CABH-IETF-SEC-MIB

File: CABH-IETF-SEC-MIB.mib (44743 bytes)

Imported modules

SNMPv2-SMI SNMPv2-TC SNMPv2-CONF
INET-ADDRESS-MIB SNMP-FRAMEWORK-MIB DOCS-IETF-BPI2-MIB
RMON2-MIB DOCS-CABLE-DEVICE-MIB

Imported symbols

MODULE-IDENTITY Unsigned32 zeroDotZero
OBJECT-TYPE mib-2 DateAndTime
TruthValue TimeStamp VariablePointer
OBJECT-GROUP MODULE-COMPLIANCE InetPortNumber
InetAddressType InetAddress SnmpAdminString
DocsX509ASN1DEREncodedCertificate ZeroBasedCounter32 docsDevFilterIpEntry

Defined Types

CabhSec2FwEventControlEntry  
SEQUENCE    
  cabhSec2FwEventType INTEGER
  cabhSec2FwEventEnable INTEGER
  cabhSec2FwEventThreshold Unsigned32
  cabhSec2FwEventInterval Unsigned32
  cabhSec2FwEventCount ZeroBasedCounter32
  cabhSec2FwEventLogReset TruthValue
  cabhSec2FwEventLogLastReset TimeStamp

CabhSec2FwLogEntry  
SEQUENCE    
  cabhSec2FwLogIndex Unsigned32
  cabhSec2FwLogEventType INTEGER
  cabhSec2FwLogEventPriority INTEGER
  cabhSec2FwLogEventId Unsigned32
  cabhSec2FwLogTime DateAndTime
  cabhSec2FwLogIpProtocol Unsigned32
  cabhSec2FwLogIpAddrType InetAddressType
  cabhSec2FwLogIpSourceAddr InetAddress
  cabhSec2FwLogIpDestAddr InetAddress
  cabhSec2FwLogIpSourcePort InetPortNumber
  cabhSec2FwLogIpDestPort InetPortNumber
  cabhSec2FwLogMessageType Unsigned32
  cabhSec2FwLogReplayCount Unsigned32
  cabhSec2FwLogMIBPointer VariablePointer

CabhSec2FwFilterScheduleEntry  
SEQUENCE    
  cabhSec2FwFilterScheduleStartTime DateAndTime
  cabhSec2FwFilterScheduleEndTime DateAndTime
  cabhSec2FwFilterScheduleDOW BITS

Defined Values

cabhSecMib 1.3.6.1.2.1.1
This MIB module supplies the basic management objects for the Security Portal Services. Copyright (C) The Internet Society (2003). This version of this MIB module is part of RFC xxxx; see the RFC itself for full legal notices.
MODULE-IDENTITY    

cabhSecMibObjects 1.3.6.1.2.1.1.1
OBJECT IDENTIFIER    

cabhSecFwObjects 1.3.6.1.2.1.1.1.1
OBJECT IDENTIFIER    

cabhSecFwBase 1.3.6.1.2.1.1.1.1.1
OBJECT IDENTIFIER    

cabhSecFwLogCtl 1.3.6.1.2.1.1.1.1.2
OBJECT IDENTIFIER    

cabhSecCertObjects 1.3.6.1.2.1.1.1.2
OBJECT IDENTIFIER    

cabhSecKerbObjects 1.3.6.1.2.1.1.1.3
OBJECT IDENTIFIER    

cabhSecKerbBase 1.3.6.1.2.1.1.1.3.1
OBJECT IDENTIFIER    

cabhSec2FwObjects 1.3.6.1.2.1.1.1.4
OBJECT IDENTIFIER    

cabhSec2FwBase 1.3.6.1.2.1.1.1.4.1
OBJECT IDENTIFIER    

cabhSec2FwEvent 1.3.6.1.2.1.1.1.4.2
OBJECT IDENTIFIER    

cabhSec2FwLog 1.3.6.1.2.1.1.1.4.3
OBJECT IDENTIFIER    

cabhSec2FwFilter 1.3.6.1.2.1.1.1.4.4
OBJECT IDENTIFIER    

cabhSecFwPolicyFileEnable 1.3.6.1.2.1.1.1.1.1.1
This parameter indicates whether or not to enable the firewall functionality.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER enable(1), disable(2)  

cabhSecFwPolicyFileURL 1.3.6.1.2.1.1.1.1.1.2
Contains the location of the last successfull downloaded policy rule set file in the format pointed in the reference. A policy rule set file download is triggered when the value used to SET this MIB is different than the value in the cabhSecFwPolicySuccessfulFileURL object.
Status: current Access: read-write
OBJECT-TYPE    
  SnmpAdminString  

cabhSecFwPolicyFileHash 1.3.6.1.2.1.1.1.1.1.3
Hash of the contents of the rules set file, calculated and sent to the PS prior to sending the rules set file. For the SHA-1 authentication algorithm the length of the hash is 160 bits. This hash value is encoded in binary format.
Status: current Access: read-write
OBJECT-TYPE    
  OCTET STRING Size(0|20)  

cabhSecFwPolicyFileOperStatus 1.3.6.1.2.1.1.1.1.1.4
inProgress(1) indicates a firewall configuration file download is underway. complete (2) indicates the firewall configuration file downloaded and configured successfully. completeFromMgt(3) This state is deprecated. failed(4) indicates the last attempted firewall configuration file download or processing failed ordinarily due to TFTP timeout.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER inProgress(1), complete(2), failed(4)  

cabhSecFwPolicyFileCurrentVersion 1.3.6.1.2.1.1.1.1.1.5
The rule set version currently operating in the PS device. This object should be in the syntax used by the individual vendor to identify software versions. Any PS element MUST return a string descriptive of the current rule set file load. If this is not applicable, this object MUST contain an empty string.
Status: current Access: read-only
OBJECT-TYPE    
  SnmpAdminString  

cabhSecFwPolicySuccessfulFileURL 1.3.6.1.2.1.1.1.1.1.6
Contains the location of the last successfull downloaded policy rule set file in the format pointed in the reference. If a successful download has not yet occurred, this MIB object should report empty string.
Status: current Access: read-only
OBJECT-TYPE    
  SnmpAdminString  

cabhSecFwEventType1Enable 1.3.6.1.2.1.1.1.1.2.1
This object enables or disables logging of type 1 firewall event messages. Type 1 event messages report attempts from both private and public clients to traverse the firewall that violate the Security Policy.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER enable(1), disable(2)  

cabhSecFwEventType2Enable 1.3.6.1.2.1.1.1.1.2.2
This object enables or disables logging of type 2 firewall event messages. Type 2 event messages report identified Denial of Service attack attempts.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER enable(1), disable(2)  

cabhSecFwEventType3Enable 1.3.6.1.2.1.1.1.1.2.3
Enables or disables logging of type 3 firewall event messages. Type 3 event messages report changes made to the following firewall management parameters: cabhSecFwPolicyFileURL, cabhSecFwPolicyFileCurrentVersion, cabhSecFwPolicyFileEnable
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER enable(1), disable(2)  

cabhSecFwEventAttackAlertThreshold 1.3.6.1.2.1.1.1.1.2.4
If the number of type 1 or 2 hacker attacks exceeds this threshold in the period define by cabhSecFwEventAttackAlertPeriod, a firewall message event MUST be logged with priority level 4.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER 0..65535  

cabhSecFwEventAttackAlertPeriod 1.3.6.1.2.1.1.1.1.2.5
Indicates the period to be used (in hours) for the cabhSecFwEventAttackAlertThreshold. This MIB variable should always keep track of the last x hours of events meaning that if the variable is set to track events for 10 hours then when the 11th hour is reached, the 1st hour of events is deleted from the tracking log. A default value is set to zero, meaning zero time, so that this MIB variable will not track any events unless configured.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER 0..65535  

cabhSecCertPsCert 1.3.6.1.2.1.1.1.2.1
The X509 DER-encoded PS certificate.
Status: current Access: read-only
OBJECT-TYPE    
  DocsX509ASN1DEREncodedCertificate  

cabhSec2FwEnable 1.3.6.1.2.1.1.1.4.1.1
This parameter indicates whether to enable or disable the firewall.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER enabled(1), disabled(2)  

cabhSec2FwPolicyFileURL 1.3.6.1.2.1.1.1.4.1.2
Contains the location of the last successfull downloaded policy rule set file in the format pointed in the reference. A policy rule set file download is triggered when the value used to SET this MIB is different than the value in the cabhSec2FwPolicySuccessfulFileURL object.
Status: current Access: read-write
OBJECT-TYPE    
  SnmpAdminString  

cabhSec2FwPolicyFileHash 1.3.6.1.2.1.1.1.4.1.3
Hash of the contents of the firewall configuration file. For the SHA-1 authentication algorithm the length of the hash is 160 bits. This hash value is encoded in binary format.
Status: current Access: read-write
OBJECT-TYPE    
  OCTET STRING Size(0|20)  

cabhSec2FwPolicyFileOperStatus 1.3.6.1.2.1.1.1.4.1.4
InProgress(1) indicates a firewall configuration file download is underway. Complete(2) indicates the firewall configuration file was downloaded and processed successfully. Failed(3) indicates that the last attempted firewall configuration file download or processing failed.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER inProgress(1), complete(2), failed(3)  

cabhSec2FwPolicyFileCurrentVersion 1.3.6.1.2.1.1.1.4.1.5
A label set by the cable operator that can be used to track various versions of configured rulesets. Once the label is set it and configured rules are changed, it may not accurately reflect the version of configured rules running on the box. This object MUST contain the string 'null' if has never been configured.
Status: current Access: read-write
OBJECT-TYPE    
  SnmpAdminString  

cabhSec2FwClearPreviousRuleset 1.3.6.1.2.1.1.1.4.1.6
Allows PS or firewall configuration files to contain either a complete firewall configured ruleset or an incremental to the already established configured ruleset depending up on its existence in the configuration file. If the PS receives a configuration file with firewall settings which includes a cabhSec2FwClearPreviousRuleset object setting marked as increment(1) or if this object setting is not included in a configuration file which contains filter settings for the firewall, then the PS MUST treat the firewall filter settings in the configuration file as an increment to the configured ruleset. If the PS receives a configuration file with firewall settings which includes a cabhSec2FwClearPreviousRuleset object setting marked as incrementDefault(3) then the PS MUST remove all previously configured rules from the configured ruleset, including any rules in the filter schedule table and increment the newly downloaded rules on top of (i.e. subsequent to) the factory default policy. If the PS receives a configuration file with firewall settings which includes a cabhSec2FwClearPreviousRuleset object setting marked as complete(2), then the PS MUST remove all previously configured rules from the configured ruleset, including any rules in cabhSec2FwFilterScheduleTable table before applying the firewall filter settings contained in the configuration file. If cabhSec2FwClearPreviousRuleset is set to increment(1) using SNMP, the PS MUST treat all of the following firewall filter settings using SNMP as an increment to the configured ruleset. If cabhSec2FwClearPreviousRuleset is set to incrementDefault(3) using SNMP, the PS MUST remove all previously configured rules from the configured ruleset, including any rules in the filter schedule table and treat all of the following firewall filter settings using SNMP as an increment on top of the factory default policy. If cabhSec2FwClearPreviousRuleset is set to complete(2), then the PS MUST remove all rules from the configured ruleset, including any rules in the filter schedule table. In this scenario the PS will operate without any configured rules, (e.g. there will be no defined filtering rules, but the firewall will still provide the minimum set of capabilities and architecture).
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER increment(1), complete(2), incrementDefault(3)  

cabhSec2FwPolicySelection 1.3.6.1.2.1.1.1.4.1.7
This parameter indicates which policy should currently be running in the firewall, either the factoryDefault policy or the configuredRuleset.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER factoryDefault(1), configuredRuleset(2)  

cabhSec2FwEventSetToFactory 1.3.6.1.2.1.1.1.4.1.8
If set to 'true', entries in cabhSec2FwEventControlEntry are set to their default values. Reading this value always returns false.
Status: current Access: read-write
OBJECT-TYPE    
  TruthValue  

cabhSec2FwEventLastSetToFactory 1.3.6.1.2.1.1.1.4.1.9
The value of sysUpTime when cabhSec2FwEventSetToFactory was last set to true. Zero if never reset.
Status: current Access: read-only
OBJECT-TYPE    
  TimeStamp  

cabhSec2FwPolicySuccessfulFileURL 1.3.6.1.2.1.1.1.4.1.10
Contains the location of the last successfull downloaded policy rule set file in the format pointed in the reference. If a successful download has not yet occurred, this MIB object should report empty string.
Status: current Access: read-only
OBJECT-TYPE    
  SnmpAdminString  

cabhSec2FwEventControlTable 1.3.6.1.2.1.1.1.4.2.1
This table controls the reporting of the Firewall Attacks events
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    CabhSec2FwEventControlEntry

cabhSec2FwEventControlEntry 1.3.6.1.2.1.1.1.4.2.1.1
Allows configuration of the reporting mechanisms for a particular type of attack.
Status: current Access: not-accessible
OBJECT-TYPE    
  CabhSec2FwEventControlEntry  

cabhSec2FwEventType 1.3.6.1.2.1.1.1.4.2.1.1.1
Classification of the different types of attacks. Type 1 logs all attempts from both LAN and WAN clients to traverse the Firewall that violate the Security Policy. Type 2 logs identified Denial of Service attack attempts. Type 3 logs all changes made to the cabhSec2FwPolicyFileURL, cabhSec2FwPolicyFileCurrentVersion or cabhSec2FwPolicyFileEnable objects. Type 4 logs all failed attempts to modify cabhSec2FwPolicyFileURL and cabhSec2FwPolicyFileEnable objects. Type 5 logs allowed inbound packets from the WAN. Type 6 logs allowed outbound packets from the LAN.
Status: current Access: not-accessible
OBJECT-TYPE    
  INTEGER type1(1), type2(2), type3(3), type4(4), type5(5), type6(6)  

cabhSec2FwEventEnable 1.3.6.1.2.1.1.1.4.2.1.1.2
Enables or disables counting and logging of firewall events by type as assigned by cabhSec2FwEventType.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER enabled(1), disabled(2)  

cabhSec2FwEventThreshold 1.3.6.1.2.1.1.1.4.2.1.1.3
Number of attacks to count before sending the appropriate event by type as assigned by cabhSec2FwEventType.
Status: current Access: read-write
OBJECT-TYPE    
  Unsigned32 0..65535  

cabhSec2FwEventInterval 1.3.6.1.2.1.1.1.4.2.1.1.4
Indicates the time interval in hours to count and log occurrences of a firewall event type as assigned in cabhSec2FwEventType. If this MIB has a value of zero then there is no interval assigned and the PS will not count or log events.
Status: current Access: read-write
OBJECT-TYPE    
  Unsigned32 0..65535  

cabhSec2FwEventCount 1.3.6.1.2.1.1.1.4.2.1.1.5
Indicates the current count up to the cabhSec2FwEventThreshold value by type as assigned by cabhSec2FwEventType.
Status: current Access: read-only
OBJECT-TYPE    
  ZeroBasedCounter32  

cabhSec2FwEventLogReset 1.3.6.1.2.1.1.1.4.2.1.1.6
Setting this object to true clears the log table for the specified event type. Reading this object always returns false.
Status: current Access: read-write
OBJECT-TYPE    
  TruthValue  

cabhSec2FwEventLogLastReset 1.3.6.1.2.1.1.1.4.2.1.1.7
The value of sysUpTime when cabhSec2FwEventLogReset was last set to true. Zero if never reset.
Status: current Access: read-only
OBJECT-TYPE    
  TimeStamp  

cabhSec2FwLogTable 1.3.6.1.2.1.1.1.4.3.1
Contains a log of packet information as related to events enabled by the cable operator. The types are defined in the CableHome 1.1 specification and require various objects to be included in the log. The following is a description for what is expected in the log for each type Type 1, Type 2, Type 5 and Type 6 table MUST include cabhSec2FwEventType, cabhSec2FwEventPriority, cabhSec2FwEventId, cabhSec2FwLogTime, cabhSec2FwIpProtocol, cabhSec2FwIpSourceAddr, cabhSec2FwIpDestAddr, cabhSec2FwIpSourcePort, cabhSec2FwIpDestPort, cabhSec2Fw, cabhSec2FwReplayCount. The other values not used by types 1, 2, 5 and 6 are default values. Type 3 and Type 4 MUST include cabhSec2FwEventType, cabhSec2FwEventPriority, cabhSec2FwEventId, cabhSec2FwLogTime, cabhSec2FwIpSourceAddr, cabhSec2FwLogMIBPointer. The other values not used by type 3 and 4 are default values.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    CabhSec2FwLogEntry

cabhSec2FwLogEntry 1.3.6.1.2.1.1.1.4.3.1.1
Each entry contains the log of firewall events
Status: current Access: not-accessible
OBJECT-TYPE    
  CabhSec2FwLogEntry  

cabhSec2FwLogIndex 1.3.6.1.2.1.1.1.4.3.1.1.1
A sequence number for the specific events under a cabhSec2FwEventType.
Status: current Access: not-accessible
OBJECT-TYPE    
  Unsigned32 1..2147483647  

