| ciscoRptrPortMDIStatus | 
      .1.3.6.1.4.1.9.9.22.1.1.1.1 | 
    
    
      | 
        This object indicates the port's MDI/MDI-X switching status.
        The normal(1) status indicates the port is configured to be
        standard MDI as defined by the 10BaseT Standard for hub port
        (allowing for connection to a chained hub).  The crossover(2)
        status indicates the port is configured to be in MDI-X mode
        (allowing for connection to a 10BaseT end node).  The
        notSwitchable(3) status indicates the port is not switchable
        between MDI and MDI-X mode.
       | 
    
    
      | ciscoRptrPortLinkTestEnabled | 
      .1.3.6.1.4.1.9.9.22.1.1.1.2 | 
    
    
      | 
        Specifies whether or not Link Integrity Test Function is
        enabled for the port as specified by the 10BaseT Standard.
        When the link test function is enabled, the absence of the
        Link Test pulses and receive data on the port will cause the
        port to go into a Link Fail state.  In this state, the data
        transmission, data reception and collision detection functions
        are disabled until valid data or 4 consecutive Link Test
        pulses appear on RXD+/- pair of the port.
        With the Link Integrity Test Function disabled, the data
        driver, receiver and collision detection remain enabled
        irrespective of the presence or absence of data or Link Test
        pulses on the port.
       | 
    
    
      | ciscoRptrPortLinkTestFailed | 
      .1.3.6.1.4.1.9.9.22.1.1.1.3 | 
    
    
      | 
        This object indicates the status of the Link Test function
        for the port.  Set to false indicates valid data or 4
        consecutive Link Test pulses have been detected on the
        port.  Set to true indicates the failure of the Link Test
        function for the port.  In the Link Test Fail state, data
        transmission, data reception and collision detection functions
        are disabled until valid data or 4 consecutive Link Test pulses
        appear on the RXD+/- pair of the port.
       | 
    
    
      | ciscoRptrPortAutoPolarityEnabled | 
      .1.3.6.1.4.1.9.9.22.1.1.1.4 | 
    
    
      | 
        Specifies whether or not the Automatic Receiver Polarity
        Reversal is enabled for the port.  This feature provides the
        ability to invert the polarity of the signals appearing at the
        RXD+/- pair of the port prior to re-transmission if the
        polarity of the received signal is reversed (such as in the
        case of wiring error).
       | 
    
    
      | ciscoRptrPortAutoPolarityCorrected | 
      .1.3.6.1.4.1.9.9.22.1.1.1.5 | 
    
    
      | 
        This object indicates the status of the Automatic Receiver
        Polarity Reversal for the port.  Set to true indicates the
        polarity of the port has been detected as reversed and is
        corrected.  Set to false indicates the polarity for the port
        as having correct polarity.
       | 
    
    
      | ciscoRptrPortSrcAddrCtrl | 
      .1.3.6.1.4.1.9.9.22.1.1.1.6 | 
    
    
      | 
        Specifies whether or not the Source Address Control feature is
        enabled for the port.  This feature provides the ability to
        control which device's specific MAC address is allowed access
        to the network.  If the management entity specified an address
        via ciscoRptrPortAllowedSrcAddr, only the device with the
        configured MAC address is allowed access to the network.  If
        the management entity does not specified an address, the
        allowed source address is learned from the last source address
        if valid; otherwise, the allowed source address is learned from
        the MAC address of the first valid packet detected on the port.
        When another MAC address other than the allowed source address
        is detected on the port, the port is partitioned.
        WARNING: Configuring Source Address Control feature on the
        port which is used for management can cause the management
        entity to lose access to the agent if the management's source
        address does not match the allowed source address.
       | 
    
    
      | ciscoRptrPortAllowedSrcAddr | 
      .1.3.6.1.4.1.9.9.22.1.1.1.7 | 
    
    
      | 
        For write access, this object is the allowed source address
        that is to be configured for source address control feature
        for the port.
        For read access, if no allowed source address was specifically
        specified by the manager, the agent shall return the learned
        address to control.  Otherwise, the specified allowed source
        address is returned if configured by management entity.
       | 
    
    
      | ciscoRptrPortAllowedSrcAddrStatus | 
      .1.3.6.1.4.1.9.9.22.1.1.1.8 | 
    
    
      | 
        This object indicates the status of ciscoRptrPortAllowedSrcAddr
        for the port.  allowedSrcAddrConfig(1) status indicates that
        the allowed source address was explicitly configured by
        management entity.  The allowedSrcAddrLearn(2) status indicates
        that the allowed source address was learned for the port.
        The allowedSrcAddrUndefined(3) status indicates that currently
        there is no restriction on the source address for the port.
       | 
    
    
      | ciscoRptrPortLastIllegalSrcAddr | 
      .1.3.6.1.4.1.9.9.22.1.1.1.9 | 
    
    
      | 
        This object is the last illegal source address which caused
        this port to be partitioned.  If the port is never partitioned
        due to Source Address Control, the agent shall return a string
        of length zero.
       | 
    
    
      | ciscoRptrPortIllegalAddrTrapAcked | 
      .1.3.6.1.4.1.9.9.22.1.1.1.10 | 
    
    
      | 
        Specifies whether an acknowledgment is sent by an NMS to
        indicate that an illegal source address trap was
        received.
        acked :
        Set by a NMS to acknowledge reception of an
        illegal source address.  When this flag is
        set, no more trap will be sent for the port.
        no-acked-sending:
        Set by the SNMP agent to indicate that it is
        sending a trap to one or more NMSs.
        The trap is sent based upon the trap
        algorithm specified by ciscoRptrTrapAlgorithm.
        no-acked-no-sending:
        Set by the SNMP agent when there is no trap
        to be sent or the trap was already sent out.
       | 
    
    
      | ciscoRptrPortIllegalAddrTrapEnabled | 
      .1.3.6.1.4.1.9.9.22.1.1.1.11 | 
    
    
      | 
        Specifies whether or not to send the illegal source
        address trap for the port.
        When it is enabled, one or more illegal source address
        traps will be generated if there is a mismatch of
        source address.  Traps are sent based on the algorithm
        specified by ciscoRptrTrapAlgorithm defined in the
        GLOBAL section.
        When it is disabled, no traps are sent. 
       | 
    
    
      | ciscoRptrPortIllegalAddrFirstHeard | 
      .1.3.6.1.4.1.9.9.22.1.1.1.12 | 
    
    
      | 
        This is the time stamp for the very first time when
        the current illegal source address was detected on the
        port.  The time stamp is given by the value of MIB-II's
        sysUpTime at which this occurrence happens.  If no illegal
        source address is heard on the port, this value is set
        to 0.
       | 
    
    
      | ciscoRptrPortIllegalAddrLastHeard | 
      .1.3.6.1.4.1.9.9.22.1.1.1.13 | 
    
    
      | 
        This is the time stamp for the last time when the
        current illegal source address was detected on the
        port.  The time stamp is given by the value of MIB-II's
        sysUpTime at which occurrence happens.  If no illegal
        source address was never occurred, this value is set
        to 0.
       | 
    
    
      | ciscoRptrPortLastIllegalAddrCount | 
      .1.3.6.1.4.1.9.9.22.1.1.1.14 | 
    
    
      | 
        This is the count of consecutive occurrences of
        the last illegal source address on the port.
        When illegal address is detected, this count
        will be incremented about every minute.
       | 
    
    
      | ciscoRptrPortIllegalAddrTotalCount | 
      .1.3.6.1.4.1.9.9.22.1.1.1.15 | 
    
    
      | 
        This is the total count of all cccurences of any
        illegal source addresses heard on the port since start-up.
        Note: Illegal source addresses may be different, may be
        the same. This counter is a *total* count from this port.
       |