- Table of Contents
-
- 17-User Access and Authentication
- 01-HH3C-8021X-EXT2-MIB
- 02-HH3C-AAA-MIB
- 03-HH3C-DOMAIN-MIB
- 04-HH3C-LOCAL-AAA-SERVER-MIB
- 05-HH3C-PORT-SECURITY-MIB
- 06-HH3C-PORTAL-MIB
- 07-HH3C-RADIUS-MIB
- 08-HH3C-USER-MIB
- 09-IEEE8021-PAE-MIB
- 10-IEEE8021-SECY-MIB
- 11-IEEE8021X-PAE-MIB
- 12-RADIUS-ACC-CLIENT-MIB
- 13-RADIUS-AUTH-CLIENT-MIB
- Related Documents
-
Title | Size | Download |
---|---|---|
07-HH3C-RADIUS-MIB | 192.37 KB |
Contents
hh3cRadiusAuthErrThreshold (1.3.6.1.4.1.25506.2.13.1.3.1)
hh3cRadiusStatAccAck (1.3.6.1.4.1.25506.2.13.6.2)
hh3cRadiusStatLogoutReq (1.3.6.1.4.1.25506.2.13.6.3)
hh3cRadiusStatLogoutAck (1.3.6.1.4.1.25506.2.13.6.4)
hh3cRadiusAccCacheMaxPackets (1.3.6.1.4.1.25506.2.13.8.1.1)
hh3cRadiusAccCacheUpperValue (1.3.6.1.4.1.25506.2.13.8.1.2)
hh3cRadiusAccCacheLowerValue (1.3.6.1.4.1.25506.2.13.8.1.3)
hh3cRadiusAccCacheMemoryUsage (1.3.6.1.4.1.25506.2.13.8.1.4)
hh3cRadiusAccCachePackets (1.3.6.1.4.1.25506.2.13.8.1.5)
hh3cRdSecondaryAuthServerTable
hh3cRadiusAuthenticationServerUpTrap
hh3cRadiusAccountingServerUpTrap
hh3cRadiusAuthenticationServerDownTrap
hh3cRadiusAccountingServerDownTrap
hh3cRadiusAccCachePacketDiscard
HH3C-RADIUS-MIB
About this MIB
Use this MIB to obtain and configure RADIUS server settings.
MIB file name
hh3c-radius.mib
Root object
iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).hh3c(25506).hh3cCommon(2).hh3cRadius(13)
Scalar objects
hh3cRadiusAuthErrThreshold (1.3.6.1.4.1.25506.2.13.1.3.1)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAuthErrThreshold (1.3.6.1.4.1.25506.2.13.1.3.1) |
read-write |
Unsigned32 |
Unsigned32 (1..100) |
Authentication failure alarm threshold. |
As per the MIB. |
hh3cRadiusStatAccAck (1.3.6.1.4.1.25506.2.13.6.2)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusStatAccAck (1.3.6.1.4.1.25506.2.13.6.2) |
read-only |
Counter64 |
Standard MIB values. |
Number of RADIUS accounting responses received from the RADIUS server. |
As per the MIB. |
hh3cRadiusStatLogoutReq (1.3.6.1.4.1.25506.2.13.6.3)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusStatLogoutReq (1.3.6.1.4.1.25506.2.13.6.3) |
read-only |
Counter64 |
Standard MIB values. |
Number of logout requests sent to the RADIUS server. |
As per the MIB. |
hh3cRadiusStatLogoutAck (1.3.6.1.4.1.25506.2.13.6.4)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusStatLogoutAck (1.3.6.1.4.1.25506.2.13.6.4) |
read-only |
Counter64 |
Standard MIB values. |
Number of logout responses received from the RADIUS server. |
As per the MIB. |
hh3cRadiusAccCacheMaxPackets (1.3.6.1.4.1.25506.2.13.8.1.1)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAccCacheMaxPackets (1.3.6.1.4.1.25506.2.13.8.1.1) |
accessible-for-notify |
Integer32 |
256..2147483647 |
Maximum number of buffered accounting packets. |
As per the MIB. |
hh3cRadiusAccCacheUpperValue (1.3.6.1.4.1.25506.2.13.8.1.2)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAccCacheUpperValue (1.3.6.1.4.1.25506.2.13.8.1.2) |
accessible-for-notify |
Integer32 |
1..100 |
Upper threshold for accounting packet buffering, in percentage. |
As per the MIB. |
hh3cRadiusAccCacheLowerValue (1.3.6.1.4.1.25506.2.13.8.1.3)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAccCacheLowerValue (1.3.6.1.4.1.25506.2.13.8.1.3) |
accessible-for-notify |
Integer32 |
0..99 |
Lower threshold for accounting packet buffering, in percentage. |
As per the MIB. |
hh3cRadiusAccCacheMemoryUsage (1.3.6.1.4.1.25506.2.13.8.1.4)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAccCacheMemoryUsage (1.3.6.1.4.1.25506.2.13.8.1.4) |
accessible-for-notify |
Integer32 |
0..100 |
Current memory usage, in percentage. |
As per the MIB. |
hh3cRadiusAccCachePackets (1.3.6.1.4.1.25506.2.13.8.1.5)
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAccCachePackets (1.3.6.1.4.1.25506.2.13.8.1.5) |
accessible-for-notify |
Integer32 |
256..2147483647 |
Current number of buffered packets. |
As per the MIB. |
Tabular objects
hh3cRdInfoTable
About this table
Use this table to configure or obtain RADIUS authentication scheme settings. Each RADIUS scheme contains a primary authentication server, a secondary authentication server, and other settings.
