CABH-IETF-SEC-MIB
File:
CABH-IETF-SEC-MIB.mib (44743 bytes)
Imported modules
Imported symbols
Defined Types
CabhSec2FwEventControlEntry |
|
SEQUENCE |
|
|
|
|
cabhSec2FwEventType |
INTEGER |
|
|
cabhSec2FwEventEnable |
INTEGER |
|
|
cabhSec2FwEventThreshold |
Unsigned32 |
|
|
cabhSec2FwEventInterval |
Unsigned32 |
|
|
cabhSec2FwEventCount |
ZeroBasedCounter32 |
|
|
cabhSec2FwEventLogReset |
TruthValue |
|
|
cabhSec2FwEventLogLastReset |
TimeStamp |
|
CabhSec2FwLogEntry |
|
SEQUENCE |
|
|
|
|
cabhSec2FwLogIndex |
Unsigned32 |
|
|
cabhSec2FwLogEventType |
INTEGER |
|
|
cabhSec2FwLogEventPriority |
INTEGER |
|
|
cabhSec2FwLogEventId |
Unsigned32 |
|
|
cabhSec2FwLogTime |
DateAndTime |
|
|
cabhSec2FwLogIpProtocol |
Unsigned32 |
|
|
cabhSec2FwLogIpAddrType |
InetAddressType |
|
|
cabhSec2FwLogIpSourceAddr |
InetAddress |
|
|
cabhSec2FwLogIpDestAddr |
InetAddress |
|
|
cabhSec2FwLogIpSourcePort |
InetPortNumber |
|
|
cabhSec2FwLogIpDestPort |
InetPortNumber |
|
|
cabhSec2FwLogMessageType |
Unsigned32 |
|
|
cabhSec2FwLogReplayCount |
Unsigned32 |
|
|
cabhSec2FwLogMIBPointer |
VariablePointer |
|
CabhSec2FwFilterScheduleEntry |
|
SEQUENCE |
|
|
|
|
cabhSec2FwFilterScheduleStartTime |
DateAndTime |
|
|
cabhSec2FwFilterScheduleEndTime |
DateAndTime |
|
|
cabhSec2FwFilterScheduleDOW |
BITS |
|
Defined Values
cabhSecMib |
1.3.6.1.2.1.1 |
This MIB module supplies the basic management
objects for the Security Portal Services.
Copyright (C) The Internet Society (2003). This version
of this MIB module is part of RFC xxxx; see the RFC
itself
for full legal notices. |
MODULE-IDENTITY |
|
|
|
cabhSecFwPolicyFileEnable |
1.3.6.1.2.1.1.1.1.1.1 |
This parameter indicates whether or not to enable the
firewall functionality. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
cabhSecFwPolicyFileURL |
1.3.6.1.2.1.1.1.1.1.2 |
Contains the location of the last successfull downloaded
policy rule set file in the format pointed in the
reference. A policy rule set file download is triggered
when the value used to SET this MIB is different than the
value in the cabhSecFwPolicySuccessfulFileURL object. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
SnmpAdminString |
|
|
cabhSecFwPolicyFileHash |
1.3.6.1.2.1.1.1.1.1.3 |
Hash of the contents of the rules set file, calculated
and sent to the PS prior to sending the rules set file.
For the SHA-1 authentication algorithm the length of the
hash is 160 bits. This hash value is encoded in binary
format. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
OCTET STRING |
Size(0|20) |
|
cabhSecFwPolicyFileOperStatus |
1.3.6.1.2.1.1.1.1.1.4 |
inProgress(1) indicates a firewall configuration file
download is underway.
complete (2) indicates the firewall configuration file
downloaded and configured successfully.
completeFromMgt(3) This state is deprecated.
failed(4) indicates the last attempted firewall
configuration file download or processing failed
ordinarily due to TFTP timeout. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
inProgress(1), complete(2), failed(4) |
|
cabhSecFwPolicyFileCurrentVersion |
1.3.6.1.2.1.1.1.1.1.5 |
The rule set version currently operating in the PS
device. This object should be in the syntax used by the
individual vendor to identify software versions. Any PS
element MUST return a string descriptive of the current
rule set file load. If this is not applicable, this
object MUST contain an empty string. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
SnmpAdminString |
|
|
cabhSecFwPolicySuccessfulFileURL |
1.3.6.1.2.1.1.1.1.1.6 |
Contains the location of the last successfull downloaded
policy rule set file in the format pointed in the
reference. If a successful download has not yet occurred,
this MIB object should report empty string. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
SnmpAdminString |
|
|
cabhSecFwEventType1Enable |
1.3.6.1.2.1.1.1.1.2.1 |
This object enables or disables logging of type 1
firewall event messages. Type 1 event messages report
attempts from both private and public clients to traverse
the firewall that violate the Security Policy. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
cabhSecFwEventType2Enable |
1.3.6.1.2.1.1.1.1.2.2 |
This object enables or disables logging of type 2
firewall event messages. Type 2 event messages report
identified Denial of Service attack attempts. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
cabhSecFwEventType3Enable |
1.3.6.1.2.1.1.1.1.2.3 |
Enables or disables logging of type 3 firewall event
messages.
Type 3 event messages report changes made to the
following firewall management parameters:
cabhSecFwPolicyFileURL,
cabhSecFwPolicyFileCurrentVersion,
cabhSecFwPolicyFileEnable |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
cabhSecFwEventAttackAlertThreshold |
1.3.6.1.2.1.1.1.1.2.4 |
If the number of type 1 or 2 hacker attacks exceeds
this threshold in the period define by
cabhSecFwEventAttackAlertPeriod, a firewall message
event MUST be logged with priority level 4. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
0..65535 |
|
cabhSecFwEventAttackAlertPeriod |
1.3.6.1.2.1.1.1.1.2.5 |
Indicates the period to be used (in hours) for the
cabhSecFwEventAttackAlertThreshold. This MIB variable
should always keep track of the last x hours of events
meaning that if the variable is set to track events for
10 hours then when the 11th hour is reached, the 1st hour
of events is deleted from the tracking log. A default
value is set to zero, meaning zero time, so that this MIB
variable will not track any events unless configured. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
0..65535 |
|
cabhSec2FwEnable |
1.3.6.1.2.1.1.1.4.1.1 |
This parameter indicates whether to enable or disable
the firewall. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enabled(1), disabled(2) |
|
cabhSec2FwPolicyFileURL |
1.3.6.1.2.1.1.1.4.1.2 |
Contains the location of the last successfull downloaded
policy rule set file in the format pointed in the
reference. A policy rule set file download is triggered
when the value used to SET this MIB is different than the
value in the cabhSec2FwPolicySuccessfulFileURL object. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
SnmpAdminString |
|
|
cabhSec2FwPolicyFileHash |
1.3.6.1.2.1.1.1.4.1.3 |
Hash of the contents of the firewall configuration file.
For the SHA-1 authentication algorithm the length of the
hash is 160 bits. This hash value is encoded in binary
format. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
OCTET STRING |
Size(0|20) |
|
cabhSec2FwPolicyFileOperStatus |
1.3.6.1.2.1.1.1.4.1.4 |
InProgress(1) indicates a firewall configuration file
download is underway. Complete(2) indicates the firewall
configuration file was downloaded and processed
successfully. Failed(3) indicates that the last attempted
firewall configuration file download or processing
failed. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
inProgress(1), complete(2), failed(3) |
|
cabhSec2FwPolicyFileCurrentVersion |
1.3.6.1.2.1.1.1.4.1.5 |
A label set by the cable operator that can be used to
track various versions of configured rulesets. Once the
label is set it and configured rules are changed, it may
not accurately reflect the version of configured rules
running on the box.
This object MUST contain the string 'null' if has never
been configured. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
SnmpAdminString |
|
|
cabhSec2FwClearPreviousRuleset |
1.3.6.1.2.1.1.1.4.1.6 |
Allows PS or firewall configuration files to contain
either a complete firewall configured ruleset or an
incremental to the already established configured ruleset
depending up on its existence in the configuration file.
If the PS receives a configuration file with firewall
settings which includes a cabhSec2FwClearPreviousRuleset
object setting marked as increment(1) or if this object
setting is not included in a configuration file which
contains filter settings for the firewall, then the PS
MUST treat the firewall filter settings in the
configuration file as an increment to the configured
ruleset. If the PS receives a configuration file with
firewall settings which includes a
cabhSec2FwClearPreviousRuleset object setting marked as
incrementDefault(3) then the PS MUST remove all
previously configured rules from the configured ruleset,
including any rules in the filter schedule table and
increment the newly downloaded rules on top of (i.e.
subsequent to) the factory default policy. If the PS
receives a configuration file with firewall settings
which includes a cabhSec2FwClearPreviousRuleset object
setting marked as complete(2), then the PS MUST remove
all previously configured rules from the configured
ruleset, including any rules in
cabhSec2FwFilterScheduleTable table before applying
the firewall filter settings contained in the
configuration file.
