AT-DHCPSN-MIB: View SNMP OID List / Download MIB

VENDOR: ALLIED TELESIS


 Home MIB: AT-DHCPSN-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 atDhcpsn 1.3.6.1.4.1.207.8.4.4.4.537
Added two more violation types for DHCP Snooping.
         atDhcpsnEvents 1.3.6.1.4.1.207.8.4.4.4.537.0
             atDhcpsnTrap 1.3.6.1.4.1.207.8.4.4.4.537.0.1
DHCP Snooping violation trap.
             atArpsecTrap 1.3.6.1.4.1.207.8.4.4.4.537.0.2
DHCP Snooping ARP Security violation trap.
         atDhcpsnVariablesTable 1.3.6.1.4.1.207.8.4.4.4.537.1 no-access
This table contains rows of DHCP Snooping information.
             atDhcpsnVariablesEntry 1.3.6.1.4.1.207.8.4.4.4.537.1.1 no-access
A set of parameters that describe the DHCP Snooping features.
                 atDhcpsnIfIndex 1.3.6.1.4.1.207.8.4.4.4.537.1.1.1 integer read-only
Ifindex of the port that the packet was received on.
                 atDhcpsnVid 1.3.6.1.4.1.207.8.4.4.4.537.1.1.2 integer read-only
VLAN ID of the port that the packet was received on.
                 atDhcpsnSmac 1.3.6.1.4.1.207.8.4.4.4.537.1.1.3 displaystring read-only
Source MAC address of the packet that caused the trap.
                 atDhcpsnOpcode 1.3.6.1.4.1.207.8.4.4.4.537.1.1.4 integer read-only
Opcode value of the BOOTP packet that caused the trap. Only bootpRequest(1) or bootpReply(2) is valid. Enumeration: 'bootpReply': 2, 'bootpRequest': 1.
                 atDhcpsnCiaddr 1.3.6.1.4.1.207.8.4.4.4.537.1.1.5 ipaddress read-only
Ciaddr value of the BOOTP packet that caused the trap.
                 atDhcpsnYiaddr 1.3.6.1.4.1.207.8.4.4.4.537.1.1.6 ipaddress read-only
Yiaddr value of the BOOTP packet that caused the trap.
                 atDhcpsnGiaddr 1.3.6.1.4.1.207.8.4.4.4.537.1.1.7 ipaddress read-only
Giaddr value of the BOOTP packet that caused the trap.
                 atDhcpsnSiaddr 1.3.6.1.4.1.207.8.4.4.4.537.1.1.8 ipaddress read-only
Siaddr value of the BOOTP packet that caused the trap.
                 atDhcpsnChaddr 1.3.6.1.4.1.207.8.4.4.4.537.1.1.9 displaystring read-only
Chaddr value of the BOOTP packet that caused the trap.
                 atDhcpsnVioType 1.3.6.1.4.1.207.8.4.4.4.537.1.1.10 integer read-only
The reason that the trap was generated. invalidBootp(1) indicates that the received BOOTP packet was invalid. For example, it is neither BootpRequest nor BootpReply. invalidDhcpAck(2) indicates that the received DHCP ACK was invalid. invalidDhcpRelDec(3) indicates the DHCP Release or Decline was invalid. invalidIp(4) indicates that the received IP packet was invalid. maxBindExceeded(5) indicates that if the entry was added, the maximum bindings configured for the port would be exceeded. opt82InsertErr(6) indicates that the insertion of Option 82 failed. opt82RxInvalid(7) indicates that the received Option 82 information was invalid. opt82RxUntrusted(8) indicates that Option 82 information was received on an untrusted port. opt82TxUntrusted(9) indicates that Option 82 would have been transmitted out an untrusted port. replyRxUntrusted(10) indicates that a BOOTP Reply was received on an untrusted port. srcMacChaddrMismatch(11) indicates that the source MAC address of the packet did not match the BOOTP CHADDR of the packet. staticEntryExisted(12) indicates that the static entry to be added already exists. dbAddErr(13) indicates that adding an entry to the database failed. Enumeration: 'dbAddErr': 13, 'opt82TxUntrusted': 9, 'opt82RxInvalid': 7, 'srcMacChaddrMismatch': 11, 'opt82RxUntrusted': 8, 'opt82InsertErr': 6, 'invalidBootp': 1, 'replyRxUntrusted': 10, 'invalidIp': 4, 'invalidDhcpRelDec': 3, 'invalidDhcpAck': 2, 'staticEntryExisted': 12, 'maxBindExceeded': 5.
         atArpsecVariablesTable 1.3.6.1.4.1.207.8.4.4.4.537.2 no-access
This table contains rows of DHCP Snooping ARP Security information.
             atArpsecVariablesEntry 1.3.6.1.4.1.207.8.4.4.4.537.2.1 no-access
A set of parameters that describe the DHCP Snooping ARP Security features.
                 atArpsecIfIndex 1.3.6.1.4.1.207.8.4.4.4.537.2.1.1 integer read-only
Ifindex of the port that the ARP packet was received on.
                 atArpsecClientIP 1.3.6.1.4.1.207.8.4.4.4.537.2.1.2 ipaddress read-only
Source IP address of the ARP packet.
                 atArpsecSrcMac 1.3.6.1.4.1.207.8.4.4.4.537.2.1.3 displaystring read-only
Source MAC address of the ARP packet.
                 atArpsecVid 1.3.6.1.4.1.207.8.4.4.4.537.2.1.4 integer read-only
VLAN ID of the port that the ARP packet was received on.
                 atArpsecVioType 1.3.6.1.4.1.207.8.4.4.4.537.2.1.5 integer read-only
The reason that the trap was generated. srcIpNotFound(1) indicates that the Sender IP address of the ARP packet was not found in the DHCP Snooping database. badVLAN(2) indicates that the VLAN of the DHCP Snooping binding entry associated with the Sender IP address of the ARP packet does not match the VLAN that the ARP packet was received on. badPort(3) indicates that the port of the DHCP Snooping binding entry associated with the Sender IP address of the ARP packet does not match the port that the ARP packet was received on. srcIpNotAllocated(4) indicates that the CHADDR of the DHCP Snooping binding entry associated with the Sender IP address of the ARP packet does not match the Source MAC and/or the ARP source MAC of the ARP packet. Enumeration: 'srcIpNotFound': 1, 'srcIpNotAllocated': 4, 'badPort': 3, 'badVLAN': 2.