mibs/MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB
2023-12-05 12:25:34 +01:00

394 lines
13 KiB
Plaintext

JUNIPER-SECURE-ACCESS-PORT-MIB DEFINITIONS ::= BEGIN
IMPORTS
MODULE-IDENTITY, OBJECT-TYPE, Unsigned32,
NOTIFICATION-TYPE, Integer32
FROM SNMPv2-SMI
TruthValue, TEXTUAL-CONVENTION, DisplayString
FROM SNMPv2-TC
ifIndex
FROM IF-MIB
jnxExSecureAccessPort
FROM JUNIPER-EX-SMI;
jnxExSecureAccessPortMIB MODULE-IDENTITY
LAST-UPDATED "200705151000Z"
ORGANIZATION "Juniper Networks, Inc."
CONTACT-INFO
" Juniper Technical Assistance Center
Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
E-mail: support@juniper.net"
DESCRIPTION
"This is Juniper Networks' implementation of enterprise specific
MIB for configuration of Secure Access Port feature. DHCP Snooping
and Dynamic ARP Inspection are mechanisms to provide per interface
security capabilities. This MIB Module is also used to control
some layer 2 functions like MAC limiting. It also supports
IP Source Guard, Mac Source Guard and Storm Control features."
::= { jnxExSecureAccessPort 1 }
jnxSecAccessPortMIBNotifications
OBJECT IDENTIFIER ::= { jnxExSecureAccessPortMIB 0 }
jnxSecAccessPortMIBObjects
OBJECT IDENTIFIER ::= { jnxExSecureAccessPortMIB 1 }
-- TEXTUAL-CONVENTION
JnxMacLimitExceededAction ::= TEXTUAL-CONVENTION
STATUS current
DESCRIPTION
"One of the following action will be taken by the system
on an interface, when the system detects the current learned
number of MAC addresses in the forwarding table has exceeded
the limit number of MAC address.
none : No action will be taken. It means Mac limit is not
enabled in the specified interface.
drop : The notification will be generated when MAC limit is
exceeded and also the MAC limit is enforced for the interface.
The new address will not be learned in the entity and also the
traffic with new address will not be flooded in the entity.
The learning will be re-enabled in the interface if the number
of MAC addresses falls below the limit.
alarm : A notification will be generated if the Mac Limit is
exceeded.
shutdown : The notification will be generated as the Mac Limit is
exceeded. The interface will be moved to blocked state, no traffic
will be allowed in the entity. The traffic will be re-enabled in
the interface if the number of MAC addresses falls below the limit."
SYNTAX INTEGER {
none (1),
drop (2),
alarm (3),
shutdown (4)
}
-- The Port Security Table for Vlan
jnxSecAccessPortVlanTable OBJECT-TYPE
SYNTAX SEQUENCE OF JnxSecAccessPortVlanEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"A table provides the mechanism to control DHCP Snooping
and Dynamic ARP Inspection per VLAN. When a VLAN is created
in a device supporting this table, a corresponding entry will
be added to this table."
::= { jnxSecAccessPortMIBObjects 1 }
jnxSecAccessPortVlanEntry OBJECT-TYPE
SYNTAX JnxSecAccessPortVlanEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"A row instance contains whether DHCP Snooping and Dynamic
ARP Inspection at each existing VLAN is enabled or disabled."
INDEX { jnxSecAccessVlanName }
::= { jnxSecAccessPortVlanTable 1 }
JnxSecAccessPortVlanEntry ::= SEQUENCE {
jnxSecAccessVlanName DisplayString,
jnxSecAccessVlanDhcpSnoopStatus TruthValue,
jnxSecAccessVlanDAIStatus TruthValue
}
jnxSecAccessVlanName OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..255))
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object indicates the VLAN name on which Dhcp Snooping
feature and Dynamic ARP Inspection is enabled."
::= { jnxSecAccessPortVlanEntry 1 }
jnxSecAccessVlanDhcpSnoopStatus OBJECT-TYPE
SYNTAX TruthValue
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates whether Dhcp Snooping is
enabled in this VLAN.
If this object is 'true', Dhcp Snooping is enabled in the
specified VLAN.
