CISCO-PKI-PARTICIPATION-MIB: View SNMP OID List / Download MIB
VENDOR: CISCO
Home | MIB: CISCO-PKI-PARTICIPATION-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
cpkiMIB | 1.3.6.1.4.1.9.9.505 |
A networking device may provide several security services and protocols like SSL, SSH, IPSec/IKE etc. which need identities in the form of X509 certificates. The device uses these certificates (called identity certificates) to authenticate itself to various clients communicating with the device using these protocols and also to provide other protection for the communication like confidentiality, integrity and non-repudiation. In addition, the device may need to authenticate the clients which involves, among other things, verifying the certificates presented by the clients (peer certificates) during the protocol exchanges. The certificate verification, in turn, involves the certificate revocation status checking and the certificate signature verification. This MIB applies to the public key infrastructure (PKI) participation feature which enables a networking device to participate in one or more PKI services (also called Certificate Authorities) enabling it to obtain one or more X509 identity certificates for its own use as well as to verify peer certificates. This MIB organizes the various certificates, key-pairs and Certificate Authority related information into the tables: the trustpoint table for certificate and CA information and a key-pair table for the key-pair information for each type of key-pair such as RSA, DSA etc. An entry in the trustpoint table corresponds to a trusted CA for obtaining an identity certificate from and also for verifying the peer certificates issued by that CA. The entry contains information about the CA certificate, the identity certificate - if obtained - from the CA, the corresponding key-pair from a key-pair table (for which the identity certificate was obtained) and the information needed for revocation checking of certitifates issued by the CA. For each type (RSA, DSA etc.) of key-pair supported by the device, a key-pair table is present and contains an entry for each key-pair of that type present in the device. This allows future expansion of the MIB to support additional key-pair types (currently only RSA key-pair is supported). As seen above, a key-pair entry from a key-pair table can be associated to an entry in the trustpoint table. A key- pair entry can be associated to multiple trustpoint table entries but not vice versa. This MIB supports the certificate work-flow operations, generally used for generating the key-pairs and obtaining the certificates for them from various CAs. The following are the steps in one typical work-flow: 1. create a trustpoint (an entry in trustpoint table) in the device. 2. Authenticate a CA (this involves manually verifying the CA certificate/chain fingerprints and then inputing the CA certificate/chain into the trustpoint). 3. Generate a key-pair (an entry in key-pair table). 4. Associate the key-pair to the trustpoint. 5. Generate a pkcs#10 Certificate Signing Request (CSR) in the trustpoint. 7. Submit CSR to the CA and get the identity certificate. 9. Input the identity certificate into the trustpoint. In another typical certificate work-flow, the key-pair and the corresponding identity certificate are allowed to be generated/obtained outside the device by whatever means and then input to the device in the pkcs#12 form. This MIB does not support the configuration of individual security services like SSL, SSH, IPsec/IKE etc. to use particular trustpoints or certificates and key-pairs in them. Instead the security services certificate usage configuration is supported in the respective feature MIBs. Glossary of the terms used in this MIB: -------------------------------------- key-pair - A pair of public-key cryptographic keys in which one is public and the other private. RSA key-pair - A key-pair belonging to the RSA public-key cryptography algorithm. Certificate Authority (CA) - A service which issues X509 certificates to certify the identity (name) and public-key of end entities. X509 - A standard for certificates and CRLs. Reference: RFC 2459. CA certificate - The self-signed certificate of a CA certifying its own identity and public-key. CA certificate chain - If a CA is certified by another CA which, in turn, was certified by a third CA and so on, ending in a CA which is self-certified, the original CA is said to be a subordinate CA and its CA certificate is a chain which is the set of CA certificates of all CAs involved. Identity certificate - The certificate of a device issued by a CA in which the device identity and public-key are certified. Trustpoint - The various information about a CA (including its CA certificate/chain), which the device wants to trust so that it can use it to enroll with the CA to g et an identity certificate and/or use it to verify the peer certificates issed by the CA. Certificate fingerptint - The digest of a certificate computed using MD5 or SHA hash algorithm. CA authentication - The process of configuring the CA certificate/chain for a trustpoint. The process involves calculating the fingerprints of the CA certificates and verifying them against the same already published by the CAs. Enrollment - The process of creating a Certificate Signing Request in a trustpoint, submitting it to corresponding CA, getting back the identity certificate and inputing it into the trustpoint. Certificate verification - The process of verifying the signature on a certificate to see if it was really signed by the CA who issued it. This verification process uses the CA certificate/chain. The certificate verification also involves verifying the validity of certificate with respect to current time by checking against the validity interval given in the certificate and the revocation status of the certificate as maintained by the CA. Certificate Signing Request (CSR) - A request to a CA for signing a certificate of an entity. The request contains the public key, the name and other attributes of the entity. pkcs#10 - A standard syntax for the CSR, Reference: RFC 2986. pkcs#12 - A standard for exporting and importing a certificate along with associated key-pair and CA certificate/chain. Reference: PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA Laboratories, June 24, 1999 CRL - Certificate Revocation List, a list of certificates that are revoked, as maintained by a CA. OCSP - Online Certificate Staus Protocol, a protocol for online checking of the revocation status of certificates. PEM format - A printable text encoding format for certificates, key-pairs and CRLs, as employed by the Privacy Enhanced Mail standard. Reference: RFCs 1421-1424. |
||
cpkiMIBNotifs | 1.3.6.1.4.1.9.9.505.0 | |||
cpkiMIBObjects | 1.3.6.1.4.1.9.9.505.1 | |||
cpkiConfig | 1.3.6.1.4.1.9.9.505.1.1 | |||
cpkiRSAKeyPairTable | 1.3.6.1.4.1.9.9.505.1.1.1 | no-access |
A list of RSA key-pair entries. |
|
1.3.6.1.4.1.9.9.505.1.1.1.1 | no-access |
The RSA key-pair entry. The entry specifies the key-pair name, size, whether it is exportable and the filename where the key-pair is stored. Each entry corresponds to a RSA key-pair generated internally in the device or imported from outside. When a new entry is created, a new RSA key-pair is generated in the device and stored in a corresponding file. When an entry is deleted through row deletion, the corresponding key-pair is destroyed. The entry is not allowed to be modified after creation as a key-pair is not modifiable after its generation. |
||
cpkiRSAKeyPairName | 1.3.6.1.4.1.9.9.505.1.1.1.1.1 | snmpadminstring | no-access |
The unique name or label of key-pair. |
cpkiRSAKeyPairId | 1.3.6.1.4.1.9.9.505.1.1.1.1.2 | unsigned32 | read-only |
A unique identification nubmer of the RSA key-pair. This is included to support ordered lists of RSA key-pairs when needed. One such scenario where such ordered list may be needed is for per application configuration of key-pairs. |
cpkiRSAKeyPairSize | 1.3.6.1.4.1.9.9.505.1.1.1.1.3 | integer | read-only |
The size of the key. The following modulus sizes are defined: 512-bit, 768-bit, 1024-bit, 1536-bit and 2048-bit. Once created, the size cannot be changed. After key-pair has been deleted through row deletion, the entry can be created again with another size. Enumeration: 'rsa512': 1, 'rsa1024': 3, 'rsa2048': 5, 'rsa1536': 4, 'rsa768': 2. |
cpkiRSAPvtKeyFileName | 1.3.6.1.4.1.9.9.505.1.1.1.1.4 | snmpadminstring | read-only |
The name of the file storing the RSA private key. This filename is automatically generated from the key-pair name. It is a unix style '/' seperated string representing the absolute path of the file in the file system of the device |
