⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2457.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 4 页
字号:
RFC 2457                Extended Border Node MIB           November 1998        ::= { hbnIsInEntry 1 }   hbnIsInPcid OBJECT-TYPE        SYNTAX OCTET STRING (SIZE(8))        MAX-ACCESS not-accessible        STATUS current        DESCRIPTION            "The procedure correlation identifier (PCID) of a session.            It is an 8-octet value.            If this object has the same value as the appnIsInPcid object            in the APPN MIB, and if the corresponding hbnIsInFqCpName            object has the same value as the corresponding            appnIsInFqCpName object, then the entries indexed by these            objects are referring to the same session."        ::= { hbnIsInEntry 2 }   hbnIsInRtpNceId OBJECT-TYPE        SYNTAX OCTET STRING (SIZE(1..8))        MAX-ACCESS read-only        STATUS current        DESCRIPTION            "The HPR local Network Connection Endpoint of the session in            the direction of the SLU."        ::= { hbnIsInEntry 3 }   hbnIsInRtpTcid OBJECT-TYPE        SYNTAX OCTET STRING (SIZE(8))        MAX-ACCESS read-only        STATUS current        DESCRIPTION            "The RTP connection local TCID of the session in the direction            of the SLU."        ::= { hbnIsInEntry 4 }   -- *******************************************************************   -- Conformance Statement   -- *******************************************************************   ebnConformance          OBJECT IDENTIFIER ::= { ebnMIB 2 }   ebnCompliances          OBJECT IDENTIFIER ::= { ebnConformance 1 }   ebnGroups               OBJECT IDENTIFIER ::= { ebnConformance 2 }   -- Compliance statements   ebnCompliance     MODULE-COMPLIANCEClouston & Moore            Standards Track                    [Page 22]RFC 2457                Extended Border Node MIB           November 1998     STATUS current     DESCRIPTION         "The compliance statement for the SNMPv2 entities which         implement the ebnMIB."     MODULE   -- this module     --  Unconditionally mandatory groups         MANDATORY-GROUPS {                   ebnDirectoryGroup,                   ebnIsRscvGroup,                   ebnDirectoryConfigGroup,                   ebnCosMappingGroup,                   ebnSubnetRoutingListGroup }     -- Conditionally mandatory groups        GROUP hbnIsInGroup        DESCRIPTION            "The hbnIsInGroup is mandatory only for HPR extended border            nodes."        ::= {ebnCompliances 1 }   -- Group definitions   ebnDirectoryGroup OBJECT-GROUP        OBJECTS { ebnDirSubnetAffiliation }        STATUS current        DESCRIPTION            "The EBN-related directory objects."        ::= { ebnGroups 1 }   ebnIsRscvGroup OBJECT-GROUP        OBJECTS { ebnIsRscvDestinationRoute,                  ebnIsRscvDestinationCos }        STATUS current        DESCRIPTION            "Two objects representing RSCV and class of service            information saved by an EBN."        ::= { ebnGroups 2 }   ebnDirectoryConfigGroup OBJECT-GROUP        OBJECTS { ebnSearchCacheTime,                  ebnMaxSearchCache,                  ebnDefaultSubnetVisitCount }        STATUS currentClouston & Moore            Standards Track                    [Page 23]RFC 2457                Extended Border Node MIB           November 1998        DESCRIPTION            "The EBN Directory Configuration Group."        ::= { ebnGroups 3 }   ebnCosMappingGroup OBJECT-GROUP        OBJECTS {  ebnCosMapNativeCos }        STATUS current        DESCRIPTION            "The EBN COS Mapping Group."        ::= { ebnGroups 4 }   ebnSubnetRoutingListGroup OBJECT-GROUP        OBJECTS { ebnSubnetSearchDynamics,                  ebnSubnetSearchOrdering,                  ebnSearchCpName,                   ebnSearchSNVC }        STATUS current        DESCRIPTION            "The Subnet Routing List Group."        ::= { ebnGroups 5 }   hbnIsInGroup OBJECT-GROUP        OBJECTS { hbnIsInRtpNceId, hbnIsInRtpTcid }        STATUS current        DESCRIPTION            "The HBN-related Intermediate Session Objects."        ::= { ebnGroups 6 }  END5.0 Security Considerations   Certain management information defined in this MIB may be considered   sensitive in some network environments.  Therefore, authentication of   received SNMP requests and controlled access to management   information SHOULD be employed in such environments.  An   authentication protocol is defined in [10].  