📄 rfc2299.txt
字号:
Ramos Informational [Page 6]RFC 2299 Summary of 2200-2299 January 19992277 Alvestrand Jan 1998 IETF Policy on Character Sets and LanguagesThis document is the current policies being applied by the InternetEngineering Steering Group (IESG) towards the standardization efforts inthe Internet Engineering Task Force (IETF) in order to help Internetprotocols fulfill these requirements. This document specifies anInternet Best Current Practices for the Internet Community, and requestsdiscussion and suggestions for improvements.2276 Sollins Jan 1998 Architectural Principles of Uniform Resource Name ResolutionThis document addresses the issues of the discovery of URN (UniformResource Name) resolver services that in turn will directly translateURNs into URLs (Uniform Resource Locators) and URCs (Uniform ResourceCharacteristics). This memo provides information for the Internetcommunity. It does not specify an Internet standard of any kind.2275 Wijnen Jan 1998 View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)This document describes the View-based Access Control Model for use inthe SNMP architecture [RFC2261]. It defines the Elements of Procedurefor controlling access to management information. This document alsoincludes a MIB for remotely managing the configuration parameters forthe View-based Access Control Model. [STANDARDS-TRACK]2274 Blumenthal Jan 1998 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)This document describes the User-based Security Model (USM) for SNMPversion 3 for use in the SNMP architecture [RFC2261]. It defines theElements of Procedure for providing SNMP message level security. Thisdocument also includes a MIB for remotely monitoring/managing theconfiguration parameters for this Security Model. [STANDARDS-TRACK]Ramos Informational [Page 7]RFC 2299 Summary of 2200-2299 January 19992273 Levi Jan 1998 SNMPv3 ApplicationsThis memo describes five types of SNMP applications which make use of anSNMP engine as described in [RFC2261]. The types of applicationdescribed are Command Generators, Command Responders, NotificationOriginators, Notification Receivers, and Proxy Forwarders. This memoalso defines MIB modules for specifying targets of managementoperations, for notification filtering, and for proxy forwarding.[STANDARDS-TRACK]2272 Case Jan 1998 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)This document describes the Message Processing and Dispatching for SNMPmessages within the SNMP architecture [RFC2271]. It defines theprocedures for dispatching potentially multiple versions of SNMPmessages to the proper SNMP Message Processing Models, and fordispatching PDUs to SNMP applications. This document also describes oneMessage Processing Model - the SNMPv3 Message Processing Model.[STANDARDS-TRACK]2271 Harrington Jan 1998 An Architecture for Describing SNMP Management FrameworksThis document describes an architecture for describing SNMP ManagementFrameworks. The architecture is designed to be modular to allow theevolution of the SNMP protocol standards over time. [STANDARDS-TRACK]2270 Stewart Jan 1998 Using a Dedicated AS for Sites Homed to a Single ProviderWith the increased growth of the Internet, the number of customers usingBGP4 has grown significantly. RFC1930 outlines a set of guidelines forwhen one needs and should use an AS. However, the customer and serviceprovider (ISP) are left with a problem as a result of this in that whilethere is no need for an allocated AS under the guidelines, certainconditions make the use of BGP4 a very pragmatic and perhaps only way toconnect a customer homed to a single ISP. This paper proposes asolution to this problem in line with recommendations set forth inRFC1930. This memo provides information for the Internet community. Itdoes not specify an Internet standard of any kind.Ramos Informational [Page 8]RFC 2299 Summary of 2200-2299 January 19992269 Armitage Jan 1998 Using the MARS Model in non-ATM NBMA NetworksThis document is intended to state the obvious equivalences, and explainthe less obvious implications. This memo provides information for theInternet community. It does not specify an Internet standard of anykind.2268 Rivest Mar 1998 A Description of the RC2(r) Encryption AlgorithmThis memo describes a conventional (secret-key) block encryptionalgorithm, called RC2, which may be considered as a proposal for a DESreplacement. This memo provides information for the Internet community.It does not specify an Internet standard of any kind.2267 Ferguson Jan 1998 Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address SpoofingThis paper discusses a simple, effective, and straightforward method forusing ingress traffic filtering to prohibit DoS attacks which use forgedIP addresses to be propagated from 'behind' an Internet ServiceProvider's (ISP) aggregation point. This memo provides information forthe Internet community. It does not specify an Internet standard of anykind.2266 Flick Jan 1998 Definitions of Managed Objects for IEEE 802.12 Repeater DevicesThis memo defines a portion of the Management Information Base (MIB) foruse with network management protocols in TCP/IP-based internets. Inparticular, it defines objects for managing