OIDs - auth_server monitor
The objects described here can be monitored with the IPHost Network Monitor.
You can start SNMP monitoring using free 30-day trial version of IPHost right now.
OID list for auth server
- World Wide Packets 8021 x Radius Server Authentication Port
- wwp8021xRadiusServerAuthPort 1.3.6.1.4.1.6141.2.401.1.2.2.4.1.3 (defined in WWP-8021X-MIB)
The destination UDP port number to which RADIUS messages should be sent. The RADIUS server will not be used for authentication if this port number is 0. - World Wide Packets 8021 x Radius Server Authentication Key
- wwp8021xRadiusServerAuthKey 1.3.6.1.4.1.6141.2.401.1.2.2.4.1.4 (defined in WWP-8021X-MIB)
The Auth Key to be used for Radius Servers. Retrieving the value of this object via SNMP will return an empty string for security reasons - dns Server Counter Authentication Answer
- dnsServCounterAuthAns 1.3.6.1.2.1.32.1.1.2.2 (defined in rfc1611)
Number of queries which were authoritatively answered. - dns Server Counter Authentication No Names
- dnsServCounterAuthNoNames 1.3.6.1.2.1.32.1.1.2.3 (defined in rfc1611)
Number of queries for which `authoritative no such name' responses were made. - dns Server Counter Non Authentication No Datas
- dnsServCounterNonAuthNoDatas 1.3.6.1.2.1.32.1.1.2.6 (defined in rfc1611)
Number of queries which were non-authoritatively answered with no data (empty answer). - dns Server Option Counter Self Authentication Answer
- dnsServOptCounterSelfAuthAns 1.3.6.1.2.1.32.1.1.3.1 (defined in rfc1611)
Number of requests the server has processed which originated from a resolver on the same host for which there has been an authoritative answer. - dns Server Option Counter Self Authentication No Names
- dnsServOptCounterSelfAuthNoNames 1.3.6.1.2.1.32.1.1.3.2 (defined in rfc1611)
Number of requests the server has processed which originated from a resolver on the same host for which there has been an authoritative no such name answer given. - dns Server Option Counter Self Non Authentication No Datas
- dnsServOptCounterSelfNonAuthNoDatas 1.3.6.1.2.1.32.1.1.3.5 (defined in rfc1611)
Number of requests the server has processed which originated from a resolver on the same host for which a `non-authoritative, no such data' response was made (empty answer). - dns Server Option Counter Friends Authentication No Data Responses
- dnsServOptCounterFriendsAuthNoDataResps 1.3.6.1.2.1.32.1.1.3.14 (defined in rfc1611)
Number of queries originating from friends for which authoritative no such data (empty answer) responses were made. The definition of friends is a locally defined matter. - dns Server Option Counter Friends Non Authentication Datas
- dnsServOptCounterFriendsNonAuthDatas 1.3.6.1.2.1.32.1.1.3.15 (defined in rfc1611)
Number of queries originating from friends which were non-authoritatively answered (cached data). The definition of friends is a locally defined matter. - rbtws Client Session Client Session Authentication Server
- rbtwsClSessClientSessAuthServer 1.3.6.1.4.1.52.4.15.1.4.4.1.1.1.1.11 (defined in rbtws-client-session-mib)
Authentication Server's IP Address. If the client is authenticated via the local DB, or not authenticated, its value will be the system IP. - rbtws Client Authentication Server Ip
- rbtwsClientAuthServerIp 1.3.6.1.4.1.52.4.15.1.2.11 (defined in rbtws-trap-mib)
The client authentication server ip address. This object is used within notifications and is not accessible. - enterasys Dot1x Authentication Server Timeout
- etsysDot1xAuthServerTimeout 1.3.6.1.4.1.5624.1.2.18.1.2.1.2.1.10 (defined in enterasys-8021x-extensions-mib)
The value, in seconds, of the serverTimeout constant currently in use by the Backend Authentication state machine. - Enterasys Encrypted Dot1x Authentication Server Timeout
- etsysEncrDot1xAuthServerTimeout 1.3.6.1.4.1.5624.1.2.19.1.1.1.1.6 (defined in enterasys-encr-8021x-config-mib)
An encrypted octet string containing The value, in seconds, of the serverTimeout constant currently in use by the Backend Authentication state machine. Alternately, the default value (for ports that use station-based access control, and that therefore may support many virtual PAEs). The data type is 1, Integer32. - Enterasys Multi Authentication Session Authentication Server Type
- etsysMultiAuthSessionAuthServerType 1.3.6.1.4.1.5624.1.2.46.1.4.1.1.4 (defined in enterasys-multi-auth-mib)
