⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2456.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
               "This group is mandatory for APPN nodes supporting               reporting of final ISR counter values via notifications."           GROUP appnTrapMibTopoConfGroup           DESCRIPTION               "This group is mandatory for APPN nodes supporting               polling reduction for local topology."           GROUP appnTrapMibTopoNotifGroup           DESCRIPTION               "This group is mandatory for APPN nodes supporting               polling reduction for local topology."           GROUP appnTrapMibDlurConfGroup           DESCRIPTION               "This group is mandatory for APPN nodes supporting               polling reduction for the dlurDlusTable."           GROUP appnTrapMibDlurNotifGroup           DESCRIPTION               "This group is mandatory for APPN nodes supporting               polling reduction for the dlurDlusTable."           OBJECT appnTrapControl               MIN-ACCESS  read-only               DESCRIPTION                   "An agent is not required to support a set to                   this object."       ::= {appnCompliances 2 }-- Units of conformanceappnTrapMibIsrNotifGroup    NOTIFICATION-GROUP        NOTIFICATIONS {                       appnIsrAccountingDataTrap                      }        STATUS  current        DESCRIPTION            "A notification for reporting the final values of the            APPN MIB's ISR counters."        ::= { appnGroups 21 }appnTrapMibTopoConfGroup  OBJECT-GROUP        OBJECTS  {                  appnTrapControl,                  appnLocalTgTableChanges,                  appnPortTableChanges,Clouston & Moore            Standards Track                    [Page 15]RFC 2456                     APPN TRAPS MIB                November 1998                  appnLsTableChanges                 }        STATUS  current        DESCRIPTION            "A collection of objects for reducing the polling            associated with the local topology tables in the            APPN MIB.  Nodes that implement this group SHALL            also implement the appnTrapMibTopoNotifGroup."        ::= { appnGroups 22 }appnTrapMibTopoNotifGroup    NOTIFICATION-GROUP        NOTIFICATIONS {                       appnLocalTgOperStateChangeTrap,                       appnLocalTgCpCpChangeTrap,                       appnPortOperStateChangeTrap,                       appnLsOperStateChangeTrap                      }        STATUS  current        DESCRIPTION            "A collection of notifications for reducing the polling            associated with the local topology tables in the            APPN MIB.  Nodes that implement this group SHALL            also implement the appnTrapMibTopoConfGroup."        ::= { appnGroups 23 }appnTrapMibDlurConfGroup  OBJECT-GROUP        OBJECTS  {                  appnTrapControl,                  dlurDlusTableChanges                 }        STATUS  current        DESCRIPTION            "A collection of objects for reducing the polling            associated with the dlurDlusTable in the DLUR            MIB.  Nodes that implement this group SHALL also            implement the appnTrapMibDlurNotifGroup."        ::= { appnGroups 24 }appnTrapMibDlurNotifGroup    NOTIFICATION-GROUP        NOTIFICATIONS {                       dlurDlusStateChangeTrap                      }        STATUS  current        DESCRIPTIONClouston & Moore            Standards Track                    [Page 16]RFC 2456                     APPN TRAPS MIB                November 1998            "A notification for reducing the polling associated            with the dlurDlusTable in the DLUR MIB.  Nodes that            implement this group SHALL also implement the            appnTrapMibDlurConfGroup."        ::= { appnGroups 25 }END5.  Security Considerations   Certain management information defined in this MIB may be considered   sensitive in some network environments.  Therefore, authentication of   received SNMP requests and controlled access to management   information SHOULD be employed in such environments.  An   authentication protocol is defined in [12].  A protocol for access   control is defined in [15].   None of the read-only objects in the APPN TRAP MIB reports a   password, user data, or anything else that is particularly sensitive.   Some enterprises view their network configuration itself, as well as   information about network usage and performance, as corporate assets;   such enterprises may wish to restrict SNMP access to most of the   objects in the MIB.   There is one read-write object in the APPN TRAP MIB, appnTrapControl.   