Reference record for OID 1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1



parent
1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3 (nwIpWgRngTable)
node code
1
node name
nwIpWgRngEntry
dot oid
1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cabletron(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) IMPORTS(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • ...skipped...
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) cabletron(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) IMPORTS(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) cabletron(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) IMPORTS(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • ...skipped...
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cabletron(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) IMPORTS(52) mibs(4) ctronExp(2) ctronRouterExp(2) nwRouter(2) nwRtrProtoSuites(3) nwIpRouter(1) nwIpComponents(2) nwIpWorkGroup(11) nwIpWgRngTable(3) nwIpWgRngEntry(1)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/cabletron/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • /iso/identified-organization/dod/internet/private/enterprise/IMPORTS/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • ...skipped...
  • /iso/org/dod/internet/private/enterprise/cabletron/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • /iso/org/dod/internet/private/enterprise/IMPORTS/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • /iso/org/dod/internet/private/enterprises/cabletron/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • /iso/org/dod/internet/private/enterprises/IMPORTS/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • ...skipped...
  • /iso/iso-identified-organization/dod/internet/private/enterprises/cabletron/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • /iso/iso-identified-organization/dod/internet/private/enterprises/IMPORTS/mibs/ctronExp/ctronRouterExp/nwRouter/nwRtrProtoSuites/nwIpRouter/nwIpComponents/nwIpWorkGroup/nwIpWgRngTable/nwIpWgRngEntry
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/52/4/2/2/2/3/1/2/11/3/1

    Description by mibdepot

    Each entry configures a range of host IP addresses to be
    associated with a given interface ( port ). If the range
    consists of a single host address the entry may optionally
    specify a physical address. The entry is indexed by the range
    and the port. Ranges may not overlap. However a range may be
    duplicated on different ports.

    The address range must lie within the subnet defined for a
    given workgroup and thus the entry acquires the security
    level of that workgroup. If security is violated, packets
    to and from a given host IP address will be filtered out
    passing through the router. The source and destination IP
    packet addresses are checked against ranges in the range table
    during packet forwarding and must match as follows:

    For a high (4) security workgroup, a host must match a single
    host range entry - it must reside on the port with the
    physical address as configured in that entry.

    For a medium (3) security workgroup, a host must match a range
    entry in that it resides on that port, but unless a physical
    address is also specified in that entry, the physical address
    is not constrained.

    For a low (2) security workgroup, a host is free to reside on
    any port with any physical address as long as its IP address
    does not lie within the range of any entry in the range table,
    but if it does fall in a range then it must completely match
    that entry, or another entry with the duplicate range. Match
    completely means match the port and, if a physical address
    is specified, match that as well.

    Parsed from file ctip-mib.mib.txt
    Company: None
    Module: CTRON-IP-ROUTER-MIB

    Description by circitor

    Each entry configures a range of host IP addresses to be
    associated with a given interface ( port ). If the range
    consists of a single host address the entry may optionally
    specify a physical address. The entry is indexed by the range
    and the port. Ranges may not overlap. However a range may be
    duplicated on different ports.

    The address range must lie within the subnet defined for a
    given workgroup and thus the entry acquires the security
    level of that workgroup. If security is violated, packets
    to and from a given host IP address will be filtered out
    passing through the router. The source and destination IP
    packet addresses are checked against ranges in the range table
    during packet forwarding and must match as follows:

    For a high (4) security workgroup, a host must match a single
    host range entry - it must reside on the port with the
    physical address as configured in that entry.

    For a medium (3) security workgroup, a host must match a range
    entry in that it resides on that port, but unless a physical
    address is also specified in that entry, the physical address
    is not constrained.

    For a low (2) security workgroup, a host is free to reside on
    any port with any physical address as long as its IP address
    does not lie within the range of any entry in the range table,
    but if it does fall in a range then it must completely match
    that entry, or another entry with the duplicate range. Match
    completely means match the port and, if a physical address
    is specified, match that as well.

