PDN-SECURITY-MIB: View SNMP OID List / Download MIB

VENDOR: PARADYNE


 Home MIB: PDN-SECURITY-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 devSecurityMgrValidation 1.3.6.1.4.1.1795.2.24.2.8.1 integer read-write
This object is used to either enable or disable SNMP IP validation. When enabled the first check on any incoming PDU is based on the IP address of the datagram. If the IP address is configured in the devSecurityMgrTable then the community name is checked. If the community name is correct then the lowest access level between the the Table and the community name is taken. Enumeration: 'enable': 2, 'disable': 1.
 devSecurityMgrMaxNumber 1.3.6.1.4.1.1795.2.24.2.8.2 integer read-only
Maximum number of managers allowed in the devSecurityMgrTable.
 devSecurityMgrCurrentNumber 1.3.6.1.4.1.1795.2.24.2.8.3 integer read-only
Current number of managers in the devSecurityMgrTable.
 devSecurityMgrTable 1.3.6.1.4.1.1795.2.24.2.8.4 no-access
A list of the security manager entries. In order to add a new Security Manager the devSecurityMgrIpAddress object must be created first by setting it to a valid IP Address.
     devSecurityMgrEntry 1.3.6.1.4.1.1795.2.24.2.8.4.1 no-access
The SNMP IP Address configuration items.
         devSecurityMgrIpAddress 1.3.6.1.4.1.1795.2.24.2.8.4.1.1 ipaddress read-write
This is used to specify the IP address that identifies the SNMP manager(s) that are authorized to send SNMP messages. An existing Security Manager may be deleted by setting the devSecurityMgrIpAddress object to 0.0.0.0 or by setting the devSecurityMgrIpAddress object to a new IP Address. A new Security Manager may be added by setting the devSecurityMgrIpAddress object of 0.0.0.0 to the new address as long as there is still room for another Security Manager. When ever a new Security Manager is added or an existing Security Manager's IP Address is modified, the devSecurityMgrAccess object is set to the default value of read (1).
         devSecurityMgrAccess 1.3.6.1.4.1.1795.2.24.2.8.4.1.2 integer read-write
This field is used to specify the access allowed for an authorized NMS when Manager Validation is performed. If the IP address for the NMS sending an SNMP message is on the list of allowed managers, this option along with the Community Name access determine the type of access allowed for the that manager. When ever a new Security Manager is added or an existing Security Manager's IP Address is modified, the devSecurityMgrAccess object is set to the default value of read (1). If the index for this object is not in the existing table and if there is room in the table then the index will be used to create a new Security Manager and will be given the requested access level. Enumeration: 'read': 1, 'readWrite': 2.
 newSecurityMgrTable 1.3.6.1.4.1.1795.2.24.2.8.5 no-access
A list of the security manager entries. If an entry is not found in this table, it is added to the table.
     newSecurityMgrEntry 1.3.6.1.4.1.1795.2.24.2.8.5.1 no-access
The SNMP IP Address configuration items.
         newSecurityMgrIpAddress 1.3.6.1.4.1.1795.2.24.2.8.5.1.1 ipaddress read-write
This is used to specify the IP address that identifies the SNMP manager(s) that are authorized to send SNMP messages. This object is the binary AND of SNMP or telnet source IP address and its subnet mask if the subnet mask is available. Subnet mask is assumed to be 255.255.255.255 when not available
         newSecurityMgrAccess 1.3.6.1.4.1.1795.2.24.2.8.5.1.2 integer read-write
This field is used to specify the access allowed for an authorized NMS when Manager Validation is performed. If the IP address for the NMS sending an SNMP message is on the list of allowed managers, this option along with the Community Name access determine the type of access allowed for the that manager. When ever a new Security Manager is added or an existing Security Manager's IP Address is modified, the newSecurityMgrAccess object is set to the default value of read (1). If the index for this object is not in the existing table and if there is room in the table then the index will be used to create a new Security Manager and will be given the requested access level. In addition changing an existing access permission to noAccess invalidates the corresponding row of this table. It is upto the implementation to decide whether to actually remove this entry from the table or not. read (1) ==> no telnet access and snmp read only access readWrite (2) ==> no telnet access and snmp read-write access noAccess (3) ==> no telnet access and no snmp read-write access telnetNoAccess (4) ==> telnet access and no snmp access telnetRead (5) ==> telnet access and snmp read only access telnetReadWrite (6) ==> telnet access and snmp read-write access. Enumeration: 'telnetReadWrite': 6, 'noAccess': 3, 'read': 1, 'readWrite': 2, 'telnetNoAccess': 4, 'telnetRead': 5.
         newSecurityMgrSubnetMask 1.3.6.1.4.1.1795.2.24.2.8.5.1.3 ipaddress read-write
This object is used to specify the subnet mask
 devSecurityTelnetSourceValidation 1.3.6.1.4.1.1795.2.24.2.8.6 integer read-write
This object is used to either enable or disable telnet source address screening Enumeration: 'enable': 2, 'disable': 1.
 devSecurityFtpSourceValidation 1.3.6.1.4.1.1795.2.24.2.8.7 integer read-write
This object is used to either enable or disable ftp source address screening Enumeration: 'enable': 2, 'disable': 1.
 securityMgrTable 1.3.6.1.4.1.1795.2.24.2.8.8 no-access
A list of the security manager entries. If an entry is not found in this table, it is added to the table.
     securityMgrEntry 1.3.6.1.4.1.1795.2.24.2.8.8.1 no-access
The device access security configuration items.
         securityMgrIpAddress 1.3.6.1.4.1.1795.2.24.2.8.8.1.1 ipaddress read-write
This is used to specify the IP address that identifies the SNMP manager(s) that are authorized to send SNMP messages.
         securityMgrSubnetMask 1.3.6.1.4.1.1795.2.24.2.8.8.1.2 ipaddress read-write
This object is used to specify the subnet mask
         securityMgrSnmpAccess 1.3.6.1.4.1.1795.2.24.2.8.8.1.3 integer read-write
This is used to specify the snmp access to the device. Enumeration: 'readWrite': 2, 'readOnly': 1, 'noAccess': 3.
         securityMgrTelnetAccess 1.3.6.1.4.1.1795.2.24.2.8.8.1.4 integer read-write
This is used to specify the telnet access to the device. Enumeration: 'enable': 2, 'disable': 1.
         securityMgrFtpAccess 1.3.6.1.4.1.1795.2.24.2.8.8.1.5 integer read-write
This is used to specify the ftp access to the device. Enumeration: 'enable': 2, 'disable': 1.
         securityMgrRowStatus 1.3.6.1.4.1.1795.2.24.2.8.8.1.6 rowstatus read-write
The status of this table entry.