This octet string is interpreted as a bit mask, in which
each bit corresponds to a category of SNMP trap.
The DESCRIPTION clause of a MIB object having this
SYNTAX should specify the semantics of bit values
'1' and '0'.
Bit definitions are as follows, where bit 31 is the
most significant bit of the first octet, and bit 0
is the least significant bit of the fourth octet:
Bit Category
----- -----------------------------------------------
0 SNMP standard coldStart/warmStart/authenticationFailure
1 SNMP standard linkUp/linkDown
2 Platform inventory.
3 Environment (power, temperature, fan).
4 Bulkstats / accounting
5-31 Undefined.
The maximum sized SNMP PDU, in bytes, that this agent
is capable of handling. The default is 1500 bytes.
The posssibility of IP fragmentation should be considered
when setting this object to large values.
Table of SNMP management clients.
Authentic SNMP clients are identified by a combination
community name and IP address.
Upon receipt of an SNMP request, this table is scanned for
a matching community name. If an entry containing a matching
community name is found, the entry's IP access list, if nonzero,
is used to validate the source IP address received in the request;
else, if the IP access list number in the matching entry is zero,
the source IP address is accepted.
Finally, the type of SNMP request is validated with respect to
the access privilege of the matching entry (e.g. a SET Request
is rejected for an entry having read-only privilege).
Use of this table constitutes 'trivial authentication',
i.e. no mechanism is employed to confirm the received SNMP
request was indeed originated by the host identified by the
IP source address.
The access privileges for a SNMP Community authenticated
by this entry.
readOnly Read-only access to nonadministrative portions of MIB.
readWrite Read-write access to nonadministrative portions of MIB.
admin Read-write access to entire MIB.
'Administrative' portions of the MIB are those portions that
pertain to management access into the managed device.
If nonzero, the number of an IP access list that describes the
IP hosts permitted SNMP management access to this device via the
corresponding community name contained in this entry.
This object provides global control over trap
generation by this agent. For each bit position,
a '1' or '0' indicates the corresponding trap
category is enabled or disabled, respectively.
The ifIndex of the interface whose IP address
is used as the source IP address for outbound
SNMP traps.
If zero, no interface is specified, the mechanism for
selecting a source IP address is implementation-dependent,
and may vary with each trap sent.
The format of the SNMP trap PDU to be sent to this
trap destination.
v1 Trap-PDU defined in RFC1157, encapsulated in Message
structure also defined in RFC1157.
v2c SNMPv2-Trap-PDU defined in RFC1905, encapsulated in
Message structure defined in RFC1901.
Bit mask designating the specific trap types
enabled for transmission to this trap destination.
For each bit position, a '1' or '0' indicates the
corresponding trap type is enabled or disabled,
respectively.
Note, trap generation is further constrained by
the value rsSnmpTrapGlobalFilter.
The reason a received SNMP request failed authentication:
other Unspecified reason.
badCommunityName The community is not recognized.
badCommunityUse The community does not have privilege for
the SNMP request type (e.g. SET request
with a community having read-only privilege).
hostDenied The host IP address was denied by the
community's associated access list.