G6-DHCP-MIB Table View
Table-centric layout grouping table, row, and column objects.
Tables
8
Rows
8
Columns
45
relayConfigTable
table.1.3.6.1.4.1.3181.10.6.2.49.7
·
1 row entry
·
5 columns
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
Indexes
relayConfigIndex
| Column | Syntax | OID | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
relayConfigIndex
Automatically generated
|
Integer32 Constraints: range: 0-0 |
.1.3.6.1.4.1.3181.10.6.2.49.7.1.1 |
||||||||||
|
relayConfigDhcpServerAddress
Defines host address or network address where the dhcp server(s) resides. Also known as ip_helper_address.
|
SNMPv2-TCDisplayStringr/w Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.3181.10.6.2.49.7.1.2 |
||||||||||
|
relayConfigRemoteIdSource
Defines how the switch is identified when DHCP option 82 is used. (Suboption2)
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.7.1.3 |
||||||||||
|
relayConfigCustomRemoteId
This remote id is used for option 82 when 'remote_id_source' is set to USER_DEFINED.
|
SNMPv2-TCDisplayStringr/w Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.3181.10.6.2.49.7.1.4 |
||||||||||
|
relayConfigCircuitIdSource
Defines how the ports are identified when option 82 is used. (Suboption1)
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.7.1.5 |
relayPortConfigTable
table.1.3.6.1.4.1.3181.10.6.2.49.8
·
1 row entry
·
3 columns
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
Indexes
relayPortConfigPortIndex
| Column | Syntax | OID | ||||
|---|---|---|---|---|---|---|
|
relayPortConfigPortIndex
Automatically generated
|
Integer32 Constraints: range: 0-31 |
.1.3.6.1.4.1.3181.10.6.2.49.8.1.1 |
||||
|
relayPortConfigEnableDhcpRelay
When enabled incoming DHCP requests are redirected to the dhcp server or network specified in 'dhcp.relay_config'
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.8.1.2 |
||||
|
relayPortConfigEnableOption82
When enabled incoming DHCP requests are modified in 'dhcp.relay_config'
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.8.1.3 |
snoopingPortConfigTable
table.1.3.6.1.4.1.3181.10.6.2.49.9
·
1 row entry
·
8 columns
This configures the DHCP snooping function. DHCP snooping acts like a DHCP firewall between access and link ports. When enabled it ensures that for untrusted ports only DHCP requests are accepted. This prevents malicious users from injecting fake DHCP frames and thus invalid IP addresses.
Indexes
snoopingPortConfigPortIndex
| Column | Syntax | OID | ||||||
|---|---|---|---|---|---|---|---|---|
|
snoopingPortConfigPortIndex
Automatically generated
|
Integer32 Constraints: range: 0-31 |
.1.3.6.1.4.1.3181.10.6.2.49.9.1.1 |
||||||
|
snoopingPortConfigEnableDhcpSnooping
This enables the DHCP snooping function per port.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.9.1.2 |
||||||
|
snoopingPortConfigDhcpFiltering
DHCP filtering prevents DHCP responses being injected from a local access port. It acts like a DHCP firewall between access and link ports.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.9.1.3 |
||||||
|
snoopingPortConfigSnoopingTrust
DHCP responses are only accepted when they ingress on a trusted port. Typically these are the link ports. AUTO uses the port role and declares all up or downlink ports as trusted.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.9.1.4 |
||||||
|
snoopingPortConfigAcceptIngressOption82
Normally incoming DHCP request incoming with Option 82 set will be discarded. When enabled then this check is ignored.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.9.1.5 |
||||||
|
snoopingPortConfigMacAddressVerification
When a packet is received on an untrusted interface, and the source MAC address and the DHCP client MAC address do not match and this feature is enabled, the packet is dropped.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.9.1.6 |
||||||
|
snoopingPortConfigDhcpRateLimiting
Defines how many DHCP request are accepted per second. When the limit is reached, DHCP flooding is assumed and the port is blocked. The value 0 disables the rate limit check.
