This s3EnetConcSecureStatus object indicates whether
the security features (both allowed nodes and
LattisSecure) for the concentrator are active or
inactive. If security is active, this object also
indicates whether the allowed nodes feature is
controlled at the concentrator, board, or port level.
LattisSecure features are always controlled at the
port level. (See the Authorized Nodes tables for
more information about how the allowed nodes and
LattisSecure receive security features are
configured.)
If this object is set to concSecureOn(2), then the
allowed nodes feature is controlled at the
concentrator level and activated for every
non-LattisSecure Ethernet port in the concentrator.
If an authorized node violation occurs on any port,
the action specified in s3EnetConcAuthAction is taken.
If this object is set to portCheckOn(3), then allowed
nodes is controlled at the port level by the
s3EnetPortSecureStatus object for that port. The
port's s3EnetPortAuthAction determines the action
taken when authorized nodes violations occur on that
port.
If this object is set to slotCheckOn(4), then allowed
nodes is controlled at the board level by the
s3EnetBoardSecureStatus object for that board.
The board's s3EnetBoardAuthAction determines the
action taken when authorized nodes violations
occur on that board's ports.
If this object is set to concentratorOff(5), then
all security features, including LattisSecure, are
deactivated for the entire concentrator.
No matter what the status of this object, the board
and port level SecureStatus and AuthAction are not
lost even if they are not currently being used. Thus,
the user can change a port's status even if this object
is slotCheckOn(4). If this object is then changed to
portCheckOn(3), then the change will take effect.
The agent must support download of this object in the
CFG file.
In release 4.0, this object was called
s3EnetConcAuthStatus.
Parsed from file s3eth461.mib.txt
Company: None
Module: SYNOPTICS-ETHERNET-MIB
This s3EnetConcSecureStatus object indicates whether
the security features (both allowed nodes and
LattisSecure) for the concentrator are active or
inactive. If security is active, this object also
indicates whether the allowed nodes feature is
controlled at the concentrator, board, or port level.
LattisSecure features are always controlled at the
port level. (See the Authorized Nodes tables for
more information about how the allowed nodes and
LattisSecure receive security features are
configured.)
If this object is set to concSecureOn(2), then the
allowed nodes feature is controlled at the
concentrator level and activated for every
non-LattisSecure Ethernet port in the concentrator.
If an authorized node violation occurs on any port,
the action specified in s3EnetConcAuthAction is taken.
If this object is set to portCheckOn(3), then allowed
nodes is controlled at the port level by the
s3EnetPortSecureStatus object for that port. The
port's s3EnetPortAuthAction determines the action
taken when authorized nodes violations occur on that
port.
If this object is set to slotCheckOn(4), then allowed
nodes is controlled at the board level by the
s3EnetBoardSecureStatus object for that board.
The board's s3EnetBoardAuthAction determines the
action taken when authorized nodes violations
occur on that board's ports.
If this object is set to concentratorOff(5), then
all security features, including LattisSecure, are
deactivated for the entire concentrator.
No matter what the status of this object, the board
and port level SecureStatus and AuthAction are not
lost even if they are not currently being used. Thus,
the user can change a port's status even if this object
is slotCheckOn(4). If this object is then changed to
portCheckOn(3), then the change will take effect.
The agent must support download of this object in the
CFG file.
In release 4.0, this object was called
s3EnetConcAuthStatus.
Parsed from file SYNOPTICS-BASIC-ETHTOK-MIB.mib
Module: SYNOPTICS-BASIC-ETHTOK-MIB
Child arc 0 is used to translate between SNMPv1 and SNMPv2 notification parameters as explained in IETF RFC 2576, section 3.
s3EnetConcSecureStatus OBJECT-TYPE SYNTAX INTEGER { other(1), concSecureOn(2), portCheckOn(3), slotCheckOn(4), concSecureOff(5) } ACCESS read-write STATUS mandatory DESCRIPTION "This s3EnetConcSecureStatus object indicates whether the security features (both allowed nodes and LattisSecure) for the concentrator are active or inactive. If security is active, this object also indicates whether the allowed nodes feature is controlled at the concentrator, board, or port level. LattisSecure features are always controlled at the port level. (See the Authorized Nodes tables for more information about how the allowed nodes and LattisSecure receive security features are configured.) If this object is set to concSecureOn(2), then the allowed nodes feature is controlled at the concentrator level and activated for every non-LattisSecure Ethernet port in the concentrator. If an authorized node violation occurs on any port, the action specified in s3EnetConcAuthAction is taken. If this object is set to portCheckOn(3), then allowed nodes is controlled at the port level by the s3EnetPortSecureStatus object for that port. The port's s3EnetPortAuthAction determines the action taken when authorized nodes violations occur on that port. If this object is set to slotCheckOn(4), then allowed nodes is controlled at the board level by the s3EnetBoardSecureStatus object for that board. The board's s3EnetBoardAuthAction determines the action taken when authorized nodes violations occur on that board's ports. If this object is set to concentratorOff(5), then all security features, including LattisSecure, are deactivated for the entire concentrator. No matter what the status of this object, the board and port level SecureStatus and AuthAction are not lost even if they are not currently being used. Thus, the user can change a port's status even if this object is slotCheckOn(4). If this object is then changed to portCheckOn(3), then the change will take effect. The agent must support download of this object in the CFG file. In release 4.0, this object was called s3EnetConcAuthStatus." ::= { s3000EnetConcentrator 13}
s3EnetConcSecureStatus OBJECT-TYPE SYNTAX INTEGER { other(1), concSecureOn(2), portCheckOn(3), slotCheckOn(4), concSecureOff(5) } ACCESS read-write STATUS mandatory DESCRIPTION "This s3EnetConcSecureStatus object indicates whether the security features (both allowed nodes and LattisSecure) for the concentrator are active or inactive. If security is active, this object also indicates whether the allowed nodes feature is controlled at the concentrator, board, or port level. LattisSecure features are always controlled at the port level. (See the Authorized Nodes tables for more information about how the allowed nodes and LattisSecure receive security features are configured.) If this object is set to concSecureOn(2), then the allowed nodes feature is controlled at the concentrator level and activated for every non-LattisSecure Ethernet port in the concentrator. If an authorized node violation occurs on any port, the action specified in s3EnetConcAuthAction is taken. If this object is set to portCheckOn(3), then allowed nodes is controlled at the port level by the s3EnetPortSecureStatus object for that port. The port's s3EnetPortAuthAction determines the action taken when authorized nodes violations occur on that port. If this object is set to slotCheckOn(4), then allowed nodes is controlled at the board level by the s3EnetBoardSecureStatus object for that board. The board's s3EnetBoardAuthAction determines the action taken when authorized nodes violations occur on that board's ports. If this object is set to concentratorOff(5), then all security features, including LattisSecure, are deactivated for the entire concentrator. No matter what the status of this object, the board and port level SecureStatus and AuthAction are not lost even if they are not currently being used. Thus, the user can change a port's status even if this object is slotCheckOn(4). If this object is then changed to portCheckOn(3), then the change will take effect. The agent must support download of this object in the CFG file. In release 4.0, this object was called s3EnetConcAuthStatus." ::= { s3000EnetConcentrator 13 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.45.1.3.2.1.13.0 | s3EnetConcSecureStatus | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.45.1.3.2.1.1 | s3EnetConcRetimingStatus | 1 | 1 | Does this concentrator have retiming turned on. Writing a 1 will turn off retiming and writing a 2 will turn on retiming. This w… |
1.3.6.1.4.1.45.1.3.2.1.2 | s3EnetConcFrmsRxOk | 1 | 1 | This contains a count of frames that are successfully received by the concentrator. This does not include frames received with a… |
1.3.6.1.4.1.45.1.3.2.1.3 | s3EnetConcOctetsRxOk | 1 | 1 | Contains a count of data and padding octets in frames that are successfully received by the concentrator. This does not include f… |
1.3.6.1.4.1.45.1.3.2.1.4 | s3EnetConcMcastFrmsRxOk | 1 | 1 | This contains a count of frames that are successfully received by the concentrator and are directed to an active non-broadcast gr… |
1.3.6.1.4.1.45.1.3.2.1.5 | s3EnetConcBcastFrmsRxOk | 1 | 1 | This contains a count of frames that are successfully received by the concentrator and are directed to the broadcast group addres… |
1.3.6.1.4.1.45.1.3.2.1.6 | s3EnetConcColls | 1 | 1 | This contains a count of the collisions at the concentrator level. For NMM+ this is a true counter. For other NMMs this is a sum… |
1.3.6.1.4.1.45.1.3.2.1.7 | s3EnetConcTooLongErrors | 1 | 1 | This contains a count of frames that are received by the concentrator and exceed the maximum permitted frame size. This counter … |
1.3.6.1.4.1.45.1.3.2.1.8 | s3EnetConcRuntErrors | 1 | 1 | This contains a count of frames received by the concentrator that are less than the minimum permitted frame size and have a good … |
1.3.6.1.4.1.45.1.3.2.1.9 | s3EnetConcFragErrors | 1 | 1 | This contains a count of frames received by the concentrator that are less than the minimum permitted frame size and have a bad F… |
1.3.6.1.4.1.45.1.3.2.1.10 | s3EnetConcAlignErrors | 1 | 1 | This contains a count of frames received by the concentrator that are not an integral number of octets in length and do not pass … |
1.3.6.1.4.1.45.1.3.2.1.11 | s3EnetConcFcsErrors | 1 | 1 | This contains a count of frames received by the concentrator that are an integral number of octets in length that do not pass the… |
1.3.6.1.4.1.45.1.3.2.1.12 | s3EnetConcLateCollErrors | 1 | 1 | This contains a total concentrator count of the late collisions. For NMM+ this is a true counter. For other NMMs this is a summat… |
1.3.6.1.4.1.45.1.3.2.1.14 | s3EnetConcAuthAction | 1 | 1 | If s3EnetConcSecureStatus is concSecureOn(2) and a violation occurs, then the action specified by this object will take place. O… |
1.3.6.1.4.1.45.1.3.2.1.15 | s3EnetConcSecurityLock | 1 | 1 | If s3EnetConcSecurityLock is locked(2), the agent will refuse all requests to modify the 'security configuration' (defined below)… |
1.3.6.1.4.1.45.1.3.2.1.16 | s3EnetConcEnetChan | 1 | 1 | Identifies the channel to which this NMM is currently monitoring. |