Support for operations
Create:Supported
Edit/Modify:Supported
Delete:Supported
Read:Supported
Columns
The table index is hh3cRdGroupName.
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRdGroupName (1.3.6.1.4.1.25506.2.13.1.1.1.1) |
read-only |
DisplayString |
OCTET STRING (1..32) |
Name of a RADIUS scheme. |
As per the MIB. |
hh3cRdPrimUdpPort (1.3.6.1.4.1.25506.2.13.1.1.1.3) |
read-create |
Integer32 |
Standard MIB values. |
Port number of the primary authentication server. |
Value range: 1 to 65535. |
hh3cRdPrimState (1.3.6.1.4.1.25506.2.13.1.1.1.4) |
read-create |
INTEGER |
active(1), block(2) |
Status of the primary authentication server. |
As per the MIB. |
hh3cRdSecUdpPort (1.3.6.1.4.1.25506.2.13.1.1.1.6) |
read-create |
Integer32 |
Standard MIB values. |
Port number of the secondary authentication server. |
Value range: 1 to 65535. |
hh3cRdSecState (1.3.6.1.4.1.25506.2.13.1.1.1.7) |
read-create |
INTEGER |
active(1), block(2) |
Status of the secondary authentication server. |
As per the MIB. |
hh3cRdKey (1.3.6.1.4.1.25506.2.13.1.1.1.8) |
read-create |
DisplayString |
OCTET STRING (1..32) |
Shared key for communication with the authentication server. |
The shared key is a string of 0 to 64 characters. When read, this object returns a zero-length string. In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters. |
hh3cRdRetry (1.3.6.1.4.1.25506.2.13.1.1.1.9) |
read-create |
Integer32 |
Standard MIB values. |
Maximum number of attempts for transmitting an authentication packet to the authentication server. |
Value range: 1 to 20. |
hh3cRdTimeout (1.3.6.1.4.1.25506.2.13.1.1.1.10) |
read-create |
Integer32 |
Standard MIB values. |
Response timeout time for the RADIUS authentication server, in seconds. |
Value range: 1 to 10. |
hh3cRdPrimAuthIpAddrType (1.3.6.1.4.1.25506.2.13.1.1.1.11) |
read-create |
InetAddressType |
Standard MIB values. |
Type of the IP address for the primary authentication server. |
You must specify hh3cRdPrimAuthIpAddrType and hh3cRdPrimAuthIpAddr in pairs in an SNMP request. |
hh3cRdPrimAuthIpAddr (1.3.6.1.4.1.25506.2.13.1.1.1.12) |
read-create |
InetAddress |
OCTET STRING (0..255) |
IP address of the primary authentication server. |
As per the MIB. |
hh3cRdSecAuthIpAddrType (1.3.6.1.4.1.25506.2.13.1.1.1.13) |
read-create |
InetAddressType |
Standard MIB values. |
Type of the IP address for the secondary authentication server. |
You must specify hh3cRdSecAuthIpAddrType and hh3cRdSecAuthIpAddr in pairs in an SNMP request. |
hh3cRdSecAuthIpAddr (1.3.6.1.4.1.25506.2.13.1.1.1.14) |
read-create |
InetAddress |
OCTET STRING (0..255) |
IP address of the secondary authentication server. |
As per the MIB. |
hh3cRdServerType (1.3.6.1.4.1.25506.2.13.1.1.1.15) |
read-create |
INTEGER |
standard(1), iphotel(2), portal(3), extended(4) |
Service type of the RADIUS authentication server. |
Only standard RADIUS attributes (value 1) are supported. |
hh3cRdQuietTime (1.3.6.1.4.1.25506.2.13.1.1.1.16) |
read-create |
Integer32 |
Integer32 (0..255) |
Quiet time for the authentication server to restore to the active status, in minutes. |
Value range: 0 to 255. |
hh3cRdUserNameFormat (1.3.6.1.4.1.25506.2.13.1.1.1.17) |
read-create |
INTEGER |
withoutdomain(1), withdomain(2) , keeporignal(3) |
Format of usernames sent to the RADIUS server. |
As per the MIB. |
hh3cRdRowStatus (1.3.6.1.4.1.25506.2.13.1.1.1.18) |
read-create |
RowStatus |
Standard MIB values. |
Row status. |
The following values are supported: active(1). createAndGo(4). destroy(6). |
hh3cRdSecKey (1.3.6.1.4.1.25506.2.13.1.1.1.19) |
read-create |
DisplayString |
OCTET STRING (0..64) |
Shared key for communication with the secondary authentication server. |
The shared key is a string of 0 to 64 characters. In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters. When read, this object returns a zero-length string. |
hh3cRdPrimVpnName (1.3.6.1.4.1.25506.2.13.1.1.1.20) |
read-create |
DisplayString |
OCTET STRING (0..31) |
Name of the VPN to which the primary authentication server belongs. |
As per the MIB. |
hh3cRdSecVpnName (1.3.6.1.4.1.25506.2.13.1.1.1.21) |
read-create |
DisplayString |
OCTET STRING (0..31) |
Name of the VPN to which the secondary authentication server belongs. |
As per the MIB. |
hh3cRdAuthNasIpAddrType (1.3.6.1.4.1.25506.2.13.1.1.1.22) |
read-create |
InetAddressType |
Standard MIB values. |
Type of the NAS IP addresses for RADIUS authentication packets sent to the authentication server. |
Not supported. |
hh3cRdAuthNasIpAddr (1.3.6.1.4.1.25506.2.13.1.1.1.23) |
read-create |
IpAddress |
Standard MIB values. |
NAS IPv4 address. |
As per the MIB. |
hh3cRdAuthNasIpv6Addr (1.3.6.1.4.1.25506.2.13.1.1.1.24) |
read-create |
Ipv6Address |
Standard MIB values. |
NAS IPv6 address. |
As per the MIB. |
hh3cRdAccInfoTable
About this table
Use this table to configure or obtain RADIUS accounting scheme settings. Each RADIUS scheme contains a primary accounting server, a secondary accounting server, and other settings.
Support for operations
Create:Supported
Edit/Modify:Supported
Delete:Supported
Read:Supported
Columns
The table index is hh3cRdAccGroupName.
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRdAccGroupName (1.3.6.1.4.1.25506.2.13.1.2.1.1) |
read-only |
DisplayString |
OCTET STRING (1..32) |
Name of a RADIUS accounting scheme. |
As per the MIB. |
hh3cRdPrimAccIpAddrType (1.3.6.1.4.1.25506.2.13.1.2.1.2) |
read-create |
InetAddressType |
Standard MIB values. |
Type of the IP address for the primary accounting server. |
You must specify hh3cRdPrimAccIpAddrType and hh3cRdPrimAccIpAddr in pairs in an SNMP request. |
hh3cRdPrimAccIpAddr (1.3.6.1.4.1.25506.2.13.1.2.1.3) |
read-create |
InetAddress |
OCTET STRING (0..255) |
IP address of the primary accounting server. |
As per the MIB. |
hh3cRdPrimAccUdpPort (1.3.6.1.4.1.25506.2.13.1.2.1.4) |
read-create |
Integer32 |
Standard MIB values. |
Port number of the primary accounting server. |
Value range: 1 to 65535. |
hh3cRdPrimAccState (1.3.6.1.4.1.25506.2.13.1.2.1.5) |
read-create |
INTEGER |
active(1), block(2) |
Status of the primary accounting server. |
As per the MIB. |
hh3cRdSecAccIpAddrType (1.3.6.1.4.1.25506.2.13.1.2.1.6) |
read-create |
InetAddressType |
Standard MIB values. |
Type of the IP address for the secondary accounting server. |
You must specify hh3cRdSecAccIpAddrType and hh3cRdSecAccIpAddr in pairs in an SNMP request. |
hh3cRdSecAccIpAddr (1.3.6.1.4.1.25506.2.13.1.2.1.7) |
read-create |
InetAddress |
OCTET STRING (0..255) |
IP address of the secondary accounting server. |
As per the MIB. |
hh3cRdSecAccUdpPort (1.3.6.1.4.1.25506.2.13.1.2.1.8) |
read-create |
Integer32 |
Standard MIB values. |
Port number of the secondary accounting server. |
Value range: 1 to 65535. |
hh3cRdSecAccState (1.3.6.1.4.1.25506.2.13.1.2.1.9) |
read-create |
INTEGER |
active(1), block(2) |
Status of the primary accounting server. |
As per the MIB. |
hh3cRdAccKey (1.3.6.1.4.1.25506.2.13.1.2.1.10) |
read-create |
DisplayString |
OCTET STRING (0..64) |
Shared key for communication with the accounting server. |
The shared key is a string of 0 to 64 characters. In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters. When read, this object returns a zero-length string. |
hh3cRdAccRetry (1.3.6.1.4.1.25506.2.13.1.2.1.11) |
read-create |
Integer32 |
Standard MIB values. |
Maximum number of attempts for transmitting an accounting packet to the accounting server. |
Value range: 1 to 20. |
hh3cRdAccTimeout (1.3.6.1.4.1.25506.2.13.1.2.1.12) |
read-create |
Integer32 |
Standard MIB values. |
Response timeout time for the accounting server, in seconds. |
Value range: 1 to 10. |
hh3cRdAccServerType (1.3.6.1.4.1.25506.2.13.1.2.1.13) |
read-create |
INTEGER |
standard(1), iphotel(2), portal(3), extended(4) |
Service type provided by the accounting server. |
Only standard RADIUS attributes (value 1) are supported. |
hh3cRdAccQuietTime (1.3.6.1.4.1.25506.2.13.1.2.1.14) |
read-create |
Integer32 |
Integer32 (0..255) |
Quiet time for the accounting server to restore to the active status, in minutes. |
Value range: 0 to 255. |
hh3cRdAccFailureAction (1.3.6.1.4.1.25506.2.13.1.2.1.15) |
read-create |
INTEGER |
ignore (1), reject(2) |
Action to take on accounting failure. |
Not supported |
hh3cRdAccRealTime (1.3.6.1.4.1.25506.2.13.1.2.1.16) |
read-create |
Integer32 |
Integer32 (0..71582) |
Interval for sending real-time accounting packets (in minutes by default). |
As per the MIB. |
hh3cRdAccRealTimeRetry (1.3.6.1.4.1.25506.2.13.1.2.1.17) |
read-create |
Integer32 |
Integer32 (1..255) |
Maximum number of attempts for transmitting a real-time accounting packet. |