|
Integer32r/w Constraints: range: 0-255 |
.1.3.6.1.4.1.3181.10.6.2.49.9.1.7 |
||||||
|
snoopingPortConfigClearSnoopingStatistics
Reset all DHCP related statistics and reason. The snooping binding table is not affected.
|
SNMPv2-TCDisplayStringr/w Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.3181.10.6.2.49.9.1.8 |
pppoeConfigTable
table.1.3.6.1.4.1.3181.10.6.2.49.10
·
1 row entry
·
5 columns
This table defines the general parameter for PPPoE Intermediate Agent feature.
Indexes
pppoeConfigIndex
| Column | Syntax | OID | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
pppoeConfigIndex
Automatically generated
|
Integer32 Constraints: range: 0-0 |
.1.3.6.1.4.1.3181.10.6.2.49.10.1.1 |
||||||||||
|
pppoeConfigVendorId
Vendor identification that this device adds to a PPPoE request before forwarding it to the server.
|
SNMPv2-SMIUnsigned32r/w Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32Type Constraints: range: 0..4294967295 |
.1.3.6.1.4.1.3181.10.6.2.49.10.1.2 |
||||||||||
|
pppoeConfigRemoteIdSource
The remote id identifies the client that requests a PPPoE connection.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.10.1.3 |
||||||||||
|
pppoeConfigCustomRemoteId
This field is only used in a PPPoE request when the remote_id_source is set to USER_DEFINED.
|
SNMPv2-TCDisplayStringr/w Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.3181.10.6.2.49.10.1.4 |
||||||||||
|
pppoeConfigCircuitIdSource
This field defines how the port on which a PPPoE request comes in is identified.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.10.1.5 |
pppoePortConfigTable
table.1.3.6.1.4.1.3181.10.6.2.49.11
·
1 row entry
·
2 columns
This table permits port specific enable of the PPPoE Intermediate Agent feature.
Indexes
pppoePortConfigPortIndex
| Column | Syntax | OID | ||||
|---|---|---|---|---|---|---|
|
pppoePortConfigPortIndex
Automatically generated
|
Integer32 Constraints: range: 0-31 |
.1.3.6.1.4.1.3181.10.6.2.49.11.1.1 |
||||
|
pppoePortConfigEnablePppoeSnooping
Enables PPPoE intermediate agent function also known as PPPoE Snooping for this port. Also observe the general enable parameter for PPPoE.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.11.1.2 |
.1.3.6.1.4.1.3181.10.6.2.49.12
·
1 row entry
·
9 columns
This table defines the parameter for Dynamic ARP Inspection per port. These features should generally be used with untrusted ports.
Indexes
arpInspectionPortConfigPortIndex
| Column | Syntax | OID | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
|
arpInspectionPortConfigPortIndex
Automatically generated
|
Integer32 Constraints: range: 0-31 |
.1.3.6.1.4.1.3181.10.6.2.49.12.1.1 |
||||||||
|
arpInspectionPortConfigEnableArpInspection
Generally enables Dynamic ARP Inspection. The details need to be configured per VLAN in separate table. This feature helps preventing from man-in-the-middle attacks to the network.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.12.1.2 |
||||||||
|
arpInspectionPortConfigArpRateLimiting
Defines how many ARP request are accepted per second. When the limit is reached, a DOS attack is assumed and the port is shut down. The value 0 disables the rate limit check.