cabhSec2FwLogEventType 1.3.6.1.2.1.1.1.4.3.1.1.2
Classification of the different types of attacks. Type 1 logs all attempts from both LAN and WAN clients to traverse the Firewall that violate the Security Policy. Type 2 logs identified Denial of Service attack attempts. Type 3 logs all changes made to the cabhSec2FwPolicyFileURL, cabhSec2FwPolicyFileCurrentVersion or cabhSec2FwPolicyFileEnable objects. Type 4 logs all failed attempts to modify cabhSec2FwPolicyFileURL and cabhSec2FwPolicyFileEnable objects. Type 5 logs allowed inbound packets from the WAN. Type 6 logs allowed outbound packets from the LAN.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER type1(1), type2(2), type3(3), type4(4), type5(5), type6(6)  

cabhSec2FwLogEventPriority 1.3.6.1.2.1.1.1.4.3.1.1.3
The priority level of this event as defined by CableHome Specification. If a priority is not assigned in the CableHome specification for a particular event then the vendor or cable operator may assign priorities. These are ordered from most serious (emergency) to least serious (debug).
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER emergency(1), alert(2), critical(3), error(4), warning(5), notice(6), information(7), debug(8)  

cabhSec2FwLogEventId 1.3.6.1.2.1.1.1.4.3.1.1.4
The assigned event ID.
Status: current Access: read-only
OBJECT-TYPE    
  Unsigned32  

cabhSec2FwLogTime 1.3.6.1.2.1.1.1.4.3.1.1.5
The time that this entry was created by the PS.
Status: current Access: read-only
OBJECT-TYPE    
  DateAndTime  

cabhSec2FwLogIpProtocol 1.3.6.1.2.1.1.1.4.3.1.1.6
The IP Protocol
Status: current Access: read-only
OBJECT-TYPE    
  Unsigned32 0..256  

cabhSec2FwLogIpAddrType 1.3.6.1.2.1.1.1.4.3.1.1.7
The type of IP addresses in the packet
Status: current Access: read-only
OBJECT-TYPE    
  InetAddressType  

cabhSec2FwLogIpSourceAddr 1.3.6.1.2.1.1.1.4.3.1.1.8
The Source IP Address of the packet logged. The address type of this object is specified by cabhSec2FwLogIpAddrType.
Status: current Access: read-only
OBJECT-TYPE    
  InetAddress  

cabhSec2FwLogIpDestAddr 1.3.6.1.2.1.1.1.4.3.1.1.9
The Destination IP Address of the packet logged. The address type of this object is specified by cabhSec2FwLogIpAddrType.
Status: current Access: read-only
OBJECT-TYPE    
  InetAddress  

cabhSec2FwLogIpSourcePort 1.3.6.1.2.1.1.1.4.3.1.1.10
The Source IP Port of the packet logged
Status: current Access: read-only
OBJECT-TYPE    
  InetPortNumber  

cabhSec2FwLogIpDestPort 1.3.6.1.2.1.1.1.4.3.1.1.11
The Source IP Port of the packet logged
Status: current Access: read-only
OBJECT-TYPE    
  InetPortNumber  

cabhSec2FwLogMessageType 1.3.6.1.2.1.1.1.4.3.1.1.12
The ICMP defined types.
Status: current Access: read-only
OBJECT-TYPE    
  Unsigned32  

cabhSec2FwLogReplayCount 1.3.6.1.2.1.1.1.4.3.1.1.13
The number of identical attack packets that were seen by the firewall based on cabhSec2FwLogIpProtocol, cabhSec2FwLogIpSourceAddr, cabhSec2FwLogIpDestAddr, cabhSec2FwLogIpSourcePort, cabhSec2FwLogIpDestPort and cabhSec2FwLogMessageType
Status: current Access: read-only
OBJECT-TYPE    
  Unsigned32  

cabhSec2FwLogMIBPointer 1.3.6.1.2.1.1.1.4.3.1.1.14
Identifies if the cabhSec2FwPolicyFileURL or the cabhSec2FwEnable MIB object changed or an attempt was made to change it.
Status: current Access: read-only
OBJECT-TYPE    
  VariablePointer  

cabhSec2FwFilterScheduleTable 1.3.6.1.2.1.1.1.4.4.1
Extends the filtering matching parameters of docsDevFilterIpTable defined in RFC 2669 for CableHome Residential Gateways to include time day intervals and days of the week.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    CabhSec2FwFilterScheduleEntry

