⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2922.txt

📁 <VC++网络游戏建摸与实现>源代码
💻 TXT
📖 第 1 页 / 共 5 页
字号:
              ptopoGeneralGroup,              ptopoConfigGroup,              ptopoNotificationsGroup        }    ::= { ptopoCompliances 1 }-- MIB groupingsptopoDataGroup   OBJECT-GROUP    OBJECTS {         ptopoConnRemoteChassisType,         ptopoConnRemoteChassis,         ptopoConnRemotePortType,         ptopoConnRemotePort,         ptopoConnDiscAlgorithm,         ptopoConnAgentNetAddrType,         ptopoConnAgentNetAddr,         ptopoConnMultiMacSASeen,         ptopoConnMultiNetSASeen,         ptopoConnIsStatic,         ptopoConnLastVerifyTime,         ptopoConnRowStatus    }    STATUS  current    DESCRIPTION            "The collection of objects which are used to represent            physical topology information for which a single agent            provides management information.            This group is mandatory for all implementations of the PTOPO            MIB."    ::= { ptopoGroups 1 }ptopoGeneralGroup    OBJECT-GROUP    OBJECTS {         ptopoLastChangeTime,         ptopoConnTabInserts,         ptopoConnTabDeletes,         ptopoConnTabDrops,         ptopoConnTabAgeouts    }    STATUS  current    DESCRIPTION            "The collection of objects which are used to report the            general status of the PTOPO MIB implementation.            This group is mandatory for all agents which implement the            PTOPO MIB."    ::= { ptopoGroups 2 }Bierman & Jones              Informational                     [Page 26]RFC 2922                 Physical Topology MIB            September 2000ptopoConfigGroup    OBJECT-GROUP    OBJECTS {         ptopoConfigTrapInterval,         ptopoConfigMaxHoldTime    }    STATUS  current    DESCRIPTION            "The collection of objects which are used to configure the            PTOPO MIB implementation behavior.            This group is mandatory for agents which implement the PTOPO            MIB."    ::= { ptopoGroups 3 }ptopoNotificationsGroup NOTIFICATION-GROUP    NOTIFICATIONS {         ptopoConfigChange    }    STATUS        current    DESCRIPTION            "The collection of notifications used to indicate PTOPO MIB            data consistency and general status information.            This group is mandatory for agents which implement the PTOPO            MIB."    ::= { ptopoGroups 4 }END5.  Intellectual Property   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practiceBierman & Jones              Informational                     [Page 27]RFC 2922                 Physical Topology MIB            September 2000   this standard.  Please address the information to the IETF Executive   Director.   The IETF has been notified of intellectual property rights claimed in   regard to some or all of the specification contained in this   document.  For more information consult the online list of claimed   rights.6.  Acknowledgements   The PTOPO Discovery Protocol is a product of the IETF PTOPOMIB   Working Group.7.  References   [RFC1155]   Rose, M. and K. McCloghrie, "Structure and Identification               of Management Information for TCP/IP-based Internets",               STD 16, RFC 1155, May 1990.   [RFC1157]   Case, J., Fedor, M., Schoffstall, M. and J. Davin,               "Simple Network Management Protocol", STD 15, RFC 1157,               May 1990.   [RFC1212]   Rose, M. and K. McCloghrie, "Concise MIB Definitions",               STD 16, RFC 1212, March 1991.   [RFC1215]   Rose, M., "A Convention for Defining Traps for use with               the SNMP", RFC 1215, March 1991.   [RFC1493]   Decker, E., Langille, P., Rijsinghani, A. and K.               McCloghrie, "Definitions of Managed Objects for Bridges",               RFC 1493, July 1993.   [RFC1700]   Reynolds, J. and J. Postel, "Assigned Numbers", STD 2,               RFC 1700, October 1994.   [RFC1901]   Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,               "Introduction to Community-based SNMPv2", January 1996.   [RFC1902]   Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,               "Structure of Management Information for version 2 of the               Simple Network Management Protocol (SNMPv2)", RFC 1902,               January 1996.   [RFC1903]   Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,               "Textual Conventions for version 2 of the Simple Network               Management Protocol (SNMPv2)", RFC 1903, January 1996.Bierman & Jones              Informational                     [Page 28]RFC 2922                 Physical Topology MIB            September 2000   [RFC1904]   Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,               "Conformance Statements for version 2 of the Simple               Network Management Protocol (SNMPv2)", RFC 1904, January               1996.   [RFC1905]   Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,               "Protocol Operations for Version 2 of the Simple Network               Management Protocol (SNMPv2)", RFC 1905, January 1996.   [RFC1906]   Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,               "Transport Mappings for Version 2 of the  Simple Network               Management Protocol (SNMPv2)", RFC 1906, January 1996.   [RFC2021]   Waldbusser, S., "Remote Network Monitoring MIB (RMON-2)",               RFC 2021, January 1997.   [RFC2037]   McCloghrie, K. and A. Bierman, "Entity MIB using SMIv2",               RFC 2037, October 1996.   [RFC2108]   de Graaf, K., Romascanu, D., McMaster, D. and K.               McCloghrie, "Definitions of Managed Objects for IEEE               802.3 Repeater Devices using SMIv2", RFC 2108, February               1997.   [RFC2233]   McCloghrie, K. and F. Kastenholtz, "The Interfaces Group               MIB using SMIv2", RFC 2233, November 1997.   [RFC2570]   Case, J., Mundy, R., Partain, D. and B. Stewart,               "Introduction to Version 3 of the Internet-standard               Network Management Framework", RFC 2570, April 1999.   [RFC2571]   Harrington, D., Presuhn, R. and B. Wijnen, "An               Architecture for Describing SNMP Management Frameworks",               RFC 2571, April 1999.   [RFC2572]   Case, J., Harrington D., Presuhn R. and B. Wijnen,               "Message Processing and Dispatching for the Simple               Network Management Protocol (SNMP)", RFC 2572, April               1999.   [RFC2573]   Levi, D., Meyer, P. and B. Stewart, "SNMPv3               Applications", RFC 2573, April 1999.   [RFC2574]   Blumenthal, U. and B. Wijnen, "User-based Security Model               (USM) for version 3 of the Simple Network Management               Protocol (SNMPv3)", RFC 2574, April 1999.Bierman & Jones              Informational                     [Page 29]RFC 2922                 Physical Topology MIB            September 2000   [RFC2575]   Wijnen, B., Presuhn, R. and K. McCloghrie, "View-based               Access Control Model (VACM) for the Simple Network               Management Protocol (SNMP)", RFC 2575, April 1999.   [RFC2578]   McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,               Rose, M. and S. Waldbusser, "Structure of Management               Information Version 2 (SMIv2)", STD 58, RFC 2578, April               1999.   [RFC2579]   McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,               Rose, M. and S. Waldbusser, "Textual Conventions for               SMIv2", STD 58, RFC 2579, April 1999.   [RFC2580]   McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,               Rose, M. and S. Waldbusser, "Conformance Statements for               SMIv2", STD 58, RFC 2580, April 1999.   [RFC2737]   McCloghrie, K. and A. Bierman, "Entity MIB (Version 2)",               RFC 2737, Cisco Systems, December 1999.8.  Security Considerations   There are a number of management objects defined in this MIB that   have a MAX-ACCESS clause of read-write and/or read-create.  Such   objects may be considered sensitive or vulnerable in some network   environments.  The support for SET operations in a non-secure   environment without proper protection can have a negative effect on   network operations.   There are a number of managed objects in this MIB that may contain   sensitive information. These are:       read-create objects:  ptopoConnRemoteChassisType          ptopoConnRemoteChassis ptopoConnRemotePortType          ptopoConnRemotePort ptopoConnAgentNetAddrType          ptopoConnAgentNetAddr ptopoConnIsStatic          ptopoConfigTrapInterval ptopoConfigMaxHoldTime       read-only objects:  ptopoConnDiscAlgorithm          ptopoConnMultiMacSASeen ptopoConnMultiNetSASeen          ptopoConnLastVerifyTime ptopoLastChangeTime       notifications:  ptopoConfigChange   These MIB objects expose information about the physical connectivity   for a particular portion of a network.Bierman & Jones              Informational                     [Page 30]RFC 2922                 Physical Topology MIB            September 2000   A network administrator may also wish to inhibit transmission of any   ptopoConfigChange notification by setting the ptopoConfigTrapInterval   object to zero.   It is thus important to control even GET access to these objects and   possibly to even encrypt the values of these object when sending them   over the network via SNMP.  Not all versions of SNMP provide features   for such a secure environment.   SNMPv1 by itself is not a secure environment.  Even if the network   itself is secure (for example by using IPSec), even then, there is no   control as to who on the secure network is allowed to access and   GET/SET (read/change/create/delete) the objects in this MIB.   It is recommended that the implementers consider the security   features as provided by the SNMPv3 framework.  Specifically, the use   of the User-based Security Model RFC 2574 [RFC2574] and the View-   based Access Control Model RFC 2575 [RFC2575] is recommended.   It is then a customer/user responsibility to ensure that the SNMP   entity giving access to an instance of this MIB, is properly   configured to give access to the objects only to those principals   (users) that have legitimate rights to indeed GET or SET   (change/create/delete) them.9.  Authors' Addresses   Andy Bierman   Cisco Systems   170 West Tasman Drive   San Jose, CA USA 95134   Phone: +1 408-527-3711   EMail: abierman@cisco.com   Kendall S. Jones   Nortel Networks   4401 Great America Parkway   Santa Clara, CA USA 95054   Phone: +1 408-495-7356   EMail: kejones@nortelnetworks.comBierman & Jones              Informational                     [Page 31]RFC 2922                 Physical Topology MIB            September 200010.  Full Copyright Statement   Copyright (C) The Internet Society (2000).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kin

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -