CISCO-LWAPP-LOCAL-AUTH-MIB: View SNMP OID List / Download MIB

VENDOR: CISCO


 Home MIB: CISCO-LWAPP-LOCAL-AUTH-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 ciscoLwappLocalAuthMIB 1.3.6.1.4.1.9.9.619
This MIB is intended to be implemented on all those devices operating as Central controllers, that terminate the Light Weight Access Point Protocol tunnel from Cisco Light-weight LWAPP Access Points. Information provided by this MIB is used to manage Local authentication information on the controller. The relationship between CC and the LWAPP APs can be depicted as follows: +......+ +......+ +......+ + + + + + + + CC + + CC + + CC + + + + + + + +......+ +......+ +......+ .. . . .. . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ + + + + + + + + + AP + + AP + + AP + + AP + + + + + + + + + +......+ +......+ +......+ +......+ . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ + + + + + + + + + MN + + MN + + MN + + MN + + + + + + + + + +......+ +......+ +......+ +......+ The LWAPP tunnel exists between the controller and the APs. The MNs communicate with the APs through the protocol defined by the 802.11 standard. LWAPP APs, upon bootup, discover and join one of the controllers and the controller pushes the configuration, that includes the WLAN parameters, to the LWAPP APs. The APs then encapsulate all the 802.11 frames from wireless clients inside LWAPP frames and forward the LWAPP frames to the controller. GLOSSARY Access Point ( AP ) An entity that contains an 802.11 medium access control ( MAC ) and physical layer ( PHY ) interface and provides access to the distribution services via the wireless medium for associated clients. LWAPP APs encapsulate all the 802.11 frames in LWAPP frames and sends them to the controller to which it is logically connected. Gratuitous Probe Response (GPR) The Gratuitous Probe Response feature aids in conserving battery power of WLAN-enabled cell phones by providing a high rate packet on the order of tens of milliseconds such that these kind of phones can wake up and wait at predefined intervals, to reduce battery power. The GPR packet is transmitted from the AP at a predefined time interval. Light Weight Access Point Protocol ( LWAPP ) This is a generic protocol that defines the communication between the Access Points and the Central Controller. Mobile Node ( MN ) A roaming 802.11 wireless device in a wireless network associated with an access point. Mobile Node and client are used interchangeably. Extensible Authentication Protocol ( EAP ) EAP is a universal authentication protocol used in wireless and PPP networks. It is defined by RFC 3748. EAP-Flexible Authentication ( EAP-FAST ) This protocol is used via secure tunneling for 802.1X EAP. Transport Layer Security ( TLS ) This is a cryptographic protocol which provides secure communication over the network. Protected Extensible Authentication Protocol ( PEAP ) PEAP is a method to securely transmit authentication information, including passwords, over wired or wireless networks. Lightweight Directory Access Protocol ( LDAP ) LDAP is a protocol used for obtaining directory services and runs over TCP/IP. REFERENCE [1] Wireless LAN Medium Access Control ( MAC ) and Physical Layer ( PHY ) Specifications [2] Draft-obara-capwap-lwapp-00.txt, IETF Light Weight Access Point Protocol
         ciscoLwappLocalAuthMIBNotifs 1.3.6.1.4.1.9.9.619.0
         ciscoLwappLocalAuthMIBObjects 1.3.6.1.4.1.9.9.619.1
             cllaConfig 1.3.6.1.4.1.9.9.619.1.1
                 cllaLocalAuth 1.3.6.1.4.1.9.9.619.1.1.1
                     cllaActiveTimeout 1.3.6.1.4.1.9.9.619.1.1.1.1 unsigned32 read-write
This object represents timeout period for the Local EAP to remain active.
                     cllaEapIdentityReqTimeout 1.3.6.1.4.1.9.9.619.1.1.1.2 unsigned32 read-write
This object represents timeout period for the EAP Identity request within which response should be sent.
                     cllaEapIdentityReqMaxRetries 1.3.6.1.4.1.9.9.619.1.1.1.3 unsigned32 read-write
This object represents maximum number of retransmissions for EAP Identity request.
                     cllaEapDynamicWepKeyIndex 1.3.6.1.4.1.9.9.619.1.1.1.4 unsigned32 read-write
This object represents key index for the EAP dynamic Wired Equivalent Privacy security policy. It applies to Static WEP key index of WLAN which has layer 2 security of type Static WEP. According to 802.11 standard 4 keys are supported for informing Mobile Station (clients) which key it should use for Static WEP Authentication The default value of 0 works for all devices, but for some old devices/clients which uses the unicast key as 3, the key index has to be configured to 3 to match the client side setting.
                     cllaEapReqTimeout 1.3.6.1.4.1.9.9.619.1.1.1.5 unsigned32 read-write
This object represents timeout period for the EAP request within which response should be sent.
                     cllaEapReqMaxRetries 1.3.6.1.4.1.9.9.619.1.1.1.6 unsigned32 read-write
This object represents maximum number of retransmissions for EAP request.
                     cllaEapMaxLoginIgnIdResp 1.3.6.1.4.1.9.9.619.1.1.1.7 truthvalue read-write
This object enables the checking of the number of devices that can be connected to the controller with the same username. You can login up to eight times from different devices (PDA, laptop, IP phone, and so on) on the same controller.
                     cllaEapKeyTimeout 1.3.6.1.4.1.9.9.619.1.1.1.8 unsigned32 read-write
This object represents the amount of time in which the controller attempts to send an EAP key over the LAN to wireless clients using local EAP.
                     cllaEapKeyMaxRetries 1.3.6.1.4.1.9.9.619.1.1.1.9 unsigned32 read-write
This object represents the maximum number of times that the controller attempts to send an EAP key over the LAN to wireless clients using local EAP.
                 cllaEapProfileTable 1.3.6.1.4.1.9.9.619.1.1.2 no-access
This table represents the local EAP authentication information on the controller. Rows are added or deleted by explicit management actions initiated by the user from a network management station through the cllaEapProfileRowStatus object.
                     cllaEapProfileEntry 1.3.6.1.4.1.9.9.619.1.1.2.1 no-access
A conceptual row in cllaEapProfileTable. Each entry in this table represents the local EAP authentication information, identified by the cllEapProfileName.
                         cllaEapProfileName 1.3.6.1.4.1.9.9.619.1.1.2.1.1 displaystring no-access
This object represent the profile name used to identify the Local EAP information.
                         cllaEapProfileMethods 1.3.6.1.4.1.9.9.619.1.1.2.1.2 bits read-only
This object represents the method type for this entry. none - No method is in use leap - LEAP is used as one of the methods eapFast - EAP-FAST is used as one of the methods tls - TLS is being used as one of the methods peap - PEAP is being used as one of the methods. Bits: 'tls': 3, 'none': 0, 'eapFast': 2, 'leap': 1, 'peap': 4.
                         cllaEapProfileCertIssuer 1.3.6.1.4.1.9.9.619.1.1.2.1.3 integer read-only
This object represents the name of the certificate issuer cisco - Cisco is the certificate issuer. vendor - The issuer is an outside vendor. Enumeration: 'vendor': 2, 'cisco': 1.
                         cllaEapProfileCaCertificationCheck 1.3.6.1.4.1.9.9.619.1.1.2.1.4 truthvalue read-only
This parameter indicates whether to check peer certificate against installed CA certificates.
                         cllaEapProfileCnCertificationIdVerify 1.3.6.1.4.1.9.9.619.1.1.2.1.5 truthvalue read-only
This parameter indicates whether to verify certificate CN against peer identity and user database.
                         cllaEapProfileDateValidityEnabled 1.3.6.1.4.1.9.9.619.1.1.2.1.6 truthvalue read-only
This parameter indicates whether to verify certificate date is valid and is within validity period.
                         cllaEapProfileLocalCertificateRequired 1.3.6.1.4.1.9.9.619.1.1.2.1.7 truthvalue read-only
This is applicable when cllaEapProfileMethods is EAP-FAST parameter. This parameter indicates whether local certificate is required.
                         cllaEapProfileClientCertificateRequired 1.3.6.1.4.1.9.9.619.1.1.2.1.8 truthvalue read-only
This is applicable when cllaEapProfileMethods is EAP-FAST parameter. This parameter indicates whether client certificate is required.
                         cllaEapProfileRowStatus 1.3.6.1.4.1.9.9.619.1.1.2.1.9 rowstatus read-only
Used to add or delete an entry in this table.
                 cllaWlanProfileTable 1.3.6.1.4.1.9.9.619.1.1.3 no-access
This table represents the information about configuring the EAP profiles for a WLAN. The creation of a new row occurs when a WLAN entry is added through an explicit network management action to the cLWlanConfigTable in CISCO-LWAPP-WLAN-MIB. Similarly, deletion of a row in cLWlanConfigTable through user action, causes the deletion of corresponding row in this table.
                     cllaWlanProfileEntry 1.3.6.1.4.1.9.9.619.1.1.3.1 no-access
Each entry in this table provides information about the Local EAP profile configured for this WLAN.
                         cllaWlanProfileName 1.3.6.1.4.1.9.9.619.1.1.3.1.1 displaystring read-write
The profile name configured for this WLAN.
                         cllaWlanProfileState 1.3.6.1.4.1.9.9.619.1.1.3.1.2 truthvalue read-write
This object indicates whether Local Authentication is enabled or disables for this WLAN.
                 cllaUserPriorityTable 1.3.6.1.4.1.9.9.619.1.1.4 no-access
This table contains entries for 802.11 user credential methods configured in the controller. At startup, all the entries in this table are set up by the central controller. A management application can later change the priority order using the cllaUserPriorityNumber.
                     cllaUserPriorityEntry 1.3.6.1.4.1.9.9.619.1.1.4.1 no-access
A conceptual row in cllaUserPriorityTable. There is an entry in this table for each 802.11 user authentication available at the agent, as identified by a value of cllaUserCredential.
                         cllaUserCredential 1.3.6.1.4.1.9.9.619.1.1.4.1.1 integer no-access
This object represents the user crediantial information. local - indicates that local credential is used for authentication ldap - indicates that LDAP credential is used for authentication. Enumeration: 'local': 1, 'ldap': 2.
                         cllaUserPriorityNumber 1.3.6.1.4.1.9.9.619.1.1.4.1.2 integer32 read-write
This object represents the order in which the user credentials are validated by the controller. At start up, the agent assigns the value of this object. Later this can be changed by the management station. This object reflects the priority in which the user credential information is applied. A lower value indicates an higher priority. For example, an entry set to value '1' has a higher priority over an entry set to value '2'. The zero value indicates that the priority is not set. No two instances of this object will have the same priority.
                 cllaEapParams 1.3.6.1.4.1.9.9.619.1.1.5
                     cllaEapMethodPacTtl 1.3.6.1.4.1.9.9.619.1.1.5.1 unsigned32 read-write
This is EAP Fast parameter. This parameter represents time to live for the protected access credentials.
                     cllaEapAnonymousProvEnabled 1.3.6.1.4.1.9.9.619.1.1.5.2 truthvalue read-write
This is EAP Fast parameter. This parameter represents whether anonymous provisioning is enabled. A value of 'true' indicates the controller will accept anonymous requests. A value of 'false' indicates that the controller will reject anonymous requests.
                     cllaEapAuthorityId 1.3.6.1.4.1.9.9.619.1.1.5.3 octet string read-write
This is EAP Fast parameter. This parameter configures the authority ID. The maximum length per platform is specified by the cllaEapAuthorityIdLength object.
                     cllaEapAuthorityInfo 1.3.6.1.4.1.9.9.619.1.1.5.4 octet string read-write
This is EAP Fast parameter. This parameter configures the authority information.
                     cllaEapServerKey 1.3.6.1.4.1.9.9.619.1.1.5.5 octet string read-write
This is EAP Fast parameter. This parameter configures the server key ID.
                     cllaEapAuthorityIdLength 1.3.6.1.4.1.9.9.619.1.1.5.6 unsigned32 read-only
This object represents the length of the cllaEapAuthorityId object, supported by this agent implementation.
         ciscoLwappLocalAuthMIBConform 1.3.6.1.4.1.9.9.619.2
             ciscoLwappLocalAuthMIBCompliances 1.3.6.1.4.1.9.9.619.2.1
                 ciscoLwappLocalAuthMIBCompliance 1.3.6.1.4.1.9.9.619.2.1.1
The compliance statement for the SNMP entities that implement the ciscoLwappLocalAuthMIB module.
                 ciscoLwappLocalAuthMIBComplianceRev1 1.3.6.1.4.1.9.9.619.2.1.2
The compliance statement for the SNMP entities that implement the ciscoLwappLocalAuthMIB module.
             ciscoLwappLocalAuthMIBGroups 1.3.6.1.4.1.9.9.619.2.2
                 ciscoLwappLocalAuthMIBConfigGroup 1.3.6.1.4.1.9.9.619.2.2.1
This collection of objects specifies the required configuration parameters for local authentication.
                 ciscoLwappLocalAuthMIBConfigGroupSup1 1.3.6.1.4.1.9.9.619.2.2.2
This collection of objects specifies the required configuration parameters for local authentication.