JUNIPER-SECURE-ACCESS-PORT-MIB DEFINITIONS::=BEGINIMPORTSMODULE-IDENTITY,OBJECT-TYPE,Unsigned32,NOTIFICATION-TYPE,Integer32FROM SNMPv2-SMI
TruthValue,TEXTUAL-CONVENTION,DisplayString
FROM SNMPv2-TC
ifIndex
FROM IF-MIB
jnxExSecureAccessPort
FROM JUNIPER-EX-SMI;jnxExSecureAccessPortMIB MODULE-IDENTITYLAST-UPDATED"200705151000Z"ORGANIZATION"Juniper Networks, Inc."CONTACT-INFO" Juniper Technical Assistance Center
Juniper Networks, Inc.
1194 N. Mathilda Avenue
Sunnyvale, CA 94089
E-mail: support@juniper.net"DESCRIPTION"This is Juniper Networks' implementation of enterprise specific
MIB for configuration of Secure Access Port feature. DHCP Snooping
and Dynamic ARP Inspection are mechanisms to provide per interface
security capabilities. This MIB Module is also used to control
some layer 2 functions like MAC limiting. It also supports
IP Source Guard, Mac Source Guard and Storm Control features."::={ jnxExSecureAccessPort 1}jnxSecAccessPortMIBNotifications
OBJECTIDENTIFIER::={ jnxExSecureAccessPortMIB 0}jnxSecAccessPortMIBObjects
OBJECTIDENTIFIER::={ jnxExSecureAccessPortMIB 1}
-- TEXTUAL-CONVENTIONJnxMacLimitExceededAction ::=TEXTUAL-CONVENTIONSTATUScurrentDESCRIPTION"One of the following action will be taken by the system
on an interface, when the system detects the current learned
number of MAC addresses in the forwarding table has exceeded
the limit number of MAC address.
none : No action will be taken. It means Mac limit is not
enabled in the specified interface.
drop : The notification will be generated when MAC limit is
exceeded and also the MAC limit is enforced for the interface.
The new address will not be learned in the entity and also the
traffic with new address will not be flooded in the entity.
The learning will be re-enabled in the interface if the number
of MAC addresses falls below the limit.
alarm : A notification will be generated if the Mac Limit is
exceeded.
shutdown : The notification will be generated as the Mac Limit is
exceeded. The interface will be moved to blocked state, no traffic
will be allowed in the entity. The traffic will be re-enabled in
the interface if the number of MAC addresses falls below the limit."SYNTAXINTEGER{none (1),drop (2),
alarm (3),shutdown (4)}-- The Port Security Table for VlanjnxSecAccessPortVlanTable OBJECT-TYPESYNTAXSEQUENCEOF JnxSecAccessPortVlanEntry
MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"A table provides the mechanism to control DHCP Snooping
and Dynamic ARP Inspection per VLAN. When a VLAN is created
in a device supporting this table, a corresponding entry will
be added to this table."::={ jnxSecAccessPortMIBObjects 1}jnxSecAccessPortVlanEntry OBJECT-TYPESYNTAX JnxSecAccessPortVlanEntry
MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"A row instance contains whether DHCP Snooping and Dynamic
ARP Inspection at each existing VLAN is enabled or disabled."INDEX{ jnxSecAccessVlanName }::={ jnxSecAccessPortVlanTable 1}
JnxSecAccessPortVlanEntry ::=SEQUENCE{
jnxSecAccessVlanName DisplayString,
jnxSecAccessVlanDhcpSnoopStatus TruthValue,
jnxSecAccessVlanDAIStatus TruthValue}jnxSecAccessVlanName OBJECT-TYPESYNTAXDisplayString(SIZE(0..255))MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"This object indicates the VLAN name on which Dhcp Snooping
feature and Dynamic ARP Inspection is enabled."::={ jnxSecAccessPortVlanEntry 1}jnxSecAccessVlanDhcpSnoopStatus OBJECT-TYPESYNTAXTruthValueMAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object indicates whether Dhcp Snooping is
enabled in this VLAN.
If this object is 'true', Dhcp Snooping is enabled in the
specified VLAN.