This object controls the generation of the notifications defined in   the APPN TRAP MIB.6.  Intellectual Property   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards- related documentation can be found in BCP-11 [16].  Copies   of claims of rights made available for publication and any assurances   of licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementers or users of this specification can   be obtained from the IETF Secretariat.Clouston & Moore            Standards Track                    [Page 17]RFC 2456                     APPN TRAPS MIB                November 1998   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.7.  Acknowledgments   This MIB module is the product of the IETF SNA NAU MIB WG and the AIW   APPN/HPR MIBs SIG.8.  References   [1]  Harrington, D., Presuhn, R., and B. Wijnen, "An Architecture for        Describing SNMP Management Frameworks", RFC 2271, Cabletron        Systems, Inc., BMC Software, Inc., IBM T. J. Watson Research,        January 1998.   [2]  Rose, M., and K. McCloghrie, "Structure and Identification of        Management Information for TCP/IP-based Internets", STD 16, RFC        1155, May 1990.   [3]  Rose, M., and K. McCloghrie, "Concise MIB Definitions", STD 16,        RFC 1212, March 1991.   [4]  Rose, M., "A Convention for Defining Traps for use with the        SNMP", RFC 1215, March 1991.   [5]  Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Structure of Management Information for Version 2 of the Simple        Network Management Protocol (SNMPv2)", RFC 1902, January 1996.   [6]  Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Textual        Conventions for Version 2 of the Simple Network Management        Protocol (SNMPv2)", RFC 1903, January 1996.   [7]  Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Conformance Statements for Version 2 of the Simple Network        Management Protocol (SNMPv2)", RFC 1904, January 1996.   [8]  Case, J., Fedor, M., Schoffstall, M., and J. Davin, "Simple        Network Management Protocol", STD 15, RFC 1157, May 1990.   [9]  Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Introduction to Community-based SNMPv2", RFC 1901, January        1996.Clouston & Moore            Standards Track                    [Page 18]RFC 2456                     APPN TRAPS MIB                November 1998   [10] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Transport Mappings for Version 2 of the Simple Network        Management Protocol (SNMPv2)", RFC 1906, January 1996.   [11] Case, J., Harrington D., Presuhn R., and B. Wijnen, "Message        Processing and Dispatching for the Simple Network Management        Protocol (SNMP)", RFC 2272, January 1998.   [12] Blumenthal, U., and B. Wijnen, "User-based Security Model (USM)        for version 3 of the Simple Network Management Protocol        (SNMPv3)", RFC 2274, January 1998.   [13] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Protocol        Operations for Version 2 of the Simple Network Management        Protocol (SNMPv2)", RFC 1905, January 1996.   [14] Levi, D., Meyer, P., and B. Stewart, "SNMPv3 Applications", RFC        2273, January 1998.   [15] Wijnen, B., Presuhn, R., and K. McCloghrie, "View-based Access         Control Model (VACM) for the Simple Network Management Protocol         (SNMP)", RFC 2275, January 1998   [16] Hovey, R., and S. Bradner, "The Organizations Involved in the        IETF Standards Process", BCP 11, RFC 2028, October 1996.   [17] Bradner, S., "Key words for use in RFCs to Indicate Requirement        Levels", BCP 14, RFC 2119, March 1997.   [18] Clouston, B., and B. Moore, "Definition of Managed Objects for        APPN", RFC 2455, November 1998.   [19] Clouston, B., and B. Moore, "Definitions of Managed Objects for        DLUR", RFC 2232, November 1997.Clouston & Moore            Standards Track                    [Page 19]RFC 2456                     APPN TRAPS MIB                November 19989.  Authors' Addresses   Bob Clouston   Cisco Systems   7025 Kit Creek Road   P.O. Box 14987   Research Triangle Park, NC 27709, USA   Phone: +1 919 472 2333   EMail: clouston@cisco.com   Robert Moore   Dept. BRQA/Bldg. 501/G114   IBM Corporation   P.O.Box 12195   3039 Cornwallis   Research Triangle Park, NC 27709, USA   Phone: +1 919 254 4436   EMail: remoore@us.ibm.comClouston & Moore            Standards Track                    [Page 20]RFC 2456                     APPN TRAPS MIB                November 199810.  Full Copyright Statement   Copyright (C) The Internet Society (1998).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Clouston & Moore            Standards Track                    [Page 21]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -