Observium_CE/mibs/avaya/SECURITY-MANAGEMENT-MIB

1310 lines
40 KiB
Plaintext

--
-- security-management-mib.my
-- MIB generated by MG-SOFT Visual MIB Builder Version 6.0 Build 88
-- Monday, March 13, 2006 at 18:53:18
--
-- security-management-mib.my
-- MIB generated by MG-SOFT Visual MIB Builder Version 3.0 Build 253
-- Monday, February 27, 2006 at 19:18:22
--
-- SECURITY-MANAGEMENT-MIB.my
-- MIB generated by MG-SOFT Visual MIB Builder Version 3.0 Build 253
-- Wednesday, November 23, 2005 at 13:35:05
--
-- SECURITY-MANAGEMENT-MIB.my
-- MIB generated by MG-SOFT Visual MIB Builder Version 3.0 Build 253
-- Wednesday, April 20, 2005 at 16:07:15
--
-- SECURITYMANAGEMENTMIB.my
-- MIB generated by MGSOFT Visual MIB Builder Version 3.0 Build 253
-- Wednesday, January 12, 2005 at 14:00:10
--
-- SECURITYMANAGEMENTMIB.my
-- MIB generated by MGSOFT Visual MIB Builder Version 3.0 Build 253
-- Tuesday, January 11, 2005 at 18:41:44
--
-- SECURITYMANAGEMENTMIB.my
-- MIB generated by MGSOFT Visual MIB Builder Version 3.0 Build 253
-- Wednesday, September 15, 2004 at 13:47:14
--
-- SECURITYMANAGEMENTMIB.my
-- MIB generated by MGSOFT Visual MIB Builder Version 3.0 Build 253
-- Sunday, June 27, 2004 at 18:06:47
--
-- ==========================================================
--
-- MIB : SECURITYMANAGEMENTMIB Avaya
--
-- Version : 1.1.0
--
-- ==========================================================
--
-- Copyright 1999 2010 Avaya Ltd.
-- All Rights Reserved.
--
-- Reproduction of this document is authorized on condition
-- that the foregoing copyright notice is included.
--
-- This Avaya SNMP Management Information Base
-- Specification embodies Avaya confidential and
-- proprietary intellectual property. Lucent Technologies retains all
-- title and ownership in the Specification, including any revisions
--
-- It is Avaya intent to encourage the widespread use of this
-- Specification in connection with the management of Avaya
-- products.
--
-- Avaya grants vendors, endusers, and other interested parties
-- a nonexclusive license to use this Specification in connection
-- with the management of Avaya products.
--
-- This Specification is supplied "as is," and Avaya makes
-- no warranty, either express or implied, as to the use,
-- operation, condition, or performance of the Specification.
--
--==========================================================
--
-- Version 1.1.0
-- 24 Oct 2010
-- Adding traps which support IPv6.
-- a. avUnAuthAccessEvent.
-- b. avAccountLockoutEvent.
-- c. avIPv6AddressDuplicationEvent.
-- Shlomi biton
--
--==========================================================
--
-- Version 1.0.12
-- 15 Jun 2009
-- Adding arpInspection(23) enumeration to secMngProtoId.
-- Shlomi biton
--
--==========================================================
--
-- Version 1.0.11
-- 07 Feb 2008
-- Changing the secMngNumOfDays2Expire to
-- Udi Ezra ; Shlomi biton
--==========================================================
--
-- Version 1.0.10
-- 07 Feb 2008
-- Adding the trap avPasswordToExpireAlert
-- Pesah Spector
-- ==========================================================
--
-- Version 1.0.9
-- 11 Jan 2007
-- Adding avSecLocalDateAndTime - for setting date and time.
--
-- ==========================================================
--
-- Version 1.0.8
-- 02 Nov 2006
-- Adding DNS Relay to dnsRelay(22) to secMngProtoId.
--
-- ==========================================================
--
-- Version 1.0.7
-- 2 MAr 2005
-- Added support for MSS notification generated as result of DoS attacks
-- or unauthenticated attempts - see definition in CID 104904. All
-- new MIB objects - notification and varbinds are located under
-- avMssNotifications MIB subtree.
--
-- ==========================================================
--
-- Version 1.0.6
-- 11 Jan 2005
-- Added support for SYN cookies operational state monitoring,
-- and configueration state monitoring/change.
-- The following items were added:
-- o secTcpSynCookies
-- o secTcpSynCkiOpState
-- o secTcpSynCkiCfgState
--
-- Changed by Nimrod Dezent
-- ==========================================================
--
-- Version 1.0.5
-- 04 Oct 2004
-- Definition of DNS resolver enumerations.
-- Adding dnsResolver(18) to secMngProtoId.
--
-- Changed by Shlomi Biton
-- ==========================================================
--
-- Version 1.0.4
-- 04 July 2004
-- Add new mib object fipsEnhancedSecurityFlg under fip140 subtree
--
-- Changed by Pesah Spector
-- ==========================================================
-- Version 1.0.3
-- 04 July 2004
-- Updating the enumeration scpConfigFile to be scpConfigFiles in secMngProtoId.
--
-- 1. Change by Shlomi Biton
-- ==========================================================
--
-- Version 1.0.2
-- 28 June 2004
-- Definition of DHCP and TFTP enumerations.
-- Adding tftp(16) and dhcp(17) to secMngProtoId.
--
-- 1. Add by Shlomi Biton
-- ==========================================================
--
-- Version 1.0.1
-- 27 June 2004
-- Definition of RFA based license support
--
-- 1. Add by Pesah Spector
-- ==========================================================
--
-- Version 1.0.0
-- Definition of network services protocols first relase
-- ==========================================================
--
--
--
SECURITY-MANAGEMENT-MIB DEFINITIONS ::= BEGIN
IMPORTS
lsg
FROM AVAYAGEN-MIB
cmgTrapLocation, cmgTrapOnBoard, cmgTrapSubsystem, cmgTrapOnIccMissing, cmgTrapModule
FROM G700-MG-MIB
ifIndex, ifType, ifPhysAddress, ifName
FROM IF-MIB
genOpLastFailureDisplay, genAppFileId, genAppFileName, genAppFileVersionNumber
FROM LOAD-MIB
DisplayString
FROM RFC1213-MIB
OBJECT-GROUP, NOTIFICATION-GROUP
FROM SNMPv2-CONF
IpAddress, Unsigned32, Counter64, OBJECT-TYPE, MODULE-IDENTITY,
OBJECT-IDENTITY, NOTIFICATION-TYPE
FROM SNMPv2-SMI
InetAddress, InetAddressType
FROM INET-ADDRESS-MIB
avEntPhySeverity
FROM AVAYA-ENTITY-MIB
PhysAddress, DateAndTime, TEXTUAL-CONVENTION
FROM SNMPv2-TC;
-- 1.3.6.1.4.1.6889.2.1.14.1
secMngModule MODULE-IDENTITY
LAST-UPDATED "201003231045Z" -- Mar 22, 2010 at 10:46 GMT
ORGANIZATION
"Avaya"
CONTACT-INFO
"Contact-info."
DESCRIPTION
"Defines MIB objects related to device secured management."
REVISION "200603131849Z" -- March 13, 2006 at 18:49 GMT
DESCRIPTION
"Support for ASG Authentication
File and Authentication
Notifications"
REVISION "200511231321Z" -- November 23, 2005 at 13:21 GMT
DESCRIPTION
"Version 1.0.9
add support for new portocol enum value
telnetServices in object secMngProtoId, added as part of G450 project
development - ref CID 110907
Pesah
"
REVISION "200501111654Z" -- January 11, 2005 at 16:54 GMT
DESCRIPTION
" Version 1.0.6
Added support for SYN cookies operational state monitoring,
and configueration state monitoring/change.
The following items were added:
o secTcpSynCookies
o secTcpSynCkiOpState
o secTcpSynCkiCfgState
Changed by Nimrod Dezent"
REVISION "200503021602Z" -- March 02, 2005 at 16:02 GMT
DESCRIPTION
"
Version 1.0.7
2 MAr 2005
Added support for MSS notification generated as result of DoS attacks
or unauthenticated attempts - see definition in CID 104904. All
new MIB objects - notification and varbinds are located under
avMssNotifications MIB subtree
"
REVISION "200504201606Z" -- April 20, 2005 at 16:06 GMT
DESCRIPTION
"
1.0.8 Changed default value of MSS rate
limiting from 60 seconds to
300 seconds"
REVISION "200602271916Z" -- February 27, 2006 at 19:16 GMT
DESCRIPTION
"Adding new
notifictations supporting Secret
Management
for backup and restore
(startup-config) file
"
REVISION "201003231045Z" -- Mar 21, 2010 at 16:57 GMT
DESCRIPTION
" Adding traps which support IPv6.
a. avUnAuthAccessEvent.
b. avAccountLockoutEvent.
c. avIPv6AddressDuplicationEvent.
d. avNSReceivedDuplicateAddressEvent.
e. avNAReceivedDuplicateAddressEvent.
"
::= { avayaSecurity 1 }
--
-- Textual conventions
--
-- January 11, 2005 at 17:00 GMT
-- February 27, 2006 at 19:16 GMT
-- April 20, 2005 at 16:06 GMT
-- March 02, 2005 at 16:02 GMT
-- January 11, 2005 at 16:54 GMT
-- November 23, 2005 at 13:21 GMT
--
-- Textual conventions
--
-- January 11, 2005 at 17:00 GMT
-- November 23, 2005 at 13:21 GMT
-- January 11, 2005 at 16:54 GMT
-- March 02, 2005 at 16:02 GMT
-- April 20, 2005 at 16:06 GMT
--
-- Textual conventions
--
-- January 11, 2005 at 17:00 GMT
-- April 20, 2005 at 16:06 GMT
-- March 02, 2005 at 16:02 GMT
-- January 11, 2005 at 16:54 GMT
--
-- Textual conventions
--
-- January 11, 2005 at 17:00 GMT
-- January 11, 2005 at 16:54 GMT
--
-- Textual conventions
--
-- January 11, 2005 at 17:00 GMT
-- January 11, 2005 at 16:54 GMT
--
-- Textual conventions
--
-- January 01, 2003 at 18:26 GMT
--
-- Textual conventions
--
OnOffType ::= TEXTUAL-CONVENTION
STATUS current
DESCRIPTION
"Description."
SYNTAX INTEGER
{
on(1),
off(2)
}
-- January 01, 2003 at 18:26 GMT
-- January 01, 2003 at 18:26 GMT
--
-- Textual conventions
--
ServiceStateType ::= TEXTUAL-CONVENTION
STATUS current
DESCRIPTION
"Description."
SYNTAX INTEGER
{
on(1),
off(2),
notSupported(3)
}
--
-- Node definitions
--
-- Node definitions
--
-- Node definitions
--
-- Node definitions
--
-- Node definitions
--
-- Node definitions
--
-- Node definitions
--
-- Node definitions
--
-- 1.3.6.1.4.1.6889.2.1.14
-- 1.3.6.1.4.1.6889.2.1.14
-- 1.3.6.1.4.1.6889.2.1.14
avayaSecurity OBJECT IDENTIFIER ::= { lsg 14 }
-- Node definitions
--
-- 1.3.6.1.4.1.6889.2.1.2.1
-- 1.3.6.1.4.1.6889.2.1.14.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.1
secMode OBJECT-TYPE
SYNTAX OnOffType
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"When the security mode flag = on - it indicates that device operates
in secured mode, =off - in non-secured mode. Otherwize when the value retuned
=Not relevant - secured mode is not supported in this device."
::= { secMngModule 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.2
-- 1.3.6.1.4.1.6889.2.1.14.1.2
secTcpSynCookies OBJECT IDENTIFIER ::= { secMngModule 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.2.1
-- 1.3.6.1.4.1.6889.2.1.14.1.2.1
secTcpSynCkiOpState OBJECT-TYPE
SYNTAX OnOffType
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Monitors the operational state of the TCP SYN cookies
defense mechanism.
The operational state of the SYN cookies can change
only after a reset, if the configuration state was
changed and the running configuration was saved to
the startup configuration before the reset.
Use secTcpSynCkiCfgState to monitor and change the
SYN cookies configuration state.
When the SYN cookies feature is turned on, it helps
protect the local host from SYN attacks (a type of
DoS attack)."
::= { secTcpSynCookies 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.2.2
-- 1.3.6.1.4.1.6889.2.1.14.1.2.2
secTcpSynCkiCfgState OBJECT-TYPE
SYNTAX OnOffType
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Controls and monitors the configuration state of the
TCP SYN cookies defense mechanism.
The operational state of the SYN cookies can change
only after reset, if the configuration state was
changed and the running configuration was saved to
the startup configuration before the reset.
Use secTcpSynCkiOpState to monitor the SYN cookies
operational state.
When the SYN cookies feature is turned on, it helps
protect the local host from SYN attacks (a type of
DoS attack).
"
::= { secTcpSynCookies 2 }
-- 1.3.6.1.4.1.6889.2.1.2.3
-- 1.3.6.1.4.1.6889.2.1.14.1.3
-- 1.3.6.1.4.1.6889.2.1.14.1.3
-- 1.3.6.1.4.1.6889.2.1.14.1.3
secMngProtoTable OBJECT-TYPE
SYNTAX SEQUENCE OF SecMngProtoEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"List of security management protocols supported in the device.
"
::= { secMngModule 3 }
-- 1.3.6.1.4.1.6889.2.1.2.3.1
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1
secMngProtoEntry OBJECT-TYPE
SYNTAX SecMngProtoEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Description."
INDEX { secMngProtoId }
::= { secMngProtoTable 1 }
SecMngProtoEntry ::=
SEQUENCE {
secMngProtoId
INTEGER,
secMngProtoStatus
ServiceStateType
}
-- 1.3.6.1.4.1.6889.2.1.2.3.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1.1
secMngProtoId OBJECT-TYPE
SYNTAX INTEGER
{
scpConfigFiles(1),
scpImageFiles(2),
ssh(3),
telnet(4),
snmpv3(5),
http(6),
https(7),
telnetClient(8),
icmpRedirection(9),
icmp(10),
recoveryPassword(11),
sshClient(12),
snmpv1(13),
icmpEcho(14),
ftpClient(15),
tftp(16),
dhcp(17),
dnsResolver(18),
scpClient(19),
tftpClient(20),
telnetServices(21),
dnsRelay(22),
arpInspection(23)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Index to the secMngProtoTable. The index can take one of the following values that
correspond to supported management protocols
scpConfigFiles(1),
scpImageFiles(2),
ssh(3),
telnet(4),
snmpv3(5),
http(6),
https(7),
telnetClient(8),
icmpRedirection(9), - icmp redirection service state
icmp(10), - icmp services status
recoveryPassword(11), - recovery password state
sshClient(12),
snmpv1(13),
icmpEcho(14) - icmp service has been launched in EchoOnly mode
tftp(16),
dhcp(17),
dnsResolver(18,
scpClient(19),
tftpClient(20),
servicesTelnet(21), - reports telnet status on Services interface in G450
Missing entry indicates that
corresponding protocol is not supported. "
::= { secMngProtoEntry 1 }
-- The index of the supported protocols. For not supported protocol
-- the entry will not be
-- 1.3.6.1.4.1.6889.2.1.2.3.1.2
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1.2
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1.2
-- 1.3.6.1.4.1.6889.2.1.14.1.3.1.2
secMngProtoStatus OBJECT-TYPE
SYNTAX ServiceStateType
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Portocol status. When the status is =on - it indicates that
correpsonding protocol is up and running, =off - protocol is down.
Otherwize when the value retuned =Not relevant - the protocol is not supported."
::= { secMngProtoEntry 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.4
-- 1.3.6.1.4.1.6889.2.1.14.1.4
-- 1.3.6.1.4.1.6889.2.1.14.1.4
secMngConformance OBJECT IDENTIFIER ::= { secMngModule 4 }
-- 1.3.6.1.4.1.6889.2.1.14.1.4.1
-- 1.3.6.1.4.1.6889.2.1.14.1.4.1
-- 1.3.6.1.4.1.6889.2.1.14.1.4.1
secMngGroups OBJECT IDENTIFIER ::= { secMngConformance 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.4.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.4.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.4.1.1
secMngBasicGroup OBJECT-GROUP
OBJECTS { secMode, secMngProtoId, secMngProtoStatus, secTcpSynCkiOpState, secTcpSynCkiCfgState,
fipsEnhancedSecurityFlg }
STATUS current
DESCRIPTION
"Description."
::= { secMngGroups 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.4.2
-- 1.3.6.1.4.1.6889.2.1.14.1.4.2
-- 1.3.6.1.4.1.6889.2.1.14.1.4.2
secMngCompliance OBJECT IDENTIFIER ::= { secMngConformance 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5
-- 1.3.6.1.4.1.6889.2.1.14.1.5
-- 1.3.6.1.4.1.6889.2.1.14.1.5
lsgLicManagement OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Group of MIBs objects used for configuration/presentation of the
License information generated by Avaya Remote Feature
Activation (RFA) system.
"
::= { secMngModule 5 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1
lsgLicMngTable OBJECT-TYPE
SYNTAX SEQUENCE OF LsgLicMngEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"RFA based License management table. All elements are
displaying the feature activation status. License activation
controlled by the license file. The table is indexed by the
license feature keyword assuming that the same keyword describing a
feature cannot appear more than once per a license file.
"
::= { lsgLicManagement 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1
lsgLicMngEntry OBJECT-TYPE
SYNTAX LsgLicMngEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Entry in lsgLicMngTable. "
INDEX { lsgLicMngFeatureKeyword }
::= { lsgLicMngTable 1 }
LsgLicMngEntry ::=
SEQUENCE {
lsgLicMngFeatureKeyword
OCTET STRING,
lsgLicMngFeatureType
INTEGER,
lsgLicMngAdminStatus
OnOffType,
lsgLicMngOperStatus
OnOffType,
lsgLicMngCountedValue
Unsigned32,
lsgLicMngLastError
INTEGER
}
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.1
lsgLicMngFeatureKeyword OBJECT-TYPE
SYNTAX OCTET STRING
MAX-ACCESS read-create
STATUS current
DESCRIPTION
"This table entry contains a features keyword. The feature
keywords are text-based for example FEAT_VPN string. This
field is used as a table index"
::= { lsgLicMngEntry 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.2
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.2
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.2
lsgLicMngFeatureType OBJECT-TYPE
SYNTAX INTEGER
{
onOffFeature(1),
quantifiableFeature(2)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"License activation mechanism support two feature types
* Boolean on-off feature
* Features that describe quantities for example number
of concurrent VPN peers
"
::= { lsgLicMngEntry 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.3
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.3
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.3
lsgLicMngAdminStatus OBJECT-TYPE
SYNTAX OnOffType
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"An administration status shows the feature activation status -
when set to On the feature is activated by the RFA licensing system.
"
::= { lsgLicMngEntry 3 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.4
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.4
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.4
lsgLicMngOperStatus OBJECT-TYPE
SYNTAX OnOffType
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The operation status shows the actual status of the
corresponding feature - feature can be not operational
enabled if for example device must be reset for feature to
be activated or feature is not supported by a device."
::= { lsgLicMngEntry 4 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.5
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.5
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.5
lsgLicMngCountedValue OBJECT-TYPE
SYNTAX Unsigned32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"For counted features, this entry shows the associated quantity"
::= { lsgLicMngEntry 5 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.6
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.6
-- 1.3.6.1.4.1.6889.2.1.14.1.5.1.1.6
lsgLicMngLastError OBJECT-TYPE
SYNTAX INTEGER { licNoError(2) }
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Shows feature error state"
::= { lsgLicMngEntry 6 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20
lsgLicMngConformance OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { lsgLicManagement 20 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20.1
lsgLicMngGroups OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { lsgLicMngConformance 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20.1.1
-- 1.3.6.1.4.1.6889.2.1.14.1.5.20.1.1
lsgLicMngBasicGroup OBJECT-GROUP
OBJECTS { lsgLicMngFeatureKeyword, lsgLicMngFeatureType, lsgLicMngAdminStatus, lsgLicMngOperStatus, lsgLicMngCountedValue,
lsgLicMngLastError }
STATUS current
DESCRIPTION
"Description."
::= { lsgLicMngGroups 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.6
-- 1.3.6.1.4.1.6889.2.1.14.1.6
-- 1.3.6.1.4.1.6889.2.1.14.1.6
fips140 OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { secMngModule 6 }
-- 1.3.6.1.4.1.6889.2.1.14.1.6.1
-- 1.3.6.1.4.1.6889.2.1.14.1.6.1
-- 1.3.6.1.4.1.6889.2.1.14.1.6.1
fipsEnhancedSecurityFlg OBJECT-TYPE
SYNTAX OnOffType
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"enhanceSecurity flag reports operation of a product in enhance security mode.
When running under enhanced security a product performs certain secure-related
activities safely, closely matching FIPS-140-2 standard. However the
flag doesn't necessary indicate that all device operations comply to
FIPS approved mode as some of security activities might be controlled
via different mechanisms for example manual configuration.
Security policy/Crypto Office guidance documents shall be used as
reference as for if this flag can be used as an evidence for operation
in FIPS approved mode. The flag is read only and set via product CLI.
"
::= { fips140 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7
avMssNotifications OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Subtree hosting MSS notification traps"
::= { secMngModule 7 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.0
avMssNotificationPrefix OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { avMssNotifications 0 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.0.1
avMSSDenialOfService NOTIFICATION-TYPE
OBJECTS { avMSSVarbindsDoSType, avMSSVarbindsSrcAddr, avMSSVarbindsDstAddr, avMSSVarbindsDstPort, avMSSVarbindsCount,
avMSSVarbindsIpProtocol, ifIndex, ifName, avMSSVarbindsSrcMACAddr }
STATUS current
DESCRIPTION
"The MSS notification sent on DoS attack"
::= { avMssNotificationPrefix 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.2
avMSSNotificationRate OBJECT-TYPE
SYNTAX INTEGER (10..28800)
UNITS "Second"
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines the rate of MSS notification report.
MSS reports will be generated as per
rate if the event group counter
passes the threshold correspondingly.
The rate units are given in seconds with
minimum - 10 seconds
maximum - 8 hours (60 * 60 * 8)
"
DEFVAL { 300 }
::= { avMssNotifications 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4
avMSSVarbinds OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Subtree of access-for-notify arguments to
MSS notification varbinds list."
::= { avMssNotifications 4 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.1
avMSSVarbindsDoSType OBJECT-TYPE
SYNTAX INTEGER
{
avMSSDoSMalformedARPs(1),
avMSSDoSLandAttack(2),
avMSSDoSICMPReflectAttack(3),
avMSSDoSUknownPort(4),
avMSSDoSUrgTCPOption(5),
avMSSDoSMalformedIP(6),
avMSSDoSSynFlood(7),
avMSSDoSSmurfAttack(8),
avMSSDoSFraggleAttack(9),
avMSSDoSMalFragmentIP(10),
avMSSSpoofedIP(11),
avMSSUnknownL4Protocol(12),
avMSSunAuthenticatedAccess(13),
avMSSUserDefinedDoSAttack100(100),
avMSSUserDefinedDoSAttack101(101),
avMSSUserDefinedDoSAttack102(102),
avMSSUserDefinedDoSAttack103(103),
avMSSUserDefinedDoSAttack104(104),
avMSSUserDefinedDoSAttack105(105)
}
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Enumeration of DoS attacks"
::= { avMSSVarbinds 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.2
avMSSVarbindsDescription OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Textual description of the DoS event "
::= { avMSSVarbinds 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.3
avMSSVarbindsSrcAddr OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Source IP address in IP header. Set to 0.0.0.0 if address is unknown"
::= { avMSSVarbinds 3 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.4
avMSSVarbindsDstAddr OBJECT-TYPE
SYNTAX IpAddress
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Destination IP address in IP header. Set to 0.0.0.0 if address is unknown"
::= { avMSSVarbinds 4 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.5
avMSSVarbindsDstPort OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Destination port number in IP header. 0 if port is not applicable or
unknown"
DEFVAL { 0 }
::= { avMSSVarbinds 5 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.6
avMSSVarbindsIpProtocol OBJECT-TYPE
SYNTAX INTEGER (0..255)
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The protocol field in IP header
"
::= { avMSSVarbinds 6 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.7
avMSSVarbindsCount OBJECT-TYPE
SYNTAX Counter64
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Counted number of events that occur in a given period
for a corresponding class of security violations (DoS,
not authorized access, etc)."
::= { avMSSVarbinds 7 }
-- 1.3.6.1.4.1.6889.2.1.14.1.7.4.8
avMSSVarbindsSrcMACAddr OBJECT-TYPE
SYNTAX PhysAddress
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Source Physical address (MAC) of a packet identified
as a packet carrying DoS payload. Set to 00:00:00:00:00:00 when phyicial address
is not supported or unknown to the system"
DEFVAL { "00:00:00:00:00:00" }
::= { avMSSVarbinds 8 }
-- 1.3.6.1.4.1.6889.2.1.14.1.8
avMSSgroup OBJECT-GROUP
OBJECTS { avMSSNotificationRate, avMSSVarbindsSrcAddr, avMSSVarbindsDstAddr, avMSSVarbindsDstPort, avMSSVarbindsDescription,
avMSSVarbindsIpProtocol, avMSSVarbindsDoSType, avMSSVarbindsCount, avMSSVarbindsSrcMACAddr }
STATUS current
DESCRIPTION
"Description."
::= { secMngModule 8 }
-- 1.3.6.1.4.1.6889.2.1.14.1.9
mssNotificationGroup NOTIFICATION-GROUP
NOTIFICATIONS { avMSSDenialOfService }
STATUS current
DESCRIPTION
"Description."
::= { secMngModule 9 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10
secMngNotifications OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { secMngModule 10 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10.0
secMngNotificationsPrefix OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { secMngNotifications 0 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10.0.1
avConfigurationEncKeyMismatchFault NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation, genAppFileId, genAppFileName,
genAppFileVersionNumber, genOpLastFailureDisplay }
STATUS current
DESCRIPTION
"Encryption keys mismatch error. Configuration download
operation is aborted"
::= { secMngNotificationsPrefix 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10.0.2
avConfigurationMasterKeyChange NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation }
STATUS current
DESCRIPTION
"Configuration Master key was changed
"
::= { secMngNotificationsPrefix 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10.0.3
avPasswordToExpireAlert NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation, secMngNumOfDays2Expire }
STATUS current
DESCRIPTION
"User password is about to expire in n days
"
::= { secMngNotificationsPrefix 3 }
avUnAuthAccessEvent NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation,
avUnauthUserName, avUnauthInetAddressType, avUnauthInetAddress,
avUnauthProtocol, avASGAuthFileAFID, avEntPhySeverity }
STATUS current
DESCRIPTION
"Notification on unauthorized login attempts.
o For CLI and SNMP login failures:
Both SNMP SSH and WEB management interfaces shall identify
situation and alert.
The reported information should include wrong user name,
host name and IP address of remote host. Passwords is not
reported because of the possibility to reveal password.
o For pre-shared-key (PSK) authentication failure in IKE:
* lntUnauthUserName -
- In IKE AM: the ID sent by the remote peer in the ID
payload.
- In IKE MM: the ID associated with the remote peer IP
in the running configuration.
* avUnauthInetAddressType and avUnauthInetAddress - represents
the source IP of the packet sent by the remote peer.
* avUnauthProtocol - lntIKEAccess(500)
"
::= { secMngNotificationsPrefix 200 }
avAccountLockoutEvent NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation,
avUnauthUserName, avUnauthInetAddressType, avUnauthInetAddress,
avUnauthProtocol, avASGAuthFileAFID, avEntPhySeverity }
STATUS current
DESCRIPTION
"After configurable number of failed attempts to authenticate a user, device
penalized by locking them out for a pre-specified amount of time."
::= { secMngNotificationsPrefix 201 }
avIPv6AddressDuplicationEvent NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation,
avDuplicatedInetAddressType, avDuplicatedInetAddress, avDuplicatedMACAddress,
ifIndex, ifName, avASGAuthFileAFID, avEntPhySeverity }
STATUS current
DESCRIPTION
"The trap is generated whenever there is a detection of IPv6 address
(link-local or global IPv6 address) duplication as part of DAD."
::= { secMngNotificationsPrefix 202 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10.1
secMngVarbinds OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Notify only varbinds used for
notifications in secMngNotifications group"
::= { secMngNotifications 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10.1.1
secMngNumOfDays2Expire OBJECT-TYPE
SYNTAX Unsigned32
UNITS "Days"
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"Description."
::= { secMngVarbinds 1 }
avUnauthUserName OBJECT-TYPE
SYNTAX OCTET STRING (SIZE (0..32))
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The name of the user who's attempt to access device was identified as unauthorized.
"
::= { secMngVarbinds 3 }
avUnauthProtocol OBJECT-TYPE
SYNTAX INTEGER
{
avSSHAccess(22),
avTELNETAccess(23),
avHTTPAccess(80),
avSNMPAccess(161),
avHTTPSAccess(443),
avIKEAccess(500),
avRASAccess(6889),
avConsoleAccess(6890),
avPPPAccess(6891)
}
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The management protocol employed for the unauthorized access -
avSSHAccess(22) -- SSH protocol
avTELNETAccess(23), --Telnet protocol
avHTTPAccess(80), -- HTTP protocol
avSNMPAccess(161), -- SNMP protocol
avHTTPSAccess(443), -- HTTPS protocol over TLS sockets
avIKEAccess(500), -- IKE protocol - PSK authentication failure
avRASAccess(6889), -- RAS access over dial-up connection
avConsoleAccess(6890), -- Access from the Console port
avPPPAccess(6891) -- Access to PPP over modem
"
::= { secMngVarbinds 5 }
avUnauthInetAddressType OBJECT-TYPE
SYNTAX InetAddressType
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The Inet Address Type of access violating station"
::= { secMngVarbinds 9 }
avUnauthInetAddress OBJECT-TYPE
SYNTAX InetAddress
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The Inet Address of access violating station"
::= { secMngVarbinds 10 }
avDuplicatedInetAddressType OBJECT-TYPE
SYNTAX InetAddressType
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The duplicated Inet Address Type."
::= { secMngVarbinds 11 }
avDuplicatedInetAddress OBJECT-TYPE
SYNTAX InetAddress
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The duplicated Inet Address."
::= { secMngVarbinds 12 }
avDuplicatedMACAddress OBJECT-TYPE
SYNTAX PhysAddress
MAX-ACCESS accessible-for-notify
STATUS current
DESCRIPTION
"The MAC address of the station that claims to be
configured with the duplicated IPv6 address."
::= { secMngVarbinds 13 }
-- 1.3.6.1.4.1.6889.2.1.14.1.10.2
avMngNotificationCompliance OBJECT-GROUP
OBJECTS { secMngNumOfDays2Expire }
STATUS current
DESCRIPTION
"Description."
::= { secMngNotifications 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.11
secMngNotificationGroup NOTIFICATION-GROUP
NOTIFICATIONS { avConfigurationEncKeyMismatchFault, avConfigurationMasterKeyChange }
STATUS current
DESCRIPTION
"Description."
::= { secMngModule 11 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12
avASGAuthenticationFiles OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Info on authentication file(s) installed in a product"
::= { secMngModule 12 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3
avASGAuthFileHeader OBJECT-IDENTITY
STATUS current
DESCRIPTION
"The information on Authentication File stored
in ASG AF file header "
::= { avASGAuthenticationFiles 3 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.1
avASGAuthFileAFID OBJECT-TYPE
SYNTAX DisplayString (SIZE (0..10))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The productID value ascociated with the
Authentication File (format 7xxxxxxxxx) "
::= { avASGAuthFileHeader 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.2
avASGAuthFileGenDate OBJECT-TYPE
SYNTAX DisplayString
UNITS "YYYY/MM/DD"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Date of Authentication file generation
(format YYYY/MM/DD)"
::= { avASGAuthFileHeader 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.3
avASGAuthFileGenTime OBJECT-TYPE
SYNTAX DisplayString (SIZE (0..8))
UNITS "HH:MM:SS"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"A 8-character string in US short locale
time (format= HH:MM:SS)"
::= { avASGAuthFileHeader 3 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.4
avASGAuthFileRelease OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Major software release the AF file was generated for "
::= { avASGAuthFileHeader 4 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.5
avASGNotifications OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { avASGAuthFileHeader 5 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0
avASGNotificationsPrefix OBJECT-IDENTITY
STATUS current
DESCRIPTION
"Description."
::= { avASGNotifications 0 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0.1
avASGAFDownloadSuccess NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation, genAppFileId, genAppFileName,
genAppFileVersionNumber, avASGAuthFileAFID }
STATUS current
DESCRIPTION
"AF download successfully accomplished"
::= { avASGNotificationsPrefix 1 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.3.5.0.2
avASGAFDownloadFailure NOTIFICATION-TYPE
OBJECTS { cmgTrapSubsystem, cmgTrapOnBoard, cmgTrapLocation, genAppFileId, genAppFileName,
genAppFileVersionNumber, genOpLastFailureDisplay, avASGAuthFileAFID }
STATUS current
DESCRIPTION
"AF download Failed "
::= { avASGNotificationsPrefix 2 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.1000
avASGAuthFileGroup OBJECT-GROUP
OBJECTS { avASGAuthFileAFID, avASGAuthFileGenDate, avASGAuthFileGenTime, avASGAuthFileRelease }
STATUS current
DESCRIPTION
"Description."
::= { avASGAuthenticationFiles 1000 }
-- 1.3.6.1.4.1.6889.2.1.14.1.12.1001
avASGAuthFileNotificationGroup NOTIFICATION-GROUP
NOTIFICATIONS { avASGAFDownloadFailure, avASGAFDownloadSuccess }
STATUS current
DESCRIPTION
"ASG authentictation File Notification Group"
::= { avASGAuthenticationFiles 1001 }
-- 1.3.6.1.4.1.6889.2.1.13
avSecLocalDateAndTime OBJECT-TYPE
SYNTAX DateAndTime
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Setting the Local current RTC date and time, when not registered with CM"
::= { secMngModule 13 }
END
--
-- security-management-mib.my
--