If this object is 'false', Dhcp Snooping is disabled in the
specified VLAN."
::= { jnxSecAccessPortVlanEntry 2 }
jnxSecAccessVlanDAIStatus OBJECT-TYPE
SYNTAX TruthValue
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates whether Dynamic ARP Inspection is
enabled in this VLAN.
If this object is 'true', Dynamic ARP Inspection is enabled.
If this object is 'false', Dynamic ARP Inspection is disabled."
::= { jnxSecAccessPortVlanEntry 3 }
-- The Port Security Table for Interface
jnxSecAccessPortIfTable OBJECT-TYPE
SYNTAX SEQUENCE OF JnxSecAccessPortIfEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"The table contains the trust state and rate limit of each interface
for DHCP Snooping purpose. The table also contains information on MAC
address limit feature for each interface capable of this feature.
This table also specifies whether IP source guard and MAC source
guard are enabled on each interface."
::= { jnxSecAccessPortMIBObjects 2 }
jnxSecAccessPortIfEntry OBJECT-TYPE
SYNTAX JnxSecAccessPortIfEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"A table entry contains the trust state and rate limit of an
interface, MAC address limit for that Interface. It also contains
the action to be undertaken if MAC address limit is exceeded. A table
entry specifies whether IP source guard and MAC source guard are enabled
on the specified interface."
INDEX { ifIndex }
::= { jnxSecAccessPortIfTable 1 }
JnxSecAccessPortIfEntry ::=
SEQUENCE {
jnxSecAccessdsIfTrustState TruthValue,
jnxSecAccessdsIfRateLimit Unsigned32,
jnxSecAccessIfMacLimit Unsigned32,
jnxSecAccessIfMacLimitExceed JnxMacLimitExceededAction,
jnxSecAccessIfIpSrcGuardStatus TruthValue,
jnxSecAccessIfMacSrcGuardStatus TruthValue
}
jnxSecAccessdsIfTrustState OBJECT-TYPE
SYNTAX TruthValue
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates whether the interface is trusted for
DHCP Snooping purpose.
If this object is 'true', the interface is trusted.
DHCP packets coming to this interface will be forwarded without
checking.
If this object is 'false', the interface is not trusted. DHCP
packets coming to this interface will be subjected to DHCP checks."
::= { jnxSecAccessPortIfEntry 1 }
jnxSecAccessdsIfRateLimit OBJECT-TYPE
SYNTAX Unsigned32
UNITS "packets per second"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates rate limit value for DHCP Snooping purpose.
If the value of this object is 0, no rate limit is applied for DHCP
traffic at this interface."
::= { jnxSecAccessPortIfEntry 2 }
jnxSecAccessIfMacLimit OBJECT-TYPE
SYNTAX Unsigned32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the threshold limit for the number of
MAC address entries on this interface.
When the instance value of this object is set to 0, no threshold
limit will be applied for this interfacew and the
corresponding instance value of jnxIfMacLimitExceedAction
of the same row has no effect."
DEFVAL { 5 }
::= { jnxSecAccessPortIfEntry 3 }
jnxSecAccessIfMacLimitExceed OBJECT-TYPE
SYNTAX JnxMacLimitExceededAction
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the action to be taken by the system for this
interface while the number of MAC addresses has exceeded the value
of jnxIfMacLimit.
This object value is only effective when the corresponding instance
value of jnxIfMacLimit is not set to 0."
::= { jnxSecAccessPortIfEntry 4 }
jnxSecAccessIfIpSrcGuardStatus OBJECT-TYPE
SYNTAX TruthValue
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates whether IP Source Guard is enabled on
the specified interface.
If this object is 'true', then IP Source Guard is enabled on the
specified interface.
If this object is 'false', then IP Source Guard is disabled on
the specified interface."
::= { jnxSecAccessPortIfEntry 5 }
jnxSecAccessIfMacSrcGuardStatus OBJECT-TYPE
SYNTAX TruthValue
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object indicates whether Mac Source Guard is enabled on
the specified interface.
If this object is 'true', then Mac Source Guard is enabled on the
specified interface.
If this object is 'false', then IP Source Guard is disabled on
the specified interface."
