G6-DHCP-MIB: View SNMP OID List / Download MIB

VENDOR: MICROSENS


 Home MIB: G6-DHCP-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 protocol 1.3.6.1.4.1.3181.10.6.2
Microsens private MIB for Generation 6 Ethernet Switches
     dhcp 1.3.6.1.4.1.3181.10.6.2.49
           dhcpEnableDhcpRelay 1.3.6.1.4.1.3181.10.6.2.49.1 integer read-write
General enable of dhcp relay function. Enumeration: 'disabled': 0, 'enabled': 1.
           dhcpEnableDhcpSnooping 1.3.6.1.4.1.3181.10.6.2.49.2 integer read-write
General enable of dhcp snooping function. Enumeration: 'disabled': 0, 'enabled': 1.
           dhcpEnablePppoeSnooping 1.3.6.1.4.1.3181.10.6.2.49.3 integer read-write
General enable of PPPoE snooping also known as PPPoE Intermediate Agent function. Enumeration: 'disabled': 0, 'enabled': 1.
           dhcpEnableArpInspection 1.3.6.1.4.1.3181.10.6.2.49.4 integer read-write
General enable of arp inspection function. Enumeration: 'disabled': 0, 'enabled': 1.
           dhcpUnblockPort 1.3.6.1.4.1.3181.10.6.2.49.5 displaystring read-write
This function may be used to unblock a port that has been set to blocking state due to DHCP flooding or due to ARP storm detection. The shorthand port format like 1 for 1/1 may be used. Syntax examples: dhcp.unblock_port = 1/2,1/5 or dhcp.unblock_port = 1/1-1/4. Also the syntax .. = 0-5 to unblock the first 6 ports is supported.
           dhcpClearSnoopingTable 1.3.6.1.4.1.3181.10.6.2.49.6 displaystring read-write
This function may be used to clear the content of the DHCP snooping table.
           relayConfigTable 1.3.6.1.4.1.3181.10.6.2.49.7 no-access
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
               relayConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.7.1 no-access
                   relayConfigIndex 1.3.6.1.4.1.3181.10.6.2.49.7.1.1 integer no-access
Automatically generated
                   relayConfigDhcpServerAddress 1.3.6.1.4.1.3181.10.6.2.49.7.1.2 displaystring read-write
Defines host address or network address where the dhcp server(s) resides. Also known as ip_helper_address.
                   relayConfigRemoteIdSource 1.3.6.1.4.1.3181.10.6.2.49.7.1.3 integer read-write
Defines how the switch is identified when DHCP option 82 is used. (Suboption2) Enumeration: 'macAddress': 1, 'hostname': 0, 'portAlias': 4, 'userDefined': 3, 'sysName': 2.
                   relayConfigCustomRemoteId 1.3.6.1.4.1.3181.10.6.2.49.7.1.4 displaystring read-write
This remote id is used for option 82 when 'remote_id_source' is set to USER_DEFINED.
                   relayConfigCircuitIdSource 1.3.6.1.4.1.3181.10.6.2.49.7.1.5 integer read-write
Defines how the ports are identified when option 82 is used. (Suboption1) Enumeration: 'snmpPortId': 0, 'slotPortId': 1, 'portAlias': 2, 'ipSlotPortVlan': 3.
           relayPortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.8 no-access
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
               relayPortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.8.1 no-access
                   relayPortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.8.1.1 integer no-access
Automatically generated
                   relayPortConfigEnableDhcpRelay 1.3.6.1.4.1.3181.10.6.2.49.8.1.2 integer read-write
When enabled incoming DHCP requests are redirected to the dhcp server or network specified in 'dhcp.relay_config' Enumeration: 'disabled': 0, 'enabled': 1.
                   relayPortConfigEnableOption82 1.3.6.1.4.1.3181.10.6.2.49.8.1.3 integer read-write
When enabled incoming DHCP requests are modified in 'dhcp.relay_config' Enumeration: 'disabled': 0, 'enabled': 1.
           snoopingPortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.9 no-access
This configures the DHCP snooping function. DHCP snooping acts like a DHCP firewall between access and link ports. When enabled it ensures that for untrusted ports only DHCP requests are accepted. This prevents malicious users from injecting fake DHCP frames and thus invalid IP addresses.
               snoopingPortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.9.1 no-access
                   snoopingPortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.9.1.1 integer no-access
Automatically generated
                   snoopingPortConfigEnableDhcpSnooping 1.3.6.1.4.1.3181.10.6.2.49.9.1.2 integer read-write
This enables the DHCP snooping function per port. Enumeration: 'disabled': 0, 'enabled': 1.
                   snoopingPortConfigDhcpFiltering 1.3.6.1.4.1.3181.10.6.2.49.9.1.3 integer read-write
DHCP filtering prevents DHCP responses being injected from a local access port. It acts like a DHCP firewall between access and link ports. Enumeration: 'disabled': 0, 'dropAndEvent': 1, 'blockAndEvent': 2.