cpkiRSAKeyPairExportable | 1.3.6.1.4.1.9.9.505.1.1.1.1.5 | truthvalue | read-only |
The key-pair is exportable through the 'exportpkcs12' PKI support action. Once created, the exportable flag value cannot be changed. After key-pair has been deleted through row deletion, the entry can be created again with another value for the exportable flag |
cpkiRSAKeyPairStorageType | 1.3.6.1.4.1.9.9.505.1.1.1.1.6 | storagetype | read-only |
The storage type for this conceptual row. |
cpkiRSAKeyPairConfigRowStatus | 1.3.6.1.4.1.9.9.505.1.1.1.1.7 | rowstatus | read-only |
The conceptual row status of the key-pair entry. Deleting an entry through row delete will fail if the entry is being pointed to from an instance from cpkiTrustPointTable. The objects in the entry may not be modified while the value of this object is active(1). An attempt to set these objects while the value of cpkiRSAKeyPairConfigRowStatus is active(1) will result in an inconsistentValue error. |
cpkiTrustPointTable | 1.3.6.1.4.1.9.9.505.1.1.2 | no-access |
A list of trustpoint, associated key-pair, certificates and revocation checking configuration entries. The table also provides control, actions, current operating state information and last action result information for the certificate work-flow if being carried out using the PKI support actions. |
|
1.3.6.1.4.1.9.9.505.1.1.2.1 | no-access |
The trustpoint configuration entry. This entry specifies the trustpoint name, the associated key-pair index, the identity certificate filename, some important attributes in the identity certificate and the issuer (CA) certificate filename and important attributes in the issuer certificate. The entry also specifies the certificate revocation checking methods and OCSP URL configuration. |
||
cpkiTrustPointName | 1.3.6.1.4.1.9.9.505.1.1.2.1.1 | snmpadminstring | no-access |
The unique name or label of a trustpoint. |
cpkiTrustPointId | 1.3.6.1.4.1.9.9.505.1.1.2.1.2 | unsigned32 | read-only |
A unique identification number of the trustpoint. This is included to support ordered lists of trustpoints when needed. One such scenario where such ordered list may be needed is for per application configuration of trustpoints for certificate selection |
cpkiKeyPairName | 1.3.6.1.4.1.9.9.505.1.1.2.1.3 | snmpadminstring | read-only |
The name of the associated key-pair from a key-pair table. If a key-pair is not yet associated, the value of this object will be a zero length string. If a key-pair is already associated, it can be modified only if the identity certificate is absent as indicated by a non-zero length string value of the object cpkiIssuerCertFileName. This is because of the fact that the identity certificate is certifying this key-pair. |
cpkiIdCertFileName | 1.3.6.1.4.1.9.9.505.1.1.2.1.4 | snmpadminstring | read-only |
The name of the file storing the identity certificate. It is a unix style '/' seperated string representing the absolute path of the file in the file system of the device. If there is no identity certificate obtained as yet, the value of this object will be a zero length string. This object gets its non-zero length string value after a successful 'certimport' or 'pkcs12import' PKI support action triggered on the object cpkiAction. This object gets set to zero length string when the identity certificate is deleted through a successful 'certdelete' action triggered on the object cpkiAction. |
cpkiIdCertSubjectName | 1.3.6.1.4.1.9.9.505.1.1.2.1.5 | snmpadminstring | read-only |
The subject name of the identity certificate. If there is no certificate (as indicated by a zero length string value of the object cpkiIdCertFileName) or no subject name in the certificate, the value of this object will be a zero length string. |
cpkiIdCertSerialNum | 1.3.6.1.4.1.9.9.505.1.1.2.1.6 | snmpadminstring | read-only |
The serial number of the identity certificate. If there is no certificate (as indicated by a zero length string value of the object cpkiIdCertFileName), the value of this object will be a zero length string. |
cpkiIdCertStartDate | 1.3.6.1.4.1.9.9.505.1.1.2.1.7 | dateandtime | read-only |
The time when the identity certificate starts to be valid, corresponding to the notBefore field in the certificate. If there is no certificate (as indicated by a zero length string value of the object cpkiIdCertFileName), the value of this object will be a zero length string. |
cpkiIdCertEndDate | 1.3.6.1.4.1.9.9.505.1.1.2.1.8 | dateandtime | read-only |
The time when the identity certificate validity ends, corresponding to the notAfter field in the certificate. If there is no certificate (as indicated by the zero length string value of the object cpkiIdCertFileName), the value of this object will be a zero length string. |
cpkiIdCertFingerPrint | 1.3.6.1.4.1.9.9.505.1.1.2.1.9 | snmpadminstring | read-only |
The MD5 fingerprint of the identity certificate in HEX string format. If there is no certificate (as indicated by a zero length string value of the object cpkiIdCertFileName), the value of this object will be a zero length string. |
cpkiIssuerCertFileName | 1.3.6.1.4.1.9.9.505.1.1.2.1.10 | snmpadminstring | read-only |
The name of the file storing the issuer certificate. It is a unix style '/' seperated string representing the absolute path of the file in the file system of the device. If there is no issuer certificate obtained yet, the value of this object will be a zero length string. This object gets its non-zero length string value after a successful 'caauth' PKI support action triggered on the object cpkiAction. This object gets set to zero length string when the issuer certificate is deleted through a successful 'cadelete' action triggered on the object cpkiAction. |
cpkiIssuerCertSubjectName | 1.3.6.1.4.1.9.9.505.1.1.2.1.11 | snmpadminstring | read-only |
The issuer name (subject name in issuer certificate which will be the same as the issuer name in the identity certificate if present). If there is no certificate (as indicated by a zero length string value of the object cpkiIssuerCertFileName), the value will be a zero length string. |
cpkiIssuerCertSerialNum | 1.3.6.1.4.1.9.9.505.1.1.2.1.12 | snmpadminstring | read-only |
The serial number of the issuer certificate. If there is no certificate (as indicated by a zero length string value of the object cpkiIssuerCertFileName), the value will be a zero length string. |
cpkiIssuerCertStartDate | 1.3.6.1.4.1.9.9.505.1.1.2.1.13 | dateandtime | read-only |
The time when the issuer certificate starts to be valid, corresponding to the notBefore field in the certificate. If there is no certificate (as indicated by a zero length string value of the object cpkiIssuerCertFileName), the value will be a zero length string. |
cpkiIssuerCertEndDate | 1.3.6.1.4.1.9.9.505.1.1.2.1.14 | dateandtime | read-only |
The time when the issuer certificate validity ends, corresponding to the notAfter field on in the certificate. If there is no certificate (as indicated by a zero length string value of the object cpkiIssuerCertFileName), the value will be a zero length string. |
cpkiIssuerCertFingerPrint | 1.3.6.1.4.1.9.9.505.1.1.2.1.15 | snmpadminstring | read-only |
The MD5 fingerprint of the issuer's certificate in HEX string format. If there is no certificate (as indicated by a zero length string value of cpkiIssuerCertFileName), the value of this object will be a zero length string. |
cpkiRevokeCheckMethods | 1.3.6.1.4.1.9.9.505.1.1.2.1.16 | octet string | read-only |
Revocation checking methods list which is an ordered list of certificate revocation checking methods to be employed while verifying peer certificates issued by the CA corresponding to this trust point entry. The value of this object is a ordered list of one or more 1-octet values, where each 1-octet value corresponds to a method in the revocation checking method enumeration: none (1) - No revocation status checking needed; instead consider the certificate as not revoked. crl (2) - Use CRL for checking the revocation status of certificates. ocsp (3) - Use OCSP for checking the revocation status of certificates. If 'none' occures in the list, it should be the last value. The octets after the last value in the ordered list should be zero octets. The order in which the revocation checking methods occur within the value of this object determines the order the revocation checking methods are attempted during the verification of a peer certificate. The default value of this object (after row creation) contains only the revocation checking method 'crl'. |
cpkiOCSPurl | 1.3.6.1.4.1.9.9.505.1.1.2.1.17 | snmpadminstring | read-only |
The contact http url of the external OCSP server for certificate revocation checking using OCSP protocol. The default value of this object (after row creation) is a zero length string |
