CISCOSB-SSH-MIB: View SNMP OID List / Download MIB
VENDOR: CISCO
Home | MIB: CISCOSB-SSH-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
rlSsh | 1.3.6.1.4.1.9.6.1.101.78 |
The MIB module describes the private MIB for SSH supported by CISCOSB's software and products. |
||
rlSshMibVersion | 1.3.6.1.4.1.9.6.1.101.78.1 | integer | read-only |
The MIB version. The current version is 2 |
rlSshServer | 1.3.6.1.4.1.9.6.1.101.78.2 | |||
rlSshServerHostPublicKeyTable | 1.3.6.1.4.1.9.6.1.101.78.2.1 | no-access |
This table contains the router's public key. Each row in this table contains a fragment of the key, in printable binhex format. There may be up to 160 characters in every fragment, and they are all combined to form one key. The key is generated by writing to rlSshServerRegenerateHostKey. To cause clients to connect to this router without printing warning messages (and also prevent active man-in-the-middle), the router's public key must printed out and inserted into the client's authorized_keys file |
|
1.3.6.1.4.1.9.6.1.101.78.2.1.1 | no-access |
The row definition for this table. |
||
rlSshServerHostPublicKeyAlgorithm | 1.3.6.1.4.1.9.6.1.101.78.2.1.1.1 | rlsshpublickeyalgorithm | read-only |
Identifies the type of public key to be displayed. |
rlSshServerHostPublicKeyFragmentId | 1.3.6.1.4.1.9.6.1.101.78.2.1.1.2 | unsigned32 | read-only |
Identifies the index of this fragment in the final key. All segments must be combined to form one big key. |
rlSshServerHostPublicKeyFragmentText | 1.3.6.1.4.1.9.6.1.101.78.2.1.1.3 | displaystring | read-only |
A part of the readable text entry for the server's public authorzation key. |
rlSshServerHostPublicKeyFingerprintTable | 1.3.6.1.4.1.9.6.1.101.78.2.2 | no-access |
This table contains the fingerprint for the router's public key. |
|
1.3.6.1.4.1.9.6.1.101.78.2.2.1 | no-access |
The row definition for this table. |
||
rlSshServerHostPublicKeyFingerprintAlgorithm | 1.3.6.1.4.1.9.6.1.101.78.2.2.1.1 | rlsshpublickeyalgorithm | read-only |
Identifies the type of public key to be displayed. |
rlSshServerHostPublicKeyFingerprintDigestFormat | 1.3.6.1.4.1.9.6.1.101.78.2.2.1.2 | rlsshpublickeydigestformat | read-only |
Format of the digest to be displayed (OpenSSH or SSH.com). |
rlSshServerHostPublicKeyFingerprint | 1.3.6.1.4.1.9.6.1.101.78.2.2.1.3 | displaystring | read-only |
SECSH format fingerprint of the server's public key. To prevent man in the middle attacks, users should make sure the ssh Server's fingerprint, as printed in the connection process, is similar to the one printed here. |
rlSshServerAuthorizedUsersPublicKeyTable | 1.3.6.1.4.1.9.6.1.101.78.2.3 | no-access |
This table contains public keys for all users who are authorized to access the router. For a user to be able to log in using SSH, the user name must appear in this table, and the user's public key must match the one found here. |
|
1.3.6.1.4.1.9.6.1.101.78.2.3.1 | no-access |
The row definition for this table. |
||
rlSshServerAuthorizedUserName | 1.3.6.1.4.1.9.6.1.101.78.2.3.1.1 | displaystring | read-write |
Name of the user who owns this public key. Both the user name and the key bytes must match before a user is authenticated using this key. |
rlSshServerAuthorizedUserPublicKeyFragmentId | 1.3.6.1.4.1.9.6.1.101.78.2.3.1.2 | unsigned32 | read-write |
Identifies the index of this fragment in the final key. All segments must be combined to form one big key. |
rlSshServerAuthorizedUserPublicKeyFragmentText | 1.3.6.1.4.1.9.6.1.101.78.2.3.1.3 | displaystring | read-write |
A part of the readable text entry for the user's public authorzation key. |
rlSshServerAuthorizedUserPublicKeyFragmentStatus | 1.3.6.1.4.1.9.6.1.101.78.2.3.1.4 | rowstatus | read-write |
Create or delete a fragment of the user's public key. A user is deleted if it has no remaining fragments. |
rlSshServerAuthorizedUsersPublicKeyFingerprintTable | 1.3.6.1.4.1.9.6.1.101.78.2.5 | no-access |
This table contains the fingerprints of the public keys for all users who are authorized to access the router. To prevent man in the middle attacks, users should make sure the user's fingerprint, as printed in the connection process, is similar to the one printed here. |
|
1.3.6.1.4.1.9.6.1.101.78.2.5.1 | no-access |
The row definition for this table. |
||
rlSshServerAuthorizedUserFingerprintName | 1.3.6.1.4.1.9.6.1.101.78.2.5.1.1 | displaystring | read-write |
Name of the user who owns this public key. Both the user name and the key bytes must match before a user is authenticated using this key. |
rlSshServerAuthorizedUserPublicKeyFingerprintAlgorithm | 1.3.6.1.4.1.9.6.1.101.78.2.5.1.2 | rlsshpublickeyalgorithm | read-only |
Identifies the type of public key to be displayed. |
rlSshServerAuthorizedUserPublicKeyFingerprintDigestFormat | 1.3.6.1.4.1.9.6.1.101.78.2.5.1.3 | rlsshpublickeydigestformat | read-only |
Format of the digest to be displayed (OpenSSH or SSH.com). |
rlSshServerAuthorizedUserPublicKeyFingerprint | 1.3.6.1.4.1.9.6.1.101.78.2.5.1.4 | displaystring | read-only |
SECSH format fingerprint of the user's public key. To prevent man in the middle attacks, users should make sure their ssh fingerprint, as printed in the connection process, is similar to the one printed here. |
rlSshServerSessionTable | 1.3.6.1.4.1.9.6.1.101.78.2.6 | no-access |
Each row in this table corresponds to an active SSH session with the server |
|
1.3.6.1.4.1.9.6.1.101.78.2.6.1 | no-access |
The row definition for this table. |
||
rlSshServerSessionIdentifier | 1.3.6.1.4.1.9.6.1.101.78.2.6.1.1 | unsigned32 | read-only |
Identifies the connection to which this row corresponds. |
rlSshServerSessionPeerAddress | 1.3.6.1.4.1.9.6.1.101.78.2.6.1.2 | ipaddress | read-only |
The network address of the remote host connected to the server. |
rlSshServerSessionPeerPort | 1.3.6.1.4.1.9.6.1.101.78.2.6.1.3 | unsigned32 | read-only |
The source network port of the remote host connected to the server. |
rlSshServerSessionPeerVersion | 1.3.6.1.4.1.9.6.1.101.78.2.6.1.4 | displaystring | read-only |
The client version of the remote host connected to the server. |
rlSshServerSessionUsername | 1.3.6.1.4.1.9.6.1.101.78.2.6.1.5 | displaystring | read-only |
SSH authenticated name of user connected to the server. |
rlSshServerSessionCipher | 1.3.6.1.4.1.9.6.1.101.78.2.6.1.6 | displaystring | read-only |
Data encryption cipher used in this connection. |
rlSshServerSessionHMAC | 1.3.6.1.4.1.9.6.1.101.78.2.6.1.7 | displaystring | read-only |
Message authentication code used in this connection. |
rlSshServerSessionInetTable | 1.3.6.1.4.1.9.6.1.101.78.2.7 | no-access |
Each row in this table corresponds to an active SSH session with the server |
|
1.3.6.1.4.1.9.6.1.101.78.2.7.1 | no-access |
The row definition for this table. |
||
rlSshServerSessionInetIdentifier | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.1 | unsigned32 | read-only |
Identifies the connection to which this row corresponds. |
rlSshServerSessionInetPeerAddressType | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.2 | inetaddresstype | read-only |
The network address of the remote host connected to the server. |
rlSshServerSessionInetPeerAddress | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.3 | inetaddress | read-only |
The network address of the remote host connected to the server. |
rlSshServerSessionInetPeerPort | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.4 | unsigned32 | read-only |
The source network port of the remote host connected to the server. |
rlSshServerSessionInetPeerVersion | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.5 | displaystring | read-only |
The client version of the remote host connected to the server. |
rlSshServerSessionInetUsername | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.6 | displaystring | read-only |
SSH authenticated name of user connected to the server. |
rlSshServerSessionInetCipher | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.7 | displaystring | read-only |
Data encryption cipher used in this connection. |
rlSshServerSessionInetHMAC | 1.3.6.1.4.1.9.6.1.101.78.2.7.1.8 | displaystring | read-only |
Message authentication code used in this connection. |
rlSshServerImportExportSelfKeyTable | 1.3.6.1.4.1.9.6.1.101.78.2.8 | no-access |
This table can be used for 2 purposes: 1) Importing public/private key pair to serve as the device key when acting as SSH server. This is done by setting entries to this table, according to the specified format. When the last entry (footer) is set, the whole key pair is checked and if valid, stored in CDB. 2) Exporting the device SSH server public/private key. This can be done by performing GetNext operations on this table. |
|
1.3.6.1.4.1.9.6.1.101.78.2.8.1 | no-access |
The row definition for this table. |
||
rlSshServerImportExportSelfKeyAlgorithm | 1.3.6.1.4.1.9.6.1.101.78.2.8.1.1 | rlsshpublickeyalgorithm | no-access |
Identifies the type of key pair. |
rlSshServerImportExportSelfKeyFormat | 1.3.6.1.4.1.9.6.1.101.78.2.8.1.2 | integer | no-access |
Specifies the format of public/key pair. The following formats are supported for import/export: 1) uuencoded_format - in this format both private and public key are in uu-encoded format, and are seperated from one another by header and footer. An example of the concateneation of all fragments in this format is: -----BEGIN RSA PRIVATE KEY----- tDaNkZZoCxXfkLLsLDlZ6T9H8U4Gz637eRV7BYBpapkidAxY1UG0/qgfKLPkbId4wzht6ArV9bE4fMtX wSMOxL3q31pOmUdVhjbWYcgZQBDy1DjFSbuIEdP85c96B9bBE2nPv90mSvb/6j8R2NItT/KJeiYMtLtI N3m6/zESKJGIrX0jP1RFDjVZSS5chSAFgB0egsLZEyOQn7jAqpX/x/easD2J6F/OjPXlJ9Hff2tMb3NU QYyBoWH2J9IxhWB6Vo66R9Y04JGR18uL/rV2sMCtpg5ppkVTEpNTp9qE1yXocR2NmzUfNFap+GJ4IHj8 CzkVfmJM/kEWaJsYgHbAgLyRg4QVyelfobv1B71aQ+u1z9KGu/QajkWdR04OQfsGOL1CvU2LGYDcRjfH jv+jl/UkDRRjoD9kt2WvouT+OL6esvKl0OJBqWbGNXg9TWv/VLtJIwgUno+MLaJuOM4Fh44+wpnqUXwQ TFtBFc8pzt5BoOwbv9gXpicTkq4/+GhwXWXxSVFebKhnHAvKSLT+Ba7K7ZeR8EIIxbXdDNFOiS45R2KI jxxXLXK44u6KGl5MygCKXUOFlJ+Zhgrq6ZH17z/RVJQ2CWqb5Ekn9GY3kH9QZ3mb4MDPfriWi2lHGXHY JmJd4SLQhpBdnOS5tu84QmyU3dNbAdzghDsR+dEY/6g7Cn0kcVkeHNZ0H+mCZik5f6XBD8eplkk43bdR FrkwTeAjwurGcKwdiKkR4DlfSq3DKssVBucTqUpqsKqPXLwTIL44rWKhEPXgGPB2XDG0VLvIRKkAgEGI LNTwOm091Ro= -----END RSA PRIVATE KEY----- -----BEGIN RSA PUBLIC KEY----- MIGHAoGBAOeIC9gRg3YaEGGMp3C00qNwLINAEDZV/J4BWM5WnWwCWZyHXDs2XiEmFu0ZONAD4gcT2f2f NNfCBPye39VVuOkKQuSV0MLLX5800LZ4y1BNcPzPZHpnGaCzl7iAjhfj9MolzAh5VRjeiYt0t1um4dm+ q9A4BtfpJqDYxCW9uxd/AgEj -----END RSA PUBLIC KEY----- Enumeration: 'uuencoded-format': 1. |
