XEDIA-PKI-MIB: View SNMP OID List / Download MIB
VENDOR: XEDIA CORPORATION
Home | MIB: XEDIA-PKI-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
xediaPkiMIB | 1.3.6.1.4.1.838.3.24 |
This module defines objects for management of Xedias Public Key Infrastructure subsystem. |
||
pkiObjects | 1.3.6.1.4.1.838.3.24.1 | |||
pkiSubsystemGroup | 1.3.6.1.4.1.838.3.24.1.1 | |||
pkiSubjNameFormat | 1.3.6.1.4.1.838.3.24.1.1.1 |
This object is used to specify the format of the subject name(s) for this system in PKI certificates and requests. There are multiple options for forming the subjects distinguished name. distNameFromLDAP(0) will use the systems LDAP directory name. distNameFromRtrAddr(1) will use the systems router IP address. If both options are disabled, then the pkiSubjDistName is set explicitly by the administrator. Default is distNameFromRtrAddr(1). The incIpAddrExt(3) option specifies that the systems router IP address (if configured) should be included as a subject alternate name extension in certificate requests. By default, this option is enabled. The incFQDomainNameExt(4) option specifies that the systems fully qualified domain name (if configured) should be included as a subject alternate name extension in certificate requests. By default, this option is enabled. |
||
pkiSubjDistName | 1.3.6.1.4.1.838.3.24.1.1.2 |
The X500 distinguished name for this system. This name corresponds to the subject name in this gateways certificates and requests. For example: C=US, O=Xedia Corp, CN=198.202.232.217 This object can be set explicitly or may reflect the systems LDAP or router address as specified by pkiSubjNameFormat. |
||
pkiLdapServer | 1.3.6.1.4.1.838.3.24.1.1.3 |
The name of the LDAP Server used as the default Certificate and CRL repository. This may be in the form of a DNS or IP address with an optional port number specified after a colon. For example: ldap.xedia.com 198.202.232.121 ldap.xedia.com:389 198.202.232.121:389 When this object is set to a valid server, LDAP is automatically enabled as a PKI certificate and CRL retrieval mechanism. If cleared, LDAP is disabled for PKI purposes. |
||
pkiKeyPairTable | 1.3.6.1.4.1.838.3.24.1.2 |
The PKI key pair table is used to administer public/private key pairs for this system. |
||
1.3.6.1.4.1.838.3.24.1.2.1 |
The attributes of a single PKI Key Pair. Note that a PkiKeyPairEntry cannot be modified if referenced by a PkiCertRqstEntry. |
|||
pkiKeyPairName | 1.3.6.1.4.1.838.3.24.1.2.1.1 |
The administrative name given to the key pair. |
||
pkiKeyPairAlgorithm | 1.3.6.1.4.1.838.3.24.1.2.1.2 |
The algorithm used to generate the key pair. |
||
pkiKeyPairLength | 1.3.6.1.4.1.838.3.24.1.2.1.3 |
The length of the public key in bits. For RSA keys, the valid range is 512 to 2048, and the default is 1024. For DSS keys, the valid range is 512 to 1024, and the default is 1024. |
||
pkiKeyPairRowStatus | 1.3.6.1.4.1.838.3.24.1.2.1.4 |
This object is used to create and delete entries in this table. |
||
pkiCertRqstTable | 1.3.6.1.4.1.838.3.24.1.3 |
The PKI key pair table is used to administer PKCS #10 certificate requests for this system. |
||
1.3.6.1.4.1.838.3.24.1.3.1 |
The attributes of a single PKCS #10 certificate request. |
|||
pkiCertRqstPublicKey | 1.3.6.1.4.1.838.3.24.1.3.1.1 |
The systems public key included in this certificate request. This object references an entry in the pkiKeyPairTable. |
||
pkiCertRqstSigAlgorithm | 1.3.6.1.4.1.838.3.24.1.3.1.2 |
The signature algorithm used to sign the public key information in this certificate request. For both RSA and DSA key pairs, the hash will default to SHA-1. |
||
pkiCertRqstSignature | 1.3.6.1.4.1.838.3.24.1.3.1.3 |
The signature of the certificate request. After the certificate request is tranported to the CA, many CAs display the certificate request signature and suggest that it is checked against the signature on the generating system. |
||
pkiCertRqstPem | 1.3.6.1.4.1.838.3.24.1.3.1.4 |