cpkiAction | 1.3.6.1.4.1.9.9.505.1.1.2.1.18 | ciscopkiaction | read-only |
The PKI support action to be triggered for this trustpoint entry. The PKI support actions are steps in the certificate work-flow used to facilitate the configuration of the RSAkey-pair, identity certificate and CA certificates in a trustpoint. A PKI support action is triggered by setting this object to the corresponding value as defined in TC CiscoPkiAction. The value of this object and the values of the objects cpkiActionUrl and cpkiActionPassword are interpreted and applied together as single action trigger. All thease actions operate over the trustpoint and modify appropriate columns in the entry. An attempt to set this object when the value of the object cpkiActionResult is 'inProgress' will result in an inconsistentValue error. The work-flow nature of certificate operations requires that the trustpoint entry already exists. Some of the operation requires that some other previous operations are already performed successfully, as seen below. The following is a brief of each action semantics, its parameters and the result: 'caauth' - This action is used to authenticate a CA and configure its CA certificate/chain in this trustpoint. This is generally the first step in a certificate work-flow. It requires the parameter objects cpkiActionUrl and cpkiActionPassword set with appropriate values. The CA certificate/chain being installed should be available in PEM fromat in a file on bootflash. The filename is specified as 'bootflash: |
cpkiActionUrl | 1.3.6.1.4.1.9.9.505.1.1.2.1.19 | snmpadminstring | read-only |
The value of this object indicates the filename containig the input or output certificate data needed for the PKI support action being triggered on this entry. The filename should pe specified as 'bootflash: |
cpkiActionPassword | 1.3.6.1.4.1.9.9.505.1.1.2.1.20 | snmpadminstring | read-only |
The value of this object indicates the password required to perform the PKI support action being triggered. This password is required to be specified only for 'certreq', 'importpkcs12' and 'exportpkcs12' actions. For security reasons, the value of this object, whenever it is retrieved by the management prototcol, is always the zero length string. |
cpkiLastAction | 1.3.6.1.4.1.9.9.505.1.1.2.1.21 | ciscopkiaction | read-only |
The PKI support action attempted last. In otherwords, the value attempted to be set for cpkiAction object last. If no action has been triggered for the trustpoint after its creation, then retrieving the value of this object will return 'noop'. |
cpkiLastActionResult | 1.3.6.1.4.1.9.9.505.1.1.2.1.22 | ciscopkiactionresult | read-only |
The result of the execution of the last PKI support action (represented by the value of cpkiLastAction). When the value of this object is 'inProgress', an attempt to set the value of cpkiAction object will return inConsistentError. |
cpkiLastActionFailureReason | 1.3.6.1.4.1.9.9.505.1.1.2.1.23 | snmpadminstring | read-only |
The failure reason description for the failed execution of PKI support action. If the object cpkiActionResult has the value 'failed', then this object contains the reason string as to why it failed. Otherwise, the value of this object is a zero length string. |
cpkiTrustPointStorageType | 1.3.6.1.4.1.9.9.505.1.1.2.1.24 | storagetype | read-only |
The storage type for this conceptual row. |
cpkiTrustPointConfigRowStatus | 1.3.6.1.4.1.9.9.505.1.1.2.1.25 | rowstatus | read-only |
The conceptual row status of the trustpoint entry. After row creation, the value of this object will become active(1) as there is no prerequisite of certain objects to be set to make this object active. The various read-only objects of the row can be populated only by means of the various PKI support actions attempted by setting the cpkiAction object with appropriate value. Except the read-only objects mentioned, all other objects of the entry can be modified when the row is active subject to the restrictions, if any, specified for each |
cpkiMIBConform | 1.3.6.1.4.1.9.9.505.2 | |||
cpkiMIBCompliances | 1.3.6.1.4.1.9.9.505.2.1 | |||
cpkiMIBCompliance | 1.3.6.1.4.1.9.9.505.2.1.1 |
The compliance statement for entities which implement the CISCO-PKI-PARTICIPATION-MIB.my. |
||
cpkiMIBGroups | 1.3.6.1.4.1.9.9.505.2.2 | |||
cpkiConfigGroup | 1.3.6.1.4.1.9.9.505.2.2.1 |
A collection of objects for configurations of the PKI support |