⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2788.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
   applRFC2248Compliance MODULE-COMPLIANCE       STATUS deprecated       DESCRIPTION         "The compliance statement for RFC 2248 implementations          which support the Network Services Monitoring MIB          for basic monitoring of network service applications."       MODULE         MANDATORY-GROUPS {applRFC2248Group}       ::= {applCompliances 3}   assocRFC2248Compliance MODULE-COMPLIANCE       STATUS deprecated       DESCRIPTION         "The compliance statement for RFC 2248 implementationsFreed & Kille               Standards Track                    [Page 15]RFC 2788            Network Services Monitoring MIB           March 2000          which support the Network Services Monitoring MIB for          basic monitoring of network service applications and          their associations."       MODULE         MANDATORY-GROUPS {applRFC2248Group, assocRFC2248Group}       ::= {applCompliances 4}   applRFC2788Compliance MODULE-COMPLIANCE       STATUS current       DESCRIPTION         "The compliance statement for RFC 2788 implementations          which support the Network Services Monitoring MIB          for basic monitoring of network service applications."       MODULE         MANDATORY-GROUPS {applRFC2788Group}       ::= {applCompliances 5}   assocRFC2788Compliance MODULE-COMPLIANCE       STATUS current       DESCRIPTION         "The compliance statement for RFC 2788 implementations          which support the Network Services Monitoring MIB for          basic monitoring of network service applications and          their associations."       MODULE         MANDATORY-GROUPS {applRFC2788Group, assocRFC2788Group}       ::= {applCompliances 6}   -- Units of conformance   applRFC1565Group OBJECT-GROUP       OBJECTS {         applName, applVersion, applUptime, applOperStatus,         applLastChange, applInboundAssociations,         applOutboundAssociations, applAccumulatedInboundAssociations,         applAccumulatedOutboundAssociations, applLastInboundActivity,         applLastOutboundActivity, applRejectedInboundAssociations,         applFailedOutboundAssociations}       STATUS obsolete       DESCRIPTION         "A collection of objects providing basic monitoring of          network service applications.  This is the original set          of such objects defined in RFC 1565."       ::= {applGroups 7}   assocRFC1565Group OBJECT-GROUP       OBJECTS {Freed & Kille               Standards Track                    [Page 16]RFC 2788            Network Services Monitoring MIB           March 2000         assocRemoteApplication, assocApplicationProtocol,         assocApplicationType, assocDuration}       STATUS obsolete       DESCRIPTION         "A collection of objects providing basic monitoring of          network service applications' associations.  This is the          original set of such objects defined in RFC 1565."       ::= {applGroups 2}   applRFC2248Group OBJECT-GROUP       OBJECTS {         applName, applVersion, applUptime, applOperStatus,         applLastChange, applInboundAssociations,         applOutboundAssociations, applAccumulatedInboundAssociations,         applAccumulatedOutboundAssociations, applLastInboundActivity,         applLastOutboundActivity, applRejectedInboundAssociations,         applFailedOutboundAssociations, applDescription, applURL}       STATUS deprecated       DESCRIPTION         "A collection of objects providing basic monitoring of          network service applications.  This group was originally          defined in RFC 2248; note that applDirectoryName is          missing."       ::= {applGroups 3}   assocRFC2248Group OBJECT-GROUP       OBJECTS {         assocRemoteApplication, assocApplicationProtocol,         assocApplicationType, assocDuration}       STATUS deprecated       DESCRIPTION         "A collection of objects providing basic monitoring of          network service applications' associations.  This group          was originally defined by RFC 2248."       ::= {applGroups 4}   applRFC2788Group OBJECT-GROUP       OBJECTS {         applName, applDirectoryName, applVersion, applUptime,         applOperStatus, applLastChange, applInboundAssociations,         applOutboundAssociations, applAccumulatedInboundAssociations,         applAccumulatedOutboundAssociations, applLastInboundActivity,         applLastOutboundActivity, applRejectedInboundAssociations,         applFailedOutboundAssociations, applDescription, applURL}       STATUS current       DESCRIPTION         "A collection of objects providing basic monitoring of          network service applications.  This is the appropriateFreed & Kille               Standards Track                    [Page 17]RFC 2788            Network Services Monitoring MIB           March 2000          group for RFC 2788 -- it adds the applDirectoryName object          missing in RFC 2248."       ::= {applGroups 5}   assocRFC2788Group OBJECT-GROUP       OBJECTS {         assocRemoteApplication, assocApplicationProtocol,         assocApplicationType, assocDuration}       STATUS current       DESCRIPTION         "A collection of objects providing basic monitoring of          network service applications' associations.  This is          the appropriate group for RFC 2788."       ::= {applGroups 6}   -- OIDs of the form {applTCPProtoID port} are intended to be used   -- for TCP-based protocols that don't have OIDs assigned by other   -- means. {applUDPProtoID port} serves the same purpose for   -- UDP-based protocols. In either case 'port' corresponds to   -- the primary port number being used by the protocol. For example,   -- assuming no other OID is assigned for SMTP, an OID of   -- {applTCPProtoID 25} could be used, since SMTP is a TCP-based   -- protocol that uses port 25 as its primary port.   applTCPProtoID OBJECT IDENTIFIER ::= {application 4}   applUDPProtoID OBJECT IDENTIFIER ::= {application 5}   END5.  Changes made since RFC 2248   This revision corrects a few minor technical errors in the   construction of the network services MIB in RFC 2248 [22]. In   addition, the applName, applVersion, and applDescription fields have   been changed from DisplayStrings to SnmpAdminStrings. The reference   to RFC 1779 has also been updated to RFC 2253, which in turn adds the   ability for distinguished names to be in the UTF-8 character set.6.  Acknowledgements   This document is a product of the Mail and Directory Management   (MADMAN) Working Group.  It is based on an earlier MIB designed by S.   Kille, T.  Lenggenhager, D. Partain, and W. Yeong.  The Electronic   Mail Association's TSC committee was instrumental in providing   feedback on and suggesting enhancements to RFC 1565 [23] that have   led to the present document.Freed & Kille               Standards Track                    [Page 18]RFC 2788            Network Services Monitoring MIB           March 20009.  References   [1]  Grillo, P. and S. Waldbusser, "Host Resources MIB", RFC 1514,        September 1993.   [2]  Krupczak, C. and J. Saperia, "Definitions of System-Level        Managed Objects for Applications", RFC 2287, February 1998.   [3]  Wijnen, B., Harrington, D. and R. Presuhn, "An Architecture for        Describing SNMP Management Frameworks", RFC 2571, April 1999.   [4]  Rose, M. and K. McCloghrie, "Structure and Identification of        Management Information for TCP/IP-based Internets", STD 16, RFC        1155, May 1990.   [5]  Rose, M. and K. McCloghrie, "Concise MIB Definitions", STD 16,        RFC 1212, March 1991.   [6]  Rose, M., "A Convention for Defining Traps for use with the        SNMP", RFC 1215, March 1991.   [7]  McCloghrie, K., Perkins, D. and J. Schoenwaelder, "Structure of        Management Information Version 2 (SMIv2)", STD 58, RFC 2578,        April 1999.   [8]  McCloghrie, K., Perkins, D. and J. Schoenwaelder, "Textual        Conventions for SMIv2", STD 58, RFC 2579, April 1999.   [9]  McCloghrie, K., Perkins, D. and J. Schoenwaelder, "Conformance        Statements for SMIv2", STD 58, RFC 2580, April 1999.   [10] Case, J., Fedor, M., Schoffstall, M. and J. Davin, "Simple        Network Management Protocol", STD 15, RFC 1157, May 1990.   [11] Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,        "Introduction to Community-based SNMPv2", RFC 1901, January        1996.   [12] Case, J., McCloghrie, K., Rose, M. and S. Waldbusser, "Transport        Mappings for Version 2 of the Simple Network Management Protocol        (SNMPv2)", RFC 1906, January 1996.   [13] Case, J., Harrington D., Presuhn R. and B. Wijnen, "Message        Processing and Dispatching for the Simple Network Management        Protocol (SNMP)", RFC 2572, April 1999.Freed & Kille               Standards Track                    [Page 19]RFC 2788            Network Services Monitoring MIB           March 2000   [14] Blumenthal, U. and B. Wijnen, "User-based Security Model (USM)        for version 3 of the Simple Network Management Protocol        (SNMPv3)", RFC 2574, April 1999.   [15] Case, J., McCloghrie, K., Rose, M. and S. Waldbusser, "Protocol        Operations for Version 2 of the Simple Network Management        Protocol (SNMPv2)", RFC 1905, January 1996.   [16] Levi, D., Meyer, P. and B. Stewart, "SNMPv3 Applications", RFC        2573, April 1999.   [17] Wijnen, B., Presuhn, R. and K. McCloghrie, "View-based Access        Control Model (VACM) for the Simple Network Management Protocol        (SNMP)", RFC 2575, April 1999.   [18] Wahl, M., Kille, S. and T.Howes, "Lightweight Directory Access        Protocol (v3): UTF-8 String Representation of Distinguished        Names", RFC 2253, December 1997.   [19] Kille, S., "Mapping between X.400(1988) and RFC 822/MIME", RFC        2156, January 1998.   [20] Berners-Lee, T., Masinter, L. and M. McCahill, "Uniform Resource        Locators (URL)", RFC 1738, December 1994.   [21] Hoffman, P., Masinter, L. and J. Zawinski, "The mailto URL        Scheme", RFC 2368, July 1998.   [22] Freed, N. and S. Kille, "Network Services Monitoring MIB", RFC        2248, January 1998.   [23] Freed, N. and Kille, "Network Services Monitoring MIB", RFC        1565, January 1994.   [29] Postel, J. and J. Reynolds, "Telnet Protocol Specification", STD        8, RFC 854, RFC 855, May 1983.8.  Security Considerations   There are no management objects defined in this MIB that have a MAX-   ACCESS clause of read-write and/or read-create.  So, if this MIB is   implemented correctly, then there is no risk that an intruder can   alter or create any management objects of this MIB via direct SNMP   SET operations.Freed & Kille               Standards Track                    [Page 20]RFC 2788            Network Services Monitoring MIB           March 2000   However, this MIB does provide passive information about the   existence, type, and configuration of applications on a given host   that could potentially indicate some sort of vulnerability. Finally,   the information MIB provides about network usage could be used to   analyze network traffic patterns.   SNMPv1 by itself is not a secure environment.  Even if the network   itself is secure (for example by using IPSec), even then, there is no   control as to who on the secure network is allowed to access and   GET/SET (read/change/create/delete) the objects in this MIB.   It is recommended that the implementers consider the security   features as provided by the SNMPv3 framework.  Specifically, the use   of the User-based Security Model RFC 2574 [14] and the View-based   Access Control Model RFC 2575 [17] is recommended.   It is then a customer/user responsibility to ensure that the SNMP   entity giving access to an instance of this MIB, is properly   configured to give access to the objects only to those principals   (users) that have legitimate rights to indeed GET or SET   (change/create/delete) them.9.  Author and Chair Addresses   Ned Freed   Innosoft International, Inc.   1050 Lakes Drive   West Covina, CA 91790   USA   Phone: +1 626 919 3600   Fax: +1 626 919 3614   EMail: ned.freed@innosoft.com   Steve Kille, MADMAN WG Chair   MessagingDirect Ltd.   The Dome, The Square   Richmond TW9 1DT   UK   Phone: +44 20 8332 9091   EMail: Steve.Kille@MessagingDirect.comFreed & Kille               Standards Track                    [Page 21]RFC 2788            Network Services Monitoring MIB           March 200010.  Full Copyright Statement   Copyright (C) The Internet Society (2000).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Freed & Kille               Standards Track                    [Page 22]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -