ENTERASYS-SSH-SERVER-MIB: View SNMP OID List / Download MIB

VENDOR: ENTERASYS NETWORKS


 Home MIB: ENTERASYS-SSH-SERVER-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 etsysSshServerMIB 1.3.6.1.4.1.5624.1.2.26
This MIB module defines a portion of the SNMP enterprise MIBs under Enterasys Networks' enterprise OID pertaining to Secure Shell (SSH) system management functionality, specifically for embedded systems. This is a subset of the objects that would be required for a full-featured, host- based implementation. It provides configuration controls for Enterasys Networks' Secure Shell system management -- a feature that enhances system security by authenticating and encrypting the remote system management function.
       etsysSshObjects 1.3.6.1.4.1.5624.1.2.26.1
           etsysSshGeneralBranch 1.3.6.1.4.1.5624.1.2.26.1.1
               etsysSshEnabled 1.3.6.1.4.1.5624.1.2.26.1.1.1 truthvalue read-write
Controls the operation of the Secure Shell server task on the embedded system. When enabled, the SSH server will accept connection requests and create a secure transport layer on which to transmit system configuration data.
               etsysSshEventLogFilter 1.3.6.1.4.1.5624.1.2.26.1.1.2 integer read-write
Specifies the filter for event log messages. Valid values are information, warning, and error. The values are defined as follows: none (1) Pass no messages. This is effectively a disable condition for Event Logging. information (2) Pass Informational Level, Warning Level and Error Level messages. warning (3) Pass Warning Level and Error Level messages. error (4) Pass Error Level messages only. Enumeration: 'information': 2, 'none': 1, 'warning': 3, 'error': 4.
               etsysSshMaxConnections 1.3.6.1.4.1.5624.1.2.26.1.1.3 integer read-only
Specifies the maximum number of simultaneous connections that the target system supports. This is an implementation restriction.
               etsysSshNumConnections 1.3.6.1.4.1.5624.1.2.26.1.1.4 integer read-write
Specifies the maximum number of simultaneous connections that the server will currently allow. This value must be less than or equal to etsysSshMaxConnections.
           etsysSshNetworkBranch 1.3.6.1.4.1.5624.1.2.26.1.2
           etsysSshCryptoBranch 1.3.6.1.4.1.5624.1.2.26.1.3
               etsysSshCiphers 1.3.6.1.4.1.5624.1.2.26.1.3.1 integer read-write
Specifies the ciphers to use for encrypting the session. Current enumerated types, DES, 3DES, Blowfish, Arcfour, Twofish, and CAST128 are supported. Special values to this option are any, anystd, that allows only standard (see below) ciphers, and anycipher that allows either any available cipher or excludes non-encrypting cipher mode none but allows all others. anystdcipher is the same as above, but includes only those ciphers mentioned in the IETF-SecSH-draft (excluding 'none'). Enumeration: 'blowfish': 5, 'arcFour': 6, 'anyCipher': 2, 'des': 3, 'aes': 9, 'tripleDes': 4, 'twofish': 7, 'cast128': 8, 'anyStdCipher': 1.
               etsysSshMACs 1.3.6.1.4.1.5624.1.2.26.1.3.2 integer read-write
Specifies the MAC (Message Authentication Code) algorithm to use for data integrity verification. Currently enumerated types, hmacSha1, hmacSha1Dash96, hmacMd5, hmacMd5Dash96, hmacRipemd160, and hmacRipemd160Dash96 are supported, of which hmacSha1, hmacSha1Dash96, hmacMd5, and hmacMd5Dash96 are included in all distributions. Special values to this option are anyStdMac, that allows only standard (see below) MACs, and anyMac that allows either any available MAC or excludes none but allows all others. AnyStdMac is the same as above, but includes only those MACs mentioned in the IETF-SecSH-draft (excluding none). Enumeration: 'anyStdMac': 1, 'hmacRipemd160': 7, 'anyMac': 2, 'hmacSha1Dash96': 4, 'hmacMd5Dash96': 6, 'hmacMd5': 5, 'hmacRipemd160Dash96': 8, 'hmacSha1': 3.
               etsysSshRekeyIntervalSeconds 1.3.6.1.4.1.5624.1.2.26.1.3.3 integer read-write
Specifies the number of seconds after which the key exchange is done again. A value of 0 (zero) turns re-key requests off. This does not prevent the client from requesting re-keys. Note that not all clients support this function.
               etsysSshRandomSeed 1.3.6.1.4.1.5624.1.2.26.1.3.4 octet string read-write
Specifies optional additional entropy information that will be merged with the seed for the random number generator.
           etsysSshLoginBranch 1.3.6.1.4.1.5624.1.2.26.1.4
               etsysSshLoginGraceTime 1.3.6.1.4.1.5624.1.2.26.1.4.1 integer read-write
The server disconnects after this many seconds if the user has not successfully been authenticated and logged in. The range limit is from 1 second to 1 hour.
               etsysSshIdleTimeout 1.3.6.1.4.1.5624.1.2.26.1.4.2 integer read-write
Specifies the maximum number of minutes before a user is disconnected due to lack of activity. A value of zero means that there is no idle timeout.
               etsysSshBannerMessage 1.3.6.1.4.1.5624.1.2.26.1.4.3 displaystring read-write
Banner message that is displayed at the client before the login.
           etsysSshServerKeyBranch 1.3.6.1.4.1.5624.1.2.26.1.5
               etsysSshGenerateHostKeys 1.3.6.1.4.1.5624.1.2.26.1.5.1 integer read-write
Causes the host to generate a new private/public host key pair, using the cipher algorithm currently selected in etsysSshAdminKeyType. Note that this can be compute intensive on many platforms. The meaning of the values are as follows: notInitiated (1) On a write, this is a no-operation, on a read, it indicates that no key material generation operation has ever been initiated, at least since the last reset to factory defaults initialization of the managed entity. No key material exists. completed (2) On a write, this is a no-operation, on a read, this indicates that a key pair has been successfully generated. failed (3) On a write, this is a no-operation, on a read, it indicates that the key generation operation has failed. generate (4) On a write, this causes the managed entity to generate a new key pair, on a read, it indicates that the managed entity is still working on creating the new keys. completedPending (5) On a write, this is a no-operation, on a read, this indicates that a key pair has been successfully generated but its use is pending due to another required operation, such as a reboot. Enumeration: 'completedPending': 5, 'failed': 3, 'completed': 2, 'generate': 4, 'notInitiated': 1.
               etsysSshPublicHostKey 1.3.6.1.4.1.5624.1.2.26.1.5.2 octet string read-only
The host's public key, of type etsysSshOperKeyType.
               etsysSshAdminKeyType 1.3.6.1.4.1.5624.1.2.26.1.5.3 integer read-write
Determines the type of the key pair to be (re)created on the next key (re)creation operation. The etsysSshOperKeyType object returns the type of key that is currently being used by the SSH server. Enumeration: 'rsa1024': 4, 'dsa512': 9, 'dsa768': 1, 'rsa3072': 8, 'dsa2048': 5, 'rsa2048': 6, 'dsa3072': 7, 'rsa512': 10, 'rsa768': 2, 'dsa1024': 3.
               etsysSshOperKeyType 1.3.6.1.4.1.5624.1.2.26.1.5.4 integer read-only
Indicates the type of the key pair currently in effect on the managed entity. The value of the etsysSshAdminKeyType object is copied to the etsysSshOperKeyType object upon successful completion of the (re)creation of a key pair. A value of none indicates that due to the failure of the initial key pair generation there is no active key pair. Enumeration: 'rsa1024': 4, 'dsa512': 9, 'dsa768': 1, 'rsa3072': 8, 'dsa2048': 5, 'rsa2048': 6, 'none': 99, 'dsa3072': 7, 'rsa512': 10, 'rsa768': 2, 'dsa1024': 3.
           etsysSshAuthBranch 1.3.6.1.4.1.5624.1.2.26.1.6
               etsysSshPasswordGuesses 1.3.6.1.4.1.5624.1.2.26.1.6.1 integer read-write
Specifies the number of tries that the user has when attempting to authenticate using password authentication.
               etsysSshAllowedAuthentications 1.3.6.1.4.1.5624.1.2.26.1.6.2 integer read-write
This specifies the authentications methods that are allowed. This is an enumerated list currently consisting of the following types: password, publickey. Each specifies an authentication method. With RequiredAuthentications, the administrator can force users to complete several authentications before they are considered authenticated. Enumeration: 'allAuth': 1, 'publickey': 3, 'password': 2.
               etsysSshRequiredAuthentications 1.3.6.1.4.1.5624.1.2.26.1.6.3 integer read-write
Related to AllowedAuthentications, this is used to specify what authentication methods the users must complete before continuing. If this value is left zero, it does not mean that no authentications are required. It means that the client can authenticate itself with any of the authentications given in AllowedAuthentications. This parameter has no default. Note: This parameter has to be a subset for AllowedAuthentications. Otherwise, the server denies connection every time. Enumeration: 'publickey': 3, 'password': 2, 'noAuth': 1.
       etsysSshConformance 1.3.6.1.4.1.5624.1.2.26.2
           etsysSshGroups 1.3.6.1.4.1.5624.1.2.26.2.1
               etsysSshBaseGroup 1.3.6.1.4.1.5624.1.2.26.2.1.1
A collection of objects providing basic SSH server configuration on a managed entity.
               etsysSshAdvancedGroup 1.3.6.1.4.1.5624.1.2.26.2.1.2
A collection of objects providing advanced feature support for configuration of the SSH server on the managed entity.
               etsysSshEventLogGroup 1.3.6.1.4.1.5624.1.2.26.2.1.3
A collection of objects to manage SSH event logs on the managed entity. Conditionally mandatory for all managed entities that implement the event log feature.
           etsysSshCompliances 1.3.6.1.4.1.5624.1.2.26.2.2
               etsysSshCompliance 1.3.6.1.4.1.5624.1.2.26.2.2.1
The compliance statement for devices that support the Enterasys Secure Shell (SSH) MIB.