The full ANS.1 DER encoded PKCS #10 certificate request in PEM/base64 format. This object may be manually cut and pasted over to the certificate authority for X.509 certificate generation. |
||
pkiNewCert | 1.3.6.1.4.1.838.3.24.1.4 |
X.509 Certificate generated by a Certificate Authority based on the pkiPublicKeyCertRequest information in base64/PEM format. This object provides a manual mechanism for the administrator to load static certificates into the pkiCertTable. When this object is written, the system parses the certificate and loads it into the local certificate database as a static entry. |
||
pkiCertTable | 1.3.6.1.4.1.838.3.24.1.5 |
This table contains the certificates in the systems local database including static certificates loaded via network management and dynamic certificates retrieved from certificate operational protocols such as LDAP. |
||
1.3.6.1.4.1.838.3.24.1.5.1 |
The attributes that make up a single certificate. |
|||
pkiCertIndex | 1.3.6.1.4.1.838.3.24.1.5.1.1 |
The unique index for this certificate. |
||
pkiCertSubjNames | 1.3.6.1.4.1.838.3.24.1.5.1.2 |
The subject name(s) of the network entity or user being certified. The certificates subject name can consist of multiple names including distinguished name fields, IP Address, domain name, etc. This object concatenates all these names into one string. |
||
pkiCertIssuerNames | 1.3.6.1.4.1.838.3.24.1.5.1.3 |
The name(s) of the certificate authority which issued this certificate. The certificates issuer name can consist of multiple names including distinguished name fields, IP Address, domain name, etc. This object concatenates all these names into one string. |
||
pkiCertKeyPair | 1.3.6.1.4.1.838.3.24.1.5.1.4 |
This systems public/private keypair associated with this certificate. If the certificate is not for this gateway, the object will be a zero length string. |
||
pkiCertType | 1.3.6.1.4.1.838.3.24.1.5.1.5 |
The type of certificate. |
||
pkiCertSerialNum | 1.3.6.1.4.1.838.3.24.1.5.1.6 |
The serial number for this certificate. |
||
pkiCertValidNotBefore | 1.3.6.1.4.1.838.3.24.1.5.1.7 |
The start of the validity period for this certificate. |
||
pkiCertValidNotAfter | 1.3.6.1.4.1.838.3.24.1.5.1.8 |
The end of the validity period for this certificate. |
||
pkiCertCreation | 1.3.6.1.4.1.838.3.24.1.5.1.9 |
Specifies how the certificate was obtained. If a dynamic certificate is modified via network management, it becomes static. |
||
pkiCertCertAuthority | 1.3.6.1.4.1.838.3.24.1.5.1.10 |
Indicates whether or not this certificate is for a Certificate Authority. |
||
pkiCertCrlIssuer | 1.3.6.1.4.1.838.3.24.1.5.1.11 |
Certificate Authorities periodically issue Certificate Revocation Lists (CRLs) for certificates which have been revoked. Certificates issued by a CA need to be checked against a current CRL issued by the CA, otherwise they cannot be trusted. By default, all CAs are considered CRL issuers. Disabling this object disables CRL checking when computing trust for subordinate certificates. |
||
pkiCertTrustStatus | 1.3.6.1.4.1.838.3.24.1.5.1.12 |
The certificates current trust status. If the trust computation succeeds, it will be trusted(0) otherwise this object will give the set of errors detected while computing the trust status for this certificate. To be trusted(0), all issuer certificates in the chain must be trusted. Note that when a self signed root certificate is added, the trustStatus remains untrustedRoot(7) until it is manually set trusted via pkiCertForceTrusted. This gives the administrator the opportunity to view and verify a root certificate before it is used to verify subordinate certificates. |
||
pkiCertForceTrusted | 1.3.6.1.4.1.838.3.24.1.5.1.13 |
A mechanism whereby the administrator can set any certificate trusted. Enabling forceTrusted will set the certificate trusted for its entire validity period and if its a CA certificate may result in subordinate certificates becoming trusted. Note that forceTrusted must be set enabled for root certificates. |
||
pkiCertSubjPubKeyAlgorithm | 1.3.6.1.4.1.838.3.24.1.5.1.14 |
