summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2273.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2273.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2273.txt')
-rw-r--r--doc/rfc/rfc2273.txt3923
1 files changed, 3923 insertions, 0 deletions
diff --git a/doc/rfc/rfc2273.txt b/doc/rfc/rfc2273.txt
new file mode 100644
index 0000000..4a5f174
--- /dev/null
+++ b/doc/rfc/rfc2273.txt
@@ -0,0 +1,3923 @@
+
+
+
+
+
+
+Network Working Group D. Levi
+Request for Comments: 2273 SNMP Research, Inc.
+Obsoletes: 2263 P. Meyer
+Category: Standards Track Secure Computing Corporation
+ B. Stewart
+ Cisco Systems
+ January 1998
+
+ SNMPv3 Applications
+
+Status of this Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (1998). All Rights Reserved.
+
+IANA Note
+
+ Due to a clerical error in the assignment of the snmpModules in this
+ memo, this RFC provides the corrected number assignments for this
+ protocol. This memo obsoletes RFC 2263.
+
+Abstract
+
+ This memo describes five types of SNMP applications which make use of
+ an SNMP engine as described in [RFC2271]. The types of application
+ described are Command Generators, Command Responders, Notification
+ Originators, Notification Receivers, and Proxy Forwarders.
+
+ This memo also defines MIB modules for specifying targets of
+ management operations, for notification filtering, and for proxy
+ forwarding.
+
+Table of Contents
+
+ 1 Overview ..................................................... 2
+ 1.1 Command Generator Applications ............................. 3
+ 1.2 Command Responder Applications ............................. 3
+ 1.3 Notification Originator Applications ....................... 3
+ 1.4 Notification Receiver Applications ......................... 3
+ 1.5 Proxy Forwarder Applications ............................... 3
+ 2 Management Targets ........................................... 5
+
+
+
+Levi, et. al. Standards Track [Page 1]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ 3 Elements Of Procedure ........................................ 6
+ 3.1 Command Generator Applications ............................. 6
+ 3.2 Command Responder Applications ............................. 8
+ 3.3 Notification Originator Applications ....................... 13
+ 3.4 Notification Receiver Applications ......................... 16
+ 3.5 Proxy Forwarder Applications ............................... 18
+ 3.5.1 Request Forwarding ....................................... 19
+ 3.5.1.1 Processing an Incoming Request ......................... 19
+ 3.5.1.2 Processing an Incoming Response ........................ 22
+ 3.5.1.3 Processing an Incoming Report Indication ............... 23
+ 3.5.2 Notification Forwarding .................................. 24
+ 4 The Structure of the MIB Modules ............................. 27
+ 4.1 The Management Target MIB Module ........................... 27
+ 4.1.1 Tag Lists ................................................ 28
+ 4.1.2 Definitions .............................................. 28
+ 4.2 The Notification MIB Module ................................ 41
+ 4.2.1 Definitions .............................................. 42
+ 4.3 The Proxy MIB Module ....................................... 53
+ 4.3.1 Definitions .............................................. 53
+ 5 Identification of Management Targets in Notification
+ Originators ............................................... 59
+ 6 Notification Filtering ....................................... 60
+ 7 Management Target Translation in Proxy Forwarder
+ Applications .............................................. 61
+ 7.1 Management Target Translation for Request Forwarding ....... 61
+ 7.2 Management Target Translation for Notification Forwarding
+ ........................................................... 62
+ 8 Intellectual Property ........................................ 63
+ 9 Acknowledgments .............................................. 64
+ 10 Security Considerations ..................................... 65
+ 11 References .................................................. 65
+ 12 Editors' Address ............................................ 67
+ A. Trap Configuration Example .................................. 68
+ B. Full Copyright Statement .................................... 70
+
+1. Overview
+
+ This document describes five types of SNMP applications:
+
+ - Applications which initiate SNMP Get, GetNext, GetBulk, and/or
+ Set requests, called 'command generators.'
+
+ - Applications which respond to SNMP Get, GetNext, GetBulk,
+ and/or Set requests, called 'command responders.'
+
+ - Applications which generate notifications, called
+ 'notification originators.'
+
+
+
+
+Levi, et. al. Standards Track [Page 2]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - Applications which receive notifications, called 'notification
+ receivers.'
+
+ - Applications which forward SNMP Get, GetNext, GetBulk, and/or
+ Set requests or notifications, called 'proxy forwarder.'
+
+ Note that there are no restrictions on which types of applications
+ may be associated with a particular SNMP engine. For example, a
+ single SNMP engine may, in fact, be associated with both command
+ generator and command responder applications.
+
+1.1. Command Generator Applications
+
+ A command generator application initiates SNMP Get, GetNext, GetBulk,
+ and/or Set requests, as well as processing the response to a request
+ which it generated.
+
+1.2. Command Responder Applications
+
+ A command responder application receives SNMP Get, GetNext, GetBulk,
+ and/or Set requests destined for the local system as indicated by the
+ fact that the contextEngineID in the received request is equal to
+ that of the local engine through which the request was received. The
+ command responder application will perform the appropriate protocol
+ operation, using access control, and will generate a response message
+ to be sent to the request's originator.
+
+1.3. Notification Originator Applications
+
+ A notification originator application conceptually monitors a system
+ for particular events or conditions, and generates Trap and/or Inform
+ messages based on these events or conditions. A notification
+ originator must have a mechanism for determining where to send
+ messages, and what SNMP version and security parameters to use when
+ sending messages. A mechanism and MIB module for this purpose is
+ provided in this document.
+
+1.4. Notification Receiver Applications
+
+ A notification receiver application listens for notification
+ messages, and generates response messages when a message containing
+ an Inform PDU is received.
+
+1.5. Proxy Forwarder Applications
+
+ A proxy forwarder application forwards SNMP messages. Note that
+ implementation of a proxy forwarder application is optional. The
+ sections describing proxy (4.5, 5.3, and 8) may be skipped for
+
+
+
+Levi, et. al. Standards Track [Page 3]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ implementations that do not include a proxy forwarder application.
+
+ The term "proxy" has historically been used very loosely, with
+ multiple different meanings. These different meanings include (among
+ others):
+
+(1) the forwarding of SNMP requests to other SNMP entities without
+ regard for what managed object types are being accessed; for
+ example, in order to forward an SNMP request from one transport
+ domain to another, or to translate SNMP requests of one version
+ into SNMP requests of another version;
+
+(2) the translation of SNMP requests into operations of some non-SNMP
+ management protocol; and
+
+(3) support for aggregated managed objects where the value of one
+ managed object instance depends upon the values of multiple other
+ (remote) items of management information.
+
+ Each of these scenarios can be advantageous; for example, support for
+ aggregation of management information can significantly reduce the
+ bandwidth requirements of large-scale management activities.
+ However, using a single term to cover multiple different scenarios
+ causes confusion.
+
+ To avoid such confusion, this document uses the term "proxy" with a
+ much more tightly defined meaning. The term "proxy" is used in this
+ document to refer to a proxy forwarder application which forwards
+ either SNMP requests, notifications, and responses without regard for
+ what managed objects are contained within requests or notifications.
+ This definition is most closely related to the first definition
+ above. Note, however, that in the SNMP architecture [RFC2271], a
+ proxy forwarder is actually an application, and need not be
+ associated with what is traditionally thought of as an SNMP agent.
+
+ Specifically, the distinction between a traditional SNMP agent and a
+ proxy forwarder application is simple:
+
+ - a proxy forwarder application forwards requests and/or
+ notifications to other SNMP engines according to the context,
+ and irrespective of the specific managed object types being
+ accessed, and forwards the response to such previously
+ forwarded messages back to the SNMP engine from which the
+ original message was received;
+
+ - in contrast, the command responder application that is part of
+ what is traditionally thought of as an SNMP agent, and which
+ processes SNMP requests according to the (names of the)
+
+
+
+Levi, et. al. Standards Track [Page 4]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ individual managed object types and instances being accessed,
+ is NOT a proxy forwarder application from the perspective of
+ this document.
+
+ Thus, when a proxy forwarder application forwards a request or
+ notification for a particular contextEngineID / contextName pair, not
+ only is the information on how to forward the request specifically
+ associated with that context, but the proxy forwarder application has
+ no need of a detailed definition of a MIB view (since the proxy
+ forwarder application forwards the request irrespective of the
+ managed object types).
+
+ In contrast, a command responder application must have the detailed
+ definition of the MIB view, and even if it needs to issue requests to
+ other entities, via SNMP or otherwise, that need is dependent on the
+ individual managed object instances being accessed (i.e., not only on
+ the context).
+
+ Note that it is a design goal of a proxy forwarder application to act
+ as an intermediary between the endpoints of a transaction. In
+ particular, when forwarding Inform requests, the associated response
+ is forwarded when it is received from the target to which the Inform
+ request was forwarded, rather than generating a response immediately
+ when an Inform request is received.
+
+2. Management Targets
+
+ Some types of applications (notification generators and proxy
+ forwarders in particular) require a mechanism for determining where
+ and how to send generated messages. This document provides a
+ mechanism and MIB module for this purpose. The set of information
+ that describes where and how to send a message is called a
+ 'Management Target', and consists of two kinds of information:
+
+ - Destination information, consisting of a transport domain and
+ a transport address. This is also termed a transport
+ endpoint.
+
+ - SNMP parameters, consisting of message processing model,
+ security model, security level, and security name information.
+
+ The SNMP-TARGET-MIB module described later in this document contains
+ one table for each of these types of information. There can be a
+ many-to-many relationship in the MIB between these two types of
+ information. That is, there may be multiple transport endpoints
+ associated with a particular set of SNMP parameters, or a particular
+ transport endpoint may be associated with several sets of SNMP
+ parameters.
+
+
+
+Levi, et. al. Standards Track [Page 5]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+3. Elements Of Procedure
+
+ The following sections describe the procedures followed by each type
+ of application when generating messages for transmission or when
+ processing received messages. Applications communicate with the
+ Dispatcher using the abstract service interfaces defined in [RFC2271].
+
+3.1. Command Generator Applications
+
+ A command generator initiates an SNMP request by calling the
+ Dispatcher using the following abstract service interface:
+
+ statusInformation = -- sendPduHandle if success
+ -- errorIndication if failure
+ sendPdu(
+ IN transportDomain -- transport domain to be used
+ IN transportAddress -- destination network address
+ IN messageProcessingModel -- typically, SNMP version
+ IN securityModel -- Security Model to use
+ IN securityName -- on behalf of this principal
+ IN securityLevel -- Level of Security requested
+ IN contextEngineID -- data from/at this entity
+ IN contextName -- data from/in this context
+ IN pduVersion -- the version of the PDU
+ IN PDU -- SNMP Protocol Data Unit
+ IN expectResponse -- TRUE or FALSE
+ )
+
+ Where:
+
+ - The transportDomain is that of the destination of the message.
+
+ - The transportAddress is that of the destination of the
+ message.
+
+ - The messageProcessingModel indicates which Message Processing
+ Model the application wishes to use.
+
+ - The securityModel is the security model that the application
+ wishes to use.
+
+ - The securityName is the security model independent name for
+ the principal on whose behalf the application wishes the
+ message is to be generated.
+
+ - The securityLevel is the security level that the application
+ wishes to use.
+
+
+
+
+Levi, et. al. Standards Track [Page 6]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The contextEngineID is provided by the command generator if it
+ wishes to explicitly specify the location of the management
+ information it is requesting.
+
+ - The contextName is provided by the command generator if it
+ wishes to explicitly specify the local context name for the
+ management information it is requesting.
+
+ - The pduVersion indicates the version of the PDU to be sent.
+
+ - The PDU is a value constructed by the command generator
+ containing the management operation that the command generator
+ wishes to perform.
+
+ - The expectResponse argument indicates that a response is
+ expected.
+
+ The result of the sendPdu interface indicates whether the PDU was
+ successfully sent. If it was successfully sent, the returned value
+ will be a sendPduHandle. The command generator should store the
+ sendPduHandle so that it can correlate a response to the original
+ request.
+
+ The Dispatcher is responsible for delivering the response to a
+ particular request to the correct command generator application. The
+ abstract service interface used is:
+
+ processResponsePdu( -- process Response PDU
+ IN messageProcessingModel -- typically, SNMP version
+ IN securityModel -- Security Model in use
+ IN securityName -- on behalf of this principal
+ IN securityLevel -- Level of Security
+ IN contextEngineID -- data from/at this SNMP entity
+ IN contextName -- data from/in this context
+ IN pduVersion -- the version of the PDU
+ IN PDU -- SNMP Protocol Data Unit
+ IN statusInformation -- success or errorIndication
+ IN sendPduHandle -- handle from sendPDU
+ )
+
+ Where:
+
+ - The messageProcessingModel is the value from the received
+ response.
+
+ - The securityModel is the value from the received response.
+
+ - The securityName is the value from the received response.
+
+
+
+Levi, et. al. Standards Track [Page 7]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The securityLevel is the value from the received response.
+
+ - The contextEngineID is the value from the received response.
+
+ - The contextName is the value from the received response.
+
+ - The pduVersion indicates the version of the PDU in the
+ received response.
+
+ - The PDU is the value from the received response.
+
+ - The statusInformation indicates success or failure in
+ receiving the response.
+
+ - The sendPduHandle is the value returned by the sendPdu call
+ which generated the original request to which this is a
+ response.
+
+ The procedure when a command generator receives a message is as
+ follows:
+
+(1) If the received values of messageProcessingModel, securityModel,
+ securityName, contextEngineID, contextName, and pduVersion are not
+ all equal to the values used in the original request, the response
+ is discarded.
+
+(2) The operation type, request-id, error-status, error-index, and
+ variable-bindings are extracted from the PDU and saved. If the
+ request-id is not equal to the value used in the original request,
+ the response is discarded.
+
+(3) At this point, it is up to the application to take an appropriate
+ action. The specific action is implementation dependent. If the
+ statusInformation indicates that the request failed, an appropriate
+ action might be to attempt to transmit the request again, or to
+ notify the person operating the application that a failure
+ occurred.
+
+3.2. Command Responder Applications
+
+ Before a command responder application can process messages, it must
+ first associate itself with an SNMP engine. The abstract service
+ interface used for this purpose is:
+
+
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 8]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ statusInformation = -- success or errorIndication
+ registerContextEngineID(
+ IN contextEngineID -- take responsibility for this one
+ IN pduType -- the pduType(s) to be registered
+ )
+
+ Where:
+
+ - The statusInformation indicates success or failure of the
+ registration attempt.
+
+ - The contextEngineID is equal to the snmpEngineID of the SNMP
+ engine with which the command responder is registering.
+
+ - The pduType indicates a Get, GetNext, GetBulk, or Set pdu.
+
+ Note that if another command responder application is already
+ registered with an SNMP engine, any further attempts to register with
+ the same contextEngineID and pduType will be denied. This implies
+ that separate command responder applications could register
+ separately for the various pdu types. However, in practice this is
+ undesirable, and only a single command responder application should
+ be registered with an SNMP engine at any given time.
+
+ A command responder application can disassociate with an SNMP engine
+ using the following abstract service interface:
+
+ unregisterContextEngineID(
+ IN contextEngineID -- give up responsibility for this one
+ IN pduType -- the pduType(s) to be unregistered
+ )
+
+ Where:
+
+ - The contextEngineID is equal to the snmpEngineID of the SNMP
+ engine with which the command responder is cancelling the
+ registration.
+
+ - The pduType indicates a Get, GetNext, GetBulk, or Set pdu.
+
+ Once the command responder has registered with the SNMP engine, it
+ waits to receive SNMP messages. The abstract service interface used
+ for receiving messages is:
+
+ processPdu( -- process Request/Notification PDU
+ IN messageProcessingModel -- typically, SNMP version
+ IN securityModel -- Security Model in use
+ IN securityName -- on behalf of this principal
+
+
+
+Levi, et. al. Standards Track [Page 9]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ IN securityLevel -- Level of Security
+ IN contextEngineID -- data from/at this SNMP entity
+ IN contextName -- data from/in this context
+ IN pduVersion -- the version of the PDU
+ IN PDU -- SNMP Protocol Data Unit
+ IN maxSizeResponseScopedPDU -- maximum size of the Response PDU
+ IN stateReference -- reference to state information
+ ) -- needed when sending a response
+
+ Where:
+
+ - The messageProcessingModel indicates which Message Processing
+ Model received and processed the message.
+
+ - The securityModel is the value from the received message.
+
+ - The securityName is the value from the received message.
+
+ - The securityLevel is the value from the received message.
+
+ - The contextEngineID is the value from the received message.
+
+ - The contextName is the value from the received message.
+
+ - The pduVersion indicates the version of the PDU in the
+ received message.
+
+ - The PDU is the value from the received message.
+
+ - The maxSizeResponseScopedPDU is the maximum allowable size of
+ a ScopedPDU containing a Response PDU (based on the maximum
+ message size that the originator of the message can accept).
+
+ - The stateReference is a value which references cached
+ information about each received request message. This value
+ must be returned to the Dispatcher in order to generate a
+ response.
+
+ The procedure when a message is received is as follows.
+
+(1) The operation type is determined from the ASN.1 tag value
+ associated with the PDU parameter. The operation type should
+ always be one of the types previously registered by the
+ application.
+
+(2) The request-id is extracted from the PDU and saved.
+
+
+
+
+
+Levi, et. al. Standards Track [Page 10]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+(3) If the SNMPv2 operation type is GetBulk, the non-repeaters and
+ max-repetitions values are extracted from the PDU and saved.
+
+(4) The variable-bindings are extracted from the PDU and saved.
+
+(5) The management operation represented by the SNMPv2 operation type
+ is performed with respect to the relevant MIB view within the
+ context named by the contextName, according to the procedures set
+ forth in [RFC1905]. The relevant MIB view is determined by the
+ securityLevel, securityModel, contextName, securityName, and SNMPv2
+ operation type. To determine whether a particular object instance
+ is within the relevant MIB view, the following abstract service
+ interface is called:
+
+ statusInformation = -- success or errorIndication
+ isAccessAllowed(
+ IN securityModel -- Security Model in use
+ IN securityName -- principal who wants to access
+ IN securityLevel -- Level of Security
+ IN viewType -- read, write, or notify view
+ IN contextName -- context containing variableName
+ IN variableName -- OID for the managed object
+ )
+
+ Where:
+
+ - The securityModel is the value from the received message.
+
+ - The securityName is the value from the received message.
+
+ - The securityLevel is the value from the received message.
+
+ - The viewType indicates whether the PDU type is a read or write
+ operation.
+
+ - The contextName is the value from the received message.
+
+ - The variableName is the object instance of the variable for
+ which access rights are to be checked.
+
+ Normally, the result of the management operation will be a new PDU
+ value, and processing will continue in step (6) below. However, at
+ any time during the processing of the management operation:
+
+ - If the isAccessAllowed ASI returns a noSuchView,
+ noAccessEntry, or noGroupName error, processing of the
+ management operation is halted, a PDU value is contructed
+ using the values from the originally received PDU, but
+
+
+
+Levi, et. al. Standards Track [Page 11]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ replacing the error_status with an authorizationError code,
+ and error_index value of 0, and control is passed to step (6)
+ below.
+
+ - If the isAccessAllowed ASI returns an otherError, processing
+ of the management operation is halted, a different PDU value
+ is contructed using the values from the originally received
+ PDU, but replacing the error_status with a genError code, and
+ control is passed to step (6) below.
+
+ - If the isAccessAllowed ASI returns a noSuchContext error,
+ processing of the management operation is halted, no result
+ PDU is generated, the snmpUnknownContexts counter is
+ incremented, and control is passed to step (6) below.
+
+ - If the context named by the contextName parameter is
+ unavailable, processing of the management operation is halted,
+ no result PDU is generated, the snmpUnavailableContexts
+ counter is incremented, and control is passed to step (6)
+ below.
+
+(6) The Dispatcher is called to generate a response or report message.
+ The abstract service interface is:
+
+ returnResponsePdu(
+ IN messageProcessingModel -- typically, SNMP version
+ IN securityModel -- Security Model in use
+ IN securityName -- on behalf of this principal
+ IN securityLevel -- same as on incoming request
+ IN contextEngineID -- data from/at this SNMP entity
+ IN contextName -- data from/in this context
+ IN pduVersion -- the version of the PDU
+ IN PDU -- SNMP Protocol Data Unit
+ IN maxSizeResponseScopedPDU -- maximum size of the Response PDU
+ IN stateReference -- reference to state information
+ -- as presented with the request
+ IN statusInformation -- success or errorIndication
+ ) -- error counter OID/value if error
+
+ Where:
+
+ - The messageProcessingModel is the value from the processPdu
+ call.
+
+ - The securityModel is the value from the processPdu call.
+
+ - The securityName is the value from the processPdu call.
+
+
+
+
+Levi, et. al. Standards Track [Page 12]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The securityLevel is the value from the processPdu call.
+
+ - The contextEngineID is the value from the processPdu call.
+
+ - The contextName is the value from the processPdu call.
+
+ - The pduVersion indicates the version of the PDU to be
+ returned. If no result PDU was generated, the pduVersion is
+ an undefined value.
+
+ - The PDU is the result generated in step (5) above. If no
+ result PDU was generated, the PDU is an undefined value.
+
+ - The maxSizeResponseScopedPDU is a local value indicating the
+ maximum size of a ScopedPDU that the application can accept.
+
+ - The stateReference is the value from the processPdu call.
+
+ - The statusInformation either contains an indication that no
+ error occurred and that a response should be generated, or
+ contains an indication that an error occurred along with the
+ OID and counter value of the appropriate error counter object.
+
+ Note that a command responder application should always call the
+ returnResponsePdu abstract service interface, even in the event of an
+ error such as a resource allocation error. In the event of such an
+ error, the PDU value passed to returnResponsePdu should contain
+ appropriate values for errorStatus and errorIndex.
+
+3.3. Notification Originator Applications
+
+ A notification originator application generates SNMP notification
+ messages. A notification message may, for example, contain an
+ SNMPv2-Trap PDU or an Inform PDU. However, a particular
+ implementation is not required to be capable of generating both types
+ of messages.
+
+ Notification originator applications require a mechanism for
+ identifying the management targets to which notifications should be
+ sent. The particular mechanism used is implementation dependent.
+ However, if an implementation makes the configuration of management
+ targets SNMP manageable, it MUST use the SNMP-TARGET-MIB module
+ described in this document.
+
+ When a notification originator wishes to generate a notification, it
+ must first determine in which context the information to be conveyed
+ in the notification exists, i.e., it must determine the
+ contextEngineID and contextName. It must then determine the set of
+
+
+
+Levi, et. al. Standards Track [Page 13]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ management targets to which the notification should be sent. The
+ application must also determine, for each management target, whether
+ the notification message should contain an SNMPv2-Trap PDU or Inform
+ PDU, and if it is to contain an Inform PDU, the number of retries and
+ retransmission algorithm.
+
+ The mechanism by which a notification originator determines this
+ information is implementation dependent. Once the application has
+ determined this information, the following procedure is performed for
+ each management target:
+
+(1) Any appropriate filtering mechanisms are applied to determine
+ whether the notification should be sent to the management target.
+ If such filtering mechanisms determine that the notification should
+ not be sent, processing continues with the next management target.
+ Otherwise,
+
+(2) The appropriate set of variable-bindings is retrieved from local
+ MIB instrumentation within the relevant MIB view. The relevant MIB
+ view is determined by the securityLevel, securityModel,
+ contextName, and securityName of the management target. To
+ determine whether a particular object instance is within the
+ relevant MIB view, the isAccessAllowed abstract service interface
+ is used, in the same manner as described in the preceding section.
+ If the statusInformation returned by isAccessAllowed does not
+ indicate accessAllowed, the notification is not sent to the
+ management target.
+
+(3) A PDU is constructed using a locally unique request-id value, an
+ operation type of SNMPv2-Trap or Inform, an error-status and
+ error-index value of 0, and the variable-bindings supplied
+ previously in step (2).
+
+(4) If the notification contains an SNMPv2-Trap PDU, the Dispatcher is
+ called using the following abstract service interface:
+
+ statusInformation = -- sendPduHandle if success
+ -- errorIndication if failure
+ sendPdu(
+ IN transportDomain -- transport domain to be used
+ IN transportAddress -- destination network address
+ IN messageProcessingModel -- typically, SNMP version
+ IN securityModel -- Security Model to use
+ IN securityName -- on behalf of this principal
+ IN securityLevel -- Level of Security requested
+ IN contextEngineID -- data from/at this entity
+ IN contextName -- data from/in this context
+ IN pduVersion -- the version of the PDU
+
+
+
+Levi, et. al. Standards Track [Page 14]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ IN PDU -- SNMP Protocol Data Unit
+ IN expectResponse -- TRUE or FALSE
+ )
+
+ Where:
+
+ - The transportDomain is that of the management target.
+
+ - The transportAddress is that of the management target.
+
+ - The messageProcessingModel is that of the management target.
+
+ - The securityModel is that of the management target.
+
+ - The securityName is that of the management target.
+
+ - The securityLevel is that of the management target.
+
+ - The contextEngineID is the value originally determined for the
+ notification.
+
+ - The contextName is the value originally determined for the
+ notification.
+
+ - The pduVersion is the version of the PDU to be sent.
+
+ - The PDU is the value constructed in step (3) above.
+
+ - The expectResponse argument indicates that no response is
+ expected.
+
+ Otherwise,
+
+(5) If the notification contains an Inform PDU, then:
+
+ a) The Dispatcher is called using the sendPdu abstract service
+ interface as described in step (4) above, except that the
+ expectResponse argument indicates that a response is expected.
+
+ b) The application caches information about the management
+ target.
+
+ c) If a response is received within an appropriate time interval
+ from the transport endpoint of the management target, the
+ notification is considered acknowledged and the cached
+ information is deleted. Otherwise,
+
+
+
+
+
+Levi, et. al. Standards Track [Page 15]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ d) If a response is not received within an appropriate time
+ period, or if a report indication is received, information
+ about the management target is retrieved from the cache, and
+ steps a) through d) are repeated. The number of times these
+ steps are repeated is equal to the previously determined retry
+ count. If this retry count is exceeded, the acknowledgement
+ of the notification is considered to have failed, and
+ processing of the notification for this management target is
+ halted.
+
+ Responses to Inform PDU notifications will be received via the
+ processResponsePDU abstract service interface.
+
+3.4. Notification Receiver Applications
+
+ Notification receiver applications receive SNMP Notification messages
+ from the Dispatcher. Before any messages can be received, the
+ notification receiver must register with the Dispatcher using the
+ registerContextEngineID abstract service interface. The parameters
+ used are:
+
+ - The contextEngineID is an undefined 'wildcard' value.
+ Notifications are delivered to a registered notification
+ receiver regardless of the contextEngineID contained in the
+ notification message.
+
+ - The pduType indicates the type of notifications that the
+ application wishes to receive (for example, SNMPv2-Trap PDUs
+ or Inform PDUs).
+
+ Once the notification receiver has registered with the Dispatcher,
+ messages are received using the processPdu abstract service
+ interface. Parameters are:
+
+ - The messageProcessingModel indicates which Message Processing
+ Model received and processed the message.
+
+ - The securityModel is the value from the received message.
+
+ - The securityName is the value from the received message.
+
+ - The securityLevel is the value from the received message.
+
+ - The contextEngineID is the value from the received message.
+
+ - The contextName is the value from the received message.
+
+
+
+
+
+Levi, et. al. Standards Track [Page 16]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The pduVersion indicates the version of the PDU in the
+ received message.
+
+ - The PDU is the value from the received message.
+
+ - The maxSizeResponseScopedPDU is the maximum allowable size of
+ a ScopedPDU containing a Response PDU (based on the maximum
+ message size that the originator of the message can accept).
+
+ - If the message contains an SNMPv2-Trap PDU, the stateReference
+ is undefined and unused. Otherwise, the stateReference is a
+ value which references cached information about the
+ notification. This value must be returned to the Dispatcher
+ in order to generate a response.
