HM2-USERMGMT-MIB: View SNMP OID List / Download MIB

VENDOR: RICHARD HIRSCHMANN


 Home MIB: HM2-USERMGMT-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 hm2UserMgmtMib 1.3.6.1.4.1.248.11.24
Hirschmann User and Password Management MIB. Copyright (C) 2011. All Rights Reserved.
       hm2UserMgmtMibNotifications 1.3.6.1.4.1.248.11.24.0
           hm2UserCreatedTrap 1.3.6.1.4.1.248.11.24.0.1
This notification is send when a new user is added to the hm2UserConfigTable.
           hm2UserDeletedTrap 1.3.6.1.4.1.248.11.24.0.2
This notification is send when a user is deleted from the hm2UserConfigTable.
           hm2UserLockedTrap 1.3.6.1.4.1.248.11.24.0.3
This notification is send when a user is locked due to excessive failed login attempts.
           hm2UserPwdChangedTrap 1.3.6.1.4.1.248.11.24.0.4
This notification is send when a password for a user is changed.
           hm2UserPwdPolicyChkChangedTrap 1.3.6.1.4.1.248.11.24.0.5
This notification is send when the password policy for a user is changed.
       hm2UserMgmtMibObjects 1.3.6.1.4.1.248.11.24.1
           hm2UserConfigGroup 1.3.6.1.4.1.248.11.24.1.1
               hm2UserConfigTable 1.3.6.1.4.1.248.11.24.1.1.1 no-access
User configuration table. This table provides the functionality the system uses for any interaction started by the user - authentication, encryption - changing authentication, password and access role for login purposes through Web, CLI, SSH, SNMPv3. For SNMPv3 the standard SNMPv3 authentication/encryption methods are used. To create a new user set hm2UserStatus to 'createAndWait, and set the corresponding objects to their values. Setting hm2UserStatus to 'active' activates the user. To delete a user, set hm2UserStatus to 'destroy'. Creating a new user in the hm2UserConfigTable always creates a new user in the SNMPv3 tables. The newly created SNMPv3 user will get the corresponding view in the SNMPv3 tables which matches to one of the given roles the user can have. All objects in this table can be set while a row is 'active'.
                   hm2UserConfigEntry 1.3.6.1.4.1.248.11.24.1.1.1.1 no-access
User configuration entry.
                       hm2UserName 1.3.6.1.4.1.248.11.24.1.1.1.1.1 snmpadminstring no-access
Agent user name.
                       hm2UserPassword 1.3.6.1.4.1.248.11.24.1.1.1.1.2 displaystring read-only
Agent user password This object will always return '********' when read. The minimum size of the password is defined with the hm2PwdMgmtMinLength object. The user password can be set while the row is active.
                       hm2UserAccessRole 1.3.6.1.4.1.248.11.24.1.1.1.1.3 hm2useraccessroles read-only
Agent user's role. The user's role can be set while the row is active.
                       hm2UserLockoutStatus 1.3.6.1.4.1.248.11.24.1.1.1.1.4 truthvalue read-only
Displays whether the user account is locked due to excessive failed login attempts. If the user is locked out, the hm2UserLockoutStatus status is 'true'. Only a user with the administrator role can set this status back to 'false'.
                       hm2UserPwdChangePerm 1.3.6.1.4.1.248.11.24.1.1.1.1.5 truthvalue read-only
Displays whether the user is allowed to change his own password. Only a user with the administrator role can set this value.
                       hm2UserPwdPolicyChk 1.3.6.1.4.1.248.11.24.1.1.1.1.6 hmenabledstatus read-only
Displays whether the password policy check is enabled or not. The password policy check objects are defined in the hm2PwdMgmtGroup. Even if this object if set to 'disable' the size of a new password has to be at least the size of the hm2PwdMgmtMinLength object set. Only a user with the administrator role can set this value.
                       hm2UserSnmpAuthType 1.3.6.1.4.1.248.11.24.1.1.1.1.7 integer read-only
SNMPv3 user authentication. The user password must be set to a string greater than or equal to 8 characters for this to be set to anything but none(0). - hmacmd5(1) -> Use HMAC-MD5 authentication - hmacsha(2) -> Use HMAC-SHA authentication The user authentication type can be set while the row is active . Enumeration: 'hmacmd5': 1, 'hmacsha': 2.