network repeaters based onIEEE 802.12. [STANDARDS-TRACK]Ramos Informational [Page 9]RFC 2299 Summary of 2200-2299 January 19992265 Wijnen Jan 1998 View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)This document describes the View-based Access Control Model for use inthe SNMP architecture [RFC2261]. It defines the Elements of Procedurefor controlling access to management information. This document alsoincludes a MIB for remotely managing the configuration parameters forthe View-based Access Control Model. [STANDARDS-TRACK]2264 Blumenthal Jan 1998 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)This document describes the User-based Security Model (USM) for SNMPversion 3 for use in the SNMP architecture [RFC2261]. It defines theElements of Procedure for providing SNMP message level security. Thisdocument also includes a MIB for remotely monitoring/managing theconfiguration parameters for this Security Model. [STANDARDS-TRACK]2263 Levi Jan 1998 SNMPv3 ApplicationsThis memo describes five types of SNMP applications which make use of anSNMP engine as described in [RFC2261]. The types of applicationdescribed are Command Generators, Command Responders, NotificationOriginators, Notification Receivers, and Proxy Forwarders. This memoalso defines MIB modules for specifying targets of managementoperations, for notification filtering, and for proxy forwarding.[STANDARDS-TRACK]2262 Case Jan 1998 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)This document describes the Message Processing and Dispatching for SNMPmessages within the SNMP architecture [RFC2261]. It defines theprocedures for dispatching potentially multiple versions of SNMPmessages to the proper SNMP Message Processing Models, and fordispatching PDUs to SNMP applications. This document also describes oneMessage Processing Model - the SNMPv3 Message Processing Model.[STANDARDS-TRACK]Ramos Informational [Page 10]RFC 2299 Summary of 2200-2299 January 19992261 Harrington Jan 1998 An Architecture for Describing SNMP Management FrameworksThis document describes an architecture for describing SNMP ManagementFrameworks. The architecture is designed to be modular to allow theevolution of the SNMP protocol standards over time. [STANDARDS-TRACK]2260 Bates Jan 1998 Scalable Support for Multi-homed Multi-provider ConnectivityThis document describes addressing and routing strategies for multi-homed enterprises attached to multiple Internet Service Providers (ISPs)that are intended to reduce the routing overhead due to theseenterprises in the global Internet routing system. This memo providesinformation for the Internet community. It does not specify an Internetstandard of any kind.2259 Elliott Jan 1998 Simple Nomenclator Query Protocol (SNQP)The Simple Nomenclator Query Protocol (SNQP) allows a client tocommunicate with a descriptive name service or other relational-stylequery service. This memo provides information for the Internetcommunity. It does not specify an Internet standard of any kind2258 Ordille Jan 1998 Internet Nomenclator ProjectThe goal of the Internet Nomenclator Project is to integrate thehundreds of publicly available CCSO servers from around the world. Thisdocument provides an overview of the Nomenclator system, describes howto register a CCSO server in the Internet Nomenclator Project, and howto use the Nomenclator search engine to find people on the Internet.This memo provides information for the Internet community. It does notspecify an Internet standard of any kind.2257 Daniele Jan 1998 Agent Extensibility (AgentX) Protocol Version 1This memo defines a standardized framework for extensible SNMP agents.It defines processing entities called master agents and subagents, aprotocol (AgentX) used to communicate between them, and the elements ofprocedure by which the extensible agent processes SNMP protocolmessages. [STANDARDS-TRACK]Ramos Informational [Page 11]RFC 2299 Summary of 2200-2299 January 19992256 Wahl Dec 1997 A Summary of the X.500(96) User Schema for use with LDAPv3This document provides an overview of the attribute types and objectclasses defined by the ISO and ITU-T committees in the X.500 documents,in particular those intended for use by directory clients. [STANDARDS-TRACK]2255 Howes Dec 1997 The LDAP URL FormatThis document describes a format for an LDAP Uniform Resource Locator.[STANDARDS-TRACK]2254 Howes Dec 1997 The String Representation of LDAP Search FiltersThis document defines a human-readable string format for representingLDAP search filters. [STANDARDS-TRACK]2253 Wahl Dec 1997 Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished NamesThis specification defines the string format for representing names,which is designed to give a clean representation of commonly useddistinguished names, while being able to represent any distinguishedname. [STANDARDS-TRACK]2252 Wahl Dec 1997 Lightweight Directory Access Protocol (v3): Attribute Syntax DefinitionsThis document defines a set of syntaxes for LDAPv3, and the rules bywhich attribute values of these syntaxes are represented as octetstrings for transmission in the LDAP protocol. [STANDARDS-TRACK]Ramos Informational [Page 12]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -