Source MAC address in the violating packet
Parsed from file ExtremeXOS_12.0.2.25_MIB-24.txt
Company: extreme
Module: EXTREME-IP-SECURITY-MIB
Child arc 0 is used to translate between SNMPv1 and SNMPv2 notification parameters as explained in IETF RFC 2576, section 3.
extremeIpSecurityMacAddress OBJECT-TYPE SYNTAX MacAddress MAX-ACCESS accessible-for-notify STATUS current DESCRIPTION "Source MAC address in the violating packet" ::= { extremeIpSecurityTraps 5 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.1916.1.34.1.5.0 | extremeIpSecurityMacAddress | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.1916.1.34.1.0 | extremeIpSecurityTrapsPrefix | 1 | 1 | None |
1.3.6.1.4.1.1916.1.34.1.1 | extremeIpSecurityVlanIfIndex | 1 | 1 | The ifIndex of the VLAN on which the violating packet was received. |
1.3.6.1.4.1.1916.1.34.1.2 | extremeIpSecurityVlanDescr | 1 | 1 | The description(name) of the VLAN on which the violating packet was received. |
1.3.6.1.4.1.1916.1.34.1.3 | extremeIpSecurityPortIfIndex | 1 | 1 | The ifIndex of the port on which the violating packet was received. |
1.3.6.1.4.1.1916.1.34.1.4 | extremeIpSecurityIpAddr | 1 | 1 | Source IP address of the violating packet |
1.3.6.1.4.1.1916.1.34.1.6 | extremeIpSecurityViolationType | 1 | 1 | The type of IP Security violation that occurred - rogueDhcpServerPacket(1) A rogue DHCP server packet was received. - badIpMacBindā¦ |