BIANCA-BRICK-IP-OLDACCESS-MIB: View SNMP OID List / Download MIB

VENDOR: BINTEC COMMUNICATIONS GMBH


 Home MIB: BIANCA-BRICK-IP-OLDACCESS-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 org 1.3
     dod 1.3.6
         internet 1.3.6.1
             private 1.3.6.1.4
                 enterprises 1.3.6.1.4.1
                     bintec 1.3.6.1.4.1.272
                             bibo 1.3.6.1.4.1.272.4
                                 biboipold 1.3.6.1.4.1.272.4.5
                                     ipAllowTable 1.3.6.1.4.1.272.4.5.1 no-access
The ipAllowTable defines all allowed IP packets. Each entry describes a subset of IP Packets, which are allowed to be processed. The overall set of allowed IP packets is the union of all subsets that are described in this table. If at least one entry is defined in the ipAllowTable, only IP datagrams which are allowed by the ipAllowTable are processed by the BRICK. All other packets are refused. Please note that the ipDenyTable overwrites the ipAllowTable. IP datagrams specified in the ipDenyTable are always refused, even if they are allowed by the ipAllowTable. Creating entries: Entries are created by setting the ipAllowProtocolMode and ipAllowSrcIfIndexMode objects in one operation (on one command line). Deleting entries: Entries are deleted by setting the ipAllowProtocolMode object to 'delete'.
                                         ipAllowEntry 1.3.6.1.4.1.272.4.5.1.1 no-access
                                             ipAllowProtocolMode 1.3.6.1.4.1.272.4.5.1.1.1 integer no-access
Specifies whether or not the protocol field of the IP datagram header should be used to determine if the datagram belongs to the subset of the entry. dont-verify(1) = don't check the protocol field; verify(2) = check the protocol field; delete(3) = delete the entry from the table Enumeration: 'verify': 2, 'dont-verify': 1, 'delete': 3.
                                             ipAllowProtocol 1.3.6.1.4.1.272.4.5.1.1.2 integer no-access
If the ipAllowProtocolMode is set to 'verify', this object specifies the protocol of IP datagrams belonging to the subset described by this entry. Otherwise, this field has no meaning. Enumeration: 'udp': 17, 'ggp': 3, 'ospf': 89, 'egp': 8, 'hmp': 20, 'tcp': 6, 'xns-idp': 22, 'icmp': 1, 'pup': 12, 'rdp': 27.
                                             ipAllowSrcIfIndexMode 1.3.6.1.4.1.272.4.5.1.1.3 integer no-access
This object specifies whether or not the originating interface of the IP datagram should be checked to determine whether a datagram belongs to the subset. Enumeration: 'verify': 2, 'dont-verify': 1.
                                             ipAllowSrcIfIndex 1.3.6.1.4.1.272.4.5.1.1.4 integer no-access
If ipAllowSrcIfIndexMode is set to 'verify', then this object specifies the ifIndex of the datagrams belonging to the subset defined by this entry.
                                             ipAllowSrcAddr 1.3.6.1.4.1.272.4.5.1.1.5 ipaddress no-access
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry.
                                             ipAllowSrcMask 1.3.6.1.4.1.272.4.5.1.1.6 ipaddress no-access
This object specifies the set of IP addresses of data grams that belong to the subset defined by this entry.
                                             ipAllowSrcPortMode 1.3.6.1.4.1.272.4.5.1.1.7 integer no-access
This object specifies the range of source port numbers of IP datagrams belonging to the subset. ignore(1) = All ports: 0 ..65535; specific(2) = a specific port number i.e. ipAllowScrPort; clients(3) = clientports: 1024 .. 4999, 32768..65535; server(4) = server ports: 0..1023 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6.
                                             ipAllowSrcPort 1.3.6.1.4.1.272.4.5.1.1.8 integer no-access
If ipAllowSrcPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used.
                                             ipAllowDstAddr 1.3.6.1.4.1.272.4.5.1.1.9 ipaddress no-access
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry.
                                             ipAllowDstMask 1.3.6.1.4.1.272.4.5.1.1.10 ipaddress no-access
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry.
                                             ipAllowDstPortMode 1.3.6.1.4.1.272.4.5.1.1.11 integer no-access
This object specifies the range of destination port numbers of IP datagrams belonging to the subset. ignore(1) = All ports: 0..65535; specific(2) = a specific port number i.e. ipAllowDstPort; clients(3) = client ports: 1024..4999, 32768..65535; server(4) = server ports. 0..1023, 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6.
                                             ipAllowDstPort 1.3.6.1.4.1.272.4.5.1.1.12 integer no-access
If ipAllowDstPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used.
                                             ipAllowSrcPortRange 1.3.6.1.4.1.272.4.5.1.1.13 integer no-access
This object can be used together with ipAllowSrcPort to apply the rule to a port range, instead of a single port. When ipAllowSrcPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipAllowSrcPort to ipAllowSrcPortRange. When this object is set to -1, the rule applies only to port ipAllowSrcPort.
                                             ipAllowDstPortRange 1.3.6.1.4.1.272.4.5.1.1.14 integer no-access
This object can be used together with ipAllowDstPort to apply the rule to a port range, instead of a single port. When ipAllowDstPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipAllowDstPort to ipAllowDstPortRange. When this object is set to -1, the rule applies only to port ipAllowDstPort.
                                     ipDenyTable 1.3.6.1.4.1.272.4.5.2 no-access
The ipDenyTable defines all IP packets to be denied. Each entry describes a subset of IP Packets, which are denied processing. The overall set of denied IP packets is the union of all subsets that are described in this table. The ipDenyTable overwrites the ipAllowTable. IP datagrams specified in the ipDenyTable are always refused, even if they are allowed by the ipAllowTable. Creating entries: Entries are created by setting the ipDenyProtocolMode and ipDenySrcIfIndexMode objects in one operation (i.e. on one command line). Deleting entries: Entries are deleted by setting the ipDenyProtocolMode object to 'delete'.
                                         ipDenyEntry 1.3.6.1.4.1.272.4.5.2.1 no-access
                                             ipDenyProtocolMode 1.3.6.1.4.1.272.4.5.2.1.1 integer no-access
Specifies whether or not the protocol field of the IP datagram header should be used to determine if the datagram belongs to the subset of this entry. dont-verify(1) = don't check the protocol field; verify(2) = check the protocol field; delete(3) = delete the entry from the table Enumeration: 'verify': 2, 'dont-verify': 1, 'delete': 3.
                                             ipDenyProtocol 1.3.6.1.4.1.272.4.5.2.1.2 integer no-access
If the ipDenyProtocolMode is set to 'verify', this object specifies the protocol of IP datagrams belonging to the subset described by this entry. Otherwise, this field has no meaning. Enumeration: 'udp': 17, 'ggp': 3, 'ospf': 89, 'egp': 8, 'hmp': 20, 'tcp': 6, 'xns-idp': 22, 'icmp': 1, 'pup': 12, 'rdp': 27.
                                             ipDenySrcIfIndexMode 1.3.6.1.4.1.272.4.5.2.1.3 integer no-access
This object specifies whether or not the originating interface of the IP datagram should be checked to determine whether a datagram belongs to this subset. Enumeration: 'verify': 2, 'dont-verify': 1.
                                             ipDenySrcIfIndex 1.3.6.1.4.1.272.4.5.2.1.4 integer no-access
If ipDenySrcIfIndexMode is set to 'verify', then this object specifies the ifIndex of the datagrams belonging to the subset defined by this entry.
                                             ipDenySrcAddr 1.3.6.1.4.1.272.4.5.2.1.5 ipaddress no-access
If ipDenySrcIfIndexMode is set to 'verify', then this object specifies the ifIndex of the datagrams belonging to the subset defined by this entry.
                                             ipDenySrcMask 1.3.6.1.4.1.272.4.5.2.1.6 ipaddress no-access
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry.
                                             ipDenySrcPortMode 1.3.6.1.4.1.272.4.5.2.1.7 integer no-access
This object specifies the range of source port numbers of IP datagrams belonging to this subset. ignore(1) = All ports: 0..65535; specific(2) = a specific port number i.e. ipAllowDstPort; clients(3) = client ports: 1024..4999, 32768..65535; server(4) = server ports. 0..1023, 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6.
                                             ipDenySrcPort 1.3.6.1.4.1.272.4.5.2.1.8 integer no-access
If ipDenySrcPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used.
                                             ipDenyDstAddr 1.3.6.1.4.1.272.4.5.2.1.9 ipaddress no-access
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry.
                                             ipDenyDstMask 1.3.6.1.4.1.272.4.5.2.1.10 ipaddress no-access
This object specifies the set of IP addresses of datagrams that belong to the subset defined by this entry.
                                             ipDenyDstPortMode 1.3.6.1.4.1.272.4.5.2.1.11 integer no-access
This object specifies the range of destination port numbers of IP datagrams belonging to the subset. ignore(1) = All ports: 0..65535; specific(2) = a specific port number i.e. ipAllowDstPort; clients(3) = client ports: 1024..4999, 32768..65535; server(4) = server ports. 0..1023, 5000..32767; unpriv(5) = unprivileged ports: 1024..65535; priv(6) = privileged ports: 0..1023 Enumeration: 'specific': 2, 'clients': 3, 'server': 4, 'ignore': 1, 'unpriv': 5, 'priv': 6.
                                             ipDenyDstPort 1.3.6.1.4.1.272.4.5.2.1.12 integer no-access
If ipDenyDstPortMode is set to 'specific', then this object contains a specific port number. Otherwise this object is not used.
                                             ipDenySrcPortRange 1.3.6.1.4.1.272.4.5.2.1.13 integer no-access
This object can be used together with ipDenySrcPort to apply the rule to a port range, instead of a single port. When ipDenySrcPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipDenySrcPort to ipDenySrcPortRange. When this object is set to -1, the rule applies only to port ipDenySrcPort.
                                             ipDenyDstPortRange 1.3.6.1.4.1.272.4.5.2.1.14 integer no-access
This object can be used together with ipDenyDstPort to apply the rule to a port range, instead of a single port. When ipDenyDstPortMode is set to specific and this object is not set to -1, than the rule applies to the Range of ports from ipDenyDstPort to ipDenyDstPortRange. When this object is set to -1, the rule applies only to port ipDenyDstPort.