This object is used to control whether the repeater
will allow completion of training by end-nodes using
null MAC addresses. The 802.12 standard is written
to disallow such training. However, some end-nodes
may use this configuration at power-up before any
software is loaded. If so, the user may see frequent
training occurring on the repeater because of this.
In addition, some end-node applications may not work
when initial training fails due to the locking out of
null MAC addresses.
The default setting of this object is to allow null
MAC addresses to train. This is recommended for most
situations, despite the fact that it contradicts the
802.12 standard.
For repeaters that have First Learned address
security on this hub, disallowing null-address
training provides the most extensive security until
the ports' authorized addresses are learned.
However, if this creates problems for the end-node
applications, it may be necessary to instead
explicitly assign the ports' authorized addresses
and configure this object to allow null-address
training.
Parsed from file hpicfVgRptr.mib.txt
Company: None
Module: HP-ICF-VG-RPTR
This object is used to control whether the repeater
will allow completion of training by end-nodes using
null MAC addresses. The 802.12 standard is written
to disallow such training. However, some end-nodes
may use this configuration at power-up before any
software is loaded. If so, the user may see frequent
training occurring on the repeater because of this.
In addition, some end-node applications may not work
when initial training fails due to the locking out of
null MAC addresses.
The default setting of this object is to allow null
MAC addresses to train. This is recommended for most
situations, despite the fact that it contradicts the
802.12 standard.
For repeaters that have First Learned address
security on this hub, disallowing null-address
training provides the most extensive security until
the ports' authorized addresses are learned.
However, if this creates problems for the end-node
applications, it may be necessary to instead
explicitly assign the ports' authorized addresses
and configure this object to allow null-address
training.
Parsed from file HP-ICF-VG-RPTR.mib
Module: HP-ICF-VG-RPTR
Vendor: Hewlett-Packard
Module: HP-ICF-VG-RPTR
[Automatically extracted from oidview.com]
hpVgNullAddrTraining OBJECT-TYPE SYNTAX INTEGER { preventNullAddr(1), allowNullAddr(2) } MAX-ACCESS read-write STATUS current DESCRIPTION "This object is used to control whether the repeater will allow completion of training by end-nodes using null MAC addresses. The 802.12 standard is written to disallow such training. However, some end-nodes may use this configuration at power-up before any software is loaded. If so, the user may see frequent training occurring on the repeater because of this. In addition, some end-node applications may not work when initial training fails due to the locking out of null MAC addresses. The default setting of this object is to allow null MAC addresses to train. This is recommended for most situations, despite the fact that it contradicts the 802.12 standard. For repeaters that have First Learned address security on this hub, disallowing null-address training provides the most extensive security until the ports' authorized addresses are learned. However, if this creates problems for the end-node applications, it may be necessary to instead explicitly assign the ports' authorized addresses and configure this object to allow null-address training." ::= { hpVgBasicGlobal 4 }
hpVgNullAddrTraining OBJECT-TYPE SYNTAX INTEGER { preventNullAddr(1), allowNullAddr(2) } MAX-ACCESS read-write STATUS current DESCRIPTION "This object is used to control whether the repeater will allow completion of training by end-nodes using null MAC addresses. The 802.12 standard is written to disallow such training. However, some end-nodes may use this configuration at power-up before any software is loaded. If so, the user may see frequent training occurring on the repeater because of this. In addition, some end-node applications may not work when initial training fails due to the locking out of null MAC addresses. The default setting of this object is to allow null MAC addresses to train. This is recommended for most situations, despite the fact that it contradicts the 802.12 standard. For repeaters that have First Learned address security on this hub, disallowing null-address training provides the most extensive security until the ports' authorized addresses are learned. However, if this creates problems for the end-node applications, it may be necessary to instead explicitly assign the ports' authorized addresses and configure this object to allow null-address training." ::= { hpVgBasicGlobal 4 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.11.2.14.11.3.1.1.4.0 | hpVgNullAddrTraining | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.11.2.14.11.3.1.1.1 | hpVgEntityName | 1 | 1 | The local name of this 100BaseVG repeater. This is the same value as hpicfEntityName in the case where there is Distributed Mana… |
1.3.6.1.4.1.11.2.14.11.3.1.1.2 | hpVgRedundantUpLinksFlag | 1 | 1 | This object is used to indicate that the hub is configured with redundant uplink ports. |
1.3.6.1.4.1.11.2.14.11.3.1.1.3 | hpVgXcvrTable | 1 | 8 | A table containing information about transceivers. All uplink, downlink, and redundent links are represented in this table |