rlSshServerImportExportSelfKeyFragmentId | 1.3.6.1.4.1.9.6.1.101.78.2.8.1.3 | integer | no-access |
Identifies the index of this fragment in the key pair input/output. |
rlSshServerImportExportSelfKeyFragmentText | 1.3.6.1.4.1.9.6.1.101.78.2.8.1.4 | octet string | read-write |
A part of the readable text entry for the key pair input/output. |
rlSshServerPort | 1.3.6.1.4.1.9.6.1.101.78.2.101 | unsigned32 | read-write |
Specifies the TCP port used by the SSH 2 Server to listen for incoming connections. |
rlSshServerEnable | 1.3.6.1.4.1.9.6.1.101.78.2.102 | integer | read-write |
Enables listening for incoming SSH2 connections on the port defined in rlSshServerPort. Enumeration: 'enable': 1, 'disable': 2. |
rlSshServerEnablePublicKeyAuthentication | 1.3.6.1.4.1.9.6.1.101.78.2.103 | integer | read-write |
If PK authentication is enabled, incoming SSH connections are authenticated using public key authentication (using rlSshServerAuthorizedUsersPublicKeyTable), before authenticating using the router's standard AAA. Enumeration: 'enable': 1, 'disable': 2. |
rlSshServerRegenerateHostKey | 1.3.6.1.4.1.9.6.1.101.78.2.104 | rlsshpublickeyalgorithm | read-write |
Setting to a value other than none results in the Server (Host) Key being regenerated. The key size is host-specific. |
rlSshServerDefaultKeyFlag | 1.3.6.1.4.1.9.6.1.101.78.2.105 | integer | read-only |
This scalar indicates which of the SSH server keys are default keys (automatically generated). Enumeration: 'all': 3, 'rsa': 1, 'none': 4, 'dsa': 2. |
rlSshServerDeleteSelfKey | 1.3.6.1.4.1.9.6.1.101.78.2.106 | rlsshpublickeyalgorithm | read-write |
Setting to a value other than 'none' results in deleting the server self key of the chosen type. As a result a default key may be created (according to the MTSC..) |
rlSshServerEnablePublicKeyAuthAutoLogin | 1.3.6.1.4.1.9.6.1.101.78.2.107 | integer | read-write |
If PK authentication is succesfull and AAA local DB method is enabled for SSH line, the username is checked with AAA local DB. If present, the user is authenticated automatically without prompting for username or password. Enumeration: 'enable': 1, 'disable': 2. |
rlSshServerEnablePasswordAuthentication | 1.3.6.1.4.1.9.6.1.101.78.2.108 | integer | read-write |
If password authentication is enabled, incoming SSH connections are authenticated with username/password authentication using the router's standard AAA. Enumeration: 'enable': 1, 'disable': 2. |
rlSshClient | 1.3.6.1.4.1.9.6.1.101.78.3 | |||
rlSshClientUserName | 1.3.6.1.4.1.9.6.1.101.78.3.1 | displaystring | read-write |
Specifies the default user name the ssh client will use when authenticating to a remote server. In SCP sessions this global user name will be used unless a specific user name has been specified for the operation. The value of this MIB must not contain charachters ':' or '@' (those are used to indicate parameters seperation in SCP copy). |
rlSshClientRegenerateSelfKey | 1.3.6.1.4.1.9.6.1.101.78.3.2 | rlsshpublickeyalgorithm | read-write |
Setting to a value other than none results in the client self key being regenerated. The key size is host-specific. |
rlSshClientSelfPublicKeyTable | 1.3.6.1.4.1.9.6.1.101.78.3.3 | no-access |
