H3C-SSH-MIB: View SNMP OID List / Download MIB

VENDOR: HUAWEI


 Home MIB: H3C-SSH-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 h3cSSH 1.3.6.1.4.1.2011.10.2.22
The initial version.
       h3cSSHServerMIB 1.3.6.1.4.1.2011.10.2.22.1
           h3cSSHServerMIBObjects 1.3.6.1.4.1.2011.10.2.22.1.1
               h3cSSHServerGlobalConfig 1.3.6.1.4.1.2011.10.2.22.1.1.1
                   h3cSSHServerVersion 1.3.6.1.4.1.2011.10.2.22.1.1.1.1 displaystring read-only
The protocol version of the SSH server.
                   h3cSSHServerCompatibleSSH1x 1.3.6.1.4.1.2011.10.2.22.1.1.1.2 integer read-write
Supporting compatibility with SSH versions 1.x. It is known that there are still devices using the previous versions. During the transition period, it is important to be able to work in a way that is compatible with the installed SSH clients and servers that use the older version of the protocol. Enumeration: 'enableCompatibleSSH1x': 1, 'disableCompatibleSSH1x': 2.
                   h3cSSHServerRekeyInterval 1.3.6.1.4.1.2011.10.2.22.1.1.1.3 integer32 read-write
The time interval of regenerating SSH server key. The unit is hour.
                   h3cSSHServerAuthRetries 1.3.6.1.4.1.2011.10.2.22.1.1.1.4 integer32 read-write
The limit times of a specified user can retry.
                   h3cSSHServerAuthTimeout 1.3.6.1.4.1.2011.10.2.22.1.1.1.5 integer32 read-write
The SSH server has a timeout for authentication and disconnect if the authentication has not been accepted within the timeout period. The unit is second.
                   h3cSFTPServerIdleTimeout 1.3.6.1.4.1.2011.10.2.22.1.1.1.6 integer32 read-write
The SFTP server has a timeout for idle connection if a user has no activities within the timeout period. The unit is minute.
                   h3cSSHServerEnable 1.3.6.1.4.1.2011.10.2.22.1.1.1.7 integer read-write
Enable SSH server function. Enumeration: 'enableSSHServer': 1, 'disableSSHServer': 2.
                   h3cSFTPServerEnable 1.3.6.1.4.1.2011.10.2.22.1.1.1.8 integer read-write
Enable SFTP server function. Enumeration: 'enableSFTPService': 1, 'disableSFTPService': 2.
               h3cSSHUserConfig 1.3.6.1.4.1.2011.10.2.22.1.1.2
                   h3cSSHUserConfigTable 1.3.6.1.4.1.2011.10.2.22.1.1.2.1 no-access
A table for managing SSH users.
                       h3cSSHUserConfigEntry 1.3.6.1.4.1.2011.10.2.22.1.1.2.1.1 no-access
SSH users configuration entry.
                           h3cSSHUserName 1.3.6.1.4.1.2011.10.2.22.1.1.2.1.1.1 displaystring no-access
The name of SSH user.
                           h3cSSHUserServiceType 1.3.6.1.4.1.2011.10.2.22.1.1.2.1.1.2 integer read-only
The service type of SSH user uses. Enumeration: 'all': 2, 'stelnet': 3, 'invalid': 1, 'sftp': 4.
                           h3cSSHUserAuthType 1.3.6.1.4.1.2011.10.2.22.1.1.2.1.1.3 integer read-only
The authentication type of SSH user chooses. Enumeration: 'publicKey': 3, 'publicKeyPassword': 5, 'password': 2, 'any': 4, 'invalid': 1.
                           h3cSSHUserPublicKeyName 1.3.6.1.4.1.2011.10.2.22.1.1.2.1.1.4 displaystring read-only
The public key which is used for authentication.
                           h3cSSHUserWorkDirectory 1.3.6.1.4.1.2011.10.2.22.1.1.2.1.1.5 displaystring read-only
The SFTP user's work directory associates with an existing user.
