summaryrefslogtreecommitdiff
path: root/MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB
diff options
context:
space:
mode:
authorDavid Leutgeb <david.leutgeb@mannundmouse.com>2023-12-05 12:25:34 +0100
committerDavid Leutgeb <david.leutgeb@mannundmouse.com>2023-12-05 12:25:34 +0100
commit98a672123c7872f6b9b75a9a2b6bb3aea504de6a (patch)
tree9b13bd7f563c3198047bd359195327cf28b3caf0 /MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB
downloadmibs-98a672123c7872f6b9b75a9a2b6bb3aea504de6a.tar.gz
mibs-98a672123c7872f6b9b75a9a2b6bb3aea504de6a.zip
Initial commitHEADmain
Diffstat (limited to 'MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB')
-rw-r--r--MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB393
1 files changed, 393 insertions, 0 deletions
diff --git a/MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB b/MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB
new file mode 100644
index 0000000..ccc0bc4
--- /dev/null
+++ b/MIBS/junos/JUNIPER-SECURE-ACCESS-PORT-MIB
@@ -0,0 +1,393 @@
+JUNIPER-SECURE-ACCESS-PORT-MIB DEFINITIONS ::= BEGIN
+
+IMPORTS
+ MODULE-IDENTITY, OBJECT-TYPE, Unsigned32,
+ NOTIFICATION-TYPE, Integer32
+ FROM SNMPv2-SMI
+
+ TruthValue, TEXTUAL-CONVENTION, DisplayString
+ FROM SNMPv2-TC
+
+ ifIndex
+ FROM IF-MIB
+
+ jnxExSecureAccessPort
+ FROM JUNIPER-EX-SMI;
+
+jnxExSecureAccessPortMIB MODULE-IDENTITY
+ LAST-UPDATED "200705151000Z"
+ ORGANIZATION "Juniper Networks, Inc."
+ CONTACT-INFO
+ " Juniper Technical Assistance Center
+ Juniper Networks, Inc.
+ 1133 Innovation Way
+ Sunnyvale, CA 94089
+ E-mail: support@juniper.net"
+
+ DESCRIPTION
+ "This is Juniper Networks' implementation of enterprise specific
+ MIB for configuration of Secure Access Port feature. DHCP Snooping
+ and Dynamic ARP Inspection are mechanisms to provide per interface
+ security capabilities. This MIB Module is also used to control
+ some layer 2 functions like MAC limiting. It also supports
+ IP Source Guard, Mac Source Guard and Storm Control features."
+ ::= { jnxExSecureAccessPort 1 }
+
+
+jnxSecAccessPortMIBNotifications
+ OBJECT IDENTIFIER ::= { jnxExSecureAccessPortMIB 0 }
+jnxSecAccessPortMIBObjects
+ OBJECT IDENTIFIER ::= { jnxExSecureAccessPortMIB 1 }
+
+-- TEXTUAL-CONVENTION
+
+JnxMacLimitExceededAction ::= TEXTUAL-CONVENTION
+ STATUS current
+ DESCRIPTION
+ "One of the following action will be taken by the system
+ on an interface, when the system detects the current learned
+ number of MAC addresses in the forwarding table has exceeded
+ the limit number of MAC address.
+
+ none : No action will be taken. It means Mac limit is not
+ enabled in the specified interface.
+
+ drop : The notification will be generated when MAC limit is
+ exceeded and also the MAC limit is enforced for the interface.
+ The new address will not be learned in the entity and also the
+ traffic with new address will not be flooded in the entity.
+ The learning will be re-enabled in the interface if the number
+ of MAC addresses falls below the limit.
+
+ alarm : A notification will be generated if the Mac Limit is
+ exceeded.
+
+ shutdown : The notification will be generated as the Mac Limit is
+ exceeded. The interface will be moved to blocked state, no traffic
+ will be allowed in the entity. The traffic will be re-enabled in
+ the interface if the number of MAC addresses falls below the limit."
+ SYNTAX INTEGER {
+ none (1),
+ drop (2),
+ alarm (3),
+ shutdown (4)
+ }
+
+-- The Port Security Table for Vlan
+
+jnxSecAccessPortVlanTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF JnxSecAccessPortVlanEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A table provides the mechanism to control DHCP Snooping
+ and Dynamic ARP Inspection per VLAN. When a VLAN is created
+ in a device supporting this table, a corresponding entry will
+ be added to this table."
+ ::= { jnxSecAccessPortMIBObjects 1 }
+
+jnxSecAccessPortVlanEntry OBJECT-TYPE
+ SYNTAX JnxSecAccessPortVlanEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A row instance contains whether DHCP Snooping and Dynamic
+ ARP Inspection at each existing VLAN is enabled or disabled."
