RADLAN-SECSD-MIB

File: RADLAN-SECSD-MIB.mib (15797 bytes)

Imported modules

RADLAN-MIB SNMPv2-TC P-BRIDGE-MIB
SNMPv2-SMI

Imported symbols

rnd TEXTUAL-CONVENTION DisplayString
EnabledStatus TruthValue RowStatus
OBJECT-TYPE

Defined Types

RlSecSdRuleUserType  
The Security Sensitive Data channels access users. user-name - the rule is per rlSecSdRuleUserName. default-user - the rule is per the default system user name. all-users - all users which their user level permission is less then 15. level-15-users - users which their user level permission is 15.
TEXTUAL-CONVENTION    
  INTEGER user-name(1), default-user(2), level-15-users(3), all-users(4)  

RlSecSdChannelType  
The Security Sensitive Data channels: secure - secure channels as console, ssh, scp, https. insecure - insecure channels as telnet, http. secure-xml-snmp - SNMPv3 with privacy or XML over https. insecure-xml-snmp - SNMPv1/v2/v3 without privacy, xml over http.
TEXTUAL-CONVENTION    
  INTEGER secure-xml-snmp(1), secure(2), insecure(3), insecure-xml-snmp(4)  

RlSecSdAccessType  
The Security Sensitive Data channels default read/write access action: exclude - Security Sensitive Data can not retrieved/set. include-encrypted - SSD can retrieved/set as encrypted only. include-decrypted - SSD can retrieved/set as decrypted only.
TEXTUAL-CONVENTION    
  INTEGER exclude(1), include-encrypted(2), include-decrypted(3)  

RlSecSdPermitAccessType  
The Security Sensitive Data channels access permit read/write action: exclude - Security Sensitive Data can not retrieved/set. include-encrypted - SSD can retrieved/set as encrypted only. include-decrypted - SSD can retrieved/set as decrypted only. include-all - SSD can retrieved/set as encrypted or as decrypted.
TEXTUAL-CONVENTION    
  INTEGER exclude(1), include-encrypted(2), include-decrypted(3), include-all(4)  

RlSecSdSessionAccessType  
The Security Sensitive Data (SSD) channels access per session: exclude - Security Sensitive Data can not retrieved. include-encrypted - SSD can retrieved as encrypted only. include-decrypted - SSD can retrieved as decrypted only. default - Set to the default SSD access as defined by the SSD rules.
TEXTUAL-CONVENTION    
  INTEGER exclude(1), include-encrypted(2), include-decrypted(3), default(4)  

RlSecSdRuleOwnerType  
The Security Sensitive Data rule owner: default - default rule which is defined by the device. user - rule which is defined by user.
TEXTUAL-CONVENTION    
  INTEGER default(1), user(2)  

RlSecSdRulesEntry  
SEQUENCE    
  rlSecSdRuleUser RlSecSdRuleUserType
  rlSecSdRuleUserName DisplayString
  rlSecSdRuleChannel RlSecSdChannelType
  rlSecSdRuleRead RlSecSdAccessType
  rlSecSdRulePermitRead RlSecSdPermitAccessType
  rlSecSdRuleIsDefault TruthValue
  rlSecSdRuleOwner RlSecSdRuleOwnerType
  rlSecSdRuleStatus RowStatus

RlSecSdMngSessionsEntry  
SEQUENCE    
  rlSecSdMngSessionId INTEGER
  rlSecSdMngSessionUserLevel INTEGER
  rlSecSdMngSessionUserName DisplayString
  rlSecSdMngSessionChannel RlSecSdChannelType

Defined Values

rlSecSd 1.3.6.1.4.1.89.209
The private MIB module definition for Security Sensitive Data (SSD), contains the MIB tables and scalars to manage the access through the different management channels as CLI, WEB and others, for sensitive data as user names and passwords in system.
MODULE-IDENTITY    

rlSecSdRulesTable 1.3.6.1.4.1.89.209.1
The table holding the Security Sensitive Data access rules per: user name / user level and management channel. Allow to add/edit/remove Security Sensitive Data rules.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    RlSecSdRulesEntry

rlSecSdRulesEntry 1.3.6.1.4.1.89.209.1.1
An entry in the rlSecSdRulesTable.
Status: current Access: not-accessible
OBJECT-TYPE    
  RlSecSdRulesEntry  

rlSecSdRuleUser 1.3.6.1.4.1.89.209.1.1.1
Contains the Rule user type as described in RlSecSdRuleUserType.
Status: current Access: read-write
OBJECT-TYPE    
  RlSecSdRuleUserType  

rlSecSdRuleUserName 1.3.6.1.4.1.89.209.1.1.2
Contains the Rule user name when rlSecSdRuleUser value is user-name, Otherwise it contains an empty string
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString Size(0..39)  

rlSecSdRuleChannel 1.3.6.1.4.1.89.209.1.1.3
Contains the Rule management channel type as described in RlSecSdChannelType. secure-xml-snmp and insecure-xml-snmp management channels have no include-encrypted capability thus their rlSecSdRulePermitRead and rlSecSdRuleRead can have only RlSecSdAccessType values of exclude or include-decrypted.
Status: current Access: read-write
OBJECT-TYPE    
  RlSecSdChannelType  

