Reference record for OID 1.3.6.1.4.1.1795.2.24.2.8.5.1.2



parent
1.3.6.1.4.1.1795.2.24.2.8.5.1 (newSecurityMgrEntry)
node code
2
node name
newSecurityMgrAccess
dot oid
1.3.6.1.4.1.1795.2.24.2.8.5.1.2
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) pdyn(1795) pdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) pdyn(1795) thenewpdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • ...skipped...
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) thenewpdn(1795) pdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) thenewpdn(1795) thenewpdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) pdyn(1795) pdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) pdyn(1795) thenewpdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • ...skipped...
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) thenewpdn(1795) pdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) thenewpdn(1795) thenewpdn-mgmt(2) paradyne(24) pdn-common(2) pdn-security(8) newSecurityMgrTable(5) newSecurityMgrEntry(1) newSecurityMgrAccess(2)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/pdyn/pdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • /iso/identified-organization/dod/internet/private/enterprise/pdyn/thenewpdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • ...skipped...
  • /iso/org/dod/internet/private/enterprise/thenewpdn/pdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • /iso/org/dod/internet/private/enterprise/thenewpdn/thenewpdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • /iso/org/dod/internet/private/enterprises/pdyn/pdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • /iso/org/dod/internet/private/enterprises/pdyn/thenewpdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • ...skipped...
  • /iso/iso-identified-organization/dod/internet/private/enterprises/thenewpdn/pdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • /iso/iso-identified-organization/dod/internet/private/enterprises/thenewpdn/thenewpdn-mgmt/paradyne/pdn-common/pdn-security/newSecurityMgrTable/newSecurityMgrEntry/newSecurityMgrAccess
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/1795/2/24/2/8/5/1/2

    Description by mibdepot

    This field is used to specify the access allowed for an authorized
    NMS when Manager Validation is performed.
    If the IP address for the NMS sending an SNMP message is on the list
    of allowed managers, this option along with the Community Name access
    determine the type of access allowed for the that manager.

    When ever a new Security Manager is added or an existing
    Security Manager's IP Address is modified, the newSecurityMgrAccess
    object is set to the default value of read (1).
    If the index for this object is not in the existing table and if there
    is room in the table then the index will be used to create a new
    Security Manager and will be given the requested access level.
    In addition changing an existing access permission to noAccess
    invalidates the corresponding row of this table. It is upto
    the implementation to decide whether to actually remove this
    entry from the table or not.

    read (1) ==> no telnet access and snmp read only access
    readWrite (2) ==> no telnet access and snmp read-write access
    noAccess (3) ==> no telnet access and no snmp read-write access
    telnetNoAccess (4) ==> telnet access and no snmp access
    telnetRead (5) ==> telnet access and snmp read only access
    telnetReadWrite (6) ==> telnet access and snmp read-write access.

    Parsed from file pdndce.mib.txt
    Company: None
    Module: PDNDCE-MIB

    Description by circitor

    This field is used to specify the access allowed for an authorized
    NMS when Manager Validation is performed.
    If the IP address for the NMS sending an SNMP message is on the list
    of allowed managers, this option along with the Community Name access
    determine the type of access allowed for the that manager.

    When ever a new Security Manager is added or an existing
    Security Manager's IP Address is modified, the newSecurityMgrAccess
    object is set to the default value of read (1).
    If the index for this object is not in the existing table and if there
    is room in the table then the index will be used to create a new
    Security Manager and will be given the requested access level.
    In addition changing an existing access permission to noAccess
    invalidates the corresponding row of this table. It is upto
    the implementation to decide whether to actually remove this
    entry from the table or not.

    read (1) ==> no telnet access and snmp read only access
    readWrite (2) ==> no telnet access and snmp read-write access
    noAccess (3) ==> no telnet access and no snmp read-write access
    telnetNoAccess (4) ==> telnet access and no snmp access
    telnetRead (5) ==> telnet access and snmp read only access
    telnetReadWrite (6) ==> telnet access and snmp read-write access.

    Parsed from file PDN-SECURITY-MIB.mib
    Module: PDN-SECURITY-MIB

    Information by oid_info

    Vendor: Paradyne
    Module: PDN-SECURITY-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    newSecurityMgrAccess OBJECT-TYPE SYNTAX INTEGER { read (1), readWrite (2), noAccess (3), telnetNoAccess (4), telnetRead (5), telnetReadWrite (6) } ACCESS read-write STATUS mandatory DESCRIPTION "This field is used to specify the access allowed for an authorized NMS when Manager Validation is performed. If the IP address for the NMS sending an SNMP message is on the list of allowed managers, this option along with the Community Name access determine the type of access allowed for the that manager. When ever a new Security Manager is added or an existing Security Manager's IP Address is modified, the newSecurityMgrAccess object is set to the default value of read (1). If the index for this object is not in the existing table and if there is room in the table then the index will be used to create a new Security Manager and will be given the requested access level. In addition changing an existing access permission to noAccess invalidates the corresponding row of this table. It is upto the implementation to decide whether to actually remove this entry from the table or not. read (1) ==> no telnet access and snmp read only access readWrite (2) ==> no telnet access and snmp read-write access noAccess (3) ==> no telnet access and no snmp read-write access telnetNoAccess (4) ==> telnet access and no snmp access telnetRead (5) ==> telnet access and snmp read only access telnetReadWrite (6) ==> telnet access and snmp read-write access." ::= { newSecurityMgrEntry 2 }

    Information by circitor

    newSecurityMgrAccess OBJECT-TYPE SYNTAX INTEGER { read (1), readWrite (2), noAccess (3), telnetNoAccess (4), telnetRead (5), telnetReadWrite (6) } ACCESS read-write STATUS mandatory DESCRIPTION "This field is used to specify the access allowed for an authorized NMS when Manager Validation is performed. If the IP address for the NMS sending an SNMP message is on the list of allowed managers, this option along with the Community Name access determine the type of access allowed for the that manager. When ever a new Security Manager is added or an existing Security Manager's IP Address is modified, the newSecurityMgrAccess object is set to the default value of read (1). If the index for this object is not in the existing table and if there is room in the table then the index will be used to create a new Security Manager and will be given the requested access level. In addition changing an existing access permission to noAccess invalidates the corresponding row of this table. It is upto the implementation to decide whether to actually remove this entry from the table or not. read (1) ==> no telnet access and snmp read only access readWrite (2) ==> no telnet access and snmp read-write access noAccess (3) ==> no telnet access and no snmp read-write access telnetNoAccess (4) ==> telnet access and no snmp access telnetRead (5) ==> telnet access and snmp read only access telnetReadWrite (6) ==> telnet access and snmp read-write access." ::= { newSecurityMgrEntry 2 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.1795)

    Baughman Kevin

    Brothers (2)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.1795.2.24.2.8.5.1.1 newSecurityMgrIpAddress 0 0 This is used to specify the IP address that identifies the
    SNMP manager(s) that are authorized to send SNMP messages.
    This object…
    1.3.6.1.4.1.1795.2.24.2.8.5.1.3 newSecurityMgrSubnetMask 0 0 This object is used to specify the subnet mask