This table contains the router's client self public key. Each row in this table contains a fragment of the key, in printable binhex format. There may be up to 160 characters in every fragment, and they are all combined to form one key. The key is generated by writing to rlSshClientRegenerateSelfKey. To cause clients to connect to this router without printing warning messages (and also prevent active man-in-the-middle), the router's public key must printed out and inserted into the client's authorized_keys file |
|
1.3.6.1.4.1.9.6.1.101.78.3.3.1 | no-access |
The row definition for this table. |
||
rlSshClientSelfPublicKeyFragmentId | 1.3.6.1.4.1.9.6.1.101.78.3.3.1.1 | unsigned32 | read-only |
Identifies the index of this fragment in the final key. All segments must be combined to form one big key. |
rlSshClientSelfPublicKeyAlgorithm | 1.3.6.1.4.1.9.6.1.101.78.3.3.1.2 | rlsshpublickeyalgorithm | read-only |
Identifies the type of public key to be displayed. |
rlSshClientSelfPublicKeyFragmentText | 1.3.6.1.4.1.9.6.1.101.78.3.3.1.3 | displaystring | read-write |
A part of the readable text entry for the router's client public authorization key. |
rlSshClientSelfPublicKeyFingerprintTable | 1.3.6.1.4.1.9.6.1.101.78.3.4 | no-access |
This table contains the fingerprint for the client's self key. |
|
1.3.6.1.4.1.9.6.1.101.78.3.4.1 | no-access |
The row definition for this table. |
||
rlSshClientSelfPublicKeyFingerprintAlgorithm | 1.3.6.1.4.1.9.6.1.101.78.3.4.1.1 | rlsshpublickeyalgorithm | read-only |
Identifies the type of public key to be displayed. |
rlSshClientSelfPublicKeyFingerprintDigestFormat | 1.3.6.1.4.1.9.6.1.101.78.3.4.1.2 | rlsshpublickeydigestformat | read-only |
Format of the digest to be displayed (OpenSSH or SSH.com). |
rlSshClientSelfPublicKeyFingerprint | 1.3.6.1.4.1.9.6.1.101.78.3.4.1.3 | displaystring | read-only |
SECSH format fingerprint of the client's self key. To prevent man in the middle attacks, users should make sure the ssh Server's fingerprint, as printed in the connection process, is similar to the one printed here. |
rlSshClientAuthenticationMethod | 1.3.6.1.4.1.9.6.1.101.78.3.5 | integer | read-write |
Specifies the global authentication method for SSH client. SSH client will apply this authentication method upon connecting to a remote server, if no specific authentication method has been defined for this operation. Enumeration: 'password': 3, 'public-key-dsa': 2, 'public-key-rsa': 1. |
rlSshClientPassword | 1.3.6.1.4.1.9.6.1.101.78.3.6 | displaystring | read-write |
Specifies the global password for SSH client, to be used for 'password' authentication. SSH client will use this password during authentication phase (when connecting remote server), in case no specific password has been specified for this operation. The value of this MIB must not contain charachters ':' or '@' (those are used to indicate parameters seperation in SCP copy). |
rlSshClientPasswordChangeTable | 1.3.6.1.4.1.9.6.1.101.78.3.7 | no-access |
This table allows the user to change the password in a remote SSH server. It should be used when working with 'password' authentication with remote server in SCP sessions. Set operation on this table will initiate SCP session with the SSH server whose inet address is specified in the key rlSshClientPasswordChangeInetAddress. During this session the password for username rlSshClientPasswordChangeUsername will be changed in the server from rlSshClientPasswordChangeOldPassword to rlSshClientPasswordChangeNewPassword. The Set operation might fail, in case an SCP session is already being held. In case 'noError' is returned, the user can poll the fields rlSshClientPasswordChangeStatus and rlSshClientPasswordChangeFailureReason in order to get information on operation status and possible failure reason. Note: up to 3 status records can be saved. |
