776 lines
22 KiB
Plaintext

G6-DHCP-MIB DEFINITIONS ::= BEGIN
IMPORTS
MODULE-IDENTITY, OBJECT-TYPE, Integer32, Unsigned32, Counter32, enterprises,NOTIFICATION-TYPE
FROM SNMPv2-SMI
DisplayString, MacAddress
FROM SNMPv2-TC
g6 FROM MICROSENS-G6-MIB
;
protocol MODULE-IDENTITY --Category
LAST-UPDATED "201802121619Z"
ORGANIZATION "MICROSENS GmbH & Co. KG"
CONTACT-INFO
"Kueferstrasse 16
D-59067 Hamm
Germany
support@microsens.de
http://www.microsens.de"
DESCRIPTION
"Microsens private MIB for Generation 6 Ethernet Switches"
REVISION "201802121619Z"
DESCRIPTION
"File creation"
::= { g6 2 }
dhcp OBJECT IDENTIFIER ::= { protocol 49 }
-- *************************** CONFIGURATION SECTION ********************************
dhcpEnableDhcpRelay OBJECT-TYPE -- enable_dhcp_relay
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"General enable of dhcp relay function."
::= { dhcp 1 }
dhcpEnableDhcpSnooping OBJECT-TYPE -- enable_dhcp_snooping
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"General enable of dhcp snooping function."
::= { dhcp 2 }
dhcpEnablePppoeSnooping OBJECT-TYPE -- enable_pppoe_snooping
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"General enable of PPPoE snooping also known as PPPoE Intermediate Agent function."
::= { dhcp 3 }
dhcpEnableArpInspection OBJECT-TYPE -- enable_arp_inspection
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"General enable of arp inspection function."
::= { dhcp 4 }
dhcpUnblockPort OBJECT-TYPE -- unblock_port
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This function may be used to unblock a port that has been set to blocking state due to DHCP flooding or due to ARP storm detection. The shorthand port format like 1 for 1/1 may be used. Syntax examples: dhcp.unblock_port = 1/2,1/5 or dhcp.unblock_port = 1/1-1/4. Also the syntax .. = 0-5 to unblock the first 6 ports is supported."
::= { dhcp 5 }
dhcpClearSnoopingTable OBJECT-TYPE -- clear_snooping_table
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This function may be used to clear the content of the DHCP snooping table."
::= { dhcp 6 }
-- ******************* Begin of relayConfigTable *************************
relayConfigTable OBJECT-TYPE
SYNTAX SEQUENCE OF RelayConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor."
::= { dhcp 7 }
relayConfigEntry OBJECT-TYPE
SYNTAX RelayConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { relayConfigIndex }
::= { relayConfigTable 1 }
RelayConfigEntry ::= SEQUENCE {
relayConfigIndex INTEGER,
relayConfigDhcpServerAddress DisplayString,
relayConfigRemoteIdSource INTEGER ,
relayConfigCustomRemoteId DisplayString,
relayConfigCircuitIdSource INTEGER
}
relayConfigIndex OBJECT-TYPE
SYNTAX INTEGER (0)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { relayConfigEntry 1 }
relayConfigDhcpServerAddress OBJECT-TYPE -- dhcp_server_address
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines host address or network address where the dhcp server(s) resides. Also known as ip_helper_address."
::= { relayConfigEntry 2 }
relayConfigRemoteIdSource OBJECT-TYPE -- remote_id_source
SYNTAX INTEGER
{
hostname (0),
macAddress (1),
sysName (2),
userDefined (3),
portAlias (4)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines how the switch is identified when DHCP option 82 is used. (Suboption2)"
::= { relayConfigEntry 3 }
relayConfigCustomRemoteId OBJECT-TYPE -- custom_remote_id
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This remote id is used for option 82 when 'remote_id_source' is set to USER_DEFINED."
::= { relayConfigEntry 4 }
relayConfigCircuitIdSource OBJECT-TYPE -- circuit_id_source
SYNTAX INTEGER
{
snmpPortId (0),
slotPortId (1),
portAlias (2),
ipSlotPortVlan (3)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines how the ports are identified when option 82 is used. (Suboption1)"
::= { relayConfigEntry 5 }
-- ********************* End of relayConfigTable ***********************
-- ******************* Begin of relayPortConfigTable *************************
relayPortConfigTable OBJECT-TYPE
SYNTAX SEQUENCE OF RelayPortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This configures the DHCP relay option 82. It can be used to supply information from which port a DHCP request came in order to supply an IP based on the physical location of the requestor."
::= { dhcp 8 }
relayPortConfigEntry OBJECT-TYPE
SYNTAX RelayPortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { relayPortConfigPortIndex }
::= { relayPortConfigTable 1 }
RelayPortConfigEntry ::= SEQUENCE {
relayPortConfigPortIndex INTEGER,
relayPortConfigEnableDhcpRelay INTEGER ,
relayPortConfigEnableOption82 INTEGER
}
relayPortConfigPortIndex OBJECT-TYPE
SYNTAX INTEGER (0..31)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { relayPortConfigEntry 1 }
relayPortConfigEnableDhcpRelay OBJECT-TYPE -- enable_dhcp_relay
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"When enabled incoming DHCP requests are redirected to the dhcp server or network specified in 'dhcp.relay_config'"
::= { relayPortConfigEntry 2 }
relayPortConfigEnableOption82 OBJECT-TYPE -- enable_option_82
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"When enabled incoming DHCP requests are modified in 'dhcp.relay_config'"
::= { relayPortConfigEntry 3 }
-- ********************* End of relayPortConfigTable ***********************
-- ******************* Begin of snoopingPortConfigTable *************************
snoopingPortConfigTable OBJECT-TYPE
SYNTAX SEQUENCE OF SnoopingPortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This configures the DHCP snooping function. DHCP snooping acts like a DHCP firewall between access and link ports. When enabled it ensures that for untrusted ports only DHCP requests are accepted. This prevents malicious users from injecting fake DHCP frames and thus invalid IP addresses."
::= { dhcp 9 }
snoopingPortConfigEntry OBJECT-TYPE
SYNTAX SnoopingPortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { snoopingPortConfigPortIndex }
::= { snoopingPortConfigTable 1 }
SnoopingPortConfigEntry ::= SEQUENCE {
snoopingPortConfigPortIndex INTEGER,
snoopingPortConfigEnableDhcpSnooping INTEGER ,
snoopingPortConfigDhcpFiltering INTEGER ,
snoopingPortConfigSnoopingTrust INTEGER ,
snoopingPortConfigAcceptIngressOption82 INTEGER ,
snoopingPortConfigMacAddressVerification INTEGER ,
snoopingPortConfigDhcpRateLimiting Integer32 ,
snoopingPortConfigClearSnoopingStatistics DisplayString
}
snoopingPortConfigPortIndex OBJECT-TYPE
SYNTAX INTEGER (0..31)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { snoopingPortConfigEntry 1 }
snoopingPortConfigEnableDhcpSnooping OBJECT-TYPE -- enable_dhcp_snooping
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This enables the DHCP snooping function per port."
::= { snoopingPortConfigEntry 2 }
snoopingPortConfigDhcpFiltering OBJECT-TYPE -- dhcp_filtering
SYNTAX INTEGER
{
disabled (0),
dropAndEvent (1),
blockAndEvent (2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"DHCP filtering prevents DHCP responses being injected from a local access port. It acts like a DHCP firewall between access and link ports."
::= { snoopingPortConfigEntry 3 }
snoopingPortConfigSnoopingTrust OBJECT-TYPE -- snooping_trust
SYNTAX INTEGER
{
auto (0),
untrusted (1),
trusted (2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"DHCP responses are only accepted when they ingress on a trusted port. Typically these are the link ports. AUTO uses the port role and declares all up or downlink ports as trusted."
::= { snoopingPortConfigEntry 4 }
snoopingPortConfigAcceptIngressOption82 OBJECT-TYPE -- accept_ingress_option82
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Normally incoming DHCP request incoming with Option 82 set will be discarded. When enabled then this check is ignored."
::= { snoopingPortConfigEntry 5 }
snoopingPortConfigMacAddressVerification OBJECT-TYPE -- mac_address_verification
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"When a packet is received on an untrusted interface, and the source MAC address and the DHCP client MAC address do not match and this feature is enabled, the packet is dropped."