                           h3cSSHUserRowStatus 1.3.6.1.4.1.2011.10.2.22.1.1.2.1.1.6 rowstatus read-only
The row status variable, used in accordance to installation and removal conventions for conceptual rows. When the `h3cSSHUserRowStatus' is set to active(1), no objects in this table can be modified. When 'h3cSSHUserRowStatus' is set to notInService(2), every object except the 'h3cSSHUserName' object in this table can be modified. To create a row in this table, a manager must set this object to createAndGo(4). Until instances of all corresponding columns are appropriately configured, the value of the corresponding instance of the h3cSSHUserRowStatus column is 'notReady'.
               h3cSSHSessionInfoTable 1.3.6.1.4.1.2011.10.2.22.1.1.3 no-access
A table for SSH sessions.
                   h3cSSHSessionInfoEntry 1.3.6.1.4.1.2011.10.2.22.1.1.3.1 no-access
The SSH session information entry.
                       h3cSSHSessionID 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.1 integer32 no-access
The identifier of SSH session.
                       h3cSSHSessionUserName 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.2 displaystring read-only
The user name of SSH session.
                       h3cSSHSessionUserIpAddrType 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.3 inetaddresstype read-only
The user IP address type of SSH session.
                       h3cSSHSessionUserIpAddr 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.4 inetaddress read-only
The user IP address of SSH session.
                       h3cSSHSessionClientVersion 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.5 displaystring read-only
The client version of SSH session. It is known that there are still devices using the previous versions.
                       h3cSSHSessionServiceType 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.6 integer read-only
The service type of SSH session. Enumeration: 'stelnet': 2, 'invalid': 1, 'sftp': 3.
                       h3cSSHSessionEncry 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.7 integer read-only
The encryption algorithm of SSH session. There are several encryption algorithms used in SSH protocol, please refer to RFC4253 Section 6.3. Enumeration: 'des3CBC': 4, 'desCBC': 3, 'invalid': 1, 'aes128CBC': 2.
                       h3cSSHSessionState 1.3.6.1.4.1.2011.10.2.22.1.1.3.1.8 integer read-only
The status of SSH session. init : This session is in initial status. verExchange : This session is in version exchanging. keysExchange : This session is in keys exchanging. authRequest : This session is in authentication requesting. serviceRequest : This session is in service requesting. established : This session has been established. disconnected : This session has been disconnected. Enumeration: 'established': 6, 'disconnect': 7, 'keysExchange': 3, 'serviceRequest': 5, 'verExchange': 2, 'init': 1, 'authRequest': 4.
           h3cSSHServerObjForTrap 1.3.6.1.4.1.2011.10.2.22.1.2
               h3cSSHAttemptUserName 1.3.6.1.4.1.2011.10.2.22.1.2.1 displaystring no-access
The user name of the attacker who attempted to log in.
               h3cSSHAttemptIpAddrType 1.3.6.1.4.1.2011.10.2.22.1.2.2 inetaddresstype no-access
The IP address type of the attacker who attempted to log in.
               h3cSSHAttemptIpAddr 1.3.6.1.4.1.2011.10.2.22.1.2.3 inetaddress no-access
The IP address of the attacker who attempted to log in.
               h3cSSHUserAuthFailureReason 1.3.6.1.4.1.2011.10.2.22.1.2.4 integer no-access
The reason for that a user failed to log in. Enumeration: 'authTimeout': 2, 'otherReason': 3, 'exceedRetries': 1.
           h3cSSHServerNotifications 1.3.6.1.4.1.2011.10.2.22.1.3
               h3cSSHServerNotificationsPrefix 1.3.6.1.4.1.2011.10.2.22.1.3.0
                   h3cSSHUserAuthFailure 1.3.6.1.4.1.2011.10.2.22.1.3.0.1
The trap is generated when a user fails to authentication.
                   h3cSSHVersionNegotiationFailure 1.3.6.1.4.1.2011.10.2.22.1.3.0.2
The trap is generated when a user fails to negotiate SSH protocol version.
                   h3cSSHUserLogin 1.3.6.1.4.1.2011.10.2.22.1.3.0.3
The trap is generated when a user logs in successfully.
                   h3cSSHUserLogoff 1.3.6.1.4.1.2011.10.2.22.1.3.0.4
The trap is generated when a user logs off.