DLINK-3100-SSH-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
8
Rows
8
Columns
35
.1.3.6.1.4.1.171.10.94.89.89.78.2.1 · 1 row entry · 3 columns
This table contains the router's public key.  Each row in this table
contains a fragment of the key, in printable binhex format.  There may
be up to 160 characters in every fragment, and they are all combined
to form one key.  The key is generated by writing to
rlSshServerRegenerateHostKey.  To cause clients to connect to this router
without printing warning messages (and also prevent active
man-in-the-middle), the router's public key must printed out and inserted
into the client's authorized_keys file
rlSshServerHostPublicKeyTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.2.1.1
The row definition for this table.
Indexes
rlSshServerHostPublicKeyAlgorithm rlSshServerHostPublicKeyFragmentId
Column Syntax OID
rlSshServerHostPublicKeyAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.171.10.94.89.89.78.2.1.1.1
rlSshServerHostPublicKeyFragmentId
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.171.10.94.89.89.78.2.1.1.2
rlSshServerHostPublicKeyFragmentText
A part of the readable text entry for the server's public authorzation key.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.1.1.3
.1.3.6.1.4.1.171.10.94.89.89.78.2.2 · 1 row entry · 3 columns
This table contains the fingerprint for the router's public key.
rlSshServerHostPublicKeyFingerprintTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.2.2.1
The row definition for this table.
Indexes
rlSshServerHostPublicKeyFingerprintAlgorithm rlSshServerHostPublicKeyFingerprintDigestFormat
Column Syntax OID
rlSshServerHostPublicKeyFingerprintAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.171.10.94.89.89.78.2.2.1.1
rlSshServerHostPublicKeyFingerprintDigestFormat
Format of the digest to be displayed (OpenSSH or SSH.com).
RlSshPublicKeyDigestFormat
Textual Convention: RlSshPublicKeyDigestFormat Enumeration
Type Values:
0hex
1bubbleBabble
.1.3.6.1.4.1.171.10.94.89.89.78.2.2.1.2
rlSshServerHostPublicKeyFingerprint
SECSH format fingerprint of the server's public key. To prevent man in
the middle attacks, users should make sure the ssh Server's fingerprint,
as printed in the connection process, is similar to the one printed here.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.2.1.3
.1.3.6.1.4.1.171.10.94.89.89.78.2.3 · 1 row entry · 4 columns
This table contains public keys for all users who are authorized to access
the router.  For a user to be able to log in using SSH, the user name must
appear in this table, and the user's public key must match the one found
here.
rlSshServerAuthorizedUsersPublicKeyTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.2.3.1
The row definition for this table.
Indexes
rlSshServerAuthorizedUserName rlSshServerAuthorizedUserPublicKeyFragmentId
Column Syntax OID
rlSshServerAuthorizedUserName
Name of the user who owns this public key. Both the user name and the
key bytes must match before a user is authenticated using this key.
OctetStringr/w
Constraints:
range: 1-48
.1.3.6.1.4.1.171.10.94.89.89.78.2.3.1.1
rlSshServerAuthorizedUserPublicKeyFragmentId
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key.
SNMPv2-SMIUnsigned32r/w
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.171.10.94.89.89.78.2.3.1.2
rlSshServerAuthorizedUserPublicKeyFragmentText
A part of the readable text entry for the user's public authorzation key.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.3.1.3
rlSshServerAuthorizedUserPublicKeyFragmentStatus
Create or delete a fragment of the user's public key.
A user is deleted if it has no remaining fragments.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.171.10.94.89.89.78.2.3.1.4
.1.3.6.1.4.1.171.10.94.89.89.78.2.5 · 1 row entry · 4 columns
This table contains the fingerprints of the public keys for all users who
are authorized to access the router.
To prevent man in the middle attacks, users should make sure the
user's fingerprint, as printed in the connection process, is similar
to the one printed here.
rlSshServerAuthorizedUsersPublicKeyFingerprintTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.2.5.1
The row definition for this table.
Indexes
rlSshServerAuthorizedUserFingerprintName rlSshServerAuthorizedUserPublicKeyFingerprintDigestFormat
Column Syntax OID
rlSshServerAuthorizedUserFingerprintName
Name of the user who owns this public key. Both the user name and the
key bytes must match before a user is authenticated using this key.
OctetStringr/w
Constraints:
range: 1-48
.1.3.6.1.4.1.171.10.94.89.89.78.2.5.1.1
rlSshServerAuthorizedUserPublicKeyFingerprintAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.171.10.94.89.89.78.2.5.1.2
rlSshServerAuthorizedUserPublicKeyFingerprintDigestFormat
Format of the digest to be displayed (OpenSSH or SSH.com).
