sshdCfgLogLevel
BIANCA-BRICK-SSH-MIB ·
.1.3.6.1.4.1.272.4.44.1.12
Object
scalar
mandatory
r/w
Enumeration
Gives the verbosity level that is used when logging messages from sshd. The possible values are: 'quiet', 'fatal', 'error', 'info', 'verbose' and 'debug'. The default is 'info'. Logging with level 'debug' violates the privacy of users and is not recommended.
Context
- MIB
- BIANCA-BRICK-SSH-MIB
- OID
.1.3.6.1.4.1.272.4.44.1.12- Type
- scalar
- Access
- readwrite
- Status
- mandatory
- Parent
- sshDaemonCfg
- Siblings
- 26
Syntax
Enumeration
Values & Constraints
Enumerated Values
1 | quiet |
2 | fatal |
3 | error |
4 | info |
5 | verbose |
6 | debug1 |
7 | debug2 |
8 | debug3 |
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| sshdCfgPort mandatory Specifies the port on which the server listens
for connections (default: 22). | scalar | Integer32 | .1.3.6.1.4.1.272.4.44.1.1 |
| sshdCfgVerifyReverseMapping mandatory Specifies whether sshd should try to verify the remote
host name and check that the resolved host name for the
remote IP address maps back to the very same IP address.
The default… | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.10 |
| sshdCfgLogFacility mandatory Gives the facility code that is used when logging messages
from sshd. The possible values are: 'daemon', 'user', 'auth',
'local0', 'local1', 'local2', 'local3', 'local4', 'local5'… | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.11 |
| sshdCfgCiphers mandatory Specifies the ciphers allowed for protocol version 2.
Multiple ciphers must be comma-separated.
The default is
'aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour'. | scalar | - | .1.3.6.1.4.1.272.4.44.1.13 |
| sshdCfgMacs mandatory Specifies the available MAC (message authentication code)
algorithms. The MAC algorithm is used in protocol version 2
for data integrity protection. Multiple algorithms must be
co… | scalar | - | .1.3.6.1.4.1.272.4.44.1.14 |
| sshdCfgProtocol mandatory Specifies the protocol versions sshd should support.
The possible values are '1' and '2'. Multiple versions
must be comma separated. Currently only protocol version 2
is supported… | scalar | - | .1.3.6.1.4.1.272.4.44.1.15 |
| sshdCfgMaxClients mandatory Specifies the maximum number of concurrent unauthenticated
connections to the sshd daemon. Additional connections will
be dropped until authentication succeeds or the LoginGraceTi… | scalar | Integer32 | .1.3.6.1.4.1.272.4.44.1.16 |
| sshdCfgClientAliveInterval mandatory Sets a timeout interval in seconds after which if no data has
been received from the client, sshd will send a message through
the encrypted channel to request a response from the … | scalar | Integer32 | .1.3.6.1.4.1.272.4.44.1.17 |
| sshdCfgClientAliveCountMax mandatory Sets the number of client alive messages (see above) which
may be sent without sshd receiving any messages back from
the client. If this threshold is reached while client alive
me… | scalar | Integer32 | .1.3.6.1.4.1.272.4.44.1.18 |
| sshdCfgAllowTcpForwarding mandatory Specifies whether TCP forwarding is permitted.
The default is 'no'. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.19 |
| sshdCfgLoginGraceTime mandatory Gives the grace time for clients to authenticate themselves
(default 600 seconds). If the client fails to authenticate
the user within this many seconds, the server disconnects.
… | scalar | Integer32 | .1.3.6.1.4.1.272.4.44.1.2 |
| sshdCfgGatewayPorts mandatory Specifies whether remote hosts are allowed to connect to ports
forwarded for the client. By default, sshd binds remote port
forwardings to the loopback addresss. This prevents oth… | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.20 |
| sshdCfgUseLogin mandatory Specifies whether login(1) is used for interactive login
sessions.
The default is 'yes'.
Note that login(1) is never used for remote command execution.
Note also, that if this is … | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.21 |
| sshdCfgX11Forwarding mandatory Specifies whether X11 forwarding is permitted.
The default is 'no'.
X11 forwarding is automatically disabled
if UseLogin is enabled. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.22 |
| sshdCfgX11DisplayOffset mandatory Specifies the first display number available for
sshd's X11 forwarding. This prevents sshd from
interfering with real X11 servers.
The default is 10. | scalar | Integer32 | .1.3.6.1.4.1.272.4.44.1.23 |
| sshdCfgHostbasedAuthentication mandatory Specifies whether ssh_known_hosts authentication together with
successful public key client host authentication is
allowed (hostbased authentication).
This option applies to proto… | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.3 |
| sshdCfgPrintMotd mandatory Specifies whether sshd should print 'motd' when a user
logs in interactively. (On some systems it is also printed
by the shell, /etc/profile, or equivalent.)
The default is 'yes'. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.32 |
| sshdCfgBanner mandatory In some jurisdictions, sending a warning message before
authentication may be relevant for getting legal protection.
The contents of the specified file are sent to the remote user… | scalar | - | .1.3.6.1.4.1.272.4.44.1.33 |
| sshdCfgPrintLastLog mandatory Specifies whether sshd should print the date and time
when the user last logged in.
The default is 'no'. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.34 |
| sshdCfgLastLogin mandatory In some jurisdictions, sending a warning message before
authentication may be relevant for getting legal protection.
The contents of the specified file are sent to the remote user… | scalar | - | .1.3.6.1.4.1.272.4.44.1.35 |
| sshdCfgPubkeyAuthentication mandatory Specifies whether public key authentication is allowed.
The default is 'yes'.
Note that this option applies to protocol version 2 only. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.4 |
| sshdCfgPasswordAuthentication mandatory Specifies whether password authentication is allowed.
The default is 'yes'. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.5 |
| sshdCfgChallengeResponseAuthentication mandatory Specifies whether challenge response authentication is allowed.
The default is 'yes'. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.6 |
| sshdCfgKeepAlives mandatory Specifies whether the system should send keepalive messages to
the other side. If they are sent, death of the connection or
crash of one of the machines will be properly noticed. … | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.7 |
| sshdCfgPermitEmptyPasswd mandatory When password authentication is allowed, it specifies
whether the server allows login to accounts with empty
password strings.
The default is 'no'. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.8 |
| sshdCfgCompression mandatory Enables/disables the general use of compression. | scalar | Enumeration | .1.3.6.1.4.1.272.4.44.1.9 |