As per the MIB. |
hh3cRdAccSaveStopPktEnable (1.3.6.1.4.1.25506.2.13.1.2.1.18) |
read-create |
TruthValue |
true(1), false(2) |
Whether to buffer RADIUS stop-accounting requests to which no responses have been received. |
Not supported. |
hh3cRdAccStopRetry (1.3.6.1.4.1.25506.2.13.1.2.1.19) |
read-create |
Integer32 |
Integer32 (10..65535) |
Maximum number of transmission attempts for individual RADIUS stop-accounting requests. |
Not supported. |
hh3cRdAccDataFlowUnit (1.3.6.1.4.1.25506.2.13.1.2.1.20) |
read-create |
INTEGER |
byte(1), kiloByte(2), megaByte(3), gigaByte(4) |
Data flow measurement unit for traffic statistics. |
As per the MIB. |
hh3cRdAccPacketUnit (1.3.6.1.4.1.25506.2.13.1.2.1.21) |
read-create |
INTEGER |
onePacket(1), kiloPacket (2), megaPacket (3), gigaPacket (4) |
Packet measurement unit for traffic statistics. |
As per the MIB. |
hh3cRdAccRowStatus (1.3.6.1.4.1.25506.2.13.1.2.1.22) |
read-create |
RowStatus |
Standard MIB values. |
Row status. |
The following values are supported: active(1). createAndGo(4). destroy(6). |
hh3cRdAcctOnEnable (1.3.6.1.4.1.25506.2.13.1.2.1.23) |
read-create |
TruthValue |
true(1), false(2) |
Enabling status of the accounting-on feature. |
As per the MIB. |
hh3cRdAcctOnSendTimes (1.3.6.1.4.1.25506.2.13.1.2.1.24) |
read-create |
Integer32 |
Standard MIB values. |
Maximum number of accounting-on packet transmission attempts. |
As per the MIB. |
hh3cRdAcctOnSendInterval (1.3.6.1.4.1.25506.2.13.1.2.1.25) |
read-create |
Integer32 |
Standard MIB values. |
Interval for retransmitting an accounting-on packet. |
As per the MIB. |
hh3cRdSecAccKey (1.3.6.1.4.1.25506.2.13.1.2.1.26) |
read-create |
DisplayString |
OCTET STRING (0..64) |
Shared key for communication with the secondary accounting server. |
The shared key is a string of 0 to 64 characters. In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters. When read, this object returns a zero-length string. |
hh3cRdPrimAccVpnName (1.3.6.1.4.1.25506.2.13.1.2.1.27) |
read-create |
DisplayString |
OCTET STRING (0..31) |
Name of the VPN to which the primary accounting server belongs. |
As per the MIB. |
hh3cRdSecAccVpnName (1.3.6.1.4.1.25506.2.13.1.2.1.28) |
read-create |
DisplayString |
OCTET STRING (0..31) |
Name of the VPN to which the secondary accounting server belongs. |
As per the MIB. |
hh3cRdAccNasIpAddrType (1.3.6.1.4.1.25506.2.13.1.2.1.29) |
read-create |
InetAddressType |
Standard MIB values. |
Type of the NAS IP addresses for RADIUS accounting packets sent to the RADIUS accounting server. |
Not supported. |
hh3cRdAccNasIpAddr (1.3.6.1.4.1.25506.2.13.1.2.1.30) |
read-create |
IpAddress |
Standard MIB values. |
NAS IPv4 address. |
As per the MIB. |
hh3cRdAccNasIpv6Addr (1.3.6.1.4.1.25506.2.13.1.2.1.31) |
read-create |
Ipv6Address |
Standard MIB values. |
NAS IPv6 address. |
As per the MIB. |
hh3cRdAccRealTimeUnit (1.3.6.1.4.1.25506.2.13.1.2.1.32) |
read-create |
INTEGER |
minute(0), second(1) |
Measurement unit for the interval at which real-time accounting packets are sent. |
As per the MIB. |
hh3cRdAccStopPktTimeResend (1.3.6.1.4.1.25506.2.13.1.2.1.33) |
read-only |
Integer32 |
Standard MIB values. |
Interval for resending stop-accounting packets. |
Value 0 indicates that this node is not supported. |
hh3cRdSecondaryAuthServerTable
About this table
Use this table to configure or obtain secondary RADIUS authentication server settings.
Support for operations
Create:Supported
Edit/Modify:Supported
Delete:Supported
Read:Supported
Columns
The table indexes are hh3cRdGroupName, hh3cRdSecondaryAuthIpAddrType, hh3cRdSecondaryAuthIpAddr, hh3cRdSecondaryAuthVpnNam, and hh3cRdSecondaryAuthUdpPort.