    Parsed from file CTRON-IP-ROUTER-MIB.mib
    Module: CTRON-IP-ROUTER-MIB

    Information by mibdepot

    nwIpWgRngEntry OBJECT-TYPE SYNTAX NwIpWgRngEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "Each entry configures a range of host IP addresses to be associated with a given interface ( port ). If the range consists of a single host address the entry may optionally specify a physical address. The entry is indexed by the range and the port. Ranges may not overlap. However a range may be duplicated on different ports. The address range must lie within the subnet defined for a given workgroup and thus the entry acquires the security level of that workgroup. If security is violated, packets to and from a given host IP address will be filtered out passing through the router. The source and destination IP packet addresses are checked against ranges in the range table during packet forwarding and must match as follows: For a high (4) security workgroup, a host must match a single host range entry - it must reside on the port with the physical address as configured in that entry. For a medium (3) security workgroup, a host must match a range entry in that it resides on that port, but unless a physical address is also specified in that entry, the physical address is not constrained. For a low (2) security workgroup, a host is free to reside on any port with any physical address as long as its IP address does not lie within the range of any entry in the range table, but if it does fall in a range then it must completely match that entry, or another entry with the duplicate range. Match completely means match the port and, if a physical address is specified, match that as well." INDEX { nwIpWgRngBegHostAddr, nwIpWgRngEndHostAddr, nwIpWgRngIfIndex } ::= { nwIpWgRngTable 1 }

    Information by oid_info

    Vendor: Enterasys Networks Inc.
    Module: CTRON-IP-ROUTER-MIB

    [Automatically extracted from oidview.com]

    Information by circitor

    nwIpWgRngEntry OBJECT-TYPE SYNTAX NwIpWgRngEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "Each entry configures a range of host IP addresses to be associated with a given interface ( port ). If the range consists of a single host address the entry may optionally specify a physical address. The entry is indexed by the range and the port. Ranges may not overlap. However a range may be duplicated on different ports. The address range must lie within the subnet defined for a given workgroup and thus the entry acquires the security level of that workgroup. If security is violated, packets to and from a given host IP address will be filtered out passing through the router. The source and destination IP packet addresses are checked against ranges in the range table during packet forwarding and must match as follows: For a high (4) security workgroup, a host must match a single host range entry - it must reside on the port with the physical address as configured in that entry. For a medium (3) security workgroup, a host must match a range entry in that it resides on that port, but unless a physical address is also specified in that entry, the physical address is not constrained. For a low (2) security workgroup, a host is free to reside on any port with any physical address as long as its IP address does not lie within the range of any entry in the range table, but if it does fall in a range then it must completely match that entry, or another entry with the duplicate range. Match completely means match the port and, if a physical address is specified, match that as well." INDEX { nwIpWgRngBegHostAddr, nwIpWgRngEndHostAddr, nwIpWgRngIfIndex } ::= { nwIpWgRngTable 1 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.52)

    McTague Charles N.

    Children (6)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1.1 nwIpWgRngBegHostAddr 0 0 The beginning (lower) IP address of the address range.
    This is the primary index into the IP Work Group Range Table.
    1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1.2 nwIpWgRngEndHostAddr 0 0 The ending (higher) IP address of the address range.
    This is the secondary index of the IP Work Group Range Table.
    1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1.3 nwIpWgRngIfIndex 0 0 The interface number. This is the tertiary index into the
    IP Work Group Interface Table, matching the primary index
    into the MIB…
    1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1.4 nwIpWgRngPhysAddr 0 0 The physical address of the host with the IP address given
    in the nwIpWgRngBegHostAddr for this conceptual row entry.
    Only single…
    1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1.5 nwIpWgRngRowStatus 0 0 This status instance supports `createAndGo' semantics
    to create an active entry.
    1.3.6.1.4.1.52.4.2.2.2.3.1.2.11.3.1.6 nwIpWgRngOperStatus 0 0 The operational status of this range table entry.
    It will be `disabled' if this entry's row status is not active.
    It will be `wor…