Wellfleet-WEP-MIB: View SNMP OID List / Download MIB

VENDOR: WELLFLEET


 Home MIB: Wellfleet-WEP-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 wfWepLineTable 1.3.6.1.4.1.18.3.4.28.1
The line table contains line entries.
     wfWepLineEntry 1.3.6.1.4.1.18.3.4.28.1.1
A line entry corresponds to a sync line.
         wfWepLineDelete 1.3.6.1.4.1.18.3.4.28.1.1.1
Indicates whether the instance has been created or deleted.
         wfWepLineDisable 1.3.6.1.4.1.18.3.4.28.1.1.2
Indicates whether the instance has been enabled or disabled.
         wfWepLineLineNumber 1.3.6.1.4.1.18.3.4.28.1.1.3
Indicates the line number of this line entry. This is part of the instance ID.
         wfWepLineLLIndex 1.3.6.1.4.1.18.3.4.28.1.1.4
Indicates the lower layer index of this line entry. This is part of the instance ID.
         wfWepLineCipherMode 1.3.6.1.4.1.18.3.4.28.1.1.5
Indicates the encryption mode. This is represented by the following bit mask values: DES 40-bit keys 0x20000000 DES 56-bit keys 0x10000000
         wfWepLineTekChangeByte 1.3.6.1.4.1.18.3.4.28.1.1.6
Frequency of traffic encryption key change, based upon number of bytes encrypted; in operation, this is effectively rounded up to the next full packet. Note that the key change rate is also influenced by time. The so-called best value will be dependent upon the algorithms that use the TEK; also, for a given algorithm the best value will change over time due to the progresses made in cryptanalysis. The strongest value of this or the corresponding circuit setting will be used.
         wfWepLineTekChangeTime 1.3.6.1.4.1.18.3.4.28.1.1.7
Frequency of traffic encryption key change, based upon number of seconds elapsed since last key change; in operation, this is effectively rounded up to the next full packet. Note that the key change rate is also influenced by number of bytes encrypted. The so-called best value will be dependent upon the algorithms that use the TEK; also, for a given algorithm the best value will change over time due to the progresses made in cryptanalysis. The strongest value of this or the corresponding circuit setting will be used. Units are seconds.
 wfWepCircuitTable 1.3.6.1.4.1.18.3.4.28.2
The circuit table contains circuit entries.
     wfWepCircuitEntry 1.3.6.1.4.1.18.3.4.28.2.1
A circuit entry corresponds to a circuit.
         wfWepCircuitDelete 1.3.6.1.4.1.18.3.4.28.2.1.1
Indicates whether the instance has been created or deleted.
         wfWepCircuitDisable 1.3.6.1.4.1.18.3.4.28.2.1.2
Indicates whether the instance has been enabled or disabled.
         wfWepCircuitId 1.3.6.1.4.1.18.3.4.28.2.1.3
Indicates the circuit ID of this entry.
         wfWepCircuitCipherMode 1.3.6.1.4.1.18.3.4.28.2.1.4
Indicates the encryption mode. This is represented by the following bit mask values: Inherit from line 0x40000000 DES 40-bit keys 0x20000000 DES 56-bit keys 0x10000000
         wfWepCircuitTekChangeByte 1.3.6.1.4.1.18.3.4.28.2.1.5
Frequency of traffic encryption key change, based upon number of bytes encrypted; in operation, this is effectively rounded up to the next full packet. Note that the key change rate is also influenced by time. The so-called best value will be dependent upon the algorithms that use the TEK; also, for a given algorithm the best value will change over time due to the progresses made in cryptanalysis. The strongest value of this or the corresponding line setting will be used.
         wfWepCircuitTekChangeTime 1.3.6.1.4.1.18.3.4.28.2.1.6
Frequency of traffic encryption key change, based upon number of seconds elapsed since last key change; in operation, this is effectively rounded up to the next full packet. Note that the key change rate is also influenced by number of bytes encrypted. The so-called best value will be dependent upon the algorithms that use the TEK; also, for a given algorithm the best value will change over time due to the progresses made in cryptanalysis. The strongest value of this or the corresponding line setting will be used. Units are seconds.
 wfWepVcTable 1.3.6.1.4.1.18.3.4.28.3
The VC table contains VC entries
     wfWepVcEntry 1.3.6.1.4.1.18.3.4.28.3.1
A VC entry corresponds to a logical connection of the WEP.
         wfWepVcLineNumber 1.3.6.1.4.1.18.3.4.28.3.1.1
Indicates the line number of this VC entry. This is part of the instance ID.
         wfWepVcLLIndex 1.3.6.1.4.1.18.3.4.28.3.1.2
Indicates the lower layer index of this VC entry. This is part of the instance ID.
         wfWepVcCircuitId 1.3.6.1.4.1.18.3.4.28.3.1.3
Indicates the circuit ID of this VC entry. This is part of the instance ID.
         wfWepVcId 1.3.6.1.4.1.18.3.4.28.3.1.4
Indicates the ID of this VC entry. This is part of the instance ID.
         wfWepVcConnectionState 1.3.6.1.4.1.18.3.4.28.3.1.5
Indicates the VC state of the WEP logical connection.
         wfWepVcCipherMode 1.3.6.1.4.1.18.3.4.28.3.1.6
Indicates the encryption mode. This is only valid in the up state. The values are: No algorithm yet 1 DES 40-bit keys 2 DES 56-bit keys 3
         wfWepVcTekChangeByte 1.3.6.1.4.1.18.3.4.28.3.1.7
Frequency of traffic encryption key change, based upon number of bytes encrypted; in operation, this is effectively rounded up to the next full packet. Note that the key change rate is also influenced by time. The so-called best value will be dependent upon the algorithms that use the TEK; also, for a given algorithm the best value will change over time due to the progresses made in cryptanalysis. This is the value used, which is the strongest value of the corresponding line or circuit setting.
         wfWepVcTekChangeTime 1.3.6.1.4.1.18.3.4.28.3.1.8
Frequency of traffic encryption key change, based upon number of bytes encrypted; in operation, this is effectively rounded up to the next full packet. Note that the key change rate is also influenced by time. The so-called best value will be dependent upon the algorithms that use the TEK; also, for a given algorithm the best value will change over time due to the progresses made in cryptanalysis. This is the value used, in units of seconds, which is the strongest value of the corresponding line or circuit setting.
         wfWepVcBadMACReceiveds 1.3.6.1.4.1.18.3.4.28.3.1.9
Indicates the number of received packets with an invalid MAC value, following decryption.
         wfWepVcBadCipherReceiveds 1.3.6.1.4.1.18.3.4.28.3.1.10
Indicates the number of received packets that failed decryption. This class of error usually involves invalid packet formats, etc.
         wfWepVcConnectionRetries 1.3.6.1.4.1.18.3.4.28.3.1.11
Indicates the number of timeouts which cause retransmission of a connect request. This error means the router peer is not responding.
         wfWepVcInvalidOpCodes 1.3.6.1.4.1.18.3.4.28.3.1.12
Indicates the number of supposed wep packets received with bad op-codes. This class of error usually involves invalid packet formats, etc.
         wfWepVcPacketsDroppedNotUp 1.3.6.1.4.1.18.3.4.28.3.1.13
Indicates the number of data packets dropped in the not-up state. This error means the wep connection is not up yet for some reason.
         wfWepVcPacketsDroppedBadN 1.3.6.1.4.1.18.3.4.28.3.1.14
Indicates the number of packets dropped for N-value mismatch. This error means the router peers are not N-time-synchronized.
         wfWepVcPacketsDroppedAuthenticator 1.3.6.1.4.1.18.3.4.28.3.1.15
Indicates the number of control packets dropped for bad authenticators. This class of error usually involves invalid packet formats, etc.
         wfWepVcBadAlgorithmValueReceiveds 1.3.6.1.4.1.18.3.4.28.3.1.16
Indicates the number of control packets dropped for a bad encryption algorithm value received. This class of error usually involves invalid packet formats, etc.
         wfWepVcAlgorithmNoGCDs 1.3.6.1.4.1.18.3.4.28.3.1.17
Indicates the number of control packets dropped when there is no encryption algorithm commonality between the 2 sides. This would usually be due to not choosing any common encryption algorithms for the two sides.
         wfWepVcAlgorithmMismatches 1.3.6.1.4.1.18.3.4.28.3.1.18
Indicates the number of control packets dropped because a matching algorithm was arbitrated in one direction and then a different algorithm was requested in the other direction. However, both sides should be agreeing to the same algorithm in both directions. This class of error usually involves invalid packet formats, etc.