                   snoopingPortConfigSnoopingTrust 1.3.6.1.4.1.3181.10.6.2.49.9.1.4 integer read-write
DHCP responses are only accepted when they ingress on a trusted port. Typically these are the link ports. AUTO uses the port role and declares all up or downlink ports as trusted. Enumeration: 'auto': 0, 'untrusted': 1, 'trusted': 2.
                   snoopingPortConfigAcceptIngressOption82 1.3.6.1.4.1.3181.10.6.2.49.9.1.5 integer read-write
Normally incoming DHCP request incoming with Option 82 set will be discarded. When enabled then this check is ignored. Enumeration: 'disabled': 0, 'enabled': 1.
                   snoopingPortConfigMacAddressVerification 1.3.6.1.4.1.3181.10.6.2.49.9.1.6 integer read-write
When a packet is received on an untrusted interface, and the source MAC address and the DHCP client MAC address do not match and this feature is enabled, the packet is dropped. Enumeration: 'disabled': 0, 'enabled': 1.
                   snoopingPortConfigDhcpRateLimiting 1.3.6.1.4.1.3181.10.6.2.49.9.1.7 integer32 read-write
Defines how many DHCP request are accepted per second. When the limit is reached, DHCP flooding is assumed and the port is blocked. The value 0 disables the rate limit check.
                   snoopingPortConfigClearSnoopingStatistics 1.3.6.1.4.1.3181.10.6.2.49.9.1.8 displaystring read-write
Reset all DHCP related statistics and reason. The snooping binding table is not affected.
           pppoeConfigTable 1.3.6.1.4.1.3181.10.6.2.49.10 no-access
This table defines the general parameter for PPPoE Intermediate Agent feature.
                 pppoeConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.10.1 no-access
                     pppoeConfigIndex 1.3.6.1.4.1.3181.10.6.2.49.10.1.1 integer no-access
Automatically generated
                     pppoeConfigVendorId 1.3.6.1.4.1.3181.10.6.2.49.10.1.2 unsigned32 read-write
Vendor identification that this device adds to a PPPoE request before forwarding it to the server.
                     pppoeConfigRemoteIdSource 1.3.6.1.4.1.3181.10.6.2.49.10.1.3 integer read-write
The remote id identifies the client that requests a PPPoE connection. Enumeration: 'macAddress': 1, 'hostname': 0, 'portAlias': 4, 'userDefined': 3, 'sysName': 2.
                     pppoeConfigCustomRemoteId 1.3.6.1.4.1.3181.10.6.2.49.10.1.4 displaystring read-write
This field is only used in a PPPoE request when the remote_id_source is set to USER_DEFINED.
                     pppoeConfigCircuitIdSource 1.3.6.1.4.1.3181.10.6.2.49.10.1.5 integer read-write
This field defines how the port on which a PPPoE request comes in is identified. Enumeration: 'snmpPortId': 0, 'slotPortId': 1, 'portAlias': 2, 'ipSlotPortVlan': 3.
           pppoePortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.11 no-access
This table permits port specific enable of the PPPoE Intermediate Agent feature.
                 pppoePortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.11.1 no-access
                     pppoePortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.11.1.1 integer no-access
Automatically generated
                     pppoePortConfigEnablePppoeSnooping 1.3.6.1.4.1.3181.10.6.2.49.11.1.2 integer read-write
Enables PPPoE intermediate agent function also known as PPPoE Snooping for this port. Also observe the general enable parameter for PPPoE. Enumeration: 'disabled': 0, 'enabled': 1.
           arpInspectionPortConfigTable 1.3.6.1.4.1.3181.10.6.2.49.12 no-access
This table defines the parameter for Dynamic ARP Inspection per port. These features should generally be used with untrusted ports.
                 arpInspectionPortConfigEntry 1.3.6.1.4.1.3181.10.6.2.49.12.1 no-access
                     arpInspectionPortConfigPortIndex 1.3.6.1.4.1.3181.10.6.2.49.12.1.1 integer no-access
Automatically generated
                     arpInspectionPortConfigEnableArpInspection 1.3.6.1.4.1.3181.10.6.2.49.12.1.2 integer read-write
Generally enables Dynamic ARP Inspection. The details need to be configured per VLAN in separate table. This feature helps preventing from man-in-the-middle attacks to the network. Enumeration: 'disabled': 0, 'enabled': 1.
                     arpInspectionPortConfigArpRateLimiting 1.3.6.1.4.1.3181.10.6.2.49.12.1.3 integer32 read-write
Defines how many ARP request are accepted per second. When the limit is reached, a DOS attack is assumed and the port is shut down. The value 0 disables the rate limit check.