If this object is 'false', Dhcp Snooping is disabled in the
specified VLAN."::={ jnxSecAccessPortVlanEntry 2}jnxSecAccessVlanDAIStatus OBJECT-TYPESYNTAXTruthValueMAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object indicates whether Dynamic ARP Inspection is
enabled in this VLAN.
If this object is 'true', Dynamic ARP Inspection is enabled.
If this object is 'false', Dynamic ARP Inspection is disabled."::={ jnxSecAccessPortVlanEntry 3}-- The Port Security Table for InterfacejnxSecAccessPortIfTable OBJECT-TYPESYNTAXSEQUENCEOF JnxSecAccessPortIfEntry
MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"The table contains the trust state and rate limit of each interface
for DHCP Snooping purpose. The table also contains information on MAC
address limit feature for each interface capable of this feature.
This table also specifies whether IP source guard and MAC source
guard are enabled on each interface."::={ jnxSecAccessPortMIBObjects 2}jnxSecAccessPortIfEntry OBJECT-TYPE
SYNTAX JnxSecAccessPortIfEntry
MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"A table entry contains the trust state and rate limit of an
interface, MAC address limit for that Interface. It also contains
the action to be undertaken if MAC address limit is exceeded. A table
entry specifies whether IP source guard and MAC source guard are enabled
on the specified interface."INDEX{ ifIndex }::={ jnxSecAccessPortIfTable 1}
JnxSecAccessPortIfEntry ::=SEQUENCE{
jnxSecAccessdsIfTrustState TruthValue,
jnxSecAccessdsIfRateLimit Unsigned32,
jnxSecAccessIfMacLimit Unsigned32,
jnxSecAccessIfMacLimitExceed JnxMacLimitExceededAction,
jnxSecAccessIfIpSrcGuardStatus TruthValue,
jnxSecAccessIfMacSrcGuardStatus TruthValue}jnxSecAccessdsIfTrustState OBJECT-TYPESYNTAXTruthValueMAX-ACCESSread-only
STATUScurrentDESCRIPTION"This object indicates whether the interface is trusted for
DHCP Snooping purpose.
If this object is 'true', the interface is trusted.
DHCP packets coming to this interface will be forwarded without
checking.
If this object is 'false', the interface is not trusted. DHCP
packets coming to this interface will be subjected to DHCP checks."::={ jnxSecAccessPortIfEntry 1}jnxSecAccessdsIfRateLimit OBJECT-TYPESYNTAXUnsigned32UNITS"packets per second"MAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object indicates rate limit value for DHCP Snooping purpose.
If the value of this object is 0, no rate limit is applied for DHCP
traffic at this interface."::={ jnxSecAccessPortIfEntry 2}jnxSecAccessIfMacLimit OBJECT-TYPESYNTAXUnsigned32MAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object specifies the threshold limit for the number of
MAC address entries on this interface.
When the instance value of this object is set to 0, no threshold
limit will be applied for this interfacew and the
corresponding instance value of jnxIfMacLimitExceedAction
of the same row has no effect."DEFVAL{5}::={ jnxSecAccessPortIfEntry 3}jnxSecAccessIfMacLimitExceed OBJECT-TYPESYNTAX JnxMacLimitExceededAction
MAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object specifies the action to be taken by the system for this
interface while the number of MAC addresses has exceeded the value
of jnxIfMacLimit.
This object value is only effective when the corresponding instance
value of jnxIfMacLimit is not set to 0."::={ jnxSecAccessPortIfEntry 4}jnxSecAccessIfIpSrcGuardStatus OBJECT-TYPESYNTAXTruthValueMAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object indicates whether IP Source Guard is enabled on
the specified interface.
If this object is 'true', then IP Source Guard is enabled on the
specified interface.
If this object is 'false', then IP Source Guard is disabled on
the specified interface."::={ jnxSecAccessPortIfEntry 5}jnxSecAccessIfMacSrcGuardStatus OBJECT-TYPESYNTAXTruthValueMAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object indicates whether Mac Source Guard is enabled on
the specified interface.
If this object is 'true', then Mac Source Guard is enabled on the
specified interface.
If this object is 'false', then IP Source Guard is disabled on
the specified interface."::={ jnxSecAccessPortIfEntry 6}-- Storm Control TablejnxStormCtlTable OBJECT-TYPESYNTAXSEQUENCEOF JnxStormCtlEntry
MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"Storm control monitors each type of traffic level on an interface.
If traffic level exceeds the threshold value(rising threshold),
switch will drop all packets of that type until traffic level drops
to the threshold level (falling threshold). If traffic rate for a
particular type exceeds the rising threshold, action will be taken
to shutdown or add configured filter on the port.
This table describes the traffic type for each interface, the rising
threshold, falling threshold and the action to be taken if the traffic
exceeds the rising threshold."::={ jnxSecAccessPortMIBObjects 3}jnxStormCtlEntry OBJECT-TYPESYNTAX JnxStormCtlEntry
MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"An entry contains the interface index,traffic type for the interface,
the rising threshold, falling threshold and the action to be taken
if the traffic exceeds the rising threshold."INDEX{ifIndex, jnxStormCtlIfTrafficType }::={ jnxStormCtlTable 1}
JnxStormCtlEntry ::=SEQUENCE{
jnxStormCtlIfTrafficType INTEGER,
jnxStormCtlRisingThreshold Integer32,
jnxStormCtlFallingThreshold Integer32,
jnxStormCtlAction INTEGER}jnxStormCtlIfTrafficType OBJECT-TYPE
SYNTAXINTEGER{broadcast(1),multicast(2),unicast (3)}MAX-ACCESSnot-accessibleSTATUScurrentDESCRIPTION"This object specifies the traffic type on the particular
interface. Value 1 specifies that it is broadcast traffic,
value 2 specifies that it is multicast traffic and
value 3 specifies that it is unicast traffic."::={ jnxStormCtlEntry 1}jnxStormCtlRisingThreshold OBJECT-TYPESYNTAXInteger32UNITS"packets per second"MAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object specifies the rising threshold value in packets
per second. The storm control action is occurs when the traffic
exceeds this threshold value."::={ jnxStormCtlEntry 2}jnxStormCtlFallingThreshold OBJECT-TYPESYNTAXInteger32UNITS"packets per second"MAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object specifies the falling threshold value in packets
per second. The storm control action ceases when the traffic
drops to this threshold value."::={ jnxStormCtlEntry 3}jnxStormCtlAction OBJECT-TYPESYNTAXINTEGER{shutdown(1),filter (2)}MAX-ACCESSread-onlySTATUScurrentDESCRIPTION"This object specifies the action to be taken, when traffic exceeds
rising threshold value. Value 1 specifies that the action taken is
to shutdown the port. Value 2 specifies that the action taken is to
apply a policy filter on the interface for the given packet type.
Default is to shutdown(1) the port."DEFVAL{1}
::={ jnxStormCtlEntry 4}-- Definition of DHCP Snooping notificationsjnxSecAccessdsRateLimitCrossed NOTIFICATION-TYPEOBJECTS{ jnxSecAccessdsIfRateLimit }STATUScurrentDESCRIPTION"A jnxdsRateLimitCrossed notification is generated when
the number of DHCP packets from an untrusted interface exceeds
jnxSecAccessdsIfRateLimit."::={ jnxSecAccessPortMIBNotifications 1}-- Definition of MAC Limit Exceeded NotificationjnxSecAccessIfMacLimitExceeded NOTIFICATION-TYPEOBJECTS{ jnxSecAccessIfMacLimit, jnxSecAccessIfMacLimitExceed }STATUScurrentDESCRIPTION"Notification is sent when the number of MAC addresses learnt by
the interface has crossed the limit of MAC addresses(jnxSecAccessIfMacLimit)
and if MAC Limit Exceeded Action(jnxSecAccessIfMacLimitExceed) is
drop or alarm or shutdown."::={ jnxSecAccessPortMIBNotifications 2}-- Definition of Storm Event Notification
jnxStormEventNotification NOTIFICATION-TYPEOBJECTS{ jnxStormCtlRisingThreshold }STATUScurrentDESCRIPTION"Notification is sent when the traffic in the interface exceeds
rising threshold(jnxStormCtlRisingThreshold)."::={ jnxSecAccessPortMIBNotifications 3}END