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRdSecondaryAuthIpAddrType (1.3.6.1.4.1.25506.2.13.1.4.1.1) |
not-accessible |
InetAddressType |
Standard MIB values. |
Type of the IP address for a secondary authentication server. |
As per the MIB. |
hh3cRdSecondaryAuthIpAddr (1.3.6.1.4.1.25506.2.13.1.4.1.2) |
not-accessible |
InetAddress |
OCTET STRING (0..255) |
IP address of the secondary authentication server. |
As per the MIB. |
hh3cRdSecondaryAuthVpnName (1.3.6.1.4.1.25506.2.13.1.4.1.3) |
not-accessible |
DisplayString |
OCTET STRING (0..31) |
Name of the VPN to which the secondary authentication server belongs. |
As per the MIB. |
hh3cRdSecondaryAuthUdpPort (1.3.6.1.4.1.25506.2.13.1.4.1.4) |
not-accessible |
Integer32 |
Integer32 (1..65535) |
Port number of the secondary authentication server. |
As per the MIB. |
hh3cRdSecondaryAuthState (1.3.6.1.4.1.25506.2.13.1.4.1.5) |
read-create |
INTEGER |
active(1), block(2) |
Status of the secondary authentication server. |
As per the MIB. |
hh3cRdSecondaryAuthKey (1.3.6.1.4.1.25506.2.13.1.4.1.6) |
read-create |
DisplayString |
OCTET STRING (0..64) |
Shared key for communication with the secondary authentication server. |
The shared key is a string of 0 to 64 characters. In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters. When read, this object returns a zero-length string. |
hh3cRdSecondaryAuthRowStatus (1.3.6.1.4.1.25506.2.13.1.4.1.7) |
read-create |
RowStatus |
Standard MIB values. |
Row status. |
The following values are supported: active(1). createAndGo(4). destroy(6). |
hh3cRdSecondaryAccServerTable
About this table
Use this table to configure or obtain secondary RADIUS accounting server settings.
Support for operations
Create:Supported
Edit/Modify:Supported
Delete:Supported
Read:Supported
Columns
The table indexes are hh3cRdAccGroupName, hh3cRdSecondaryAccIpAddrType, hh3cRdSecondaryAccIpAddr, hh3cRdSecondaryAccVpnName, and hh3cRdSecondaryAccUdpPort.
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRdSecondaryAccIpAddrType (1.3.6.1.4.1.25506.2.13.1.5.1.1) |
not-accessible |
InetAddressType |
Standard MIB values. |
Type of the IP address for a secondary accounting server. |
As per the MIB. |
hh3cRdSecondaryAccIpAddr (1.3.6.1.4.1.25506.2.13.1.5.1.2) |
not-accessible |
InetAddress |
OCTET STRING (0..255) |
IP address of the secondary accounting server. |
As per the MIB. |
hh3cRdSecondaryAccVpnName (1.3.6.1.4.1.25506.2.13.1.5.1.3) |
not-accessible |
DisplayString |
OCTET STRING (0..31) |
Name of the VPN to which the secondary accounting server belongs. |
As per the MIB. |
hh3cRdSecondaryAccUdpPort (1.3.6.1.4.1.25506.2.13.1.5.1.4) |
not-accessible |
Integer32 |
Integer32 (1..65535) |
Port number of the secondary accounting server. |
As per the MIB. |
hh3cRdSecondaryAccState (1.3.6.1.4.1.25506.2.13.1.5.1.5) |
read-create |
INTEGER |
active(1), block(2) |
Status of the secondary accounting server. |
As per the MIB. |
hh3cRdSecondaryAccKey (1.3.6.1.4.1.25506.2.13.1.5.1.6) |
read-create |
DisplayString |
OCTET STRING (0..64) |
Shared key for communication with the secondary accounting server. |
The shared key is a string of 0 to 64 characters. In dayou OEM version, the shared key string must be nine characters long or longer and must contain digits, uppercase letters, lowercase letters, and special characters. When read, this object returns a zero-length string. |
hh3cRdSecondaryAccRowStatus (1.3.6.1.4.1.25506.2.13.1.5.1.7) |
read-create |
RowStatus |
Standard MIB values. |
Row status. |
The following values are supported: active(1). createAndGo(4). destroy(6). |
hh3cRadiusAccServerTable
About this table
This table collects packet statistics by RADIUS accounting server, which is not implemented by standard MIBs.
Support for operations
Create:Not supported
Edit/Modify:Not supported
Delete:Not supported
Read:Supported
Columns
The table index is radiusAccServerIndex.
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAccClientStartRequests (1.3.6.1.4.1.25506.2.13.2.1.1.1.1) |
read-only |
Counter32 |
Standard MIB values. |
Number of start-accounting requests sent to the RADIUS server. |
As per the MIB. |
hh3cRadiusAccClientStartResponses (1.3.6.1.4.1.25506.2.13.2.1.1.1.2) |
read-only |
Counter32 |
Standard MIB values. |
Number of start-accounting requests received from the RADIUS server. |
As per the MIB. |
hh3cRadiusAccClientInterimRequests (1.3.6.1.4.1.25506.2.13.2.1.1.1.3) |
read-only |
Counter32 |
Standard MIB values. |
Number of real-time accounting request sent to the RADIUS server. |
As per the MIB. |
hh3cRadiusAccClientInterimResponses (1.3.6.1.4.1.25506.2.13.2.1.1.1.4) |
read-only |
Counter32 |
Standard MIB values. |
Number of real-time accounting requests received from the RADIUS server. |
As per the MIB. |
hh3cRadiusAccClientStopRequests (1.3.6.1.4.1.25506.2.13.2.1.1.1.5) |
read-only |
Counter32 |
Standard MIB values. |
Number of stop-accounting request sent to the RADIUS server. |
As per the MIB. |
hh3cRadiusAccClientStopResponses (1.3.6.1.4.1.25506.2.13.2.1.1.1.6) |
read-only |
Counter32 |
Standard MIB values. |
Number of stop-accounting requests received from the RADIUS server. |
As per the MIB. |
hh3cRadiusAuthServerTable
About this table
This table collects authentication failure statistics by RADIUS authentication server, which is not implemented by standard MIBs.
Support for operations
Create:Not supported
Edit/Modify:Not supported
Delete:Not supported
Read:Supported
Columns
The table index is radiusAuthServerIndex.
