SECURITY-MANAGEMENT-MIB: View SNMP OID List / Download MIB

VENDOR: AVAYA COMMUNICATION


 Home MIB: SECURITY-MANAGEMENT-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 avayaSecurity 1.3.6.1.4.1.6889.2.1.14
       secMngModule 1.3.6.1.4.1.6889.2.1.14.1
Defines MIB objects related to device secured management.
           secMode 1.3.6.1.4.1.6889.2.1.14.1.1 onofftype read-only
When the security mode flag = on - it indicates that device operates in secured mode, =off - in non-secured mode. Otherwize when the value retuned =Not relevant - secured mode is not supported in this device.
           secTcpSynCookies 1.3.6.1.4.1.6889.2.1.14.1.2
               secTcpSynCkiOpState 1.3.6.1.4.1.6889.2.1.14.1.2.1 onofftype read-only
Monitors the operational state of the TCP SYN cookies defense mechanism. The operational state of the SYN cookies can change only after a reset, if the configuration state was changed and the running configuration was saved to the startup configuration before the reset. Use secTcpSynCkiCfgState to monitor and change the SYN cookies configuration state. When the SYN cookies feature is turned on, it helps protect the local host from SYN attacks (a type of DoS attack).
               secTcpSynCkiCfgState 1.3.6.1.4.1.6889.2.1.14.1.2.2 onofftype read-write
Controls and monitors the configuration state of the TCP SYN cookies defense mechanism. The operational state of the SYN cookies can change only after reset, if the configuration state was changed and the running configuration was saved to the startup configuration before the reset. Use secTcpSynCkiOpState to monitor the SYN cookies operational state. When the SYN cookies feature is turned on, it helps protect the local host from SYN attacks (a type of DoS attack).
           secMngProtoTable 1.3.6.1.4.1.6889.2.1.14.1.3 no-access
List of security management protocols supported in the device.
               secMngProtoEntry 1.3.6.1.4.1.6889.2.1.14.1.3.1 no-access
Description.
                   secMngProtoId 1.3.6.1.4.1.6889.2.1.14.1.3.1.1 integer read-only
Index to the secMngProtoTable. The index can take one of the following values that correspond to supported management protocols scpConfigFiles(1), scpImageFiles(2), ssh(3), telnet(4), snmpv3(5), http(6), https(7), telnetClient(8), icmpRedirection(9), - icmp redirection service state icmp(10), - icmp services status recoveryPassword(11), - recovery password state sshClient(12), snmpv1(13), icmpEcho(14) - icmp service has been launched in EchoOnly mode tftp(16), dhcp(17), dnsResolver(18, scpClient(19), tftpClient(20), servicesTelnet(21), - reports telnet status on Services interface in G450 Missing entry indicates that corresponding protocol is not supported. Enumeration: 'scpClient': 19, 'recoveryPassword': 11, 'snmpv1': 13, 'ftpClient': 15, 'snmpv3': 5, 'tftpClient': 20, 'dnsRelay': 22, 'https': 7, 'dhcp': 17, 'scpConfigFiles': 1, 'telnetClient': 8, 'http': 6, 'telnetServices': 21, 'arpInspection': 23, 'icmpRedirection': 9, 'telnet': 4, 'scpImageFiles': 2, 'dnsResolver': 18, 'ssh': 3, 'icmp': 10, 'icmpEcho': 14, 'sshClient': 12, 'tftp': 16.
                   secMngProtoStatus 1.3.6.1.4.1.6889.2.1.14.1.3.1.2 servicestatetype read-only
Portocol status. When the status is =on - it indicates that correpsonding protocol is up and running, =off - protocol is down. Otherwize when the value retuned =Not relevant - the protocol is not supported.
           secMngConformance 1.3.6.1.4.1.6889.2.1.14.1.4
               secMngGroups 1.3.6.1.4.1.6889.2.1.14.1.4.1
                   secMngBasicGroup 1.3.6.1.4.1.6889.2.1.14.1.4.1.1
Description.
               secMngCompliance 1.3.6.1.4.1.6889.2.1.14.1.4.2
           lsgLicManagement 1.3.6.1.4.1.6889.2.1.14.1.5
Group of MIBs objects used for configuration/presentation of the License information generated by Avaya Remote Feature Activation (RFA) system.