cabhSec2FwFilterScheduleEntry 1.3.6.1.2.1.1.1.4.4.1.1
Extended values for entries of docsDevFilterIpTable. If the PS has not acquired ToD the entire docsDevFilterIpEntry rule set is ignored.
Status: current Access: not-accessible
OBJECT-TYPE    
  CabhSec2FwFilterScheduleEntry  

cabhSec2FwFilterScheduleStartTime 1.3.6.1.2.1.1.1.4.4.1.1.1
The start time, with optional time zone, for a firewall filter ruleset. Only the time portion of the DateAndTime TEXTUAL-CONVENTION have a meaning.
Status: current Access: read-create
OBJECT-TYPE    
  DateAndTime  

cabhSec2FwFilterScheduleEndTime 1.3.6.1.2.1.1.1.4.4.1.1.2
The end time, with optional time zone, for a firewall filter ruleset. Only the time portion of the DateAndTime TEXTUAL-CONVENTION have a meaning.
Status: current Access: read-create
OBJECT-TYPE    
  DateAndTime  

cabhSec2FwFilterScheduleDOW 1.3.6.1.2.1.1.1.4.4.1.1.3
If the day of week bit associated with the PS given day is '1', this object criteria matches.
Status: current Access: read-create
OBJECT-TYPE    
  BITS sunday(0), monday(1), tuesday(2), wednesday(3), thursday(4), friday(5), saturday(6)  

cabhSecKerbPKINITGracePeriod 1.3.6.1.2.1.1.1.3.1.1
The PKINIT Grace Period is needed by the PS to know when it should start retrying to get a new ticket. The PS MUST obtain a new Kerberos ticket (with a PKINIT exchange); this may be many minutes before the old ticket expires.
Status: current Access: read-write
OBJECT-TYPE    
  Unsigned32 15..600  

cabhSecKerbTGSGracePeriod 1.3.6.1.2.1.1.1.3.1.2
The TGS Grace Period is needed by the PS to know when it should start retrying to get a new ticket. The PS MUST obtain a new Kerberos ticket (with a TGS Request); this may be many minutes before the old ticket expires.
Status: current Access: read-write
OBJECT-TYPE    
  Unsigned32 1..600  

cabhSecKerbUnsolicitedKeyMaxTimeout 1.3.6.1.2.1.1.1.3.1.3
This timeout applies to PS initiated AP-REQ/REP key management exchange with NMS. The maximum timeout is the value which may not be exceeded in the exponential backoff algorithm.
Status: current Access: read-write
OBJECT-TYPE    
  Unsigned32 15..600  

cabhSecKerbUnsolicitedKeyMaxRetries 1.3.6.1.2.1.1.1.3.1.4
The number of retries the PS is allowed for AP-REQ/REP key management exchange initiation with the NMS. This is the maximum number of retries before the PS gives up attempting to establish an SNMPv3 security association with NMS.
Status: current Access: read-write
OBJECT-TYPE    
  Unsigned32 1..32  

cabhSecNotification 1.3.6.1.2.1.1.2
OBJECT IDENTIFIER    

cabhSecConformance 1.3.6.1.2.1.1.3
OBJECT IDENTIFIER    

cabhSecCompliances 1.3.6.1.2.1.1.3.1
OBJECT IDENTIFIER    

cabhSecGroups 1.3.6.1.2.1.1.3.2
OBJECT IDENTIFIER    

cabhSecCompliance 1.3.6.1.2.1.1.3.1.1
The compliance statement for CableHome Security.
Status: current Access: read-write
MODULE-COMPLIANCE    

cabhSecGroup 1.3.6.1.2.1.1.3.2.1
Group of objects in CableHome 1.0 Firewall MIB.
Status: current Access: read-write
OBJECT-GROUP    

cabhSecCertGroup 1.3.6.1.2.1.1.3.2.2
Group of objects in CableHome gateway for PS Certificate.
Status: current Access: read-write
OBJECT-GROUP    

cabhSecKerbGroup 1.3.6.1.2.1.1.3.2.3
Group of objects in CableHome gateway for Kerberos.
Status: current Access: read-write
OBJECT-GROUP    

cabhSec2Group 1.3.6.1.2.1.1.3.2.4
Group of objects in CableHome 1.1 Firewall MIB.
Status: current Access: read-write
OBJECT-GROUP