::= { snoopingPortConfigEntry 6 }
snoopingPortConfigDhcpRateLimiting OBJECT-TYPE -- dhcp_rate_limiting
SYNTAX Integer32 (0..255)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines how many DHCP request are accepted per second. When the limit is reached, DHCP flooding is assumed and the port is blocked. The value 0 disables the rate limit check."
::= { snoopingPortConfigEntry 7 }
snoopingPortConfigClearSnoopingStatistics OBJECT-TYPE -- clear_snooping_statistics
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Reset all DHCP related statistics and reason. The snooping binding table is not affected."
::= { snoopingPortConfigEntry 8 }
-- ********************* End of snoopingPortConfigTable ***********************
-- ******************* Begin of pppoeConfigTable *************************
pppoeConfigTable OBJECT-TYPE
SYNTAX SEQUENCE OF PppoeConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table defines the general parameter for PPPoE Intermediate Agent feature."
::= { dhcp 10 }
pppoeConfigEntry OBJECT-TYPE
SYNTAX PppoeConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { pppoeConfigIndex }
::= { pppoeConfigTable 1 }
PppoeConfigEntry ::= SEQUENCE {
pppoeConfigIndex INTEGER,
pppoeConfigVendorId Unsigned32,
pppoeConfigRemoteIdSource INTEGER ,
pppoeConfigCustomRemoteId DisplayString,
pppoeConfigCircuitIdSource INTEGER
}
pppoeConfigIndex OBJECT-TYPE
SYNTAX INTEGER (0)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { pppoeConfigEntry 1 }
pppoeConfigVendorId OBJECT-TYPE -- vendor_id
SYNTAX Unsigned32
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Vendor identification that this device adds to a PPPoE request before forwarding it to the server."
::= { pppoeConfigEntry 2 }
pppoeConfigRemoteIdSource OBJECT-TYPE -- remote_id_source
SYNTAX INTEGER
{
hostname (0),
macAddress (1),
sysName (2),
userDefined (3),
portAlias (4)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"The remote id identifies the client that requests a PPPoE connection."
::= { pppoeConfigEntry 3 }
pppoeConfigCustomRemoteId OBJECT-TYPE -- custom_remote_id
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This field is only used in a PPPoE request when the remote_id_source is set to USER_DEFINED."
::= { pppoeConfigEntry 4 }
pppoeConfigCircuitIdSource OBJECT-TYPE -- circuit_id_source
SYNTAX INTEGER
{
snmpPortId (0),
slotPortId (1),
portAlias (2),
ipSlotPortVlan (3)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This field defines how the port on which a PPPoE request comes in is identified."
::= { pppoeConfigEntry 5 }
-- ********************* End of pppoeConfigTable ***********************
-- ******************* Begin of pppoePortConfigTable *************************
pppoePortConfigTable OBJECT-TYPE
SYNTAX SEQUENCE OF PppoePortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table permits port specific enable of the PPPoE Intermediate Agent feature."
::= { dhcp 11 }
pppoePortConfigEntry OBJECT-TYPE
SYNTAX PppoePortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { pppoePortConfigPortIndex }
::= { pppoePortConfigTable 1 }
PppoePortConfigEntry ::= SEQUENCE {
pppoePortConfigPortIndex INTEGER,
pppoePortConfigEnablePppoeSnooping INTEGER
}
pppoePortConfigPortIndex OBJECT-TYPE
SYNTAX INTEGER (0..31)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { pppoePortConfigEntry 1 }
pppoePortConfigEnablePppoeSnooping OBJECT-TYPE -- enable_pppoe_snooping
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Enables PPPoE intermediate agent function also known as PPPoE Snooping for this port. Also observe the general enable parameter for PPPoE."
::= { pppoePortConfigEntry 2 }
-- ********************* End of pppoePortConfigTable ***********************
-- ******************* Begin of arpInspectionPortConfigTable *************************
arpInspectionPortConfigTable OBJECT-TYPE
SYNTAX SEQUENCE OF ArpInspectionPortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table defines the parameter for Dynamic ARP Inspection per port. These features should generally be used with untrusted ports."