::= { jnxSecAccessPortIfEntry 6 }
-- Storm Control Table
jnxStormCtlTable OBJECT-TYPE
SYNTAX SEQUENCE OF JnxStormCtlEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Storm control monitors each type of traffic level on an interface.
If traffic level exceeds the threshold value(rising threshold),
switch will drop all packets of that type until traffic level drops
to the threshold level (falling threshold). If traffic rate for a
particular type exceeds the rising threshold, action will be taken
to shutdown or add configured filter on the port.
This table describes the traffic type for each interface, the rising
threshold, falling threshold and the action to be taken if the traffic
exceeds the rising threshold."
::= { jnxSecAccessPortMIBObjects 3 }
jnxStormCtlEntry OBJECT-TYPE
SYNTAX JnxStormCtlEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"An entry contains the interface index,traffic type for the interface,
the rising threshold, falling threshold and the action to be taken
if the traffic exceeds the rising threshold."
INDEX {ifIndex, jnxStormCtlIfTrafficType }
::= { jnxStormCtlTable 1 }
JnxStormCtlEntry ::= SEQUENCE {
jnxStormCtlIfTrafficType INTEGER,
jnxStormCtlRisingThreshold Integer32,
jnxStormCtlFallingThreshold Integer32,
jnxStormCtlAction INTEGER
}
jnxStormCtlIfTrafficType OBJECT-TYPE
SYNTAX INTEGER {
broadcast(1),
multicast(2),
unicast (3)
}
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"This object specifies the traffic type on the particular
interface. Value 1 specifies that it is broadcast traffic,
value 2 specifies that it is multicast traffic and
value 3 specifies that it is unicast traffic."
::= { jnxStormCtlEntry 1 }
jnxStormCtlRisingThreshold OBJECT-TYPE
SYNTAX Integer32
UNITS "packets per second"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the rising threshold value in packets
per second. The storm control action is occurs when the traffic
exceeds this threshold value."
::= { jnxStormCtlEntry 2 }
jnxStormCtlFallingThreshold OBJECT-TYPE
SYNTAX Integer32
UNITS "packets per second"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the falling threshold value in packets
per second. The storm control action ceases when the traffic
drops to this threshold value."
::= { jnxStormCtlEntry 3 }
jnxStormCtlAction OBJECT-TYPE
SYNTAX INTEGER {
shutdown(1),
filter (2)
}
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"This object specifies the action to be taken, when traffic exceeds
rising threshold value. Value 1 specifies that the action taken is
to shutdown the port. Value 2 specifies that the action taken is to
apply a policy filter on the interface for the given packet type.
Default is to shutdown(1) the port."
DEFVAL { 1 }
::= { jnxStormCtlEntry 4 }
-- Definition of DHCP Snooping notifications
jnxSecAccessdsRateLimitCrossed NOTIFICATION-TYPE
OBJECTS { jnxSecAccessdsIfRateLimit }
STATUS current
DESCRIPTION
"A jnxdsRateLimitCrossed notification is generated when
the number of DHCP packets from an untrusted interface exceeds
jnxSecAccessdsIfRateLimit."
::= { jnxSecAccessPortMIBNotifications 1 }
-- Definition of MAC Limit Exceeded Notification
jnxSecAccessIfMacLimitExceeded NOTIFICATION-TYPE
OBJECTS { jnxSecAccessIfMacLimit, jnxSecAccessIfMacLimitExceed }
STATUS current
DESCRIPTION
"Notification is sent when the number of MAC addresses learnt by
the interface has crossed the limit of MAC addresses(jnxSecAccessIfMacLimit)
and if MAC Limit Exceeded Action(jnxSecAccessIfMacLimitExceed) is
drop or alarm or shutdown."
::= { jnxSecAccessPortMIBNotifications 2 }
-- Definition of Storm Event Notification
jnxStormEventNotification NOTIFICATION-TYPE
OBJECTS { jnxStormCtlRisingThreshold }
STATUS current
DESCRIPTION
"Notification is sent when the traffic in the interface exceeds
rising threshold(jnxStormCtlRisingThreshold)."
::= { jnxSecAccessPortMIBNotifications 3 }
END