                     arpInspectionPortConfigInspectionDatabase 1.3.6.1.4.1.3181.10.6.2.49.12.1.4 integer read-write
When set to another value than NONE, the MAC-IP relationship of the incoming ARPs is verified against the selected table. This ensures that only valid MACs enter the network. Enumeration: 'dhcp': 1, 'none': 0, 'arpAcl': 2, 'both': 3.
                     arpInspectionPortConfigArpAclName 1.3.6.1.4.1.3181.10.6.2.49.12.1.5 displaystring read-write
Name of the ACL (access control list) which declares which IP/MAC relations are acceptible. Note: ACLs are configured under Management.ACL. Several ACL may be specified with a comma separated list. Example acl1, otherlist
                     arpInspectionPortConfigAclDefaultLogic 1.3.6.1.4.1.3181.10.6.2.49.12.1.6 integer read-write
Defines which action is taken when none of the ACL records matches. Default is deny which blocks the ARP. Enumeration: 'deny': 0, 'permit': 1.
                     arpInspectionPortConfigSourceMacValidation 1.3.6.1.4.1.3181.10.6.2.49.12.1.7 integer read-write
Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. Packets with different MAC addresses are dropped. Enumeration: 'disabled': 0, 'enabled': 1.
                     arpInspectionPortConfigDestMacValidation 1.3.6.1.4.1.3181.10.6.2.49.12.1.8 integer read-write
Checks the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. Packets with different MAC addresses are dropped. Enumeration: 'disabled': 0, 'enabled': 1.
                     arpInspectionPortConfigIpRangeValidation 1.3.6.1.4.1.3181.10.6.2.49.12.1.9 integer read-write
Checks ARP for invalid addresses. Invalid addresses include 0.0.0.0, 255.255.255.255, and all IP multicast and loopback addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP addresses are checked only in ARP responses. Enumeration: 'disabled': 0, 'enabled': 1.
           snoopingStatisticsTable 1.3.6.1.4.1.3181.10.6.2.49.100 no-access
Statistics indicating activity of DHCP snooping.
                   snoopingStatisticsEntry 1.3.6.1.4.1.3181.10.6.2.49.100.1 no-access
                       snoopingStatisticsPortIndex 1.3.6.1.4.1.3181.10.6.2.49.100.1.1 integer no-access
Automatically generated
                       snoopingStatisticsTrustMode 1.3.6.1.4.1.3181.10.6.2.49.100.1.2 integer read-only
Reflects the determined trust mode. Enumeration: 'untrusted': 1, 'trusted': 2, 'undecided': 0.
                       snoopingStatisticsNumberOfDhcpProcessed 1.3.6.1.4.1.3181.10.6.2.49.100.1.3 unsigned32 read-only
Counts the number of dhcp messages processed.
                       snoopingStatisticsNumberOfDhcpDropped 1.3.6.1.4.1.3181.10.6.2.49.100.1.4 unsigned32 read-only
Counts the number of dhcp messages dropped.
                       snoopingStatisticsLastDropReason 1.3.6.1.4.1.3181.10.6.2.49.100.1.5 integer read-only
Enumeration: 'dhcpServerSpoofed': 2, 'ok': 0, 'bindingMismatch': 4, 'illegalRelayAgent': 3, 'illegalDhcpServer': 1, 'flooding': 5.
           snoopingTableTable 1.3.6.1.4.1.3181.10.6.2.49.101 no-access
This table lists the MAC-IP bindings of the untrusted ports (only) as discovered through DHCP snooping.
                   snoopingTableEntry 1.3.6.1.4.1.3181.10.6.2.49.101.1 no-access
                       snoopingTableIndex 1.3.6.1.4.1.3181.10.6.2.49.101.1.1 integer no-access
Automatically generated
                       snoopingTableMac 1.3.6.1.4.1.3181.10.6.2.49.101.1.2 macaddress read-only
MAC address entry
                       snoopingTableIp 1.3.6.1.4.1.3181.10.6.2.49.101.1.3 octet string read-only
IP address associated with this MAC.
                       snoopingTablePort 1.3.6.1.4.1.3181.10.6.2.49.101.1.4 integer32 read-only
Port number for MAC address
                       snoopingTableVlan 1.3.6.1.4.1.3181.10.6.2.49.101.1.5 integer32 read-only
if non zero this MAC is part of this VLAN.
                       snoopingTableLastUpdated 1.3.6.1.4.1.3181.10.6.2.49.101.1.6 displaystring read-only
Time stamp when this record was written
                       snoopingTableLastUpdatedEpoch 1.3.6.1.4.1.3181.10.6.2.49.101.1.7 unsigned32 read-only
Time stamp in alternate format
                       snoopingTableLeaseTime 1.3.6.1.4.1.3181.10.6.2.49.101.1.8 counter32 read-only
Lease time as reported by DHCP server