Object (OID) |
Access |
Syntax |
Value range |
Description |
Implementation |
hh3cRadiusAuthFailureTimes (1.3.6.1.4.1.25506.2.13.4.1.1.1.1) |
read-only |
Counter32 |
Standard MIB values. |
Number of authentication failures. |
As per the MIB. |
hh3cRadiusAuthTimeoutTimes (1.3.6.1.4.1.25506.2.13.4.1.1.1.2) |
read-only |
Counter32 |
Standard MIB values. |
Number of authentication timeouts. |
As per the MIB. |
hh3cRadiusAuthRejectTimes (1.3.6.1.4.1.25506.2.13.4.1.1.1.3) |
read-only |
Counter32 |
Standard MIB values. |
Number of authentication rejections. |
As per the MIB. |
Notifications
hh3cRadiusAuthServerUpTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.0.1 |
Authentication server up |
Recovery |
Warning |
N/A (N/A) |
OFF |
Notification triggers
This notification is generated when the status of an authentication server changes from blocked to active.
This notification cannot function correctly with SNMPv2 and later versions. It has been replaced with hh3cRadiusAuthenticationServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.4) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS authentication server up event (if enabled) depends on the SNMP version for the event:
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAuthServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.1) notification.
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAuthenticationServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.4) notification.
System impact
No negative impact on services.
Status control
ON
CLI: Use both the snmp-agent trap enable radius authentication-server-up and radius trap-version v1 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius authentication-server-up command or the radius trap-version v2 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress) |
IP address of an authentication server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber) |
Port number of the authentication server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
No action is required.
hh3cRadiusAccServerUpTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.0.2 |
Accounting server up |
Recovery |
Warning |
N/A (N/A) |
OFF |
Notification triggers
This notification is generated when the status of an accounting server changes from blocked to active.
This notification cannot function correctly with SNMPv2 and later versions. It has been replaced with hh3cRadiusAccountingServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.5) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS accounting server up event (if enabled) depends on the SNMP version for the event:
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAccServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.2) notification.
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAccountingServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.5) notification.
System impact
No negative impact on services.
Status control
ON
CLI: Use both the snmp-agent trap enable radius accounting-server-up and radius trap-version v1 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius accounting-server-up command or the radius trap-version v2 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress) |
IP address of an accounting server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber) |
Port number of the accounting server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
No action is required.
hh3cRadiusAuthErrTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.0.3 |
Authentication failure alarm threshold crossing. |
Informational |
Major |
N/A (N/A) |
OFF |
Notification triggers
This notification is generated when the ratio of the authentication failures to the total authentication requests reaches the authentication failure alarm threshold.
System impact
The system is might being attacked.
Status control
ON
CLI: Use the snmp-agent trap enable radius authentication-error-threshold command.
OFF
CLI: Use the undo snmp-agent trap enable radius authentication-error-threshold command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress) |
IP address of an authentication server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber) |
Port number of the authentication server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
To resolve this issue, contact the administrator for help.
hh3cRadiusAuthenticationServerUpTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.0.4 |
Authentication server up |
Recovery |
Warning |
N/A (N/A) |
OFF |
Notification triggers
This notification is generated when the status of an authentication server changes from blocked to active.
This notification replaces hh3cRadiusAuthServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.1) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS authentication server up event (if enabled) depends on the SNMP version for the event:
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAuthenticationServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.4) notification.
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAuthServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.1) notification.
System impact
No negative impact on services.
Status control
ON
CLI: Use both the snmp-agent trap enable radius authentication-server-up and radius trap-version v2 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius authentication-server-up command or the radius trap-version v1 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress) |
IP address of an authentication server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber) |
Port number of the authentication server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
No action is required.
hh3cRadiusAccountingServerUpTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.0.5 |
Accounting server up |
Recovery |
Warning |
N/A (N/A) |
OFF |
Notification triggers
This notification is generated when the status of an accounting server changes from blocked to active.
This notification replaces hh3cRadiusAccServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.2) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS accounting server up event (if enabled) depends on the SNMP version for the event:
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAccountingServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.5) notification.
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAccServerUpTrap (1.3.6.1.4.1.25506.2.13.3.0.2) notification.
System impact
No negative impact on services.
Status control
ON
CLI: Use both the snmp-agent trap enable radius accounting-server-up and radius trap-version v2 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius accounting-server-up command or the radius trap-version v1 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress) |
IP address of an accounting server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber) |
Port number of the accounting server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
No action is required.
hh3cRadiusAuthenticationServerDownTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.0.6 |
Authentication server down |
Error |
Major |
1.3.6.1.4.1.25506.2.13.3.0.4 (hh3cRadiusAuthenticationServerUpTrap) |
OFF |
Notification triggers
This notification is generated when the status of an authentication server changes from active to blocked.
This notification replaces hh3cRadiusAuthServerDownTrap (1.3.6.1.4.1.25506.2.13.3.1) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS authentication server down event (if enabled) depends on the SNMP version for the event:
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAuthenticationServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.6) notification.
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAuthServerDownTrap (1.3.6.1.4.1.25506.2.13.3.1) notification.
System impact
If no secondary authentication servers exist, users cannot perform authentication to come online.
Status control
ON
CLI: Use both the snmp-agent trap enable radius authentication-server-down and radius trap-version v2 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius authentication-server-down command or the radius trap-version v1 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress) |
IP address of an authentication server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber) |
Port number of the authentication server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
To resolve this issue:
1.Use the display interface command to view whether the interface connected to the authentication server is up:
- If no, troubleshoot the physical link.