If cabhSec2FwClearPreviousRuleset is set to increment(1)
using SNMP, the PS MUST treat all of the following
firewall filter settings using SNMP as an increment to
the configured ruleset.
If cabhSec2FwClearPreviousRuleset is set to
incrementDefault(3) using SNMP, the PS MUST remove all
previously configured rules from the configured ruleset,
including any rules in the filter schedule table and
treat all of the following firewall filter settings using
SNMP as an increment on top of the factory default
policy. If cabhSec2FwClearPreviousRuleset is set to
complete(2), then the PS MUST remove all rules from the
configured ruleset, including any rules in the filter
schedule table. In this scenario the PS will operate
without any configured rules, (e.g. there will be no
defined filtering rules, but the firewall will still
provide the minimum set of capabilities and
architecture). |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
increment(1), complete(2), incrementDefault(3) |
|
cabhSec2FwPolicySelection |
1.3.6.1.2.1.1.1.4.1.7 |
This parameter indicates which policy should currently
be running in the firewall, either the factoryDefault
policy or the configuredRuleset. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
factoryDefault(1), configuredRuleset(2) |
|
cabhSec2FwEventSetToFactory |
1.3.6.1.2.1.1.1.4.1.8 |
If set to 'true', entries in cabhSec2FwEventControlEntry
are set to their default values. Reading this value
always returns false. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cabhSec2FwEventLastSetToFactory |
1.3.6.1.2.1.1.1.4.1.9 |
The value of sysUpTime when cabhSec2FwEventSetToFactory
was last set to true. Zero if never reset. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TimeStamp |
|
|
cabhSec2FwPolicySuccessfulFileURL |
1.3.6.1.2.1.1.1.4.1.10 |
Contains the location of the last successfull downloaded
policy rule set file in the format pointed in the
reference. If a successful download has not yet occurred,
this MIB object should report empty string. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
SnmpAdminString |
|
|
cabhSec2FwEventControlEntry |
1.3.6.1.2.1.1.1.4.2.1.1 |
Allows configuration of the reporting mechanisms for a
particular type of attack. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CabhSec2FwEventControlEntry |
|
|
cabhSec2FwEventType |
1.3.6.1.2.1.1.1.4.2.1.1.1 |
Classification of the different types of attacks.
Type 1 logs all attempts from both LAN and WAN clients to
traverse the Firewall that violate the Security Policy.
Type 2 logs identified Denial of Service attack attempts.
Type 3 logs all changes made to the cabhSec2FwPolicyFileURL,
cabhSec2FwPolicyFileCurrentVersion or
cabhSec2FwPolicyFileEnable objects.
Type 4 logs all failed attempts to modify
cabhSec2FwPolicyFileURL and cabhSec2FwPolicyFileEnable
objects. Type 5 logs allowed inbound packets from the WAN.
Type 6 logs allowed outbound packets from the LAN. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
INTEGER |
type1(1), type2(2), type3(3), type4(4), type5(5), type6(6) |
|
cabhSec2FwEventEnable |
1.3.6.1.2.1.1.1.4.2.1.1.2 |
Enables or disables counting and logging of firewall
events by type as assigned by cabhSec2FwEventType. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enabled(1), disabled(2) |
|
cabhSec2FwEventThreshold |
1.3.6.1.2.1.1.1.4.2.1.1.3 |
Number of attacks to count before sending the
appropriate event by type as assigned by
cabhSec2FwEventType. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
0..65535 |
|
cabhSec2FwEventInterval |
1.3.6.1.2.1.1.1.4.2.1.1.4 |
Indicates the time interval in hours to count and log
occurrences of a firewall event type as assigned in
cabhSec2FwEventType. If this MIB has a value of zero then
there is no interval assigned and the PS will not count
or log events. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
0..65535 |
|
cabhSec2FwEventCount |
1.3.6.1.2.1.1.1.4.2.1.1.5 |
Indicates the current count up to the
cabhSec2FwEventThreshold value by type as assigned by
cabhSec2FwEventType. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
ZeroBasedCounter32 |
|
|
cabhSec2FwEventLogReset |
1.3.6.1.2.1.1.1.4.2.1.1.6 |
Setting this object to true clears the log table for the
specified event type. Reading this object always returns
false. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
cabhSec2FwEventLogLastReset |
1.3.6.1.2.1.1.1.4.2.1.1.7 |
The value of sysUpTime when cabhSec2FwEventLogReset was
last set to true. Zero if never reset. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TimeStamp |
|
|
cabhSec2FwLogTable |
1.3.6.1.2.1.1.1.4.3.1 |
Contains a log of packet information as related to
events enabled by the cable operator. The types are
defined in the CableHome 1.1 specification and require
various objects to be included in the log.