|
1.3.6.1.4.1.9.6.1.101.78.3.7.1 | no-access |
The row definition for this table. |
||
rlSshClientPasswordChangeInetAddrType | 1.3.6.1.4.1.9.6.1.101.78.3.7.1.1 | inetaddresstype | no-access |
Specifies the inet address type of remote SCP server |
rlSshClientPasswordChangeInetAddr | 1.3.6.1.4.1.9.6.1.101.78.3.7.1.2 | inetaddress | no-access |
Specifies the inet address of remote SCP server |
rlSshClientPasswordChangeUsername | 1.3.6.1.4.1.9.6.1.101.78.3.7.1.3 | displaystring | read-write |
Specifies the username for which the password change is required. |
rlSshClientPasswordChangeOldPassword | 1.3.6.1.4.1.9.6.1.101.78.3.7.1.4 | displaystring | read-write |
Specifies the old password that was in use for rlSshClientPasswordChangeUsername until now. Upon setting a value in this entry, length of this field value must be 6-70. Password of length 0 will always be returned on GET operations. |
rlSshClientPasswordChangeNewPassword | 1.3.6.1.4.1.9.6.1.101.78.3.7.1.5 | displaystring | read-write |
Specifies the new password that should be in use for rlSshClientPasswordChangeUsername from now on. Upon setting a value in this entry, length of this field value must be 6-70. Password of length 0 will always be returned on GET operations. |
rlSshClientPasswordChangeStatus | 1.3.6.1.4.1.9.6.1.101.78.3.7.1.6 | integer | read-only |
Specifies the status of last password change operation on remote server identified by rlSshClientPasswordChangeInetAddress. In case this data was erased (3 or more password change operations have been performed since the operation on this server), the status will be 'noData'. Enumeration: 'failed': 3, 'inProgress': 1, 'noData': 4, 'succeeded': 2. |
rlSshClientPasswordChangeFailureReason | 1.3.6.1.4.1.9.6.1.101.78.3.7.1.7 | displaystring | read-only |
In case the value of rlSshClientPasswordChangeStatus is 'failed', this field will contain the failure reason. |
rlSshClientDeleteSelfKey | 1.3.6.1.4.1.9.6.1.101.78.3.8 | rlsshpublickeyalgorithm | read-write |
Setting to a value other than 'none' results in deleting the client self key of the chosen type. |
rlSshClientImportExportSelfKeyTable | 1.3.6.1.4.1.9.6.1.101.78.3.9 | no-access |
This table can be used for 2 purposes: 1) Importing public/private key pair to serve as the device key when acting as SSH client. This is done by setting entries to this table, according to the specified format. When the last entry (footer) is set, the whole key pair is checked and if valid, stored in CDB. 2) Exporting the device SSH client public/private key. This can be done by performing GetNext operations on this table. |
|
1.3.6.1.4.1.9.6.1.101.78.3.9.1 | no-access |
The row definition for this table. |
||
rlSshClientImportExportSelfKeyAlgorithm | 1.3.6.1.4.1.9.6.1.101.78.3.9.1.1 | rlsshpublickeyalgorithm | no-access |
Identifies the type of key pair. |
rlSshClientImportExportSelfKeyFormat | 1.3.6.1.4.1.9.6.1.101.78.3.9.1.2 | integer | no-access |