::= { dhcp 12 }
arpInspectionPortConfigEntry OBJECT-TYPE
SYNTAX ArpInspectionPortConfigEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { arpInspectionPortConfigPortIndex }
::= { arpInspectionPortConfigTable 1 }
ArpInspectionPortConfigEntry ::= SEQUENCE {
arpInspectionPortConfigPortIndex INTEGER,
arpInspectionPortConfigEnableArpInspection INTEGER ,
arpInspectionPortConfigArpRateLimiting Integer32 ,
arpInspectionPortConfigInspectionDatabase INTEGER ,
arpInspectionPortConfigArpAclName DisplayString,
arpInspectionPortConfigAclDefaultLogic INTEGER ,
arpInspectionPortConfigSourceMacValidation INTEGER ,
arpInspectionPortConfigDestMacValidation INTEGER ,
arpInspectionPortConfigIpRangeValidation INTEGER
}
arpInspectionPortConfigPortIndex OBJECT-TYPE
SYNTAX INTEGER (0..31)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { arpInspectionPortConfigEntry 1 }
arpInspectionPortConfigEnableArpInspection OBJECT-TYPE -- enable_arp_inspection
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Generally enables Dynamic ARP Inspection. The details need to be configured per VLAN in separate table. This feature helps preventing from man-in-the-middle attacks to the network."
::= { arpInspectionPortConfigEntry 2 }
arpInspectionPortConfigArpRateLimiting OBJECT-TYPE -- arp_rate_limiting
SYNTAX Integer32 (0..255)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines how many ARP request are accepted per second. When the limit is reached, a DOS attack is assumed and the port is shut down. The value 0 disables the rate limit check."
::= { arpInspectionPortConfigEntry 3 }
arpInspectionPortConfigInspectionDatabase OBJECT-TYPE -- inspection_database
SYNTAX INTEGER
{
none (0),
dhcp (1),
arpAcl (2),
both (3)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"When set to another value than NONE, the MAC-IP relationship of the incoming ARPs is verified against the selected table. This ensures that only valid MACs enter the network."
::= { arpInspectionPortConfigEntry 4 }
arpInspectionPortConfigArpAclName OBJECT-TYPE -- arp_acl_name
SYNTAX DisplayString
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Name of the ACL (access control list) which declares which IP/MAC relations are acceptible. Note: ACLs are configured under Management.ACL. Several ACL may be specified with a comma separated list. Example acl1, otherlist"
::= { arpInspectionPortConfigEntry 5 }
arpInspectionPortConfigAclDefaultLogic OBJECT-TYPE -- acl_default_logic
SYNTAX INTEGER
{
deny (0),
permit (1)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Defines which action is taken when none of the ACL records matches. Default is deny which blocks the ARP."
::= { arpInspectionPortConfigEntry 6 }
arpInspectionPortConfigSourceMacValidation OBJECT-TYPE -- source_mac_validation
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. Packets with different MAC addresses are dropped."
::= { arpInspectionPortConfigEntry 7 }
arpInspectionPortConfigDestMacValidation OBJECT-TYPE -- dest_mac_validation
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Checks the destination MAC address in the Ethernet header against the target MAC address in ARP body. This check is performed for ARP responses. Packets with different MAC addresses are dropped."
::= { arpInspectionPortConfigEntry 8 }
arpInspectionPortConfigIpRangeValidation OBJECT-TYPE -- ip_range_validation
SYNTAX INTEGER { disabled(0), enabled(1) }
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"Checks ARP for invalid addresses. Invalid addresses include 0.0.0.0, 255.255.255.255, and all IP multicast and loopback addresses. Sender IP addresses are checked in all ARP requests and responses, and target IP addresses are checked only in ARP responses."
::= { arpInspectionPortConfigEntry 9 }
-- ********************* End of arpInspectionPortConfigTable ***********************
-- ****************************** STATUS SECTION ********************************
-- ******************* Begin of snoopingStatisticsTable *************************
snoopingStatisticsTable OBJECT-TYPE
SYNTAX SEQUENCE OF SnoopingStatisticsEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Statistics indicating activity of DHCP snooping."