+ INDEX { jnxSecAccessVlanName }
+ ::= { jnxSecAccessPortVlanTable 1 }
+
+JnxSecAccessPortVlanEntry ::= SEQUENCE {
+ jnxSecAccessVlanName DisplayString,
+ jnxSecAccessVlanDhcpSnoopStatus TruthValue,
+ jnxSecAccessVlanDAIStatus TruthValue
+ }
+
+jnxSecAccessVlanName OBJECT-TYPE
+ SYNTAX DisplayString (SIZE(0..255))
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "This object indicates the VLAN name on which Dhcp Snooping
+ feature and Dynamic ARP Inspection is enabled."
+ ::= { jnxSecAccessPortVlanEntry 1 }
+
+jnxSecAccessVlanDhcpSnoopStatus OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object indicates whether Dhcp Snooping is
+ enabled in this VLAN.
+
+ If this object is 'true', Dhcp Snooping is enabled in the
+ specified VLAN.
+
+ If this object is 'false', Dhcp Snooping is disabled in the
+ specified VLAN."
+ ::= { jnxSecAccessPortVlanEntry 2 }
+
+jnxSecAccessVlanDAIStatus OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object indicates whether Dynamic ARP Inspection is
+ enabled in this VLAN.
+
+ If this object is 'true', Dynamic ARP Inspection is enabled.
+
+ If this object is 'false', Dynamic ARP Inspection is disabled."
+ ::= { jnxSecAccessPortVlanEntry 3 }
+
+
+-- The Port Security Table for Interface
+
+jnxSecAccessPortIfTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF JnxSecAccessPortIfEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The table contains the trust state and rate limit of each interface
+ for DHCP Snooping purpose. The table also contains information on MAC
+ address limit feature for each interface capable of this feature.
+ This table also specifies whether IP source guard and MAC source
+ guard are enabled on each interface."
+ ::= { jnxSecAccessPortMIBObjects 2 }
+
+jnxSecAccessPortIfEntry OBJECT-TYPE
+ SYNTAX JnxSecAccessPortIfEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A table entry contains the trust state and rate limit of an
+ interface, MAC address limit for that Interface. It also contains
+ the action to be undertaken if MAC address limit is exceeded. A table
+ entry specifies whether IP source guard and MAC source guard are enabled
+ on the specified interface."
+ INDEX { ifIndex }
+ ::= { jnxSecAccessPortIfTable 1 }
+
+JnxSecAccessPortIfEntry ::=
+ SEQUENCE {
+ jnxSecAccessdsIfTrustState TruthValue,
+ jnxSecAccessdsIfRateLimit Unsigned32,
+ jnxSecAccessIfMacLimit Unsigned32,
+ jnxSecAccessIfMacLimitExceed JnxMacLimitExceededAction,
+ jnxSecAccessIfIpSrcGuardStatus TruthValue,
+ jnxSecAccessIfMacSrcGuardStatus TruthValue
+ }
+
+
+jnxSecAccessdsIfTrustState OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object indicates whether the interface is trusted for
+ DHCP Snooping purpose.
+
+ If this object is 'true', the interface is trusted.
+ DHCP packets coming to this interface will be forwarded without
+ checking.
+
+ If this object is 'false', the interface is not trusted. DHCP
+ packets coming to this interface will be subjected to DHCP checks."
+ ::= { jnxSecAccessPortIfEntry 1 }
+
+jnxSecAccessdsIfRateLimit OBJECT-TYPE
+ SYNTAX Unsigned32
+ UNITS "packets per second"
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object indicates rate limit value for DHCP Snooping purpose.
+ If the value of this object is 0, no rate limit is applied for DHCP
+ traffic at this interface."
+ ::= { jnxSecAccessPortIfEntry 2 }
+
+jnxSecAccessIfMacLimit OBJECT-TYPE
+ SYNTAX Unsigned32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object specifies the threshold limit for the number of
+ MAC address entries on this interface.
+
+ When the instance value of this object is set to 0, no threshold
+ limit will be applied for this interfacew and the
+ corresponding instance value of jnxIfMacLimitExceedAction
+ of the same row has no effect."
+ DEFVAL { 5 }
+ ::= { jnxSecAccessPortIfEntry 3 }
+
+jnxSecAccessIfMacLimitExceed OBJECT-TYPE
+ SYNTAX JnxMacLimitExceededAction
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object specifies the action to be taken by the system for this
+ interface while the number of MAC addresses has exceeded the value
+ of jnxIfMacLimit.
+
+ This object value is only effective when the corresponding instance
+ value of jnxIfMacLimit is not set to 0."
+ ::= { jnxSecAccessPortIfEntry 4 }
+
+jnxSecAccessIfIpSrcGuardStatus OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object indicates whether IP Source Guard is enabled on
+ the specified interface.
+
+ If this object is 'true', then IP Source Guard is enabled on the
+ specified interface.
+
+ If this object is 'false', then IP Source Guard is disabled on
+ the specified interface."
+ ::= { jnxSecAccessPortIfEntry 5 }
+
+jnxSecAccessIfMacSrcGuardStatus OBJECT-TYPE
+ SYNTAX TruthValue
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object indicates whether Mac Source Guard is enabled on
+ the specified interface.
