AD | Application | AWS | Azure | Cloud | Database | Enterprise | Environmental | Event Log | File System | IoT | IT Service | Network/System | Infra | Performance | Protocol | SaaS | Security | Service Level | Storage | Linux | VMware | VoIP | Web | Wireless | SNMP

Crumbtrail

MonitorTools.com » Technical documentation » SNMP » MIB » Enterasys-Networks » ENTERASYS-8021X-REKEYING-MIB » Objects

ENTERASYS-8021X-REKEYING-MIB.mib object view, vendor Enterasys-Networks

Introduction

Most network devices and programs ship with so-called MIB files to describe the parameters and meanings (i.e.: friendly names) which are available for monitoring via SNMP.
ActiveXperts Network Monitor 2024 can import vendor-specific MIB files, so it can be used to monitor specific OID's (Object Identifiers). This way, you can monitor your devices, computers, etc. by selecting your relevant OID's by name.

ActiveXperts Network Monitor 2024 can import MIB file ENTERASYS-8021X-REKEYING-MIB and use it to monitor vendor specific OID's.

ENTERASYS-8021X-REKEYING-MIB file content

Object view of ENTERASYS-8021X-REKEYING-MIB:

Scalar Object
etsysDot1xRekeyConfigEntry .1.3.6.1.4.1.5624.1.2.17.1.1.1.1
Each conceptual row holds encryption key configuration information for the Authenticator PAEs associated with one port.
Tabular Object
etsysDot1xRekeyEnabled .1.3.6.1.4.1.5624.1.2.17.1.1.1.1.1
Determines how an access point selects radio encryption keys. If the selected port/Authenticator PAE does not support the EAPOL-Key feature (e.g., because radio keys are not applicable to Ethernet ports), this object's value will be FALSE and attempts to write TRUE will fail. Normally, if radio keys are present, the manager enters them into the access point through some manual process. The manager or the users may also need to configure the keys into each laptop (access points can distribute the keys automatically to 802.1x EAP-TLS clients). However laptops get keys, the keys remain static until somebody goes to the trouble of changing them. If the keys stay unchanged for long periods, this can make it easier for a determined attacker to launch a cryptographic attack. When rapid rekeying is enabled, an access point ignores its manually-set keys. It generates pseudo-random keys on a periodic basis, using IEEE 802.1x key distribution to deliver the keys to new and current clients. Do not enable rapid rekeying unless ALL of your clients support IEEE 802.1x and an authentication method (e.g., EAP-TLS) that supports key distribution. Before enabling rapid rekeying, make sure that you have set 'dot1xAuthKeyTxEnabled' to TRUE. Changing the keys without telling any of the clients about the changes is not a very useful mode of operation.
etsysDot1xRekeyPeriod .1.3.6.1.4.1.5624.1.2.17.1.1.1.1.2
When rapid rekeying (periodic changing of radio keys) is enabled, the value of this object determines the period, in seconds, between key changes.
etsysDot1xRekeyLength .1.3.6.1.4.1.5624.1.2.17.1.1.1.1.3
Determines the number of bits/bytes used in the encryption keys. Currently supports either 128-bit (16-octet) encryption keys or 40-bit (5-octet) encryption keys.
etsysDot1xRekeyAsymmetric .1.3.6.1.4.1.5624.1.2.17.1.1.1.1.4
Determines the association between the supplicant and authenticator transmit keys. If true(1), the authenticator and supplicant will use different encryption keys in order to transmit data. If false(2), the authenticator and supplicant will use a single key pattern to encrypt the transmitted data.
Table
etsysDot1xRekeyConfigTable .1.3.6.1.4.1.5624.1.2.17.1.1.1
A table that contains encryption-key-related configuration objects for ports on which Authenticator PAEs can run.
Object Identifier
etsys8021xRekeyingMIB .1.3.6.1.4.1.5624.1.2.17
This MIB module defines a portion of the SNMP enterprise MIBs under Enterasys Networks' enterprise OID pertaining to IEEE 802.1x authentication. This MIB is designed to supplement and be used in connection with the standard IEEE 802.1x MIB. It provides configuration controls for Enterasys Networks' rapid rekeying feature -- a feature that enhances wireless LAN security by changing the network's radio keys on a regular basis.
etsysDot1xRekeyingObjects .1.3.6.1.4.1.5624.1.2.17.1
etsysDot1xRekeyBaseBranch .1.3.6.1.4.1.5624.1.2.17.1.1
etsysDot1xRekeyingConformance .1.3.6.1.4.1.5624.1.2.17.2
etsysDot1xRekeyingGroups .1.3.6.1.4.1.5624.1.2.17.2.1
etsysDot1xRekeyingCompliances .1.3.6.1.4.1.5624.1.2.17.2.2
Group
etsysDot1xRekeyingBaseGroup .1.3.6.1.4.1.5624.1.2.17.2.1.1
A collection of objects providing rekeying configuration information about a port on which Authenticator PAEs can run.