RlSshPublicKeyDigestFormat
Textual Convention: RlSshPublicKeyDigestFormat Enumeration
Type Values:
0hex
1bubbleBabble
.1.3.6.1.4.1.171.10.94.89.89.78.2.5.1.3
rlSshServerAuthorizedUserPublicKeyFingerprint
SECSH format fingerprint of the user's public key. To prevent man in
the middle attacks, users should make sure their ssh fingerprint,
as printed in the connection process, is similar to the one printed here.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.5.1.4
.1.3.6.1.4.1.171.10.94.89.89.78.2.6 · 1 row entry · 7 columns
Each row in this table corresponds to an active SSH session with
the server
rlSshServerSessionTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.2.6.1
The row definition for this table.
Indexes
rlSshServerSessionIdentifier
Column Syntax OID
rlSshServerSessionIdentifier
Identifies the connection to which this row corresponds.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.171.10.94.89.89.78.2.6.1.1
rlSshServerSessionPeerAddress
The network address of the remote host connected to the server.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.1.3.6.1.4.1.171.10.94.89.89.78.2.6.1.2
rlSshServerSessionPeerPort
The source network port of the remote host connected to the server.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.171.10.94.89.89.78.2.6.1.3
rlSshServerSessionPeerVersion
The client version of the remote host connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.6.1.4
rlSshServerSessionUsername
SSH authenticated name of user connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.6.1.5
rlSshServerSessionCipher
Data encryption cipher used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.6.1.6
rlSshServerSessionHMAC
Message authentication code used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.6.1.7
.1.3.6.1.4.1.171.10.94.89.89.78.2.7 · 1 row entry · 8 columns
Each row in this table corresponds to an active SSH session with the server
rlSshServerSessionInetTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.2.7.1
The row definition for this table.
Indexes
rlSshServerSessionInetIdentifier
Column Syntax OID
rlSshServerSessionInetIdentifier
Identifies the connection to which this row corresponds.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.1
rlSshServerSessionInetPeerAddressType
The network address of the remote host connected to the server.
INET-ADDRESS-MIBInetAddressType
Textual Convention: INET-ADDRESS-MIBInetAddressType Enumeration
Type Values:
0unknown
1ipv4
2ipv6
3ipv4z
4ipv6z
16dns
25l2vpn
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.2
rlSshServerSessionInetPeerAddress
The network address of the remote host connected to the server.
INET-ADDRESS-MIBInetAddress
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.3
rlSshServerSessionInetPeerPort
The source network port of the remote host connected to the server.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.4
rlSshServerSessionInetPeerVersion
The client version of the remote host connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.5
rlSshServerSessionInetUsername
SSH authenticated name of user connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.6
rlSshServerSessionInetCipher
Data encryption cipher used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.7
rlSshServerSessionInetHMAC
Message authentication code used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.2.7.1.8
.1.3.6.1.4.1.171.10.94.89.89.78.3.3 · 1 row entry · 3 columns
This table contains the router's client self public key.  Each row in
this table contains a fragment of the key, in printable binhex format.
There may be up to 160 characters in every fragment, and they are all
combined to form one key.  The key is generated by writing to
rlSshClientRegenerateSelfKey.  To cause clients to connect to this router
without printing warning messages (and also prevent active
man-in-the-middle), the router's public key must printed out and
inserted into the client's authorized_keys file
rlSshClientSelfPublicKeyTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.3.3.1
The row definition for this table.
Indexes
rlSshClientSelfPublicKeyAlgorithm rlSshClientSelfPublicKeyFragmentId
Column Syntax OID
rlSshClientSelfPublicKeyFragmentId
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.171.10.94.89.89.78.3.3.1.1
rlSshClientSelfPublicKeyAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.171.10.94.89.89.78.3.3.1.2
rlSshClientSelfPublicKeyFragmentText
A part of the readable text entry for the router's client public
authorization key.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.3.3.1.3
.1.3.6.1.4.1.171.10.94.89.89.78.3.4 · 1 row entry · 3 columns
This table contains the fingerprint for the client's self key.
rlSshClientSelfPublicKeyFingerprintTableEntry entry .1.3.6.1.4.1.171.10.94.89.89.78.3.4.1
The row definition for this table.
Indexes
rlSshClientSelfPublicKeyFingerprintAlgorithm rlSshClientSelfPublicKeyFingerprintDigestFormat
Column Syntax OID
rlSshClientSelfPublicKeyFingerprintAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.171.10.94.89.89.78.3.4.1.1
rlSshClientSelfPublicKeyFingerprintDigestFormat
Format of the digest to be displayed (OpenSSH or SSH.com).
RlSshPublicKeyDigestFormat
Textual Convention: RlSshPublicKeyDigestFormat Enumeration
Type Values:
0hex
1bubbleBabble
.1.3.6.1.4.1.171.10.94.89.89.78.3.4.1.2
rlSshClientSelfPublicKeyFingerprint
SECSH format fingerprint of the client's self key. To prevent man in
the middle attacks, users should make sure the ssh Server's fingerprint,
as printed in the connection process, is similar to the one printed here.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.171.10.94.89.89.78.3.4.1.3