Automatically extracted from a file named S3M_AGENT
ssh OBJECT IDENTIFIER ::= { security 5 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.43.10.4.5.1 | sshRandomSeed | 0 | 0 | User supplied string used as input to the seed for random number generation. The random numbers are used for SSH Host Key Pair ge… |
1.3.6.1.4.1.43.10.4.5.2 | sshTftpServer | 0 | 0 | IP Address of TFTP server used for SSH Client Public Key File download. |
1.3.6.1.4.1.43.10.4.5.3 | sshKeyFilename | 0 | 0 | The pathname for the SSH Client Public Key File to be downloaded from the TFTP server. The standard SECSH Public Key File format … |
1.3.6.1.4.1.43.10.4.5.4 | sshKeyUserName | 0 | 0 | The Username to be associated with the Client Public Key File to be downloaded. |
1.3.6.1.4.1.43.10.4.5.5 | sshKeyFileAction | 0 | 0 | sshKeyFileAction OBJECT-TYPE SYNTAX INTEGER { notActive (1), abortAction (2), downloadClientPublicKey (3) } ACCESS read-write S… |
1.3.6.1.4.1.43.10.4.5.6 | sshKeyFileStatus | 0 | 0 | SSH Client Public Key File TFTP status for the last file transfer. fileSuccess (1): The file was transferred with no … |
1.3.6.1.4.1.43.10.4.5.7 | sshUserAuthMethod | 0 | 0 | sshUserAuthMethod OBJECT-TYPE SYNTAX INTEGER { password (1), publicKey (2), passwordAndPublicKey (3) } ACCESS read-write STATUS… |
1.3.6.1.4.1.43.10.4.5.8 | sshCipher | 0 | 0 | Bit mask indicating the symetric cipher algorithms supported by the server (bit 0 is the most significant bit). bit 0 = tripledes… |
1.3.6.1.4.1.43.10.4.5.9 | sshHostKeyTable | 1 | 7 | Table containing SSH Host Public Keys and Host Key generation management for each unit in a stack. |
1.3.6.1.4.1.43.10.4.5.10 | sshClientKeyTable | 1 | 8 | Table of SSH Client Public Keys. More than one Client Public Key can be associated with the same Username. |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.43.10.4.1 | securityEnableTable | 1 | 14 | A table of permissions for access to the managed device from each of its interfaces, at each security access level. The table is … |
1.3.6.1.4.1.43.10.4.2 | securityUserTable | 1 | 8 | A table used to define Users. Users can be created/modified or deleted, with the exception of the default Users which cannot be de… |
1.3.6.1.4.1.43.10.4.3 | securityAuditLogTable, securityAuditLog | 1 | 7 | The audit log is a circular table recording all updates to the managed database on the device. The log must be read regularly by… |
1.3.6.1.4.1.43.10.4.4 | securityLoginMIB | 7 | 16 | None |
1.3.6.1.4.1.43.10.4.6 | trustedIpHost | 5 | 22 | None |