TELDAT-TRAP-BSPF-MIB: View SNMP OID List / Download MIB

VENDOR: TELDAT, S.A.


 Home MIB: TELDAT-TRAP-BSPF-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 bspfTrapsMIB 1.3.6.1.4.1.2007.1.4.194
This Module Information Base file is defined for managing received SNMP notifications generated by the BSPF event subsystem.
         bspfEventsGroup 1.3.6.1.4.1.2007.1.4.194.1
             bspfEventObjects1 1.3.6.1.4.1.2007.1.4.194.1.1
Event BSPF.1 Bridge has detected an incoming packet whose destination matches a spoofed MAC address.
                 bspf1_src_mac 1.3.6.1.4.1.2007.1.4.194.1.1.1 displaystring no-access
Parameter 'src-mac' in event BSPF.1
                 bspf1_src_port 1.3.6.1.4.1.2007.1.4.194.1.1.2 integer32 no-access
Parameter 'src-port' in event BSPF.1
                 bspf1_dst_mac 1.3.6.1.4.1.2007.1.4.194.1.1.3 displaystring no-access
Parameter 'dst-mac' in event BSPF.1
                 bspf1_dst_port 1.3.6.1.4.1.2007.1.4.194.1.1.4 integer32 no-access
Parameter 'dst-port' in event BSPF.1
                 bspf1_protocol 1.3.6.1.4.1.2007.1.4.194.1.1.5 integer32 no-access
Parameter 'protocol' in event BSPF.1
                 bspf1_interface 1.3.6.1.4.1.2007.1.4.194.1.1.6 displaystring no-access
Parameter 'interface' in event BSPF.1
             bspfEventObjects2 1.3.6.1.4.1.2007.1.4.194.1.2
Event BSPF.2 Bridge has intercepted an incoming packet destined for a spoofed MAC. If its protocol is IP, the destination ip address does not match the one spoofed. If it is ARP, the operation code must be request.
                 bspf2_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.2.1 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.2
                 bspf2_protocol 1.3.6.1.4.1.2007.1.4.194.1.2.2 integer32 no-access
Parameter 'protocol' in event BSPF.2
                 bspf2_interface 1.3.6.1.4.1.2007.1.4.194.1.2.3 displaystring no-access
Parameter 'interface' in event BSPF.2
             bspfEventObjects3 1.3.6.1.4.1.2007.1.4.194.1.3
Event BSPF.3 The MAC address associated with a spoofed address has been updated.
                 bspf3_mac_addr 1.3.6.1.4.1.2007.1.4.194.1.3.1 displaystring no-access
Parameter 'mac-addr' in event BSPF.3
                 bspf3_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.3.2 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.3
                 bspf3_interface 1.3.6.1.4.1.2007.1.4.194.1.3.3 displaystring no-access
Parameter 'interface' in event BSPF.3
             bspfEventObjects4 1.3.6.1.4.1.2007.1.4.194.1.4
Event BSPF.4 The port associated with a spoofed address has been updated.
                 bspf4_port 1.3.6.1.4.1.2007.1.4.194.1.4.1 integer32 no-access
Parameter 'port' in event BSPF.4
                 bspf4_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.4.2 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.4
                 bspf4_interface 1.3.6.1.4.1.2007.1.4.194.1.4.3 displaystring no-access
Parameter 'interface' in event BSPF.4
             bspfEventObjects5 1.3.6.1.4.1.2007.1.4.194.1.5
Event BSPF.5 Bridge-spoofing sends an ARP packet periodically requesting the MAC address associated with every spoofed address configured.
                 bspf5_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.5.1 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.5
                 bspf5_interface 1.3.6.1.4.1.2007.1.4.194.1.5.2 displaystring no-access
Parameter 'interface' in event BSPF.5
             bspfEventObjects6 1.3.6.1.4.1.2007.1.4.194.1.6
Event BSPF.6 Bridge-spoofing broadcasts an ARP gratuitous packet after changing the MAC address associated with a configured spoofed address.
                 bspf6_mac_addr 1.3.6.1.4.1.2007.1.4.194.1.6.1 displaystring no-access
Parameter 'mac-addr' in event BSPF.6
                 bspf6_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.6.2 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.6
                 bspf6_interface 1.3.6.1.4.1.2007.1.4.194.1.6.3 displaystring no-access
Parameter 'interface' in event BSPF.6
             bspfEventObjects7 1.3.6.1.4.1.2007.1.4.194.1.7
Event BSPF.7 Received an ARP request packet asking for a spoofed configured address.
                 bspf7_mac_addr 1.3.6.1.4.1.2007.1.4.194.1.7.1 displaystring no-access
Parameter 'mac-addr' in event BSPF.7
                 bspf7_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.7.2 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.7
                 bspf7_interface 1.3.6.1.4.1.2007.1.4.194.1.7.3 displaystring no-access
Parameter 'interface' in event BSPF.7
             bspfEventObjects8 1.3.6.1.4.1.2007.1.4.194.1.8
Event BSPF.8 Sent a reply to an ARP request asking for a spoofed configured address.
                 bspf8_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.8.1 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.8
                 bspf8_src_mac 1.3.6.1.4.1.2007.1.4.194.1.8.2 displaystring no-access
Parameter 'src-mac' in event BSPF.8
                 bspf8_dst_mac 1.3.6.1.4.1.2007.1.4.194.1.8.3 displaystring no-access
Parameter 'dst-mac' in event BSPF.8
                 bspf8_interface 1.3.6.1.4.1.2007.1.4.194.1.8.4 displaystring no-access
Parameter 'interface' in event BSPF.8
             bspfEventObjects9 1.3.6.1.4.1.2007.1.4.194.1.9
Event BSPF.9 A bridge must be defined before a spoofing ip address can be configured.
                 bspf9_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.9.1 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.9
                 bspf9_interface 1.3.6.1.4.1.2007.1.4.194.1.9.2 displaystring no-access
Parameter 'interface' in event BSPF.9
             bspfEventObjects10 1.3.6.1.4.1.2007.1.4.194.1.10
Event BSPF.10 There is no enough free memory to configure a new spoofing ip address.
                   bspf10_spoof_addr 1.3.6.1.4.1.2007.1.4.194.1.10.1 ipaddress no-access
Parameter 'spoof-addr' in event BSPF.10
                   bspf10_interface 1.3.6.1.4.1.2007.1.4.194.1.10.2 displaystring no-access
Parameter 'interface' in event BSPF.10
         bspfNotifications 1.3.6.1.4.1.2007.1.4.194.2
             bspfNotificationsPrefix 1.3.6.1.4.1.2007.1.4.194.2.0
                 bspfNotification1 1.3.6.1.4.1.2007.1.4.194.2.0.1
Notification of Event BSPF.1 Message: 'Packet from $1 port $2 to $3 port $4 protocol 0x$5, interface $6' Parameters list: $1: bspf1-src-mac $2: bspf1-src-port $3: bspf1-dst-mac $4: bspf1-dst-port $5: bspf1-protocol $6: bspf1-interface Bridge has detected an incoming packet whose destination matches a spoofed MAC address.
                 bspfNotification2 1.3.6.1.4.1.2007.1.4.194.2.0.2
Notification of Event BSPF.2 Message: 'Packet intercepted, spoofed address $1 protocol 0x$2, interface $3' Parameters list: $1: bspf2-spoof-addr $2: bspf2-protocol $3: bspf2-interface Bridge has intercepted an incoming packet destined for a spoofed MAC. If its protocol is IP, the destination ip address does not match the one spoofed. If it is ARP, the operation code must be request.
                 bspfNotification3 1.3.6.1.4.1.2007.1.4.194.2.0.3
Notification of Event BSPF.3 Message: 'New MAC $1 learned, spoofed address $2, interface $3' Parameters list: $1: bspf3-mac-addr $2: bspf3-spoof-addr $3: bspf3-interface The MAC address associated with a spoofed address has been updated.
                 bspfNotification4 1.3.6.1.4.1.2007.1.4.194.2.0.4
Notification of Event BSPF.4 Message: 'New port $1 learned, spoofed address $2, interface $3' Parameters list: $1: bspf4-port $2: bspf4-spoof-addr $3: bspf4-interface The port associated with a spoofed address has been updated.
                 bspfNotification5 1.3.6.1.4.1.2007.1.4.194.2.0.5
Notification of Event BSPF.5 Message: 'Discovering MAC and port associated with spoofed address $1, interface $2' Parameters list: $1: bspf5-spoof-addr $2: bspf5-interface Bridge-spoofing sends an ARP packet periodically requesting the MAC address associated with every spoofed address configured.
                 bspfNotification6 1.3.6.1.4.1.2007.1.4.194.2.0.6
Notification of Event BSPF.6 Message: 'Broadcasting new MAC $1 associated with spoofed address $2, interface $3' Parameters list: $1: bspf6-mac-addr $2: bspf6-spoof-addr $3: bspf6-interface Bridge-spoofing broadcasts an ARP gratuitous packet after changing the MAC address associated with a configured spoofed address.
                 bspfNotification7 1.3.6.1.4.1.2007.1.4.194.2.0.7
Notification of Event BSPF.7 Message: 'ARP request from MAC $1 for spoofed address $2, interface $3' Parameters list: $1: bspf7-mac-addr $2: bspf7-spoof-addr $3: bspf7-interface Received an ARP request packet asking for a spoofed configured address.
                 bspfNotification8 1.3.6.1.4.1.2007.1.4.194.2.0.8
Notification of Event BSPF.8 Message: 'ARP reply for address $1 is MAC $2, destination MAC $3, interface $4' Parameters list: $1: bspf8-spoof-addr $2: bspf8-src-mac $3: bspf8-dst-mac $4: bspf8-interface Sent a reply to an ARP request asking for a spoofed configured address.
                 bspfNotification9 1.3.6.1.4.1.2007.1.4.194.2.0.9
Notification of Event BSPF.9 Message: 'Error adding address $1, bridge must be enabled, interface $2' Parameters list: $1: bspf9-spoof-addr $2: bspf9-interface A bridge must be defined before a spoofing ip address can be configured.
                 bspfNotification10 1.3.6.1.4.1.2007.1.4.194.2.0.10
Notification of Event BSPF.10 Message: 'Error adding address $1, out of memory, interface $2' Parameters list: $1: bspf10-spoof-addr $2: bspf10-interface There is no enough free memory to configure a new spoofing ip address.