               lsgLicMngTable 1.3.6.1.4.1.6889.2.1.14.1.5.1 no-access
RFA based License management table. All elements are displaying the feature activation status. License activation controlled by the license file. The table is indexed by the license feature keyword assuming that the same keyword describing a feature cannot appear more than once per a license file.
                   lsgLicMngEntry 1.3.6.1.4.1.6889.2.1.14.1.5.1.1 no-access
Entry in lsgLicMngTable.
                       lsgLicMngFeatureKeyword 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.1 octet string read-only
This table entry contains a features keyword. The feature keywords are text-based for example FEAT_VPN string. This field is used as a table index
                       lsgLicMngFeatureType 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.2 integer read-only
License activation mechanism support two feature types * Boolean on-off feature * Features that describe quantities for example number of concurrent VPN peers Enumeration: 'quantifiableFeature': 2, 'onOffFeature': 1.
                       lsgLicMngAdminStatus 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.3 onofftype read-only
An administration status shows the feature activation status - when set to On the feature is activated by the RFA licensing system.
                       lsgLicMngOperStatus 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.4 onofftype read-only
The operation status shows the actual status of the corresponding feature - feature can be not operational enabled if for example device must be reset for feature to be activated or feature is not supported by a device.
                       lsgLicMngCountedValue 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.5 unsigned32 read-only
For counted features, this entry shows the associated quantity
                       lsgLicMngLastError 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.6 integer read-only
Shows feature error state Enumeration: 'licNoError': 2.
               lsgLicMngConformance 1.3.6.1.4.1.6889.2.1.14.1.5.20
Description.
                     lsgLicMngGroups 1.3.6.1.4.1.6889.2.1.14.1.5.20.1
Description.
                         lsgLicMngBasicGroup 1.3.6.1.4.1.6889.2.1.14.1.5.20.1.1
Description.
           fips140 1.3.6.1.4.1.6889.2.1.14.1.6
Description.
               fipsEnhancedSecurityFlg 1.3.6.1.4.1.6889.2.1.14.1.6.1 onofftype read-only
enhanceSecurity flag reports operation of a product in enhance security mode. When running under enhanced security a product performs certain secure-related activities safely, closely matching FIPS-140-2 standard. However the flag doesn't necessary indicate that all device operations comply to FIPS approved mode as some of security activities might be controlled via different mechanisms for example manual configuration. Security policy/Crypto Office guidance documents shall be used as reference as for if this flag can be used as an evidence for operation in FIPS approved mode. The flag is read only and set via product CLI.
           avMssNotifications 1.3.6.1.4.1.6889.2.1.14.1.7
Subtree hosting MSS notification traps
               avMssNotificationPrefix 1.3.6.1.4.1.6889.2.1.14.1.7.0
Description.
                   avMSSDenialOfService 1.3.6.1.4.1.6889.2.1.14.1.7.0.1
The MSS notification sent on DoS attack
               avMSSNotificationRate 1.3.6.1.4.1.6889.2.1.14.1.7.2 integer read-write
Defines the rate of MSS notification report. MSS reports will be generated as per rate if the event group counter passes the threshold correspondingly. The rate units are given in seconds with minimum - 10 seconds maximum - 8 hours (60 * 60 * 8)
               avMSSVarbinds 1.3.6.1.4.1.6889.2.1.14.1.7.4
Subtree of access-for-notify arguments to MSS notification varbinds list.
                   avMSSVarbindsDoSType 1.3.6.1.4.1.6889.2.1.14.1.7.4.1 integer no-access
Enumeration of DoS attacks Enumeration: 'avMSSDoSICMPReflectAttack': 3, 'avMSSDoSMalformedARPs': 1, 'avMSSDoSUknownPort': 4, 'avMSSDoSUrgTCPOption': 5, 'avMSSUserDefinedDoSAttack100': 100, 'avMSSUserDefinedDoSAttack102': 102, 'avMSSUserDefinedDoSAttack104': 104, 'avMSSUserDefinedDoSAttack103': 103, 'avMSSDoSFraggleAttack': 9, 'avMSSDoSMalFragmentIP': 10, 'avMSSSpoofedIP': 11, 'avMSSunAuthenticatedAccess': 13, 'avMSSUnknownL4Protocol': 12, 'avMSSUserDefinedDoSAttack101': 101, 'avMSSDoSSmurfAttack': 8, 'avMSSDoSMalformedIP': 6, 'avMSSDoSLandAttack': 2, 'avMSSDoSSynFlood': 7, 'avMSSUserDefinedDoSAttack105': 105.