The type of authentication server used to authenticate this session. A value of radius(1) indicates that a RADIUS request and response were attempted in order to authenticate the session. A value of local(2) indicates that the session was authenticated by a local file or configuration on the device itself. - Enterasys Multi Authentication Session Authentication Server Address Type
- etsysMultiAuthSessionAuthServerAddrType 1.3.6.1.4.1.5624.1.2.46.1.4.1.1.5 (defined in enterasys-multi-auth-mib)
The type of data returned by etsysMultiAuthSessionAuthServerAddr. If the etsysMultiAuthSessionAuthServerType leaf for this entry has a value of local(2) then this object MUST return a a value of unknown(0). - Enterasys Multi Authentication Session Authentication Server Address
- etsysMultiAuthSessionAuthServerAddr 1.3.6.1.4.1.5624.1.2.46.1.4.1.1.6 (defined in enterasys-multi-auth-mib)
The network address of the authentication server for this session. If the etsysMultiAuthSessionAuthServerType leaf for this entry has a value of local(2) then this object MUST return a zero length string. - Enterasys Radius Authentication Server Encrypt Table
- etsysRadiusAuthServerEncryptTable 1.3.6.1.4.1.5624.1.2.5.1.6 (defined in enterasys-radius-auth-client-encrypt-mib)
The (conceptual) table listing the RADIUS authentication servers with which the client shares a secret. - Enterasys Radius Authentication Client Server Address Encrypt
- etsysRadiusAuthClientServerAddressEncrypt 1.3.6.1.4.1.5624.1.2.5.1.6.1.2 (defined in enterasys-radius-auth-client-encrypt-mib)
The dotted-decimal IPv4 address of RADIUS authentication server. This parameter value is maintained across system reboots. This object's true data type is 2, OCTET STRING. - Enterasys Radius Authentication Client Server Secret Encrypt
- etsysRadiusAuthClientServerSecretEncrypt 1.3.6.1.4.1.5624.1.2.5.1.6.1.4 (defined in enterasys-radius-auth-client-encrypt-mib)
This object is the secret shared between the RADIUS authentication server and RADIUS client. This parameter value is maintained across system reboots. This object's true data type is 2, OCTET STRING. - Enterasys Radius Authentication Client Server Clear Time Encrypt
- etsysRadiusAuthClientServerClearTimeEncrypt 1.3.6.1.4.1.5624.1.2.5.1.6.1.6 (defined in enterasys-radius-auth-client-encrypt-mib)
This value indicates the date and time since server counters were last cleared. On a write, the server counters will be cleared and the clear time will be set to the current time if the decoded object is zero. This object's true data type is 1, Integer32. - Enterasys Radius Authentication Client Server Status Encrypt
- etsysRadiusAuthClientServerStatusEncrypt 1.3.6.1.4.1.5624.1.2.5.1.6.1.7 (defined in enterasys-radius-auth-client-encrypt-mib)
Lets users create and delete RADIUS authentication server entries on systems that support this capability. Rules 1. When creating a RADIUS Authentication Client, it is up to the management station to determine a suitable etsysRadiusAuthServerIndexEncrypt. To facilitate interoperability, agents should not put any restrictions on the etsysRadiusAuthServerIndexEncrypt beyond the obvious ones that it be valid and unused. 2. Before a new row can become 'active', values must be supplied for the columnar objects etsysRadiusAuthClientServerAddressEncrypt, etsysRadiusAuthClientServerPortNumberEncrypt and etsysRadiusAuthClientServerSecretEncrypt. 3. The value of etsysRadiusAuthClientServerStatusEncrypt must be set to 'notInService' in order to modify a writable object in the same conceptual row. 4. etsysRadiusAuthClientServer entries whose status is 'notReady' or 'notInService' will not be used for authentication. - Enterasys Radius Authentication Server Index
- etsysRadiusAuthServerIndex 1.3.6.1.4.1.5624.1.2.4.1.5.1.1 (defined in enterasys-radius-auth-client-mib)
A number uniquely identifying each conceptual row in the etsysRadiusAuthServerTable. This value also indicates the relative priority of the servers. The initial authentication attempt will be against the server with the lowest value of etsysRadiusAuthServerIndex and any successive attempt will be with the next higher value, and so on. Maintaining the value of etsysRadiusAuthServerIndex for all active(1) entries across agent reboots is REQUIRED. - Enterasys Radius Authentication Client Server Address
- etsysRadiusAuthClientServerAddress 1.3.6.1.4.1.5624.1.2.4.1.5.1.3 (defined in enterasys-radius-auth-client-mib)
