Reference record for OID 1.3.6.1.4.1.838.3.17.1.3.2



parent
1.3.6.1.4.1.838.3.17.1.3 (xAuthUsers)
node code
2
node name
xAuthUserTable
dot oid
1.3.6.1.4.1.838.3.17.1.3.2
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) xedia(838) xediaMibs(3) xediaAuthenticationMIB(17) xAuthenticationObjects(1) xAuthUsers(3) xAuthUserTable(2)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) xedia(838) xediaMibs(3) xediaAuthenticationMIB(17) xAuthenticationObjects(1) xAuthUsers(3) xAuthUserTable(2)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) xedia(838) xediaMibs(3) xediaAuthenticationMIB(17) xAuthenticationObjects(1) xAuthUsers(3) xAuthUserTable(2)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) xedia(838) xediaMibs(3) xediaAuthenticationMIB(17) xAuthenticationObjects(1) xAuthUsers(3) xAuthUserTable(2)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) xedia(838) xediaMibs(3) xediaAuthenticationMIB(17) xAuthenticationObjects(1) xAuthUsers(3) xAuthUserTable(2)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) xedia(838) xediaMibs(3) xediaAuthenticationMIB(17) xAuthenticationObjects(1) xAuthUsers(3) xAuthUserTable(2)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/xedia/xediaMibs/xediaAuthenticationMIB/xAuthenticationObjects/xAuthUsers/xAuthUserTable
  • /iso/identified-organization/dod/internet/private/enterprises/xedia/xediaMibs/xediaAuthenticationMIB/xAuthenticationObjects/xAuthUsers/xAuthUserTable
  • /iso/org/dod/internet/private/enterprise/xedia/xediaMibs/xediaAuthenticationMIB/xAuthenticationObjects/xAuthUsers/xAuthUserTable
  • /iso/org/dod/internet/private/enterprises/xedia/xediaMibs/xediaAuthenticationMIB/xAuthenticationObjects/xAuthUsers/xAuthUserTable
  • /iso/iso-identified-organization/dod/internet/private/enterprise/xedia/xediaMibs/xediaAuthenticationMIB/xAuthenticationObjects/xAuthUsers/xAuthUserTable
  • /iso/iso-identified-organization/dod/internet/private/enterprises/xedia/xediaMibs/xediaAuthenticationMIB/xAuthenticationObjects/xAuthUsers/xAuthUserTable
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/838/3/17/1/3/2

    Description by mibdepot

    The Authentication User table. Remote dial-in clients can be
    authenticated: locally using an internal database, or externally
    using a Radius server server. Clients are defined internally
    in this table. This table can have a special '' entry
    that defines the default user authentication method and
    default tunnel name. The table lookup is always done first.

    If the client's name is not found a 'default' entry defines
    an alternative authentication methanism. If the 'default' entry
    is not defined, and the client is not found in the table, the
    client is denied access to the network, i.e. IPsec security
    associations will not be created. If the client's name is
    found in the table, the ipsecRemoteClientAuthenProtocol
    defines which authenication mechanism is to be used.

    Specific users CAN be excluded by specifying 'always reject'
    in the authentication protocol. The 'default' user can be
    set to 'always accept' to allow ALL undefined users to
    be automatically authenticated.

    For 'internal authentication', whether through a specific
    entry, or the default entry, the requested password must
    match the configured password. '

    Remote client example:
    xauthUserName = [email protected],
    xauthUserPassword = abc,
    xauthUserTunnelName = Engineering,
    xauthUserAuthenProtocol = internalAuthentication.

    Parsed from file xauth.mib.txt
    Company: None
    Module: XEDIA-AUTHENTICATION-MIB

    Description by circitor

    The Authentication User table. Remote dial-in clients can be
    authenticated: locally using an internal database, or externally
    using a Radius server server. Clients are defined internally
    in this table. This table can have a special '' entry
    that defines the default user authentication method and
    default client group name. The table lookup is always done first.

    If the client's name is not found a 'default' entry defines
    an alternative authentication methanism. If the 'default' entry
    is not defined, and the client is not found in the table, the
    client is denied access to the network, i.e. IPsec security
    associations will not be created. If the client's name is
    found in the table, the xauthUserAuthenProtocol
    defines which authenication mechanism is to be used.

    Specific users CAN be excluded by specifying 'always reject'
    in the authentication protocol. The 'default' user can be
    set to 'always accept' to allow ALL undefined users to
    be automatically authenticated.

    For 'internal authentication', whether through a specific
    entry, or the default entry, the requested password must
    match the configured password. '

    Remote client example:
    xauthUserName = [email protected],
    xauthUserPassword = abc,
    xauthUserClientGroup = Engineering,
    xauthUserAuthenProtocol = internalAuthentication.

    Parsed from file XEDIA-AUTHENTICATION-MIB.mib
    Module: XEDIA-AUTHENTICATION-MIB

    Information by oid_info

    Vendor: Xedia Corporation
    Module: XEDIA-AUTHENTICATION-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    xAuthUserTable OBJECT-TYPE SYNTAX SEQUENCE OF XAuthUserEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The Authentication User table. Remote dial-in clients can be authenticated: locally using an internal database, or externally using a Radius server server. Clients are defined internally in this table. This table can have a special '' entry that defines the default user authentication method and default tunnel name. The table lookup is always done first. If the client's name is not found a 'default' entry defines an alternative authentication methanism. If the 'default' entry is not defined, and the client is not found in the table, the client is denied access to the network, i.e. IPsec security associations will not be created. If the client's name is found in the table, the ipsecRemoteClientAuthenProtocol defines which authenication mechanism is to be used. Specific users CAN be excluded by specifying 'always reject' in the authentication protocol. The 'default' user can be set to 'always accept' to allow ALL undefined users to be automatically authenticated. For 'internal authentication', whether through a specific entry, or the default entry, the requested password must match the configured password. ' Remote client example: xauthUserName = [email protected], xauthUserPassword = abc, xauthUserTunnelName = Engineering, xauthUserAuthenProtocol = internalAuthentication." ::= { xAuthUsers 2 }

    Information by circitor

    xAuthUserTable OBJECT-TYPE SYNTAX SEQUENCE OF XAuthUserEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The Authentication User table. Remote dial-in clients can be authenticated: locally using an internal database, or externally using a Radius server server. Clients are defined internally in this table. This table can have a special '' entry that defines the default user authentication method and default client group name. The table lookup is always done first. If the client's name is not found a 'default' entry defines an alternative authentication methanism. If the 'default' entry is not defined, and the client is not found in the table, the client is denied access to the network, i.e. IPsec security associations will not be created. If the client's name is found in the table, the xauthUserAuthenProtocol defines which authenication mechanism is to be used. Specific users CAN be excluded by specifying 'always reject' in the authentication protocol. The 'default' user can be set to 'always accept' to allow ALL undefined users to be automatically authenticated. For 'internal authentication', whether through a specific entry, or the default entry, the requested password must match the configured password. ' Remote client example: xauthUserName = [email protected], xauthUserPassword = abc, xauthUserClientGroup = Engineering, xauthUserAuthenProtocol = internalAuthentication." ::= { xAuthUsers 2 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.838)

    Kincaid Colin

    Children (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.838.3.17.1.3.2.1 xAuthUserEntry 6 6 An entry containing information applicable to a
    particular User.

    Brothers (2)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.838.3.17.1.3.1 xAuthUserStats 1 2 None
    1.3.6.1.4.1.838.3.17.1.3.3 xAuthUserActgTable 1 13 None