CISCO-SNMP-VACM-EXT-MIB: View SNMP OID List / Download MIB
VENDOR: CISCO
Home | MIB: CISCO-SNMP-VACM-EXT-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
ciscoSnmpVacmExtMIB | 1.3.6.1.4.1.9.9.409 |
The management information definitions to extend the View-based Access Control Model (RFC3415) for SNMP. This MIB extends the 'SNMP-VIEW-BASED-ACM-MIB' to allow each combination of a 'securityModel' and a 'securityName' to be mapped into additional groupNames. The groups identified by these mappings are in addition to those identified by 'vacmGroupName' of the 'vacmSecurityToGroupTable'. |
||
ciscoSnmpVacmExtMIBObjects | 1.3.6.1.4.1.9.9.409.1 | |||
cvacmSecurityToGroupTable | 1.3.6.1.4.1.9.9.409.1.1 | no-access |
An Extension table to the 'vacmSecurityToGroupTable' defined in 'SNMP-VIEW-BASED-ACM-MIB. This table provides a mechanism to map a combination of 'securityModel' and 'securityName' into one or more groups in addition to the 'vacmGroupName' mapped in the 'vacmSecurityToGroupTable'. These groups provide additional access control policies for a principal. The agent must allow the same group mapping entry to be present in both the 'cvacmSecurityToGroupTable' and the 'vacmSecurityToGroupTable'. A row in this table can not exist without a corresponding row for the same combination of 'securityModel' and 'securityName in the 'vacmSecurityToGroupTable'. While creating a row in this table, if there is no corresponding row for the same combination of 'securityModel' and 'securityName in the 'vacmSecurityToGroupTable', the same mapping entry in is created in the 'vacmSecurityToGroupTable' by the agent using the values of instance variables of the entry in this table. The deletion of a row in the 'vacmSecurityToGroupTable' also causes the deletion of all the group mapping entries for the same combination of 'vacmSecurityModel' and 'vacmSecurityName' in the 'cvacmSecurityToGroupTable'. The deletion of a row in this table does not affect 'vacmSecurityToGroupTable'entries. |
|
1.3.6.1.4.1.9.9.409.1.1.1 | no-access |
An entry (conceptual row) in the 'cvacmSecurityToGroupTable'. Each row represents one groupName mapping for the combination of 'securityModel' and 'securityName' in the system. |
||
cvacmSecurityGrpName | 1.3.6.1.4.1.9.9.409.1.1.1.1 | snmpadminstring | no-access |
The name of the group for the mapping represented by this row. This is in addition to the 'vacmGroupName' mapped in the 'vacmSecurityToGroupTable'. For example a user principal represented by 'securityName' maps to a group represented by 'cvacmSecurityGrpName' under a security model represented by 'securityModel'. This groupName is used as index into the 'vacmAccessTable' to select an access control policy. However, a value in this table does not imply that an instance with the value exists in table 'vacmAccesTable'. |
cvacmSecurityGrpStorageType | 1.3.6.1.4.1.9.9.409.1.1.1.2 | storagetype | read-only |
The storage type for this conceptual row. Conceptual rows having the value 'permanent' need not allow write-access to any columnar objects in the row. |
cvacmSecurityGrpStatus | 1.3.6.1.4.1.9.9.409.1.1.1.3 | rowstatus | read-only |
The status of this conceptual row. The value of this object has no effect on whether other objects in this conceptual row can be modified. |
ciscoSnmpVacmExtMIBConformance | 1.3.6.1.4.1.9.9.409.2 | |||
ciscoSnmpVacmExtMIBCompliances | 1.3.6.1.4.1.9.9.409.2.1 | |||
ciscoSnmpVacmExtMIBCompliance | 1.3.6.1.4.1.9.9.409.2.1.1 |
The compliance statement for SNMP engines which implement the CISCO-SNMP-VACM-EXT-MIB. |
||
ciscoSnmpVacmExtMIBGroups | 1.3.6.1.4.1.9.9.409.2.2 | |||
ciscoSnmpVacmExtGroup | 1.3.6.1.4.1.9.9.409.2.2.1 |
A collection of objects providing for remote configuration of an SNMP engine which extends the SNMP View-based Access Control Model. |