[rbak-nsp] SNMP Session list - SE400

Brent brent at ubtanet.com
Fri May 7 11:38:33 EDT 2010


Sean - That worked great, thank you!  I can write up a simple php function
to convert everything. Any idea what the rest of the OID might reveal?

 

SNMPv2-SMI::enterprises.2352.2.27.1.1.1.1.3.4.116.101.115.116.25.48.50.48.50
.48.48.51.70.54.56.48.48.51.57.50.48.45.52.66.69.52.50.56.66.56 = STRING:
"3/3:1 vpi-vci 18 37 pppoe 37"

 

Username: test

 

From: Sean Maguire [mailto:smaguire at talktalkplc.com] 
Sent: Friday, May 07, 2010 2:51 AM
To: Brent; redback-nsp at puck.nether.net
Subject: RE: [rbak-nsp] SNMP Session list - SE400

 

Hi Brent,

 

>From memory, the PPP username, along with the length, is encoded as part of
the OID when you walk the SUBSCRIBER-ACTIVE MIB. For example, if you walk
the OID tree that you mentioned and you have a user "fred at example.com", the
OID returned would be:

 

SNMPv2-SMI::enterprises.2352.2.27.1.1.1.1.3.16.102.114.101.100.64.101.120.97
.109.112.108.101.46.99.111.109

 

The 16 is the length of the username, followed by the decimal ASCII code of
all the characters in the username. It's pretty trivial to write a Perl
script to convert usernames and OIDs into each other.

 

Regarding the MAC addresses for each user, you might be able to find them
somewhere in ifTable, which has an entry for all subscribers connected to
the device since these are regarded as circuits. I would have guessed that,
if the value was present, it would have been returned in ifPhysAddress
(1.3.6.1.2.1.2.2.1.6) but a quick walk on one of our devices seems to show
that this value is blank in most cases, so you might be out of luck.

 

Regards,

 

Sean

 

  _____  

From: redback-nsp-bounces at puck.nether.net
[mailto:redback-nsp-bounces at puck.nether.net] On Behalf Of Brent
Sent: 06 May 2010 16:28
To: redback-nsp at puck.nether.net
Subject: [rbak-nsp] SNMP Session list - SE400

 

Does anyone know if it's possible to get useful session information (like
ppp username, or mac address) for all active sessions via snmp?  I can get
this: 4/3 vlan-id 2020 pppoe 17168 using this OID:
SNMPv2-SMI::enterprises.2352.2.27.1.1.1.1.3.3.. but I can't really
extrapolate anything externally from that.

 

Thanks,

 

Brent

 

 

 
############################################################################
##
This communication together with any attachments transmitted with it
("this E-Mail") is intended only for the use of the addressee and may
contain
information which is privileged and confidential. If the reader of this
E-Mail
is not the intended recipient or the employee or agent responsible for
delivering it to the intended recipient you are hereby notified that any
use,
dissemination, forwarding, printing or copying of this E-Mail is strictly
prohibited. Addressees should check this E-mail for viruses. The Company
makes
no representations as regards the absence of viruses in this E-Mail. If you
have received this E-Mail in error please notify our IT Service Desk
immediately by e-mail at abuse at opaltelecom.co.uk Please then immediately
delete, erase or otherwise destroy this E-Mail and any copies of it.
 
Any opinions expressed in this E-Mail are those of the author and do not
necessarily constitute the views of the Company. Nothing in this E-Mail
shall
bind the Company in any contract or obligation.
 
For the purposes of this E-Mail "the Company" means TalkTalk Telecom Group
PLC
and/or any of its subsidiaries.
 
Please feel free to visit our website: www.talktalkgroup.com 
 
TalkTalk Telecom Group Plc (Registered in England & Wales No. 7105891)
11 Evesham Street, London W11 4AR
############################################################################
##
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/redback-nsp/attachments/20100507/69c78018/attachment.html>


More information about the redback-nsp mailing list