BRCM-SSH-MGMT-MIB: View SNMP OID List / Download MIB

VENDOR: BROADCOM LIMITED


 Home MIB: BRCM-SSH-MGMT-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 sshMgmt 1.3.6.1.4.1.4413.2.2.2.1.1.4
     sshIpStackInterfaces 1.3.6.1.4.1.4413.2.2.2.1.1.4.1
Controls and reflects the IP stack interfaces on which a ssh server is active.
     sshUserName 1.3.6.1.4.1.4413.2.2.2.1.1.4.2
Controls and reflects the user name which will be allowed ssh access.
     sshPassword 1.3.6.1.4.1.4413.2.2.2.1.1.4.3
Controls and reflects the password which will be allowed ssh access.
     sshServerControl 1.3.6.1.4.1.4413.2.2.2.1.1.4.4
Used to start or stop the ssh server. When read, indicates the current state of the server.
     sshSessionIp 1.3.6.1.4.1.4413.2.2.2.1.1.4.5
This object gives the IP address of the most recently connected device. If no session has taken place since the last reboot, this object will read 0.0.0.0.
     sshSessionInProgress 1.3.6.1.4.1.4413.2.2.2.1.1.4.6
Indicates whether or not a ssh session is currently in progress.
     sshForceUserLogout 1.3.6.1.4.1.4413.2.2.2.1.1.4.7
If a ssh session is currently in progress, setting this object to true(1) will terminate the session. Setting to false(2) has no effect. Always returns false(2) when read.
     sshSessionAddressType 1.3.6.1.4.1.4413.2.2.2.1.1.4.8
The type of internet address used for sshSessionAddress.
     sshSessionAddress 1.3.6.1.4.1.4413.2.2.2.1.1.4.9
This object gives the address of the most recently connected device. If no session has taken place since the last reboot, this object will report an empty string.
     sshHackerTable 1.3.6.1.4.1.4413.2.2.2.1.1.4.10
A table of internet addresses which have been blacklisted from ssh access on this station. Blacklisting occurs when a login attempt fails a number of times from the given address.
           sshHackerEntry 1.3.6.1.4.1.4413.2.2.2.1.1.4.10.1
An entry representing a single blacklisted address.
               sshHackerAddressType 1.3.6.1.4.1.4413.2.2.2.1.1.4.10.1.1
The type of internet address used for sshHackerAddress.
               sshHackerAddress 1.3.6.1.4.1.4413.2.2.2.1.1.4.10.1.2
The address of an device which has unsuccessfully attempted to log in to this station enough times to be blacklisted as a hacker.
               sshHackerNumAttempts 1.3.6.1.4.1.4413.2.2.2.1.1.4.10.1.3
The number of times that the device represented by this entry has attempted to log in to this station.
               sshHackerLastTime 1.3.6.1.4.1.4413.2.2.2.1.1.4.10.1.4
The value of sysUpTime when this row was created, or when the value of sshHackerNumAttempts was last incremented.
     sshSessionInactivityTimeout 1.3.6.1.4.1.4413.2.2.2.1.1.4.11
This object controls the length of time after which an ssh session will be terminated if there is no activity. Note that if this object is set to zero, the session will never be terminated due to inactivity.
     sshHackerInactivityTimeout 1.3.6.1.4.1.4413.2.2.2.1.1.4.12
This object controls the length of time after which an entry in the sshHackerTable will be removed if there are no further attempts to access the system from the corresponding sshHackerAddress. Note that if this object is set to zero, the sshHackerTable will be effectively disabled and no IP addresses will be blacklisted for unauthorized access. If set to -1, entries in the sshHackerTable will never be aged out and once blacklisted, only a system reboot will allow another attempted login from the blacklisted address.
     sshTraps 1.3.6.1.4.1.4413.2.2.2.1.1.4.99
           sshHackerTrap 1.3.6.1.4.1.4413.2.2.2.1.1.4.99.1
An entry has been added to the sshHackerTable, indicating repeated unauthorized login attempts by the device indicated.