                       hm2UserSnmpEncType 1.3.6.1.4.1.248.11.24.1.1.1.1.8 integer read-only
SNMPv3 user encryption Can not be set to des(2) or aesCfb128(3) if hm2UserSnmpAuthenticationType is set to none(0). - none(0) -> no encryption used - des(1) -> DES encryption used - aesCfb128(2) -> AES-128 encryption used The user encryption type can be set while the row is active. Enumeration: 'none': 0, 'des': 1, 'aesCfb128': 2.
                       hm2UserStatus 1.3.6.1.4.1.248.11.24.1.1.1.1.9 rowstatus read-only
Agent user status. active(1) - This user account is active. notInService(2) - Row has been suspended. notReady(3) - Row has incomplete values. createAndGo(4) - Accept row values and activate. createAndWait(5) - Accept row values and wait. destroy(6) - Set to this value to remove this user account.
               hm2UserStatusGroup 1.3.6.1.4.1.248.11.24.1.1.10
                     hm2UserLastUserCreated 1.3.6.1.4.1.248.11.24.1.1.10.1 snmpadminstring read-only
Name of the last user created in hm2UserConfigTable.
                     hm2UserLastUserDeleted 1.3.6.1.4.1.248.11.24.1.1.10.2 snmpadminstring read-only
Name of the last user deleted in hm2UserConfigTable.
               hm2UserCustomGroup 1.3.6.1.4.1.248.11.24.1.1.20
                     hm2UserCustomAccessRole2NameTable 1.3.6.1.4.1.248.11.24.1.1.20.1 no-access
Custom based role to name mapping.
                         hm2UserCustomAccessRole2NameEntry 1.3.6.1.4.1.248.11.24.1.1.20.1.1 no-access
The hm2UserCustomAccessRole2NameEntry.
                             hm2UserCustomAccessRole 1.3.6.1.4.1.248.11.24.1.1.20.1.1.1 hm2usercustomaccessroles no-access
Custom based roles.
                             hm2UserCustomAccessRoleName 1.3.6.1.4.1.248.11.24.1.1.20.1.1.2 snmpadminstring read-write
Custom based role name.
                             hm2UserCustomAccessRoleStatus 1.3.6.1.4.1.248.11.24.1.1.20.1.1.3 rowstatus read-only
Custom-based role to name command row status. active(1) - This user account is active. notInService(2) - Row has been suspended. notReady(3) - Row has incomplete values. createAndGo(4) - Accept row values and activate. createAndWait(5) - Accept row values and wait. destroy(6) - Set to this value to remove this role to name entry.
                     hm2UserCustomCliCmdInheritTable 1.3.6.1.4.1.248.11.24.1.1.20.2 no-access
Base access role from which the custom-based CLI commands are inherited from.
                         hm2UserCustomCliCmdInheritEntry 1.3.6.1.4.1.248.11.24.1.1.20.2.1 no-access
The hm2UserCustomCliCmdInheritEntry.
                             hm2UserCustomCliBaseAccessRole 1.3.6.1.4.1.248.11.24.1.1.20.2.1.1 hm2useraccessroles read-only
The base access role the new CLI command is inherited from.
                             hm2UserCustomCliBaseAccessRoleStatus 1.3.6.1.4.1.248.11.24.1.1.20.2.1.2 rowstatus read-only
Custom-based CLI base access role command row status. active(1) - This user account is active. notInService(2) - Row has been suspended. notReady(3) - Row has incomplete values. createAndGo(4) - Accept row values and activate. createAndWait(5) - Accept row values and wait. destroy(6) - Set to this value to remove this role to name entry.
                     hm2UserCustomCliCmdTable 1.3.6.1.4.1.248.11.24.1.1.20.3 no-access
Table containing the custom-based CLI commands.
                         hm2UserCustomCliCmdEntry 1.3.6.1.4.1.248.11.24.1.1.20.3.1 no-access
The entries of the table.
                             hm2UserCustomCliExecMode 1.3.6.1.4.1.248.11.24.1.1.20.3.1.1 hm2usercliexecmodes no-access
CLI exec mode.
