ciscoRptrPortMDIStatus |
.1.3.6.1.4.1.9.9.22.1.1.1.1 |
This object indicates the port's MDI/MDI-X switching status.
The normal(1) status indicates the port is configured to be
standard MDI as defined by the 10BaseT Standard for hub port
(allowing for connection to a chained hub). The crossover(2)
status indicates the port is configured to be in MDI-X mode
(allowing for connection to a 10BaseT end node). The
notSwitchable(3) status indicates the port is not switchable
between MDI and MDI-X mode.
|
ciscoRptrPortLinkTestEnabled |
.1.3.6.1.4.1.9.9.22.1.1.1.2 |
Specifies whether or not Link Integrity Test Function is
enabled for the port as specified by the 10BaseT Standard.
When the link test function is enabled, the absence of the
Link Test pulses and receive data on the port will cause the
port to go into a Link Fail state. In this state, the data
transmission, data reception and collision detection functions
are disabled until valid data or 4 consecutive Link Test
pulses appear on RXD+/- pair of the port.
With the Link Integrity Test Function disabled, the data
driver, receiver and collision detection remain enabled
irrespective of the presence or absence of data or Link Test
pulses on the port.
|
ciscoRptrPortLinkTestFailed |
.1.3.6.1.4.1.9.9.22.1.1.1.3 |
This object indicates the status of the Link Test function
for the port. Set to false indicates valid data or 4
consecutive Link Test pulses have been detected on the
port. Set to true indicates the failure of the Link Test
function for the port. In the Link Test Fail state, data
transmission, data reception and collision detection functions
are disabled until valid data or 4 consecutive Link Test pulses
appear on the RXD+/- pair of the port.
|
ciscoRptrPortAutoPolarityEnabled |
.1.3.6.1.4.1.9.9.22.1.1.1.4 |
Specifies whether or not the Automatic Receiver Polarity
Reversal is enabled for the port. This feature provides the
ability to invert the polarity of the signals appearing at the
RXD+/- pair of the port prior to re-transmission if the
polarity of the received signal is reversed (such as in the
case of wiring error).
|
ciscoRptrPortAutoPolarityCorrected |
.1.3.6.1.4.1.9.9.22.1.1.1.5 |
This object indicates the status of the Automatic Receiver
Polarity Reversal for the port. Set to true indicates the
polarity of the port has been detected as reversed and is
corrected. Set to false indicates the polarity for the port
as having correct polarity.
|
ciscoRptrPortSrcAddrCtrl |
.1.3.6.1.4.1.9.9.22.1.1.1.6 |
Specifies whether or not the Source Address Control feature is
enabled for the port. This feature provides the ability to
control which device's specific MAC address is allowed access
to the network. If the management entity specified an address
via ciscoRptrPortAllowedSrcAddr, only the device with the
configured MAC address is allowed access to the network. If
the management entity does not specified an address, the
allowed source address is learned from the last source address
if valid; otherwise, the allowed source address is learned from
the MAC address of the first valid packet detected on the port.
When another MAC address other than the allowed source address
is detected on the port, the port is partitioned.
WARNING: Configuring Source Address Control feature on the
port which is used for management can cause the management
entity to lose access to the agent if the management's source
address does not match the allowed source address.
|
ciscoRptrPortAllowedSrcAddr |
.1.3.6.1.4.1.9.9.22.1.1.1.7 |
For write access, this object is the allowed source address
that is to be configured for source address control feature
for the port.
For read access, if no allowed source address was specifically
specified by the manager, the agent shall return the learned
address to control. Otherwise, the specified allowed source
address is returned if configured by management entity.
|
ciscoRptrPortAllowedSrcAddrStatus |
.1.3.6.1.4.1.9.9.22.1.1.1.8 |
This object indicates the status of ciscoRptrPortAllowedSrcAddr
for the port. allowedSrcAddrConfig(1) status indicates that
the allowed source address was explicitly configured by
management entity. The allowedSrcAddrLearn(2) status indicates
that the allowed source address was learned for the port.
The allowedSrcAddrUndefined(3) status indicates that currently
there is no restriction on the source address for the port.
|
ciscoRptrPortLastIllegalSrcAddr |
.1.3.6.1.4.1.9.9.22.1.1.1.9 |
This object is the last illegal source address which caused
this port to be partitioned. If the port is never partitioned
due to Source Address Control, the agent shall return a string
of length zero.
|
ciscoRptrPortIllegalAddrTrapAcked |
.1.3.6.1.4.1.9.9.22.1.1.1.10 |
Specifies whether an acknowledgment is sent by an NMS to
indicate that an illegal source address trap was
received.
acked :
Set by a NMS to acknowledge reception of an
illegal source address. When this flag is
set, no more trap will be sent for the port.
no-acked-sending:
Set by the SNMP agent to indicate that it is
sending a trap to one or more NMSs.
The trap is sent based upon the trap
algorithm specified by ciscoRptrTrapAlgorithm.
no-acked-no-sending:
Set by the SNMP agent when there is no trap
to be sent or the trap was already sent out.
|
ciscoRptrPortIllegalAddrTrapEnabled |
.1.3.6.1.4.1.9.9.22.1.1.1.11 |
Specifies whether or not to send the illegal source
address trap for the port.
When it is enabled, one or more illegal source address
traps will be generated if there is a mismatch of
source address. Traps are sent based on the algorithm
specified by ciscoRptrTrapAlgorithm defined in the
GLOBAL section.
When it is disabled, no traps are sent.
|
ciscoRptrPortIllegalAddrFirstHeard |
.1.3.6.1.4.1.9.9.22.1.1.1.12 |
This is the time stamp for the very first time when
the current illegal source address was detected on the
port. The time stamp is given by the value of MIB-II's
sysUpTime at which this occurrence happens. If no illegal
source address is heard on the port, this value is set
to 0.
|
ciscoRptrPortIllegalAddrLastHeard |
.1.3.6.1.4.1.9.9.22.1.1.1.13 |
This is the time stamp for the last time when the
current illegal source address was detected on the
port. The time stamp is given by the value of MIB-II's
sysUpTime at which occurrence happens. If no illegal
source address was never occurred, this value is set
to 0.
|
ciscoRptrPortLastIllegalAddrCount |
.1.3.6.1.4.1.9.9.22.1.1.1.14 |
This is the count of consecutive occurrences of
the last illegal source address on the port.
When illegal address is detected, this count
will be incremented about every minute.
|
ciscoRptrPortIllegalAddrTotalCount |
.1.3.6.1.4.1.9.9.22.1.1.1.15 |
This is the total count of all cccurences of any
illegal source addresses heard on the port since start-up.
Note: Illegal source addresses may be different, may be
the same. This counter is a *total* count from this port.
|