CISCO-WDS-IDS-MIB: View SNMP OID List / Download MIB

VENDOR: CISCO


 Home MIB: CISCO-WDS-IDS-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 ciscoWdsIdsMIB 1.3.6.1.4.1.9.9.457
This MIB is intended to be implemented on all IOS based network entities that provide Wireless Domain Services, for the purpose of providing network management stations information about the various attempts to compromise the security in the 802.11-based wireless networks. Entities that can be configured to provide Wireless Domain Services could be an 802.11 Access Point, a Switch or any other IOS network device, that allows the WDS configuration. The MIB reports the information about the MAC spoofing attempts made by wireless clients to compromise the security of the network. MAC Spoofing is detected by the WDS when clients attempt to authenticate with the WDS using the MAC address of another client while roaming from one AP to another. Upon detecting this, the WDS provides the information about the client and the username to the NMS as MIB objects. The hierarchy of the WDS, AP and MNs is as follows. +=====+ +=====+ +=====+ | | | | | | | WDS | | WDS | | WDS | | | | | | | +=====+ +=====+ +=====+ / \ \ \ / \ \ \ / \ \ \ / \ \ \ / \ \ \ \/ \/ \/ \/ +~-~-~+ +~-~-~+ +~-~-~+ +~-~-~+ + + + + + + + + + AP + + AP + + AP + + AP + + + + + + + + + +~-~-~+ +~-~-~+ +~-~-~+ +~-~-~+ .. . . . .. . . . . . . . . . . . . . . . . . . . . . . . \/ \/ \/ \/ \/ +.....+ +.....+ +-.-.-.+ +~-~-~+ +......+ + + + + + + + + + + + MN + + MN + + MN + + MN + + MN + + + + + + + + + + + +.....+ +.....+ +-.-.-.+ +~-~-~+ +......+ The WDS include authentication and registration services for the APs. An AP provides Proxy Authentication and registration services for the MNs. The wireless connections are represented as dotted lines in the above diagram. GLOSSARY Access Point ( AP ) An entity that contains an 802.11 medium access control ( MAC ) and physical layer ( PHY ) interface and provides access to the distribution services via the wireless medium for associated clients. Mobile Node ( MN ) A roaming 802.11 wireless device in a wireless network associated with an access point. Wireless Domain Services (WDS) The set of services being offered at a particular broadcast domain that may be an IP subnet or a particular VLAN, or across the L3 cloud. The services include the following. 1. MN security credential caching to provide seamless, secure intra-subnet roaming. 2. Authenticated context transfer for roaming client within the subnet. Context The mobility context for an MN includes its current mobility bindings with the APs, IP/802 address bindings, cached configuration parameters, QoS state, IP group membership, authentication state, accounting statistics, and other dynamically derived protocol state information.
         ciscoWdsIdsMIBObjects 1.3.6.1.4.1.9.9.457.1
             ciscoWdsIdsMacSpoofing 1.3.6.1.4.1.9.9.457.1.1
                 ciscoWdsIdsMaxMacAddresses 1.3.6.1.4.1.9.9.457.1.1.1 integer32 read-write
This object indicates the maximum number of different MAC addresses for which spoofing events are held in this table.
                 ciscoWdsIdsMaxEntriesPerMac 1.3.6.1.4.1.9.9.457.1.1.2 integer32 read-write
This object indicates the maximum number of entries that can be held for a particular MAC address indicated by the object ciscoWdsIdsMacSpoofStaMacAddress.
                 ciscoWdsIdsMacSpoofTable 1.3.6.1.4.1.9.9.457.1.1.3 no-access
This table gives the information about the MAC spoofing attacks detected by the network entity offering WDS. An entry in this table is created by the agent when the WDS detects a MAC spoofing attack. The agent at anytime will retain only the most recent and maximum number of entries possible for a particular MAC. The older entries are purged automatically when the number of entries for a particular MAC reaches its maximum. Thus, there can be a maximum of those many different MAC addresses indicated by ciscoWdsIdsMaxMacAddresses and for each MAC address, the maximum number of entries is indicated by the value of the MIB object ciscoWdsIdsMaxEntriesPerMac. MAC spoofing is detected only by the network entity serving as the active WDS and hence this table is populated only by the active WDS as indicated by the values 'wds' and 'active' for the MIB objects cDot11csServiceType and cDot11csWdsInstanceState respectively. If cDot11csServiceType equals 'none' indicating that WDS is not configured in this station, or cDot11csWdsInstanceState not equals 'active' indicating that this entity is not the currently active WDS, a 'noSuchInstance' error is returned for the queries to the objects of this table.
                     ciscoWdsIdsMacSpoofEntry 1.3.6.1.4.1.9.9.457.1.1.3.1 no-access
An entry holds the information about one instance of MAC spoofing attack detected on the radio interface of the AP identified by ciscoWdsIdsMacSpoofStaMacAddress.
                         ciscoWdsIdsMacSpoofStaMacAddress 1.3.6.1.4.1.9.9.457.1.1.3.1.1 macaddress no-access
This object identifies the radio interface of the 802.11 station, that has forwarded the authentication request of the client with the spoofed MAC address indicated by ciscoWdsIdsMacSpoofClient, to the WDS.
                         ciscoWdsIdsMacSpoofIndex 1.3.6.1.4.1.9.9.457.1.1.3.1.2 unsigned32 no-access
This object identifies the set of information about one instance of a MAC spoofing attack detected by the WDS. The radio interface of the 802.11 station that has forwarded the authentication request is identified by ciscoWdsIdsMacSpoofStaMacAddress.
                         ciscoWdsIdsMacSpoofClient 1.3.6.1.4.1.9.9.457.1.1.3.1.3 macaddress read-only
This object indicates the MAC address that has been spoofed.
                         ciscoWdsIdsMacSpoofUserId 1.3.6.1.4.1.9.9.457.1.1.3.1.4 snmpadminstring read-only
This object indicates the userId used by the wireless client when attempting the MAC spoofing attack.
                         ciscoWdsIdsMacSpoofDetectTime 1.3.6.1.4.1.9.9.457.1.1.3.1.5 timestamp read-only
This object indicates the time at which this MAC spoofing attempt is detected by the WDS.
         ciscoWdsIdsMIBConform 1.3.6.1.4.1.9.9.457.2
             ciscoWdsIdsMIBCompliances 1.3.6.1.4.1.9.9.457.2.1
                 ciscoWdsIdsMIBCompliance 1.3.6.1.4.1.9.9.457.2.1.1
The compliance statement for the SNMP entities that implement the ciscoWdsIdsMIB module.
             ciscoWdsIdsMIBGroups 1.3.6.1.4.1.9.9.457.2.2
                 ciscoWdsIdsMacSpoofingGroup 1.3.6.1.4.1.9.9.457.2.2.1
This collection of objects provide the information about the various attempts to spoof the MAC addresses of valid wireless clients in the network.