                             hm2UserCustomCliIndex 1.3.6.1.4.1.248.11.24.1.1.20.3.1.2 integer32 no-access
Index of the custom based CLI commands.
                             hm2UserCustomCliCommand 1.3.6.1.4.1.248.11.24.1.1.20.3.1.3 snmpadminstring read-only
The custom based CLI command to be assigned.
                             hm2UserCustomCliType 1.3.6.1.4.1.248.11.24.1.1.20.3.1.4 integer read-only
The custom based CLI command to be included or excluded in respect to the base role. Enumeration: 'included': 1, 'excluded': 2.
                             hm2UserCustomCliStatus 1.3.6.1.4.1.248.11.24.1.1.20.3.1.5 rowstatus read-only
Custom-based CLI command row status. active(1) - This user account is active. notInService(2) - Row has been suspended. notReady(3) - Row has incomplete values. createAndGo(4) - Accept row values and activate. createAndWait(5) - Accept row values and wait. destroy(6) - Set to this value to remove this CLI command entry.
           hm2PwdMgmtGroup 1.3.6.1.4.1.248.11.24.1.2
               hm2PwdMgmtMinLength 1.3.6.1.4.1.248.11.24.1.2.1 integer32 read-write
Minimum length for user passwords All new local user passwords must be at least this many characters in length.
               hm2PwdMgmtLoginAttempts 1.3.6.1.4.1.248.11.24.1.2.2 integer32 read-write
The number of allowable failed local authentication attempts before the user's account is locked. A value of '0' indicates that user accounts will never be locked.
               hm2PwdMgmtMinUpperCase 1.3.6.1.4.1.248.11.24.1.2.3 integer32 read-write
The number of minimum allowable uppercase letters in a password. Minimum of '0' means no restriction on that set of characters.
               hm2PwdMgmtMinLowerCase 1.3.6.1.4.1.248.11.24.1.2.4 integer32 read-write
The number of minimum allowable lowercase letters in a password. Minimum of '0' means no restriction on that set of characters.
               hm2PwdMgmtMinNumericNumbers 1.3.6.1.4.1.248.11.24.1.2.5 integer32 read-write
The number of minimum allowable numeric numbers in a password. Minimum of '0' means no restriction on that set of characters.
               hm2PwdMgmtMinSpecialCharacters 1.3.6.1.4.1.248.11.24.1.2.6 integer32 read-write
The number of minimum allowable special characters in a password. Minimum of '0' means no restriction on that set of characters. The following special characters are allowed: !#$%&'()*+,-./:;<=>?@[\\]^_`{}~
               hm2PwdMgmtDefaultPwdStatusGroup 1.3.6.1.4.1.248.11.24.1.2.100
                       hm2PwdMgmtDefaultPwdActive 1.3.6.1.4.1.248.11.24.1.2.100.1 truthvalue read-only
Shows if one or more default passwords are active for users configured in the hm2UserConfigTable. The hm2PwdMgmtDefaultPwdStatusTable shows for which users the default password is currently actice.
                       hm2PwdMgmtDefaultPwdStatusTable 1.3.6.1.4.1.248.11.24.1.2.100.100 no-access
Table showing for which users defined in hm2UserConfigTable the default password has not been changed.
                               hm2PwdMgmtDefaultPwdStatusEntry 1.3.6.1.4.1.248.11.24.1.2.100.100.1 no-access
Entry.
                                   hm2PwdMgmtDefaultPwdStatusIndex 1.3.6.1.4.1.248.11.24.1.2.100.100.1.1 integer32 no-access
Index for the table.
                                   hm2PwdMgmtDefaultPwdStatusUserName 1.3.6.1.4.1.248.11.24.1.2.100.100.1.2 snmpadminstring read-only
The name of the default user for which the default password has not been changed.
           hm2UserApplicationListGroup 1.3.6.1.4.1.248.11.24.1.3
               hm2UserApplicationListTable 1.3.6.1.4.1.248.11.24.1.3.1 no-access
This table provides the functionality the system uses to assign an authentication list to an application. All objects in this table can be set while a row is 'active'.
                   hm2UserApplicationListEntry 1.3.6.1.4.1.248.11.24.1.3.1.1 no-access
Application list entry.
