdsMacSpoofIndex Unsigned32
  ciscoWdsIdsMacSpoofClient MacAddress
  ciscoWdsIdsMacSpoofUserId SnmpAdminString
  ciscoWdsIdsMacSpoofDetectTime TimeStamp

Defined Values

ciscoWdsIdsMIB 1.3.6.1.4.1.9.9.457
This MIB is intended to be implemented on all IOS based network entities that provide Wireless Domain Services, for the purpose of providing network management stations information about the various attempts to compromise the security in the 802.11-based wireless networks. Entities that can be configured to provide Wireless Domain Services could be an 802.11 Access Point, a Switch or any other IOS network device, that allows the WDS configuration. The MIB reports the information about the MAC spoofing attempts made by wireless clients to compromise the security of the network. MAC Spoofing is detected by the WDS when clients attempt to authenticate with the WDS using the MAC address of another client while roaming from one AP to another. Upon detecting this, the WDS provides the information about the client and the username to the NMS as MIB objects. The hierarchy of the WDS, AP and MNs is as follows. +=====+ +=====+ +=====+ | | | | | | | WDS | | WDS | | WDS | | | | | | | +=====+ +=====+ +=====+ / \ \ \ / \ \ \ / \ \ \ / \ \ \ / \ \ \ \/ \/ \/ \/ +~-~-~+ +~-~-~+ +~-~-~+ +~-~-~+ + + + + + + + + + AP + + AP + + AP + + AP + + + + + + + + + +~-~-~+ +~-~-~+ +~-~-~+ +~-~-~+ .. . . . .. . . . . . . . . . . . . . . . . . . . . . . . \/ \/ \/ \/ \/ +.....+ +.....+ +-.-.-.+ +~-~-~+ +......+ + + + + + + + + + + + MN + + MN + + MN + + MN + + MN + + + + + + + + + + + +.....+ +.....+ +-.-.-.+ +~-~-~+ +......+ The WDS include authentication and registration services for the APs. An AP provides Proxy Authentication and registration services for the MNs. The wireless connections are represented as dotted lines in the above diagram. GLOSSARY Access Point ( AP ) An entity that contains an 802.11 medium access control ( MAC ) and physical layer ( PHY ) interface and provides access to the distribution services via the wireless medium for associated clients. Mobile Node ( MN ) A roaming 802.11 wireless device in a wireless network associated with an access point. Wireless Domain Services (WDS) The set of services being offered at a particular broadcast domain that may be an IP subnet or a particular VLAN, or across the L3 cloud. The services include the following. 1. MN security credential caching to provide seamless, secure intra-subnet roaming. 2. Authenticated context transfer for roaming client within the subnet. Context The mobility context for an MN includes its current mobility bindings with the APs, IP/802 address bindings, cached configuration parameters, QoS state, IP group membership, authentication state, accounting statistics, and other dynamically derived protocol state information.
MODULE-IDENTITY    

ciscoWdsIdsMIBObjects 1.3.6.1.4.1.9.9.457.1
OBJECT IDENTIFIER    

ciscoWdsIdsMacSpoofing 1.3.6.1.4.1.9.9.457.1.1
OBJECT IDENTIFIER    

ciscoWdsIdsMaxMacAddresses 1.3.6.1.4.1.9.9.457.1.1.1
This object indicates the maximum number of different MAC addresses for which spoofing events are held in this table.
Status: current Access: read-write
OBJECT-TYPE    
  Integer32 1..2147483647  

ciscoWdsIdsMaxEntriesPerMac 1.3.6.1.4.1.9.9.457.1.1.2
This object indicates the maximum number of entries that can be held for a particular MAC address indicated by the object ciscoWdsIdsMacSpoofStaMacAddress.
Status: current Access: read-write
OBJECT-TYPE    
  Integer32 1..2147483647  