- If yes, go to step 2.
2.Use the ping command to check whether the RADIUS server is reachable:
- If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.
- If yes, go to step 3.
3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:
- If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.
- If yes, go to step 4.
4.Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.
hh3cRadiusAccountingServerDownTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.0.7 |
Accounting server down |
Error |
Major |
1.3.6.1.4.1.25506.2.13.3.0.5 (hh3cRadiusAccountingServerUpTrap) |
OFF |
Notification triggers
This notification is generated when the status of an accounting server changes from active to blocked.
This notification replaces hh3cRadiusAccServerDownTrap (1.3.6.1.4.1.25506.2.13.3.2) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS accounting server down event (if enabled) depends on the SNMP version for the event:
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAccountingServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.7) notification.
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAccServerDownTrap (1.3.6.1.4.1.25506.2.13.3.2) notification.
System impact
The server is unreachable and users cannot come online.
Status control
ON
CLI: Use both the snmp-agent trap enable radius accounting-server-down and radius trap-version v2 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius accounting-server-down command or the radius trap-version v1 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress) |
IP address of an accounting server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber) |
Port number of an accounting server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
To resolve this issue:
1.Use the display interface command to view whether the interface connected to the accounting server is up:
- If no, troubleshoot the physical link.
- If yes, go to step 2.
2.Use the ping command to check whether the RADIUS server is reachable:
- If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.
- If yes, go to step 3.
3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:
- If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.
- If yes, go to step 4.
4.Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.
hh3cRadiusAuthServerDownTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.1 |
Authentication server down |
Error |
Major |
1.3.6.1.4.1.25506.2.13.3.0.1 (hh3cRadiusAuthServerUpTrap) |
OFF |
Notification triggers
This notification is generated when the status of an authentication server changes from active to blocked.
This notification cannot function correctly with SNMPv2 and later versions. It has been replaced with hh3cRadiusAuthenticationServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.6) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS authentication server down event (if enabled) depends on the SNMP version for the event:
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAuthServerDownTrap (1.3.6.1.4.1.25506.2.13.3.1) notification.
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAuthenticationServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.6) notification.
System impact
If no secondary authentication servers exist, users cannot perform authentication to come online.
Status control
ON
CLI: Use both the snmp-agent trap enable radius authentication-server-down and radius trap-version v1 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius authentication-server-down command or the radius trap-version v2 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.1.2.1.1.3.1.2 (radiusAuthServerAddress) |
IP address of an authentication server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.1.2.1.1.3.1.3 (radiusAuthClientServerPortNumber) |
Port number of the authentication server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
To resolve this issue:
1.Use the display interface command to view whether the interface connected to the authentication server is up:
- If no, troubleshoot the physical link.
- If yes, go to step 2.
2.Use the ping command to check whether the RADIUS server is reachable:
- If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.
- If yes, go to step 3.
3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:
- If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.
- If yes, go to step 4.
4.Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.
hh3cRadiusAccServerDownTrap
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.3.2 |
Accounting server down |
Error |
Major |
1.3.6.1.4.1.25506.2.13.3.0.2 (hh3cRadiusAccServerUpTrap) |
OFF |
Notification triggers
This notification is generated when the status of an accounting server changes from active to blocked.
This notification cannot function correctly with SNMPv2 and later versions. It has been replaced with hh3cRadiusAccountingServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.7) in SNMPv2 and later versions.
The notification generated by the device for the RADIUS accounting server down event (if enabled) depends on the SNMP version for the event:
If SNMPv1 is specified for this event by using the radius trap-version v1 command, the device generates the hh3cRadiusAccServerDownTrap (1.3.6.1.4.1.25506.2.13.3.2) notification.
If SNMPv2 is specified for this event by using the radius trap-version v2 command, the device generates the hh3cRadiusAccountingServerDownTrap (1.3.6.1.4.1.25506.2.13.3.0.7) notification.
System impact
The server is unreachable and users cannot come online.
Status control
ON
CLI: Use both the snmp-agent trap enable radius accounting-server-down and radius trap-version v1 commands.
OFF
CLI: Use either the undo snmp-agent trap enable radius accounting-server-down command or the radius trap-version v2 command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.2.1.67.2.2.1.1.3.1.2 (radiusAccServerAddress) |
IP address of an accounting server. |
radiusAuthServerIndex |
IP Address |
Standard MIB values. |
1.3.6.1.2.1.67.2.2.1.1.3.1.3 (radiusAccClientServerPortNumber) |
Port number of an accounting server. |
radiusAuthServerIndex |
INTEGER |
1.. 65535 |
Recommended action
To resolve this issue:
1.Use the display interface command to view whether the interface connected to the accounting server is up:
- If no, troubleshoot the physical link.
- If yes, go to step 2.
2.Use the ping command to check whether the RADIUS server is reachable:
- If no, first check the network reachability between the device and the RADIUS server, and then check whether firewalls exist in the network. Make sure the RADIUS server is reachable.
- If yes, go to step 3.
3.Use the display current-configuration command to view whether the RADIUS server's configurations are correct:
- If no, modify the RADIUS server's configurations. For more information about RADIUS server configurations, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.
- If yes, go to step 4.
4.Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.
hh3cRadiusAccCacheAlarm
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.8.0.1 |
The ratio of the number of buffered stop-accounting packets to the max number allowed reached the upper threshold. |
Error |
Warning |
1.3.6.1.4.1.25506.2.13.8.0.2 (hh3cRadiusAccCacheResume) |
OFF |
Notification triggers
This notification is generated when the ratio of the number of buffered stop-accounting packets to the allowed max number configured by using the radius stop-accounting-buffer cache command reaches the upper threshold.
System impact
No negative impact on services currently. If the number of buffered stop-accounting packets reaches the allowed max number, the device processes new stop-accounting requests according to whether you have configured the radius stop-accounting-buffer overwrite-oldest command in system view for new stop-accounting request overwriting.
If you have configured the command, the device uses a new stop-accounting request to overwrite the oldest one.
If you have not configured the command, the device stops buffering new stop-accounting requests and new stop-accounting requests are dropped.
Status control
ON
CLI: Use the snmp-agent trap enable radius accounting-cache-upper-threshold command.
OFF
CLI: Use the undo snmp-agent trap enable radius accounting-cache-upper-threshold command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.4.1.25506.2.13.8.1.1 (hh3cRadiusAccCacheMaxPackets) |
Allowed maximum number of stop-accounting packets that can be buffered. |
N/A |
Integer32 |
256..2147483647 |
1.3.6.1.4.1.25506.2.13.8.1.2 (hh3cRadiusAccCacheUpperValue) |
Upper threshold for the ratio of the number of buffered stop-accounting packets to the maximum number allowed, in percentage. |
N/A |
Integer32 |
1..100 |
Recommended action
To resolve this issue:
1.Check whether the set upper threshold for stop-accounting request buffering is appropriate:
- If yes, go to step 2.
- If no, use the radius stop-accounting-buffer warning-threshold command in system view to set the upper threshold to a higher value as needed, and then go to step 2.
2.Use the test-aaa command in user view to test whether communication failures exist between the device and the RADIUS server:
- If the test succeeds, it indicates that the RADIUS server is reachable. Go to step 3.
- If the test fails, troubleshoot the link between the device and the server. If the issue persists when the link is normal, go to step 3.
3.Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.
hh3cRadiusAccCacheResume
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.8.0.2 |
The ratio of the number of buffered stop-accounting packets to the max number allowed dropped below the lower threshold. |
Recovery |
Warning |
N/A (N/A) |
OFF |
Notification triggers
This notification is generated when the ratio of the number of buffered stop-accounting packets to the allowed max number configured by using the radius stop-accounting-buffer cache command drops below the lower threshold.
System impact
No negative impact on services.
Status control
ON
CLI: Use the snmp-agent trap enable radius accounting-cache-lower-threshold command.
OFF
CLI: Use the undo snmp-agent trap enable radius accounting-cache-lower-threshold command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.4.1.25506.2.13.8.1.1 (hh3cRadiusAccCacheMaxPackets) |
Allowed maximum number of stop-accounting packets that can be buffered. |
N/A |
Integer32 |
256..2147483647 |
1.3.6.1.4.1.25506.2.13.8.1.3 (hh3cRadiusAccCacheLowerValue) |
Lower threshold for the ratio of the number of buffered stop-accounting packets to the maximum number allowed, in percentage. |
N/A |
Integer32 |
0..99 |
Recommended action
No action is required.
hh3cRadiusAccCachePacketDiscard
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.13.8.0.3 |
The system dropped buffered stop-accounting packets or stop-accounting packets to be buffered after the memory usage reached the minor alarm threshold. |
Informational |
Major |
N/A (N/A) |
OFF |
Notification triggers
This notification is generated when the system drops buffered stop-accounting packets or stop-accounting packets to be buffered after the memory usage reaches the minor alarm threshold.
System impact
The device processes stop-accounting packets according to whether you have configured the radius stop-accounting-buffer memory-minor-threshold overwrite-oldest command. If you have configured this command, the device uses a new stop-accounting request to overwrite the oldest one. Otherwise, the device stops buffering new stop-accounting requests. After the link between the device and the server recovers, some users might fail to go offline in time.
Status control
ON
CLI: Use the snmp-agent trap enable radius accounting-cache-discard command.
OFF
CLI: Use the undo snmp-agent trap enable radius accounting-cache-discard command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.4.1.25506.2.13.8.1.4 (hh3cRadiusAccCacheMemoryUsage) |
Current memory usage, in percentage. |
N/A |
Integer32 |
0..100 |
1.3.6.1.4.1.25506.2.13.8.1.5 (hh3cRadiusAccCachePackets) |
Number of stop-accounting packets that have been buffered. |
N/A |
Integer32 |
256..2147483647 |
Recommended action
To resolve this issue:
1.Use the display memory-threshold command in any view to check whether the memory usage of the MPU reaches the minor memory alarm threshold:
- If yes, go to step 2.
- If no, go to step 5.
2.Check whether the configured minor memory alarm threshold is low:
- If yes, use the memory-threshold command in system view to set the minor memory alarm threshold to a higher value as needed.
- If no, go to step 3.
3.Use the radius stop-accounting-buffer cache command in system view to set the maximum number of stop-accounting requests allowed to a smaller value so as to reduce resource consumption caused by buffered RADIUS stop-accounting requests. Then go to step 4.
4.Use the test-aaa command in user view to test whether communication failures exist between the device and the RADIUS server:
- If the test succeeds, it indicates that the RADIUS server is reachable. Go to step 5.
- If the test fails, troubleshoot the link between the device and the server. If the issue persists when the link is normal, go to step 5.
5.Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.