                       hm2UserApplicationListName 1.3.6.1.4.1.248.11.24.1.3.1.1.1 snmpadminstring no-access
Application list name.
                       hm2UserApplicationListAuthListName 1.3.6.1.4.1.248.11.24.1.3.1.1.6 snmpadminstring read-only
The authentication list used for this application to authenticate to the system. The application authentication list can be set while the row is active.
                       hm2UserApplicationListStatus 1.3.6.1.4.1.248.11.24.1.3.1.1.7 rowstatus read-only
Application row status. active(1) - This user account is active. notInService(2) - Row has been suspended. notReady(3) - Row has incomplete values. createAndGo(4) - Accept row values and activate. createAndWait(5) - Accept row values and wait. destroy(6) - Set to this value to remove this application list entry.
           hm2UserAuthListGroup 1.3.6.1.4.1.248.11.24.1.4
               hm2UserAuthListTable 1.3.6.1.4.1.248.11.24.1.4.1 no-access
The hm2UserAuthListTable holds up to 5 policies a user authenticates to the system.
                   hm2UserAuthListEntry 1.3.6.1.4.1.248.11.24.1.4.1.1 no-access
The hm2UserAuthListEntry.
                       hm2UserAuthListName 1.3.6.1.4.1.248.11.24.1.4.1.1.1 snmpadminstring no-access
Authentication list index. Unique name used for indexing into this table.
                       hm2UserAuthListPolicy1 1.3.6.1.4.1.248.11.24.1.4.1.1.2 hm2userauthlist read-only
Authentication list policy 1. Configures the first authentication policy to use when this list is specified. - local -> authentication is done through local user database - radius -> authentication is done through a RADIUS server - ias -> authentication is done through a (i)ntegrated (a)uthentication (s)erver - cam -> authentication is done through a CAM server (via LDAP) - ldap -> authentication is done through a AD server (via LDAP) - reject -> authentication is rejected/not allowed. Note: If a policy is set to 'reject' further policies are ignored.
                       hm2UserAuthListPolicy2 1.3.6.1.4.1.248.11.24.1.4.1.1.3 hm2userauthlist read-only
Authentication list policy 2. Configures the first authentication policy to use when this list is specified. - local -> authentication is done through local user database - radius -> authentication is done through a RADIUS server - ias -> authentication is done through a (i)ntegrated (a)uthentication (s)erver - cam -> authentication is done through a CAM server (via LDAP) - ldap -> authentication is done through a AD server (via LDAP) - reject -> authentication is rejected/not allowed Note: If a policy is set to 'reject' further policies are ignored.
                       hm2UserAuthListPolicy3 1.3.6.1.4.1.248.11.24.1.4.1.1.4 hm2userauthlist read-only
Authentication list policy 3. Configures the first authentication policy to use when this list is specified. - local -> authentication is done through local user database - radius -> authentication is done through a RADIUS server - ias -> authentication is done through a (i)ntegrated (a)uthentication (s)erver - cam -> authentication is done through a CAM server (via LDAP) - ldap -> authentication is done through a AD server (via LDAP) - reject -> authentication is rejected/not allowed Note: If a policy is set to 'reject' further policies are ignored.
                       hm2UserAuthListPolicy4 1.3.6.1.4.1.248.11.24.1.4.1.1.5 hm2userauthlist read-only
Authentication list policy 4. Configures the first authentication policy to use when this list is specified. - local -> authentication is done through local user database - radius -> authentication is done through a RADIUS server - ias -> authentication is done through a (i)ntegrated (a)uthentication (s)erver - cam -> authentication is done through a CAM server (via LDAP) - ldap -> authentication is done through a AD server (via LDAP) - reject -> authentication is rejected/not allowed Note: If a policy is set to 'reject' further policies are ignored.
                       hm2UserAuthListPolicy5 1.3.6.1.4.1.248.11.24.1.4.1.1.6 hm2userauthlist read-only
Authentication list policy 5. Configures the first authentication policy to use when this list is specified. - local -> authentication is done through local user database - radius -> authentication is done through a RADIUS server - ias -> authentication is done through a (i)ntegrated (a)uthentication (s)erver - cam -> authentication is done through a CAM server (via LDAP) - ldap -> authentication is done through a AD server (via LDAP) - reject -> authentication is rejected/not allowed Note: If a policy is set to 'reject' further policies are ignored.