         wfWepVcUnexpectedState 1.3.6.1.4.1.18.3.4.28.3.1.19
Indicates internal errors for an unexpected state.
         wfWepVcPacketsDroppedBadMinorSeq 1.3.6.1.4.1.18.3.4.28.3.1.20
Indicates the number of data packets dropped for minor sequence number mismatch. This error may indicate a replay attack.
         wfWepVcEncryptedBytes 1.3.6.1.4.1.18.3.4.28.3.1.21
Indicates the number of bytes encrypted.
         wfWepVcDecryptedBytes 1.3.6.1.4.1.18.3.4.28.3.1.22
Indicates the number of bytes decrypted.
 wfFrVCircuitLETable 1.3.6.1.4.1.18.3.4.28.4
Frame Relay Circuit link encryption table gives attributs for the link encryption for virtual circuits.
     wfFrVCircuitLEEntry 1.3.6.1.4.1.18.3.4.28.4.1
An entry in the Frame Relay Circuit table. An instance exists only if a corresponding wfFrVCircuitEntry exists (e.g. for that same VC).
         wfFrCircuitLEDelete 1.3.6.1.4.1.18.3.4.28.4.1.1
Create/delete parameter
         wfFrCircuitLEDisable 1.3.6.1.4.1.18.3.4.28.4.1.2
Enable/disable link encryption on this VC
         wfFrCircuitLELineNumber 1.3.6.1.4.1.18.3.4.28.4.1.3
Instance identifier. This is the line number on which the associated Frame Relay interface resides.
         wfFrCircuitLELLIndex 1.3.6.1.4.1.18.3.4.28.4.1.4
The Lower layer index uniquely identifies the lower layer in cases where the lower layer may be something other than the physical layer. For example if Frame Relay is running over an ATM VC, the LLIndex identifies the ATM VC.
         wfFrCircuitLECircuitNumber 1.3.6.1.4.1.18.3.4.28.4.1.5
The circuit number of this interface.
         wfFrCircuitLEDlci 1.3.6.1.4.1.18.3.4.28.4.1.6
One of three instance identifier. This is the Frame Relay address of the virtual circuit.
         wfFrCircuitLEState 1.3.6.1.4.1.18.3.4.28.4.1.7
Indicates the state of the particular virtual circuit.
         wfFrCircuitLELtsSecret 1.3.6.1.4.1.18.3.4.28.4.1.8
Long-term shared secret, used to generate a series of key encryption keys for use during the connection. This value contained in the MIB is itself encrypted under the routers Node Protection Key, and includes a cryptographic MAC to verify successful decryption.
         wfFrCircuitLEMekChangeRate 1.3.6.1.4.1.18.3.4.28.4.1.9
The rate of change of the n counter in minutes, used in generating the current master encryption key Kijn.
 wfPppCircuitLETable 1.3.6.1.4.1.18.3.4.28.5
The Wellfleet PPP Circuit Link Encryption Configuration Table contains attributes for the link encryption mechanism.
     wfPppCircuitLEEntry 1.3.6.1.4.1.18.3.4.28.5.1
Per Wellfleet circuit PPP link encryption configuration parameters and counters. An instance exists only if a corresponding wfPPPCircuitEntry exists (e.g. for that same circuit).
         wfPppCircuitLEDelete 1.3.6.1.4.1.18.3.4.28.5.1.1
Create/Delete parameter
         wfPppCircuitLEDisable 1.3.6.1.4.1.18.3.4.28.5.1.2
Enable/disable link encryption on this circuit.
         wfPppCircuitLEState 1.3.6.1.4.1.18.3.4.28.5.1.3
PPP link encryption state variable, Not Present, Init, Down, Up
         wfPppCircuitLECircuitID 1.3.6.1.4.1.18.3.4.28.5.1.4
cct number for this instance
         wfPppCircuitLELtsSecret 1.3.6.1.4.1.18.3.4.28.5.1.5
Long-term shared secret, used to generate a series of key encryption keys for use during the connection. This value contained in the MIB is itself encrypted under the routers Node Protection Key, and includes a cryptographic MAC to verify successful decryption.
         wfPppCircuitLEMekChangeRate 1.3.6.1.4.1.18.3.4.28.5.1.6
The rate of change of the n counter in minutes, used in generating the current master encryption key Kijn.