::= { dhcp 100 }
snoopingStatisticsEntry OBJECT-TYPE
SYNTAX SnoopingStatisticsEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { snoopingStatisticsPortIndex }
::= { snoopingStatisticsTable 1 }
SnoopingStatisticsEntry ::= SEQUENCE {
snoopingStatisticsPortIndex INTEGER,
snoopingStatisticsTrustMode INTEGER ,
snoopingStatisticsNumberOfDhcpProcessed Unsigned32,
snoopingStatisticsNumberOfDhcpDropped Unsigned32,
snoopingStatisticsLastDropReason INTEGER
}
snoopingStatisticsPortIndex OBJECT-TYPE
SYNTAX INTEGER (0..31)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { snoopingStatisticsEntry 1 }
snoopingStatisticsTrustMode OBJECT-TYPE -- trust_mode
SYNTAX INTEGER
{
undecided (0),
untrusted (1),
trusted (2)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Reflects the determined trust mode."
::= { snoopingStatisticsEntry 2 }
snoopingStatisticsNumberOfDhcpProcessed OBJECT-TYPE -- number_of_dhcp_processed
SYNTAX Unsigned32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Counts the number of dhcp messages processed."
::= { snoopingStatisticsEntry 3 }
snoopingStatisticsNumberOfDhcpDropped OBJECT-TYPE -- number_of_dhcp_dropped
SYNTAX Unsigned32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Counts the number of dhcp messages dropped."
::= { snoopingStatisticsEntry 4 }
snoopingStatisticsLastDropReason OBJECT-TYPE -- last_drop_reason
SYNTAX INTEGER
{
ok (0),
illegalDhcpServer (1),
dhcpServerSpoofed (2),
illegalRelayAgent (3),
bindingMismatch (4),
flooding (5)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
""
::= { snoopingStatisticsEntry 5 }
-- ********************* End of snoopingStatisticsTable ***********************
-- ******************* Begin of snoopingTableTable *************************
snoopingTableTable OBJECT-TYPE
SYNTAX SEQUENCE OF SnoopingTableEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This table lists the MAC-IP bindings of the untrusted ports (only) as discovered through DHCP snooping."
::= { dhcp 101 }
snoopingTableEntry OBJECT-TYPE
SYNTAX SnoopingTableEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
""
INDEX { snoopingTableIndex }
::= { snoopingTableTable 1 }
SnoopingTableEntry ::= SEQUENCE {
snoopingTableIndex INTEGER,
snoopingTableMac MacAddress,
snoopingTableIp OCTET STRING ,
snoopingTablePort Integer32 ,
snoopingTableVlan Integer32 ,
snoopingTableLastUpdated DisplayString,
snoopingTableLastUpdatedEpoch Unsigned32,
snoopingTableLeaseTime Counter32
}
snoopingTableIndex OBJECT-TYPE
SYNTAX INTEGER (0..255)
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Automatically generated"
::= { snoopingTableEntry 1 }
snoopingTableMac OBJECT-TYPE -- mac
SYNTAX MacAddress
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"MAC address entry"
::= { snoopingTableEntry 2 }
snoopingTableIp OBJECT-TYPE -- ip
SYNTAX OCTET STRING (SIZE (0..20))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"IP address associated with this MAC."
::= { snoopingTableEntry 3 }
snoopingTablePort OBJECT-TYPE -- port
SYNTAX Integer32 (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Port number for MAC address"
::= { snoopingTableEntry 4 }
snoopingTableVlan OBJECT-TYPE -- vlan
SYNTAX Integer32 (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"if non zero this MAC is part of this VLAN."
::= { snoopingTableEntry 5 }
snoopingTableLastUpdated OBJECT-TYPE -- last_updated
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Time stamp when this record was written"
::= { snoopingTableEntry 6 }
snoopingTableLastUpdatedEpoch OBJECT-TYPE -- last_updated_epoch
SYNTAX Unsigned32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Time stamp in alternate format"
::= { snoopingTableEntry 7 }
snoopingTableLeaseTime OBJECT-TYPE -- lease_time
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Lease time as reported by DHCP server"
::= { snoopingTableEntry 8 }
-- ********************* End of snoopingTableTable ***********************
END