Specifies the format of public/key pair. The following formats are supported for import/export: 1) uuencoded_format - in this format both private and public key are in uu-encoded format, and are seperated from one another by header and footer. An example of the concateneation of all fragments in this format is: -----BEGIN ENCRYPTED RSA PRIVATE KEY----- tDaNkZZoCxXfkLLsLDlZ6T9H8U4Gz637eRV7BYBpapkidAxY1UG0/qgfKLPkbId4wzht6ArV9bE4fMtX wSMOxL3q31pOmUdVhjbWYcgZQBDy1DjFSbuIEdP85c96B9bBE2nPv90mSvb/6j8R2NItT/KJeiYMtLtI N3m6/zESKJGIrX0jP1RFDjVZSS5chSAFgB0egsLZEyOQn7jAqpX/x/easD2J6F/OjPXlJ9Hff2tMb3NU QYyBoWH2J9IxhWB6Vo66R9Y04JGR18uL/rV2sMCtpg5ppkVTEpNTp9qE1yXocR2NmzUfNFap+GJ4IHj8 CzkVfmJM/kEWaJsYgHbAgLyRg4QVyelfobv1B71aQ+u1z9KGu/QajkWdR04OQfsGOL1CvU2LGYDcRjfH jv+jl/UkDRRjoD9kt2WvouT+OL6esvKl0OJBqWbGNXg9TWv/VLtJIwgUno+MLaJuOM4Fh44+wpnqUXwQ TFtBFc8pzt5BoOwbv9gXpicTkq4/+GhwXWXxSVFebKhnHAvKSLT+Ba7K7ZeR8EIIxbXdDNFOiS45R2KI jxxXLXK44u6KGl5MygCKXUOFlJ+Zhgrq6ZH17z/RVJQ2CWqb5Ekn9GY3kH9QZ3mb4MDPfriWi2lHGXHY JmJd4SLQhpBdnOS5tu84QmyU3dNbAdzghDsR+dEY/6g7Cn0kcVkeHNZ0H+mCZik5f6XBD8eplkk43bdR FrkwTeAjwurGcKwdiKkR4DlfSq3DKssVBucTqUpqsKqPXLwTIL44rWKhEPXgGPB2XDG0VLvIRKkAgEGI LNTwOm091Ro= -----END RSA PRIVATE KEY----- -----BEGIN RSA PUBLIC KEY----- MIGHAoGBAOeIC9gRg3YaEGGMp3C00qNwLINAEDZV/J4BWM5WnWwCWZyHXDs2XiEmFu0ZONAD4gcT2f2f NNfCBPye39VVuOkKQuSV0MLLX5800LZ4y1BNcPzPZHpnGaCzl7iAjhfj9MolzAh5VRjeiYt0t1um4dm+ q9A4BtfpJqDYxCW9uxd/AgEj -----END RSA PUBLIC KEY----- Enumeration: 'uuencoded-format': 1. |
rlSshClientImportExportSelfKeyFragmentId | 1.3.6.1.4.1.9.6.1.101.78.3.9.1.3 | integer | no-access |
Identifies the index of this fragment in the key pair input/output. |
rlSshClientImportExportSelfKeyFragmentText | 1.3.6.1.4.1.9.6.1.101.78.3.9.1.4 | octet string | read-write |
A part of the readable text entry for the key pair input/output. |
rlSshClientRemoteServerPublicKeyFingerprintTable | 1.3.6.1.4.1.9.6.1.101.78.3.10 | no-access |
Table for storing fingerprints of remote servers public keys. It is used for the purpose of server authentication. An entry can be inserted to this table either explicitly by user configuration, or during copy operation, after user's approval. |
|
1.3.6.1.4.1.9.6.1.101.78.3.10.1 | no-access |
The row definition for this table. |
||
rlSshClientRemoteServerFingerprintInetAddrType | 1.3.6.1.4.1.9.6.1.101.78.3.10.1.1 | inetaddresstype | no-access |
Remote server inet address type. |
rlSshClientRemoteServerFingerprintInetAddr | 1.3.6.1.4.1.9.6.1.101.78.3.10.1.2 | inetaddress | no-access |
Remote server inet address. |
rlSshClientRemoteServerFingerprint | 1.3.6.1.4.1.9.6.1.101.78.3.10.1.3 | octet string | read-only |
Remote server fingerprint. |
rlSshClientRemoteServerFingerprintStatus | 1.3.6.1.4.1.9.6.1.101.78.3.10.1.4 | rowstatus | read-only |
Row status for this row. |
rlSshClientRemoteServersAuthenticationEnable | 1.3.6.1.4.1.9.6.1.101.78.3.11 | integer | read-write |
Setting this field to 'enable' enables remote servers authentication. As a result, while opening a session with a remote server, the fingerprint of the remote server will be computed and looked for in the table rlSshClientRemoteServerPublicKeyFingerprintTable. If an entry with the key (server-inet-address, server-fingerprint) is found, the server is considered authenticated. Otherwise, the server is not authenticated (unless the user specifically approved this server can be trusted). Enumeration: 'enable': 1, 'disable': 2. |
rlSshClientDefaultKeyFlag | 1.3.6.1.4.1.9.6.1.101.78.3.12 | integer | read-only |
This scalar indicates which of the SSH client keys are default keys (automatically generated). Enumeration: 'all': 3, 'rsa': 1, 'none': 4, 'dsa': 2. |