                   avMSSVarbindsDescription 1.3.6.1.4.1.6889.2.1.14.1.7.4.2 displaystring no-access
Textual description of the DoS event
                   avMSSVarbindsSrcAddr 1.3.6.1.4.1.6889.2.1.14.1.7.4.3 ipaddress no-access
Source IP address in IP header. Set to 0.0.0.0 if address is unknown
                   avMSSVarbindsDstAddr 1.3.6.1.4.1.6889.2.1.14.1.7.4.4 ipaddress no-access
Destination IP address in IP header. Set to 0.0.0.0 if address is unknown
                   avMSSVarbindsDstPort 1.3.6.1.4.1.6889.2.1.14.1.7.4.5 integer no-access
Destination port number in IP header. 0 if port is not applicable or unknown
                   avMSSVarbindsIpProtocol 1.3.6.1.4.1.6889.2.1.14.1.7.4.6 integer no-access
The protocol field in IP header
                   avMSSVarbindsCount 1.3.6.1.4.1.6889.2.1.14.1.7.4.7 counter64 no-access
Counted number of events that occur in a given period for a corresponding class of security violations (DoS, not authorized access, etc).
                   avMSSVarbindsSrcMACAddr 1.3.6.1.4.1.6889.2.1.14.1.7.4.8 physaddress no-access
Source Physical address (MAC) of a packet identified as a packet carrying DoS payload. Set to 00:00:00:00:00:00 when phyicial address is not supported or unknown to the system
           avMSSgroup 1.3.6.1.4.1.6889.2.1.14.1.8
Description.
           mssNotificationGroup 1.3.6.1.4.1.6889.2.1.14.1.9
Description.
           secMngNotifications 1.3.6.1.4.1.6889.2.1.14.1.10
Description.
                 secMngNotificationsPrefix 1.3.6.1.4.1.6889.2.1.14.1.10.0
Description.
                     avConfigurationEncKeyMismatchFault 1.3.6.1.4.1.6889.2.1.14.1.10.0.1
Encryption keys mismatch error. Configuration download operation is aborted
                     avConfigurationMasterKeyChange 1.3.6.1.4.1.6889.2.1.14.1.10.0.2
Configuration Master key was changed
                     avPasswordToExpireAlert 1.3.6.1.4.1.6889.2.1.14.1.10.0.3
User password is about to expire in n days
                     avUnAuthAccessEvent 1.3.6.1.4.1.6889.2.1.14.1.10.0.200
Notification on unauthorized login attempts. o For CLI and SNMP login failures: Both SNMP SSH and WEB management interfaces shall identify situation and alert. The reported information should include wrong user name, host name and IP address of remote host. Passwords is not reported because of the possibility to reveal password. o For pre-shared-key (PSK) authentication failure in IKE: * lntUnauthUserName - - In IKE AM: the ID sent by the remote peer in the ID payload. - In IKE MM: the ID associated with the remote peer IP in the running configuration. * avUnauthInetAddressType and avUnauthInetAddress - represents the source IP of the packet sent by the remote peer. * avUnauthProtocol - lntIKEAccess(500)
                     avAccountLockoutEvent 1.3.6.1.4.1.6889.2.1.14.1.10.0.201
After configurable number of failed attempts to authenticate a user, device penalized by locking them out for a pre-specified amount of time.
                     avIPv6AddressDuplicationEvent 1.3.6.1.4.1.6889.2.1.14.1.10.0.202
The trap is generated whenever there is a detection of IPv6 address (link-local or global IPv6 address) duplication as part of DAD.
                 secMngVarbinds 1.3.6.1.4.1.6889.2.1.14.1.10.1
Notify only varbinds used for notifications in secMngNotifications group
                     secMngNumOfDays2Expire 1.3.6.1.4.1.6889.2.1.14.1.10.1.1 unsigned32 no-access
Description.
                     avUnauthUserName 1.3.6.1.4.1.6889.2.1.14.1.10.1.3 octet string no-access
The name of the user who's attempt to access device was identified as unauthorized.
                     avUnauthProtocol 1.3.6.1.4.1.6889.2.1.14.1.10.1.5 integer no-access
The management protocol employed for the unauthorized access - avSSHAccess(22) -- SSH protocol avTELNETAccess(23), --Telnet protocol avHTTPAccess(80), -- HTTP protocol avSNMPAccess(161), -- SNMP protocol avHTTPSAccess(443), -- HTTPS protocol over TLS sockets avIKEAccess(500), -- IKE protocol - PSK authentication failure avRASAccess(6889), -- RAS access over dial-up connection avConsoleAccess(6890), -- Access from the Console port avPPPAccess(6891) -- Access to PPP over modem Enumeration: 'avHTTPAccess': 80, 'avHTTPSAccess': 443, 'avRASAccess': 6889, 'avSNMPAccess': 161, 'avIKEAccess': 500, 'avPPPAccess': 6891, 'avTELNETAccess': 23, 'avSSHAccess': 22, 'avConsoleAccess': 6890.
                     avUnauthInetAddressType 1.3.6.1.4.1.6889.2.1.14.1.10.1.9 inetaddresstype no-access
The Inet Address Type of access violating station
                     avUnauthInetAddress 1.3.6.1.4.1.6889.2.1.14.1.10.1.10 inetaddress no-access
The Inet Address of access violating station
                     avDuplicatedInetAddressType 1.3.6.1.4.1.6889.2.1.14.1.10.1.11 inetaddresstype no-access
The duplicated Inet Address Type.
                     avDuplicatedInetAddress 1.3.6.1.4.1.6889.2.1.14.1.10.1.12 inetaddress no-access
The duplicated Inet Address.
                     avDuplicatedMACAddress 1.3.6.1.4.1.6889.2.1.14.1.10.1.13 physaddress no-access
The MAC address of the station that claims to be configured with the duplicated IPv6 address.
                 avMngNotificationCompliance 1.3.6.1.4.1.6889.2.1.14.1.10.2
Description.
           secMngNotificationGroup 1.3.6.1.4.1.6889.2.1.14.1.11
Description.
           avASGAuthenticationFiles 1.3.6.1.4.1.6889.2.1.14.1.12
Info on authentication file(s) installed in a product
                 avASGAuthFileHeader 1.3.6.1.4.1.6889.2.1.14.1.12.3
The information on Authentication File stored in ASG AF file header
                     avASGAuthFileAFID 1.3.6.1.4.1.6889.2.1.14.1.12.3.1 displaystring read-only
The productID value ascociated with the Authentication File (format 7xxxxxxxxx)
                     avASGAuthFileGenDate 1.3.6.1.4.1.6889.2.1.14.1.12.3.2 displaystring read-only
Date of Authentication file generation (format YYYY/MM/DD)
                     avASGAuthFileGenTime 1.3.6.1.4.1.6889.2.1.14.1.12.3.3 displaystring read-only
A 8-character string in US short locale time (format= HH:MM:SS)
                     avASGAuthFileRelease 1.3.6.1.4.1.6889.2.1.14.1.12.3.4 displaystring read-only
Major software release the AF file was generated for
                     avASGNotifications 1.3.6.1.4.1.6889.2.1.14.1.12.3.5
Description.
                         avASGNotificationsPrefix 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0
Description.
                             avASGAFDownloadSuccess 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0.1
AF download successfully accomplished
                             avASGAFDownloadFailure 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0.2
AF download Failed
                 avASGAuthFileGroup 1.3.6.1.4.1.6889.2.1.14.1.12.1000
Description.
                 avASGAuthFileNotificationGroup 1.3.6.1.4.1.6889.2.1.14.1.12.1001
ASG authentictation File Notification Group
           avSecLocalDateAndTime 1.3.6.1.4.1.6889.2.1.14.1.13 dateandtime read-write
Setting the Local current RTC date and time, when not registered with CM