A protocol for access   control is defined in [11].   None of the read-only objects in the EBN MIB reports a password, user   data, or anything else that is particularly sensitive.  Some   enterprises view their network configuration itself, as well as   information about network usage and performance, as corporate assets;Clouston & Moore            Standards Track                    [Page 24]RFC 2457                Extended Border Node MIB           November 1998   such enterprises may wish to restrict SNMP access to most of the   objects in the MIB.   There are no read-write objects in the EBN MIB.6.0 Intellectual Property   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementers or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.7.0 Acknowledgments   This MIB module is the product of the IETF SNA NAU MIB WG and the AIW   APPN/HPR MIBs SIG.  Thanks to Dave Billing, Cisco Systems; Katie Lee,   IBM Corporation; and Marcia Peters, IBM Corporation, for their   contributions and review.8.0 References   [1]  Case, J., Fedor, M. Schoffstall, M. and J. Davin, "Simple        Network Management Protocol", STD 15, RFC 1157, May 1990.   [2]  McCloghrie, K., and M. Rose, "Management Information Base for        Network Management of TCP/IP-based internets: MIB-II", STD 17,        RFC 1213, March 1991.   [3]  Case, J., McCloghrie, K., Rose, M., and Waldbusser S.,        "Structure of Management Information for Version 2 of the Simple        Network Management Protocol (SNMPv2)", RFC 1902, January 1996.Clouston & Moore            Standards Track                    [Page 25]RFC 2457                Extended Border Node MIB           November 1998   [4]  Case, J., McCloghrie, K., Rose, M., and Waldbusser, S., "Textual        Conventions for Version 2 of the Simple Network Management        Protocol (SNMPv2)", RFC 1903, January 1996.   [5]  Case, J., McCloghrie, K., Rose, M., and Waldbusser, S.,        "Conformance Statements for Version 2 of the Simple Network        Management Protocol (SNMPv2)", RFC 1904, January 1996.   [6]  Case, J., McCloghrie, K., Rose, M., and Waldbusser, S.,        "Protocol Operations for Version 2 of the Simple Network        Management Protocol (SNMPv2)", RFC 1905, January 1996.   [7]  Harrington D., Presuhn, R. and B. Wijnen, "An Architecture for        Describing SNMP Management Frameworks", RFC 2271, January 1998.   [8]  Harrington D., Presuhn, R. and B. Wijnen, "Message Processing        and Dispatching for the Simple Network Management Protocol        (SNMP)", RFC 2272, January 1998.   [9]  Levi D., Meyer P. and B. Stewart, "SNMPv3 Applications", RFC        2273, January 1998.   [10] Blumenthal, U. and B. Wijnen, "User-based Security Model (USM)        for version 3 of the Simple Network Management Protocol        (SNMPv3)", RFC 2274, January 1998.   [11] Wijnen, B., Presuhn, R. and K. McCloghrie, "View-based Access        Control Model (VACM) for the Simple Network Management Protocol        (SNMP)", RFC 2275, January 1998.   [12] Hovey, R. and S. Bradner, "The Organizations Involved in the        IETF Standards Process", BCP 11, RFC 2028, October 1996.   [13] Bradner, S., "Key words for use in RFCs to Indicate Requirement        Levels", BCP 14, RFC 2119, March 1997.   [14] Clouston, B. and B. Moore, "Definition of Managed Objects for        APPN", RFC 2455, November 1998.   [15] IBM, APPN Extended Border Node Architecture Reference Version        1.0, available only via anonymous FTP at        networking.raleigh.ibm.com, as        /pub/standards/aiw/appn/bordernode/ebn4.psbin.   [16] IBM, SNA/MS Formats, GC31-8302-01Clouston & Moore            Standards Track                    [Page 26]RFC 2457                Extended Border Node MIB           November 19989.0 Authors' Addresses   Bob Clouston   Cisco Systems   7025 Kit Creek Road   P.O. Box 14987   Research Triangle Park, NC 27709, USA   Phone: +1-919-472-2333   EMail: clouston@cisco.com   Robert Moore   Dept. BRQA/Bldg. 501/G114   IBM Corporation   P.O.Box 12195   3039 Cornwallis   Research Triangle Park, NC 27709, USA   Phone: +1-919-254-4436   EMail: remoore@us.ibm.comClouston & Moore            Standards Track                    [Page 27]RFC 2457                Extended Border Node MIB           November 199810.0  Full Copyright Statement   Copyright (C) The Internet Society (1998).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Clouston & Moore            Standards Track                    [Page 28]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -