Enable/disable for the trap generated when the NMC detects
that the packet bus clock on the NMC daughter board pcb has
failed. Check status of nmcStatPktBusClkSrc to determine
if the NMC was acting as clock master.
Default=enable(1).
Parsed from file NMC-MIB.mib.txt
Company: None
Module: NMC-MIB
Enable/disable for the trap generated when the NMC detects
that the packet bus clock on the NMC daughter board pcb has
failed. Check status of nmcStatPktBusClkSrc to determine
if the NMC was acting as clock master.
Default=enable(1).
Parsed from file NMC-MIB.mib
Module: NMC-MIB
Vendor: UTStarcom Incorporated
Module: NMC-MIB
[Automatically extracted from oidview.com]
nmcTePbClockFail OBJECT-TYPE SYNTAX INTEGER{ enable(1), disable(2) } ACCESS read-write STATUS mandatory DESCRIPTION "Enable/disable for the trap generated when the NMC detects that the packet bus clock on the NMC daughter board pcb has failed. Check status of nmcStatPktBusClkSrc to determine if the NMC was acting as clock master. Default=enable(1)." ::= { nmcTe 13 }
nmcTePbClockFail OBJECT-TYPE SYNTAX INTEGER{ enable(1), disable(2) } ACCESS read-write STATUS mandatory DESCRIPTION "Enable/disable for the trap generated when the NMC detects that the packet bus clock on the NMC daughter board pcb has failed. Check status of nmcStatPktBusClkSrc to determine if the NMC was acting as clock master. Default=enable(1)." ::= { nmcTe 13 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.429.1.2.7.13.0 | nmcTePbClockFail | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.429.1.2.7.1 | nmcTeDialOutLoginFail | 1 | 1 | Enable/disable for the trap generated when a dial out login security session has failed. |
1.3.6.1.4.1.429.1.2.7.2 | nmcTeDialInLoginFail | 1 | 1 | Enable/disable for the trap generated when a dial in login security session has failed. |
1.3.6.1.4.1.429.1.2.7.3 | nmcTeDialOutRestrictNum | 1 | 1 | Enable/disable for the trap generated when a dial out security session has failed as a result of attempting to dial a restricted … |
1.3.6.1.4.1.429.1.2.7.4 | nmcTeDialBackRestrictNum | 1 | 1 | Enable/disable for the trap generated when a dial back security session has failed as a result of attempting to dial a restricted… |
1.3.6.1.4.1.429.1.2.7.5 | nmcTeUserBlacklist | 1 | 1 | Enable/disable for the trap generated when a security user has reached their final failed login attempt number and is now being b… |
1.3.6.1.4.1.429.1.2.7.6 | nmcTeUserBlacklistLogin | 1 | 1 | Enable/disable for the trap generated when a security login attempt by a currently blacklisted user has occurred. |
1.3.6.1.4.1.429.1.2.7.7 | nmcTeRespAttmptLimExceed | 1 | 1 | Enable/disable for the trap generated when a security user has failed to issue a valid response to a particular security prompt b… |
1.3.6.1.4.1.429.1.2.7.8 | nmcTeLoginAttmptLimExceed | 1 | 1 | Enable/disable for the trap generated when a security session has failed because the indicated user does not appear in the securi… |
1.3.6.1.4.1.429.1.2.7.9 | nmcTeLogSrvrLoss | 1 | 1 | Enable/disable for the trap generated when communication with a logging server has been lost. |
1.3.6.1.4.1.429.1.2.7.10 | nmcTeSecSrvrLoss | 1 | 1 | Enable/disable for the trap generated when communication with a security server has been lost. |
1.3.6.1.4.1.429.1.2.7.11 | nmcTeSinglePbClockFail | 1 | 1 | Enable/disable for the trap generated when the NMC detects that there is a packet bus clock failure in a single slot. Default=enab… |
1.3.6.1.4.1.429.1.2.7.12 | nmcTePbClockSwitch | 1 | 1 | Enable/disable for the trap generated when the NMC detects that there is a packet bus clock failure in multiple slots and the NMC… |
1.3.6.1.4.1.429.1.2.7.14 | nmcTeDnsSrvrLoss | 1 | 1 | Enable/disable for the trap generated when communication with the primary and secondary DNS server has been lost. |
1.3.6.1.4.1.429.1.2.7.15 | nmcTeNtpSrvrLoss | 1 | 1 | Enable/disable for the trap generated when communication with all NTP servers has failed. |
1.3.6.1.4.1.429.1.2.7.16 | nmcTeNtpSrvrRestore | 1 | 1 | Enable/disable for the trap generated when communication with the NTP server has been restored. |
1.3.6.1.4.1.429.1.2.7.17 | nmcTeNtpSrvrDegraded | 1 | 1 | Enable/disable for the trap generated when communication with the primary NTP server has failed, but the secondary has been resto… |
1.3.6.1.4.1.429.1.2.7.18 | nmcTeDnsSrvrRestore | 1 | 1 | Enable/disable for the trap generated when communication with the primary DNS server has been restored. Default=disable. |
1.3.6.1.4.1.429.1.2.7.19 | nmcTeDnsSrvrDegraded | 1 | 1 | Enable/disable for the trap generated when communication with the primary DNS server has failed, but the secondary DNS server is … |
1.3.6.1.4.1.429.1.2.7.20 | nmcTeLogSrvrRestore | 1 | 1 | Enable/disable for the trap generated when communication with a logging server has been restored. |
1.3.6.1.4.1.429.1.2.7.21 | nmcTeLogSrvrGroupOper | 1 | 1 | Enable/disable for the trap generated when the communication with the group of logging servers is operational with the primary se… |
1.3.6.1.4.1.429.1.2.7.22 | nmcTeLogSrvrGroupDegr | 1 | 1 | Enable/disable from the trap generated when the communication with the group of logging servers has degraded with a non-primary s… |
1.3.6.1.4.1.429.1.2.7.23 | nmcTeLogSrvrGroupNonOp | 1 | 1 | Enable/disable for the trap generated when the communication with the group of logging servers is non-operational. |
1.3.6.1.4.1.429.1.2.7.24 | nmcTeSecSrvrRestore | 1 | 1 | Enable/disable for the trap generated when communication with the RADIUS Security server has been restored. Default=disabled |
1.3.6.1.4.1.429.1.2.7.25 | nmcTeSecSrvrGroupOper | 1 | 1 | Enable/disable for the trap generated when communication to the RADIUS Security server group becomes operational. Default=disabled |
1.3.6.1.4.1.429.1.2.7.26 | nmcTeSecSrvrGroupDegr | 1 | 1 | Enable/disable for the trap generated when communication to the RADIUS Security server group becomes degraded because of failure … |
1.3.6.1.4.1.429.1.2.7.27 | nmcTeSecSrvrGroupNonOp | 1 | 1 | Enable/disable for the trap generated when communication to the RADIUS Security server group becomes non-operational because of f… |