The following is a description for what is expected in
the log for each type Type 1, Type 2, Type 5 and Type 6
table MUST include cabhSec2FwEventType,
cabhSec2FwEventPriority, cabhSec2FwEventId,
cabhSec2FwLogTime, cabhSec2FwIpProtocol,
cabhSec2FwIpSourceAddr, cabhSec2FwIpDestAddr,
cabhSec2FwIpSourcePort, cabhSec2FwIpDestPort,
cabhSec2Fw, cabhSec2FwReplayCount. The other values not
used by types 1, 2, 5 and 6 are default values. Type 3
and Type 4 MUST include cabhSec2FwEventType,
cabhSec2FwEventPriority,
cabhSec2FwEventId, cabhSec2FwLogTime,
cabhSec2FwIpSourceAddr, cabhSec2FwLogMIBPointer.
The other values not used by type 3 and 4 are default
values. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CabhSec2FwLogEntry |
|
cabhSec2FwLogEntry |
1.3.6.1.2.1.1.1.4.3.1.1 |
Each entry contains the log of firewall events |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CabhSec2FwLogEntry |
|
|
cabhSec2FwLogIndex |
1.3.6.1.2.1.1.1.4.3.1.1.1 |
A sequence number for the specific events under a
cabhSec2FwEventType. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
1..2147483647 |
|
cabhSec2FwLogEventType |
1.3.6.1.2.1.1.1.4.3.1.1.2 |
Classification of the different types of attacks.
Type 1 logs all attempts from both LAN and WAN clients to
traverse the Firewall that violate the Security Policy.
Type 2 logs identified Denial of Service attack attempts.
Type 3 logs all changes made to the
cabhSec2FwPolicyFileURL,
cabhSec2FwPolicyFileCurrentVersion or
cabhSec2FwPolicyFileEnable objects.
Type 4 logs all failed attempts to modify
cabhSec2FwPolicyFileURL and cabhSec2FwPolicyFileEnable
objects.
Type 5 logs allowed inbound packets from the WAN.
Type 6 logs allowed outbound packets from the LAN. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
type1(1), type2(2), type3(3), type4(4), type5(5), type6(6) |
|
cabhSec2FwLogEventPriority |
1.3.6.1.2.1.1.1.4.3.1.1.3 |
The priority level of this event as defined by CableHome
Specification. If a priority is not assigned in the
CableHome specification for a particular event then the
vendor or cable operator may assign priorities. These are
ordered from most serious (emergency) to least serious
(debug). |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
emergency(1), alert(2), critical(3), error(4), warning(5), notice(6), information(7), debug(8) |
|
cabhSec2FwLogTime |
1.3.6.1.2.1.1.1.4.3.1.1.5 |
The time that this entry was created by the PS. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
DateAndTime |
|
|
cabhSec2FwLogIpSourceAddr |
1.3.6.1.2.1.1.1.4.3.1.1.8 |
The Source IP Address of the packet logged.
The address type of this object is specified by
cabhSec2FwLogIpAddrType. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
InetAddress |
|
|
cabhSec2FwLogIpDestAddr |
1.3.6.1.2.1.1.1.4.3.1.1.9 |
The Destination IP Address of the packet logged.