|
Integer32r/w Constraints: range: 0-255 |
.1.3.6.1.4.1.3181.10.6.2.49.12.1.3 |
||||||||
|
arpInspectionPortConfigInspectionDatabase
When set to another value than NONE, the MAC-IP relationship of the incoming ARPs is verified against the selected table. This ensures that only valid MACs enter the network.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.12.1.4 |
||||||||
|
arpInspectionPortConfigArpAclName
Name of the ACL (access control list) which declares which IP/MAC relations are acceptible. Note: ACLs are configured under Management.ACL. Several ACL may be specified with a comma separated list. Example acl1, otherli…
|
SNMPv2-TCDisplayStringr/w Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.3181.10.6.2.49.12.1.5 |
||||||||
|
arpInspectionPortConfigAclDefaultLogic
Defines which action is taken when none of the ACL records matches. Default is deny which blocks the ARP.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.12.1.6 |
||||||||
|
arpInspectionPortConfigSourceMacValidation
Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. Packets with different MAC addresses are dropped.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.12.1.7 |
||||||||
|
arpInspectionPortConfigDestMacValidation
Checks the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. Packets with different MAC addresses are dropped.
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.12.1.8 |
||||||||
|
arpInspectionPortConfigIpRangeValidation
Checks ARP for invalid addresses. Invalid addresses include 0.0.0.0, 255.255.255.255, and all IP multicast and loopback addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP address…
|
Enumerationr/w Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.12.1.9 |
snoopingStatisticsTable
table.1.3.6.1.4.1.3181.10.6.2.49.100
·
1 row entry
·
5 columns
Statistics indicating activity of DHCP snooping.
Indexes
snoopingStatisticsPortIndex
| Column | Syntax | OID | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
snoopingStatisticsPortIndex
Automatically generated
|
Integer32 Constraints: range: 0-31 |
.1.3.6.1.4.1.3181.10.6.2.49.100.1.1 |
||||||||||||
|
snoopingStatisticsTrustMode
Reflects the determined trust mode.
|
Enumeration Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.100.1.2 |
||||||||||||
|
snoopingStatisticsNumberOfDhcpProcessed
Counts the number of dhcp messages processed.
|
SNMPv2-SMIUnsigned32 Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32Type Constraints: range: 0..4294967295 |
.1.3.6.1.4.1.3181.10.6.2.49.100.1.3 |
||||||||||||
|
snoopingStatisticsNumberOfDhcpDropped
Counts the number of dhcp messages dropped.
|
SNMPv2-SMIUnsigned32 Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32Type Constraints: range: 0..4294967295 |
.1.3.6.1.4.1.3181.10.6.2.49.100.1.4 |
||||||||||||
| snoopingStatisticsLastDropReason | Enumeration Enumerated Values:
|
.1.3.6.1.4.1.3181.10.6.2.49.100.1.5 |
snoopingTableTable
table.1.3.6.1.4.1.3181.10.6.2.49.101
·
1 row entry
·
8 columns
This table lists the MAC-IP bindings of the untrusted ports (only) as discovered through DHCP snooping.
Indexes
snoopingTableIndex
| Column | Syntax | OID |
|---|---|---|
|
snoopingTableIndex
Automatically generated
|
Integer32 Constraints: range: 0-255 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.1 |
|
snoopingTableMac
MAC address entry
|
SNMPv2-TCMacAddress Textual Convention: SNMPv2-TCMacAddress OctetStringType Constraints: range: 6 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.2 |
|
snoopingTableIp
IP address associated with this MAC.
|
OctetString Constraints: range: 0-20 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.3 |
|
snoopingTablePort
Port number for MAC address
|
Integer32 Constraints: range: 0-65535 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.4 |
|
snoopingTableVlan
if non zero this MAC is part of this VLAN.
|
Integer32 Constraints: range: 0-65535 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.5 |
|
snoopingTableLastUpdated
Time stamp when this record was written
|
SNMPv2-TCDisplayString Textual Convention: SNMPv2-TCDisplayString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.6 |
|
snoopingTableLastUpdatedEpoch
Time stamp in alternate format
|
SNMPv2-SMIUnsigned32 Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32Type Constraints: range: 0..4294967295 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.7 |
|
snoopingTableLeaseTime
Lease time as reported by DHCP server
|
SNMPv2-SMICounter32 Textual Convention: SNMPv2-SMICounter32 Unsigned32Type Constraints: range: 0..4294967295 |
.1.3.6.1.4.1.3181.10.6.2.49.101.1.8 |