+
+ If this object is 'true', then Mac Source Guard is enabled on the
+ specified interface.
+
+ If this object is 'false', then IP Source Guard is disabled on
+ the specified interface."
+ ::= { jnxSecAccessPortIfEntry 6 }
+
+
+-- Storm Control Table
+
+jnxStormCtlTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF JnxStormCtlEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "Storm control monitors each type of traffic level on an interface.
+ If traffic level exceeds the threshold value(rising threshold),
+ switch will drop all packets of that type until traffic level drops
+ to the threshold level (falling threshold). If traffic rate for a
+ particular type exceeds the rising threshold, action will be taken
+ to shutdown or add configured filter on the port.
+
+ This table describes the traffic type for each interface, the rising
+ threshold, falling threshold and the action to be taken if the traffic
+ exceeds the rising threshold."
+ ::= { jnxSecAccessPortMIBObjects 3 }
+
+jnxStormCtlEntry OBJECT-TYPE
+ SYNTAX JnxStormCtlEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry contains the interface index,traffic type for the interface,
+ the rising threshold, falling threshold and the action to be taken
+ if the traffic exceeds the rising threshold."
+ INDEX {ifIndex, jnxStormCtlIfTrafficType }
+ ::= { jnxStormCtlTable 1 }
+
+JnxStormCtlEntry ::= SEQUENCE {
+ jnxStormCtlIfTrafficType INTEGER,
+ jnxStormCtlRisingThreshold Integer32,
+ jnxStormCtlFallingThreshold Integer32,
+ jnxStormCtlAction INTEGER
+ }
+
+jnxStormCtlIfTrafficType OBJECT-TYPE
+ SYNTAX INTEGER {
+ broadcast(1),
+ multicast(2),
+ unicast (3)
+ }
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "This object specifies the traffic type on the particular
+ interface. Value 1 specifies that it is broadcast traffic,
+ value 2 specifies that it is multicast traffic and
+ value 3 specifies that it is unicast traffic."
+ ::= { jnxStormCtlEntry 1 }
+
+jnxStormCtlRisingThreshold OBJECT-TYPE
+ SYNTAX Integer32
+ UNITS "packets per second"
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object specifies the rising threshold value in packets
+ per second. The storm control action is occurs when the traffic
+ exceeds this threshold value."
+ ::= { jnxStormCtlEntry 2 }
+
+jnxStormCtlFallingThreshold OBJECT-TYPE
+ SYNTAX Integer32
+ UNITS "packets per second"
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object specifies the falling threshold value in packets
+ per second. The storm control action ceases when the traffic
+ drops to this threshold value."
+ ::= { jnxStormCtlEntry 3 }
+
+jnxStormCtlAction OBJECT-TYPE
+ SYNTAX INTEGER {
+ shutdown(1),
+ filter (2)
+ }
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "This object specifies the action to be taken, when traffic exceeds
+ rising threshold value. Value 1 specifies that the action taken is
+ to shutdown the port. Value 2 specifies that the action taken is to
+ apply a policy filter on the interface for the given packet type.
+ Default is to shutdown(1) the port."
+ DEFVAL { 1 }
+ ::= { jnxStormCtlEntry 4 }
+
+
+ -- Definition of DHCP Snooping notifications
+
+jnxSecAccessdsRateLimitCrossed NOTIFICATION-TYPE
+ OBJECTS { jnxSecAccessdsIfRateLimit }
+ STATUS current
+ DESCRIPTION
+ "A jnxdsRateLimitCrossed notification is generated when
+ the number of DHCP packets from an untrusted interface exceeds
+ jnxSecAccessdsIfRateLimit."
+ ::= { jnxSecAccessPortMIBNotifications 1 }
+
+-- Definition of MAC Limit Exceeded Notification
+
+jnxSecAccessIfMacLimitExceeded NOTIFICATION-TYPE
+ OBJECTS { jnxSecAccessIfMacLimit, jnxSecAccessIfMacLimitExceed }
+ STATUS current
+ DESCRIPTION
+ "Notification is sent when the number of MAC addresses learnt by
+ the interface has crossed the limit of MAC addresses(jnxSecAccessIfMacLimit)
+ and if MAC Limit Exceeded Action(jnxSecAccessIfMacLimitExceed) is
+ drop or alarm or shutdown."
+ ::= { jnxSecAccessPortMIBNotifications 2 }
+
+-- Definition of Storm Event Notification
+
+jnxStormEventNotification NOTIFICATION-TYPE
+ OBJECTS { jnxStormCtlRisingThreshold }
+ STATUS current
+ DESCRIPTION
+ "Notification is sent when the traffic in the interface exceeds
+ rising threshold(jnxStormCtlRisingThreshold)."
+ ::= { jnxSecAccessPortMIBNotifications 3 }
+END
+
+
+