Reference record for OID 1.3.6.1.4.1.1916.1.34.1.6


parent
1.3.6.1.4.1.1916.1.34.1 (extremeIpSecurityTraps)
node code
6
node name
extremeIpSecurityViolationType
dot oid
1.3.6.1.4.1.1916.1.34.1.6
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) extremenetworks(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) extreme(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • ...skipped...
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) extremenetworks(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) extreme(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) extremenetworks(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) extreme(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • ...skipped...
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) extremenetworks(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) extreme(1916) extremeAgent(1) extremeIpSecurity(34) extremeIpSecurityTraps(1) extremeIpSecurityViolationType(6)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/extremenetworks/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • /iso/identified-organization/dod/internet/private/enterprise/extreme/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • ...skipped...
  • /iso/org/dod/internet/private/enterprise/extremenetworks/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • /iso/org/dod/internet/private/enterprise/extreme/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • /iso/org/dod/internet/private/enterprises/extremenetworks/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • /iso/org/dod/internet/private/enterprises/extreme/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • ...skipped...
  • /iso/iso-identified-organization/dod/internet/private/enterprises/extremenetworks/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • /iso/iso-identified-organization/dod/internet/private/enterprises/extreme/extremeAgent/extremeIpSecurity/extremeIpSecurityTraps/extremeIpSecurityViolationType
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/1916/1/34/1/6

    Description by mibdepot

    The type of IP Security violation that occurred
    - rogueDhcpServerPacket(1)
    A rogue DHCP server packet was received.
    - badIpMacBindingInArpPacket(2)
    The IP-MAC binding received in the ARP packet does not exist in
    the DHCP Bindings table.
    - badIpInArpPacket(3)
    The Source IP address in the ARP payload is invalid.
    - badMacInArpPacket(4)
    One of the MAC addresses in the ARP payload does not match with
    its counterpart in the ethernet header.

    Parsed from file ExtremeXOS_12.0.2.25_MIB-24.txt
    Company: extreme
    Module: EXTREME-IP-SECURITY-MIB

    Information by oid_info

    Child arc 0 is used to translate between SNMPv1 and SNMPv2 notification parameters as explained in IETF RFC 2576, section 3.

    Information by mibdepot

    extremeIpSecurityViolationType OBJECT-TYPE SYNTAX INTEGER { rogueDhcpServerPacket(1), badIpMacBindingInArpPacket(2), badIpInArpPacket(3), badMacInArpPacket(4) } MAX-ACCESS accessible-for-notify STATUS current DESCRIPTION "The type of IP Security violation that occurred - rogueDhcpServerPacket(1) A rogue DHCP server packet was received. - badIpMacBindingInArpPacket(2) The IP-MAC binding received in the ARP packet does not exist in the DHCP Bindings table. - badIpInArpPacket(3) The Source IP address in the ARP payload is invalid. - badMacInArpPacket(4) One of the MAC addresses in the ARP payload does not match with its counterpart in the ethernet header." ::= { extremeIpSecurityTraps 6 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.1916)

    Hanning Gary W.

    Children (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.1916.1.34.1.6.0 extremeIpSecurityViolationType 0 0 None

    Brothers (6)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.1916.1.34.1.0 extremeIpSecurityTrapsPrefix 1 1 None
    1.3.6.1.4.1.1916.1.34.1.1 extremeIpSecurityVlanIfIndex 1 1 The ifIndex of the VLAN on which the violating packet was received.
    1.3.6.1.4.1.1916.1.34.1.2 extremeIpSecurityVlanDescr 1 1 The description(name) of the VLAN on which the violating packet was received.
    1.3.6.1.4.1.1916.1.34.1.3 extremeIpSecurityPortIfIndex 1 1 The ifIndex of the port on which the violating packet was received.
    1.3.6.1.4.1.1916.1.34.1.4 extremeIpSecurityIpAddr 1 1 Source IP address of the violating packet
    1.3.6.1.4.1.1916.1.34.1.5 extremeIpSecurityMacAddress 1 1 Source MAC address in the violating packet