IP address type of address under spoof attack.
Parsed from file RC-VLAN-MIB.mib.txt
Company: avaya
Module: RC-VLAN-MIB
rcVlanPortSpoofDetectSpoofedIpAddressType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS read-only STATUS current DESCRIPTION "IP address type of address under spoof attack." ::= { rcVlanPortSpoofDetectEntry 2 }
Vendor: Avaya
Module: RC-VLAN-MIB (RC-VLAN-MIB.mib)
Type: TABULAR
Access: read-only
Syntax: InetAddressType
Automatically extracted from www.mibdepot.com
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.2272.1.3.16.1.1 | rcVlanPortSpoofDetectIndex | 0 | 0 | The auxiliary variable for identifying instances of the columnar objects in the spoof detect table. |
1.3.6.1.4.1.2272.1.3.16.1.3 | rcVlanPortSpoofDetectSpoofedIpAddress | 0 | 0 | IP address that has been detected under spoof attack. |
1.3.6.1.4.1.2272.1.3.16.1.4 | rcVlanPortSpoofDetectSpoofedMacAddress | 0 | 0 | MAC address that has sent out spoofing ARP. |
1.3.6.1.4.1.2272.1.3.16.1.5 | rcVlanPortSpoofDetectPort | 0 | 0 | Port index that has enabled spoof-detect. |
1.3.6.1.4.1.2272.1.3.16.1.6 | rcVlanPortSpoofDetectVlanId | 0 | 0 | VLAN ID that has been detected under spoof attack. |