The address type of this object is specified by
cabhSec2FwLogIpAddrType. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
InetAddress |
|
|
cabhSec2FwLogReplayCount |
1.3.6.1.2.1.1.1.4.3.1.1.13 |
The number of identical attack packets that were seen by
the firewall based on cabhSec2FwLogIpProtocol,
cabhSec2FwLogIpSourceAddr, cabhSec2FwLogIpDestAddr,
cabhSec2FwLogIpSourcePort, cabhSec2FwLogIpDestPort and
cabhSec2FwLogMessageType |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
|
|
cabhSec2FwLogMIBPointer |
1.3.6.1.2.1.1.1.4.3.1.1.14 |
Identifies if the cabhSec2FwPolicyFileURL or the
cabhSec2FwEnable MIB object changed or an attempt was
made to change it. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
VariablePointer |
|
|
cabhSec2FwFilterScheduleTable |
1.3.6.1.2.1.1.1.4.4.1 |
Extends the filtering matching parameters of
docsDevFilterIpTable defined in RFC 2669 for CableHome
Residential Gateways to include time day intervals and
days of the week. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
CabhSec2FwFilterScheduleEntry |
|
cabhSec2FwFilterScheduleEntry |
1.3.6.1.2.1.1.1.4.4.1.1 |
Extended values for entries of docsDevFilterIpTable.
If the PS has not acquired ToD the entire
docsDevFilterIpEntry rule set is ignored. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
CabhSec2FwFilterScheduleEntry |
|
|
cabhSec2FwFilterScheduleStartTime |
1.3.6.1.2.1.1.1.4.4.1.1.1 |
The start time, with optional time zone, for a firewall
filter ruleset. Only the time portion of the DateAndTime
TEXTUAL-CONVENTION have a meaning. |
Status: current |
Access: read-create |
OBJECT-TYPE |
|
|
|
|
DateAndTime |
|
|
cabhSec2FwFilterScheduleEndTime |
1.3.6.1.2.1.1.1.4.4.1.1.2 |
The end time, with optional time zone, for a firewall
filter ruleset. Only the time portion of the DateAndTime
TEXTUAL-CONVENTION have a meaning. |
Status: current |
Access: read-create |
OBJECT-TYPE |
|
|
|
|
DateAndTime |
|
|
cabhSec2FwFilterScheduleDOW |
1.3.6.1.2.1.1.1.4.4.1.1.3 |
If the day of week bit associated with the PS given day
is '1', this object criteria matches. |
Status: current |
Access: read-create |
OBJECT-TYPE |
|
|
|
|
BITS |
sunday(0), monday(1), tuesday(2), wednesday(3), thursday(4), friday(5), saturday(6) |
|
cabhSecKerbPKINITGracePeriod |
1.3.6.1.2.1.1.1.3.1.1 |
The PKINIT Grace Period is needed by the PS to know when
it should start retrying to get a new ticket. The PS MUST
obtain a new Kerberos ticket (with a PKINIT exchange);
this may be many minutes before the old ticket expires. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
15..600 |
|
cabhSecKerbTGSGracePeriod |
1.3.6.1.2.1.1.1.3.1.2 |
The TGS Grace Period is needed by the PS to know when it
should start retrying to get a new ticket. The PS MUST
obtain a new Kerberos ticket (with a TGS Request); this
may be many minutes before the old ticket expires. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
1..600 |
|
cabhSecKerbUnsolicitedKeyMaxTimeout |
1.3.6.1.2.1.1.1.3.1.3 |
This timeout applies to PS initiated AP-REQ/REP key
management exchange with NMS. The maximum timeout is the
value which may not be exceeded in the exponential
backoff algorithm. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
15..600 |
|
cabhSecKerbUnsolicitedKeyMaxRetries |
1.3.6.1.2.1.1.1.3.1.4 |
The number of retries the PS is allowed for AP-REQ/REP
key management exchange initiation with the NMS. This is
the maximum number of retries before the PS gives up
attempting to establish an SNMPv3 security association
with NMS. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
1..32 |
|
cabhSecCompliance |
1.3.6.1.2.1.1.3.1.1 |
The compliance statement for CableHome Security. |
Status: current |
Access: read-write |
MODULE-COMPLIANCE |
|
|
|
cabhSecGroup |
1.3.6.1.2.1.1.3.2.1 |
Group of objects in CableHome 1.0 Firewall MIB. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
cabhSecCertGroup |
1.3.6.1.2.1.1.3.2.2 |
Group of objects in CableHome gateway for PS
Certificate. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
cabhSecKerbGroup |
1.3.6.1.2.1.1.3.2.3 |
Group of objects in CableHome gateway for Kerberos. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|
cabhSec2Group |
1.3.6.1.2.1.1.3.2.4 |
Group of objects in CableHome 1.1 Firewall MIB. |
Status: current |
Access: read-write |
OBJECT-GROUP |
|
|
|