                       hm2UserAuthListStatus 1.3.6.1.4.1.248.11.24.1.4.1.1.7 rowstatus read-only
The status of the authentication list. active(1) - This entry is active. notInService(2) - Row has been suspended. notReady(3) - Row has incomplete values. createAndGo(4) - Accept row values and activate. createAndWait(5) - Accept row values and wait. destroy(6) - Set to this value to remove this authentication list.
           hm2UserIasGroup 1.3.6.1.4.1.248.11.24.1.5
               hm2UserIasTable 1.3.6.1.4.1.248.11.24.1.5.1 no-access
(I)ntegrated (A)uthentication (S)erver.
                   hm2UserIasEntry 1.3.6.1.4.1.248.11.24.1.5.1.1 no-access
The hm2UserIasEntry.
                       hm2UserIasUserName 1.3.6.1.4.1.248.11.24.1.5.1.1.1 snmpadminstring no-access
The (I)ntegrated (A)uthentication (S)erver user name.
                       hm2UserIasUserPassword 1.3.6.1.4.1.248.11.24.1.5.1.1.2 displaystring read-only
The (I)ntegrated (A)uthentication (S)erver user password. This object will always return '********' when read. The user password can be set while the row is active.
                       hm2UserIasUserStatus 1.3.6.1.4.1.248.11.24.1.5.1.1.3 rowstatus read-only
The status of the IAS users. active(1) - This entry is active. notInService(2) - Row has been suspended. notReady(3) - Row has incomplete values. createAndGo(4) - Accept row values and activate. createAndWait(5) - Accept row values and wait. destroy(6) - Set to this value to remove this IAS entry.
       hm2UserMgmtMibSNMPExtensionGroup 1.3.6.1.4.1.248.11.24.3
           hm2UserMgmtGlobalSESGroup 1.3.6.1.4.1.248.11.24.3.1
               hm2UserMgmtGlobalSESLenCharset 1.3.6.1.4.1.248.11.24.3.1.1
Indicates that the chosen entry name uses not allowed character(s). Allowed are alphanumerical characters and name size from 1 to 32.
               hm2UserMgmtGlobalSESPwdLenCharset 1.3.6.1.4.1.248.11.24.3.1.2
Indicates that the chosen password is incorrect. Check character set, length, policy matching (if password policy checker is enabled).
           hm2UserMgmtUserSESGroup 1.3.6.1.4.1.248.11.24.3.2
               hm2UserMgmtUserSESActivate 1.3.6.1.4.1.248.11.24.3.2.1
Indicates that the chosen user entry can not be activated. Be sure that a user password has been successfully set before.
               hm2UserMgmtUserSESDeactivate 1.3.6.1.4.1.248.11.24.3.2.2
Indicates that the chosen user entry can not be deactivated. Be sure that this user is not the last active admin on the device.
           hm2UserMgmtApplSESGroup 1.3.6.1.4.1.248.11.24.3.3
               hm2UserMgmtApplSESAddDel 1.3.6.1.4.1.248.11.24.3.3.1
Indicates that the chosen entry can not be added or deleted. Notice that application lists can neither be added nor deleted.
               hm2UserMgmtApplSESDeactivate 1.3.6.1.4.1.248.11.24.3.3.2
Indicates that the chosen entry can not be deactivated. Be sure that this list is not referenced to an authentication list (hm2UserApplicationListAuthListName has to be set to a zero length string).
           hm2UserMgmtAuthSESGroup 1.3.6.1.4.1.248.11.24.3.4
               hm2UserMgmtAuthSESDuplPolicy 1.3.6.1.4.1.248.11.24.3.4.1
Indicates that the chosen policy of this entry can not be set twice. Be sure that a policy is set only once per authentication list (exception: the policy 'reject' can be set several times).
               hm2UserMgmtAuthSESDeactivate 1.3.6.1.4.1.248.11.24.3.4.2
Indicates that the chosen entry can not be deactivated. Be sure that this list is not referenced by an apllication list (hm2UserApplicationListAuthListName is not set to this authentication list name).