ciscoWdsIdsMacSpoofTable 1.3.6.1.4.1.9.9.457.1.1.3
This table gives the information about the MAC spoofing attacks detected by the network entity offering WDS. An entry in this table is created by the agent when the WDS detects a MAC spoofing attack. The agent at anytime will retain only the most recent and maximum number of entries possible for a particular MAC. The older entries are purged automatically when the number of entries for a particular MAC reaches its maximum. Thus, there can be a maximum of those many different MAC addresses indicated by ciscoWdsIdsMaxMacAddresses and for each MAC address, the maximum number of entries is indicated by the value of the MIB object ciscoWdsIdsMaxEntriesPerMac. MAC spoofing is detected only by the network entity serving as the active WDS and hence this table is populated only by the active WDS as indicated by the values 'wds' and 'active' for the MIB objects cDot11csServiceType and cDot11csWdsInstanceState respectively. If cDot11csServiceType equals 'none' indicating that WDS is not configured in this station, or cDot11csWdsInstanceState not equals 'active' indicating that this entity is not the currently active WDS, a 'noSuchInstance' error is returned for the queries to the objects of this table.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    CiscoWdsIdsMacSpoofEntry

ciscoWdsIdsMacSpoofEntry 1.3.6.1.4.1.9.9.457.1.1.3.1
An entry holds the information about one instance of MAC spoofing attack detected on the radio interface of the AP identified by ciscoWdsIdsMacSpoofStaMacAddress.
Status: current Access: not-accessible
OBJECT-TYPE    
  CiscoWdsIdsMacSpoofEntry  

ciscoWdsIdsMacSpoofStaMacAddress 1.3.6.1.4.1.9.9.457.1.1.3.1.1
This object identifies the radio interface of the 802.11 station, that has forwarded the authentication request of the client with the spoofed MAC address indicated by ciscoWdsIdsMacSpoofClient, to the WDS.
Status: current Access: not-accessible
OBJECT-TYPE    
  MacAddress  

ciscoWdsIdsMacSpoofIndex 1.3.6.1.4.1.9.9.457.1.1.3.1.2
This object identifies the set of information about one instance of a MAC spoofing attack detected by the WDS. The radio interface of the 802.11 station that has forwarded the authentication request is identified by ciscoWdsIdsMacSpoofStaMacAddress.
Status: current Access: not-accessible
OBJECT-TYPE    
  Unsigned32  

ciscoWdsIdsMacSpoofClient 1.3.6.1.4.1.9.9.457.1.1.3.1.3
This object indicates the MAC address that has been spoofed.
Status: current Access: read-only
OBJECT-TYPE    
  MacAddress  

ciscoWdsIdsMacSpoofUserId 1.3.6.1.4.1.9.9.457.1.1.3.1.4
This object indicates the userId used by the wireless client when attempting the MAC spoofing attack.
Status: current Access: read-only
OBJECT-TYPE    
  SnmpAdminString Size(1..253)  

ciscoWdsIdsMacSpoofDetectTime 1.3.6.1.4.1.9.9.457.1.1.3.1.5
This object indicates the time at which this MAC spoofing attempt is detected by the WDS.
Status: current Access: read-only
OBJECT-TYPE    
  TimeStamp  

ciscoWdsIdsMIBConform 1.3.6.1.4.1.9.9.457.2
OBJECT IDENTIFIER    

ciscoWdsIdsMIBCompliances 1.3.6.1.4.1.9.9.457.2.1
OBJECT IDENTIFIER    

ciscoWdsIdsMIBGroups 1.3.6.1.4.1.9.9.457.2.2
OBJECT IDENTIFIER    

ciscoWdsIdsMIBCompliance 1.3.6.1.4.1.9.9.457.2.1.1
The compliance statement for the SNMP entities that implement the ciscoWdsIdsMIB module.
Status: current Access: read-only
MODULE-COMPLIANCE    

ciscoWdsIdsMacSpoofingGroup 1.3.6.1.4.1.9.9.457.2.2.1
This collection of objects provide the information about the various attempts to spoof the MAC addresses of valid wireless clients in the network.
Status: current Access: read-only
OBJECT-GROUP