G6-DHCP-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
8
Rows
8
Columns
45
.1.3.6.1.4.1.3181.10.6.2.49.7 · 1 row entry · 5 columns
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
relayConfigEntry entry .1.3.6.1.4.1.3181.10.6.2.49.7.1
Indexes
relayConfigIndex
Column Syntax OID
relayConfigIndex
Automatically generated
Integer32
Constraints:
range: 0-0
.1.3.6.1.4.1.3181.10.6.2.49.7.1.1
relayConfigDhcpServerAddress
Defines host address or network address where the dhcp server(s) resides. Also known as ip_helper_address.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.3181.10.6.2.49.7.1.2
relayConfigRemoteIdSource
Defines how the switch is identified when DHCP option 82 is used. (Suboption2)
Enumerationr/w
Enumerated Values:
0hostname
1macAddress
2sysName
3userDefined
4portAlias
.1.3.6.1.4.1.3181.10.6.2.49.7.1.3
relayConfigCustomRemoteId
This remote id is used for option 82 when 'remote_id_source' is set to USER_DEFINED.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.3181.10.6.2.49.7.1.4
relayConfigCircuitIdSource
Defines how the ports are identified when option 82 is used. (Suboption1)
Enumerationr/w
Enumerated Values:
0snmpPortId
1slotPortId
2portAlias
3ipSlotPortVlan
.1.3.6.1.4.1.3181.10.6.2.49.7.1.5
.1.3.6.1.4.1.3181.10.6.2.49.8 · 1 row entry · 3 columns
This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor.
relayPortConfigEntry entry .1.3.6.1.4.1.3181.10.6.2.49.8.1
Indexes
relayPortConfigPortIndex
Column Syntax OID
relayPortConfigPortIndex
Automatically generated
Integer32
Constraints:
range: 0-31
.1.3.6.1.4.1.3181.10.6.2.49.8.1.1
relayPortConfigEnableDhcpRelay
When enabled incoming DHCP requests are redirected to the dhcp server or network specified in 'dhcp.relay_config'
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.8.1.2
relayPortConfigEnableOption82
When enabled incoming DHCP requests are modified in 'dhcp.relay_config'
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.8.1.3
.1.3.6.1.4.1.3181.10.6.2.49.9 · 1 row entry · 8 columns
This configures the DHCP snooping function. DHCP snooping acts like a DHCP firewall between access and link ports. When enabled it ensures that for untrusted ports only DHCP requests are accepted. This prevents malicious users from injecting fake DHCP frames and thus invalid IP addresses.
snoopingPortConfigEntry entry .1.3.6.1.4.1.3181.10.6.2.49.9.1
Indexes
snoopingPortConfigPortIndex
Column Syntax OID
snoopingPortConfigPortIndex
Automatically generated
Integer32
Constraints:
range: 0-31
.1.3.6.1.4.1.3181.10.6.2.49.9.1.1
snoopingPortConfigEnableDhcpSnooping
This enables the DHCP snooping function per port.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.9.1.2
snoopingPortConfigDhcpFiltering
DHCP filtering prevents DHCP responses being injected from a local access port. It acts like a DHCP firewall between access and link ports.
Enumerationr/w
Enumerated Values:
0disabled
1dropAndEvent
2blockAndEvent
.1.3.6.1.4.1.3181.10.6.2.49.9.1.3
snoopingPortConfigSnoopingTrust
DHCP responses are only accepted when they ingress on a trusted port. Typically these are the link ports. AUTO uses the port role and declares all up or downlink ports as trusted.
Enumerationr/w
Enumerated Values:
0auto
1untrusted
2trusted
.1.3.6.1.4.1.3181.10.6.2.49.9.1.4
snoopingPortConfigAcceptIngressOption82
Normally incoming DHCP request incoming with Option 82 set will be discarded. When enabled then this check is ignored.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.9.1.5
snoopingPortConfigMacAddressVerification
When a packet is received on an untrusted interface, and the source MAC address and the DHCP client MAC address do not match and this feature is enabled, the packet is dropped.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.9.1.6
snoopingPortConfigDhcpRateLimiting
Defines how many DHCP request are accepted per second. When the limit is reached, DHCP flooding is assumed and the port is blocked. The value 0 disables the rate limit check.
Integer32r/w
Constraints:
range: 0-255
.1.3.6.1.4.1.3181.10.6.2.49.9.1.7
snoopingPortConfigClearSnoopingStatistics
Reset all DHCP related statistics and reason. The snooping binding table is not affected.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.3181.10.6.2.49.9.1.8
.1.3.6.1.4.1.3181.10.6.2.49.10 · 1 row entry · 5 columns
This table defines the general parameter for PPPoE Intermediate Agent feature.
pppoeConfigEntry entry .1.3.6.1.4.1.3181.10.6.2.49.10.1
Indexes
pppoeConfigIndex
Column Syntax OID
pppoeConfigIndex
Automatically generated
Integer32
Constraints:
range: 0-0
.1.3.6.1.4.1.3181.10.6.2.49.10.1.1
pppoeConfigVendorId
Vendor identification that this device adds to a PPPoE request before forwarding it to the server.
SNMPv2-SMIUnsigned32r/w
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.3181.10.6.2.49.10.1.2
pppoeConfigRemoteIdSource
The remote id identifies the client that requests a PPPoE connection.
Enumerationr/w
Enumerated Values:
0hostname
1macAddress
2sysName
3userDefined
4portAlias
.1.3.6.1.4.1.3181.10.6.2.49.10.1.3
pppoeConfigCustomRemoteId
This field is only used in a PPPoE request when the remote_id_source is set to USER_DEFINED.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.3181.10.6.2.49.10.1.4
pppoeConfigCircuitIdSource
This field defines how the port on which a PPPoE request comes in is identified.
Enumerationr/w
Enumerated Values:
0snmpPortId
1slotPortId
2portAlias
3ipSlotPortVlan
.1.3.6.1.4.1.3181.10.6.2.49.10.1.5
.1.3.6.1.4.1.3181.10.6.2.49.11 · 1 row entry · 2 columns
This table permits port specific enable of the PPPoE Intermediate Agent feature.
pppoePortConfigEntry entry .1.3.6.1.4.1.3181.10.6.2.49.11.1
Indexes
pppoePortConfigPortIndex
Column Syntax OID
pppoePortConfigPortIndex
Automatically generated
Integer32
Constraints:
range: 0-31
.1.3.6.1.4.1.3181.10.6.2.49.11.1.1
pppoePortConfigEnablePppoeSnooping
Enables PPPoE intermediate agent function also known as PPPoE Snooping for this port. Also observe the general enable parameter for PPPoE.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.11.1.2
.1.3.6.1.4.1.3181.10.6.2.49.12 · 1 row entry · 9 columns
This table defines the parameter for Dynamic ARP Inspection per port. These features should generally be used with untrusted ports.
arpInspectionPortConfigEntry entry .1.3.6.1.4.1.3181.10.6.2.49.12.1
Indexes
arpInspectionPortConfigPortIndex
Column Syntax OID
arpInspectionPortConfigPortIndex
Automatically generated
Integer32
Constraints:
range: 0-31
.1.3.6.1.4.1.3181.10.6.2.49.12.1.1
arpInspectionPortConfigEnableArpInspection
Generally enables Dynamic ARP Inspection. The details need to be configured per VLAN in separate table. This feature helps preventing from man-in-the-middle attacks to the network.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.12.1.2
arpInspectionPortConfigArpRateLimiting
Defines how many ARP request are accepted per second. When the limit is reached, a DOS attack is assumed and the port is shut down. The value 0 disables the rate limit check.
Integer32r/w
Constraints:
range: 0-255
.1.3.6.1.4.1.3181.10.6.2.49.12.1.3
arpInspectionPortConfigInspectionDatabase
When set to another value than NONE, the MAC-IP relationship of the incoming ARPs is verified against the selected table. This ensures that only valid MACs enter the network.
Enumerationr/w
Enumerated Values:
0none
1dhcp
2arpAcl
3both
.1.3.6.1.4.1.3181.10.6.2.49.12.1.4
arpInspectionPortConfigArpAclName
Name of the ACL (access control list) which declares which IP/MAC relations are acceptible. Note: ACLs are configured under Management.ACL. Several ACL may be specified with a comma separated list. Example acl1, otherli…
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.3181.10.6.2.49.12.1.5
arpInspectionPortConfigAclDefaultLogic
Defines which action is taken when none of the ACL records matches. Default is deny which blocks the ARP.
Enumerationr/w
Enumerated Values:
0deny
1permit
.1.3.6.1.4.1.3181.10.6.2.49.12.1.6
arpInspectionPortConfigSourceMacValidation
Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. Packets with different MAC addresses are dropped.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.12.1.7
arpInspectionPortConfigDestMacValidation
Checks the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. Packets with different MAC addresses are dropped.
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.12.1.8
arpInspectionPortConfigIpRangeValidation
Checks ARP for invalid addresses. Invalid addresses include 0.0.0.0, 255.255.255.255, and all IP multicast and loopback addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP address…
Enumerationr/w
Enumerated Values:
0disabled
1enabled
.1.3.6.1.4.1.3181.10.6.2.49.12.1.9
.1.3.6.1.4.1.3181.10.6.2.49.100 · 1 row entry · 5 columns
Statistics indicating activity of DHCP snooping.
snoopingStatisticsEntry entry .1.3.6.1.4.1.3181.10.6.2.49.100.1
Indexes
snoopingStatisticsPortIndex
Column Syntax OID
snoopingStatisticsPortIndex
Automatically generated
Integer32
Constraints:
range: 0-31
.1.3.6.1.4.1.3181.10.6.2.49.100.1.1
snoopingStatisticsTrustMode
Reflects the determined trust mode.
Enumeration
Enumerated Values:
0undecided
1untrusted
2trusted
.1.3.6.1.4.1.3181.10.6.2.49.100.1.2
snoopingStatisticsNumberOfDhcpProcessed
Counts the number of dhcp messages processed.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.3181.10.6.2.49.100.1.3
snoopingStatisticsNumberOfDhcpDropped
Counts the number of dhcp messages dropped.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.3181.10.6.2.49.100.1.4
snoopingStatisticsLastDropReason Enumeration
Enumerated Values:
0ok
1illegalDhcpServer
2dhcpServerSpoofed
3illegalRelayAgent
4bindingMismatch
5flooding
.1.3.6.1.4.1.3181.10.6.2.49.100.1.5
.1.3.6.1.4.1.3181.10.6.2.49.101 · 1 row entry · 8 columns
This table lists the MAC-IP bindings of the untrusted ports (only) as discovered through DHCP snooping.
snoopingTableEntry entry .1.3.6.1.4.1.3181.10.6.2.49.101.1
Indexes
snoopingTableIndex
Column Syntax OID
snoopingTableIndex
Automatically generated
Integer32
Constraints:
range: 0-255
.1.3.6.1.4.1.3181.10.6.2.49.101.1.1
snoopingTableMac
MAC address entry
SNMPv2-TCMacAddress
Textual Convention: SNMPv2-TCMacAddress OctetString
Type Constraints:
range: 6
.1.3.6.1.4.1.3181.10.6.2.49.101.1.2
snoopingTableIp
IP address associated with this MAC.
OctetString
Constraints:
range: 0-20
.1.3.6.1.4.1.3181.10.6.2.49.101.1.3
snoopingTablePort
Port number for MAC address
Integer32
Constraints:
range: 0-65535
.1.3.6.1.4.1.3181.10.6.2.49.101.1.4
snoopingTableVlan
if non zero this MAC is part of this VLAN.
Integer32
Constraints:
range: 0-65535
.1.3.6.1.4.1.3181.10.6.2.49.101.1.5
snoopingTableLastUpdated
Time stamp when this record was written
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.3181.10.6.2.49.101.1.6
snoopingTableLastUpdatedEpoch
Time stamp in alternate format
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.3181.10.6.2.49.101.1.7
snoopingTableLeaseTime
Lease time as reported by DHCP server
SNMPv2-SMICounter32
Textual Convention: SNMPv2-SMICounter32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.3181.10.6.2.49.101.1.8