The encoded unicast IP address or hostname of a RADIUS server. RADIUS requests will be sent to this address. If this address is a DNS hostname, then that hostname SHOULD be resolved into an IP address each time an authentication session is initialized. - Enterasys Radius Authentication Client Server Port Number
- etsysRadiusAuthClientServerPortNumber 1.3.6.1.4.1.5624.1.2.4.1.5.1.4 (defined in enterasys-radius-auth-client-mib)
The UDP port number (0-65535) the client will use to send RADIUS requests to this server. - Enterasys Radius Authentication Client Server Secret
- etsysRadiusAuthClientServerSecret 1.3.6.1.4.1.5624.1.2.4.1.5.1.5 (defined in enterasys-radius-auth-client-mib)
This object is the secret shared between the RADIUS authentication server and the RADIUS client. On a read operation this object MUST return a zero length string. Writing this object with a zero length string clears the secret. - Enterasys Radius Authentication Client Server Timeout
- etsysRadiusAuthClientServerTimeout 1.3.6.1.4.1.5624.1.2.4.1.5.1.10 (defined in enterasys-radius-auth-client-mib)
The number of seconds to wait for a RADIUS Server to respond to a request. A value of -1 indicates that the server timeout specified by etsysRadiusAuthClientRetryTimeout should be used for this server. Maintaining the value of this object across agent reboots is REQUIRED. - ALTIGA ACE Server Authentication Successes
- alACEServerAuthSuccesses 1.3.6.1.4.1.3076.2.1.2.45.2.1.9 (defined in ALTIGA-SDI-ACE-STATS-MIB)
number of auth successes. - ALTIGA ACE Server Authentication Failures
- alACEServerAuthFailures 1.3.6.1.4.1.3076.2.1.2.45.2.1.10 (defined in ALTIGA-SDI-ACE-STATS-MIB)
number of failures for this server. - Cisco CDS-TV Authentication Manager Server Thread Pool
- cdstvAuthMgrServerThreadPool 1.3.6.1.4.1.9.9.751.1.8 (defined in CISCO-CDSTV-AUTHMGR-MIB)
This object specifies the number of threads in the Authentication Manager server pool that are used to process authentication requests for the duration of the connection. - Cisco Dot11 Security Local Authentication Server Enabled
- cdot11SecLocalAuthServerEnabled 1.3.6.1.4.1.9.9.413.1.2.1 (defined in CISCO-DOT11-SSID-SECURITY-MIB)
This object configures the use of local authentication server. If it is 'true', local authentication server is enabled. If it is 'false', the local authentication server is disabled. If both local and network servers are configured, the local server is used as back up when network authentication server is not available. - Cisco Ggsn Default Aaa Authentication Server Group
- cGgsnDefaultAaaAuthServerGroup 1.3.6.1.4.1.9.9.240.1.3.5 (defined in CISCO-GGSN-MIB)
This object specifies the AAA radius server group that is used for authentication by all APN's on this GGSN. - Cisco GPRS Access Point Aaa Authentication Server Group
- cgprsAccPtAaaAuthServerGroup 1.3.6.1.4.1.9.9.183.1.1.1.1.26 (defined in CISCO-GPRS-ACC-PT-MIB)
This object specifies the AAA radius server group that is used for authentication by this APN. - Authentication User Profile Tunnel Server
- authUserProfileTunnelServer 1.3.6.1.4.1.2.6.119.7.2.1.2.1.25 (defined in ibm-ibmauth)
Tunnel-Server endpoint address. For IP protocol, it is the server IP address in dotted notation. - Juniper L2tp Session Stats Accounting Tnl Server Authentication ID
- jnxL2tpSessionStatsAcctTnlServerAuthID 1.3.6.1.4.1.2636.3.49.1.1.4.1.46 (defined in JNX-L2TP-MIB)
This object contains the local host name of the tunnel that is hosting this session. - Juniper Pae Authentication Config Server Timeout
- jnxPaeAuthConfigServerTimeout 1.3.6.1.4.1.2636.3.40.1.3.1.1.2.1.11 (defined in JUNIPER-PAE-EXTENSION-MIB)
This object specifies Authentication server timeout interval on the specified PAE port. - Switch AAC Server Group Authentication Protocol1
- swAACServerGroupAuthProtocol1 1.3.6.1.4.1.171.12.5.9.1.3 (defined in AAC)
The authentication protocol provided by the Server. - Switch AAC Server Group Authentication Protocol4
- swAACServerGroupAuthProtocol4 1.3.6.1.4.1.171.12.5.9.1.9 (defined in AAC)
The authentication protocol provided by the Server. - Switch AAC Server Group Authentication Protocol7
- swAACServerGroupAuthProtocol7 1.3.6.1.4.1.171.12.5.9.1.15 (defined in AAC)
The authentication protocol provided by the Server. - Switch AAC Server Authentication Key
- swAACServerAuthKey 1.3.6.1.4.1.171.12.5.10.1.4 (defined in AAC)
The key used while authentication process .It is write-only. - Switch AAC Control Server Authentication Protocol
- swAACCtrlServerAuthProtocol 1.3.6.1.4.1.171.12.5.12.1.3 (defined in AAC)
The authentication protocol provide by the Server.