rfc2591.txt

来自「中、英文RFC文档大全打包下载完全版 .」· 文本 代码 · 共 1,404 行 · 第 1/4 页

TXT
1,404
字号
            january, february, march, april, may, june,            july, august, september, october, november, december      }      schedDay.3.98.111.98.6.105.102.45.111.102.102 = {            d1, d2, d3, d4, d5, d6, d7, d8, d9, d10,            d11, d12, d13, d14, d15, d16, d17, d18, d19, d20,            d21, d22, d23, d24, d25, d26, d27, d28, d29, d30, d31      }      schedHour.3.98.111.98.6.105.102.45.111.102.102 = { h20 }Levi & Schoenwaelder        Standards Track                    [Page 19]RFC 2591                     Scheduling MIB                     May 1999      schedMinute.3.98.111.98.6.105.102.45.111.102.102 = { m30 }      schedValue.3.98.111.98.6.105.102.45.111.102.102 = down(2)      schedContextName.3.98.111.98.6.105.102.45.111.102.102 = ""      schedVariable.3.98.111.98.6.105.102.45.111.102.102 =        ifAdminStatus.6      schedType.3.98.111.98.6.105.102.45.111.102.102 = calendar(2)      schedAdminStatus.3.98.111.98.6.105.102.45.111.102.102 = enabled(1)      schedStorageType.3.98.111.98.6.105.102.45.111.102.102 =        nonVolatile(3)      schedRowStatus.3.98.111.98.6.105.102.45.111.102.102 = active(1)      The scheduling entry which brings the interface up on every Monday      morning at 5:30 is owned by schedOwner = "bob" and its name is      schedName = "if-on". The instance identifier for the scheduling      entry is therefore 3.98.111.98.5.105.102.45.111.110.      The entry in the schedTable which brings the interface up again on      every Monday morning at 5:30 looks as follows:      schedWeekDay.3.98.111.98.5.105.102.45.111.110 = { monday }      schedMonth.3.98.111.98.5.105.102.45.111.110 = {            january, february, march, april, may, june,            july, august, september, october, november, december      }      schedDay.3.98.111.98.5.105.102.45.111.110 = {            d1, d2, d3, d4, d5, d6, d7, d8, d9, d10,            d11, d12, d13, d14, d15, d16, d17, d18, d19, d20,            d21, d22, d23, d24, d25, d26, d27, d28, d29, d30, d31      }      schedHour.3.98.111.98.5.105.102.45.111.110 = { h5 }      schedMinute.3.98.111.98.5.105.102.45.111.110 = { m30 }      schedValue.3.98.111.98.5.105.102.45.111.110 = up(1)      schedContextName.3.98.111.98.5.105.102.45.111.110 = ""      schedVariable.3.98.111.98.5.105.102.45.111.110 = ifAdminStatus.6      schedType.3.98.111.98.5.105.102.45.111.110 = calendar(2)      schedAdminStatus.3.98.111.98.5.105.102.45.111.110 = enabled(1)      schedStorageType.3.98.111.98.5.105.102.45.111.110 = nonVolatile(3)      schedRowStatus.3.98.111.98.5.105.102.45.111.110 = active(1)   A similar configuration could be used to control other schedules. For   example, one could change the "if-on" and "if-off" schedules to   enable and disable the periodic scheduler defined in the first   example.Levi & Schoenwaelder        Standards Track                    [Page 20]RFC 2591                     Scheduling MIB                     May 19996.  Security Considerations   Scheduled SNMP set operations must use the security credentials that   were present when the corresponding row in the scheduling entry was   created.  An implementation must therefore record and maintain the   credentials for every scheduling entry.   An implementation must ensure that access control rules are applied   when doing the set operation. This is accomplished by calling the   isAccessAllowed abstract service interface defined in RFC 2271 [1]:      statusInformation =          -- success or errorIndication        isAccessAllowed(        IN   securityModel         -- Security Model in use        IN   securityName          -- principal who wants to access        IN   securityLevel         -- Level of Security        IN   viewType              -- read, write, or notify view        IN   contextName           -- context containing variableName        IN   variableName          -- OID for the managed object             )   The securityModel, securityName and securityLevel parameters are set   to the values that were recorded when the scheduling entry was   created. The viewType parameter must select the write view and the   contextName and variableName parameters are taken from the   schedContextName and schedVariableName values of the scheduling   entry.   This MIB limits scheduled actions to objects in the local MIB. This   avoids security problems with the delegation of access rights.   However, it might be possible for a user of this MIB to own some   schedules that might trigger far in the future. This can cause   security risks if the security administrator did not properly update   the access control lists when a user is withdrawn from an SNMP   engine. Therefore, entries in the schedTable SHOULD be cleaned up   whenever a user is removed from an SNMP engine.   To facilitate the provisioning of access control by a security   administrator using the View-Based Access Control Model (VACM)   defined in RFC 2275 [15] for tables in which multiple users may need   to independently create or modify entries, the initial index is used   as an "owner index". Such an initial index has a syntax of   SnmpAdminString, and can thus be trivially mapped to a securityName   or groupName as defined in VACM, in accordance with a security   policy.   All entries in related tables belonging to a particular user will   have the same value for this initial index.  For a given user's   entries in a particular table, the object identifiers for theLevi & Schoenwaelder        Standards Track                    [Page 21]RFC 2591                     Scheduling MIB                     May 1999   information in these entries will have the same subidentifiers   (except for the "column" subidentifier) up to the end of the encoded   owner index. To configure VACM to permit access to this portion of   the table, one would create vacmViewTreeFamilyTable entries with the   value of vacmViewTreeFamilySubtree including the owner index portion,   and vacmViewTreeFamilyMask "wildcarding" the column subidentifier.   More elaborate configurations are possible.7.  Intellectual Property   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.8.  Acknowledgments   This document was produced by the IETF Distributed Management   (DISMAN) working group.9.  References   [1]  Harrington, D., Presuhn, R. and B. Wijnen, "An Architecture for        Describing SNMP Management Frameworks", RFC 2271, January 1998.   [2]  Rose, M. and K. McCloghrie, "Structure and Identification of        Management Information for TCP/IP-based Internets", STD 16, RFC        1155, May 1990.   [3]  Rose, M. and K. McCloghrie, "Concise MIB Definitions", STD 16,        RFC 1212, March 1991.Levi & Schoenwaelder        Standards Track                    [Page 22]RFC 2591                     Scheduling MIB                     May 1999   [4]  Rose, M., "A Convention for Defining Traps for use with the        SNMP", RFC 1215, March 1991.   [5]  McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose,        M. and S. Waldbusser, "Structure of Management Information        Version 2 (SMIv2)", STD 58, RFC 2578, April 1999.   [6]  McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose,        M. and S. Waldbusser, "Textual Conventions for SMIv2", STD 58,        RFC 2579, April 1999.   [7]  McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose,        M. and S. Waldbusser, "Conformance Statements for SMIv2", STD        58, RFC 2580, April 1999.   [8]  Case, J., Fedor, M., Schoffstall, M. and J. Davin, "Simple        Network Management Protocol", STD 15, RFC 1157, May 1990.   [9]  Case, J., McCloghrie, K., Rose, M. and S. Waldbusser,        "Introduction to Community-based SNMPv2", RFC 1901, January        1996.   [10] Case, J., McCloghrie, K., Rose, M. and S. Waldbusser, "Transport        Mappings for Version 2 of the Simple Network Management Protocol        (SNMPv2)", RFC 1906, January 1996.   [11] Case, J., Harrington D., Presuhn R. and B. Wijnen, "Message        Processing and Dispatching for the Simple Network Management        Protocol (SNMP)", RFC 2272, January 1998.   [12] Blumenthal, U. and B. Wijnen, "User-based Security Model (USM)        for version 3 of the Simple Network Management Protocol        (SNMPv3)", RFC 2274, January 1998.   [13] Case, J., McCloghrie, K., Rose, M. and S. Waldbusser, "Protocol        Operations for Version 2 of the Simple Network Management        Protocol (SNMPv2)", January 1996.   [14] Levi, D., Meyer, P. and B. Stewart, "SNMPv3 Applications", RFC        2273, January 1998   [15] Wijnen, B., Presuhn, R. and K. McCloghrie, "View-based Access        Control Model (VACM) for the Simple Network Management Protocol        (SNMP)", RFC 2275, January 1998.   [16] Hovey, R. and S. Bradner, "The Organizations Involved in the        IETF Standards Process", BCP 11, RFC 2028, October 1996.Levi & Schoenwaelder        Standards Track                    [Page 23]RFC 2591                     Scheduling MIB                     May 1999   [17] Levi, D. and J. Schoenwaelder, "Definitions of Managed Objects        for the Delegation of Management Scripts", RFC 2592, May 1999.   [18] McCloghrie, K. and F. Kastenholz, "The Interfaces Group MIB        using SMIv2", RFC 2233, November 1997.   [19] Bradner, S., "Key words for use in RFCs to Indicate Requirement        Levels", BCP 14, RFC 2119, March 1997.10.  Editors' Addresses   David B. Levi   Nortel Networks   4401 Great America Parkway   Santa Clara, CA 95052-8185   U.S.A.   Phone: +1 423 686 0432   EMail: dlevi@nortelnetworks.com   Juergen Schoenwaelder   TU Braunschweig   Bueltenweg 74/75   38106 Braunschweig   Germany   Phone: +49 531 391-3283   EMail: schoenw@ibr.cs.tu-bs.deLevi & Schoenwaelder        Standards Track                    [Page 24]RFC 2591                     Scheduling MIB                     May 199911.  Full Copyright Statement   Copyright (C) The Internet Society (1999).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Levi & Schoenwaelder        Standards Track                    [Page 25]

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?