+
+ When an SNMPv2-Trap PDU is delivered to a notification receiver
+ application, it first extracts the SNMP operation type, request-id,
+ error-status, error-index, and variable-bindings from the PDU. After
+ this, processing depends on the particular implementation.
+
+ When an Inform PDU is received, the notification receiver application
+ follows the following procedure:
+
+(1) The SNMPv2 operation type, request-id, error-status, error-index,
+ and variable-bindings are extracted from the PDU.
+
+(2) A Response PDU is constructed using the extracted request-id and
+ variable-bindings, and with error-status and error-index both set
+ to 0.
+
+(3) The Dispatcher is called to generate a response message using the
+ returnResponsePdu abstract service interface. Parameters are:
+
+ - The messageProcessingModel is the value from the processPdu
+ call.
+
+ - The securityModel is the value from the processPdu call.
+
+ - The securityName is the value from the processPdu call.
+
+ - The securityLevel is the value from the processPdu call.
+
+ - The contextEngineID is the value from the processPdu call.
+
+ - The contextName is the value from the processPdu call.
+
+ - The pduVersion indicates the version of the PDU to be
+ returned.
+
+
+
+Levi, et. al. Standards Track [Page 17]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The PDU is the result generated in step (2) above.
+
+ - The maxSizeResponseScopedPDU is a local value indicating the
+ maximum size of a ScopedPDU that the application can accept.
+
+ - The stateReference is the value from the processPdu call.
+
+ - The statusInformation indicates that no error occurred and
+ that a response should be generated.
+
+3.5. Proxy Forwarder Applications
+
+ A proxy forwarder application deals with forwarding SNMP messages.
+ There are four basic types of messages which a proxy forwarder
+ application may need to forward. These are grouped according to the
+ PDU type contained in a message, or according to whether a report
+ indication is contained in the message. The four basic types of
+ messages are:
+
+ - Those containing PDU types which were generated by a command
+ generator application (for example, Get, GetNext, GetBulk, and
+ Set PDU types). These deal with requesting or modifying
+ information located within a particular context.
+
+ - Those containing PDU types which were generated by a
+ notification originator application (for example, SNMPv2-Trap
+ and Inform PDU types). These deal with notifications
+ concerning information located within a particular context.
+
+ - Those containing a Response PDU type. Forwarding of Response
+ PDUs always occurs as a result of receiving a response to a
+ previously forwarded message.
+
+ - Those containing a report indication. Forwarding of report
+ indications always occurs as a result of receiving a report
+ indication for a previously forwarded message.
+
+ For the first type, the proxy forwarder's role is to deliver a
+ request for management information to an SNMP engine which is
+ "closer" or "downstream in the path" to the SNMP engine which has
+ access to that information, and to deliver the response containing
+ the information back to the SNMP engine from which the request was
+ received. The context information in a request is used to determine
+ which SNMP engine has access to the requested information, and this
+ is used to determine where and how to forward the request.
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 18]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ For the second type, the proxy forwarder's role is to determine which
+ SNMP engines should receive notifications about management
+ information from a particular location. The context information in a
+ notification message determines the location to which the information
+ contained in the notification applies. This is used to determine
+ which SNMP engines should receive notification about this
+ information.
+
+ For the third type, the proxy forwarder's role is to determine which
+ previously forwarded request or notification (if any) the response
+ matches, and to forward the response back to the initiator of the
+ request or notification.
+
+ For the fourth type, the proxy forwarder's role is to determine which
+ previously forwarded request or notification (if any) the report
+ indication matches, and to forward the report indication back to the
+ initiator of the request or notification.
+
+ When forwarding messages, a proxy forwarder application must perform
+ a translation of incoming management target information into outgoing
+ management target information. How this translation is performed is
+ implementation specific. In many cases, this will be driven by a
+ preconfigured translation table. If a proxy forwarder application
+ makes the contents of this table SNMP manageable, it MUST use the
+ SNMP-PROXY-MIB module defined in this document.
+
+3.5.1. Request Forwarding
+
+ There are two phases for request forwarding. First, the incoming
+ request needs to be passed through the proxy application. Then, the
+ resulting response needs to be passed back. These phases are
+ described in the following two sections.
+
+3.5.1.1. Processing an Incoming Request
+
+ A proxy forwarder application that wishes to forward request messages
+ must first register with the Dispatcher using the
+ registerContextEngineID abstract service interface. The proxy
+ forwarder must register each contextEngineID for which it wishes to
+ forward messages, as well as for each pduType. Note that as the
+ configuration of a proxy forwarder is changed, the particular
+ contextEngineID values for which it is forwarding may change. The
+ proxy forwarder should call the registerContextEngineID and
+ unregisterContextEngineID abstract service interfaces as needed to
+ reflect its current configuration.
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 19]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ A proxy forwarder application should never attempt to register a
+ value of contextEngineID which is equal to the snmpEngineID of the
+ SNMP engine to which the proxy forwarder is associated.
+
+ Once the proxy forwarder has registered for the appropriate
+ contextEngineId values, it can start processing messages. The
+ following procedure is used:
+
+(1) A message is received using the processPdu abstract service
+ interface. The incoming management target information received
+ from the processPdu interface is translated into outgoing
+ management target information. Note that this translation may vary
+ for different values of contextEngineID and/or contextName. The
+ translation should result in a single management target.
+
+(2) If appropriate outgoing management target information cannot be
+ found, the proxy forwarder increments the snmpProxyDrops counter
+ [RFC1907], and then calls the Dispatcher using the
+ returnResponsePdu abstract service interface. Parameters are:
+
+ - The messageProcessingModel is the value from the processPdu
+ call.
+
+ - The securityModel is the value from the processPdu call.
+
+ - The securityName is the value from the processPdu call.
+
+ - The securityLevel is the value from the processPdu call.
+
+ - The contextEngineID is the value from the processPdu call.
+
+ - The contextName is the value from the processPdu call.
+
+ - The pduVersion is the value from the processPdu call.
+
+ - The PDU is an undefined value.
+
+ - The maxSizeResponseScopedPDU is a local value indicating the
+ maximum size of a ScopedPDU that the application can accept.
+
+ - The stateReference is the value from the processPdu call.
+
+ - The statusInformation indicates that an error occurred and
+ includes the OID and value of the snmpProxyDrops object.
+
+ Processing of the message stops at this point. Otherwise,
+
+
+
+
+
+Levi, et. al. Standards Track [Page 20]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+(3) A new PDU is constructed. A unique value of request-id should be
+ used in the new PDU (this value will enable a subsequent response
+ message to be correlated with this request). The remainder of the
+ new PDU is identical to the received PDU, unless the incoming SNMP
+ version is SNMPv2 or SNMPv3 and the outgoing SNMP version is
+ SNMPv1, in which case the proxy forwarder must apply the
+ translation rules as documented in [RFC1908].
+
+(4) The proxy forwarder calls the Dispatcher to generate the forwarded
+ message, using the sendPdu abstract service interface. The
+ parameters are:
+
+ - The transportDomain is that of the outgoing management target.
+
+ - The transportAddress is that of the outgoing management
+ target.
+
+ - The messageProcessingModel is that of the outgoing management
+ target.
+
+ - The securityModel is that of the outgoing management target.
+
+ - The securityName is that of the outgoing management target.
+
+ - The securityLevel is that of the outgoing management target.
+
+ - The contextEngineID is the value originally received.
+
+ - The contextName is the value originally received.
+
+ - The pduVersion is the version of the PDU to be sent.
+
+ - The PDU is the value constructed in step (3) above.
+
+ - The expectResponse argument indicates that a response is
+ expected. If the sendPdu call is unsuccessful, the proxy
+ forwarder performs the steps described in (2) above.
+ Otherwise:
+
+(5) The proxy forwarder caches the following information in order to
+ match an incoming response to the forwarded request:
+
+ - The sendPduHandle returned from the call to sendPdu,
+
+ - The request-id from the received PDU.
+
+ - the contextEngineID,
+
+
+
+
+Levi, et. al. Standards Track [Page 21]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - the contextName,
+
+ - the stateReference,
+
+ - the incoming management target information,
+
+ - the outgoing management information,
+
+ - any other information needed to match an incoming response to
+ the forwarded request.
+
+ If this information cannot be cached (possibly due to a lack of
+ resources), the proxy forwarder performs the steps described in (2)
+ above. Otherwise:
+
+(6) Processing of the request stops until a response to the forwarded
+ request is received, or until an appropriate time interval has
+ expired. If this time interval expires before a response has been
+ received, the cached information about this request is removed.
+
+3.5.1.2. Processing an Incoming Response
+
+ A proxy forwarder follows the following procedure when an incoming
+ response is received:
+
+(1) The incoming response is received using the processResponsePdu
+ interface. The proxy forwarder uses the received parameters to
+ locate an entry in its cache of pending forwarded requests. This
+ is done by matching the received parameters with the cached values
+ of sendPduHandle, contextEngineID, contextName, outgoing management
+ target information, and the request-id contained in the received
+ PDU (the proxy forwarder must extract the request-id for this
+ purpose). If an appropriate cache entry cannot be found,
+ processing of the response is halted. Otherwise:
+
+(2) The cache information is extracted, and removed from the cache.
+
+(3) A new Response PDU is constructed, using the request-id value from
+ the original forwarded request (as extracted from the cache). All
+ other values are identical to those in the received Response PDU.
+
+(4) If the incoming SNMP version is SNMPv1 and the outgoing SNMP
+ version is SNMPv2 or SNMPv3, the proxy forwarder must apply the
+ translation rules documented in [RFC1908].
+
+(5) The proxy forwarder calls the Dispatcher using the
+ returnResponsePdu abstract service interface. Parameters are:
+
+
+
+
+Levi, et. al. Standards Track [Page 22]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The messageProcessingModel indicates the Message Processing
+ Model by which the original incoming message was processed.
+
+ - The securityModel is that of the original incoming management
+ target extracted from the cache.
+
+ - The securityName is that of the original incoming management
+ target extracted from the cache.
+
+ - The securityLevel is that of the original incoming management
+ target extracted from the cache.
+
+ - The contextEngineID is the value extracted from the cache.
+
+ - The contextName is the value extracted from the cache.
+
+ - The pduVersion indicates the version of the PDU to be
+ returned.
+
+ - The PDU is the (possibly translated) Response PDU.
+
+ - The maxSizeResponseScopedPDU is a local value indicating the
+ maximum size of a ScopedPDU that the application can accept.
+
+ - The stateReference is the value extracted from the cache.
+
+ - The statusInformation indicates that no error occurred and
+ that a Response PDU message should be generated.
+
+3.5.1.3. Processing an Incoming Report Indication
+
+ A proxy forwarder follows the following procedure when an incoming
+ report indication is received:
+
+(1) The incoming report indication is received using the
+ processResponsePdu interface. The proxy forwarder uses the
+ received parameters to locate an entry in its cache of pending
+ forwarded requests. This is done by matching the received
+ parameters with the cached values of sendPduHandle. If an
+ appropriate cache entry cannot be found, processing of the report
+ indication is halted. Otherwise:
+
+(2) The cache information is extracted, and removed from the cache.
+
+(3) If the original incoming management target information indicates
+ SNMPv1, processing of the report indication is halted.
+
+
+
+
+
+Levi, et. al. Standards Track [Page 23]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+(4) The proxy forwarder calls the Dispatcher using the
+ returnResponsePdu abstract service interface. Parameters are:
+
+ - The messageProcessingModel indicates the Message Processing
+ Model by which the original incoming message was processed.
+
+ - The securityModel is that of the original incoming management
+ target extracted from the cache.
+
+ - The securityName is that of the original incoming management
+ target extracted from the cache.
+
+ - The securityLevel is that of the original incoming management
+ target extracted from the cache.
+
+ - The contextEngineID is the value extracted from the cache.
+
+ - The contextName is the value extracted from the cache.
+
+ - The pduVersion indicates the version of the PDU to be
+ returned.
+
+ - The PDU is unused.
+
+ - The maxSizeResponseScopedPDU is a local value indicating the
+ maximum size of a ScopedPDU that the application can accept.
+
+ - The stateReference is the value extracted from the cache.
+
+ - The statusInformation contain the contextEngineID,
+ contextName, counter OID, and counter value received in the
+ report indication.
+
+3.5.2. Notification Forwarding
+
+ A proxy forwarder receives notifications in the same manner as a
+ notification receiver application, using the processPdu abstract
+ service interface. The following procedure is used when a
+ notification is received:
+
+(1) The incoming management target information received from the
+ processPdu interface is translated into outgoing management target
+ information. Note that this translation may vary for different
+ values of contextEngineId and/or contextName. The translation may
+ result in multiple management targets.
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 24]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+(2) If appropriate outgoing management target information cannot be
+ found and the notification was a Trap, processing of the
+ notification is halted. If appropriate outgoing management target
+ information cannot be found and the notification was an Inform, the
+ proxy forwarder increments the snmpProxyDrops object, and calls the
+ Dispatcher using the returnResponsePdu abstract service interface.
+
+ The parameters are:
+
+ - The messageProcessingModel is the received value.
+
+ - The securityModel is the received value.
+
+ - The securityName is the received value.
+
+ - The securityLevel is the received value.
+
+ - The contextEngineID is the received value.
+
+ - The contextName is the received value.
+
+ - The pduVersion is the received value.
+
+ - The PDU is an undefined and unused value.
+
+ - The maxSizeResponseScopedPDU is a local value indicating the
+ maximum size of a ScopedPDU that the application can accept.
+
+ - The stateReference is the received value.
+
+ - The statusInformation indicates that an error occurred and
+ that a Report message should be generated.
+
+ Processing of the message stops at this point. Otherwise,
+
+(3) The proxy forwarder generates a notification using the procedures
+ described in the preceding section on Notification Originators,
+ with the following exceptions:
+
+ - The contextEngineID and contextName values from the original
+ received notification are used.
+
+ - The outgoing management targets previously determined are
+ used.
+
+ - No filtering mechanisms are applied.
+
+
+
+
+
+Levi, et. al. Standards Track [Page 25]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The variable-bindings from the original received notification
+ are used, rather than retrieving variable-bindings from local
+ MIB instrumentation. In particular, no access-control is
+ applied to these variable-bindings.
+
+ - If for any of the outgoing management targets, the incoming
+ SNMP version is SNMPv1 and the outgoing SNMP version is SNMPv2
+ or SNMPv3, the proxy forwarder must apply the translation
+ rules as documented in [RFC1908].
+
+ - If for any of the outgoing management targets, the incoming
+ SNMP version is SNMPv2 or SNMPv3, and the outgoing SNMP
+ version is SNMPv1, this outgoing management target is not used
+ when generating the forwarded notifications.
+
+(4) If the original received notification contains an SNMPv2-Trap PDU,
+ processing of the notification is now completed. Otherwise, the
+ original received notification must contain an Inform PDU, and
+ processing continues.
+
+(5) If the forwarded notifications included any Inform PDUs, processing
+ continues when the procedures described in the section for
+ Notification Originators determine that either:
+
+ - None of the generated notifications containing Inform PDUs
+ have been successfully acknowledged within the longest of the
+ time intervals, in which case processing of the original
+ notification is halted, or,
+
+ - At least one of the generated notifications containing Inform
+ PDUs is successfully acknowledged, in which case a response to
+ the original received notification containing an Inform PDU is
+ generated as described in the following steps.
+
+(6) A Response PDU is constructed, using the values of request-id and
+ variable-bindings from the original received Inform PDU, and
+ error-status and error-index values of 0.
+
+(7) The Dispatcher is called using the returnResponsePdu abstract
+ service interface. Parameters are:
+
+ - The messageProcessingModel is the originally received value.
+
+ - The securityModel is the originally received value.
+
+ - The securityName is the originally received value.
+
+ - The securityLevel is the originally received value.
+
+
+
+Levi, et. al. Standards Track [Page 26]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The contextEngineID is the originally received value.
+
+ - The contextName is the originally received value.
+
+ - The pduVersion indicates the version of the PDU constructed in
+ step (6) above.
+
+ - The PDU is the value constructed in step (6) above.
+
+ - The maxSizeResponseScopedPDU is a local value indicating the
+ maximum size of a ScopedPDU that the application can accept.
+
+ - The stateReference is the originally received value.
+
+ - The statusInformation indicates that no error occurred and
+ that a Response PDU message should be generated.
+
+4. The Structure of the MIB Modules
+
+ There are three separate MIB modules described in this document, the
+ management target MIB, the notification MIB, and the proxy MIB. The
+ following sections describe the structure of these three MIB modules.
+
+ The use of these MIBs by particular types of applications is
+ described later in this document:
+
+ - The use of the management target MIB and the notification MIB
+ in notification originator applications is described in
+ section 6.
+
+ - The use of the notification MIB for filtering notifications in
+ notification originator applications is described in section
+ 7.
+
+ - The use of the management target MIB and the proxy MIB in
+ proxy forwarding applications is described in section 8.
+
+4.1. The Management Target MIB Module
+
+ The SNMP-TARGET-MIB module contains objects for defining management
+ targets. It consists of two tables and conformance/compliance
+ statements.
+
+ The first table, the snmpTargetAddrTable, contains information about
+ transport domains and addresses. It also contains an object,
+ snmpTargetAddrTagList, which provides a mechanism for grouping
+ entries.
+
+
+
+
+Levi, et. al. Standards Track [Page 27]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ The second table, the snmpTargetParamsTable, contains information
+ about SNMP version and security information to be used when sending
+ messages to particular transport domains and addresses.
+
+4.1.1. Tag Lists
+
+ The snmpTargetAddrTagList object is used for grouping entries in the
+ snmpTargetAddrTable. The value of this object contains a list of tag
+ values which are used to select target addresses to be used for a
+ particular operation.
+
+ A tag value, which may also be used in MIB objects other than
+ snmpTargetAddrTagList, is an arbitrary string of octets, but may not
+ contain a delimiter character. Delimiter characters are defined to
+ be one of the following characters:
+
+ - An ASCII space character (0x20).
+
+ - An ASCII TAB character (0x09).
+
+ - An ASCII carriage return (CR) character (0x0D).
+
+ - An ASCII line feed (LF) character (0x0B).
+
+ In addition, a tag value may not have a zero length. Generally, a
+ particular MIB object may contain either
+
+ - a single tag value, in which case the value of the MIB object
+ may not contain a delimiter character, or:
+
+ - a MIB object may contain a list of tag values, separated by
+ single delimiter characters.
+
+ For a list of tag values, these constraints imply certain
+ restrictions on the value of a MIB object:
+
+ - There cannot be a leading or trailing delimiter character.
+
+ - There cannot be multiple adjacent delimiter charaters.
+
+4.1.2. Definitions
+
+ SNMP-TARGET-MIB DEFINITIONS ::= BEGIN
+
+ IMPORTS
+ TEXTUAL-CONVENTION,
+ MODULE-IDENTITY,
+ OBJECT-TYPE,
+
+
+
+Levi, et. al. Standards Track [Page 28]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ snmpModules,
+ Integer32
+ FROM SNMPv2-SMI
+
+ TDomain,
+ TAddress,
+ TimeInterval,
+ RowStatus,
+ StorageType,
+ TestAndIncr
+ FROM SNMPv2-TC
+ SnmpSecurityModel,
+ SnmpMessageProcessingModel,
+ SnmpSecurityLevel,
+ SnmpAdminString
+ FROM SNMP-FRAMEWORK-MIB
+
+ OBJECT-GROUP
+ FROM SNMPv2-CONF;
+
+ snmpTargetMIB MODULE-IDENTITY
+ LAST-UPDATED "9711210000Z"
+ ORGANIZATION "IETF SNMPv3 Working Group"
+ CONTACT-INFO
+ "WG-email: snmpv3@tis.com
+ Subscribe: majordomo@tis.com
+ In message body: subscribe snmpv3
+
+ Chair: Russ Mundy
+ Trusted Information Systems
+ Postal: 3060 Washington Rd
+ Glenwood MD 21738
+ USA
+ Email: mundy@tis.com
+ Phone: +1-301-854-6889
+
+ Co-editor: David B. Levi
+ SNMP Research, Inc.
+ Postal: 3001 Kimberlin Heights Road
+ Knoxville, TN 37920-9716
+ E-mail: levi@snmp.com
+ Phone: +1 423 573 1434
+
+ Co-editor: Paul Meyer
+ Secure Computing Corporation
+ Postal: 2675 Long Lake Road
+ Roseville, MN 55113
+ E-mail: paul_meyer@securecomputing.com
+
+
+
+Levi, et. al. Standards Track [Page 29]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ Phone: +1 612 628 1592
+
+ Co-editor: Bob Stewart
+ Cisco Systems, Inc.
+ Postal: 170 West Tasman Drive
+ San Jose, CA 95134-1706
+ E-mail: bstewart@cisco.com
+ Phone: +1 603 654 6923"
+ DESCRIPTION
+ "This MIB module defines MIB objects which provide
+ mechanisms to remotely configure the parameters used
+ by an SNMP entity for the generation of SNMP messages."
+ REVISION "9707140000Z"
+ DESCRIPTION
+ "The initial revision."
+ ::= { snmpModules 12 }
+
+ snmpTargetObjects OBJECT IDENTIFIER ::= { snmpTargetMIB 1 }
+ snmpTargetConformance OBJECT IDENTIFIER ::= { snmpTargetMIB 3 }
+
+ SnmpTagValue ::= TEXTUAL-CONVENTION
+ DISPLAY-HINT "255a"
+ STATUS current
+ DESCRIPTION
+ "An octet string containing a tag value.
+ Tag values are preferably in human-readable form.
+
+ To facilitate internationalization, this information
+ is represented using the ISO/IEC IS 10646-1 character
+ set, encoded as an octet string using the UTF-8
+ character encoding scheme described in RFC 2044.
+
+ Since additional code points are added by amendments
+ to the 10646 standard from time to time,
+ implementations must be prepared to encounter any code
+ point from 0x00000000 to 0x7fffffff.
+
+ The use of control codes should be avoided, and certain
+ control codes are not allowed as described below.
+
+ For code points not directly supported by user
+ interface hardware or software, an alternative means
+ of entry and display, such as hexadecimal, may be
+ provided.
+
+ For information encoded in 7-bit US-ASCII, the UTF-8
+ representation is identical to the US-ASCII encoding.
+
+
+
+
+Levi, et. al. Standards Track [Page 30]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ Note that when this TC is used for an object that
+ is used or envisioned to be used as an index, then a
+ SIZE restriction must be specified so that the number
+ sub-identifiers for any object instance do not exceed
+ the limit of 128, as defined by [RFC1905].
+
+ An object of this type contains a single tag value
+ which is used to select a set of entries in a table.
+ A tag value is an arbitrary string of octets, but
+ may not contain a delimiter character. Delimiter
+ characters are defined to be one of the following:
+
+ - An ASCII space character (0x20).
+
+ - An ASCII TAB character (0x09).
+
+ - An ASCII carriage return (CR) character (0x0D).
+
+ - An ASCII line feed (LF) character (0x0B).
+
+ Delimiter characters are used to separate tag values
+ in a tag list. An object of this type may only
+ contain a single tag value, and so delimiter
+ characters are not allowed in a value of this type.
+
+ Some examples of valid tag values are:
+
+ - 'acme'
+
+ - 'router'
+
+ - 'host'
+
+ The use of a tag value to select table entries is
+ application and MIB specific."
+ SYNTAX OCTET STRING (SIZE (0..255))
+
+ SnmpTagList ::= TEXTUAL-CONVENTION
+ DISPLAY-HINT "255a"
+ STATUS current
+ DESCRIPTION
+ "An octet string containing a list of tag values.
+ Tag values are preferably in human-readable form.
+
+ To facilitate internationalization, this information
+ is represented using the ISO/IEC IS 10646-1 character
+ set, encoded as an octet string using the UTF-8
+ character encoding scheme described in RFC 2044.
+
+
+
+Levi, et. al. Standards Track [Page 31]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ Since additional code points are added by amendments
+ to the 10646 standard from time to time,
+ implementations must be prepared to encounter any code
+ point from 0x00000000 to 0x7fffffff.
+
+ The use of control codes should be avoided, except as
+ described below.
+
+ For code points not directly supported by user
+ interface hardware or software, an alternative means
+ of entry and display, such as hexadecimal, may be
+ provided.
+
+ For information encoded in 7-bit US-ASCII, the UTF-8
+ representation is identical to the US-ASCII encoding.
+
+ An object of this type contains a list of tag values
+ which are used to select a set of entries in a table.
+
+ A tag value is an arbitrary string of octets, but
+ may not contain a delimiter character. Delimiter
+ characters are defined to be one of the following:
+
+ - An ASCII space character (0x20).
+
+ - An ASCII TAB character (0x09).
+
+ - An ASCII carriage return (CR) character (0x0D).
+
+ - An ASCII line feed (LF) character (0x0B).
+
+ Delimiter characters are used to separate tag values
+ in a tag list. Only a single delimiter character may
+ occur between two tag values. A tag value may not
+ have a zero length. These constraints imply certain
+ restrictions on the contents of this object:
+
+ - There cannot be a leading or trailing delimiter
+ character.
+
+ - There cannot be multiple adjacent delimiter
+ characters.
+
+ Some examples of valid tag lists are:
+
+ - An empty string
+
+ - 'acme router'
+
+
+
+Levi, et. al. Standards Track [Page 32]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - 'host managerStation'
+
+ Note that although a tag value may not have a length of
+ zero, an empty string is still valid. This indicates
+ an empty list (i.e. there are no tag values in the list).
+
+ The use of the tag list to select table entries is
+ application and MIB specific. Typically, an application
+ will provide one or more tag values, and any entry
+ which contains some combination of these tag values
+ will be selected."
+ SYNTAX OCTET STRING (SIZE (0..255))
+
+ --
+ --
+ -- The snmpTargetObjects group
+ --
+ --
+
+ snmpTargetSpinLock OBJECT-TYPE
+ SYNTAX TestAndIncr
+ MAX-ACCESS read-write
+ STATUS current
+ DESCRIPTION
+ "This object is used to facilitate modification of table
+ entries in the SNMP-TARGET-MIB module by multiple
+ managers. In particular, it is useful when modifying
+ the value of the snmpTargetAddrTagList object.
+
+ The procedure for modifying the snmpTargetAddrTagList
+ object is as follows:
+
+ 1. Retrieve the value of snmpTargetSpinLock and
+ of snmpTargetAddrTagList.
+
+ 2. Generate a new value for snmpTargetAddrTagList.
+
+ 3. Set the value of snmpTargetSpinLock to the
+ retrieved value, and the value of
+ snmpTargetAddrTagList to the new value. If
+ the set fails for the snmpTargetSpinLock
+ object, go back to step 1."
+ ::= { snmpTargetObjects 1 }
+
+ snmpTargetAddrTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SnmpTargetAddrEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+
+
+
+Levi, et. al. Standards Track [Page 33]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ DESCRIPTION
+ "A table of transport addresses to be used in the generation
+ of SNMP messages."
+
+ ::= { snmpTargetObjects 2 }
+
+ snmpTargetAddrEntry OBJECT-TYPE
+ SYNTAX SnmpTargetAddrEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A transport address to be used in the generation
+ of SNMP operations.
+
+ Entries in the snmpTargetAddrTable are created and
+ deleted using the snmpTargetAddrRowStatus object."
+ INDEX { IMPLIED snmpTargetAddrName }
+ ::= { snmpTargetAddrTable 1 }
+
+ SnmpTargetAddrEntry ::= SEQUENCE {
+ snmpTargetAddrName SnmpAdminString,
+ snmpTargetAddrTDomain TDomain,
+ snmpTargetAddrTAddress TAddress,
+ snmpTargetAddrTimeout TimeInterval,
+ snmpTargetAddrRetryCount Integer32,
+ snmpTargetAddrTagList SnmpTagList,
+ snmpTargetAddrParams SnmpAdminString,
+ snmpTargetAddrStorageType StorageType,
+ snmpTargetAddrRowStatus RowStatus
+ }
+
+ snmpTargetAddrName OBJECT-TYPE
+ SYNTAX SnmpAdminString (SIZE(1..32))
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The locally arbitrary, but unique identifier associated
+ with this snmpTargetAddrEntry."
+ ::= { snmpTargetAddrEntry 1 }
+
+ snmpTargetAddrTDomain OBJECT-TYPE
+ SYNTAX TDomain
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object indicates the transport type of the address
+ contained in the snmpTargetAddrTAddress object."
+ ::= { snmpTargetAddrEntry 2 }
+
+
+
+Levi, et. al. Standards Track [Page 34]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ snmpTargetAddrTAddress OBJECT-TYPE
+ SYNTAX TAddress
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object contains a transport address. The format of
+ this address depends on the value of the
+ snmpTargetAddrTDomain object."
+ ::= { snmpTargetAddrEntry 3 }
+
+ snmpTargetAddrTimeout OBJECT-TYPE
+ SYNTAX TimeInterval
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object should reflect the expected maximum round
+ trip time for communicating with the transport address
+ defined by this row. When a message is sent to this
+ address, and a response (if one is expected) is not
+ received within this time period, an implementation
+ may assume that the response will not be delivered.
+
+ Note that the time interval that an application waits
+ for a response may actually be derived from the value
+ of this object. The method for deriving the actual time
+ interval is implementation dependent. One such method
+ is to derive the expected round trip time based on a
+ particular retransmission algorithm and on the number
+ of timeouts which have occurred. The type of message may
+ also be considered when deriving expected round trip
+ times for retransmissions. For example, if a message is
+ being sent with a securityLevel that indicates both
+ authentication and privacy, the derived value may be
+ increased to compensate for extra processing time spent
+ during authentication and encryption processing."
+ DEFVAL { 1500 }
+ ::= { snmpTargetAddrEntry 4 }
+
+ snmpTargetAddrRetryCount OBJECT-TYPE
+ SYNTAX Integer32 (0..255)
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object specifies a default number of retries to be
+ attempted when a response is not received for a generated
+ message. An application may provide its own retry count,
+ in which case the value of this object is ignored."
+ DEFVAL { 3 }
+
+
+
+Levi, et. al. Standards Track [Page 35]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ ::= { snmpTargetAddrEntry 5 }
+
+ snmpTargetAddrTagList OBJECT-TYPE
+ SYNTAX SnmpTagList
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object contains a list of tag values which are
+ used to select target addresses for a particular
+ operation."
+ ::= { snmpTargetAddrEntry 6 }
+
+ snmpTargetAddrParams OBJECT-TYPE
+ SYNTAX SnmpAdminString (SIZE(1..32))
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The value of this object identifies an entry in the
+ snmpTargetParamsTable. The identified entry
+ contains SNMP parameters to be used when generating
+ messages to be sent to this transport address."
+ ::= { snmpTargetAddrEntry 7 }
+
+ snmpTargetAddrStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for this conceptual row."
+ ::= { snmpTargetAddrEntry 8 }
+
+ snmpTargetAddrRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The status of this conceptual row.
+
+ To create a row in this table, a manager must
+ set this object to either createAndGo(4) or
+ createAndWait(5).
+
+ Until instances of all corresponding columns are
+ appropriately configured, the value of the
+ corresponding instance of the snmpTargetAddrRowStatus
+ column is 'notReady'.
+
+ In particular, a newly created row cannot be made
+
+
+
+Levi, et. al. Standards Track [Page 36]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ active until the corresponding snmpTargetAddrTDomain
+ and snmpTargetAddrTAddress have both been set.
+
+ The following objects may not be modified while the
+ value of this object is active(1):
+ - snmpTargetAddrTDomain
+ - snmpTargetAddrTAddress"
+ ::= { snmpTargetAddrEntry 9 }
+
+ snmpTargetParamsTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SnmpTargetParamsEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A table of SNMP target information to be used
+ in the generation of SNMP messages."
+ ::= { snmpTargetObjects 3 }
+
+ snmpTargetParamsEntry OBJECT-TYPE
+ SYNTAX SnmpTargetParamsEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A set of SNMP target information.
+
+ Entries in the snmpTargetParamsTable are created and
+ deleted using the snmpTargetParamsRowStatus object."
+ INDEX { IMPLIED snmpTargetParamsName }
+ ::= { snmpTargetParamsTable 1 }
+
+ SnmpTargetParamsEntry ::= SEQUENCE {
+ snmpTargetParamsName SnmpAdminString,
+ snmpTargetParamsMPModel SnmpMessageProcessingModel,
+ snmpTargetParamsSecurityModel SnmpSecurityModel,
+ snmpTargetParamsSecurityName SnmpAdminString,
+ snmpTargetParamsSecurityLevel SnmpSecurityLevel,
+ snmpTargetParamsStorageType StorageType,
+ snmpTargetParamsRowStatus RowStatus
+ }
+
+ snmpTargetParamsName OBJECT-TYPE
+ SYNTAX SnmpAdminString (SIZE(1..32))
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The locally arbitrary, but unique identifier associated
+ with this snmpTargetParamsEntry."
+ ::= { snmpTargetParamsEntry 1 }
+
+
+
+Levi, et. al. Standards Track [Page 37]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ snmpTargetParamsMPModel OBJECT-TYPE
+ SYNTAX SnmpMessageProcessingModel
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The Message Processing Model to be used when generating
+ SNMP messages using this entry."
+ ::= { snmpTargetParamsEntry 2 }
+
+ snmpTargetParamsSecurityModel OBJECT-TYPE
+ SYNTAX SnmpSecurityModel (0..254 | 256..2147483647)
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The Security Model to be used when generating SNMP
+ messages using this entry."
+ ::= { snmpTargetParamsEntry 3 }
+
+ snmpTargetParamsSecurityName OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The securityName which identifies the Principal on
+ whose behalf SNMP messages will be generated using
+ this entry."
+ ::= { snmpTargetParamsEntry 4 }
+
+ snmpTargetParamsSecurityLevel OBJECT-TYPE
+ SYNTAX SnmpSecurityLevel
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The Level of Security to be used when generating
+ SNMP messages using this entry."
+ ::= { snmpTargetParamsEntry 5 }
+
+ snmpTargetParamsStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for this conceptual row."
+ ::= { snmpTargetParamsEntry 6 }
+
+ snmpTargetParamsRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+
+
+
+Levi, et. al. Standards Track [Page 38]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ STATUS current
+ DESCRIPTION
+ "The status of this conceptual row.
+
+ To create a row in this table, a manager must
+ set this object to either createAndGo(4) or
+ createAndWait(5).
+
+ Until instances of all corresponding columns are
+ appropriately configured, the value of the
+ corresponding instance of the snmpTargetParamsRowStatus
+ column is 'notReady'.
+
+ In particular, a newly created row cannot be made
+ active until the corresponding
+ snmpTargetParamsMPModel,
+ snmpTargetParamsSecurityModel,
+ snmpTargetParamsSecurityName,
+ and snmpTargetParamsSecurityLevel have all been set.
+
+ The following objects may not be modified while the
+ value of this object is active(1):
+ - snmpTargetParamsMPModel
+ - snmpTargetParamsSecurityModel
+ - snmpTargetParamsSecurityName
+ - snmpTargetParamsSecurityLevel"
+ ::= { snmpTargetParamsEntry 7 }
+
+ snmpUnavailableContexts OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The total number of packets received by the SNMP
+ engine which were dropped because the context
+ contained in the mesage was unavailable."
+ ::= { snmpTargetObjects 4 }
+
+ snmpUnknownContexts OBJECT-TYPE
+ SYNTAX Counter32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The total number of packets received by the SNMP
+ engine which were dropped because the context
+ contained in the mesage was unknown."
+
+ ::= { snmpTargetObjects 5 }
+
+
+
+Levi, et. al. Standards Track [Page 39]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ --
+ --
+ -- Conformance information
+ --
+ --
+
+ snmpTargetCompliances OBJECT IDENTIFIER ::=
+ { snmpTargetConformance 1 }
+ snmpTargetGroups OBJECT IDENTIFIER ::=
+ { snmpTargetConformance 2 }
+
+ --
+ --
+ -- Compliance statements
+ --
+ --
+
+
+ snmpTargetCommandResponderCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for SNMP entities which include
+ a command responder application."
+ MODULE -- This Module
+ MANDATORY-GROUPS { snmpTargetCommandResponderGroup }
+ ::= { snmpTargetCompliances 1 }
+
+ snmpTargetBasicGroup OBJECT-GROUP
+ OBJECTS {
+ snmpTargetSpinLock,
+ snmpTargetAddrTDomain,
+ snmpTargetAddrTAddress,
+ snmpTargetAddrTagList,
+ snmpTargetAddrParams,
+ snmpTargetAddrStorageType,
+ snmpTargetAddrRowStatus,
+ snmpTargetParamsMPModel,
+ snmpTargetParamsSecurityModel,
+ snmpTargetParamsSecurityName,
+ snmpTargetParamsSecurityLevel,
+ snmpTargetParamsStorageType,
+ snmpTargetParamsRowStatus
+ }
+ STATUS current
+ DESCRIPTION
+
+ "A collection of objects providing basic remote
+ configuration of management targets."
+
+
+
+Levi, et. al. Standards Track [Page 40]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ ::= { snmpTargetGroups 1 }
+
+ snmpTargetResponseGroup OBJECT-GROUP
+ OBJECTS {
+ snmpTargetAddrTimeout,
+ snmpTargetAddrRetryCount
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing remote configuration
+ of management targets for applications which generate
+ SNMP messages for which a response message would be
+ expected."
+ ::= { snmpTargetGroups 2 }
+
+ snmpTargetCommandResponderGroup OBJECT-GROUP
+ OBJECTS {
+ snmpUnavailableContexts,
+ snmpUnknownContexts
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects required for command responder
+ applications, used for counting error conditions."
+ ::= { snmpTargetGroups 3 }
+
+ END
+
+4.2. The Notification MIB Module
+
+ The SNMP-NOTIFICATION-MIB module contains objects for the remote
+ configuration of the parameters used by an SNMP entity for the
+ generation of notifications. It consists of three tables and
+ conformance/compliance statements. The first table, the
+ snmpNotifyTable, contains entries which select which entries in the
+ snmpTargetAddrTable should be used for generating notifications, and
+ the type of notifications to be generated.
+
+ The second table sparsely augments the snmpTargetAddrTable with an
+ object which is used to associate a set of filters with a particular
+ management target.
+
+ The third table defines filters which are used to limit the number of
+ notifications which are generated using particular management
+ targets.
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 41]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+4.2.1. Definitions
+
+ SNMP-NOTIFICATION-MIB DEFINITIONS ::= BEGIN
+
+ IMPORTS
+ MODULE-IDENTITY,
+ OBJECT-TYPE,
+ snmpModules
+ FROM SNMPv2-SMI
+
+ RowStatus,
+ StorageType
+ FROM SNMPv2-TC
+
+ SnmpAdminString
+ FROM SNMP-FRAMEWORK-MIB
+
+ SnmpTagValue,
+ snmpTargetParamsName
+ FROM SNMP-TARGET-MIB
+
+ MODULE-COMPLIANCE,
+ OBJECT-GROUP
+ FROM SNMPv2-CONF;
+
+ snmpNotificationMIB MODULE-IDENTITY
+ LAST-UPDATED "9711210000Z"
+ ORGANIZATION "IETF SNMPv3 Working Group"
+ CONTACT-INFO
+ "WG-email: snmpv3@tis.com
+ Subscribe: majordomo@tis.com
+ In message body: subscribe snmpv3
+
+ Chair: Russ Mundy
+ Trusted Information Systems
+ Postal: 3060 Washington Rd
+ Glenwood MD 21738
+ USA
+ Email: mundy@tis.com
+ Phone: +1-301-854-6889
+
+ Co-editor: David B. Levi
+ SNMP Research, Inc.
+ Postal: 3001 Kimberlin Heights Road
+ Knoxville, TN 37920-9716
+ E-mail: levi@snmp.com
+ Phone: +1 423 573 1434
+
+
+
+
+Levi, et. al. Standards Track [Page 42]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ Co-editor: Paul Meyer
+ Secure Computing Corporation
+ Postal: 2675 Long Lake Road
+ Roseville, MN 55113
+ E-mail: paul_meyer@securecomputing.com
+ Phone: +1 612 628 1592
+
+ Co-editor: Bob Stewart
+ Cisco Systems, Inc.
+ Postal: 170 West Tasman Drive
+ San Jose, CA 95134-1706
+ E-mail: bstewart@cisco.com
+ Phone: +1 603 654 6923"
+ DESCRIPTION
+ "This MIB module defines MIB objects which provide
+ mechanisms to remotely configure the parameters
+ used by an SNMP entity for the generation of
+ notifications."
+ REVISION "9707140000Z"
+ DESCRIPTION
+ "The initial revision."
+ ::= { snmpModules 13 }
+
+ snmpNotifyObjects OBJECT IDENTIFIER ::=
+ { snmpNotificationMIB 1 }
+ snmpNotifyConformance OBJECT IDENTIFIER ::=
+ { snmpNotificationMIB 3 }
+
+
+ --
+ --
+ -- The snmpNotifyObjects group
+ --
+ --
+
+ snmpNotifyTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SnmpNotifyEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "This table is used to select management targets which should
+ receive notifications, as well as the type of notification
+ which should be sent to each selected management target."
+ ::= { snmpNotifyObjects 1 }
+
+ snmpNotifyEntry OBJECT-TYPE
+ SYNTAX SnmpNotifyEntry
+ MAX-ACCESS not-accessible
+
+
+
+Levi, et. al. Standards Track [Page 43]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ STATUS current
+ DESCRIPTION
+ "An entry in this table selects a set of management targets
+ which should receive notifications, as well as the type of
+ notification which should be sent to each selected
+ management target.
+
+ Entries in the snmpNotifyTable are created and
+ deleted using the snmpNotifyRowStatus object."
+ INDEX { IMPLIED snmpNotifyName }
+ ::= { snmpNotifyTable 1 }
+
+ SnmpNotifyEntry ::= SEQUENCE {
+ snmpNotifyName SnmpAdminString,
+ snmpNotifyTag SnmpTagValue,
+ snmpNotifyType INTEGER,
+ snmpNotifyStorageType StorageType,
+ snmpNotifyRowStatus RowStatus
+ }
+
+ snmpNotifyName OBJECT-TYPE
+ SYNTAX SnmpAdminString (SIZE(1..32))
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The locally arbitrary, but unique identifier associated
+ with this snmpNotifyEntry."
+ ::= { snmpNotifyEntry 1 }
+
+ snmpNotifyTag OBJECT-TYPE
+ SYNTAX SnmpTagValue
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object contains a single tag value which is used
+ to select entries in the snmpTargetAddrTable. Any entry
+ in the snmpTargetAddrTable which contains a tag value
+ which is equal to the value of an instance of this
+ object is selected. If this object contains a value
+ of zero length, no entries are selected."
+ ::= { snmpNotifyEntry 2 }
+
+ snmpNotifyType OBJECT-TYPE
+ SYNTAX INTEGER {
+ trap(1),
+ inform(2)
+ }
+ MAX-ACCESS read-create
+
+
+
+Levi, et. al. Standards Track [Page 44]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ STATUS current
+ DESCRIPTION
+ "This object determines the type of notification to
+ be generated for entries in the snmpTargetAddrTable
+ selected by the corresponding instance of
+ snmpNotifyTag.
+
+ If the value of this object is trap(1), then any
+ messages generated for selected rows will contain
+ SNMPv2-Trap PDUs.
+
+ If the value of this object is inform(2), then any
+ messages generated for selected rows will contain
+ Inform PDUs.
+
+ Note that if an SNMP entity only supports
+ generation of traps (and not informs), then this
+ object may be read-only."
+ DEFVAL { trap }
+ ::= { snmpNotifyEntry 3 }
+
+ snmpNotifyStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for this conceptual row."
+ ::= { snmpNotifyEntry 4 }
+
+ snmpNotifyRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The status of this conceptual row.
+
+ To create a row in this table, a manager must
+ set this object to either createAndGo(4) or
+ createAndWait(5).
+
+ Until instances of all corresponding columns are
+ appropriately configured, the value of the
+ corresponding instance of the snmpNotifyRowStatus
+ column is 'notReady'.
+
+ In particular, a newly created row cannot be made
+ active until the corresponding snmpNotifyTag has
+ been set."
+
+
+
+Levi, et. al. Standards Track [Page 45]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ ::= { snmpNotifyEntry 5 }
+
+ snmpNotifyFilterProfileTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SnmpNotifyFilterProfileEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "This table is used to associate a notification filter
+ profile with a particular set of target parameters."
+ ::= { snmpNotifyObjects 2 }
+
+ snmpNotifyFilterProfileEntry OBJECT-TYPE
+ SYNTAX SnmpNotifyFilterProfileEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry in this table indicates the name of the filter
+ profile to be used when generating notifications using
+ the corresponding entry in the snmpTargetParamsTable.
+
+ Entries in the snmpNotifyFilterProfileTable are created
+ and deleted using the snmpNotifyFilterProfileRowStatus
+ object."
+ INDEX { IMPLIED snmpTargetParamsName }
+ ::= { snmpNotifyFilterProfileTable 1 }
+
+ SnmpNotifyFilterProfileEntry ::= SEQUENCE {
+ snmpNotifyFilterProfileName SnmpAdminString,
+ snmpNotifyFilterProfileStorType StorageType,
+ snmpNotifyFilterProfileRowStatus RowStatus
+ }
+
+ snmpNotifyFilterProfileName OBJECT-TYPE
+ SYNTAX SnmpAdminString (SIZE(1..32))
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The name of the filter profile to be used when generating
+ notifications using the corresponding entry in the
+ snmpTargetAddrTable."
+ ::= { snmpNotifyFilterProfileEntry 1 }
+
+ snmpNotifyFilterProfileStorType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type of this conceptual row."
+
+
+
+Levi, et. al. Standards Track [Page 46]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ ::= { snmpNotifyFilterProfileEntry 2 }
+
+ snmpNotifyFilterProfileRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The status of this conceptual row.
+
+ To create a row in this table, a manager must
+ set this object to either createAndGo(4) or
+ createAndWait(5)."
+ ::= { snmpNotifyFilterProfileEntry 3 }
+
+ snmpNotifyFilterTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SnmpNotifyFilterEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The table of filter profiles. Filter profiles are used
+ to determine whether particular management targets should
+ receive particular notifications.
+
+ When a notification is generated, it must be compared
+ with the filters associated with each management target
+ which is configured to receive notifications. If the
+ notification is matched by a filter, it is not sent to
+ the management target with which the filter is
+ associated."
+ ::= { snmpNotifyObjects 3 }
+
+ snmpNotifyFilterEntry OBJECT-TYPE
+ SYNTAX SnmpNotifyFilterEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An element of a filter profile.
+
+ Entries in the snmpNotifyFilterTable are created and
+ deleted using the snmpNotifyFilterRowStatus object."
+ INDEX { snmpNotifyFilterProfileName,
+ IMPLIED snmpNotifyFilterSubtree }
+ ::= { snmpNotifyFilterTable 1 }
+
+ SnmpNotifyFilterEntry ::= SEQUENCE {
+ snmpNotifyFilterSubtree OBJECT IDENTIFIER,
+ snmpNotifyFilterMask OCTET STRING,
+ snmpNotifyFilterType INTEGER,
+
+
+
+Levi, et. al. Standards Track [Page 47]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ snmpNotifyFilterStorageType StorageType,
+ snmpNotifyFilterRowStatus RowStatus
+ }
+
+ snmpNotifyFilterSubtree OBJECT-TYPE
+ SYNTAX OBJECT IDENTIFIER
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The MIB subtree which, when combined with the corresponding
+ instance of snmpNotifyFilterMask, defines a family of
+ subtrees which are included in or excluded from the
+ filter profile."
+ ::= { snmpNotifyFilterEntry 1 }
+
+ snmpNotifyFilterMask OBJECT-TYPE
+ SYNTAX OCTET STRING (SIZE(0..16))
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The bit mask which, in combination with the corresponding
+ instance of snmpNotifyFilterSubtree, defines a family of
+ subtrees which are included in or excluded from the
+ filter profile.
+
+ Each bit of this bit mask corresponds to a
+ sub-identifier of snmpNotifyFilterSubtree, with the
+ most significant bit of the i-th octet of this octet
+ string value (extended if necessary, see below)
+ corresponding to the (8*i - 7)-th sub-identifier, and
+ the least significant bit of the i-th octet of this
+ octet string corresponding to the (8*i)-th
+ sub-identifier, where i is in the range 1 through 16.
+
+ Each bit of this bit mask specifies whether or not
+ the corresponding sub-identifiers must match when
+ determining if an OBJECT IDENTIFIER matches this
+ family of filter subtrees; a '1' indicates that an
+ exact match must occur; a '0' indicates 'wild card',
+ i.e., any sub-identifier value matches.
+
+ Thus, the OBJECT IDENTIFIER X of an object instance
+ is contained in a family of filter subtrees if, for
+ each sub-identifier of the value of
+ snmpNotifyFilterSubtree, either:
+
+ the i-th bit of snmpNotifyFilterMask is 0, or
+
+
+
+
+Levi, et. al. Standards Track [Page 48]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ the i-th sub-identifier of X is equal to the i-th
+ sub-identifier of the value of
+ snmpNotifyFilterSubtree.
+
+ If the value of this bit mask is M bits long and
+ there are more than M sub-identifiers in the
+ corresponding instance of snmpNotifyFilterSubtree,
+ then the bit mask is extended with 1's to be the
+ required length.
+
+ Note that when the value of this object is the
+ zero-length string, this extension rule results in
+ a mask of all-1's being used (i.e., no 'wild card'),
+ and the family of filter subtrees is the one
+ subtree uniquely identified by the corresponding
+ instance of snmpNotifyFilterSubtree."
+ DEFVAL { ''H }
+ ::= { snmpNotifyFilterEntry 2 }
+
+ snmpNotifyFilterType OBJECT-TYPE
+ SYNTAX INTEGER {
+ included(1),
+ excluded(2)
+ }
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object indicates whether the family of filter subtrees
+ defined by this entry are included in or excluded from a
+ filter."
+ DEFVAL { included }
+ ::= { snmpNotifyFilterEntry 3 }
+
+ snmpNotifyFilterStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type of this conceptual row."
+ ::= { snmpNotifyFilterEntry 4 }
+
+ snmpNotifyFilterRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The status of this conceptual row.
+
+
+
+
+Levi, et. al. Standards Track [Page 49]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ To create a row in this table, a manager must
+ set this object to either createAndGo(4) or
+ createAndWait(5)."
+ ::= { snmpNotifyFilterEntry 5 }
+
+ --
+ --
+ -- Conformance information
+ --
+ --
+
+ snmpNotifyCompliances OBJECT IDENTIFIER ::=
+ { snmpNotifyConformance 1 }
+ snmpNotifyGroups OBJECT IDENTIFIER ::=
+ { snmpNotifyConformance 2 }
+
+ --
+ --
+ -- Compliance statements
+ --
+ --
+
+ snmpNotifyBasicCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for minimal SNMP entities which
+ implement only SNMP Traps and read-create operations on
+ only the snmpTargetAddrTable."
+ MODULE SNMP-TARGET-MIB
+ MANDATORY-GROUPS { snmpTargetBasicGroup }
+
+ OBJECT snmpTargetParamsMPModel
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access is not required."
+
+ OBJECT snmpTargetParamsSecurityModel
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access is not required."
+
+ OBJECT snmpTargetParamsSecurityName
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access is not required."
+
+ OBJECT snmpTargetParamsSecurityLevel
+ MIN-ACCESS read-only
+
+
+
+Levi, et. al. Standards Track [Page 50]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ DESCRIPTION
+ "Create/delete/modify access is not required."
+
+ OBJECT snmpTargetParamsStorageType
+ SYNTAX INTEGER {
+ readOnly(5)
+ }
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access is not required.
+ Support of the values other(1), volatile(2),
+ nonVolatile(3), and permanent(4) is not required."
+
+ OBJECT snmpTargetParamsRowStatus
+ SYNTAX INTEGER {
+ active(1)
+ }
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access to the
+ snmpTargetParamsTable is not required.
+ Support of the values notInService(2), notReady(3),
+ createAndGo(4), createAndWait(5), and destroy(6) is
+ not required."
+
+ MODULE -- This Module
+ MANDATORY-GROUPS { snmpNotifyGroup }
+
+ OBJECT snmpNotifyTag
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access is not required."
+
+ OBJECT snmpNotifyType
+ SYNTAX INTEGER {
+ trap(1)
+ }
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access is not required.
+ Support of the value notify(2) is not required."
+
+ OBJECT snmpNotifyStorageType
+ SYNTAX INTEGER {
+ readOnly(5)
+ }
+ MIN-ACCESS read-only
+ DESCRIPTION
+
+
+
+Levi, et. al. Standards Track [Page 51]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ "Create/delete/modify access is not required.
+ Support of the values other(1), volatile(2),
+ nonVolatile(3), and permanent(4) is not required."
+
+ OBJECT snmpNotifyRowStatus
+ SYNTAX INTEGER {
+ active(1)
+ }
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Create/delete/modify access to the
+ snmpNotifyTable is not required.
+ Support of the values notInService(2), notReady(3),
+ createAndGo(4), createAndWait(5), and destroy(6) is
+ not required."
+
+ ::= { snmpNotifyCompliances 1 }
+
+ snmpNotifyBasicFiltersCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for SNMP entities which implement
+ SNMP Traps with filtering, and read-create operations on
+ all related tables."
+ MODULE SNMP-TARGET-MIB
+ MANDATORY-GROUPS { snmpTargetBasicGroup }
+ MODULE -- This Module
+ MANDATORY-GROUPS { snmpNotifyGroup,
+ snmpNotifyFilterGroup }
+ ::= { snmpNotifyCompliances 2 }
+
+ snmpNotifyFullCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for SNMP entities which either
+ implement only SNMP Informs, or both SNMP Traps and SNMP
+ Informs, plus filtering and read-create operations on
+ all related tables."
+ MODULE SNMP-TARGET-MIB
+ MANDATORY-GROUPS { snmpTargetBasicGroup,
+ snmpTargetResponseGroup }
+ MODULE -- This Module
+ MANDATORY-GROUPS { snmpNotifyGroup,
+ snmpNotifyFilterGroup }
+ ::= { snmpNotifyCompliances 3 }
+
+ snmpNotifyGroup OBJECT-GROUP
+ OBJECTS {
+
+
+
+Levi, et. al. Standards Track [Page 52]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ snmpNotifyTag,
+ snmpNotifyType,
+ snmpNotifyStorageType,
+ snmpNotifyRowStatus
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects for selecting which management
+ targets are used for generating notifications, and the
+ type of notification to be generated for each selected
+ management target."
+ ::= { snmpNotifyGroups 1 }
+
+ snmpNotifyFilterGroup OBJECT-GROUP
+ OBJECTS {
+ snmpNotifyFilterProfileName,
+ snmpNotifyFilterProfileStorType,
+ snmpNotifyFilterProfileRowStatus,
+ snmpNotifyFilterMask,
+ snmpNotifyFilterType,
+ snmpNotifyFilterStorageType,
+ snmpNotifyFilterRowStatus
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing remote configuration
+ of notification filters."
+ ::= { snmpNotifyGroups 2 }
+
+ END
+
+4.3. The Proxy MIB Module
+
+ The SNMP-PROXY-MIB module, which defines MIB objects that provide
+ mechanisms to remotely configure the parameters used by an SNMP
+ entity for proxy forwarding operations, contains a single table.
+ This table, snmpProxyTable, is used to define translations between
+ management targets for use when forwarding messages.
+
+4.3.1. Definitions
+
+ SNMP-PROXY-MIB DEFINITIONS ::= BEGIN
+
+ IMPORTS
+ MODULE-IDENTITY,
+ OBJECT-TYPE,
+ snmpModules
+ FROM SNMPv2-SMI
+
+
+
+Levi, et. al. Standards Track [Page 53]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ RowStatus,
+ StorageType
+ FROM SNMPv2-TC
+
+ SnmpEngineID,
+ SnmpAdminString
+ FROM SNMP-FRAMEWORK-MIB
+
+ SnmpTagValue,
+ FROM SNMP-TARGET-MIB
+
+ MODULE-COMPLIANCE,
+ OBJECT-GROUP
+ FROM SNMPv2-CONF;
+
+ snmpProxyMIB MODULE-IDENTITY
+ LAST-UPDATED "9711210000Z"
+ ORGANIZATION "IETF SNMPv3 Working Group"
+ CONTACT-INFO
+ "WG-email: snmpv3@tis.com
+ Subscribe: majordomo@tis.com
+ In message body: subscribe snmpv3
+
+ Chair: Russ Mundy
+ Trusted Information Systems
+ Postal: 3060 Washington Rd
+ Glenwood MD 21738
+ USA
+ Email: mundy@tis.com
+ Phone: +1-301-854-6889
+
+ Co-editor: David B. Levi
+ SNMP Research, Inc.
+ Postal: 3001 Kimberlin Heights Road
+ Knoxville, TN 37920-9716
+ E-mail: levi@snmp.com
+ Phone: +1 423 573 1434
+
+ Co-editor: Paul Meyer
+ Secure Computing Corporation
+ Postal: 2675 Long Lake Road
+ Roseville, MN 55113
+ E-mail: paul_meyer@securecomputing.com
+ Phone: +1 612 628 1592
+
+ Co-editor: Bob Stewart
+ Cisco Systems, Inc.
+ Postal: 170 West Tasman Drive
+
+
+
+Levi, et. al. Standards Track [Page 54]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ San Jose, CA 95134-1706
+ E-mail: bstewart@cisco.com
+ Phone: +1 603 654 6923"
+ DESCRIPTION
+ "This MIB module defines MIB objects which provide
+ mechanisms to remotely configure the parameters
+ used by a proxy forwarding application."
+ REVISION "9707140000Z"
+ DESCRIPTION
+ "The initial revision."
+ ::= { snmpModules 14 }
+
+ snmpProxyObjects OBJECT IDENTIFIER ::= { snmpProxyMIB 1 }
+ snmpProxyConformance OBJECT IDENTIFIER ::= { snmpProxyMIB 3 }
+
+ --
+ --
+ -- The snmpProxyObjects group
+ --
+ --
+
+ snmpProxyTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SnmpProxyEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The table of translation parameters used by proxy forwarder
+ applications for forwarding SNMP messages."
+ ::= { snmpProxyObjects 2 }
+
+ snmpProxyEntry OBJECT-TYPE
+ SYNTAX SnmpProxyEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A set of translation parameters used by a proxy forwarder
+ application for forwarding SNMP messages.
+
+ Entries in the snmpProxyTable are created and deleted
+ using the snmpProxyRowStatus object."
+ INDEX { IMPLIED snmpProxyName }
+ ::= { snmpProxyTable 1 }
+
+ SnmpProxyEntry ::= SEQUENCE {
+ snmpProxyName SnmpAdminString,
+ snmpProxyType INTEGER,
+ snmpProxyContextEngineID SnmpEngineID,
+ snmpProxyContextName SnmpAdminString,
+
+
+
+Levi, et. al. Standards Track [Page 55]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ snmpProxyTargetParamsIn SnmpAdminString,
+ snmpProxySingleTargetOut SnmpAdminString,
+ snmpProxyMultipleTargetOut SnmpTagValue,
+ snmpProxyStorageType StorageType,
+ snmpProxyRowStatus RowStatus
+ }
+
+ snmpProxyName OBJECT-TYPE
+ SYNTAX SnmpAdminString (SIZE(1..32))
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The locally arbitrary, but unique identifier associated
+ with this snmpProxyEntry."
+ ::= { snmpProxyEntry 1 }
+
+ snmpProxyType OBJECT-TYPE
+ SYNTAX INTEGER {
+ read(1),
+ write(2),
+ trap(3),
+ inform(4)
+ }
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The type of message that may be forwarded using
+ the translation parameters defined by this entry."
+ ::= { snmpProxyEntry 2 }
+
+ snmpProxyContextEngineID OBJECT-TYPE
+ SYNTAX SnmpEngineID
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The contextEngineID contained in messages that
+ may be forwarded using the translation parameters
+ defined by this entry."
+ ::= { snmpProxyEntry 3 }
+
+ snmpProxyContextName OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The contextName contained in messages that may be
+ forwarded using the translation parameters defined
+ by this entry.
+
+
+
+Levi, et. al. Standards Track [Page 56]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ This object is optional, and if not supported, the
+ contextName contained in a message is ignored when
+ selecting an entry in the snmpProxyTable."
+ ::= { snmpProxyEntry 4 }
+
+ snmpProxyTargetParamsIn OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object selects an entry in the snmpTargetParamsTable.
+ The selected entry is used to determine which row of the
+ snmpProxyTable to use for forwarding received messages."
+ ::= { snmpProxyEntry 5 }
+
+ snmpProxySingleTargetOut OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object selects a management target defined in the
+ snmpTargetAddrTable (in the SNMP-TARGET-MIB). The
+ selected target is defined by an entry in the
+ snmpTargetAddrTable whose index value (snmpTargetAddrName)
+ is equal to this object.
+
+ This object is only used when selection of a single
+ target is required (i.e. when forwarding an incoming
+ read or write request)."
+ ::= { snmpProxyEntry 6 }
+
+ snmpProxyMultipleTargetOut OBJECT-TYPE
+ SYNTAX SnmpTagValue
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object selects a set of management targets defined
+ in the snmpTargetAddrTable (in the SNMP-TARGET-MIB).
+
+ This object is only used when selection of multiple
+ targets is required (i.e. when forwarding an incoming
+ notification)."
+ ::= { snmpProxyEntry 7 }
+
+ snmpProxyStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+
+
+
+Levi, et. al. Standards Track [Page 57]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ DESCRIPTION
+ "The storage type of this conceptual row."
+ ::= { snmpProxyEntry 8 }
+
+ snmpProxyRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The status of this conceptual row.
+
+ To create a row in this table, a manager must
+ set this object to either createAndGo(4) or
+ createAndWait(5).
+
+ The following objects may not be modified while the
+ value of this object is active(1):
+ - snmpProxyType
+ - snmpProxyContextEngineID
+ - snmpProxyContextName
+ - snmpProxyTargetParamsIn
+ - snmpProxySingleTargetOut
+ - snmpProxyMultipleTargetOut"
+
+ ::= { snmpProxyEntry 9 }
+
+ --
+ --
+ -- Conformance information
+ --
+ --
+
+ snmpProxyCompliances OBJECT IDENTIFIER ::=
+ { snmpProxyConformance 1 }
+ snmpProxyGroups OBJECT IDENTIFIER ::=
+ { snmpProxyConformance 2 }
+
+ --
+ --
+ -- Compliance statements
+ --
+ --
+
+ snmpProxyCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for SNMP entities which include
+ a proxy forwarding application."
+
+
+
+Levi, et. al. Standards Track [Page 58]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ MODULE SNMP-TARGET-MIB
+ MANDATORY-GROUPS { snmpTargetBasicGroup,
+ snmpTargetResponseGroup }
+ MODULE -- This Module
+ MANDATORY-GROUPS { snmpProxyGroup }
+ ::= { snmpProxyCompliances 1 }
+
+ snmpProxyGroup OBJECT-GROUP
+ OBJECTS {
+ snmpProxyType,
+ snmpProxyContextEngineID,
+ snmpProxyContextName,
+ snmpProxyTargetParamsIn,
+ snmpProxySingleTargetOut,
+ snmpProxyMultipleTargetOut,
+ snmpProxyStorageType,
+ snmpProxyRowStatus
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing remote configuration of
+ management target translation parameters for use by
+ proxy forwarder applications."
+
+ ::= { snmpProxyGroups 3 }
+
+ END
+
+5. Identification of Management Targets in Notification Originators
+
+ This section describes the mechanisms used by a notification
+ originator application when using the MIB module described in this
+ document to determine the set of management targets to be used when
+ generating a notification.
+
+ A notification originator uses the snmpNotifyTable to find the
+ management targets to be used for generating notifications. Each
+ active entry in this table identifies zero or more entries in the
+ snmpTargetAddrTable. Any entry in the snmpTargetAddrTable whose
+ snmpTargetAddrTagList object contains a tag value which is equal to a
+ value of snmpNotifyTag is selected by the snmpNotifyEntry which
+ contains that instance of snmpNotifyTag. Note that a particular
+ snmpTargetAddrEntry may be selected by multiple entries in the
+ snmpNotifyTable, resulting in multiple notifications being generated
+ using that snmpTargetAddrEntry.
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 59]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ Each snmpTargetAddrEntry contains a pointer to the
+ snmpTargetParamsTable (snmpTargetAddrParams). This pointer selects a
+ set of SNMP parameters to be used for generating notifications. If
+ the selected entry in the snmpTargetParamsTable does not exist, the
+ management target is not used to generate notifications.
+
+ The decision as to whether a notification should contain an SNMPv2-
+ Trap or Inform PDU is determined by the value of the snmpNotifyType
+ object. If the value of this object is trap(1), the notification
+ should contain an SNMPv2-Trap PDU. If the value of this object is
+ inform(2), then the notification should contain an Inform PDU, and
+ the timeout time and number of retries for the Inform are the value
+ of snmpTargetAddrTimeout and snmpTargetAddrRetryCount. Note that the
+ exception to these rules is when the snmpTargetParamsMPModel object
+ indicates SNMPv1. In this case, the notification is sent as a Trap
+ if the value of snmpNotifyTargetType is either trap(1) or inform(2).
+
+6. Notification Filtering
+
+ This section describes the mechanisms used by a notification
+ originator application when using the MIB module described in this
+ document to filter generation of notifications.
+
+ A notification originator uses the snmpNotifyFilterTable to filter
+ notifications. A notification filter profile may be associated with
+ a particular entry in the snmpTargetParamsTable. The associated
+ filter profile is identified by an entry in the
+ snmpNotifyFilterProfileTable whose index is equal to the index of the
+ entry in the snmpTargetParamsTable. If no such entry exists in the
+ snmpNotifyFilterProfileTable, no filtering is performed for that
+ management target.
+
+ If such an entry does exist, the value of snmpNotifyFilterProfileName
+ of the entry is compared with the corresponding portion of the index
+ of all active entries in the snmpNotifyFilterTable. All such entries
+ for which this comparison results in an exact match are used for
+ filtering a notification generated using the associated
+ snmpTargetParamsEntry. If no such entries exist, no filtering is
+ performed, and a notification may be sent to the management target.
+
+ Otherwise, if matching entries do exist, a notification may be sent
+ if the NOTIFICATION-TYPE OBJECT IDENTIFIER of the notification (this
+ is the value of the element of the variable bindings whose name is
+ snmpTrapOID.0, i.e., the second variable binding), and all of the
+ object instances to be included in the variable-bindings of the
+ notification, are not specifically excluded by the matching entries.
+
+
+
+
+
+Levi, et. al. Standards Track [Page 60]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ Each set of snmpNotifyFilterTable entries is divided into two
+ collections of filter subtrees: the included filter subtrees, and
+ the excluded filter subtrees. The snmpNotifyFilterType object
+ defines the collection to which each matching entry belongs.
+
+ To determine whether a particular notification name or object
+ instance is excluded by the set of matching entries, compare the
+ notification name's or object instance's OBJECT IDENTIFIER with each
+ of the matching entries. If none match, then the notification name
+ or object instance is considered excluded, and the notification
+ should not be sent to this management target. If one or more match,
+ then the notification name or object instance is included or
+ excluded, according to the value of snmpNotifyFilterType in the entry
+ whose value of snmpNotifyFilterSubtree has the most sub-identifiers.
+ If multiple entries match and have the same number of sub-
+ identifiers, then the lexicographically greatest instance of
+ snmpNotifyFilterType among those which match determines the inclusion
+ or exclusion.
+
+ A notification name's or object instance's OBJECT IDENTIFIER X
+ matches an entry in the snmpNotifyFilterTable when the number of
+ sub-identifiers in X is at least as many as in the value of
+ snmpNotifyFilterSubtree for the entry, and each sub-identifier in the
+ value of snmpNotifyFilterSubtree matches its corresponding sub-
+ identifier in X. Two sub-identifiers match either if the
+ corresponding bit of snmpNotifyFilterMask is zero (the 'wild card'
+ value), or if the two sub-identifiers are equal.
+
+7. Management Target Translation in Proxy Forwarder Applications
+
+ This section describes the mechanisms used by a proxy forwarder
+ application when using the MIB module described in this document to
+ translate incoming management target information into outgoing
+ management target information for the purpose of forwarding messages.
+ There are actually two mechanisms a proxy forwarder may use, one for
+ forwarding request messages, and one for forwarding notification
+ messages.
+
+7.1. Management Target Translation for Request Forwarding
+
+ When forwarding request messages, the proxy forwarder will select a
+ single entry in the snmpProxyTable. To select this entry, it will
+ perform the following comparisons:
+
+ - The snmpProxyType must be read(1) if the request is a Get,
+ GetNext, or GetBulk request. The snmpProxyType must be
+ write(2) if the request is a Set request.
+
+
+
+
+Levi, et. al. Standards Track [Page 61]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The contextEngineId must equal the snmpProxyContextEngineID
+ object.
+
+ - If the snmpProxyContextName object is supported, it must equal
+ the contextName.
+
+ - The snmpProxyTargetParamsIn object identifies an entry in the
+ snmpTargetParamsTable. The messageProcessingModel,
+ securityLevel, security model, and securityName must match the
+ values of snmpTargetParamsMPModel,
+ snmpTargetParamsSecurityModel, snmpTargetParamsSecurityName,
+ and snmpTargetParamsSecurityLevel of the identified entry in
+ the snmpTargetParamsTable.
+
+ There may be multiple entries in the snmpProxyTable for which these
+ comparisons succeed. The entry whose snmpProxyName has the
+ lexicographically smallest value and for which the comparisons
+ succeed will be selected by the proxy forwarder.
+
+ The outgoing management target information is identified by the value
+ of the snmpProxySingleTargetOut object of the selected entry. This
+ object identifies an entry in the snmpTargetAddrTable. The
+ identified entry in the snmpTargetAddrTable also contains a reference
+ to the snmpTargetParamsTable (snmpTargetAddrParams). If either the
+ identified entry in the snmpTargetAddrTable does not exist, or the
+ identified entry in the snmpTargetParamsTable does not exist, then
+ this snmpProxyEntry does not identify valid forwarding information,
+ and the proxy forwarder should attempt to identify another row.
+
+ If there is no entry in the snmpProxyTable for which all of the
+ conditions above may be met, then there is no appropriate forwarding
+ information, and the proxy forwarder should take appropriate actions.
+
+ Otherwise, The snmpTargetAddrTDomain, snmpTargetAddrTAddress,
+ snmpTargetAddrTimeout, and snmpTargetRetryCount of the identified
+ snmpTargetAddrEntry, and the snmpTargetParamsMPModel,
+ snmpTargetParamsSecurityModel, snmpTargetParamsSecurityName, and
+ snmpTargetParamsSecurityLevel of the identified snmpTargetParamsEntry
+ are used as the destination management target.
+
+7.2. Management Target Translation for Notification Forwarding
+
+ When forwarding notification messages, the proxy forwarder will
+ select multiple entries in the snmpProxyTable. To select these
+ entries, it will perform the following comparisons:
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 62]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ - The snmpProxyType must be trap(3) if the notification is a
+ Trap. The snmpProxyType must be inform(4) if the request is
+ an Inform.
+
+ - The contextEngineId must equal the snmpProxyContextEngineID
+ object.
+
+ - If the snmpProxyContextName object is supported, it must equal
+ the contextName.
+
+ - The snmpProxyTargetParamsIn object identifies an entry in the
+ snmpTargetParamsTable. The messageProcessingModel,
+ securityLevel, security model, and securityName must match the
+ values of snmpTargetParamsMPModel,
+ snmpTargetParamsSecurityModel, snmpTargetParamsSecurityName,
+ and snmpTargetParamsSecurityLevel of the identified entry in
+ the snmpTargetParamsTable.
+
+ All entries for which these conditions are met are selected. The
+ snmpProxyMultipleTargetOut object of each such entry is used to
+ select a set of entries in the snmpTargetAddrTable. Any
+ snmpTargetAddrEntry whose snmpTargetAddrTagList object contains a tag
+ value equal to the value of snmpProxyMultipleTargetOut, and whose
+ snmpTargetAddrParams object references an existing entry in the
+ snmpTargetParamsTable, is selected as a destination for the forwarded
+ notification.
+
+8. Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ intellectual property or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; neither does it represent that it
+ has made any effort to identify any such rights. Information on the
+ IETF's procedures with respect to rights in standards-track and
+ standards-related documentation can be found in BCP-11. Copies of
+ claims of rights made available for publication and any assurances of
+ licenses to be made available, or the result of an attempt made to
+ obtain a general license or permission for the use of such
+ proprietary rights by implementors or users of this specification can
+ be obtained from the IETF Secretariat.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights which may cover technology that may be required to practice
+ this standard. Please address the information to the IETF Executive
+ Director.
+
+
+
+Levi, et. al. Standards Track [Page 63]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+9. Acknowledgments
+
+ This document is the result of the efforts of the SNMPv3 Working
+ Group. Some special thanks are in order to the following SNMPv3 WG
+ members:
+
+ Dave Battle (SNMP Research, Inc.)
+ Uri Blumenthal (IBM T.J. Watson Research Center)
+ Jeff Case (SNMP Research, Inc.)
+ John Curran (BBN)
+ T. Max Devlin (Hi-TECH Connections)
+ John Flick (Hewlett Packard)
+ David Harrington (Cabletron Systems Inc.)
+ N.C. Hien (IBM T.J. Watson Research Center)
+ Dave Levi (SNMP Research, Inc.)
+ Louis A Mamakos (UUNET Technologies Inc.)
+ Paul Meyer (Secure Computing Corporation)
+ Keith McCloghrie (Cisco Systems)
+ Russ Mundy (Trusted Information Systems, Inc.)
+ Bob Natale (ACE*COMM Corporation)
+ Mike O'Dell (UUNET Technologies Inc.)
+ Dave Perkins (DeskTalk)
+ Peter Polkinghorne (Brunel University)
+ Randy Presuhn (BMC Software, Inc.)
+ David Reid (SNMP Research, Inc.)
+ Shawn Routhier (Epilogue)
+ Juergen Schoenwaelder (TU Braunschweig)
+ Bob Stewart (Cisco Systems)
+ Bert Wijnen (IBM T.J. Watson Research Center)
+
+ The document is based on recommendations of the IETF Security and
+ Administrative Framework Evolution for SNMP Advisory Team. Members of
+ that Advisory Team were:
+
+ David Harrington (Cabletron Systems Inc.)
+ Jeff Johnson (Cisco Systems)
+ David Levi (SNMP Research Inc.)
+ John Linn (Openvision)
+ Russ Mundy (Trusted Information Systems) chair
+ Shawn Routhier (Epilogue)
+ Glenn Waters (Nortel)
+ Bert Wijnen (IBM T. J. Watson Research Center)
+
+ As recommended by the Advisory Team and the SNMPv3 Working Group
+ Charter, the design incorporates as much as practical from previous
+ RFCs and drafts. As a result, special thanks are due to the authors
+ of previous designs known as SNMPv2u and SNMPv2*:
+
+
+
+
+Levi, et. al. Standards Track [Page 64]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ Jeff Case (SNMP Research, Inc.)
+ David Harrington (Cabletron Systems Inc.)
+ David Levi (SNMP Research, Inc.)
+ Keith McCloghrie (Cisco Systems)
+ Brian O'Keefe (Hewlett Packard)
+ Marshall T. Rose (Dover Beach Consulting)
+ Jon Saperia (BGS Systems Inc.)
+ Steve Waldbusser (International Network Services)
+ Glenn W. Waters (Bell-Northern Research Ltd.)
+
+10. Security Considerations
+
+ The SNMP applications described in this document typically have
+ direct access to MIB instrumentation. Thus, it is very important
+ that these applications be strict in their application of access
+ control as described in this document.
+
+ In addition, there may be some types of notification generator
+ applications which, rather than accessing MIB instrumentation using
+ access control, will obtain MIB information through other means (such
+ as from a command line). The implementors and users of such
+ applications must be responsible for not divulging MIB information
+ that normally would be inaccessible due to access control.
+
+11. References
+
+ [RFC1157]
+ Case, J., Fedor, M., Schoffstall, M. and J. Davin, "Simple Network
+ Management Protocol", RFC 1157, May 1990.
+
+ [RFC1213]
+ McCloghrie, K. and M. Rose, Editors, "Management Information Base
+ for Network Management of TCP/IP-based internets: MIB-II", STD 17,
+ RFC 1213, March 1991.
+
+ [RFC1902]
+ Case, J., McCloghrie, K., Rose, M. and S. Waldbusser, "Structure of
+ Management Information for Version 2 of the Simple Network
+ Management Protocol (SNMPv2)", RFC 1902, January 1996.
+
+ [RFC1903]
+ Case, J., McCloghrie, K., Rose, M. and S. Waldbusser, "Textual
+ Conventions for Version 2 of the Simple Network Management Protocol
+ (SNMPv2)", RFC 1903, January 1996.
+
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 65]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ [RFC1905]
+ SNMPv2 Working Group, Case, J., McCloghrie, K., Rose, M., and S.
+ Waldbusser, "Protocol Operations for Version 2 of the Simple
+ Network Management Protocol (SNMPv2)", RFC 1905, January 1996.
+
+ [RFC1907]
+ SNMPv2 Working Group, Case, J., McCloghrie, K., Rose, M., and S.
+ Waldbusser, "Management Information Base for Version 2 of the
+ Simple Network Management Protocol (SNMPv2)", RFC 1907, January
+ 1996.
+
+ [RFC1908]
+ SNMPv2 Working Group, Case, J., McCloghrie, K., Rose, M., and S.
+ Waldbusser, "Coexistence between Version 1 and Version 2 of the
+ Internet-standard Network Management Framework", RFC 1908, January
+ 1996.
+
+ [RFC2271]
+ Harrington, D., and B. Wijnen, "An Architecture for Describing SNMP
+ Management Frameworks", RFC 2271, January 1998.
+
+ [RFC2272]
+ Case, J., Harrington, D., and B. Wijnen, "Message Processing and
+ Dispatching for the Simple Network Management Protocol (SNMP)", RFC
+ 2272, January 1998.
+
+ [RFC2275]
+ Wijnen, B., Presuhn, R., and K. McCloghrie, "View-based Access
+ Control Model for the Simple Network Management Protocol (SNMP)",
+ RFC 2275, January 1998.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 66]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+12. Editors' Addresses
+
+ David B. Levi
+ SNMP Research, Inc.
+ 3001 Kimberlin Heights Road
+ Knoxville, TN 37920-9716
+ U.S.A.
+
+ Phone: +1 423 573 1434
+ EMail: levi@snmp.com
+
+
+ Paul Meyer
+ Secure Computing Corporation
+ 2675 Long Lake Road
+ Roseville, MN 55113
+ U.S.A.
+
+ Phone: +1 612 628 1592
+ EMail: paul_meyer@securecomputing.com
+
+
+ Bob Stewart
+ Cisco Systems, Inc.
+ 170 West Tasman Drive
+ San Jose, CA 95134-1706
+ U.S.A.
+
+ Phone: +1 603 654 6923
+ EMail: bstewart@cisco.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 67]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+APPENDIX A - Trap Configuration Example
+
+ This section describes an example configuration for a Notification
+ Generator application which implements the snmpNotifyBasicCompliance
+ level. The example configuration specifies that the Notification
+ Generator should send notifications to 3 separate managers, using
+ authentication and no privacy for the first 2 managers, and using
+ both authentication and privacy for the third manager.
+
+ The configuration consists of three rows in the snmpTargetAddrTable,
+ and two rows in the snmpTargetTable.
+
+ snmpTargetAddrName SnmpAdminString,
+ snmpTargetAddrTDomain TDomain,
+ snmpTargetAddrTAddress TAddress,
+ snmpTargetAddrTimeout TimeInterval,
+ snmpTargetAddrRetryCount Integer32,
+ snmpTargetAddrTagList SnmpAdminString,
+ snmpTargetAddrParams SnmpAdminString,
+ snmpTargetAddrStorageType StorageType,
+ snmpTargetAddrRowStatus RowStatus
+
+ * snmpTargetAddrName = "addr1"
+ snmpTargetAddrTDomain = snmpUDPDomain
+ snmpTargetAddrTAddress = 128.1.2.3:162
+ snmpTargetAddrTagList = "group1"
+ snmpTargetAddrParams = "AuthNoPriv joe"
+ snmpTargetAddrStorageType = readOnly(5)
+ snmpTargetAddrRowStatus = active(1)
+
+ * snmpTargetAddrName = "addr2"
+ snmpTargetAddrTDomain = snmpUDPDomain
+ snmpTargetAddrTAddress = 128.2.4.6:162
+ snmpTargetAddrTagList = "group1"
+ snmpTargetAddrParams = "AuthNoPriv-joe"
+ snmpTargetAddrStorageType = readOnly(5)
+ snmpTargetAddrRowStatus = active(1)
+
+ * snmpTargetAddrName = "addr3"
+ snmpTargetAddrTDomain = snmpUDPDomain
+ snmpTargetAddrTAddress = 128.1.2.3:162
+ snmpTargetAddrTagList = "group2"
+ snmpTargetAddrParams = "AuthPriv-bob"
+ snmpTargetAddrStorageType = readOnly(5)
+ snmpTargetAddrRowStatus = active(1)
+
+ * snmpTargetParamsName = "AuthNoPriv-joe"
+ snmpTargetParamsMPModel = 3
+
+
+
+Levi, et. al. Standards Track [Page 68]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+ snmpTargetParamsSecurityModel = 3 (USM)
+ snmpTargetParamsSecurityName = "joe"
+ snmpTargetParamsSecurityLevel = authNoPriv(2)
+ snmpTargetParamsStorageType = readOnly(5)
+ snmpTargetParamsRowStatus = active(1)
+
+ * snmpTargetParamsName = "AuthPriv-bob"
+ snmpTargetParamsMPModel = 3
+ snmpTargetParamsSecurityModel = 3 (USM)
+ snmpTargetParamsSecurityName = "bob"
+ snmpTargetParamsSecurityLevel = authPriv(3)
+ snmpTargetParamsStorageType = readOnly(5)
+ snmpTargetParamsRowStatus = active(1)
+
+ * snmpNotifyName = "group1"
+ snmpNotifyTag = "group1"
+ snmpNotifyType = trap(1)
+ snmpNotifyStorageType = readOnly(5)
+ snmpNotifyRowStatus = active(1)
+
+ * snmpNotifyName = "group2"
+ snmpNotifyTag = "group2"
+ snmpNotifyType = trap(1)
+ snmpNotifyStorageType = readOnly(5)
+ snmpNotifyRowStatus = active(1)
+
+ These entries define two groups of management targets. The first
+ group contains two management targets:
+
+ first target second target
+ ------------ -------------
+ messageProcessingModel SNMPv3 SNMPv3
+ securityModel 3 (USM) 3 (USM)
+ securityName "joe" "joe"
+ securityLevel authNoPriv(2) authNoPriv(2)
+ transportDomain snmpUDPDomain snmpUDPDomain
+ transportAddress 128.1.2.3:162 128.2.4.6:162
+
+ And the second group contains a single management target:
+
+ messageProcessingModel SNMPv3
+ securityLevel authPriv(3)
+ securityModel 3 (USM)
+ securityName "bob"
+ transportDomain snmpUDPDomain
+ transportAddress 128.1.5.9:162
+
+
+
+
+
+Levi, et. al. Standards Track [Page 69]
+
+RFC 2273 SNMPv3 Applications January 1998
+
+
+B. Full Copyright Statement
+
+ Copyright (C) The Internet Society (1998). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Levi, et. al. Standards Track [Page 70]
+