The subjects public key algorithm. |
||
pkiCertSignatureAlgorithm | 1.3.6.1.4.1.838.3.24.1.5.1.15 |
The algorithm used to sign the certificate. |
||
pkiCertSignature | 1.3.6.1.4.1.838.3.24.1.5.1.16 |
The certificates digital signature. After loading a CA certificate, it is recommended that this value be checked against the CA certificate signature to verify that the certificate was not compromised in transit. |
||
pkiCertRemove | 1.3.6.1.4.1.838.3.24.1.5.1.17 |
This object is used to delete certificates. |
||
pkiNewCrl | 1.3.6.1.4.1.838.3.24.1.6 |
X.509 Certificate Revocation list generated by a Certificate Authority in base64/PEM format. This object provides a manual mechanism for the administrator to load static CRLS into the pkiCrlTable. When this object is written, the system parses the CRL and loads it into the local CRL database as a static entry. |
||
pkiCrlTable | 1.3.6.1.4.1.838.3.24.1.7 |
This table contains the CRLs in the systems local database including static CRLs loaded via network management and dynamic CRLs retrieved from operational protocols such as LDAP. |
||
1.3.6.1.4.1.838.3.24.1.7.1 |
The attributes that make up a single CRL. |
|||
pkiCrlIndex | 1.3.6.1.4.1.838.3.24.1.7.1.1 |
The unique index for this CRL. |
||
pkiCrlIssuerNames | 1.3.6.1.4.1.838.3.24.1.7.1.2 |
The name(s) of the certificate authority which issued this CRL. The CRLs issuer name can consist of multiple names including distinguished name fields, IP Address, domain name, etc. This object concatenates all these names into one string. |
||
pkiCrlNumber | 1.3.6.1.4.1.838.3.24.1.7.1.3 |
The CRL number which is unique for all CRLs issued by a particular CA. |
||
pkiCrlType | 1.3.6.1.4.1.838.3.24.1.7.1.4 |
The type of certificates in the CRL. |
||
pkiCrlUpdateTime | 1.3.6.1.4.1.838.3.24.1.7.1.5 |
The time when this CRL was updated. |
||
pkiCrlNextUpdateTime | 1.3.6.1.4.1.838.3.24.1.7.1.6 |
The time when this CRL will be updated next. |
||
pkiCrlTrustStatus | 1.3.6.1.4.1.838.3.24.1.7.1.7 |
The CRLs current trust status. If the trust computation succeeds, it will be trusted(0) otherwise this object will give the set of errors detected while computing the trust status for this CRL. To be trusted, all issuer certificates in the chain must be trusted. |
||
pkiCrlCreation | 1.3.6.1.4.1.838.3.24.1.7.1.8 |
Specifies how the CRL was obtained. If a dynamic CRL is modified via network management, it becomes static. |
||
pkiCrlRevokedCerts | 1.3.6.1.4.1.838.3.24.1.7.1.9 |
The number of revoked certificates in this CRL. |
||
pkiCrlRemove | 1.3.6.1.4.1.838.3.24.1.7.1.10 |
This object is used to delete CRLs. |
||
pkiCrlCertTable | 1.3.6.1.4.1.838.3.24.1.8 |
This table contains the list of revoked certificates from CRLs in the pkiCrlTable. |
||
1.3.6.1.4.1.838.3.24.1.8.1 |
A revoked certificate entry from a CRL. |
|||
pkiCrlCertIndex | 1.3.6.1.4.1.838.3.24.1.8.1.1 |
The unique index for this CRL certificate. |
||
pkiCrlCertSerialNumber | 1.3.6.1.4.1.838.3.24.1.8.1.2 |
The serial number for the revoked certificate. |
||
pkiCrlCertRevokedDate | 1.3.6.1.4.1.838.3.24.1.8.1.3 |
The date and time at which the certificate was revoked. |
||
pkiCrlCertInvalidDate | 1.3.6.1.4.1.838.3.24.1.8.1.4 |
The date and time at which the certificate becomes invalid. |
||
pkiCrlCertIssuerNames | 1.3.6.1.4.1.838.3.24.1.8.1.5 |
The name(s) of the certificate authority which revoked the certificate. The certificates issuer name can consist of multiple names including distinguished name fields, IP Address, domain name, etc. This object concatenates all these names into one string. |
||
pkiConformance | 1.3.6.1.4.1.838.3.24.2 | |||
pkiCompliances | 1.3.6.1.4.1.838.3.24.2.1 | |||
pkiCompliance | 1.3.6.1.4.1.838.3.24.2.1.1 |
The compliance statement for all agents that support this MIB. A compliant agent implements all objects defined in this MIB. |
||
pkiGroups | 1.3.6.1.4.1.838.3.24.2.2 | |||
pkiAllGroup | 1.3.6.1.4.1.838.3.24.2.2.1 |
The set of all accessible objects in this MIB. |