avUnAuthAccessEvent
SECURITY-MANAGEMENT-MIB ·
.1.3.6.1.4.1.6889.2.1.14.1.10.0.200
Object
notification
Notification on unauthorized login attempts.
o For CLI and SNMP login failures:
Both SNMP SSH and WEB management interfaces shall identify
situation and alert.
The reported information should include wrong user name,
host name and IP address of remote host. Passwords is not
reported because of the possibility to reveal password.
o For pre-shared-key (PSK) authentication failure in IKE:
* lntUnauthUserName -
- In IKE AM: the ID sent by the remote peer in the ID
payload.
- In IKE MM: the ID associated with the remote peer IP
in the running configuration.
* avUnauthInetAddressType and avUnauthInetAddress - represents
the source IP of the packet sent by the remote peer.
* avUnauthProtocol - lntIKEAccess(500)
Context
- MIB
- SECURITY-MANAGEMENT-MIB
- OID
.1.3.6.1.4.1.6889.2.1.14.1.10.0.200- Type
- notification
- Status
- current
- Parent
- secMngNotificationsPrefix
- Siblings
- 5
Syntax
No syntax metadata recorded.
Values & Constraints
No enumerated values or constraints recorded.
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| avConfigurationEncKeyMismatchFault Encryption keys mismatch error. Configuration download
operation is aborted | notification | - | .1.3.6.1.4.1.6889.2.1.14.1.10.0.1 |
| avConfigurationMasterKeyChange Configuration Master key was changed | notification | - | .1.3.6.1.4.1.6889.2.1.14.1.10.0.2 |
| avAccountLockoutEvent After configurable number of failed attempts to authenticate a user, device
penalized by locking them out for a pre-specified amount of time. | notification | - | .1.3.6.1.4.1.6889.2.1.14.1.10.0.201 |
| avIPv6AddressDuplicationEvent The trap is generated whenever there is a detection of IPv6 address
(link-local or global IPv6 address) duplication as part of DAD. | notification | - | .1.3.6.1.4.1.6889.2.1.14.1.10.0.202 |
| avPasswordToExpireAlert User password is about to expire in n days | notification | - | .1.3.6.1.4.1.6889.2.1.14.1.10.0.3 |
Notification Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| G700-MG-MIBcmgTrapSubsystem The high-level subsystem that generated the trap.
Expected values are 'HW', 'SW', and 'Net'. | scalar | OctetString | .1.3.6.1.4.1.6889.2.9.1.5.2.1.3 |
| G700-MG-MIBcmgTrapOnBoard Expected values are 'no' and 'yes'. If a problem is on-board,
replacing the media module is likely to resolve the problem. | scalar | OctetString | .1.3.6.1.4.1.6889.2.9.1.5.2.1.2 |
| G700-MG-MIBcmgTrapLocation Location of the problem in the form gggVspp, where
ggg Media gateway number, or zero if the gateway is not
currently registered with any controller.
V The letter V; a field separ… | scalar | OctetString | .1.3.6.1.4.1.6889.2.9.1.5.2.1.1 |
| avUnauthUserName The name of the user who's attempt to access device was identified as unauthorized. | scalar | OctetString | .1.3.6.1.4.1.6889.2.1.14.1.10.1.3 |
| avUnauthInetAddressType The Inet Address Type of access violating station | scalar | INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.6889.2.1.14.1.10.1.9 |
| avUnauthInetAddress The Inet Address of access violating station | scalar | INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.6889.2.1.14.1.10.1.10 |
| avUnauthProtocol The management protocol employed for the unauthorized access -
avSSHAccess(22) -- SSH protocol
avTELNETAccess(23), --Telnet protocol
avHTTPAccess(80), -- HTTP p… | scalar | Enumeration | .1.3.6.1.4.1.6889.2.1.14.1.10.1.5 |
| avASGAuthFileAFID The productID value ascociated with the
Authentication File (format 7xxxxxxxxx) | scalar | OctetString | .1.3.6.1.4.1.6889.2.1.14.1.12.3.1 |
| AVAYA-ENTITY-MIBavEntPhySeverity The severity of the notification. | scalar | AvEntPhyItuPerceivedSeverity | .1.3.6.1.4.1.6889.2.1.99.4.1 |