rlSecSdRuleRead 1.3.6.1.4.1.89.209.1.1.4
Contains the Rule default read access level as described in RlSecSdAccessType, must be lower or equal access from rlSecSdRulePermitRead
Status: current Access: read-write
OBJECT-TYPE    
  RlSecSdAccessType  

rlSecSdRulePermitRead 1.3.6.1.4.1.89.209.1.1.5
Contains the Rule maximum permission access level as described in RlSecSdPermitAccessType.
Status: current Access: read-write
OBJECT-TYPE    
  RlSecSdPermitAccessType  

rlSecSdRuleIsDefault 1.3.6.1.4.1.89.209.1.1.6
true - Rule has created by the by the system. false - Rule has created by the user.
Status: current Access: read-only
OBJECT-TYPE    
  TruthValue  

rlSecSdRuleOwner 1.3.6.1.4.1.89.209.1.1.7
Contains the current Rule ownership as defined in RlSecSdRuleOwnerType. when rlSecSdRuleIsDefault is true, rlSecSdRuleOwner allowed to change default rule to user rule and vice versa.
Status: current Access: read-write
OBJECT-TYPE    
  RlSecSdRuleOwnerType  

rlSecSdRuleStatus 1.3.6.1.4.1.89.209.1.1.8
The status of a table entry. It is used to Add/Edit/Delete an entry from this table.
Status: current Access: read-write
OBJECT-TYPE    
  RowStatus  

rlSecSdMngSessionsTable 1.3.6.1.4.1.89.209.2
The table holding Security Sensitive Data management sessions. Allowing to get management channel, user name, user level.
Status: current Access: not-accessible
OBJECT-TYPE    
  SEQUENCE OF  
    RlSecSdMngSessionsEntry

rlSecSdMngSessionsEntry 1.3.6.1.4.1.89.209.2.2
An entry in the rlSecSdMngSessionsTable.
Status: current Access: not-accessible
OBJECT-TYPE    
  RlSecSdMngSessionsEntry  

rlSecSdMngSessionId 1.3.6.1.4.1.89.209.2.2.1
Contains the Security Sensitive Data management session identifier, rlSecSdCurrentSessionId is used to get the current management session identifier
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER  

rlSecSdMngSessionUserLevel 1.3.6.1.4.1.89.209.2.2.2
Contains the Security Sensitive Data management session user access level.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER  

rlSecSdMngSessionUserName 1.3.6.1.4.1.89.209.2.2.3
Contains the Security Sensitive Data management session user name.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString Size(0..160)  

rlSecSdMngSessionChannel 1.3.6.1.4.1.89.209.2.2.4
Contains the Security Sensitive Data management session channel type as described in RlSecSdChannelType.
Status: current Access: read-only
OBJECT-TYPE    
  RlSecSdChannelType  

rlSecSdSessionControl 1.3.6.1.4.1.89.209.3
Action scalar which set the default read access of Security Sensitive Data. Affect only on session which from this scalar is configured. Scalar Get value is the default-display/read of the session which from this scalar is retrieved.
Status: current Access: read-write
OBJECT-TYPE    
  RlSecSdSessionAccessType  

rlSecSdCurrentSessionId 1.3.6.1.4.1.89.209.4
Get the current SSD management channel identifier, used to get information from rlSecSdMngSessionsTable.
Status: current Access: read-only
OBJECT-TYPE    
  INTEGER  

rlSecSdPassPhrase 1.3.6.1.4.1.89.209.5
Set the passphrase for the SSD encryptyption / decryption key. on set, passphrase is in plain text format. on get, passphrase is encrypted.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString Size(0..160)  

rlSecSdFilePassphraseControl 1.3.6.1.4.1.89.209.6
File Passphrase control provides an additional level of protection on passphrase and configurations. restricted - a device restricts its passphrase from being inserted into a configuration file. unrestricted - (default) a device will include its passphrase when creating a configuration file.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER restricted(1), unrestricted(2)  

rlSecSdFileIntegrityControl 1.3.6.1.4.1.89.209.7
File integrity control provides a validation of configuration file. enable - Validate the configuration file digest when downloading the file to startup configuration. disable - Do not validate.
Status: current Access: read-write
OBJECT-TYPE    
  INTEGER enable(1), disable(2)  

rlSecSdConfigurationFileSsdDigest 1.3.6.1.4.1.89.209.8
SSD block in configuration file integrity digest, auxiliary action scalar for internal system using during configuration download.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString Size(0..160)  

rlSecSdConfigurationFileDigest 1.3.6.1.4.1.89.209.9
SSD configuration file integrity digest, auxiliary action scalar for internal system using during configuration download.
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString Size(0..160)  

rlSecSdFileIndicator 1.3.6.1.4.1.89.209.10
Retrieve configuration file SSD indicator. set value: configuration file name. get value: Exclude, Encrypted, Plaintext
Status: current Access: read-write
OBJECT-TYPE    
  DisplayString Size(0..39)